xref: /titanic_52/usr/src/lib/libbsm/common/adt_token.c (revision f6e214c7418f43af38bd8c3a557e3d0a1d311cfa)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * adt_token.c
23  *
24  * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
25  * Use is subject to license terms.
26  *
27  * This file does not provide any user callable functions.  See adt.c
28  */
29 
30 #include <bsm/adt.h>
31 #include <bsm/adt_event.h>
32 #include <bsm/audit.h>
33 
34 #include <adt_xlate.h>
35 #include <alloca.h>
36 #include <assert.h>
37 #include <netdb.h>
38 #include <priv.h>
39 #include <string.h>
40 #include <strings.h>
41 #include <stdlib.h>
42 #include <time.h>
43 #include <unistd.h>
44 
45 #include <sys/priv_names.h>
46 #include <sys/socket.h>
47 #include <sys/types.h>
48 #include <sys/vnode.h>
49 
50 #include <tsol/label.h>
51 
52 #ifdef	C2_DEBUG
53 #define	DPRINTF(x) { (void) printf x; }
54 #define	DFLUSH (void) fflush(stdout);
55 
56 /* 0x + Classification + Compartments + end of string */
57 #define	HEX_SIZE 2 + 2*2 + 2*32 + 1
58 
59 static char *
60 dprt_label(m_label_t *label)
61 {
62 	static char	hex[HEX_SIZE];
63 	char		*direct = NULL;
64 
65 	if (label_to_str(label, &direct, M_INTERNAL, DEF_NAMES) != 0) {
66 		adt_write_syslog("label_to_str(M_INTERNAL)", errno);
67 		return ("hex label failed");
68 	}
69 	(void) strlcpy(hex, direct, sizeof (hex));
70 	free(direct);
71 	return (hex);
72 }
73 #else	/* !C2_DEBUG */
74 #define	DPRINTF(x)
75 #define	DFLUSH
76 #endif	/* C2_DEBUG */
77 
78 static adt_token_func_t adt_getTokenFunction(char);
79 
80 static char	*empty = "";
81 
82 /*
83  * call adt_token_open() first and adt_token_close() last.
84  *
85  * au_open is sort of broken; it returns a -1 when out of memory that
86  * you're supposed to ignore; au_write and au_close return without
87  * doing anything when a -1 is passed.  This code sort of follows the
88  * au_open model except that it calls syslog to indicate underlying
89  * brokenness.  Other than that, -1 is ignored.
90  */
91 
92 void
93 adt_token_open(struct adt_event_state *event)
94 {
95 	static int	have_syslogged = 0;
96 
97 	event->ae_event_handle = au_open();
98 	if (event->ae_event_handle < 0) {
99 		if (!have_syslogged) {
100 			adt_write_syslog("au_open failed", ENOMEM);
101 			have_syslogged = 1;
102 		}
103 	} else {
104 		have_syslogged = 0;
105 	}
106 }
107 
108 /*
109  * call generate_token for each token in the order you want the tokens
110  * generated.
111  */
112 
113 void
114 adt_generate_token(struct entry *p_entry, void *p_data,
115     struct adt_event_state *event)
116 {
117 	adt_token_func_t	p_func;
118 
119 	assert((p_entry != NULL) && (p_data != NULL) && (event != NULL));
120 
121 	p_func = adt_getTokenFunction(p_entry->en_token_id);
122 	assert(p_func != NULL);
123 
124 	DPRINTF(("p_entry=%p, p_data=%p, offset=%llu, msgFmt=%s\n",
125 	    (void *)p_entry, p_data, (long long)p_entry->en_offset,
126 	    p_entry->en_msg_format));
127 	DFLUSH
128 
129 	(*p_func)(p_entry->en_type_def,
130 	    (char *)p_data + p_entry->en_offset, p_entry->en_required, event,
131 	    p_entry->en_msg_format);
132 }
133 
134 /* call this last */
135 
136 int
137 adt_token_close(struct adt_event_state *event)
138 {
139 	int	rc;
140 
141 	rc = au_close(event->ae_event_handle, AU_TO_WRITE,
142 	    event->ae_internal_id);
143 	if (rc < 0)
144 		adt_write_syslog("au_close failed", errno);
145 	return (rc);
146 }
147 
148 /*
149  * one function per token -- see the jump table at the end of file
150  */
151 
152 /* ARGSUSED */
153 static void
154 adt_to_return(datadef *def, void *p_data, int required,
155     struct adt_event_state *event, char *notUsed)
156 {
157 
158 #ifdef _LP64
159 	(void) au_write(event->ae_event_handle,
160 	    au_to_return64((int64_t)event->ae_rc, event->ae_type));
161 #else
162 	(void) au_write(event->ae_event_handle,
163 	    au_to_return32((int32_t)event->ae_rc, event->ae_type));
164 #endif
165 }
166 
167 /*
168  * AUT_CMD
169  *
170  * the command line is described with argc and argv and the environment
171  * with envp.  The envp list is NULL terminated and has no separate
172  * counter; envp will be a NULL list unless the AUDIT_ARGE policy is
173  * set.
174  */
175 
176 /* ARGSUSED */
177 static void
178 adt_to_cmd(datadef *def, void *p_data, int required,
179     struct adt_event_state *event, char *notUsed)
180 {
181 	struct adt_internal_state	*sp = event->ae_session;
182 	int				argc;
183 	char				**argv;
184 	char				**envp = NULL;
185 
186 	argc = ((union convert *)p_data)->tint;
187 	p_data = adt_adjust_address(p_data, sizeof (int), sizeof (char **));
188 	argv = ((union convert *)p_data)->tchar2star;
189 	p_data = adt_adjust_address(p_data, sizeof (char **), sizeof (char **));
190 
191 	if (sp->as_kernel_audit_policy & AUDIT_ARGE)
192 		envp = ((union convert *)p_data)->tchar2star;
193 
194 	(void) au_write(event->ae_event_handle,
195 	    au_to_cmd(argc, argv, envp));
196 }
197 
198 /*
199  * special case of AUT_CMD with 1 argument that is
200  * a string showing the whole command and no envp
201  */
202 /* ARGSUSED */
203 static void
204 adt_to_cmd1(datadef *def, void *p_data, int required,
205     struct adt_event_state *event, char *notUsed)
206 {
207 	char	*string;
208 
209 	string = ((union convert *)p_data)->tcharstar;
210 
211 	if (string == NULL) {
212 		if (required) {
213 			string = empty;
214 		} else {
215 			return;
216 		}
217 	}
218 	/* argc is hardcoded as 1 */
219 	(void) au_write(event->ae_event_handle, au_to_cmd(1, &string,
220 	    NULL));
221 }
222 
223 /*
224  * adt_to_tid	-- generic address (ip is only one defined at present)
225  *	input:
226  *		terminal type:  ADT_IPv4, ADT_IPv6...
227  *		case: ADT_IPv4 or ADT_IPv6...
228  *			ip type
229  *			remote port
230  *			local port
231  *			address
232  *		case: not defined...
233  */
234 /* ARGSUSED */
235 static void
236 adt_to_tid(datadef *def, void *p_data, int required,
237     struct adt_event_state *event, char *notUsed)
238 {
239 	au_generic_tid_t	tid;
240 	uint32_t		type;
241 	au_ip_t			*ip;
242 
243 	type = ((union convert *)p_data)->tuint32;
244 
245 	switch (type) {
246 	case ADT_IPv4:
247 	case ADT_IPv6:
248 		p_data = adt_adjust_address(p_data, sizeof (uint32_t),
249 		    sizeof (uint32_t));
250 
251 		tid.gt_type = AU_IPADR;
252 		ip = &(tid.gt_adr.at_ip);
253 
254 		ip->at_type = (type == ADT_IPv4) ?
255 		    AU_IPv4 : AU_IPv6;
256 
257 		ip->at_r_port = ((union convert *)p_data)->tuint16;
258 		p_data = adt_adjust_address(p_data, sizeof (uint16_t),
259 		    sizeof (uint16_t));
260 
261 		ip->at_l_port = ((union convert *)p_data)->tuint16;
262 
263 		/* arg3 is for the array element, not the array size */
264 		p_data = adt_adjust_address(p_data, sizeof (uint16_t),
265 		    sizeof (uint32_t));
266 
267 		(void) memcpy(ip->at_addr, p_data, ip->at_type);
268 		break;
269 	default:
270 		adt_write_syslog("Invalid terminal id type", EINVAL);
271 		return;
272 	}
273 	(void) au_write(event->ae_event_handle, au_to_tid(&tid));
274 }
275 
276 /*
277  * au_to_frmi takes a char * that is the fmri.
278  */
279 /* ARGSUSED */
280 static void
281 adt_to_frmi(datadef *def, void *p_data, int required,
282     struct adt_event_state *event, char *notUsed)
283 {
284 	char		*fmri;
285 
286 	DPRINTF(("  adt_to_fmri dd_datatype=%d\n", def->dd_datatype));
287 
288 	fmri = ((union convert *)p_data)->tcharstar;
289 
290 	if (fmri == NULL) {
291 		if (required) {
292 			fmri = empty;
293 		} else {
294 			return;
295 		}
296 	}
297 	DPRINTF(("  fmri=%s\n", fmri));
298 	(void) au_write(event->ae_event_handle, au_to_fmri(fmri));
299 }
300 
301 /*
302  * au_to_label takes an m_label_t * that is the label.
303  */
304 /* ARGSUSED */
305 static void
306 adt_to_label(datadef *def, void *p_data, int required,
307     struct adt_event_state *event, char *notUsed)
308 {
309 	m_label_t	*label;
310 
311 	DPRINTF(("  adt_to_label dd_datatype=%d\n", def->dd_datatype));
312 
313 	label = ((union convert *)p_data)->tm_label;
314 
315 	if (label != NULL) {
316 		DPRINTF(("  label=%s\n", dprt_label(label)));
317 		DFLUSH
318 		(void) au_write(event->ae_event_handle, au_to_label(label));
319 	} else {
320 		DPRINTF(("  Null label\n"));
321 		if (required)
322 			adt_write_syslog("adt_to_label no required label", 0);
323 	}
324 }
325 
326 /*
327  * au_to_newgroups takes a length and an array of gids
328  * as input.  The input to adt_to_newgroups is a length
329  * and a pointer to an array of gids.
330  */
331 
332 /* ARGSUSED */
333 static void
334 adt_to_newgroups(datadef *def, void *p_data, int required,
335     struct adt_event_state *event, char *notUsed)
336 {
337 	int	n;
338 	gid_t	*groups;
339 
340 	n = ((union convert *)p_data)->tint;
341 	if (n < 1) {
342 		if (required) {
343 			n = 0;  /* in case negative n was passed */
344 		} else {
345 			return;
346 		}
347 	}
348 	p_data = adt_adjust_address(p_data, sizeof (int), sizeof (int32_t *));
349 
350 	groups = ((union convert *)p_data)->tgidstar;
351 
352 	(void) au_write(event->ae_event_handle, au_to_newgroups(n, groups));
353 }
354 
355 /* ARGSUSED */
356 static void
357 adt_to_path(datadef *def, void *p_data, int required,
358     struct adt_event_state *event, char *notUsed)
359 {
360 	char	*path;
361 
362 	path = ((union convert *)p_data)->tcharstar;
363 
364 	if (path != NULL) {
365 		DPRINTF(("  path=%s\n", path));
366 		(void) au_write(event->ae_event_handle, au_to_path(path));
367 	} else {
368 		DPRINTF(("  Null path\n"));
369 		if (required) {
370 			(void) au_write(event->ae_event_handle,
371 			    au_to_path(empty));
372 		}
373 	}
374 }
375 
376 /*
377  * dummy token id:  AUT_PATHLIST
378  */
379 
380 /* ARGSUSED */
381 static void
382 adt_to_pathlist(datadef *def, void *p_data, int required,
383     struct adt_event_state *event, char *notUsed)
384 {
385 	char	*path;
386 	char	*working_buf;
387 	char	*pathlist;
388 	char	*last_str;
389 
390 	pathlist = ((union convert *)p_data)->tcharstar;
391 
392 	if (pathlist != NULL) {
393 		working_buf = strdup(pathlist);
394 		if (working_buf == NULL) {
395 			adt_write_syslog("audit failure", errno);
396 			if (required) {
397 				(void) au_write(event->ae_event_handle,
398 				    au_to_path(empty));
399 			}
400 			return;
401 		}
402 		for (path = strtok_r(working_buf, " ", &last_str);
403 		    path; path = strtok_r(NULL, " ", &last_str)) {
404 			DPRINTF(("  path=%s\n", path));
405 			(void) au_write(event->ae_event_handle,
406 			    au_to_path(path));
407 		}
408 	} else {
409 		DPRINTF(("  Null path list\n"));
410 		if (required)
411 			(void) au_write(event->ae_event_handle,
412 			    au_to_path(empty));
413 	}
414 }
415 
416 /*
417  * AUT_PRIV
418  */
419 
420 /* ARGSUSED */
421 static void
422 adt_to_priv(datadef *def, void *p_data, int required,
423     struct adt_event_state *event, const char *priv_type)
424 {
425 	priv_set_t	*privilege;
426 
427 	privilege = ((union convert *)p_data)->tprivstar;
428 
429 	if (privilege != NULL) {
430 		(void) au_write(event->ae_event_handle,
431 		    au_to_privset(priv_type, privilege));
432 	} else {
433 		if (required) {
434 			DPRINTF(("  Null privilege\n"));
435 			(void) au_write(event->ae_event_handle,
436 			    au_to_privset(empty, NULL));
437 		}
438 	}
439 }
440 
441 /*
442  * -AUT_PRIV_L	AUT_PRIV for a limit set
443  */
444 
445 /* ARGSUSED */
446 static void
447 adt_to_priv_limit(datadef *def, void *p_data, int required,
448     struct adt_event_state *event, char *notUsed)
449 {
450 	adt_to_priv(def, p_data, required, event, PRIV_LIMIT);
451 }
452 
453 /*
454  * -AUT_PRIV_I	AUT_PRIV for an inherit set
455  */
456 
457 /* ARGSUSED */
458 static void
459 adt_to_priv_inherit(datadef *def, void *p_data, int required,
460     struct adt_event_state *event, char *notUsed)
461 {
462 	adt_to_priv(def, p_data, required, event, PRIV_INHERITABLE);
463 }
464 
465 /* ARGSUSED */
466 static void
467 adt_to_priv_effective(datadef *def, void *p_data, int required,
468     struct adt_event_state *event, char *notUsed)
469 {
470 	adt_to_priv(def, p_data, required, event, PRIV_EFFECTIVE);
471 }
472 
473 static void
474 getCharacteristics(struct auditpinfo_addr *info, pid_t *pid)
475 {
476 	int	rc;
477 
478 	if (*pid == 0) {		/* getpinfo for this pid */
479 		info->ap_pid = getpid();
480 	} else {
481 		info->ap_pid = *pid;
482 	}
483 
484 	rc = auditon(A_GETPINFO_ADDR, (caddr_t)info,
485 	    sizeof (struct auditpinfo_addr));
486 	if (rc == -1) {
487 		info->ap_auid = AU_NOAUDITID;
488 		info->ap_asid = 0;
489 		(void) memset((void *)&(info->ap_termid), 0,
490 		    sizeof (au_tid_addr_t));
491 		info->ap_termid.at_type = AU_IPv4;
492 	}
493 }
494 
495 /*
496  * AUT_PROCESS
497  *
498  */
499 
500 /* ARGSUSED */
501 static void
502 adt_to_process(datadef *def, void *p_data, int required,
503     struct adt_event_state *event, char *notUsed)
504 {
505 	au_id_t			auid;
506 	uid_t			euid;
507 	gid_t			egid;
508 	uid_t			ruid;
509 	gid_t			rgid;
510 	pid_t			pid;
511 	au_asid_t		sid;
512 	au_tid_addr_t		*tid;
513 	struct auditpinfo_addr	info;
514 
515 	auid = ((union convert *)p_data)->tuid;
516 	p_data = adt_adjust_address(p_data, sizeof (uid_t), sizeof (uid_t));
517 	euid = ((union convert *)p_data)->tuid;
518 	p_data = adt_adjust_address(p_data, sizeof (uid_t), sizeof (gid_t));
519 	egid = ((union convert *)p_data)->tgid;
520 	p_data = adt_adjust_address(p_data, sizeof (gid_t), sizeof (uid_t));
521 	ruid = ((union convert *)p_data)->tuid;
522 	p_data = adt_adjust_address(p_data, sizeof (uid_t), sizeof (gid_t));
523 	rgid = ((union convert *)p_data)->tgid;
524 	p_data = adt_adjust_address(p_data, sizeof (gid_t), sizeof (pid_t));
525 	pid  = ((union convert *)p_data)->tpid;
526 	p_data = adt_adjust_address(p_data, sizeof (pid_t), sizeof (uint32_t));
527 	sid  = ((union convert *)p_data)->tuint32;
528 	p_data = adt_adjust_address(p_data, sizeof (uint32_t),
529 	    sizeof (au_tid_addr_t *));
530 	tid  = ((union convert *)p_data)->ttermid;
531 
532 	getCharacteristics(&info, &pid);
533 
534 	if (auid == AU_NOAUDITID)
535 		auid = info.ap_auid;
536 
537 	if (euid == AU_NOAUDITID)
538 		euid = geteuid();
539 
540 	if (egid == AU_NOAUDITID)
541 		egid = getegid();
542 
543 	if (ruid == AU_NOAUDITID)
544 		ruid = getuid();
545 
546 	if (rgid == AU_NOAUDITID)
547 		rgid = getgid();
548 
549 	if (tid == NULL)
550 		tid = &(info.ap_termid);
551 
552 	if (sid == 0)
553 		sid = info.ap_asid;
554 
555 	if (pid == 0)
556 		pid = info.ap_pid;
557 
558 	(void) au_write(event->ae_event_handle,
559 	    au_to_process_ex(auid, euid, egid, ruid, rgid, pid, sid, tid));
560 }
561 
562 /*
563  * Generate subject information.
564  * If labels are present, generate the subject label token.
565  * If the group audit policy is set, generate the subject group token.
566  *
567  * The required flag does not apply here.
568  *
569  * Non-attributable records are indicated by an auid of AU_NOAUDITID;
570  * no subject token or group token is generated for a non-attributable
571  * record.
572  */
573 
574 /* ARGSUSED */
575 static void
576 adt_to_subject(datadef *def, void *p_data, int required,
577     struct adt_event_state *event, char *notUsed)
578 {
579 	struct adt_internal_state	*sp = event->ae_session;
580 
581 	if (sp->as_info.ai_auid == AU_NOAUDITID)
582 		return;
583 
584 	assert(sp->as_have_user_data == ADT_HAVE_ALL);
585 
586 	(void) au_write(event->ae_event_handle,
587 	    au_to_subject_ex(sp->as_info.ai_auid,
588 	    sp->as_euid, sp->as_egid, sp->as_ruid, sp->as_rgid,
589 	    sp->as_pid, sp->as_info.ai_asid,
590 	    &(sp->as_info.ai_termid)));
591 	if (is_system_labeled()) {
592 		(void) au_write(event->ae_event_handle,
593 		    au_to_label(sp->as_label));
594 	}
595 	/*
596 	 * Add optional tokens if in the process model.
597 	 * In a session model, the groups list is undefined and label
598 	 * is in the state.
599 	 */
600 	if (sp->as_session_model == ADT_PROCESS_MODEL) {
601 		if (sp->as_kernel_audit_policy & AUDIT_GROUP) {
602 			int group_count;
603 			int maxgrp = getgroups(0, NULL);
604 			gid_t *grouplist = alloca(maxgrp * sizeof (gid_t));
605 
606 			if ((group_count = getgroups(maxgrp, grouplist)) > 0) {
607 				(void) au_write(event->ae_event_handle,
608 				    au_to_newgroups(group_count, grouplist));
609 			}
610 		}
611 	}
612 }
613 
614 /*
615  * adt_to_text()
616  *
617  * The format string, normally null, is sort of a wrapper around
618  * the input.  adt_write_text() is a wrapper around au_write that
619  * handles the format string
620  *
621  */
622 #define	TEXT_LENGTH 49
623 
624 static void
625 adt_write_text(int handle, char *main_text, const char *format)
626 {
627 	char	buffer[TEXT_LENGTH * 2 + 1];
628 
629 	if (format == NULL) {
630 		(void) au_write(handle, au_to_text(main_text));
631 	} else {
632 		(void) snprintf(buffer, TEXT_LENGTH * 2, format, main_text);
633 		(void) au_write(handle, au_to_text(buffer));
634 	}
635 }
636 
637 static void
638 adt_to_text(datadef *def, void *p_data, int required,
639     struct adt_event_state *event, char *format)
640 {
641 	static int	have_syslogged = 0;
642 	char		*string;
643 	char		**string_list;
644 	char		buffer[TEXT_LENGTH + 1];
645 	time_t		date;
646 	struct tm	tm;
647 	uint32_t	*int_list;
648 	int		written, available;
649 	int		i, arrayCount;
650 	struct msg_text *list;
651 	int		list_index;
652 
653 	DPRINTF(("  adt_to_text dd_datatype=%d\n", def->dd_datatype));
654 	switch (def->dd_datatype) {
655 	case ADT_DATE:
656 		/*
657 		 * Consider creating a separate token type for dates
658 		 * -- store as longs and format them in praudit.
659 		 * For now, a date is input as a time_t and output as
660 		 * a text token.  If we do this, we need to consider
661 		 * carrying timezone info so that praudit can
662 		 * represent times in an unambiguous manner.
663 		 */
664 		date = ((union convert *)p_data)->tlong;
665 		if (strftime(buffer, sizeof (buffer), "%x",
666 		    localtime_r(&date, &tm)) > TEXT_LENGTH) {
667 			if (required) {
668 				(void) strncpy(buffer, "invalid date",
669 				    TEXT_LENGTH);
670 			} else {
671 				break;
672 			}
673 		}
674 		DPRINTF(("  text=%s\n", buffer));
675 		adt_write_text(event->ae_event_handle, buffer, format);
676 		break;
677 		/*
678 		 * The "input size" is overloaded to mean the list number
679 		 * and the msg_selector indexes the desired string in
680 		 * that list
681 		 */
682 	case ADT_MSG:
683 		list = &adt_msg_text[(enum adt_msg_list)def->dd_input_size];
684 		list_index = ((union convert *)p_data)->msg_selector;
685 
686 		if ((list_index + list->ml_offset < list->ml_min_index) ||
687 		    (list_index + list->ml_offset > list->ml_max_index)) {
688 			string = "Invalid message index";
689 		} else {
690 			string = list->ml_msg_list[list_index +
691 			    list->ml_offset];
692 		}
693 
694 		if (string == NULL) {	/* null is valid; means skip */
695 			if (required) {
696 				string = empty;
697 			} else {
698 				break;
699 			}
700 		}
701 		DPRINTF(("  text=%s\n", string));
702 		adt_write_text(event->ae_event_handle, string, format);
703 		break;
704 	case ADT_UID:
705 	case ADT_GID:
706 	case ADT_UINT:
707 	case ADT_UINT32:
708 		(void) snprintf(buffer, TEXT_LENGTH, "%u",
709 		    ((union convert *)p_data)->tuint);
710 
711 		DPRINTF(("  text=%s\n", buffer));
712 		adt_write_text(event->ae_event_handle, buffer, format);
713 		break;
714 	case ADT_INT:
715 	case ADT_INT32:
716 		(void) snprintf(buffer, TEXT_LENGTH, "%d",
717 		    ((union convert *)p_data)->tint);
718 
719 		DPRINTF(("  text=%s\n", buffer));
720 		adt_write_text(event->ae_event_handle, buffer, format);
721 		break;
722 	case ADT_LONG:
723 		(void) snprintf(buffer, TEXT_LENGTH, "%ld",
724 		    ((union convert *)p_data)->tlong);
725 
726 		DPRINTF(("  text=%s\n", buffer));
727 		adt_write_text(event->ae_event_handle, buffer, format);
728 		break;
729 	case ADT_UIDSTAR:
730 	case ADT_GIDSTAR:
731 	case ADT_UINT32STAR:
732 		int_list = ((union convert *)p_data)->tuint32star;
733 		p_data = adt_adjust_address(p_data, sizeof (int *),
734 		    sizeof (int));
735 		arrayCount = ((union convert *)p_data)->tint;
736 
737 		string = buffer;
738 		available = TEXT_LENGTH;	/* space available in buffer */
739 
740 		if (arrayCount < 0)
741 			arrayCount = 0;
742 
743 		if ((arrayCount > 0) && (int_list != NULL)) {
744 			for (; arrayCount > 0; arrayCount--) {
745 				written = snprintf(string, available,
746 				    "%d ", *int_list++);
747 				if (written < 1)
748 					break;
749 				string += written;
750 				available -= written;
751 			}
752 		} else if (required) {
753 			string = empty;
754 		} else {
755 			break;
756 		}
757 
758 		adt_write_text(event->ae_event_handle, buffer, format);
759 		break;
760 	case ADT_ULONG:
761 		(void) snprintf(buffer, TEXT_LENGTH, "%lu",
762 		    ((union convert *)p_data)->tulong);
763 
764 		DPRINTF(("  text=%s\n", buffer));
765 		adt_write_text(event->ae_event_handle, buffer, format);
766 		break;
767 	case ADT_UINT64:
768 		(void) snprintf(buffer, TEXT_LENGTH, "%llu",
769 		    ((union convert *)p_data)->tuint64);
770 
771 		DPRINTF(("  text=%s\n", buffer));
772 		adt_write_text(event->ae_event_handle, buffer, format);
773 		break;
774 	case ADT_CHARSTAR:
775 		string = ((union convert *)p_data)->tcharstar;
776 
777 		if (string == NULL) {
778 			if (required) {
779 				string = empty;
780 			} else {
781 				break;
782 			}
783 		}
784 		DPRINTF(("  text=%s\n", string));
785 		adt_write_text(event->ae_event_handle, string, format);
786 		break;
787 	case ADT_CHAR2STAR:
788 		string_list = ((union convert *)p_data)->tchar2star;
789 		p_data = adt_adjust_address(p_data, sizeof (char **),
790 		    sizeof (int));
791 		arrayCount = ((union convert *)p_data)->tint;
792 
793 		if (arrayCount < 0)
794 			arrayCount = 0;
795 
796 		if ((arrayCount > 0) && (string_list != NULL)) {
797 			for (i = 0; i < arrayCount; i++) {
798 				string = string_list[i];
799 				if (string != NULL)
800 					adt_write_text(event->ae_event_handle,
801 					    string, format);
802 			}
803 		} else if (required) {
804 			adt_write_text(event->ae_event_handle, empty, format);
805 		} else {
806 			break;
807 		}
808 		break;
809 	default:
810 		if (!have_syslogged) { /* don't flood the log */
811 			adt_write_syslog("unsupported data conversion",
812 			    ENOTSUP);
813 			have_syslogged = 1;
814 		}
815 		break;
816 	}
817 	DFLUSH
818 }
819 
820 /*
821  * AUT_UAUTH
822  */
823 
824 /* ARGSUSED */
825 static void
826 adt_to_uauth(datadef *def, void *p_data, int required,
827     struct adt_event_state *event, char *format)
828 {
829 	char		*string;
830 
831 	DPRINTF(("  adt_to_uauth dd_datatype=%d\n", def->dd_datatype));
832 
833 	string = ((union convert *)p_data)->tcharstar;
834 
835 	if (string == NULL) {
836 		if (required) {
837 			string = empty;
838 		} else {
839 			return;
840 		}
841 	}
842 	DPRINTF(("  text=%s\n", string));
843 	(void) au_write(event->ae_event_handle, au_to_uauth(string));
844 }
845 
846 /*
847  * AUT_USER
848  */
849 
850 /* ARGSUSED */
851 static void
852 adt_to_user(datadef *def, void *p_data, int required,
853     struct adt_event_state *event, char *format)
854 {
855 	uid_t	uid;
856 	char	*username;
857 
858 	DPRINTF(("  adt_to_user dd_datatype=%d\n", def->dd_datatype));
859 
860 	uid = ((union convert *)p_data)->tuid;
861 	p_data = adt_adjust_address(p_data, sizeof (uid_t), sizeof (uid_t));
862 
863 	username = ((union convert *)p_data)->tcharstar;
864 
865 	if (username == NULL) {
866 		if (required) {
867 			username = empty;
868 		} else {
869 			return;
870 		}
871 	}
872 	DPRINTF(("  username=%s\n", username));
873 	(void) au_write(event->ae_event_handle, au_to_user(uid, username));
874 }
875 
876 /*
877  * AUT_ZONENAME
878  */
879 
880 /* ARGSUSED */
881 static void
882 adt_to_zonename(datadef *def, void *p_data, int required,
883     struct adt_event_state *event, char *notUsed)
884 {
885 	char	*name;
886 
887 	name = ((union convert *)p_data)->tcharstar;
888 
889 	if (name != NULL) {
890 		DPRINTF(("  name=%s\n", name));
891 		(void) au_write(event->ae_event_handle, au_to_zonename(name));
892 	} else {
893 		DPRINTF(("  Null name\n"));
894 		if (required) {
895 			(void) au_write(event->ae_event_handle,
896 			    au_to_zonename(empty));
897 		}
898 	}
899 }
900 
901 /*
902  * ADT_IN_PEER dummy token
903  */
904 
905 /* ARGSUSED */
906 static void
907 adt_to_in_peer(datadef *def, void *p_data, int required,
908     struct adt_event_state *event, char *notUsed)
909 {
910 	int	sock;
911 	struct sockaddr_in6 peer;
912 	int	peerlen = sizeof (peer);
913 
914 	DPRINTF(("    adt_to_in_peer dd_datatype=%d\n", def->dd_datatype));
915 
916 	sock = ((union convert *)p_data)->tfd;
917 
918 	if (sock < 0) {
919 		DPRINTF(("  Socket fd %d\n", sock));
920 		if (required) {
921 			adt_write_syslog("adt_to_in_peer no required socket",
922 			    0);
923 		}
924 		return;
925 	}
926 	if (getpeername(sock, (struct sockaddr *)&peer, (socklen_t *)&peerlen)
927 	    < 0) {
928 
929 		adt_write_syslog("adt_to_in_addr getpeername", errno);
930 		return;
931 	}
932 	if (peer.sin6_family == AF_INET6) {
933 		(void) au_write(event->ae_event_handle,
934 		    au_to_in_addr_ex(&(peer.sin6_addr)));
935 		(void) au_write(event->ae_event_handle,
936 		    au_to_iport((ushort_t)peer.sin6_port));
937 	} else {
938 		(void) au_write(event->ae_event_handle,
939 		    au_to_in_addr(&(((struct sockaddr_in *)&peer)->sin_addr)));
940 		(void) au_write(event->ae_event_handle,
941 		    au_to_iport(
942 		    (ushort_t)(((struct sockaddr_in *)&peer)->sin_port)));
943 	}
944 }
945 
946 /*
947  * ADT_IN_REMOTE dummy token
948  *
949  * Similar to ADT_IN_PEER except the input is
950  * an IP address type (ADT_IPv4 | ADT_IPv6) and an address V4/V6
951  */
952 
953 /* ARGSUSED */
954 static void
955 adt_to_in_remote(datadef *def, void *p_data, int required,
956     struct adt_event_state *event, char *notUsed)
957 {
958 	int32_t	type;
959 
960 	DPRINTF(("    adt_to_in_remote dd_datatype=%d\n", def->dd_datatype));
961 
962 	type = ((union convert *)p_data)->tuint32;
963 
964 	if (type ==  0) {
965 		if (required == 0) {
966 			return;
967 		}
968 		/* required and not specified */
969 		adt_write_syslog("adt_to_in_remote required address not "
970 		    "specified", 0);
971 		type = ADT_IPv4;
972 	}
973 	p_data = adt_adjust_address(p_data, sizeof (int32_t),
974 	    sizeof (uint32_t));
975 
976 	switch (type) {
977 	case ADT_IPv4:
978 		(void) au_write(event->ae_event_handle, au_to_in_addr(
979 		    (struct in_addr *)&(((union convert *)p_data)->tuint32)));
980 		break;
981 	case ADT_IPv6:
982 		(void) au_write(event->ae_event_handle, au_to_in_addr_ex(
983 		    (struct in6_addr *)&(((union convert *)p_data)->tuint32)));
984 		break;
985 	default:
986 		adt_write_syslog("adt_to_in_remote invalid type", EINVAL);
987 		return;
988 	}
989 }
990 
991 /*
992  * adt_to_iport takes a uint16_t IP port.
993  */
994 
995 /* ARGSUSED */
996 static void
997 adt_to_iport(datadef *def, void *p_data, int required,
998     struct adt_event_state *event, char *notUsed)
999 {
1000 	ushort_t port;
1001 
1002 	DPRINTF(("  adt_to_iport dd_datatype=%d\n", def->dd_datatype));
1003 
1004 	port = ((union convert *)p_data)->tuint16;
1005 
1006 	if (port == 0) {
1007 		if (required == 0) {
1008 			return;
1009 		}
1010 		/* required and not specified */
1011 		adt_write_syslog("adt_to_iport no required port", 0);
1012 	}
1013 	(void) au_write(event->ae_event_handle, au_to_iport(port));
1014 
1015 }
1016 
1017 
1018 /*
1019  *	This is a compact table that defines only the tokens that are
1020  * actually generated in the adt.xml file.  It can't be a  pure
1021  * indexed table because the adt.xml language defines internal extension
1022  * tokens for some processing.  VIZ. ADT_CMD_ALT, ADT_AUT_PRIV_* (see
1023  * adt_xlate.h), and the -AUT_PATH value.
1024  */
1025 
1026 #define	MAX_TOKEN_JMP 21
1027 
1028 static struct token_jmp token_table[MAX_TOKEN_JMP] =
1029 {
1030 	{AUT_CMD, adt_to_cmd},
1031 	{ADT_CMD_ALT, adt_to_cmd1},
1032 	{AUT_FMRI, adt_to_frmi},
1033 	{ADT_IN_PEER, adt_to_in_peer},
1034 	{ADT_IN_REMOTE, adt_to_in_remote},
1035 	{AUT_IPORT, adt_to_iport},
1036 	{AUT_LABEL, adt_to_label},
1037 	{AUT_NEWGROUPS, adt_to_newgroups},
1038 	{AUT_PATH, adt_to_path},
1039 	{-AUT_PATH, adt_to_pathlist},	/* private extension of token values */
1040 	{ADT_AUT_PRIV_L, adt_to_priv_limit},
1041 	{ADT_AUT_PRIV_I, adt_to_priv_inherit},
1042 	{ADT_AUT_PRIV_E, adt_to_priv_effective},
1043 	{AUT_PROCESS, adt_to_process},
1044 	{AUT_RETURN, adt_to_return},
1045 	{AUT_SUBJECT, adt_to_subject},
1046 	{AUT_TEXT, adt_to_text},
1047 	{AUT_TID, adt_to_tid},
1048 	{AUT_UAUTH, adt_to_uauth},
1049 	{AUT_USER, adt_to_user},
1050 	{AUT_ZONENAME, adt_to_zonename}
1051 };
1052 
1053 /*
1054  *	{AUT_ACL, adt_to_acl},			not used
1055  *	{AUT_ARBITRARY, adt_to_arbitrary},	AUT_ARBITRARY is undefined
1056  *	{AUT_ARG, adt_to_arg},			not used
1057  *	{AUT_ATTR, adt_to_attr},		not used in mountd
1058  *	{AUT_XATOM, adt_to_atom},		not used
1059  *	{AUT_EXEC_ARGS, adt_to_exec_args},	not used
1060  *	{AUT_EXEC_ENV, adt_to_exec_env},	not used
1061  *	{AUT_EXIT, adt_to_exit},		obsolete
1062  *	{AUT_FILE, adt_to_file},		AUT_FILE is undefined
1063  *	{AUT_XCOLORMAP, adt_to_colormap},	not used
1064  *	{AUT_XCURSOR, adt_to_cursor},		not used
1065  *	{AUT_XFONT, adt_to_font},		not used
1066  *	{AUT_XGC, adt_to_gc},			not used
1067  *	{AUT_GROUPS, adt_to_groups},		obsolete
1068  *	{AUT_HEADER, adt_to_header},		generated by au_close
1069  *	{AUT_IP, adt_to_ip},			not used
1070  *	{AUT_IPC, adt_to_ipc},			not used
1071  *	{AUT_IPC_PERM, adt_to_ipc_perm},	not used
1072  *	{AUT_OPAQUE, adt_to_opaque},		not used
1073  *	{AUT_XPIXMAP, adt_to_pixmap},		not used
1074  *	{AUT_XPROPERTY, adt_to_property},	not used
1075  *	{AUT_SEQ, adt_to_seq},			not used
1076  *	{AUT_SOCKET, adt_to_socket},		not used
1077  *	{AUT_SOCKET_INET, adt_to_socket_inet},  AUT_SOCKET_INET is undefined
1078  *	{AUT_TRAILER, adt_to_trailer},		generated by au_close
1079  *	{AUT_XCLIENT, adt_to_xclient}		not used
1080  */
1081 
1082 /* find function to generate token */
1083 
1084 static adt_token_func_t
1085 adt_getTokenFunction(char token_id)
1086 {
1087 	int	i;
1088 	struct token_jmp	*p_jmp = token_table;
1089 
1090 	for (i = 0; i < MAX_TOKEN_JMP; i++) {
1091 		if (token_id == p_jmp->jmp_id) {
1092 			return (p_jmp->jmp_to);
1093 		}
1094 		p_jmp++;
1095 	}
1096 	errno = EINVAL;
1097 	return (NULL);
1098 }
1099 
1100 /*
1101  * adjustAddress -- given the address of data, its size, and the type of
1102  * the next data field, calculate the offset to the next piece of data.
1103  * Depending on the caller, "current" and "next" mean the current pointer
1104  * and the next pointer or the last pointer and the current pointer.
1105  */
1106 void *
1107 adt_adjust_address(void *current_address, size_t current_size,
1108     size_t next_size)
1109 {
1110 	ptrdiff_t adjustment;
1111 	ptrdiff_t remainder;
1112 
1113 	adjustment = (size_t)current_address + current_size;
1114 
1115 	if (next_size) {
1116 		remainder = adjustment % next_size;
1117 		if (remainder != 0)
1118 			adjustment += next_size - remainder;
1119 	}
1120 	return ((char *)adjustment);
1121 }
1122