On 09.01.23 23:36, Alan DeKok wrote:
How about:
The order in TLVs are encoded in a TEAP packet does not
matter, however there is an order in which TLVs must be processed:
1. Crypto-Binding-TLV
2. Intermediate-Result-TLV
3. Result-TLV
4. Identity-Type TLV
5. EAP-Payload TLV[Identity-Request] or Basic-Password-Auth-Req TLV
That is, cryptographic binding is checked before any result is used,
and identities are checked before proposing authentication methods, as the
identity may influence the chosen authentication method.
You've left out the other TLVs, but I think most fit in (5). We need to
consider what happens in the case of a request-action TLV.
Eliot
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu