diff options
author | Leon M. George <leon@georgemail.eu> | 2019-09-11 14:10:18 +0200 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2019-09-19 23:43:27 +0200 |
commit | a123df275846b1b83aaf3d7488a1544f7c0e09aa (patch) | |
tree | aa2e6f54037a4edaab92d7c97e9f91caaddee5e8 /package/network/services/hostapd | |
parent | 6dda2ea6ad133705d243d3cc626779ee24bdc88d (diff) | |
download | upstream-a123df275846b1b83aaf3d7488a1544f7c0e09aa.tar.gz upstream-a123df275846b1b83aaf3d7488a1544f7c0e09aa.tar.bz2 upstream-a123df275846b1b83aaf3d7488a1544f7c0e09aa.zip |
hostapd: revert signature change in patch
The original wpa_hexdump uses a 'void *' for the payload. With patch
410-limit_debug_messages, the signature changes and compiler warnings
occur at various places. One such warning is:
wpa_debug.h:106:20: note: expected 'const u8 * {aka const unsigned char *}' but argument is of type 'struct wpa_eapol_key *'
Signed-off-by: Leon M. George <leon@georgemail.eu>
[commit message facelift]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
Diffstat (limited to 'package/network/services/hostapd')
-rw-r--r-- | package/network/services/hostapd/patches/410-limit_debug_messages.patch | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/package/network/services/hostapd/patches/410-limit_debug_messages.patch b/package/network/services/hostapd/patches/410-limit_debug_messages.patch index d182e8d986..687589d746 100644 --- a/package/network/services/hostapd/patches/410-limit_debug_messages.patch +++ b/package/network/services/hostapd/patches/410-limit_debug_messages.patch @@ -124,7 +124,7 @@ * configuration. The contents of buf is printed out has hex dump. */ -void wpa_hexdump(int level, const char *title, const void *buf, size_t len); -+static inline void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len) ++static inline void wpa_hexdump(int level, const char *title, const void *buf, size_t len) +{ + if (level < CONFIG_MSG_MIN_PRIORITY) + return; |