1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
From c3a350c5b2e37af0074effdfc2e0bef8fa70fc8e Mon Sep 17 00:00:00 2001
From: Torsten Fohrer <torsten.fohrer@sbe.de>
Date: Sun, 15 Dec 2019 16:58:40 +0100
Subject: [PATCH] Avoiding bad call flags with python 3.8, using METH_NOARGS
instead of zero.
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
(C) SBE network solutions GmbH
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14209
Signed-off-by: Torsten Fohrer <torsten.fohrer@sbe.de>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Ralph Boehme <slow@samba.org>
Autobuild-User(master): Ralph Böhme <slow@samba.org>
Autobuild-Date(master): Wed Dec 18 14:33:58 UTC 2019 on sn-devel-184
(cherry picked from commit f0eb1e623f76d3dbd0c22f96cabebd1041c147df)
---
source4/auth/gensec/pygensec.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/source4/auth/gensec/pygensec.c b/source4/auth/gensec/pygensec.c
index b2c1e9c279a..c866180edb3 100644
--- a/source4/auth/gensec/pygensec.c
+++ b/source4/auth/gensec/pygensec.c
@@ -678,7 +678,7 @@ static PyMethodDef py_gensec_security_methods[] = {
"S.have_feature()\n Return True if GENSEC negotiated a particular feature." },
{ "set_max_update_size", (PyCFunction)py_gensec_set_max_update_size, METH_VARARGS,
"S.set_max_update_size(max_size) \n Some mechs can fragment update packets, needs to be use before the mech is started." },
- { "max_update_size", (PyCFunction)py_gensec_max_update_size, 0,
+ { "max_update_size", (PyCFunction)py_gensec_max_update_size, METH_NOARGS,
"S.max_update_size() \n Return the current max_update_size." },
{ "update", (PyCFunction)py_gensec_update, METH_VARARGS,
"S.update(blob_in) -> (finished, blob_out)\nPerform one step in a GENSEC dance. Repeat with new packets until finished is true or exception." },
--
2.20.1
|