1<testcase> 2<info> 3<keywords> 4SMTP 5SMTP AUTH NTLM 6SMTP AUTH PLAIN 7SASL DOWNGRADE 8RFC4954 9</keywords> 10</info> 11 12# 13# Server-side 14<reply> 15<servercmd> 16AUTH NTLM PLAIN 17REPLY "AUTH NTLM" 334 NTLM supported 18REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 334 Rubbish 19REPLY * 501 AUTH exchange cancelled by client 20REPLY "AUTH PLAIN" 334 PLAIN supported 21REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated 22</servercmd> 23</reply> 24 25# 26# Client-side 27<client> 28<server> 29smtp 30</server> 31<features> 32NTLM 33!SSPI 34</features> 35 <name> 36SMTP NTLM authentication with SASL downgrade 37 </name> 38<stdin> 39mail body 40</stdin> 41 <setenv> 42# we force our own host name, in order to make the test machine independent 43CURL_GETHOSTNAME=curlhost 44# we try to use the LD_PRELOAD hack, if not a debug build 45LD_PRELOAD=%PWD/libtest/.libs/libhostname.so 46 </setenv> 47 <command> 48smtp://%HOSTIP:%SMTPPORT/936 --mail-rcpt recipient@example.com --mail-from sender@example.com -u user:secret -T - 49</command> 50<precheck> 51chkhostname curlhost 52</precheck> 53</client> 54 55# 56# Verify data after the test has been "shot" 57<verify> 58<protocol> 59EHLO 936 60AUTH NTLM 61TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 62* 63AUTH PLAIN 64dXNlcgB1c2VyAHNlY3JldA== 65MAIL FROM:<sender@example.com> 66RCPT TO:<recipient@example.com> 67DATA 68QUIT 69</protocol> 70<upload> 71mail body 72. 73</upload> 74</verify> 75</testcase> 76