@@ -3688,7 +3688,7 @@ index c83a7272c9..0c7dea2f1f 100644
3688
3688
package x509
3689
3689
3690
3690
diff --git a/src/crypto/x509/x509_test.go b/src/crypto/x509/x509_test.go
3691
- index 910679756f..44ebc7c15f 100644
3691
+ index 3c592e1136..a594823783 100644
3692
3692
--- a/src/crypto/x509/x509_test.go
3693
3693
+++ b/src/crypto/x509/x509_test.go
3694
3694
@@ -12,7 +12,7 @@ import (
@@ -3700,7 +3700,7 @@ index 910679756f..44ebc7c15f 100644
3700
3700
"crypto/internal/backend/boringtest"
3701
3701
"crypto/rand"
3702
3702
"crypto/rsa"
3703
- @@ -655 ,7 +655 ,7 @@ func TestCreateSelfSignedCertificate(t *testing.T) {
3703
+ @@ -656 ,7 +656 ,7 @@ func TestCreateSelfSignedCertificate(t *testing.T) {
3704
3704
extraExtensionData := []byte("extra extension")
3705
3705
3706
3706
for _, test := range tests {
@@ -3709,7 +3709,7 @@ index 910679756f..44ebc7c15f 100644
3709
3709
key, _ := test.priv.(*rsa.PrivateKey)
3710
3710
if key.PublicKey.N.BitLen() < 2048 {
3711
3711
t.Logf("skipping short key with BoringCrypto: %d", key.PublicKey.N.BitLen())
3712
- @@ -3719 ,7 +3719 ,7 @@ func TestRevocationListCheckSignatureFrom(t *testing.T) {
3712
+ @@ -3720 ,7 +3720 ,7 @@ func TestRevocationListCheckSignatureFrom(t *testing.T) {
3713
3713
var testCurve elliptic.Curve
3714
3714
// If OpenSSL supports P224, use the default upstream behavior,
3715
3715
// otherwise test with P384
@@ -3719,7 +3719,7 @@ index 910679756f..44ebc7c15f 100644
3719
3719
} else {
3720
3720
testCurve = elliptic.P384()
3721
3721
diff --git a/src/go.mod b/src/go.mod
3722
- index c18ae7760f..12a1a3a4d6 100644
3722
+ index 04bb1b358c..b656ad46ce 100644
3723
3723
--- a/src/go.mod
3724
3724
+++ b/src/go.mod
3725
3725
@@ -3,6 +3,7 @@ module std
@@ -3728,18 +3728,18 @@ index c18ae7760f..12a1a3a4d6 100644
3728
3728
require (
3729
3729
+ github.com/golang-fips/openssl/v2 v2.0.1
3730
3730
golang.org/x/crypto v0.16.1-0.20231129163542-152cdb1503eb
3731
- golang.org/x/net v0.19.0
3731
+ golang.org/x/net v0.19.1-0.20240327214321-ae3c50b55fdf
3732
3732
)
3733
3733
diff --git a/src/go.sum b/src/go.sum
3734
- index 7c3519882a..aeb3130373 100644
3734
+ index 28d7841926..6454ac2934 100644
3735
3735
--- a/src/go.sum
3736
3736
+++ b/src/go.sum
3737
3737
@@ -1,3 +1,5 @@
3738
3738
+ github.com/golang-fips/openssl/v2 v2.0.1 h1:oNIu7tARUHmSIY7Gqn5lbSCnHSduvkFJoM2FRq294lA=
3739
3739
+ github.com/golang-fips/openssl/v2 v2.0.1/go.mod h1:7tuBqX2Zov8Yq5mJ2yzlKhpnxOnWyEzi38AzeWRuQdg=
3740
3740
golang.org/x/crypto v0.16.1-0.20231129163542-152cdb1503eb h1:1ceSY7sk6sJuiDREHpfyrqDnDljsLfEP2GuTClhBBfI=
3741
3741
golang.org/x/crypto v0.16.1-0.20231129163542-152cdb1503eb/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4=
3742
- golang.org/x/net v0.19.0 h1:zTwKpTd2XuCqf8huc7Fo2iSy+4RHPd10s4KzeTnVr1c =
3742
+ golang.org/x/net v0.19.1-0.20240327214321-ae3c50b55fdf h1:zcMReZfxLPmppTre5oSNPSOgoTRtOplx+QV25LkyAto =
3743
3743
diff --git a/src/vendor/github.com/golang-fips/openssl/v2/.gitleaks.toml b/src/vendor/github.com/golang-fips/openssl/v2/.gitleaks.toml
3744
3744
new file mode 100644
3745
3745
index 0000000000..aed2e22df2
@@ -9688,7 +9688,7 @@ index 0000000000..5de62f95a7
9688
9688
+ return nil
9689
9689
+ }
9690
9690
diff --git a/src/vendor/modules.txt b/src/vendor/modules.txt
9691
- index 338c496bf9..187322fab6 100644
9691
+ index 8c555d28c5..1c8b73a529 100644
9692
9692
--- a/src/vendor/modules.txt
9693
9693
+++ b/src/vendor/modules.txt
9694
9694
@@ -1,3 +1,7 @@
0 commit comments