summaryrefslogtreecommitdiff
path: root/hurd/password.defs
diff options
context:
space:
mode:
authorThomas Bushnell <thomas@gnu.org>1997-09-23 19:57:40 +0000
committerThomas Bushnell <thomas@gnu.org>1997-09-23 19:57:40 +0000
commit2414fffb156b8ffd627719b6e216ce6a6702635c (patch)
treeeee55f130159b8f22abad49b7af2fec45966eee5 /hurd/password.defs
parentee03219c9e72833087ba48491ab21cf4d6a0e64a (diff)
Tue Sep 23 15:52:35 1997 Thomas Bushnell, n/BSG <thomas@gnu.ai.mit.edu>
* password.defs: New file. * paths.h (_SERVERS_PASSWORD): New entry. * subsystems: Add password at 38000.
Diffstat (limited to 'hurd/password.defs')
-rw-r--r--hurd/password.defs51
1 files changed, 51 insertions, 0 deletions
diff --git a/hurd/password.defs b/hurd/password.defs
new file mode 100644
index 00000000..d52c5661
--- /dev/null
+++ b/hurd/password.defs
@@ -0,0 +1,51 @@
+/* Protocol for password checker
+ Copyright (C) 1997 Free Software Foundation, Inc.
+
+This file is part of the GNU Hurd.
+
+The GNU Hurd is free software; you can redistribute it and/or modify
+it under the terms of the GNU General Public License as published by
+the Free Software Foundation; either version 2, or (at your option)
+any later version.
+
+The GNU Hurd is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with the GNU Hurd; see the file COPYING. If not, write to
+the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. */
+
+/* Written by Thomas Bushnell, n/BSG. */
+
+subsystem term 38000;
+
+#ifdef PASSWORD_IMPORTS
+PASSWORD_IMPORTS
+#endif
+
+#include <hurd/hurd_types.defs>
+
+/* Service for this protocol normally lives on /servers/password as
+ specified by _SERVERS_PASSWORD in <hurd/paths.h>. */
+
+/* Check to see if the password for user USER is really PW. Return
+ an error if it fails, and return an auth port for the id in AUTH
+ if it succeeded. */
+password_check_user (
+ server: io_t;
+ user: uid_t;
+ pw: string_t;
+ out auth: mach_port_send_t);
+
+
+/* Check to see if the password for GROUP is really PW. Return
+ an error if it fails, and return an auth port for the id in AUTH
+ if it succeeded. */
+password_check_group (
+ server: io_t;
+ group: uid_t;
+ pw: string_t;
+ out auth: mach_port_send_t);
+