]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/libpam/libpam/pam_map.c
unfinished sblive driver, playback/mixer only for now - not enabled in
[FreeBSD/FreeBSD.git] / contrib / libpam / libpam / pam_map.c
1 /* pam_map.c - PAM mapping interface
2  *
3  * $Id$
4  *
5  * This is based on the X/Open XSSO specification of March 1997.
6  * It is not implemented as it is going to change... after 1997/9/25.
7  *
8  * $Log$
9  */
10
11 #include <stdio.h>
12
13 #include "pam_private.h"
14
15 /* p 54 */
16
17 int pam_get_mapped_authtok(pam_handle_t *pamh,
18                            const char *target_module_username,
19                            const char *target_module_type,
20                            const char *target_authn_domain,
21                            size_t *target_authtok_len
22                            unsigned char **target_module_authtok);
23 {
24     D(("called"));
25
26     IF_NO_PAMH("pam_get_mapped_authtok",pamh,PAM_SYSTEM_ERR);
27
28     return PAM_SYSTEM_ERROR;
29 }
30
31 /* p 68 */
32
33 int pam_set_mapped_authtok(pam_handle_t *pamh,
34                            char *target_module_username,
35                            size_t *target_authtok_len,
36                            unsigned char *target_module_authtok,
37                            char *target_module_type,
38                            char *target_authn_domain)
39 {
40     D(("called"));
41
42     IF_NO_PAMH("pam_set_mapped_authtok",pamh,PAM_SYSTEM_ERR);
43
44     return PAM_SYSTEM_ERROR;
45 }
46
47 /* p 56 */
48
49 int pam_get_mapped_username(pam_handle_t *pamh,
50                             const char *src_username,
51                             const char *src_module_type,
52                             const char *src_authn_domain,
53                             const char *target_module_type,
54                             const char *target_authn_domain,
55                             char **target_module_username)
56 {
57     D(("called"));
58
59     IF_NO_PAMH("pam_get_mapped_username",pamh,PAM_SYSTEM_ERR);
60
61     return PAM_SYSTEM_ERROR;
62 }
63
64 /* p 70 */
65
66 int pam_set_mapped_username(pam_handle_t *pamh,
67                             char *src_username,
68                             char *src_module_type,
69                             char *src_authn_domain,
70                             char *target_module_username,
71                             char *target_module_type,
72                             char *target_authn_domain)
73 {
74     D(("called"));
75
76     IF_NO_PAMH("pam_set_mapped_username",pamh,PAM_SYSTEM_ERR);
77
78     return PAM_SYSTEM_ERROR;
79 }