nttime2string = _glue.nttime2string
nttime2unix = _glue.nttime2unix
unix2nttime = _glue.unix2nttime
-generate_random_password = _glue.generate_random_password
strcasecmp_m = _glue.strcasecmp_m
strstr_m = _glue.strstr_m
is_ntvfs_fileserver_built = _glue.is_ntvfs_fileserver_built
+
+def generate_random_password(min_len, max_len):
+ string = _glue.generate_random_password(min_len, max_len)
+ return unicode(string, 'utf-8')
msg["msDS-KeyVersionNumber"] = [str(key_version_number)]
msg["privateKeytab"] = ["secrets.keytab"]
- msg["secret"] = [machinepass]
+ msg["secret"] = [machinepass.encode('utf-8')]
msg["samAccountName"] = ["%s$" % netbiosname]
msg["secureChannelType"] = [str(secure_channel_type)]
if domainsid is not None:
if krbtgtpass is None:
krbtgtpass = samba.generate_random_password(128, 255)
+ else:
+ krbtgtpass = unicode(krbtgtpass, 'utf-8')
if machinepass is None:
machinepass = samba.generate_random_password(128, 255)
+ else:
+ machinepass = unicode(machinepass, 'utf-8')
if dnspass is None:
dnspass = samba.generate_random_password(128, 255)
+ else:
+ dnspass = unicode(dnspass, 'utf-8')
samdb = fill_samdb(samdb, lp, names, logger=logger,
schema=schema,
kvno = str(res[0]["msDs-keyVersionNumber"])
msg = ldb.Message(secrets_msg[0].dn)
- msg["secret"] = ldb.MessageElement(machinepass,
+ msg["secret"] = ldb.MessageElement(machinepass.encode('utf-8'),
ldb.FLAG_MOD_REPLACE,
"secret")
msg["msDS-KeyVersionNumber"] = ldb.MessageElement(kvno,