gsasl  1.8.0
digesthmac.h
Go to the documentation of this file.
00001 /* digesthmac.h --- Compute DIGEST-MD5 response value.
00002  * Copyright (C) 2004-2012 Simon Josefsson
00003  *
00004  * This file is part of GNU SASL Library.
00005  *
00006  * GNU SASL Library is free software; you can redistribute it and/or
00007  * modify it under the terms of the GNU Lesser General Public License
00008  * as published by the Free Software Foundation; either version 2.1 of
00009  * the License, or (at your option) any later version.
00010  *
00011  * GNU SASL Library is distributed in the hope that it will be useful,
00012  * but WITHOUT ANY WARRANTY; without even the implied warranty of
00013  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
00014  * Lesser General Public License for more details.
00015  *
00016  * You should have received a copy of the GNU Lesser General Public
00017  * License along with GNU SASL Library; if not, write to the Free
00018  * Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
00019  * Boston, MA 02110-1301, USA.
00020  *
00021  */
00022 
00023 #ifndef DIGEST_MD5_DIGESTHMAC_H
00024 #define DIGEST_MD5_DIGESTHMAC_H
00025 
00026 /* Get token types. */
00027 #include "tokens.h"
00028 
00029 /* Compute in 33 bytes large array OUTPUT the DIGEST-MD5 response
00030    value.  SECRET holds the 16 bytes MD5 hash SS, i.e.,
00031    H(username:realm:passwd).  NONCE is a zero terminated string with
00032    the server nonce.  NC is the nonce-count, typically 1 for initial
00033    authentication.  CNONCE is a zero terminated string with the client
00034    nonce.  QOP is the quality of protection to use.  AUTHZID is a zero
00035    terminated string with the authorization identity.  DIGESTURI is a
00036    zero terminated string with the server principal (e.g.,
00037    imap/mail.example.org).  RSPAUTH is a boolean which indicate
00038    whether to compute a value for the RSPAUTH response or the "real"
00039    authentication.  CIPHER is the cipher to use.  KIC, KIS, KCC, KCS
00040    are either NULL, or points to 16 byte arrays that will hold the
00041    computed keys on output.  Returns 0 on success. */
00042 extern int digest_md5_hmac (char *output, char secret[DIGEST_MD5_LENGTH],
00043                             const char *nonce, unsigned long nc,
00044                             const char *cnonce, digest_md5_qop qop,
00045                             const char *authzid,
00046                             const char *digesturi, int rspauth,
00047                             digest_md5_cipher cipher, char *kic, char *kis,
00048                             char *kcc, char *kcs);
00049 
00050 #endif /* DIGEST_MD5_DIGESTHMAC_H */