Connected: An Internet Encyclopedia
3.5.1. Generation of a KRB_PRIV message

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1510
Up: 3. Message Exchanges
Up: 3.5. The KRB_PRIV Exchange
Prev: 3.5. The KRB_PRIV Exchange
Next: 3.5.2. Receipt of KRB_PRIV message

3.5.1. Generation of a KRB_PRIV message

3.5.1. Generation of a KRB_PRIV message

When an application wishes to send a KRB_PRIV message, it collects its data and the appropriate control information (specified in section 5.7.1) and encrypts them under an encryption key (usually the last key negotiated via subkeys, or the session key if no negotiation has occured). As part of the control information, the client must choose to use either a timestamp or a sequence number (or both); see the discussion in section 3.4.1 for guidelines on which to use. After the user data and control information are encrypted, the client transmits the ciphertext and some "envelope" information to the recipient.


Next: 3.5.2. Receipt of KRB_PRIV message

Connected: An Internet Encyclopedia
3.5.1. Generation of a KRB_PRIV message