1<testcase>
2<info>
3<keywords>
4SMTP
5SMTP AUTH NTLM
6SMTP AUTH PLAIN
7SASL DOWNGRADE
8RFC4954
9</keywords>
10</info>
11
12#
13# Server-side
14<reply>
15<servercmd>
16AUTH NTLM PLAIN
17REPLY "AUTH NTLM" 334 NTLM supported
18REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 334 Rubbish
19REPLY * 501 AUTH exchange cancelled by client
20REPLY "AUTH PLAIN" 334 PLAIN supported
21REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
22</servercmd>
23</reply>
24
25#
26# Client-side
27<client>
28<server>
29smtp
30</server>
31<features>
32NTLM
33!SSPI
34</features>
35 <name>
36SMTP NTLM authentication with SASL downgrade
37 </name>
38<stdin>
39mail body
40</stdin>
41 <setenv>
42# we force our own host name, in order to make the test machine independent
43CURL_GETHOSTNAME=curlhost
44# we try to use the LD_PRELOAD hack, if not a debug build
45LD_PRELOAD=%PWD/libtest/.libs/libhostname.so
46 </setenv>
47 <command>
48smtp://%HOSTIP:%SMTPPORT/936 --mail-rcpt recipient@example.com --mail-from sender@example.com -u user:secret -T -
49</command>
50<precheck>
51chkhostname curlhost
52</precheck>
53</client>
54
55#
56# Verify data after the test has been "shot"
57<verify>
58<protocol>
59EHLO 936
60AUTH NTLM
61TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
62*
63AUTH PLAIN
64dXNlcgB1c2VyAHNlY3JldA==
65MAIL FROM:<sender@example.com>
66RCPT TO:<recipient@example.com>
67DATA
68QUIT
69</protocol>
70<upload>
71mail body
72.
73</upload>
74</verify>
75</testcase>
76