Bug 1952381

Summary: golang: Port to OpenSSL 3.0
Product: Red Hat Enterprise Linux 9 Reporter: Sahana Prasad <sahana>
Component: golangAssignee: David Benoit <dbenoit>
Status: CLOSED CURRENTRELEASE QA Contact: Edjunior Barbosa Machado <emachado>
Severity: high Docs Contact:
Priority: unspecified    
Version: CentOS StreamCC: asm, bstinson, dbelyavs, dbenoit, emachado, fweimer, jwboyer, mcermak, ssorce, tschelle, tstellar
Target Milestone: betaKeywords: FutureFeature, Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: golang-1.16.4-3.el9 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of:
: 1984110 (view as bug list) Environment:
Last Closed: 2021-12-07 21:20:54 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1958021, 1984110    

Description Sahana Prasad 2021-04-22 07:44:49 UTC
This bug is used to track golang readiness with OpenSSL 3.0 targetted for RHEL-9 beta.

As of now the following tests fail when golang is built with OpenSSL 3.0:

FAIL    crypto/aes      
FAIL TestCBCDecrypterAES 

These are a couple of known failures that are already fixed upstream and they will be patched downstream

There are other test failures due to the following error:

FAIL TestDecryptPKCS1v15
FAIL TestEncryptPKCS1v15SessionKey
FAIL TestEncryptPKCS1v15DecrypterSessionKey 
FAIL TestShortSessionKey
FAIL TestCreateSelfSignedCertificate



pkcs1v15_test.go:278: Failed to encrypt short message: EVP_PKEY_operation_init failed
        openssl error(s):
        error:1C800069:Provider routines::invalid key length

David is following this up and removing support for 1024 bit keys