On Thu, Jun 23, 2022 at 12:58:38PM +0200, Eliot Lear wrote: > If wpa_supplicant receives a duplicate DPP chirp over a TCP connection > this causes the connection (and all of its state) to be torn down. > Such a tear-down means that the authentication request state is discarded. > That in turn will cause any otherwise valid authentication response > to not succeed. > > This commit addresses that problem. It also does not attempt to check > for duplicates until at least we know that we know we have an appropriate > hash. Thanks, applied. -- Jouni Malinen PGP id EFC895FA _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap