From 033adbf833196c09810f754bd054866455522eaf Mon Sep 17 00:00:00 2001 From: Benjamin Berg Date: Tue, 20 Feb 2024 14:18:22 +0100 Subject: [PATCH] WNM: Drop explicit wpa_is_bss_tmp_disallowed() check There is no need for this check as wpa_scan_res_match() already calls the function through wpa_scan_res_ok() before accepting a match. Signed-off-by: Benjamin Berg --- wpa_supplicant/wnm_sta.c | 8 -------- 1 file changed, 8 deletions(-) diff --git a/wpa_supplicant/wnm_sta.c b/wpa_supplicant/wnm_sta.c index 8c011582f..749eda911 100644 --- a/wpa_supplicant/wnm_sta.c +++ b/wpa_supplicant/wnm_sta.c @@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs, continue; } - if (wpa_is_bss_tmp_disallowed(wpa_s, target)) { - wpa_printf(MSG_DEBUG, - "MBO: Candidate BSS " MACSTR - " retry delay is not over yet", - MAC2STR(nei->bssid)); - continue; - } - if (target->level < bss->level && target->level < -80) { wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR " (pref %d) does not have sufficient signal level (%d)",