xref: /aosp_15_r20/external/curl/tests/data/test875 (revision 6236dae45794135f37c4eb022389c904c8b0090d)
1*6236dae4SAndroid Build Coastguard Worker<testcase>
2*6236dae4SAndroid Build Coastguard Worker<info>
3*6236dae4SAndroid Build Coastguard Worker<keywords>
4*6236dae4SAndroid Build Coastguard WorkerPOP3
5*6236dae4SAndroid Build Coastguard WorkerCRLF-in-URL
6*6236dae4SAndroid Build Coastguard Worker</keywords>
7*6236dae4SAndroid Build Coastguard Worker</info>
8*6236dae4SAndroid Build Coastguard Worker
9*6236dae4SAndroid Build Coastguard Worker# Client-side
10*6236dae4SAndroid Build Coastguard Worker<client>
11*6236dae4SAndroid Build Coastguard Worker<server>
12*6236dae4SAndroid Build Coastguard Workerpop3
13*6236dae4SAndroid Build Coastguard Worker</server>
14*6236dae4SAndroid Build Coastguard Worker<name>
15*6236dae4SAndroid Build Coastguard WorkerPOP3 with URL-encoded CR LF in the URL
16*6236dae4SAndroid Build Coastguard Worker</name>
17*6236dae4SAndroid Build Coastguard Worker<command>
18*6236dae4SAndroid Build Coastguard Workerpop3://%HOSTIP:%POP3PORT/%0d%0a/%TESTNUMBER
19*6236dae4SAndroid Build Coastguard Worker</command>
20*6236dae4SAndroid Build Coastguard Worker</client>
21*6236dae4SAndroid Build Coastguard Worker
22*6236dae4SAndroid Build Coastguard Worker#
23*6236dae4SAndroid Build Coastguard Worker<verify>
24*6236dae4SAndroid Build Coastguard Worker# 3 - CURLE_URL_MALFORMAT
25*6236dae4SAndroid Build Coastguard Worker<errorcode>
26*6236dae4SAndroid Build Coastguard Worker3
27*6236dae4SAndroid Build Coastguard Worker</errorcode>
28*6236dae4SAndroid Build Coastguard Worker</verify>
29*6236dae4SAndroid Build Coastguard Worker</testcase>
30