Out of curiosity, what are you trying to accomplish?  When I hear of
people trying to get at kerberos session keys, there's almost always a
better way to do what they're doing.

---
This message may originate from an unmonitored or fictitious alias
(davespam).  Use davidchr for replies.
This email is provided "as is" and confers no rights.  
 
 

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Douglas E. Engert
> Sent: Thursday, September 01, 2005 11:19 AM
> To: jan2x
> Cc: [email protected]
> Subject: Re: Kerberos session key
> 
> 
> 
> jan2x wrote:
> > Good day! I am tracing the program from Microsoft which is a SSPI
> > program. My question is, is the token returned be the session key of
> > the Kerberos session? If not, how can i extract the session key?
> > Thanks!
> > 
> 
> See the LsaCallAuthenticationPackage() to get a service ticket.
> Then look at the pTicketResponse.
> 
>    pTicket = &(pTicketResponse->Ticket);
> 
>    pTicket->SessionKey.Length;
>    pTicket->SessionKey.value;
> 
> 
> > ________________________________________________
> > Kerberos mailing list           [email protected]
> > https://mailman.mit.edu/mailman/listinfo/kerberos
> > 
> > 
> 
> -- 
> 
>   Douglas E. Engert  <[EMAIL PROTECTED]>
>   Argonne National Laboratory
>   9700 South Cass Avenue
>   Argonne, Illinois  60439
>   (630) 252-5444
> ________________________________________________
> Kerberos mailing list           [email protected]
> https://mailman.mit.edu/mailman/listinfo/kerberos
> 

________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to