WNM: Drop explicit wpa_is_bss_tmp_disallowed() check
There is no need for this check as wpa_scan_res_match() already calls the function through wpa_scan_res_ok() before accepting a match. Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
This commit is contained in:
parent
8b51310f4e
commit
033adbf833
1 changed files with 0 additions and 8 deletions
|
@ -795,14 +795,6 @@ compare_scan_neighbor_results(struct wpa_supplicant *wpa_s, os_time_t age_secs,
|
|||
continue;
|
||||
}
|
||||
|
||||
if (wpa_is_bss_tmp_disallowed(wpa_s, target)) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"MBO: Candidate BSS " MACSTR
|
||||
" retry delay is not over yet",
|
||||
MAC2STR(nei->bssid));
|
||||
continue;
|
||||
}
|
||||
|
||||
if (target->level < bss->level && target->level < -80) {
|
||||
wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
|
||||
" (pref %d) does not have sufficient signal level (%d)",
|
||||
|
|
Loading…
Reference in a new issue