From: Benjamin Berg Date: Tue, 20 Feb 2024 13:18:22 +0000 (+0100) Subject: WNM: Drop explicit wpa_is_bss_tmp_disallowed() check X-Git-Tag: hostap_2_11~330 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=033adbf833196c09810f754bd054866455522eaf;p=thirdparty%2Fhostap.git WNM: Drop explicit wpa_is_bss_tmp_disallowed() check There is no need for this check as wpa_scan_res_match() already calls the function through wpa_scan_res_ok() before accepting a match. Signed-off-by: Benjamin Berg --- diff --git a/wpa_supplicant/wnm_sta.c b/wpa_supplicant/wnm_sta.c index 8c011582f..749eda911 100644 --- a/wpa_supplicant/wnm_sta.c +++ b/wpa_supplicant/wnm_sta.c @@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs, continue; } - if (wpa_is_bss_tmp_disallowed(wpa_s, target)) { - wpa_printf(MSG_DEBUG, - "MBO: Candidate BSS " MACSTR - " retry delay is not over yet", - MAC2STR(nei->bssid)); - continue; - } - if (target->level < bss->level && target->level < -80) { wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR " (pref %d) does not have sufficient signal level (%d)",