^samba4.winbind.struct.lookup_name_sid\(ad_member:local\)
^samba4.winbind.struct.getdcname\(nt4_member:local\) # Works in other modes, just not against the classic/NT4 DC
#
+# This test is no longer valid given s4winbind needs a live NETLOGON server
+#
+^samba.blackbox.pdbtest.s4winbind\(ad_dc_ntvfs\).pdbtest
+#
# Differences in our KDC compared to windows
#
^samba4.krb5.kdc .*.as-req-pac-request # We should reply to a request for a PAC over UDP with KRB5KRB_ERR_RESPONSE_TOO_BIG unconditionally
r->in.logon.network->identity_info.workstation.string,
r->in.logon.network->challenge,
lm_response, nt_response,
- &r->out.authoritative, &flags,
+ &r->out.authoritative,
+ true,
+ &flags,
&r->out.validation.sam3);
return status;
}
DATA_BLOB lm_response,
DATA_BLOB nt_response,
uint8_t *authoritative,
+ bool skip_sam,
uint32_t *flags,
struct netr_SamInfo3 **info3)
{
* name_domain can also be lp_realm()
* we need to check against domain->name.
*/
- if (strequal(domain->name, get_global_sam_name())) {
+ if (!skip_sam && strequal(domain->name, get_global_sam_name())) {
DATA_BLOB chal_blob = data_blob_const(
chal, 8);
lm_resp,
nt_resp,
&authoritative,
+ false,
&flags,
&info3);
if (!NT_STATUS_IS_OK(result)) {
DATA_BLOB lm_response,
DATA_BLOB nt_response,
uint8_t *authoritative,
+ bool skip_sam,
uint32_t *flags,
struct netr_SamInfo3 **info3);