gsasl  2.2.1
digesthmac.h
Go to the documentation of this file.
1 /* digesthmac.h --- Compute DIGEST-MD5 response value.
2  * Copyright (C) 2004-2024 Simon Josefsson
3  *
4  * This file is part of GNU SASL Library.
5  *
6  * GNU SASL Library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public License
8  * as published by the Free Software Foundation; either version 2.1 of
9  * the License, or (at your option) any later version.
10  *
11  * GNU SASL Library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with GNU SASL Library; if not, write to the Free
18  * Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
19  * Boston, MA 02110-1301, USA.
20  *
21  */
22 
23 #ifndef DIGEST_MD5_DIGESTHMAC_H
24 # define DIGEST_MD5_DIGESTHMAC_H
25 
26 /* Get token types. */
27 # include "tokens.h"
28 
29 /* Compute in 33 bytes large array OUTPUT the DIGEST-MD5 response
30  value. SECRET holds the 16 bytes MD5 hash SS, i.e.,
31  H(username:realm:passwd). NONCE is a zero terminated string with
32  the server nonce. NC is the nonce-count, typically 1 for initial
33  authentication. CNONCE is a zero terminated string with the client
34  nonce. QOP is the quality of protection to use. AUTHZID is a zero
35  terminated string with the authorization identity. DIGESTURI is a
36  zero terminated string with the server principal (e.g.,
37  imap/mail.example.org). RSPAUTH is a boolean which indicate
38  whether to compute a value for the RSPAUTH response or the "real"
39  authentication. CIPHER is the cipher to use. KIC, KIS, KCC, KCS
40  are either NULL, or points to 16 byte arrays that will hold the
41  computed keys on output. Returns 0 on success. */
42 extern int digest_md5_hmac (char *output, char secret[DIGEST_MD5_LENGTH],
43  const char *nonce, unsigned long nc,
44  const char *cnonce, digest_md5_qop qop,
45  const char *authzid,
46  const char *digesturi, int rspauth,
47  digest_md5_cipher cipher, char *kic, char *kis,
48  char *kcc, char *kcs);
49 
50 #endif /* DIGEST_MD5_DIGESTHMAC_H */
digest_md5_qop
digest_md5_cipher
#define DIGEST_MD5_LENGTH
int digest_md5_hmac(char *output, char secret[DIGEST_MD5_LENGTH], const char *nonce, unsigned long nc, const char *cnonce, digest_md5_qop qop, const char *authzid, const char *digesturi, int rspauth, digest_md5_cipher cipher, char *kic, char *kis, char *kcc, char *kcs)