From b7a5d8dfd07a6dc528d16fa0f78eeccf2ee4c531 Mon Sep 17 00:00:00 2001 From: Torsten Fohrer Date: Sun, 15 Dec 2019 16:58:40 +0100 Subject: [PATCH] Avoiding bad call flags with python 3.8, using METH_NOARGS instead of zero. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit (C) SBE network solutions GmbH BUG: https://bugzilla.samba.org/show_bug.cgi?id=14209 Signed-off-by: Torsten Fohrer Reviewed-by: Douglas Bagnall Reviewed-by: Ralph Boehme Autobuild-User(master): Ralph Böhme Autobuild-Date(master): Wed Dec 18 14:33:58 UTC 2019 on sn-devel-184 (cherry picked from commit f0eb1e623f76d3dbd0c22f96cabebd1041c147df) --- source4/auth/gensec/pygensec.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/source4/auth/gensec/pygensec.c b/source4/auth/gensec/pygensec.c index d27fe28648a..c9f3fd3b489 100644 --- a/source4/auth/gensec/pygensec.c +++ b/source4/auth/gensec/pygensec.c @@ -659,7 +659,7 @@ static PyMethodDef py_gensec_security_methods[] = { "S.have_feature()\n Return True if GENSEC negotiated a particular feature." }, { "set_max_update_size", (PyCFunction)py_gensec_set_max_update_size, METH_VARARGS, "S.set_max_update_size(max_size) \n Some mechs can fragment update packets, needs to be use before the mech is started." }, - { "max_update_size", (PyCFunction)py_gensec_max_update_size, 0, + { "max_update_size", (PyCFunction)py_gensec_max_update_size, METH_NOARGS, "S.max_update_size() \n Return the current max_update_size." }, { "update", (PyCFunction)py_gensec_update, METH_VARARGS, "S.update(blob_in) -> (finished, blob_out)\nPerform one step in a GENSEC dance. Repeat with new packets until finished is true or exception." }, -- 2.20.1