diff --git a/src/handshake.h b/src/handshake.h index e667fccd..b738efd9 100644 --- a/src/handshake.h +++ b/src/handshake.h @@ -116,7 +116,6 @@ struct handshake_state { bool wait_for_gtk : 1; bool no_rekey : 1; bool support_fils : 1; - bool offload : 1; uint8_t ssid[32]; size_t ssid_len; char *passphrase; diff --git a/src/station.c b/src/station.c index cf4dd2e7..064872c6 100644 --- a/src/station.c +++ b/src/station.c @@ -981,16 +981,6 @@ static struct handshake_state *station_handshake_setup(struct station *station, goto no_psk; handshake_state_set_passphrase(hs, passphrase); - - /* - * TODO: This check isn't strictly correct since - * some drivers may support EXTERNAL_AUTH but since - * wiphy_can_connect takes this into account IWD should - * have already rejected the connection if this was the - * case. - */ - if (!wiphy_supports_cmds_auth_assoc(wiphy)) - hs->offload = true; } else { const uint8_t *psk = network_get_psk(network);