mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 15:24:43 +02:00
8284780: Need methods to create pre-sized HashSet and LinkedHashSet
Reviewed-by: naoto, bpb, dfuchs, ascarpino
This commit is contained in:
parent
a941bc2de6
commit
e01cd7c3ed
29 changed files with 147 additions and 47 deletions
|
@ -278,7 +278,7 @@ public class HttpURLConnection extends java.net.HttpURLConnection {
|
|||
allowRestrictedHeaders = Boolean.parseBoolean(
|
||||
props.getProperty("sun.net.http.allowRestrictedHeaders"));
|
||||
if (!allowRestrictedHeaders) {
|
||||
restrictedHeaderSet = new HashSet<>(restrictedHeaders.length);
|
||||
restrictedHeaderSet = HashSet.newHashSet(restrictedHeaders.length);
|
||||
for (int i=0; i < restrictedHeaders.length; i++) {
|
||||
restrictedHeaderSet.add(restrictedHeaders[i].toLowerCase());
|
||||
}
|
||||
|
|
|
@ -230,7 +230,7 @@ abstract class AsynchronousServerSocketChannelImpl
|
|||
static final Set<SocketOption<?>> defaultOptions = defaultOptions();
|
||||
|
||||
private static Set<SocketOption<?>> defaultOptions() {
|
||||
HashSet<SocketOption<?>> set = new HashSet<>(2);
|
||||
HashSet<SocketOption<?>> set = HashSet.newHashSet(2);
|
||||
set.add(StandardSocketOptions.SO_RCVBUF);
|
||||
set.add(StandardSocketOptions.SO_REUSEADDR);
|
||||
if (Net.isReusePortAvailable()) {
|
||||
|
|
|
@ -503,7 +503,7 @@ abstract class AsynchronousSocketChannelImpl
|
|||
static final Set<SocketOption<?>> defaultOptions = defaultOptions();
|
||||
|
||||
private static Set<SocketOption<?>> defaultOptions() {
|
||||
HashSet<SocketOption<?>> set = new HashSet<>(5);
|
||||
HashSet<SocketOption<?>> set = HashSet.newHashSet(5);
|
||||
set.add(StandardSocketOptions.SO_SNDBUF);
|
||||
set.add(StandardSocketOptions.SO_RCVBUF);
|
||||
set.add(StandardSocketOptions.SO_KEEPALIVE);
|
||||
|
|
|
@ -105,7 +105,7 @@ abstract class AbstractPoller implements Runnable {
|
|||
// validate arguments before request to poller
|
||||
if (dir == null)
|
||||
throw new NullPointerException();
|
||||
Set<WatchEvent.Kind<?>> eventSet = new HashSet<>(events.length);
|
||||
Set<WatchEvent.Kind<?>> eventSet = HashSet.newHashSet(events.length);
|
||||
for (WatchEvent.Kind<?> event: events) {
|
||||
// standard events
|
||||
if (event == StandardWatchEventKinds.ENTRY_CREATE ||
|
||||
|
|
|
@ -95,7 +95,7 @@ class PollingWatchService
|
|||
throws IOException
|
||||
{
|
||||
// check events - CCE will be thrown if there are invalid elements
|
||||
final Set<WatchEvent.Kind<?>> eventSet = new HashSet<>(events.length);
|
||||
final Set<WatchEvent.Kind<?>> eventSet = HashSet.newHashSet(events.length);
|
||||
for (WatchEvent.Kind<?> event: events) {
|
||||
// standard events
|
||||
if (event == StandardWatchEventKinds.ENTRY_CREATE ||
|
||||
|
|
|
@ -514,7 +514,7 @@ public class PKCS7 {
|
|||
// CRLs (optional)
|
||||
if (crls != null && crls.length != 0) {
|
||||
// cast to X509CRLImpl[] since X509CRLImpl implements DerEncoder
|
||||
Set<X509CRLImpl> implCRLs = new HashSet<>(crls.length);
|
||||
Set<X509CRLImpl> implCRLs = HashSet.newHashSet(crls.length);
|
||||
for (X509CRL crl: crls) {
|
||||
if (crl instanceof X509CRLImpl)
|
||||
implCRLs.add((X509CRLImpl) crl);
|
||||
|
|
|
@ -92,7 +92,7 @@ class ConstraintsChecker extends PKIXCertPathChecker {
|
|||
@Override
|
||||
public Set<String> getSupportedExtensions() {
|
||||
if (supportedExts == null) {
|
||||
supportedExts = new HashSet<String>(2);
|
||||
supportedExts = HashSet.newHashSet(2);
|
||||
supportedExts.add(BasicConstraints_Id.toString());
|
||||
supportedExts.add(NameConstraints_Id.toString());
|
||||
supportedExts = Collections.unmodifiableSet(supportedExts);
|
||||
|
|
|
@ -81,8 +81,8 @@ final class ForwardBuilder extends Builder {
|
|||
|
||||
// populate sets of trusted certificates and subject DNs
|
||||
trustAnchors = buildParams.trustAnchors();
|
||||
trustedCerts = new HashSet<X509Certificate>(trustAnchors.size());
|
||||
trustedSubjectDNs = new HashSet<X500Principal>(trustAnchors.size());
|
||||
trustedCerts = HashSet.newHashSet(trustAnchors.size());
|
||||
trustedSubjectDNs = HashSet.newHashSet(trustAnchors.size());
|
||||
for (TrustAnchor anchor : trustAnchors) {
|
||||
X509Certificate trustedCert = anchor.getTrustedCert();
|
||||
if (trustedCert != null) {
|
||||
|
|
|
@ -85,7 +85,7 @@ class KeyChecker extends PKIXCertPathChecker {
|
|||
@Override
|
||||
public Set<String> getSupportedExtensions() {
|
||||
if (supportedExts == null) {
|
||||
supportedExts = new HashSet<String>(3);
|
||||
supportedExts = HashSet.newHashSet(3);
|
||||
supportedExts.add(KeyUsage_Id.toString());
|
||||
supportedExts.add(ExtendedKeyUsage_Id.toString());
|
||||
supportedExts.add(SubjectAlternativeName_Id.toString());
|
||||
|
|
|
@ -93,7 +93,7 @@ class PolicyChecker extends PKIXCertPathChecker {
|
|||
if (initialPolicies.isEmpty()) {
|
||||
// if no initialPolicies are specified by user, set
|
||||
// initPolicies to be anyPolicy by default
|
||||
this.initPolicies = new HashSet<String>(1);
|
||||
this.initPolicies = HashSet.newHashSet(1);
|
||||
this.initPolicies.add(ANY_POLICY);
|
||||
} else {
|
||||
this.initPolicies = new HashSet<String>(initialPolicies);
|
||||
|
@ -154,7 +154,7 @@ class PolicyChecker extends PKIXCertPathChecker {
|
|||
@Override
|
||||
public Set<String> getSupportedExtensions() {
|
||||
if (supportedExts == null) {
|
||||
supportedExts = new HashSet<String>(4);
|
||||
supportedExts = HashSet.newHashSet(4);
|
||||
supportedExts.add(CertificatePolicies_Id.toString());
|
||||
supportedExts.add(PolicyMappings_Id.toString());
|
||||
supportedExts.add(PolicyConstraints_Id.toString());
|
||||
|
|
|
@ -573,7 +573,7 @@ final class CertificateMessage {
|
|||
if ((subAltDnsName != null) && !subAltDnsName.isEmpty()) {
|
||||
if (subAltDnsNames == null) {
|
||||
subAltDnsNames =
|
||||
new HashSet<>(subjectAltNames.size());
|
||||
HashSet.newHashSet(subjectAltNames.size());
|
||||
}
|
||||
subAltDnsNames.add(subAltDnsName);
|
||||
}
|
||||
|
|
|
@ -110,7 +110,7 @@ final class SunX509KeyManagerImpl extends X509ExtendedKeyManager {
|
|||
// assert privateKey and certificates != null
|
||||
this.privateKey = privateKey;
|
||||
this.certificates = certificates;
|
||||
this.issuerX500Principals = new HashSet<>(certificates.length);
|
||||
this.issuerX500Principals = HashSet.newHashSet(certificates.length);
|
||||
for (X509Certificate certificate : certificates) {
|
||||
issuerX500Principals.add(certificate.getIssuerX500Principal());
|
||||
}
|
||||
|
|
|
@ -313,7 +313,7 @@ public final class InternalLocaleBuilder {
|
|||
clearExtensions();
|
||||
|
||||
if (!LocaleUtils.isEmpty(bcpExtensions)) {
|
||||
Set<CaseInsensitiveChar> done = new HashSet<>(bcpExtensions.size());
|
||||
Set<CaseInsensitiveChar> done = HashSet.newHashSet(bcpExtensions.size());
|
||||
for (String bcpExt : bcpExtensions) {
|
||||
CaseInsensitiveChar key = new CaseInsensitiveChar(bcpExt);
|
||||
// ignore duplicates
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue