On 09.01.23 23:36, Alan DeKok wrote:
   How about:

The order in TLVs are encoded in a TEAP packet does not
matter, however there is an order in which TLVs must be processed:

1. Crypto-Binding-TLV
2. Intermediate-Result-TLV
3. Result-TLV
4. Identity-Type TLV
5. EAP-Payload TLV[Identity-Request] or Basic-Password-Auth-Req TLV

That is, cryptographic binding is checked before any result is used,
and identities are checked before proposing authentication methods, as the
identity may influence the chosen authentication method.

You've left out the other TLVs, but I think most fit in (5).  We need to consider what happens in the case of a request-action TLV.

Eliot

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to