1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 #include <ctype.h> 29 #include <dirent.h> 30 #include <grp.h> 31 #include <libintl.h> 32 #include <limits.h> 33 #include <locale.h> 34 #include <pwd.h> 35 #include <stdio.h> 36 #include <stdlib.h> 37 #include <string.h> 38 #include <sys/types.h> 39 #include <sys/inttypes.h> 40 #include <sys/file.h> 41 #include <sys/param.h> 42 #include <sys/uio.h> 43 #include <sys/stat.h> 44 #include <sys/acl.h> 45 #include <sys/socket.h> 46 #include <sys/errno.h> 47 #include <sys/ipc.h> 48 #include <sys/sem.h> 49 #include <sys/systm.h> 50 #include <netinet/in.h> 51 #include <sys/tiuser.h> 52 #include <rpc/types.h> 53 #include <rpc/auth.h> 54 #include <rpc/auth_unix.h> 55 #include <rpc/svc.h> 56 #include <rpc/xdr.h> 57 #include <nfs/nfs.h> 58 #include <sys/fs/ufs_quota.h> 59 #include <sys/time.h> 60 #include <sys/mkdev.h> 61 #include <unistd.h> 62 63 #include <bsm/audit.h> 64 #include <bsm/audit_record.h> 65 #include <bsm/libbsm.h> 66 67 #include <tsol/label.h> 68 #include <sys/tsol/label_macro.h> 69 70 #include "praudit.h" 71 #include "toktable.h" 72 73 #include <netdb.h> 74 #include <arpa/inet.h> 75 76 static char *anchor_path(char *); 77 static char *collapse_path(char *); 78 79 80 /* 81 * ----------------------------------------------------------------------- 82 * is_file_token: 83 * Tests whether the specified token id represents a type 84 * of file token. 85 * return codes : 1 - tokenid is a file token type 86 * : 0 - otherwise 87 * ----------------------------------------------------------------------- 88 */ 89 int 90 is_file_token(int tokenid) 91 { 92 if ((tokenid == AUT_OTHER_FILE32) || (tokenid == AUT_OTHER_FILE64)) 93 return (1); 94 95 return (0); 96 } 97 98 /* 99 * ----------------------------------------------------------------------- 100 * is_header_token: 101 * Tests whether the specified token id represents a type 102 * of header token (signifying the start of a record). 103 * return codes : 1 - tokenid is a header type 104 * : 0 - otherwise 105 * ----------------------------------------------------------------------- 106 */ 107 int 108 is_header_token(int tokenid) 109 { 110 if ((tokenid == AUT_OHEADER) || (tokenid == AUT_HEADER32) || 111 (tokenid == AUT_HEADER32_EX) || (tokenid == AUT_HEADER64) || 112 (tokenid == AUT_HEADER64_EX)) 113 return (1); 114 115 return (0); 116 } 117 118 /* 119 * ----------------------------------------------------------------------- 120 * is_token: 121 * Tests whether the specified token id represents a true 122 * token, as opposed to a regular tag. 123 * return codes : 1 - tokenid is a true token 124 * : 0 - otherwise 125 * ----------------------------------------------------------------------- 126 */ 127 int 128 is_token(int tokenid) 129 { 130 if ((tokenid > 0) && (tokenid <= MAXTOKEN)) 131 return (1); 132 133 return (0); 134 } 135 136 137 /* 138 * ----------------------------------------------------------------------- 139 * exit_token() : Process information label token and display contents 140 * return codes : -1 - error 141 * : 0 - successful 142 * NOTE: At the time of call, the label token id has been retrieved 143 * 144 * Format of exit token: 145 * exit token id adr_char 146 * ----------------------------------------------------------------------- 147 */ 148 int 149 exit_token(pr_context_t *context) 150 { 151 int returnstat; 152 int retval; 153 uval_t uval; 154 155 if ((returnstat = open_tag(context, TAG_ERRVAL)) != 0) 156 return (returnstat); 157 158 if ((returnstat = pr_adr_int32(context, (int32_t *)&retval, 1)) == 0) { 159 if (!(context->format & PRF_RAWM)) { 160 char *emsg = strerror(retval); 161 162 if (emsg == NULL) 163 uval.string_val = gettext("Unknown errno"); 164 else 165 uval.string_val = gettext(emsg); 166 uval.uvaltype = PRA_STRING; 167 } else { 168 uval.uvaltype = PRA_INT32; 169 uval.int32_val = retval; 170 } 171 returnstat = pa_print(context, &uval, 0); 172 } 173 if (returnstat == 0) 174 returnstat = close_tag(context, TAG_ERRVAL); 175 176 return (process_tag(context, TAG_RETVAL, returnstat, 1)); 177 } 178 179 /* 180 * ------------------------------------------------------------------ 181 * file_token() : prints out seconds of time and other file name 182 * return codes : -1 - error 183 * : 0 - successful, valid file token fields 184 * At the time of entry, the file token ID has already been retrieved 185 * 186 * Format of file token: 187 * file token id adr_char 188 * seconds of time adr_u_int 189 * name of other file adr_string 190 * ------------------------------------------------------------------ 191 */ 192 int 193 file_token(pr_context_t *context) 194 { 195 int returnstat; 196 197 returnstat = pa_utime32(context, 0, 0); /* time from usecs */ 198 199 /* other file name */ 200 returnstat = pa_file_string(context, returnstat, 1); 201 202 return (returnstat); 203 } 204 205 int 206 file64_token(pr_context_t *context) 207 { 208 int returnstat; 209 210 returnstat = pa_utime64(context, 0, 0); /* time from usecs */ 211 212 /* other file name */ 213 returnstat = pa_file_string(context, returnstat, 1); 214 215 return (returnstat); 216 } 217 218 /* 219 * ----------------------------------------------------------------------- 220 * header_token() : Process record header token and display contents 221 * return codes : -1 - error 222 * : 0 - successful 223 * : 1 - warning, password entry not found 224 * 225 * NOTE: At the time of call, the header token id has been retrieved 226 * 227 * Format of header token: 228 * header token id adr_char 229 * record byte count adr_u_int 230 * event type adr_u_short (printed either ASCII or raw) 231 * event class adr_u_int (printed either ASCII or raw) 232 * event action adr_u_int 233 * if extended: extended host name (IPv4/IPv6) 234 * seconds of time adr_u_int (printed either ASCII or raw) 235 * nanoseconds of time adr_u_int 236 * ----------------------------------------------------------------------- 237 */ 238 int 239 header_token(pr_context_t *context) 240 { 241 int returnstat; 242 243 returnstat = pa_reclen(context, 0); /* record byte */ 244 /* version ID */ 245 returnstat = process_tag(context, TAG_TOKVERS, returnstat, 0); 246 /* event type */ 247 returnstat = process_tag(context, TAG_EVTYPE, returnstat, 0); 248 /* event modifier */ 249 returnstat = pa_event_modifier(context, returnstat, 0); 250 /* time from nsec */ 251 returnstat = pa_ntime32(context, returnstat, 1); 252 253 return (returnstat); 254 } 255 256 int 257 header64_token(pr_context_t *context) 258 { 259 int returnstat; 260 261 returnstat = pa_reclen(context, 0); /* record byte */ 262 /* version ID */ 263 returnstat = process_tag(context, TAG_TOKVERS, returnstat, 0); 264 /* event type */ 265 returnstat = process_tag(context, TAG_EVTYPE, returnstat, 0); 266 /* event modifier */ 267 returnstat = pa_event_modifier(context, returnstat, 0); 268 /* time from nsec */ 269 returnstat = pa_ntime64(context, returnstat, 1); 270 271 return (returnstat); 272 } 273 274 int 275 header32_ex_token(pr_context_t *context) 276 { 277 int returnstat; 278 279 returnstat = pa_reclen(context, 0); /* record byte */ 280 /* version ID */ 281 returnstat = process_tag(context, TAG_TOKVERS, returnstat, 0); 282 /* event type */ 283 returnstat = process_tag(context, TAG_EVTYPE, returnstat, 0); 284 /* event modifier */ 285 returnstat = pa_event_modifier(context, returnstat, 0); 286 /* machine name */ 287 returnstat = pa_hostname_ex(context, returnstat, 0); 288 /* time from nsec */ 289 returnstat = pa_ntime32(context, returnstat, 1); 290 291 return (returnstat); 292 } 293 294 int 295 header64_ex_token(pr_context_t *context) 296 { 297 int returnstat; 298 299 returnstat = pa_reclen(context, 0); /* record byte */ 300 /* version ID */ 301 returnstat = process_tag(context, TAG_TOKVERS, returnstat, 0); 302 /* event type */ 303 returnstat = process_tag(context, TAG_EVTYPE, returnstat, 0); 304 /* event modifier */ 305 returnstat = pa_event_modifier(context, returnstat, 0); 306 /* machine name */ 307 returnstat = pa_hostname_ex(context, returnstat, 0); 308 /* time from nsec */ 309 returnstat = pa_ntime64(context, returnstat, 1); 310 311 return (returnstat); 312 } 313 314 /* 315 * ----------------------------------------------------------------------- 316 * trailer_token() : Process record trailer token and display contents 317 * return codes : -1 - error 318 * : 0 - successful 319 * NOTE: At the time of call, the trailer token id has already been 320 * retrieved 321 * 322 * Format of trailer token: 323 * trailer token id adr_char 324 * record sequence no adr_u_short (should be AUT_TRAILER_MAGIC) 325 * record byte count adr_u_int 326 * ----------------------------------------------------------------------- 327 */ 328 int 329 trailer_token(pr_context_t *context) 330 { 331 short magic_number; 332 333 if (pr_adr_u_short(context, (ushort_t *)&magic_number, 1) < 0) { 334 (void) fprintf(stderr, gettext( 335 "praudit: Cannot retrieve trailer magic number\n")); 336 return (-1); 337 } else { 338 if (magic_number != AUT_TRAILER_MAGIC) { 339 (void) fprintf(stderr, gettext( 340 "praudit: Invalid trailer magic number\n")); 341 return (-1); 342 } else 343 /* Do not display trailer in XML mode */ 344 if (context->format & PRF_XMLM) { 345 uint32_t junk; 346 int retstat; 347 348 retstat = pr_adr_u_int32(context, &junk, 1); 349 return (retstat); 350 } else { 351 return (pa_adr_u_int32(context, 0, 1)); 352 } 353 } 354 } 355 356 /* 357 * ----------------------------------------------------------------------- 358 * arbitrary_data_token(): 359 * Process arbitrary data token and display contents 360 * return codes : -1 - error 361 * : 0 - successful 362 * NOTE: At the time of call, the arbitrary data token id has already 363 * been retrieved 364 * 365 * Format of arbitrary data token: 366 * arbitrary data token id adr char 367 * how to print adr_char 368 * From audit_record.h, this may be either: 369 * AUP_BINARY binary 370 * AUP_OCTAL octal 371 * AUP_DECIMAL decimal 372 * AUP_HEX hexadecimal 373 * basic unit adr_char 374 * From audit_record.h, this may be either: 375 * AUR_BYTE byte 376 * AUR_CHAR char 377 * AUR_SHORT short 378 * AUR_INT32 int32_t 379 * AUR_INT64 int64_t 380 * unit count adr_char, specifying number of units of 381 * data in the "data items" parameter below 382 * data items depends on basic unit 383 * 384 * ----------------------------------------------------------------------- 385 */ 386 int 387 arbitrary_data_token(pr_context_t *context) 388 { 389 int returnstat; 390 int i; 391 char c1; 392 short c2; 393 int32_t c3; 394 int64_t c4; 395 char how_to_print, basic_unit, unit_count, fwid; 396 char *p; 397 int index = 0; 398 char *pformat = "%*s"; 399 400 uval_t uval; 401 402 if ((returnstat = pr_adr_char(context, &how_to_print, 1)) != 0) 403 return (returnstat); 404 405 if ((returnstat = pr_adr_char(context, &basic_unit, 1)) != 0) 406 return (returnstat); 407 408 if ((returnstat = pr_adr_char(context, &unit_count, 1)) != 0) 409 return (returnstat); 410 411 if (!(context->format & PRF_RAWM)) { 412 uval.uvaltype = PRA_STRING; 413 uval.string_val = htp2string(how_to_print); 414 } else { 415 uval.uvaltype = PRA_INT32; 416 uval.int32_val = (int)how_to_print; 417 } 418 419 if ((returnstat = open_tag(context, TAG_ARBPRINT)) != 0) 420 return (returnstat); 421 if ((returnstat = pa_print(context, &uval, 0)) < 0) 422 return (returnstat); 423 if ((returnstat = close_tag(context, TAG_ARBPRINT)) != 0) 424 return (returnstat); 425 426 if (!(context->format & PRF_RAWM)) { 427 uval.uvaltype = PRA_STRING; 428 uval.string_val = bu2string(basic_unit); 429 } else { 430 uval.uvaltype = PRA_INT32; 431 uval.int32_val = (int32_t)basic_unit; 432 } 433 434 if ((returnstat = open_tag(context, TAG_ARBTYPE)) != 0) 435 return (returnstat); 436 if ((returnstat = pa_print(context, &uval, 0)) < 0) 437 return (returnstat); 438 if ((returnstat = close_tag(context, TAG_ARBTYPE)) != 0) 439 return (returnstat); 440 441 uval.uvaltype = PRA_INT32; 442 uval.int32_val = (int32_t)unit_count; 443 444 if ((returnstat = open_tag(context, TAG_ARBCOUNT)) != 0) 445 return (returnstat); 446 if ((returnstat = pa_print(context, &uval, 1)) < 0) 447 return (returnstat); 448 if ((returnstat = close_tag(context, TAG_ARBCOUNT)) != 0) 449 return (returnstat); 450 451 /* Done with attributes; force end of token open */ 452 if ((returnstat = finish_open_tag(context)) != 0) 453 return (returnstat); 454 455 /* get the field width in case we need to format output */ 456 fwid = findfieldwidth(basic_unit, how_to_print); 457 p = (char *)malloc(80); 458 459 /* now get the data items and print them */ 460 for (i = 0; (i < unit_count); i++) { 461 switch (basic_unit) { 462 /* case AUR_BYTE: */ 463 case AUR_CHAR: 464 if (pr_adr_char(context, &c1, 1) == 0) 465 (void) convert_char_to_string(how_to_print, 466 c1, p); 467 else { 468 free(p); 469 return (-1); 470 } 471 break; 472 case AUR_SHORT: 473 if (pr_adr_short(context, &c2, 1) == 0) 474 (void) convert_short_to_string(how_to_print, 475 c2, p); 476 else { 477 free(p); 478 return (-1); 479 } 480 break; 481 case AUR_INT32: 482 if (pr_adr_int32(context, &c3, 1) == 0) 483 (void) convert_int32_to_string(how_to_print, 484 c3, p); 485 else { 486 free(p); 487 return (-1); 488 } 489 break; 490 case AUR_INT64: 491 if (pr_adr_int64(context, &c4, 1) == 0) 492 (void) convert_int64_to_string(how_to_print, 493 c4, p); 494 else { 495 free(p); 496 return (-1); 497 } 498 break; 499 default: 500 free(p); 501 return (-1); 502 /*NOTREACHED*/ 503 } 504 505 /* 506 * At this point, we have successfully retrieved a data 507 * item and converted it into an ASCII string pointed to 508 * by p. If all output is to be printed on one line, 509 * simply separate the data items by a space (or by the 510 * delimiter if this is the last data item), otherwise, we 511 * need to format the output before display. 512 */ 513 if (context->format & PRF_ONELINE) { 514 returnstat = pr_printf(context, "%s", p); 515 if ((returnstat >= 0) && (i == (unit_count - 1))) 516 returnstat = pr_printf(context, "%s", 517 context->SEPARATOR); 518 else 519 returnstat = pr_putchar(context, ' '); 520 } else { /* format output */ 521 returnstat = pr_printf(context, pformat, fwid, p); 522 index += fwid; 523 if ((returnstat >= 0) && 524 (((index + fwid) > 75) || 525 (i == (unit_count - 1)))) { 526 returnstat = pr_putchar(context, '\n'); 527 index = 0; 528 } 529 } /* else if PRF_ONELINE */ 530 if (returnstat < 0) { 531 free(p); 532 return (returnstat); 533 } 534 } 535 free(p); 536 537 return (returnstat); 538 } 539 540 /* 541 * ----------------------------------------------------------------------- 542 * opaque_token() : Process opaque token and display contents 543 * return codes : -1 - error 544 * : 0 - successful 545 * NOTE: At the time of call, the opaque token id has already been 546 * retrieved 547 * 548 * Format of opaque token: 549 * opaque token id adr_char 550 * size adr_short 551 * data adr_char, size times 552 * ----------------------------------------------------------------------- 553 */ 554 int 555 opaque_token(pr_context_t *context) 556 { 557 int returnstat; 558 short size; 559 char *charp; 560 uval_t uval; 561 562 563 /* print the size of the token */ 564 if (pr_adr_short(context, &size, 1) == 0) { 565 uval.uvaltype = PRA_SHORT; 566 uval.short_val = size; 567 returnstat = pa_print(context, &uval, 0); 568 } else 569 returnstat = -1; 570 571 /* now print out the data field in hexadecimal */ 572 if (returnstat >= 0) { 573 /* try to allocate memory for the character string */ 574 if ((charp = (char *)malloc(size * sizeof (char))) == NULL) 575 returnstat = -1; 576 else { 577 if ((returnstat = pr_adr_char(context, charp, 578 size)) == 0) { 579 /* print out in hexadecimal format */ 580 uval.uvaltype = PRA_STRING; 581 uval.string_val = hexconvert(charp, size, size); 582 if (uval.string_val) { 583 returnstat = pa_print(context, 584 &uval, 1); 585 free(uval.string_val); 586 } 587 } 588 free(charp); 589 } 590 } 591 592 return (returnstat); 593 } 594 595 /* 596 * ----------------------------------------------------------------------- 597 * path_token() : Process path token and display contents 598 * return codes : -1 - error 599 * : 0 - successful 600 * NOTE: At the time of call, the path token id has been retrieved 601 * 602 * Format of path token: 603 * token id adr_char 604 * path adr_string 605 * ----------------------------------------------------------------------- 606 */ 607 int 608 path_token(pr_context_t *context) 609 { 610 char *path; /* path */ 611 char *apath; /* anchored path */ 612 char *cpath; /* collapsed path */ 613 short length; 614 int returnstat; 615 uval_t uval; 616 617 /* 618 * We need to know how much space to allocate for our string, so 619 * read the length first, then call pr_adr_char to read those bytes. 620 */ 621 if (pr_adr_short(context, &length, 1) == 0) { 622 if ((path = (char *)malloc(length + 1)) == NULL) { 623 returnstat = -1; 624 } else if (pr_adr_char(context, path, length) == 0) { 625 path[length] = '\0'; 626 uval.uvaltype = PRA_STRING; 627 if (*path != '/') { 628 apath = anchor_path(path); 629 free(path); 630 } else 631 apath = path; 632 cpath = collapse_path(apath); 633 uval.string_val = cpath; 634 returnstat = pa_print(context, &uval, 1); 635 free(cpath); 636 } else { 637 free(path); 638 returnstat = -1; 639 } 640 return (returnstat); 641 } else 642 return (-1); 643 } 644 645 /* 646 * anchor a path name with a slash 647 */ 648 char * 649 anchor_path(char *sp) 650 { 651 char *dp; /* destination path */ 652 char *tp; /* temporary path */ 653 size_t len; 654 655 len = strlen(sp) + 2; 656 if ((dp = tp = (char *)calloc(1, len)) == (char *)0) 657 return ((char *)0); 658 659 *dp++ = '/'; 660 661 (void) strlcpy(dp, sp, len); 662 663 return (tp); 664 } 665 666 /* 667 * copy path to collapsed path. 668 * collapsed path does not contain: 669 * successive slashes 670 * instances of dot-slash 671 * instances of dot-dot-slash 672 * passed path must be anchored with a '/' 673 */ 674 char * 675 collapse_path(char *s) 676 { 677 int id; /* index of where we are in destination string */ 678 int is; /* index of where we are in source string */ 679 int slashseen; /* have we seen a slash */ 680 int ls; /* length of source string */ 681 682 ls = strlen(s) + 1; 683 684 slashseen = 0; 685 for (is = 0, id = 0; is < ls; is++) { 686 /* thats all folks, we've reached the end of input */ 687 if (s[is] == '\0') { 688 if (id > 1 && s[id-1] == '/') { 689 --id; 690 } 691 s[id++] = '\0'; 692 break; 693 } 694 /* previous character was a / */ 695 if (slashseen) { 696 if (s[is] == '/') 697 continue; /* another slash, ignore it */ 698 } else if (s[is] == '/') { 699 /* we see a /, just copy it and try again */ 700 slashseen = 1; 701 s[id++] = '/'; 702 continue; 703 } 704 /* /./ seen */ 705 if (s[is] == '.' && s[is+1] == '/') { 706 is += 1; 707 continue; 708 } 709 /* XXX/. seen */ 710 if (s[is] == '.' && s[is+1] == '\0') { 711 if (id > 1) 712 id--; 713 continue; 714 } 715 /* XXX/.. seen */ 716 if (s[is] == '.' && s[is+1] == '.' && s[is+2] == '\0') { 717 is += 1; 718 if (id > 0) 719 id--; 720 while (id > 0 && s[--id] != '/'); 721 id++; 722 continue; 723 } 724 /* XXX/../ seen */ 725 if (s[is] == '.' && s[is+1] == '.' && s[is+2] == '/') { 726 is += 2; 727 if (id > 0) 728 id--; 729 while (id > 0 && s[--id] != '/'); 730 id++; 731 continue; 732 } 733 while (is < ls && (s[id++] = s[is++]) != '/'); 734 is--; 735 } 736 return (s); 737 } 738 739 /* 740 * ----------------------------------------------------------------------- 741 * cmd_token() : Process cmd token and display contents 742 * return codes : -1 - error 743 * : 0 - successful 744 * NOTE: At the time of call, the cmd token id has been retrieved 745 * 746 * Format of command token: 747 * token id adr_char 748 * argc adr_short 749 * N*argv[i] adr_string (short, string) 750 * env cnt adr_short 751 * N*arge[i] adr_string (short, string) 752 * ----------------------------------------------------------------------- 753 */ 754 int 755 cmd_token(pr_context_t *context) 756 { 757 int returnstat; 758 short num; 759 760 returnstat = pr_adr_short(context, &num, 1); 761 if (returnstat < 0) 762 return (returnstat); 763 764 if (!(context->format & PRF_XMLM)) { 765 returnstat = pr_printf(context, "%s%s%d%s", 766 (context->format & PRF_ONELINE) ? "" : gettext("argcnt"), 767 (context->format & PRF_ONELINE) ? "" : context->SEPARATOR, 768 num, context->SEPARATOR); 769 if (returnstat < 0) 770 return (returnstat); 771 } 772 773 for (; num > 0; num--) { 774 if ((returnstat = process_tag(context, TAG_ARGV, 775 returnstat, 0)) < 0) 776 return (returnstat); 777 } 778 779 if ((returnstat = pr_adr_short(context, &num, 1)) < 0) 780 return (returnstat); 781 782 if (!(context->format & PRF_XMLM)) { 783 returnstat = pr_printf(context, "%s%s%d%s", 784 (context->format & PRF_ONELINE) ? "" : gettext("envcnt"), 785 (context->format & PRF_ONELINE) ? "" : context->SEPARATOR, 786 num, context->SEPARATOR); 787 if (returnstat < 0) 788 return (returnstat); 789 } 790 791 if ((num == 0) && !(context->format & PRF_XMLM)) { 792 returnstat = pr_putchar(context, '\n'); 793 if (returnstat < 0) 794 return (returnstat); 795 } 796 797 for (; num > 1; num--) { 798 if ((returnstat = process_tag(context, TAG_ARGE, 799 returnstat, 0)) < 0) 800 return (returnstat); 801 } 802 if (num) 803 returnstat = process_tag(context, TAG_ARGE, returnstat, 1); 804 805 return (returnstat); 806 807 } 808 809 /* 810 * ----------------------------------------------------------------------- 811 * argument32_token() : Process argument token and display contents 812 * return codes : -1 - error 813 * : 0 - successful 814 * NOTE: At the time of call, the arg token id has been retrieved 815 * 816 * Format of argument token: 817 * current directory token id adr_char 818 * argument number adr_char 819 * argument value adr_int32 820 * argument description adr_string 821 * ----------------------------------------------------------------------- 822 */ 823 int 824 argument32_token(pr_context_t *context) 825 { 826 int returnstat; 827 828 returnstat = process_tag(context, TAG_ARGNUM, 0, 0); 829 returnstat = process_tag(context, TAG_ARGVAL32, returnstat, 0); 830 returnstat = process_tag(context, TAG_ARGDESC, returnstat, 1); 831 832 return (returnstat); 833 834 } 835 836 /* 837 * ----------------------------------------------------------------------- 838 * argument64_token() : Process argument token and display contents 839 * return codes : -1 - error 840 * : 0 - successful 841 * NOTE: At the time of call, the arg token id has been retrieved 842 * 843 * Format of 64 bit argument token: 844 * current directory token id adr_char 845 * argument number adr_char 846 * argument value adr_int64 847 * argument description adr_string 848 * ----------------------------------------------------------------------- 849 */ 850 int 851 argument64_token(pr_context_t *context) 852 { 853 int returnstat; 854 855 returnstat = process_tag(context, TAG_ARGNUM, 0, 0); 856 returnstat = process_tag(context, TAG_ARGVAL64, returnstat, 0); 857 returnstat = process_tag(context, TAG_ARGDESC, returnstat, 1); 858 859 return (returnstat); 860 861 } 862 863 /* 864 * ----------------------------------------------------------------------- 865 * process_token() : Process process token and display contents 866 * return codes : -1 - error 867 * : 0 - successful 868 * NOTE: At the time of call, the process token id has been retrieved 869 * 870 * Format of process token: 871 * process token id adr_char 872 * auid adr_u_int32 873 * euid adr_u_int32 874 * egid adr_u_int32 875 * ruid adr_u_int32 876 * egid adr_u_int32 877 * pid adr_u_int32 878 * sid adr_u_int32 879 * tid adr_u_int32, adr_u_int32 880 * ----------------------------------------------------------------------- 881 */ 882 int 883 process32_token(pr_context_t *context) 884 { 885 int returnstat; 886 887 /* auid */ 888 returnstat = process_tag(context, TAG_AUID, 0, 0); 889 /* uid */ 890 returnstat = process_tag(context, TAG_UID, returnstat, 0); 891 /* gid */ 892 returnstat = process_tag(context, TAG_GID, returnstat, 0); 893 /* ruid */ 894 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 895 /* rgid */ 896 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 897 /* pid */ 898 returnstat = process_tag(context, TAG_PID, returnstat, 0); 899 /* sid */ 900 returnstat = process_tag(context, TAG_SID, returnstat, 0); 901 /* tid */ 902 returnstat = process_tag(context, TAG_TID32, returnstat, 1); 903 904 return (returnstat); 905 } 906 907 int 908 process64_token(pr_context_t *context) 909 { 910 int returnstat; 911 912 /* auid */ 913 returnstat = process_tag(context, TAG_AUID, 0, 0); 914 /* uid */ 915 returnstat = process_tag(context, TAG_UID, returnstat, 0); 916 /* gid */ 917 returnstat = process_tag(context, TAG_GID, returnstat, 0); 918 /* ruid */ 919 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 920 /* rgid */ 921 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 922 /* pid */ 923 returnstat = process_tag(context, TAG_PID, returnstat, 0); 924 /* sid */ 925 returnstat = process_tag(context, TAG_SID, returnstat, 0); 926 /* tid */ 927 returnstat = process_tag(context, TAG_TID64, returnstat, 1); 928 929 return (returnstat); 930 } 931 932 /* 933 * ----------------------------------------------------------------------- 934 * process_ex_token() : Process process token and display contents 935 * return codes : -1 - error 936 * : 0 - successful 937 * NOTE: At the time of call, the process token id has been retrieved 938 * 939 * Format of extended process token: 940 * process token id adr_char 941 * auid adr_u_int32 942 * euid adr_u_int32 943 * egid adr_u_int32 944 * ruid adr_u_int32 945 * egid adr_u_int32 946 * pid adr_u_int32 947 * sid adr_u_int32 948 * tid adr_u_int32, adr_u_int32, 4*adr_u_int32 949 * ----------------------------------------------------------------------- 950 */ 951 int 952 process32_ex_token(pr_context_t *context) 953 { 954 int returnstat; 955 956 /* auid */ 957 returnstat = process_tag(context, TAG_AUID, 0, 0); 958 /* uid */ 959 returnstat = process_tag(context, TAG_UID, returnstat, 0); 960 /* gid */ 961 returnstat = process_tag(context, TAG_GID, returnstat, 0); 962 /* ruid */ 963 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 964 /* rgid */ 965 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 966 /* pid */ 967 returnstat = process_tag(context, TAG_PID, returnstat, 0); 968 /* sid */ 969 returnstat = process_tag(context, TAG_SID, returnstat, 0); 970 /* tid */ 971 returnstat = process_tag(context, TAG_TID32_EX, returnstat, 1); 972 973 return (returnstat); 974 } 975 976 int 977 process64_ex_token(pr_context_t *context) 978 { 979 int returnstat; 980 981 /* auid */ 982 returnstat = process_tag(context, TAG_AUID, 0, 0); 983 /* uid */ 984 returnstat = process_tag(context, TAG_UID, returnstat, 0); 985 /* gid */ 986 returnstat = process_tag(context, TAG_GID, returnstat, 0); 987 /* ruid */ 988 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 989 /* rgid */ 990 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 991 /* pid */ 992 returnstat = process_tag(context, TAG_PID, returnstat, 0); 993 /* sid */ 994 returnstat = process_tag(context, TAG_SID, returnstat, 0); 995 /* tid */ 996 returnstat = process_tag(context, TAG_TID64_EX, returnstat, 1); 997 998 return (returnstat); 999 } 1000 1001 /* 1002 * ----------------------------------------------------------------------- 1003 * return_value32_token(): Process return value and display contents 1004 * return codes : -1 - error 1005 * : 0 - successful 1006 * NOTE: At the time of call, the return value token id has been retrieved 1007 * 1008 * Format of return value token: 1009 * return value token id adr_char 1010 * error number adr_char 1011 * return value adr_int32 1012 * ----------------------------------------------------------------------- 1013 */ 1014 int 1015 return_value32_token(pr_context_t *context) 1016 { 1017 int returnstat; 1018 uchar_t number; 1019 int32_t value; 1020 char pb[512]; /* print buffer */ 1021 uval_t uval; 1022 bool_t used_ret_val = 0; 1023 1024 /* 1025 * Every audit record generated contains a return token. 1026 * 1027 * The return token is a special token. It indicates the success 1028 * or failure of the event that contains it. 1029 * The return32 token contains two pieces of data: 1030 * 1031 * char number; 1032 * int32_t return_value; 1033 * 1034 * For audit records generated by the kernel: 1035 * The kernel always puts a positive value in "number". 1036 * Upon success "number" is 0. 1037 * Upon failure "number" is a positive errno value that is less than 1038 * sys_nerr. 1039 * 1040 * For audit records generated at the user level: 1041 * Upon success "number" is 0. 1042 * Upon failure "number" is -1. 1043 * 1044 * For both kernel and user land the value of "return_value" is 1045 * arbitrary. For the kernel it contains the return value of 1046 * the system call. For user land it contains an arbitrary return 1047 * value if it is less than ADT_FAIL_VALUE; ADT_FAIL_VALUE 1048 * and above are messages defined in adt_event.h. ADT_FAIL_PAM and 1049 * above are messages from pam_strerror(). No interpretation is done 1050 * on "return_value" if it is outside the range of ADT_FAIL_VALUE_* or 1051 * ADT_FAIL_PAM values. 1052 */ 1053 if ((returnstat = open_tag(context, TAG_ERRVAL)) != 0) 1054 return (returnstat); 1055 1056 if ((returnstat = pr_adr_u_char(context, &number, 1)) == 0) { 1057 if (!(context->format & PRF_RAWM)) { 1058 used_ret_val = 1; 1059 pa_error(number, pb, sizeof (pb)); 1060 uval.uvaltype = PRA_STRING; 1061 uval.string_val = pb; 1062 if ((returnstat = pa_print(context, &uval, 0)) != 0) 1063 return (returnstat); 1064 if ((returnstat = close_tag(context, TAG_ERRVAL)) != 0) 1065 return (returnstat); 1066 if ((returnstat = open_tag(context, TAG_RETVAL)) != 0) 1067 return (returnstat); 1068 1069 if ((returnstat = pr_adr_int32( 1070 context, &value, 1)) != 0) 1071 return (returnstat); 1072 1073 pa_retval(value, pb, sizeof (pb)); 1074 } else { 1075 uval.uvaltype = PRA_INT32; 1076 if ((char)number == -1) 1077 uval.int32_val = -1; 1078 else 1079 uval.int32_val = number; 1080 } 1081 returnstat = pa_print(context, &uval, used_ret_val); 1082 } 1083 if (used_ret_val) { 1084 if (returnstat == 0) 1085 returnstat = close_tag(context, TAG_RETVAL); 1086 return (returnstat); 1087 } 1088 if (!returnstat) 1089 if (returnstat = close_tag(context, TAG_ERRVAL)) 1090 return (returnstat); 1091 1092 return (process_tag(context, TAG_RETVAL, returnstat, 1)); 1093 } 1094 1095 /* 1096 * ----------------------------------------------------------------------- 1097 * return_value64_token(): Process return value and display contents 1098 * return codes : -1 - error 1099 * : 0 - successful 1100 * NOTE: At the time of call, the return value token id has been retrieved 1101 * 1102 * Format of return value token: 1103 * return value token id adr_char 1104 * error number adr_char 1105 * return value adr_int64 1106 * 1107 * HOWEVER, the 64 bit return value is a concatenation of two 1108 * 32 bit return values; the first of which is the same as is 1109 * carried in the return32 token. The second 32 bits are ignored 1110 * here so that the displayed return token will have the same 1111 * number whether the application is 32 or 64 bits. 1112 * ----------------------------------------------------------------------- 1113 */ 1114 int 1115 return_value64_token(pr_context_t *context) 1116 { 1117 int returnstat; 1118 uchar_t number; 1119 rval_t rval; 1120 char pb[512]; /* print buffer */ 1121 uval_t uval; 1122 1123 /* 1124 * Every audit record generated contains a return token. 1125 * 1126 * The return token is a special token. It indicates the success 1127 * or failure of the event that contains it. 1128 * The return64 token contains two pieces of data: 1129 * 1130 * char number; 1131 * int64_t return_value; 1132 * 1133 * For audit records generated by the kernel: 1134 * The kernel always puts a positive value in "number". 1135 * Upon success "number" is 0. 1136 * Upon failure "number" is a positive errno value that is less than 1137 * sys_nerr. 1138 * 1139 * For audit records generated at the user level: 1140 * Upon success "number" is 0. 1141 * Upon failure "number" is -1. 1142 * 1143 * For both kernel and user land the value of "return_value" is 1144 * arbitrary. For the kernel it contains the return value of 1145 * the system call. For user land it contains an arbitrary return 1146 * value if it is less than ADT_FAIL_VALUE; ADT_FAIL_VALUE 1147 * and above are messages defined in adt_event.h. ADT_FAIL_PAM and 1148 * above are messages from pam_strerror(). No interpretation is done 1149 * on "return_value" if it is outside the range of ADT_FAIL_VALUE_* or 1150 * ADT_FAIL_PAM values. 1151 * 1152 * The 64 bit return value consists of two 32bit parts; for 1153 * system calls, the first part is the value returned by the 1154 * system call and the second part depends on the system call 1155 * implementation. In most cases, the second part is either 0 1156 * or garbage; because of that, it is omitted from the praudit 1157 * output. 1158 */ 1159 if ((returnstat = open_tag(context, TAG_ERRVAL)) != 0) 1160 return (returnstat); 1161 1162 if ((returnstat = pr_adr_u_char(context, &number, 1)) == 0) { 1163 if (!(context->format & PRF_RAWM)) { 1164 pa_error(number, pb, sizeof (pb)); 1165 uval.uvaltype = PRA_STRING; 1166 uval.string_val = pb; 1167 if ((returnstat = pa_print(context, &uval, 0)) != 0) 1168 return (returnstat); 1169 1170 if ((returnstat = close_tag(context, TAG_ERRVAL)) != 0) 1171 return (returnstat); 1172 if ((returnstat = open_tag(context, TAG_RETVAL)) != 0) 1173 return (returnstat); 1174 1175 if ((returnstat = pr_adr_int64(context, 1176 &rval.r_vals, 1)) != 0) 1177 return (returnstat); 1178 pa_retval(rval.r_val1, pb, sizeof (pb)); 1179 } else { 1180 uval.uvaltype = PRA_INT32; 1181 if ((char)number == -1) 1182 uval.int32_val = -1; 1183 else 1184 uval.int32_val = number; 1185 1186 if ((returnstat = pa_print(context, &uval, 0)) != 0) 1187 return (returnstat); 1188 1189 if ((returnstat = close_tag(context, TAG_ERRVAL)) != 0) 1190 return (returnstat); 1191 if ((returnstat = open_tag(context, TAG_RETVAL)) != 0) 1192 return (returnstat); 1193 1194 if ((returnstat = pr_adr_int64(context, 1195 &rval.r_vals, 1)) != 0) 1196 return (returnstat); 1197 uval.int32_val = rval.r_val1; 1198 } 1199 returnstat = pa_print(context, &uval, 1); 1200 } else { 1201 return (returnstat); 1202 } 1203 1204 if (returnstat == 0) 1205 returnstat = close_tag(context, TAG_RETVAL); 1206 1207 return (returnstat); 1208 } 1209 1210 /* 1211 * ----------------------------------------------------------------------- 1212 * subject32_token() : Process subject token and display contents 1213 * return codes : -1 - error 1214 * : 0 - successful 1215 * NOTE: At the time of call, the subject token id has been retrieved 1216 * 1217 * Format of subject token: 1218 * subject token id adr_char 1219 * auid adr_u_int32 1220 * euid adr_u_int32 1221 * egid adr_u_int32 1222 * ruid adr_u_int32 1223 * egid adr_u_int32 1224 * pid adr_u_int32 1225 * sid adr_u_int32 1226 * tid adr_u_int32, adr_u_int32 1227 * ----------------------------------------------------------------------- 1228 */ 1229 int 1230 subject32_token(pr_context_t *context) 1231 { 1232 int returnstat; 1233 1234 /* auid */ 1235 returnstat = process_tag(context, TAG_AUID, 0, 0); 1236 /* uid */ 1237 returnstat = process_tag(context, TAG_UID, returnstat, 0); 1238 /* gid */ 1239 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1240 /* ruid */ 1241 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 1242 /* rgid */ 1243 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 1244 /* pid */ 1245 returnstat = process_tag(context, TAG_PID, returnstat, 0); 1246 /* sid */ 1247 returnstat = process_tag(context, TAG_SID, returnstat, 0); 1248 /* tid */ 1249 returnstat = process_tag(context, TAG_TID32, returnstat, 1); 1250 1251 return (returnstat); 1252 } 1253 1254 int 1255 subject64_token(pr_context_t *context) 1256 { 1257 int returnstat; 1258 1259 /* auid */ 1260 returnstat = process_tag(context, TAG_AUID, 0, 0); 1261 /* uid */ 1262 returnstat = process_tag(context, TAG_UID, returnstat, 0); 1263 /* gid */ 1264 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1265 /* ruid */ 1266 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 1267 /* rgid */ 1268 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 1269 /* pid */ 1270 returnstat = process_tag(context, TAG_PID, returnstat, 0); 1271 /* sid */ 1272 returnstat = process_tag(context, TAG_SID, returnstat, 0); 1273 /* tid */ 1274 returnstat = process_tag(context, TAG_TID64, returnstat, 1); 1275 1276 return (returnstat); 1277 } 1278 1279 /* 1280 * ----------------------------------------------------------------------- 1281 * subject_ex_token(): Process subject token and display contents 1282 * return codes : -1 - error 1283 * : 0 - successful 1284 * NOTE: At the time of call, the subject token id has been retrieved 1285 * 1286 * Format of extended subject token: 1287 * subject token id adr_char 1288 * auid adr_u_int32 1289 * euid adr_u_int32 1290 * egid adr_u_int32 1291 * ruid adr_u_int32 1292 * egid adr_u_int32 1293 * pid adr_u_int32 1294 * sid adr_u_int32 1295 * tid adr_u_int32, adr_u_int32 1296 * ----------------------------------------------------------------------- 1297 */ 1298 int 1299 subject32_ex_token(pr_context_t *context) 1300 { 1301 int returnstat; 1302 1303 /* auid */ 1304 returnstat = process_tag(context, TAG_AUID, 0, 0); 1305 /* uid */ 1306 returnstat = process_tag(context, TAG_UID, returnstat, 0); 1307 /* gid */ 1308 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1309 /* ruid */ 1310 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 1311 /* rgid */ 1312 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 1313 /* pid */ 1314 returnstat = process_tag(context, TAG_PID, returnstat, 0); 1315 /* sid */ 1316 returnstat = process_tag(context, TAG_SID, returnstat, 0); 1317 /* tid */ 1318 returnstat = process_tag(context, TAG_TID32_EX, returnstat, 1); 1319 1320 return (returnstat); 1321 } 1322 1323 int 1324 subject64_ex_token(pr_context_t *context) 1325 { 1326 int returnstat; 1327 1328 /* auid */ 1329 returnstat = process_tag(context, TAG_AUID, 0, 0); 1330 /* uid */ 1331 returnstat = process_tag(context, TAG_UID, returnstat, 0); 1332 /* gid */ 1333 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1334 /* ruid */ 1335 returnstat = process_tag(context, TAG_RUID, returnstat, 0); 1336 /* rgid */ 1337 returnstat = process_tag(context, TAG_RGID, returnstat, 0); 1338 /* pid */ 1339 returnstat = process_tag(context, TAG_PID, returnstat, 0); 1340 /* sid */ 1341 returnstat = process_tag(context, TAG_SID, returnstat, 0); 1342 /* tid */ 1343 returnstat = process_tag(context, TAG_TID64_EX, returnstat, 1); 1344 1345 return (returnstat); 1346 } 1347 1348 /* 1349 * ----------------------------------------------------------------------- 1350 * s5_IPC_token() : Process System V IPC token and display contents 1351 * return codes : -1 - error 1352 * : 0 - successful 1353 * NOTE: At the time of call, the System V IPC id has been retrieved 1354 * 1355 * Format of System V IPC token: 1356 * System V IPC token id adr_char 1357 * object id adr_int32 1358 * ----------------------------------------------------------------------- 1359 */ 1360 int 1361 s5_IPC_token(pr_context_t *context) 1362 { 1363 int returnstat; 1364 uchar_t ipctype; 1365 uval_t uval; 1366 1367 /* 1368 * TRANSLATION_NOTE 1369 * These names refer to the type of System V IPC object: 1370 * message queue, semaphore, shared memory. 1371 */ 1372 1373 if (pr_adr_u_char(context, &ipctype, 1) == 0) { 1374 if ((returnstat = open_tag(context, TAG_IPCTYPE)) != 0) 1375 return (returnstat); 1376 1377 if (!(context->format & PRF_RAWM)) { 1378 /* print in ASCII form */ 1379 uval.uvaltype = PRA_STRING; 1380 switch (ipctype) { 1381 case AT_IPC_MSG: 1382 uval.string_val = gettext("msg"); 1383 break; 1384 case AT_IPC_SEM: 1385 uval.string_val = gettext("sem"); 1386 break; 1387 case AT_IPC_SHM: 1388 uval.string_val = gettext("shm"); 1389 break; 1390 } 1391 returnstat = pa_print(context, &uval, 0); 1392 } 1393 /* print in integer form */ 1394 if ((context->format & PRF_RAWM) || (returnstat == 1)) { 1395 uval.uvaltype = PRA_BYTE; 1396 uval.char_val = ipctype; 1397 returnstat = pa_print(context, &uval, 0); 1398 } 1399 if ((returnstat = close_tag(context, TAG_IPCTYPE)) != 0) 1400 return (returnstat); 1401 1402 /* next get and print ipc id */ 1403 return (process_tag(context, TAG_IPCID, returnstat, 1)); 1404 } else { 1405 /* cannot retrieve ipc type */ 1406 return (-1); 1407 } 1408 } 1409 1410 /* 1411 * ----------------------------------------------------------------------- 1412 * text_token() : Process text token and display contents 1413 * return codes : -1 - error 1414 * : 0 - successful 1415 * NOTE: At the time of call, the text token id has been retrieved 1416 * 1417 * Format of text token: 1418 * text token id adr_char 1419 * text adr_string 1420 * ----------------------------------------------------------------------- 1421 */ 1422 int 1423 text_token(pr_context_t *context) 1424 { 1425 return (pa_adr_string(context, 0, 1)); 1426 } 1427 1428 /* 1429 * ----------------------------------------------------------------------- 1430 * tid_token() : Process a generic terminal id token / AUT_TID 1431 * return codes : -1 - error 1432 * : 0 - successful 1433 * NOTE: At the time of call, the token id has been retrieved 1434 * 1435 * Format of tid token: 1436 * ip token id adr_char 1437 * terminal type adr_char 1438 * terminal type = AU_IPADR: 1439 * remote port: adr_short 1440 * local port: adr_short 1441 * IP type: adt_int32 -- AU_IPv4 or AU_IPv6 1442 * address: adr_int32 if IPv4, else 4 * adr_int32 1443 * ----------------------------------------------------------------------- 1444 */ 1445 int 1446 tid_token(pr_context_t *context) 1447 { 1448 int returnstat; 1449 uchar_t type; 1450 uval_t uval; 1451 1452 if ((returnstat = pr_adr_u_char(context, &type, 1)) != 0) 1453 return (returnstat); 1454 uval.uvaltype = PRA_STRING; 1455 if ((returnstat = open_tag(context, TAG_TID_TYPE)) != 0) 1456 return (returnstat); 1457 1458 switch (type) { 1459 default: 1460 return (-1); /* other than IP type is not implemented */ 1461 case AU_IPADR: 1462 uval.string_val = "ip"; 1463 returnstat = pa_print(context, &uval, 0); 1464 returnstat = close_tag(context, TAG_TID_TYPE); 1465 returnstat = open_tag(context, TAG_IP); 1466 returnstat = process_tag(context, TAG_IP_REMOTE, returnstat, 0); 1467 returnstat = process_tag(context, TAG_IP_LOCAL, returnstat, 0); 1468 returnstat = process_tag(context, TAG_IP_ADR, returnstat, 1); 1469 returnstat = close_tag(context, TAG_IP); 1470 break; 1471 } 1472 return (returnstat); 1473 } 1474 1475 /* 1476 * ----------------------------------------------------------------------- 1477 * ip_addr_token() : Process ip token and display contents 1478 * return codes : -1 - error 1479 * : 0 - successful 1480 * NOTE: At the time of call, the ip token id has been retrieved 1481 * 1482 * Format of ip address token: 1483 * ip token id adr_char 1484 * address adr_int32 (printed in hex) 1485 * ----------------------------------------------------------------------- 1486 */ 1487 1488 int 1489 ip_addr_token(pr_context_t *context) 1490 { 1491 return (pa_hostname(context, 0, 1)); 1492 } 1493 1494 int 1495 ip_addr_ex_token(pr_context_t *context) 1496 { 1497 int returnstat; 1498 uint32_t ip_addr[16]; 1499 uint32_t ip_type; 1500 struct in_addr ia; 1501 char *ipstring; 1502 char buf[256]; 1503 uval_t uval; 1504 1505 /* get address type */ 1506 if ((returnstat = pr_adr_u_int32(context, &ip_type, 1)) != 0) 1507 return (returnstat); 1508 1509 /* legal address types are either AU_IPv4 or AU_IPv6 only */ 1510 if ((ip_type != AU_IPv4) && (ip_type != AU_IPv6)) 1511 return (-1); 1512 1513 /* get address (4/16) */ 1514 if ((returnstat = pr_adr_char(context, (char *)ip_addr, ip_type)) != 0) 1515 return (returnstat); 1516 1517 uval.uvaltype = PRA_STRING; 1518 if (ip_type == AU_IPv4) { 1519 uval.string_val = buf; 1520 1521 if (!(context->format & PRF_RAWM)) { 1522 get_Hname(ip_addr[0], buf, sizeof (buf)); 1523 return (pa_print(context, &uval, 1)); 1524 } 1525 1526 ia.s_addr = ip_addr[0]; 1527 if ((ipstring = inet_ntoa(ia)) == NULL) 1528 return (-1); 1529 1530 (void) snprintf(buf, sizeof (buf), "%s", ipstring); 1531 1532 } else { 1533 uval.string_val = buf; 1534 1535 if (!(context->format & PRF_RAWM)) { 1536 get_Hname_ex(ip_addr, buf, sizeof (buf)); 1537 return (pa_print(context, &uval, 1)); 1538 } 1539 1540 (void) inet_ntop(AF_INET6, (void *) ip_addr, buf, 1541 sizeof (buf)); 1542 1543 } 1544 1545 return (pa_print(context, &uval, 1)); 1546 } 1547 1548 /* 1549 * ----------------------------------------------------------------------- 1550 * ip_token() : Process ip header token and display contents 1551 * return codes : -1 - error 1552 * : 0 - successful 1553 * NOTE: At the time of call, the ip token id has been retrieved 1554 * 1555 * Format of ip header token: 1556 * ip header token id adr_char 1557 * version adr_char (printed in hex) 1558 * type of service adr_char (printed in hex) 1559 * length adr_short 1560 * id adr_u_short 1561 * offset adr_u_short 1562 * ttl adr_char (printed in hex) 1563 * protocol adr_char (printed in hex) 1564 * checksum adr_u_short 1565 * source address adr_int32 (printed in hex) 1566 * destination address adr_int32 (printed in hex) 1567 * ----------------------------------------------------------------------- 1568 */ 1569 int 1570 ip_token(pr_context_t *context) 1571 { 1572 int returnstat; 1573 1574 returnstat = process_tag(context, TAG_IPVERS, 0, 0); 1575 returnstat = process_tag(context, TAG_IPSERV, returnstat, 0); 1576 returnstat = process_tag(context, TAG_IPLEN, returnstat, 0); 1577 returnstat = process_tag(context, TAG_IPID, returnstat, 0); 1578 returnstat = process_tag(context, TAG_IPOFFS, returnstat, 0); 1579 returnstat = process_tag(context, TAG_IPTTL, returnstat, 0); 1580 returnstat = process_tag(context, TAG_IPPROTO, returnstat, 0); 1581 returnstat = process_tag(context, TAG_IPCKSUM, returnstat, 0); 1582 returnstat = process_tag(context, TAG_IPSRC, returnstat, 0); 1583 returnstat = process_tag(context, TAG_IPDEST, returnstat, 1); 1584 1585 return (returnstat); 1586 } 1587 1588 /* 1589 * ----------------------------------------------------------------------- 1590 * iport_token() : Process ip port address token and display contents 1591 * return codes : -1 - error 1592 * : 0 - successful 1593 * NOTE: At time of call, the ip port address token id has been retrieved 1594 * 1595 * Format of ip port token: 1596 * ip port address token id adr_char 1597 * port address adr_short (in hex) 1598 * ----------------------------------------------------------------------- 1599 */ 1600 int 1601 iport_token(pr_context_t *context) 1602 { 1603 return (pa_adr_shorthex(context, 0, 1)); 1604 } 1605 1606 /* 1607 * ----------------------------------------------------------------------- 1608 * socket_token() : Process socket token and display contents 1609 * return codes : -1 - error 1610 * : 0 - successful 1611 * NOTE: At time of call, the socket token id has been retrieved 1612 * 1613 * Format of socket token: 1614 * ip socket token id adr_char 1615 * socket type adr_short (in hex) 1616 * foreign port adr_short (in hex) 1617 * foreign internet address adr_hostname/adr_int32 (in ascii/hex) 1618 * ----------------------------------------------------------------------- 1619 * 1620 * Note: local port and local internet address have been removed for 5.x 1621 */ 1622 int 1623 socket_token(pr_context_t *context) 1624 { 1625 int returnstat; 1626 1627 returnstat = process_tag(context, TAG_SOCKTYPE, 0, 0); 1628 returnstat = process_tag(context, TAG_SOCKPORT, returnstat, 0); 1629 if (returnstat != 0) 1630 return (returnstat); 1631 1632 if ((returnstat = open_tag(context, TAG_SOCKADDR)) != 0) 1633 return (returnstat); 1634 1635 if ((returnstat = pa_hostname(context, returnstat, 1)) != 0) 1636 return (returnstat); 1637 1638 return (close_tag(context, TAG_SOCKADDR)); 1639 } 1640 1641 /* 1642 * ----------------------------------------------------------------------- 1643 * socket_ex_token() : Process socket token and display contents 1644 * return codes : -1 - error 1645 * : 0 - successful 1646 * NOTE: At time of call, the extended socket token id has been retrieved 1647 * 1648 * Format of extended socket token: 1649 * token id adr_char 1650 * socket domain adr_short (in hex) 1651 * socket type adr_short (in hex) 1652 * IP address type adr_short (in hex) [not displayed] 1653 * local port adr_short (in hex) 1654 * local internet address adr_hostname/adr_int32 (in ascii/hex) 1655 * foreign port adr_short (in hex) 1656 * foreign internet address adr_hostname/adr_int32 (in ascii/hex) 1657 * ----------------------------------------------------------------------- 1658 * 1659 * Note: local port and local internet address have been removed for 5.x 1660 */ 1661 int 1662 socket_ex_token(pr_context_t *context) 1663 { 1664 int returnstat; 1665 1666 returnstat = process_tag(context, TAG_SOCKEXDOM, 0, 0); 1667 returnstat = process_tag(context, TAG_SOCKEXTYPE, returnstat, 0); 1668 returnstat = pa_hostname_so(context, returnstat, 1); 1669 1670 return (returnstat); 1671 } 1672 1673 /* 1674 * ----------------------------------------------------------------------- 1675 * sequence_token() : Process sequence token and display contents 1676 * return codes : -1 - error 1677 * : 0 - successful 1678 * NOTE: At time of call, the socket token id has been retrieved 1679 * 1680 * Format of sequence token: 1681 * sequence token id adr_char 1682 * sequence number adr_u_int32 (in hex) 1683 * ----------------------------------------------------------------------- 1684 */ 1685 int 1686 sequence_token(pr_context_t *context) 1687 { 1688 return (process_tag(context, TAG_SEQNUM, 0, 1)); 1689 } 1690 1691 /* 1692 * ----------------------------------------------------------------------- 1693 * acl_token() : Process access control list term 1694 * return codes : -1 - error 1695 * : 0 - successful 1696 * 1697 * Format of acl token: 1698 * token id adr_char 1699 * term type adr_u_int32 1700 * term value adr_u_int32 (depends on type) 1701 * file mode adr_u_int (in octal) 1702 * ----------------------------------------------------------------------- 1703 */ 1704 int 1705 acl_token(pr_context_t *context) 1706 { 1707 int returnstat; 1708 1709 returnstat = pa_pw_uid_gr_gid(context, 0, 0); 1710 1711 return (process_tag(context, TAG_MODE, returnstat, 1)); 1712 } 1713 1714 /* 1715 * ----------------------------------------------------------------------- 1716 * attribute_token() : Process attribute token and display contents 1717 * return codes : -1 - error 1718 * : 0 - successful 1719 * NOTE: At the time of call, the attribute token id has been retrieved 1720 * 1721 * Format of attribute token: 1722 * attribute token id adr_char 1723 * mode adr_u_int (printed in octal) 1724 * uid adr_u_int 1725 * gid adr_u_int 1726 * file system id adr_int 1727 * 1728 * node id adr_int (attribute_token 1729 * pre SunOS 5.7) 1730 * device adr_u_int 1731 * or 1732 * node id adr_int64 (attribute32_token) 1733 * device adr_u_int 1734 * or 1735 * node id adr_int64 (attribute64_token) 1736 * device adr_u_int64 1737 * ----------------------------------------------------------------------- 1738 */ 1739 int 1740 attribute_token(pr_context_t *context) 1741 { 1742 int returnstat; 1743 1744 returnstat = process_tag(context, TAG_MODE, 0, 0); 1745 returnstat = process_tag(context, TAG_UID, returnstat, 0); 1746 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1747 returnstat = process_tag(context, TAG_FSID, returnstat, 0); 1748 returnstat = process_tag(context, TAG_NODEID32, returnstat, 0); 1749 returnstat = process_tag(context, TAG_DEVICE32, returnstat, 1); 1750 1751 return (returnstat); 1752 } 1753 1754 int 1755 attribute32_token(pr_context_t *context) 1756 { 1757 int returnstat; 1758 1759 returnstat = process_tag(context, TAG_MODE, 0, 0); 1760 returnstat = process_tag(context, TAG_UID, returnstat, 0); 1761 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1762 returnstat = process_tag(context, TAG_FSID, returnstat, 0); 1763 returnstat = process_tag(context, TAG_NODEID64, returnstat, 0); 1764 returnstat = process_tag(context, TAG_DEVICE32, returnstat, 1); 1765 1766 return (returnstat); 1767 } 1768 1769 int 1770 attribute64_token(pr_context_t *context) 1771 { 1772 int returnstat; 1773 1774 returnstat = process_tag(context, TAG_MODE, 0, 0); 1775 returnstat = process_tag(context, TAG_UID, returnstat, 0); 1776 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1777 returnstat = process_tag(context, TAG_FSID, returnstat, 0); 1778 returnstat = process_tag(context, TAG_NODEID64, returnstat, 0); 1779 returnstat = process_tag(context, TAG_DEVICE64, returnstat, 1); 1780 1781 return (returnstat); 1782 } 1783 1784 /* 1785 * ----------------------------------------------------------------------- 1786 * group_token() : Process group token and display contents 1787 * return codes : -1 - error 1788 * : 0 - successful 1789 * NOTE: At the time of call, the group token id has been retrieved 1790 * 1791 * Format of group token: 1792 * group token id adr_char 1793 * group list adr_long, 16 times 1794 * ----------------------------------------------------------------------- 1795 */ 1796 int 1797 group_token(pr_context_t *context) 1798 { 1799 int returnstat = 0; 1800 int i; 1801 1802 for (i = 0; i < NGROUPS_MAX - 1; i++) { 1803 if ((returnstat = process_tag(context, TAG_GROUPID, 1804 returnstat, 0)) < 0) 1805 return (returnstat); 1806 } 1807 1808 return (process_tag(context, TAG_GROUPID, returnstat, 1)); 1809 } 1810 1811 /* 1812 * ----------------------------------------------------------------------- 1813 * newgroup_token() : Process group token and display contents 1814 * return codes : -1 - error 1815 * : 0 - successful 1816 * NOTE: At the time of call, the group token id has been retrieved 1817 * 1818 * Format of new group token: 1819 * group token id adr_char 1820 * group number adr_short 1821 * group list adr_int32, group number times 1822 * ----------------------------------------------------------------------- 1823 */ 1824 int 1825 newgroup_token(pr_context_t *context) 1826 { 1827 int returnstat; 1828 int i, num; 1829 short n_groups; 1830 1831 returnstat = pr_adr_short(context, &n_groups, 1); 1832 if (returnstat != 0) 1833 return (returnstat); 1834 1835 num = (int)n_groups; 1836 if (num == 0) { 1837 if (!(context->format & PRF_XMLM)) { 1838 /* sigh, have to put out a '\n' */ 1839 returnstat = pr_putchar(context, '\n'); 1840 } 1841 return (returnstat); 1842 } 1843 for (i = 0; i < num - 1; i++) { 1844 if ((returnstat = process_tag(context, TAG_GROUPID, 1845 returnstat, 0)) < 0) 1846 return (returnstat); 1847 } 1848 1849 return (process_tag(context, TAG_GROUPID, returnstat, 1)); 1850 } 1851 1852 static int 1853 string_token_common(pr_context_t *context, int tag) 1854 { 1855 int returnstat; 1856 int num; 1857 1858 returnstat = pr_adr_int32(context, (int32_t *)&num, 1); 1859 if (returnstat != 0) 1860 return (returnstat); 1861 1862 if (!(context->format & PRF_XMLM)) { 1863 returnstat = pr_printf(context, "%d%s", num, 1864 context->SEPARATOR); 1865 if (returnstat != 0) 1866 return (returnstat); 1867 } 1868 1869 if (num == 0) 1870 return (0); 1871 1872 for (; num > 1; num--) { 1873 if ((returnstat = (process_tag(context, tag, 1874 returnstat, 0))) < 0) 1875 return (returnstat); 1876 } 1877 1878 return (process_tag(context, tag, returnstat, 1)); 1879 } 1880 1881 int 1882 path_attr_token(pr_context_t *context) 1883 { 1884 return (string_token_common(context, TAG_XAT)); 1885 } 1886 1887 int 1888 exec_args_token(pr_context_t *context) 1889 { 1890 return (string_token_common(context, TAG_ARG)); 1891 } 1892 1893 int 1894 exec_env_token(pr_context_t *context) 1895 { 1896 return (string_token_common(context, TAG_ENV)); 1897 } 1898 1899 /* 1900 * ----------------------------------------------------------------------- 1901 * s5_IPC_perm_token() : Process System V IPC permission token and display 1902 * contents 1903 * return codes : -1 - error 1904 * : 0 - successful 1905 * NOTE: At the time of call, the System V IPC permission token id 1906 * has been retrieved 1907 * 1908 * Format of System V IPC permission token: 1909 * System V IPC permission token id adr_char 1910 * uid adr_u_int32 1911 * gid adr_u_int32 1912 * cuid adr_u_int32 1913 * cgid adr_u_int32 1914 * mode adr_u_int32 1915 * seq adr_u_int32 1916 * key adr_int32 1917 * ----------------------------------------------------------------------- 1918 */ 1919 int 1920 s5_IPC_perm_token(pr_context_t *context) 1921 { 1922 int returnstat; 1923 1924 returnstat = process_tag(context, TAG_UID, 0, 0); 1925 returnstat = process_tag(context, TAG_GID, returnstat, 0); 1926 returnstat = process_tag(context, TAG_CUID, returnstat, 0); 1927 returnstat = process_tag(context, TAG_CGID, returnstat, 0); 1928 returnstat = process_tag(context, TAG_MODE, returnstat, 0); 1929 returnstat = process_tag(context, TAG_SEQ, returnstat, 0); 1930 returnstat = process_tag(context, TAG_KEY, returnstat, 1); 1931 1932 return (returnstat); 1933 } 1934 1935 /* 1936 * ----------------------------------------------------------------------- 1937 * host_token() : Process host token and display contents 1938 * return codes : -1 - error 1939 * : 0 - successful 1940 * NOTE: At the time of call, the host token id has been retrieved 1941 * 1942 * Format of host token: 1943 * host token id adr_char 1944 * hostid adr_u_int32 1945 * ----------------------------------------------------------------------- 1946 */ 1947 int 1948 host_token(pr_context_t *context) 1949 { 1950 return (pa_hostname(context, 0, 1)); 1951 } 1952 1953 /* 1954 * ----------------------------------------------------------------------- 1955 * liaison_token() : Process liaison token and display contents 1956 * return codes : -1 - error 1957 * : 0 - successful 1958 * NOTE: At the time of call, the liaison token id has been retrieved 1959 * 1960 * Format of liaison token: 1961 * liaison token id adr_char 1962 * liaison adr_u_int32 1963 * ----------------------------------------------------------------------- 1964 */ 1965 int 1966 liaison_token(pr_context_t *context) 1967 { 1968 return (pa_liaison(context, 0, 1)); 1969 } 1970 1971 /* 1972 * ----------------------------------------------------------------------- 1973 * useofauth_token(): Process useofauth token and display contents 1974 * return codes : -1 - error 1975 * : 0 - successful 1976 * NOTE: At the time of call, the uauth token id has been retrieved 1977 * 1978 * Format of useofauth token: 1979 * uauth token id adr_char 1980 * uauth adr_string 1981 * ----------------------------------------------------------------------- 1982 */ 1983 int 1984 useofauth_token(pr_context_t *context) 1985 { 1986 return (pa_adr_string(context, 0, 1)); 1987 } 1988 1989 /* 1990 * ----------------------------------------------------------------------- 1991 * zonename_token(): Process zonename token and display contents 1992 * return codes : -1 - error 1993 * : 0 - successful 1994 * NOTE: At the time of call, the zonename token id has been retrieved 1995 * 1996 * Format of zonename token: 1997 * zonename token id adr_char 1998 * zone name adr_string 1999 * ----------------------------------------------------------------------- 2000 */ 2001 int 2002 zonename_token(pr_context_t *context) 2003 { 2004 return (process_tag(context, TAG_ZONENAME, 0, 1)); 2005 } 2006 2007 /* 2008 * ----------------------------------------------------------------------- 2009 * fmri_token(): Process fmri token and display contents 2010 * return codes : -1 - error 2011 * : 0 - successful 2012 * NOTE: At the time of call, the fmri token id has been retrieved 2013 * 2014 * Format of fmri token: 2015 * fmri token id adr_char 2016 * service instance name adr_string 2017 * ----------------------------------------------------------------------- 2018 */ 2019 int 2020 fmri_token(pr_context_t *context) 2021 { 2022 return (pa_adr_string(context, 0, 1)); 2023 } 2024 2025 /* 2026 * ----------------------------------------------------------------------- 2027 * xatom_token() : Process Xatom token and display contents in hex. 2028 * return codes : -1 - error 2029 * : 0 - successful 2030 * NOTE: At the time of call, the xatom token id has been retrieved 2031 * 2032 * Format of xatom token: 2033 * token id adr_char 2034 * length adr_short 2035 * atom adr_char length times 2036 * ----------------------------------------------------------------------- 2037 */ 2038 int 2039 xatom_token(pr_context_t *context) 2040 { 2041 return (pa_adr_string(context, 0, 1)); 2042 } 2043 2044 int 2045 xcolormap_token(pr_context_t *context) 2046 { 2047 return (pa_xgeneric(context)); 2048 } 2049 2050 int 2051 xcursor_token(pr_context_t *context) 2052 { 2053 return (pa_xgeneric(context)); 2054 } 2055 2056 int 2057 xfont_token(pr_context_t *context) 2058 { 2059 return (pa_xgeneric(context)); 2060 } 2061 2062 int 2063 xgc_token(pr_context_t *context) 2064 { 2065 return (pa_xgeneric(context)); 2066 } 2067 2068 int 2069 xpixmap_token(pr_context_t *context) 2070 { 2071 return (pa_xgeneric(context)); 2072 } 2073 2074 int 2075 xwindow_token(pr_context_t *context) 2076 { 2077 return (pa_xgeneric(context)); 2078 } 2079 2080 /* 2081 * ----------------------------------------------------------------------- 2082 * xproperty_token(): Process Xproperty token and display contents 2083 * 2084 * return codes : -1 - error 2085 * : 0 - successful 2086 * NOTE: At the time of call, the xproperty token id has been retrieved 2087 * 2088 * Format of xproperty token: 2089 * token id adr_char 2090 * XID adr_u_int32 2091 * creator UID adr_u_int32 2092 * text adr_text 2093 * ----------------------------------------------------------------------- 2094 */ 2095 int 2096 xproperty_token(pr_context_t *context) 2097 { 2098 int returnstat; 2099 2100 returnstat = process_tag(context, TAG_XID, 0, 0); 2101 returnstat = process_tag(context, TAG_XCUID, returnstat, 0); 2102 2103 /* Done with attributes; force end of token open */ 2104 if (returnstat == 0) 2105 returnstat = finish_open_tag(context); 2106 2107 returnstat = pa_adr_string(context, returnstat, 1); 2108 2109 return (returnstat); 2110 } 2111 2112 /* 2113 * ----------------------------------------------------------------------- 2114 * xselect_token(): Process Xselect token and display contents in hex 2115 * 2116 * return codes : -1 - error 2117 * : 0 - successful 2118 * NOTE: At the time of call, the xselect token id has been retrieved 2119 * 2120 * Format of xselect token 2121 * text token id adr_char 2122 * property text adr_string 2123 * property type adr_string 2124 * property data adr_string 2125 * ----------------------------------------------------------------------- 2126 */ 2127 int 2128 xselect_token(pr_context_t *context) 2129 { 2130 int returnstat; 2131 2132 returnstat = process_tag(context, TAG_XSELTEXT, 0, 0); 2133 returnstat = process_tag(context, TAG_XSELTYPE, returnstat, 0); 2134 returnstat = process_tag(context, TAG_XSELDATA, returnstat, 1); 2135 2136 return (returnstat); 2137 } 2138 2139 /* 2140 * ----------------------------------------------------------------------- 2141 * xclient_token(): Process Xclient token and display contents in hex. 2142 * 2143 * return codes : -1 - error 2144 * : 0 - successful 2145 * 2146 * Format of xclient token: 2147 * token id adr_char 2148 * client adr_int32 2149 * ----------------------------------------------------------------------- 2150 */ 2151 int 2152 xclient_token(pr_context_t *context) 2153 { 2154 return (pa_adr_int32(context, 0, 1)); 2155 } 2156 2157 /* 2158 * ----------------------------------------------------------------------- 2159 * slabel_token() : Process sensitivity label token and display contents 2160 * return codes : -1 - error 2161 * : 0 - successful 2162 * NOTE: At the time of call, the slabel token id has been retrieved 2163 * 2164 * Format of sensitivity label token: 2165 * slabel token id adr_char 2166 * label adr_char, sizeof (bslabel_t) bytes 2167 * ----------------------------------------------------------------------- 2168 */ 2169 /*ARGSUSED*/ 2170 int 2171 slabel_token(pr_context_t *context) 2172 { 2173 bslabel_t label; 2174 int returnstat; 2175 char strbuf[2048]; 2176 char *sp = strbuf; 2177 uval_t uval; 2178 2179 if ((returnstat = pr_adr_char(context, (char *)&label, 2180 sizeof (label))) == 0) { 2181 uval.uvaltype = PRA_STRING; 2182 if (!(context->format & PRF_RAWM)) { 2183 /* print in ASCII form */ 2184 if (label_to_str(&label, &sp, M_LABEL, 2185 DEF_NAMES) == 0) { 2186 uval.string_val = sp; 2187 returnstat = pa_print(context, &uval, 1); 2188 } else /* cannot convert to string */ 2189 returnstat = 1; 2190 } 2191 /* print in hexadecimal form */ 2192 if ((context->format & PRF_RAWM) || (returnstat == 1)) { 2193 uval.string_val = hexconvert((char *)&label, 2194 sizeof (bslabel_t), sizeof (bslabel_t)); 2195 if (uval.string_val) { 2196 returnstat = pa_print(context, &uval, 1); 2197 free(uval.string_val); 2198 } 2199 } 2200 } 2201 return (returnstat); 2202 } 2203 2204 /* 2205 * ----------------------------------------------------------------------- 2206 * useofpriv_token() : Process priv token and display contents 2207 * return codes : -1 - error 2208 * : 0 - successful 2209 * NOTE: At the time of call, the useofpriv token id has been retrieved 2210 * 2211 * Format of useofpriv token: 2212 * useofpriv token id adr_char 2213 * success/failure flag adr_char 2214 * priv adr_int32 (Trusted Solaris) 2215 * priv_set '\0' separated privileges. 2216 * ----------------------------------------------------------------------- 2217 */ 2218 /*ARGSUSED*/ 2219 int 2220 useofpriv_token(pr_context_t *context) 2221 { 2222 int returnstat; 2223 char sf; 2224 uval_t uval; 2225 2226 if ((returnstat = pr_adr_char(context, &sf, 1)) != 0) { 2227 return (returnstat); 2228 } 2229 if (!(context->format & PRF_RAWM)) { 2230 /* print in ASCII form */ 2231 2232 if ((returnstat = open_tag(context, TAG_RESULT)) != 0) 2233 return (returnstat); 2234 2235 uval.uvaltype = PRA_STRING; 2236 if (sf) { 2237 uval.string_val = gettext("successful use of priv"); 2238 returnstat = pa_print(context, &uval, 0); 2239 } else { 2240 uval.string_val = gettext("failed use of priv"); 2241 returnstat = pa_print(context, &uval, 0); 2242 } 2243 if (returnstat == 0) 2244 returnstat = close_tag(context, TAG_RESULT); 2245 2246 /* Done with attributes; force end of token open */ 2247 if (returnstat == 0) 2248 returnstat = finish_open_tag(context); 2249 } else { 2250 /* print in hexadecimal form */ 2251 if ((returnstat = open_tag(context, TAG_RESULT)) != 0) 2252 return (returnstat); 2253 uval.uvaltype = PRA_SHORT; 2254 uval.short_val = sf; 2255 returnstat = pa_print(context, &uval, 0); 2256 if (returnstat == 0) 2257 returnstat = close_tag(context, TAG_RESULT); 2258 2259 /* Done with attributes; force end of token open */ 2260 if (returnstat == 0) 2261 returnstat = finish_open_tag(context); 2262 } 2263 return (pa_adr_string(context, 0, 1)); 2264 } 2265 2266 /* 2267 * ----------------------------------------------------------------------- 2268 * privilege_token() : Process privilege token and display contents 2269 * return codes : -1 - error 2270 * : 0 - successful 2271 * NOTE: At the time of call, the privilege token id has been retrieved 2272 * 2273 * Format of privilege token: 2274 * privilege token id adr_char 2275 * privilege type adr_string 2276 * privilege adr_string 2277 * ----------------------------------------------------------------------- 2278 */ 2279 int 2280 privilege_token(pr_context_t *context) 2281 { 2282 int returnstat; 2283 2284 /* privilege type: */ 2285 returnstat = process_tag(context, TAG_SETTYPE, 0, 0); 2286 2287 /* Done with attributes; force end of token open */ 2288 if (returnstat == 0) 2289 returnstat = finish_open_tag(context); 2290 2291 /* privilege: */ 2292 return (pa_adr_string(context, returnstat, 1)); 2293 } 2294