table of contents
gsasl_scram_secrets_from_salted_password(3) | gsasl | gsasl_scram_secrets_from_salted_password(3) |
NAME¶
gsasl_scram_secrets_from_salted_password - API function
SYNOPSIS¶
#include <gsasl.h>
int gsasl_scram_secrets_from_salted_password(Gsasl_hash hash, const char * salted_password, char * client_key, char * server_key, char * stored_key);
ARGUMENTS¶
- Gsasl_hash hash
- a Gsasl_hash element, e.g., GSASL_HASH_SHA256.
- const char * salted_password
- input array with salted password.
- char * client_key
- pre-allocated output array with derived client key.
- char * server_key
- pre-allocated output array with derived server key.
- char * stored_key
- pre-allocated output array with derived stored key.
DESCRIPTION¶
Helper function to derive SCRAM ClientKey/ServerKey/StoredKey. The
client_key , server_key , and stored_key buffers must
have room to hold digest for given hash , use
GSASL_HASH_MAX_SIZE which is sufficient for all hashes.
Return value: Returns GSASL_OK if successful, or error code.
SINCE¶
1.10
REPORTING BUGS¶
Report bugs to <bug-gsasl@gnu.org>.
General guidelines for reporting bugs: http://www.gnu.org/gethelp/
GNU SASL home page: http://www.gnu.org/software/gsasl/
COPYRIGHT¶
Copyright © 2002-2022 Simon Josefsson.
Copying and distribution of this file, with or without modification, are
permitted in any medium without royalty provided the copyright notice and
this notice are preserved.
SEE ALSO¶
The full documentation for gsasl is maintained as a Texinfo manual. If the info and gsasl programs are properly installed at your site, the command
- info gsasl
should give you access to the complete manual. As an alternative you may obtain the manual from:
2.2.1 | gsasl |