WNM: Drop explicit wpa_is_bss_tmp_disallowed() check
There is no need for this check as wpa_scan_res_match() already calls the function through wpa_scan_res_ok() before accepting a match. Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
This commit is contained in:
parent
8b51310f4e
commit
033adbf833
1 changed files with 0 additions and 8 deletions
|
@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs,
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (wpa_is_bss_tmp_disallowed(wpa_s, target)) {
|
|
||||||
wpa_printf(MSG_DEBUG,
|
|
||||||
"MBO: Candidate BSS " MACSTR
|
|
||||||
" retry delay is not over yet",
|
|
||||||
MAC2STR(nei->bssid));
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (target->level < bss->level && target->level < -80) {
|
if (target->level < bss->level && target->level < -80) {
|
||||||
wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
|
wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
|
||||||
" (pref %d) does not have sufficient signal level (%d)",
|
" (pref %d) does not have sufficient signal level (%d)",
|
||||||
|
|
Loading…
Reference in a new issue