• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1<testcase>
2<info>
3<keywords>
4SMTP
5SASL
6SASL AUTH NTLM
7SASL AUTH PLAIN
8SASL DOWNGRADE
9RFC4954
10</keywords>
11</info>
12
13#
14# Server-side
15<reply>
16<servercmd>
17AUTH NTLM PLAIN
18REPLY "AUTH NTLM" 334 NTLM supported
19REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 334 Rubbish
20REPLY * 501 AUTH exchange cancelled by client
21REPLY "AUTH PLAIN" 334 PLAIN supported
22REPLY AHVzZXIAc2VjcmV0 235 Authenticated
23</servercmd>
24</reply>
25
26#
27# Client-side
28<client>
29<server>
30smtp
31</server>
32<features>
33NTLM
34SSL
35!SSPI
36</features>
37 <name>
38SMTP NTLM authentication with SASL downgrade
39 </name>
40<stdin>
41mail body
42</stdin>
43 <setenv>
44# we force our own host name, in order to make the test machine independent
45CURL_GETHOSTNAME=curlhost
46# we try to use the LD_PRELOAD hack, if not a debug build
47LD_PRELOAD=%PWD/libtest/.libs/libhostname.so
48 </setenv>
49 <command>
50smtp://%HOSTIP:%SMTPPORT/936 --mail-rcpt recipient@example.com --mail-from sender@example.com -u user:secret -T -
51</command>
52<precheck>
53chkhostname curlhost
54</precheck>
55</client>
56
57#
58# Verify data after the test has been "shot"
59<verify>
60<protocol>
61EHLO 936
62AUTH NTLM
63TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
64*
65AUTH PLAIN
66AHVzZXIAc2VjcmV0
67MAIL FROM:<sender@example.com>
68RCPT TO:<recipient@example.com>
69DATA
70QUIT
71</protocol>
72<upload>
73mail body
74.
75</upload>
76</verify>
77</testcase>
78