[PATCH v2 15/20] WNM: Drop explicit wpa_is_bss_tmp_disallowed check
benjamin at sipsolutions.net
benjamin at sipsolutions.net
Tue Feb 20 05:18:22 PST 2024
From: Benjamin Berg <benjamin.berg at intel.com>
There is no need for this check as wpa_scan_res_match already calls the
function.
Signed-off-by: Benjamin Berg <benjamin.berg at intel.com>
---
wpa_supplicant/wnm_sta.c | 8 --------
1 file changed, 8 deletions(-)
diff --git a/wpa_supplicant/wnm_sta.c b/wpa_supplicant/wnm_sta.c
index 2ba78377a..1d567029a 100644
--- a/wpa_supplicant/wnm_sta.c
+++ b/wpa_supplicant/wnm_sta.c
@@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs,
continue;
}
- if (wpa_is_bss_tmp_disallowed(wpa_s, target)) {
- wpa_printf(MSG_DEBUG,
- "MBO: Candidate BSS " MACSTR
- " retry delay is not over yet",
- MAC2STR(nei->bssid));
- continue;
- }
-
if (target->level < bss->level && target->level < -80) {
wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
" (pref %d) does not have sufficient signal level (%d)",
--
2.43.2
More information about the Hostap
mailing list