/************************/
/* Function 0x40 */
+ typedef [v1_enum] enum {
+ SAMR_CONNECT_FEATURE_RID_ONLY = 0x00000001,
+ SAMR_CONNECT_FEATURE_RESRVED1 = 0x00000002,
+ SAMR_CONNECT_FEATURE_RESRVED2 = 0x00000004,
+ SAMR_CONNECT_FEATURE_USE_AES = 0x00000010
+ } samr_SupportedFeatures;
+
typedef struct {
samr_ConnectVersion client_version; /* w2k3 gives 3 */
- uint32 unknown2; /* w2k3 gives 0 */
+ samr_SupportedFeatures supported_features;
} samr_ConnectInfo1;
typedef union {
struct samr_ConnectInfo1 info1;
info1.client_version = SAMR_CONNECT_AFTER_W2K;
- info1.unknown2 = 0;
+ info1.supported_features = 0;
c.in.system_name = r->in.system_name;
c.in.access_mask = r->in.access_mask;
status = dcesrv_samr_Connect(dce_call, mem_ctx, &c);
r->out.info_out->info1.client_version = SAMR_CONNECT_AFTER_W2K;
- r->out.info_out->info1.unknown2 = 0;
+ r->out.info_out->info1.supported_features = 0;
*r->out.level_out = r->in.level_in;
return status;
torture_comment(tctx, "Testing samr_Connect5\n");
info.info1.client_version = 0;
- info.info1.unknown2 = 0;
+ info.info1.supported_features = 0;
r5.in.system_name = "";
r5.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
uint32_t level_out = 0;
info.info1.client_version = 0;
- info.info1.unknown2 = 0;
+ info.info1.supported_features = 0;
r5.in.system_name = "";
r5.in.level_in = 1;
r5.in.info_in = &info;
uint32_t level_out = 0;
info.info1.client_version = 0;
- info.info1.unknown2 = 0;
+ info.info1.supported_features = 0;
r5.in.system_name = "";
r5.in.level_in = 1;
r5.in.info_in = &info;