torture_assert_ntstatus_ok(tctx, dcerpc_netr_LogonSamLogon_r(b, tctx, &r),
"LogonSamLogon failed");
+ if (creds->authenticate_kerberos &&
+ auth_type != DCERPC_AUTH_TYPE_KRB5 &&
+ auth_level != DCERPC_AUTH_LEVEL_PRIVACY)
+ {
+ torture_assert_ntstatus_equal(tctx,
+ r.out.result,
+ NT_STATUS_ACCESS_DENIED,
+ "LogonSamLogon auth none krb5");
+ continue;
+ }
torture_assert_ntstatus_ok(tctx, r.out.result, "LogonSamLogon failed");
status = netlogon_creds_client_verify(creds,
torture_assert_ntstatus_ok(tctx, dcerpc_netr_LogonSamLogon_r(b, tctx, &r),
"LogonSamLogon failed");
+ if (creds->authenticate_kerberos &&
+ auth_type != DCERPC_AUTH_TYPE_KRB5 &&
+ auth_level != DCERPC_AUTH_LEVEL_PRIVACY)
+ {
+ torture_assert_ntstatus_equal(tctx,
+ r.out.result,
+ NT_STATUS_ACCESS_DENIED,
+ "LogonSamLogon auth none krb5");
+ continue;
+ }
torture_assert_ntstatus_ok(tctx, r.out.result, "LogonSamLogon failed");
status = netlogon_creds_client_verify(creds,
torture_assert_ntstatus_ok(tctx, dcerpc_netr_LogonSamLogon_r(b, tctx, &r),
"LogonSamLogon failed");
+ if (creds->authenticate_kerberos &&
+ auth_type != DCERPC_AUTH_TYPE_KRB5 &&
+ auth_level != DCERPC_AUTH_LEVEL_PRIVACY)
+ {
+ torture_assert_ntstatus_equal(tctx,
+ r.out.result,
+ NT_STATUS_ACCESS_DENIED,
+ "LogonSamLogon auth none krb5");
+ continue;
+ }
torture_assert_ntstatus_ok(tctx, r.out.result, "LogonSamLogon failed");
status = netlogon_creds_client_verify(creds,