Initial vendor import of the TrustedBSD OpenBSM distribution, version
1.0 alpha 1, an implementation of the documented Sun Basic Security
Module (BSM) Audit API and file format, as well as local extensions to
support the Mac OS X and FreeBSD operating systems. Also included are
command line tools for audit trail reduction and conversion to text,
as well as documentation of the commands, file format, and APIs. This
distribution is the foundation for the TrustedBSD Audit implementation,
and is a pre-release.
This is the first in a series of commits to introduce support for
Common Criteria CAPP security event audit support.
This software has been made possible through the generous
contributions of Apple Computer, Inc., SPARTA, Inc., as well as
members of the TrustedBSD Project, including Wayne Salamon <wsalamon>
and Tom Rhodes <trhodes>. The original OpenBSM implementation was
created by McAfee Research under contract to Apple Computer, Inc., as
part of their CC CAPP security evaluation.
Many thanks to: wsalamon, trhodes
Obtained from: TrustedBSD Project
2006-01-31 19:40:12 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 2002 Thomas Moestl <tmm@FreeBSD.org>
|
|
|
|
* Copyright (c) 2005 Robert N. M. Watson
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* Derived from FreeBSD src/sys/sys/endian.h:1.6.
|
Vendor import of OpenBSM 1.1 alpha4, which incorporates the following
changes since the last imported OpenBSM release:
OpenBSM 1.1 alpha 4
- With the addition of BSM error number mapping, we also need to map the
local error number passed to audit_submit(3) to a BSM error number,
rather than have the caller perform that conversion.
- Reallocate user audit events to avoid collisions with Solaris; adopt a
more formal allocation scheme, and add some events allocated in Solaris
that will be of immediate use on other platforms.
- Add an event for Calife.
- Add au_strerror(3), which allows generating strings for BSM errors
directly, rather than requiring applications to map to the local error
space, which might not be able to entirely represent the BSM error
number space.
- Major auditd rewrite for launchd(8) support. Add libauditd library
that is shared between launchd and auditd.
- Add AUDIT_TRIGGER_INITIALIZE trigger (sent via 'audit -i') for
(re)starting auditing under launchd(8) on Mac OS X.
- Add 'current' symlink to active audit trail.
- Add crash recovery of previous audit trail file when detected on audit
startup that it has not been properly terminated.
- Add the event AUE_audit_recovery to indicated when an audit trail file
has been recovered from not being properly terminated. This event is
stored in the new audit trail file and includes the path of recovered
audit trail file.
- Mac OS X and FreeBSD dependent code in auditd.c is separated into
auditd_darwin.c and auditd_fbsd.c files.
- Add an event for the posix_spawn(2) and fsgetpath(2) Mac OS X system
calls.
- For Mac OS X, we use ASL(3) instead of syslog(3) for logging.
- Add support for NOTICE level logging.
OpenBSM 1.1 alpha 3
- Add two new functions, au_bsm_to_errno() and au_errno_to_bsm(), to map
between BSM error numbers (largely the Solaris definitions) and local
errno(2) values for 32-bit and 64-bit return tokens. This is required
as operating systems don't agree on some of the values of more recent
error numbers.
- Fix a bug how au_to_exec_args(3) and au_to_exec_env(3) calculates the
total size for the token. This bug resulted in "unknown" tokens being
printed after the exec args/env tokens.
- Support for AUT_SOCKET_EX extended socket tokens, which describe a
socket using a pair of IPv4/IPv6 and port tuples.
- OpenBSM BSM file header version bumped for 1.1 release.
- Deprecated Darwin constants, such as TRAILER_PAD_MAGIC, removed.
Obtained from: TrustedBSD Project
Sponsored by: Apple Inc.
2008-12-28 22:40:42 +00:00
|
|
|
* $P4: //depot/projects/trustedbsd/openbsm/compat/endian.h#8 $
|
Initial vendor import of the TrustedBSD OpenBSM distribution, version
1.0 alpha 1, an implementation of the documented Sun Basic Security
Module (BSM) Audit API and file format, as well as local extensions to
support the Mac OS X and FreeBSD operating systems. Also included are
command line tools for audit trail reduction and conversion to text,
as well as documentation of the commands, file format, and APIs. This
distribution is the foundation for the TrustedBSD Audit implementation,
and is a pre-release.
This is the first in a series of commits to introduce support for
Common Criteria CAPP security event audit support.
This software has been made possible through the generous
contributions of Apple Computer, Inc., SPARTA, Inc., as well as
members of the TrustedBSD Project, including Wayne Salamon <wsalamon>
and Tom Rhodes <trhodes>. The original OpenBSM implementation was
created by McAfee Research under contract to Apple Computer, Inc., as
part of their CC CAPP security evaluation.
Many thanks to: wsalamon, trhodes
Obtained from: TrustedBSD Project
2006-01-31 19:40:12 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _COMPAT_ENDIAN_H_
|
|
|
|
#define _COMPAT_ENDIAN_H_
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some systems will have the uint/int types defined here already, others
|
|
|
|
* will need stdint.h.
|
|
|
|
*/
|
Vendor import of OpenBSM 1.1 alpha4, which incorporates the following
changes since the last imported OpenBSM release:
OpenBSM 1.1 alpha 4
- With the addition of BSM error number mapping, we also need to map the
local error number passed to audit_submit(3) to a BSM error number,
rather than have the caller perform that conversion.
- Reallocate user audit events to avoid collisions with Solaris; adopt a
more formal allocation scheme, and add some events allocated in Solaris
that will be of immediate use on other platforms.
- Add an event for Calife.
- Add au_strerror(3), which allows generating strings for BSM errors
directly, rather than requiring applications to map to the local error
space, which might not be able to entirely represent the BSM error
number space.
- Major auditd rewrite for launchd(8) support. Add libauditd library
that is shared between launchd and auditd.
- Add AUDIT_TRIGGER_INITIALIZE trigger (sent via 'audit -i') for
(re)starting auditing under launchd(8) on Mac OS X.
- Add 'current' symlink to active audit trail.
- Add crash recovery of previous audit trail file when detected on audit
startup that it has not been properly terminated.
- Add the event AUE_audit_recovery to indicated when an audit trail file
has been recovered from not being properly terminated. This event is
stored in the new audit trail file and includes the path of recovered
audit trail file.
- Mac OS X and FreeBSD dependent code in auditd.c is separated into
auditd_darwin.c and auditd_fbsd.c files.
- Add an event for the posix_spawn(2) and fsgetpath(2) Mac OS X system
calls.
- For Mac OS X, we use ASL(3) instead of syslog(3) for logging.
- Add support for NOTICE level logging.
OpenBSM 1.1 alpha 3
- Add two new functions, au_bsm_to_errno() and au_errno_to_bsm(), to map
between BSM error numbers (largely the Solaris definitions) and local
errno(2) values for 32-bit and 64-bit return tokens. This is required
as operating systems don't agree on some of the values of more recent
error numbers.
- Fix a bug how au_to_exec_args(3) and au_to_exec_env(3) calculates the
total size for the token. This bug resulted in "unknown" tokens being
printed after the exec args/env tokens.
- Support for AUT_SOCKET_EX extended socket tokens, which describe a
socket using a pair of IPv4/IPv6 and port tuples.
- OpenBSM BSM file header version bumped for 1.1 release.
- Deprecated Darwin constants, such as TRAILER_PAD_MAGIC, removed.
Obtained from: TrustedBSD Project
Sponsored by: Apple Inc.
2008-12-28 22:40:42 +00:00
|
|
|
#ifdef HAVE_STDINT_H
|
Initial vendor import of the TrustedBSD OpenBSM distribution, version
1.0 alpha 1, an implementation of the documented Sun Basic Security
Module (BSM) Audit API and file format, as well as local extensions to
support the Mac OS X and FreeBSD operating systems. Also included are
command line tools for audit trail reduction and conversion to text,
as well as documentation of the commands, file format, and APIs. This
distribution is the foundation for the TrustedBSD Audit implementation,
and is a pre-release.
This is the first in a series of commits to introduce support for
Common Criteria CAPP security event audit support.
This software has been made possible through the generous
contributions of Apple Computer, Inc., SPARTA, Inc., as well as
members of the TrustedBSD Project, including Wayne Salamon <wsalamon>
and Tom Rhodes <trhodes>. The original OpenBSM implementation was
created by McAfee Research under contract to Apple Computer, Inc., as
part of their CC CAPP security evaluation.
Many thanks to: wsalamon, trhodes
Obtained from: TrustedBSD Project
2006-01-31 19:40:12 +00:00
|
|
|
#include <stdint.h>
|
Vendor import of OpenBSM 1.1 alpha4, which incorporates the following
changes since the last imported OpenBSM release:
OpenBSM 1.1 alpha 4
- With the addition of BSM error number mapping, we also need to map the
local error number passed to audit_submit(3) to a BSM error number,
rather than have the caller perform that conversion.
- Reallocate user audit events to avoid collisions with Solaris; adopt a
more formal allocation scheme, and add some events allocated in Solaris
that will be of immediate use on other platforms.
- Add an event for Calife.
- Add au_strerror(3), which allows generating strings for BSM errors
directly, rather than requiring applications to map to the local error
space, which might not be able to entirely represent the BSM error
number space.
- Major auditd rewrite for launchd(8) support. Add libauditd library
that is shared between launchd and auditd.
- Add AUDIT_TRIGGER_INITIALIZE trigger (sent via 'audit -i') for
(re)starting auditing under launchd(8) on Mac OS X.
- Add 'current' symlink to active audit trail.
- Add crash recovery of previous audit trail file when detected on audit
startup that it has not been properly terminated.
- Add the event AUE_audit_recovery to indicated when an audit trail file
has been recovered from not being properly terminated. This event is
stored in the new audit trail file and includes the path of recovered
audit trail file.
- Mac OS X and FreeBSD dependent code in auditd.c is separated into
auditd_darwin.c and auditd_fbsd.c files.
- Add an event for the posix_spawn(2) and fsgetpath(2) Mac OS X system
calls.
- For Mac OS X, we use ASL(3) instead of syslog(3) for logging.
- Add support for NOTICE level logging.
OpenBSM 1.1 alpha 3
- Add two new functions, au_bsm_to_errno() and au_errno_to_bsm(), to map
between BSM error numbers (largely the Solaris definitions) and local
errno(2) values for 32-bit and 64-bit return tokens. This is required
as operating systems don't agree on some of the values of more recent
error numbers.
- Fix a bug how au_to_exec_args(3) and au_to_exec_env(3) calculates the
total size for the token. This bug resulted in "unknown" tokens being
printed after the exec args/env tokens.
- Support for AUT_SOCKET_EX extended socket tokens, which describe a
socket using a pair of IPv4/IPv6 and port tuples.
- OpenBSM BSM file header version bumped for 1.1 release.
- Deprecated Darwin constants, such as TRAILER_PAD_MAGIC, removed.
Obtained from: TrustedBSD Project
Sponsored by: Apple Inc.
2008-12-28 22:40:42 +00:00
|
|
|
#endif
|
Initial vendor import of the TrustedBSD OpenBSM distribution, version
1.0 alpha 1, an implementation of the documented Sun Basic Security
Module (BSM) Audit API and file format, as well as local extensions to
support the Mac OS X and FreeBSD operating systems. Also included are
command line tools for audit trail reduction and conversion to text,
as well as documentation of the commands, file format, and APIs. This
distribution is the foundation for the TrustedBSD Audit implementation,
and is a pre-release.
This is the first in a series of commits to introduce support for
Common Criteria CAPP security event audit support.
This software has been made possible through the generous
contributions of Apple Computer, Inc., SPARTA, Inc., as well as
members of the TrustedBSD Project, including Wayne Salamon <wsalamon>
and Tom Rhodes <trhodes>. The original OpenBSM implementation was
created by McAfee Research under contract to Apple Computer, Inc., as
part of their CC CAPP security evaluation.
Many thanks to: wsalamon, trhodes
Obtained from: TrustedBSD Project
2006-01-31 19:40:12 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Some operating systems do not yet have the more recent endian APIs that
|
|
|
|
* permit encoding to and decoding from byte streams. For those systems, we
|
|
|
|
* implement local non-optimized versions.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static __inline uint16_t
|
|
|
|
bswap16(uint16_t int16)
|
|
|
|
{
|
|
|
|
const unsigned char *from;
|
|
|
|
unsigned char *to;
|
|
|
|
uint16_t t;
|
|
|
|
|
|
|
|
from = (const unsigned char *) &int16;
|
|
|
|
to = (unsigned char *) &t;
|
|
|
|
|
|
|
|
to[0] = from[1];
|
|
|
|
to[1] = from[0];
|
|
|
|
|
|
|
|
return (t);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline uint32_t
|
|
|
|
bswap32(uint32_t int32)
|
|
|
|
{
|
|
|
|
const unsigned char *from;
|
|
|
|
unsigned char *to;
|
|
|
|
uint32_t t;
|
|
|
|
|
|
|
|
from = (const unsigned char *) &int32;
|
|
|
|
to = (unsigned char *) &t;
|
|
|
|
|
|
|
|
to[0] = from[3];
|
|
|
|
to[1] = from[2];
|
|
|
|
to[2] = from[1];
|
|
|
|
to[3] = from[0];
|
|
|
|
|
|
|
|
return (t);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline uint64_t
|
|
|
|
bswap64(uint64_t int64)
|
|
|
|
{
|
|
|
|
const unsigned char *from;
|
|
|
|
unsigned char *to;
|
|
|
|
uint64_t t;
|
|
|
|
|
|
|
|
from = (const unsigned char *) &int64;
|
|
|
|
to = (unsigned char *) &t;
|
|
|
|
|
|
|
|
to[0] = from[7];
|
|
|
|
to[1] = from[6];
|
|
|
|
to[2] = from[5];
|
|
|
|
to[3] = from[4];
|
|
|
|
to[4] = from[3];
|
|
|
|
to[5] = from[2];
|
|
|
|
to[6] = from[1];
|
|
|
|
to[7] = from[0];
|
|
|
|
|
|
|
|
return (t);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(BYTE_ORDER) && !defined(_BYTE_ORDER)
|
|
|
|
#define _BYTE_ORDER BYTE_ORDER
|
|
|
|
#endif
|
|
|
|
#if !defined(_BYTE_ORDER)
|
|
|
|
#error "Neither BYTE_ORDER nor _BYTE_ORDER defined"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(BIG_ENDIAN) && !defined(_BIG_ENDIAN)
|
|
|
|
#define _BIG_ENDIAN BIG_ENDIAN
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(LITTLE_ENDIAN) && !defined(_LITTLE_ENDIAN)
|
|
|
|
#define _LITTLE_ENDIAN LITTLE_ENDIAN
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Host to big endian, host to little endian, big endian to host, and little
|
|
|
|
* endian to host byte order functions as detailed in byteorder(9).
|
|
|
|
*/
|
|
|
|
#if _BYTE_ORDER == _LITTLE_ENDIAN
|
|
|
|
#define htobe16(x) bswap16((x))
|
|
|
|
#define htobe32(x) bswap32((x))
|
|
|
|
#define htobe64(x) bswap64((x))
|
|
|
|
#define htole16(x) ((uint16_t)(x))
|
|
|
|
#define htole32(x) ((uint32_t)(x))
|
|
|
|
#define htole64(x) ((uint64_t)(x))
|
|
|
|
|
|
|
|
#define be16toh(x) bswap16((x))
|
|
|
|
#define be32toh(x) bswap32((x))
|
|
|
|
#define be64toh(x) bswap64((x))
|
|
|
|
#define le16toh(x) ((uint16_t)(x))
|
|
|
|
#define le32toh(x) ((uint32_t)(x))
|
|
|
|
#define le64toh(x) ((uint64_t)(x))
|
|
|
|
#else /* _BYTE_ORDER != _LITTLE_ENDIAN */
|
|
|
|
#define htobe16(x) ((uint16_t)(x))
|
|
|
|
#define htobe32(x) ((uint32_t)(x))
|
|
|
|
#define htobe64(x) ((uint64_t)(x))
|
|
|
|
#define htole16(x) bswap16((x))
|
|
|
|
#define htole32(x) bswap32((x))
|
|
|
|
#define htole64(x) bswap64((x))
|
|
|
|
|
|
|
|
#define be16toh(x) ((uint16_t)(x))
|
|
|
|
#define be32toh(x) ((uint32_t)(x))
|
|
|
|
#define be64toh(x) ((uint64_t)(x))
|
|
|
|
#define le16toh(x) bswap16((x))
|
|
|
|
#define le32toh(x) bswap32((x))
|
|
|
|
#define le64toh(x) bswap64((x))
|
|
|
|
#endif /* _BYTE_ORDER == _LITTLE_ENDIAN */
|
|
|
|
|
|
|
|
/* Alignment-agnostic encode/decode bytestream to/from little/big endian. */
|
|
|
|
|
|
|
|
static __inline uint16_t
|
|
|
|
be16dec(const void *pp)
|
|
|
|
{
|
|
|
|
unsigned char const *p = (unsigned char const *)pp;
|
|
|
|
|
|
|
|
return ((p[0] << 8) | p[1]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline uint32_t
|
|
|
|
be32dec(const void *pp)
|
|
|
|
{
|
|
|
|
unsigned char const *p = (unsigned char const *)pp;
|
|
|
|
|
|
|
|
return ((p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline uint64_t
|
|
|
|
be64dec(const void *pp)
|
|
|
|
{
|
|
|
|
unsigned char const *p = (unsigned char const *)pp;
|
|
|
|
|
|
|
|
return (((uint64_t)be32dec(p) << 32) | be32dec(p + 4));
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline uint16_t
|
|
|
|
le16dec(const void *pp)
|
|
|
|
{
|
|
|
|
unsigned char const *p = (unsigned char const *)pp;
|
|
|
|
|
|
|
|
return ((p[1] << 8) | p[0]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline uint32_t
|
|
|
|
le32dec(const void *pp)
|
|
|
|
{
|
|
|
|
unsigned char const *p = (unsigned char const *)pp;
|
|
|
|
|
|
|
|
return ((p[3] << 24) | (p[2] << 16) | (p[1] << 8) | p[0]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline uint64_t
|
|
|
|
le64dec(const void *pp)
|
|
|
|
{
|
|
|
|
unsigned char const *p = (unsigned char const *)pp;
|
|
|
|
|
|
|
|
return (((uint64_t)le32dec(p + 4) << 32) | le32dec(p));
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline void
|
|
|
|
be16enc(void *pp, uint16_t u)
|
|
|
|
{
|
|
|
|
unsigned char *p = (unsigned char *)pp;
|
|
|
|
|
|
|
|
p[0] = (u >> 8) & 0xff;
|
|
|
|
p[1] = u & 0xff;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline void
|
|
|
|
be32enc(void *pp, uint32_t u)
|
|
|
|
{
|
|
|
|
unsigned char *p = (unsigned char *)pp;
|
|
|
|
|
|
|
|
p[0] = (u >> 24) & 0xff;
|
|
|
|
p[1] = (u >> 16) & 0xff;
|
|
|
|
p[2] = (u >> 8) & 0xff;
|
|
|
|
p[3] = u & 0xff;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline void
|
|
|
|
be64enc(void *pp, uint64_t u)
|
|
|
|
{
|
|
|
|
unsigned char *p = (unsigned char *)pp;
|
|
|
|
|
|
|
|
be32enc(p, u >> 32);
|
|
|
|
be32enc(p + 4, u & 0xffffffff);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline void
|
|
|
|
le16enc(void *pp, uint16_t u)
|
|
|
|
{
|
|
|
|
unsigned char *p = (unsigned char *)pp;
|
|
|
|
|
|
|
|
p[0] = u & 0xff;
|
|
|
|
p[1] = (u >> 8) & 0xff;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline void
|
|
|
|
le32enc(void *pp, uint32_t u)
|
|
|
|
{
|
|
|
|
unsigned char *p = (unsigned char *)pp;
|
|
|
|
|
|
|
|
p[0] = u & 0xff;
|
|
|
|
p[1] = (u >> 8) & 0xff;
|
|
|
|
p[2] = (u >> 16) & 0xff;
|
|
|
|
p[3] = (u >> 24) & 0xff;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline void
|
|
|
|
le64enc(void *pp, uint64_t u)
|
|
|
|
{
|
|
|
|
unsigned char *p = (unsigned char *)pp;
|
|
|
|
|
|
|
|
le32enc(p, u & 0xffffffff);
|
|
|
|
le32enc(p + 4, u >> 32);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* _COMPAT_ENDIAN_H_ */
|