Blame SOURCES/rh1906862-always_initialise_configurator_access.patch

b44ac0
# HG changeset patch
b44ac0
# User andrew
b44ac0
# Date 1608219816 0
b44ac0
#      Thu Dec 17 15:43:36 2020 +0000
b44ac0
# Node ID db5d1b28bfce04352b3a48960bf836f6eb20804b
b44ac0
# Parent  a2cfa397150e99b813354226d536eb8509b5850b
b44ac0
RH1906862: Always initialise JavaSecuritySystemConfiguratorAccess
b44ac0
b44ac0
diff --git openjdk.orig/jdk/src/share/classes/java/security/Security.java openjdk/jdk/src/share/classes/java/security/Security.java
b44ac0
--- openjdk.orig/jdk/src/share/classes/java/security/Security.java
b44ac0
+++ openjdk/jdk/src/share/classes/java/security/Security.java
b44ac0
@@ -30,6 +30,8 @@
b44ac0
 import java.util.concurrent.ConcurrentHashMap;
b44ac0
 import java.io.*;
b44ac0
 import java.net.URL;
b44ac0
+import sun.misc.SharedSecrets;
b44ac0
+import sun.misc.JavaSecuritySystemConfiguratorAccess;
b44ac0
 import sun.security.util.Debug;
b44ac0
 import sun.security.util.PropertyExpander;
b44ac0
 
b44ac0
@@ -69,6 +71,15 @@
b44ac0
     }
b44ac0
 
b44ac0
     static {
b44ac0
+        // Initialise here as used by code with system properties disabled
b44ac0
+        SharedSecrets.setJavaSecuritySystemConfiguratorAccess(
b44ac0
+            new JavaSecuritySystemConfiguratorAccess() {
b44ac0
+                @Override
b44ac0
+                public boolean isSystemFipsEnabled() {
b44ac0
+                    return SystemConfigurator.isSystemFipsEnabled();
b44ac0
+                }
b44ac0
+            });
b44ac0
+
b44ac0
         // doPrivileged here because there are multiple
b44ac0
         // things in initialize that might require privs.
b44ac0
         // (the FileInputStream call and the File.exists call,
b44ac0
diff --git openjdk.orig/jdk/src/share/classes/java/security/SystemConfigurator.java openjdk/jdk/src/share/classes/java/security/SystemConfigurator.java
b44ac0
--- openjdk.orig/jdk/src/share/classes/java/security/SystemConfigurator.java
b44ac0
+++ openjdk/jdk/src/share/classes/java/security/SystemConfigurator.java
b44ac0
@@ -39,8 +39,6 @@
b44ac0
 import java.util.Properties;
b44ac0
 import java.util.regex.Pattern;
b44ac0
 
b44ac0
-import sun.misc.SharedSecrets;
b44ac0
-import sun.misc.JavaSecuritySystemConfiguratorAccess;
b44ac0
 import sun.security.util.Debug;
b44ac0
 
b44ac0
 /**
b44ac0
@@ -66,16 +64,6 @@
b44ac0
 
b44ac0
     private static boolean systemFipsEnabled = false;
b44ac0
 
b44ac0
-    static {
b44ac0
-        SharedSecrets.setJavaSecuritySystemConfiguratorAccess(
b44ac0
-            new JavaSecuritySystemConfiguratorAccess() {
b44ac0
-                @Override
b44ac0
-                public boolean isSystemFipsEnabled() {
b44ac0
-                    return SystemConfigurator.isSystemFipsEnabled();
b44ac0
-                }
b44ac0
-            });
b44ac0
-    }
b44ac0
-
b44ac0
     /*
b44ac0
      * Invoked when java.security.Security class is initialized, if
b44ac0
      * java.security.disableSystemPropertiesFile property is not set and