113498266Sopenharmony_ci<testcase> 213498266Sopenharmony_ci<info> 313498266Sopenharmony_ci<keywords> 413498266Sopenharmony_ciHTTP 513498266Sopenharmony_ciHTTP GET 613498266Sopenharmony_ci--fail 713498266Sopenharmony_ci</keywords> 813498266Sopenharmony_ci</info> 913498266Sopenharmony_ci 1013498266Sopenharmony_ci# Server-side 1113498266Sopenharmony_ci<reply> 1213498266Sopenharmony_ci<data nocheck="yes"> 1313498266Sopenharmony_ciHTTP/1.0 401 BAD BOY 1413498266Sopenharmony_ciServer: swsclose 1513498266Sopenharmony_ciContent-Type: text/html 1613498266Sopenharmony_ci 1713498266Sopenharmony_ciThis contains a response code >= 400, so curl shouldn't display this. Even 1813498266Sopenharmony_cithough it's a response code that triggers authentication, we're not using 1913498266Sopenharmony_ciauthentication so we should still fail. 2013498266Sopenharmony_ci</data> 2113498266Sopenharmony_ci</reply> 2213498266Sopenharmony_ci 2313498266Sopenharmony_ci# Client-side 2413498266Sopenharmony_ci<client> 2513498266Sopenharmony_ci<server> 2613498266Sopenharmony_cihttp 2713498266Sopenharmony_ci</server> 2813498266Sopenharmony_ci<name> 2913498266Sopenharmony_ciHTTP GET with an error code that might trick authentication and --fail 3013498266Sopenharmony_ci</name> 3113498266Sopenharmony_ci<command> 3213498266Sopenharmony_cihttp://%HOSTIP:%HTTPPORT/%TESTNUMBER --fail 3313498266Sopenharmony_ci</command> 3413498266Sopenharmony_ci</client> 3513498266Sopenharmony_ci 3613498266Sopenharmony_ci# Verify data after the test has been "shot" 3713498266Sopenharmony_ci<verify> 3813498266Sopenharmony_ci<protocol> 3913498266Sopenharmony_ciGET /%TESTNUMBER HTTP/1.1 4013498266Sopenharmony_ciHost: %HOSTIP:%HTTPPORT 4113498266Sopenharmony_ciUser-Agent: curl/%VERSION 4213498266Sopenharmony_ciAccept: */* 4313498266Sopenharmony_ci 4413498266Sopenharmony_ci</protocol> 4513498266Sopenharmony_ci<errorcode> 4613498266Sopenharmony_ci22 4713498266Sopenharmony_ci</errorcode> 4813498266Sopenharmony_ci</verify> 4913498266Sopenharmony_ci</testcase> 50