^samba.tests.krb5.authn_policy_tests.samba.tests.krb5.authn_policy_tests.AuthnPolicyTests.test_authn_policy_bad_pwd_allowed_from_user_deny.ad_dc
^samba.tests.krb5.authn_policy_tests.samba.tests.krb5.authn_policy_tests.AuthnPolicyTests.test_authn_policy_denied_no_fast.ad_dc
^samba.tests.krb5.authn_policy_tests.samba.tests.krb5.authn_policy_tests.AuthnPolicyTests.test_authn_policy_tgt_lifetime_min.ad_dc
+#
+# MIT does not support password history in order to avoid badPwdCount changes
+# with the last password, see https://bugzilla.samba.org/show_bug.cgi?id=14054
+#
+^samba4.ldap.login_basics.python.*.__main__.BasicUserAuthTests.test_login_basics_krb5
return 0;
}
+static int sdb_keys_to_HistKeys(krb5_context context,
+ const struct sdb_keys *s,
+ krb5_kvno kvno,
+ hdb_entry *h)
+{
+ unsigned int i;
+
+ for (i = 0; i < s->len; i++) {
+ Key k = { 0, };
+ int ret;
+
+ ret = sdb_key_to_Key(&s->val[i], &k);
+ if (ret != 0) {
+ return ENOMEM;
+ }
+ ret = hdb_add_history_key(context, h, kvno, &k);
+ free_Key(&k);
+ if (ret != 0) {
+ return ENOMEM;
+ }
+ }
+
+ return 0;
+}
+
static int sdb_event_to_Event(krb5_context context,
const struct sdb_event *s, Event *h)
{
goto error;
}
+ if (h->kvno > 1) {
+ rc = sdb_keys_to_HistKeys(context,
+ &s->old_keys,
+ h->kvno - 1,
+ h);
+ if (rc != 0) {
+ goto error;
+ }
+ }
+
+ if (h->kvno > 2) {
+ rc = sdb_keys_to_HistKeys(context,
+ &s->older_keys,
+ h->kvno - 2,
+ h);
+ if (rc != 0) {
+ goto error;
+ }
+ }
+
rc = sdb_event_to_Event(context,
&s->created_by,
&h->created_by);