Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package java-11-openjdk for openSUSE:Factory 
checked in at 2022-02-03 23:16:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/java-11-openjdk (Old)
 and      /work/SRC/openSUSE:Factory/.java-11-openjdk.new.1898 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "java-11-openjdk"

Thu Feb  3 23:16:27 2022 rev:51 rq:950245 version:11.0.14.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes  
2021-11-09 23:54:12.351940253 +0100
+++ 
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.1898/java-11-openjdk.changes    
    2022-02-03 23:17:12.548316797 +0100
@@ -1,0 +2,698 @@
+Mon Jan 31 08:38:39 UTC 2022 - Fridrich Strba <fst...@suse.com>
+
+- Update to upstream tag jdk-11.0.14+9 (January 2022 CPU)
+  * New features
+    + JDK-8248238: Implementation: JEP 388: Windows AArch64 Support
+  * Security fixes
+    + JDK-8217375: jarsigner breaks old signature with long lines
+      in manifest
+    + JDK-8251329: (zipfs) Files.walkFileTree walks infinitely if
+      zip has dir named "." inside
+    + JDK-8264934, CVE-2022-21248, bnc#1194926: Enhance cross VM serialization
+    + JDK-8268488: More valuable DerValues
+    + JDK-8268494: Better inlining of inlined interfaces
+    + JDK-8268512: More content for ContentInfo
+    + JDK-8268795: Enhance digests of Jar files
+    + JDK-8268801: Improve PKCS attribute handling
+    + JDK-8268813, CVE-2022-21283, bnc#1194937: Better String matching
+    + JDK-8269151: Better construction of EncryptedPrivateKeyInfo
+    + JDK-8269944: Better HTTP transport redux
+    + JDK-8270386, CVE-2022-21291, bsc#1194925: Better verification
+      of scan methods
+    + JDK-8270392, CVE-2022-21293, bsc#1194935: Improve String
+      constructions
+    + JDK-8270416, CVE-2022-21294, bsc#1194934: Enhance construction
+      of Identity maps
+    + JDK-8270492, CVE-2022-21282, bsc#1194933: Better resolution of
+      URIs
+    + JDK-8270498, CVE-2022-21296, bsc#1194932: Improve SAX Parser
+      configuration management
+    + JDK-8270646, CVE-2022-21299, bsc#1194931: Improved scanning of
+      XML entities
+    + JDK-8270952, CVE-2022-21277, bsc#1194930: Improve TIFF file
+      handling
+    + JDK-8271962: Better TrueType font loading
+    + JDK-8271968: Better canonical naming
+    + JDK-8271987: Manifest improved manifest entries
+    + JDK-8272014, CVE-2022-21305, bsc#1194939: Better array
+      indexing
+    + JDK-8272026, CVE-2022-21340, bsc#1194940: Verify Jar
+      Verification
+    + JDK-8272236, CVE-2022-21341, bsc#1194941: Improve serial forms
+      for transport
+    + JDK-8272272: Enhance jcmd communication
+    + JDK-8272462: Enhance image handling
+    + JDK-8273290: Enhance sound handling
+    + JDK-8273756, CVE-2022-21360, bsc#1194929: Enhance BMP image
+      support
+    + JDK-8273838, CVE-2022-21365, bsc#1194928: Enhanced BMP
+      processing
+    + JDK-8274096, CVE-2022-21366, bsc#1194927: Improve decoding of
+      image files
+    + JDK-8279541: Improve HarfBuzz
+  * Other changes
+    + JDK-6849922: java/awt/Choice/ChoiceKeyEventReaction/
+      /ChoiceKeyEventReaction.html fails
+    + JDK-7105119: [TEST_BUG] [macosx] In test
+      UIDefaults.toString() must be called with the invokeLater()
+    + JDK-7151826: [TEST_BUG] [macosx] The test
+      javax/swing/JPopupMenu/4966112/bug4966112.java not for mac
+    + JDK-7179006: [macosx] Print-to-file doesn't work: printing to
+      the default printer instead
+    + JDK-8015602: [macosx] Test javax/swing/SpringLayout/4726194/
+      /bug4726194.java fails on MacOSX
+    + JDK-8034084: nsk.nsk/jvmti/ThreadStart/threadstart003 Wrong
+      number of thread end events
+    + JDK-8039261: [TEST_BUG]: There is not a minimal security
+      level in Java Preferences and the TestApplet.html is blocked.
+    + JDK-8047218: [TEST_BUG] java/awt/FullScreen/AltTabCrashTest/
+      /AltTabCrashTest.java fails with exception
+    + JDK-8075909: [TEST_BUG] The regression-swing case failed as
+      it does not have the 'Open' button when select 'subdir' folder
+      with NimbusLAF
+    + JDK-8078219: Verify lack of @test tag in files in java/net
+      test directory
+    + JDK-8080569: java/lang/ProcessBuilder/DestroyTest.java fails
+      with "RuntimeException: Process terminated prematurely"
+    + JDK-8081652: [TESTBUG] java/lang/management/ThreadMXBean/
+      /ThreadMXBeanStateTest.java timed out intermittently
+    + JDK-8129310: java/net/Socket/asyncClose/AsyncClose.java fails
+      intermittently
+    + JDK-8131745: java/lang/management/ThreadMXBean/
+      /AllThreadIds.java still fails intermittently
+    + JDK-8136517: [macosx] Test java/awt/Focus/8073453/
+      /AWTFocusTransitionTest.java fails on MacOSX
+    + JDK-8137101: [TEST_BUG] javax/swing/plaf/basic/BasicHTML/
+      /4251579/bug4251579.java failure due to timing
+    + JDK-8143021: [TEST_BUG] Test javax/swing/JColorChooser/
+      /Test6541987.java fails
+    + JDK-8159597: [TEST_BUG] closed/javax/swing/JPopupMenu/4760494/
+      /bug4760494.java leaves key pressed
+    + JDK-8159904: [TEST_BUG] Failure on solaris of
+      java/awt/Window/MultiWindowApp/MultiWindowAppTest.java
+    + JDK-8163086: java/awt/Window/TranslucentJAppletTest/
+      /TranslucentJAppletTest.java fails
+    + JDK-8165828: [TEST_BUG] The reg case: javax/swing/plaf/metal/
+      /MetalIcons/MetalHiDPIIconsTest.java failed as No Metal Look
+      and Feel
+    + JDK-8169953: JComboBox/8057893: ComboBoxEdited event is not
+      fired! on Windows
+    + JDK-8169954: JFileChooser/8021253: java.lang.RuntimeException:
+      Default button is not pressed
+    + JDK-8169959: javax/swing/JTable/6263446/bug6263446.java:
+      Table should be editing
+    + JDK-8171381: [TEST_BUG] [macos] javax/swing/JPopupMenu/
+      /7156657/bug7156657.java fails on OS X
+    + JDK-8171998: javax/swing/JMenu/4692443/bug4692443.java fails
+      on Windows
+    + JDK-8174819: java/nio/file/WatchService/LotsOfEvents.java
+      fails intermittently
+    + JDK-8179880: Refactor javax/security shell tests to plain
+      java tests
+    + JDK-8180568: Refactor javax/crypto shell tests to plain java
+      tests
+    + JDK-8180569: Refactor sun/security/krb5/ shell tests to plain
+      java tests
+    + JDK-8180571: Refactor sun/security/pkcs11 shell tests to
+      plain java tests and fix failures
+    + JDK-8180573: Refactor sun/security/tools shell tests to plain
+      java tests
+    + JDK-8187649: ArrayIndexOutOfBoundsException in
+      java.util.JapaneseImperialCalendar
+    + JDK-8190753: (zipfs): Accessing a large entry (> 2^31 bytes)
+      leads to a negative initial size for ByteArrayOutputStream
+    + JDK-8195703: BasicJDWPConnectionTest.java: 'App exited
+      unexpectedly with 2'
+    + JDK-8196096: javax/swing/JPopupMenu/6580930/bug6580930.java
+      fails
+    + JDK-8197560: test javax/swing/JTree/8003400/Test8003400.java
+      fails
+    + JDK-8197800: Test java/awt/Focus/NonFocusableWindowTest/
+      /NoEventsTest.java fails on Windows
+    + JDK-8197811: Test java/awt/Choice/PopupPosTest/
+      /PopupPosTest.java fails on Windows
+    + JDK-8198616: java/awt/Focus/6378278/InputVerifierTest.java
+      fails on mac
+    + JDK-8198617: java/awt/Focus/6382144/EndlessLoopTest.java
+      fails on mac
+    + JDK-8198619: java/awt/Focus/FocusTraversalPolicy/
+      /ButtonGroupLayoutTraversal/ButtonGroupLayoutTraversalTest.java
+      fails on mac
+    + JDK-8198623: java/awt/KeyboardFocusmanager/TypeAhead/
+      /EnqueueWithDialogButtonTest/EnqueueWithDialogButtonTest.java
+      fails on mac
+    + JDK-8198624: java/awt/KeyboardFocusmanager/TypeAhead/
+      /SubMenuShowTest/SubMenuShowTest.html fails on mac
+    + JDK-8199138: Add RISC-V support to Zero
+    + JDK-8199529: javax/swing/text/Utilities/8142966/
+      /SwingFontMetricsTest.java fails on windows
+    + JDK-8201224: Make string buffer size dynamic in
+      mlvmJvmtiUtils.c
+    + JDK-8202342: [Graal] fromTonga/nsk/jvmti/unit/
+      /FollowReferences/followref003/TestDescription.java fails with
+      "Location mismatch" errors
+    + JDK-8204161: [TESTBUG] auto failed with the "Applet thread
+      threw exception: java.lang.UnsupportedOperationException"
+      exception
+    + JDK-8206085: Refactor
+      langtools/tools/javac/versions/Versions.java
+    + JDK-8207936: TestZipFile failed with java.lang.AssertionError
+      exception
+    + JDK-8208242: Add @requires to vmTestbase/gc/g1 tests
+    + JDK-8209611: use C++ compiler for hotspot tests
+    + JDK-8210182: Remove macros for C compilation from vmTestBase
+      but non jvmti
+    + JDK-8210198: Clean up JNI_ENV_ARG for
+      vmTestbase/jvmti/Get[A-F] tests
+    + JDK-8210205: build fails on AIX in hotspot cpp tests (for
+      example getstacktr001.cpp)
+    + JDK-8210242: [TESTBUG] vmTestbase/nsk/stress/jni/
+      /jnistress001.java crashes with EXCEPTION_ACCESS_VIOLATION
+      on windows-x86
+    + JDK-8210353: Move java/util/Arrays/TimSortStackSize2.java
+      back to tier1
+    + JDK-8210385: Clean up JNI_ENV_ARG and factorize the macros
+      for vmTestbase/jvmti[A-N] tests
+    + JDK-8210392: assert(Compile::current()->live_nodes() <
+      Compile::current()->max_node_limit()) failed: Live Node limit
+      exceeded limit
+    + JDK-8210395: Add doc to SecurityTools.java
+    + JDK-8210429: Clean up JNI_ENV_ARG for
+      vmTestbase/jvmti/Get[G-Z] tests
+    + JDK-8210481: Remove #ifdef cplusplus from vmTestbase
+    + JDK-8210593: Clean up JNI_ENV_ARG and factorize the macros
+      for vmTestbase/jvmti[N-R] tests
+    + JDK-8210665: Clean up JNI_ENV_ARG and factorize the macros
+      for vmTestbase/jvmti[R-U] tests
+    + JDK-8210689: Remove the multi-line old C style for string
+      literals
+    + JDK-8210700: Clean up JNI_ENV_ARG and factorize the macros
+      for vmTestbase/jvmti/unit tests
+    + JDK-8210726: Fix up a few minor nits forgotten by JDK-8210665
+    + JDK-8210920: Native C++ tests are not using CXXFLAGS
+    + JDK-8210984: [TESTBUG] hs203t003 fails with "# ERROR:
+      hs203t003.cpp, 218: NSK_CPP_STUB2 ( ResumeThread, jvmti,
+      thread)"
+    + JDK-8211036: Remove the NSK_STUB macros from vmTestbase for
+      non jvmti
++++ 501 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes
++++ and 
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.1898/java-11-openjdk.changes

Old:
----
  jdk-11.0.13+8.tar.gz
  riscv64-zero.patch

New:
----
  jdk-11.0.14+9.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ java-11-openjdk.spec ++++++
--- /var/tmp/diff_new_pack.9DVEi4/_old  2022-02-03 23:17:16.548289493 +0100
+++ /var/tmp/diff_new_pack.9DVEi4/_new  2022-02-03 23:17:16.552289466 +0100
@@ -1,7 +1,7 @@
 #
 # spec file
 #
-# Copyright (c) 2021 SUSE LLC
+# Copyright (c) 2022 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -33,13 +33,13 @@
 # Standard JPackage naming and versioning defines.
 %global featurever      11
 %global interimver      0
-%global updatever       13
+%global updatever       14
 %global patchver        0
-%global datever         2021-10-19
-%global buildver        8
+%global datever         2022-01-18
+%global buildver        9
 %global openjdk_repo    jdk11u
-%global openjdk_tag     jdk-11.0.13+8
-%global openjdk_dir     jdk11u-jdk-11.0.13-8
+%global openjdk_tag     
jdk-%{featurever}.%{interimver}.%{updatever}+%{buildver}
+%global openjdk_dir     
%{openjdk_repo}-jdk-%{featurever}.%{interimver}.%{updatever}-%{buildver}
 # JavaEE modules
 %global java_atk_wrapper_version 0.33.2
 %global java_activation_repository activation
@@ -238,8 +238,7 @@
 #
 Patch500:       activation-module.patch
 Patch501:       annotation-module.patch
-#
-Patch600:       riscv64-zero.patch
+
 BuildRequires:  alsa-lib-devel
 BuildRequires:  autoconf
 BuildRequires:  automake
@@ -529,6 +528,7 @@
 %patch16 -p1
 %patch17 -p1
 %patch18 -p1
+
 %patch19 -p1
 
 %patch20 -p1
@@ -558,8 +558,6 @@
 %patch500
 %patch501
 
-%patch600 -p1
-
 # Extract systemtap tapsets
 
 %if %{with_systemtap}
@@ -1314,7 +1312,7 @@
 %{_jvmdir}/%{sdkdir}/lib/*/libjvm.so
 %{_jvmdir}/%{sdkdir}/lib/*/Xusage.txt
 
-%config(noreplace) %{_jvmdir}/%{sdkdir}/lib/security/blacklisted.certs
+%config(noreplace) %{_jvmdir}/%{sdkdir}/lib/security/blocked.certs
 %config(noreplace) %{_jvmdir}/%{sdkdir}/conf/security/nss.cfg
 %config(noreplace) %{_jvmdir}/%{sdkdir}/conf/security/nss.fips.cfg
 %{_jvmdir}/%{sdkdir}/lib/security/default.policy

++++++ fips.patch ++++++
--- /var/tmp/diff_new_pack.9DVEi4/_old  2022-02-03 23:17:16.700288455 +0100
+++ /var/tmp/diff_new_pack.9DVEi4/_new  2022-02-03 23:17:16.700288455 +0100
@@ -1,6 +1,6 @@
---- a/make/autoconf/libraries.m4
-+++ b/make/autoconf/libraries.m4
-@@ -101,6 +101,7 @@ AC_DEFUN_ONCE([LIB_SETUP_LIBRARIES],
+--- a/make/autoconf/libraries.m4       2022-01-19 07:14:06.470777835 +0100
++++ b/make/autoconf/libraries.m4       2022-01-19 07:14:30.810908184 +0100
+@@ -101,6 +101,7 @@
    LIB_SETUP_LIBFFI
    LIB_SETUP_BUNDLED_LIBS
    LIB_SETUP_MISC_LIBS
@@ -8,7 +8,7 @@
    LIB_SETUP_SOLARIS_STLPORT
    LIB_TESTS_SETUP_GRAALUNIT
  
-@@ -223,3 +224,62 @@ AC_DEFUN_ONCE([LIB_SETUP_SOLARIS_STLPORT],
+@@ -223,3 +224,62 @@
    fi
  ])
  
@@ -71,9 +71,9 @@
 +  fi
 +  AC_SUBST(USE_SYSCONF_NSS)
 +])
---- a/make/autoconf/spec.gmk.in
-+++ b/make/autoconf/spec.gmk.in
-@@ -828,6 +829,10 @@ INSTALL_SYSCONFDIR=@sysconfdir@
+--- a/make/autoconf/spec.gmk.in        2022-01-19 07:14:06.470777835 +0100
++++ b/make/autoconf/spec.gmk.in        2022-01-19 07:14:30.810908184 +0100
+@@ -824,6 +824,10 @@
  # Libraries
  #
  
@@ -84,13 +84,12 @@
  USE_EXTERNAL_LCMS:=@USE_EXTERNAL_LCMS@
  LCMS_CFLAGS:=@LCMS_CFLAGS@
  LCMS_LIBS:=@LCMS_LIBS@
---- a/make/lib/Lib-java.base.gmk
-+++ b/make/lib/Lib-java.base.gmk
-@@ -178,6 +178,31 @@ ifeq ($(OPENJDK_TARGET_OS_TYPE), unix)
-   endif
+--- a/make/lib/Lib-java.base.gmk       2022-01-19 07:14:06.522778112 +0100
++++ b/make/lib/Lib-java.base.gmk       2022-01-19 07:14:30.810908184 +0100
+@@ -179,6 +179,31 @@
  endif
  
-+################################################################################
+ 
################################################################################
 +# Create the systemconf library
 +
 +LIBSYSTEMCONF_CFLAGS :=
@@ -115,11 +114,12 @@
 +  TARGETS += $(BUILD_LIBSYSTEMCONF)
 +endif
 +
- 
################################################################################
++################################################################################
  # Create the symbols file for static builds.
  
---- a/make/nb_native/nbproject/configurations.xml
-+++ b/make/nb_native/nbproject/configurations.xml
+ ifeq ($(STATIC_BUILD), true)
+--- a/make/nb_native/nbproject/configurations.xml      2022-01-19 
07:14:06.526778135 +0100
++++ b/make/nb_native/nbproject/configurations.xml      2022-01-19 
07:14:30.814908206 +0100
 @@ -2950,6 +2950,9 @@
                    <in>LinuxWatchService.c</in>
                  </df>
@@ -130,21 +130,21 @@
              </df>
            </df>
            <df name="macosx">
-@@ -29301,6 +29304,11 @@
+@@ -29300,6 +29303,11 @@
+             ex="false"
              tool="0"
              flavor2="0">
-       </item>
++      </item>
 +      <item path="../../src/java.base/linux/native/libsystemconf/systemconf.c"
 +            ex="false"
 +            tool="0"
 +            flavor2="0">
-+      </item>
+       </item>
        <item path="../../src/java.base/macosx/native/include/jni_md.h"
              ex="false"
-             tool="3"
---- a/make/scripts/compare_exceptions.sh.incl
-+++ b/make/scripts/compare_exceptions.sh.incl
-@@ -179,6 +179,7 @@ if [ "$OPENJDK_TARGET_OS" = "solaris" ] && [ 
"$OPENJDK_TARGET_CPU" = "x86_64" ];
+--- a/make/scripts/compare_exceptions.sh.incl  2022-01-19 07:14:06.526778135 
+0100
++++ b/make/scripts/compare_exceptions.sh.incl  2022-01-19 07:14:30.814908206 
+0100
+@@ -179,6 +179,7 @@
        ./lib/libsplashscreen.so
        ./lib/libsunec.so
        ./lib/libsunwjdga.so
@@ -152,7 +152,7 @@
        ./lib/libunpack.so
        ./lib/libverify.so
        ./lib/libzip.so
-@@ -289,6 +290,7 @@ if [ "$OPENJDK_TARGET_OS" = "solaris" ] && [ 
"$OPENJDK_TARGET_CPU" = "sparcv9" ]
+@@ -289,6 +290,7 @@
        ./lib/libsplashscreen.so
        ./lib/libsunec.so
        ./lib/libsunwjdga.so
@@ -160,8 +160,8 @@
        ./lib/libunpack.so
        ./lib/libverify.so
        ./lib/libzip.so
---- /dev/null
-+++ b/src/java.base/linux/native/libsystemconf/systemconf.c
+--- a/src/java.base/linux/native/libsystemconf/systemconf.c    1970-01-01 
01:00:00.000000000 +0100
++++ b/src/java.base/linux/native/libsystemconf/systemconf.c    2022-01-19 
07:14:30.818908226 +0100
 @@ -0,0 +1,170 @@
 +/*
 + * Copyright (c) 2021, Red Hat, Inc.
@@ -333,9 +333,9 @@
 +        (*env)->CallVoidMethod(env, debugObj, debugPrintlnMethodID, jMsg);
 +    }
 +}
---- a/src/java.base/share/classes/java/security/Security.java
-+++ b/src/java.base/share/classes/java/security/Security.java
-@@ -32,6 +32,7 @@ import java.net.URL;
+--- a/src/java.base/share/classes/java/security/Security.java  2022-01-19 
07:14:06.678778949 +0100
++++ b/src/java.base/share/classes/java/security/Security.java  2022-01-19 
07:14:30.818908226 +0100
+@@ -32,6 +32,7 @@
  
  import jdk.internal.event.EventHelper;
  import jdk.internal.event.SecurityPropertyModificationEvent;
@@ -343,7 +343,7 @@
  import jdk.internal.misc.SharedSecrets;
  import jdk.internal.util.StaticProperty;
  import sun.security.util.Debug;
-@@ -74,6 +75,19 @@ public final class Security {
+@@ -74,6 +75,19 @@
      }
  
      static {
@@ -363,7 +363,7 @@
          // doPrivileged here because there are multiple
          // things in initialize that might require privs.
          // (the FileInputStream call and the File.exists call,
-@@ -193,29 +207,10 @@ public final class Security {
+@@ -193,29 +207,10 @@
          }
  
          String disableSystemProps = 
System.getProperty("java.security.disableSystemPropertiesFile");
@@ -396,8 +396,8 @@
              }
          }
  
---- /dev/null
-+++ b/src/java.base/share/classes/java/security/SystemConfigurator.java
+--- a/src/java.base/share/classes/java/security/SystemConfigurator.java        
1970-01-01 01:00:00.000000000 +0100
++++ b/src/java.base/share/classes/java/security/SystemConfigurator.java        
2022-01-19 07:14:30.818908226 +0100
 @@ -0,0 +1,236 @@
 +/*
 + * Copyright (c) 2019, 2021, Red Hat, Inc.
@@ -635,8 +635,8 @@
 +        }
 +    }
 +}
---- /dev/null
-+++ 
b/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
+--- 
a/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
  1970-01-01 01:00:00.000000000 +0100
++++ 
b/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
  2022-01-19 07:14:30.818908226 +0100
 @@ -0,0 +1,31 @@
 +/*
 + * Copyright (c) 2020, Red Hat, Inc.
@@ -669,9 +669,9 @@
 +    boolean isSystemFipsEnabled();
 +    boolean isPlainKeySupportEnabled();
 +}
---- a/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
-+++ b/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
-@@ -76,6 +76,7 @@ public class SharedSecrets {
+--- a/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java 
2022-01-19 07:14:06.706779099 +0100
++++ b/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java 
2022-01-19 07:14:30.818908226 +0100
+@@ -76,6 +76,7 @@
      private static JavaIORandomAccessFileAccess javaIORandomAccessFileAccess;
      private static JavaSecuritySignatureAccess javaSecuritySignatureAccess;
      private static JavaxCryptoSealedObjectAccess 
javaxCryptoSealedObjectAccess;
@@ -679,7 +679,7 @@
  
      public static JavaUtilJarAccess javaUtilJarAccess() {
          if (javaUtilJarAccess == null) {
-@@ -361,4 +362,12 @@ public class SharedSecrets {
+@@ -361,4 +362,12 @@
          }
          return javaxCryptoSealedObjectAccess;
      }
@@ -692,9 +692,9 @@
 +        return javaSecuritySystemConfiguratorAccess;
 +    }
  }
---- a/src/java.base/share/classes/module-info.java
-+++ b/src/java.base/share/classes/module-info.java
-@@ -182,6 +182,7 @@ module java.base {
+--- a/src/java.base/share/classes/module-info.java     2022-01-19 
07:14:06.650778799 +0100
++++ b/src/java.base/share/classes/module-info.java     2022-01-19 
07:14:30.818908226 +0100
+@@ -182,6 +182,7 @@
          java.security.jgss,
          java.sql,
          java.xml,
@@ -702,9 +702,9 @@
          jdk.jartool,
          jdk.attach,
          jdk.charsets,
---- a/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java
-+++ b/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java
-@@ -33,8 +33,13 @@ import java.security.KeyStore.*;
+--- a/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java  
2022-01-19 07:14:06.730779226 +0100
++++ b/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java  
2022-01-19 07:14:30.818908226 +0100
+@@ -33,8 +33,13 @@
  
  import javax.net.ssl.*;
  
@@ -718,7 +718,7 @@
      X509ExtendedKeyManager keyManager;
      boolean isInitialized;
  
-@@ -62,7 +67,8 @@ abstract class KeyManagerFactoryImpl extends 
KeyManagerFactorySpi {
+@@ -62,7 +67,8 @@
                  KeyStoreException, NoSuchAlgorithmException,
                  UnrecoverableKeyException {
              if ((ks != null) && SunJSSE.isFIPS()) {
@@ -728,7 +728,7 @@
                      throw new KeyStoreException("FIPS mode: KeyStore must be "
                          + "from provider " + 
SunJSSE.cryptoProvider.getName());
                  }
-@@ -91,8 +97,8 @@ abstract class KeyManagerFactoryImpl extends 
KeyManagerFactorySpi {
+@@ -91,8 +97,8 @@
                  keyManager = new X509KeyManagerImpl(
                          Collections.<Builder>emptyList());
              } else {
@@ -739,9 +739,9 @@
                      throw new KeyStoreException(
                          "FIPS mode: KeyStore must be " +
                          "from provider " + SunJSSE.cryptoProvider.getName());
---- a/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java
-+++ b/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java
-@@ -31,6 +31,7 @@ import java.security.*;
+--- a/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java 
2022-01-19 07:14:06.730779226 +0100
++++ b/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java 
2022-01-19 07:14:30.818908226 +0100
+@@ -31,6 +31,7 @@
  import java.security.cert.*;
  import java.util.*;
  import javax.net.ssl.*;
@@ -749,7 +749,7 @@
  import sun.security.action.GetPropertyAction;
  import sun.security.provider.certpath.AlgorithmChecker;
  import sun.security.validator.Validator;
-@@ -542,6 +543,23 @@ public abstract class SSLContextImpl extends 
SSLContextSpi {
+@@ -542,6 +543,23 @@
  
          static {
              if (SunJSSE.isFIPS()) {
@@ -773,7 +773,7 @@
                  supportedProtocols = Arrays.asList(
                      ProtocolVersion.TLS13,
                      ProtocolVersion.TLS12,
-@@ -556,6 +574,7 @@ public abstract class SSLContextImpl extends SSLContextSpi 
{
+@@ -556,6 +574,7 @@
                      ProtocolVersion.TLS11,
                      ProtocolVersion.TLS10
                  });
@@ -781,7 +781,7 @@
              } else {
                  supportedProtocols = Arrays.asList(
                      ProtocolVersion.TLS13,
-@@ -620,6 +639,16 @@ public abstract class SSLContextImpl extends 
SSLContextSpi {
+@@ -620,6 +639,16 @@
  
          static ProtocolVersion[] getSupportedProtocols() {
              if (SunJSSE.isFIPS()) {
@@ -798,7 +798,7 @@
                  return new ProtocolVersion[] {
                          ProtocolVersion.TLS13,
                          ProtocolVersion.TLS12,
-@@ -949,6 +978,16 @@ public abstract class SSLContextImpl extends 
SSLContextSpi {
+@@ -949,6 +978,16 @@
  
          static ProtocolVersion[] getProtocols() {
              if (SunJSSE.isFIPS()) {
@@ -815,9 +815,9 @@
                  return new ProtocolVersion[]{
                          ProtocolVersion.TLS13,
                          ProtocolVersion.TLS12,
---- a/src/java.base/share/classes/sun/security/ssl/SunJSSE.java
-+++ b/src/java.base/share/classes/sun/security/ssl/SunJSSE.java
-@@ -27,6 +27,8 @@ package sun.security.ssl;
+--- a/src/java.base/share/classes/sun/security/ssl/SunJSSE.java        
2022-01-19 07:14:06.730779226 +0100
++++ b/src/java.base/share/classes/sun/security/ssl/SunJSSE.java        
2022-01-19 07:14:30.818908226 +0100
+@@ -27,6 +27,8 @@
  
  import java.security.*;
  import java.util.*;
@@ -826,7 +826,7 @@
  import sun.security.rsa.SunRsaSignEntries;
  import static sun.security.util.SecurityConstants.PROVIDER_VER;
  import static sun.security.provider.SunEntries.createAliases;
-@@ -195,8 +197,13 @@ public abstract class SunJSSE extends 
java.security.Provider {
+@@ -195,8 +197,13 @@
              "sun.security.ssl.SSLContextImpl$TLS11Context", null, null);
          ps("SSLContext", "TLSv1.2",
              "sun.security.ssl.SSLContextImpl$TLS12Context", null, null);
@@ -840,13 +840,12 @@
          ps("SSLContext", "TLS",
              "sun.security.ssl.SSLContextImpl$TLSContext",
              (isfips? null : createAliases("SSL")), null);
---- a/src/java.base/share/conf/security/java.security
-+++ b/src/java.base/share/conf/security/java.security
-@@ -86,6 +86,14 @@ security.provider.tbd=Apple
- #endif
+--- a/src/java.base/share/conf/security/java.security  2022-01-19 
07:14:06.742779290 +0100
++++ b/src/java.base/share/conf/security/java.security  2022-01-19 
07:14:30.818908226 +0100
+@@ -87,6 +87,14 @@
  #security.provider.tbd=SunPKCS11 ${java.home}/lib/security/nss.cfg
  
-+#
+ #
 +# Security providers used when global crypto-policies are set to FIPS.
 +#
 +fips.provider.1=SunPKCS11 ${java.home}/conf/security/nss.fips.cfg
@@ -854,33 +853,24 @@
 +fips.provider.3=SunEC
 +fips.provider.4=com.sun.net.ssl.internal.ssl.Provider SunPKCS11-NSS-FIPS
 +
- #
++#
  # A list of preferred providers for specific algorithms. These providers will
  # be searched for matching algorithms before the list of registered providers.
-@@ -299,6 +307,11 @@ policy.ignoreIdentityScope=false
- #
+ # Entries containing errors (parsing, etc) will be ignored. Use the
+@@ -300,6 +308,11 @@
  keystore.type=pkcs12
  
-+#
+ #
 +# Default keystore type used when global crypto-policies are set to FIPS.
 +#
 +fips.keystore.type=PKCS11
 +
- #
++#
  # Controls compatibility mode for JKS and PKCS12 keystore types.
  #
---- a/src/java.base/share/lib/security/default.policy
-+++ b/src/java.base/share/lib/security/default.policy
-@@ -124,6 +124,7 @@ grant codeBase "jrt:/jdk.crypto.ec" {
- grant codeBase "jrt:/jdk.crypto.cryptoki" {
-     permission java.lang.RuntimePermission
-                    "accessClassInPackage.com.sun.crypto.provider";
-+    permission java.lang.RuntimePermission 
"accessClassInPackage.jdk.internal.misc";
-     permission java.lang.RuntimePermission
-                    "accessClassInPackage.sun.security.*";
-     permission java.lang.RuntimePermission "accessClassInPackage.sun.nio.ch";
---- /dev/null
-+++ 
b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
+ # When set to 'true', both JKS and PKCS12 keystore types support loading
+--- 
a/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
   1970-01-01 01:00:00.000000000 +0100
++++ 
b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
   2022-01-19 07:14:40.350959275 +0100
 @@ -0,0 +1,290 @@
 +/*
 + * Copyright (c) 2021, Red Hat, Inc.
@@ -1172,8 +1162,8 @@
 +        }
 +    }
 +}
---- a/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java
-+++ b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java
+--- a/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java 
2022-01-19 07:14:07.066781027 +0100
++++ b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java 
2022-01-19 07:17:44.400170510 +0100
 @@ -26,6 +26,9 @@
  package sun.security.pkcs11;
  
@@ -1184,16 +1174,15 @@
  import java.util.*;
  
  import java.security.*;
-@@ -42,6 +45,8 @@ import javax.security.auth.callback.ConfirmationCallback;
+@@ -41,6 +44,7 @@
  import javax.security.auth.callback.PasswordCallback;
- import javax.security.auth.callback.TextOutputCallback;
  
+ import jdk.internal.misc.InnocuousThread;
 +import jdk.internal.misc.SharedSecrets;
-+
  import sun.security.util.Debug;
  import sun.security.util.ResourcesMgr;
  import static sun.security.util.SecurityConstants.PROVIDER_VER;
-@@ -59,6 +64,29 @@ import static sun.security.pkcs11.wrapper.PKCS11Constants.*;
+@@ -58,6 +62,29 @@
   */
  public final class SunPKCS11 extends AuthProvider {
  
@@ -1223,7 +1212,7 @@
      private static final long serialVersionUID = -1354835039035306505L;
  
      static final Debug debug = Debug.getInstance("sunpkcs11");
-@@ -314,10 +342,15 @@ public final class SunPKCS11 extends AuthProvider {
+@@ -326,10 +353,15 @@
              // request multithreaded access first
              initArgs.flags = CKF_OS_LOCKING_OK;
              PKCS11 tmpPKCS11;
@@ -1240,7 +1229,7 @@
              } catch (PKCS11Exception e) {
                  if (debug != null) {
                      debug.println("Multi-threaded initialization failed: " + 
e);
-@@ -333,7 +366,7 @@ public final class SunPKCS11 extends AuthProvider {
+@@ -345,7 +377,7 @@
                      initArgs.flags = 0;
                  }
                  tmpPKCS11 = PKCS11.getInstance(library,
@@ -1249,7 +1238,7 @@
              }
              p11 = tmpPKCS11;
  
-@@ -373,6 +406,24 @@ public final class SunPKCS11 extends AuthProvider {
+@@ -385,6 +417,24 @@
              if (nssModule != null) {
                  nssModule.setProvider(this);
              }
@@ -1274,9 +1263,9 @@
          } catch (Exception e) {
              if (config.getHandleStartupErrors() == Config.ERR_IGNORE_ALL) {
                  throw new UnsupportedOperationException
---- 
a/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
-+++ 
b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
-@@ -49,6 +49,7 @@ package sun.security.pkcs11.wrapper;
+--- 
a/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java 
   2022-01-19 07:14:07.066781027 +0100
++++ 
b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java 
   2022-01-19 07:14:40.354959295 +0100
+@@ -49,6 +49,7 @@
  
  import java.io.File;
  import java.io.IOException;
@@ -1284,7 +1273,7 @@
  import java.util.*;
  
  import java.security.AccessController;
-@@ -150,16 +151,28 @@ public class PKCS11 {
+@@ -150,17 +151,29 @@
  
      public static synchronized PKCS11 getInstance(String pkcs11ModulePath,
              String functionList, CK_C_INITIALIZE_ARGS pInitArgs,
@@ -1298,25 +1287,24 @@
 +            boolean nssFipsMode = fipsKeyImporter != null;
              if ((pInitArgs != null)
                      && ((pInitArgs.flags & CKF_OS_LOCKING_OK) != 0)) {
--                pkcs11 = new PKCS11(pkcs11ModulePath, functionList);
 +                if (nssFipsMode) {
 +                    pkcs11 = new FIPSPKCS11(pkcs11ModulePath, functionList,
 +                            fipsKeyImporter);
 +                } else {
-+                    pkcs11 = new PKCS11(pkcs11ModulePath, functionList);
+                 pkcs11 = new PKCS11(pkcs11ModulePath, functionList);
 +                }
-             } else {
--                pkcs11 = new SynchronizedPKCS11(pkcs11ModulePath, 
functionList);
++            } else {
 +                if (nssFipsMode) {
 +                    pkcs11 = new SynchronizedFIPSPKCS11(pkcs11ModulePath,
 +                            functionList, fipsKeyImporter);
-+                } else {
-+                    pkcs11 = new SynchronizedPKCS11(pkcs11ModulePath, 
functionList);
-+                }
+             } else {
+                 pkcs11 = new SynchronizedPKCS11(pkcs11ModulePath, 
functionList);
              }
++            }
              if (omitInitialize == false) {
                  try {
-@@ -1909,4 +1922,69 @@ static class SynchronizedPKCS11 extends PKCS11 {
+                     pkcs11.C_Initialize(pInitArgs);
+@@ -1909,4 +1922,69 @@
          super.C_GenerateRandom(hSession, randomData);
      }
  }

++++++ jdk-11.0.13+8.tar.gz -> jdk-11.0.14+9.tar.gz ++++++
/work/SRC/openSUSE:Factory/java-11-openjdk/jdk-11.0.13+8.tar.gz 
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.1898/jdk-11.0.14+9.tar.gz 
differ: char 15, line 1

Reply via email to