nttime2string = _glue.nttime2string
nttime2unix = _glue.nttime2unix
unix2nttime = _glue.unix2nttime
+generate_random_password = _glue.generate_random_password
generate_random_machine_password = _glue.generate_random_machine_password
check_password_quality = _glue.check_password_quality
generate_random_bytes = _glue.generate_random_bytes
HRESULTError = _glue.HRESULTError
WERRORError = _glue.WERRORError
DsExtendedError = _glue.DsExtendedError
-
-def generate_random_password(min_len, max_len):
- string = _glue.generate_random_password(min_len, max_len)
- return unicode(string, 'utf-8')
if krbtgtpass is None:
krbtgtpass = samba.generate_random_machine_password(128, 255)
- else:
- krbtgtpass = unicode(krbtgtpass, 'utf-8')
if machinepass is None:
machinepass = samba.generate_random_machine_password(128, 255)
- else:
- machinepass = unicode(machinepass, 'utf-8')
if dnspass is None:
dnspass = samba.generate_random_password(128, 255)
- else:
- dnspass = unicode(dnspass, 'utf-8')
samdb.transaction_start()
try:
kvno = str(res[0]["msDs-keyVersionNumber"])
msg = ldb.Message(secrets_msg[0].dn)
- msg["secret"] = ldb.MessageElement(machinepass.encode('utf-8'),
+ msg["secret"] = ldb.MessageElement(machinepass,
ldb.FLAG_MOD_REPLACE,
"secret")
msg["msDS-KeyVersionNumber"] = ldb.MessageElement(kvno,