xref: /aosp_15_r20/external/curl/tests/data/test1476 (revision 6236dae45794135f37c4eb022389c904c8b0090d)
1*6236dae4SAndroid Build Coastguard Worker<testcase>
2*6236dae4SAndroid Build Coastguard Worker<info>
3*6236dae4SAndroid Build Coastguard Worker<keywords>
4*6236dae4SAndroid Build Coastguard WorkerHTTP
5*6236dae4SAndroid Build Coastguard WorkerHTTP GET
6*6236dae4SAndroid Build Coastguard Workercookies
7*6236dae4SAndroid Build Coastguard Worker</keywords>
8*6236dae4SAndroid Build Coastguard Worker</info>
9*6236dae4SAndroid Build Coastguard Worker
10*6236dae4SAndroid Build Coastguard Worker# Server-side
11*6236dae4SAndroid Build Coastguard Worker<reply>
12*6236dae4SAndroid Build Coastguard Worker
13*6236dae4SAndroid Build Coastguard Worker<data crlf="yes">
14*6236dae4SAndroid Build Coastguard WorkerHTTP/1.1 200 OK
15*6236dae4SAndroid Build Coastguard WorkerDate: Tue, 09 Nov 2010 14:49:00 GMT
16*6236dae4SAndroid Build Coastguard WorkerContent-Length: 0
17*6236dae4SAndroid Build Coastguard WorkerSet-Cookie: super=oops; domain=co.UK; path=/
18*6236dae4SAndroid Build Coastguard WorkerSet-Cookie: fine=yesyes; domain=CURL.CO.UK; path=/
19*6236dae4SAndroid Build Coastguard Worker
20*6236dae4SAndroid Build Coastguard Worker</data>
21*6236dae4SAndroid Build Coastguard Worker</reply>
22*6236dae4SAndroid Build Coastguard Worker
23*6236dae4SAndroid Build Coastguard Worker# Client-side
24*6236dae4SAndroid Build Coastguard Worker<client>
25*6236dae4SAndroid Build Coastguard Worker<server>
26*6236dae4SAndroid Build Coastguard Workerhttp
27*6236dae4SAndroid Build Coastguard Worker</server>
28*6236dae4SAndroid Build Coastguard Worker<name>
29*6236dae4SAndroid Build Coastguard WorkerPSL violating cookie with mixed case domain and cookie domain property
30*6236dae4SAndroid Build Coastguard Worker</name>
31*6236dae4SAndroid Build Coastguard Worker<command>
32*6236dae4SAndroid Build Coastguard Worker-x http://%HOSTIP:%HTTPPORT/%TESTNUMBER http://curl.co.UK -c %LOGDIR/cookies%TESTNUMBER.txt
33*6236dae4SAndroid Build Coastguard Worker</command>
34*6236dae4SAndroid Build Coastguard Worker<features>
35*6236dae4SAndroid Build Coastguard Workerproxy
36*6236dae4SAndroid Build Coastguard WorkerPSL
37*6236dae4SAndroid Build Coastguard Workercookies
38*6236dae4SAndroid Build Coastguard Worker</features>
39*6236dae4SAndroid Build Coastguard Worker</client>
40*6236dae4SAndroid Build Coastguard Worker
41*6236dae4SAndroid Build Coastguard Worker# Verify data after the test has been "shot"
42*6236dae4SAndroid Build Coastguard Worker<verify>
43*6236dae4SAndroid Build Coastguard Worker<protocol crlf="yes">
44*6236dae4SAndroid Build Coastguard WorkerGET http://curl.co.UK/ HTTP/1.1
45*6236dae4SAndroid Build Coastguard WorkerHost: curl.co.UK
46*6236dae4SAndroid Build Coastguard WorkerUser-Agent: curl/%VERSION
47*6236dae4SAndroid Build Coastguard WorkerAccept: */*
48*6236dae4SAndroid Build Coastguard WorkerProxy-Connection: Keep-Alive
49*6236dae4SAndroid Build Coastguard Worker
50*6236dae4SAndroid Build Coastguard Worker</protocol>
51*6236dae4SAndroid Build Coastguard Worker<file name="%LOGDIR/cookies%TESTNUMBER.txt" mode="text">
52*6236dae4SAndroid Build Coastguard Worker# Netscape HTTP Cookie File
53*6236dae4SAndroid Build Coastguard Worker# https://curl.se/docs/http-cookies.html
54*6236dae4SAndroid Build Coastguard Worker# This file was generated by libcurl! Edit at your own risk.
55*6236dae4SAndroid Build Coastguard Worker
56*6236dae4SAndroid Build Coastguard Worker.CURL.CO.UK	TRUE	/	FALSE	0	fine	yesyes
57*6236dae4SAndroid Build Coastguard Worker</file>
58*6236dae4SAndroid Build Coastguard Worker</verify>
59*6236dae4SAndroid Build Coastguard Worker</testcase>
60