xref: /titanic_44/usr/src/lib/pkcs11/pkcs11_tpm/common/loadsave.c (revision 0a1ad920531b37f01f4aa8084737026621c76bdb)
1 /*
2  *		Common Public License Version 0.5
3  *
4  *		THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF
5  *		THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE,
6  *		REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES
7  *		RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
8  *
9  *		1. DEFINITIONS
10  *
11  *		"Contribution" means:
12  *		      a) in the case of the initial Contributor, the
13  *		      initial code and documentation distributed under
14  *		      this Agreement, and
15  *
16  *		      b) in the case of each subsequent Contributor:
17  *		      i) changes to the Program, and
18  *		      ii) additions to the Program;
19  *
20  *		      where such changes and/or additions to the Program
21  *		      originate from and are distributed by that
22  *		      particular Contributor. A Contribution 'originates'
23  *		      from a Contributor if it was added to the Program
24  *		      by such Contributor itself or anyone acting on such
25  *		      Contributor's behalf. Contributions do not include
26  *		      additions to the Program which: (i) are separate
27  *		      modules of software distributed in conjunction with
28  *		      the Program under their own license agreement, and
29  *		      (ii) are not derivative works of the Program.
30  *
31  *
32  *		"Contributor" means any person or entity that distributes
33  *		the Program.
34  *
35  *		"Licensed Patents " mean patent claims licensable by a
36  *		Contributor which are necessarily infringed by the use or
37  *		sale of its Contribution alone or when combined with the
38  *		Program.
39  *
40  *		"Program" means the Contributions distributed in
41  *		accordance with this Agreement.
42  *
43  *		"Recipient" means anyone who receives the Program under
44  *		this Agreement, including all Contributors.
45  *
46  *		2. GRANT OF RIGHTS
47  *
48  *		      a) Subject to the terms of this Agreement, each
49  *		      Contributor hereby grants Recipient a
50  *		      non-exclusive, worldwide, royalty-free copyright
51  *		      license to reproduce, prepare derivative works of,
52  *		      publicly display, publicly perform, distribute and
53  *		      sublicense the Contribution of such Contributor, if
54  *		      any, and such derivative works, in source code and
55  *		      object code form.
56  *
57  *		      b) Subject to the terms of this Agreement, each
58  *		      Contributor hereby grants Recipient a
59  *		      non-exclusive, worldwide, royalty-free patent
60  *		      license under Licensed Patents to make, use, sell,
61  *		      offer to sell, import and otherwise transfer the
62  *		      Contribution of such Contributor, if any, in source
63  *		      code and object code form. This patent license
64  *		      shall apply to the combination of the Contribution
65  *		      and the Program if, at the time the Contribution is
66  *		      added by the Contributor, such addition of the
67  *		      Contribution causes such combination to be covered
68  *		      by the Licensed Patents. The patent license shall
69  *		      not apply to any other combinations which include
70  *		      the Contribution. No hardware per se is licensed
71  *		      hereunder.
72  *
73  *		      c) Recipient understands that although each
74  *		      Contributor grants the licenses to its
75  *		      Contributions set forth herein, no assurances are
76  *		      provided by any Contributor that the Program does
77  *		      not infringe the patent or other intellectual
78  *		      property rights of any other entity. Each
79  *		      Contributor disclaims any liability to Recipient
80  *		      for claims brought by any other entity based on
81  *		      infringement of intellectual property rights or
82  *		      otherwise. As a condition to exercising the rights
83  *		      and licenses granted hereunder, each Recipient
84  *		      hereby assumes sole responsibility to secure any
85  *		      other intellectual property rights needed, if any.
86  *
87  *		      For example, if a third party patent license is
88  *		      required to allow Recipient to distribute the
89  *		      Program, it is Recipient's responsibility to
90  *		      acquire that license before distributing the
91  *		      Program.
92  *
93  *		      d) Each Contributor represents that to its
94  *		      knowledge it has sufficient copyright rights in its
95  *		      Contribution, if any, to grant the copyright
96  *		      license set forth in this Agreement.
97  *
98  *		3. REQUIREMENTS
99  *
100  *		A Contributor may choose to distribute the Program in
101  *		object code form under its own license agreement, provided
102  *		that:
103  *		      a) it complies with the terms and conditions of
104  *		      this Agreement; and
105  *
106  *		      b) its license agreement:
107  *		      i) effectively disclaims on behalf of all
108  *		      Contributors all warranties and conditions, express
109  *		      and implied, including warranties or conditions of
110  *		      title and non-infringement, and implied warranties
111  *		      or conditions of merchantability and fitness for a
112  *		      particular purpose;
113  *
114  *		      ii) effectively excludes on behalf of all
115  *		      Contributors all liability for damages, including
116  *		      direct, indirect, special, incidental and
117  *		      consequential damages, such as lost profits;
118  *
119  *		      iii) states that any provisions which differ from
120  *		      this Agreement are offered by that Contributor
121  *		      alone and not by any other party; and
122  *
123  *		      iv) states that source code for the Program is
124  *		      available from such Contributor, and informs
125  *		      licensees how to obtain it in a reasonable manner
126  *		      on or through a medium customarily used for
127  *		      software exchange.
128  *
129  *		When the Program is made available in source code form:
130  *		      a) it must be made available under this Agreement;
131  *		      and
132  *		      b) a copy of this Agreement must be included with
133  *		      each copy of the Program.
134  *
135  *		Contributors may not remove or alter any copyright notices
136  *		contained within the Program.
137  *
138  *		Each Contributor must identify itself as the originator of
139  *		its Contribution, if any, in a manner that reasonably
140  *		allows subsequent Recipients to identify the originator of
141  *		the Contribution.
142  *
143  *
144  *		4. COMMERCIAL DISTRIBUTION
145  *
146  *		Commercial distributors of software may accept certain
147  *		responsibilities with respect to end users, business
148  *		partners and the like. While this license is intended to
149  *		facilitate the commercial use of the Program, the
150  *		Contributor who includes the Program in a commercial
151  *		product offering should do so in a manner which does not
152  *		create potential liability for other Contributors.
153  *		Therefore, if a Contributor includes the Program in a
154  *		commercial product offering, such Contributor ("Commercial
155  *		Contributor") hereby agrees to defend and indemnify every
156  *		other Contributor ("Indemnified Contributor") against any
157  *		losses, damages and costs (collectively "Losses") arising
158  *		from claims, lawsuits and other legal actions brought by a
159  *		third party against the Indemnified Contributor to the
160  *		extent caused by the acts or omissions of such Commercial
161  *		Contributor in connection with its distribution of the
162  *		Program in a commercial product offering. The obligations
163  *		in this section do not apply to any claims or Losses
164  *		relating to any actual or alleged intellectual property
165  *		infringement. In order to qualify, an Indemnified
166  *		Contributor must: a) promptly notify the Commercial
167  *		Contributor in writing of such claim, and b) allow the
168  *		Commercial Contributor to control, and cooperate with the
169  *		Commercial Contributor in, the defense and any related
170  *		settlement negotiations. The Indemnified Contributor may
171  *		participate in any such claim at its own expense.
172  *
173  *
174  *		For example, a Contributor might include the Program in a
175  *		commercial product offering, Product X. That Contributor
176  *		is then a Commercial Contributor. If that Commercial
177  *		Contributor then makes performance claims, or offers
178  *		warranties related to Product X, those performance claims
179  *		and warranties are such Commercial Contributor's
180  *		responsibility alone. Under this section, the Commercial
181  *		Contributor would have to defend claims against the other
182  *		Contributors related to those performance claims and
183  *		warranties, and if a court requires any other Contributor
184  *		to pay any damages as a result, the Commercial Contributor
185  *		must pay those damages.
186  *
187  *
188  *		5. NO WARRANTY
189  *
190  *		EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE
191  *		PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT
192  *		WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
193  *		IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR
194  *		CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR
195  *		FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely
196  *		responsible for determining the appropriateness of using
197  *		and distributing the Program and assumes all risks
198  *		associated with its exercise of rights under this
199  *		Agreement, including but not limited to the risks and
200  *		costs of program errors, compliance with applicable laws,
201  *		damage to or loss of data, programs or equipment, and
202  *		unavailability or interruption of operations.
203  *
204  *		6. DISCLAIMER OF LIABILITY
205  *		EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER
206  *		RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY
207  *		FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
208  *		OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION
209  *		LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
210  *		LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
211  *		(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
212  *		OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE
213  *		OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE
214  *		POSSIBILITY OF SUCH DAMAGES.
215  *
216  *		7. GENERAL
217  *
218  *		If any provision of this Agreement is invalid or
219  *		unenforceable under applicable law, it shall not affect
220  *		the validity or enforceability of the remainder of the
221  *		terms of this Agreement, and without further action by the
222  *		parties hereto, such provision shall be reformed to the
223  *		minimum extent necessary to make such provision valid and
224  *		enforceable.
225  *
226  *
227  *		If Recipient institutes patent litigation against a
228  *		Contributor with respect to a patent applicable to
229  *		software (including a cross-claim or counterclaim in a
230  *		lawsuit), then any patent licenses granted by that
231  *		Contributor to such Recipient under this Agreement shall
232  *		terminate as of the date such litigation is filed. In
233  *		addition, If Recipient institutes patent litigation
234  *		against any entity (including a cross-claim or
235  *		counterclaim in a lawsuit) alleging that the Program
236  *		itself (excluding combinations of the Program with other
237  *		software or hardware) infringes such Recipient's
238  *		patent(s), then such Recipient's rights granted under
239  *		Section 2(b) shall terminate as of the date such
240  *		litigation is filed.
241  *
242  *		All Recipient's rights under this Agreement shall
243  *		terminate if it fails to comply with any of the material
244  *		terms or conditions of this Agreement and does not cure
245  *		such failure in a reasonable period of time after becoming
246  *		aware of such noncompliance. If all Recipient's rights
247  *		under this Agreement terminate, Recipient agrees to cease
248  *		use and distribution of the Program as soon as reasonably
249  *		practicable. However, Recipient's obligations under this
250  *		Agreement and any licenses granted by Recipient relating
251  *		to the Program shall continue and survive.
252  *
253  *		Everyone is permitted to copy and distribute copies of
254  *		this Agreement, but in order to avoid inconsistency the
255  *		Agreement is copyrighted and may only be modified in the
256  *		following manner. The Agreement Steward reserves the right
257  *		to publish new versions (including revisions) of this
258  *		Agreement from time to time. No one other than the
259  *		Agreement Steward has the right to modify this Agreement.
260  *
261  *		IBM is the initial Agreement Steward. IBM may assign the
262  *		responsibility to serve as the Agreement Steward to a
263  *		suitable separate entity. Each new version of the
264  *		Agreement will be given a distinguishing version number.
265  *		The Program (including Contributions) may always be
266  *		distributed subject to the version of the Agreement under
267  *		which it was received. In addition, after a new version of
268  *		the Agreement is published, Contributor may elect to
269  *		distribute the Program (including its Contributions) under
270  *		the new version. Except as expressly stated in Sections
271  *		2(a) and 2(b) above, Recipient receives no rights or
272  *		licenses to the intellectual property of any Contributor
273  *		under this Agreement, whether expressly, by implication,
274  *		estoppel or otherwise. All rights in the Program not
275  *		expressly granted under this Agreement are reserved.
276  *
277  *
278  *		This Agreement is governed by the laws of the State of New
279  *		York and the intellectual property laws of the United
280  *		States of America. No party to this Agreement will bring a
281  *		legal action under this Agreement more than one year after
282  *		the cause of action arose. Each party waives its rights to
283  *		a jury trial in any resulting litigation.
284  *
285  *
286  *
287  * (C) COPYRIGHT International Business Machines Corp. 2001,2002
288  */
289 /*
290  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
291  * Use is subject to license terms.
292  */
293 
294 #include "tpmtok_int.h"
295 #include <pwd.h>
296 #include <grp.h>
297 #include <fcntl.h>
298 
299 #define	ALTERNATE_KEYSTORE_PATH "PKCS11_TPM_DIR"
300 #define	PWD_BUFFER_SIZE	1024
301 
302 static char keystore_path[MAXPATHLEN];
303 static boolean_t keystore_path_initialized = 0;
304 
305 TSS_HKEY hPrivateLeafKey;
306 static CK_RV
307 restore_private_token_object(TSS_HCONTEXT, CK_BYTE  *, CK_ULONG, OBJECT *);
308 
309 static struct flock fl = {
310 	0,
311 	0,
312 	0,
313 	0,
314 	0,
315 	0,
316 	{0, 0, 0, 0}
317 };
318 
319 static int
320 lockfile(int fd, int op)
321 {
322 	fl.l_type = op;
323 	return (fcntl(fd, F_SETLKW, &fl));
324 }
325 
326 static char *
327 get_user_default_path(char *home_path)
328 {
329 	struct passwd pwd, *user_info;
330 	char pwdbuf[PWD_BUFFER_SIZE];
331 
332 	if (getpwuid_r(getuid(), &pwd, pwdbuf, PWD_BUFFER_SIZE,
333 	    &user_info) != 0)
334 		return (NULL);
335 
336 	(void) snprintf(home_path, MAXPATHLEN, "/var/tpm/pkcs11/%s",
337 	    user_info ? user_info->pw_name : "");
338 
339 	return (home_path);
340 }
341 
342 char *
343 get_tpm_keystore_path()
344 {
345 	char *env_val;
346 	char home_path[MAXPATHLEN];
347 
348 	if (!keystore_path_initialized) {
349 		env_val = getenv(ALTERNATE_KEYSTORE_PATH);
350 		bzero(keystore_path, sizeof (keystore_path));
351 		/*
352 		 * If it isn't set or is set to the empty string use the
353 		 * default location.  We need to check for the empty string
354 		 * because some users "unset" environment variables by giving
355 		 * them no value, this isn't the same thing as removing it
356 		 * from the environment.
357 		 *
358 		 * We don't want that to attempt to open the token area.
359 		 */
360 		if ((env_val == NULL) || (strcmp(env_val, "") == 0)) {
361 			/* alternate path not specified, use default dir */
362 			char *p = get_user_default_path(home_path);
363 			if (p == NULL)
364 				return (NULL);
365 			(void) snprintf(keystore_path, MAXPATHLEN, "%s", p);
366 		} else {
367 			(void) snprintf(keystore_path, MAXPATHLEN, "%s",
368 			    env_val);
369 		}
370 		keystore_path_initialized = 1;
371 	}
372 	return (keystore_path);
373 }
374 
375 static CK_RV
376 create_keystore_dir()
377 {
378 	char *ksdir = get_tpm_keystore_path();
379 	char objdir[MAXPATHLEN];
380 	CK_RV rv = 0;
381 
382 	if (ksdir == NULL)
383 		return (CKR_FUNCTION_FAILED);
384 
385 	if (mkdir(ksdir, S_IRUSR|S_IWUSR|S_IXUSR) < 0) {
386 		if (errno == EEXIST) {
387 			rv = 0;
388 		} else {
389 			return (CKR_FUNCTION_FAILED);
390 		}
391 	}
392 	if (rv == 0) {
393 		(void) snprintf(objdir, sizeof (objdir),
394 		    "%s/%s", ksdir, TOKEN_OBJ_DIR);
395 
396 		if (mkdir(objdir, S_IRUSR|S_IWUSR|S_IXUSR) < 0) {
397 			if (errno == EEXIST) {
398 				rv = 0;
399 			} else {
400 				return (CKR_FUNCTION_FAILED);
401 			}
402 		}
403 	}
404 	return (CKR_OK);
405 }
406 
407 static void
408 set_perm(int file)
409 {
410 	/*
411 	 * In the TPM token, with per user data stores, we don't share the token
412 	 * object amongst a group. In fact, we want to restrict access to
413 	 * a single user.
414 	 */
415 	(void) fchmod(file, S_IRUSR|S_IWUSR);
416 }
417 
418 CK_RV
419 load_token_data(TSS_HCONTEXT hContext, TOKEN_DATA *td)
420 {
421 	FILE	*fp;
422 	CK_BYTE	fname[MAXPATHLEN];
423 	CK_RV	rc;
424 	char *p = get_tpm_keystore_path();
425 
426 	if (p == NULL)
427 		return (CKR_FUNCTION_FAILED);
428 
429 	(void) snprintf((char *)fname, sizeof (fname),
430 	    "%s/%s", p, TOKEN_DATA_FILE);
431 
432 	rc = XProcLock(xproclock);
433 	if (rc != CKR_OK)
434 		return (rc);
435 
436 	fp = fopen((char *)fname, "r");
437 	if (!fp) {
438 		/* Better error checking added */
439 		if (errno == ENOENT) {
440 			(void) XProcUnLock(xproclock);
441 			rc = create_keystore_dir();
442 			if (rc != 0)
443 				goto out_nolock;
444 
445 			rc = init_token_data(hContext, td);
446 			if (rc != CKR_OK) {
447 				goto out_nolock;
448 			}
449 
450 			rc = XProcLock(xproclock);
451 			if (rc != CKR_OK) {
452 				goto out_nolock;
453 			}
454 
455 			fp = fopen((char *)fname, "r");
456 			if (!fp) {
457 				LogError("failed opening %s for read: %s",
458 				    fname, (char *)strerror(errno));
459 				rc = CKR_FUNCTION_FAILED;
460 				goto out_unlock;
461 			}
462 		} else {
463 			/* Could not open file for some unknown reason */
464 			rc = CKR_FUNCTION_FAILED;
465 			goto out_unlock;
466 		}
467 	}
468 	if (lockfile(fileno(fp), F_RDLCK)) {
469 		(void) fclose(fp);
470 		rc = CKR_FUNCTION_FAILED;
471 		goto out_unlock;
472 	}
473 	set_perm(fileno(fp));
474 
475 	rc = fread(td, sizeof (TOKEN_DATA), 1, fp);
476 
477 	(void) lockfile(fileno(fp), F_UNLCK);
478 	(void) fclose(fp);
479 
480 	if (rc == 0)
481 		rc = CKR_FUNCTION_FAILED;
482 	else
483 		rc = CKR_OK;
484 
485 out_unlock:
486 	(void) XProcUnLock(xproclock);
487 
488 out_nolock:
489 	return (rc);
490 }
491 
492 CK_RV
493 save_token_data(TOKEN_DATA *td)
494 {
495 	FILE	*fp;
496 	CK_RV	rc;
497 	CK_BYTE	fname[MAXPATHLEN];
498 	char *p = get_tpm_keystore_path();
499 
500 	if (p == NULL)
501 		return (CKR_FUNCTION_FAILED);
502 
503 	(void) snprintf((char *)fname, sizeof (fname),
504 	    "%s/%s", p, TOKEN_DATA_FILE);
505 
506 	rc = XProcLock(xproclock);
507 	if (rc != CKR_OK)
508 		goto out_nolock;
509 
510 	fp = fopen((char *)fname, "w");
511 
512 	if (!fp) {
513 		rc = CKR_FUNCTION_FAILED;
514 		goto done;
515 	}
516 	if (lockfile(fileno(fp), F_WRLCK)) {
517 		rc = CKR_FUNCTION_FAILED;
518 		(void) fclose(fp);
519 		goto done;
520 	}
521 	set_perm(fileno(fp));
522 
523 	(void) fwrite(td, sizeof (TOKEN_DATA), 1, fp);
524 	(void) lockfile(fileno(fp), F_UNLCK);
525 	(void) fclose(fp);
526 
527 	rc = CKR_OK;
528 done:
529 	(void) XProcUnLock(xproclock);
530 
531 out_nolock:
532 	return (rc);
533 }
534 
535 CK_RV
536 save_token_object(TSS_HCONTEXT hContext, OBJECT *obj)
537 {
538 	FILE	*fp = NULL;
539 	CK_BYTE	line[100];
540 	CK_RV	rc;
541 	CK_BYTE	fname[MAXPATHLEN];
542 	char *p = get_tpm_keystore_path();
543 
544 	if (p == NULL)
545 		return (CKR_FUNCTION_FAILED);
546 
547 	if (object_is_private(obj) == TRUE)
548 		rc = save_private_token_object(hContext, obj);
549 	else
550 		rc = save_public_token_object(obj);
551 
552 	if (rc != CKR_OK)
553 		return (rc);
554 
555 	(void) snprintf((char *)fname, sizeof (fname),
556 	    "%s/%s/%s", p, TOKEN_OBJ_DIR, TOKEN_OBJ_INDEX_FILE);
557 
558 	fp = fopen((char *)fname, "r");
559 	if (fp) {
560 		if (lockfile(fileno(fp), F_RDLCK)) {
561 			(void) fclose(fp);
562 			return (CKR_FUNCTION_FAILED);
563 		}
564 		set_perm(fileno(fp));
565 		while (!feof(fp)) {
566 			(void) fgets((char *)line, 50, fp);
567 			if (!feof(fp)) {
568 				line[strlen((char *)line) - 1] = 0;
569 				if (strcmp((char *)line,
570 				    (char *)(obj->name)) == 0) {
571 					(void) lockfile(fileno(fp), F_UNLCK);
572 					(void) fclose(fp);
573 					return (CKR_OK);
574 				}
575 			}
576 		}
577 		(void) lockfile(fileno(fp), F_UNLCK);
578 		(void) fclose(fp);
579 	}
580 
581 	fp = fopen((char *)fname, "a");
582 	if (!fp)
583 		return (CKR_FUNCTION_FAILED);
584 
585 	if (lockfile(fileno(fp), F_WRLCK)) {
586 		(void) fclose(fp);
587 		return (CKR_FUNCTION_FAILED);
588 	}
589 	set_perm(fileno(fp));
590 
591 	(void) fprintf(fp, "%s\n", obj->name);
592 	(void) lockfile(fileno(fp), F_UNLCK);
593 	(void) fclose(fp);
594 
595 	return (CKR_OK);
596 }
597 
598 CK_RV
599 save_public_token_object(OBJECT *obj)
600 {
601 	FILE	*fp = NULL;
602 	CK_BYTE	*cleartxt = NULL;
603 	CK_BYTE	fname[MAXPATHLEN];
604 	CK_ULONG	cleartxt_len;
605 	CK_BBOOL	flag = FALSE;
606 	CK_RV	rc;
607 	CK_ULONG	total_len;
608 	char *p = get_tpm_keystore_path();
609 
610 	if (p == NULL)
611 		return (CKR_FUNCTION_FAILED);
612 
613 	(void) snprintf((char *)fname, sizeof (fname),
614 	    "%s/%s/%s", p, TOKEN_OBJ_DIR, obj->name);
615 
616 	rc = object_flatten(obj, &cleartxt, &cleartxt_len);
617 	if (rc != CKR_OK)
618 		goto error;
619 
620 	fp = fopen((char *)fname, "w");
621 	if (!fp) {
622 		LogError("Error opening %s - %s", fname,
623 		    (char *)strerror(errno));
624 		rc = CKR_FUNCTION_FAILED;
625 		goto error;
626 	}
627 	if (lockfile(fileno(fp), F_WRLCK)) {
628 		(void) fclose(fp);
629 		return (CKR_FUNCTION_FAILED);
630 	}
631 
632 	set_perm(fileno(fp));
633 
634 	total_len = cleartxt_len + sizeof (CK_ULONG) + sizeof (CK_BBOOL);
635 
636 	(void) fwrite(&total_len, sizeof (CK_ULONG), 1, fp);
637 	(void) fwrite(&flag, sizeof (CK_BBOOL), 1, fp);
638 	(void) fwrite(cleartxt, cleartxt_len, 1, fp);
639 
640 	(void) lockfile(fileno(fp), F_UNLCK);
641 	(void) fclose(fp);
642 	free(cleartxt);
643 
644 	return (CKR_OK);
645 
646 error:
647 	if (fp)
648 		(void) fclose(fp);
649 	if (cleartxt)
650 		free(cleartxt);
651 	return (rc);
652 }
653 
654 CK_RV
655 save_private_token_object(TSS_HCONTEXT hContext, OBJECT *obj)
656 {
657 	FILE *fp = NULL;
658 	CK_BYTE	*obj_data  = NULL;
659 	CK_BYTE	*cleartxt  = NULL;
660 	CK_BYTE	*ciphertxt = NULL;
661 	CK_BYTE	*ptr = NULL;
662 	CK_BYTE	fname[100];
663 	CK_BYTE	hash_sha[SHA1_DIGEST_LENGTH];
664 	CK_ULONG obj_data_len, cleartxt_len, ciphertxt_len;
665 	CK_ULONG	padded_len;
666 	CK_BBOOL	flag;
667 	CK_RV	rc;
668 	CK_ULONG	obj_data_len_32;
669 	CK_ULONG	total_len;
670 	CK_ULONG	chunksize, blocks;
671 	char 		*p = get_tpm_keystore_path();
672 
673 	if (p == NULL)
674 		return (CKR_FUNCTION_FAILED);
675 
676 	rc = object_flatten(obj, &obj_data, &obj_data_len);
677 	obj_data_len_32 = obj_data_len;
678 	if (rc != CKR_OK) {
679 		goto error;
680 	}
681 	/*
682 	 * format for the object file:
683 	 *    private flag
684 	 *	---- begin encrypted part	<--+
685 	 *	length of object data		|
686 	 *	object data			+---- sensitive part
687 	 *	SHA of (object data)		|
688 	 *	---- end encrypted part		<--+
689 	 */
690 	if ((rc = compute_sha(obj_data, obj_data_len, hash_sha)) != CKR_OK)
691 		goto error;
692 
693 	/*
694 	 * RSA OAEP crypto uses chunks smaller than the max to make room
695 	 * for the hashes.
696 	 * chunksize = RSA_Modulus_Size - (2 * SHA1_DIGEST_SIZE + 2) - (4 - 1)
697 	 * == 209
698 	 */
699 	chunksize = RSA_BLOCK_SIZE - (2 * SHA1_DIGEST_LENGTH + 2) - 5;
700 
701 	cleartxt_len = sizeof (CK_ULONG) + obj_data_len_32 + SHA1_DIGEST_LENGTH;
702 
703 	blocks = cleartxt_len / chunksize + ((cleartxt_len % chunksize) > 0);
704 	padded_len   = RSA_BLOCK_SIZE * blocks;
705 
706 	cleartxt  = (CK_BYTE *)malloc(padded_len);
707 	ciphertxt = (CK_BYTE *)malloc(padded_len);
708 	if (!cleartxt || !ciphertxt) {
709 		rc = CKR_HOST_MEMORY;
710 		goto error;
711 	}
712 
713 	ciphertxt_len = padded_len;
714 
715 	ptr = cleartxt;
716 	(void) memcpy(ptr, &obj_data_len_32, sizeof (CK_ULONG));
717 	ptr += sizeof (CK_ULONG);
718 	(void) memcpy(ptr,  obj_data, obj_data_len_32);
719 	ptr += obj_data_len_32;
720 	(void) memcpy(ptr, hash_sha, SHA1_DIGEST_LENGTH);
721 
722 	(void) add_pkcs_padding(cleartxt + cleartxt_len, RSA_BLOCK_SIZE,
723 	    cleartxt_len, padded_len);
724 
725 	/* the encrypt function will compute the padded length */
726 	rc = tpm_encrypt_data(hContext, hPrivateLeafKey, cleartxt, cleartxt_len,
727 	    ciphertxt, &ciphertxt_len);
728 
729 	if (rc != CKR_OK) {
730 		goto error;
731 	}
732 
733 	(void) snprintf((char *)fname, sizeof (fname),
734 	    "%s/%s/%s", p, TOKEN_OBJ_DIR, obj->name);
735 
736 	fp = fopen((char *)fname, "w");
737 	if (!fp) {
738 		rc = CKR_FUNCTION_FAILED;
739 		goto error;
740 	}
741 	if (lockfile(fileno(fp), F_WRLCK)) {
742 		rc = CKR_FUNCTION_FAILED;
743 		goto error;
744 	}
745 
746 	set_perm(fileno(fp));
747 
748 	total_len = sizeof (CK_ULONG) + sizeof (CK_BBOOL) + ciphertxt_len;
749 
750 	flag = TRUE;
751 
752 	(void) fwrite(&total_len, sizeof (CK_ULONG), 1, fp);
753 	(void) fwrite(&flag, sizeof (CK_BBOOL), 1, fp);
754 	(void) fwrite(ciphertxt, ciphertxt_len,    1, fp);
755 
756 	(void) lockfile(fileno(fp), F_UNLCK);
757 	(void) fclose(fp);
758 
759 	free(obj_data);
760 	free(cleartxt);
761 	free(ciphertxt);
762 	return (CKR_OK);
763 
764 error:
765 	if (fp)
766 		(void) fclose(fp);
767 	if (obj_data)
768 		free(obj_data);
769 	if (cleartxt)
770 		free(cleartxt);
771 	if (ciphertxt)
772 		free(ciphertxt);
773 
774 	return (rc);
775 }
776 
777 CK_RV
778 load_public_token_objects(void)
779 {
780 	FILE	*fp1 = NULL, *fp2 = NULL;
781 	CK_BYTE *buf = NULL;
782 	CK_BYTE tmp[MAXPATHLEN], fname[MAXPATHLEN], iname[MAXPATHLEN];
783 	CK_BBOOL priv;
784 	CK_ULONG size;
785 	char *ksdir = get_tpm_keystore_path();
786 
787 	if (ksdir == NULL)
788 		return (CKR_FUNCTION_FAILED);
789 
790 	(void) snprintf((char *)iname, sizeof (iname),
791 	    "%s/%s/%s", ksdir,
792 	    TOKEN_OBJ_DIR, TOKEN_OBJ_INDEX_FILE);
793 
794 	fp1 = fopen((char *)iname, "r");
795 	if (!fp1)
796 		return (CKR_OK);  // no token objects
797 
798 	if (lockfile(fileno(fp1), F_RDLCK)) {
799 		(void) fclose(fp1);
800 		return (CKR_FUNCTION_FAILED);
801 	}
802 
803 	while (!feof(fp1)) {
804 		(void) fgets((char *)tmp, 50, fp1);
805 		if (feof(fp1))
806 			break;
807 
808 		tmp[strlen((char *)tmp) - 1] = 0;
809 
810 		(void) snprintf((char *)fname, sizeof (fname),
811 		    "%s/%s/", ksdir, TOKEN_OBJ_DIR);
812 
813 		(void) strncat((char *)fname, (const char *)tmp,
814 		    (size_t)sizeof (fname));
815 
816 		fp2 = fopen((char *)fname, "r");
817 		if (!fp2)
818 			continue;
819 
820 		(void) fread(&size, sizeof (CK_ULONG), 1, fp2);
821 		(void) fread(&priv, sizeof (CK_BBOOL), 1, fp2);
822 		if (priv == TRUE) {
823 			(void) fclose(fp2);
824 			continue;
825 		}
826 
827 		size = size - sizeof (CK_ULONG) - sizeof (CK_BBOOL);
828 		buf = (CK_BYTE *)malloc(size);
829 		if (!buf) {
830 			(void) lockfile(fileno(fp1), F_UNLCK);
831 			(void) fclose(fp1);
832 			(void) fclose(fp2);
833 			return (CKR_HOST_MEMORY);
834 		}
835 
836 		(void) fread(buf, size, 1, fp2);
837 
838 		if (pthread_mutex_lock(&obj_list_mutex)) {
839 			(void) lockfile(fileno(fp1), F_UNLCK);
840 			(void) fclose(fp1);
841 			(void) fclose(fp2);
842 			free(buf);
843 			return (CKR_FUNCTION_FAILED);
844 		}
845 
846 		(void) object_mgr_restore_obj(buf, NULL);
847 
848 		(void) pthread_mutex_unlock(&obj_list_mutex);
849 		free(buf);
850 		(void) fclose(fp2);
851 	}
852 	(void) lockfile(fileno(fp1), F_UNLCK);
853 	(void) fclose(fp1);
854 
855 	return (CKR_OK);
856 }
857 
858 CK_RV
859 load_private_token_objects(TSS_HCONTEXT hContext)
860 {
861 	FILE *fp1 = NULL, *fp2 = NULL;
862 	CK_BYTE *buf = NULL;
863 	CK_BYTE tmp[MAXPATHLEN], fname[MAXPATHLEN], iname[MAXPATHLEN];
864 	CK_BBOOL priv;
865 	CK_ULONG size;
866 	CK_RV rc;
867 	char *ksdir = get_tpm_keystore_path();
868 
869 	if (ksdir == NULL)
870 		return (CKR_FUNCTION_FAILED);
871 
872 	(void) snprintf((char *)iname, sizeof (iname),
873 	    "%s/%s/%s", ksdir, TOKEN_OBJ_DIR, TOKEN_OBJ_INDEX_FILE);
874 
875 	fp1 = fopen((char *)iname, "r");
876 	if (!fp1)
877 		return (CKR_OK);
878 
879 	if (lockfile(fileno(fp1), F_RDLCK)) {
880 		rc = CKR_FUNCTION_FAILED;
881 		goto error;
882 	}
883 
884 	while (!feof(fp1)) {
885 		(void) fgets((char *)tmp, sizeof (tmp), fp1);
886 		if (feof(fp1))
887 			break;
888 
889 		tmp[strlen((char *)tmp) - 1] = 0;
890 
891 		(void) snprintf((char *)fname, sizeof (fname),
892 		    "%s/%s/%s", ksdir, TOKEN_OBJ_DIR, tmp);
893 
894 		fp2 = fopen((char *)fname, "r");
895 		if (!fp2)
896 			continue;
897 
898 		(void) fread(&size, sizeof (CK_ULONG), 1, fp2);
899 		(void) fread(&priv, sizeof (CK_BBOOL), 1, fp2);
900 		if (priv == FALSE) {
901 			(void) fclose(fp2);
902 			continue;
903 		}
904 
905 		size = size - sizeof (CK_ULONG) - sizeof (CK_BBOOL);
906 		buf = (CK_BYTE *)malloc(size);
907 		if (!buf) {
908 			rc = CKR_HOST_MEMORY;
909 			goto error;
910 		}
911 
912 		rc = fread((char *)buf, size, 1, fp2);
913 		if (rc != 1) {
914 			rc = CKR_FUNCTION_FAILED;
915 			goto error;
916 		}
917 
918 		if (pthread_mutex_lock(&obj_list_mutex)) {
919 			rc = CKR_FUNCTION_FAILED;
920 			goto error;
921 		}
922 		rc = restore_private_token_object(hContext, buf, size, NULL);
923 		(void) pthread_mutex_unlock(&obj_list_mutex);
924 		if (rc != CKR_OK)
925 			goto error;
926 
927 		free(buf);
928 		(void) fclose(fp2);
929 	}
930 	(void) lockfile(fileno(fp1), F_UNLCK);
931 	(void) fclose(fp1);
932 
933 	return (CKR_OK);
934 
935 error:
936 	if (buf)
937 		free(buf);
938 	if (fp1) {
939 		(void) lockfile(fileno(fp1), F_UNLCK);
940 		(void) fclose(fp1);
941 	}
942 	if (fp2)
943 		(void) fclose(fp2);
944 	return (rc);
945 }
946 
947 static CK_RV
948 restore_private_token_object(
949 	TSS_HCONTEXT hContext,
950 	CK_BYTE  *data,
951 	CK_ULONG len,
952 	OBJECT   *pObj)
953 {
954 	CK_BYTE * cleartxt  = NULL;
955 	CK_BYTE * obj_data  = NULL;
956 	CK_BYTE *ptr = NULL;
957 	CK_BYTE hash_sha[SHA1_DIGEST_LENGTH];
958 	CK_ULONG cleartxt_len, obj_data_len;
959 	CK_RV rc;
960 
961 	/*
962 	 * format for the object data:
963 	 *    (private flag has already been read at this point)
964 	 *    ---- begin encrypted part
965 	 *	length of object data
966 	 *	object data
967 	 *	SHA of object data
968 	 *    ---- end encrypted part
969 	 */
970 
971 	cleartxt_len = len;
972 
973 	cleartxt = (CK_BYTE *)malloc(len);
974 	if (!cleartxt) {
975 		rc = CKR_HOST_MEMORY;
976 		goto done;
977 	}
978 
979 	rc = tpm_decrypt_data(hContext, hPrivateLeafKey, data, len,
980 	    cleartxt, &len);
981 
982 	if (rc != CKR_OK) {
983 		goto done;
984 	}
985 
986 	(void) strip_pkcs_padding(cleartxt, len, &cleartxt_len);
987 
988 	if (cleartxt_len > len) {
989 		rc = CKR_FUNCTION_FAILED;
990 		goto done;
991 	}
992 
993 	ptr = cleartxt;
994 
995 	bcopy(ptr, &obj_data_len, sizeof (CK_ULONG));
996 	ptr += sizeof (CK_ULONG);
997 	obj_data = ptr;
998 
999 	if ((rc = compute_sha(ptr, obj_data_len, hash_sha)) != CKR_OK)
1000 		goto done;
1001 	ptr += obj_data_len;
1002 
1003 	if (memcmp(ptr, hash_sha, SHA1_DIGEST_LENGTH) != 0) {
1004 		rc = CKR_FUNCTION_FAILED;
1005 		goto done;
1006 	}
1007 
1008 	(void) object_mgr_restore_obj(obj_data, pObj);
1009 	rc = CKR_OK;
1010 done:
1011 	if (cleartxt)
1012 		free(cleartxt);
1013 
1014 	return (rc);
1015 }
1016 
1017 CK_RV
1018 reload_token_object(TSS_HCONTEXT hContext, OBJECT *obj)
1019 {
1020 	FILE *fp = NULL;
1021 	CK_BYTE *buf = NULL;
1022 	CK_BYTE fname[MAXPATHLEN];
1023 	CK_BBOOL priv;
1024 	CK_ULONG size;
1025 	CK_ULONG size_64;
1026 	CK_RV rc;
1027 	char *p = get_tpm_keystore_path();
1028 
1029 	if (p == NULL)
1030 		return (CKR_FUNCTION_FAILED);
1031 
1032 	(void) memset((char *)fname, 0x0, sizeof (fname));
1033 
1034 	(void) snprintf((char *)fname, sizeof (fname),
1035 	    "%s/%s/", p, TOKEN_OBJ_DIR);
1036 
1037 	(void) strncat((char *)fname, (char *)obj->name, sizeof (fname));
1038 
1039 	fp = fopen((char *)fname, "r");
1040 	if (!fp) {
1041 		rc = CKR_FUNCTION_FAILED;
1042 		goto done;
1043 	}
1044 	if (lockfile(fileno(fp), F_RDLCK)) {
1045 		rc = CKR_FUNCTION_FAILED;
1046 		goto done;
1047 	}
1048 
1049 	set_perm(fileno(fp));
1050 
1051 	(void) fread(&size, sizeof (CK_ULONG), 1, fp);
1052 	(void) fread(&priv, sizeof (CK_BBOOL), 1, fp);
1053 
1054 	size = size - sizeof (CK_ULONG) - sizeof (CK_BBOOL);
1055 
1056 	buf = (CK_BYTE *)malloc(size);
1057 	if (!buf) {
1058 		rc = CKR_HOST_MEMORY;
1059 		goto done;
1060 	}
1061 
1062 	(void) fread(buf, size, 1, fp);
1063 
1064 	size_64 = size;
1065 
1066 	if (priv) {
1067 		rc = restore_private_token_object(hContext, buf, size_64, obj);
1068 	} else {
1069 		rc = object_mgr_restore_obj(buf, obj);
1070 	}
1071 
1072 done:
1073 	if (fp) {
1074 		(void) lockfile(fileno(fp), F_UNLCK);
1075 		(void) fclose(fp);
1076 	}
1077 	if (buf)
1078 		free(buf);
1079 	return (rc);
1080 }
1081 
1082 static int
1083 islink(char *fname)
1084 {
1085 	struct stat st;
1086 
1087 	if (stat((const char *)fname, &st))
1088 		return (-1);
1089 	else if (S_ISLNK(st.st_mode))
1090 		return (1);
1091 	return (0);
1092 }
1093 
1094 CK_RV
1095 delete_token_object(OBJECT *obj)
1096 {
1097 	FILE *fp1, *fp2;
1098 	CK_BYTE line[100];
1099 	char objidx[MAXPATHLEN], idxtmp[MAXPATHLEN], fname[MAXPATHLEN];
1100 	char *ksdir = get_tpm_keystore_path();
1101 
1102 	if (ksdir == NULL)
1103 		return (CKR_FUNCTION_FAILED);
1104 
1105 	(void) snprintf(objidx, sizeof (objidx),
1106 	    "%s/%s/%s", ksdir, TOKEN_OBJ_DIR, TOKEN_OBJ_INDEX_FILE);
1107 
1108 	(void) snprintf(idxtmp, sizeof (idxtmp),
1109 	    "%s/IDX.TMP", ksdir, TOKEN_OBJ_DIR);
1110 
1111 	/*
1112 	 * If either file is a link, fail.
1113 	 */
1114 	if (islink(objidx) != 0)
1115 		return (CKR_FUNCTION_FAILED);
1116 
1117 	if (islink(idxtmp) != 0)
1118 		return (CKR_FUNCTION_FAILED);
1119 
1120 	fp1 = fopen(objidx, "r");
1121 	fp2 = fopen(idxtmp, "w");
1122 	if (!fp1 || !fp2) {
1123 		if (fp1)
1124 			(void) fclose(fp1);
1125 		if (fp2)
1126 			(void) fclose(fp2);
1127 		return (CKR_FUNCTION_FAILED);
1128 	}
1129 
1130 	if (lockfile(fileno(fp1), F_RDLCK)) {
1131 		(void) fclose(fp1);
1132 		(void) fclose(fp2);
1133 		return (CKR_FUNCTION_FAILED);
1134 	}
1135 	if (lockfile(fileno(fp2), F_WRLCK)) {
1136 		(void) lockfile(fileno(fp1), F_UNLCK);
1137 		(void) fclose(fp1);
1138 		(void) fclose(fp2);
1139 		return (CKR_FUNCTION_FAILED);
1140 	}
1141 	set_perm(fileno(fp2));
1142 
1143 	while (!feof(fp1)) {
1144 		(void) fgets((char *)line, 50, fp1);
1145 		if (!feof(fp1)) {
1146 			line[ strlen((char *)line)-1 ] = 0;
1147 			if (strcmp((char *)line, (char *)obj->name))
1148 				(void) fprintf(fp2, "%s\n", line);
1149 		}
1150 	}
1151 
1152 	(void) lockfile(fileno(fp1), F_UNLCK);
1153 	(void) lockfile(fileno(fp2), F_UNLCK);
1154 	(void) fclose(fp1);
1155 	(void) fclose(fp2);
1156 
1157 	fp2 = fopen(objidx, "w");
1158 	fp1 = fopen(idxtmp, "r");
1159 	if (!fp1 || !fp2) {
1160 		if (fp1)
1161 			(void) fclose(fp1);
1162 		if (fp2)
1163 			(void) fclose(fp2);
1164 		return (CKR_FUNCTION_FAILED);
1165 	}
1166 	if (lockfile(fileno(fp1), F_RDLCK)) {
1167 		(void) fclose(fp1);
1168 		(void) fclose(fp2);
1169 		return (CKR_FUNCTION_FAILED);
1170 	}
1171 	if (lockfile(fileno(fp2), F_WRLCK)) {
1172 		(void) lockfile(fileno(fp1), F_UNLCK);
1173 		(void) fclose(fp1);
1174 		(void) fclose(fp2);
1175 		return (CKR_FUNCTION_FAILED);
1176 	}
1177 
1178 	set_perm(fileno(fp2));
1179 
1180 	while (!feof(fp1)) {
1181 		(void) fgets((char *)line, 50, fp1);
1182 		if (!feof(fp1))
1183 			(void) fprintf(fp2, "%s", (char *)line);
1184 	}
1185 
1186 	(void) lockfile(fileno(fp1), F_UNLCK);
1187 	(void) lockfile(fileno(fp2), F_UNLCK);
1188 	(void) fclose(fp1);
1189 	(void) fclose(fp2);
1190 
1191 	(void) snprintf(fname, sizeof (fname),
1192 	    "%s/%s/%s", ksdir, TOKEN_OBJ_DIR, (char *)obj->name);
1193 
1194 	(void) unlink(fname);
1195 	return (CKR_OK);
1196 }
1197