[PATCH 7/9] WNM: Drop explicit wpa_is_bss_tmp_disallowed check
benjamin at sipsolutions.net
benjamin at sipsolutions.net
Fri Feb 9 07:18:57 PST 2024
From: Benjamin Berg <benjamin.berg at intel.com>
There is no need for this check as wpa_scan_res_match already calls the
function.
Signed-off-by: Benjamin Berg <benjamin.berg at intel.com>
---
wpa_supplicant/wnm_sta.c | 8 --------
1 file changed, 8 deletions(-)
diff --git a/wpa_supplicant/wnm_sta.c b/wpa_supplicant/wnm_sta.c
index dc43a87b5..9e550fa98 100644
--- a/wpa_supplicant/wnm_sta.c
+++ b/wpa_supplicant/wnm_sta.c
@@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs,
continue;
}
- if (wpa_is_bss_tmp_disallowed(wpa_s, target)) {
- wpa_printf(MSG_DEBUG,
- "MBO: Candidate BSS " MACSTR
- " retry delay is not over yet",
- MAC2STR(nei->bssid));
- continue;
- }
-
if (target->level < bss->level && target->level < -80) {
wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
" (pref %d) does not have sufficient signal level (%d)",
--
2.43.0
More information about the Hostap
mailing list