1/* digesthmac.h --- Compute DIGEST-MD5 response value.
2 * Copyright (C) 2004-2012 Simon Josefsson
3 *
4 * This file is part of GNU SASL Library.
5 *
6 * GNU SASL Library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public License
8 * as published by the Free Software Foundation; either version 2.1 of
9 * the License, or (at your option) any later version.
10 *
11 * GNU SASL Library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with GNU SASL Library; if not, write to the Free
18 * Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
19 * Boston, MA 02110-1301, USA.
20 *
21 */
22
23#ifndef DIGEST_MD5_DIGESTHMAC_H
24#define DIGEST_MD5_DIGESTHMAC_H
25
26/* Get token types. */
27#include "tokens.h"
28
29/* Compute in 33 bytes large array OUTPUT the DIGEST-MD5 response
30 value. SECRET holds the 16 bytes MD5 hash SS, i.e.,
31 H(username:realm:passwd). NONCE is a zero terminated string with
32 the server nonce. NC is the nonce-count, typically 1 for initial
33 authentication. CNONCE is a zero terminated string with the client
34 nonce. QOP is the quality of protection to use. AUTHZID is a zero
35 terminated string with the authorization identity. DIGESTURI is a
36 zero terminated string with the server principal (e.g.,
37 imap/mail.example.org). RSPAUTH is a boolean which indicate
38 whether to compute a value for the RSPAUTH response or the "real"
39 authentication. CIPHER is the cipher to use. KIC, KIS, KCC, KCS
40 are either NULL, or points to 16 byte arrays that will hold the
41 computed keys on output. Returns 0 on success. */
42extern int digest_md5_hmac (char *output, char secret[DIGEST_MD5_LENGTH],
43 const char *nonce, unsigned long nc,
44 const char *cnonce, digest_md5_qop qop,
45 const char *authzid,
46 const char *digesturi, int rspauth,
47 digest_md5_cipher cipher, char *kic, char *kis,
48 char *kcc, char *kcs);
49
50#endif /* DIGEST_MD5_DIGESTHMAC_H */
51