| Top |  |  |  |  | 
| LassoWsseUsernameToken * | lasso_wsse_username_token_new () | 
| void | lasso_wsse_username_token_reset_nonce () | 
| void | lasso_wsse_username_token_set_password_kind () | 
| lasso_error_t | lasso_wsse_username_token_set_password () | 
| lasso_error_t | lasso_wsse_username_token_check_password () | 
| guchar * | lasso_wsse_username_token_derive_key () | 
Transmit username and password credential as a WS-Security token. The password can be transmitted as cleartext or using a digest mode. It also allows to derive encryption and HMAC signing keys.
void
lasso_wsse_username_token_reset_nonce (LassoWsseUsernameToken *wsse_username_token);
Generate a random nonce.
void lasso_wsse_username_token_set_password_kind (LassoWsseUsernameToken *wsse_username_token,LassoWsseUsernameTokenPasswordType password_type);
Set the way to transmit password, that is either cleartext or digest.
| wsse_username_token | a LassoWsseUsernameToken object | |
| password_type | a LassoWsseUsernameTokenPasswordType enumeration | 
lasso_error_t lasso_wsse_username_token_set_password (LassoWsseUsernameToken *wsse_username_token,char *password);
Set the password using the given UTF-8 string. If password kind is digest, compute the digest SHA1(nonce + created + password), convert to Base64 and set it as the password. If nonce or created are NULL, the empty string is used.
lasso_error_t lasso_wsse_username_token_check_password (LassoWsseUsernameToken *wsse_username_token,char *password);
guchar * lasso_wsse_username_token_derive_key (LassoWsseUsernameToken *wsse_username_token,char *password);
Generate a derived 128bit key using the password and setting from the UsernameToken.
struct LassoWsseUsernameToken {
	LassoNode parent;
	char *Id;
	char *Username;
	char *Nonce;
	char *Salt;
	char *Created;
	int Iteration;
	GHashTable *attributes;
};
| LassoNode  | ||
| the identifier of the UsernameToken | ||
| the username | ||
| a nonce used to compute the digest of the password | ||
| the salt for generating derived key | ||
| the timestamp for the generation of the token, also used in the digest of the password | ||
| how many times to apply SHA1 for generating derivated key | ||