Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package java-11-openjdk for openSUSE:Factory
checked in at 2023-10-19 22:47:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/java-11-openjdk (Old)
and /work/SRC/openSUSE:Factory/.java-11-openjdk.new.1945 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "java-11-openjdk"
Thu Oct 19 22:47:27 2023 rev:67 rq:1118622 version:11.0.21.0
Changes:
--------
--- /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes
2023-09-25 20:01:20.646138985 +0200
+++
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.1945/java-11-openjdk.changes
2023-10-19 22:49:55.476101257 +0200
@@ -1,0 +2,358 @@
+Wed Oct 18 11:32:34 UTC 2023 - Andreas Schwab <[email protected]>
+
+- Configure with --with-native-debug-symbols=internal to enable
+ generation of debuginfo packages
+
+-------------------------------------------------------------------
+Wed Oct 18 11:01:50 UTC 2023 - Fridrich Strba <[email protected]>
+
+- Upgrade to upstrem tag jdk-11.0.21+9 (October 2023 CPU)
+ * Security fixes:
+ + JDK-8242330: Arrays should be cloned in several JAAS Callback
+ classes
+ + JDK-8284910: Buffer clean in PasswordCallback
+ + JDK-8286503: Enhance security classes
+ + JDK-8296581: Better system proxy support
+ + JDK-8297856: Improve handling of Bidi characters
+ + JDK-8309966, CVE-2023-22081, bsc#1216374: Enhanced TLS
+ connections
+ + JDK-8305815: Update Libpng to 1.6.39
+ + JDK-8306881: Update FreeType to 2.13.0
+ * Other fixes:
+ + JDK-6176679: Application freezes when copying an animated gif
+ image to the system clipboard
+ + JDK-8023980: JCE doesn't provide any class to handle RSA
+ private key in PKCS#1
+ + JDK-8155246: Throw error if default java.security file is
+ missing
+ + JDK-8158880: test/java/time/tck/java/time/format/
+ /TCKDateTimeFormatterBuilder.java fail with zh_CN locale
+ + JDK-8168261: Use server cipher suites preference by default
+ + JDK-8181383: com/sun/jdi/OptionTest.java fails intermittently
+ with bind failed: Address already in use
+ + JDK-8201516: DebugNonSafepoints generates incorrect
+ information
+ + JDK-8209398: sun/security/pkcs11/KeyStore/SecretKeysBasic.sh
+ failed with "PKCS11Exception: CKR_ATTRIBUTE_SENSITIVE"
+ + JDK-8211343: nsk_jvmti_parseoptions should handle multiple
+ suboptions
+ + JDK-8212045: Add back the tests that were removed from
+ HashesTest.java and AddExportsTest.java
+ + JDK-8216059: nsk_jvmti_parseoptions still has dependency on
+ tilde separator
+ + JDK-8217237: HttpClient does not deal well with multi-valued
+ WWW-Authenticate challenge headers
+ + JDK-8217395: Update langtools shell tests to use ${EXE_SUFFIX}
+ + JDK-8217612: (CL)HSDB cannot show some JVM flags
+ + JDK-8217850: CompressedClassSpaceSizeInJmapHeap fails after
+ JDK-8217612
+ + JDK-8218471: generate-unsafe-access-tests.sh does not
+ correctly invoke build.tools.spp.Spp
+ + JDK-8219628: [TESTBUG] javadoc/doclet/InheritDocForUserTags
+ fails with -othervm
+ + JDK-8220410: sun/security/tools/jarsigner/warnings/
+ /NoTimestampTest.java failed with missing expected output
+ + JDK-8221372: Test vmTestbase/nsk/jvmti/GetThreadState/
+ /thrstat001/TestDescription.java times out
+ + JDK-8222323: ChildAlwaysOnTopTest.java fails with
+ "RuntimeException: Failed to unset alwaysOnTop"
+ + JDK-8223573: Replace wildcard address with loopback or local
+ host in tests - part 4
+ + JDK-8223714: HTTPSetAuthenticatorTest could be made more
+ resilient
+ + JDK-8223783: sun/net/www/http/HttpClient/MultiThreadTest.java
+ sometimes detect threads+1 connections
+ + JDK-8223856: Replace wildcard address with loopback or local
+ host in tests - part 8
+ + JDK-8224617: (fs) java/nio/file/FileStore/Basic.java found
+ filesystem twice
+ + JDK-8224729: Cleanups in sun/security/provider/certpath/ldap/
+ /LDAPCertStoreImpl.java
+ + JDK-8224768: Test ActalisCA.java fails
+ + JDK-8225012: sanity/client/SwingSet/src/ToolTipDemoTest.java
+ fails on Windows
+ + JDK-8226221: Update PKCS11 tests to use NSS 3.46 libs
+ + JDK-8228341: SignTwice.java fails intermittently on Windows
+ + JDK-8228403: SignTwice.java failed with
+ java.io.FileNotFoundException: File name too long
+ + JDK-8229147: Linux os::create_thread() overcounts guardpage
+ size with newer glibc (>=2.27)
+ + JDK-8229333: java/io/File/SetLastModified.java timed out
+ + JDK-8229338: clean up
+ test/jdk/java/util/RandomAccess/Basic.java
+ + JDK-8229348: java/net/DatagramSocket/
+ /UnreferencedDatagramSockets.java fails intermittently
+ + JDK-8229481: sun/net/www/protocol/https/
+ /ChunkedOutputStream.java failed with a SSLException
+ + JDK-8229912: [TESTBUG] java/net/Socks/SocksIPv6Test fails
+ without IPv6
+ + JDK-8230132: java/net/NetworkInterface/
+ /NetworkInterfaceRetrievalTests.java to skip Teredo Tunneling
+ Pseudo-Interface
+ + JDK-8231037: java/net/InetAddress/ptr/Lookup.java fails
+ intermittently due to reverse lookup failed
+ + JDK-8231357: sun/security/pkcs11/Cipher/TestKATForGCM.java
+ fails on SLES11 using mozilla-nss-3.14
+ + JDK-8231516: network QuickAckTest.java failed due to
+ "SocketException: maximum number of DatagramSockets reached"
+ + JDK-8232101: (sctp) Add minimal sanity tests for SCTP
+ + JDK-8232195: Enable BigInteger tests: DivisionOverflow,
+ SymmetricRangeTests and StringConstructorOverflow
+ + JDK-8232840: java/math/BigInteger/largeMemory/
+ /SymmetricRangeTests.java fails due to "OutOfMemoryError:
+ Requested array size exceeds VM limit"
+ + JDK-8232922: Add java/math/BigInteger/largeMemory/
+ /SymmetricRangeTests.java to ProblemList-Xcomp
+ + JDK-8234808: jdb quoted option parsing broken
+ + JDK-8236045: [TESTBUG] MismatchedWhiteBox test fails with
+ missing WhiteBox$WhiteBoxPermission.class
+ + JDK-8237183: Bug ID missing for test in patch which fixed
+ JDK-8230665
+ + JDK-8238157: security/infra/java/security/cert/
+ /CertPathValidator/certification/AmazonCA.java test failures
+ because of revocation date
+ + JDK-8239007: java/math/BigInteger/largeMemory/ tests should
+ be disabled on 32-bit platforms
+ + JDK-8239264: Clearup the legacy ObjectIdentifier constructor
+ from int array
+ + JDK-8239333: Mark test AmazonCA.java with intermittent key
+ + JDK-8239537: cgroup MetricsTester testMemorySubsystem fails
+ sometimes when testing memory.kmem.tcp.usage_in_bytes
+ + JDK-8240193: loadLibrary("osxsecurity") should not be removed
+ + JDK-8241097: java/math/BigInteger/largeMemory/
+ /SymmetricRangeTests.java requires -XX:+CompactStrings
+ + JDK-8242151: Improve OID mapping and reuse among JDK security
+ providers for aliases registration
+ + JDK-8242897: KeyFactory.generatePublic( x509Spec ) failed
+ with java.security.InvalidKeyException
+ + JDK-8243210: ClhsdbScanOops fails with NullPointerException
+ in FileMapHeader.inCopiedVtableSpace
+ + JDK-8244078: ProcessTools executeTestJvm and
+ createJavaProcessBuilder have inconsistent handling of
+ test.*.opts
+ + JDK-8247895: SHA1PRNGReseed.java is calling setSeed(0)
+ + JDK-8247968: test/jdk/javax/crypto/SecretKeyFactory/
+ /security.properties has wrong header
+ + JDK-8248001: javadoc generates invalid HTML pages whose
+ ftp:// links are broken
+ + JDK-8249699: java/io/ByteArrayOutputStream/MaxCapacity.java
+ should use @requires instead of @ignore
+ + JDK-8251517: [TESTBUG] com/sun/net/httpserver/bugs/
+ /B6393710.java does not scale socket timeout
+ + JDK-8252530: Fix inconsistencies in hotspot whitebox
+ + JDK-8254350: CompletableFuture.get may swallow
+ InterruptedException
+ + JDK-8255348: NPE in PKIXCertPathValidator event logging code
+ + JDK-8257993: vmTestbase/nsk/jvmti/RedefineClasses/
+ /StressRedefine/TestDescription.java crash intermittently
+ + JDK-8259796: timed CompletableFuture.get may swallow
+ InterruptedException
+ + JDK-8260274: Cipher.init(int, key) does not use highest
+ priority provider for random bytes
+ + JDK-8260878: com/sun/jdi/JdbOptions.java fails without jfr
+ + JDK-8260934: java/lang/StringBuilder/HugeCapacity.java fails
+ without Compact Strings
+ + JDK-8263970: Manual test javax/swing/JTextField/
+ /JapaneseReadingAttributes/JapaneseReadingAttributes.java
+ failed
+ + JDK-8265980: Fix systemDictionary and loaderConstraints
+ printing
+ + JDK-8268457: XML Transformer outputs Unicode supplementary
+ character incorrectly to HTML
+ + JDK-8268464: Remove dependancy of TestHttpsServer,
+ HttpTransaction, HttpCallback from
+ open/test/jdk/sun/net/www/protocol/https/ tests
+ + JDK-8269091: javax/sound/sampled/Clip/SetPositionHang.java
+ failed with ArrayIndexOutOfBoundsException: Array index out of
+ range: -4
+ + JDK-8270331: [TESTBUG] Error: Not a test or directory
+ containing tests: java/awt/print/PrinterJob/InitToBlack.java
+ + JDK-8271838: AmazonCA.java interop test fails
+ + JDK-8273807: Zero: Drop incorrect test block from
+ compiler/startup/NumCompilerThreadsCheck.java
+ + JDK-8274205: Handle KDC_ERR_SVC_UNAVAILABLE error code from
+ KDC
+ + JDK-8274606: Fix jaxp/javax/xml/jaxp/unittest/transform/
+ /SurrogateTest.java test
+ + JDK-8275234: java/awt/GraphicsDevice/DisplayModes/
+ /CycleDMImage.java is entered twice in ProblemList
+ + JDK-8275303: sun/java2d/pipe/InterpolationQualityTest.java
+ fails with D3D basic render driver
+ + JDK-8276651: java/lang/ProcessHandle tests fail with
+ "RuntimeException: Input/output error" in
+ java.lang.ProcessHandleImpl$Info.info0
+ + JDK-8277353: java/security/MessageDigest/
+ /ThreadSafetyTest.java test times out
+ + JDK-8279536: jdk/nio/zipfs/ZipFSOutputStreamTest.java timed
+ out
+ + JDK-8283756: (zipfs) ZipFSOutputStreamTest.testOutputStream
+ should only check inflated bytes
+ + JDK-8284524: Create an automated test for JDK-4422362
+ + JDK-8284767: Create an automated test for JDK-4422535
+ + JDK-8284772: GHA: Use GCC Major Version Dependencies Only
+ + JDK-8285635: javax/swing/JRootPane/DefaultButtonTest.java
+ failed with Default Button not pressed for L&F:
+ com.sun.java.swing.plaf.motif.MotifLookAndFeel
+ + JDK-8286172: Create an automated test for JDK-4516019
+ + JDK-8286481: Exception printed to stdout on Windows when
+ storing transparent image in clipboard
+ + JDK-8286620: Create regression test for verifying setMargin()
+ of JRadioButton
+ + JDK-8289508: Improve test coverage for XPath Axes: ancestor,
+ ancestor-or-self, preceding, and preceding-sibling
+ + JDK-8289748: C2 compiled code crashes with SIGFPE with
+ -XX:+StressLCM and -XX:+StressGCM
+ + JDK-8291444: GHA builds/tests won't run manually if disabled
+ from automatic running
+ + JDK-8291830: jvmti/RedefineClasses/StressRedefine failed:
+ assert(!is_null(v)) failed: narrow klass value can never be
+ zero
+ + JDK-8292033: Move jdk.X509Certificate event logic to JCA layer
+ + JDK-8292297: Fix up loading of override java.security
+ properties file
+ + JDK-8292443: Weak CAS VarHandle/Unsafe tests should test
+ always-failing cases
+ + JDK-8293180: JQuery UI license file not updated
+ + JDK-8293562: KeepAliveCache Blocks Threads while Closing
+ Connections
+ + JDK-8293657: sun/management/jmxremote/bootstrap/
+ /RmiBootstrapTest.java#id1 failed with "SSLHandshakeException:
+ Remote host terminated the handshake"
+ + JDK-8293858: Change PKCS7 code to use default SecureRandom
+ impl instead of SHA1PRNG
+ + JDK-8295737: macOS: Print content cut off when width > height
+ with portrait orientation
+ + JDK-8295894: Remove SECOM certificate that is expiring in
+ September 2023
+ + JDK-8296084: javax/swing/JSpinner/4788637/bug4788637.java
+ fails intermittently on a VM
+ + JDK-8297437: javadoc cannot link to old docs (with old style
+ anchors)
+ + JDK-8297523: Various GetPrimitiveArrayCritical miss result -
+ NULL check
+ + JDK-8297587: Upgrade JLine to 3.22.0
+ + JDK-8297681: Unnecessary color conversion during
+ 4BYTE_ABGR_PRE to INT_ARGB_PRE blit
+ + JDK-8297730: C2: Arraycopy intrinsic throws incorrect
+ exception
+ + JDK-8297887: Update Siphash
+ + JDK-8297923: java.awt.ScrollPane broken after multiple scroll
+ up/down
+ + JDK-8297955: LDAP CertStore should use LdapName and not
+ String for DNs
+ + JDK-8298921: Create a regression test for JDK-8139581
+ + JDK-8298974: Add ftcolor.c to imported freetype sources
+ + JDK-8299424: containers/docker/TestMemoryWithCgroupV1.java
+ fails on SLES12 ppc64le when testing Memory and Swap Limit
+ + JDK-8299658: C1 compilation crashes in
+ LinearScan::resolve_exception_edge
+ + JDK-8299713: Test javax/swing/JTableHeader/6889007/
+ /bug6889007.java failed: Wrong type of cursor
+ + JDK-8300098: java/util/concurrent/ConcurrentHashMap/
+ /ConcurrentAssociateTest.java fails with internal timeout when
+ executed with TieredCompilation1/3
+ + JDK-8300659: Refactor TestMemoryAwareness to use WhiteBox api
+ for host values
+ + JDK-8300751: [17u] Remove duplicate entry in javac.properties
+ + JDK-8301269: Update Commons BCEL to Version 6.7.0
+ + JDK-8301491: C2: java.lang.StringUTF16::indexOfChar intrinsic
+ called with negative character argument
+ + JDK-8301700: Increase the default TLS Diffie-Hellman group
+ size from 1024-bit to 2048-bit
+ + JDK-8301959: Compile command in
+ compiler.loopopts.TestRemoveEmptyCountedLoop does not work
+ + JDK-8302161: Upgrade jQuery UI to version 1.13.2
+ + JDK-8302182: Update Public Suffix List to 88467c9
+ + JDK-8303511: C2: assert(get_ctrl(n) == cle_out) during
+ unrolling
+ + JDK-8303809: Dispose context in SPNEGO NegotiatorImpl
+ + JDK-8304054: Linux: NullPointerException from
+ FontConfiguration.getVersion in case no fonts are installed
+ + JDK-8304498: JShell does not switch to raw mode when there is
+ no /bin/test
+ + JDK-8304867: Explicitly disable dtrace for ppc builds
+ + JDK-8305074: ProblemList
+ javax/net/ssl/DTLS/RespondToRetransmit.java
+ + JDK-8305421: Work around JDK-8305420 in CDSJDITest.java
+ + JDK-8305763: Parsing a URI with an underscore goes through a
+ silent exception, negatively impacting performance
+ + JDK-8305766: ProblemList runtime/CompressedOops/
+ /CompressedClassPointers.java
+ + JDK-8305950: Have -XshowSettings option display tzdata version
+ + JDK-8306133: Open source few AWT Drag & Drop related tests
+ + JDK-8306137: Open source several AWT ScrollPane related tests
+ + JDK-8306484: Open source several AWT Choice jtreg tests
+ + JDK-8306636: Disable compiler/c2/Test6905845.java with
+ -XX:TieredStopAtLevel=3
+ + JDK-8306638: Open source some AWT tests related to
+ datatransfer and Toolkit
+ + JDK-8306682: Open source a few more AWT Choice tests
+ + JDK-8306718: Optimize and opensource some old AWT tests
+ + JDK-8306954: Open source five Focus related tests
+ + JDK-8306955: Open source several JComboBox jtreg tests
+ + JDK-8307078: Opensource and clean up five more AWT Focus
+ related tests
+ + JDK-8307080: Open source some more JComboBox jtreg tests
+ + JDK-8307128: Open source some drag and drop tests 4
+ + JDK-8307133: Open source some JTable jtreg tests
++++ 61 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes
++++ and
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.1945/java-11-openjdk.changes
Old:
----
jdk-11.0.20.1+1.tar.gz
New:
----
jdk-11.0.21+9.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ java-11-openjdk.spec ++++++
--- /var/tmp/diff_new_pack.4jEyf6/_old 2023-10-19 22:49:58.896225301 +0200
+++ /var/tmp/diff_new_pack.4jEyf6/_new 2023-10-19 22:49:58.900225447 +0200
@@ -20,6 +20,7 @@
%{!?arm6:%global arm6 armv3l armv4b armv4l armv4tl armv5b armv5l armv5teb
armv5tel armv5tejl armv6l armv6hl}
%global jit_arches %{ix86} x86_64 ppc64 ppc64le %{aarch64} %{arm} s390x
%global debug 0
+%global make make
%if 0%{?suse_version} > 1500
%global add_back_javaee_modules 0
%else
@@ -37,9 +38,8 @@
# Standard JPackage naming and versioning defines.
%global featurever 11
%global interimver 0
-%global updatever 20
-%global patchver 1
-%global buildver 1
+%global updatever 21
+%global buildver 9
%global openjdk_repo jdk11u
%global openjdk_tag
jdk-%{featurever}.%{interimver}.%{updatever}%{?patchver:.%{patchver}}+%{buildver}
%global openjdk_dir
%{openjdk_repo}-jdk-%{featurever}.%{interimver}.%{updatever}%{?patchver:.%{patchver}}-%{buildver}
@@ -345,9 +345,9 @@
# java.io.FileNotFoundException: /usr/lib64/libnss3.so
#was bnc#634793
Requires: mozilla-nss
-Requires(post): java-ca-certificates
# Post requires update-alternatives to install tool update-alternatives.
Requires(post): update-alternatives
+Requires(posttrans):java-ca-certificates
# Postun requires update-alternatives to uninstall tool update-alternatives.
Requires(postun):update-alternatives
Recommends: tzdata-java8
@@ -579,12 +579,17 @@
EXTRA_CPP_FLAGS="-Wno-error"
%ifarch ppc64 ppc64le ppc
-EXTRA_CFLAGS="$EXTRA_CFLAGS -fno-strict-aliasing"
+EXTRA_CFLAGS="${EXTRA_CFLAGS} -fno-strict-aliasing"
%endif
%if 0%{?suse_version} >= 1330
-EXTRA_CFLAGS="$EXTRA_CFLAGS -Wno-error -std=gnu++98
-fno-delete-null-pointer-checks -fno-lifetime-dse -fpermissive"
-EXTRA_CPP_FLAGS="$EXTRA_CPP_FLAGS -Wno-error -std=gnu++98
-fno-delete-null-pointer-checks -fno-lifetime-dse"
+EXTRA_CFLAGS="${EXTRA_CFLAGS} -fno-delete-null-pointer-checks
-fno-lifetime-dse -fpermissive"
+EXTRA_CPP_FLAGS="${EXTRA_CPP_FLAGS} -std=gnu++98
-fno-delete-null-pointer-checks -fno-lifetime-dse"
+%endif
+
+%ifarch %{ix86}
+EXTRA_CFLAGS="${EXTRA_CFLAGS} -mstackrealign -mincoming-stack-boundary=2
-mpreferred-stack-boundary=4"
+EXTRA_CPP_FLAGS="${EXTRA_CPP_FLAGS} -mstackrealign -mincoming-stack-boundary=2
-mpreferred-stack-boundary=4"
%endif
mkdir -p %{buildoutputdir}
@@ -611,6 +616,7 @@
%endif
--disable-keep-packaged-modules \
--with-debug-level=%{debugbuild} \
+ --with-native-debug-symbols=internal \
--enable-sysconf-nss \
--with-zlib=system \
--with-libjpeg=system \
@@ -630,8 +636,8 @@
%ifarch x86_64
--with-jvm-features=zgc,shenandoahgc \
%endif
- --with-extra-cxxflags="$EXTRA_CPP_FLAGS" \
- --with-extra-cflags="$EXTRA_CFLAGS" \
+ --with-extra-cxxflags="${EXTRA_CPP_FLAGS}" \
+ --with-extra-cflags="${EXTRA_CFLAGS}" \
--disable-javac-server
# The combination of FULL_DEBUG_SYMBOLS=0 and ALT_OBJCOPY=/does_not_exist
@@ -639,7 +645,7 @@
# STRIP_POLICY=none says don't do any stripping. DEBUG_BINARIES=true says
# ignore all the other logic about which debug options and just do '-g'.
-make \
+%{make} \
JAVAC_FLAGS=-g \
LOG=trace \
DEBUG_BINARIES=true \
@@ -1014,7 +1020,7 @@
fi
# remove the default empty cacert file, if it's installed
-if [ 0`stat -c "%{s}" %{cacerts} 2>/dev/null` = "032" ] ; then
+if [ 0`stat -c "%%s" %{cacerts} 2>/dev/null` = "032" ] ; then
rm -f %{cacerts}
fi
++++++ adlc-parser.patch ++++++
--- /var/tmp/diff_new_pack.4jEyf6/_old 2023-10-19 22:49:58.996228929 +0200
+++ /var/tmp/diff_new_pack.4jEyf6/_new 2023-10-19 22:49:59.000229074 +0200
@@ -1,10 +1,22 @@
---- jdk10/src/hotspot/share/adlc/formsopt.cpp 2014-07-03 21:56:12.000000000
+0200
-+++ jdk10/src/hotspot/share/adlc/formsopt.cpp 2014-07-14 11:43:21.900408570
+0200
-@@ -347,6 +347,7 @@
+--- a/src/hotspot/share/adlc/formsopt.cpp
++++ b/src/hotspot/share/adlc/formsopt.cpp
+@@ -427,6 +427,11 @@ void AllocClass::output(FILE *fp) { // Write info
to output files
+ //==============================Frame
Handling=================================
+
//------------------------------FrameForm--------------------------------------
+ FrameForm::FrameForm() {
++ _sync_stack_slots = NULL;
++ _inline_cache_reg = NULL;
++ _interpreter_method_oop_reg = NULL;
++ _interpreter_frame_pointer_reg = NULL;
++ _cisc_spilling_operand_name = NULL;
+ _frame_pointer = NULL;
+ _c_frame_pointer = NULL;
+ _alignment = NULL;
+@@ -438,7 +443,6 @@ FrameForm::FrameForm() {
+ _c_calling_convention = NULL;
_return_value = NULL;
_c_return_value = NULL;
- _interpreter_frame_pointer_reg = NULL;
-+ _cisc_spilling_operand_name = NULL;
+- _interpreter_frame_pointer_reg = NULL;
}
FrameForm::~FrameForm() {
++++++ config.guess ++++++
--- /var/tmp/diff_new_pack.4jEyf6/_old 2023-10-19 22:49:59.020229799 +0200
+++ /var/tmp/diff_new_pack.4jEyf6/_new 2023-10-19 22:49:59.024229945 +0200
@@ -4,7 +4,7 @@
# shellcheck disable=SC2006,SC2268 # see below for rationale
-timestamp='2023-07-20'
+timestamp='2023-08-22'
# This file is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
@@ -155,6 +155,9 @@
set_cc_for_build
cat <<-EOF > "$dummy.c"
+ #if defined(__ANDROID__)
+ LIBC=android
+ #else
#include <features.h>
#if defined(__UCLIBC__)
LIBC=uclibc
@@ -169,6 +172,7 @@
LIBC=musl
#endif
#endif
+ #endif
EOF
cc_set_libc=`$CC_FOR_BUILD -E "$dummy.c" 2>/dev/null | grep '^LIBC' |
sed 's, ,,g'`
eval "$cc_set_libc"
@@ -904,7 +908,7 @@
fi
;;
*:FreeBSD:*:*)
- UNAME_PROCESSOR=`/usr/bin/uname -p`
+ UNAME_PROCESSOR=`uname -p`
case $UNAME_PROCESSOR in
amd64)
UNAME_PROCESSOR=x86_64 ;;
++++++ config.sub ++++++
--- /var/tmp/diff_new_pack.4jEyf6/_old 2023-10-19 22:49:59.036230379 +0200
+++ /var/tmp/diff_new_pack.4jEyf6/_new 2023-10-19 22:49:59.040230525 +0200
@@ -4,7 +4,7 @@
# shellcheck disable=SC2006,SC2268 # see below for rationale
-timestamp='2023-07-31'
+timestamp='2023-09-19'
# This file is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
@@ -1181,7 +1181,7 @@
case $cpu in
1750a | 580 \
| a29k \
- | aarch64 | aarch64_be \
+ | aarch64 | aarch64_be | aarch64c | arm64ec \
| abacus \
| alpha | alphaev[4-8] | alphaev56 | alphaev6[78] \
| alpha64 | alpha64ev[4-8] | alpha64ev56 |
alpha64ev6[78] \
@@ -1200,6 +1200,7 @@
| d10v | d30v | dlx | dsp16xx \
| e2k | elxsi | epiphany \
| f30[01] | f700 | fido | fr30 | frv | ft32 | fx80 \
+ | javascript \
| h8300 | h8500 \
| hppa | hppa1.[01] | hppa2.0 | hppa2.0[nw] | hppa64 \
| hexagon \
@@ -1284,11 +1285,12 @@
# Decode manufacturer-specific aliases for certain operating systems.
-if test x$basic_os != x
+if test x"$basic_os" != x
then
# First recognize some ad-hoc cases, or perhaps split kernel-os, or else just
# set os.
+obj=
case $basic_os in
gnu/linux*)
kernel=linux
@@ -1488,10 +1490,16 @@
os=eabi
;;
*)
- os=elf
+ os=
+ obj=elf
;;
esac
;;
+ aout* | coff* | elf* | pe*)
+ # These are machine code file formats, not OSes
+ obj=$os
+ os=
+ ;;
*)
# No normalization, but not necessarily accepted, that comes
below.
;;
@@ -1510,12 +1518,15 @@
# system, and we'll never get to this point.
kernel=
+obj=
case $cpu-$vendor in
score-*)
- os=elf
+ os=
+ obj=elf
;;
spu-*)
- os=elf
+ os=
+ obj=elf
;;
*-acorn)
os=riscix1.2
@@ -1525,28 +1536,35 @@
os=gnu
;;
arm*-semi)
- os=aout
+ os=
+ obj=aout
;;
c4x-* | tic4x-*)
- os=coff
+ os=
+ obj=coff
;;
c8051-*)
- os=elf
+ os=
+ obj=elf
;;
clipper-intergraph)
os=clix
;;
hexagon-*)
- os=elf
+ os=
+ obj=elf
;;
tic54x-*)
- os=coff
+ os=
+ obj=coff
;;
tic55x-*)
- os=coff
+ os=
+ obj=coff
;;
tic6x-*)
- os=coff
+ os=
+ obj=coff
;;
# This must come before the *-dec entry.
pdp10-*)
@@ -1568,19 +1586,24 @@
os=sunos3
;;
m68*-cisco)
- os=aout
+ os=
+ obj=aout
;;
mep-*)
- os=elf
+ os=
+ obj=elf
;;
mips*-cisco)
- os=elf
+ os=
+ obj=elf
;;
mips*-*)
- os=elf
+ os=
+ obj=elf
;;
or32-*)
- os=coff
+ os=
+ obj=coff
;;
*-tti) # must be before sparc entry or we get the wrong os.
os=sysv3
@@ -1589,7 +1612,8 @@
os=sunos4.1.1
;;
pru-*)
- os=elf
+ os=
+ obj=elf
;;
*-be)
os=beos
@@ -1670,10 +1694,12 @@
os=uxpv
;;
*-rom68k)
- os=coff
+ os=
+ obj=coff
;;
*-*bug)
- os=coff
+ os=
+ obj=coff
;;
*-apple)
os=macos
@@ -1691,7 +1717,8 @@
fi
-# Now, validate our (potentially fixed-up) OS.
+# Now, validate our (potentially fixed-up) individual pieces (OS, OBJ).
+
case $os in
# Sometimes we do "kernel-libc", so those need to count as OSes.
musl* | newlib* | relibc* | uclibc*)
@@ -1702,6 +1729,9 @@
# VxWorks passes extra cpu info in the 4th filed.
simlinux | simwindows | spe)
;;
+ # See `case $cpu-$os` validation below
+ ghcjs)
+ ;;
# Now accept the basic system types.
# The portable systems comes first.
# Each alternative MUST end in a * to match a version number.
@@ -1719,11 +1749,11 @@
| mirbsd* | netbsd* | dicos* | openedition* | ose* \
| bitrig* | openbsd* | secbsd* | solidbsd* | libertybsd* | os108* \
| ekkobsd* | freebsd* | riscix* | lynxos* | os400* \
- | bosx* | nextstep* | cxux* | aout* | elf* | oabi* \
- | ptx* | coff* | ecoff* | winnt* | domain* | vsta* \
+ | bosx* | nextstep* | cxux* | oabi* \
+ | ptx* | ecoff* | winnt* | domain* | vsta* \
| udi* | lites* | ieee* | go32* | aux* | hcos* \
| chorusrdb* | cegcc* | glidix* | serenity* \
- | cygwin* | msys* | pe* | moss* | proelf* | rtems* \
+ | cygwin* | msys* | moss* | proelf* | rtems* \
| midipix* | mingw32* | mingw64* | mint* \
| uxpv* | beos* | mpeix* | udk* | moxiebox* \
| interix* | uwin* | mks* | rhapsody* | darwin* \
@@ -1747,60 +1777,95 @@
kernel* | msvc* )
# Restricted further below
;;
+ '')
+ if test x"$obj" = x
+ then
+ echo "Invalid configuration '$1': Blank OS only allowed
with explicit machine code file format" 1>&2
+ fi
+ ;;
*)
echo "Invalid configuration '$1': OS '$os' not recognized" 1>&2
exit 1
;;
esac
+case $obj in
+ aout* | coff* | elf* | pe*)
+ ;;
+ '')
+ # empty is fine
+ ;;
+ *)
+ echo "Invalid configuration '$1': Machine code format '$obj'
not recognized" 1>&2
+ exit 1
+ ;;
+esac
+
+# Here we handle the constraint that a (synthetic) cpu and os are
+# valid only in combination with each other and nowhere else.
+case $cpu-$os in
+ # The "javascript-unknown-ghcjs" triple is used by GHC; we
+ # accept it here in order to tolerate that, but reject any
+ # variations.
+ javascript-ghcjs)
+ ;;
+ javascript-* | *-ghcjs)
+ echo "Invalid configuration '$1': cpu '$cpu' is not valid with
os '$os$obj'" 1>&2
+ exit 1
+ ;;
+esac
+
# As a final step for OS-related things, validate the OS-kernel combination
# (given a valid OS), if there is a kernel.
-case $kernel-$os in
- linux-gnu* | linux-dietlibc* | linux-android* | linux-newlib* \
- | linux-musl* | linux-relibc* | linux-uclibc* | linux-mlibc*
)
+case $kernel-$os-$obj in
+ linux-gnu*- | linux-dietlibc*- | linux-android*- | linux-newlib*- \
+ | linux-musl*- | linux-relibc*- | linux-uclibc*- |
linux-mlibc*- )
;;
- uclinux-uclibc* )
+ uclinux-uclibc*- )
;;
- managarm-mlibc* | managarm-kernel* )
+ managarm-mlibc*- | managarm-kernel*- )
;;
- windows*-gnu* | windows*-msvc*)
+ windows*-msvc*-)
;;
- -dietlibc* | -newlib* | -musl* | -relibc* | -uclibc* | -mlibc* )
+ -dietlibc*- | -newlib*- | -musl*- | -relibc*- | -uclibc*- | -mlibc*- )
# These are just libc implementations, not actual OSes, and thus
# require a kernel.
echo "Invalid configuration '$1': libc '$os' needs explicit
kernel." 1>&2
exit 1
;;
- -kernel* )
+ -kernel*- )
echo "Invalid configuration '$1': '$os' needs explicit kernel."
1>&2
exit 1
;;
- *-kernel* )
+ *-kernel*- )
echo "Invalid configuration '$1': '$kernel' does not support
'$os'." 1>&2
exit 1
;;
- *-msvc* )
+ *-msvc*- )
echo "Invalid configuration '$1': '$os' needs 'windows'." 1>&2
exit 1
;;
- kfreebsd*-gnu* | kopensolaris*-gnu*)
+ kfreebsd*-gnu*- | kopensolaris*-gnu*-)
;;
- vxworks-simlinux | vxworks-simwindows | vxworks-spe)
+ vxworks-simlinux- | vxworks-simwindows- | vxworks-spe-)
;;
- nto-qnx*)
+ nto-qnx*-)
;;
- os2-emx)
+ os2-emx-)
;;
- *-eabi* | *-gnueabi*)
+ *-eabi*- | *-gnueabi*-)
;;
- none-coff* | none-elf*)
+ none--*)
# None (no kernel, i.e. freestanding / bare metal),
- # can be paired with an output format "OS"
+ # can be paired with an machine code file format
;;
- -*)
+ -*-)
# Blank kernel with real OS is always fine.
;;
- *-*)
+ --*)
+ # Blank kernel and OS with real machine code file format is
always fine.
+ ;;
+ *-*-*)
echo "Invalid configuration '$1': Kernel '$kernel' not known to
work with OS '$os'." 1>&2
exit 1
;;
@@ -1884,7 +1949,7 @@
;;
esac
-echo "$cpu-$vendor-${kernel:+$kernel-}$os"
+echo "$cpu-$vendor${kernel:+-$kernel}${os:+-$os}${obj:+-$obj}"
exit
# Local variables:
++++++ fips.patch ++++++
--- /var/tmp/diff_new_pack.4jEyf6/_old 2023-10-19 22:49:59.056231105 +0200
+++ /var/tmp/diff_new_pack.4jEyf6/_new 2023-10-19 22:49:59.056231105 +0200
@@ -1,6 +1,6 @@
---- jdk11u/make/autoconf/libraries.m4 2023-05-10 19:43:58.534273705 +0200
-+++ jdk11u/make/autoconf/libraries.m4 2023-05-11 09:44:31.769353381 +0200
-@@ -101,6 +101,7 @@
+--- a/make/autoconf/libraries.m4
++++ b/make/autoconf/libraries.m4
+@@ -101,6 +101,7 @@ AC_DEFUN_ONCE([LIB_SETUP_LIBRARIES],
LIB_SETUP_LIBFFI
LIB_SETUP_BUNDLED_LIBS
LIB_SETUP_MISC_LIBS
@@ -8,7 +8,7 @@
LIB_SETUP_SOLARIS_STLPORT
LIB_TESTS_SETUP_GRAALUNIT
-@@ -223,3 +224,62 @@
+@@ -223,3 +224,62 @@ AC_DEFUN_ONCE([LIB_SETUP_SOLARIS_STLPORT],
fi
])
@@ -71,9 +71,9 @@
+ fi
+ AC_SUBST(USE_SYSCONF_NSS)
+])
---- jdk11u/make/autoconf/spec.gmk.in 2023-05-10 19:43:58.534273705 +0200
-+++ jdk11u/make/autoconf/spec.gmk.in 2023-05-11 09:44:31.769353381 +0200
-@@ -848,6 +848,10 @@
+--- a/make/autoconf/spec.gmk.in
++++ b/make/autoconf/spec.gmk.in
+@@ -848,6 +848,10 @@ INSTALL_SYSCONFDIR=@sysconfdir@
# Libraries
#
@@ -84,12 +84,13 @@
USE_EXTERNAL_LCMS:=@USE_EXTERNAL_LCMS@
LCMS_CFLAGS:=@LCMS_CFLAGS@
LCMS_LIBS:=@LCMS_LIBS@
---- jdk11u/make/lib/Lib-java.base.gmk 2023-05-10 19:43:58.586273741 +0200
-+++ jdk11u/make/lib/Lib-java.base.gmk 2023-05-11 09:44:31.769353381 +0200
-@@ -179,6 +179,31 @@
+--- a/make/lib/Lib-java.base.gmk
++++ b/make/lib/Lib-java.base.gmk
+@@ -178,6 +178,31 @@ ifeq ($(call isTargetOsType, unix), true)
+ endif
endif
-
################################################################################
++################################################################################
+# Create the systemconf library
+
+LIBSYSTEMCONF_CFLAGS :=
@@ -114,12 +115,11 @@
+ TARGETS += $(BUILD_LIBSYSTEMCONF)
+endif
+
-+################################################################################
+
################################################################################
# Create the symbols file for static builds.
- ifeq ($(STATIC_BUILD), true)
---- jdk11u/make/nb_native/nbproject/configurations.xml 2023-05-10
19:43:58.590273744 +0200
-+++ jdk11u/make/nb_native/nbproject/configurations.xml 2023-05-11
09:44:31.781353376 +0200
+--- a/make/nb_native/nbproject/configurations.xml
++++ b/make/nb_native/nbproject/configurations.xml
@@ -2950,6 +2950,9 @@
<in>LinuxWatchService.c</in>
</df>
@@ -130,21 +130,21 @@
</df>
</df>
<df name="macosx">
-@@ -29300,6 +29303,11 @@
- ex="false"
+@@ -29301,6 +29304,11 @@
tool="0"
flavor2="0">
-+ </item>
+ </item>
+ <item path="../../src/java.base/linux/native/libsystemconf/systemconf.c"
+ ex="false"
+ tool="0"
+ flavor2="0">
- </item>
++ </item>
<item path="../../src/java.base/macosx/native/include/jni_md.h"
ex="false"
---- jdk11u/make/scripts/compare_exceptions.sh.incl 2023-05-10
19:43:58.590273744 +0200
-+++ jdk11u/make/scripts/compare_exceptions.sh.incl 2023-05-11
09:44:31.785353373 +0200
-@@ -179,6 +179,7 @@
+ tool="3"
+--- a/make/scripts/compare_exceptions.sh.incl
++++ b/make/scripts/compare_exceptions.sh.incl
+@@ -179,6 +179,7 @@ if [ "$OPENJDK_TARGET_OS" = "solaris" ] && [
"$OPENJDK_TARGET_CPU" = "x86_64" ];
./lib/libsplashscreen.so
./lib/libsunec.so
./lib/libsunwjdga.so
@@ -152,7 +152,7 @@
./lib/libunpack.so
./lib/libverify.so
./lib/libzip.so
-@@ -289,6 +290,7 @@
+@@ -289,6 +290,7 @@ if [ "$OPENJDK_TARGET_OS" = "solaris" ] && [
"$OPENJDK_TARGET_CPU" = "sparcv9" ]
./lib/libsplashscreen.so
./lib/libsunec.so
./lib/libsunwjdga.so
@@ -160,8 +160,8 @@
./lib/libunpack.so
./lib/libverify.so
./lib/libzip.so
---- jdk11u/src/java.base/linux/native/libsystemconf/systemconf.c
1970-01-01 01:00:00.000000000 +0100
-+++ jdk11u/src/java.base/linux/native/libsystemconf/systemconf.c
2023-05-11 09:44:31.785353373 +0200
+--- /dev/null
++++ b/src/java.base/linux/native/libsystemconf/systemconf.c
@@ -0,0 +1,224 @@
+/*
+ * Copyright (c) 2021, Red Hat, Inc.
@@ -387,9 +387,9 @@
+ return (fips_enabled == '1' ? JNI_TRUE : JNI_FALSE);
+ }
+}
---- jdk11u/src/java.base/share/classes/java/security/Security.java
2023-05-10 19:43:58.770273872 +0200
-+++ jdk11u/src/java.base/share/classes/java/security/Security.java
2023-05-11 09:44:31.785353373 +0200
-@@ -32,6 +32,7 @@
+--- a/src/java.base/share/classes/java/security/Security.java
++++ b/src/java.base/share/classes/java/security/Security.java
+@@ -32,6 +32,7 @@ import java.net.URL;
import jdk.internal.event.EventHelper;
import jdk.internal.event.SecurityPropertyModificationEvent;
@@ -397,9 +397,9 @@
import jdk.internal.misc.SharedSecrets;
import jdk.internal.util.StaticProperty;
import sun.security.util.Debug;
-@@ -47,12 +48,20 @@
- * implementation-specific location, which is typically the properties file
- * {@code conf/security/java.security} in the Java installation directory.
+@@ -50,12 +51,20 @@ import sun.security.jca.*;
+ * @implNote If the properties file fails to load, the JDK implementation will
+ * throw an unspecified error when initializing the {@code Security} class.
*
+ * <p>Additional default values of security properties are read from a
+ * system-specific location, if available.</p>
@@ -418,7 +418,7 @@
/* Are we debugging? -- for developers */
private static final Debug sdebug =
Debug.getInstance("properties");
-@@ -67,6 +76,19 @@
+@@ -70,6 +79,19 @@ public final class Security {
}
static {
@@ -438,26 +438,19 @@
// doPrivileged here because there are multiple
// things in initialize that might require privs.
// (the FileInputStream call and the File.exists call,
-@@ -83,6 +105,7 @@
+@@ -85,6 +107,7 @@ public final class Security {
+ private static void initialize() {
props = new Properties();
- boolean loadedProps = false;
boolean overrideAll = false;
+ boolean systemSecPropsEnabled = false;
// first load the system properties file
// to determine the value of security.overridePropertiesFile
-@@ -98,6 +121,7 @@
- if (sdebug != null) {
- sdebug.println("reading security properties file: " +
- propFile);
-+ sdebug.println(props.toString());
- }
- } catch (IOException e) {
- if (sdebug != null) {
-@@ -192,6 +216,61 @@
+@@ -105,9 +128,63 @@ public final class Security {
}
+ loadProps(null, extraPropFile, overrideAll);
}
-
++
+ boolean sysUseProps =
Boolean.valueOf(System.getProperty(SYS_PROP_SWITCH, "false"));
+ boolean secUseProps =
Boolean.valueOf(props.getProperty(SEC_PROP_SWITCH));
+ if (sdebug != null) {
@@ -477,9 +470,7 @@
+ }
+ }
+
-+ // FIPS support depends on the contents of java.security so
-+ // ensure it has loaded first
-+ if (loadedProps && systemSecPropsEnabled) {
++ if (systemSecPropsEnabled) {
+ boolean shouldEnable;
+ String sysProp = System.getProperty("com.suse.fips");
+ if (sysProp == null) {
@@ -515,9 +506,13 @@
+ }
}
- /*
---- jdk11u/src/java.base/share/classes/java/security/SystemConfigurator.java
1970-01-01 01:00:00.000000000 +0100
-+++ jdk11u/src/java.base/share/classes/java/security/SystemConfigurator.java
2023-05-11 09:44:31.789353372 +0200
+- private static boolean loadProps(File masterFile, String extraPropFile,
boolean overrideAll) {
++ static boolean loadProps(File masterFile, String extraPropFile, boolean
overrideAll) {
+ InputStream is = null;
+ try {
+ if (masterFile != null && masterFile.exists()) {
+--- /dev/null
++++ b/src/java.base/share/classes/java/security/SystemConfigurator.java
@@ -0,0 +1,248 @@
+/*
+ * Copyright (c) 2019, 2021, Red Hat, Inc.
@@ -767,8 +762,8 @@
+ }
+ }
+}
----
jdk11u/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
1970-01-01 01:00:00.000000000 +0100
-+++
jdk11u/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
2023-05-11 09:44:31.789353372 +0200
+--- /dev/null
++++
b/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
@@ -0,0 +1,31 @@
+/*
+ * Copyright (c) 2020, Red Hat, Inc.
@@ -801,9 +796,11 @@
+ boolean isSystemFipsEnabled();
+ boolean isPlainKeySupportEnabled();
+}
---- jdk11u/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
2023-05-10 19:43:58.802273893 +0200
-+++ jdk11u/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
2023-05-11 09:44:31.789353372 +0200
-@@ -36,6 +36,7 @@
+diff --git a/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
b/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
+index 688ec9f091..8489b940c4 100644
+--- a/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
++++ b/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java
+@@ -36,6 +36,7 @@ import java.io.FilePermission;
import java.io.ObjectInputStream;
import java.io.RandomAccessFile;
import java.security.ProtectionDomain;
@@ -811,7 +808,7 @@
import java.security.Signature;
/** A repository of "shared secrets", which are a mechanism for
-@@ -76,6 +77,7 @@
+@@ -76,6 +77,7 @@ public class SharedSecrets {
private static JavaIORandomAccessFileAccess javaIORandomAccessFileAccess;
private static JavaSecuritySignatureAccess javaSecuritySignatureAccess;
private static JavaxCryptoSealedObjectAccess
javaxCryptoSealedObjectAccess;
@@ -819,7 +816,7 @@
public static JavaUtilJarAccess javaUtilJarAccess() {
if (javaUtilJarAccess == null) {
-@@ -361,4 +363,15 @@
+@@ -361,4 +363,15 @@ public class SharedSecrets {
}
return javaxCryptoSealedObjectAccess;
}
@@ -835,9 +832,9 @@
+ return javaSecuritySystemConfiguratorAccess;
+ }
}
---- jdk11u/src/java.base/share/classes/module-info.java 2023-05-10
19:43:58.810273900 +0200
-+++ jdk11u/src/java.base/share/classes/module-info.java 2023-05-11
09:44:31.789353372 +0200
-@@ -182,6 +182,7 @@
+--- a/src/java.base/share/classes/module-info.java
++++ b/src/java.base/share/classes/module-info.java
+@@ -182,6 +182,7 @@ module java.base {
java.security.jgss,
java.sql,
java.xml,
@@ -845,9 +842,9 @@
jdk.jartool,
jdk.attach,
jdk.charsets,
----
jdk11u/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java
2023-05-10 19:43:58.826273911 +0200
-+++
jdk11u/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java
2023-05-11 09:44:31.789353372 +0200
-@@ -33,8 +33,13 @@
+--- a/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java
++++ b/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java
+@@ -33,8 +33,13 @@ import java.security.KeyStore.*;
import javax.net.ssl.*;
@@ -861,7 +858,7 @@
X509ExtendedKeyManager keyManager;
boolean isInitialized;
-@@ -62,7 +67,8 @@
+@@ -62,7 +67,8 @@ abstract class KeyManagerFactoryImpl extends
KeyManagerFactorySpi {
KeyStoreException, NoSuchAlgorithmException,
UnrecoverableKeyException {
if ((ks != null) && SunJSSE.isFIPS()) {
@@ -871,7 +868,7 @@
throw new KeyStoreException("FIPS mode: KeyStore must be "
+ "from provider " +
SunJSSE.cryptoProvider.getName());
}
-@@ -91,8 +97,8 @@
+@@ -91,8 +97,8 @@ abstract class KeyManagerFactoryImpl extends
KeyManagerFactorySpi {
keyManager = new X509KeyManagerImpl(
Collections.<Builder>emptyList());
} else {
@@ -882,9 +879,9 @@
throw new KeyStoreException(
"FIPS mode: KeyStore must be " +
"from provider " + SunJSSE.cryptoProvider.getName());
---- jdk11u/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java
2023-05-10 19:43:58.830273913 +0200
-+++ jdk11u/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java
2023-05-11 09:44:31.793353369 +0200
-@@ -31,6 +31,7 @@
+--- a/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java
++++ b/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java
+@@ -31,6 +31,7 @@ import java.security.*;
import java.security.cert.*;
import java.util.*;
import javax.net.ssl.*;
@@ -892,7 +889,7 @@
import sun.security.action.GetPropertyAction;
import sun.security.provider.certpath.AlgorithmChecker;
import sun.security.validator.Validator;
-@@ -542,6 +543,23 @@
+@@ -542,6 +543,23 @@ public abstract class SSLContextImpl extends
SSLContextSpi {
static {
if (SunJSSE.isFIPS()) {
@@ -916,7 +913,7 @@
supportedProtocols = Arrays.asList(
ProtocolVersion.TLS13,
ProtocolVersion.TLS12,
-@@ -556,6 +574,7 @@
+@@ -556,6 +574,7 @@ public abstract class SSLContextImpl extends SSLContextSpi
{
ProtocolVersion.TLS11,
ProtocolVersion.TLS10
});
@@ -924,7 +921,7 @@
} else {
supportedProtocols = Arrays.asList(
ProtocolVersion.TLS13,
-@@ -910,12 +929,23 @@
+@@ -910,12 +929,23 @@ public abstract class SSLContextImpl extends
SSLContextSpi {
if (client) {
// default client protocols
if (SunJSSE.isFIPS()) {
@@ -948,7 +945,7 @@
} else {
candidates = new ProtocolVersion[] {
ProtocolVersion.TLS13,
-@@ -927,12 +957,23 @@
+@@ -927,12 +957,23 @@ public abstract class SSLContextImpl extends
SSLContextSpi {
} else {
// default server protocols
if (SunJSSE.isFIPS()) {
@@ -972,9 +969,9 @@
} else {
candidates = new ProtocolVersion[] {
ProtocolVersion.TLS13,
---- jdk11u/src/java.base/share/classes/sun/security/ssl/SunJSSE.java
2023-05-10 19:43:58.830273913 +0200
-+++ jdk11u/src/java.base/share/classes/sun/security/ssl/SunJSSE.java
2023-05-11 09:44:31.793353369 +0200
-@@ -27,6 +27,8 @@
+--- a/src/java.base/share/classes/sun/security/ssl/SunJSSE.java
++++ b/src/java.base/share/classes/sun/security/ssl/SunJSSE.java
+@@ -27,6 +27,8 @@ package sun.security.ssl;
import java.security.*;
import java.util.*;
@@ -982,8 +979,8 @@
+import jdk.internal.misc.SharedSecrets;
import sun.security.rsa.SunRsaSignEntries;
import static sun.security.util.SecurityConstants.PROVIDER_VER;
- import static sun.security.provider.SunEntries.createAliases;
-@@ -195,8 +197,13 @@
+ import static sun.security.util.SecurityProviderConstants.*;
+@@ -195,8 +197,13 @@ public abstract class SunJSSE extends
java.security.Provider {
"sun.security.ssl.SSLContextImpl$TLS11Context", null, null);
ps("SSLContext", "TLSv1.2",
"sun.security.ssl.SSLContextImpl$TLS12Context", null, null);
@@ -996,13 +993,14 @@
+ }
ps("SSLContext", "TLS",
"sun.security.ssl.SSLContextImpl$TLSContext",
- (isfips? null : createAliases("SSL")), null);
---- jdk11u/src/java.base/share/conf/security/java.security 2023-05-10
19:43:58.842273922 +0200
-+++ jdk11u/src/java.base/share/conf/security/java.security 2023-05-11
09:44:31.793353369 +0200
-@@ -86,6 +86,14 @@
+ (isfips? null : List.of("SSL")), null);
+--- a/src/java.base/share/conf/security/java.security
++++ b/src/java.base/share/conf/security/java.security
+@@ -89,6 +89,14 @@ security.provider.tbd=SunPKCS11
+ #endif
#security.provider.tbd=SunPKCS11 ${java.home}/lib/security/nss.cfg
- #
++#
+# Security providers used when FIPS mode support is active
+#
+fips.provider.1=SunPKCS11 ${java.home}/conf/security/nss.fips.cfg
@@ -1010,38 +1008,37 @@
+fips.provider.3=SunEC
+fips.provider.4=com.sun.net.ssl.internal.ssl.Provider SunPKCS11-NSS-FIPS
+
-+#
+ #
# A list of preferred providers for specific algorithms. These providers will
# be searched for matching algorithms before the list of registered providers.
- # Entries containing errors (parsing, etc) will be ignored. Use the
-@@ -299,6 +307,11 @@
+@@ -302,6 +310,11 @@ policy.ignoreIdentityScope=false
+ #
keystore.type=pkcs12
- #
++#
+# Default keystore type used when global crypto-policies are set to FIPS.
+#
+fips.keystore.type=PKCS11
+
-+#
+ #
# Controls compatibility mode for JKS and PKCS12 keystore types.
#
- # When set to 'true', both JKS and PKCS12 keystore types support loading
-@@ -336,6 +349,13 @@
+@@ -339,6 +352,13 @@ package.definition=sun.misc.,\
+ #
security.overridePropertiesFile=true
- #
++#
+# Determines whether this properties file will be appended to
+# using the system properties file stored at
+# /etc/crypto-policies/back-ends/java.config
+#
+security.useSystemPropertiesFile=true
+
-+#
+ #
# Determines the default key and trust manager factory algorithms for
# the javax.net.ssl package.
- #
----
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
1970-01-01 01:00:00.000000000 +0100
-+++
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
2023-05-11 09:44:31.793353369 +0200
+--- /dev/null
++++
b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
@@ -0,0 +1,290 @@
+/*
+ * Copyright (c) 2021, Red Hat, Inc.
@@ -1333,8 +1330,8 @@
+ }
+ }
+}
----
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java
2023-05-10 19:43:59.222274190 +0200
-+++
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java
2023-05-11 09:44:31.793353369 +0200
+--- a/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java
++++ b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java
@@ -26,6 +26,9 @@
package sun.security.pkcs11;
@@ -1345,7 +1342,7 @@
import java.util.*;
import java.security.*;
-@@ -43,6 +46,8 @@
+@@ -43,6 +46,8 @@ import javax.security.auth.callback.PasswordCallback;
import com.sun.crypto.provider.ChaCha20Poly1305Parameters;
import jdk.internal.misc.InnocuousThread;
@@ -1354,7 +1351,7 @@
import sun.security.util.Debug;
import sun.security.util.ResourcesMgr;
import static sun.security.util.SecurityConstants.PROVIDER_VER;
-@@ -60,6 +65,29 @@
+@@ -61,6 +66,29 @@ import static sun.security.pkcs11.wrapper.PKCS11Constants.*;
*/
public final class SunPKCS11 extends AuthProvider {
@@ -1384,7 +1381,7 @@
private static final long serialVersionUID = -1354835039035306505L;
static final Debug debug = Debug.getInstance("sunpkcs11");
-@@ -317,10 +345,15 @@
+@@ -318,10 +346,15 @@ public final class SunPKCS11 extends AuthProvider {
// request multithreaded access first
initArgs.flags = CKF_OS_LOCKING_OK;
PKCS11 tmpPKCS11;
@@ -1401,7 +1398,7 @@
} catch (PKCS11Exception e) {
if (debug != null) {
debug.println("Multi-threaded initialization failed: " +
e);
-@@ -336,7 +369,7 @@
+@@ -337,7 +370,7 @@ public final class SunPKCS11 extends AuthProvider {
initArgs.flags = 0;
}
tmpPKCS11 = PKCS11.getInstance(library,
@@ -1410,7 +1407,7 @@
}
p11 = tmpPKCS11;
-@@ -376,6 +409,24 @@
+@@ -377,6 +410,24 @@ public final class SunPKCS11 extends AuthProvider {
if (nssModule != null) {
nssModule.setProvider(this);
}
@@ -1435,9 +1432,9 @@
} catch (Exception e) {
if (config.getHandleStartupErrors() == Config.ERR_IGNORE_ALL) {
throw new UnsupportedOperationException
----
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
2023-05-10 19:43:59.226274194 +0200
-+++
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
2023-05-11 09:44:31.797353367 +0200
-@@ -49,6 +49,7 @@
+---
a/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
++++
b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
+@@ -49,6 +49,7 @@ package sun.security.pkcs11.wrapper;
import java.io.File;
import java.io.IOException;
@@ -1445,7 +1442,7 @@
import java.util.*;
import java.security.AccessController;
-@@ -148,19 +149,42 @@
+@@ -148,19 +149,42 @@ public class PKCS11 {
this.pkcs11ModulePath = pkcs11ModulePath;
}
@@ -1488,7 +1485,7 @@
if (omitInitialize == false) {
try {
pkcs11.C_Initialize(pInitArgs);
-@@ -1909,4 +1933,69 @@
+@@ -1909,4 +1933,69 @@ static class SynchronizedPKCS11 extends PKCS11 {
super.C_GenerateRandom(hSession, randomData);
}
}
++++++ jdk-11.0.20.1+1.tar.gz -> jdk-11.0.21+9.tar.gz ++++++
/work/SRC/openSUSE:Factory/java-11-openjdk/jdk-11.0.20.1+1.tar.gz
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.1945/jdk-11.0.21+9.tar.gz
differ: char 13, line 1
++++++ nss-security-provider.patch ++++++
--- /var/tmp/diff_new_pack.4jEyf6/_old 2023-10-19 22:49:59.140234152 +0200
+++ /var/tmp/diff_new_pack.4jEyf6/_new 2023-10-19 22:49:59.140234152 +0200
@@ -1,6 +1,6 @@
---- openjdk/src/java.base/share/conf/security/java.security 2021-03-16
07:15:49.798093653 +0100
-+++ openjdk/src/java.base/share/conf/security/java.security 2021-03-16
11:38:01.416893125 +0100
-@@ -83,6 +83,7 @@
+--- a/src/java.base/share/conf/security/java.security
++++ b/src/java.base/share/conf/security/java.security
+@@ -87,6 +87,7 @@ security.provider.tbd=Apple
#ifndef solaris
security.provider.tbd=SunPKCS11
#endif
++++++ reproducible-javadoc-timestamp.patch ++++++
--- /var/tmp/diff_new_pack.4jEyf6/_old 2023-10-19 22:49:59.176235457 +0200
+++ /var/tmp/diff_new_pack.4jEyf6/_new 2023-10-19 22:49:59.180235603 +0200
@@ -1,14 +1,3 @@
-From cf1f86d30b2e9d0b4ada535d16e6e9141dc6bb17 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Fridrich=20=C5=A0trba?= <[email protected]>
-Date: Fri, 4 Aug 2023 17:43:52 +0200
-Subject: [PATCH] Reproducible javadoc timestamp
-
----
- .../doclets/formats/html/markup/Head.java | 15 ++++++++++++++-
- 1 file changed, 14 insertions(+), 1 deletion(-)
-
-diff --git
a/src/jdk.javadoc/share/classes/jdk/javadoc/internal/doclets/formats/html/markup/Head.java
b/src/jdk.javadoc/share/classes/jdk/javadoc/internal/doclets/formats/html/markup/Head.java
-index 85ee310f0b..3c5260b1a0 100644
---
a/src/jdk.javadoc/share/classes/jdk/javadoc/internal/doclets/formats/html/markup/Head.java
+++
b/src/jdk.javadoc/share/classes/jdk/javadoc/internal/doclets/formats/html/markup/Head.java
@@ -256,6 +256,9 @@ public class Head {
@@ -47,7 +36,4 @@
}
return new Comment(text);
}
---
-2.41.0
-