pkd: Run openssh client with SK keys

Fixes: #331

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Pavol Žáčik <pzacik@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
Jakub Jelen
2025-11-25 18:49:56 +01:00
parent 3e074a3fba
commit 5c496acef7
4 changed files with 69 additions and 0 deletions

View File

@@ -153,6 +153,21 @@ void setup_openssh_client_keys(void) {
}
assert_int_equal(rc, 0);
}
#ifdef HAVE_SK_DUMMY
setenv("SSH_SK_PROVIDER", SK_DUMMY_LIBRARY_PATH, 1);
if (access(OPENSSH_ECDSA_SK_TESTKEY, F_OK) != 0) {
rc = system_checked(OPENSSH_KEYGEN " -t ecdsa-sk -q -N \"\" -f "
OPENSSH_ECDSA_SK_TESTKEY);
}
assert_int_equal(rc, 0);
if (access(OPENSSH_ED25519_SK_TESTKEY, F_OK) != 0) {
rc = system_checked(OPENSSH_KEYGEN " -t ed25519-sk -q -N \"\" -f "
OPENSSH_ED25519_SK_TESTKEY);
}
assert_int_equal(rc, 0);
#endif
}
void cleanup_openssh_client_keys(void) {
@@ -165,6 +180,10 @@ void cleanup_openssh_client_keys(void) {
if (!ssh_fips_mode()) {
cleanup_key(OPENSSH_ED25519_TESTKEY);
}
#ifdef HAVE_SK_DUMMY
cleanup_key(OPENSSH_ECDSA_SK_TESTKEY);
cleanup_key(OPENSSH_ED25519_SK_TESTKEY);
#endif
}
void setup_dropbear_client_keys(void)