4.2.4.4 GSS_WrapEx Examples
The GSS_WrapEx() is specified in section 3.4.6. The following data is part of the security context state for the NTLM Session.
SeqNum for the message:
-
0000000: 00 00 00 00 ••••
Plaintext data where conf_req_flag == TRUE and sign == TRUE:
-
0000000: 50 00 6c 00 61 00 69 00 6e 00 74 00 65 00 78 00 P•l•a•i•n•t•e•x• 0000010: 74 00 t•
The sealkey is created using SEALKEY() (section 3.4.5.3):
MD5(ConcatenationOf(RandomSessionKey, "session key to client-to-server sealing key magic constant")):
-
0000000: 59 f6 00 97 3c c4 96 0a 25 48 0a 7c 19 6e 4c 58 Y.•.<─.•%H•.•nLX
The signkey is created using SIGNKEY() (section 3.4.5.2):
MD5(ConcatenationOf(RandomSessionKey, "session key to client-to-server signing key magic constant")):
-
0000000: 47 88 dc 86 1b 47 82 f3 5d 43 fd 98 fe 1a 2d 39 G...•G..]C...•-9
The output message data and signature is created using SEAL() specified in section 3.4.3. Output_message will contain conf_state == TRUE, signed == TRUE and data:
Data:
-
0000000: 54 e5 01 65 bf 19 36 dc 99 60 20 c1 81 1b 0f 06 T.•e.•6..`...••• 0000010: fb 5f √_
Checksum: HMAC_MD5(SigningKey, ConcatenationOf(SeqNum, Message))[0..7]:
-
0000000: 70 35 28 51 f2 56 43 09 p5(Q.VC•
Checksum: RC4(Checksum above):
-
0000000: 7f b3 8e c5 c5 5d 49 76 .....]Iv
Signature:
-
0000000: 01 00 00 00 7f b3 8e c5 c5 5d 49 76 00 00 00 00 ••••.....]Iv••••