uint32_t negotiate_flags,
const char *machine_name,
const char *plain_pass,
+ int sec_chan_type,
struct creds_CredentialState *creds)
{
NTSTATUS status;
a.in.server_name = NULL;
a.in.account_name = talloc_asprintf(mem_ctx, "%s$", machine_name);
- a.in.secure_channel_type = SEC_CHAN_BDC;
+ a.in.secure_channel_type = sec_chan_type;
a.in.computer_name = machine_name;
a.in.negotiate_flags = &negotiate_flags;
a.out.negotiate_flags = &negotiate_flags;
BOOL ret = True;
if (!test_SetupCredentials2(p, mem_ctx, NETLOGON_NEG_AUTH2_FLAGS,
- TEST_MACHINE_NAME, machine_password, &creds)) {
+ TEST_MACHINE_NAME, machine_password,
+ SEC_CHAN_BDC, &creds)) {
return False;
}
join_ctx = torture_join_domain(TEST_MACHINE_NAME, lp_workgroup(), ACB_WSTRUST,
&machine_password);
if (!join_ctx) {
- printf("Failed to join as BDC\n");
+ printf("Failed to join as Workstation\n");
return False;
}
* with INTERNAL_ERROR */
b.flags &= ~DCERPC_AUTH_OPTIONS;
- b.flags |= DCERPC_SCHANNEL_BDC | DCERPC_SIGN | DCERPC_SCHANNEL_128;
+ b.flags |= DCERPC_SCHANNEL_WORKSTATION | DCERPC_SIGN | DCERPC_SCHANNEL_128;
status = dcerpc_pipe_connect_b(&p, &b,
DCERPC_NETLOGON_UUID,
for (i=0; i < ARRAY_SIZE(credential_flags); i++) {
if (!test_SetupCredentials2(p, mem_ctx, credential_flags[i],
- TEST_MACHINE_NAME, machine_password, creds)) {
+ TEST_MACHINE_NAME, machine_password,
+ SEC_CHAN_WKSTA, creds)) {
return False;
}