]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
WNM: Drop explicit wpa_is_bss_tmp_disallowed() check
authorBenjamin Berg <benjamin.berg@intel.com>
Tue, 20 Feb 2024 13:18:22 +0000 (14:18 +0100)
committerJouni Malinen <j@w1.fi>
Sat, 2 Mar 2024 18:52:17 +0000 (20:52 +0200)
There is no need for this check as wpa_scan_res_match() already calls
the function through wpa_scan_res_ok() before accepting a match.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
wpa_supplicant/wnm_sta.c

index 8c011582fb21dfb99879e0002a02dc566f11d669..749eda911b59b9789808ba65e774be945cfb0785 100644 (file)
@@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs,
                        continue;
                }
 
-               if (wpa_is_bss_tmp_disallowed(wpa_s, target)) {
-                       wpa_printf(MSG_DEBUG,
-                                  "MBO: Candidate BSS " MACSTR
-                                  " retry delay is not over yet",
-                                  MAC2STR(nei->bssid));
-                       continue;
-               }
-
                if (target->level < bss->level && target->level < -80) {
                        wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
                                   " (pref %d) does not have sufficient signal level (%d)",