Scroll to navigation

libcanlock(3) libcanlock 3.3.0 manual libcanlock(3)

NAME

cl_get_key - Create Cancel-Key with libcanlock

SYNOPSIS

#include <libcanlock-3/canlock.h>

char *cl_get_key(cl_hash_version hash,
                 const unsigned char *sec, size_t sec_len,
                 const unsigned char *msg, size_t msg_len);

Supported values for hash (by version 3.0.0 of libcanlock):
CL_SHA1 CL_SHA224 CL_SHA256 CL_SHA384 CL_SHA512

DESCRIPTION

The cl_get_key() function creates a <c-key> element according to the algorithm recommended by RFC 8315 in Section 4. The hash algorithm selected for <scheme> is used for the HMAC operation too.

The hash algorithm for <scheme> is selected with hash.

The local secret is specified with sec (sec_len must be set to the length of sec).
The length of the local secret should be at least the length of the hash that was selected for <scheme> (32 octets for SHA256).

The Message-ID of the target article (the one that should be cancelled or superseded) is specified with msg (msg_len must be set to the length of msg).

The Message-ID msg can be prepended with an optional User-ID. The length of the User-ID must be added to msg_len. The User-ID must not contain angle brackets.

RETURN VALUE

Upon successful completion a pointer to the result string is returned. Otherwise, NULL is returned.

On success the caller is responsible to call free() for the pointer returned as result.

AUTHORS

Dennis Preiser
(Based in part on the implementation from G. J. Andruk for Version 2)

The base64 implementation is written by Kungliga Tekniska Hogskolan (Royal Institute of Technology, Stockholm, Sweden)

The hash algorithms are implemented with code from RFC 6234

REPORTING BUGS

Report bugs to <mailto:michael.baeuerle@gmx.net>.

STANDARDS

libcanlock tries to comply with the following standards:

RFC 5537, RFC 6234, RFC 8315

SEE ALSO

free(3), cl_clear_secret(3), cl_get_lock(3), cl_split(3), cl_verify(3), cl_verify_multi(3), canlock(1)

2021-11-24 Unix