FST: Remove a bogus WPA_ASSERT()
own_addr is not defined here, so no idea what this WPA_ASSERT() was trying to check. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
6a5425fd60
commit
17e20b1e2b
1 changed files with 0 additions and 2 deletions
|
@ -756,8 +756,6 @@ struct fst_session * fst_session_create(struct fst_group *g)
|
|||
struct fst_session *s;
|
||||
u32 id;
|
||||
|
||||
WPA_ASSERT(!is_zero_ether_addr(own_addr));
|
||||
|
||||
id = fst_find_free_session_id();
|
||||
if (id == FST_INVALID_SESSION_ID) {
|
||||
fst_printf(MSG_ERROR, "Cannot assign new session ID");
|
||||
|
|
Loading…
Reference in a new issue