On Tue, Apr 21, 2020 at 11:02 AM Oleg Pekar
wrote:
> >And focusing on that "what to do here.." part and the unused IMCK-zero[j]
>> in the previous paragraph..
>> >How is this supposed to work when an inner EAP authentication method
>> does not derive either MSK or EMSK?
>> >Intermediate result in
>[Joe] (catching up) With respect to the case that the method is an MSK
>generating mechanism and and MSK is not generated/used. I think the original
>intention was that this case would be a protocol violation, ie if a method
>generates an MSK it should be available for crypto-binding. I'm co