Out of curiosity, what are you trying to accomplish? When I hear of people trying to get at kerberos session keys, there's almost always a better way to do what they're doing.
--- This message may originate from an unmonitored or fictitious alias (davespam). Use davidchr for replies. This email is provided "as is" and confers no rights. > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Douglas E. Engert > Sent: Thursday, September 01, 2005 11:19 AM > To: jan2x > Cc: [email protected] > Subject: Re: Kerberos session key > > > > jan2x wrote: > > Good day! I am tracing the program from Microsoft which is a SSPI > > program. My question is, is the token returned be the session key of > > the Kerberos session? If not, how can i extract the session key? > > Thanks! > > > > See the LsaCallAuthenticationPackage() to get a service ticket. > Then look at the pTicketResponse. > > pTicket = &(pTicketResponse->Ticket); > > pTicket->SessionKey.Length; > pTicket->SessionKey.value; > > > > ________________________________________________ > > Kerberos mailing list [email protected] > > https://mailman.mit.edu/mailman/listinfo/kerberos > > > > > > -- > > Douglas E. Engert <[EMAIL PROTECTED]> > Argonne National Laboratory > 9700 South Cass Avenue > Argonne, Illinois 60439 > (630) 252-5444 > ________________________________________________ > Kerberos mailing list [email protected] > https://mailman.mit.edu/mailman/listinfo/kerberos > ________________________________________________ Kerberos mailing list [email protected] https://mailman.mit.edu/mailman/listinfo/kerberos
