> With a standard EAP library that is lock-step in the manner you
> describe, it's far easier to produce a synthetic identity request in the
> initiator than to hack the state machine or do anything else.  Think of

Right, I actually tried to hack the state machine as described in a very early 
iteration and, with the library we used, it just didn't work.

-- Luke
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to