Add the DragonFly cvs id and perform general cleanups on cvs/rcs/sccs ids. Most
[dragonfly.git] / contrib / libpam / libpam / pam_map.c
1 /* pam_map.c - PAM mapping interface
2  *
3  * $Id$
4  * $FreeBSD: src/contrib/libpam/libpam/pam_map.c,v 1.1.1.1.6.2 2001/06/11 15:28:12 markm Exp $
5  * $DragonFly: src/contrib/libpam/libpam/Attic/pam_map.c,v 1.2 2003/06/17 04:24:03 dillon Exp $
6  *
7  * This is based on the X/Open XSSO specification of March 1997.
8  * It is not implemented as it is going to change... after 1997/9/25.
9  *
10  * $Log$
11  */
12
13 #include <stdio.h>
14
15 #include "pam_private.h"
16
17 /* p 54 */
18
19 int pam_get_mapped_authtok(pam_handle_t *pamh,
20                            const char *target_module_username,
21                            const char *target_module_type,
22                            const char *target_authn_domain,
23                            size_t *target_authtok_len
24                            unsigned char **target_module_authtok);
25 {
26     D(("called"));
27
28     IF_NO_PAMH("pam_get_mapped_authtok",pamh,PAM_SYSTEM_ERR);
29
30     return PAM_SYSTEM_ERROR;
31 }
32
33 /* p 68 */
34
35 int pam_set_mapped_authtok(pam_handle_t *pamh,
36                            char *target_module_username,
37                            size_t *target_authtok_len,
38                            unsigned char *target_module_authtok,
39                            char *target_module_type,
40                            char *target_authn_domain)
41 {
42     D(("called"));
43
44     IF_NO_PAMH("pam_set_mapped_authtok",pamh,PAM_SYSTEM_ERR);
45
46     return PAM_SYSTEM_ERROR;
47 }
48
49 /* p 56 */
50
51 int pam_get_mapped_username(pam_handle_t *pamh,
52                             const char *src_username,
53                             const char *src_module_type,
54                             const char *src_authn_domain,
55                             const char *target_module_type,
56                             const char *target_authn_domain,
57                             char **target_module_username)
58 {
59     D(("called"));
60
61     IF_NO_PAMH("pam_get_mapped_username",pamh,PAM_SYSTEM_ERR);
62
63     return PAM_SYSTEM_ERROR;
64 }
65
66 /* p 70 */
67
68 int pam_set_mapped_username(pam_handle_t *pamh,
69                             char *src_username,
70                             char *src_module_type,
71                             char *src_authn_domain,
72                             char *target_module_username,
73                             char *target_module_type,
74                             char *target_authn_domain)
75 {
76     D(("called"));
77
78     IF_NO_PAMH("pam_set_mapped_username",pamh,PAM_SYSTEM_ERR);
79
80     return PAM_SYSTEM_ERROR;
81 }