@@ -818,7 +818,7 @@ and wait for and return with the server's result, or with
818
818
819
819
.. py :method :: LDAPObject.passwd(user, oldpw, newpw [, serverctrls=None [, clientctrls=None ]]) -> int
820
820
821
- .. py :method :: LDAPObject.passwd_s(user, oldpw, newpw [, serverctrls=None [, clientctrls=None ]]) -> (respoid, respvalue)
821
+ .. py :method :: LDAPObject.passwd_s(user, oldpw, newpw [, serverctrls=None [, clientctrls=None ] [, extract_newpw= False ]] ]) -> (respoid, respvalue)
822
822
823
823
Perform a ``LDAP Password Modify Extended Operation `` operation
824
824
on the entry specified by *user *.
@@ -829,10 +829,12 @@ and wait for and return with the server's result, or with
829
829
of the specified *user * which is sometimes used when a user changes
830
830
his own password.
831
831
832
- ``respoid `` is always :py:const: `None `. ``respvalue `` is also
833
- :py:const: `None ` unless *newpw * was :py:const: `None `, this requests
834
- that the server generates a new random password. With :py:meth: `passwd_s() `
835
- method, this password is available through ``respvalue.genPasswd ``.
832
+ *respoid * is always :py:const: `None `. *respvalue * is also
833
+ :py:const: `None ` unless *newpw * was :py:const: `None `. This requests that
834
+ the server generate a new random password. If *extract_newpw * is
835
+ :py:const: `True `, this password is a bytes object available through
836
+ ``respvalue.genPasswd ``, otherwise *respvalue * is the raw ASN.1 response
837
+ (this is deprecated and only for backwards compatibility).
836
838
837
839
*serverctrls * and *clientctrls * like described in section :ref: `ldap-controls `.
838
840
0 commit comments