4.5 RC4 GSS_WrapEx

The GSS_WrapEx() is specified in section 3.4.5.4.1. The RC4-HMAC usage is specified in [RFC4757] and corresponding errata. The following data is part of the security context state for the Kerberos session when the client is the initiator.

 Confidentiality == TRUE
 DCE-Style == FALSE

Session Key:

 0000000: 81 a2 cb 90 af 7f c2 d1 95 54 a1 50 d8 18 53 59   üó╦É»⌂┬╤òTíP╪·SY
 qop_req == 0

Plaintext data where conf_req_flag == TRUE and sign == TRUE:

 0000000: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff      ·"3DUfwêÖ¬╗╠▌ε

The signature is created as specified in [RFC4757] section 7.3 with the following inputs:

Kss:

 0000000: 81 a2 cb 90 af 7f c2 d1 95 54 a1 50 d8 18 53 59   üó╦É»⌂┬╤òTíP╪·SY
 Encrypt == TRUE
 Direction == sender_is_initiator
 Export == FALSE

Seq_num (in big-endian order as specified in [RFC4757] section 7.1):

 0000000: 60 cb ac d3                                       `╦¼╙

Data:

 0000000: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff      ·"3DUfwêÖ¬╗╠▌ε

Confounder:

 0000000: 52 56 f3 fb 63 0c f1 2a                           RV≤√c·±*
 Padding == 01

The output message data and signature is created using SEAL() specified in section 3.4.4. Output_message will contain conf_state == TRUE, signed == TRUE and the following:

Data:

 0000000: 8e d6 3f 0a c8 38 15 33 5b 72 e2 93 ba e1 f6 60   Ä╓?·╚8·3[rΓô║ß÷`

Signature:

 0000000: 60 3b 06 09 2a 86 48 86 f7 12 01 02 02 02 01 11   `;··*åHå≈·······
 0000010: 00 10 00 ff ff e2 9e 8b bc 63 48 e7 40 eb aa 61   ···  Γ₧ï╝cHτ@δ¬a
 0000020: 92 44 a1 56 a1 3b 5c f6 5e 3c 21 b9 aa            ÆDíVí;\÷^<!╣¬
Show: