# Without AES we currently get DOWNGRADE_DETECTED
^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_.*_auth3_00004004
^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_.*_auth3_603fffff
-# These need to be checked
-^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_send_to_sam
# This is not implemented yet
^samba.tests.krb5.netlogon.*.NetlogonSchannel.test_ticket_samlogon
case SEC_CHAN_DNS_DOMAIN:
case SEC_CHAN_DOMAIN:
case SEC_CHAN_NULL:
- return NT_STATUS_INVALID_PARAMETER;
+ return NT_STATUS_ACCESS_DENIED;
default:
DEBUG(1, ("Client asked for an invalid secure channel type: %d\n",
creds->secure_channel_type));
(ndr_pull_flags_fn_t)ndr_pull_netr_SendToSamBase);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- /* We only partially implement SendToSam */
- return NT_STATUS_NOT_IMPLEMENTED;
+ return NT_STATUS_INVALID_PARAMETER;
}
/* Now 'send' to SAM */
&dn);
if (ret != LDB_SUCCESS) {
ldb_transaction_cancel(sam_ctx);
- return NT_STATUS_INVALID_PARAMETER;
+ return NT_STATUS_OBJECT_NAME_NOT_FOUND;
}
if (creds->secure_channel_type == SEC_CHAN_RODC &&