[PATCH 7/9] WNM: Drop explicit wpa_is_bss_tmp_disallowed check

benjamin at sipsolutions.net benjamin at sipsolutions.net
Fri Feb 9 07:18:57 PST 2024


From: Benjamin Berg <benjamin.berg at intel.com>

There is no need for this check as wpa_scan_res_match already calls the
function.

Signed-off-by: Benjamin Berg <benjamin.berg at intel.com>
---
 wpa_supplicant/wnm_sta.c | 8 --------
 1 file changed, 8 deletions(-)

diff --git a/wpa_supplicant/wnm_sta.c b/wpa_supplicant/wnm_sta.c
index dc43a87b5..9e550fa98 100644
--- a/wpa_supplicant/wnm_sta.c
+++ b/wpa_supplicant/wnm_sta.c
@@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs,
 			continue;
 		}
 
-		if (wpa_is_bss_tmp_disallowed(wpa_s, target)) {
-			wpa_printf(MSG_DEBUG,
-				   "MBO: Candidate BSS " MACSTR
-				   " retry delay is not over yet",
-				   MAC2STR(nei->bssid));
-			continue;
-		}
-
 		if (target->level < bss->level && target->level < -80) {
 			wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
 				   " (pref %d) does not have sufficient signal level (%d)",
-- 
2.43.0




More information about the Hostap mailing list