irctest.client_tests.sasl

SASL authentication from clients, for all known mechanisms.

For now, only SASLv3.1 is tested, not SASLv3.2.

Irc302SaslTestCase

limnoria
sopel
testPlainNotAvailable
Test the client does not try to authenticate using a mechanism the

server does not advertise. Actually, this is optional.

..

SaslTestCase

limnoria
sopel
testEcdsa

Test ECDSA authentication.

.s
testPlain

Test PLAIN authentication with correct username/password.

..
testPlainLargeMultiple[\xe9\xe8]
Test the client splits large AUTHENTICATE messages whose payload

is a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

..
testPlainLargeMultiple[quux]
Test the client splits large AUTHENTICATE messages whose payload

is a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

..
testPlainLarge[\xe9\xe8\xe0]
Test the client splits large AUTHENTICATE messages whose payload

is not a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

..
testPlainLarge[barbaz]
Test the client splits large AUTHENTICATE messages whose payload

is not a multiple of 400. <http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>

..
testPlainNotAvailable
sasl=EXTERNAL is advertized, whereas the client is configured

to use PLAIN.

A client implementing sasl-3.2 can give up authentication immediately. A client not implementing it will try authenticating, and will get a 904.

..
testScram

Test SCRAM-SHA-256 authentication.

.s
testScramBadPassword

Test SCRAM-SHA-256 authentication with a bad password.

.s
testScramMaliciousServer[AAAA]
Test SCRAM-SHA-256 authentication to a server which pretends to know

the password

.s
testScramMaliciousServer[]
Test SCRAM-SHA-256 authentication to a server which pretends to know

the password

.s
testScramMaliciousServer[dj1ubU1mM1FIV2NKUWk5cE1ndHFLU0tQclZueUk2c3FOTzZJN3BFLzBveUdjPQ==]
Test SCRAM-SHA-256 authentication to a server which pretends to know

the password

.s