-
Notifications
You must be signed in to change notification settings - Fork 27
Description
golang-fips/openssl is flexible in its support for OpenSSL versions; the version available at runtime does not have to match the version available at build time (https://github.com/golang-fips/openssl#portable-openssl). golang-fips/go does not have this property; _goboringcrypto_DLOPEN_OPENSSL loads only the version of the library that was available at build time (
go/patches/001-initial-openssl-for-fips.patch
Line 3470 in 7f64529
| +_goboringcrypto_DLOPEN_OPENSSL(void) |
Is it possible for this repo to use the same tricks as golang-fips/openssl to be version-agnostic? If not, could the failure to load the expected openssl version be a panic instead of silently falling back to the wrong crypto implementations? At the very least this hidden dependency should be documented.
FYI I ran into this moving a binary between Red Hat's ubi9 (which uses OpenSSL 3.0) and ubi8 (which uses OpenSSL 1.1).