> With a standard EAP library that is lock-step in the manner you > describe, it's far easier to produce a synthetic identity request in the > initiator than to hack the state machine or do anything else. Think of
Right, I actually tried to hack the state machine as described in a very early iteration and, with the library we used, it just didn't work. -- Luke _______________________________________________ abfab mailing list [email protected] https://www.ietf.org/mailman/listinfo/abfab
