Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package java-11-openjdk for openSUSE:Factory 
checked in at 2023-07-26 13:21:53
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/java-11-openjdk (Old)
 and      /work/SRC/openSUSE:Factory/.java-11-openjdk.new.15225 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "java-11-openjdk"

Wed Jul 26 13:21:53 2023 rev:63 rq:1100545 version:11.0.20.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes  
2023-04-27 19:59:47.465522229 +0200
+++ 
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.15225/java-11-openjdk.changes   
    2023-07-26 13:22:01.395340224 +0200
@@ -1,0 +2,208 @@
+Tue Jul 25 06:46:26 UTC 2023 - Fridrich Strba <[email protected]>
+
+- Upgrade to upstream tag jdk-11.0.20+8 (July 2023 CPU)
+  * CVEs
+    + CVE-2023-22006, bsc#1213473
+    + CVE-2023-22036, bsc#1213474
+    + CVE-2023-22041, bsc#1213475
+    + CVE-2023-22044, bsc#1213479
+    + CVE-2023-22045, bsc#1213481
+    + CVE-2023-22049, bsc#1213482
+    + CVE-2023-25193, bsc#1207922
+  * Security fixes
+    + JDK-8298676: Enhanced Look and Feel
+    + JDK-8300285: Enhance TLS data handling
+    + JDK-8300596: Enhance Jar Signature validation
+    + JDK-8301998, JDK-8302084: Update HarfBuzz to 7.0.1
+    + JDK-8302475: Enhance HTTP client file downloading
+    + JDK-8302483: Enhance ZIP performance
+    + JDK-8303376: Better launching of JDI
+    + JDK-8304468: Better array usages
+    + JDK-8305312: Enhanced path handling
+    + JDK-8308682: Enhance AES performance
+  * Other changes
+    + JDK-8171426: java/lang/ProcessBuilder/Basic.java failed with
+      Stream closed
+    + JDK-8178806: Better exception logging in crypto code
+    + JDK-8187522: test/sun/net/ftp/FtpURLConnectionLeak.java timed
+      out
+    + JDK-8209167: Use CLDR's time zone mappings for Windows
+    + JDK-8209546: Make sun/security/tools/keytool/autotest.sh to
+      support macosx
+    + JDK-8209880: tzdb.dat is not reproducibly built
+    + JDK-8213531: Test javax/swing/border/TestTitledBorderLeak.java
+      fails
+    + JDK-8214459: NSS source should be removed
+    + JDK-8214807: Improve handling of very old class files
+    + JDK-8215015: [TESTBUG] remove unneeded -Xfuture option from
+      tests
+    + JDK-8215575: C2 crash: assert(get_instanceKlass()->is_loaded())
+      failed: must be at least loaded
+    + JDK-8220093: Change to GCC 8.2 for building on Linux at Oracle
+    + JDK-8227257: javax/swing/JFileChooser/4847375/bug4847375.java
+      fails with AssertionError
+    + JDK-8232853: AuthenticationFilter.Cache::remove may throw
+      ConcurrentModificationException
+    + JDK-8243936: NonWriteable system properties are actually
+      writeable
+    + JDK-8246383: NullPointerException in
+      JceSecurity.getVerificationResult when using Entrust provider
+    + JDK-8248701: On Windows generated modules-deps.gmk can
+      contain backslash-r (CR) characters
+    + JDK-8257856: Make ClassFileVersionsTest.java robust to JDK
+      version updates
+    + JDK-8259530: Generated docs contain MIT/GPL-licenced works
+      without reproducing the licence
+    + JDK-8263420: Incorrect function name in
+      NSAccessibilityStaticText native peer implementation
+    + JDK-8264290: Create implementation for
+      NSAccessibilityComponentGroup protocol peer
+    + JDK-8264304: Create implementation for NSAccessibilityToolbar
+      protocol peer
+    + JDK-8265486: ProblemList javax/sound/midi/Sequencer/
+      /Recording.java on macosx-aarch64
+    + JDK-8268558: [TESTBUG] Case 2 in
+      TestP11KeyFactoryGetRSAKeySpec is skipped
+    + JDK-8269746: C2: assert(!in->is_CFG()) failed: CFG Node with
+      no controlling input?
+    + JDK-8274864: Remove Amman/Cairo hacks in ZoneInfoFile
+    + JDK-8275233: Incorrect line number reported in exception
+      stack trace thrown from a lambda expression
+    + JDK-8275721: Name of UTC timezone in a locale changes
+      depending on previous code
+    + JDK-8275735: [linux] Remove deprecated Metrics api (kernel
+      memory limit)
+    + JDK-8276880: Remove java/lang/RuntimeTests/exec/ExecWithDir
+      as unnecessary
+    + JDK-8277775: Fixup bugids in RemoveDropTargetCrashTest.java -
+      add 4357905
+    + JDK-8278434: timeouts in test java/time/test/java/time/format/
+      /TestZoneTextPrinterParser.java
+    + JDK-8280703: CipherCore.doFinal(...) causes potentially
+      massive byte[] allocations during decryption
+    + JDK-8282077: PKCS11 provider C_sign() impl should handle
+      CKR_BUFFER_TOO_SMALL error
+    + JDK-8282201: Consider removal of expiry check in
+      VerifyCACerts.java test
+    + JDK-8282467: add extra diagnostics for JDK-8268184
+    + JDK-8282600: SSLSocketImpl should not use user_canceled
+      workaround when not necessary
+    + JDK-8283059: Uninitialized warning in check_code.c with GCC
+      11.2
+    + JDK-8285497: Add system property for Java SE specification
+      maintenance version
+    + JDK-8286398: Address possibly lossy conversions in
+      jdk.internal.le
+    + JDK-8287007: [cgroups] Consistently use stringStream
+      throughout parsing code
+    + JDK-8287246: DSAKeyValue should check for missing params
+      instead of relying on KeyFactory provider
+    + JDK-8287876: The recently de-problemlisted
+      TestTitledBorderLeak test is unstable
+    + JDK-8287897: Augment src/jdk.internal.le/share/legal/jline.md
+      with information on 4th party dependencies
+    + JDK-8289301: P11Cipher should not throw out of bounds
+      exception during padding
+    + JDK-8289735: UTIL_LOOKUP_PROGS fails on pathes with space
+    + JDK-8291226: Create Test Cases to cover scenarios for
+      JDK-8278067
+    + JDK-8291637: HttpClient default keep alive timeout not
+      followed if server sends invalid value
+    + JDK-8291638: Keep-Alive timeout of 0 should close connection
+      immediately
+    + JDK-8292206: TestCgroupMetrics.java fails as getMemoryUsage()
+      is lower than expected
+    + JDK-8293232: Fix race condition in pkcs11 SessionManager
+    + JDK-8293815: P11PSSSignature.engineUpdate should not print
+      debug messages during normal operation
+    + JDK-8294548: Problem list SA core file tests on macosx-x64
+      due to JDK-8294316
+    + JDK-8294906: Memory leak in PKCS11 NSS TLS server
+    + JDK-8295974: jni_FatalError and Xcheck:jni warnings should
+      print the native stack when there are no Java frames
+    + JDK-8296934: Write a test to verify whether Undecorated Frame
+      can be iconified or not
+    + JDK-8297000: [jib] Add more friendly warning for proxy issues
+    + JDK-8297450: ScaledTextFieldBorderTest.java fails when run
+      with -show parameter
+    + JDK-8298887: On the latest macOS+XCode the Robot API may
+      report wrong colors
+    + JDK-8299259: C2: Div/Mod nodes without zero check could be
+      split through iv phi of loop resulting in SIGFPE
+    + JDK-8300079: SIGSEGV in LibraryCallKit::inline_string_copy
+      due to constant NULL src argument
+    + JDK-8300205: Swing test bug8078268 make latch timeout
+      configurable
+    + JDK-8300490: Spaces in name of MacOS Code Signing Identity
+      are not correctly handled after JDK-8293550
+    + JDK-8301119: Support for GB18030-2022
+    + JDK-8301170: perfMemory_windows.cpp add free_security_attr to
+      early returns
+    + JDK-8301401: Allow additional characters for GB18030-2022
+      support
+    + JDK-8302151: BMPImageReader throws an exception reading BMP
+      images
+    + JDK-8302791: Add specific ClassLoader object to Proxy
+      IllegalArgumentException message
+    + JDK-8303102: jcmd: ManagementAgent.status truncates the text
+      longer than O_BUFLEN
+    + JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m
+      needs CFRelease call in early potential CHECK_NULL return
+    + JDK-8303432: Bump update version for OpenJDK: jdk-11.0.20
+    + JDK-8303440: The "ZonedDateTime.parse" may not accept the
+      "UTC+XX" zone id
+    + JDK-8303465: KeyStore of type KeychainStore, provider Apple
+      does not show all trusted certificates
+    + JDK-8303476: Add the runtime version in the release file of a
+      JDK image
+    + JDK-8303482: Update LCMS to 2.15
+    + JDK-8303564: C2: "Bad graph detected in build_loop_late"
+      after a CMove is wrongly split thru phi
+    + JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs
+      CFRelease call in early potential CHECK_NULL return
+    + JDK-8303822: gtestMain should give more helpful output
+    + JDK-8303861: Error handling step timeouts should never be
+      blocked by OnError and others
+    + JDK-8303937: Corrupted heap dumps due to missing retries for
+      os::write()
+    + JDK-8304134: jib bootstrapper fails to quote filename when
+      checking download filetype
+    + JDK-8304291: [AIX] Broken build after JDK-8301998
+    + JDK-8304295: harfbuzz build fails with GCC 7 after JDK-8301998
+    + JDK-8304350: Font.getStringBounds calculates wrong width for
+      TextAttribute.TRACKING other than 0.0
+    + JDK-8304760: Add 2 Microsoft TLS roots
+    + JDK-8305113: (tz) Update Timezone Data to 2023c
+    + JDK-8305400: ISO 4217 Amendment 175 Update
+    + JDK-8305528: [11u] Backport of JDK-8259530 breaks build with
+      JDK10 bootstrap VM
+    + JDK-8305682: Update the javadoc in the Character class to
+      state support for GB 18030-2022 Implementation Level 2
+    + JDK-8305711: Arm: C2 always enters slowpath for monitorexit
+    + JDK-8305721: add `make compile-commands` artifacts to
+      .gitignore
+    + JDK-8305975: Add TWCA Global Root CA
+    + JDK-8306543: GHA: MSVC installation is failing
+    + JDK-8306658: GHA: MSVC installation could be optional since
+      it might already be pre-installed
+    + JDK-8306664: GHA: Update MSVC version to latest stepping
+    + JDK-8306768: CodeCache Analytics reports wrong threshold
+    + JDK-8306976: UTIL_REQUIRE_SPECIAL warning on grep
+    + JDK-8307134: Add GTS root CAs
+    + JDK-8307811: [TEST] compilation of TimeoutInErrorHandlingTest
+      fails after backport of JDK-8303861
+    + JDK-8308006: Missing NMT memory tagging in CMS
+    + JDK-8308884: [17u/11u] Backout JDK-8297951
+    + JDK-8309476: [11u] tools/jmod/hashes/HashesOrderTest.java
+      fails intermittently
++++ 11 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes
++++ and 
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.15225/java-11-openjdk.changes

Old:
----
  jdk-11.0.19+7.tar.gz
  system-crypto-policy.patch

New:
----
  jdk-11.0.20+8.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ java-11-openjdk.spec ++++++
--- /var/tmp/diff_new_pack.SLfb3Z/_old  2023-07-26 13:22:03.951354691 +0200
+++ /var/tmp/diff_new_pack.SLfb3Z/_new  2023-07-26 13:22:03.955354714 +0200
@@ -37,8 +37,8 @@
 # Standard JPackage naming and versioning defines.
 %global featurever      11
 %global interimver      0
-%global updatever       19
-%global buildver        7
+%global updatever       20
+%global buildver        8
 %global openjdk_repo    jdk11u
 %global openjdk_tag     
jdk-%{featurever}.%{interimver}.%{updatever}%{?patchver:.%{patchver}}+%{buildver}
 %global openjdk_dir     
%{openjdk_repo}-jdk-%{featurever}.%{interimver}.%{updatever}%{?patchver:.%{patchver}}-%{buildver}
@@ -210,7 +210,6 @@
 # Fix: implicit-pointer-decl
 Patch13:        implicit-pointer-decl.patch
 #
-Patch14:        system-crypto-policy.patch
 Patch15:        system-pcsclite.patch
 Patch16:        missing-return.patch
 Patch17:        nss-security-provider.patch
@@ -488,7 +487,6 @@
 %patch10 -p1
 %patch12 -p1
 %patch13 -p1
-%patch14 -p1
 
 %if %{with_system_pcsc}
 %patch15 -p1

++++++ fips.patch ++++++
--- /var/tmp/diff_new_pack.SLfb3Z/_old  2023-07-26 13:22:04.071355370 +0200
+++ /var/tmp/diff_new_pack.SLfb3Z/_new  2023-07-26 13:22:04.075355393 +0200
@@ -1,5 +1,5 @@
---- jdk11u/make/autoconf/libraries.m4  2022-10-19 09:05:18.084144515 +0200
-+++ jdk11u/make/autoconf/libraries.m4  2022-10-19 09:05:52.464419694 +0200
+--- jdk11u/make/autoconf/libraries.m4  2023-05-10 19:43:58.534273705 +0200
++++ jdk11u/make/autoconf/libraries.m4  2023-05-11 09:44:31.769353381 +0200
 @@ -101,6 +101,7 @@
    LIB_SETUP_LIBFFI
    LIB_SETUP_BUNDLED_LIBS
@@ -71,9 +71,9 @@
 +  fi
 +  AC_SUBST(USE_SYSCONF_NSS)
 +])
---- jdk11u/make/autoconf/spec.gmk.in   2022-10-19 09:05:18.084144515 +0200
-+++ jdk11u/make/autoconf/spec.gmk.in   2022-10-19 09:05:52.464419694 +0200
-@@ -841,6 +841,10 @@
+--- jdk11u/make/autoconf/spec.gmk.in   2023-05-10 19:43:58.534273705 +0200
++++ jdk11u/make/autoconf/spec.gmk.in   2023-05-11 09:44:31.769353381 +0200
+@@ -848,6 +848,10 @@
  # Libraries
  #
  
@@ -84,8 +84,8 @@
  USE_EXTERNAL_LCMS:=@USE_EXTERNAL_LCMS@
  LCMS_CFLAGS:=@LCMS_CFLAGS@
  LCMS_LIBS:=@LCMS_LIBS@
---- jdk11u/make/lib/Lib-java.base.gmk  2022-10-19 09:05:18.132144900 +0200
-+++ jdk11u/make/lib/Lib-java.base.gmk  2022-10-19 09:05:52.464419694 +0200
+--- jdk11u/make/lib/Lib-java.base.gmk  2023-05-10 19:43:58.586273741 +0200
++++ jdk11u/make/lib/Lib-java.base.gmk  2023-05-11 09:44:31.769353381 +0200
 @@ -179,6 +179,31 @@
  endif
  
@@ -118,8 +118,8 @@
  # Create the symbols file for static builds.
  
  ifeq ($(STATIC_BUILD), true)
---- jdk11u/make/nb_native/nbproject/configurations.xml 2022-10-19 
09:05:18.136144932 +0200
-+++ jdk11u/make/nb_native/nbproject/configurations.xml 2022-10-19 
09:05:52.472419757 +0200
+--- jdk11u/make/nb_native/nbproject/configurations.xml 2023-05-10 
19:43:58.590273744 +0200
++++ jdk11u/make/nb_native/nbproject/configurations.xml 2023-05-11 
09:44:31.781353376 +0200
 @@ -2950,6 +2950,9 @@
                    <in>LinuxWatchService.c</in>
                  </df>
@@ -142,8 +142,8 @@
        </item>
        <item path="../../src/java.base/macosx/native/include/jni_md.h"
              ex="false"
---- jdk11u/make/scripts/compare_exceptions.sh.incl     2022-10-19 
09:05:18.136144932 +0200
-+++ jdk11u/make/scripts/compare_exceptions.sh.incl     2022-10-19 
09:05:52.472419757 +0200
+--- jdk11u/make/scripts/compare_exceptions.sh.incl     2023-05-10 
19:43:58.590273744 +0200
++++ jdk11u/make/scripts/compare_exceptions.sh.incl     2023-05-11 
09:44:31.785353373 +0200
 @@ -179,6 +179,7 @@
        ./lib/libsplashscreen.so
        ./lib/libsunec.so
@@ -161,7 +161,7 @@
        ./lib/libverify.so
        ./lib/libzip.so
 --- jdk11u/src/java.base/linux/native/libsystemconf/systemconf.c       
1970-01-01 01:00:00.000000000 +0100
-+++ jdk11u/src/java.base/linux/native/libsystemconf/systemconf.c       
2022-10-19 09:05:52.472419757 +0200
++++ jdk11u/src/java.base/linux/native/libsystemconf/systemconf.c       
2023-05-11 09:44:31.785353373 +0200
 @@ -0,0 +1,224 @@
 +/*
 + * Copyright (c) 2021, Red Hat, Inc.
@@ -387,8 +387,8 @@
 +      return (fips_enabled == '1' ? JNI_TRUE : JNI_FALSE);
 +    }
 +}
---- jdk11u/src/java.base/share/classes/java/security/Security.java     
2022-10-19 09:05:18.300146245 +0200
-+++ jdk11u/src/java.base/share/classes/java/security/Security.java     
2022-10-19 09:05:52.472419757 +0200
+--- jdk11u/src/java.base/share/classes/java/security/Security.java     
2023-05-10 19:43:58.770273872 +0200
++++ jdk11u/src/java.base/share/classes/java/security/Security.java     
2023-05-11 09:44:31.785353373 +0200
 @@ -32,6 +32,7 @@
  
  import jdk.internal.event.EventHelper;
@@ -397,7 +397,16 @@
  import jdk.internal.misc.SharedSecrets;
  import jdk.internal.util.StaticProperty;
  import sun.security.util.Debug;
-@@ -56,6 +57,11 @@
+@@ -47,12 +48,20 @@
+  * implementation-specific location, which is typically the properties file
+  * {@code conf/security/java.security} in the Java installation directory.
+  *
++ * <p>Additional default values of security properties are read from a
++ * system-specific location, if available.</p>
++ *
+  * @author Benjamin Renaud
+  * @since 1.1
+  */
  
  public final class Security {
  
@@ -409,7 +418,7 @@
      /* Are we debugging? -- for developers */
      private static final Debug sdebug =
                          Debug.getInstance("properties");
-@@ -74,6 +80,19 @@
+@@ -67,6 +76,19 @@
      }
  
      static {
@@ -429,7 +438,7 @@
          // doPrivileged here because there are multiple
          // things in initialize that might require privs.
          // (the FileInputStream call and the File.exists call,
-@@ -90,6 +109,7 @@
+@@ -83,6 +105,7 @@
          props = new Properties();
          boolean loadedProps = false;
          boolean overrideAll = false;
@@ -437,7 +446,15 @@
  
          // first load the system properties file
          // to determine the value of security.overridePropertiesFile
-@@ -227,6 +247,61 @@
+@@ -98,6 +121,7 @@
+                 if (sdebug != null) {
+                     sdebug.println("reading security properties file: " +
+                                 propFile);
++                    sdebug.println(props.toString());
+                 }
+             } catch (IOException e) {
+                 if (sdebug != null) {
+@@ -192,6 +216,61 @@
              }
          }
  
@@ -500,7 +517,7 @@
  
      /*
 --- jdk11u/src/java.base/share/classes/java/security/SystemConfigurator.java   
1970-01-01 01:00:00.000000000 +0100
-+++ jdk11u/src/java.base/share/classes/java/security/SystemConfigurator.java   
2022-10-19 09:05:52.472419757 +0200
++++ jdk11u/src/java.base/share/classes/java/security/SystemConfigurator.java   
2023-05-11 09:44:31.789353372 +0200
 @@ -0,0 +1,248 @@
 +/*
 + * Copyright (c) 2019, 2021, Red Hat, Inc.
@@ -751,7 +768,7 @@
 +    }
 +}
 --- 
jdk11u/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
     1970-01-01 01:00:00.000000000 +0100
-+++ 
jdk11u/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
     2022-10-19 09:05:52.472419757 +0200
++++ 
jdk11u/src/java.base/share/classes/jdk/internal/misc/JavaSecuritySystemConfiguratorAccess.java
     2023-05-11 09:44:31.789353372 +0200
 @@ -0,0 +1,31 @@
 +/*
 + * Copyright (c) 2020, Red Hat, Inc.
@@ -784,8 +801,8 @@
 +    boolean isSystemFipsEnabled();
 +    boolean isPlainKeySupportEnabled();
 +}
---- jdk11u/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java    
2022-10-19 09:05:18.328146468 +0200
-+++ jdk11u/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java    
2022-10-19 09:05:52.472419757 +0200
+--- jdk11u/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java    
2023-05-10 19:43:58.802273893 +0200
++++ jdk11u/src/java.base/share/classes/jdk/internal/misc/SharedSecrets.java    
2023-05-11 09:44:31.789353372 +0200
 @@ -36,6 +36,7 @@
  import java.io.ObjectInputStream;
  import java.io.RandomAccessFile;
@@ -818,8 +835,8 @@
 +        return javaSecuritySystemConfiguratorAccess;
 +    }
  }
---- jdk11u/src/java.base/share/classes/module-info.java        2022-10-19 
09:05:18.276146052 +0200
-+++ jdk11u/src/java.base/share/classes/module-info.java        2022-10-19 
09:05:52.472419757 +0200
+--- jdk11u/src/java.base/share/classes/module-info.java        2023-05-10 
19:43:58.810273900 +0200
++++ jdk11u/src/java.base/share/classes/module-info.java        2023-05-11 
09:44:31.789353372 +0200
 @@ -182,6 +182,7 @@
          java.security.jgss,
          java.sql,
@@ -828,8 +845,8 @@
          jdk.jartool,
          jdk.attach,
          jdk.charsets,
---- 
jdk11u/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java  
   2022-10-19 09:05:18.352146661 +0200
-+++ 
jdk11u/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java  
   2022-10-19 09:05:52.472419757 +0200
+--- 
jdk11u/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java  
   2023-05-10 19:43:58.826273911 +0200
++++ 
jdk11u/src/java.base/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java  
   2023-05-11 09:44:31.789353372 +0200
 @@ -33,8 +33,13 @@
  
  import javax.net.ssl.*;
@@ -865,8 +882,8 @@
                      throw new KeyStoreException(
                          "FIPS mode: KeyStore must be " +
                          "from provider " + SunJSSE.cryptoProvider.getName());
---- jdk11u/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java    
2022-10-19 09:05:18.352146661 +0200
-+++ jdk11u/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java    
2022-10-19 09:05:52.472419757 +0200
+--- jdk11u/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java    
2023-05-10 19:43:58.830273913 +0200
++++ jdk11u/src/java.base/share/classes/sun/security/ssl/SSLContextImpl.java    
2023-05-11 09:44:31.793353369 +0200
 @@ -31,6 +31,7 @@
  import java.security.cert.*;
  import java.util.*;
@@ -875,16 +892,10 @@
  import sun.security.action.GetPropertyAction;
  import sun.security.provider.certpath.AlgorithmChecker;
  import sun.security.validator.Validator;
-@@ -542,20 +543,38 @@
+@@ -542,6 +543,23 @@
  
          static {
              if (SunJSSE.isFIPS()) {
--                supportedProtocols = Arrays.asList(
--                    ProtocolVersion.TLS13,
--                    ProtocolVersion.TLS12,
--                    ProtocolVersion.TLS11,
--                    ProtocolVersion.TLS10
--                );
 +                if (SharedSecrets.getJavaSecuritySystemConfiguratorAccess()
 +                        .isSystemFipsEnabled()) {
 +                    // RH1860986: TLSv1.3 key derivation not supported with
@@ -894,41 +905,75 @@
 +                        ProtocolVersion.TLS11,
 +                        ProtocolVersion.TLS10
 +                    );
- 
--                serverDefaultProtocols = getAvailableProtocols(
--                        new ProtocolVersion[] {
--                    ProtocolVersion.TLS13,
--                    ProtocolVersion.TLS12,
--                    ProtocolVersion.TLS11,
--                    ProtocolVersion.TLS10
--                });
-+                    serverDefaultProtocols = getAvailableProtocols(
-+                            new ProtocolVersion[] {
-+                        ProtocolVersion.TLS12,
-+                        ProtocolVersion.TLS11,
-+                        ProtocolVersion.TLS10
-+                    });
-+                } else {
-+                    supportedProtocols = Arrays.asList(
-+                        ProtocolVersion.TLS13,
-+                        ProtocolVersion.TLS12,
-+                        ProtocolVersion.TLS11,
-+                        ProtocolVersion.TLS10
-+                    );
 +
 +                    serverDefaultProtocols = getAvailableProtocols(
 +                            new ProtocolVersion[] {
-+                        ProtocolVersion.TLS13,
 +                        ProtocolVersion.TLS12,
 +                        ProtocolVersion.TLS11,
 +                        ProtocolVersion.TLS10
 +                    });
++                } else {
+                 supportedProtocols = Arrays.asList(
+                     ProtocolVersion.TLS13,
+                     ProtocolVersion.TLS12,
+@@ -556,6 +574,7 @@
+                     ProtocolVersion.TLS11,
+                     ProtocolVersion.TLS10
+                 });
 +                }
              } else {
                  supportedProtocols = Arrays.asList(
                      ProtocolVersion.TLS13,
---- jdk11u/src/java.base/share/classes/sun/security/ssl/SunJSSE.java   
2022-10-19 09:05:18.352146661 +0200
-+++ jdk11u/src/java.base/share/classes/sun/security/ssl/SunJSSE.java   
2022-10-19 09:05:52.472419757 +0200
+@@ -910,12 +929,23 @@
+                 if (client) {
+                     // default client protocols
+                     if (SunJSSE.isFIPS()) {
++                        if 
(SharedSecrets.getJavaSecuritySystemConfiguratorAccess()
++                            .isSystemFipsEnabled()) {
++                            // RH1860986: TLSv1.3 key derivation not 
supported with
++                            // the Security Providers available in system 
FIPS mode.
++                            candidates = new ProtocolVersion[] {
++                                ProtocolVersion.TLS12,
++                                ProtocolVersion.TLS11,
++                                ProtocolVersion.TLS10
++                            };
++                        } else {
+                         candidates = new ProtocolVersion[] {
+                             ProtocolVersion.TLS13,
+                             ProtocolVersion.TLS12,
+                             ProtocolVersion.TLS11,
+                             ProtocolVersion.TLS10
+                         };
++                        }
+                     } else {
+                         candidates = new ProtocolVersion[] {
+                             ProtocolVersion.TLS13,
+@@ -927,12 +957,23 @@
+                 } else {
+                     // default server protocols
+                     if (SunJSSE.isFIPS()) {
++                        if 
(SharedSecrets.getJavaSecuritySystemConfiguratorAccess()
++                            .isSystemFipsEnabled()) {
++                            // RH1860986: TLSv1.3 key derivation not 
supported with
++                            // the Security Providers available in system 
FIPS mode.
++                            candidates = new ProtocolVersion[] {
++                                ProtocolVersion.TLS12,
++                                ProtocolVersion.TLS11,
++                                ProtocolVersion.TLS10
++                            };
++                        } else {
+                         candidates = new ProtocolVersion[] {
+                             ProtocolVersion.TLS13,
+                             ProtocolVersion.TLS12,
+                             ProtocolVersion.TLS11,
+                             ProtocolVersion.TLS10
+                         };
++                        }
+                     } else {
+                         candidates = new ProtocolVersion[] {
+                             ProtocolVersion.TLS13,
+--- jdk11u/src/java.base/share/classes/sun/security/ssl/SunJSSE.java   
2023-05-10 19:43:58.830273913 +0200
++++ jdk11u/src/java.base/share/classes/sun/security/ssl/SunJSSE.java   
2023-05-11 09:44:31.793353369 +0200
 @@ -27,6 +27,8 @@
  
  import java.security.*;
@@ -942,21 +987,19 @@
              "sun.security.ssl.SSLContextImpl$TLS11Context", null, null);
          ps("SSLContext", "TLSv1.2",
              "sun.security.ssl.SSLContextImpl$TLS12Context", null, null);
--        ps("SSLContext", "TLSv1.3",
--            "sun.security.ssl.SSLContextImpl$TLS13Context", null, null);
 +        if (!SharedSecrets.getJavaSecuritySystemConfiguratorAccess()
 +                .isSystemFipsEnabled()) {
 +            // RH1860986: TLSv1.3 key derivation not supported with
 +            // the Security Providers available in system FIPS mode.
-+            ps("SSLContext", "TLSv1.3",
-+                "sun.security.ssl.SSLContextImpl$TLS13Context", null, null);
+         ps("SSLContext", "TLSv1.3",
+             "sun.security.ssl.SSLContextImpl$TLS13Context", null, null);
 +        }
          ps("SSLContext", "TLS",
              "sun.security.ssl.SSLContextImpl$TLSContext",
              (isfips? null : createAliases("SSL")), null);
---- jdk11u/src/java.base/share/conf/security/java.security     2022-10-19 
09:05:18.372146820 +0200
-+++ jdk11u/src/java.base/share/conf/security/java.security     2022-10-19 
09:05:52.472419757 +0200
-@@ -87,6 +87,14 @@
+--- jdk11u/src/java.base/share/conf/security/java.security     2023-05-10 
19:43:58.842273922 +0200
++++ jdk11u/src/java.base/share/conf/security/java.security     2023-05-11 
09:44:31.793353369 +0200
+@@ -86,6 +86,14 @@
  #security.provider.tbd=SunPKCS11 ${java.home}/lib/security/nss.cfg
  
  #
@@ -971,7 +1014,7 @@
  # A list of preferred providers for specific algorithms. These providers will
  # be searched for matching algorithms before the list of registered providers.
  # Entries containing errors (parsing, etc) will be ignored. Use the
-@@ -300,6 +308,11 @@
+@@ -299,6 +307,11 @@
  keystore.type=pkcs12
  
  #
@@ -983,8 +1026,22 @@
  # Controls compatibility mode for JKS and PKCS12 keystore types.
  #
  # When set to 'true', both JKS and PKCS12 keystore types support loading
+@@ -336,6 +349,13 @@
+ security.overridePropertiesFile=true
+ 
+ #
++# Determines whether this properties file will be appended to
++# using the system properties file stored at
++# /etc/crypto-policies/back-ends/java.config
++#
++security.useSystemPropertiesFile=true
++
++#
+ # Determines the default key and trust manager factory algorithms for
+ # the javax.net.ssl package.
+ #
 --- 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
      1970-01-01 01:00:00.000000000 +0100
-+++ 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
      2022-10-19 09:05:52.472419757 +0200
++++ 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/FIPSKeyImporter.java
      2023-05-11 09:44:31.793353369 +0200
 @@ -0,0 +1,290 @@
 +/*
 + * Copyright (c) 2021, Red Hat, Inc.
@@ -1276,8 +1333,8 @@
 +        }
 +    }
 +}
---- 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java 
   2022-10-19 09:05:18.680149285 +0200
-+++ 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java 
   2022-10-19 09:05:52.472419757 +0200
+--- 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java 
   2023-05-10 19:43:59.222274190 +0200
++++ 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java 
   2023-05-11 09:44:31.793353369 +0200
 @@ -26,6 +26,9 @@
  package sun.security.pkcs11;
  
@@ -1327,7 +1384,7 @@
      private static final long serialVersionUID = -1354835039035306505L;
  
      static final Debug debug = Debug.getInstance("sunpkcs11");
-@@ -328,10 +356,15 @@
+@@ -317,10 +345,15 @@
              // request multithreaded access first
              initArgs.flags = CKF_OS_LOCKING_OK;
              PKCS11 tmpPKCS11;
@@ -1344,7 +1401,7 @@
              } catch (PKCS11Exception e) {
                  if (debug != null) {
                      debug.println("Multi-threaded initialization failed: " + 
e);
-@@ -347,7 +380,7 @@
+@@ -336,7 +369,7 @@
                      initArgs.flags = 0;
                  }
                  tmpPKCS11 = PKCS11.getInstance(library,
@@ -1353,7 +1410,7 @@
              }
              p11 = tmpPKCS11;
  
-@@ -387,6 +420,24 @@
+@@ -376,6 +409,24 @@
              if (nssModule != null) {
                  nssModule.setProvider(this);
              }
@@ -1378,8 +1435,8 @@
          } catch (Exception e) {
              if (config.getHandleStartupErrors() == Config.ERR_IGNORE_ALL) {
                  throw new UnsupportedOperationException
---- 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
       2022-10-19 09:05:18.680149285 +0200
-+++ 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
       2022-10-19 09:05:52.472419757 +0200
+--- 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
       2023-05-10 19:43:59.226274194 +0200
++++ 
jdk11u/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11.java
       2023-05-11 09:44:31.797353367 +0200
 @@ -49,6 +49,7 @@
  
  import java.io.File;
@@ -1388,7 +1445,7 @@
  import java.util.*;
  
  import java.security.AccessController;
-@@ -148,18 +149,41 @@
+@@ -148,19 +149,42 @@
          this.pkcs11ModulePath = pkcs11ModulePath;
      }
  
@@ -1396,16 +1453,15 @@
 +     * Compatibility wrapper to allow this method to work as before
 +     * when FIPS mode support is not active.
 +     */
-+    public static synchronized PKCS11 getInstance(String pkcs11ModulePath,
-+           String functionList, CK_C_INITIALIZE_ARGS pInitArgs,
-+           boolean omitInitialize) throws IOException, PKCS11Exception {
+     public static synchronized PKCS11 getInstance(String pkcs11ModulePath,
+             String functionList, CK_C_INITIALIZE_ARGS pInitArgs,
+             boolean omitInitialize) throws IOException, PKCS11Exception {
 +        return getInstance(pkcs11ModulePath, functionList,
 +                           pInitArgs, omitInitialize, null);
 +    }
 +
-     public static synchronized PKCS11 getInstance(String pkcs11ModulePath,
-             String functionList, CK_C_INITIALIZE_ARGS pInitArgs,
--            boolean omitInitialize) throws IOException, PKCS11Exception {
++    public static synchronized PKCS11 getInstance(String pkcs11ModulePath,
++            String functionList, CK_C_INITIALIZE_ARGS pInitArgs,
 +            boolean omitInitialize, MethodHandle fipsKeyImporter)
 +                    throws IOException, PKCS11Exception {
          // we may only call C_Initialize once per native .so/.dll
@@ -1415,24 +1471,23 @@
 +            boolean nssFipsMode = fipsKeyImporter != null;
              if ((pInitArgs != null)
                      && ((pInitArgs.flags & CKF_OS_LOCKING_OK) != 0)) {
--                pkcs11 = new PKCS11(pkcs11ModulePath, functionList);
 +                if (nssFipsMode) {
 +                    pkcs11 = new FIPSPKCS11(pkcs11ModulePath, functionList,
 +                            fipsKeyImporter);
 +                } else {
-+                    pkcs11 = new PKCS11(pkcs11ModulePath, functionList);
+                 pkcs11 = new PKCS11(pkcs11ModulePath, functionList);
 +                }
-             } else {
--                pkcs11 = new SynchronizedPKCS11(pkcs11ModulePath, 
functionList);
++            } else {
 +                if (nssFipsMode) {
 +                    pkcs11 = new SynchronizedFIPSPKCS11(pkcs11ModulePath,
 +                            functionList, fipsKeyImporter);
-+                } else {
-+                    pkcs11 = new SynchronizedPKCS11(pkcs11ModulePath, 
functionList);
-+                }
+             } else {
+                 pkcs11 = new SynchronizedPKCS11(pkcs11ModulePath, 
functionList);
              }
++            }
              if (omitInitialize == false) {
                  try {
+                     pkcs11.C_Initialize(pInitArgs);
 @@ -1909,4 +1933,69 @@
          super.C_GenerateRandom(hSession, randomData);
      }

++++++ jdk-11.0.19+7.tar.gz -> jdk-11.0.20+8.tar.gz ++++++
/work/SRC/openSUSE:Factory/java-11-openjdk/jdk-11.0.19+7.tar.gz 
/work/SRC/openSUSE:Factory/.java-11-openjdk.new.15225/jdk-11.0.20+8.tar.gz 
differ: char 29, line 1

++++++ nss.fips.cfg.in ++++++
--- /var/tmp/diff_new_pack.SLfb3Z/_old  2023-07-26 13:22:04.183356005 +0200
+++ /var/tmp/diff_new_pack.SLfb3Z/_new  2023-07-26 13:22:04.187356027 +0200
@@ -4,4 +4,6 @@
 nssDbMode = readOnly
 nssModule = fips
 
+attributes(*,CKO_SECRET_KEY,CKK_GENERIC_SECRET)={ CKA_SIGN=true }
+
 

Reply via email to