2
* Copyright (c) 2005 Massachusetts Institute of Technology
3
* Copyright (c) 2007 Secure Endpoints Inc.
5
* Permission is hereby granted, free of charge, to any person
6
* obtaining a copy of this software and associated documentation
7
* files (the "Software"), to deal in the Software without
8
* restriction, including without limitation the rights to use, copy,
9
* modify, merge, publish, distribute, sublicense, and/or sell copies
10
* of the Software, and to permit persons to whom the Software is
11
* furnished to do so, subject to the following conditions:
13
* The above copyright notice and this permission notice shall be
14
* included in all copies or substantial portions of the Software.
16
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
17
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
18
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
19
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
20
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
21
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
22
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
30
\page pi_structure Structure of a module
32
A Network Identity Manager module is a dynamically loadable library
33
with a specific set of exported symbols. Each export symbol and
34
general notes about writing a plug-in module are documented below.
36
\section pi_str_reg Registration and Version Information
40
\section pi_str_init Initialization
42
Do not use DllMain or other system specific callback routines to
43
perform intilization tasks other than creating mutexes, initializing
44
thread local storage and other tasks that must be performed at that
45
stage. Specifically, do not call any Network Identity Manager API functions from
48
\section pi_str_cb Callbacks
50
The callbacks that must be implemented by a module are: