# This is not implemented yet
^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_ticket_samlogon
-# The RODC handling is wrong
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_auth3_01000000
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_auth3_613fffff
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_auth3_e13fffff
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_authK_00000000
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_authK_00004000
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_authK_603fbffb
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_authK_80000000
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam_rodc_authK_e13fffff
&dn);
if (ret != LDB_SUCCESS) {
ldb_transaction_cancel(sam_ctx);
+ if (creds->secure_channel_type == SEC_CHAN_RODC) {
+ return NT_STATUS_INTERNAL_ERROR;
+ }
return NT_STATUS_OBJECT_NAME_NOT_FOUND;
}
"an arbitrary user: %s\n",
ldb_dn_get_linearized(dn)));
ldb_transaction_cancel(sam_ctx);
- return NT_STATUS_INVALID_PARAMETER;
+ return NT_STATUS_ACCESS_DENIED;
}
msg->dn = dn;