Jim!
 
Just before the closure of Implementors Guide regarding the
 
4.2 EP-GK Authentication (Non-Subscription Based)
 
Is our understanding of the XOR'ing algorithm right?
 
See below:
1. Take the GK Id (GKID) as a sequence of BMP characters (each 16 bit long) of length N.
2. Take the 16 bit long Random value (RND) N times to build the string of the same length as GKID above.
3. Take the 16 bit long requestSeqNum (SQN) N times to build the string of the same length as GKID above.
4. XOR bitwise three of these same length bit strings.
 
GKID             !BMP1 !BMP2 !BMP3 !BMP4 !BMP5   !
XOR
RND 16 bit   !RND16!RND16!RND16!RND16 !RND16! 
XOR
SQN 16 bit   !SQN16!SQN16!SQN16!SQN16!SQN16! 
 
May be it would be useful to put such an explanation into the Implementors Guide?
 
Orit Levin
RADVision Inc.,
575 Corporate Drive - Suite 420
Mahwah, NJ 07430
Tel:    201-529-4300 (230)
Fax:   201-529-3516