diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java 2011-07-29 14:27:07.764531588 -0400
@@ -103,9 +103,9 @@ class Attribute implements Comparable<At
return this.def.compareTo(that.def);
}
- private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<>();
- private static final Map<Layout, Attribute> attributes = new HashMap<>();
- private static final Map<Layout, Attribute> standardDefs = new HashMap<>();
+ private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<List<Attribute>, List<Attribute>>();
+ private static final Map<Layout, Attribute> attributes = new HashMap<Layout, Attribute>();
+ private static final Map<Layout, Attribute> standardDefs = new HashMap<Layout, Attribute>();
// Canonicalized lists of trivial attrs (Deprecated, etc.)
// are used by trimToSize, in order to reduce footprint
@@ -115,7 +115,7 @@ class Attribute implements Comparable<At
synchronized (canonLists) {
List<Attribute> cl = canonLists.get(al);
if (cl == null) {
- cl = new ArrayList<>(al.size());
+ cl = new ArrayList<Attribute>(al.size());
cl.addAll(al);
cl = Collections.unmodifiableList(cl);
canonLists.put(al, cl);
@@ -336,9 +336,9 @@ class Attribute implements Comparable<At
public void addAttribute(Attribute a) {
if (attributes == null)
- attributes = new ArrayList<>(3);
+ attributes = new ArrayList<Attribute>(3);
else if (!(attributes instanceof ArrayList))
- attributes = new ArrayList<>(attributes); // unfreeze it
+ attributes = new ArrayList<Attribute>(attributes); // unfreeze it
attributes.add(a);
}
@@ -346,7 +346,7 @@ class Attribute implements Comparable<At
if (attributes == null) return null;
if (!attributes.contains(a)) return null;
if (!(attributes instanceof ArrayList))
- attributes = new ArrayList<>(attributes); // unfreeze it
+ attributes = new ArrayList<Attribute>(attributes); // unfreeze it
attributes.remove(a);
return a;
}
@@ -838,7 +838,7 @@ class Attribute implements Comparable<At
*/
static //private
Layout.Element[] tokenizeLayout(Layout self, int curCble, String layout) {
- List<Layout.Element> col = new ArrayList<>(layout.length());
+ List<Layout.Element> col = new ArrayList<Layout.Element>(layout.length());
tokenizeLayout(self, curCble, layout, col);
Layout.Element[] res = new Layout.Element[col.size()];
col.toArray(res);
@@ -903,7 +903,7 @@ class Attribute implements Comparable<At
case 'T': // union: 'T' any_int union_case* '(' ')' '[' body ']'
kind = EK_UN;
i = tokenizeSInt(e, layout, i);
- List<Layout.Element> cases = new ArrayList<>();
+ List<Layout.Element> cases = new ArrayList<Layout.Element>();
for (;;) {
// Keep parsing cases until we hit the default case.
if (layout.charAt(i++) != '(')
@@ -1057,7 +1057,7 @@ class Attribute implements Comparable<At
}
static //private
String[] splitBodies(String layout) {
- List<String> bodies = new ArrayList<>();
+ List<String> bodies = new ArrayList<String>();
// Parse several independent layout bodies: "[foo][bar]...[baz]"
for (int i = 0; i < layout.length(); i++) {
if (layout.charAt(i++) != '[')
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java.sav 2011-07-29 14:27:01.425625667 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java 2011-07-29 14:27:07.765531573 -0400
@@ -257,7 +257,7 @@ class BandStructure {
assert(basicCodings[_meta_default] == null);
assert(basicCodings[_meta_canon_min] != null);
assert(basicCodings[_meta_canon_max] != null);
- Map<Coding, Integer> map = new HashMap<>();
+ Map<Coding, Integer> map = new HashMap<Coding, Integer>();
for (int i = 0; i < basicCodings.length; i++) {
Coding c = basicCodings[i];
if (c == null) continue;
@@ -1068,8 +1068,8 @@ class BandStructure {
// Bootstrap support for CPRefBands. These are needed to record
// intended CP indexes, before the CP has been created.
- private final List<CPRefBand> allKQBands = new ArrayList<>();
- private List<Object[]> needPredefIndex = new ArrayList<>();
+ private final List<CPRefBand> allKQBands = new ArrayList<CPRefBand>();
+ private List<Object[]> needPredefIndex = new ArrayList<Object[]>();
int encodeRef(Entry e, Index ix) {
@@ -1704,7 +1704,7 @@ class BandStructure {
protected int attrClassFileVersionMask;
// Mapping from Attribute.Layout to Band[] (layout element bands).
- protected Map<Attribute.Layout, Band[]> attrBandTable = new HashMap<>();
+ protected Map<Attribute.Layout, Band[]> attrBandTable = new HashMap<Attribute.Layout, Band[]>();
// Well-known attributes:
protected final Attribute.Layout attrCodeEmpty;
@@ -1713,16 +1713,16 @@ class BandStructure {
protected final Attribute.Layout attrConstantValue;
// Mapping from Attribute.Layout to Integer (inverse of attrDefs)
- Map<Attribute.Layout, Integer> attrIndexTable = new HashMap<>();
+ Map<Attribute.Layout, Integer> attrIndexTable = new HashMap<Attribute.Layout, Integer>();
// Mapping from attribute index (<32 are flag bits) to attributes.
protected List<List<Attribute.Layout>> attrDefs =
- new FixedList<>(ATTR_CONTEXT_LIMIT);
+ new FixedList<List<Attribute.Layout>>(ATTR_CONTEXT_LIMIT);
{
for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
assert(attrIndexLimit[i] == 0);
attrIndexLimit[i] = 32; // just for the sake of predefs.
- attrDefs.set(i, new ArrayList<>(Collections.nCopies(
+ attrDefs.set(i, new ArrayList<Attribute.Layout>(Collections.nCopies(
attrIndexLimit[i], (Attribute.Layout)null)));
}
@@ -1912,7 +1912,7 @@ class BandStructure {
protected List<Attribute.Layout> getPredefinedAttrs(int ctype) {
assert(attrIndexLimit[ctype] != 0);
- List<Attribute.Layout> res = new ArrayList<>(attrIndexLimit[ctype]);
+ List<Attribute.Layout> res = new ArrayList<Attribute.Layout>(attrIndexLimit[ctype]);
// Remove nulls and non-predefs.
for (int ai = 0; ai < attrIndexLimit[ctype]; ai++) {
if (testBit(attrDefSeen[ctype], 1L<<ai)) continue;
@@ -2536,7 +2536,7 @@ class BandStructure {
// DEBUG ONLY: Record something about the band order.
boolean notePrevForAssert(Band b, Band p) {
if (prevForAssertMap == null)
- prevForAssertMap = new HashMap<>();
+ prevForAssertMap = new HashMap<Band, Band>();
prevForAssertMap.put(b, p);
return true;
}
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java 2011-07-29 14:27:07.765531573 -0400
@@ -469,7 +469,7 @@ class ClassReader {
void readInnerClasses(Class cls) throws IOException {
int nc = readUnsignedShort();
- ArrayList<InnerClass> ics = new ArrayList<>(nc);
+ ArrayList<InnerClass> ics = new ArrayList<InnerClass>(nc);
for (int i = 0; i < nc; i++) {
InnerClass ic =
new InnerClass(readClassRef(),
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java 2011-07-29 14:27:07.766531558 -0400
@@ -743,9 +743,9 @@ class CodingChooser {
// Steps 1/2/3 are interdependent, and may be iterated.
// Steps 4 and 5 may be decided independently afterward.
int[] LValuesCoded = PopulationCoding.LValuesCoded;
- List<Coding> bestFits = new ArrayList<>();
- List<Coding> fullFits = new ArrayList<>();
- List<Coding> longFits = new ArrayList<>();
+ List<Coding> bestFits = new ArrayList<Coding>();
+ List<Coding> fullFits = new ArrayList<Coding>();
+ List<Coding> longFits = new ArrayList<Coding>();
final int PACK_TO_MAX_S = 1;
if (bestPopFVC <= 255) {
bestFits.add(BandStructure.BYTE1);
@@ -785,7 +785,7 @@ class CodingChooser {
}
}
}
- List<Coding> allFits = new ArrayList<>();
+ List<Coding> allFits = new ArrayList<Coding>();
for (Iterator<Coding> i = bestFits.iterator(),
j = fullFits.iterator(),
k = longFits.iterator();
@@ -1230,10 +1230,10 @@ class CodingChooser {
Histogram hist = getValueHistogram();
int fVlen = stressLen(hist.getTotalLength());
if (fVlen == 0) return coding;
- List<Integer> popvals = new ArrayList<>();
+ List<Integer> popvals = new ArrayList<Integer>();
if (stress.nextBoolean()) {
// Build the population from the value list.
- Set<Integer> popset = new HashSet<>();
+ Set<Integer> popset = new HashSet<Integer>();
for (int i = start; i < end; i++) {
if (popset.add(values[i])) popvals.add(values[i]);
}
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java 2011-07-29 14:27:07.766531558 -0400
@@ -402,7 +402,7 @@ class Coding implements Comparable<Codin
private static Map<Coding, Coding> codeMap;
private static synchronized Coding of(int B, int H, int S, int del) {
- if (codeMap == null) codeMap = new HashMap<>();
+ if (codeMap == null) codeMap = new HashMap<Coding, Coding>();
Coding x0 = new Coding(B, H, S, del);
Coding x1 = codeMap.get(x0);
if (x1 == null) codeMap.put(x0, x1 = x0);
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java 2011-07-29 14:27:07.766531558 -0400
@@ -915,7 +915,7 @@ class ConstantPool {
public static
Index[] partition(Index ix, int[] keys) {
// %%% Should move this into class Index.
- List<List<Entry>> parts = new ArrayList<>();
+ List<List<Entry>> parts = new ArrayList<List<Entry>>();
Entry[] cpMap = ix.cpMap;
assert(keys.length == cpMap.length);
for (int i = 0; i < keys.length; i++) {
@@ -926,7 +926,7 @@ class ConstantPool {
}
List<Entry> part = parts.get(key);
if (part == null) {
- parts.set(key, part = new ArrayList<>());
+ parts.set(key, part = new ArrayList<Entry>());
}
part.add(cpMap[i]);
}
@@ -1133,7 +1133,7 @@ class ConstantPool {
void completeReferencesIn(Set<Entry> cpRefs, boolean flattenSigs) {
cpRefs.remove(null);
for (ListIterator<Entry> work =
- new ArrayList<>(cpRefs).listIterator(cpRefs.size());
+ new ArrayList<Entry>(cpRefs).listIterator(cpRefs.size());
work.hasPrevious(); ) {
Entry e = work.previous();
work.remove(); // pop stack
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java.sav 2011-07-29 14:27:01.425625667 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java 2011-07-29 14:27:07.767531543 -0400
@@ -59,7 +59,7 @@ class Driver {
ResourceBundle.getBundle("com.sun.java.util.jar.pack.DriverResource");
public static void main(String[] ava) throws IOException {
- List<String> av = new ArrayList<>(Arrays.asList(ava));
+ List<String> av = new ArrayList<String>(Arrays.asList(ava));
boolean doPack = true;
boolean doUnpack = false;
@@ -84,7 +84,7 @@ class Driver {
}
// Collect engine properties here:
- Map<String,String> engProps = new HashMap<>();
+ Map<String,String> engProps = new HashMap<String, String>();
engProps.put(verboseProp, System.getProperty(verboseProp));
String optionMap;
@@ -98,7 +98,7 @@ class Driver {
}
// Collect argument properties here:
- Map<String,String> avProps = new HashMap<>();
+ Map<String,String> avProps = new HashMap<String, String>();
try {
for (;;) {
String state = parseCommandOptions(av, optionMap, avProps);
@@ -537,7 +537,7 @@ class Driver {
String resultString = null;
// Convert options string into optLines dictionary.
- TreeMap<String,String[]> optmap = new TreeMap<>();
+ TreeMap<String,String[]> optmap = new TreeMap<String,String[]>();
loadOptmap:
for (String optline : options.split("\n")) {
String[] words = optline.split("\\p{Space}+");
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java 2011-07-29 14:27:07.767531543 -0400
@@ -45,7 +45,7 @@ final class FixedList<E> implements List
private final ArrayList<E> flist;
protected FixedList(int capacity) {
- flist = new ArrayList<>(capacity);
+ flist = new ArrayList<E>(capacity);
// initialize the list to null
for (int i = 0 ; i < capacity ; i++) {
flist.add(null);
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Fixups.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Fixups.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Fixups.java.sav 2011-07-29 14:27:56.374810200 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Fixups.java 2011-07-29 14:28:15.044533166 -0400
@@ -126,11 +126,11 @@ final class Fixups extends AbstractColle
public void setBytes(byte[] newBytes) {
if (bytes == newBytes) return;
ArrayList<Fixup> old = null;
- assert((old = new ArrayList<>(this)) != null);
+ assert((old = new ArrayList<Fixup>(this)) != null);
if (bytes == null || newBytes == null) {
// One or the other representations is deficient.
// Construct a checkpoint.
- ArrayList<Fixup> save = new ArrayList<>(this);
+ ArrayList<Fixup> save = new ArrayList<Fixup>(this);
clear();
bytes = newBytes;
addAll(save);
@@ -138,7 +138,7 @@ final class Fixups extends AbstractColle
// assume newBytes is some sort of bitwise copy of the old bytes
bytes = newBytes;
}
- assert(old.equals(new ArrayList<>(this)));
+ assert(old.equals(new ArrayList<Fixup>(this)));
}
static final int LOC_SHIFT = 1;
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java 2011-07-29 14:27:07.768531528 -0400
@@ -112,7 +112,7 @@ class Package {
public static final Attribute.Layout attrSourceFileSpecial;
public static final Map<Attribute.Layout, Attribute> attrDefs;
static {
- Map<Layout, Attribute> ad = new HashMap<>(3);
+ Map<Layout, Attribute> ad = new HashMap<Layout, Attribute>(3);
attrCodeEmpty = Attribute.define(ad, ATTR_CONTEXT_METHOD,
"Code", "").layout();
attrInnerClassesEmpty = Attribute.define(ad, ATTR_CONTEXT_CLASS,
@@ -181,7 +181,7 @@ class Package {
}
}
- ArrayList<Package.Class> classes = new ArrayList<>();
+ ArrayList<Package.Class> classes = new ArrayList<Package.Class>();
public List<Package.Class> getClasses() {
return classes;
@@ -263,7 +263,7 @@ class Package {
if (olda == null)
return; // no SourceFile attr.
String obvious = getObviousSourceFile();
- List<Entry> ref = new ArrayList<>(1);
+ List<Entry> ref = new ArrayList<Entry>(1);
olda.visitRefs(this, VRM_PACKAGE, ref);
Utf8Entry sfName = (Utf8Entry) ref.get(0);
Attribute a = olda;
@@ -291,7 +291,7 @@ class Package {
if (a != olda) {
if (verbose > 2)
Utils.log.fine("recoding obvious SourceFile="+obvious);
- List<Attribute> newAttrs = new ArrayList<>(getAttributes());
+ List<Attribute> newAttrs = new ArrayList<Attribute>(getAttributes());
int where = newAttrs.indexOf(olda);
newAttrs.set(where, a);
setAttributes(newAttrs);
@@ -321,7 +321,7 @@ class Package {
}
public void setInnerClasses(Collection<InnerClass> ics) {
- innerClasses = (ics == null) ? null : new ArrayList<>(ics);
+ innerClasses = (ics == null) ? null : new ArrayList<InnerClass>(ics);
// Edit the attribute list, if necessary.
Attribute a = getAttribute(attrInnerClassesEmpty);
if (innerClasses != null && a == null)
@@ -340,7 +340,7 @@ class Package {
* with that of Package.this.allInnerClasses.
*/
public List<InnerClass> computeGloballyImpliedICs() {
- Set<Entry> cpRefs = new HashSet<>();
+ Set<Entry> cpRefs = new HashSet<Entry>();
{ // This block temporarily displaces this.innerClasses.
ArrayList<InnerClass> innerClassesSaved = innerClasses;
innerClasses = null; // ignore for the moment
@@ -349,7 +349,7 @@ class Package {
}
ConstantPool.completeReferencesIn(cpRefs, true);
- Set<Entry> icRefs = new HashSet<>();
+ Set<Entry> icRefs = new HashSet<Entry>();
for (Entry e : cpRefs) {
// Restrict cpRefs to InnerClasses entries only.
if (!(e instanceof ClassEntry)) continue;
@@ -365,7 +365,7 @@ class Package {
// This loop is structured this way so as to accumulate
// entries into impliedICs in an order which reflects
// the order of allInnerClasses.
- ArrayList<InnerClass> impliedICs = new ArrayList<>();
+ ArrayList<InnerClass> impliedICs = new ArrayList<InnerClass>();
for (InnerClass ic : allInnerClasses) {
// This one is locally relevant if it describes
// a member of the current class, or if the current
@@ -408,8 +408,8 @@ class Package {
// Diff is A since I is empty.
}
// (I*A) is non-trivial
- Set<InnerClass> center = new HashSet<>(actualICs);
- center.retainAll(new HashSet<>(impliedICs));
+ Set<InnerClass> center = new HashSet<InnerClass>(actualICs);
+ center.retainAll(new HashSet<InnerClass>(impliedICs));
impliedICs.addAll(actualICs);
impliedICs.removeAll(center);
// Diff is now I^A = (I+A)-(I*A).
@@ -538,7 +538,7 @@ class Package {
super(flags, descriptor);
assert(!descriptor.isMethod());
if (fields == null)
- fields = new ArrayList<>();
+ fields = new ArrayList<Field>();
boolean added = fields.add(this);
assert(added);
order = fields.size();
@@ -563,7 +563,7 @@ class Package {
super(flags, descriptor);
assert(descriptor.isMethod());
if (methods == null)
- methods = new ArrayList<>();
+ methods = new ArrayList<Method>();
boolean added = methods.add(this);
assert(added);
}
@@ -728,14 +728,14 @@ class Package {
}
// What non-class files are in this unit?
- ArrayList<File> files = new ArrayList<>();
+ ArrayList<File> files = new ArrayList<File>();
public List<File> getFiles() {
return files;
}
public List<File> getClassStubs() {
- List<File> classStubs = new ArrayList<>(classes.size());
+ List<File> classStubs = new ArrayList<File>(classes.size());
for (Class cls : classes) {
assert(cls.file.isClassStub());
classStubs.add(cls.file);
@@ -749,7 +749,7 @@ class Package {
int modtime = NO_MODTIME;
int options = 0; // random flag bits, such as deflate_hint
Class stubClass; // if this is a stub, here's the class
- ArrayList<byte[]> prepend = new ArrayList<>(); // list of byte[]
+ ArrayList<byte[]> prepend = new ArrayList<byte[]>(); // list of byte[]
java.io.ByteArrayOutputStream append = new ByteArrayOutputStream();
File(Utf8Entry name) {
@@ -852,7 +852,7 @@ class Package {
public InputStream getInputStream() {
InputStream in = new ByteArrayInputStream(append.toByteArray());
if (prepend.isEmpty()) return in;
- List<InputStream> isa = new ArrayList<>(prepend.size()+1);
+ List<InputStream> isa = new ArrayList<InputStream>(prepend.size()+1);
for (byte[] bytes : prepend) {
isa.add(new ByteArrayInputStream(bytes));
}
@@ -888,7 +888,7 @@ class Package {
}
// Is there a globally declared table of inner classes?
- List<InnerClass> allInnerClasses = new ArrayList<>();
+ List<InnerClass> allInnerClasses = new ArrayList<InnerClass>();
Map<ClassEntry, InnerClass> allInnerClassesByThis;
public
@@ -903,7 +903,7 @@ class Package {
allInnerClasses.addAll(ics);
// Make an index:
- allInnerClassesByThis = new HashMap<>(allInnerClasses.size());
+ allInnerClassesByThis = new HashMap<ClassEntry,InnerClass>(allInnerClasses.size());
for (InnerClass ic : allInnerClasses) {
Object pic = allInnerClassesByThis.put(ic.thisClass, ic);
assert(pic == null); // caller must ensure key uniqueness!
@@ -1295,7 +1295,7 @@ class Package {
// Use this before writing the class files.
void ensureAllClassFiles() {
- Set<File> fileSet = new HashSet<>(files);
+ Set<File> fileSet = new HashSet<File>(files);
for (Class cls : classes) {
// Add to the end of ths list:
if (!fileSet.contains(cls.file))
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java.sav 2011-07-29 14:27:01.426625653 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java 2011-07-29 14:27:07.768531528 -0400
@@ -686,7 +686,7 @@ class PackageReader extends BandStructur
cp_Signature_classes.expectLength(getIntTotal(numSigClasses));
cp_Signature_classes.readFrom(in);
cp_Signature_classes.setIndex(getCPIndex(CONSTANT_Class));
- utf8Signatures = new HashMap<>();
+ utf8Signatures = new HashMap<Utf8Entry, SignatureEntry>();
for (int i = 0; i < cpMap.length; i++) {
Utf8Entry formRef = (Utf8Entry) cp_Signature_form.getRef();
ClassEntry[] classRefs = new ClassEntry[numSigClasses[i]];
@@ -892,7 +892,7 @@ class PackageReader extends BandStructur
ic_name.expectLength(longICCount);
ic_name.readFrom(in);
ic_flags.resetForSecondPass();
- List<InnerClass> icList = new ArrayList<>(numInnerClasses);
+ List<InnerClass> icList = new ArrayList<InnerClass>(numInnerClasses);
for (int i = 0; i < numInnerClasses; i++) {
int flags = ic_flags.getInt();
boolean longForm = (flags & ACC_IC_LONG_FORM) != 0;
@@ -934,7 +934,7 @@ class PackageReader extends BandStructur
void readLocalInnerClasses(Class cls) throws IOException {
int nc = class_InnerClasses_N.getInt();
- List<InnerClass> localICs = new ArrayList<>(nc);
+ List<InnerClass> localICs = new ArrayList<InnerClass>(nc);
for (int i = 0; i < nc; i++) {
ClassEntry thisClass = (ClassEntry) class_InnerClasses_RC.getRef();
int flags = class_InnerClasses_F.getInt();
@@ -1062,7 +1062,7 @@ class PackageReader extends BandStructur
Entry[] reconstructLocalCPMap(Class cls) {
Set<Entry> ldcRefs = ldcRefMap.get(cls);
- Set<Entry> cpRefs = new HashSet<>();
+ Set<Entry> cpRefs = new HashSet<Entry>();
// look for constant pool entries:
cls.visitRefs(VRM_CLASSIC, cpRefs);
@@ -1167,7 +1167,7 @@ class PackageReader extends BandStructur
method_descr.expectLength(totalNM);
if (verbose > 1) Utils.log.fine("expecting #fields="+totalNF+" and #methods="+totalNM+" in #classes="+numClasses);
- List<Class.Field> fields = new ArrayList<>(totalNF);
+ List<Class.Field> fields = new ArrayList<Class.Field>(totalNF);
field_descr.readFrom(in);
for (int i = 0; i < classes.length; i++) {
Class c = classes[i];
@@ -1183,7 +1183,7 @@ class PackageReader extends BandStructur
countAndReadAttrs(ATTR_CONTEXT_FIELD, fields);
fields = null; // release to GC
- List<Class.Method> methods = new ArrayList<>(totalNM);
+ List<Class.Method> methods = new ArrayList<Class.Method>(totalNM);
method_descr.readFrom(in);
for (int i = 0; i < classes.length; i++) {
Class c = classes[i];
@@ -1206,10 +1206,10 @@ class PackageReader extends BandStructur
Code[] allCodes;
List<Code> codesWithFlags;
- Map<Class, Set<Entry>> ldcRefMap = new HashMap<>();
+ Map<Class, Set<Entry>> ldcRefMap = new HashMap<Class, Set<Entry>>();
Code[] buildCodeAttrs(List<Class.Method> methods) {
- List<Code> codes = new ArrayList<>(methods.size());
+ List<Code> codes = new ArrayList<Code>(methods.size());
for (Class.Method m : methods) {
if (m.getAttribute(attrCodeEmpty) != null) {
m.code = new Code(m);
@@ -1233,7 +1233,7 @@ class PackageReader extends BandStructur
boolean attrsOK = testBit(archiveOptions, AO_HAVE_ALL_CODE_FLAGS);
code_headers.expectLength(allCodes.length);
code_headers.readFrom(in);
- List<Code> longCodes = new ArrayList<>(allCodes.length / 10);
+ List<Code> longCodes = new ArrayList<Code>(allCodes.length / 10);
for (int i = 0; i < allCodes.length; i++) {
Code c = allCodes[i];
int sc = code_headers.getByte();
@@ -1472,7 +1472,7 @@ class PackageReader extends BandStructur
bits -= (1L<<ai);
nfa += 1;
}
- List<Attribute> ha = new ArrayList<>(nfa + noa);
+ List<Attribute> ha = new ArrayList<Attribute>(nfa + noa);
h.attributes = ha;
bits = attrBits; // iterate again
for (int ai = 0; bits != 0; ai++) {
@@ -1596,7 +1596,7 @@ class PackageReader extends BandStructur
void readAttrs(int ctype, Collection<? extends Attribute.Holder> holders)
throws IOException {
// Decode band values into attributes.
- Set<Attribute.Layout> sawDefs = new HashSet<>();
+ Set<Attribute.Layout> sawDefs = new HashSet<Attribute.Layout>();
ByteArrayOutputStream buf = new ByteArrayOutputStream();
for (final Attribute.Holder h : holders) {
if (h.attributes == null) continue;
@@ -1799,7 +1799,7 @@ class PackageReader extends BandStructur
// scratch buffer for collecting code::
byte[] buf = new byte[1<<12];
// record of all switch opcodes (these are variable-length)
- List<Integer> allSwitchOps = new ArrayList<>();
+ List<Integer> allSwitchOps = new ArrayList<Integer>();
for (int k = 0; k < allCodes.length; k++) {
Code c = allCodes[k];
scanOneMethod:
@@ -1915,7 +1915,7 @@ class PackageReader extends BandStructur
Set<Entry> ldcRefSet = ldcRefMap.get(curClass);
if (ldcRefSet == null)
- ldcRefMap.put(curClass, ldcRefSet = new HashSet<>());
+ ldcRefMap.put(curClass, ldcRefSet = new HashSet<Entry>());
ClassEntry thisClass = curClass.thisClass;
ClassEntry superClass = curClass.superClass;
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java.sav 2011-07-29 14:27:01.427625638 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java 2011-07-29 14:27:07.769531513 -0400
@@ -116,7 +116,7 @@ class PackageWriter extends BandStructur
int[][] attrCounts; // count attr. occurences
void setup() {
- requiredEntries = new HashSet<>();
+ requiredEntries = new HashSet<Entry>();
setArchiveOptions();
trimClassAttributes();
collectAttributeLayouts();
@@ -176,7 +176,7 @@ class PackageWriter extends BandStructur
}
}
// Decide on default version number (majority rule).
- Map<Integer, int[]> verCounts = new HashMap<>();
+ Map<Integer, int[]> verCounts = new HashMap<Integer, int[]>();
int bestCount = 0;
int bestVersion = -1;
for (Class cls : pkg.classes) {
@@ -728,7 +728,7 @@ class PackageWriter extends BandStructur
void collectAttributeLayouts() {
maxFlags = new int[ATTR_CONTEXT_LIMIT];
- allLayouts = new FixedList<>(ATTR_CONTEXT_LIMIT);
+ allLayouts = new FixedList<Map<Attribute.Layout,int[]>>(ATTR_CONTEXT_LIMIT);
for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
allLayouts.set(i, new HashMap<Attribute.Layout, int[]>());
}
@@ -773,7 +773,7 @@ class PackageWriter extends BandStructur
}
// Collect counts for both predefs. and custom defs.
// Decide on custom, local attribute definitions.
- backCountTable = new HashMap<>();
+ backCountTable = new HashMap<Attribute.Layout, int[]>();
attrCounts = new int[ATTR_CONTEXT_LIMIT][];
for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
// Now the remaining defs in allLayouts[i] need attr. indexes.
@@ -888,7 +888,7 @@ class PackageWriter extends BandStructur
Attribute.Layout[] attrDefsWritten;
void writeAttrDefs() throws IOException {
- List<Object[]> defList = new ArrayList<>();
+ List<Object[]> defList = new ArrayList<Object[]>();
for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
int limit = attrDefs.get(i).size();
for (int j = 0; j < limit; j++) {
@@ -1005,7 +1005,7 @@ class PackageWriter extends BandStructur
void collectInnerClasses() {
// Capture inner classes, removing them from individual classes.
// Irregular inner classes must stay local, though.
- Map<ClassEntry, InnerClass> allICMap = new HashMap<>();
+ Map<ClassEntry, InnerClass> allICMap = new HashMap<ClassEntry, InnerClass>();
// First, collect a consistent global set.
for (Class cls : pkg.classes) {
if (!cls.hasInnerClasses()) continue;
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java 2011-07-29 14:27:07.769531513 -0400
@@ -181,8 +181,8 @@ public class PackerImpl extends TLGloba
final Map<Attribute.Layout, Attribute> attrDefs;
final Map<Attribute.Layout, String> attrCommands;
{
- Map<Attribute.Layout, Attribute> lattrDefs = new HashMap<>();
- Map<Attribute.Layout, String> lattrCommands = new HashMap<>();
+ Map<Attribute.Layout, Attribute> lattrDefs = new HashMap<Attribute.Layout, Attribute>();
+ Map<Attribute.Layout, String> lattrCommands = new HashMap<Attribute.Layout, String>();
String[] keys = {
Pack200.Packer.CLASS_ATTRIBUTE_PFX,
Pack200.Packer.FIELD_ATTRIBUTE_PFX,
@@ -590,7 +590,7 @@ public class PackerImpl extends TLGloba
assert(pkg.files.containsAll(pkg.getClassStubs()));
// Order of stubs in file list must agree with classes.
List<Package.File> res = pkg.files;
- assert((res = new ArrayList<>(pkg.files))
+ assert((res = new ArrayList<Package.File>(pkg.files))
.retainAll(pkg.getClassStubs()) || true);
assert(res.equals(pkg.getClassStubs()));
}
@@ -623,7 +623,7 @@ public class PackerImpl extends TLGloba
List<InFile> scanJar(JarFile jf) throws IOException {
// Collect jar entries, preserving order.
- List<InFile> inFiles = new ArrayList<>();
+ List<InFile> inFiles = new ArrayList<InFile>();
try {
for (JarEntry je : Collections.list(jf.entries())) {
InFile inFile = new InFile(jf, je);
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java 2011-07-29 14:27:07.769531513 -0400
@@ -309,7 +309,7 @@ class PopulationCoding implements Coding
// As each new value is added, we assert that the value
// was not already in the set.
Set<Integer> uniqueValuesForDebug = null;
- assert((uniqueValuesForDebug = new HashSet<>()) != null);
+ assert((uniqueValuesForDebug = new HashSet<Integer>()) != null);
int fillp = 1;
maxForDebug += fillp;
int min = Integer.MIN_VALUE; // farthest from the center
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java.sav 2011-07-29 14:27:01.427625638 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java 2011-07-29 14:27:07.770531498 -0400
@@ -47,8 +47,8 @@ import java.util.jar.Pack200;
*/
final class PropMap implements SortedMap<String, String> {
- private final TreeMap<String, String> theMap = new TreeMap<>();;
- private final List<PropertyChangeListener> listenerList = new ArrayList<>(1);
+ private final TreeMap<String, String> theMap = new TreeMap<String, String>();;
+ private final List<PropertyChangeListener> listenerList = new ArrayList<PropertyChangeListener>(1);
void addListener(PropertyChangeListener listener) {
listenerList.add(listener);
@@ -187,7 +187,7 @@ final class PropMap implements SortedMap
// Get sequence of props for "prefix", and "prefix.*".
List<String> getProperties(String prefix) {
Collection<String> values = prefixMap(prefix).values();
- List<String> res = new ArrayList<>(values.size());
+ List<String> res = new ArrayList<String>(values.size());
res.addAll(values);
while (res.remove(null));
return res;
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java.sav 2011-07-29 12:21:02.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java 2011-07-29 14:27:07.770531498 -0400
@@ -58,12 +58,12 @@ class TLGlobals {
private final Map<String, MemberEntry> memberEntries;
TLGlobals() {
- utf8Entries = new HashMap<>();
- classEntries = new HashMap<>();
- literalEntries = new HashMap<>();
- signatureEntries = new HashMap<>();
- descriptorEntries = new HashMap<>();
- memberEntries = new HashMap<>();
+ utf8Entries = new HashMap<String,Utf8Entry>();
+ classEntries = new HashMap<String,ClassEntry>();
+ literalEntries = new HashMap<Object,LiteralEntry>();
+ signatureEntries = new HashMap<String,SignatureEntry>();
+ descriptorEntries = new HashMap<String,DescriptorEntry>();
+ memberEntries = new HashMap<String,MemberEntry>();
props = new PropMap();
}
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java.sav 2011-07-29 14:27:01.427625638 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java 2011-07-29 14:27:07.770531498 -0400
@@ -232,7 +232,7 @@ public class UnpackerImpl extends TLGlob
props.setProperty(java.util.jar.Pack200.Unpacker.PROGRESS,"50");
pkg.ensureAllClassFiles();
// Now write out the files.
- Set<Package.Class> classesToWrite = new HashSet<>(pkg.getClasses());
+ Set<Package.Class> classesToWrite = new HashSet<Package.Class>(pkg.getClasses());
for (Package.File file : pkg.getFiles()) {
String name = file.nameString;
JarEntry je = new JarEntry(Utils.getJarEntryName(name));
diff -up openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java.sav openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java
--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java.sav 2011-07-29 14:27:01.427625638 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java 2011-07-29 14:27:07.770531498 -0400
@@ -132,7 +132,7 @@ class Utils {
// Keep a TLS point to the global data and environment.
// This makes it simpler to supply environmental options
// to the engine code, especially the native code.
- static final ThreadLocal<TLGlobals> currentInstance = new ThreadLocal<>();
+ static final ThreadLocal<TLGlobals> currentInstance = new ThreadLocal<TLGlobals>();
// convenience methods to access the TL globals
static TLGlobals getTLGlobals() {
diff -up openjdk-boot/jdk/src/share/classes/com/sun/rowset/CachedRowSetImpl.java.sav openjdk-boot/jdk/src/share/classes/com/sun/rowset/CachedRowSetImpl.java
--- openjdk-boot/jdk/src/share/classes/com/sun/rowset/CachedRowSetImpl.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/rowset/CachedRowSetImpl.java 2011-07-29 14:27:07.773531453 -0400
@@ -1284,7 +1284,7 @@ public class CachedRowSetImpl extends Ba
*/
public Collection<?> toCollection() throws SQLException {
- TreeMap<Integer, Object> tMap = new TreeMap<>();
+ TreeMap<Integer, Object> tMap = new TreeMap<Integer, Object>();
for (int i = 0; i<numRows; i++) {
tMap.put(Integer.valueOf(i), rvh.get(i));
@@ -1314,7 +1314,7 @@ public class CachedRowSetImpl extends Ba
public Collection<?> toCollection(int column) throws SQLException {
int nRows = numRows;
- Vector<Object> vec = new Vector<>(nRows);
+ Vector<Object> vec = new Vector<Object>(nRows);
// create a copy
CachedRowSetImpl crsTemp;
diff -up openjdk-boot/jdk/src/share/classes/com/sun/rowset/JoinRowSetImpl.java.sav openjdk-boot/jdk/src/share/classes/com/sun/rowset/JoinRowSetImpl.java
--- openjdk-boot/jdk/src/share/classes/com/sun/rowset/JoinRowSetImpl.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/rowset/JoinRowSetImpl.java 2011-07-29 14:27:07.774531438 -0400
@@ -222,7 +222,7 @@ public class JoinRowSetImpl extends WebR
// either of the setter methods have been set.
if(boolColId){
//
- ArrayList<Integer> indices = new ArrayList<>();
+ ArrayList<Integer> indices = new ArrayList<Integer>();
for(int i=0;i<cRowset.getMatchColumnNames().length;i++) {
if( (strMatchKey = (cRowset.getMatchColumnNames())[i]) != null) {
iMatchKey = cRowset.findColumn(strMatchKey);
diff -up openjdk-boot/jdk/src/share/classes/com/sun/security/auth/callback/DialogCallbackHandler.java.sav openjdk-boot/jdk/src/share/classes/com/sun/security/auth/callback/DialogCallbackHandler.java
--- openjdk-boot/jdk/src/share/classes/com/sun/security/auth/callback/DialogCallbackHandler.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/security/auth/callback/DialogCallbackHandler.java 2011-07-29 14:27:07.774531438 -0400
@@ -99,10 +99,10 @@ public class DialogCallbackHandler imple
throws UnsupportedCallbackException
{
/* Collect messages to display in the dialog */
- final List<Object> messages = new ArrayList<>(3);
+ final List<Object> messages = new ArrayList<Object>(3);
/* Collection actions to perform if the user clicks OK */
- final List<Action> okActions = new ArrayList<>(2);
+ final List<Action> okActions = new ArrayList<Action>(2);
ConfirmationInfo confirmation = new ConfirmationInfo();
diff -up openjdk-boot/jdk/src/share/classes/com/sun/security/auth/login/ConfigFile.java.sav openjdk-boot/jdk/src/share/classes/com/sun/security/auth/login/ConfigFile.java
--- openjdk-boot/jdk/src/share/classes/com/sun/security/auth/login/ConfigFile.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/security/auth/login/ConfigFile.java 2011-07-29 14:27:07.774531438 -0400
@@ -152,7 +152,7 @@ public class ConfigFile extends javax.se
// new configuration
HashMap<String, LinkedList<AppConfigurationEntry>> newConfig =
- new HashMap<>();
+ new HashMap<String, LinkedList<AppConfigurationEntry>>();
if (url != null) {
@@ -392,7 +392,7 @@ public class ConfigFile extends javax.se
String moduleClass;
String sflag;
AppConfigurationEntry.LoginModuleControlFlag controlFlag;
- LinkedList<AppConfigurationEntry> configEntries = new LinkedList<>();
+ LinkedList<AppConfigurationEntry> configEntries = new LinkedList<AppConfigurationEntry>();
// application name
appName = st.sval;
@@ -432,7 +432,7 @@ public class ConfigFile extends javax.se
}
// get the args
- HashMap<String, String> options = new HashMap<>();
+ HashMap<String, String> options = new HashMap<String, String>();
String key;
String value;
while (peek(";") == false) {
diff -up openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/JndiLoginModule.java.sav openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/JndiLoginModule.java
--- openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/JndiLoginModule.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/JndiLoginModule.java 2011-07-29 14:27:07.775531424 -0400
@@ -184,7 +184,7 @@ public class JndiLoginModule implements
private UnixNumericUserPrincipal UIDPrincipal;
private UnixNumericGroupPrincipal GIDPrincipal;
private LinkedList<UnixNumericGroupPrincipal> supplementaryGroups =
- new LinkedList<>();
+ new LinkedList<UnixNumericGroupPrincipal>();
// initial state
private Subject subject;
diff -up openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/KeyStoreLoginModule.java.sav openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/KeyStoreLoginModule.java
--- openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/KeyStoreLoginModule.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/KeyStoreLoginModule.java 2011-07-29 14:27:07.775531424 -0400
@@ -658,7 +658,7 @@ public class KeyStoreLoginModule impleme
throw new FailedLoginException(
"Unable to find X.509 certificate chain in keystore");
} else {
- LinkedList<Certificate> certList = new LinkedList<>();
+ LinkedList<Certificate> certList = new LinkedList<Certificate>();
for (int i=0; i < fromKeyStore.length; i++) {
certList.add(fromKeyStore[i]);
}
diff -up openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/SolarisLoginModule.java.sav openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/SolarisLoginModule.java
--- openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/SolarisLoginModule.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/SolarisLoginModule.java 2011-07-29 14:27:07.775531424 -0400
@@ -76,7 +76,7 @@ public class SolarisLoginModule implemen
private SolarisNumericUserPrincipal UIDPrincipal;
private SolarisNumericGroupPrincipal GIDPrincipal;
private LinkedList<SolarisNumericGroupPrincipal> supplementaryGroups =
- new LinkedList<>();
+ new LinkedList<SolarisNumericGroupPrincipal>();
/**
* Initialize this <code>LoginModule</code>.
diff -up openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/UnixLoginModule.java.sav openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/UnixLoginModule.java
--- openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/UnixLoginModule.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/security/auth/module/UnixLoginModule.java 2011-07-29 14:27:07.775531424 -0400
@@ -70,7 +70,7 @@ public class UnixLoginModule implements
private UnixNumericUserPrincipal UIDPrincipal;
private UnixNumericGroupPrincipal GIDPrincipal;
private LinkedList<UnixNumericGroupPrincipal> supplementaryGroups =
- new LinkedList<>();
+ new LinkedList<UnixNumericGroupPrincipal>();
/**
* Initialize this <code>LoginModule</code>.
diff -up openjdk-boot/jdk/src/share/classes/com/sun/security/auth/PolicyFile.java.sav openjdk-boot/jdk/src/share/classes/com/sun/security/auth/PolicyFile.java
--- openjdk-boot/jdk/src/share/classes/com/sun/security/auth/PolicyFile.java.sav 2011-07-29 12:21:06.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/security/auth/PolicyFile.java 2011-07-29 14:27:07.775531424 -0400
@@ -1180,7 +1180,7 @@ public class PolicyFile extends javax.se
// Done
return certs;
- ArrayList<Certificate> userCertList = new ArrayList<>();
+ ArrayList<Certificate> userCertList = new ArrayList<Certificate>();
i = 0;
while (i < certs.length) {
userCertList.add(certs[i]);
diff -up openjdk-boot/jdk/src/share/classes/com/sun/tools/example/trace/EventThread.java.sav openjdk-boot/jdk/src/share/classes/com/sun/tools/example/trace/EventThread.java
--- openjdk-boot/jdk/src/share/classes/com/sun/tools/example/trace/EventThread.java.sav 2011-07-29 14:27:35.063126457 -0400
+++ openjdk-boot/jdk/src/share/classes/com/sun/tools/example/trace/EventThread.java 2011-07-29 14:27:43.454001938 -0400
@@ -50,7 +50,7 @@ public class EventThread extends Thread
// Maps ThreadReference to ThreadTrace instances
private Map<ThreadReference, ThreadTrace> traceMap =
- new HashMap<>();
+ new HashMap<ThreadReference, ThreadTrace>();
EventThread(VirtualMachine vm, String[] excludes, PrintWriter writer) {
super("event-handler");
diff -up openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java.sav openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java
--- openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java 2011-07-29 14:27:07.775531424 -0400
@@ -34,7 +34,7 @@ import java.io.File;
*/
class DeleteOnExitHook {
- private static LinkedHashSet<String> files = new LinkedHashSet<>();
+ private static LinkedHashSet<String> files = new LinkedHashSet<String>();
static {
// DeleteOnExitHook must be the last shutdown hook to be invoked.
// Application shutdown hooks may add the first file to the
@@ -71,7 +71,7 @@ class DeleteOnExitHook {
files = null;
}
- ArrayList<String> toBeDeleted = new ArrayList<>(theFiles);
+ ArrayList<String> toBeDeleted = new ArrayList<String>(theFiles);
// reverse the list to maintain previous jdk deletion order.
// Last in first deleted.
diff -up openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java.sav openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java
--- openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java 2011-07-29 14:27:07.775531424 -0400
@@ -57,7 +57,7 @@ class FileInputStream extends InputStrea
private volatile boolean closed = false;
private static final ThreadLocal<Boolean> runningFinalize =
- new ThreadLocal<>();
+ new ThreadLocal<Boolean>();
private static boolean isRunningFinalize() {
Boolean val;
diff -up openjdk-boot/jdk/src/share/classes/java/io/File.java.sav openjdk-boot/jdk/src/share/classes/java/io/File.java
--- openjdk-boot/jdk/src/share/classes/java/io/File.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/File.java 2011-07-29 14:27:07.776531410 -0400
@@ -1082,7 +1082,7 @@ public class File
if ((names == null) || (filter == null)) {
return names;
}
- List<String> v = new ArrayList<>();
+ List<String> v = new ArrayList<String>();
for (int i = 0 ; i < names.length ; i++) {
if (filter.accept(this, names[i])) {
v.add(names[i]);
@@ -1173,7 +1173,7 @@ public class File
public File[] listFiles(FilenameFilter filter) {
String ss[] = list();
if (ss == null) return null;
- ArrayList<File> files = new ArrayList<>();
+ ArrayList<File> files = new ArrayList<File>();
for (String s : ss)
if ((filter == null) || filter.accept(this, s))
files.add(new File(s, this));
@@ -1211,7 +1211,7 @@ public class File
public File[] listFiles(FileFilter filter) {
String ss[] = list();
if (ss == null) return null;
- ArrayList<File> files = new ArrayList<>();
+ ArrayList<File> files = new ArrayList<File>();
for (String s : ss) {
File f = new File(s, this);
if ((filter == null) || filter.accept(f))
diff -up openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java.sav openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java
--- openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java 2011-07-29 14:27:07.776531410 -0400
@@ -70,7 +70,7 @@ class FileOutputStream extends OutputStr
private final Object closeLock = new Object();
private volatile boolean closed = false;
private static final ThreadLocal<Boolean> runningFinalize =
- new ThreadLocal<>();
+ new ThreadLocal<Boolean>();
private static boolean isRunningFinalize() {
Boolean val;
diff -up openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java.sav openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java
--- openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java 2011-07-29 14:27:07.776531410 -0400
@@ -725,7 +725,7 @@ implements Serializable {
*/
public FilePermissionCollection() {
- perms = new ArrayList<>();
+ perms = new ArrayList<Permission>();
}
/**
@@ -830,7 +830,7 @@ implements Serializable {
// Don't call out.defaultWriteObject()
// Write out Vector
- Vector<Permission> permissions = new Vector<>(perms.size());
+ Vector<Permission> permissions = new Vector<Permission>(perms.size());
synchronized (this) {
permissions.addAll(perms);
}
@@ -853,7 +853,7 @@ implements Serializable {
// Get the one we want
Vector<Permission> permissions = (Vector<Permission>)gfields.get("permissions", null);
- perms = new ArrayList<>(permissions.size());
+ perms = new ArrayList<Permission>(permissions.size());
perms.addAll(permissions);
}
}
diff -up openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java.sav openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java
--- openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java 2011-07-29 14:27:07.776531410 -0400
@@ -213,7 +213,7 @@ public class ObjectInputStream
/** table mapping primitive type names to corresponding class objects */
private static final HashMap<String, Class<?>> primClasses
- = new HashMap<>(8, 1.0F);
+ = new HashMap<String, Class<?>>(8, 1.0F);
static {
primClasses.put("boolean", boolean.class);
primClasses.put("byte", byte.class);
@@ -229,11 +229,11 @@ public class ObjectInputStream
private static class Caches {
/** cache of subclass security audit results */
static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<WeakClassKey,Boolean>();
/** queue for WeakReferences to audited subclasses */
static final ReferenceQueue<Class<?>> subclassAuditsQueue =
- new ReferenceQueue<>();
+ new ReferenceQueue<Class<?>>();
}
/** filter stream for handling block data conversion */
diff -up openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java.sav openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java
--- openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java 2011-07-29 14:27:07.776531410 -0400
@@ -165,11 +165,11 @@ public class ObjectOutputStream
private static class Caches {
/** cache of subclass security audit results */
static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<WeakClassKey,Boolean>();
/** queue for WeakReferences to audited subclasses */
static final ReferenceQueue<Class<?>> subclassAuditsQueue =
- new ReferenceQueue<>();
+ new ReferenceQueue<Class<?>>();
}
/** filter stream for handling block data conversion */
@@ -2413,7 +2413,7 @@ public class ObjectOutputStream
private final List<String> stack;
DebugTraceInfoStack() {
- stack = new ArrayList<>();
+ stack = new ArrayList<String>();
}
/**
diff -up openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java.sav openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java
--- openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java 2011-07-29 14:27:07.777531395 -0400
@@ -84,18 +84,18 @@ public class ObjectStreamClass implement
private static class Caches {
/** cache mapping local classes -> descriptors */
static final ConcurrentMap<WeakClassKey,Reference<?>> localDescs =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<WeakClassKey,Reference<?>>();
/** cache mapping field group/local desc pairs -> field reflectors */
static final ConcurrentMap<FieldReflectorKey,Reference<?>> reflectors =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<FieldReflectorKey,Reference<?>>();
/** queue for WeakReferences to local classes */
private static final ReferenceQueue<Class<?>> localDescsQueue =
- new ReferenceQueue<>();
+ new ReferenceQueue<Class<?>>();
/** queue for WeakReferences to field reflectors keys */
private static final ReferenceQueue<Class<?>> reflectorsQueue =
- new ReferenceQueue<>();
+ new ReferenceQueue<Class<?>>();
}
/** class associated with this descriptor (if any) */
@@ -290,7 +290,7 @@ public class ObjectStreamClass implement
EntryFuture future = null;
if (entry == null) {
EntryFuture newEntry = new EntryFuture();
- Reference<?> newRef = new SoftReference<>(newEntry);
+ Reference<?> newRef = new SoftReference<EntryFuture>(newEntry);
do {
if (ref != null) {
Caches.localDescs.remove(key, ref);
@@ -1130,7 +1130,7 @@ public class ObjectStreamClass implement
private ClassDataSlot[] getClassDataLayout0()
throws InvalidClassException
{
- ArrayList<ClassDataSlot> slots = new ArrayList<>();
+ ArrayList<ClassDataSlot> slots = new ArrayList<ClassDataSlot>();
Class<?> start = cl, end = cl;
// locate closest non-serializable superclass
@@ -1566,7 +1566,7 @@ public class ObjectStreamClass implement
ObjectStreamField[] boundFields =
new ObjectStreamField[serialPersistentFields.length];
- Set<String> fieldNames = new HashSet<>(serialPersistentFields.length);
+ Set<String> fieldNames = new HashSet<String>(serialPersistentFields.length);
for (int i = 0; i < serialPersistentFields.length; i++) {
ObjectStreamField spf = serialPersistentFields[i];
@@ -1604,7 +1604,7 @@ public class ObjectStreamClass implement
*/
private static ObjectStreamField[] getDefaultSerialFields(Class<?> cl) {
Field[] clFields = cl.getDeclaredFields();
- ArrayList<ObjectStreamField> list = new ArrayList<>();
+ ArrayList<ObjectStreamField> list = new ArrayList<ObjectStreamField>();
int mask = Modifier.STATIC | Modifier.TRANSIENT;
for (int i = 0; i < clFields.length; i++) {
@@ -1855,8 +1855,8 @@ public class ObjectStreamClass implement
writeKeys = new long[nfields];
offsets = new int[nfields];
typeCodes = new char[nfields];
- ArrayList<Class<?>> typeList = new ArrayList<>();
- Set<Long> usedKeys = new HashSet<>();
+ ArrayList<Class<?>> typeList = new ArrayList<Class<?>>();
+ Set<Long> usedKeys = new HashSet<Long>();
for (int i = 0; i < nfields; i++) {
@@ -2092,7 +2092,7 @@ public class ObjectStreamClass implement
EntryFuture future = null;
if (entry == null) {
EntryFuture newEntry = new EntryFuture();
- Reference<?> newRef = new SoftReference<>(newEntry);
+ Reference<?> newRef = new SoftReference<EntryFuture>(newEntry);
do {
if (ref != null) {
Caches.reflectors.remove(key, ref);
diff -up openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java.sav openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java
--- openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java 2011-07-29 14:27:07.777531395 -0400
@@ -47,7 +47,7 @@ class ApplicationShutdownHooks {
}
}
);
- hooks = new IdentityHashMap<>();
+ hooks = new IdentityHashMap<Thread, Thread>();
} catch (IllegalStateException e) {
// application shutdown hooks cannot be added if
// shutdown is in progress.
diff -up openjdk-boot/jdk/src/share/classes/java/lang/Character.java.sav openjdk-boot/jdk/src/share/classes/java/lang/Character.java
--- openjdk-boot/jdk/src/share/classes/java/lang/Character.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/Character.java 2011-07-29 14:27:07.777531395 -0400
@@ -646,7 +646,8 @@ class Character implements java.io.Seria
*/
public static final class UnicodeBlock extends Subset {
- private static Map<String, UnicodeBlock> map = new HashMap<>(256);
+ private static Map<String, UnicodeBlock> map
+ = new HashMap<String, UnicodeBlock>(256);
/**
* Creates a UnicodeBlock with the given identifier name.
@@ -4175,7 +4176,7 @@ class Character implements java.io.Seria
private static HashMap<String, Character.UnicodeScript> aliases;
static {
- aliases = new HashMap<>(128);
+ aliases = new HashMap<String, UnicodeScript>(128);
aliases.put("ARAB", ARABIC);
aliases.put("ARMI", IMPERIAL_ARAMAIC);
aliases.put("ARMN", ARMENIAN);
diff -up openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java.sav openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java
--- openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java 2011-07-29 14:27:07.777531395 -0400
@@ -81,7 +81,7 @@ class CharacterName {
} while (cpOff < cpEnd);
strPool = new byte[total - cpEnd];
dis.readFully(strPool);
- refStrPool = new SoftReference<>(strPool);
+ refStrPool = new SoftReference<byte[]>(strPool);
} catch (Exception x) {
throw new InternalError(x.getMessage());
} finally {
diff -up openjdk-boot/jdk/src/share/classes/java/lang/Class.java.sav openjdk-boot/jdk/src/share/classes/java/lang/Class.java
--- openjdk-boot/jdk/src/share/classes/java/lang/Class.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/Class.java 2011-07-29 14:27:07.778531380 -0400
@@ -1308,7 +1308,7 @@ public final
return java.security.AccessController.doPrivileged(
new java.security.PrivilegedAction<Class<?>[]>() {
public Class[] run() {
- List<Class<?>> list = new ArrayList<>();
+ List<Class<?>> list = new ArrayList<Class<?>>();
Class<?> currentClass = Class.this;
while (currentClass != null) {
Class<?>[] members = currentClass.getDeclaredClasses();
@@ -2308,9 +2308,9 @@ public final
res = Reflection.filterFields(this, getDeclaredFields0(publicOnly));
if (useCaches) {
if (publicOnly) {
- declaredPublicFields = new SoftReference<>(res);
+ declaredPublicFields = new SoftReference<Field[]>(res);
} else {
- declaredFields = new SoftReference<>(res);
+ declaredFields = new SoftReference<Field[]>(res);
}
}
return res;
@@ -2332,9 +2332,9 @@ public final
// No cached value available; compute value recursively.
// Traverse in correct order for getField().
- List<Field> fields = new ArrayList<>();
+ List<Field> fields = new ArrayList<Field>();
if (traversedInterfaces == null) {
- traversedInterfaces = new HashSet<>();
+ traversedInterfaces = new HashSet<Class<?>>();
}
// Local fields
@@ -2360,7 +2360,7 @@ public final
res = new Field[fields.size()];
fields.toArray(res);
if (useCaches) {
- publicFields = new SoftReference<>(res);
+ publicFields = new SoftReference<Field[]>(res);
}
return res;
}
@@ -2405,9 +2405,9 @@ public final
}
if (useCaches) {
if (publicOnly) {
- publicConstructors = new SoftReference<>(res);
+ publicConstructors = new SoftReference<Constructor<T>[]>(res);
} else {
- declaredConstructors = new SoftReference<>(res);
+ declaredConstructors = new SoftReference<Constructor<T>[]>(res);
}
}
return res;
@@ -2442,9 +2442,9 @@ public final
res = Reflection.filterMethods(this, getDeclaredMethods0(publicOnly));
if (useCaches) {
if (publicOnly) {
- declaredPublicMethods = new SoftReference<>(res);
+ declaredPublicMethods = new SoftReference<Method[]>(res);
} else {
- declaredMethods = new SoftReference<>(res);
+ declaredMethods = new SoftReference<Method[]>(res);
}
}
return res;
@@ -2600,7 +2600,7 @@ public final
methods.compactAndTrim();
res = methods.getArray();
if (useCaches) {
- publicMethods = new SoftReference<>(res);
+ publicMethods = new SoftReference<Method[]>(res);
}
return res;
}
@@ -2979,7 +2979,7 @@ public final
if (universe == null)
throw new IllegalArgumentException(
getName() + " is not an enum type");
- Map<String, T> m = new HashMap<>(2 * universe.length);
+ Map<String, T> m = new HashMap<String, T>(2 * universe.length);
for (T constant : universe)
m.put(((Enum<?>)constant).name(), constant);
enumConstantDirectory = m;
@@ -3092,7 +3092,7 @@ public final
if (superClass == null) {
annotations = declaredAnnotations;
} else {
- annotations = new HashMap<>();
+ annotations = new HashMap<Class<? extends Annotation>, Annotation>();
superClass.initAnnotationsIfNecessary();
for (Map.Entry<Class<? extends Annotation>, Annotation> e : superClass.annotations.entrySet()) {
Class<? extends Annotation> annotationClass = e.getKey();
diff -up openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java.sav openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java
--- openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java 2011-07-29 14:27:07.778531380 -0400
@@ -246,7 +246,7 @@ public abstract class ClassLoader {
// The classes loaded by this class loader. The only purpose of this table
// is to keep the classes from being GC'ed until the loader is GC'ed.
- private final Vector<Class<?>> classes = new Vector<>();
+ private final Vector<Class<?>> classes = new Vector<Class<?>>();
// The "default" domain. Set as the default ProtectionDomain on newly
// created classes.
@@ -265,7 +265,8 @@ public abstract class ClassLoader {
// The packages defined in this class loader. Each package name is mapped
// to its corresponding Package object.
// @GuardedBy("itself")
- private final HashMap<String, Package> packages = new HashMap<>();
+ private final HashMap<String, Package> packages =
+ new HashMap<String, Package>();
private static Void checkCreateClassLoader() {
SecurityManager security = System.getSecurityManager();
@@ -278,16 +279,16 @@ public abstract class ClassLoader {
private ClassLoader(Void unused, ClassLoader parent) {
this.parent = parent;
if (ParallelLoaders.isRegistered(this.getClass())) {
- parallelLockMap = new ConcurrentHashMap<>();
- package2certs = new ConcurrentHashMap<>();
+ parallelLockMap = new ConcurrentHashMap<String, Object>();
+ package2certs = new ConcurrentHashMap<String, Certificate[]>();
domains =
Collections.synchronizedSet(new HashSet<ProtectionDomain>());
assertionLock = new Object();
} else {
// no finer-grained lock; lock on the classloader instance
parallelLockMap = null;
- package2certs = new Hashtable<>();
- domains = new HashSet<>();
+ package2certs = new Hashtable<String, Certificate[]>();
+ domains = new HashSet<ProtectionDomain>();
assertionLock = this;
}
}
@@ -1175,7 +1176,7 @@ public abstract class ClassLoader {
}
tmp[1] = findResources(name);
- return new CompoundEnumeration<>(tmp);
+ return new CompoundEnumeration<URL>(tmp);
}
/**
@@ -1657,7 +1658,7 @@ public abstract class ClassLoader {
protected Package[] getPackages() {
Map<String, Package> map;
synchronized (packages) {
- map = new HashMap<>(packages);
+ map = new HashMap<String, Package>(packages);
}
Package[] pkgs;
if (parent != null) {
@@ -1764,17 +1765,20 @@ public abstract class ClassLoader {
}
// All native library names we've loaded.
- private static Vector<String> loadedLibraryNames = new Vector<>();
+ private static Vector<String> loadedLibraryNames
+ = new Vector<String>();
// Native libraries belonging to system classes.
private static Vector<NativeLibrary> systemNativeLibraries
- = new Vector<>();
+ = new Vector<NativeLibrary>();
// Native libraries associated with the class loader.
- private Vector<NativeLibrary> nativeLibraries = new Vector<>();
+ private Vector<NativeLibrary> nativeLibraries
+ = new Vector<NativeLibrary>();
// native libraries being loaded/unloaded.
- private static Stack<NativeLibrary> nativeLibraryContext = new Stack<>();
+ private static Stack<NativeLibrary> nativeLibraryContext
+ = new Stack<NativeLibrary>();
// The paths searched for libraries
private static String usr_paths[];
@@ -2097,8 +2101,8 @@ public abstract class ClassLoader {
* them to empty maps, effectively ignoring any present settings.
*/
synchronized (assertionLock) {
- classAssertionStatus = new HashMap<>();
- packageAssertionStatus = new HashMap<>();
+ classAssertionStatus = new HashMap<String, Boolean>();
+ packageAssertionStatus = new HashMap<String, Boolean>();
defaultAssertionStatus = false;
}
}
@@ -2160,8 +2164,8 @@ public abstract class ClassLoader {
private void initializeJavaAssertionMaps() {
// assert Thread.holdsLock(assertionLock);
- classAssertionStatus = new HashMap<>();
- packageAssertionStatus = new HashMap<>();
+ classAssertionStatus = new HashMap<String, Boolean>();
+ packageAssertionStatus = new HashMap<String, Boolean>();
AssertionStatusDirectives directives = retrieveDirectives();
for(int i = 0; i < directives.classes.length; i++)
diff -up openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java.sav openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java
--- openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java.sav 2011-07-29 12:21:11.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java 2011-07-29 14:27:07.778531380 -0400
@@ -787,7 +787,7 @@ public class ManagementFactory {
getPlatformManagementInterfaces()
{
Set<Class<? extends PlatformManagedObject>> result =
- new TreeSet<>();
+ new TreeSet<Class<? extends PlatformManagedObject>>();
for (PlatformComponent component: PlatformComponent.values()) {
result.add(component.getMXBeanInterface());
}
diff -up openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java.sav openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java
--- openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java.sav 2011-07-29 12:21:11.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java 2011-07-29 14:27:07.778531380 -0400
@@ -287,7 +287,7 @@ enum PlatformComponent {
List<T> getGcMXBeanList(Class<T> gcMXBeanIntf) {
List<GarbageCollectorMXBean> list =
ManagementFactoryHelper.getGarbageCollectorMXBeans();
- List<T> result = new ArrayList<>(list.size());
+ List<T> result = new ArrayList<T>(list.size());
for (GarbageCollectorMXBean m : list) {
if (gcMXBeanIntf.isInstance(m)) {
result.add(gcMXBeanIntf.cast(m));
@@ -342,7 +342,7 @@ enum PlatformComponent {
}
private static Set<String> keyProperties(String... keyNames) {
- Set<String> set = new HashSet<>();
+ Set<String> set = new HashSet<String>();
set.add("type");
for (String s : keyNames) {
set.add(s);
@@ -407,7 +407,7 @@ enum PlatformComponent {
List<T> getMXBeans(MBeanServerConnection mbs, Class<T> mxbeanInterface)
throws java.io.IOException
{
- List<T> result = new ArrayList<>();
+ List<T> result = new ArrayList<T>();
for (ObjectName on : getObjectNames(mbs)) {
result.add(ManagementFactory.
newPlatformMXBeanProxy(mbs,
@@ -438,7 +438,7 @@ enum PlatformComponent {
private static Map<String, PlatformComponent> enumMap;
private static synchronized void ensureInitialized() {
if (enumMap == null) {
- enumMap = new HashMap<>();
+ enumMap = new HashMap<String,PlatformComponent>();
for (PlatformComponent pc: PlatformComponent.values()) {
// Use String as the key rather than Class<?> to avoid
// causing unnecessary class loading of management interface
diff -up openjdk-boot/jdk/src/share/classes/java/lang/Package.java.sav openjdk-boot/jdk/src/share/classes/java/lang/Package.java
--- openjdk-boot/jdk/src/share/classes/java/lang/Package.java.sav 2011-07-29 14:27:01.428625623 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/Package.java 2011-07-29 14:27:07.779531365 -0400
@@ -596,13 +596,16 @@ public class Package implements java.lan
}
// The map of loaded system packages
- private static Map<String, Package> pkgs = new HashMap<>(31);
+ private static Map<String, Package> pkgs
+ = new HashMap<String, Package>(31);
// Maps each directory or zip file name to its corresponding url
- private static Map<String, URL> urls = new HashMap<>(10);
+ private static Map<String, URL> urls
+ = new HashMap<String, URL>(10);
// Maps each code source url for a jar file to its manifest
- private static Map<String, Manifest> mans = new HashMap<>(10);
+ private static Map<String, Manifest> mans
+ = new HashMap<String, Manifest>(10);
private static native String getSystemPackage0(String name);
private static native String[] getSystemPackages0();
diff -up openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java.sav openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java
--- openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java 2011-07-29 14:27:07.779531365 -0400
@@ -214,7 +214,7 @@ public final class ProcessBuilder
* @param command a string array containing the program and its arguments
*/
public ProcessBuilder(String... command) {
- this.command = new ArrayList<>(command.length);
+ this.command = new ArrayList<String>(command.length);
for (String arg : command)
this.command.add(arg);
}
@@ -251,7 +251,7 @@ public final class ProcessBuilder
* @return this process builder
*/
public ProcessBuilder command(String... command) {
- this.command = new ArrayList<>(command.length);
+ this.command = new ArrayList<String>(command.length);
for (String arg : command)
this.command.add(arg);
return this;
diff -up openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java.sav openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java
--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java.sav 2011-07-29 12:21:11.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java 2011-07-29 14:27:07.779531365 -0400
@@ -136,7 +136,7 @@ public final
// which implicitly requires that new java.lang.reflect
// objects be fabricated for each reflective call on Class
// objects.)
- Constructor<T> res = new Constructor<>(clazz,
+ Constructor<T> res = new Constructor<T>(clazz,
parameterTypes,
exceptionTypes, modifiers, slot,
signature,
diff -up openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java.sav openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java
--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java.sav 2011-07-29 12:21:11.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java 2011-07-29 14:27:07.779531365 -0400
@@ -232,7 +232,7 @@ public class Proxy implements java.io.Se
/** maps a class loader to the proxy class cache for that loader */
private static Map<ClassLoader, Map<List<String>, Object>> loaderToCache
- = new WeakHashMap<>();
+ = new WeakHashMap<ClassLoader, Map<List<String>, Object>>();
/** marks that a particular proxy class is currently being generated */
private static Object pendingGenerationMarker = new Object();
@@ -356,7 +356,7 @@ public class Proxy implements java.io.Se
String[] interfaceNames = new String[interfaces.length];
// for detecting duplicates
- Set<Class<?>> interfaceSet = new HashSet<>();
+ Set<Class<?>> interfaceSet = new HashSet<Class<?>>();
for (int i = 0; i < interfaces.length; i++) {
/*
@@ -413,7 +413,7 @@ public class Proxy implements java.io.Se
synchronized (loaderToCache) {
cache = loaderToCache.get(loader);
if (cache == null) {
- cache = new HashMap<>();
+ cache = new HashMap<List<String>, Object>();
loaderToCache.put(loader, cache);
}
/*
diff -up openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java.sav openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java
--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java.sav 2011-07-29 12:21:11.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java 2011-07-29 14:27:07.779531365 -0400
@@ -84,7 +84,7 @@ class ReflectAccess implements sun.refle
byte[] annotations,
byte[] parameterAnnotations)
{
- return new Constructor<>(declaringClass,
+ return new Constructor<T>(declaringClass,
parameterTypes,
checkedExceptions,
modifiers,
diff -up openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java.sav openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java
--- openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java 2011-07-29 14:27:07.779531365 -0400
@@ -53,9 +53,9 @@ class StringCoding {
/** The cached coders for each thread */
private final static ThreadLocal<SoftReference<StringDecoder>> decoder =
- new ThreadLocal<>();
+ new ThreadLocal<SoftReference<StringDecoder>>();
private final static ThreadLocal<SoftReference<StringEncoder>> encoder =
- new ThreadLocal<>();
+ new ThreadLocal<SoftReference<StringEncoder>>();
private static boolean warnUnsupportedCharset = true;
diff -up openjdk-boot/jdk/src/share/classes/java/lang/String.java.sav openjdk-boot/jdk/src/share/classes/java/lang/String.java
--- openjdk-boot/jdk/src/share/classes/java/lang/String.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/String.java 2011-07-29 14:27:07.779531365 -0400
@@ -2330,7 +2330,7 @@ public final class String
int off = 0;
int next = 0;
boolean limited = limit > 0;
- ArrayList<String> list = new ArrayList<>();
+ ArrayList<String> list = new ArrayList<String>();
while ((next = indexOf(ch, off)) != -1) {
if (!limited || list.size() < limit - 1) {
list.add(substring(off, next));
diff -up openjdk-boot/jdk/src/share/classes/java/lang/Thread.java.sav openjdk-boot/jdk/src/share/classes/java/lang/Thread.java
--- openjdk-boot/jdk/src/share/classes/java/lang/Thread.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/Thread.java 2011-07-29 14:27:07.780531350 -0400
@@ -1616,7 +1616,8 @@ class Thread implements Runnable {
// Get a snapshot of the list of all threads
Thread[] threads = getThreads();
StackTraceElement[][] traces = dumpThreads(threads);
- Map<Thread, StackTraceElement[]> m = new HashMap<>(threads.length);
+ Map<Thread, StackTraceElement[]> m
+ = new HashMap<Thread, StackTraceElement[]>(threads.length);
for (int i = 0; i < threads.length; i++) {
StackTraceElement[] stackTrace = traces[i];
if (stackTrace != null) {
@@ -1637,11 +1638,11 @@ class Thread implements Runnable {
private static class Caches {
/** cache of subclass security audit results */
static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<WeakClassKey,Boolean>();
/** queue for WeakReferences to audited subclasses */
static final ReferenceQueue<Class<?>> subclassAuditsQueue =
- new ReferenceQueue<>();
+ new ReferenceQueue<Class<?>>();
}
/**
diff -up openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java.sav openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java
--- openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java.sav 2011-07-29 12:21:10.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java 2011-07-29 14:27:07.780531350 -0400
@@ -917,7 +917,7 @@ public class Throwable implements Serial
// Use the sentinel for a zero-length list
suppressed = SUPPRESSED_SENTINEL;
} else { // Copy Throwables to new list
- suppressed = new ArrayList<>(1);
+ suppressed = new ArrayList<Throwable>(1);
for (Throwable t : suppressedExceptions) {
// Enforce constraints on suppressed exceptions in
// case of corrupt or malicious stream.
@@ -1048,7 +1048,7 @@ public class Throwable implements Serial
return;
if (suppressedExceptions == SUPPRESSED_SENTINEL)
- suppressedExceptions = new ArrayList<>(1);
+ suppressedExceptions = new ArrayList<Throwable>(1);
suppressedExceptions.add(exception);
}
diff -up openjdk-boot/jdk/src/share/classes/java/net/InetAddress.java.sav openjdk-boot/jdk/src/share/classes/java/net/InetAddress.java
--- openjdk-boot/jdk/src/share/classes/java/net/InetAddress.java.sav 2011-07-29 12:21:11.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/net/InetAddress.java 2011-07-29 14:27:07.780531350 -0400
@@ -677,7 +677,7 @@ class InetAddress implements java.io.Ser
static InetAddressImpl impl;
- private static final HashMap<String, Void> lookupTable = new HashMap<>();
+ private static final HashMap<String, Void> lookupTable = new HashMap<String, Void>();
/**
* Represents a cache entry
@@ -736,7 +736,7 @@ class InetAddress implements java.io.Ser
// As we iterate in insertion order we can
// terminate when a non-expired entry is found.
- LinkedList<String> expired = new LinkedList<>();
+ LinkedList<String> expired = new LinkedList<String>();
long now = System.currentTimeMillis();
for (String key : cache.keySet()) {
CacheEntry entry = cache.get(key);
diff -up openjdk-boot/jdk/src/share/classes/java/net/URLClassLoader.java.sav openjdk-boot/jdk/src/share/classes/java/net/URLClassLoader.java
--- openjdk-boot/jdk/src/share/classes/java/net/URLClassLoader.java.sav 2011-07-29 12:21:11.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/net/URLClassLoader.java 2011-07-29 14:27:07.780531350 -0400
@@ -205,7 +205,7 @@ public class URLClassLoader extends Secu
*/
private WeakHashMap<Closeable,Void>
- closeables = new WeakHashMap<>();
+ closeables = new WeakHashMap<Closeable, Void>();
/**
* Returns an input stream for reading the specified resource.
diff -up openjdk-boot/jdk/src/share/classes/java/nio/file/Files.java.sav openjdk-boot/jdk/src/share/classes/java/nio/file/Files.java
--- openjdk-boot/jdk/src/share/classes/java/nio/file/Files.java.sav 2011-07-29 14:27:01.429625608 -0400
+++ openjdk-boot/jdk/src/share/classes/java/nio/file/Files.java 2011-07-29 14:27:07.780531350 -0400
@@ -1487,7 +1487,7 @@ public final class Files {
return AccessController
.doPrivileged(new PrivilegedAction<List<FileTypeDetector>>() {
@Override public List<FileTypeDetector> run() {
- List<FileTypeDetector> list = new ArrayList<>();
+ List<FileTypeDetector> list = new ArrayList<FileTypeDetector>();
ServiceLoader<FileTypeDetector> loader = ServiceLoader
.load(FileTypeDetector.class, ClassLoader.getSystemClassLoader());
for (FileTypeDetector detector: loader) {
@@ -3008,7 +3008,7 @@ public final class Files {
BufferedReader reader = null;
try {
reader = newBufferedReader(path, cs);
- List<String> result = new ArrayList<>();
+ List<String> result = new ArrayList<String>();
for (;;) {
String line = reader.readLine();
if (line == null)
diff -up openjdk-boot/jdk/src/share/classes/java/security/AccessControlContext.java.sav openjdk-boot/jdk/src/share/classes/java/security/AccessControlContext.java
--- openjdk-boot/jdk/src/share/classes/java/security/AccessControlContext.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/AccessControlContext.java 2011-07-29 14:27:07.781531335 -0400
@@ -124,7 +124,7 @@ public final class AccessControlContext
this.context = null;
}
} else {
- List<ProtectionDomain> v = new ArrayList<>(context.length);
+ List<ProtectionDomain> v = new ArrayList<ProtectionDomain>(context.length);
for (int i =0; i< context.length; i++) {
if ((context[i] != null) && (!v.contains(context[i])))
v.add(context[i]);
diff -up openjdk-boot/jdk/src/share/classes/java/security/BasicPermission.java.sav openjdk-boot/jdk/src/share/classes/java/security/BasicPermission.java
--- openjdk-boot/jdk/src/share/classes/java/security/BasicPermission.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/BasicPermission.java 2011-07-29 14:27:07.781531335 -0400
@@ -515,7 +515,7 @@ implements java.io.Serializable
// Copy perms into a Hashtable
Hashtable<String, Permission> permissions =
- new Hashtable<>(perms.size()*2);
+ new Hashtable<String, Permission>(perms.size()*2);
synchronized (this) {
permissions.putAll(perms);
diff -up openjdk-boot/jdk/src/share/classes/java/security/CodeSource.java.sav openjdk-boot/jdk/src/share/classes/java/security/CodeSource.java
--- openjdk-boot/jdk/src/share/classes/java/security/CodeSource.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/CodeSource.java 2011-07-29 14:27:07.781531335 -0400
@@ -188,7 +188,7 @@ public class CodeSource implements java.
} else if (signers != null) {
// Convert the code signers to certs
ArrayList<java.security.cert.Certificate> certChains =
- new ArrayList<>();
+ new ArrayList<java.security.cert.Certificate>();
for (int i = 0; i < signers.length; i++) {
certChains.addAll(
signers[i].getSignerCertPath().getCertificates());
@@ -606,10 +606,10 @@ public class CodeSource implements java.
// Iterate through all the certificates
int i = 0;
- List<CodeSigner> signers = new ArrayList<>();
+ List<CodeSigner> signers = new ArrayList<CodeSigner>();
while (i < certs.length) {
List<java.security.cert.Certificate> certChain =
- new ArrayList<>();
+ new ArrayList<java.security.cert.Certificate>();
certChain.add(certs[i++]); // first cert is an end-entity cert
int j = i;
diff -up openjdk-boot/jdk/src/share/classes/java/security/Permissions.java.sav openjdk-boot/jdk/src/share/classes/java/security/Permissions.java
--- openjdk-boot/jdk/src/share/classes/java/security/Permissions.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/Permissions.java 2011-07-29 14:27:07.781531335 -0400
@@ -362,7 +362,7 @@ implements Serializable
// Copy perms into a Hashtable
Hashtable<Class<?>, PermissionCollection> perms =
- new Hashtable<>(permsMap.size()*2); // no sync; estimate
+ new Hashtable<Class<?>, PermissionCollection>(permsMap.size()*2); // no sync; estimate
synchronized (this) {
perms.putAll(permsMap);
}
@@ -567,7 +567,7 @@ implements Serializable
// Copy perms into a Hashtable
Hashtable<Permission, Permission> perms =
- new Hashtable<>(permsMap.size()*2);
+ new Hashtable<Permission, Permission>(permsMap.size()*2);
synchronized (this) {
perms.putAll(permsMap);
}
diff -up openjdk-boot/jdk/src/share/classes/java/security/ProtectionDomain.java.sav openjdk-boot/jdk/src/share/classes/java/security/ProtectionDomain.java
--- openjdk-boot/jdk/src/share/classes/java/security/ProtectionDomain.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/ProtectionDomain.java 2011-07-29 14:27:07.781531335 -0400
@@ -368,8 +368,8 @@ public class ProtectionDomain {
int swag = 32;
int vcap = 8;
Enumeration<Permission> e;
- List<Permission> pdVector = new ArrayList<>(vcap);
- List<Permission> plVector = new ArrayList<>(swag);
+ List<Permission> pdVector = new ArrayList<Permission>(vcap);
+ List<Permission> plVector = new ArrayList<Permission>(swag);
//
// Build a vector of domain permissions for subsequent merge
diff -up openjdk-boot/jdk/src/share/classes/java/security/Provider.java.sav openjdk-boot/jdk/src/share/classes/java/security/Provider.java
--- openjdk-boot/jdk/src/share/classes/java/security/Provider.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/Provider.java 2011-07-29 14:27:07.781531335 -0400
@@ -437,7 +437,7 @@ public abstract class Provider extends P
private void readObject(ObjectInputStream in)
throws IOException, ClassNotFoundException {
- Map<Object,Object> copy = new HashMap<>();
+ Map<Object,Object> copy = new HashMap<Object,Object>();
for (Map.Entry<Object,Object> entry : super.entrySet()) {
copy.put(entry.getKey(), entry.getValue());
}
@@ -719,7 +719,7 @@ public abstract class Provider extends P
}
if (serviceSet == null) {
ensureLegacyParsed();
- Set<Service> set = new LinkedHashSet<>();
+ Set<Service> set = new LinkedHashSet<Service>();
if (serviceMap != null) {
set.addAll(serviceMap.values());
}
@@ -1395,7 +1395,7 @@ public abstract class Provider extends P
if (s != null) {
String[] classNames = s.split("\\|");
List<Class> classList =
- new ArrayList<>(classNames.length);
+ new ArrayList<Class>(classNames.length);
for (String className : classNames) {
Class clazz = getKeyClass(className);
if (clazz != null) {
diff -up openjdk-boot/jdk/src/share/classes/java/security/SecureClassLoader.java.sav openjdk-boot/jdk/src/share/classes/java/security/SecureClassLoader.java
--- openjdk-boot/jdk/src/share/classes/java/security/SecureClassLoader.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/SecureClassLoader.java 2011-07-29 14:27:07.781531335 -0400
@@ -50,7 +50,7 @@ public class SecureClassLoader extends C
// HashMap that maps CodeSource to ProtectionDomain
// @GuardedBy("pdcache")
private final HashMap<CodeSource, ProtectionDomain> pdcache =
- new HashMap<>(11);
+ new HashMap<CodeSource, ProtectionDomain>(11);
private static final Debug debug = Debug.getInstance("scl");
diff -up openjdk-boot/jdk/src/share/classes/java/security/Security.java.sav openjdk-boot/jdk/src/share/classes/java/security/Security.java
--- openjdk-boot/jdk/src/share/classes/java/security/Security.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/Security.java 2011-07-29 14:27:07.781531335 -0400
@@ -546,7 +546,7 @@ public final class Security {
value = filter.substring(index + 1);
}
- Hashtable<String, String> hashtableFilter = new Hashtable<>(1);
+ Hashtable<String, String> hashtableFilter = new Hashtable<String, String>(1);
hashtableFilter.put(key, value);
return (getProviders(hashtableFilter));
@@ -606,7 +606,7 @@ public final class Security {
// Then only return those providers who satisfy the selection criteria.
Provider[] allProviders = Security.getProviders();
Set<String> keySet = filter.keySet();
- LinkedHashSet<Provider> candidates = new LinkedHashSet<>(5);
+ LinkedHashSet<Provider> candidates = new LinkedHashSet<Provider>(5);
// Returns all installed providers
// if the selection criteria is null.
@@ -660,7 +660,7 @@ public final class Security {
}
// Map containing cached Spi Class objects of the specified type
- private static final Map<String, Class> spiMap = new ConcurrentHashMap<>();
+ private static final Map<String, Class> spiMap = new ConcurrentHashMap<String, Class>();
/**
* Return the Class object for the given engine type
@@ -884,7 +884,7 @@ public final class Security {
String attrName,
String filterValue,
Provider[] allProviders) {
- LinkedHashSet<Provider> candidates = new LinkedHashSet<>(5);
+ LinkedHashSet<Provider> candidates = new LinkedHashSet<Provider>(5);
for (int i = 0; i < allProviders.length; i++) {
if (isCriterionSatisfied(allProviders[i], serviceName,
algName,
@@ -1081,7 +1081,7 @@ public final class Security {
return Collections.EMPTY_SET;
}
- HashSet<String> result = new HashSet<>();
+ HashSet<String> result = new HashSet<String>();
Provider[] providers = Security.getProviders();
for (int i = 0; i < providers.length; i++) {
diff -up openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermissionCollection.java.sav openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermissionCollection.java
--- openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermissionCollection.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermissionCollection.java 2011-07-29 14:27:07.782531320 -0400
@@ -119,7 +119,7 @@ implements java.io.Serializable
public Enumeration<Permission> elements() {
List<Permission> results =
- new ArrayList<>(); // where results are stored
+ new ArrayList<Permission>(); // where results are stored
// Get iterator of Map values (which are lists of permissions)
synchronized (this) {
@@ -161,7 +161,7 @@ implements java.io.Serializable
// Copy perms into a Hashtable
Hashtable<String, Vector<UnresolvedPermission>> permissions =
- new Hashtable<>(perms.size()*2);
+ new Hashtable<String, Vector<UnresolvedPermission>>(perms.size()*2);
// Convert each entry (List) into a Vector
synchronized (this) {
@@ -169,7 +169,7 @@ implements java.io.Serializable
for (Map.Entry<String, List<UnresolvedPermission>> e : set) {
// Convert list into Vector
List<UnresolvedPermission> list = e.getValue();
- Vector<UnresolvedPermission> vec = new Vector<>(list.size());
+ Vector<UnresolvedPermission> vec = new Vector<UnresolvedPermission>(list.size());
synchronized (list) {
vec.addAll(list);
}
@@ -206,7 +206,7 @@ implements java.io.Serializable
for (Map.Entry<String, Vector<UnresolvedPermission>> e : set) {
// Convert Vector into ArrayList
Vector<UnresolvedPermission> vec = e.getValue();
- List<UnresolvedPermission> list = new ArrayList<>(vec.size());
+ List<UnresolvedPermission> list = new ArrayList<UnresolvedPermission>(vec.size());
list.addAll(vec);
// Add to Hashtable being serialized
diff -up openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermission.java.sav openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermission.java
--- openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermission.java.sav 2011-07-29 12:21:12.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/security/UnresolvedPermission.java 2011-07-29 14:27:07.782531320 -0400
@@ -198,7 +198,7 @@ implements java.io.Serializable
if (this.certs == null) {
// extract the signer certs
ArrayList<java.security.cert.Certificate> signerCerts =
- new ArrayList<>();
+ new ArrayList<java.security.cert.Certificate>();
i = 0;
while (i < certs.length) {
signerCerts.add(certs[i]);
diff -up openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java.sav openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java
--- openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java 2011-07-29 14:27:07.782531320 -0400
@@ -482,8 +482,8 @@ public abstract class AbstractList<E> ex
*/
public List<E> subList(int fromIndex, int toIndex) {
return (this instanceof RandomAccess ?
- new RandomAccessSubList<>(this, fromIndex, toIndex) :
- new SubList<>(this, fromIndex, toIndex));
+ new RandomAccessSubList<E>(this, fromIndex, toIndex) :
+ new SubList<E>(this, fromIndex, toIndex));
}
// Comparison and hashing
@@ -747,7 +747,7 @@ class SubList<E> extends AbstractList<E>
}
public List<E> subList(int fromIndex, int toIndex) {
- return new SubList<>(this, fromIndex, toIndex);
+ return new SubList<E>(this, fromIndex, toIndex);
}
private void rangeCheck(int index) {
@@ -776,6 +776,6 @@ class RandomAccessSubList<E> extends Sub
}
public List<E> subList(int fromIndex, int toIndex) {
- return new RandomAccessSubList<>(this, fromIndex, toIndex);
+ return new RandomAccessSubList<E>(this, fromIndex, toIndex);
}
}
diff -up openjdk-boot/jdk/src/share/classes/java/util/Arrays.java.sav openjdk-boot/jdk/src/share/classes/java/util/Arrays.java
--- openjdk-boot/jdk/src/share/classes/java/util/Arrays.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/Arrays.java 2011-07-29 14:27:07.782531320 -0400
@@ -2825,7 +2825,7 @@ public class Arrays {
*/
@SafeVarargs
public static <T> List<T> asList(T... a) {
- return new ArrayList<>(a);
+ return new ArrayList<T>(a);
}
/**
diff -up openjdk-boot/jdk/src/share/classes/java/util/Collections.java.sav openjdk-boot/jdk/src/share/classes/java/util/Collections.java
--- openjdk-boot/jdk/src/share/classes/java/util/Collections.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/Collections.java 2011-07-29 14:27:07.783531305 -0400
@@ -1035,7 +1035,7 @@ public class Collections {
* @return an unmodifiable view of the specified collection.
*/
public static <T> Collection<T> unmodifiableCollection(Collection<? extends T> c) {
- return new UnmodifiableCollection<>(c);
+ return new UnmodifiableCollection<T>(c);
}
/**
@@ -1109,7 +1109,7 @@ public class Collections {
* @return an unmodifiable view of the specified set.
*/
public static <T> Set<T> unmodifiableSet(Set<? extends T> s) {
- return new UnmodifiableSet<>(s);
+ return new UnmodifiableSet<T>(s);
}
/**
@@ -1141,7 +1141,7 @@ public class Collections {
* @return an unmodifiable view of the specified sorted set.
*/
public static <T> SortedSet<T> unmodifiableSortedSet(SortedSet<T> s) {
- return new UnmodifiableSortedSet<>(s);
+ return new UnmodifiableSortedSet<T>(s);
}
/**
@@ -1158,13 +1158,13 @@ public class Collections {
public Comparator<? super E> comparator() {return ss.comparator();}
public SortedSet<E> subSet(E fromElement, E toElement) {
- return new UnmodifiableSortedSet<>(ss.subSet(fromElement,toElement));
+ return new UnmodifiableSortedSet<E>(ss.subSet(fromElement,toElement));
}
public SortedSet<E> headSet(E toElement) {
- return new UnmodifiableSortedSet<>(ss.headSet(toElement));
+ return new UnmodifiableSortedSet<E>(ss.headSet(toElement));
}
public SortedSet<E> tailSet(E fromElement) {
- return new UnmodifiableSortedSet<>(ss.tailSet(fromElement));
+ return new UnmodifiableSortedSet<E>(ss.tailSet(fromElement));
}
public E first() {return ss.first();}
@@ -1188,8 +1188,8 @@ public class Collections {
*/
public static <T> List<T> unmodifiableList(List<? extends T> list) {
return (list instanceof RandomAccess ?
- new UnmodifiableRandomAccessList<>(list) :
- new UnmodifiableList<>(list));
+ new UnmodifiableRandomAccessList<T>(list) :
+ new UnmodifiableList<T>(list));
}
/**
@@ -1250,7 +1250,7 @@ public class Collections {
}
public List<E> subList(int fromIndex, int toIndex) {
- return new UnmodifiableList<>(list.subList(fromIndex, toIndex));
+ return new UnmodifiableList<E>(list.subList(fromIndex, toIndex));
}
/**
@@ -1267,7 +1267,7 @@ public class Collections {
*/
private Object readResolve() {
return (list instanceof RandomAccess
- ? new UnmodifiableRandomAccessList<>(list)
+ ? new UnmodifiableRandomAccessList<E>(list)
: this);
}
}
@@ -1283,7 +1283,7 @@ public class Collections {
}
public List<E> subList(int fromIndex, int toIndex) {
- return new UnmodifiableRandomAccessList<>(
+ return new UnmodifiableRandomAccessList<E>(
list.subList(fromIndex, toIndex));
}
@@ -1296,7 +1296,7 @@ public class Collections {
* deserialization.
*/
private Object writeReplace() {
- return new UnmodifiableList<>(list);
+ return new UnmodifiableList<E>(list);
}
}
@@ -1315,7 +1315,7 @@ public class Collections {
* @return an unmodifiable view of the specified map.
*/
public static <K,V> Map<K,V> unmodifiableMap(Map<? extends K, ? extends V> m) {
- return new UnmodifiableMap<>(m);
+ return new UnmodifiableMap<K,V>(m);
}
/**
@@ -1363,7 +1363,7 @@ public class Collections {
public Set<Map.Entry<K,V>> entrySet() {
if (entrySet==null)
- entrySet = new UnmodifiableEntrySet<>(m.entrySet());
+ entrySet = new UnmodifiableEntrySet<K,V>(m.entrySet());
return entrySet;
}
@@ -1400,7 +1400,7 @@ public class Collections {
return i.hasNext();
}
public Map.Entry<K,V> next() {
- return new UnmodifiableEntry<>(i.next());
+ return new UnmodifiableEntry<K,V>(i.next());
}
public void remove() {
throw new UnsupportedOperationException();
@@ -1411,7 +1411,7 @@ public class Collections {
public Object[] toArray() {
Object[] a = c.toArray();
for (int i=0; i<a.length; i++)
- a[i] = new UnmodifiableEntry<>((Map.Entry<K,V>)a[i]);
+ a[i] = new UnmodifiableEntry<K,V>((Map.Entry<K,V>)a[i]);
return a;
}
@@ -1422,7 +1422,7 @@ public class Collections {
Object[] arr = c.toArray(a.length==0 ? a : Arrays.copyOf(a, 0));
for (int i=0; i<arr.length; i++)
- arr[i] = new UnmodifiableEntry<>((Map.Entry<K,V>)arr[i]);
+ arr[i] = new UnmodifiableEntry<K,V>((Map.Entry<K,V>)arr[i]);
if (arr.length > a.length)
return (T[])arr;
@@ -1443,7 +1443,7 @@ public class Collections {
if (!(o instanceof Map.Entry))
return false;
return c.contains(
- new UnmodifiableEntry<>((Map.Entry<?,?>) o));
+ new UnmodifiableEntry<Object,Object>((Map.Entry<?,?>) o));
}
/**
@@ -1517,7 +1517,7 @@ public class Collections {
* @return an unmodifiable view of the specified sorted map.
*/
public static <K,V> SortedMap<K,V> unmodifiableSortedMap(SortedMap<K, ? extends V> m) {
- return new UnmodifiableSortedMap<>(m);
+ return new UnmodifiableSortedMap<K,V>(m);
}
/**
@@ -1535,13 +1535,13 @@ public class Collections {
public Comparator<? super K> comparator() {return sm.comparator();}
public SortedMap<K,V> subMap(K fromKey, K toKey) {
- return new UnmodifiableSortedMap<>(sm.subMap(fromKey, toKey));
+ return new UnmodifiableSortedMap<K,V>(sm.subMap(fromKey, toKey));
}
public SortedMap<K,V> headMap(K toKey) {
- return new UnmodifiableSortedMap<>(sm.headMap(toKey));
+ return new UnmodifiableSortedMap<K,V>(sm.headMap(toKey));
}
public SortedMap<K,V> tailMap(K fromKey) {
- return new UnmodifiableSortedMap<>(sm.tailMap(fromKey));
+ return new UnmodifiableSortedMap<K,V>(sm.tailMap(fromKey));
}
public K firstKey() {return sm.firstKey();}
@@ -1583,11 +1583,11 @@ public class Collections {
* @return a synchronized view of the specified collection.
*/
public static <T> Collection<T> synchronizedCollection(Collection<T> c) {
- return new SynchronizedCollection<>(c);
+ return new SynchronizedCollection<T>(c);
}
static <T> Collection<T> synchronizedCollection(Collection<T> c, Object mutex) {
- return new SynchronizedCollection<>(c, mutex);
+ return new SynchronizedCollection<T>(c, mutex);
}
/**
@@ -1686,11 +1686,11 @@ public class Collections {
* @return a synchronized view of the specified set.
*/
public static <T> Set<T> synchronizedSet(Set<T> s) {
- return new SynchronizedSet<>(s);
+ return new SynchronizedSet<T>(s);
}
static <T> Set<T> synchronizedSet(Set<T> s, Object mutex) {
- return new SynchronizedSet<>(s, mutex);
+ return new SynchronizedSet<T>(s, mutex);
}
/**
@@ -1754,7 +1754,7 @@ public class Collections {
* @return a synchronized view of the specified sorted set.
*/
public static <T> SortedSet<T> synchronizedSortedSet(SortedSet<T> s) {
- return new SynchronizedSortedSet<>(s);
+ return new SynchronizedSortedSet<T>(s);
}
/**
@@ -1783,18 +1783,18 @@ public class Collections {
public SortedSet<E> subSet(E fromElement, E toElement) {
synchronized (mutex) {
- return new SynchronizedSortedSet<>(
+ return new SynchronizedSortedSet<E>(
ss.subSet(fromElement, toElement), mutex);
}
}
public SortedSet<E> headSet(E toElement) {
synchronized (mutex) {
- return new SynchronizedSortedSet<>(ss.headSet(toElement), mutex);
+ return new SynchronizedSortedSet<E>(ss.headSet(toElement), mutex);
}
}
public SortedSet<E> tailSet(E fromElement) {
synchronized (mutex) {
- return new SynchronizedSortedSet<>(ss.tailSet(fromElement),mutex);
+ return new SynchronizedSortedSet<E>(ss.tailSet(fromElement),mutex);
}
}
@@ -1833,14 +1833,14 @@ public class Collections {
*/
public static <T> List<T> synchronizedList(List<T> list) {
return (list instanceof RandomAccess ?
- new SynchronizedRandomAccessList<>(list) :
- new SynchronizedList<>(list));
+ new SynchronizedRandomAccessList<T>(list) :
+ new SynchronizedList<T>(list));
}
static <T> List<T> synchronizedList(List<T> list, Object mutex) {
return (list instanceof RandomAccess ?
- new SynchronizedRandomAccessList<>(list, mutex) :
- new SynchronizedList<>(list, mutex));
+ new SynchronizedRandomAccessList<T>(list, mutex) :
+ new SynchronizedList<T>(list, mutex));
}
/**
@@ -1903,7 +1903,7 @@ public class Collections {
public List<E> subList(int fromIndex, int toIndex) {
synchronized (mutex) {
- return new SynchronizedList<>(list.subList(fromIndex, toIndex),
+ return new SynchronizedList<E>(list.subList(fromIndex, toIndex),
mutex);
}
}
@@ -1922,7 +1922,7 @@ public class Collections {
*/
private Object readResolve() {
return (list instanceof RandomAccess
- ? new SynchronizedRandomAccessList<>(list)
+ ? new SynchronizedRandomAccessList<E>(list)
: this);
}
}
@@ -1944,7 +1944,7 @@ public class Collections {
public List<E> subList(int fromIndex, int toIndex) {
synchronized (mutex) {
- return new SynchronizedRandomAccessList<>(
+ return new SynchronizedRandomAccessList<E>(
list.subList(fromIndex, toIndex), mutex);
}
}
@@ -1958,7 +1958,7 @@ public class Collections {
* deserialization.
*/
private Object writeReplace() {
- return new SynchronizedList<>(list);
+ return new SynchronizedList<E>(list);
}
}
@@ -1990,7 +1990,7 @@ public class Collections {
* @return a synchronized view of the specified map.
*/
public static <K,V> Map<K,V> synchronizedMap(Map<K,V> m) {
- return new SynchronizedMap<>(m);
+ return new SynchronizedMap<K,V>(m);
}
/**
@@ -2051,7 +2051,7 @@ public class Collections {
public Set<K> keySet() {
synchronized (mutex) {
if (keySet==null)
- keySet = new SynchronizedSet<>(m.keySet(), mutex);
+ keySet = new SynchronizedSet<K>(m.keySet(), mutex);
return keySet;
}
}
@@ -2059,7 +2059,7 @@ public class Collections {
public Set<Map.Entry<K,V>> entrySet() {
synchronized (mutex) {
if (entrySet==null)
- entrySet = new SynchronizedSet<>(m.entrySet(), mutex);
+ entrySet = new SynchronizedSet<Map.Entry<K,V>>(m.entrySet(), mutex);
return entrySet;
}
}
@@ -2067,7 +2067,7 @@ public class Collections {
public Collection<V> values() {
synchronized (mutex) {
if (values==null)
- values = new SynchronizedCollection<>(m.values(), mutex);
+ values = new SynchronizedCollection<V>(m.values(), mutex);
return values;
}
}
@@ -2129,7 +2129,7 @@ public class Collections {
* @return a synchronized view of the specified sorted map.
*/
public static <K,V> SortedMap<K,V> synchronizedSortedMap(SortedMap<K,V> m) {
- return new SynchronizedSortedMap<>(m);
+ return new SynchronizedSortedMap<K,V>(m);
}
@@ -2159,18 +2159,18 @@ public class Collections {
public SortedMap<K,V> subMap(K fromKey, K toKey) {
synchronized (mutex) {
- return new SynchronizedSortedMap<>(
+ return new SynchronizedSortedMap<K,V>(
sm.subMap(fromKey, toKey), mutex);
}
}
public SortedMap<K,V> headMap(K toKey) {
synchronized (mutex) {
- return new SynchronizedSortedMap<>(sm.headMap(toKey), mutex);
+ return new SynchronizedSortedMap<K,V>(sm.headMap(toKey), mutex);
}
}
public SortedMap<K,V> tailMap(K fromKey) {
synchronized (mutex) {
- return new SynchronizedSortedMap<>(sm.tailMap(fromKey),mutex);
+ return new SynchronizedSortedMap<K,V>(sm.tailMap(fromKey),mutex);
}
}
@@ -2246,7 +2246,7 @@ public class Collections {
*/
public static <E> Collection<E> checkedCollection(Collection<E> c,
Class<E> type) {
- return new CheckedCollection<>(c, type);
+ return new CheckedCollection<E>(c, type);
}
@SuppressWarnings("unchecked")
@@ -2378,7 +2378,7 @@ public class Collections {
* @since 1.5
*/
public static <E> Set<E> checkedSet(Set<E> s, Class<E> type) {
- return new CheckedSet<>(s, type);
+ return new CheckedSet<E>(s, type);
}
/**
@@ -2424,7 +2424,7 @@ public class Collections {
*/
public static <E> SortedSet<E> checkedSortedSet(SortedSet<E> s,
Class<E> type) {
- return new CheckedSortedSet<>(s, type);
+ return new CheckedSortedSet<E>(s, type);
}
/**
@@ -2484,8 +2484,8 @@ public class Collections {
*/
public static <E> List<E> checkedList(List<E> list, Class<E> type) {
return (list instanceof RandomAccess ?
- new CheckedRandomAccessList<>(list, type) :
- new CheckedList<>(list, type));
+ new CheckedRandomAccessList<E>(list, type) :
+ new CheckedList<E>(list, type));
}
/**
@@ -2550,7 +2550,7 @@ public class Collections {
}
public List<E> subList(int fromIndex, int toIndex) {
- return new CheckedList<>(list.subList(fromIndex, toIndex), type);
+ return new CheckedList<E>(list.subList(fromIndex, toIndex), type);
}
}
@@ -2567,7 +2567,7 @@ public class Collections {
}
public List<E> subList(int fromIndex, int toIndex) {
- return new CheckedRandomAccessList<>(
+ return new CheckedRandomAccessList<E>(
list.subList(fromIndex, toIndex), type);
}
}
@@ -2609,7 +2609,7 @@ public class Collections {
public static <K, V> Map<K, V> checkedMap(Map<K, V> m,
Class<K> keyType,
Class<V> valueType) {
- return new CheckedMap<>(m, keyType, valueType);
+ return new CheckedMap<K,V>(m, keyType, valueType);
}
@@ -2677,14 +2677,15 @@ public class Collections {
// - protection from malicious t
// - correct behavior if t is a concurrent map
Object[] entries = t.entrySet().toArray();
- List<Map.Entry<K,V>> checked = new ArrayList<>(entries.length);
+ List<Map.Entry<K,V>> checked =
+ new ArrayList<Map.Entry<K,V>>(entries.length);
for (Object o : entries) {
Map.Entry<?,?> e = (Map.Entry<?,?>) o;
Object k = e.getKey();
Object v = e.getValue();
typeCheck(k, v);
checked.add(
- new AbstractMap.SimpleImmutableEntry<>((K) k, (V) v));
+ new AbstractMap.SimpleImmutableEntry<K,V>((K) k, (V) v));
}
for (Map.Entry<K,V> e : checked)
m.put(e.getKey(), e.getValue());
@@ -2694,7 +2695,7 @@ public class Collections {
public Set<Map.Entry<K,V>> entrySet() {
if (entrySet==null)
- entrySet = new CheckedEntrySet<>(m.entrySet(), valueType);
+ entrySet = new CheckedEntrySet<K,V>(m.entrySet(), valueType);
return entrySet;
}
@@ -2809,7 +2810,7 @@ public class Collections {
if (!(o instanceof Map.Entry))
return false;
return s.remove(new AbstractMap.SimpleImmutableEntry
- <>((Map.Entry<?,?>)o));
+ <Object, Object>((Map.Entry<?,?>)o));
}
public boolean removeAll(Collection<?> c) {
@@ -2842,7 +2843,7 @@ public class Collections {
static <K,V,T> CheckedEntry<K,V,T> checkedEntry(Map.Entry<K,V> e,
Class<T> valueType) {
- return new CheckedEntry<>(e, valueType);
+ return new CheckedEntry<K,V,T>(e, valueType);
}
/**
@@ -2883,7 +2884,7 @@ public class Collections {
if (!(o instanceof Map.Entry))
return false;
return e.equals(new AbstractMap.SimpleImmutableEntry
- <>((Map.Entry<?,?>)o));
+ <Object, Object>((Map.Entry<?,?>)o));
}
}
}
@@ -2926,7 +2927,7 @@ public class Collections {
public static <K,V> SortedMap<K,V> checkedSortedMap(SortedMap<K, V> m,
Class<K> keyType,
Class<V> valueType) {
- return new CheckedSortedMap<>(m, keyType, valueType);
+ return new CheckedSortedMap<K,V>(m, keyType, valueType);
}
/**
@@ -2992,7 +2993,7 @@ public class Collections {
private static class EmptyIterator<E> implements Iterator<E> {
static final EmptyIterator<Object> EMPTY_ITERATOR
- = new EmptyIterator<>();
+ = new EmptyIterator<Object>();
public boolean hasNext() { return false; }
public E next() { throw new NoSuchElementException(); }
@@ -3041,7 +3042,7 @@ public class Collections {
implements ListIterator<E>
{
static final EmptyListIterator<Object> EMPTY_ITERATOR
- = new EmptyListIterator<>();
+ = new EmptyListIterator<Object>();
public boolean hasPrevious() { return false; }
public E previous() { throw new NoSuchElementException(); }
@@ -3077,7 +3078,7 @@ public class Collections {
private static class EmptyEnumeration<E> implements Enumeration<E> {
static final EmptyEnumeration<Object> EMPTY_ENUMERATION
- = new EmptyEnumeration<>();
+ = new EmptyEnumeration<Object>();
public boolean hasMoreElements() { return false; }
public E nextElement() { throw new NoSuchElementException(); }
@@ -3089,7 +3090,7 @@ public class Collections {
* @see #emptySet()
*/
@SuppressWarnings("unchecked")
- public static final Set EMPTY_SET = new EmptySet<>();
+ public static final Set EMPTY_SET = new EmptySet<Object>();
/**
* Returns the empty set (immutable). This set is serializable.
@@ -3149,7 +3150,7 @@ public class Collections {
* @see #emptyList()
*/
@SuppressWarnings("unchecked")
- public static final List EMPTY_LIST = new EmptyList<>();
+ public static final List EMPTY_LIST = new EmptyList<Object>();
/**
* Returns the empty list (immutable). This list is serializable.
@@ -3223,7 +3224,7 @@ public class Collections {
* @since 1.3
*/
@SuppressWarnings("unchecked")
- public static final Map EMPTY_MAP = new EmptyMap<>();
+ public static final Map EMPTY_MAP = new EmptyMap<Object,Object>();
/**
* Returns the empty map (immutable). This map is serializable.
@@ -3285,7 +3286,7 @@ public class Collections {
* @return an immutable set containing only the specified object.
*/
public static <T> Set<T> singleton(T o) {
- return new SingletonSet<>(o);
+ return new SingletonSet<T>(o);
}
static <E> Iterator<E> singletonIterator(final E e) {
@@ -3338,7 +3339,7 @@ public class Collections {
* @since 1.3
*/
public static <T> List<T> singletonList(T o) {
- return new SingletonList<>(o);
+ return new SingletonList<T>(o);
}
/**
@@ -3380,7 +3381,7 @@ public class Collections {
* @since 1.3
*/
public static <K,V> Map<K,V> singletonMap(K key, V value) {
- return new SingletonMap<>(key, value);
+ return new SingletonMap<K,V>(key, value);
}
/**
@@ -3422,7 +3423,7 @@ public class Collections {
public Set<Map.Entry<K,V>> entrySet() {
if (entrySet==null)
entrySet = Collections.<Map.Entry<K,V>>singleton(
- new SimpleImmutableEntry<>(k, v));
+ new SimpleImmutableEntry<K,V>(k, v));
return entrySet;
}
@@ -3454,7 +3455,7 @@ public class Collections {
public static <T> List<T> nCopies(int n, T o) {
if (n < 0)
throw new IllegalArgumentException("List length = " + n);
- return new CopiesList<>(n, o);
+ return new CopiesList<T>(n, o);
}
/**
@@ -3528,7 +3529,7 @@ public class Collections {
if (fromIndex > toIndex)
throw new IllegalArgumentException("fromIndex(" + fromIndex +
") > toIndex(" + toIndex + ")");
- return new CopiesList<>(toIndex - fromIndex, element);
+ return new CopiesList<E>(toIndex - fromIndex, element);
}
}
@@ -3596,7 +3597,7 @@ public class Collections {
if (cmp instanceof ReverseComparator2)
return ((ReverseComparator2<T>)cmp).cmp;
- return new ReverseComparator2<>(cmp);
+ return new ReverseComparator2<T>(cmp);
}
/**
@@ -3675,7 +3676,7 @@ public class Collections {
* @see ArrayList
*/
public static <T> ArrayList<T> list(Enumeration<T> e) {
- ArrayList<T> l = new ArrayList<>();
+ ArrayList<T> l = new ArrayList<T>();
while (e.hasMoreElements())
l.add(e.nextElement());
return l;
@@ -3868,7 +3869,7 @@ public class Collections {
* @since 1.6
*/
public static <E> Set<E> newSetFromMap(Map<E, Boolean> map) {
- return new SetFromMap<>(map);
+ return new SetFromMap<E>(map);
}
/**
@@ -3932,7 +3933,7 @@ public class Collections {
* @since 1.6
*/
public static <T> Queue<T> asLifoQueue(Deque<T> deque) {
- return new AsLIFOQueue<>(deque);
+ return new AsLIFOQueue<T>(deque);
}
/**
diff -up openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java.sav openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java
--- openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java 2011-07-29 14:27:07.783531305 -0400
@@ -500,7 +500,7 @@ public class EnumMap<K extends Enum<K>,
int j = 0;
for (int i = 0; i < vals.length; i++)
if (vals[i] != null)
- a[j++] = new AbstractMap.SimpleEntry<>(
+ a[j++] = new AbstractMap.SimpleEntry<K,V>(
keyUniverse[i], unmaskNull(vals[i]));
return a;
}
diff -up openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java.sav openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java
--- openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java 2011-07-29 14:27:07.783531305 -0400
@@ -110,9 +110,9 @@ public abstract class EnumSet<E extends
throw new ClassCastException(elementType + " not an enum");
if (universe.length <= 64)
- return new RegularEnumSet<>(elementType, universe);
+ return new RegularEnumSet<E>(elementType, universe);
else
- return new JumboEnumSet<>(elementType, universe);
+ return new JumboEnumSet<E>(elementType, universe);
}
/**
@@ -431,7 +431,7 @@ public abstract class EnumSet<E extends
}
Object writeReplace() {
- return new SerializationProxy<>(this);
+ return new SerializationProxy<E>(this);
}
// readObject method for the serialization proxy pattern
diff -up openjdk-boot/jdk/src/share/classes/java/util/Formatter.java.sav openjdk-boot/jdk/src/share/classes/java/util/Formatter.java
--- openjdk-boot/jdk/src/share/classes/java/util/Formatter.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/Formatter.java 2011-07-29 14:27:07.783531305 -0400
@@ -2511,7 +2511,7 @@ public final class Formatter implements
* Finds format specifiers in the format string.
*/
private FormatString[] parse(String s) {
- ArrayList<FormatString> al = new ArrayList<>();
+ ArrayList<FormatString> al = new ArrayList<FormatString>();
Matcher m = fsPattern.matcher(s);
for (int i = 0, len = s.length(); i < len; ) {
if (m.find(i)) {
diff -up openjdk-boot/jdk/src/share/classes/java/util/HashMap.java.sav openjdk-boot/jdk/src/share/classes/java/util/HashMap.java
--- openjdk-boot/jdk/src/share/classes/java/util/HashMap.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/HashMap.java 2011-07-29 14:27:07.784531290 -0400
@@ -763,7 +763,7 @@ public class HashMap<K,V>
*/
void addEntry(int hash, K key, V value, int bucketIndex) {
Entry<K,V> e = table[bucketIndex];
- table[bucketIndex] = new Entry<>(hash, key, value, e);
+ table[bucketIndex] = new Entry<K,V>(hash, key, value, e);
if (size++ >= threshold)
resize(2 * table.length);
}
@@ -778,7 +778,7 @@ public class HashMap<K,V>
*/
void createEntry(int hash, K key, V value, int bucketIndex) {
Entry<K,V> e = table[bucketIndex];
- table[bucketIndex] = new Entry<>(hash, key, value, e);
+ table[bucketIndex] = new Entry<K,V>(hash, key, value, e);
size++;
}
diff -up openjdk-boot/jdk/src/share/classes/java/util/HashSet.java.sav openjdk-boot/jdk/src/share/classes/java/util/HashSet.java
--- openjdk-boot/jdk/src/share/classes/java/util/HashSet.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/HashSet.java 2011-07-29 14:27:07.784531290 -0400
@@ -100,7 +100,7 @@ public class HashSet<E>
* default initial capacity (16) and load factor (0.75).
*/
public HashSet() {
- map = new HashMap<>();
+ map = new HashMap<E,Object>();
}
/**
@@ -113,7 +113,7 @@ public class HashSet<E>
* @throws NullPointerException if the specified collection is null
*/
public HashSet(Collection<? extends E> c) {
- map = new HashMap<>(Math.max((int) (c.size()/.75f) + 1, 16));
+ map = new HashMap<E,Object>(Math.max((int) (c.size()/.75f) + 1, 16));
addAll(c);
}
@@ -127,7 +127,7 @@ public class HashSet<E>
* than zero, or if the load factor is nonpositive
*/
public HashSet(int initialCapacity, float loadFactor) {
- map = new HashMap<>(initialCapacity, loadFactor);
+ map = new HashMap<E,Object>(initialCapacity, loadFactor);
}
/**
@@ -139,7 +139,7 @@ public class HashSet<E>
* than zero
*/
public HashSet(int initialCapacity) {
- map = new HashMap<>(initialCapacity);
+ map = new HashMap<E,Object>(initialCapacity);
}
/**
@@ -156,7 +156,7 @@ public class HashSet<E>
* than zero, or if the load factor is nonpositive
*/
HashSet(int initialCapacity, float loadFactor, boolean dummy) {
- map = new LinkedHashMap<>(initialCapacity, loadFactor);
+ map = new LinkedHashMap<E,Object>(initialCapacity, loadFactor);
}
/**
diff -up openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java.sav openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java
--- openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java 2011-07-29 14:27:07.784531290 -0400
@@ -455,7 +455,7 @@ public class Hashtable<K,V>
// Creates the new entry.
Entry<K,V> e = tab[index];
- tab[index] = new Entry<>(hash, key, value, e);
+ tab[index] = new Entry<K,V>(hash, key, value, e);
count++;
return null;
}
@@ -579,7 +579,7 @@ public class Hashtable<K,V>
if (count == 0) {
return Collections.emptyEnumeration();
} else {
- return new Enumerator<>(type, false);
+ return new Enumerator<T>(type, false);
}
}
@@ -587,7 +587,7 @@ public class Hashtable<K,V>
if (count == 0) {
return Collections.emptyIterator();
} else {
- return new Enumerator<>(type, true);
+ return new Enumerator<T>(type, true);
}
}
@@ -863,7 +863,7 @@ public class Hashtable<K,V>
while (entry != null) {
entryStack =
- new Entry<>(0, entry.key, entry.value, entryStack);
+ new Entry<Object, Object>(0, entry.key, entry.value, entryStack);
entry = entry.next;
}
}
@@ -941,7 +941,7 @@ public class Hashtable<K,V>
}
// Creates the new entry.
Entry<K,V> e = tab[index];
- tab[index] = new Entry<>(hash, key, value, e);
+ tab[index] = new Entry<K,V>(hash, key, value, e);
count++;
}
@@ -962,7 +962,7 @@ public class Hashtable<K,V>
}
protected Object clone() {
- return new Entry<>(hash, key, value,
+ return new Entry<K,V>(hash, key, value,
(next==null ? null : (Entry<K,V>) next.clone()));
}
diff -up openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java.sav openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java
--- openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java 2011-07-29 14:27:07.784531290 -0400
@@ -1145,7 +1145,7 @@ public class IdentityHashMap<K,V>
Object[] result = new Object[size];
Iterator<Map.Entry<K,V>> it = iterator();
for (int i = 0; i < size; i++)
- result[i] = new AbstractMap.SimpleEntry<>(it.next());
+ result[i] = new AbstractMap.SimpleEntry<K,V>(it.next());
return result;
}
@@ -1157,7 +1157,7 @@ public class IdentityHashMap<K,V>
.newInstance(a.getClass().getComponentType(), size);
Iterator<Map.Entry<K,V>> it = iterator();
for (int i = 0; i < size; i++)
- a[i] = (T) new AbstractMap.SimpleEntry<>(it.next());
+ a[i] = (T) new AbstractMap.SimpleEntry<K,V>(it.next());
if (a.length > size)
a[size] = null;
return a;
diff -up openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java.sav openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java
--- openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java 2011-07-29 14:27:07.784531290 -0400
@@ -91,7 +91,7 @@ class JumboEnumSet<E extends Enum<E>> ex
* @return an iterator over the elements contained in this set
*/
public Iterator<E> iterator() {
- return new EnumSetIterator<>();
+ return new EnumSetIterator<E>();
}
private class EnumSetIterator<E extends Enum<E>> implements Iterator<E> {
diff -up openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java.sav openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java
--- openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java 2011-07-29 14:27:07.784531290 -0400
@@ -237,7 +237,7 @@ public class LinkedHashMap<K,V>
* the chain.
*/
void init() {
- header = new Entry<>(-1, null, null, null);
+ header = new Entry<K,V>(-1, null, null, null);
header.before = header.after = header;
}
@@ -438,7 +438,7 @@ public class LinkedHashMap<K,V>
*/
void createEntry(int hash, K key, V value, int bucketIndex) {
HashMap.Entry<K,V> old = table[bucketIndex];
- Entry<K,V> e = new Entry<>(hash, key, value, old);
+ Entry<K,V> e = new Entry<K,V>(hash, key, value, old);
table[bucketIndex] = e;
e.addBefore(header);
size++;
diff -up openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java.sav openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java
--- openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java 2011-07-29 14:27:07.784531290 -0400
@@ -122,7 +122,7 @@ public class LinkedList<E>
*/
private void linkFirst(E e) {
final Node<E> f = first;
- final Node<E> newNode = new Node<>(null, e, f);
+ final Node<E> newNode = new Node<E>(null, e, f);
first = newNode;
if (f == null)
last = newNode;
@@ -137,7 +137,7 @@ public class LinkedList<E>
*/
void linkLast(E e) {
final Node<E> l = last;
- final Node<E> newNode = new Node<>(l, e, null);
+ final Node<E> newNode = new Node<E>(l, e, null);
last = newNode;
if (l == null)
first = newNode;
@@ -153,7 +153,7 @@ public class LinkedList<E>
void linkBefore(E e, Node<E> succ) {
// assert succ != null;
final Node<E> pred = succ.prev;
- final Node<E> newNode = new Node<>(pred, e, succ);
+ final Node<E> newNode = new Node<E>(pred, e, succ);
succ.prev = newNode;
if (pred == null)
first = newNode;
@@ -419,7 +419,7 @@ public class LinkedList<E>
for (Object o : a) {
@SuppressWarnings("unchecked") E e = (E) o;
- Node<E> newNode = new Node<>(pred, e, null);
+ Node<E> newNode = new Node<E>(pred, e, null);
if (pred == null)
first = newNode;
else
diff -up openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java.sav openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java
--- openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java 2011-07-29 14:27:07.784531290 -0400
@@ -187,7 +187,7 @@ public abstract class ListResourceBundle
return;
Object[][] contents = getContents();
- HashMap<String,Object> temp = new HashMap<>(contents.length);
+ HashMap<String,Object> temp = new HashMap<String,Object>(contents.length);
for (int i = 0; i < contents.length; ++i) {
// key must be non-null String, value must be non-null
String key = (String) contents[i][0];
diff -up openjdk-boot/jdk/src/share/classes/java/util/Locale.java.sav openjdk-boot/jdk/src/share/classes/java/util/Locale.java
--- openjdk-boot/jdk/src/share/classes/java/util/Locale.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/Locale.java 2011-07-29 14:27:07.785531275 -0400
@@ -1793,7 +1793,7 @@ public final class Locale implements Clo
return formatList(variantNames, listPattern, listCompositionPattern);
}
}
- ArrayList<String> names = new ArrayList<>(4);
+ ArrayList<String> names = new ArrayList<String>(4);
if (languageName.length() != 0) {
names.add(languageName);
}
diff -up openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java.sav openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java
--- openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java 2011-07-29 14:27:07.785531275 -0400
@@ -127,7 +127,7 @@ public class FileHandler extends StreamH
private FileOutputStream lockStream;
private File files[];
private static final int MAX_LOCKS = 100;
- private static java.util.HashMap<String, String> locks = new java.util.HashMap<>();
+ private static java.util.HashMap<String, String> locks = new java.util.HashMap<String, String>();
// A metered stream is a subclass of OutputStream that
// (a) forwards all its output to a target stream
diff -up openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java.sav openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java
--- openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java 2011-07-29 14:27:07.785531275 -0400
@@ -59,7 +59,7 @@ import java.util.ResourceBundle;
*/
public class Level implements java.io.Serializable {
- private static java.util.ArrayList<Level> known = new java.util.ArrayList<>();
+ private static java.util.ArrayList<Level> known = new java.util.ArrayList<Level>();
private static String defaultBundle = "sun.util.logging.resources.logging";
/**
diff -up openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java.sav openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java
--- openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java 2011-07-29 14:27:07.785531275 -0400
@@ -170,7 +170,7 @@ public class Logger {
private LogManager manager;
private String name;
private final CopyOnWriteArrayList<Handler> handlers =
- new CopyOnWriteArrayList<>();
+ new CopyOnWriteArrayList<Handler>();
private String resourceBundleName;
private volatile boolean useParentHandlers = true;
private volatile Filter filter;
@@ -1439,7 +1439,7 @@ public class Logger {
// Set our new parent.
parent = newParent;
if (parent.kids == null) {
- parent.kids = new ArrayList<>(2);
+ parent.kids = new ArrayList<LogManager.LoggerWeakRef>(2);
}
if (ref == null) {
// we didn't have a previous parent
diff -up openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java.sav openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java
--- openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java 2011-07-29 14:27:07.785531275 -0400
@@ -56,7 +56,7 @@ class Logging implements LoggingMXBean {
public List<String> getLoggerNames() {
Enumeration loggers = logManager.getLoggerNames();
- ArrayList<String> array = new ArrayList<>();
+ ArrayList<String> array = new ArrayList<String>();
for (; loggers.hasMoreElements();) {
array.add((String) loggers.nextElement());
diff -up openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java.sav openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java
--- openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java 2011-07-29 14:27:07.785531275 -0400
@@ -156,7 +156,8 @@ public class LogManager {
private final static Level defaultLevel = Level.INFO;
// Table of named Loggers that maps names to Loggers.
- private Hashtable<String,LoggerWeakRef> namedLoggers = new Hashtable<>();
+ private Hashtable<String,LoggerWeakRef> namedLoggers =
+ new Hashtable<String,LoggerWeakRef>();
// Tree of named Loggers
private LogNode root = new LogNode(null);
private Logger rootLogger;
@@ -444,7 +445,7 @@ public class LogManager {
// loggerRefQueue holds LoggerWeakRef objects for Logger objects
// that have been GC'ed.
private final ReferenceQueue<Logger> loggerRefQueue
- = new ReferenceQueue<>();
+ = new ReferenceQueue<Logger>();
// Package-level inner class.
// Helper class for managing WeakReferences to Logger objects.
@@ -694,7 +695,7 @@ public class LogManager {
name = "";
}
if (node.children == null) {
- node.children = new HashMap<>();
+ node.children = new HashMap<String,LogNode>();
}
LogNode child = node.children.get(head);
if (child == null) {
@@ -878,7 +879,7 @@ public class LogManager {
}
hands = hands.trim();
int ix = 0;
- Vector<String> result = new Vector<>();
+ Vector<String> result = new Vector<String>();
while (ix < hands.length()) {
int end = ix;
while (end < hands.length()) {
diff -up openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java.sav openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java
--- openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java 2011-07-29 14:27:07.786531260 -0400
@@ -85,7 +85,8 @@ public class LogRecord implements java.i
private static final AtomicInteger nextThreadId
= new AtomicInteger(MIN_SEQUENTIAL_THREAD_ID);
- private static final ThreadLocal<Integer> threadIds = new ThreadLocal<>();
+ private static final ThreadLocal<Integer> threadIds
+ = new ThreadLocal<Integer>();
/**
* @serial Logging message level
diff -up openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java.sav openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java
--- openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java 2011-07-29 14:27:07.786531260 -0400
@@ -155,7 +155,8 @@ public abstract class AbstractPreference
* All known unremoved children of this node. (This "cache" is consulted
* prior to calling childSpi() or getChild().
*/
- private Map<String, AbstractPreferences> kidCache = new HashMap<>();
+ private Map<String, AbstractPreferences> kidCache
+ = new HashMap<String, AbstractPreferences>();
/**
* This field is used to keep track of whether or not this node has
@@ -712,7 +713,7 @@ public abstract class AbstractPreference
if (removed)
throw new IllegalStateException("Node has been removed.");
- Set<String> s = new TreeSet<>(kidCache.keySet());
+ Set<String> s = new TreeSet<String>(kidCache.keySet());
for (String kid : childrenNamesSpi())
s.add(kid);
return s.toArray(EMPTY_STRING_ARRAY);
@@ -1441,7 +1442,8 @@ public abstract class AbstractPreference
* event delivery from preference activity, greatly simplifying
* locking and reducing opportunity for deadlock.
*/
- private static final List<EventObject> eventQueue = new LinkedList<>();
+ private static final List<EventObject> eventQueue
+ = new LinkedList<EventObject>();
/**
* These two classes are used to distinguish NodeChangeEvents on
diff -up openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java.sav openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java
--- openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java 2011-07-29 14:27:07.786531260 -0400
@@ -538,7 +538,7 @@ public class PriorityQueue<E> extends Ab
cursor--;
else {
if (forgetMeNot == null)
- forgetMeNot = new ArrayDeque<>();
+ forgetMeNot = new ArrayDeque<E>();
forgetMeNot.add(moved);
}
} else if (lastRetElt != null) {
diff -up openjdk-boot/jdk/src/share/classes/java/util/Properties.java.sav openjdk-boot/jdk/src/share/classes/java/util/Properties.java
--- openjdk-boot/jdk/src/share/classes/java/util/Properties.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/Properties.java 2011-07-29 14:27:07.786531260 -0400
@@ -1010,7 +1010,7 @@ class Properties extends Hashtable<Objec
* @since 1.6
*/
public Set<String> stringPropertyNames() {
- Hashtable<String, String> h = new Hashtable<>();
+ Hashtable<String, String> h = new Hashtable<String, String>();
enumerateStringProperties(h);
return h.keySet();
}
diff -up openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java.sav openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java
--- openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java 2011-07-29 14:27:07.787531246 -0400
@@ -1193,7 +1193,7 @@ public final class Pattern
public String[] split(CharSequence input, int limit) {
int index = 0;
boolean matchLimited = limit > 0;
- ArrayList<String> matchList = new ArrayList<>();
+ ArrayList<String> matchList = new ArrayList<String>();
Matcher m = matcher(input);
// Add segments before each match found
@@ -1695,7 +1695,7 @@ loop: for(int x=0, offset=0; x<nCodePo
Map<String, Integer> namedGroups() {
if (namedGroups == null)
- namedGroups = new HashMap<>(2);
+ namedGroups = new HashMap<String, Integer>(2);
return namedGroups;
}
@@ -5495,7 +5495,7 @@ NEXT: while (i <= last) {
}
private static final HashMap<String, CharPropertyFactory> map
- = new HashMap<>();
+ = new HashMap<String, CharPropertyFactory>();
static {
// Unicode character property aliases, defined in
diff -up openjdk-boot/jdk/src/share/classes/java/util/regex/UnicodeProp.java.sav openjdk-boot/jdk/src/share/classes/java/util/regex/UnicodeProp.java
--- openjdk-boot/jdk/src/share/classes/java/util/regex/UnicodeProp.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/regex/UnicodeProp.java 2011-07-29 14:27:07.787531246 -0400
@@ -193,8 +193,8 @@ enum UnicodeProp {
}
};
- private final static HashMap<String, String> posix = new HashMap<>();
- private final static HashMap<String, String> aliases = new HashMap<>();
+ private final static HashMap<String, String> posix = new HashMap<String,String>();
+ private final static HashMap<String, String> aliases = new HashMap<String,String>();
static {
posix.put("ALPHA", "ALPHABETIC");
posix.put("LOWER", "LOWERCASE");
diff -up openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java.sav openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java
--- openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java 2011-07-29 14:27:07.787531246 -0400
@@ -72,7 +72,7 @@ class RegularEnumSet<E extends Enum<E>>
* @return an iterator over the elements contained in this set
*/
public Iterator<E> iterator() {
- return new EnumSetIterator<>();
+ return new EnumSetIterator<E>();
}
private class EnumSetIterator<E extends Enum<E>> implements Iterator<E> {
diff -up openjdk-boot/jdk/src/share/classes/java/util/ResourceBundle.java.sav openjdk-boot/jdk/src/share/classes/java/util/ResourceBundle.java
--- openjdk-boot/jdk/src/share/classes/java/util/ResourceBundle.java.sav 2011-07-29 12:21:13.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/ResourceBundle.java 2011-07-29 14:27:07.787531246 -0400
@@ -289,7 +289,7 @@ public abstract class ResourceBundle {
* name for compatibility with some workarounds for bug 4212439.
*/
private static final ConcurrentMap<CacheKey, BundleReference> cacheList
- = new ConcurrentHashMap<>(INITIAL_CACHE_SIZE);
+ = new ConcurrentHashMap<CacheKey,BundleReference>(INITIAL_CACHE_SIZE);
/**
* Queue for reference objects referring to class loaders or bundles.
@@ -1754,7 +1754,7 @@ public abstract class ResourceBundle {
* @since 1.6
*/
public Set<String> keySet() {
- Set<String> keys = new HashSet<>();
+ Set<String> keys = new HashSet<String>();
for (ResourceBundle rb = this; rb != null; rb = rb.parent) {
keys.addAll(rb.handleKeySet());
}
@@ -1782,7 +1782,7 @@ public abstract class ResourceBundle {
if (keySet == null) {
synchronized (this) {
if (keySet == null) {
- Set<String> keys = new HashSet<>();
+ Set<String> keys = new HashSet<String>();
Enumeration<String> enumKeys = getKeys();
while (enumKeys.hasMoreElements()) {
String key = enumKeys.nextElement();
@@ -2300,7 +2300,7 @@ public abstract class ResourceBundle {
if (baseName == null) {
throw new NullPointerException();
}
- return new ArrayList<>(CANDIDATES_CACHE.get(locale.getBaseLocale()));
+ return new ArrayList<Locale>(CANDIDATES_CACHE.get(locale.getBaseLocale()));
}
private static final CandidateListCache CANDIDATES_CACHE = new CandidateListCache();
@@ -2326,7 +2326,7 @@ public abstract class ResourceBundle {
if (language.equals("nb") || isNorwegianBokmal) {
List<Locale> tmpList = getDefaultList("nb", script, region, variant);
// Insert a locale replacing "nb" with "no" for every list entry
- List<Locale> bokmalList = new LinkedList<>();
+ List<Locale> bokmalList = new LinkedList<Locale>();
for (Locale l : tmpList) {
bokmalList.add(l);
if (l.getLanguage().length() == 0) {
@@ -2373,7 +2373,7 @@ public abstract class ResourceBundle {
List<String> variants = null;
if (variant.length() > 0) {
- variants = new LinkedList<>();
+ variants = new LinkedList<String>();
int idx = variant.length();
while (idx != -1) {
variants.add(variant.substring(0, idx));
@@ -2381,7 +2381,7 @@ public abstract class ResourceBundle {
}
}
- List<Locale> list = new LinkedList<>();
+ List<Locale> list = new LinkedList<Locale>();
if (variants != null) {
for (String v : variants) {
diff -up openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java.sav openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java
--- openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java 2011-07-29 14:27:07.787531246 -0400
@@ -191,7 +191,7 @@ public final class ServiceLoader<S>
private ClassLoader loader;
// Cached providers, in instantiation order
- private LinkedHashMap<String,S> providers = new LinkedHashMap<>();
+ private LinkedHashMap<String,S> providers = new LinkedHashMap<String,S>();
// The current lazy-lookup iterator
private LazyIterator lookupIterator;
@@ -291,7 +291,7 @@ public final class ServiceLoader<S>
{
InputStream in = null;
BufferedReader r = null;
- ArrayList<String> names = new ArrayList<>();
+ ArrayList<String> names = new ArrayList<String>();
try {
in = u.openStream();
r = new BufferedReader(new InputStreamReader(in, "utf-8"));
@@ -463,7 +463,7 @@ public final class ServiceLoader<S>
public static <S> ServiceLoader<S> load(Class<S> service,
ClassLoader loader)
{
- return new ServiceLoader<>(service, loader);
+ return new ServiceLoader<S>(service, loader);
}
/**
diff -up openjdk-boot/jdk/src/share/classes/java/util/TimSort.java.sav openjdk-boot/jdk/src/share/classes/java/util/TimSort.java
--- openjdk-boot/jdk/src/share/classes/java/util/TimSort.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/TimSort.java 2011-07-29 14:27:07.787531246 -0400
@@ -196,7 +196,7 @@ class TimSort<T> {
* extending short natural runs to minRun elements, and merging runs
* to maintain stack invariant.
*/
- TimSort<T> ts = new TimSort<>(a, c);
+ TimSort<T> ts = new TimSort<T>(a, c);
int minRun = minRunLength(nRemaining);
do {
// Identify next run
diff -up openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java.sav openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java
--- openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java 2011-07-29 14:27:07.788531232 -0400
@@ -530,7 +530,7 @@ public class TreeMap<K,V>
if (t == null) {
compare(key, key); // type (and possibly null) check
- root = new Entry<>(key, value, null);
+ root = new Entry<K,V>(key, value, null);
size = 1;
modCount++;
return null;
@@ -566,7 +566,7 @@ public class TreeMap<K,V>
return t.setValue(value);
} while (t != null);
}
- Entry<K,V> e = new Entry<>(key, value, parent);
+ Entry<K,V> e = new Entry<K,V>(key, value, parent);
if (cmp < 0)
parent.left = e;
else
@@ -1066,14 +1066,14 @@ public class TreeMap<K,V>
}
public NavigableSet<E> subSet(E fromElement, boolean fromInclusive,
E toElement, boolean toInclusive) {
- return new KeySet<>(m.subMap(fromElement, fromInclusive,
+ return new KeySet<E>(m.subMap(fromElement, fromInclusive,
toElement, toInclusive));
}
public NavigableSet<E> headSet(E toElement, boolean inclusive) {
- return new KeySet<>(m.headMap(toElement, inclusive));
+ return new KeySet<E>(m.headMap(toElement, inclusive));
}
public NavigableSet<E> tailSet(E fromElement, boolean inclusive) {
- return new KeySet<>(m.tailMap(fromElement, inclusive));
+ return new KeySet<E>(m.tailMap(fromElement, inclusive));
}
public SortedSet<E> subSet(E fromElement, E toElement) {
return subSet(fromElement, true, toElement, false);
@@ -1202,7 +1202,7 @@ public class TreeMap<K,V>
*/
static <K,V> Map.Entry<K,V> exportEntry(TreeMap.Entry<K,V> e) {
return (e == null) ? null :
- new AbstractMap.SimpleImmutableEntry<>(e);
+ new AbstractMap.SimpleImmutableEntry<K,V>(e);
}
/**
@@ -2403,7 +2403,7 @@ public class TreeMap<K,V>
value = (defaultVal != null ? defaultVal : (V) str.readObject());
}
- Entry<K,V> middle = new Entry<>(key, value, null);
+ Entry<K,V> middle = new Entry<K,V>(key, value, null);
// color nodes in non-full bottommost level red
if (level == redLevel)
diff -up openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java.sav openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java
--- openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java 2011-07-29 14:27:07.788531232 -0400
@@ -138,7 +138,7 @@ public class TreeSet<E> extends Abstract
* ordering} of the elements will be used.
*/
public TreeSet(Comparator<? super E> comparator) {
- this(new TreeMap<>(comparator));
+ this(new TreeMap<E,Object>(comparator));
}
/**
@@ -195,7 +195,7 @@ public class TreeSet<E> extends Abstract
* @since 1.6
*/
public NavigableSet<E> descendingSet() {
- return new TreeSet<>(m.descendingMap());
+ return new TreeSet<E>(m.descendingMap());
}
/**
@@ -322,7 +322,7 @@ public class TreeSet<E> extends Abstract
*/
public NavigableSet<E> subSet(E fromElement, boolean fromInclusive,
E toElement, boolean toInclusive) {
- return new TreeSet<>(m.subMap(fromElement, fromInclusive,
+ return new TreeSet<E>(m.subMap(fromElement, fromInclusive,
toElement, toInclusive));
}
@@ -335,7 +335,7 @@ public class TreeSet<E> extends Abstract
* @since 1.6
*/
public NavigableSet<E> headSet(E toElement, boolean inclusive) {
- return new TreeSet<>(m.headMap(toElement, inclusive));
+ return new TreeSet<E>(m.headMap(toElement, inclusive));
}
/**
@@ -347,7 +347,7 @@ public class TreeSet<E> extends Abstract
* @since 1.6
*/
public NavigableSet<E> tailSet(E fromElement, boolean inclusive) {
- return new TreeSet<>(m.tailMap(fromElement, inclusive));
+ return new TreeSet<E>(m.tailMap(fromElement, inclusive));
}
/**
@@ -477,7 +477,7 @@ public class TreeSet<E> extends Abstract
throw new InternalError();
}
- clone.m = new TreeMap<>(m);
+ clone.m = new TreeMap<E,Object>(m);
return clone;
}
@@ -524,9 +524,9 @@ public class TreeSet<E> extends Abstract
// Create backing TreeMap
TreeMap<E,Object> tm;
if (c==null)
- tm = new TreeMap<>();
+ tm = new TreeMap<E,Object>();
else
- tm = new TreeMap<>(c);
+ tm = new TreeMap<E,Object>(c);
m = tm;
// Read in size
diff -up openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java.sav openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java
--- openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java 2011-07-29 14:27:07.788531232 -0400
@@ -171,7 +171,7 @@ public class WeakHashMap<K,V>
/**
* Reference queue for cleared WeakEntries
*/
- private final ReferenceQueue<Object> queue = new ReferenceQueue<>();
+ private final ReferenceQueue<Object> queue = new ReferenceQueue<Object>();
/**
* The number of times this WeakHashMap has been structurally modified.
@@ -439,7 +439,7 @@ public class WeakHashMap<K,V>
modCount++;
Entry<K,V> e = tab[i];
- tab[i] = new Entry<>(k, value, queue, h, e);
+ tab[i] = new Entry<K,V>(k, value, queue, h, e);
if (++size >= threshold)
resize(tab.length * 2);
return null;
@@ -955,9 +955,10 @@ public class WeakHashMap<K,V>
}
private List<Map.Entry<K,V>> deepCopy() {
- List<Map.Entry<K,V>> list = new ArrayList<>(size());
+ List<Map.Entry<K,V>> list =
+ new ArrayList<Map.Entry<K,V>>(size());
for (Map.Entry<K,V> e : this)
- list.add(new AbstractMap.SimpleEntry<>(e));
+ list.add(new AbstractMap.SimpleEntry<K,V>(e));
return list;
}
diff -up openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java.sav openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java
--- openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java 2011-07-29 14:27:07.788531232 -0400
@@ -319,7 +319,7 @@ class ZipFile implements ZipConstants, C
// the outstanding inputstreams that need to be closed,
// mapped to the inflater objects they use.
- private final Map<InputStream, Inflater> streams = new WeakHashMap<>();
+ private final Map<InputStream, Inflater> streams = new WeakHashMap<InputStream,Inflater>();
/**
* Returns an input stream for reading the contents of the specified
@@ -461,7 +461,7 @@ class ZipFile implements ZipConstants, C
}
// List of available Inflater objects for decompression
- private Deque<Inflater> inflaterCache = new ArrayDeque<>();
+ private Deque<Inflater> inflaterCache = new ArrayDeque<Inflater>();
/**
* Returns the path name of the ZIP file.
@@ -577,7 +577,7 @@ class ZipFile implements ZipConstants, C
// Close streams, release their inflaters
synchronized (streams) {
if (false == streams.isEmpty()) {
- Map<InputStream, Inflater> copy = new HashMap<>(streams);
+ Map<InputStream, Inflater> copy = new HashMap<InputStream,Inflater>(streams);
streams.clear();
for (Map.Entry<InputStream, Inflater> e : copy.entrySet()) {
e.getKey().close();
diff -up openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java.sav openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java
--- openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java.sav 2011-07-29 12:21:14.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java 2011-07-29 14:27:07.788531232 -0400
@@ -53,8 +53,8 @@ class ZipOutputStream extends DeflaterOu
}
private XEntry current;
- private Vector<XEntry> xentries = new Vector<>();
- private HashSet<String> names = new HashSet<>();
+ private Vector<XEntry> xentries = new Vector<XEntry>();
+ private HashSet<String> names = new HashSet<String>();
private CRC32 crc = new CRC32();
private long written = 0;
private long locoff = 0;
diff -up openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java.sav openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java
--- openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java.sav 2011-07-29 12:21:17.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java 2011-07-29 14:27:07.788531232 -0400
@@ -361,7 +361,7 @@ final class KrbDelegationPermissionColle
// Don't call out.defaultWriteObject()
// Write out Vector
- Vector<Permission> permissions = new Vector<>(perms.size());
+ Vector<Permission> permissions = new Vector<Permission>(perms.size());
synchronized (this) {
permissions.addAll(perms);
diff -up openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/ServicePermission.java.sav openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/ServicePermission.java
--- openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/ServicePermission.java.sav 2011-07-29 12:21:17.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/javax/security/auth/kerberos/ServicePermission.java 2011-07-29 14:27:07.788531232 -0400
@@ -569,7 +569,7 @@ final class KrbServicePermissionCollecti
// Don't call out.defaultWriteObject()
// Write out Vector
- Vector<Permission> permissions = new Vector<>(perms.size());
+ Vector<Permission> permissions = new Vector<Permission>(perms.size());
synchronized (this) {
permissions.addAll(perms);
diff -up openjdk-boot/jdk/src/share/classes/javax/security/auth/PrivateCredentialPermission.java.sav openjdk-boot/jdk/src/share/classes/javax/security/auth/PrivateCredentialPermission.java
--- openjdk-boot/jdk/src/share/classes/javax/security/auth/PrivateCredentialPermission.java.sav 2011-07-29 12:21:17.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/javax/security/auth/PrivateCredentialPermission.java 2011-07-29 14:27:07.789531217 -0400
@@ -329,7 +329,7 @@ public final class PrivateCredentialPerm
throw new IllegalArgumentException("invalid empty name");
}
- ArrayList<CredOwner> pList = new ArrayList<>();
+ ArrayList<CredOwner> pList = new ArrayList<CredOwner>();
StringTokenizer tokenizer = new StringTokenizer(name, " ", true);
String principalClass = null;
String principalName = null;
diff -up openjdk-boot/jdk/src/share/classes/javax/security/auth/SubjectDomainCombiner.java.sav openjdk-boot/jdk/src/share/classes/javax/security/auth/SubjectDomainCombiner.java
--- openjdk-boot/jdk/src/share/classes/javax/security/auth/SubjectDomainCombiner.java.sav 2011-07-29 12:21:17.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/javax/security/auth/SubjectDomainCombiner.java 2011-07-29 14:27:07.789531217 -0400
@@ -48,7 +48,7 @@ public class SubjectDomainCombiner imple
private Subject subject;
private WeakKeyValueMap<ProtectionDomain, ProtectionDomain> cachedPDs =
- new WeakKeyValueMap<>();
+ new WeakKeyValueMap<ProtectionDomain, ProtectionDomain>();
private Set<Principal> principalSet;
private Principal[] principals;
diff -up openjdk-boot/jdk/src/share/classes/sun/invoke/util/ValueConversions.java.sav openjdk-boot/jdk/src/share/classes/sun/invoke/util/ValueConversions.java
--- openjdk-boot/jdk/src/share/classes/sun/invoke/util/ValueConversions.java.sav 2011-07-29 12:21:23.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/invoke/util/ValueConversions.java 2011-07-29 14:27:07.789531217 -0400
@@ -59,7 +59,7 @@ public class ValueConversions {
EnumMap<Wrapper, MethodHandle>[] caches
= (EnumMap<Wrapper, MethodHandle>[]) new EnumMap[n]; // unchecked warning expected here
for (int i = 0; i < n; i++)
- caches[i] = new EnumMap<>(Wrapper.class);
+ caches[i] = new EnumMap<Wrapper, MethodHandle>(Wrapper.class);
return caches;
}
@@ -1009,7 +1009,7 @@ public class ValueConversions {
Object a8, Object a9)
{ return makeArray(a0, a1, a2, a3, a4, a5, a6, a7, a8, a9); }
private static MethodHandle[] makeArrays() {
- ArrayList<MethodHandle> mhs = new ArrayList<>();
+ ArrayList<MethodHandle> mhs = new ArrayList<MethodHandle>();
for (;;) {
MethodHandle mh = findCollector("array", mhs.size(), Object[].class);
if (mh == null) break;
@@ -1055,7 +1055,7 @@ public class ValueConversions {
Object a8, Object a9)
{ fillWithArguments(a, pos, a0, a1, a2, a3, a4, a5, a6, a7, a8, a9); return a; }
private static MethodHandle[] makeFillArrays() {
- ArrayList<MethodHandle> mhs = new ArrayList<>();
+ ArrayList<MethodHandle> mhs = new ArrayList<MethodHandle>();
mhs.add(null); // there is no empty fill; at least a0 is required
for (;;) {
MethodHandle mh = findCollector("fillArray", mhs.size(), Object[].class, Object[].class, Integer.class);
@@ -1210,7 +1210,7 @@ public class ValueConversions {
Object a8, Object a9)
{ return makeList(a0, a1, a2, a3, a4, a5, a6, a7, a8, a9); }
private static MethodHandle[] makeLists() {
- ArrayList<MethodHandle> mhs = new ArrayList<>();
+ ArrayList<MethodHandle> mhs = new ArrayList<MethodHandle>();
for (;;) {
MethodHandle mh = findCollector("list", mhs.size(), List.class);
if (mh == null) break;
diff -up openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java.sav openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java
--- openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java.sav 2011-07-29 12:21:23.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java 2011-07-29 14:27:07.789531217 -0400
@@ -54,7 +54,7 @@ public class CharacterEncoding {
private static volatile boolean installedAll;
static {
- aliasTable = new HashMap<>(460, 1.0f); /* MDA */
+ aliasTable = new HashMap<String,String>(460, 1.0f); /* MDA */
aliasTable.put("us-ascii", "ASCII");
aliasTable.put("ascii", "ASCII");
diff -up openjdk-boot/jdk/src/share/classes/sun/io/Converters.java.sav openjdk-boot/jdk/src/share/classes/sun/io/Converters.java
--- openjdk-boot/jdk/src/share/classes/sun/io/Converters.java.sav 2011-07-29 12:21:23.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/io/Converters.java 2011-07-29 14:27:07.789531217 -0400
@@ -120,7 +120,7 @@ public class Converters {
private static Class<?> cache(int type, Object encoding, Class<?> c) {
SoftReference<Object[]>[] srs = classCache[type];
- srs[CACHE_SIZE - 1] = new SoftReference<>(new Object[] { c, encoding });
+ srs[CACHE_SIZE - 1] = new SoftReference<Object[]>(new Object[] { c, encoding });
moveToFront(srs, CACHE_SIZE - 1);
return c;
}
diff -up openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java.sav openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java
--- openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java.sav 2011-07-29 12:21:24.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java 2011-07-29 14:27:07.789531217 -0400
@@ -173,7 +173,7 @@ public enum LauncherHelper {
private static void printProperties(PrintStream ostream) {
Properties p = System.getProperties();
ostream.println(PROP_SETTINGS);
- List<String> sortedPropertyKeys = new ArrayList<>();
+ List<String> sortedPropertyKeys = new ArrayList<String>();
sortedPropertyKeys.addAll(p.stringPropertyNames());
Collections.sort(sortedPropertyKeys);
for (String x : sortedPropertyKeys) {
@@ -248,7 +248,7 @@ public enum LauncherHelper {
}
// Locale does not implement Comparable so we convert it to String
// and sort it for pretty printing.
- Set<String> sortedSet = new TreeSet<>();
+ Set<String> sortedSet = new TreeSet<String>();
for (Locale l : tlocales) {
sortedSet.add(l.toString());
}
diff -up openjdk-boot/jdk/src/share/classes/sun/management/ManagementFactoryHelper.java.sav openjdk-boot/jdk/src/share/classes/sun/management/ManagementFactoryHelper.java
--- openjdk-boot/jdk/src/share/classes/sun/management/ManagementFactoryHelper.java.sav 2011-07-29 12:21:24.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/management/ManagementFactoryHelper.java 2011-07-29 14:27:07.789531217 -0400
@@ -204,7 +204,7 @@ public class ManagementFactoryHelper {
private static List<BufferPoolMXBean> bufferPools = null;
public static synchronized List<BufferPoolMXBean> getBufferPoolMXBeans() {
if (bufferPools == null) {
- bufferPools = new ArrayList<>(2);
+ bufferPools = new ArrayList<BufferPoolMXBean>(2);
bufferPools.add(createBufferPoolMXBean(sun.misc.SharedSecrets.getJavaNioAccess()
.getDirectBufferPool()));
bufferPools.add(createBufferPoolMXBean(sun.nio.ch.FileChannelImpl
diff -up openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java.sav openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java
--- openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java.sav 2011-07-29 12:21:25.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java 2011-07-29 14:27:07.789531217 -0400
@@ -52,7 +52,7 @@ public final class DNSNameService implem
// Per-thread soft cache of the last temporary context
private static ThreadLocal<SoftReference<ThreadContext>> contextRef =
- new ThreadLocal<>();
+ new ThreadLocal<SoftReference<ThreadContext>>();
// Simple class to encapsulate the temporary context
private static class ThreadContext {
@@ -99,7 +99,7 @@ public final class DNSNameService implem
// new thread context needs to be created
if (thrCtxt == null) {
- final Hashtable<String,Object> env = new Hashtable<>();
+ final Hashtable<String,Object> env = new Hashtable<String,Object>();
env.put("java.naming.factory.initial",
"com.sun.jndi.dns.DnsContextFactory");
@@ -165,7 +165,7 @@ public final class DNSNameService implem
final String[] ids, int depth)
throws UnknownHostException
{
- ArrayList<String> results = new ArrayList<>();
+ ArrayList<String> results = new ArrayList<String>();
Attributes attrs;
// do the query
diff -up openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java.sav openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java
--- openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java.sav 2011-07-29 12:21:26.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java 2011-07-29 14:27:07.789531217 -0400
@@ -111,7 +111,7 @@ public abstract class AuthenticationInfo
* at the same time, then all but the first will block until
* the first completes its authentication.
*/
- static private HashMap<String,Thread> requests = new HashMap<>();
+ static private HashMap<String,Thread> requests = new HashMap<String,Thread>();
/* check if a request for this destination is in progress
* return false immediately if not. Otherwise block until
diff -up openjdk-boot/jdk/src/share/classes/sun/net/www/URLConnection.java.sav openjdk-boot/jdk/src/share/classes/sun/net/www/URLConnection.java
--- openjdk-boot/jdk/src/share/classes/sun/net/www/URLConnection.java.sav 2011-07-29 12:21:25.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/net/www/URLConnection.java 2011-07-29 14:27:07.790531202 -0400
@@ -239,7 +239,7 @@ abstract public class URLConnection exte
url = null;
}
- private static HashMap<String,Void> proxiedHosts = new HashMap<>();
+ private static HashMap<String,Void> proxiedHosts = new HashMap<String,Void>();
public synchronized static void setProxiedHost(String host) {
proxiedHosts.put(host.toLowerCase(), null);
diff -up openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java.sav openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java
--- openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java.sav 2011-07-29 12:21:26.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java 2011-07-29 14:27:07.790531202 -0400
@@ -49,22 +49,22 @@ public class AbstractCharsetProvider
/* Maps canonical names to class names
*/
private Map<String,String> classMap
- = new TreeMap<>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
+ = new TreeMap<String,String>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
/* Maps alias names to canonical names
*/
private Map<String,String> aliasMap
- = new TreeMap<>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
+ = new TreeMap<String,String>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
/* Maps canonical names to alias-name arrays
*/
private Map<String,String[]> aliasNameMap
- = new TreeMap<>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
+ = new TreeMap<String,String[]>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
/* Maps canonical names to soft references that hold cached instances
*/
private Map<String,SoftReference<Charset>> cache
- = new TreeMap<>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
+ = new TreeMap<String,SoftReference<Charset>>(ASCIICaseInsensitiveComparator.CASE_INSENSITIVE_ORDER);
private String packagePrefix;
@@ -167,7 +167,7 @@ public class AbstractCharsetProvider
final ArrayList<String> ks;
synchronized (this) {
init();
- ks = new ArrayList<>(classMap.keySet());
+ ks = new ArrayList<String>(classMap.keySet());
}
return new Iterator<Charset>() {
diff -up openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractAclFileAttributeView.java.sav openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractAclFileAttributeView.java
--- openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractAclFileAttributeView.java.sav 2011-07-29 12:21:27.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractAclFileAttributeView.java 2011-07-29 14:27:07.790531202 -0400
@@ -84,7 +84,7 @@ abstract class AbstractAclFileAttributeV
throw new IllegalArgumentException("'" + name() + ":" +
attribute + "' not recognized");
}
- Map<String,Object> result = new HashMap<>(2);
+ Map<String,Object> result = new HashMap<String,Object>(2);
if (acl)
result.put(ACL_NAME, getAcl());
if (owner)
diff -up openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractBasicFileAttributeView.java.sav openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractBasicFileAttributeView.java
--- openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractBasicFileAttributeView.java.sav 2011-07-29 12:21:27.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractBasicFileAttributeView.java 2011-07-29 14:27:07.790531202 -0400
@@ -89,8 +89,8 @@ abstract class AbstractBasicFileAttribut
* Used to build a map of attribute name/values.
*/
static class AttributesBuilder {
- private Set<String> names = new HashSet<>();
- private Map<String,Object> map = new HashMap<>();
+ private Set<String> names = new HashSet<String>();
+ private Map<String,Object> map = new HashMap<String,Object>();
private boolean copyAll;
private AttributesBuilder(Set<String> allowed, String[] requested) {
diff -up openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractPoller.java.sav openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractPoller.java
--- openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractPoller.java.sav 2011-07-29 12:21:27.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractPoller.java 2011-07-29 14:27:07.790531202 -0400
@@ -102,7 +102,7 @@ abstract class AbstractPoller implements
throw new NullPointerException();
if (events.length == 0)
throw new IllegalArgumentException("No events to register");
- Set<WatchEvent.Kind<?>> eventSet = new HashSet<>(events.length);
+ Set<WatchEvent.Kind<?>> eventSet = new HashSet<WatchEvent.Kind<?>>(events.length);
for (WatchEvent.Kind<?> event: events) {
// standard events
if (event == StandardWatchEventKinds.ENTRY_CREATE ||
diff -up openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractUserDefinedFileAttributeView.java.sav openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractUserDefinedFileAttributeView.java
--- openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractUserDefinedFileAttributeView.java.sav 2011-07-29 12:21:27.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/nio/fs/AbstractUserDefinedFileAttributeView.java 2011-07-29 14:27:07.790531202 -0400
@@ -77,7 +77,7 @@ abstract class AbstractUserDefinedFileAt
throws IOException
{
// names of attributes to return
- List<String> names = new ArrayList<>();
+ List<String> names = new ArrayList<String>();
for (String name: attributes) {
if (name.equals("*")) {
names = list();
@@ -90,7 +90,7 @@ abstract class AbstractUserDefinedFileAt
}
// read each value and return in map
- Map<String,Object> result = new HashMap<>();
+ Map<String,Object> result = new HashMap<String,Object>();
for (String name: names) {
int size = size(name);
byte[] buf = new byte[size];
diff -up openjdk-boot/jdk/src/share/classes/sun/nio/fs/FileOwnerAttributeViewImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/nio/fs/FileOwnerAttributeViewImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/nio/fs/FileOwnerAttributeViewImpl.java.sav 2011-07-29 12:21:27.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/nio/fs/FileOwnerAttributeViewImpl.java 2011-07-29 14:27:07.790531202 -0400
@@ -71,7 +71,7 @@ final class FileOwnerAttributeViewImpl
@Override
public Map<String,Object> readAttributes(String[] attributes) throws IOException {
- Map<String,Object> result = new HashMap<>();
+ Map<String,Object> result = new HashMap<String,Object>();
for (String attribute: attributes) {
if (attribute.equals("*") || attribute.equals(OWNER_NAME)) {
result.put(OWNER_NAME, getOwner());
diff -up openjdk-boot/jdk/src/share/classes/sun/nio/fs/Util.java.sav openjdk-boot/jdk/src/share/classes/sun/nio/fs/Util.java
--- openjdk-boot/jdk/src/share/classes/sun/nio/fs/Util.java.sav 2011-07-29 12:21:27.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/nio/fs/Util.java 2011-07-29 14:27:07.790531202 -0400
@@ -63,7 +63,7 @@ class Util {
* Returns a Set containing the given elements.
*/
static <E> Set<E> newSet(E... elements) {
- HashSet<E> set = new HashSet<>();
+ HashSet<E> set = new HashSet<E>();
for (E e: elements) {
set.add(e);
}
@@ -75,7 +75,7 @@ class Util {
* the given elements.
*/
static <E> Set<E> newSet(Set<E> other, E... elements) {
- HashSet<E> set = new HashSet<>(other);
+ HashSet<E> set = new HashSet<E>(other);
for (E e: elements) {
set.add(e);
}
diff -up openjdk-boot/jdk/src/share/classes/sun/rmi/server/Activation.java.sav openjdk-boot/jdk/src/share/classes/sun/rmi/server/Activation.java
--- openjdk-boot/jdk/src/share/classes/sun/rmi/server/Activation.java.sav 2011-07-29 12:21:27.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/rmi/server/Activation.java 2011-07-29 14:27:07.790531202 -0400
@@ -149,10 +149,10 @@ public class Activation implements Seria
/** maps activation id to its respective group id */
private Map<ActivationID,ActivationGroupID> idTable =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<ActivationID,ActivationGroupID>();
/** maps group id to its GroupEntry groups */
private Map<ActivationGroupID,GroupEntry> groupTable =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<ActivationGroupID,GroupEntry>();
private byte majorVersion = MAJOR_VERSION;
private byte minorVersion = MINOR_VERSION;
@@ -288,10 +288,10 @@ public class Activation implements Seria
{
ois.defaultReadObject();
if (! (groupTable instanceof ConcurrentHashMap)) {
- groupTable = new ConcurrentHashMap<>(groupTable);
+ groupTable = new ConcurrentHashMap<ActivationGroupID,GroupEntry>(groupTable);
}
if (! (idTable instanceof ConcurrentHashMap)) {
- idTable = new ConcurrentHashMap<>(idTable);
+ idTable = new ConcurrentHashMap<ActivationID,ActivationGroupID>(idTable);
}
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/acl/AclEntryImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/acl/AclEntryImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/acl/AclEntryImpl.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/acl/AclEntryImpl.java 2011-07-29 14:27:07.790531202 -0400
@@ -37,7 +37,7 @@ import java.security.acl.*;
*/
public class AclEntryImpl implements AclEntry {
private Principal user = null;
- private Vector<Permission> permissionSet = new Vector<>(10, 10);
+ private Vector<Permission> permissionSet = new Vector<Permission>(10, 10);
private boolean negative = false;
/**
diff -up openjdk-boot/jdk/src/share/classes/sun/security/acl/AclImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/acl/AclImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/acl/AclImpl.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/acl/AclImpl.java 2011-07-29 14:27:07.791531187 -0400
@@ -41,15 +41,15 @@ public class AclImpl extends OwnerImpl i
// or principal.
//
private Hashtable<Principal, AclEntry> allowedUsersTable =
- new Hashtable<>(23);
+ new Hashtable<Principal,AclEntry>(23);
private Hashtable<Principal, AclEntry> allowedGroupsTable =
- new Hashtable<>(23);
+ new Hashtable<Principal, AclEntry>(23);
private Hashtable<Principal, AclEntry> deniedUsersTable =
- new Hashtable<>(23);
+ new Hashtable<Principal, AclEntry>(23);
private Hashtable<Principal, AclEntry> deniedGroupsTable =
- new Hashtable<>(23);
+ new Hashtable<Principal, AclEntry>(23);
private String aclName = null;
- private Vector<Permission> zeroSet = new Vector<>(1,1);
+ private Vector<Permission> zeroSet = new Vector<Permission>(1,1);
/**
@@ -294,7 +294,7 @@ public class AclImpl extends OwnerImpl i
//
private static Enumeration<Permission> union(Enumeration<Permission> e1,
Enumeration<Permission> e2) {
- Vector<Permission> v = new Vector<>(20, 20);
+ Vector<Permission> v = new Vector<Permission>(20, 20);
while (e1.hasMoreElements())
v.addElement(e1.nextElement());
@@ -313,7 +313,7 @@ public class AclImpl extends OwnerImpl i
//
private Enumeration<Permission> subtract(Enumeration<Permission> e1,
Enumeration<Permission> e2) {
- Vector<Permission> v = new Vector<>(20, 20);
+ Vector<Permission> v = new Vector<Permission>(20, 20);
while (e1.hasMoreElements())
v.addElement(e1.nextElement());
diff -up openjdk-boot/jdk/src/share/classes/sun/security/acl/GroupImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/acl/GroupImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/acl/GroupImpl.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/acl/GroupImpl.java 2011-07-29 14:27:07.791531187 -0400
@@ -34,7 +34,7 @@ import java.security.acl.*;
* @author Satish Dharmaraj
*/
public class GroupImpl implements Group {
- private Vector<Principal> groupMembers = new Vector<>(50, 100);
+ private Vector<Principal> groupMembers = new Vector<Principal>(50, 100);
private String group;
/**
@@ -131,7 +131,7 @@ public class GroupImpl implements Group
if (groupMembers.contains(member)) {
return true;
} else {
- Vector<Group> alreadySeen = new Vector<>(10);
+ Vector<Group> alreadySeen = new Vector<Group>(10);
return isMemberRecurse(member, alreadySeen);
}
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/jca/ProviderList.java.sav openjdk-boot/jdk/src/share/classes/sun/security/jca/ProviderList.java
--- openjdk-boot/jdk/src/share/classes/sun/security/jca/ProviderList.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/jca/ProviderList.java 2011-07-29 14:27:07.791531187 -0400
@@ -96,7 +96,7 @@ public final class ProviderList {
if (providerList.getProvider(p.getName()) != null) {
return providerList;
}
- List<ProviderConfig> list = new ArrayList<>
+ List<ProviderConfig> list = new ArrayList<ProviderConfig>
(Arrays.asList(providerList.configs));
int n = list.size();
if ((position < 0) || (position > n)) {
@@ -160,7 +160,7 @@ public final class ProviderList {
* Return a new ProviderList parsed from the java.security Properties.
*/
private ProviderList() {
- List<ProviderConfig> configList = new ArrayList<>();
+ List<ProviderConfig> configList = new ArrayList<ProviderConfig>();
for (int i = 1; true; i++) {
String entry = Security.getProperty("security.provider." + i);
if (entry == null) {
@@ -200,7 +200,7 @@ public final class ProviderList {
* possible recursion and deadlock during verification.
*/
ProviderList getJarList(String[] jarClassNames) {
- List<ProviderConfig> newConfigs = new ArrayList<>();
+ List<ProviderConfig> newConfigs = new ArrayList<ProviderConfig>();
for (String className : jarClassNames) {
ProviderConfig newConfig = new ProviderConfig(className);
for (ProviderConfig config : configs) {
@@ -356,7 +356,7 @@ public final class ProviderList {
*/
@Deprecated
public List<Service> getServices(String type, List<String> algorithms) {
- List<ServiceId> ids = new ArrayList<>();
+ List<ServiceId> ids = new ArrayList<ServiceId>();
for (String alg : algorithms) {
ids.add(new ServiceId(type, alg));
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/jca/Providers.java.sav openjdk-boot/jdk/src/share/classes/sun/security/jca/Providers.java
--- openjdk-boot/jdk/src/share/classes/sun/security/jca/Providers.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/jca/Providers.java 2011-07-29 14:27:07.791531187 -0400
@@ -40,7 +40,7 @@ import java.security.Security;
public class Providers {
private static final ThreadLocal<ProviderList> threadLists =
- new InheritableThreadLocal<>();
+ new InheritableThreadLocal<ProviderList>();
// number of threads currently using thread-local provider lists
// tracked to allow an optimization if == 0
diff -up openjdk-boot/jdk/src/share/classes/sun/security/jgss/krb5/Krb5Util.java.sav openjdk-boot/jdk/src/share/classes/sun/security/jgss/krb5/Krb5Util.java
--- openjdk-boot/jdk/src/share/classes/sun/security/jgss/krb5/Krb5Util.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/jgss/krb5/Krb5Util.java 2011-07-29 14:27:07.791531187 -0400
@@ -267,7 +267,7 @@ public class Krb5Util {
if (ktabs.isEmpty()) {
return kk.toArray(new KerberosKey[kk.size()]);
} else {
- List<KerberosKey> keys = new ArrayList<>();
+ List<KerberosKey> keys = new ArrayList<KerberosKey>();
for (KeyTab ktab: ktabs) {
for (KerberosKey k: ktab.getKeys(kp)) {
keys.add(k);
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/Config.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/Config.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/Config.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/Config.java 2011-07-29 14:27:07.791531187 -0400
@@ -527,7 +527,7 @@ public class Config {
}
})));
String Line;
- Vector<String> v = new Vector<>();
+ Vector<String> v = new Vector<String>();
String previous = null;
while ((Line = br.readLine()) != null) {
// ignore comments and blank line in the configuration file.
@@ -588,7 +588,7 @@ public class Config {
throw new KrbException("I/O error while reading" +
" configuration file.");
}
- Hashtable<String,Object> table = new Hashtable<>();
+ Hashtable<String,Object> table = new Hashtable<String,Object>();
for (int i = 0; i < v.size(); i++) {
String line = v.elementAt(i).trim();
if (line.equalsIgnoreCase("[realms]")) {
@@ -597,7 +597,7 @@ public class Config {
if ((count == v.size()) ||
(v.elementAt(count).startsWith("["))) {
Hashtable<String,Hashtable<String,Vector<String>>> temp =
- new Hashtable<>();
+ new Hashtable<String,Hashtable<String,Vector<String>>>();
temp = parseRealmField(v, i + 1, count);
table.put("realms", temp);
i = count - 1;
@@ -610,7 +610,7 @@ public class Config {
if ((count == v.size()) ||
(v.elementAt(count).startsWith("["))) {
Hashtable<String,Hashtable<String,Vector<String>>> temp =
- new Hashtable<>();
+ new Hashtable<String,Hashtable<String,Vector<String>>>();
temp = parseRealmField(v, i + 1, count);
table.put("capaths", temp);
i = count - 1;
@@ -728,7 +728,7 @@ public class Config {
* Parses key-value pairs under a stanza name.
*/
private Hashtable<String,String> parseField(Vector<String> v, int start, int end) {
- Hashtable<String,String> table = new Hashtable<>();
+ Hashtable<String,String> table = new Hashtable<String,String>();
String line;
for (int i = start; i < end; i++) {
line = v.elementAt(i);
@@ -750,7 +750,7 @@ public class Config {
* information for the realm given within a pair of braces.
*/
private Hashtable<String,Hashtable<String,Vector<String>>> parseRealmField(Vector<String> v, int start, int end) {
- Hashtable<String,Hashtable<String,Vector<String>>> table = new Hashtable<>();
+ Hashtable<String,Hashtable<String,Vector<String>>> table = new Hashtable<String,Hashtable<String,Vector<String>>>();
String line;
for (int i = start; i < end; i++) {
line = v.elementAt(i).trim();
@@ -790,9 +790,9 @@ public class Config {
* Parses key-value pairs within each braces under [realms].
*/
private Hashtable<String,Vector<String>> parseRealmFieldEx(Vector<String> v, int start, int end) {
- Hashtable<String,Vector<String>> table = new Hashtable<>();
- Vector<String> keyVector = new Vector<>();
- Vector<String> nameVector = new Vector<>();
+ Hashtable<String,Vector<String>> table = new Hashtable<String,Vector<String>>();
+ Vector<String> keyVector = new Vector<String>();
+ Vector<String> nameVector = new Vector<String>();
String line = "";
String key;
for (int i = start; i < end; i++) {
@@ -897,7 +897,7 @@ public class Config {
}
st = new StringTokenizer(default_enctypes, delim);
int len = st.countTokens();
- ArrayList<Integer> ls = new ArrayList<>(len);
+ ArrayList<Integer> ls = new ArrayList<Integer>(len);
int type;
for (int i = 0; i < len; i++) {
type = getType(st.nextToken());
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/Authenticator.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/Authenticator.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/Authenticator.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/Authenticator.java 2011-07-29 14:27:07.791531187 -0400
@@ -176,7 +176,7 @@ public class Authenticator {
* @exception IOException if an I/O error occurs while reading encoded data.
*/
public byte[] asn1Encode() throws Asn1Exception, IOException {
- Vector<DerValue> v = new Vector<>();
+ Vector<DerValue> v = new Vector<DerValue>();
DerOutputStream temp = new DerOutputStream();
temp.putInteger(BigInteger.valueOf(authenticator_vno));
v.addElement(new DerValue(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte) 0x00), temp.toByteArray()));
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/AuthorizationData.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/AuthorizationData.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/AuthorizationData.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/AuthorizationData.java 2011-07-29 14:27:07.791531187 -0400
@@ -99,7 +99,7 @@ public class AuthorizationData implement
* @exception IOException if an I/O error occurs while reading encoded data.
*/
public AuthorizationData(DerValue der) throws Asn1Exception, IOException {
- Vector<AuthorizationDataEntry> v = new Vector<>();
+ Vector<AuthorizationDataEntry> v = new Vector<AuthorizationDataEntry>();
if (der.getTag() != DerValue.tag_Sequence) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ccache/FileCredentialsCache.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ccache/FileCredentialsCache.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ccache/FileCredentialsCache.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ccache/FileCredentialsCache.java 2011-07-29 14:27:07.791531187 -0400
@@ -490,7 +490,7 @@ public class FileCredentialsCache extend
private static String exec(String c) {
StringTokenizer st = new StringTokenizer(c);
- Vector<String> v = new Vector<>();
+ Vector<String> v = new Vector<String>();
while (st.hasMoreTokens()) {
v.addElement(st.nextToken());
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/crypto/EType.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/crypto/EType.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/crypto/EType.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/crypto/EType.java 2011-07-29 14:27:07.792531172 -0400
@@ -257,7 +257,7 @@ public abstract class EType {
+ configName);
}
- List<Integer> list = new ArrayList<>(answer.length);
+ List<Integer> list = new ArrayList<Integer>(answer.length);
for (int i = 0; i < answer.length; i++) {
if (EncryptionKey.findKey(answer[i], keys) != null) {
list.add(answer[i]);
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/EncAPRepPart.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/EncAPRepPart.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/EncAPRepPart.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/EncAPRepPart.java 2011-07-29 14:27:07.792531172 -0400
@@ -133,7 +133,7 @@ public class EncAPRepPart {
* @exception IOException if an I/O error occurs while reading encoded data.
*/
public byte[] asn1Encode() throws Asn1Exception, IOException {
- Vector<DerValue> v = new Vector<>();
+ Vector<DerValue> v = new Vector<DerValue>();
DerOutputStream temp = new DerOutputStream();
v.addElement(new DerValue(DerValue.createTag(DerValue.TAG_CONTEXT,
true, (byte) 0x00), ctime.asn1Encode()));
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/HostAddresses.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/HostAddresses.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/HostAddresses.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/HostAddresses.java 2011-07-29 14:27:07.792531172 -0400
@@ -179,7 +179,7 @@ public class HostAddresses implements Cl
*/
public HostAddresses(DerValue encoding)
throws Asn1Exception, IOException {
- Vector<HostAddress> tempAddresses = new Vector<>();
+ Vector<HostAddress> tempAddresses = new Vector<HostAddress>();
DerValue der = null;
while (encoding.getData().available() > 0) {
der = encoding.getData().getDerValue();
@@ -265,7 +265,7 @@ public class HostAddresses implements Cl
if (addresses == null || addresses.length == 0)
return null;
- ArrayList<InetAddress> ipAddrs = new ArrayList<>(addresses.length);
+ ArrayList<InetAddress> ipAddrs = new ArrayList<InetAddress>(addresses.length);
for (int i = 0; i < addresses.length; i++) {
try {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReqBody.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReqBody.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReqBody.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReqBody.java 2011-07-29 14:27:07.792531172 -0400
@@ -158,7 +158,7 @@ public class KDCReqBody {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
der = encoding.getData().getDerValue();
- Vector<Integer> v = new Vector<>();
+ Vector<Integer> v = new Vector<Integer>();
if ((der.getTag() & (byte)0x1F) == (byte)0x08) {
subDer = der.getData().getDerValue();
@@ -183,7 +183,7 @@ public class KDCReqBody {
encAuthorizationData = EncryptedData.parse(encoding.getData(), (byte)0x0A, true);
}
if (encoding.getData().available() > 0) {
- Vector<Ticket> tempTickets = new Vector<>();
+ Vector<Ticket> tempTickets = new Vector<Ticket>();
der = encoding.getData().getDerValue();
if ((der.getTag() & (byte)0x1F) == (byte)0x0B) {
subDer = der.getData().getDerValue();
@@ -216,7 +216,7 @@ public class KDCReqBody {
*
*/
public byte[] asn1Encode(int msgType) throws Asn1Exception, IOException {
- Vector<DerValue> v = new Vector<>();
+ Vector<DerValue> v = new Vector<DerValue>();
v.addElement(new DerValue(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte)0x00), kdcOptions.asn1Encode()));
if (msgType == Krb5.KRB_AS_REQ) {
if (cname != null) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReq.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReq.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReq.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KDCReq.java 2011-07-29 14:27:07.792531172 -0400
@@ -150,7 +150,7 @@ public class KDCReq {
if (subsubDer.getTag() != DerValue.tag_SequenceOf) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
- Vector<PAData> v = new Vector<>();
+ Vector<PAData> v = new Vector<PAData>();
while (subsubDer.getData().available() > 0) {
v.addElement(new PAData(subsubDer.getData().getDerValue()));
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KrbCredInfo.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KrbCredInfo.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KrbCredInfo.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KrbCredInfo.java 2011-07-29 14:27:07.792531172 -0400
@@ -157,7 +157,7 @@ public class KrbCredInfo {
* @exception IOException if an I/O error occurs while reading encoded data.
*/
public byte[] asn1Encode() throws Asn1Exception, IOException {
- Vector<DerValue> v = new Vector<>();
+ Vector<DerValue> v = new Vector<DerValue>();
v.addElement(new DerValue(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte)0x00), key.asn1Encode()));
if (prealm != null)
v.addElement(new DerValue(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte)0x01), prealm.asn1Encode()));
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBCred.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBCred.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBCred.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBCred.java 2011-07-29 14:27:07.792531172 -0400
@@ -134,7 +134,7 @@ public class KRBCred {
if (subsubDer.getTag() != DerValue.tag_SequenceOf) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
- Vector<Ticket> v = new Vector<>();
+ Vector<Ticket> v = new Vector<Ticket>();
while (subsubDer.getData().available() > 0) {
v.addElement(new Ticket(subsubDer.getData().getDerValue()));
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBError.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBError.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBError.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/KRBError.java 2011-07-29 14:27:07.792531172 -0400
@@ -260,7 +260,7 @@ public class KRBError implements java.io
private void parsePAData(byte[] data)
throws IOException, Asn1Exception {
DerValue derPA = new DerValue(data);
- List<PAData> paList = new ArrayList<>();
+ List<PAData> paList = new ArrayList<PAData>();
while (derPA.data.available() > 0) {
// read the PA-DATA
DerValue tmp = derPA.data.getDerValue();
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java.sav 2011-07-29 14:27:01.432625563 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java 2011-07-29 14:27:07.792531172 -0400
@@ -67,7 +67,7 @@ public class KeyTab implements KeyTabCon
// Attention: Currently there is no way to remove a keytab from this map,
// this might lead to a memory leak.
- private static Map<String,KeyTab> map = new HashMap<>();
+ private static Map<String,KeyTab> map = new HashMap<String,KeyTab>();
// KeyTab file does not exist. Note: a missing keytab is still valid
private boolean isMissing = false;
@@ -79,7 +79,7 @@ public class KeyTab implements KeyTabCon
private long lastModified;
private int kt_vno;
- private Vector<KeyTabEntry> entries = new Vector<>();
+ private Vector<KeyTabEntry> entries = new Vector<KeyTabEntry>();
/**
* Constructs a KeyTab object.
@@ -280,7 +280,7 @@ public class KeyTab implements KeyTabCon
KeyTabEntry entry;
EncryptionKey key;
int size = entries.size();
- ArrayList<EncryptionKey> keys = new ArrayList<>(size);
+ ArrayList<EncryptionKey> keys = new ArrayList<EncryptionKey>(size);
for (int i = size-1; i >= 0; i--) {
entry = entries.elementAt(i);
if (entry.service.match(service)) {
@@ -482,7 +482,7 @@ public class KeyTab implements KeyTabCon
int count = 0;
// Remember the highest KVNO for each etype. Used for kvno == -2
- Map<Integer,Integer> highest = new HashMap<>();
+ Map<Integer,Integer> highest = new HashMap<Integer, Integer>();
for (int i = entries.size()-1; i >= 0; i--) {
KeyTabEntry e = entries.get(i);
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/LastReq.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/LastReq.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/LastReq.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/LastReq.java 2011-07-29 14:27:07.792531172 -0400
@@ -77,7 +77,7 @@ public class LastReq {
*/
public LastReq(DerValue encoding) throws Asn1Exception, IOException {
- Vector<LastReqEntry> v= new Vector<>();
+ Vector<LastReqEntry> v= new Vector<LastReqEntry>();
if (encoding.getTag() != DerValue.tag_Sequence) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/KdcComm.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/KdcComm.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/KdcComm.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/KdcComm.java 2011-07-29 14:27:07.792531172 -0400
@@ -462,7 +462,7 @@ public final class KdcComm {
*/
static class KdcAccessibility {
// Known bad KDCs
- private static Set<String> bads = new HashSet<>();
+ private static Set<String> bads = new HashSet<String>();
private static synchronized void addBad(String kdc) {
if (DEBUG) {
@@ -492,9 +492,9 @@ public final class KdcComm {
// Returns a preferred KDC list by putting the bad ones at the end
private static synchronized String[] list(String kdcList) {
StringTokenizer st = new StringTokenizer(kdcList);
- List<String> list = new ArrayList<>();
+ List<String> list = new ArrayList<String>();
if (badPolicy == BpType.TRY_LAST) {
- List<String> badkdcs = new ArrayList<>();
+ List<String> badkdcs = new ArrayList<String>();
while (st.hasMoreTokens()) {
String t = st.nextToken();
if (bads.contains(t)) badkdcs.add(t);
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/PrincipalName.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/PrincipalName.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/PrincipalName.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/PrincipalName.java 2011-07-29 14:27:07.793531157 -0400
@@ -244,7 +244,7 @@ public class PrincipalName
if (subDer.getTag() != DerValue.tag_SequenceOf) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
}
- Vector<String> v = new Vector<>();
+ Vector<String> v = new Vector<String>();
DerValue subSubDer;
while(subDer.getData().available() > 0) {
subSubDer = subDer.getData().getDerValue();
@@ -299,7 +299,7 @@ public class PrincipalName
// Code repetition, realm parsed again by class Realm
protected static String[] parseName(String name) {
- Vector<String> tempStrings = new Vector<>();
+ Vector<String> tempStrings = new Vector<String>();
String temp = name;
int i = 0;
int componentStart = 0;
diff -up openjdk-boot/jdk/src/share/classes/sun/security/krb5/Realm.java.sav openjdk-boot/jdk/src/share/classes/sun/security/krb5/Realm.java
--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/Realm.java.sav 2011-07-29 12:21:28.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/Realm.java 2011-07-29 14:27:07.793531157 -0400
@@ -359,14 +359,14 @@ public class Realm implements Cloneable
}
String tempTarget = null, tempRealm = null;
- Stack<String> iStack = new Stack<>();
+ Stack<String> iStack = new Stack<String>();
/*
* The half-established reversed-path, starting from the final target
* (sRealm), each item can be connected to by the next one.
* Might contains wrong item, if found, a bad track is performed
*/
- Vector<String> tempList = new Vector<>(8, 8);
+ Vector<String> tempList = new Vector<String>(8, 8);
tempList.add(sRealm);
int count = 0; // For debug only
diff -up openjdk-boot/jdk/src/share/classes/sun/security/provider/certpath/DistributionPointFetcher.java.sav openjdk-boot/jdk/src/share/classes/sun/security/provider/certpath/DistributionPointFetcher.java
--- openjdk-boot/jdk/src/share/classes/sun/security/provider/certpath/DistributionPointFetcher.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/certpath/DistributionPointFetcher.java 2011-07-29 14:27:07.793531157 -0400
@@ -590,7 +590,7 @@ class DistributionPointFetcher {
// Except the performance improvement, another benefit is to break
// the dead loop while looking for the issuer back and forth
// between the delegated self-issued certificate and its issuer.
- Set<TrustAnchor> newTrustAnchors = new HashSet<>(trustAnchors);
+ Set<TrustAnchor> newTrustAnchors = new HashSet<TrustAnchor>(trustAnchors);
if (prevKey != null) {
// Add the previous certificate as a trust anchor.
diff -up openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java.sav openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java
--- openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java 2011-07-29 14:27:07.793531157 -0400
@@ -683,7 +683,7 @@ abstract class JavaKeyStore extends KeyS
// Read the certificate chain
int numOfCerts = dis.readInt();
if (numOfCerts > 0) {
- List<Certificate> certs = new ArrayList<>(
+ List<Certificate> certs = new ArrayList<Certificate>(
numOfCerts > 10 ? 10 : numOfCerts);
for (int j = 0; j < numOfCerts; j++) {
if (xVersion == 2) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/provider/PolicyFile.java.sav openjdk-boot/jdk/src/share/classes/sun/security/provider/PolicyFile.java
--- openjdk-boot/jdk/src/share/classes/sun/security/provider/PolicyFile.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/PolicyFile.java 2011-07-29 14:27:07.793531157 -0400
@@ -299,7 +299,7 @@ public class PolicyFile extends java.sec
private static final int DEFAULT_CACHE_SIZE = 1;
// contains the policy grant entries, PD cache, and alias mapping
- private AtomicReference<PolicyInfo> policyInfo = new AtomicReference<>();
+ private AtomicReference<PolicyInfo> policyInfo = new AtomicReference<PolicyInfo>();
private boolean constructed = false;
private boolean expandProperties = true;
@@ -1333,7 +1333,7 @@ public class PolicyFile extends java.sec
List<PolicyParser.PrincipalEntry> entryPs = entry.getPrincipals();
if (debug != null) {
- ArrayList<PolicyParser.PrincipalEntry> accPs = new ArrayList<>();
+ ArrayList<PolicyParser.PrincipalEntry> accPs = new ArrayList<PolicyParser.PrincipalEntry>();
if (principals != null) {
for (int i = 0; i < principals.length; i++) {
accPs.add(new PolicyParser.PrincipalEntry
@@ -1414,7 +1414,7 @@ public class PolicyFile extends java.sec
// check if the PrincipalComparator
// implies the current thread's principals
- Set<Principal> pSet = new HashSet<>(principals.length);
+ Set<Principal> pSet = new HashSet<Principal>(principals.length);
for (int j = 0; j < principals.length; j++) {
pSet.add(principals[j]);
}
@@ -1697,7 +1697,7 @@ public class PolicyFile extends java.sec
// build an info array for every principal
// in the current domain which has a principal class
// that is equal to policy entry principal class name
- List<Principal> plist = new ArrayList<>();
+ List<Principal> plist = new ArrayList<Principal>();
for (int i = 0; i < pdp.length; i++) {
if(pe.principalClass.equals(pdp[i].getClass().getName()))
plist.add(pdp[i]);
@@ -1767,7 +1767,7 @@ public class PolicyFile extends java.sec
// Done
return certs;
- ArrayList<Certificate> userCertList = new ArrayList<>();
+ ArrayList<Certificate> userCertList = new ArrayList<Certificate>();
i = 0;
while (i < certs.length) {
userCertList.add(certs[i]);
@@ -2246,7 +2246,7 @@ public class PolicyFile extends java.sec
if (this.certs == null) {
// extract the signer certs
ArrayList<Certificate> signerCerts =
- new ArrayList<>();
+ new ArrayList<Certificate>();
i = 0;
while (i < certs.length) {
signerCerts.add(certs[i]);
diff -up openjdk-boot/jdk/src/share/classes/sun/security/provider/Sun.java.sav openjdk-boot/jdk/src/share/classes/sun/security/provider/Sun.java
--- openjdk-boot/jdk/src/share/classes/sun/security/provider/Sun.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/Sun.java 2011-07-29 14:27:07.793531157 -0400
@@ -55,7 +55,7 @@ public final class Sun extends Provider
SunEntries.putEntries(this);
} else {
// use LinkedHashMap to preserve the order of the PRNGs
- Map<Object, Object> map = new LinkedHashMap<>();
+ Map<Object, Object> map = new LinkedHashMap<Object, Object>();
SunEntries.putEntries(map);
AccessController.doPrivileged(new PutAllAction(this, map));
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/provider/VerificationProvider.java.sav openjdk-boot/jdk/src/share/classes/sun/security/provider/VerificationProvider.java
--- openjdk-boot/jdk/src/share/classes/sun/security/provider/VerificationProvider.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/VerificationProvider.java 2011-07-29 14:27:07.793531157 -0400
@@ -76,7 +76,7 @@ public final class VerificationProvider
SunRsaSignEntries.putEntries(this);
} else {
// use LinkedHashMap to preserve the order of the PRNGs
- Map<Object, Object> map = new LinkedHashMap<>();
+ Map<Object, Object> map = new LinkedHashMap<Object, Object>();
SunEntries.putEntries(map);
SunRsaSignEntries.putEntries(map);
AccessController.doPrivileged(new PutAllAction(this, map));
diff -up openjdk-boot/jdk/src/share/classes/sun/security/provider/X509Factory.java.sav openjdk-boot/jdk/src/share/classes/sun/security/provider/X509Factory.java
--- openjdk-boot/jdk/src/share/classes/sun/security/provider/X509Factory.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/X509Factory.java 2011-07-29 14:27:07.794531142 -0400
@@ -409,10 +409,10 @@ public class X509Factory extends Certifi
parseX509orPKCS7Cert(InputStream is)
throws CertificateException, IOException
{
- Collection<X509CertImpl> coll = new ArrayList<>();
+ Collection<X509CertImpl> coll = new ArrayList<X509CertImpl>();
byte[] data = readOneBlock(is);
if (data == null) {
- return new ArrayList<>(0);
+ return new ArrayList<Certificate>(0);
}
try {
PKCS7 pkcs7 = new PKCS7(data);
@@ -422,7 +422,7 @@ public class X509Factory extends Certifi
return Arrays.asList(certs);
} else {
// no crls provided
- return new ArrayList<>(0);
+ return new ArrayList<Certificate>(0);
}
} catch (ParsingException e) {
while (data != null) {
@@ -442,10 +442,10 @@ public class X509Factory extends Certifi
parseX509orPKCS7CRL(InputStream is)
throws CRLException, IOException
{
- Collection<X509CRLImpl> coll = new ArrayList<>();
+ Collection<X509CRLImpl> coll = new ArrayList<X509CRLImpl>();
byte[] data = readOneBlock(is);
if (data == null) {
- return new ArrayList<>(0);
+ return new ArrayList<java.security.cert.CRL>(0);
}
try {
PKCS7 pkcs7 = new PKCS7(data);
@@ -455,7 +455,7 @@ public class X509Factory extends Certifi
return Arrays.asList(crls);
} else {
// no crls provided
- return new ArrayList<>(0);
+ return new ArrayList<java.security.cert.CRL>(0);
}
} catch (ParsingException e) {
while (data != null) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/rsa/RSACore.java.sav openjdk-boot/jdk/src/share/classes/sun/security/rsa/RSACore.java
--- openjdk-boot/jdk/src/share/classes/sun/security/rsa/RSACore.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/rsa/RSACore.java 2011-07-29 14:27:07.794531142 -0400
@@ -219,7 +219,7 @@ public final class RSACore {
// use a weak hashmap so that cached values are automatically cleared
// when the modulus is GC'ed
private final static Map<BigInteger, BlindingParameters> blindingCache =
- new WeakHashMap<>();
+ new WeakHashMap<BigInteger, BlindingParameters>();
/**
* Set of blinding parameters for a given RSA key.
diff -up openjdk-boot/jdk/src/share/classes/sun/security/rsa/SunRsaSign.java.sav openjdk-boot/jdk/src/share/classes/sun/security/rsa/SunRsaSign.java
--- openjdk-boot/jdk/src/share/classes/sun/security/rsa/SunRsaSign.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/rsa/SunRsaSign.java 2011-07-29 14:27:07.794531142 -0400
@@ -52,7 +52,7 @@ public final class SunRsaSign extends Pr
SunRsaSignEntries.putEntries(this);
} else {
// use LinkedHashMap to preserve the order of the PRNGs
- Map<Object, Object> map = new HashMap<>();
+ Map<Object, Object> map = new HashMap<Object, Object>();
SunRsaSignEntries.putEntries(map);
AccessController.doPrivileged(new PutAllAction(this, map));
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/CipherSuite.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/CipherSuite.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/CipherSuite.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/CipherSuite.java 2011-07-29 14:27:07.794531142 -0400
@@ -393,7 +393,7 @@ final class CipherSuite implements Compa
// Map BulkCipher -> Boolean(available)
private final static Map<BulkCipher,Boolean> availableCache =
- new HashMap<>(8);
+ new HashMap<BulkCipher,Boolean>(8);
// descriptive name including key size, e.g. AES/128
final String description;
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/ClientHandshaker.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/ClientHandshaker.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/ClientHandshaker.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/ClientHandshaker.java 2011-07-29 14:27:07.794531142 -0400
@@ -656,7 +656,7 @@ final class ClientHandshaker extends Han
if (certRequest != null) {
X509ExtendedKeyManager km = sslContext.getX509KeyManager();
- ArrayList<String> keytypesTmp = new ArrayList<>(4);
+ ArrayList<String> keytypesTmp = new ArrayList<String>(4);
for (int i = 0; i < certRequest.types.length; i++) {
String typeName;
@@ -1175,7 +1175,7 @@ final class ClientHandshaker extends Han
"Can't reuse existing SSL client session");
}
- Collection<CipherSuite> cipherList = new ArrayList<>(2);
+ Collection<CipherSuite> cipherList = new ArrayList<CipherSuite>(2);
cipherList.add(sessionSuite);
if (!secureRenegotiation &&
cipherSuites.contains(CipherSuite.C_SCSV)) {
@@ -1193,7 +1193,7 @@ final class ClientHandshaker extends Han
// exclude SCSV for secure renegotiation
if (secureRenegotiation && cipherSuites.contains(CipherSuite.C_SCSV)) {
Collection<CipherSuite> cipherList =
- new ArrayList<>(cipherSuites.size() - 1);
+ new ArrayList<CipherSuite>(cipherSuites.size() - 1);
for (CipherSuite suite : cipherSuites.collection()) {
if (suite != CipherSuite.C_SCSV) {
cipherList.add(suite);
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/HandshakeMessage.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/HandshakeMessage.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/HandshakeMessage.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/HandshakeMessage.java 2011-07-29 14:27:07.794531142 -0400
@@ -258,7 +258,7 @@ static final class ClientHello extends H
// add server_name extension
void addServerNameIndicationExtension(String hostname) {
// We would have checked that the hostname ia a FQDN.
- ArrayList<String> hostnames = new ArrayList<>(1);
+ ArrayList<String> hostnames = new ArrayList<String>(1);
hostnames.add(hostname);
try {
@@ -434,7 +434,7 @@ class CertificateMsg extends HandshakeMe
CertificateMsg(HandshakeInStream input) throws IOException {
int chainLen = input.getInt24();
- List<Certificate> v = new ArrayList<>(4);
+ List<Certificate> v = new ArrayList<Certificate>(4);
CertificateFactory cf = null;
while (chainLen > 0) {
@@ -1334,7 +1334,7 @@ class CertificateRequest extends Handsha
// read the certificate_authorities
int len = input.getInt16();
- ArrayList<DistinguishedName> v = new ArrayList<>();
+ ArrayList<DistinguishedName> v = new ArrayList<DistinguishedName>();
while (len >= 3) {
DistinguishedName dn = new DistinguishedName(input);
v.add(dn);
@@ -1725,7 +1725,7 @@ static final class CertificateVerify ext
// Note that this will prevent the Spi classes from being GC'd. We assume
// that is not a problem.
private final static Map<Class,Object> methodCache =
- new ConcurrentHashMap<>();
+ new ConcurrentHashMap<Class,Object>();
private static void digestKey(MessageDigest md, SecretKey key) {
try {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/Handshaker.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/Handshaker.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/Handshaker.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/Handshaker.java 2011-07-29 14:27:07.794531142 -0400
@@ -569,7 +569,7 @@ abstract class Handshaker {
activeProtocols = getActiveProtocols();
}
- ArrayList<CipherSuite> suites = new ArrayList<>();
+ ArrayList<CipherSuite> suites = new ArrayList<CipherSuite>();
if (!(activeProtocols.collection().isEmpty()) &&
activeProtocols.min.v != ProtocolVersion.NONE.v) {
for (CipherSuite suite : enabledCipherSuites.collection()) {
@@ -614,7 +614,7 @@ abstract class Handshaker {
*/
ProtocolList getActiveProtocols() {
if (activeProtocols == null) {
- ArrayList<ProtocolVersion> protocols = new ArrayList<>(4);
+ ArrayList<ProtocolVersion> protocols = new ArrayList<ProtocolVersion>(4);
for (ProtocolVersion protocol : enabledProtocols.collection()) {
boolean found = false;
for (CipherSuite suite : enabledCipherSuites.collection()) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/HelloExtensions.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/HelloExtensions.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/HelloExtensions.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/HelloExtensions.java 2011-07-29 14:27:07.795531127 -0400
@@ -169,7 +169,7 @@ final class ExtensionType {
return name;
}
- static List<ExtensionType> knownExtensions = new ArrayList<>(9);
+ static List<ExtensionType> knownExtensions = new ArrayList<ExtensionType>(9);
static ExtensionType get(int id) {
for (ExtensionType ext : knownExtensions) {
@@ -673,7 +673,7 @@ final class SupportedEllipticPointFormat
}
public String toString() {
- List<String> list = new ArrayList<>();
+ List<String> list = new ArrayList<String>();
for (byte format : formats) {
list.add(toString(format));
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/ProtocolList.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/ProtocolList.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/ProtocolList.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/ProtocolList.java 2011-07-29 14:27:07.795531127 -0400
@@ -79,7 +79,7 @@ final class ProtocolList {
throw new IllegalArgumentException("Protocols may not be null");
}
- ArrayList<ProtocolVersion> versions = new ArrayList<>(3);
+ ArrayList<ProtocolVersion> versions = new ArrayList<ProtocolVersion>(3);
for (int i = 0; i < names.length; i++ ) {
ProtocolVersion version = ProtocolVersion.valueOf(names[i]);
if (versions.contains(version) == false) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java 2011-07-29 14:27:07.795531127 -0400
@@ -153,7 +153,7 @@ final class SignatureAndHashAlgorithm {
static Collection<SignatureAndHashAlgorithm>
getSupportedAlgorithms(AlgorithmConstraints constraints) {
- Collection<SignatureAndHashAlgorithm> supported = new ArrayList<>();
+ Collection<SignatureAndHashAlgorithm> supported = new ArrayList<SignatureAndHashAlgorithm>();
synchronized (priorityMap) {
for (SignatureAndHashAlgorithm sigAlg : priorityMap.values()) {
if (sigAlg.priority <= SUPPORTED_ALG_PRIORITY_MAX_NUM &&
@@ -170,7 +170,7 @@ final class SignatureAndHashAlgorithm {
// Get supported algorithm collection from an untrusted collection
static Collection<SignatureAndHashAlgorithm> getSupportedAlgorithms(
Collection<SignatureAndHashAlgorithm> algorithms ) {
- Collection<SignatureAndHashAlgorithm> supported = new ArrayList<>();
+ Collection<SignatureAndHashAlgorithm> supported = new ArrayList<SignatureAndHashAlgorithm>();
for (SignatureAndHashAlgorithm sigAlg : algorithms) {
if (sigAlg.priority <= SUPPORTED_ALG_PRIORITY_MAX_NUM) {
supported.add(sigAlg);
@@ -182,7 +182,7 @@ final class SignatureAndHashAlgorithm {
static String[] getAlgorithmNames(
Collection<SignatureAndHashAlgorithm> algorithms) {
- ArrayList<String> algorithmNames = new ArrayList<>();
+ ArrayList<String> algorithmNames = new ArrayList<String>();
if (algorithms != null) {
for (SignatureAndHashAlgorithm sigAlg : algorithms) {
algorithmNames.add(sigAlg.algorithm);
@@ -195,7 +195,7 @@ final class SignatureAndHashAlgorithm {
static Set<String> getHashAlgorithmNames(
Collection<SignatureAndHashAlgorithm> algorithms) {
- Set<String> algorithmNames = new HashSet<>();
+ Set<String> algorithmNames = new HashSet<String>();
if (algorithms != null) {
for (SignatureAndHashAlgorithm sigAlg : algorithms) {
if (sigAlg.hash.value > 0) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java 2011-07-29 14:27:07.795531127 -0400
@@ -261,7 +261,7 @@ final class SSLAlgorithmConstraints impl
protected Set<String> decomposes(KeyExchange keyExchange,
boolean forCertPathOnly) {
- Set<String> components = new HashSet<>();
+ Set<String> components = new HashSet<String>();
switch (keyExchange) {
case K_NULL:
if (!forCertPathOnly) {
@@ -356,7 +356,7 @@ final class SSLAlgorithmConstraints impl
}
protected Set<String> decomposes(BulkCipher bulkCipher) {
- Set<String> components = new HashSet<>();
+ Set<String> components = new HashSet<String>();
if (bulkCipher.transformation != null) {
components.addAll(super.decomposes(bulkCipher.transformation));
@@ -366,7 +366,7 @@ final class SSLAlgorithmConstraints impl
}
protected Set<String> decomposes(MacAlg macAlg) {
- Set<String> components = new HashSet<>();
+ Set<String> components = new HashSet<String>();
if (macAlg == CipherSuite.M_MD5) {
components.add("MD5");
@@ -407,7 +407,7 @@ final class SSLAlgorithmConstraints impl
}
if (cipherSuite != null) {
- Set<String> components = new HashSet<>();
+ Set<String> components = new HashSet<String>();
if(cipherSuite.keyExchange != null) {
components.addAll(
@@ -448,7 +448,7 @@ final class SSLAlgorithmConstraints impl
}
if (cipherSuite != null) {
- Set<String> components = new HashSet<>();
+ Set<String> components = new HashSet<String>();
if(cipherSuite.keyExchange != null) {
components.addAll(
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLContextImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLContextImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLContextImpl.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLContextImpl.java 2011-07-29 14:27:07.795531127 -0400
@@ -325,7 +325,7 @@ public abstract class SSLContextImpl ext
Collection<CipherSuite> allowedCipherSuites =
CipherSuite.allowedCipherSuites();
- ArrayList<CipherSuite> suites = new ArrayList<>();
+ ArrayList<CipherSuite> suites = new ArrayList<CipherSuite>();
if (!(protocols.collection().isEmpty()) &&
protocols.min.v != ProtocolVersion.NONE.v) {
for (CipherSuite suite : allowedCipherSuites) {
@@ -532,7 +532,7 @@ public abstract class SSLContextImpl ext
return defaultKeyManagers;
}
- final Map<String,String> props = new HashMap<>();
+ final Map<String,String> props = new HashMap<String,String>();
AccessController.doPrivileged(
new PrivilegedExceptionAction<Object>() {
public Object run() throws Exception {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLSessionImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLSessionImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLSessionImpl.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/SSLSessionImpl.java 2011-07-29 14:27:07.795531127 -0400
@@ -618,7 +618,7 @@ final class SSLSessionImpl extends Exten
* key and the calling security context. This is important since
* sessions can be shared across different protection domains.
*/
- private Hashtable<SecureKey, Object> table = new Hashtable<>();
+ private Hashtable<SecureKey, Object> table = new Hashtable<SecureKey, Object>();
/**
* Assigns a session value. Session change events are given if
@@ -686,7 +686,7 @@ final class SSLSessionImpl extends Exten
*/
public String[] getValueNames() {
Enumeration<SecureKey> e;
- Vector<Object> v = new Vector<>();
+ Vector<Object> v = new Vector<Object>();
SecureKey key;
Object securityCtx = SecureKey.getCurrentSecurityContext();
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java 2011-07-29 14:27:07.795531127 -0400
@@ -337,7 +337,7 @@ final class SunX509KeyManagerImpl extend
X500Principal[] x500Issuers = (X500Principal[])issuers;
// the algorithm below does not produce duplicates, so avoid Set
- List<String> aliases = new ArrayList<>();
+ List<String> aliases = new ArrayList<String>();
for (Map.Entry<String,X509Credentials> entry :
credentialsMap.entrySet()) {
@@ -397,7 +397,7 @@ final class SunX509KeyManagerImpl extend
* possible. Principals that cannot be converted are ignored.
*/
private static X500Principal[] convertPrincipals(Principal[] principals) {
- List<X500Principal> list = new ArrayList<>(principals.length);
+ List<X500Principal> list = new ArrayList<X500Principal>(principals.length);
for (int i = 0; i < principals.length; i++) {
Principal p = principals[i];
if (p instanceof X500Principal) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java 2011-07-29 14:27:07.795531127 -0400
@@ -134,7 +134,7 @@ abstract class TrustManagerFactoryImpl e
FileInputStream fis = null;
String defaultTrustStoreType;
String defaultTrustStoreProvider;
- final HashMap<String,String> props = new HashMap<>();
+ final HashMap<String,String> props = new HashMap<String,String>();
final String sep = File.separator;
KeyStore ks = null;
diff -up openjdk-boot/jdk/src/share/classes/sun/security/ssl/X509KeyManagerImpl.java.sav openjdk-boot/jdk/src/share/classes/sun/security/ssl/X509KeyManagerImpl.java
--- openjdk-boot/jdk/src/share/classes/sun/security/ssl/X509KeyManagerImpl.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/ssl/X509KeyManagerImpl.java 2011-07-29 14:27:07.796531112 -0400
@@ -307,7 +307,7 @@ final class X509KeyManagerImpl extends X
(keyTypes.length == 0) || (keyTypes[0] == null)) {
return null;
}
- List<KeyType> list = new ArrayList<>(keyTypes.length);
+ List<KeyType> list = new ArrayList<KeyType>(keyTypes.length);
for (String keyType : keyTypes) {
list.add(new KeyType(keyType));
}
@@ -429,7 +429,7 @@ final class X509KeyManagerImpl extends X
// make a Set out of the array
private Set<Principal> getIssuerSet(Principal[] issuers) {
if ((issuers != null) && (issuers.length != 0)) {
- return new HashSet<>(Arrays.asList(issuers));
+ return new HashSet<Principal>(Arrays.asList(issuers));
} else {
return null;
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/tools/JarSigner.java.sav openjdk-boot/jdk/src/share/classes/sun/security/tools/JarSigner.java
--- openjdk-boot/jdk/src/share/classes/sun/security/tools/JarSigner.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/tools/JarSigner.java 2011-07-29 14:27:07.796531112 -0400
@@ -123,14 +123,14 @@ public class JarSigner {
boolean token = false; // token-based keystore
String jarfile; // jar files to sign or verify
String alias; // alias to sign jar with
- List<String> ckaliases = new ArrayList<>(); // aliases in -verify
+ List<String> ckaliases = new ArrayList<String>(); // aliases in -verify
char[] storepass; // keystore password
boolean protectedPath; // protected authentication path
String storetype; // keystore type
String providerName; // provider name
Vector<String> providers = null; // list of providers
// arguments for provider constructors
- HashMap<String,String> providerArgs = new HashMap<>();
+ HashMap<String,String> providerArgs = new HashMap<String,String>();
char[] keypass; // private key password
String sigfile; // name of .SF file
String sigalg; // name of signature algorithm
@@ -567,7 +567,7 @@ public class JarSigner {
try {
jf = new JarFile(jarName, true);
- Vector<JarEntry> entriesVec = new Vector<>();
+ Vector<JarEntry> entriesVec = new Vector<JarEntry>();
byte[] buffer = new byte[8192];
Enumeration<JarEntry> entries = jf.entries();
@@ -594,7 +594,7 @@ public class JarSigner {
// The map to record display info, only used when -verbose provided
// key: signer info string
// value: the list of files with common key
- Map<String,List<String>> output = new LinkedHashMap<>();
+ Map<String,List<String>> output = new LinkedHashMap<String,List<String>>();
if (man != null) {
if (verbose != null) System.out.println();
@@ -946,7 +946,7 @@ public class JarSigner {
.append(signTimeForm.format(source)).append("]").toString();
}
- private Map<CodeSigner,Integer> cacheForInKS = new IdentityHashMap<>();
+ private Map<CodeSigner,Integer> cacheForInKS = new IdentityHashMap<CodeSigner,Integer>();
private int inKeyStoreForOneSigner(CodeSigner signer) {
if (cacheForInKS.containsKey(signer)) {
@@ -989,7 +989,7 @@ public class JarSigner {
return result;
}
- Hashtable<Certificate, String> storeHash = new Hashtable<>();
+ Hashtable<Certificate, String> storeHash = new Hashtable<Certificate,String>();
int inKeyStore(CodeSigner[] signers) {
@@ -1119,7 +1119,7 @@ public class JarSigner {
* generated one. (This may invalidate existing signatures!)
*/
BASE64Encoder encoder = new JarBASE64Encoder();
- Vector<ZipEntry> mfFiles = new Vector<>();
+ Vector<ZipEntry> mfFiles = new Vector<ZipEntry>();
boolean wasSigned = false;
@@ -1476,7 +1476,7 @@ public class JarSigner {
return false;
}
- Map<CodeSigner,String> cacheForSignerInfo = new IdentityHashMap<>();
+ Map<CodeSigner,String> cacheForSignerInfo = new IdentityHashMap<CodeSigner,String>();
/**
* Returns a string of singer info, with a newline at the end
@@ -1600,7 +1600,7 @@ public class JarSigner {
}
}
}
- Set<TrustAnchor> tas = new HashSet<>();
+ Set<TrustAnchor> tas = new HashSet<TrustAnchor>();
try {
KeyStore caks = KeyTool.getCacertsKeyStore();
if (caks != null) {
diff -up openjdk-boot/jdk/src/share/classes/sun/security/tools/KeyTool.java.sav openjdk-boot/jdk/src/share/classes/sun/security/tools/KeyTool.java
--- openjdk-boot/jdk/src/share/classes/sun/security/tools/KeyTool.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/tools/KeyTool.java 2011-07-29 14:27:07.796531112 -0400
@@ -152,11 +152,11 @@ public final class KeyTool {
private KeyStore caks = null; // "cacerts" keystore
private char[] srcstorePass = null;
private String srcstoretype = null;
- private Set<char[]> passwords = new HashSet<>();
+ private Set<char[]> passwords = new HashSet<char[]>();
private String startDate = null;
- private List<String> ids = new ArrayList<>(); // used in GENCRL
- private List<String> v3ext = new ArrayList<>();
+ private List<String> ids = new ArrayList<String>(); // used in GENCRL
+ private List<String> v3ext = new ArrayList<String>();
enum Command {
CERTREQ("Generates.a.certificate.request",
@@ -2089,7 +2089,7 @@ public final class KeyTool {
*/
public static List<CRL> readCRLsFromCert(X509Certificate cert)
throws Exception {
- List<CRL> crls = new ArrayList<>();
+ List<CRL> crls = new ArrayList<CRL>();
CRLDistributionPointsExtension ext =
X509CertImpl.toImpl(cert).getCRLDistributionPointsExtension();
if (ext == null) return crls;
@@ -2256,7 +2256,7 @@ public final class KeyTool {
if (jarfile != null) {
JarFile jf = new JarFile(jarfile, true);
Enumeration<JarEntry> entries = jf.entries();
- Set<CodeSigner> ss = new HashSet<>();
+ Set<CodeSigner> ss = new HashSet<CodeSigner>();
byte[] buffer = new byte[8192];
int pos = 0;
while (entries.hasMoreElements()) {
@@ -3331,7 +3331,7 @@ public final class KeyTool {
}
// start building chain
- Vector<Certificate> chain = new Vector<>(2);
+ Vector<Certificate> chain = new Vector<Certificate>(2);
if (buildChain((X509Certificate)certToVerify, chain, certs)) {
Certificate[] newChain = new Certificate[chain.size()];
// buildChain() returns chain with self-signed root-cert first and
@@ -3857,7 +3857,7 @@ public final class KeyTool {
break;
case 2: // EKU
if(value != null) {
- Vector<ObjectIdentifier> v = new Vector<>();
+ Vector<ObjectIdentifier> v = new Vector<ObjectIdentifier>();
for (String s: value.split(",")) {
int p = oneOf(s,
"anyExtendedKeyUsage",
@@ -3927,7 +3927,7 @@ public final class KeyTool {
}
if(value != null) {
List<AccessDescription> accessDescriptions =
- new ArrayList<>();
+ new ArrayList<AccessDescription>();
String[] ps = value.split(",");
for(String item: ps) {
colonpos = item.indexOf(':');
@@ -4211,7 +4211,7 @@ class Pair<A, B> {
}
public static <A,B> Pair<A,B> of(A a, B b) {
- return new Pair<>(a,b);
+ return new Pair<A,B>(a,b);
}
}
diff -up openjdk-boot/jdk/src/share/classes/sun/security/tools/policytool/PolicyTool.java.sav openjdk-boot/jdk/src/share/classes/sun/security/tools/policytool/PolicyTool.java
--- openjdk-boot/jdk/src/share/classes/sun/security/tools/policytool/PolicyTool.java.sav 2011-07-29 12:21:29.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/security/tools/policytool/PolicyTool.java 2011-07-29 14:27:07.797531097 -0400
@@ -643,7 +643,7 @@ public class PolicyTool {
Class<?> pc = Class.forName(type, true,
Thread.currentThread().getContextClassLoader());
Constructor<?> c = null;
- Vector<String> objects = new Vector<>(2);
+ Vector<String> objects = new Vector<String>(2);
if (name != null) objects.add(name);
if (actions != null) objects.add(actions);
switch (objects.size()) {
@@ -1722,7 +1722,7 @@ class ToolDialog extends Dialog {
new PolicyParser.GrantEntry(signedby, codebase);
// get the new Principals
- LinkedList<PolicyParser.PrincipalEntry> prins = new LinkedList<>();
+ LinkedList<PolicyParser.PrincipalEntry> prins = new LinkedList<PolicyParser.PrincipalEntry>();
TaggedList prinList = (TaggedList)getComponent(PE_PRIN_LIST);
for (int i = 0; i < prinList.getItemCount(); i++) {
prins.add((PolicyParser.PrincipalEntry)prinList.getObject(i));
@@ -1730,7 +1730,7 @@ class ToolDialog extends Dialog {
ge.principals = prins;
// get the new Permissions
- Vector<PolicyParser.PermissionEntry> perms = new Vector<>();
+ Vector<PolicyParser.PermissionEntry> perms = new Vector<PolicyParser.PermissionEntry>();
TaggedList permList = (TaggedList)getComponent(PE_PERM_LIST);
for (int i = 0; i < permList.getItemCount(); i++) {
perms.addElement((PolicyParser.PermissionEntry)permList.getObject(i));
@@ -3647,7 +3647,7 @@ class NoDisplayException extends Runtime
* This is a java.awt.List that bind an Object to each String it holds.
*/
class TaggedList extends List {
- private java.util.List<Object> data = new LinkedList<>();
+ private java.util.List<Object> data = new LinkedList<Object>();
public TaggedList(int i, boolean b) {
super(i, b);
}
diff -up openjdk-boot/jdk/src/share/classes/sun/tools/native2ascii/Main.java.sav openjdk-boot/jdk/src/share/classes/sun/tools/native2ascii/Main.java
--- openjdk-boot/jdk/src/share/classes/sun/tools/native2ascii/Main.java.sav 2011-07-29 12:21:32.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/tools/native2ascii/Main.java 2011-07-29 14:27:07.797531097 -0400
@@ -94,7 +94,7 @@ public class Main {
* Run the converter
*/
public synchronized boolean convert(String argv[]){
- List<String> v = new ArrayList<>(2);
+ List<String> v = new ArrayList<String>(2);
File outputFile = null;
boolean createOutputFile = false;
diff -up openjdk-boot/jdk/src/share/classes/sun/util/locale/InternalLocaleBuilder.java.sav openjdk-boot/jdk/src/share/classes/sun/util/locale/InternalLocaleBuilder.java
--- openjdk-boot/jdk/src/share/classes/sun/util/locale/InternalLocaleBuilder.java.sav 2011-07-29 12:21:32.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/util/locale/InternalLocaleBuilder.java 2011-07-29 14:27:07.797531097 -0400
@@ -113,7 +113,7 @@ public final class InternalLocaleBuilder
}
// Use case insensitive string to prevent duplication
if (uattributes == null) {
- uattributes = new HashSet<>(4);
+ uattributes = new HashSet<CaseInsensitiveString>(4);
}
uattributes.add(new CaseInsensitiveString(attribute));
return this;
@@ -157,7 +157,7 @@ public final class InternalLocaleBuilder
}
}
if (ukeywords == null) {
- ukeywords = new HashMap<>(4);
+ ukeywords = new HashMap<CaseInsensitiveString,String>(4);
}
ukeywords.put(cikey, type);
}
@@ -211,7 +211,7 @@ public final class InternalLocaleBuilder
setUnicodeLocaleExtension(val);
} else {
if (extensions == null) {
- extensions = new HashMap<>(4);
+ extensions = new HashMap<CaseInsensitiveChar,String>(4);
}
extensions.put(key, val);
}
@@ -262,7 +262,7 @@ public final class InternalLocaleBuilder
}
if (extensions == null) {
- extensions = new ArrayList<>(4);
+ extensions = new ArrayList<String>(4);
}
extensions.add(sb.toString());
} else {
@@ -313,7 +313,7 @@ public final class InternalLocaleBuilder
clearExtensions();
if (!LocaleUtils.isEmpty(bcpExtensions)) {
- Set<CaseInsensitiveChar> done = new HashSet<>(bcpExtensions.size());
+ Set<CaseInsensitiveChar> done = new HashSet<CaseInsensitiveChar>(bcpExtensions.size());
for (String bcpExt : bcpExtensions) {
CaseInsensitiveChar key = new CaseInsensitiveChar(bcpExt);
// ignore duplicates
@@ -323,7 +323,7 @@ public final class InternalLocaleBuilder
setUnicodeLocaleExtension(bcpExt.substring(2));
} else {
if (extensions == null) {
- extensions = new HashMap<>(4);
+ extensions = new HashMap<CaseInsensitiveChar,String>(4);
}
extensions.put(key, bcpExt.substring(2));
}
@@ -334,7 +334,7 @@ public final class InternalLocaleBuilder
if (privateuse != null && privateuse.length() > 0) {
// privateuse string contains prefix, e.g. "x-abc-def"
if (extensions == null) {
- extensions = new HashMap<>(1);
+ extensions = new HashMap<CaseInsensitiveChar,String>(1);
}
extensions.put(new CaseInsensitiveChar(privateuse), privateuse.substring(2));
}
@@ -442,19 +442,19 @@ public final class InternalLocaleBuilder
UnicodeLocaleExtension ue = (UnicodeLocaleExtension)e;
for (String uatr : ue.getUnicodeLocaleAttributes()) {
if (uattributes == null) {
- uattributes = new HashSet<>(4);
+ uattributes = new HashSet<CaseInsensitiveString>(4);
}
uattributes.add(new CaseInsensitiveString(uatr));
}
for (String ukey : ue.getUnicodeLocaleKeys()) {
if (ukeywords == null) {
- ukeywords = new HashMap<>(4);
+ ukeywords = new HashMap<CaseInsensitiveString,String>(4);
}
ukeywords.put(new CaseInsensitiveString(ukey), ue.getUnicodeLocaleType(ukey));
}
} else {
if (extensions == null) {
- extensions = new HashMap<>(4);
+ extensions = new HashMap<CaseInsensitiveChar,String>(4);
}
extensions.put(new CaseInsensitiveChar(key), e.getValue());
}
@@ -604,7 +604,7 @@ public final class InternalLocaleBuilder
break;
}
if (uattributes == null) {
- uattributes = new HashSet<>(4);
+ uattributes = new HashSet<CaseInsensitiveString>(4);
}
uattributes.add(new CaseInsensitiveString(itr.current()));
itr.next();
@@ -622,7 +622,7 @@ public final class InternalLocaleBuilder
assert(typeStart == -1 || typeEnd != -1);
type = (typeStart == -1) ? "" : subtags.substring(typeStart, typeEnd);
if (ukeywords == null) {
- ukeywords = new HashMap<>(4);
+ ukeywords = new HashMap<CaseInsensitiveString,String>(4);
}
ukeywords.put(key, type);
@@ -652,7 +652,7 @@ public final class InternalLocaleBuilder
assert(typeStart == -1 || typeEnd != -1);
type = (typeStart == -1) ? "" : subtags.substring(typeStart, typeEnd);
if (ukeywords == null) {
- ukeywords = new HashMap<>(4);
+ ukeywords = new HashMap<CaseInsensitiveString,String>(4);
}
ukeywords.put(key, type);
}
diff -up openjdk-boot/jdk/src/share/classes/sun/util/locale/LanguageTag.java.sav openjdk-boot/jdk/src/share/classes/sun/util/locale/LanguageTag.java
--- openjdk-boot/jdk/src/share/classes/sun/util/locale/LanguageTag.java.sav 2011-07-29 12:21:32.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/util/locale/LanguageTag.java 2011-07-29 14:27:07.797531097 -0400
@@ -62,7 +62,7 @@ public class LanguageTag {
// Map contains grandfathered tags and its preferred mappings from
// http://www.ietf.org/rfc/rfc5646.txt
// Keys are lower-case strings.
- private static final Map<String, String[]> GRANDFATHERED = new HashMap<>();
+ private static final Map<String, String[]> GRANDFATHERED = new HashMap<String,String[]>();
static {
// grandfathered = irregular ; non-redundant tags registered
@@ -257,7 +257,7 @@ public class LanguageTag {
}
found = true;
if (extlangs.isEmpty()) {
- extlangs = new ArrayList<>(3);
+ extlangs = new ArrayList<String>(3);
}
extlangs.add(s);
sts.parseLength = itr.currentEnd();
@@ -322,7 +322,7 @@ public class LanguageTag {
}
found = true;
if (variants.isEmpty()) {
- variants = new ArrayList<>(3);
+ variants = new ArrayList<String>(3);
}
variants.add(s);
sts.parseLength = itr.currentEnd();
@@ -365,7 +365,7 @@ public class LanguageTag {
}
if (extensions.isEmpty()) {
- extensions = new ArrayList<>(4);
+ extensions = new ArrayList<String>(4);
}
extensions.add(sb.toString());
found = true;
@@ -462,7 +462,7 @@ public class LanguageTag {
break;
}
if (variants == null) {
- variants = new ArrayList<>();
+ variants = new ArrayList<String>();
}
variants.add(var); // Do not canonicalize!
varitr.next();
@@ -503,7 +503,7 @@ public class LanguageTag {
privateuse = ext.getValue();
} else {
if (extensions == null) {
- extensions = new ArrayList<>();
+ extensions = new ArrayList<String>();
}
extensions.add(locextKey.toString() + SEP + ext.getValue());
}
diff -up openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleExtensions.java.sav openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleExtensions.java
--- openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleExtensions.java.sav 2011-07-29 12:21:32.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleExtensions.java 2011-07-29 14:27:07.797531097 -0400
@@ -81,7 +81,7 @@ public class LocaleExtensions {
}
// Build extension map
- SortedMap<Character, Extension> map = new TreeMap<>();
+ SortedMap<Character, Extension> map = new TreeMap<Character,Extension>();
if (hasExtension) {
for (Entry<CaseInsensitiveChar, String> ext : extensions.entrySet()) {
char key = LocaleUtils.toLower(ext.getKey().value());
@@ -104,14 +104,14 @@ public class LocaleExtensions {
SortedMap<String, String> ukmap = null;
if (hasUAttributes) {
- uaset = new TreeSet<>();
+ uaset = new TreeSet<String>();
for (CaseInsensitiveString cis : uattributes) {
uaset.add(LocaleUtils.toLowerString(cis.value()));
}
}
if (hasUKeywords) {
- ukmap = new TreeMap<>();
+ ukmap = new TreeMap<String,String>();
for (Entry<CaseInsensitiveString, String> kwd : ukeywords.entrySet()) {
String key = LocaleUtils.toLowerString(kwd.getKey().value());
String type = LocaleUtils.toLowerString(kwd.getValue());
diff -up openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleObjectCache.java.sav openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleObjectCache.java
--- openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleObjectCache.java.sav 2011-07-29 12:21:32.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/util/locale/LocaleObjectCache.java 2011-07-29 14:27:07.797531097 -0400
@@ -38,14 +38,14 @@ import java.util.concurrent.ConcurrentMa
public abstract class LocaleObjectCache<K, V> {
private ConcurrentMap<K, CacheEntry<K, V>> map;
- private ReferenceQueue<V> queue = new ReferenceQueue<>();
+ private ReferenceQueue<V> queue = new ReferenceQueue<V>();
public LocaleObjectCache() {
this(16, 0.75f, 16);
}
public LocaleObjectCache(int initialCapacity, float loadFactor, int concurrencyLevel) {
- map = new ConcurrentHashMap<>(initialCapacity, loadFactor, concurrencyLevel);
+ map = new ConcurrentHashMap<K, CacheEntry<K,V>>(initialCapacity, loadFactor, concurrencyLevel);
}
public V get(K key) {
@@ -64,7 +64,7 @@ public abstract class LocaleObjectCache<
return null;
}
- CacheEntry<K, V> newEntry = new CacheEntry<>(key, newVal, queue);
+ CacheEntry<K, V> newEntry = new CacheEntry<K,V>(key, newVal, queue);
while (value == null) {
cleanStaleEntries();
@@ -81,7 +81,7 @@ public abstract class LocaleObjectCache<
}
protected V put(K key, V value) {
- CacheEntry<K, V> entry = new CacheEntry<>(key, value, queue);
+ CacheEntry<K, V> entry = new CacheEntry<K,V>(key, value, queue);
CacheEntry<K, V> oldEntry = map.put(key, entry);
return (oldEntry == null) ? null : oldEntry.get();
}
diff -up openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java.sav openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java
--- openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java.sav 2011-07-29 12:21:32.000000000 -0400
+++ openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java 2011-07-29 14:27:07.797531097 -0400
@@ -113,7 +113,7 @@ public class PlatformLogger {
// Table of known loggers. Maps names to PlatformLoggers.
private static Map<String,WeakReference<PlatformLogger>> loggers =
- new HashMap<>();
+ new HashMap<String,WeakReference<PlatformLogger>>();
/**
* Returns a PlatformLogger of a given name.
@@ -126,7 +126,7 @@ public class PlatformLogger {
}
if (log == null) {
log = new PlatformLogger(name);
- loggers.put(name, new WeakReference<>(log));
+ loggers.put(name, new WeakReference<PlatformLogger>(log));
}
return log;
}
@@ -469,7 +469,7 @@ public class PlatformLogger {
*/
static class JavaLogger extends LoggerProxy {
private static final Map<Integer, Object> levelObjects =
- new HashMap<>();
+ new HashMap<Integer, Object>();
static {
if (LoggingSupport.isAvailable()) {
diff -up openjdk-boot/jdk/src/share/demo/nio/zipfs/Demo.java.sav openjdk-boot/jdk/src/share/demo/nio/zipfs/Demo.java
--- openjdk-boot/jdk/src/share/demo/nio/zipfs/Demo.java.sav 2011-07-29 12:21:35.000000000 -0400
+++ openjdk-boot/jdk/src/share/demo/nio/zipfs/Demo.java 2011-07-29 14:27:07.798531083 -0400
@@ -151,7 +151,7 @@ public class Demo {
}
Action action = Action.valueOf(args[0]);
- Map<String, Object> env = env = new HashMap<>();
+ Map<String, Object> env = env = new HashMap<String,Object>();
if (action == Action.create)
env.put("create", "true");
try (FileSystem fs = provider.newFileSystem(Paths.get(args[1]), env)) {
@@ -647,9 +647,9 @@ public class Demo {
private static void fchCopy(Path src, Path dst) throws IOException
{
- Set<OpenOption> read = new HashSet<>();
+ Set<OpenOption> read = new HashSet<OpenOption>();
read.add(READ);
- Set<OpenOption> openwrite = new HashSet<>();
+ Set<OpenOption> openwrite = new HashSet<OpenOption>();
openwrite.add(CREATE_NEW);
openwrite.add(WRITE);
@@ -667,9 +667,9 @@ public class Demo {
private static void chCopy(Path src, Path dst) throws IOException
{
- Set<OpenOption> read = new HashSet<>();
+ Set<OpenOption> read = new HashSet<OpenOption>();
read.add(READ);
- Set<OpenOption> openwrite = new HashSet<>();
+ Set<OpenOption> openwrite = new HashSet<OpenOption>();
openwrite.add(CREATE_NEW);
openwrite.add(WRITE);
diff -up openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipCoder.java.sav openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipCoder.java
--- openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipCoder.java.sav 2011-07-29 12:21:35.000000000 -0400
+++ openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipCoder.java 2011-07-29 14:27:07.798531083 -0400
@@ -133,8 +133,8 @@ final class ZipCoder {
return new ZipCoder(Charset.defaultCharset());
}
- private final ThreadLocal<CharsetDecoder> decTL = new ThreadLocal<>();
- private final ThreadLocal<CharsetEncoder> encTL = new ThreadLocal<>();
+ private final ThreadLocal<CharsetDecoder> decTL = new ThreadLocal<CharsetDecoder>();
+ private final ThreadLocal<CharsetEncoder> encTL = new ThreadLocal<CharsetEncoder>();r
private CharsetDecoder decoder() {
CharsetDecoder dec = decTL.get();
diff -up openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileAttributeView.java.sav openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileAttributeView.java
--- openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileAttributeView.java.sav 2011-07-29 12:21:35.000000000 -0400
+++ openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileAttributeView.java 2011-07-29 14:27:07.798531083 -0400
@@ -125,7 +125,7 @@ public class ZipFileAttributeView implem
throws IOException
{
ZipFileAttributes zfas = readAttributes();
- LinkedHashMap<String, Object> map = new LinkedHashMap<>();
+ LinkedHashMap<String, Object> map = new LinkedHashMap<String,Object>();
if ("*".equals(attributes)) {
for (AttrID id : AttrID.values()) {
try {
diff -up openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystem.java.sav openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystem.java
--- openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystem.java.sav 2011-07-29 12:21:35.000000000 -0400
+++ openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystem.java 2011-07-29 14:27:07.798531083 -0400
@@ -147,7 +147,7 @@ public class ZipFileSystem extends FileS
@Override
public Iterable<Path> getRootDirectories() {
- ArrayList<Path> pathArr = new ArrayList<>();
+ ArrayList<Path> pathArr = new ArrayList<Path>();
pathArr.add(new ZipPath(this, new byte[]{'/'}));
return pathArr;
}
@@ -192,7 +192,7 @@ public class ZipFileSystem extends FileS
@Override
public Iterable<FileStore> getFileStores() {
- ArrayList<FileStore> list = new ArrayList<>(1);
+ ArrayList<FileStore> list = new ArrayList<FileStore>(1);
list.add(new ZipFileStore(new ZipPath(this, new byte[]{'/'})));
return list;
}
@@ -258,7 +258,7 @@ public class ZipFileSystem extends FileS
endWrite();
}
if (!streams.isEmpty()) { // unlock and close all remaining streams
- Set<InputStream> copy = new HashSet<>(streams);
+ Set<InputStream> copy = new HashSet<InputStream>(streams);
for (InputStream is: copy)
is.close();
}
@@ -386,7 +386,7 @@ public class ZipFileSystem extends FileS
IndexNode inode = getInode(path);
if (inode == null)
throw new NotDirectoryException(getString(path));
- List<Path> list = new ArrayList<>();
+ List<Path> list = new ArrayList<Path>();
IndexNode child = inode.child;
while (child != null) {
ZipPath zp = toZipPath(child.name);
@@ -815,7 +815,7 @@ public class ZipFileSystem extends FileS
// the ex-channel and ex-path that need to close when their outstanding
// input streams are all closed by the obtainers.
- private Set<ExChannelCloser> exChClosers = new HashSet<>();
+ private Set<ExChannelCloser> exChClosers = new HashSet<ExChannelCloser>();
private Set<Path> tmppaths = Collections.synchronizedSet(new HashSet<Path>());
private Path getTempPathForEntry(byte[] path) throws IOException {
@@ -1012,7 +1012,7 @@ public class ZipFileSystem extends FileS
private byte[] initCEN() throws IOException {
end = findEND();
if (end.endpos == 0) {
- inodes = new LinkedHashMap<>(10);
+ inodes = new LinkedHashMap<IndexNode,IndexNode>(10);
locpos = 0;
buildNodeTree();
return null; // only END header present
@@ -1033,7 +1033,7 @@ public class ZipFileSystem extends FileS
zerror("read CEN tables failed");
}
// Iterate through the entries in the central directory
- inodes = new LinkedHashMap<>(end.centot + 1);
+ inodes = new LinkedHashMap<IndexNode,IndexNode>(end.centot + 1);
int pos = 0;
int limit = cen.length - ENDHDR;
while (pos < limit) {
@@ -1180,7 +1180,7 @@ public class ZipFileSystem extends FileS
return;
Path tmpFile = createTempFileInSameDirectoryAs(zfpath);
OutputStream os = Files.newOutputStream(tmpFile, WRITE);
- ArrayList<Entry> elist = new ArrayList<>(inodes.size());
+ ArrayList<Entry> elist = new ArrayList<Entry>(inodes.size());
long written = 0;
byte[] buf = new byte[8192];
Entry e = null;
@@ -1592,7 +1592,7 @@ public class ZipFileSystem extends FileS
// Maxmum number of de/inflater we cache
private final int MAX_FLATER = 20;
// List of available Inflater objects for decompression
- private final List<Inflater> inflaters = new ArrayList<>();
+ private final List<Inflater> inflaters = new ArrayList<Inflater>();
// Gets an inflater from the list of available inflaters or allocates
// a new one.
@@ -1621,7 +1621,7 @@ public class ZipFileSystem extends FileS
}
// List of available Deflater objects for compression
- private final List<Deflater> deflaters = new ArrayList<>();
+ private final List<Deflater> deflaters = new ArrayList<Deflater>();
// Gets an deflater from the list of available deflaters or allocates
// a new one.
@@ -2331,7 +2331,7 @@ public class ZipFileSystem extends FileS
private void buildNodeTree() throws IOException {
beginWrite();
try {
- HashSet<IndexNode> dirs = new HashSet<>();
+ HashSet<IndexNode> dirs = new HashSet<IndexNode>();
IndexNode root = new IndexNode(ROOTPATH, -1);
inodes.put(root, root);
dirs.add(root);
diff -up openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystemProvider.java.sav openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystemProvider.java
--- openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystemProvider.java.sav 2011-07-29 12:21:35.000000000 -0400
+++ openjdk-boot/jdk/src/share/demo/nio/zipfs/src/com/sun/nio/zipfs/ZipFileSystemProvider.java 2011-07-29 14:27:07.798531083 -0400
@@ -53,7 +53,7 @@ import java.util.concurrent.ExecutorServ
public class ZipFileSystemProvider extends FileSystemProvider {
- private final Map<Path, ZipFileSystem> filesystems = new HashMap<>();
+ private final Map<Path, ZipFileSystem> filesystems = new HashMap<Path,ZipFileSystem>();
public ZipFileSystemProvider() {}
diff -up openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java.sav openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java
--- openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java.sav 2011-07-29 12:21:39.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java 2011-07-29 14:27:07.798531083 -0400
@@ -68,7 +68,7 @@ final class ProcessEnvironment
// We cache the C environment. This means that subsequent calls
// to putenv/setenv from C will not be visible from Java code.
byte[][] environ = environ();
- theEnvironment = new HashMap<>(environ.length/2 + 3);
+ theEnvironment = new HashMap<Variable,Value>(environ.length/2 + 3);
// Read environment variables back to front,
// so that earlier variables override later ones.
for (int i = environ.length-1; i > 0; i-=2)
diff -up openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java.sav openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java
--- openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java.sav 2011-07-29 14:27:01.432625563 -0400
+++ openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java 2011-07-29 14:27:07.798531083 -0400
@@ -354,7 +354,7 @@ class FileSystemPreferences extends Abst
* log against that map. The resulting map is then written back
* to the disk.
*/
- final List<Change> changeLog = new ArrayList<>();
+ final List<Change> changeLog = new ArrayList<Change>();
/**
* Represents a change to a preference.
@@ -507,7 +507,7 @@ class FileSystemPreferences extends Abst
});
if (newNode) {
// These 2 things guarantee node will get wrtten at next flush/sync
- prefsCache = new TreeMap<>();
+ prefsCache = new TreeMap<String, String>();
nodeCreate = new NodeCreate();
changeLog.add(nodeCreate);
}
@@ -550,7 +550,7 @@ class FileSystemPreferences extends Abst
loadCache();
} catch(Exception e) {
// assert lastSyncTime == 0;
- prefsCache = new TreeMap<>();
+ prefsCache = new TreeMap<String, String>();
}
}
@@ -567,7 +567,7 @@ class FileSystemPreferences extends Abst
AccessController.doPrivileged(
new PrivilegedExceptionAction<Void>() {
public Void run() throws BackingStoreException {
- Map<String, String> m = new TreeMap<>();
+ Map<String, String> m = new TreeMap<String, String>();
long newLastSyncTime = 0;
FileInputStream fis = null;
try {
@@ -581,7 +581,7 @@ class FileSystemPreferences extends Abst
prefsFile.renameTo( new File(
prefsFile.getParentFile(),
"IncorrectFormatPrefs.xml"));
- m = new TreeMap<>();
+ m = new TreeMap<String, String>();
} else if (e instanceof FileNotFoundException) {
getLogger().warning("Prefs file removed in background "
+ prefsFile.getPath());
@@ -662,7 +662,7 @@ class FileSystemPreferences extends Abst
return AccessController.doPrivileged(
new PrivilegedAction<String[]>() {
public String[] run() {
- List<String> result = new ArrayList<>();
+ List<String> result = new ArrayList<String>();
File[] dirContents = dir.listFiles();
if (dirContents != null) {
for (int i = 0; i < dirContents.length; i++)
@@ -810,7 +810,7 @@ class FileSystemPreferences extends Abst
} else if (lastSyncTime != 0 && !dir.exists()) {
// This node was removed in the background. Playback any changes
// against a virgin (empty) Map.
- prefsCache = new TreeMap<>();
+ prefsCache = new TreeMap<String, String>();
replayChanges();
}
if (!changeLog.isEmpty()) {
diff -up openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java.sav openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java
--- openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java.sav 2011-07-29 12:21:40.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java 2011-07-29 14:27:07.798531083 -0400
@@ -60,7 +60,7 @@ public class ResolverConfigurationImpl
int maxperkeyword,
int maxkeywords)
{
- LinkedList<String> ll = new LinkedList<>();
+ LinkedList<String> ll = new LinkedList<String>();
try {
BufferedReader in =
@@ -200,7 +200,7 @@ public class ResolverConfigurationImpl
// no local domain so try fallback (RPC) domain or
// hostname
- sl = new LinkedList<>();
+ sl = new LinkedList<String>();
String domain = fallbackDomain0();
if (domain != null && domain.length() > 0) {
sl.add(domain);
diff -up openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java.sav openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java
--- openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java.sav 2011-07-29 12:21:40.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java 2011-07-29 14:27:07.799531069 -0400
@@ -153,12 +153,12 @@ final class CompoundTextSupport {
static {
HashMap<ControlSequence, String> tSequenceToEncodingMap =
- new HashMap<>(33, 1.0f);
+ new HashMap<ControlSequence, String>(33, 1.0f);
HashMap<ControlSequence, Boolean> tHighBitsMap =
- new HashMap<>(31, 1.0f);
+ new HashMap<ControlSequence, Boolean>(31, 1.0f);
HashMap<String, ControlSequence> tEncodingToSequenceMap =
- new HashMap<>(21, 1.0f);
- ArrayList<String> tEncodings = new ArrayList<>(21);
+ new HashMap<String, ControlSequence>(21, 1.0f);
+ ArrayList<String> tEncodings = new ArrayList<String>(21);
if (!(isEncodingSupported("US-ASCII") &&
isEncodingSupported("ISO-8859-1")))
diff -up openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxFileSystem.java.sav openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxFileSystem.java
--- openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxFileSystem.java.sav 2011-07-29 12:21:40.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxFileSystem.java 2011-07-29 14:27:07.799531069 -0400
@@ -53,7 +53,7 @@ class LinuxFileSystem extends UnixFileSy
static final Set<String> supportedFileAttributeViews =
supportedFileAttributeViews();
private static Set<String> supportedFileAttributeViews() {
- Set<String> result = new HashSet<>();
+ Set<String> result = new HashSet<String>();
result.addAll(standardFileAttributeViews());
// additional Linux-specific views
result.add("dos");
@@ -76,7 +76,7 @@ class LinuxFileSystem extends UnixFileSy
* Returns object to iterate over the mount entries in the given fstab file.
*/
Iterable<UnixMountEntry> getMountEntries(String fstab) {
- ArrayList<UnixMountEntry> entries = new ArrayList<>();
+ ArrayList<UnixMountEntry> entries = new ArrayList<UnixMountEntry>();
try {
long fp = setmntent(fstab.getBytes(), "r".getBytes());
try {
diff -up openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxUserDefinedFileAttributeView.java.sav openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxUserDefinedFileAttributeView.java
--- openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxUserDefinedFileAttributeView.java.sav 2011-07-29 12:21:40.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/LinuxUserDefinedFileAttributeView.java 2011-07-29 14:27:07.799531069 -0400
@@ -63,7 +63,7 @@ class LinuxUserDefinedFileAttributeView
// Parses buffer as array of NULL-terminated C strings.
private List<String> asList(long address, int size) {
- List<String> list = new ArrayList<>();
+ List<String> list = new ArrayList<String>();
int start = 0;
int pos = 0;
while (pos < size) {
diff -up openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisAclFileAttributeView.java.sav openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisAclFileAttributeView.java
--- openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisAclFileAttributeView.java.sav 2011-07-29 12:21:40.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisAclFileAttributeView.java 2011-07-29 14:27:07.799531069 -0400
@@ -198,7 +198,7 @@ class SolarisAclFileAttributeView
* Decode the buffer, returning an ACL
*/
private static List<AclEntry> decode(long address, int n) {
- ArrayList<AclEntry> acl = new ArrayList<>(n);
+ ArrayList<AclEntry> acl = new ArrayList<AclEntry>(n);
for (int i=0; i<n; i++) {
long offset = address + i*SIZEOF_ACE_T;
diff -up openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisFileSystem.java.sav openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisFileSystem.java
--- openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisFileSystem.java.sav 2011-07-29 12:21:40.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisFileSystem.java 2011-07-29 14:27:07.799531069 -0400
@@ -76,7 +76,7 @@ class SolarisFileSystem extends UnixFile
static final Set<String> supportedFileAttributeViews =
supportedFileAttributeViews();
private static Set<String> supportedFileAttributeViews() {
- Set<String> result = new HashSet<>();
+ Set<String> result = new HashSet<String>();
result.addAll(standardFileAttributeViews());
// additional Solaris-specific views
result.add("acl");
@@ -101,7 +101,7 @@ class SolarisFileSystem extends UnixFile
*/
@Override
Iterable<UnixMountEntry> getMountEntries() {
- ArrayList<UnixMountEntry> entries = new ArrayList<>();
+ ArrayList<UnixMountEntry> entries = new ArrayList<UnixMountEntry>();
try {
UnixPath mnttab = new UnixPath(this, "/etc/mnttab");
long fp = fopen(mnttab, "r");
diff -up openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisUserDefinedFileAttributeView.java.sav openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisUserDefinedFileAttributeView.java
--- openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisUserDefinedFileAttributeView.java.sav 2011-07-29 12:21:40.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/SolarisUserDefinedFileAttributeView.java 2011-07-29 14:27:07.799531069 -0400
@@ -83,7 +83,7 @@ class SolarisUserDefinedFileAttributeVie
}
// read list of extended attributes
- List<String> list = new ArrayList<>();
+ List<String> list = new ArrayList<String>();
try {
byte[] name;
while ((name = readdir(dp)) != null) {
diff -up openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/UnixFileAttributes.java.sav openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/UnixFileAttributes.java
--- openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/UnixFileAttributes.java.sav 2011-07-29 12:21:41.000000000 -0400
+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/fs/UnixFileAttributes.java 2011-07-29 14:27:07.799531069 -0400
@@ -194,7 +194,7 @@ class UnixFileAttributes
@Override
public Set<PosixFilePermission> permissions() {
int bits = (st_mode & UnixConstants.S_IAMB);
- HashSet<PosixFilePermission> perms = new HashSet<>();
+ HashSet<PosixFilePermission> perms = new HashSet<PosixFilePermission>();
if ((bits & UnixConstants.S_IRUSR) > 0)
perms.add(PosixFilePermission.OWNER_READ);
diff -up openjdk-boot/jdk/src/windows/classes/java/lang/ProcessEnvironment.java.sav openjdk-boot/jdk/src/windows/classes/java/lang/ProcessEnvironment.java
--- openjdk-boot/jdk/src/windows/classes/java/lang/ProcessEnvironment.java.sav 2011-07-29 12:21:43.000000000 -0400
+++ openjdk-boot/jdk/src/windows/classes/java/lang/ProcessEnvironment.java 2011-07-29 14:27:07.799531069 -0400
@@ -250,7 +250,8 @@ final class ProcessEnvironment extends H
envblock.substring(eql+1,end));
}
- theCaseInsensitiveEnvironment = new TreeMap<>(nameComparator);
+ theCaseInsensitiveEnvironment
+ = new TreeMap<String,String>(nameComparator);
theCaseInsensitiveEnvironment.putAll(theEnvironment);
}
@@ -295,7 +296,8 @@ final class ProcessEnvironment extends H
// Only for use by ProcessImpl.start()
String toEnvironmentBlock() {
// Sort Unicode-case-insensitively by name
- List<Map.Entry<String,String>> list = new ArrayList<>(entrySet());
+ List<Map.Entry<String,String>> list
+ = new ArrayList<Map.Entry<String,String>>(entrySet());
Collections.sort(list, entryComparator);
StringBuilder sb = new StringBuilder(size()*30);
diff -up openjdk-boot/jdk/src/windows/classes/sun/net/dns/ResolverConfigurationImpl.java.sav openjdk-boot/jdk/src/windows/classes/sun/net/dns/ResolverConfigurationImpl.java
--- openjdk-boot/jdk/src/windows/classes/sun/net/dns/ResolverConfigurationImpl.java.sav 2011-07-29 12:21:43.000000000 -0400
+++ openjdk-boot/jdk/src/windows/classes/sun/net/dns/ResolverConfigurationImpl.java 2011-07-29 14:27:07.799531069 -0400
@@ -63,7 +63,7 @@ public class ResolverConfigurationImpl
// Parse string that consists of token delimited by space or commas
// and return LinkedHashMap
private LinkedList<String> stringToList(String str) {
- LinkedList<String> ll = new LinkedList<>();
+ LinkedList<String> ll = new LinkedList<String>();
// comma and space are valid delimites
StringTokenizer st = new StringTokenizer(str, ", ");
diff -up openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsFileSystem.java.sav openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsFileSystem.java
--- openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsFileSystem.java.sav 2011-07-29 12:21:43.000000000 -0400
+++ openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsFileSystem.java 2011-07-29 14:27:07.799531069 -0400
@@ -128,7 +128,7 @@ class WindowsFileSystem
}
// iterate over roots, ignoring those that the security manager denies
- ArrayList<Path> result = new ArrayList<>();
+ ArrayList<Path> result = new ArrayList<Path>();
SecurityManager sm = System.getSecurityManager();
for (int i = 0; i <= 25; i++) { // 0->A, 1->B, 2->C...
if ((drives & (1 << i)) != 0) {
diff -up openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsPath.java.sav openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsPath.java
--- openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsPath.java.sav 2011-07-29 12:21:43.000000000 -0400
+++ openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsPath.java 2011-07-29 14:27:07.799531069 -0400
@@ -575,7 +575,7 @@ class WindowsPath extends AbstractPath {
// generate offset array
private void initOffsets() {
if (offsets == null) {
- ArrayList<Integer> list = new ArrayList<>();
+ ArrayList<Integer> list = new ArrayList<Integer>();
if (isEmpty()) {
// empty path considered to have one name element
list.add(0);
diff -up openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsSecurityDescriptor.java.sav openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsSecurityDescriptor.java
--- openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsSecurityDescriptor.java.sav 2011-07-29 12:21:43.000000000 -0400
+++ openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsSecurityDescriptor.java 2011-07-29 14:27:07.800531055 -0400
@@ -378,7 +378,7 @@ class WindowsSecurityDescriptor {
AclInformation aclInfo = GetAclInformation(aclAddress);
aceCount = aclInfo.aceCount();
}
- ArrayList<AclEntry> result = new ArrayList<>(aceCount);
+ ArrayList<AclEntry> result = new ArrayList<AclEntry>(aceCount);
// decode each of the ACEs to AclEntry objects
for (int i=0; i<aceCount; i++) {
diff -up openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsUserDefinedFileAttributeView.java.sav openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsUserDefinedFileAttributeView.java
--- openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsUserDefinedFileAttributeView.java.sav 2011-07-29 12:21:43.000000000 -0400
+++ openjdk-boot/jdk/src/windows/classes/sun/nio/fs/WindowsUserDefinedFileAttributeView.java 2011-07-29 14:27:07.800531055 -0400
@@ -65,7 +65,7 @@ class WindowsUserDefinedFileAttributeVie
// enumerates the file streams using FindFirstStream/FindNextStream APIs.
private List<String> listUsingStreamEnumeration() throws IOException {
- List<String> list = new ArrayList<>();
+ List<String> list = new ArrayList<String>();
try {
FirstStream first = FindFirstStream(file.getPathForWin32Calls());
if (first != null) {
@@ -114,7 +114,7 @@ class WindowsUserDefinedFileAttributeVie
NativeBuffer buffer = null;
// result with names of alternative data streams
- final List<String> list = new ArrayList<>();
+ final List<String> list = new ArrayList<String>();
try {
buffer = NativeBuffers.getNativeBuffer(BUFFER_SIZE);
@@ -216,7 +216,7 @@ class WindowsUserDefinedFileAttributeVie
// wrap with channel
FileChannel fc = null;
try {
- Set<OpenOption> opts = new HashSet<>();
+ Set<OpenOption> opts = new HashSet<OpenOption>();
opts.add(READ);
if (!followLinks)
opts.add(WindowsChannelFactory.OPEN_REPARSE_POINT);
@@ -243,7 +243,7 @@ class WindowsUserDefinedFileAttributeVie
// wrap with channel
FileChannel fc = null;
try {
- Set<OpenOption> opts = new HashSet<>();
+ Set<OpenOption> opts = new HashSet<OpenOption>();
opts.add(READ);
if (!followLinks)
opts.add(WindowsChannelFactory.OPEN_REPARSE_POINT);
@@ -298,7 +298,7 @@ class WindowsUserDefinedFileAttributeVie
x.rethrowAsIOException(file);
}
try {
- Set<OpenOption> opts = new HashSet<>();
+ Set<OpenOption> opts = new HashSet<OpenOption>();
if (!followLinks)
opts.add(WindowsChannelFactory.OPEN_REPARSE_POINT);
opts.add(CREATE);
diff -up openjdk-boot/jdk/test/java/io/Serializable/NPEProvoker/NPEProvoker.java.sav openjdk-boot/jdk/test/java/io/Serializable/NPEProvoker/NPEProvoker.java
--- openjdk-boot/jdk/test/java/io/Serializable/NPEProvoker/NPEProvoker.java.sav 2011-07-29 12:21:50.000000000 -0400
+++ openjdk-boot/jdk/test/java/io/Serializable/NPEProvoker/NPEProvoker.java 2011-07-29 14:27:07.800531055 -0400
@@ -56,7 +56,7 @@ public class NPEProvoker implements java
public static void main(String[] args) {
System.err.println("\n Regression test for bug 6541870\n");
try {
- ArrayList<NPEProvoker> list = new ArrayList<>();
+ ArrayList<NPEProvoker> list = new ArrayList<NPEProvoker>();
list.add(new NPEProvoker());
ByteArrayOutputStream baos = new ByteArrayOutputStream();
ObjectOutputStream oos = new ObjectOutputStream(baos);
diff -up openjdk-boot/jdk/test/java/lang/instrument/ilib/InjectBytecodes.java.sav openjdk-boot/jdk/test/java/lang/instrument/ilib/InjectBytecodes.java
--- openjdk-boot/jdk/test/java/lang/instrument/ilib/InjectBytecodes.java.sav 2011-07-29 12:21:53.000000000 -0400
+++ openjdk-boot/jdk/test/java/lang/instrument/ilib/InjectBytecodes.java 2011-07-29 14:27:07.800531055 -0400
@@ -50,7 +50,7 @@ class InjectBytecodes implements Runtime
private final Injector[] after = new Injector[256];
private final String className;
private final String methodName;
- private final Map<Integer,byte[]> snippets = new HashMap<>();
+ private final Map<Integer,byte[]> snippets = new HashMap<Integer,byte[]>();
private int pos;
private int newPos;
diff -up openjdk-boot/jdk/test/java/lang/instrument/ilib/Inject.java.sav openjdk-boot/jdk/test/java/lang/instrument/ilib/Inject.java
--- openjdk-boot/jdk/test/java/lang/instrument/ilib/Inject.java.sav 2011-07-29 12:21:53.000000000 -0400
+++ openjdk-boot/jdk/test/java/lang/instrument/ilib/Inject.java 2011-07-29 14:27:07.800531055 -0400
@@ -107,7 +107,7 @@ public class Inject implements RuntimeCo
class IndexedInjector implements TrackerInjector {
int counter = 0;
int tracker;
- List<Info> infoList = new ArrayList<>();
+ List<Info> infoList = new ArrayList<Info>();
public int stackSize(int currentSize) {
return currentSize + 1;
diff -up openjdk-boot/jdk/test/java/lang/reflect/Generics/TestPlainArrayNotGeneric.java.sav openjdk-boot/jdk/test/java/lang/reflect/Generics/TestPlainArrayNotGeneric.java
--- openjdk-boot/jdk/test/java/lang/reflect/Generics/TestPlainArrayNotGeneric.java.sav 2011-07-29 12:21:53.000000000 -0400
+++ openjdk-boot/jdk/test/java/lang/reflect/Generics/TestPlainArrayNotGeneric.java 2011-07-29 14:27:07.800531055 -0400
@@ -103,7 +103,7 @@ public class TestPlainArrayNotGeneric {
}
}
- private static final Set<Type> checking = new HashSet<>();
+ private static final Set<Type> checking = new HashSet<Type>();
private static void check(Type t, String what) {
if (t == null || !checking.add(t))
diff -up openjdk-boot/jdk/test/java/util/logging/ClassLoaderLeakTest.java.sav openjdk-boot/jdk/test/java/util/logging/ClassLoaderLeakTest.java
--- openjdk-boot/jdk/test/java/util/logging/ClassLoaderLeakTest.java.sav 2011-07-29 12:21:59.000000000 -0400
+++ openjdk-boot/jdk/test/java/util/logging/ClassLoaderLeakTest.java 2011-07-29 14:27:07.800531055 -0400
@@ -89,7 +89,7 @@ public class ClassLoaderLeakTest {
MyClassLoader appClassLoader = new MyClassLoader(urls, "test0");
WeakReference<MyClassLoader> ref =
- new WeakReference<>(appClassLoader);
+ new WeakReference<MyClassLoader>(appClassLoader);
Thread appThread = new Thread(appsThreadGroup, launcher, "AppThread-0");
diff -up openjdk-boot/jdk/test/java/util/Random/DistinctSeeds.java.sav openjdk-boot/jdk/test/java/util/Random/DistinctSeeds.java
--- openjdk-boot/jdk/test/java/util/Random/DistinctSeeds.java.sav 2011-07-29 12:21:59.000000000 -0400
+++ openjdk-boot/jdk/test/java/util/Random/DistinctSeeds.java 2011-07-29 14:27:07.800531055 -0400
@@ -59,7 +59,7 @@ public class DistinctSeeds {
}
}
final int threadCount = 2;
- List<RandomCollector> collectors = new ArrayList<>();
+ List<RandomCollector> collectors = new ArrayList<RandomCollector>();
List<Thread> threads = new ArrayList<Thread>();
for (int i = 0; i < threadCount; i++) {
RandomCollector r = new RandomCollector();