1<testcase> 2<info> 3<keywords> 4SMTP 5SASL 6SASL AUTH NTLM 7SASL AUTH PLAIN 8SASL DOWNGRADE 9RFC4954 10</keywords> 11</info> 12 13# 14# Server-side 15<reply> 16<servercmd> 17AUTH NTLM PLAIN 18REPLY "AUTH NTLM" 334 NTLM supported 19REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 334 Rubbish 20REPLY * 501 AUTH exchange cancelled by client 21REPLY "AUTH PLAIN" 334 PLAIN supported 22REPLY AHVzZXIAc2VjcmV0 235 Authenticated 23</servercmd> 24</reply> 25 26# 27# Client-side 28<client> 29<server> 30smtp 31</server> 32<features> 33NTLM 34SSL 35!SSPI 36</features> 37 <name> 38SMTP NTLM authentication with SASL downgrade 39 </name> 40<stdin> 41mail body 42</stdin> 43 <setenv> 44# we force our own host name, in order to make the test machine independent 45CURL_GETHOSTNAME=curlhost 46# we try to use the LD_PRELOAD hack, if not a debug build 47LD_PRELOAD=%PWD/libtest/.libs/libhostname.so 48 </setenv> 49 <command> 50smtp://%HOSTIP:%SMTPPORT/936 --mail-rcpt recipient@example.com --mail-from sender@example.com -u user:secret -T - 51</command> 52<precheck> 53chkhostname curlhost 54</precheck> 55</client> 56 57# 58# Verify data after the test has been "shot" 59<verify> 60<protocol> 61EHLO 936 62AUTH NTLM 63TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 64* 65AUTH PLAIN 66AHVzZXIAc2VjcmV0 67MAIL FROM:<sender@example.com> 68RCPT TO:<recipient@example.com> 69DATA 70QUIT 71</protocol> 72<upload> 73mail body 74. 75</upload> 76</verify> 77</testcase> 78