summaryrefslogtreecommitdiff
path: root/testsuite/nsswitch/longarg.exp
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2001-12-04 05:03:03 +0000
committerAndrew Bartlett <abartlet@samba.org>2001-12-04 05:03:03 +0000
commit3bc87626ae7894269535333aadb45ec786f3908d (patch)
treef6e2866016b836e79bcee221f23e19ff3c374331 /testsuite/nsswitch/longarg.exp
parent275a9f4ef74747970b0bd16b1cf1943812080343 (diff)
downloadsamba-3bc87626ae7894269535333aadb45ec786f3908d.tar.gz
samba-3bc87626ae7894269535333aadb45ec786f3908d.tar.bz2
samba-3bc87626ae7894269535333aadb45ec786f3908d.zip
Add 'net rpc join' to match the ADS equiv.
This kills off the offending code in smbpasswd -j -Uab%c In the process we have changed from unsing compelatly random passwords to random, 15 char ascii strings. While this does produce a decrese in entropy, it is still vastly greater than we need, considering the application. In the meantime this allows us to actually *type* the machine account password duruign debugging. This code also adds a 'check' step to the join, confirming that the stored password does indeed do somthing of value :-) Andrew Bartlett (This used to be commit c0b7ee6ee547dc7ff798eaf8cb63fbe344073029)
Diffstat (limited to 'testsuite/nsswitch/longarg.exp')
0 files changed, 0 insertions, 0 deletions