4.5 RC4 GSS_WrapEx
The GSS_WrapEx() is specified in section 3.4.5.4.1. The RC4-HMAC usage is specified in [RFC4757] and corresponding errata. The following data is part of the security context state for the Kerberos session when the client is the initiator.
-
Confidentiality == TRUE DCE-Style == FALSE
Session Key:
-
0000000: 81 a2 cb 90 af 7f c2 d1 95 54 a1 50 d8 18 53 59 üó╦É»⌂┬╤òTíP╪·SY qop_req == 0
Plaintext data where conf_req_flag == TRUE and sign == TRUE:
-
0000000: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff ·"3DUfwêÖ¬╗╠▌ε
The signature is created as specified in [RFC4757] section 7.3 with the following inputs:
Kss:
-
0000000: 81 a2 cb 90 af 7f c2 d1 95 54 a1 50 d8 18 53 59 üó╦É»⌂┬╤òTíP╪·SY Encrypt == TRUE Direction == sender_is_initiator Export == FALSE
Seq_num (in big-endian order as specified in [RFC4757] section 7.1):
-
0000000: 60 cb ac d3 `╦¼╙
Data:
-
0000000: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff ·"3DUfwêÖ¬╗╠▌ε
Confounder:
-
0000000: 52 56 f3 fb 63 0c f1 2a RV≤√c·±* Padding == 01
The output message data and signature is created using SEAL()
specified in section 3.4.4. Output_message
will contain conf_state == TRUE, signed == TRUE and the following:
Data:
-
0000000: 8e d6 3f 0a c8 38 15 33 5b 72 e2 93 ba e1 f6 60 Ä╓?·╚8·3[rΓô║ß÷`
Signature:
-
0000000: 60 3b 06 09 2a 86 48 86 f7 12 01 02 02 02 01 11 `;··*åHå≈······· 0000010: 00 10 00 ff ff e2 9e 8b bc 63 48 e7 40 eb aa 61 ··· Γ₧ï╝cHτ@δ¬a 0000020: 92 44 a1 56 a1 3b 5c f6 5e 3c 21 b9 aa ÆDíVí;\÷^<!╣¬