irctest.client_tests.sasl

SASL authentication from clients, for all known mechanisms.

For now, only SASLv3.1 is tested, not SASLv3.2.

Irc302SaslTestCase

limnoria
sopel
thelounge
testPlainNotAvailable
Test the client does not try to authenticate using a mechanism the

server does not advertise. Actually, this is optional.

...

SaslTestCase

limnoria
sopel
thelounge
testEcdsa

Test ECDSA authentication.

.ss
testPlain

Test PLAIN authentication with correct username/password.

...
testPlainLargeMultiple[\xe9\xe8]
Test the client splits large AUTHENTICATE messages whose payload

is a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

...
testPlainLargeMultiple[quux]
Test the client splits large AUTHENTICATE messages whose payload

is a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

..s
testPlainLarge[\xe9\xe8\xe0]
Test the client splits large AUTHENTICATE messages whose payload

is not a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

...
testPlainLarge[barbaz]
Test the client splits large AUTHENTICATE messages whose payload

is not a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

..s
testPlainNotAvailable
sasl=EXTERNAL is advertized, whereas the client is configured

to use PLAIN.

A client implementing sasl-3.2 can give up authentication immediately. A client not implementing it will try authenticating, and will get a 904.

...
testScram

Test SCRAM-SHA-256 authentication.

.ss
testScramBadPassword

Test SCRAM-SHA-256 authentication with a bad password.

.ss
testScramMaliciousServer[AAAA]
Test SCRAM-SHA-256 authentication to a server which pretends to know

the password

.ss
testScramMaliciousServer[]
Test SCRAM-SHA-256 authentication to a server which pretends to know

the password

.ss
testScramMaliciousServer[dj1ubU1mM1FIV2NKUWk5cE1ndHFLU0tQclZueUk2c3FOTzZJN3BFLzBveUdjPQ==]
Test SCRAM-SHA-256 authentication to a server which pretends to know

the password

.ss