Describe the bug
When we are running pcks11-provider and FIPS mode is enabled, the provider is loaded by OpenSSL but none of the functions are FIPS compatible so none of them is called or used. Trying to load a pkcs11 URI makes OpenSSL fall back to the default provider and try to open it as a file. This fails and the "Failed to open OpenSSL store: error:8000000D:system library::Permission denied" error message is printed.
To Reproduce
We are using libssh API to reproduce this bug.
Steps to reproduce the behavior:
Describe the bug When we are running pcks11-provider and FIPS mode is enabled, the provider is loaded by OpenSSL but none of the functions are FIPS compatible so none of them is called or used. Trying to load a pkcs11 URI makes OpenSSL fall back to the default provider and try to open it as a file. This fails and the "Failed to open OpenSSL store: error:8000000D:system library::Permission denied" error message is printed.
To Reproduce We are using libssh API to reproduce this bug. Steps to reproduce the behavior:
Expected behavior The pcks11 keys (both RSA and ECDSA) should be able to be loaded by the pcks11-provider in FIPS mode.
Operating environment (please complete the following information):
Token and application used (please complete the following information):
Harness libssh API C code converted to txt. Feel free to reproduce it however you see fit. simple-libssh-client.txt