From a123df275846b1b83aaf3d7488a1544f7c0e09aa Mon Sep 17 00:00:00 2001 From: "Leon M. George" Date: Wed, 11 Sep 2019 14:10:18 +0200 Subject: [PATCH] hostapd: revert signature change in patch MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit The original wpa_hexdump uses a 'void *' for the payload. With patch 410-limit_debug_messages, the signature changes and compiler warnings occur at various places. One such warning is: wpa_debug.h:106:20: note: expected 'const u8 * {aka const unsigned char *}' but argument is of type 'struct wpa_eapol_key *' Signed-off-by: Leon M. George [commit message facelift] Signed-off-by: Petr Å tetiar --- .../services/hostapd/patches/410-limit_debug_messages.patch | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/package/network/services/hostapd/patches/410-limit_debug_messages.patch b/package/network/services/hostapd/patches/410-limit_debug_messages.patch index d182e8d986..687589d746 100644 --- a/package/network/services/hostapd/patches/410-limit_debug_messages.patch +++ b/package/network/services/hostapd/patches/410-limit_debug_messages.patch @@ -124,7 +124,7 @@ * configuration. The contents of buf is printed out has hex dump. */ -void wpa_hexdump(int level, const char *title, const void *buf, size_t len); -+static inline void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len) ++static inline void wpa_hexdump(int level, const char *title, const void *buf, size_t len) +{ + if (level < CONFIG_MSG_MIN_PRIORITY) + return; -- 2.30.2