[icedtea] Patch for OpenJDK7 b126 support

Dr Andrew John Hughes ahughes at redhat.com
Tue Jan 25 18:25:02 PST 2011


On 01:14 Wed 26 Jan     , Damien Raude-Morvan wrote:
> Hi Andrew,
> 
> Le mardi 25 janvier 2011 00:33:00, Dr Andrew John Hughes a écrit :
> > Have you actually got it building?  I haven't got the IcedTea forest
> > building independently yet and the last pull I did was b124.  What are you
> > using to get b126?
> [...]
> > * The changesets you move to don't appear to exist on my checkout of the
> > IcedTea forest.  What are these based on?
> 
> Yes, I've successfuly build a b126 Icedtea+OpenJDK using patch I've send 
> yesterday and using Debian toolkit for building [0] (ie. it just prepare 
> configure options and apply some more patches).
> 
> To get tarballs, I'm using OpenJDK7 forest [1] and a simple script to
> 1) obtain revision by parsing .hgtags and grep "b126"
> 2) wget ${JDK_URL}/${module}/archive/${rev}.tar.gz
> 3) compute sha256sum && update Makefile.am
> 
> [0] https://code.launchpad.net/~drazzib/openjdk/openjdk7
> [1] http://hg.openjdk.java.net/jdk7/jdk7
> 

We use http://hg.openjdk.java.net/icedtea/jdk7 as the basis for IcedTea7
as mentioned on http://icedtea.classpath.org/wiki/Main_Page

> > * Please don't bump CACAO in the same patch.  This should be done
> > separately to minimise change.
> 
> Of course, I'll prepare another patch.
> 
> > * Don't change the jaxp/jaxws/jaf URLs.  They are set to use IcedTea as the
> > Oracle servers have proved unreliable.  I'll update the IcedTea server
> > with these new ones. This is the first time I've seen them as I've been
> > busy with 6.
> 
> Ok, fine for me.
> 
> > * The other changes look par for the course.  You seem to be
> > dropping icedtea-ssl.patch with no explanation though.  Why is this?  It
> > looks like it possibly could be dropped.
> 
> Good catch, icedtea-ssl.patch is not needed anymore.
> Here is updated patch based on all your comments.
> 
> > Are you doing a full bootstrap with gcj?  I assume so from the ecj patch
> > additions.
> 
> Yes, I'm doing a full bootstrap with ecj-gcj... But I doesn't seems a viable 
> long term solution as more and more source code of OpenJDK is updated to 
> diamond operator and others Project Coin stuff... Is there support for Java 7 
> planned in ECJ roadmap ?
> 

I think it already does support some of it, but we build 1.6 classes not 1.7.
I think these additions to OpenJDK make it harder to bootstrap with no real
value, and seem especially odd given most of the codebase still lacks 1.5
features (try removing -nowarn and see how much ecj spews out during the build).

> Regards,
> -- 
> Damien

> diff -r e5b43d618ab5 -r 43fd56d0ce89 ChangeLog
> --- a/ChangeLog	Wed Jan 26 01:03:53 2011 +0100
> +++ b/ChangeLog	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,3 +1,46 @@
> +2011-01-26  Damien Raude-Morvan <drazzib at drazzib.com>
> +
> +  Bump to b126 openjdk7 drops.
> +  * Makefile.am:
> +  (OPENJDK_VERSION): Set to b126.
> +  (CORBA_CHANGESET): Updated.
> +  (HOTSPOT_CHANGESET): Likewise.
> +  (JAXP_CHANGESET): Likewise.
> +  (JAXWS_CHANGESET): Likewise.
> +  (JDK_CHANGESET): Likewise.
> +  (LANGTOOLS_CHANGESET): Likewise.
> +  (OPENJDK_CHANGESET): Likewise.
> +  (CORBA_SHA256SUM): Likewise.
> +  (HOTSPOT_SHA256SUM): Likewise.
> +  (JAXP_SHA256SUM): Likewise.
> +  (JAXWS_SHA256SUM): Likewise.
> +  (JDK_SHA256SUM): Likewise.
> +  (LANGTOOLS_SHA256SUM): Likewise.
> +  (OPENJDK_SHA256SUM): Likewise.
> +  (JAXWS_DROP_ZIP): Updated to 2.2.
> +  (JAXWS_DROP_SHA256SUM): Likewise.
> +  (JAXP_DROP_ZIP): Updated to 1.4.5-dev.
> +  (JAXP_DROP_SHA256SUM): Likewise.
> +  * patches/hotspot/default/icedtea-includedb.patch: Removed;
> +    includeDB completely dropped upstream.
> +  * patches/no-precompiled.patch: Removed; b126 now allow to set 
> +    "USE_PRECOMPILED_HEADER=0"
> +  * patches/icedtea-ssl.patch: Removed; don't need to cast anymore and
> +    conflict with TLS 1.2 support now present upstream.
> +  * generated/java/nio/DirectByteBuffer.java: fix call to super constructor
> +    (drop last parameter)
> +  * patches/icedtea-freetypeversion.patch, patches/icedtea-javafiles.patch,
> +    patches/icedtea-lc_ctype.patch, patches/icedtea-signed-types.patch,
> +    patches/boot/ant-javac.patch, patches/boot/demos.patch,
> +    patches/boot/fontconfig.patch, patches/boot/revert-6941137.patch,
> +    patches/boot/revert-6973616.patch, patches/boot/xbootclasspath.patch,
> +    patches/hotspot/default/icedtea-gcc-suffix.patch,
> +    patches/hotspot/default/icedtea-sparc-trapsfix.patch,
> +    patches/hotspot/default/icedtea-text-relocations.patch,
> +    : all refreshed
> +  * patches/boot/ecj-diamond.patch, patches/boot/ecj-stringswitch.patch:
> +    many parts of JDK now use diamond operator and string switch
> +
>  2011-01-26  Damien Raude-Morvan <drazzib at drazzib.com>
>  
>    Remove NetX and the IcedTea plugin (drop remaining bits from acinclude.m4
> diff -r e5b43d618ab5 -r 43fd56d0ce89 Makefile.am
> --- a/Makefile.am	Wed Jan 26 01:03:53 2011 +0100
> +++ b/Makefile.am	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,22 +1,22 @@
>  # Dependencies
>  
> -OPENJDK_VERSION = b117
> +OPENJDK_VERSION = b126
>  
> -CORBA_CHANGESET = 06146786b141
> -HOTSPOT_CHANGESET = 81685aa89446
> -JAXP_CHANGESET  = 43658f98c582
> -JAXWS_CHANGESET = f3444af18aff
> -JDK_CHANGESET = e7fc51780596
> -LANGTOOLS_CHANGESET = fdf1b74d3437
> -OPENJDK_CHANGESET = c94d1673451e
> +CORBA_CHANGESET = d7532bcd3742
> +HOTSPOT_CHANGESET = 4c851c931d00
> +JAXP_CHANGESET = 2fde639439c1
> +JAXWS_CHANGESET = 6d772c5119d5
> +JDK_CHANGESET = 8361ef97a0f9
> +LANGTOOLS_CHANGESET = 438a8ad60f7a
> +OPENJDK_CHANGESET = b566d4909056
>  
> -CORBA_SHA256SUM = 8d5a566e2d51d791d75f1ff25d5ae499317ec9391ed6bbc86eef483d15551d55
> -HOTSPOT_SHA256SUM = 7ca6831eb7505c21b8607c7cf8d12cb182fca21c3a40c4696db737d56d80e54b
> -JAXP_SHA256SUM = e0aa77b166b30d4d4052110956da831c59c43e22f8d6feeac62a06775bb083b6
> -JAXWS_SHA256SUM = ff4124f3765ac5ebac5ecfd0391cb2a54857d80ac7f967f60630ce0879cfd1f4
> -JDK_SHA256SUM = 0a01f5c43c8ef895addbc6c75adf4046d200c7a0d95d8056fa4f127a1b87feec
> -LANGTOOLS_SHA256SUM = d200c9bcf1c1805e0800a8cd8017e99ff6d12db14a1fcca8e9b67c59dc5ed448
> -OPENJDK_SHA256SUM = d7a3a531f0e064898e511f08f1127447b9171adce21ae4cecb3bca84b3f7b531
> +CORBA_SHA256SUM = ffaf9368d495dbfcbc0292c1ccd99b3c2137fa95708efc0938a03c4a20fb0f40
> +HOTSPOT_SHA256SUM = 2abfc0a8b7cd47f026ec0a28063150bd86db6807373509ee5a11c3010960bdaa
> +JAXP_SHA256SUM = 7bb23aab37af6e0e9d9d5d0312b9982a46fbf65adbe0d5ca398d84da444e30dc
> +JAXWS_SHA256SUM = 7dff2582a77bc4b76525e58feada7b86df9b2193a6bf53447b90b805483dea5a
> +JDK_SHA256SUM = 815533a7b09e0e8c02a64a6a97a6a7b8bab8a95389d7ad6db3dcc7ad3005103f
> +LANGTOOLS_SHA256SUM = 101b14691959b93e49844b95e5cb79622889b2fb7610090bb33fe037363bb3bc
> +OPENJDK_SHA256SUM = 1973623b462a97e3a5dc6820493785e5f205e7f01b88e56939c53092623b6436
>  
>  CACAO_VERSION = e321b101a9ee
>  CACAO_SHA256SUM = 46bc5b6212c199dc4a3dbebe6386fe15a8248625a5dffa17115aab394a298444
> @@ -25,14 +25,14 @@
>  CACAO_SRC_ZIP = cacao-$(CACAO_VERSION).tar.bz2
>  
>  JAXWS_DROP_URL = http://icedtea.classpath.org/download/drops
> -JAXWS_DROP_ZIP = jdk7-jaxws2_2-2010_08_19.zip
> -JAXWS_DROP_SHA256SUM = b8877aafbb15a348babcaee4ee372fb3e2ea0282f8fe93d306272fd24d7847de
> +JAXWS_DROP_ZIP = jdk7-jaxws2_2_2-2010_12_14.zip
> +JAXWS_DROP_SHA256SUM = ef3115dde8ed9a7129e65aab8b1499e11621e343559e6e5a8df9c4542848fb9b
>  JAF_DROP_URL = http://icedtea.classpath.org/download/drops
>  JAF_DROP_ZIP = jdk7-jaf-2010_08_19.zip
>  JAF_DROP_SHA256SUM = e6aefedfdbb4673e8019583d1344fb162b94e1b10382c362364dbbfd5889c09e
>  JAXP_DROP_URL = http://icedtea.classpath.org/download/drops
> -JAXP_DROP_ZIP = jaxp-1_4_4.zip
> -JAXP_DROP_SHA256SUM = 10b203bec5b7d3dd8f515a9e098f80abc316faf977bcc220b56efe3dc6e9e5e9
> +JAXP_DROP_ZIP = jaxp-1_4_5-dev.zip
> +JAXP_DROP_SHA256SUM = 938cce9d3f0afaa5d076c62a2de081862102d10bfe04a0767122f2dff5bd975e
>  
>  ICEDTEA_HG_URL = http://hg.openjdk.java.net/icedtea/jdk7
>  OPENJDK_HG_URL = http://hg.openjdk.java.net/jdk7/jdk7
> @@ -255,7 +255,6 @@
>  
>  ICEDTEA_PATCHES = \
>  	patches/hotspot/$(HSBUILD)/icedtea-text-relocations.patch \
> -	patches/icedtea-ssl.patch \
>  	patches/icedtea-rmi_amd64.patch \
>  	patches/icedtea-tools.patch \
>  	patches/icedtea-demos.patch \
> @@ -295,12 +294,10 @@
>          patches/security/icedtea-6592792.patch \
>          patches/security/icedtea-6733959.patch \
>          patches/security/icedtea-6755943.patch \
> -	patches/hotspot/$(HSBUILD)/icedtea-includedb.patch \
>  	patches/icedtea-demo-swingapplet.patch \
>  	patches/icedtea-jvmtiEnv.patch \
>  	patches/icedtea-disable-intree-ec.patch \
>  	patches/icedtea-sources.patch \
> -	patches/no-precompiled.patch \
>  	patches/parisc.patch \
>  	patches/sh4-support.patch \
>  	patches/jtreg-httpTest.patch \
> diff -r e5b43d618ab5 -r 43fd56d0ce89 generated/java/nio/DirectByteBuffer.java
> --- a/generated/java/nio/DirectByteBuffer.java	Wed Jan 26 01:03:53 2011 +0100
> +++ b/generated/java/nio/DirectByteBuffer.java	Wed Jan 26 01:12:41 2011 +0100
> @@ -114,7 +114,7 @@
>      //
>      DirectByteBuffer(int cap) {                   // package-private
>  
> -        super(-1, 0, cap, cap, false);
> +        super(-1, 0, cap, cap);
>          int ps = Bits.pageSize();
>          int size = cap + ps;
>          Bits.reserveMemory(size, cap);
> @@ -144,7 +144,7 @@
>      // Invoked only by JNI: NewDirectByteBuffer(void*, long)
>      //
>      private DirectByteBuffer(long addr, int cap) {
> -        super(-1, 0, cap, cap, false);
> +        super(-1, 0, cap, cap);
>          address = addr;
>          cleaner = null;
>      }
> @@ -155,7 +155,7 @@
>      //
>      protected DirectByteBuffer(int cap, long addr, Runnable unmapper) {
>  
> -        super(-1, 0, cap, cap, true);
> +        super(-1, 0, cap, cap);
>          address = addr;
>          viewedBuffer = null;
>          cleaner = Cleaner.create(this, unmapper);
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/ant-javac.patch
> --- a/patches/boot/ant-javac.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/ant-javac.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk-boot.orig/jaxp/build.xml openjdk-boot/jaxp/build.xml
> ---- openjdk-boot.orig/jaxp/build.xml	2009-12-04 15:29:13.000000000 +0000
> -+++ openjdk-boot/jaxp/build.xml	2009-12-14 22:57:23.000000000 +0000
> -@@ -122,7 +122,8 @@
> +--- openjdk-boot/jaxp/build.xml.orig
> ++++ openjdk-boot/jaxp/build.xml
> +@@ -131,7 +131,8 @@
>                memoryMaximumSize="${javac.memoryMaximumSize}"
>                source="${javac.source}"
>   	     debug="${javac.debug}"
> @@ -11,10 +10,9 @@
>               <compilerarg value="-J-Xbootclasspath/p:${javac.jar}"/>
>               <compilerarg line="${javac.version.opt} ${javac.lint.opts} ${javac.no.jdk.warnings}"/>
>               <src refid="src.dir.id"/>
> -diff -Nru openjdk-boot.orig/jaxws/build.xml openjdk-boot/jaxws/build.xml
> ---- openjdk-boot.orig/jaxws/build.xml	2009-12-04 15:35:01.000000000 +0000
> -+++ openjdk-boot/jaxws/build.xml	2009-12-14 22:57:41.000000000 +0000
> -@@ -122,7 +122,8 @@
> +--- openjdk-boot/jaxws/build.xml.orig
> ++++ openjdk-boot/jaxws/build.xml
> +@@ -131,7 +131,8 @@
>                memoryMaximumSize="${javac.memoryMaximumSize}"
>                source="${javac.source}"
>   	     debug="${javac.debug}"
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/demos.patch
> --- a/patches/boot/demos.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/demos.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -21,12 +21,12 @@
>  diff -Nru openjdk-boot.orig/jdk/make/Makefile openjdk-boot/jdk/make/Makefile
>  --- openjdk-boot.orig/jdk/make/Makefile	2010-04-28 22:05:26.000000000 +0100
>  +++ openjdk-boot/jdk/make/Makefile	2010-05-04 13:23:57.000000000 +0100
> -@@ -242,7 +242,7 @@
> +@@ -241,7 +241,7 @@
>   
>   SUBDIRS       = tools java javax sun com
>   SUBDIRS_tools = launchers
>  -SUBDIRS_misc  = org sunw jpda mkdemo mksample
>  +SUBDIRS_misc  = org sunw jpda mksample
>   
> - include $(BUILDDIR)/common/Subdirs.gmk
> - 
> + # Alternate classes implementation
> + ifndef OPENJDK
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/ecj-diamond.patch
> --- a/patches/boot/ecj-diamond.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/ecj-diamond.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -r 917976e88f76 src/share/classes/sun/nio/cs/AbstractCharsetProvider.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java	Mon Feb 22 15:16:55 2010 +0000
> -+++ openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java	Mon Feb 22 16:55:24 2010 +0000
> +--- openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java
>  @@ -49,22 +49,22 @@
>       /* Maps canonical names to class names
>        */
> @@ -37,9 +36,8 @@
>           }
>   
>           return new Iterator<Charset>() {
> -diff -r a9b4fde406d4 src/share/classes/sun/io/CharacterEncoding.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/io/CharacterEncoding.java	Thu Feb 18 13:31:46 2010 -0800
> -+++ openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java	Wed Feb 24 11:10:05 2010 +0000
> +--- openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java
>  @@ -54,7 +54,7 @@
>       private static volatile boolean installedAll;
>   
> @@ -49,9 +47,8 @@
>   
>           aliasTable.put("us-ascii",              "ASCII");
>           aliasTable.put("ascii",                 "ASCII");
> -diff -r c1cee45daf4d src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java	Wed Apr 28 22:15:05 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java	Tue May 04 18:21:07 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java
>  @@ -111,7 +111,7 @@
>        * at the same time, then all but the first will block until
>        * the first completes its authentication.
> @@ -61,9 +58,8 @@
>   
>       /* check if a request for this destination is in progress
>        * return false immediately if not. Otherwise block until
> -diff -r c1cee45daf4d src/share/classes/sun/security/provider/JavaKeyStore.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java	Wed Apr 28 22:15:05 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java	Wed May 05 11:35:35 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java
>  @@ -683,7 +683,7 @@
>                       // Read the certificate chain
>                       int numOfCerts = dis.readInt();
> @@ -73,9 +69,8 @@
>                                   numOfCerts > 10 ? 10 : numOfCerts);
>                           for (int j = 0; j < numOfCerts; j++) {
>                               if (xVersion == 2) {
> -diff -Nru openjdk-boot.orig/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java
> ---- openjdk-boot.orig/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java	2010-09-01 22:07:18.059282202 +0100
> -+++ openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java	2010-09-01 22:07:50.032515630 +0100
> +--- openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java
>  @@ -60,7 +60,7 @@
>                                             int maxperkeyword,
>                                             int maxkeywords)
> @@ -94,9 +89,8 @@
>           String domain = fallbackDomain0();
>           if (domain != null && domain.length() > 0) {
>               sl.add(domain);
> -diff -r a094068f4c7b src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java	Fri Aug 27 19:01:53 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java	Mon Sep 06 17:03:29 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java
>  @@ -52,7 +52,7 @@
>   
>       // Per-thread soft cache of the last temporary context
> @@ -124,9 +118,8 @@
>           Attributes attrs;
>   
>           // do the query
> -diff -r a094068f4c7b src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java
> ---- openjdk-boot.orig/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java	Fri Aug 27 19:01:53 2010 +0100
> -+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java	Mon Sep 06 18:44:51 2010 +0100
> +--- openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java
>  @@ -153,12 +153,12 @@
>   
>       static {
> @@ -144,10 +137,9 @@
>   
>           if (!(isEncodingSupported("US-ASCII") &&
>                 isEncodingSupported("ISO-8859-1")))
> -diff -r a094068f4c7b src/share/classes/com/sun/jndi/dns/DnsContextFactory.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java	Fri Aug 27 19:01:53 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java	Mon Sep 06 18:50:12 2010 +0100
> -@@ -132,7 +132,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java
> +@@ -135,7 +135,7 @@
>               throw new ConfigurationException("DNS pseudo-URL required");
>           }
>   
> @@ -156,23 +148,22 @@
>   
>           for (int i = 0; i < urls.length; i++) {
>               String server = urls[i].getHost();
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Attribute.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java	Wed Sep 15 00:00:17 2010 +0100
> -@@ -96,9 +96,9 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java
> +@@ -104,9 +104,9 @@
> +         return this.def.compareTo(that.def);
>       }
>   
> -     private static final byte[] noBytes = {};
>  -    private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<>();
>  -    private static final Map<Layout, Attribute> attributes = new HashMap<>();
>  -    private static final Map<Layout, Attribute> standardDefs = new HashMap<>();
> -+    private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<List<Attribute>,List<Attribute>>();
> ++    private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<List<Attribute>, List<Attribute>>();
>  +    private static final Map<Layout, Attribute> attributes = new HashMap<Layout, Attribute>();
>  +    private static final Map<Layout, Attribute> standardDefs = new HashMap<Layout, Attribute>();
>   
>       // Canonicalized lists of trivial attrs (Deprecated, etc.)
>       // are used by trimToSize, in order to reduce footprint
> -@@ -108,7 +108,7 @@
> +@@ -116,7 +116,7 @@
>           synchronized (canonLists) {
>               List<Attribute> cl = canonLists.get(al);
>               if (cl == null) {
> @@ -181,7 +172,7 @@
>                   cl.addAll(al);
>                   cl = Collections.unmodifiableList(cl);
>                   canonLists.put(al, cl);
> -@@ -329,9 +329,9 @@
> +@@ -337,9 +337,9 @@
>   
>           public void addAttribute(Attribute a) {
>               if (attributes == null)
> @@ -193,7 +184,7 @@
>               attributes.add(a);
>           }
>   
> -@@ -339,7 +339,7 @@
> +@@ -347,7 +347,7 @@
>               if (attributes == null)       return null;
>               if (!attributes.contains(a))  return null;
>               if (!(attributes instanceof ArrayList))
> @@ -202,46 +193,45 @@
>               attributes.remove(a);
>               return a;
>           }
> -@@ -824,7 +824,7 @@
> +@@ -838,7 +838,7 @@
>       */
>       static //private
>       Layout.Element[] tokenizeLayout(Layout self, int curCble, String layout) {
> --        ArrayList<Layout.Element> col = new ArrayList<>(layout.length());
> -+        ArrayList<Layout.Element> col = new ArrayList<Layout.Element>(layout.length());
> +-        List<Layout.Element> col = new ArrayList<>(layout.length());
> ++        List<Layout.Element> col = new ArrayList<Layout.Element>(layout.length());
>           tokenizeLayout(self, curCble, layout, col);
>           Layout.Element[] res = new Layout.Element[col.size()];
>           col.toArray(res);
> -@@ -889,7 +889,7 @@
> +@@ -903,7 +903,7 @@
>               case 'T': // union: 'T' any_int union_case* '(' ')' '[' body ']'
>                   kind = EK_UN;
>                   i = tokenizeSInt(e, layout, i);
> --                ArrayList<Layout.Element> cases = new ArrayList<>();
> -+                ArrayList<Layout.Element> cases = new ArrayList<Layout.Element>();
> +-                List<Layout.Element> cases = new ArrayList<>();
> ++                List<Layout.Element> cases = new ArrayList<Layout.Element>();
>                   for (;;) {
>                       // Keep parsing cases until we hit the default case.
>                       if (layout.charAt(i++) != '(')
> -@@ -1043,7 +1043,7 @@
> +@@ -1057,7 +1057,7 @@
>       }
>       static //private
>       String[] splitBodies(String layout) {
> --        ArrayList<String> bodies = new ArrayList<>();
> -+        ArrayList<String> bodies = new ArrayList<String>();
> +-        List<String> bodies = new ArrayList<>();
> ++        List<String> bodies = new ArrayList<String>();
>           // Parse several independent layout bodies:  "[foo][bar]...[baz]"
>           for (int i = 0; i < layout.length(); i++) {
>               if (layout.charAt(i++) != '[')
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java	Wed Sep 15 00:00:17 2010 +0100
> -@@ -909,7 +909,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java
> +@@ -919,7 +919,7 @@
>       public static
>       Index[] partition(Index ix, int[] keys) {
>           // %%% Should move this into class Index.
> --        ArrayList<List<Entry>> parts = new ArrayList<>();
> -+        ArrayList<List<Entry>> parts = new ArrayList<List<Entry>>();
> +-        List<List<Entry>> parts = new ArrayList<>();
> ++        List<List<Entry>> parts = new ArrayList<List<Entry>>();
>           Entry[] cpMap = ix.cpMap;
>           assert(keys.length == cpMap.length);
>           for (int i = 0; i < keys.length; i++) {
> -@@ -920,7 +920,7 @@
> +@@ -930,7 +930,7 @@
>               }
>               List<Entry> part = parts.get(key);
>               if (part == null) {
> @@ -250,19 +240,27 @@
>               }
>               part.add(cpMap[i]);
>           }
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Package.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java	Wed Sep 15 00:00:17 2010 +0100
> -@@ -90,7 +90,7 @@
> +@@ -1137,7 +1137,7 @@
> +     void completeReferencesIn(Set<Entry> cpRefs, boolean flattenSigs) {
> +         cpRefs.remove(null);
> +         for (ListIterator<Entry> work =
> +-                 new ArrayList<>(cpRefs).listIterator(cpRefs.size());
> ++                 new ArrayList<Entry>(cpRefs).listIterator(cpRefs.size());
> +              work.hasPrevious(); ) {
> +             Entry e = work.previous();
> +             work.remove();          // pop stack
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java
> +@@ -112,7 +112,7 @@
>       public static final Attribute.Layout attrSourceFileSpecial;
> -     public static final Map attrDefs;
> +     public static final Map<Attribute.Layout, Attribute> attrDefs;
>       static {
> --        HashMap<Layout, Attribute> ad = new HashMap<>(3);
> -+        HashMap<Layout, Attribute> ad = new HashMap<Layout, Attribute>(3);
> +-        Map<Layout, Attribute> ad = new HashMap<>(3);
> ++        Map<Layout, Attribute> ad = new HashMap<Layout, Attribute>(3);
>           attrCodeEmpty = Attribute.define(ad, ATTR_CONTEXT_METHOD,
>                                            "Code", "").layout();
>           attrInnerClassesEmpty = Attribute.define(ad, ATTR_CONTEXT_CLASS,
> -@@ -160,7 +160,7 @@
> +@@ -181,7 +181,7 @@
>           }
>       }
>   
> @@ -271,7 +269,16 @@
>   
>       public List<Package.Class> getClasses() {
>           return classes;
> -@@ -271,7 +271,7 @@
> +@@ -264,7 +264,7 @@
> +             if (olda == null)
> +                 return;  // no SourceFile attr.
> +             String obvious = getObviousSourceFile();
> +-            List<Entry> ref = new ArrayList<>(1);
> ++            List<Entry> ref = new ArrayList<Entry>(1);
> +             olda.visitRefs(this, VRM_PACKAGE, ref);
> +             Utf8Entry sfName = (Utf8Entry) ref.get(0);
> +             Attribute a = olda;
> +@@ -292,7 +292,7 @@
>               if (a != olda) {
>                   if (verbose > 2)
>                       Utils.log.fine("recoding obvious SourceFile="+obvious);
> @@ -280,25 +287,34 @@
>                   int where = newAttrs.indexOf(olda);
>                   newAttrs.set(where, a);
>                   setAttributes(newAttrs);
> -@@ -320,7 +320,7 @@
> +@@ -322,7 +322,7 @@
> +         }
> + 
> +         public void setInnerClasses(Collection<InnerClass> ics) {
> +-            innerClasses = (ics == null) ? null : new ArrayList<>(ics);
> ++            innerClasses = (ics == null) ? null : new ArrayList<InnerClass>(ics);
> +             // Edit the attribute list, if necessary.
> +             Attribute a = getAttribute(attrInnerClassesEmpty);
> +             if (innerClasses != null && a == null)
> +@@ -341,7 +341,7 @@
>            *  with that of Package.this.allInnerClasses.
>            */
>           public List<InnerClass> computeGloballyImpliedICs() {
> --            HashSet<Entry> cpRefs = new HashSet<>();
> -+            HashSet<Entry> cpRefs = new HashSet<Entry>();
> +-            Set<Entry> cpRefs = new HashSet<>();
> ++            Set<Entry> cpRefs = new HashSet<Entry>();
>               {   // This block temporarily displaces this.innerClasses.
>                   ArrayList<InnerClass> innerClassesSaved = innerClasses;
>                   innerClasses = null;  // ignore for the moment
> -@@ -329,7 +329,7 @@
> +@@ -350,7 +350,7 @@
>               }
>               ConstantPool.completeReferencesIn(cpRefs, true);
>   
> --            HashSet<Entry> icRefs = new HashSet<>();
> -+            HashSet<Entry> icRefs = new HashSet<Entry>();
> +-            Set<Entry> icRefs = new HashSet<>();
> ++            Set<Entry> icRefs = new HashSet<Entry>();
>               for (Entry e : cpRefs) {
>                   // Restrict cpRefs to InnerClasses entries only.
>                   if (!(e instanceof ClassEntry))  continue;
> -@@ -345,7 +345,7 @@
> +@@ -366,7 +366,7 @@
>               // This loop is structured this way so as to accumulate
>               // entries into impliedICs in an order which reflects
>               // the order of allInnerClasses.
> @@ -307,18 +323,18 @@
>               for (InnerClass ic : allInnerClasses) {
>                   // This one is locally relevant if it describes
>                   // a member of the current class, or if the current
> -@@ -388,8 +388,8 @@
> +@@ -409,8 +409,8 @@
>                   // Diff is A since I is empty.
>               }
>               // (I*A) is non-trivial
> --            HashSet<InnerClass> center = new HashSet<>(actualICs);
> +-            Set<InnerClass> center = new HashSet<>(actualICs);
>  -            center.retainAll(new HashSet<>(impliedICs));
> -+            HashSet<InnerClass> center = new HashSet<InnerClass>(actualICs);
> ++            Set<InnerClass> center = new HashSet<InnerClass>(actualICs);
>  +            center.retainAll(new HashSet<InnerClass>(impliedICs));
>               impliedICs.addAll(actualICs);
>               impliedICs.removeAll(center);
>               // Diff is now I^A = (I+A)-(I*A).
> -@@ -518,7 +518,7 @@
> +@@ -539,7 +539,7 @@
>                   super(flags, descriptor);
>                   assert(!descriptor.isMethod());
>                   if (fields == null)
> @@ -327,7 +343,7 @@
>                   boolean added = fields.add(this);
>                   assert(added);
>                   order = fields.size();
> -@@ -543,7 +543,7 @@
> +@@ -564,7 +564,7 @@
>                   super(flags, descriptor);
>                   assert(descriptor.isMethod());
>                   if (methods == null)
> @@ -336,7 +352,7 @@
>                   boolean added = methods.add(this);
>                   assert(added);
>               }
> -@@ -713,14 +713,14 @@
> +@@ -732,14 +732,14 @@
>       }
>   
>       // What non-class files are in this unit?
> @@ -348,30 +364,30 @@
>       }
>   
>       public List<File> getClassStubs() {
> --        ArrayList<File> classStubs = new ArrayList<>(classes.size());
> -+        ArrayList<File> classStubs = new ArrayList<File>(classes.size());
> +-        List<File> classStubs = new ArrayList<>(classes.size());
> ++        List<File> classStubs = new ArrayList<File>(classes.size());
>           for (Class cls : classes) {
>               assert(cls.file.isClassStub());
>               classStubs.add(cls.file);
> -@@ -839,7 +839,7 @@
> +@@ -859,7 +859,7 @@
>           public InputStream getInputStream() {
>               InputStream in = new ByteArrayInputStream(append.toByteArray());
> -             if (prepend.size() == 0)  return in;
> --            ArrayList<InputStream> isa = new ArrayList<>(prepend.size()+1);
> -+            ArrayList<InputStream> isa = new ArrayList<InputStream>(prepend.size()+1);
> +             if (prepend.isEmpty())  return in;
> +-            List<InputStream> isa = new ArrayList<>(prepend.size()+1);
> ++            List<InputStream> isa = new ArrayList<InputStream>(prepend.size()+1);
>               for (Iterator i = prepend.iterator(); i.hasNext(); ) {
>                   byte[] bytes = (byte[]) i.next();
>                   isa.add(new ByteArrayInputStream(bytes));
> -@@ -876,7 +876,7 @@
> +@@ -896,7 +896,7 @@
>       }
>   
>       // Is there a globally declared table of inner classes?
> --    ArrayList<InnerClass> allInnerClasses = new ArrayList<>();
> -+    ArrayList<InnerClass> allInnerClasses = new ArrayList<InnerClass>();
> -     HashMap<ClassEntry, InnerClass>   allInnerClassesByThis;
> +-    List<InnerClass> allInnerClasses = new ArrayList<>();
> ++    List<InnerClass> allInnerClasses = new ArrayList<InnerClass>();
> +     Map<ClassEntry, InnerClass>   allInnerClassesByThis;
>   
>       public
> -@@ -891,7 +891,7 @@
> +@@ -911,7 +911,7 @@
>           allInnerClasses.addAll(ics);
>   
>           // Make an index:
> @@ -380,30 +396,17 @@
>           for (InnerClass ic : allInnerClasses) {
>               Object pic = allInnerClassesByThis.put(ic.thisClass, ic);
>               assert(pic == null);  // caller must ensure key uniqueness!
> -@@ -1288,7 +1288,7 @@
> +@@ -1307,7 +1307,7 @@
>   
>       // Use this before writing the class files.
>       void ensureAllClassFiles() {
> --        HashSet<File> fileSet = new HashSet<>(files);
> -+        HashSet<File> fileSet = new HashSet<File>(files);
> +-        Set<File> fileSet = new HashSet<>(files);
> ++        Set<File> fileSet = new HashSet<File>(files);
>           for (Class cls : classes) {
>               // Add to the end of ths list:
>               if (!fileSet.contains(cls.file))
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java	Wed Sep 15 00:00:17 2010 +0100
> -@@ -599,7 +599,7 @@
> - 
> -         List<InFile> scanJar(JarFile jf) throws IOException {
> -             // Collect jar entries, preserving order.
> --            List<InFile> inFiles = new ArrayList<>();
> -+            List<InFile> inFiles = new ArrayList<InFile>();
> -             for (JarEntry je : Collections.list(jf.entries())) {
> -                 InFile inFile = new InFile(jf, je);
> -                 assert(je.isDirectory() == inFile.name.endsWith("/"));
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java	Wed Sep 15 00:00:17 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java
>  @@ -58,12 +58,12 @@
>       private final Map<String, MemberEntry> memberEntries;
>   
> @@ -423,10 +426,9 @@
>           props = new PropMap();
>       }
>   
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Utils.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java	Wed Sep 15 00:00:17 2010 +0100
> -@@ -123,7 +123,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java
> +@@ -132,7 +132,7 @@
>       // Keep a TLS point to the global data and environment.
>       // This makes it simpler to supply environmental options
>       // to the engine code, especially the native code.
> @@ -435,49 +437,47 @@
>   
>       // convenience methods to access the TL globals
>       static TLGlobals getTLGlobals() {
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java	Wed Sep 15 14:34:26 2010 +0100
> -@@ -199,7 +199,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java
> +@@ -226,7 +226,7 @@
>               props.setProperty(java.util.jar.Pack200.Unpacker.PROGRESS,"50");
>               pkg.ensureAllClassFiles();
>               // Now write out the files.
> --            HashSet<Package.Class> classesToWrite = new HashSet<>(pkg.getClasses());
> -+            HashSet<Package.Class> classesToWrite = new HashSet<Package.Class>(pkg.getClasses());
> -             for (Iterator i = pkg.getFiles().iterator(); i.hasNext(); ) {
> -                 Package.File file = (Package.File) i.next();
> +-            Set<Package.Class> classesToWrite = new HashSet<>(pkg.getClasses());
> ++            Set<Package.Class> classesToWrite = new HashSet<Package.Class>(pkg.getClasses());
> +             for (Package.File file : pkg.getFiles()) {
>                   String name = file.nameString;
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Driver.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java	Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java	Wed Sep 15 15:25:40 2010 +0100
> -@@ -38,7 +38,7 @@
> +                 JarEntry je = new JarEntry(Utils.getJarEntryName(name));
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java
> +@@ -59,7 +59,7 @@
>                   ResourceBundle.getBundle("com.sun.java.util.jar.pack.DriverResource");
>   
>       public static void main(String[] ava) throws IOException {
> --        ArrayList<String> av = new ArrayList<>(Arrays.asList(ava));
> -+        ArrayList<String> av = new ArrayList<String>(Arrays.asList(ava));
> +-        List<String> av = new ArrayList<>(Arrays.asList(ava));
> ++        List<String> av = new ArrayList<String>(Arrays.asList(ava));
>   
>           boolean doPack   = true;
>           boolean doUnpack = false;
> -@@ -61,7 +61,7 @@
> +@@ -84,7 +84,7 @@
>           }
>   
>           // Collect engine properties here:
> --        HashMap<String,String> engProps = new HashMap<>();
> -+        HashMap<String,String> engProps = new HashMap<String,String>();
> +-        Map<String,String> engProps = new HashMap<>();
> ++        Map<String,String> engProps = new HashMap<String,String>();
>           engProps.put(verboseProp, System.getProperty(verboseProp));
>   
>           String optionMap;
> -@@ -75,7 +75,7 @@
> +@@ -98,7 +98,7 @@
>           }
>   
>           // Collect argument properties here:
> --        HashMap<String,String> avProps = new HashMap<>();
> -+        HashMap<String,String> avProps = new HashMap<String,String>();
> +-        Map<String,String> avProps = new HashMap<>();
> ++        Map<String,String> avProps = new HashMap<String,String>();
>           try {
>               for (;;) {
>                   String state = parseCommandOptions(av, optionMap, avProps);
> -@@ -494,7 +494,7 @@
> +@@ -525,7 +525,7 @@
>           String resultString = null;
>   
>           // Convert options string into optLines dictionary.
> @@ -486,3 +486,2633 @@
>       loadOptmap:
>           for (String optline : options.split("\n")) {
>               String[] words = optline.split("\\p{Space}+");
> +--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java
> +@@ -436,7 +436,7 @@
> +         int count = 0;
> + 
> +         // Remember the highest KVNO for each etype. Used for kvno == -2
> +-        Map<Integer,Integer> highest = new HashMap<>();
> ++        Map<Integer,Integer> highest = new HashMap<Integer,Integer>();
> + 
> +         for (int i = entries.size()-1; i >= 0; i--) {
> +             KeyTabEntry e = entries.get(i);
> +--- openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java
> +@@ -315,7 +315,7 @@
> +     private static native void freeEntry(long jzfile, long jzentry);
> + 
> +     // the outstanding inputstreams that need to be closed.
> +-    private Set<InputStream> streams = new HashSet<>();
> ++    private Set<InputStream> streams = new HashSet<InputStream>();
> + 
> +     /**
> +      * Returns an input stream for reading the contents of the specified
> +@@ -545,7 +545,7 @@
> + 
> +             if (streams.size() !=0) {
> +                 Set<InputStream> copy = streams;
> +-                streams = new HashSet<>();
> ++                streams = new HashSet();
> +                 for (InputStream is: copy)
> +                     is.close();
> +             }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java
> +@@ -183,8 +183,8 @@
> +         final Map<Attribute.Layout, Attribute> attrDefs;
> +         final Map<Attribute.Layout, String> attrCommands;
> +         {
> +-            Map<Attribute.Layout, Attribute> lattrDefs   = new HashMap<>();
> +-            Map<Attribute.Layout, String>  lattrCommands = new HashMap<>();
> ++            Map<Attribute.Layout, Attribute> lattrDefs   = new HashMap<Attribute.Layout, Attribute>();
> ++            Map<Attribute.Layout, String>  lattrCommands = new HashMap<Attribute.Layout, String>();
> +             String[] keys = {
> +                 Pack200.Packer.CLASS_ATTRIBUTE_PFX,
> +                 Pack200.Packer.FIELD_ATTRIBUTE_PFX,
> +@@ -593,7 +593,7 @@
> +                 assert(pkg.files.containsAll(pkg.getClassStubs()));
> +                 // Order of stubs in file list must agree with classes.
> +                 List<Package.File> res = pkg.files;
> +-                assert((res = new ArrayList<>(pkg.files))
> ++                assert((res = new ArrayList(pkg.files))
> +                        .retainAll(pkg.getClassStubs()) || true);
> +                 assert(res.equals(pkg.getClassStubs()));
> +             }
> +@@ -626,7 +626,7 @@
> + 
> +         List<InFile> scanJar(JarFile jf) throws IOException {
> +             // Collect jar entries, preserving order.
> +-            List<InFile> inFiles = new ArrayList<>();
> ++            List<InFile> inFiles = new ArrayList<InFile>();
> +             try {
> +                 for (JarEntry je : Collections.list(jf.entries())) {
> +                     InFile inFile = new InFile(jf, je);
> +--- openjdk-boot/jdk/src/share/classes/java/dyn/Switcher.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/dyn/Switcher.java
> +@@ -79,7 +79,7 @@
> +     return MethodHandles.guardWithTest(this.mcsInvoker, target, fallback);
> +   }
> +   public static void invalidateAll(Switcher[] switchers) {
> +-    List<MutableCallSite> mcss = new ArrayList<>();
> ++    List<MutableCallSite> mcss = new ArrayList<MutableCallSite>();
> +     for (Switcher s : switchers)  mcss.add(s.mcs);
> +     for (MutableCallSite mcs : mcss)  mcs.setTarget(K_false);
> +     MutableCallSite.sync(mcss.toArray(new MutableCallSite[0]));
> +--- openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java
> +@@ -170,7 +170,7 @@
> +     private static void printProperties(PrintStream ostream) {
> +         Properties p = System.getProperties();
> +         ostream.println(PROP_SETTINGS);
> +-        List<String> sortedPropertyKeys = new ArrayList<>();
> ++        List<String> sortedPropertyKeys = new ArrayList<String>();
> +         sortedPropertyKeys.addAll(p.stringPropertyNames());
> +         Collections.sort(sortedPropertyKeys);
> +         for (String x : sortedPropertyKeys) {
> +@@ -245,7 +245,7 @@
> +         }
> +         // Locale does not implement Comparable so we convert it to String
> +         // and sort it for pretty printing.
> +-        Set<String> sortedSet = new TreeSet<>();
> ++        Set<String> sortedSet = new TreeSet<String>();
> +         for (Locale l : tlocales) {
> +             sortedSet.add(l.toString());
> +         }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java
> +@@ -743,9 +743,9 @@
> +         // Steps 1/2/3 are interdependent, and may be iterated.
> +         // Steps 4 and 5 may be decided independently afterward.
> +         int[] LValuesCoded = PopulationCoding.LValuesCoded;
> +-        List<Coding> bestFits = new ArrayList<>();
> +-        List<Coding> fullFits = new ArrayList<>();
> +-        List<Coding> longFits = new ArrayList<>();
> ++        List<Coding> bestFits = new ArrayList<Coding>();
> ++        List<Coding> fullFits = new ArrayList<Coding>();
> ++        List<Coding> longFits = new ArrayList<Coding>();
> +         final int PACK_TO_MAX_S = 1;
> +         if (bestPopFVC <= 255) {
> +             bestFits.add(BandStructure.BYTE1);
> +@@ -785,7 +785,7 @@
> +                 }
> +             }
> +         }
> +-        List<Coding> allFits = new ArrayList<>();
> ++        List<Coding> allFits = new ArrayList<Coding>();
> +         for (Iterator<Coding> i = bestFits.iterator(),
> +                       j = fullFits.iterator(),
> +                       k = longFits.iterator();
> +@@ -1230,10 +1230,10 @@
> +         Histogram hist = getValueHistogram();
> +         int fVlen = stressLen(hist.getTotalLength());
> +         if (fVlen == 0)  return coding;
> +-        List<Integer> popvals = new ArrayList<>();
> ++        List<Integer> popvals = new ArrayList<Integer>();
> +         if (stress.nextBoolean()) {
> +             // Build the population from the value list.
> +-            Set<Integer> popset = new HashSet<>();
> ++            Set<Integer> popset = new HashSet<Integer>();
> +             for (int i = start; i < end; i++) {
> +                 if (popset.add(values[i]))  popvals.add(values[i]);
> +             }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java
> +@@ -680,7 +680,7 @@
> +         cp_Signature_classes.expectLength(getIntTotal(numSigClasses));
> +         cp_Signature_classes.readFrom(in);
> +         cp_Signature_classes.setIndex(getCPIndex(CONSTANT_Class));
> +-        utf8Signatures = new HashMap<>();
> ++        utf8Signatures = new HashMap<Utf8Entry, SignatureEntry>();
> +         for (int i = 0; i < cpMap.length; i++) {
> +             Utf8Entry formRef = (Utf8Entry) cp_Signature_form.getRef();
> +             ClassEntry[] classRefs = new ClassEntry[numSigClasses[i]];
> +@@ -880,7 +880,7 @@
> +         ic_name.expectLength(longICCount);
> +         ic_name.readFrom(in);
> +         ic_flags.resetForSecondPass();
> +-        List<InnerClass> icList = new ArrayList<>(numInnerClasses);
> ++        List<InnerClass> icList = new ArrayList<InnerClass>(numInnerClasses);
> +         for (int i = 0; i < numInnerClasses; i++) {
> +             int flags = ic_flags.getInt();
> +             boolean longForm = (flags & ACC_IC_LONG_FORM) != 0;
> +@@ -922,7 +922,7 @@
> + 
> +     void readLocalInnerClasses(Class cls) throws IOException {
> +         int nc = class_InnerClasses_N.getInt();
> +-        List<InnerClass> localICs = new ArrayList<>(nc);
> ++        List<InnerClass> localICs = new ArrayList<InnerClass>(nc);
> +         for (int i = 0; i < nc; i++) {
> +             ClassEntry thisClass = (ClassEntry) class_InnerClasses_RC.getRef();
> +             int        flags     =              class_InnerClasses_F.getInt();
> +@@ -1011,7 +1011,7 @@
> +         return -1;
> +     }
> + 
> +-    Comparator<Entry> entryOutputOrder = new Comparator<>() {
> ++    Comparator<Entry> entryOutputOrder = new Comparator<Entry>() {
> +         public int compare(Entry  e0, Entry e1) {
> +             int k0 = getOutputIndex(e0);
> +             int k1 = getOutputIndex(e1);
> +@@ -1050,7 +1050,7 @@
> + 
> +     Entry[] reconstructLocalCPMap(Class cls) {
> +         Set<Entry> ldcRefs = ldcRefMap.get(cls);
> +-        Set<Entry> cpRefs = new HashSet<>();
> ++        Set<Entry> cpRefs = new HashSet<Entry>();
> + 
> +         // look for constant pool entries:
> +         cls.visitRefs(VRM_CLASSIC, cpRefs);
> +@@ -1155,7 +1155,7 @@
> +         method_descr.expectLength(totalNM);
> +         if (verbose > 1)  Utils.log.fine("expecting #fields="+totalNF+" and #methods="+totalNM+" in #classes="+numClasses);
> + 
> +-        List<Class.Field> fields = new ArrayList<>(totalNF);
> ++        List<Class.Field> fields = new ArrayList<Class.Field>(totalNF);
> +         field_descr.readFrom(in);
> +         for (int i = 0; i < classes.length; i++) {
> +             Class c = classes[i];
> +@@ -1171,7 +1171,7 @@
> +         countAndReadAttrs(ATTR_CONTEXT_FIELD, fields);
> +         fields = null;  // release to GC
> + 
> +-        List<Class.Method> methods = new ArrayList<>(totalNM);
> ++        List<Class.Method> methods = new ArrayList<Class.Method>(totalNM);
> +         method_descr.readFrom(in);
> +         for (int i = 0; i < classes.length; i++) {
> +             Class c = classes[i];
> +@@ -1194,10 +1194,10 @@
> + 
> +     Code[] allCodes;
> +     List<Code> codesWithFlags;
> +-    Map<Class, Set<Entry>> ldcRefMap = new HashMap<>();
> ++    Map<Class, Set<Entry>> ldcRefMap = new HashMap<Class, Set<Entry>>();
> + 
> +     Code[] buildCodeAttrs(List<Class.Method> methods) {
> +-        List<Code> codes = new ArrayList<>(methods.size());
> ++        List<Code> codes = new ArrayList<Code>(methods.size());
> +         for (Class.Method m : methods) {
> +             if (m.getAttribute(attrCodeEmpty) != null) {
> +                 m.code = new Code(m);
> +@@ -1221,7 +1221,7 @@
> +         boolean attrsOK = testBit(archiveOptions, AO_HAVE_ALL_CODE_FLAGS);
> +         code_headers.expectLength(allCodes.length);
> +         code_headers.readFrom(in);
> +-        List<Code> longCodes = new ArrayList<>(allCodes.length / 10);
> ++        List<Code> longCodes = new ArrayList<Code>(allCodes.length / 10);
> +         for (int i = 0; i < allCodes.length; i++) {
> +             Code c = allCodes[i];
> +             int sc = code_headers.getByte();
> +@@ -1460,7 +1460,7 @@
> +                 bits -= (1L<<ai);
> +                 nfa += 1;
> +             }
> +-            List<Attribute> ha = new ArrayList<>(nfa + noa);
> ++            List<Attribute> ha = new ArrayList<Attribute>(nfa + noa);
> +             h.attributes = ha;
> +             bits = attrBits;  // iterate again
> +             for (int ai = 0; bits != 0; ai++) {
> +@@ -1584,7 +1584,7 @@
> +     @SuppressWarnings("unchecked")
> +     void readAttrs(int ctype, Collection holders) throws IOException {
> +         // Decode band values into attributes.
> +-        Set<Attribute.Layout> sawDefs = new HashSet<>();
> ++        Set<Attribute.Layout> sawDefs = new HashSet<Attribute.Layout>();
> +         ByteArrayOutputStream buf = new ByteArrayOutputStream();
> +         for (Iterator i = holders.iterator(); i.hasNext(); ) {
> +             final Attribute.Holder h = (Attribute.Holder) i.next();
> +@@ -1788,7 +1788,7 @@
> +         // scratch buffer for collecting code::
> +         byte[] buf = new byte[1<<12];
> +         // record of all switch opcodes (these are variable-length)
> +-        List<Integer> allSwitchOps = new ArrayList<>();
> ++        List<Integer> allSwitchOps = new ArrayList<Integer>();
> +         for (int k = 0; k < allCodes.length; k++) {
> +             Code c = allCodes[k];
> +         scanOneMethod:
> +@@ -1904,7 +1904,7 @@
> + 
> +             Set<Entry> ldcRefSet = ldcRefMap.get(curClass);
> +             if (ldcRefSet == null)
> +-                ldcRefMap.put(curClass, ldcRefSet = new HashSet<>());
> ++                ldcRefMap.put(curClass, ldcRefSet = new HashSet<Entry>());
> + 
> +             ClassEntry thisClass  = curClass.thisClass;
> +             ClassEntry superClass = curClass.superClass;
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java
> +@@ -116,7 +116,7 @@
> +     int[][]     attrCounts;       // count attr. occurences
> + 
> +     void setup() {
> +-        requiredEntries = new HashSet<>();
> ++        requiredEntries = new HashSet<Entry>();
> +         setArchiveOptions();
> +         trimClassAttributes();
> +         collectAttributeLayouts();
> +@@ -176,7 +176,7 @@
> +             }
> +         }
> +         // Decide on default version number (majority rule).
> +-        Map<Integer, int[]> verCounts = new HashMap<>();
> ++        Map<Integer, int[]> verCounts = new HashMap<Integer, int[]>();
> +         int bestCount = 0;
> +         int bestVersion = -1;
> +         for (Class cls : pkg.classes) {
> +@@ -723,7 +723,7 @@
> +     @SuppressWarnings("unchecked")
> +     void collectAttributeLayouts() {
> +         maxFlags = new int[ATTR_CONTEXT_LIMIT];
> +-        allLayouts = new FixedList<>(ATTR_CONTEXT_LIMIT);
> ++        allLayouts = new FixedList<Map<Attribute.Layout, int[]>>(ATTR_CONTEXT_LIMIT);
> +         for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> +             allLayouts.set(i, new HashMap<Attribute.Layout, int[]>());
> +         }
> +@@ -768,7 +768,7 @@
> +         }
> +         // Collect counts for both predefs. and custom defs.
> +         // Decide on custom, local attribute definitions.
> +-        backCountTable = new HashMap<>();
> ++        backCountTable = new HashMap<Attribute.Layout, int[]>();
> +         attrCounts = new int[ATTR_CONTEXT_LIMIT][];
> +         for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> +             // Now the remaining defs in allLayouts[i] need attr. indexes.
> +@@ -785,7 +785,7 @@
> +             defMap.entrySet().toArray(layoutsAndCounts);
> +             // Sort by count, most frequent first.
> +             // Predefs. participate in this sort, though it does not matter.
> +-            Arrays.sort(layoutsAndCounts, new Comparator<>() {
> ++            Arrays.sort(layoutsAndCounts, new Comparator() {
> +                 public int compare(Object o0, Object o1) {
> +                     Map.Entry e0 = (Map.Entry) o0;
> +                     Map.Entry e1 = (Map.Entry) o1;
> +@@ -883,7 +883,7 @@
> + 
> +     @SuppressWarnings("unchecked")
> +     void writeAttrDefs() throws IOException {
> +-        List<Object[]> defList = new ArrayList<>();
> ++        List<Object[]> defList = new ArrayList<Object[]>();
> +         for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> +             int limit = attrDefs.get(i).size();
> +             for (int j = 0; j < limit; j++) {
> +@@ -995,7 +995,7 @@
> +     void collectInnerClasses() {
> +         // Capture inner classes, removing them from individual classes.
> +         // Irregular inner classes must stay local, though.
> +-        Map<ClassEntry, InnerClass> allICMap = new HashMap<>();
> ++        Map<ClassEntry, InnerClass> allICMap = new HashMap<ClassEntry, InnerClass>();
> +         // First, collect a consistent global set.
> +         for (Class cls : pkg.classes) {
> +             if (!cls.hasInnerClasses())  continue;
> +--- openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java
> +@@ -113,7 +113,7 @@
> + 
> +     // Table of known loggers.  Maps names to PlatformLoggers.
> +     private static Map<String,WeakReference<PlatformLogger>> loggers =
> +-        new HashMap<>();
> ++        new HashMap<String,WeakReference<PlatformLogger>>();
> + 
> +     /**
> +      * Returns a PlatformLogger of a given name.
> +@@ -126,7 +126,7 @@
> +         }
> +         if (log == null) {
> +             log = new PlatformLogger(name);
> +-            loggers.put(name, new WeakReference<>(log));
> ++            loggers.put(name, new WeakReference<PlatformLogger>(log));
> +         }
> +         return log;
> +     }
> +@@ -488,7 +488,7 @@
> +      */
> +     static class JavaLogger extends LoggerProxy {
> +         private static final Map<Integer, Object> levelObjects =
> +-            new HashMap<>();
> ++            new HashMap();
> + 
> +         static {
> +             if (LoggingSupport.isAvailable()) {
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java
> +@@ -257,7 +257,7 @@
> +         assert(basicCodings[_meta_default] == null);
> +         assert(basicCodings[_meta_canon_min] != null);
> +         assert(basicCodings[_meta_canon_max] != null);
> +-        Map<Coding, Integer> map = new HashMap<>();
> ++        Map<Coding, Integer> map = new HashMap<Coding, Integer>();
> +         for (int i = 0; i < basicCodings.length; i++) {
> +             Coding c = basicCodings[i];
> +             if (c == null)  continue;
> +@@ -1050,8 +1050,8 @@
> + 
> +     // Bootstrap support for CPRefBands.  These are needed to record
> +     // intended CP indexes, before the CP has been created.
> +-    private final List<CPRefBand> allKQBands = new ArrayList<>();
> +-    private List<Object[]> needPredefIndex = new ArrayList<>();
> ++    private final List<CPRefBand> allKQBands = new ArrayList<CPRefBand>();
> ++    private List<Object[]> needPredefIndex = new ArrayList<Object[]>();
> + 
> + 
> +     int encodeRef(Entry e, Index ix) {
> +@@ -1686,7 +1686,7 @@
> +     protected int attrClassFileVersionMask;
> + 
> +     // Mapping from Attribute.Layout to Band[] (layout element bands).
> +-    protected Map<Attribute.Layout, Band[]> attrBandTable = new HashMap<>();
> ++    protected Map<Attribute.Layout, Band[]> attrBandTable = new HashMap<Attribute.Layout, Band[]>();
> + 
> +     // Well-known attributes:
> +     protected final Attribute.Layout attrCodeEmpty;
> +@@ -1695,16 +1695,16 @@
> +     protected final Attribute.Layout attrConstantValue;
> + 
> +     // Mapping from Attribute.Layout to Integer (inverse of attrDefs)
> +-    Map<Attribute.Layout, Integer> attrIndexTable = new HashMap<>();
> ++    Map<Attribute.Layout, Integer> attrIndexTable = new HashMap<Attribute.Layout, Integer>();
> + 
> +     // Mapping from attribute index (<32 are flag bits) to attributes.
> +     protected List<List<Attribute.Layout>> attrDefs =
> +-            new FixedList<>(ATTR_CONTEXT_LIMIT);
> ++            new FixedList<List<Attribute.Layout>>(ATTR_CONTEXT_LIMIT);
> +     {
> +         for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> +             assert(attrIndexLimit[i] == 0);
> +             attrIndexLimit[i] = 32;  // just for the sake of predefs.
> +-            attrDefs.set(i, new ArrayList<>(Collections.nCopies(
> ++            attrDefs.set(i, new ArrayList<Attribute.Layout>(Collections.nCopies(
> +                     attrIndexLimit[i], (Attribute.Layout)null)));
> + 
> +         }
> +@@ -1894,7 +1894,7 @@
> + 
> +     protected List getPredefinedAttrs(int ctype) {
> +         assert(attrIndexLimit[ctype] != 0);
> +-        List<Attribute.Layout> res = new ArrayList<>(attrIndexLimit[ctype]);
> ++        List<Attribute.Layout> res = new ArrayList<Attribute.Layout>(attrIndexLimit[ctype]);
> +         // Remove nulls and non-predefs.
> +         for (int ai = 0; ai < attrIndexLimit[ctype]; ai++) {
> +             if (testBit(attrDefSeen[ctype], 1L<<ai))  continue;
> +@@ -2518,7 +2518,7 @@
> +     // DEBUG ONLY:  Record something about the band order.
> +     boolean notePrevForAssert(Band b, Band p) {
> +         if (prevForAssertMap == null)
> +-            prevForAssertMap = new HashMap<>();
> ++            prevForAssertMap = new HashMap<Band, Band>();
> +         prevForAssertMap.put(b, p);
> +         return true;
> +     }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java
> +@@ -48,8 +48,8 @@
> +  */
> + 
> + final class PropMap implements SortedMap<Object, Object>  {
> +-    private final TreeMap<Object, Object> theMap = new TreeMap<>();;
> +-    private final List<PropertyChangeListener> listenerList = new ArrayList<>(1);
> ++    private final TreeMap<Object, Object> theMap = new TreeMap<Object, Object>();;
> ++    private final List<PropertyChangeListener> listenerList = new ArrayList<PropertyChangeListener>(1);
> + 
> +     void addListener(PropertyChangeListener listener) {
> +         listenerList.add(listener);
> +@@ -144,7 +144,7 @@
> +             } catch (IOException ignore) {}
> +         }
> + 
> +-        defaultProps = (new HashMap<>(props));  // shrink to fit
> ++        defaultProps = (new HashMap<Object,Object>(props));  // shrink to fit
> +     }
> + 
> +     PropMap() {
> +@@ -180,7 +180,7 @@
> +     // Get sequence of props for "prefix", and "prefix.*".
> +     List getProperties(String prefix) {
> +         Collection<Object> values = prefixMap(prefix).values();
> +-        List<Object> res = new ArrayList<>(values.size());
> ++        List<Object> res = new ArrayList(values.size());
> +         res.addAll(values);
> +         while (res.remove(null));
> +         return res;
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java
> +@@ -402,7 +402,7 @@
> +     private static Map<Coding, Coding> codeMap;
> + 
> +     private static synchronized Coding of(int B, int H, int S, int del) {
> +-        if (codeMap == null)  codeMap = new HashMap<>();
> ++        if (codeMap == null)  codeMap = new HashMap<Coding, Coding>();
> +         Coding x0 = new Coding(B, H, S, del);
> +         Coding x1 = codeMap.get(x0);
> +         if (x1 == null)  codeMap.put(x0, x1 = x0);
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java
> +@@ -309,7 +309,7 @@
> +         // As each new value is added, we assert that the value
> +         // was not already in the set.
> +         Set<Integer> uniqueValuesForDebug = null;
> +-        assert((uniqueValuesForDebug = new HashSet<>()) != null);
> ++        assert((uniqueValuesForDebug = new HashSet<Integer>()) != null);
> +         int fillp = 1;
> +         maxForDebug += fillp;
> +         int min = Integer.MIN_VALUE;  // farthest from the center
> +--- openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java
> +@@ -34,7 +34,7 @@
> +  */
> + 
> + class DeleteOnExitHook {
> +-    private static LinkedHashSet<String> files = new LinkedHashSet<>();
> ++    private static LinkedHashSet<String> files = new LinkedHashSet();
> +     static {
> +         // DeleteOnExitHook must be the last shutdown hook to be invoked.
> +         // Application shutdown hooks may add the first file to the
> +@@ -71,7 +71,7 @@
> +             files = null;
> +         }
> + 
> +-        ArrayList<String> toBeDeleted = new ArrayList<>(theFiles);
> ++        ArrayList<String> toBeDeleted = new ArrayList(theFiles);
> + 
> +         // reverse the list to maintain previous jdk deletion order.
> +         // Last in first deleted.
> +--- openjdk-boot/jdk/src/share/classes/java/io/File.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/File.java
> +@@ -1067,7 +1067,7 @@
> +         if ((names == null) || (filter == null)) {
> +             return names;
> +         }
> +-        List<String> v = new ArrayList<>();
> ++        List<String> v = new ArrayList();
> +         for (int i = 0 ; i < names.length ; i++) {
> +             if (filter.accept(this, names[i])) {
> +                 v.add(names[i]);
> +@@ -1158,7 +1158,7 @@
> +     public File[] listFiles(FilenameFilter filter) {
> +         String ss[] = list();
> +         if (ss == null) return null;
> +-        ArrayList<File> files = new ArrayList<>();
> ++        ArrayList<File> files = new ArrayList();
> +         for (String s : ss)
> +             if ((filter == null) || filter.accept(this, s))
> +                 files.add(new File(s, this));
> +@@ -1195,7 +1195,7 @@
> +     public File[] listFiles(FileFilter filter) {
> +         String ss[] = list();
> +         if (ss == null) return null;
> +-        ArrayList<File> files = new ArrayList<>();
> ++        ArrayList<File> files = new ArrayList();
> +         for (String s : ss) {
> +             File f = new File(s, this);
> +             if ((filter == null) || filter.accept(f))
> +--- openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java
> +@@ -56,7 +56,7 @@
> +     private volatile boolean closed = false;
> + 
> +     private static final ThreadLocal<Boolean> runningFinalize =
> +-        new ThreadLocal<>();
> ++        new ThreadLocal();
> + 
> +     private static boolean isRunningFinalize() {
> +         Boolean val;
> +--- openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java
> +@@ -69,7 +69,7 @@
> +     private final Object closeLock = new Object();
> +     private volatile boolean closed = false;
> +     private static final ThreadLocal<Boolean> runningFinalize =
> +-        new ThreadLocal<>();
> ++        new ThreadLocal();
> + 
> +     private static boolean isRunningFinalize() {
> +         Boolean val;
> +--- openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java
> +@@ -725,7 +725,7 @@
> +      */
> + 
> +     public FilePermissionCollection() {
> +-        perms = new ArrayList<>();
> ++        perms = new ArrayList();
> +     }
> + 
> +     /**
> +@@ -830,7 +830,7 @@
> +         // Don't call out.defaultWriteObject()
> + 
> +         // Write out Vector
> +-        Vector<Permission> permissions = new Vector<>(perms.size());
> ++        Vector<Permission> permissions = new Vector(perms.size());
> +         synchronized (this) {
> +             permissions.addAll(perms);
> +         }
> +@@ -853,7 +853,7 @@
> + 
> +         // Get the one we want
> +         Vector<Permission> permissions = (Vector<Permission>)gfields.get("permissions", null);
> +-        perms = new ArrayList<>(permissions.size());
> ++        perms = new ArrayList(permissions.size());
> +         perms.addAll(permissions);
> +     }
> + }
> +--- openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java
> +@@ -213,7 +213,7 @@
> + 
> +     /** table mapping primitive type names to corresponding class objects */
> +     private static final HashMap<String, Class<?>> primClasses
> +-        = new HashMap<>(8, 1.0F);
> ++        = new HashMap(8, 1.0F);
> +     static {
> +         primClasses.put("boolean", boolean.class);
> +         primClasses.put("byte", byte.class);
> +@@ -229,11 +229,11 @@
> +     private static class Caches {
> +         /** cache of subclass security audit results */
> +         static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
> +-            new ConcurrentHashMap<>();
> ++            new ConcurrentHashMap();
> + 
> +         /** queue for WeakReferences to audited subclasses */
> +         static final ReferenceQueue<Class<?>> subclassAuditsQueue =
> +-            new ReferenceQueue<>();
> ++            new ReferenceQueue();
> +     }
> + 
> +     /** filter stream for handling block data conversion */
> +--- openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java
> +@@ -165,11 +165,11 @@
> +     private static class Caches {
> +         /** cache of subclass security audit results */
> +         static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
> +-            new ConcurrentHashMap<>();
> ++            new ConcurrentHashMap();
> + 
> +         /** queue for WeakReferences to audited subclasses */
> +         static final ReferenceQueue<Class<?>> subclassAuditsQueue =
> +-            new ReferenceQueue<>();
> ++            new ReferenceQueue();
> +     }
> + 
> +     /** filter stream for handling block data conversion */
> +@@ -2413,7 +2413,7 @@
> +         private final List<String> stack;
> + 
> +         DebugTraceInfoStack() {
> +-            stack = new ArrayList<>();
> ++            stack = new ArrayList();
> +         }
> + 
> +         /**
> +--- openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java
> +@@ -84,18 +84,18 @@
> +     private static class Caches {
> +         /** cache mapping local classes -> descriptors */
> +         static final ConcurrentMap<WeakClassKey,Reference<?>> localDescs =
> +-            new ConcurrentHashMap<>();
> ++            new ConcurrentHashMap();
> + 
> +         /** cache mapping field group/local desc pairs -> field reflectors */
> +         static final ConcurrentMap<FieldReflectorKey,Reference<?>> reflectors =
> +-            new ConcurrentHashMap<>();
> ++            new ConcurrentHashMap();
> + 
> +         /** queue for WeakReferences to local classes */
> +         private static final ReferenceQueue<Class<?>> localDescsQueue =
> +-            new ReferenceQueue<>();
> ++            new ReferenceQueue();
> +         /** queue for WeakReferences to field reflectors keys */
> +         private static final ReferenceQueue<Class<?>> reflectorsQueue =
> +-            new ReferenceQueue<>();
> ++            new ReferenceQueue();
> +     }
> + 
> +     /** class associated with this descriptor (if any) */
> +@@ -290,7 +290,7 @@
> +         EntryFuture future = null;
> +         if (entry == null) {
> +             EntryFuture newEntry = new EntryFuture();
> +-            Reference<?> newRef = new SoftReference<>(newEntry);
> ++            Reference<?> newRef = new SoftReference(newEntry);
> +             do {
> +                 if (ref != null) {
> +                     Caches.localDescs.remove(key, ref);
> +@@ -329,7 +329,7 @@
> +                 entry = th;
> +             }
> +             if (future.set(entry)) {
> +-                Caches.localDescs.put(key, new SoftReference<>(entry));
> ++                Caches.localDescs.put(key, new SoftReference(entry));
> +             } else {
> +                 // nested lookup call already set future
> +                 entry = future.get();
> +@@ -1130,7 +1130,7 @@
> +     private ClassDataSlot[] getClassDataLayout0()
> +         throws InvalidClassException
> +     {
> +-        ArrayList<ClassDataSlot> slots = new ArrayList<>();
> ++        ArrayList<ClassDataSlot> slots = new ArrayList();
> +         Class<?> start = cl, end = cl;
> + 
> +         // locate closest non-serializable superclass
> +@@ -1566,7 +1566,7 @@
> + 
> +         ObjectStreamField[] boundFields =
> +             new ObjectStreamField[serialPersistentFields.length];
> +-        Set<String> fieldNames = new HashSet<>(serialPersistentFields.length);
> ++        Set<String> fieldNames = new HashSet(serialPersistentFields.length);
> + 
> +         for (int i = 0; i < serialPersistentFields.length; i++) {
> +             ObjectStreamField spf = serialPersistentFields[i];
> +@@ -1604,7 +1604,7 @@
> +      */
> +     private static ObjectStreamField[] getDefaultSerialFields(Class<?> cl) {
> +         Field[] clFields = cl.getDeclaredFields();
> +-        ArrayList<ObjectStreamField> list = new ArrayList<>();
> ++        ArrayList<ObjectStreamField> list = new ArrayList();
> +         int mask = Modifier.STATIC | Modifier.TRANSIENT;
> + 
> +         for (int i = 0; i < clFields.length; i++) {
> +@@ -1855,8 +1855,8 @@
> +             writeKeys = new long[nfields];
> +             offsets = new int[nfields];
> +             typeCodes = new char[nfields];
> +-            ArrayList<Class<?>> typeList = new ArrayList<>();
> +-            Set<Long> usedKeys = new HashSet<>();
> ++            ArrayList<Class<?>> typeList = new ArrayList();
> ++            Set<Long> usedKeys = new HashSet();
> + 
> + 
> +             for (int i = 0; i < nfields; i++) {
> +@@ -2092,7 +2092,7 @@
> +         EntryFuture future = null;
> +         if (entry == null) {
> +             EntryFuture newEntry = new EntryFuture();
> +-            Reference<?> newRef = new SoftReference<>(newEntry);
> ++            Reference<?> newRef = new SoftReference(newEntry);
> +             do {
> +                 if (ref != null) {
> +                     Caches.reflectors.remove(key, ref);
> +@@ -2118,7 +2118,7 @@
> +                 entry = th;
> +             }
> +             future.set(entry);
> +-            Caches.reflectors.put(key, new SoftReference<>(entry));
> ++            Caches.reflectors.put(key, new SoftReference(entry));
> +         }
> + 
> +         if (entry instanceof FieldReflector) {
> +--- openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java
> +@@ -47,7 +47,7 @@
> +                     }
> +                 }
> +             );
> +-            hooks = new IdentityHashMap<>();
> ++            hooks = new IdentityHashMap();
> +         } catch (IllegalStateException e) {
> +             // application shutdown hooks cannot be added if
> +             // shutdown is in progress.
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Class.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Class.java
> +@@ -1306,7 +1306,7 @@
> +         return java.security.AccessController.doPrivileged(
> +             new java.security.PrivilegedAction<Class<?>[]>() {
> +                 public Class[] run() {
> +-                    List<Class<?>> list = new ArrayList<>();
> ++                    List<Class<?>> list = new ArrayList();
> +                     Class<?> currentClass = Class.this;
> +                     while (currentClass != null) {
> +                         Class<?>[] members = currentClass.getDeclaredClasses();
> +@@ -2306,9 +2306,9 @@
> +         res = Reflection.filterFields(this, getDeclaredFields0(publicOnly));
> +         if (useCaches) {
> +             if (publicOnly) {
> +-                declaredPublicFields = new SoftReference<>(res);
> ++                declaredPublicFields = new SoftReference(res);
> +             } else {
> +-                declaredFields = new SoftReference<>(res);
> ++                declaredFields = new SoftReference(res);
> +             }
> +         }
> +         return res;
> +@@ -2330,9 +2330,9 @@
> + 
> +         // No cached value available; compute value recursively.
> +         // Traverse in correct order for getField().
> +-        List<Field> fields = new ArrayList<>();
> ++        List<Field> fields = new ArrayList();
> +         if (traversedInterfaces == null) {
> +-            traversedInterfaces = new HashSet<>();
> ++            traversedInterfaces = new HashSet();
> +         }
> + 
> +         // Local fields
> +@@ -2358,7 +2358,7 @@
> +         res = new Field[fields.size()];
> +         fields.toArray(res);
> +         if (useCaches) {
> +-            publicFields = new SoftReference<>(res);
> ++            publicFields = new SoftReference(res);
> +         }
> +         return res;
> +     }
> +@@ -2403,9 +2403,9 @@
> +         }
> +         if (useCaches) {
> +             if (publicOnly) {
> +-                publicConstructors = new SoftReference<>(res);
> ++                publicConstructors = new SoftReference(res);
> +             } else {
> +-                declaredConstructors = new SoftReference<>(res);
> ++                declaredConstructors = new SoftReference(res);
> +             }
> +         }
> +         return res;
> +@@ -2440,9 +2440,9 @@
> +         res = Reflection.filterMethods(this, getDeclaredMethods0(publicOnly));
> +         if (useCaches) {
> +             if (publicOnly) {
> +-                declaredPublicMethods = new SoftReference<>(res);
> ++                declaredPublicMethods = new SoftReference(res);
> +             } else {
> +-                declaredMethods = new SoftReference<>(res);
> ++                declaredMethods = new SoftReference(res);
> +             }
> +         }
> +         return res;
> +@@ -2598,7 +2598,7 @@
> +         methods.compactAndTrim();
> +         res = methods.getArray();
> +         if (useCaches) {
> +-            publicMethods = new SoftReference<>(res);
> ++            publicMethods = new SoftReference(res);
> +         }
> +         return res;
> +     }
> +@@ -2977,7 +2977,7 @@
> +             if (universe == null)
> +                 throw new IllegalArgumentException(
> +                     getName() + " is not an enum type");
> +-            Map<String, T> m = new HashMap<>(2 * universe.length);
> ++            Map<String, T> m = new HashMap(2 * universe.length);
> +             for (T constant : universe)
> +                 m.put(((Enum<?>)constant).name(), constant);
> +             enumConstantDirectory = m;
> +@@ -3090,7 +3090,7 @@
> +         if (superClass == null) {
> +             annotations = declaredAnnotations;
> +         } else {
> +-            annotations = new HashMap<>();
> ++            annotations = new HashMap();
> +             superClass.initAnnotationsIfNecessary();
> +             for (Map.Entry<Class<? extends Annotation>, Annotation> e : superClass.annotations.entrySet()) {
> +                 Class<? extends Annotation> annotationClass = e.getKey();
> +--- openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java
> +@@ -247,7 +247,7 @@
> + 
> +     // The classes loaded by this class loader. The only purpose of this table
> +     // is to keep the classes from being GC'ed until the loader is GC'ed.
> +-    private final Vector<Class<?>> classes = new Vector<>();
> ++    private final Vector<Class<?>> classes = new Vector();
> + 
> +     // The "default" domain. Set as the default ProtectionDomain on newly
> +     // created classes.
> +@@ -266,7 +266,7 @@
> +     // The packages defined in this class loader.  Each package name is mapped
> +     // to its corresponding Package object.
> +     // @GuardedBy("itself")
> +-    private final HashMap<String, Package> packages = new HashMap<>();
> ++    private final HashMap<String, Package> packages = new HashMap();
> + 
> +     private static Void checkCreateClassLoader() {
> +         SecurityManager security = System.getSecurityManager();
> +@@ -279,16 +279,16 @@
> +     private ClassLoader(Void unused, ClassLoader parent) {
> +         this.parent = parent;
> +         if (ParallelLoaders.isRegistered(this.getClass())) {
> +-            parallelLockMap = new ConcurrentHashMap<>();
> +-            package2certs = new ConcurrentHashMap<>();
> ++            parallelLockMap = new ConcurrentHashMap();
> ++            package2certs = new ConcurrentHashMap();
> +             domains =
> +                 Collections.synchronizedSet(new HashSet<ProtectionDomain>());
> +             assertionLock = new Object();
> +         } else {
> +             // no finer-grained lock; lock on the classloader instance
> +             parallelLockMap = null;
> +-            package2certs = new Hashtable<>();
> +-            domains = new HashSet<>();
> ++            package2certs = new Hashtable();
> ++            domains = new HashSet();
> +             assertionLock = this;
> +         }
> +     }
> +@@ -1181,7 +1181,7 @@
> +         }
> +         tmp[1] = findResources(name);
> + 
> +-        return new CompoundEnumeration<>(tmp);
> ++        return new CompoundEnumeration(tmp);
> +     }
> + 
> +     /**
> +@@ -1656,7 +1656,7 @@
> +     protected Package[] getPackages() {
> +         Map<String, Package> map;
> +         synchronized (packages) {
> +-            map = new HashMap<>(packages);
> ++            map = new HashMap(packages);
> +         }
> +         Package[] pkgs;
> +         if (parent != null) {
> +@@ -1763,17 +1763,17 @@
> +     }
> + 
> +     // All native library names we've loaded.
> +-    private static Vector<String> loadedLibraryNames = new Vector<>();
> ++    private static Vector<String> loadedLibraryNames = new Vector();
> + 
> +     // Native libraries belonging to system classes.
> +     private static Vector<NativeLibrary> systemNativeLibraries
> +-        = new Vector<>();
> ++        = new Vector();
> + 
> +     // Native libraries associated with the class loader.
> +-    private Vector<NativeLibrary> nativeLibraries = new Vector<>();
> ++    private Vector<NativeLibrary> nativeLibraries = new Vector();
> + 
> +     // native libraries being loaded/unloaded.
> +-    private static Stack<NativeLibrary> nativeLibraryContext = new Stack<>();
> ++    private static Stack<NativeLibrary> nativeLibraryContext = new Stack();
> + 
> +     // The paths searched for libraries
> +     private static String usr_paths[];
> +@@ -2097,8 +2097,8 @@
> +          * them to empty maps, effectively ignoring any present settings.
> +          */
> +         synchronized (assertionLock) {
> +-            classAssertionStatus = new HashMap<>();
> +-            packageAssertionStatus = new HashMap<>();
> ++            classAssertionStatus = new HashMap();
> ++            packageAssertionStatus = new HashMap();
> +             defaultAssertionStatus = false;
> +         }
> +     }
> +@@ -2160,8 +2160,8 @@
> +     private void initializeJavaAssertionMaps() {
> +         // assert Thread.holdsLock(assertionLock);
> + 
> +-        classAssertionStatus = new HashMap<>();
> +-        packageAssertionStatus = new HashMap<>();
> ++        classAssertionStatus = new HashMap();
> ++        packageAssertionStatus = new HashMap();
> +         AssertionStatusDirectives directives = retrieveDirectives();
> + 
> +         for(int i = 0; i < directives.classes.length; i++)
> +--- openjdk-boot/jdk/src/share/classes/java/lang/String.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/String.java
> +@@ -2330,7 +2330,7 @@
> +             int off = 0;
> +             int next = 0;
> +             boolean limited = limit > 0;
> +-            ArrayList<String> list = new ArrayList<>();
> ++            ArrayList<String> list = new ArrayList();
> +             while ((next = indexOf(ch, off)) != -1) {
> +                 if (!limited || list.size() < limit - 1) {
> +                     list.add(substring(off, next));
> +--- openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java
> +@@ -53,9 +53,9 @@
> + 
> +     /** The cached coders for each thread */
> +     private final static ThreadLocal<SoftReference<StringDecoder>> decoder =
> +-        new ThreadLocal<>();
> ++        new ThreadLocal();
> +     private final static ThreadLocal<SoftReference<StringEncoder>> encoder =
> +-        new ThreadLocal<>();
> ++        new ThreadLocal();
> + 
> +     private static boolean warnUnsupportedCharset = true;
> + 
> +@@ -67,7 +67,7 @@
> +     }
> + 
> +     private static <T> void set(ThreadLocal<SoftReference<T>> tl, T ob) {
> +-        tl.set(new SoftReference<>(ob));
> ++        tl.set(new SoftReference(ob));
> +     }
> + 
> +     // Trim the given byte array to the given length
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Thread.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Thread.java
> +@@ -1642,7 +1642,7 @@
> +         // Get a snapshot of the list of all threads
> +         Thread[] threads = getThreads();
> +         StackTraceElement[][] traces = dumpThreads(threads);
> +-        Map<Thread, StackTraceElement[]> m = new HashMap<>(threads.length);
> ++        Map<Thread, StackTraceElement[]> m = new HashMap(threads.length);
> +         for (int i = 0; i < threads.length; i++) {
> +             StackTraceElement[] stackTrace = traces[i];
> +             if (stackTrace != null) {
> +@@ -1663,11 +1663,11 @@
> +     private static class Caches {
> +         /** cache of subclass security audit results */
> +         static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
> +-            new ConcurrentHashMap<>();
> ++            new ConcurrentHashMap();
> + 
> +         /** queue for WeakReferences to audited subclasses */
> +         static final ReferenceQueue<Class<?>> subclassAuditsQueue =
> +-            new ReferenceQueue<>();
> ++            new ReferenceQueue();
> +     }
> + 
> +     /**
> +--- openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java
> +@@ -794,7 +794,7 @@
> +      */
> +     public static List<Class<? extends PlatformManagedObject>> getAllPlatformMXBeanInterfaces() {
> +         List<Class<? extends PlatformManagedObject>> result =
> +-            new ArrayList<>();
> ++            new ArrayList();
> +         for (PlatformComponent component: PlatformComponent.values()) {
> +             result.add(component.getMXBeanInterface());
> +         }
> +--- openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java
> +@@ -267,7 +267,7 @@
> +             List<T> getGcMXBeanList(Class<T> gcMXBeanIntf) {
> +         List<GarbageCollectorMXBean> list =
> +             ManagementFactoryHelper.getGarbageCollectorMXBeans();
> +-        List<T> result = new ArrayList<>(list.size());
> ++        List<T> result = new ArrayList(list.size());
> +         for (GarbageCollectorMXBean m : list) {
> +             if (gcMXBeanIntf.isInstance(m)) {
> +                 result.add(gcMXBeanIntf.cast(m));
> +@@ -330,7 +330,7 @@
> +     }
> + 
> +     private static Set<String> keyProperties(String... keyNames) {
> +-        Set<String> set = new HashSet<>();
> ++        Set<String> set = new HashSet();
> +         set.add("type");
> +         for (String s : keyNames) {
> +             set.add(s);
> +@@ -364,7 +364,7 @@
> +         List<T> getMXBeans(MBeanServerConnection mbs, Class<T> mxbeanInterface)
> +         throws java.io.IOException
> +     {
> +-        List<T> result = new ArrayList<>();
> ++        List<T> result = new ArrayList();
> +         for (ObjectName on : getObjectNames(mbs)) {
> +             result.add(ManagementFactory.
> +                 newPlatformMXBeanProxy(mbs,
> +--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java
> +@@ -232,7 +232,7 @@
> + 
> +     /** maps a class loader to the proxy class cache for that loader */
> +     private static Map<ClassLoader, Map<List<String>, Object>> loaderToCache
> +-        = new WeakHashMap<>();
> ++        = new WeakHashMap();
> + 
> +     /** marks that a particular proxy class is currently being generated */
> +     private static Object pendingGenerationMarker = new Object();
> +@@ -356,7 +356,7 @@
> +         String[] interfaceNames = new String[interfaces.length];
> + 
> +         // for detecting duplicates
> +-        Set<Class<?>> interfaceSet = new HashSet<>();
> ++        Set<Class<?>> interfaceSet = new HashSet();
> + 
> +         for (int i = 0; i < interfaces.length; i++) {
> +             /*
> +@@ -413,7 +413,7 @@
> +         synchronized (loaderToCache) {
> +             cache = loaderToCache.get(loader);
> +             if (cache == null) {
> +-                cache = new HashMap<>();
> ++                cache = new HashMap();
> +                 loaderToCache.put(loader, cache);
> +             }
> +             /*
> +--- openjdk-boot/jdk/src/share/classes/java/sql/DriverManager.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/sql/DriverManager.java
> +@@ -364,7 +364,7 @@
> +      * @return the list of JDBC Drivers loaded by the caller's class loader
> +      */
> +     public static java.util.Enumeration<Driver> getDrivers() {
> +-        java.util.Vector<Driver> result = new java.util.Vector<>();
> ++        java.util.Vector<Driver> result = new java.util.Vector();
> +         java.util.Vector drivers = null;
> + 
> +         if (!initialized) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/Collections.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Collections.java
> +@@ -1035,7 +1035,7 @@
> +      * @return an unmodifiable view of the specified collection.
> +      */
> +     public static <T> Collection<T> unmodifiableCollection(Collection<? extends T> c) {
> +-        return new UnmodifiableCollection<>(c);
> ++        return new UnmodifiableCollection(c);
> +     }
> + 
> +     /**
> +@@ -1109,7 +1109,7 @@
> +      * @return an unmodifiable view of the specified set.
> +      */
> +     public static <T> Set<T> unmodifiableSet(Set<? extends T> s) {
> +-        return new UnmodifiableSet<>(s);
> ++        return new UnmodifiableSet(s);
> +     }
> + 
> +     /**
> +@@ -1141,7 +1141,7 @@
> +      * @return an unmodifiable view of the specified sorted set.
> +      */
> +     public static <T> SortedSet<T> unmodifiableSortedSet(SortedSet<T> s) {
> +-        return new UnmodifiableSortedSet<>(s);
> ++        return new UnmodifiableSortedSet(s);
> +     }
> + 
> +     /**
> +@@ -1158,13 +1158,13 @@
> +         public Comparator<? super E> comparator() {return ss.comparator();}
> + 
> +         public SortedSet<E> subSet(E fromElement, E toElement) {
> +-            return new UnmodifiableSortedSet<>(ss.subSet(fromElement,toElement));
> ++            return new UnmodifiableSortedSet(ss.subSet(fromElement,toElement));
> +         }
> +         public SortedSet<E> headSet(E toElement) {
> +-            return new UnmodifiableSortedSet<>(ss.headSet(toElement));
> ++            return new UnmodifiableSortedSet(ss.headSet(toElement));
> +         }
> +         public SortedSet<E> tailSet(E fromElement) {
> +-            return new UnmodifiableSortedSet<>(ss.tailSet(fromElement));
> ++            return new UnmodifiableSortedSet(ss.tailSet(fromElement));
> +         }
> + 
> +         public E first()                   {return ss.first();}
> +@@ -1188,8 +1188,8 @@
> +      */
> +     public static <T> List<T> unmodifiableList(List<? extends T> list) {
> +         return (list instanceof RandomAccess ?
> +-                new UnmodifiableRandomAccessList<>(list) :
> +-                new UnmodifiableList<>(list));
> ++                new UnmodifiableRandomAccessList(list) :
> ++                new UnmodifiableList(list));
> +     }
> + 
> +     /**
> +@@ -1250,7 +1250,7 @@
> +         }
> + 
> +         public List<E> subList(int fromIndex, int toIndex) {
> +-            return new UnmodifiableList<>(list.subList(fromIndex, toIndex));
> ++            return new UnmodifiableList(list.subList(fromIndex, toIndex));
> +         }
> + 
> +         /**
> +@@ -1267,7 +1267,7 @@
> +          */
> +         private Object readResolve() {
> +             return (list instanceof RandomAccess
> +-                    ? new UnmodifiableRandomAccessList<>(list)
> ++                    ? new UnmodifiableRandomAccessList(list)
> +                     : this);
> +         }
> +     }
> +@@ -1283,7 +1283,7 @@
> +         }
> + 
> +         public List<E> subList(int fromIndex, int toIndex) {
> +-            return new UnmodifiableRandomAccessList<>(
> ++            return new UnmodifiableRandomAccessList(
> +                 list.subList(fromIndex, toIndex));
> +         }
> + 
> +@@ -1296,7 +1296,7 @@
> +          * deserialization.
> +          */
> +         private Object writeReplace() {
> +-            return new UnmodifiableList<>(list);
> ++            return new UnmodifiableList(list);
> +         }
> +     }
> + 
> +@@ -1315,7 +1315,7 @@
> +      * @return an unmodifiable view of the specified map.
> +      */
> +     public static <K,V> Map<K,V> unmodifiableMap(Map<? extends K, ? extends V> m) {
> +-        return new UnmodifiableMap<>(m);
> ++        return new UnmodifiableMap(m);
> +     }
> + 
> +     /**
> +@@ -1363,7 +1363,7 @@
> + 
> +         public Set<Map.Entry<K,V>> entrySet() {
> +             if (entrySet==null)
> +-                entrySet = new UnmodifiableEntrySet<>(m.entrySet());
> ++                entrySet = new UnmodifiableEntrySet(m.entrySet());
> +             return entrySet;
> +         }
> + 
> +@@ -1400,7 +1400,7 @@
> +                         return i.hasNext();
> +                     }
> +                     public Map.Entry<K,V> next() {
> +-                        return new UnmodifiableEntry<>(i.next());
> ++                        return new UnmodifiableEntry(i.next());
> +                     }
> +                     public void remove() {
> +                         throw new UnsupportedOperationException();
> +@@ -1411,7 +1411,7 @@
> +             public Object[] toArray() {
> +                 Object[] a = c.toArray();
> +                 for (int i=0; i<a.length; i++)
> +-                    a[i] = new UnmodifiableEntry<>((Map.Entry<K,V>)a[i]);
> ++                    a[i] = new UnmodifiableEntry((Map.Entry<K,V>)a[i]);
> +                 return a;
> +             }
> + 
> +@@ -1422,7 +1422,7 @@
> +                 Object[] arr = c.toArray(a.length==0 ? a : Arrays.copyOf(a, 0));
> + 
> +                 for (int i=0; i<arr.length; i++)
> +-                    arr[i] = new UnmodifiableEntry<>((Map.Entry<K,V>)arr[i]);
> ++                    arr[i] = new UnmodifiableEntry((Map.Entry<K,V>)arr[i]);
> + 
> +                 if (arr.length > a.length)
> +                     return (T[])arr;
> +@@ -1443,7 +1443,7 @@
> +                 if (!(o instanceof Map.Entry))
> +                     return false;
> +                 return c.contains(
> +-                    new UnmodifiableEntry<>((Map.Entry<?,?>) o));
> ++                    new UnmodifiableEntry((Map.Entry<?,?>) o));
> +             }
> + 
> +             /**
> +@@ -1517,7 +1517,7 @@
> +      * @return an unmodifiable view of the specified sorted map.
> +      */
> +     public static <K,V> SortedMap<K,V> unmodifiableSortedMap(SortedMap<K, ? extends V> m) {
> +-        return new UnmodifiableSortedMap<>(m);
> ++        return new UnmodifiableSortedMap(m);
> +     }
> + 
> +     /**
> +@@ -1535,13 +1535,13 @@
> +         public Comparator<? super K> comparator() {return sm.comparator();}
> + 
> +         public SortedMap<K,V> subMap(K fromKey, K toKey) {
> +-            return new UnmodifiableSortedMap<>(sm.subMap(fromKey, toKey));
> ++            return new UnmodifiableSortedMap(sm.subMap(fromKey, toKey));
> +         }
> +         public SortedMap<K,V> headMap(K toKey) {
> +-            return new UnmodifiableSortedMap<>(sm.headMap(toKey));
> ++            return new UnmodifiableSortedMap(sm.headMap(toKey));
> +         }
> +         public SortedMap<K,V> tailMap(K fromKey) {
> +-            return new UnmodifiableSortedMap<>(sm.tailMap(fromKey));
> ++            return new UnmodifiableSortedMap(sm.tailMap(fromKey));
> +         }
> + 
> +         public K firstKey()           {return sm.firstKey();}
> +@@ -1583,11 +1583,11 @@
> +      * @return a synchronized view of the specified collection.
> +      */
> +     public static <T> Collection<T> synchronizedCollection(Collection<T> c) {
> +-        return new SynchronizedCollection<>(c);
> ++        return new SynchronizedCollection(c);
> +     }
> + 
> +     static <T> Collection<T> synchronizedCollection(Collection<T> c, Object mutex) {
> +-        return new SynchronizedCollection<>(c, mutex);
> ++        return new SynchronizedCollection(c, mutex);
> +     }
> + 
> +     /**
> +@@ -1686,11 +1686,11 @@
> +      * @return a synchronized view of the specified set.
> +      */
> +     public static <T> Set<T> synchronizedSet(Set<T> s) {
> +-        return new SynchronizedSet<>(s);
> ++        return new SynchronizedSet(s);
> +     }
> + 
> +     static <T> Set<T> synchronizedSet(Set<T> s, Object mutex) {
> +-        return new SynchronizedSet<>(s, mutex);
> ++        return new SynchronizedSet(s, mutex);
> +     }
> + 
> +     /**
> +@@ -1754,7 +1754,7 @@
> +      * @return a synchronized view of the specified sorted set.
> +      */
> +     public static <T> SortedSet<T> synchronizedSortedSet(SortedSet<T> s) {
> +-        return new SynchronizedSortedSet<>(s);
> ++        return new SynchronizedSortedSet(s);
> +     }
> + 
> +     /**
> +@@ -1783,18 +1783,18 @@
> + 
> +         public SortedSet<E> subSet(E fromElement, E toElement) {
> +             synchronized (mutex) {
> +-                return new SynchronizedSortedSet<>(
> ++                return new SynchronizedSortedSet(
> +                     ss.subSet(fromElement, toElement), mutex);
> +             }
> +         }
> +         public SortedSet<E> headSet(E toElement) {
> +             synchronized (mutex) {
> +-                return new SynchronizedSortedSet<>(ss.headSet(toElement), mutex);
> ++                return new SynchronizedSortedSet(ss.headSet(toElement), mutex);
> +             }
> +         }
> +         public SortedSet<E> tailSet(E fromElement) {
> +             synchronized (mutex) {
> +-               return new SynchronizedSortedSet<>(ss.tailSet(fromElement),mutex);
> ++               return new SynchronizedSortedSet(ss.tailSet(fromElement),mutex);
> +             }
> +         }
> + 
> +@@ -1833,14 +1833,14 @@
> +      */
> +     public static <T> List<T> synchronizedList(List<T> list) {
> +         return (list instanceof RandomAccess ?
> +-                new SynchronizedRandomAccessList<>(list) :
> +-                new SynchronizedList<>(list));
> ++                new SynchronizedRandomAccessList(list) :
> ++                new SynchronizedList(list));
> +     }
> + 
> +     static <T> List<T> synchronizedList(List<T> list, Object mutex) {
> +         return (list instanceof RandomAccess ?
> +-                new SynchronizedRandomAccessList<>(list, mutex) :
> +-                new SynchronizedList<>(list, mutex));
> ++                new SynchronizedRandomAccessList(list, mutex) :
> ++                new SynchronizedList(list, mutex));
> +     }
> + 
> +     /**
> +@@ -1903,7 +1903,7 @@
> + 
> +         public List<E> subList(int fromIndex, int toIndex) {
> +             synchronized (mutex) {
> +-                return new SynchronizedList<>(list.subList(fromIndex, toIndex),
> ++                return new SynchronizedList(list.subList(fromIndex, toIndex),
> +                                             mutex);
> +             }
> +         }
> +@@ -1922,7 +1922,7 @@
> +          */
> +         private Object readResolve() {
> +             return (list instanceof RandomAccess
> +-                    ? new SynchronizedRandomAccessList<>(list)
> ++                    ? new SynchronizedRandomAccessList(list)
> +                     : this);
> +         }
> +     }
> +@@ -1944,7 +1944,7 @@
> + 
> +         public List<E> subList(int fromIndex, int toIndex) {
> +             synchronized (mutex) {
> +-                return new SynchronizedRandomAccessList<>(
> ++                return new SynchronizedRandomAccessList(
> +                     list.subList(fromIndex, toIndex), mutex);
> +             }
> +         }
> +@@ -1958,7 +1958,7 @@
> +          * deserialization.
> +          */
> +         private Object writeReplace() {
> +-            return new SynchronizedList<>(list);
> ++            return new SynchronizedList(list);
> +         }
> +     }
> + 
> +@@ -1990,7 +1990,7 @@
> +      * @return a synchronized view of the specified map.
> +      */
> +     public static <K,V> Map<K,V> synchronizedMap(Map<K,V> m) {
> +-        return new SynchronizedMap<>(m);
> ++        return new SynchronizedMap(m);
> +     }
> + 
> +     /**
> +@@ -2051,7 +2051,7 @@
> +         public Set<K> keySet() {
> +             synchronized (mutex) {
> +                 if (keySet==null)
> +-                    keySet = new SynchronizedSet<>(m.keySet(), mutex);
> ++                    keySet = new SynchronizedSet(m.keySet(), mutex);
> +                 return keySet;
> +             }
> +         }
> +@@ -2059,7 +2059,7 @@
> +         public Set<Map.Entry<K,V>> entrySet() {
> +             synchronized (mutex) {
> +                 if (entrySet==null)
> +-                    entrySet = new SynchronizedSet<>(m.entrySet(), mutex);
> ++                    entrySet = new SynchronizedSet(m.entrySet(), mutex);
> +                 return entrySet;
> +             }
> +         }
> +@@ -2067,7 +2067,7 @@
> +         public Collection<V> values() {
> +             synchronized (mutex) {
> +                 if (values==null)
> +-                    values = new SynchronizedCollection<>(m.values(), mutex);
> ++                    values = new SynchronizedCollection(m.values(), mutex);
> +                 return values;
> +             }
> +         }
> +@@ -2129,7 +2129,7 @@
> +      * @return a synchronized view of the specified sorted map.
> +      */
> +     public static <K,V> SortedMap<K,V> synchronizedSortedMap(SortedMap<K,V> m) {
> +-        return new SynchronizedSortedMap<>(m);
> ++        return new SynchronizedSortedMap(m);
> +     }
> + 
> + 
> +@@ -2159,18 +2159,18 @@
> + 
> +         public SortedMap<K,V> subMap(K fromKey, K toKey) {
> +             synchronized (mutex) {
> +-                return new SynchronizedSortedMap<>(
> ++                return new SynchronizedSortedMap(
> +                     sm.subMap(fromKey, toKey), mutex);
> +             }
> +         }
> +         public SortedMap<K,V> headMap(K toKey) {
> +             synchronized (mutex) {
> +-                return new SynchronizedSortedMap<>(sm.headMap(toKey), mutex);
> ++                return new SynchronizedSortedMap(sm.headMap(toKey), mutex);
> +             }
> +         }
> +         public SortedMap<K,V> tailMap(K fromKey) {
> +             synchronized (mutex) {
> +-               return new SynchronizedSortedMap<>(sm.tailMap(fromKey),mutex);
> ++               return new SynchronizedSortedMap(sm.tailMap(fromKey),mutex);
> +             }
> +         }
> + 
> +@@ -2246,7 +2246,7 @@
> +      */
> +     public static <E> Collection<E> checkedCollection(Collection<E> c,
> +                                                       Class<E> type) {
> +-        return new CheckedCollection<>(c, type);
> ++        return new CheckedCollection(c, type);
> +     }
> + 
> +     @SuppressWarnings("unchecked")
> +@@ -2378,7 +2378,7 @@
> +      * @since 1.5
> +      */
> +     public static <E> Set<E> checkedSet(Set<E> s, Class<E> type) {
> +-        return new CheckedSet<>(s, type);
> ++        return new CheckedSet(s, type);
> +     }
> + 
> +     /**
> +@@ -2424,7 +2424,7 @@
> +      */
> +     public static <E> SortedSet<E> checkedSortedSet(SortedSet<E> s,
> +                                                     Class<E> type) {
> +-        return new CheckedSortedSet<>(s, type);
> ++        return new CheckedSortedSet(s, type);
> +     }
> + 
> +     /**
> +@@ -2484,8 +2484,8 @@
> +      */
> +     public static <E> List<E> checkedList(List<E> list, Class<E> type) {
> +         return (list instanceof RandomAccess ?
> +-                new CheckedRandomAccessList<>(list, type) :
> +-                new CheckedList<>(list, type));
> ++                new CheckedRandomAccessList(list, type) :
> ++                new CheckedList(list, type));
> +     }
> + 
> +     /**
> +@@ -2550,7 +2550,7 @@
> +         }
> + 
> +         public List<E> subList(int fromIndex, int toIndex) {
> +-            return new CheckedList<>(list.subList(fromIndex, toIndex), type);
> ++            return new CheckedList(list.subList(fromIndex, toIndex), type);
> +         }
> +     }
> + 
> +@@ -2567,7 +2567,7 @@
> +         }
> + 
> +         public List<E> subList(int fromIndex, int toIndex) {
> +-            return new CheckedRandomAccessList<>(
> ++            return new CheckedRandomAccessList(
> +                 list.subList(fromIndex, toIndex), type);
> +         }
> +     }
> +@@ -2609,7 +2609,7 @@
> +     public static <K, V> Map<K, V> checkedMap(Map<K, V> m,
> +                                               Class<K> keyType,
> +                                               Class<V> valueType) {
> +-        return new CheckedMap<>(m, keyType, valueType);
> ++        return new CheckedMap(m, keyType, valueType);
> +     }
> + 
> + 
> +@@ -2677,14 +2677,14 @@
> +             // - protection from malicious t
> +             // - correct behavior if t is a concurrent map
> +             Object[] entries = t.entrySet().toArray();
> +-            List<Map.Entry<K,V>> checked = new ArrayList<>(entries.length);
> ++            List<Map.Entry<K,V>> checked = new ArrayList(entries.length);
> +             for (Object o : entries) {
> +                 Map.Entry<?,?> e = (Map.Entry<?,?>) o;
> +                 Object k = e.getKey();
> +                 Object v = e.getValue();
> +                 typeCheck(k, v);
> +                 checked.add(
> +-                    new AbstractMap.SimpleImmutableEntry<>((K) k, (V) v));
> ++                    new AbstractMap.SimpleImmutableEntry((K) k, (V) v));
> +             }
> +             for (Map.Entry<K,V> e : checked)
> +                 m.put(e.getKey(), e.getValue());
> +@@ -2694,7 +2694,7 @@
> + 
> +         public Set<Map.Entry<K,V>> entrySet() {
> +             if (entrySet==null)
> +-                entrySet = new CheckedEntrySet<>(m.entrySet(), valueType);
> ++                entrySet = new CheckedEntrySet(m.entrySet(), valueType);
> +             return entrySet;
> +         }
> + 
> +@@ -2809,7 +2809,7 @@
> +                 if (!(o instanceof Map.Entry))
> +                     return false;
> +                 return s.remove(new AbstractMap.SimpleImmutableEntry
> +-                                <>((Map.Entry<?,?>)o));
> ++                                ((Map.Entry<?,?>)o));
> +             }
> + 
> +             public boolean removeAll(Collection<?> c) {
> +@@ -2842,7 +2842,7 @@
> + 
> +             static <K,V,T> CheckedEntry<K,V,T> checkedEntry(Map.Entry<K,V> e,
> +                                                             Class<T> valueType) {
> +-                return new CheckedEntry<>(e, valueType);
> ++                return new CheckedEntry(e, valueType);
> +             }
> + 
> +             /**
> +@@ -2883,7 +2883,7 @@
> +                     if (!(o instanceof Map.Entry))
> +                         return false;
> +                     return e.equals(new AbstractMap.SimpleImmutableEntry
> +-                                    <>((Map.Entry<?,?>)o));
> ++                                    ((Map.Entry<?,?>)o));
> +                 }
> +             }
> +         }
> +@@ -2926,7 +2926,7 @@
> +     public static <K,V> SortedMap<K,V> checkedSortedMap(SortedMap<K, V> m,
> +                                                         Class<K> keyType,
> +                                                         Class<V> valueType) {
> +-        return new CheckedSortedMap<>(m, keyType, valueType);
> ++        return new CheckedSortedMap(m, keyType, valueType);
> +     }
> + 
> +     /**
> +@@ -2992,7 +2992,7 @@
> + 
> +     private static class EmptyIterator<E> implements Iterator<E> {
> +         static final EmptyIterator<Object> EMPTY_ITERATOR
> +-            = new EmptyIterator<>();
> ++            = new EmptyIterator();
> + 
> +         public boolean hasNext() { return false; }
> +         public E next() { throw new NoSuchElementException(); }
> +@@ -3041,7 +3041,7 @@
> +         implements ListIterator<E>
> +     {
> +         static final EmptyListIterator<Object> EMPTY_ITERATOR
> +-            = new EmptyListIterator<>();
> ++            = new EmptyListIterator();
> + 
> +         public boolean hasPrevious() { return false; }
> +         public E previous() { throw new NoSuchElementException(); }
> +@@ -3077,7 +3077,7 @@
> + 
> +     private static class EmptyEnumeration<E> implements Enumeration<E> {
> +         static final EmptyEnumeration<Object> EMPTY_ENUMERATION
> +-            = new EmptyEnumeration<>();
> ++            = new EmptyEnumeration();
> + 
> +         public boolean hasMoreElements() { return false; }
> +         public E nextElement() { throw new NoSuchElementException(); }
> +@@ -3089,7 +3089,7 @@
> +      * @see #emptySet()
> +      */
> +     @SuppressWarnings("unchecked")
> +-    public static final Set EMPTY_SET = new EmptySet<>();
> ++    public static final Set EMPTY_SET = new EmptySet();
> + 
> +     /**
> +      * Returns the empty set (immutable).  This set is serializable.
> +@@ -3149,7 +3149,7 @@
> +      * @see #emptyList()
> +      */
> +     @SuppressWarnings("unchecked")
> +-    public static final List EMPTY_LIST = new EmptyList<>();
> ++    public static final List EMPTY_LIST = new EmptyList();
> + 
> +     /**
> +      * Returns the empty list (immutable).  This list is serializable.
> +@@ -3223,7 +3223,7 @@
> +      * @since 1.3
> +      */
> +     @SuppressWarnings("unchecked")
> +-    public static final Map EMPTY_MAP = new EmptyMap<>();
> ++    public static final Map EMPTY_MAP = new EmptyMap();
> + 
> +     /**
> +      * Returns the empty map (immutable).  This map is serializable.
> +@@ -3285,7 +3285,7 @@
> +      * @return an immutable set containing only the specified object.
> +      */
> +     public static <T> Set<T> singleton(T o) {
> +-        return new SingletonSet<>(o);
> ++        return new SingletonSet(o);
> +     }
> + 
> +     static <E> Iterator<E> singletonIterator(final E e) {
> +@@ -3338,7 +3338,7 @@
> +      * @since 1.3
> +      */
> +     public static <T> List<T> singletonList(T o) {
> +-        return new SingletonList<>(o);
> ++        return new SingletonList(o);
> +     }
> + 
> +     /**
> +@@ -3380,7 +3380,7 @@
> +      * @since 1.3
> +      */
> +     public static <K,V> Map<K,V> singletonMap(K key, V value) {
> +-        return new SingletonMap<>(key, value);
> ++        return new SingletonMap(key, value);
> +     }
> + 
> +     /**
> +@@ -3422,7 +3422,7 @@
> +         public Set<Map.Entry<K,V>> entrySet() {
> +             if (entrySet==null)
> +                 entrySet = Collections.<Map.Entry<K,V>>singleton(
> +-                    new SimpleImmutableEntry<>(k, v));
> ++                    new SimpleImmutableEntry(k, v));
> +             return entrySet;
> +         }
> + 
> +@@ -3454,7 +3454,7 @@
> +     public static <T> List<T> nCopies(int n, T o) {
> +         if (n < 0)
> +             throw new IllegalArgumentException("List length = " + n);
> +-        return new CopiesList<>(n, o);
> ++        return new CopiesList(n, o);
> +     }
> + 
> +     /**
> +@@ -3528,7 +3528,7 @@
> +             if (fromIndex > toIndex)
> +                 throw new IllegalArgumentException("fromIndex(" + fromIndex +
> +                                                    ") > toIndex(" + toIndex + ")");
> +-            return new CopiesList<>(toIndex - fromIndex, element);
> ++            return new CopiesList(toIndex - fromIndex, element);
> +         }
> +     }
> + 
> +@@ -3594,7 +3594,7 @@
> +         if (cmp instanceof ReverseComparator2)
> +             return ((ReverseComparator2<T>)cmp).cmp;
> + 
> +-        return new ReverseComparator2<>(cmp);
> ++        return new ReverseComparator2(cmp);
> +     }
> + 
> +     /**
> +@@ -3673,7 +3673,7 @@
> +      * @see ArrayList
> +      */
> +     public static <T> ArrayList<T> list(Enumeration<T> e) {
> +-        ArrayList<T> l = new ArrayList<>();
> ++        ArrayList<T> l = new ArrayList();
> +         while (e.hasMoreElements())
> +             l.add(e.nextElement());
> +         return l;
> +@@ -3818,7 +3818,7 @@
> +      * @since 1.6
> +      */
> +     public static <E> Set<E> newSetFromMap(Map<E, Boolean> map) {
> +-        return new SetFromMap<>(map);
> ++        return new SetFromMap(map);
> +     }
> + 
> +     /**
> +@@ -3882,7 +3882,7 @@
> +      * @since  1.6
> +      */
> +     public static <T> Queue<T> asLifoQueue(Deque<T> deque) {
> +-        return new AsLIFOQueue<>(deque);
> ++        return new AsLIFOQueue(deque);
> +     }
> + 
> +     /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/Formatter.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Formatter.java
> +@@ -2490,7 +2490,7 @@
> +      * Finds format specifiers in the format string.
> +      */
> +     private FormatString[] parse(String s) {
> +-        ArrayList<FormatString> al = new ArrayList<>();
> ++        ArrayList<FormatString> al = new ArrayList();
> +         Matcher m = fsPattern.matcher(s);
> +         for (int i = 0, len = s.length(); i < len; ) {
> +             if (m.find(i)) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/HashSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/HashSet.java
> +@@ -100,7 +100,7 @@
> +      * default initial capacity (16) and load factor (0.75).
> +      */
> +     public HashSet() {
> +-        map = new HashMap<>();
> ++        map = new HashMap();
> +     }
> + 
> +     /**
> +@@ -113,7 +113,7 @@
> +      * @throws NullPointerException if the specified collection is null
> +      */
> +     public HashSet(Collection<? extends E> c) {
> +-        map = new HashMap<>(Math.max((int) (c.size()/.75f) + 1, 16));
> ++        map = new HashMap(Math.max((int) (c.size()/.75f) + 1, 16));
> +         addAll(c);
> +     }
> + 
> +@@ -127,7 +127,7 @@
> +      *             than zero, or if the load factor is nonpositive
> +      */
> +     public HashSet(int initialCapacity, float loadFactor) {
> +-        map = new HashMap<>(initialCapacity, loadFactor);
> ++        map = new HashMap(initialCapacity, loadFactor);
> +     }
> + 
> +     /**
> +@@ -139,7 +139,7 @@
> +      *             than zero
> +      */
> +     public HashSet(int initialCapacity) {
> +-        map = new HashMap<>(initialCapacity);
> ++        map = new HashMap(initialCapacity);
> +     }
> + 
> +     /**
> +@@ -156,7 +156,7 @@
> +      *             than zero, or if the load factor is nonpositive
> +      */
> +     HashSet(int initialCapacity, float loadFactor, boolean dummy) {
> +-        map = new LinkedHashMap<>(initialCapacity, loadFactor);
> ++        map = new LinkedHashMap(initialCapacity, loadFactor);
> +     }
> + 
> +     /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java
> +@@ -89,7 +89,7 @@
> +      * @return an iterator over the elements contained in this set
> +      */
> +     public Iterator<E> iterator() {
> +-        return new EnumSetIterator<>();
> ++        return new EnumSetIterator();
> +     }
> + 
> +     private class EnumSetIterator<E extends Enum<E>> implements Iterator<E> {
> +--- openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java
> +@@ -538,7 +538,7 @@
> +                     cursor--;
> +                 else {
> +                     if (forgetMeNot == null)
> +-                        forgetMeNot = new ArrayDeque<>();
> ++                        forgetMeNot = new ArrayDeque();
> +                     forgetMeNot.add(moved);
> +                 }
> +             } else if (lastRetElt != null) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/Properties.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Properties.java
> +@@ -1011,7 +1011,7 @@
> +      * @since   1.6
> +      */
> +     public Set<String> stringPropertyNames() {
> +-        Hashtable<String, String> h = new Hashtable<>();
> ++        Hashtable<String, String> h = new Hashtable();
> +         enumerateStringProperties(h);
> +         return h.keySet();
> +     }
> +--- openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java
> +@@ -71,7 +71,7 @@
> +      * @return an iterator over the elements contained in this set
> +      */
> +     public Iterator<E> iterator() {
> +-        return new EnumSetIterator<>();
> ++        return new EnumSetIterator();
> +     }
> + 
> +     private class EnumSetIterator<E extends Enum<E>> implements Iterator<E> {
> +--- openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java
> +@@ -191,7 +191,7 @@
> +     private ClassLoader loader;
> + 
> +     // Cached providers, in instantiation order
> +-    private LinkedHashMap<String,S> providers = new LinkedHashMap<>();
> ++    private LinkedHashMap<String,S> providers = new LinkedHashMap();
> + 
> +     // The current lazy-lookup iterator
> +     private LazyIterator lookupIterator;
> +@@ -291,7 +291,7 @@
> +     {
> +         InputStream in = null;
> +         BufferedReader r = null;
> +-        ArrayList<String> names = new ArrayList<>();
> ++        ArrayList<String> names = new ArrayList();
> +         try {
> +             in = u.openStream();
> +             r = new BufferedReader(new InputStreamReader(in, "utf-8"));
> +@@ -463,7 +463,7 @@
> +     public static <S> ServiceLoader<S> load(Class<S> service,
> +                                             ClassLoader loader)
> +     {
> +-        return new ServiceLoader<>(service, loader);
> ++        return new ServiceLoader(service, loader);
> +     }
> + 
> +     /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java
> +@@ -138,7 +138,7 @@
> +      *        ordering} of the elements will be used.
> +      */
> +     public TreeSet(Comparator<? super E> comparator) {
> +-        this(new TreeMap<>(comparator));
> ++        this(new TreeMap(comparator));
> +     }
> + 
> +     /**
> +@@ -195,7 +195,7 @@
> +      * @since 1.6
> +      */
> +     public NavigableSet<E> descendingSet() {
> +-        return new TreeSet<>(m.descendingMap());
> ++        return new TreeSet(m.descendingMap());
> +     }
> + 
> +     /**
> +@@ -322,7 +322,7 @@
> +      */
> +     public NavigableSet<E> subSet(E fromElement, boolean fromInclusive,
> +                                   E toElement,   boolean toInclusive) {
> +-        return new TreeSet<>(m.subMap(fromElement, fromInclusive,
> ++        return new TreeSet(m.subMap(fromElement, fromInclusive,
> +                                        toElement,   toInclusive));
> +     }
> + 
> +@@ -335,7 +335,7 @@
> +      * @since 1.6
> +      */
> +     public NavigableSet<E> headSet(E toElement, boolean inclusive) {
> +-        return new TreeSet<>(m.headMap(toElement, inclusive));
> ++        return new TreeSet(m.headMap(toElement, inclusive));
> +     }
> + 
> +     /**
> +@@ -347,7 +347,7 @@
> +      * @since 1.6
> +      */
> +     public NavigableSet<E> tailSet(E fromElement, boolean inclusive) {
> +-        return new TreeSet<>(m.tailMap(fromElement, inclusive));
> ++        return new TreeSet(m.tailMap(fromElement, inclusive));
> +     }
> + 
> +     /**
> +@@ -477,7 +477,7 @@
> +             throw new InternalError();
> +         }
> + 
> +-        clone.m = new TreeMap<>(m);
> ++        clone.m = new TreeMap(m);
> +         return clone;
> +     }
> + 
> +@@ -524,9 +524,9 @@
> +         // Create backing TreeMap
> +         TreeMap<E,Object> tm;
> +         if (c==null)
> +-            tm = new TreeMap<>();
> ++            tm = new TreeMap();
> +         else
> +-            tm = new TreeMap<>(c);
> ++            tm = new TreeMap(c);
> +         m = tm;
> + 
> +         // Read in size
> +--- openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java
> +@@ -171,7 +171,7 @@
> +     /**
> +      * Reference queue for cleared WeakEntries
> +      */
> +-    private final ReferenceQueue<Object> queue = new ReferenceQueue<>();
> ++    private final ReferenceQueue<Object> queue = new ReferenceQueue();
> + 
> +     /**
> +      * The number of times this WeakHashMap has been structurally modified.
> +@@ -439,7 +439,7 @@
> + 
> +         modCount++;
> +         Entry<K,V> e = tab[i];
> +-        tab[i] = new Entry<>(k, value, queue, h, e);
> ++        tab[i] = new Entry(k, value, queue, h, e);
> +         if (++size >= threshold)
> +             resize(tab.length * 2);
> +         return null;
> +@@ -955,9 +955,9 @@
> +         }
> + 
> +         private List<Map.Entry<K,V>> deepCopy() {
> +-            List<Map.Entry<K,V>> list = new ArrayList<>(size());
> ++            List<Map.Entry<K,V>> list = new ArrayList(size());
> +             for (Map.Entry<K,V> e : this)
> +-                list.add(new AbstractMap.SimpleEntry<>(e));
> ++                list.add(new AbstractMap.SimpleEntry(e));
> +             return list;
> +         }
> + 
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java
> +@@ -127,7 +127,7 @@
> +     private FileOutputStream lockStream;
> +     private File files[];
> +     private static final int MAX_LOCKS = 100;
> +-    private static java.util.HashMap<String, String> locks = new java.util.HashMap<>();
> ++    private static java.util.HashMap<String, String> locks = new java.util.HashMap();
> + 
> +     // A metered stream is a subclass of OutputStream that
> +     //   (a) forwards all its output to a target stream
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java
> +@@ -59,7 +59,7 @@
> +  */
> + 
> + public class Level implements java.io.Serializable {
> +-    private static java.util.ArrayList<Level> known = new java.util.ArrayList<>();
> ++    private static java.util.ArrayList<Level> known = new java.util.ArrayList();
> +     private static String defaultBundle = "sun.util.logging.resources.logging";
> + 
> +     /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java
> +@@ -156,7 +156,7 @@
> +     private final static Level defaultLevel = Level.INFO;
> + 
> +     // Table of named Loggers that maps names to Loggers.
> +-    private Hashtable<String,LoggerWeakRef> namedLoggers = new Hashtable<>();
> ++    private Hashtable<String,LoggerWeakRef> namedLoggers = new Hashtable();
> +     // Tree of named Loggers
> +     private LogNode root = new LogNode(null);
> +     private Logger rootLogger;
> +@@ -421,7 +421,7 @@
> +     // loggerRefQueue holds LoggerWeakRef objects for Logger objects
> +     // that have been GC'ed.
> +     private final ReferenceQueue<Logger> loggerRefQueue
> +-        = new ReferenceQueue<>();
> ++        = new ReferenceQueue();
> + 
> +     // Package-level inner class.
> +     // Helper class for managing WeakReferences to Logger objects.
> +@@ -671,7 +671,7 @@
> +                 name = "";
> +             }
> +             if (node.children == null) {
> +-                node.children = new HashMap<>();
> ++                node.children = new HashMap();
> +             }
> +             LogNode child = node.children.get(head);
> +             if (child == null) {
> +@@ -855,7 +855,7 @@
> +         }
> +         hands = hands.trim();
> +         int ix = 0;
> +-        Vector<String> result = new Vector<>();
> ++        Vector<String> result = new Vector();
> +         while (ix < hands.length()) {
> +             int end = ix;
> +             while (end < hands.length()) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java
> +@@ -85,7 +85,7 @@
> +     private static final AtomicInteger nextThreadId
> +         = new AtomicInteger(MIN_SEQUENTIAL_THREAD_ID);
> + 
> +-    private static final ThreadLocal<Integer> threadIds = new ThreadLocal<>();
> ++    private static final ThreadLocal<Integer> threadIds = new ThreadLocal();
> + 
> +     /**
> +      * @serial Logging message level
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java
> +@@ -170,7 +170,7 @@
> +     private LogManager manager;
> +     private String name;
> +     private final CopyOnWriteArrayList<Handler> handlers =
> +-        new CopyOnWriteArrayList<>();
> ++        new CopyOnWriteArrayList();
> +     private String resourceBundleName;
> +     private volatile boolean useParentHandlers = true;
> +     private volatile Filter filter;
> +@@ -1420,13 +1420,13 @@
> +             // Set our new parent.
> +             parent = newParent;
> +             if (parent.kids == null) {
> +-                parent.kids = new ArrayList<>(2);
> ++                parent.kids = new ArrayList(2);
> +             }
> +             if (ref == null) {
> +                 // we didn't have a previous parent
> +                 ref = manager.new LoggerWeakRef(this);
> +             }
> +-            ref.setParentRef(new WeakReference<>(parent));
> ++            ref.setParentRef(new WeakReference(parent));
> +             parent.kids.add(ref);
> + 
> +             // As a result of the reparenting, the effective level
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java
> +@@ -56,7 +56,7 @@
> + 
> +     public List<String> getLoggerNames() {
> +         Enumeration loggers = logManager.getLoggerNames();
> +-        ArrayList<String> array = new ArrayList<>();
> ++        ArrayList<String> array = new ArrayList();
> + 
> +         for (; loggers.hasMoreElements();) {
> +             array.add((String) loggers.nextElement());
> +--- openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java
> +@@ -155,7 +155,7 @@
> +      * All known unremoved children of this node.  (This "cache" is consulted
> +      * prior to calling childSpi() or getChild().
> +      */
> +-    private Map<String, AbstractPreferences> kidCache = new HashMap<>();
> ++    private Map<String, AbstractPreferences> kidCache = new HashMap();
> + 
> +     /**
> +      * This field is used to keep track of whether or not this node has
> +@@ -712,7 +712,7 @@
> +             if (removed)
> +                 throw new IllegalStateException("Node has been removed.");
> + 
> +-            Set<String> s = new TreeSet<>(kidCache.keySet());
> ++            Set<String> s = new TreeSet(kidCache.keySet());
> +             for (String kid : childrenNamesSpi())
> +                 s.add(kid);
> +             return s.toArray(EMPTY_STRING_ARRAY);
> +@@ -1441,7 +1441,7 @@
> +      * event delivery from preference activity, greatly simplifying
> +      * locking and reducing opportunity for deadlock.
> +      */
> +-    private static final List<EventObject> eventQueue = new LinkedList<>();
> ++    private static final List<EventObject> eventQueue = new LinkedList();
> + 
> +     /**
> +      * These two classes are used to distinguish NodeChangeEvents on
> +--- openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java
> +@@ -314,7 +314,7 @@
> +  *     <td headers="matches">Nothing, but quotes all characters until <tt>\E</tt></td></tr>
> +  * <tr><td valign="top" headers="construct quot"><tt>\E</tt></td>
> +  *     <td headers="matches">Nothing, but ends quoting started by <tt>\Q</tt></td></tr>
> +- *     <!-- Metachars: !$()*+.<>?[\]^{|} -->
> ++ *     <!-- Metachars: !$()*+.()?[\]^{|} -->
> +  *
> +  * <tr><th>&nbsp;</th></tr>
> +  * <tr align="left"><th colspan="2" id="special">Special constructs (named-capturing and non-capturing)</th></tr>
> +@@ -1068,7 +1068,7 @@
> +     public String[] split(CharSequence input, int limit) {
> +         int index = 0;
> +         boolean matchLimited = limit > 0;
> +-        ArrayList<String> matchList = new ArrayList<>();
> ++        ArrayList<String> matchList = new ArrayList();
> +         Matcher m = matcher(input);
> + 
> +         // Add segments before each match found
> +@@ -1566,7 +1566,7 @@
> + 
> +     Map<String, Integer> namedGroups() {
> +         if (namedGroups == null)
> +-            namedGroups = new HashMap<>(2);
> ++            namedGroups = new HashMap(2);
> +         return namedGroups;
> +     }
> + 
> +@@ -5309,7 +5309,7 @@
> +         }
> + 
> +         private static final HashMap<String, CharPropertyFactory> map
> +-            = new HashMap<>();
> ++            = new HashMap();
> + 
> +         static {
> +             // Unicode character property aliases, defined in
> +--- openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java
> +@@ -52,8 +52,8 @@
> +     }
> + 
> +     private XEntry current;
> +-    private Vector<XEntry> xentries = new Vector<>();
> +-    private HashSet<String> names = new HashSet<>();
> ++    private Vector<XEntry> xentries = new Vector();
> ++    private HashSet<String> names = new HashSet();
> +     private CRC32 crc = new CRC32();
> +     private long written = 0;
> +     private long locoff = 0;
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java
> +@@ -469,7 +469,7 @@
> + 
> +     void readInnerClasses(Class cls) throws IOException {
> +         int nc = readUnsignedShort();
> +-        ArrayList<InnerClass> ics = new ArrayList<>(nc);
> ++        ArrayList<InnerClass> ics = new ArrayList(nc);
> +         for (int i = 0; i < nc; i++) {
> +             InnerClass ic =
> +                 new InnerClass(readClassRef(),
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java
> +@@ -45,7 +45,7 @@
> +     private final ArrayList<E> flist;
> + 
> +     protected FixedList(int capacity) {
> +-        flist = new ArrayList<>(capacity);
> ++        flist = new ArrayList(capacity);
> +         // initialize the list to null
> +         for (int i = 0 ; i < capacity ; i++) {
> +             flist.add(null);
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Character.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Character.java
> +@@ -648,7 +648,7 @@
> +      */
> +     public static final class UnicodeBlock extends Subset {
> + 
> +-        private static Map<String, UnicodeBlock> map = new HashMap<>(256);
> ++        private static Map<String, UnicodeBlock> map = new HashMap(256);
> + 
> +         /**
> +          * Creates a UnicodeBlock with the given identifier name.
> +@@ -4177,7 +4177,7 @@
> + 
> +         private static HashMap<String, Character.UnicodeScript> aliases;
> +         static {
> +-            aliases = new HashMap<>(128);
> ++            aliases = new HashMap(128);
> +             aliases.put("ARAB", ARABIC);
> +             aliases.put("ARMI", IMPERIAL_ARAMAIC);
> +             aliases.put("ARMN", ARMENIAN);
> +--- openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java
> +@@ -81,7 +81,7 @@
> +             } while (cpOff < cpEnd);
> +             strPool = new byte[total - cpEnd];
> +             dis.readFully(strPool);
> +-            refStrPool = new SoftReference<>(strPool);
> ++            refStrPool = new SoftReference(strPool);
> +         } catch (Exception x) {
> +             throw new InternalError(x.getMessage());
> +         } finally {
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Package.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Package.java
> +@@ -588,13 +588,13 @@
> +     }
> + 
> +     // The map of loaded system packages
> +-    private static Map<String, Package> pkgs = new HashMap<>(31);
> ++    private static Map<String, Package> pkgs = new HashMap(31);
> + 
> +     // Maps each directory or zip file name to its corresponding url
> +-    private static Map<String, URL> urls = new HashMap<>(10);
> ++    private static Map<String, URL> urls = new HashMap(10);
> + 
> +     // Maps each code source url for a jar file to its manifest
> +-    private static Map<String, Manifest> mans = new HashMap<>(10);
> ++    private static Map<String, Manifest> mans = new HashMap(10);
> + 
> +     private static native String getSystemPackage0(String name);
> +     private static native String[] getSystemPackages0();
> +--- openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java
> +@@ -214,7 +214,7 @@
> +      * @param command a string array containing the program and its arguments
> +      */
> +     public ProcessBuilder(String... command) {
> +-        this.command = new ArrayList<>(command.length);
> ++        this.command = new ArrayList(command.length);
> +         for (String arg : command)
> +             this.command.add(arg);
> +     }
> +@@ -251,7 +251,7 @@
> +      * @return this process builder
> +      */
> +     public ProcessBuilder command(String... command) {
> +-        this.command = new ArrayList<>(command.length);
> ++        this.command = new ArrayList(command.length);
> +         for (String arg : command)
> +             this.command.add(arg);
> +         return this;
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java
> +@@ -828,7 +828,7 @@
> +                 // Use the sentinel for a zero-length list
> +                 suppressed = SUPPRESSED_SENTINEL;
> +             } else { // Copy Throwables to new list
> +-                suppressed = new ArrayList<>(1);
> ++                suppressed = new ArrayList(1);
> +                 for (Throwable t : suppressedExceptions) {
> +                     // Enforce constraints on suppressed exceptions in
> +                     // case of corrupt or malicious stream.
> +@@ -911,7 +911,7 @@
> +                 return;
> + 
> +             if (suppressedExceptions == SUPPRESSED_SENTINEL)
> +-                suppressedExceptions = new ArrayList<>(1);
> ++                suppressedExceptions = new ArrayList(1);
> + 
> +             assert suppressedExceptions != SUPPRESSED_SENTINEL;
> + 
> +--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java
> +@@ -144,7 +144,7 @@
> +         // which implicitly requires that new java.lang.reflect
> +         // objects be fabricated for each reflective call on Class
> +         // objects.)
> +-        Constructor<T> res = new Constructor<>(clazz,
> ++        Constructor<T> res = new Constructor(clazz,
> +                                                 parameterTypes,
> +                                                 exceptionTypes, modifiers, slot,
> +                                                 signature,
> +--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java
> +@@ -84,7 +84,7 @@
> +                                              byte[] annotations,
> +                                              byte[] parameterAnnotations)
> +     {
> +-        return new Constructor<>(declaringClass,
> ++        return new Constructor(declaringClass,
> +                                   parameterTypes,
> +                                   checkedExceptions,
> +                                   modifiers,
> +--- openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java
> +@@ -482,8 +482,8 @@
> +      */
> +     public List<E> subList(int fromIndex, int toIndex) {
> +         return (this instanceof RandomAccess ?
> +-                new RandomAccessSubList<>(this, fromIndex, toIndex) :
> +-                new SubList<>(this, fromIndex, toIndex));
> ++                new RandomAccessSubList(this, fromIndex, toIndex) :
> ++                new SubList(this, fromIndex, toIndex));
> +     }
> + 
> +     // Comparison and hashing
> +@@ -747,7 +747,7 @@
> +     }
> + 
> +     public List<E> subList(int fromIndex, int toIndex) {
> +-        return new SubList<>(this, fromIndex, toIndex);
> ++        return new SubList(this, fromIndex, toIndex);
> +     }
> + 
> +     private void rangeCheck(int index) {
> +@@ -776,6 +776,6 @@
> +     }
> + 
> +     public List<E> subList(int fromIndex, int toIndex) {
> +-        return new RandomAccessSubList<>(this, fromIndex, toIndex);
> ++        return new RandomAccessSubList(this, fromIndex, toIndex);
> +     }
> + }
> +--- openjdk-boot/jdk/src/share/classes/java/util/Arrays.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Arrays.java
> +@@ -2824,7 +2824,7 @@
> +      * @return a list view of the specified array
> +      */
> +     public static <T> List<T> asList(T... a) {
> +-        return new ArrayList<>(a);
> ++        return new ArrayList(a);
> +     }
> + 
> +     /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java
> +@@ -499,7 +499,7 @@
> +             int j = 0;
> +             for (int i = 0; i < vals.length; i++)
> +                 if (vals[i] != null)
> +-                    a[j++] = new AbstractMap.SimpleEntry<>(
> ++                    a[j++] = new AbstractMap.SimpleEntry(
> +                         keyUniverse[i], unmaskNull(vals[i]));
> +             return a;
> +         }
> +--- openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java
> +@@ -110,9 +110,9 @@
> +             throw new ClassCastException(elementType + " not an enum");
> + 
> +         if (universe.length <= 64)
> +-            return new RegularEnumSet<>(elementType, universe);
> ++            return new RegularEnumSet(elementType, universe);
> +         else
> +-            return new JumboEnumSet<>(elementType, universe);
> ++            return new JumboEnumSet(elementType, universe);
> +     }
> + 
> +     /**
> +@@ -430,7 +430,7 @@
> +     }
> + 
> +     Object writeReplace() {
> +-        return new SerializationProxy<>(this);
> ++        return new SerializationProxy(this);
> +     }
> + 
> +     // readObject method for the serialization proxy pattern
> +--- openjdk-boot/jdk/src/share/classes/java/util/HashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/HashMap.java
> +@@ -763,7 +763,7 @@
> +      */
> +     void addEntry(int hash, K key, V value, int bucketIndex) {
> +         Entry<K,V> e = table[bucketIndex];
> +-        table[bucketIndex] = new Entry<>(hash, key, value, e);
> ++        table[bucketIndex] = new Entry(hash, key, value, e);
> +         if (size++ >= threshold)
> +             resize(2 * table.length);
> +     }
> +@@ -778,7 +778,7 @@
> +      */
> +     void createEntry(int hash, K key, V value, int bucketIndex) {
> +         Entry<K,V> e = table[bucketIndex];
> +-        table[bucketIndex] = new Entry<>(hash, key, value, e);
> ++        table[bucketIndex] = new Entry(hash, key, value, e);
> +         size++;
> +     }
> + 
> +--- openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java
> +@@ -455,7 +455,7 @@
> + 
> +         // Creates the new entry.
> +         Entry<K,V> e = tab[index];
> +-        tab[index] = new Entry<>(hash, key, value, e);
> ++        tab[index] = new Entry(hash, key, value, e);
> +         count++;
> +         return null;
> +     }
> +@@ -579,7 +579,7 @@
> +         if (count == 0) {
> +             return Collections.emptyEnumeration();
> +         } else {
> +-            return new Enumerator<>(type, false);
> ++            return new Enumerator(type, false);
> +         }
> +     }
> + 
> +@@ -587,7 +587,7 @@
> +         if (count == 0) {
> +             return Collections.emptyIterator();
> +         } else {
> +-            return new Enumerator<>(type, true);
> ++            return new Enumerator(type, true);
> +         }
> +     }
> + 
> +@@ -929,7 +929,7 @@
> +         }
> +         // Creates the new entry.
> +         Entry<K,V> e = tab[index];
> +-        tab[index] = new Entry<>(hash, key, value, e);
> ++        tab[index] = new Entry(hash, key, value, e);
> +         count++;
> +     }
> + 
> +@@ -950,7 +950,7 @@
> +         }
> + 
> +         protected Object clone() {
> +-            return new Entry<>(hash, key, value,
> ++            return new Entry(hash, key, value,
> +                                   (next==null ? null : (Entry<K,V>) next.clone()));
> +         }
> + 
> +--- openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java
> +@@ -1134,7 +1134,7 @@
> +             Object[] result = new Object[size];
> +             Iterator<Map.Entry<K,V>> it = iterator();
> +             for (int i = 0; i < size; i++)
> +-                result[i] = new AbstractMap.SimpleEntry<>(it.next());
> ++                result[i] = new AbstractMap.SimpleEntry(it.next());
> +             return result;
> +         }
> + 
> +@@ -1146,7 +1146,7 @@
> +                     .newInstance(a.getClass().getComponentType(), size);
> +             Iterator<Map.Entry<K,V>> it = iterator();
> +             for (int i = 0; i < size; i++)
> +-                a[i] = (T) new AbstractMap.SimpleEntry<>(it.next());
> ++                a[i] = (T) new AbstractMap.SimpleEntry(it.next());
> +             if (a.length > size)
> +                 a[size] = null;
> +             return a;
> +--- openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java
> +@@ -237,7 +237,7 @@
> +      * the chain.
> +      */
> +     void init() {
> +-        header = new Entry<>(-1, null, null, null);
> ++        header = new Entry(-1, null, null, null);
> +         header.before = header.after = header;
> +     }
> + 
> +@@ -438,7 +438,7 @@
> +      */
> +     void createEntry(int hash, K key, V value, int bucketIndex) {
> +         HashMap.Entry<K,V> old = table[bucketIndex];
> +-        Entry<K,V> e = new Entry<>(hash, key, value, old);
> ++        Entry<K,V> e = new Entry(hash, key, value, old);
> +         table[bucketIndex] = e;
> +         e.addBefore(header);
> +         size++;
> +--- openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java
> +@@ -122,7 +122,7 @@
> +      */
> +     private void linkFirst(E e) {
> +         final Node<E> f = first;
> +-        final Node<E> newNode = new Node<>(null, e, f);
> ++        final Node<E> newNode = new Node(null, e, f);
> +         first = newNode;
> +         if (f == null)
> +             last = newNode;
> +@@ -137,7 +137,7 @@
> +      */
> +     void linkLast(E e) {
> +         final Node<E> l = last;
> +-        final Node<E> newNode = new Node<>(l, e, null);
> ++        final Node<E> newNode = new Node(l, e, null);
> +         last = newNode;
> +         if (l == null)
> +             first = newNode;
> +@@ -153,7 +153,7 @@
> +     void linkBefore(E e, Node<E> succ) {
> +         // assert succ != null;
> +         final Node<E> pred = succ.prev;
> +-        final Node<E> newNode = new Node<>(pred, e, succ);
> ++        final Node<E> newNode = new Node(pred, e, succ);
> +         succ.prev = newNode;
> +         if (pred == null)
> +             first = newNode;
> +@@ -419,7 +419,7 @@
> + 
> +         for (Object o : a) {
> +             @SuppressWarnings("unchecked") E e = (E) o;
> +-            Node<E> newNode = new Node<>(pred, e, null);
> ++            Node<E> newNode = new Node(pred, e, null);
> +             if (pred == null)
> +                 first = newNode;
> +             else
> +--- openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java
> +@@ -187,7 +187,7 @@
> +             return;
> + 
> +         Object[][] contents = getContents();
> +-        HashMap<String,Object> temp = new HashMap<>(contents.length);
> ++        HashMap<String,Object> temp = new HashMap(contents.length);
> +         for (int i = 0; i < contents.length; ++i) {
> +             // key must be non-null String, value must be non-null
> +             String key = (String) contents[i][0];
> +--- openjdk-boot/jdk/src/share/classes/java/util/TimSort.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/TimSort.java
> +@@ -196,7 +196,7 @@
> +          * extending short natural runs to minRun elements, and merging runs
> +          * to maintain stack invariant.
> +          */
> +-        TimSort<T> ts = new TimSort<>(a, c);
> ++        TimSort<T> ts = new TimSort(a, c);
> +         int minRun = minRunLength(nRemaining);
> +         do {
> +             // Identify next run
> +--- openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java
> +@@ -533,7 +533,7 @@
> +             // throw NullPointerException
> +             //
> +             // compare(key, key); // type check
> +-            root = new Entry<>(key, value, null);
> ++            root = new Entry(key, value, null);
> +             size = 1;
> +             modCount++;
> +             return null;
> +@@ -569,7 +569,7 @@
> +                     return t.setValue(value);
> +             } while (t != null);
> +         }
> +-        Entry<K,V> e = new Entry<>(key, value, parent);
> ++        Entry<K,V> e = new Entry(key, value, parent);
> +         if (cmp < 0)
> +             parent.left = e;
> +         else
> +@@ -1069,14 +1069,14 @@
> +         }
> +         public NavigableSet<E> subSet(E fromElement, boolean fromInclusive,
> +                                       E toElement,   boolean toInclusive) {
> +-            return new KeySet<>(m.subMap(fromElement, fromInclusive,
> ++            return new KeySet(m.subMap(fromElement, fromInclusive,
> +                                           toElement,   toInclusive));
> +         }
> +         public NavigableSet<E> headSet(E toElement, boolean inclusive) {
> +-            return new KeySet<>(m.headMap(toElement, inclusive));
> ++            return new KeySet(m.headMap(toElement, inclusive));
> +         }
> +         public NavigableSet<E> tailSet(E fromElement, boolean inclusive) {
> +-            return new KeySet<>(m.tailMap(fromElement, inclusive));
> ++            return new KeySet(m.tailMap(fromElement, inclusive));
> +         }
> +         public SortedSet<E> subSet(E fromElement, E toElement) {
> +             return subSet(fromElement, true, toElement, false);
> +@@ -1205,7 +1205,7 @@
> +      */
> +     static <K,V> Map.Entry<K,V> exportEntry(TreeMap.Entry<K,V> e) {
> +         return (e == null) ? null :
> +-            new AbstractMap.SimpleImmutableEntry<>(e);
> ++            new AbstractMap.SimpleImmutableEntry(e);
> +     }
> + 
> +     /**
> +@@ -2406,7 +2406,7 @@
> +             value = (defaultVal != null ? defaultVal : (V) str.readObject());
> +         }
> + 
> +-        Entry<K,V> middle =  new Entry<>(key, value, null);
> ++        Entry<K,V> middle =  new Entry(key, value, null);
> + 
> +         // color nodes in non-full bottommost level red
> +         if (level == redLevel)
> +--- openjdk-boot/jdk/src/share/classes/sun/io/Converters.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/io/Converters.java
> +@@ -120,7 +120,7 @@
> + 
> +     private static Class<?> cache(int type, Object encoding, Class<?> c) {
> +         SoftReference<Object[]>[] srs = classCache[type];
> +-        srs[CACHE_SIZE - 1] = new SoftReference<>(new Object[] { c, encoding });
> ++        srs[CACHE_SIZE - 1] = new SoftReference(new Object[] { c, encoding });
> +         moveToFront(srs, CACHE_SIZE - 1);
> +         return c;
> +     }
> +--- openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java
> +@@ -68,7 +68,7 @@
> +         // We cache the C environment.  This means that subsequent calls
> +         // to putenv/setenv from C will not be visible from Java code.
> +         byte[][] environ = environ();
> +-        theEnvironment = new HashMap<>(environ.length/2 + 3);
> ++        theEnvironment = new HashMap(environ.length/2 + 3);
> +         // Read environment variables back to front,
> +         // so that earlier variables override later ones.
> +         for (int i = environ.length-1; i > 0; i-=2)
> +--- openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java
> +@@ -354,7 +354,7 @@
> +      * log against that map.  The resulting map is then written back
> +      * to the disk.
> +      */
> +-    final List<Change> changeLog = new ArrayList<>();
> ++    final List<Change> changeLog = new ArrayList();
> + 
> +     /**
> +      * Represents a change to a preference.
> +@@ -507,7 +507,7 @@
> +         });
> +         if (newNode) {
> +             // These 2 things guarantee node will get wrtten at next flush/sync
> +-            prefsCache = new TreeMap<>();
> ++            prefsCache = new TreeMap();
> +             nodeCreate = new NodeCreate();
> +             changeLog.add(nodeCreate);
> +         }
> +@@ -550,7 +550,7 @@
> +             loadCache();
> +         } catch(Exception e) {
> +             // assert lastSyncTime == 0;
> +-            prefsCache = new TreeMap<>();
> ++            prefsCache = new TreeMap();
> +         }
> +     }
> + 
> +@@ -567,7 +567,7 @@
> +             AccessController.doPrivileged(
> +                 new PrivilegedExceptionAction<Void>() {
> +                 public Void run() throws BackingStoreException {
> +-                    Map<String, String> m = new TreeMap<>();
> ++                    Map<String, String> m = new TreeMap();
> +                     long newLastSyncTime = 0;
> +                     try {
> +                         newLastSyncTime = prefsFile.lastModified();
> +@@ -581,7 +581,7 @@
> +                             prefsFile.renameTo( new File(
> +                                                     prefsFile.getParentFile(),
> +                                                   "IncorrectFormatPrefs.xml"));
> +-                            m = new TreeMap<>();
> ++                            m = new TreeMap();
> +                         } else if (e instanceof FileNotFoundException) {
> +                         getLogger().warning("Prefs file removed in background "
> +                                            + prefsFile.getPath());
> +@@ -646,7 +646,7 @@
> +         return AccessController.doPrivileged(
> +             new PrivilegedAction<String[]>() {
> +                 public String[] run() {
> +-                    List<String> result = new ArrayList<>();
> ++                    List<String> result = new ArrayList();
> +                     File[] dirContents = dir.listFiles();
> +                     if (dirContents != null) {
> +                         for (int i = 0; i < dirContents.length; i++)
> +@@ -794,7 +794,7 @@
> +         } else if (lastSyncTime != 0 && !dir.exists()) {
> +             // This node was removed in the background.  Playback any changes
> +             // against a virgin (empty) Map.
> +-            prefsCache = new TreeMap<>();
> ++            prefsCache = new TreeMap();
> +             replayChanges();
> +         }
> +         if (!changeLog.isEmpty()) {
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/ecj-stringswitch.patch
> --- a/patches/boot/ecj-stringswitch.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/ecj-stringswitch.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -r c981a387cd86 src/share/classes/com/sun/security/ntlm/NTLM.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java	Mon Nov 22 21:55:09 2010 +0000
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java	Wed Nov 24 00:34:39 2010 +0000
> +--- openjdk-boot/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java
>  @@ -64,17 +64,23 @@
>   
>       protected NTLM(String version) throws NTLMException {
> @@ -36,3 +35,161 @@
>           try {
>               fac = SecretKeyFactory.getInstance ("DES");
>               cipher = Cipher.getInstance ("DES/ECB/NoPadding");
> +--- openjdk-boot/jdk/src/share/classes/sun/security/util/DisabledAlgorithmConstraints.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/security/util/DisabledAlgorithmConstraints.java
> +@@ -383,18 +383,17 @@
> +             GE;         // ">="
> + 
> +             static Operator of(String s) {
> +-                switch (s) {
> +-                    case "==":
> ++                if (s.equals("==")) {
> +                         return EQ;
> +-                    case "!=":
> ++                } else if (s.equals("!=")) {
> +                         return NE;
> +-                    case "<":
> ++                } else if (s.equals("<")) {
> +                         return LT;
> +-                    case "<=":
> ++                } else if (s.equals("<=")) {
> +                         return LE;
> +-                    case ">":
> ++                } else if (s.equals(">")) {
> +                         return GT;
> +-                    case ">=":
> ++                } else if (s.equals(">=")) {
> +                         return GE;
> +                 }
> + 
> +--- openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java
> +@@ -114,23 +114,18 @@
> +         String optStr = (opts.length > 1 && opts[1] != null)
> +                 ? opts[1].trim()
> +                 : "all";
> +-        switch (optStr) {
> +-            case "vm":
> ++        if (optStr.equals("vm")) {
> +                 printVmSettings(ostream, initialHeapSize, maxHeapSize,
> +                         stackSize, isServer);
> +-                break;
> +-            case "properties":
> ++        } else if (optStr.equals("properties")) {
> +                 printProperties(ostream);
> +-                break;
> +-            case "locale":
> ++        } else if (optStr.equals("locale")) {
> +                 printLocale(ostream);
> +-                break;
> +-            default:
> ++        } else {
> +                 printVmSettings(ostream, initialHeapSize, maxHeapSize,
> +                         stackSize, isServer);
> +                 printProperties(ostream);
> +                 printLocale(ostream);
> +-                break;
> +         }
> +     }
> + 
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java
> +@@ -1116,30 +1116,25 @@
> +         // what is one of { Debug, Compile, Constant, Exceptions, InnerClasses }
> +         if (verbose > 0)
> +             Utils.log.info("Stripping "+what.toLowerCase()+" data and attributes...");
> +-        switch (what) {
> +-            case "Debug":
> ++        if (what.equals("Debug")) {
> +                 strip("SourceFile");
> +                 strip("LineNumberTable");
> +                 strip("LocalVariableTable");
> +                 strip("LocalVariableTypeTable");
> +-                break;
> +-            case "Compile":
> ++        } else if (what.equals("Compile")) {
> +                 // Keep the inner classes normally.
> +                 // Although they have no effect on execution,
> +                 // the Reflection API exposes them, and JCK checks them.
> +                 // NO: // strip("InnerClasses");
> +                 strip("Deprecated");
> +                 strip("Synthetic");
> +-                break;
> +-            case "Exceptions":
> ++        } else if (what.equals("Exceptions")) {
> +                 // Keep the exceptions normally.
> +                 // Although they have no effect on execution,
> +                 // the Reflection API exposes them, and JCK checks them.
> +                 strip("Exceptions");
> +-                break;
> +-            case "Constant":
> ++        } else if (what.equals("Constant")) {
> +                 stripConstantFields();
> +-                break;
> +         }
> +     }
> + 
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java
> +@@ -351,16 +351,14 @@
> +                 Object lkey = Attribute.keyForLookup(ctype, name);
> +                 String cmd = (String) attrCommands.get(lkey);
> +                 if (cmd != null) {
> +-                    switch (cmd) {
> +-                        case "pass":
> ++                    if (cmd.equals("pass")) {
> +                             String message1 = "passing attribute bitwise in " + h;
> +                             throw new Attribute.FormatException(message1, ctype, name, cmd);
> +-                        case "error":
> ++                    } else if (cmd.equals("error")) {
> +                             String message2 = "attribute not allowed in " + h;
> +                             throw new Attribute.FormatException(message2, ctype, name, cmd);
> +-                        case "strip":
> ++                    } else if (cmd.equals("strip")) {
> +                             skip(length, name + " attribute in " + h);
> +-                            continue;
> +                     }
> +                 }
> +             }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java
> +@@ -71,15 +71,12 @@
> +         {
> +             // Non-standard, undocumented "--unpack" switch enables unpack mode.
> +             String arg0 = av.isEmpty() ? "" : av.get(0);
> +-            switch (arg0) {
> +-                case "--pack":
> ++            if (arg0.equals("--pack")) {
> +                 av.remove(0);
> +-                    break;
> +-                case "--unpack":
> ++            } else if (arg0.equals("--unpack")) {
> +                 av.remove(0);
> +                 doPack = false;
> +                 doUnpack = true;
> +-                    break;
> +             }
> +         }
> + 
> +@@ -180,17 +177,13 @@
> +         // Deal with remaining non-engine properties:
> +         for (String opt : avProps.keySet()) {
> +             String val = avProps.get(opt);
> +-            switch (opt) {
> +-                case "--repack":
> ++            if (opt.equals("--repack")) {
> +                     doRepack = true;
> +-                    break;
> +-                case "--no-gzip":
> ++            } else if (opt.equals("--no-gzip")) {
> +                     doZip = (val == null);
> +-                    break;
> +-                case "--log-file=":
> ++            } else if (opt.equals("--log-file=")) {
> +                     logFile = val;
> +-                    break;
> +-                default:
> ++            } else {
> +                     throw new InternalError(MessageFormat.format(
> +                             RESOURCE.getString(DriverResource.BAD_OPTION),
> +                             opt, avProps.get(opt)));
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/fontconfig.patch
> --- a/patches/boot/fontconfig.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/fontconfig.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk-boot.orig/jdk/make/sun/awt/Makefile openjdk-boot/jdk/make/sun/awt/Makefile
> ---- openjdk-boot.orig/jdk/make/sun/awt/Makefile	2010-03-02 18:01:28.000000000 +0000
> -+++ openjdk-boot/jdk/make/sun/awt/Makefile	2010-03-02 18:01:21.000000000 +0000
> -@@ -402,11 +402,9 @@
> +--- openjdk-boot/jdk/make/sun/awt/Makefile.orig
> ++++ openjdk-boot/jdk/make/sun/awt/Makefile
> +@@ -407,11 +407,9 @@
>   
>   COMPILEFONTCONFIG_JARFILE = $(BUILDTOOLJARDIR)/compilefontconfig.jar
>   
> @@ -9,7 +8,7 @@
>  -    $(COMPILEFONTCONFIG_JARFILE)
>  +$(LIBDIR)/%.bfc: $(GENSRCDIR)/fontconfig/%.bfc
>   	$(prep-target)
> --	$(BOOT_JAVA_CMD) -jar $(COMPILEFONTCONFIG_JARFILE) $< $@
> +-	$(BOOT_JAVA_CMD) -jar $(COMPILEFONTCONFIG_JARFILE) $(COMPILEFONTCONFIG_FLAGS) $< $@
>  -	$(install-module-file)
>  +	$(install-file)
>   	$(call chmod-file, 444)
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/revert-6941137.patch
> --- a/patches/boot/revert-6941137.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/revert-6941137.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,10 +1,9 @@
> -diff -r c981a387cd86 src/share/classes/sun/util/calendar/ZoneInfoFile.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java	Mon Nov 22 21:55:09 2010 +0000
> -+++ openjdk-boot/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java	Tue Nov 23 23:05:24 2010 +0000
> -@@ -486,7 +486,7 @@
> -                     String otherDir = getZoneInfoDir(homeDir);
> -                     if (otherDir != null)
> -                         zi = otherDir;
> +--- openjdk-boot.orig/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java
> ++++ openjdk-boot/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java
> +@@ -479,7 +479,7 @@
> +                 String zi = System.getProperty("java.home") +
> +                     File.separator + "lib" + File.separator + "zi";
> +                 try {
>  -                    zi = FileSystems.getDefault().getPath(zi).toRealPath(true).toString();
>  +                    zi = new File(zi).getCanonicalPath();
>                   } catch(Exception e) {
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/revert-6973616.patch
> --- a/patches/boot/revert-6973616.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/revert-6973616.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,12 +1,11 @@
> -diff -Nru openjdk-boot.orig/jdk/make/common/shared/Defs-versions.gmk openjdk-boot/jdk/make/common/shared/Defs-versions.gmk
> ---- openjdk-boot.orig/jdk/make/common/shared/Defs-versions.gmk	2010-09-06 13:47:55.000000000 +0100
> -+++ openjdk-boot/jdk/make/common/shared/Defs-versions.gmk	2010-09-06 13:54:03.765973618 +0100
> -@@ -191,7 +191,7 @@
> +--- openjdk-boot/jdk/make/common/shared/Defs-versions.gmk.orig
> ++++ openjdk-boot/jdk/make/common/shared/Defs-versions.gmk
> +@@ -206,7 +206,7 @@
>   
>   # Generic
>   REQUIRED_ANT_VER          = 1.6.3
>  -REQUIRED_BOOT_VER         = 1.6
>  +REQUIRED_BOOT_VER         = 1.5
>   REQUIRED_FREETYPE_VERSION = 2.2.1
> - REQUIRED_MAKE_VER         = 3.78
> + REQUIRED_MAKE_VER         = 3.81
>   REQUIRED_UNZIP_VER        = 5.12
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/xbootclasspath.patch
> --- a/patches/boot/xbootclasspath.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/xbootclasspath.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -Nru openjdk.orig/corba/make/common/shared/Defs-java.gmk openjdk/corba/make/common/shared/Defs-java.gmk
> ---- openjdk-boot.orig/corba/make/common/shared/Defs-java.gmk	2010-11-12 01:18:17.000000000 +0000
> -+++ openjdk-boot/corba/make/common/shared/Defs-java.gmk	2010-11-22 17:37:26.447519804 +0000
> +--- openjdk-boot/corba/make/common/shared/Defs-java.gmk.orig
> ++++ openjdk-boot/corba/make/common/shared/Defs-java.gmk
>  @@ -131,26 +131,14 @@
>   CLASS_VERSION = -target $(TARGET_CLASS_VERSION)
>   JAVACFLAGS  += $(CLASS_VERSION)
> @@ -33,9 +32,8 @@
>   
>   # Override of what javac to use (see deploy workspace)
>   ifdef JAVAC
> -diff -Nru openjdk.orig/jdk/make/common/shared/Defs-java.gmk openjdk/jdk/make/common/shared/Defs-java.gmk
> ---- openjdk-boot.orig/jdk/make/common/shared/Defs-java.gmk	2010-11-22 17:32:24.000000000 +0000
> -+++ openjdk-boot/jdk/make/common/shared/Defs-java.gmk	2010-11-22 17:35:30.752202773 +0000
> +--- openjdk-boot/jdk/make/common/shared/Defs-java.gmk.orig
> ++++ openjdk-boot/jdk/make/common/shared/Defs-java.gmk
>  @@ -136,7 +136,7 @@
>   JAVACFLAGS  += $(OTHER_JAVACFLAGS)
>   
> @@ -57,7 +55,7 @@
>  -		"-Xbootclasspath/p:$(JAVAC_JAR)" \
>  -		-jar $(JAVAC_JAR) $(JAVACFLAGS)
>  -  JAVAH_CMD   = $(BOOT_JAVA_CMD) \
> --		"-Xbootclasspath/p:$(JAVAH_JAR)$(CLASSPATH_SEPARATOR)$(JAVADOC_JAR)$(CLASSPATH_SEPARATOR)$(JAVAC_JAR)"  \
> +-		"-Xbootclasspath/p:$(JAVAH_JAR)$(CLASSPATH_SEPARATOR)$(JAVAC_JAR)"  \
>  -		-jar $(JAVAH_JAR) $(JAVAHFLAGS)
>     JAVADOC_CMD = $(BOOT_JAVA_CMD) \
>   		"-Xbootclasspath/p:$(JAVADOC_JAR)$(CLASSPATH_SEPARATOR)$(JAVAC_JAR)$(CLASSPATH_SEPARATOR)$(DOCLETS_JAR)" \
> @@ -73,9 +71,8 @@
>   endif
>   
>   # Override of what javac to use (see deploy workspace)
> -diff -Nru openjdk.orig/jdk/make/java/text/base/Makefile openjdk/jdk/make/java/text/base/Makefile
> ---- openjdk-boot.orig/jdk/make/java/text/base/Makefile	2010-07-29 21:55:27.000000000 +0100
> -+++ openjdk-boot/jdk/make/java/text/base/Makefile	2010-11-22 17:35:30.768201571 +0000
> +--- openjdk-boot/jdk/make/java/text/base/Makefile.orig
> ++++ openjdk-boot/jdk/make/java/text/base/Makefile
>  @@ -81,8 +81,8 @@
>   		-sourcepath $(TEXT_SRCDIR) \
>   		$(TEXT_SOURCES)
> @@ -87,9 +84,8 @@
>   		-o $(TEXT_CLASSDIR) \
>   		-spec $(UNICODEDATA)/UnicodeData.txt
>   	@$(java-vm-cleanup)
> -diff -Nru openjdk.orig/jdk/make/sun/text/Makefile openjdk/jdk/make/sun/text/Makefile
> ---- openjdk-boot.orig/jdk/make/sun/text/Makefile	2010-07-29 21:55:29.000000000 +0100
> -+++ openjdk-boot/jdk/make/sun/text/Makefile	2010-11-22 17:35:30.768201571 +0000
> +--- openjdk-boot/jdk/make/sun/text/Makefile.orig
> ++++ openjdk-boot/jdk/make/sun/text/Makefile
>  @@ -86,8 +86,9 @@
>   	$(BOOT_JAVAC_CMD) -d $(TEXT_CLASSES) \
>   		-sourcepath $(TEXT_SRCDIR) \
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-gcc-suffix.patch
> --- a/patches/hotspot/default/icedtea-gcc-suffix.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/hotspot/default/icedtea-gcc-suffix.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -Nru openjdk.orig/hotspot/agent/src/os/linux/Makefile openjdk/hotspot/agent/src/os/linux/Makefile
> ---- openjdk.orig/hotspot/agent/src/os/linux/Makefile	2010-07-29 21:54:38.000000000 +0100
> -+++ openjdk/hotspot/agent/src/os/linux/Makefile	2010-08-31 17:54:44.523837437 +0100
> +--- openjdk/hotspot/agent/src/os/linux/Makefile.orig
> ++++ openjdk/hotspot/agent/src/os/linux/Makefile
>  @@ -23,7 +23,7 @@
>   #
>   
> @@ -10,13 +9,12 @@
>   
>   JAVAH    = ${JAVA_HOME}/bin/javah
>   
> -diff -Nru openjdk.orig/hotspot/make/linux/makefiles/gcc.make openjdk/hotspot/make/linux/makefiles/gcc.make
> ---- openjdk.orig/hotspot/make/linux/makefiles/gcc.make	2010-08-31 17:24:48.000000000 +0100
> -+++ openjdk/hotspot/make/linux/makefiles/gcc.make	2010-08-31 17:55:09.288779769 +0100
> -@@ -26,11 +26,11 @@
> - # CC, CPP & AS
> - 
> - ifdef ALT_COMPILER_PATH
> +--- openjdk/hotspot/make/linux/makefiles/gcc.make.orig
> ++++ openjdk/hotspot/make/linux/makefiles/gcc.make
> +@@ -28,11 +28,11 @@
> + # When cross-compiling the ALT_COMPILER_PATH points
> + # to the cross-compilation toolset
> + ifdef CROSS_COMPILE_ARCH
>  -CPP = $(ALT_COMPILER_PATH)/g++
>  -CC  = $(ALT_COMPILER_PATH)/gcc
>  +CPP = $(ALT_COMPILER_PATH)/g++$(GCC_SUFFIX)
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-includedb.patch
> --- a/patches/hotspot/default/icedtea-includedb.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
> @@ -1,12 +0,0 @@
> -diff -Nru openjdk.orig/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge openjdk/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge
> ---- openjdk.orig/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge	2009-02-19 08:40:26.000000000 +0000
> -+++ openjdk/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge	2009-02-23 21:09:49.000000000 +0000
> -@@ -308,6 +308,8 @@
> - psPermGen.cpp                           psMarkSweepDecorator.hpp
> - psPermGen.cpp                           psParallelCompact.hpp
> - psPermGen.cpp                           psPermGen.hpp
> -+psPermGen.cpp                           markOop.inline.hpp
> -+psPermGen.cpp                           markSweep.inline.hpp
> - 
> - psPermGen.hpp                           psOldGen.hpp
> - 
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-sparc-trapsfix.patch
> --- a/patches/hotspot/default/icedtea-sparc-trapsfix.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/hotspot/default/icedtea-sparc-trapsfix.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,9 +1,8 @@
> -diff -Nru openjdk.orig/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp
> ---- openjdk.orig/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp	2008-08-04 08:40:18.000000000 +0100
> -+++ openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp	2008-08-09 01:29:51.000000000 +0100
> -@@ -25,7 +25,16 @@
> - #include "incls/_precompiled.incl"
> - #include "incls/_assembler_linux_sparc.cpp.incl"
> +--- openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp.orig
> ++++ openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp
> +@@ -28,7 +28,16 @@
> + #include "runtime/os.hpp"
> + #include "runtime/threadLocalStorage.hpp"
>   
>  -#include <asm-sparc/traps.h>
>  +/* Headers for 32bit sparc with a 32bit userland end up in asm/
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-text-relocations.patch
> --- a/patches/hotspot/default/icedtea-text-relocations.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/hotspot/default/icedtea-text-relocations.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk.orig/hotspot/make/linux/makefiles/gcc.make openjdk/hotspot/make/linux/makefiles/gcc.make
> ---- openjdk.orig/hotspot/make/linux/makefiles/gcc.make	2008-07-17 08:40:27.000000000 +0100
> -+++ openjdk/hotspot/make/linux/makefiles/gcc.make	2008-07-21 23:10:50.000000000 +0100
> -@@ -46,7 +46,11 @@
> +--- openjdk/hotspot/make/linux/makefiles/gcc.make.orig
> ++++ openjdk/hotspot/make/linux/makefiles/gcc.make
> +@@ -58,7 +58,11 @@
>   # Compiler flags
>   
>   # position-independent code
> @@ -13,9 +12,9 @@
>   
>   VM_PICFLAG/LIBJVM = $(PICFLAG)
>   VM_PICFLAG/AOUT   =
> ---- rules.make.orig	2008-12-12 11:23:31.000000000 -0500
> -+++ openjdk/hotspot/make/linux/makefiles/rules.make	2008-12-12 11:32:26.000000000 -0500
> -@@ -138,20 +138,10 @@
> +--- openjdk/hotspot/make/linux/makefiles/rules.make.orig
> ++++ openjdk/hotspot/make/linux/makefiles/rules.make
> +@@ -146,20 +146,10 @@
>   include $(GAMMADIR)/make/pic.make
>   endif
>   
> @@ -24,21 +23,21 @@
>   %.o: %.cpp
>   	@echo Compiling $<
>   	$(QUIETLY) $(REMOVE_TARGET)
> - 	$(QUIETLY) $(COMPILE.CC) -o $@ $< $(COMPILE_DONE)
> + 	$(QUIETLY) $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE)
>  -else
>  -%.o: %.cpp
>  -	@echo Compiling $<
>  -	$(QUIETLY) $(REMOVE_TARGET)
>  -	$(QUIETLY) $(if $(findstring $@, $(NONPIC_OBJ_FILES)), \
> --	   $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) -o $@ $< $(COMPILE_DONE), \
> --	   $(COMPILE.CC) -o $@ $< $(COMPILE_DONE))
> +-	   $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE), \
> +-	   $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE))
>  -endif
>   
>   %.o: %.s
>   	@echo Assembling $<
> ---- rules.make.orig	2008-12-12 11:42:55.000000000 -0500
> -+++ openjdk/hotspot/make/solaris/makefiles/rules.make	2008-12-12 11:44:01.000000000 -0500
> -@@ -138,20 +138,10 @@
> +--- openjdk/hotspot/make/solaris/makefiles/rules.make.orig
> ++++ openjdk/hotspot/make/solaris/makefiles/rules.make
> +@@ -146,20 +146,10 @@
>   include $(GAMMADIR)/make/pic.make
>   endif
>   
> @@ -47,14 +46,14 @@
>   %.o: %.cpp
>   	@echo Compiling $<
>   	$(QUIETLY) $(REMOVE_TARGET)
> - 	$(QUIETLY) $(COMPILE.CC) -o $@ $< $(COMPILE_DONE)
> + 	$(QUIETLY) $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE)
>  -else
>  -%.o: %.cpp
>  -	@echo Compiling $<
>  -	$(QUIETLY) $(REMOVE_TARGET)
>  -	$(QUIETLY) $(if $(findstring $@, $(NONPIC_OBJ_FILES)), \
> --         $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) -o $@ $< $(COMPILE_DONE), \
> --         $(COMPILE.CC) -o $@ $< $(COMPILE_DONE))
> +-	   $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE), \
> +-	   $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE))
>  -endif
>   
>   %.o: %.s
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-freetypeversion.patch
> --- a/patches/icedtea-freetypeversion.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-freetypeversion.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,12 +1,11 @@
> -diff -Nru openjdk.orig/jdk/make/common/shared/Defs-versions.gmk openjdk/jdk/make/common/shared/Defs-versions.gmk
> ---- openjdk.orig/jdk/make/common/shared/Defs-versions.gmk	2010-08-27 19:16:10.000000000 +0100
> -+++ openjdk/jdk/make/common/shared/Defs-versions.gmk	2010-08-31 19:07:12.239786010 +0100
> -@@ -192,7 +192,7 @@
> +--- openjdk/jdk/make/common/shared/Defs-versions.gmk.orig
> ++++ openjdk/jdk/make/common/shared/Defs-versions.gmk
> +@@ -207,7 +207,7 @@
>   # Generic
>   REQUIRED_ANT_VER          = 1.6.3
>   REQUIRED_BOOT_VER         = 1.6
>  -REQUIRED_FREETYPE_VERSION = 2.3.0
>  +REQUIRED_FREETYPE_VERSION = 2.2.1
> - REQUIRED_MAKE_VER         = 3.78
> + REQUIRED_MAKE_VER         = 3.81
>   REQUIRED_UNZIP_VER        = 5.12
>   REQUIRED_ZIP_VER          = 2.2
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-javafiles.patch
> --- a/patches/icedtea-javafiles.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-javafiles.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk	2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk	2010-09-01 19:20:12.256298401 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk
>  @@ -62,7 +62,6 @@
>   	com/sun/corba/se/impl/encoding/TypeCodeInputStream.java \
>   	com/sun/corba/se/impl/encoding/TypeCodeOutputStream.java \
> @@ -12,9 +11,8 @@
>  +	com/sun/corba/se/impl/encoding/WrapperInputStream.java \
>  +	com/sun/corba/se/impl/encoding/IDLJavaSerializationInputStream.java \
>  +	com/sun/corba/se/impl/encoding/IDLJavaSerializationOutputStream.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk	2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk	2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk
>  @@ -66,4 +66,5 @@
>   	com/sun/corba/se/impl/ior/iiop/JavaSerializationComponent.java \
>   	com/sun/corba/se/impl/ior/iiop/MaxStreamFormatVersionComponentImpl.java \
> @@ -22,9 +20,8 @@
>  -	com/sun/corba/se/impl/ior/iiop/ORBTypeComponentImpl.java
>  +	com/sun/corba/se/impl/ior/iiop/ORBTypeComponentImpl.java \
>  +	com/sun/corba/se/impl/ior/iiop/JavaSerializationComponent.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk	2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk	2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk
>  @@ -81,4 +81,5 @@
>   	com/sun/corba/se/impl/orbutil/graph/Node.java \
>   	com/sun/corba/se/impl/orbutil/graph/NodeData.java \
> @@ -32,9 +29,8 @@
>  -	com/sun/corba/se/impl/orbutil/graph/GraphImpl.java 
>  +	com/sun/corba/se/impl/orbutil/graph/GraphImpl.java \
>  +	com/sun/corba/se/impl/orbutil/GetPropertyAction.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk	2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk	2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk
>  @@ -81,5 +81,5 @@
>   	com/sun/corba/se/impl/protocol/giopmsgheaders/RequestMessage_1_1.java \
>   	com/sun/corba/se/impl/protocol/giopmsgheaders/RequestMessage_1_2.java \
> @@ -43,9 +39,8 @@
>  -
>  +	com/sun/corba/se/impl/protocol/giopmsgheaders/TargetAddressHelper.java \
>  +	com/sun/corba/se/impl/protocol/giopmsgheaders/LocateReplyOrReplyMessage.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk	2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk	2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk
>  @@ -30,6 +30,7 @@
>   	com/sun/corba/se/spi/monitoring/StringMonitoredAttributeBase.java \
>   	com/sun/corba/se/spi/monitoring/LongMonitoredAttributeBase.java \
> @@ -54,9 +49,8 @@
>   	com/sun/corba/se/spi/monitoring/MonitoredAttributeInfo.java \
>   	com/sun/corba/se/spi/monitoring/MonitoredObject.java \
>   	com/sun/corba/se/spi/monitoring/MonitoredObjectFactory.java \
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk	2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk	2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk
>  @@ -29,5 +29,6 @@
>   	com/sun/corba/se/spi/presentation/rmi/IDLNameTranslator.java \
>   	com/sun/corba/se/spi/presentation/rmi/PresentationDefaults.java \
> @@ -64,9 +58,8 @@
>  +	com/sun/corba/se/spi/presentation/rmi/PresentationDefaults.java \
>   	com/sun/corba/se/spi/presentation/rmi/StubAdapter.java
>   
> -diff -Nru openjdk.orig/jdk/make/java/java/FILES_java.gmk openjdk/jdk/make/java/java/FILES_java.gmk
> ---- openjdk.orig/jdk/make/java/java/FILES_java.gmk	2010-07-29 21:55:26.000000000 +0100
> -+++ openjdk/jdk/make/java/java/FILES_java.gmk	2010-09-01 19:20:12.268297371 +0100
> +--- openjdk/jdk/make/java/java/FILES_java.gmk.orig
> ++++ openjdk/jdk/make/java/java/FILES_java.gmk
>  @@ -29,6 +29,80 @@
>   # will generate header files
>   #
> @@ -148,9 +141,9 @@
>       java/lang/Object.java \
>       java/lang/AutoCloseable.java \
>       java/lang/Class.java \
> -@@ -138,13 +212,6 @@
> -     java/lang/Readable.java \
> +@@ -139,13 +213,6 @@
>       java/lang/Override.java \
> +     java/lang/SafeVarargs.java \
>       java/lang/SuppressWarnings.java \
>  -    java/lang/ref/Reference.java \
>  -        java/lang/ref/SoftReference.java \
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-lc_ctype.patch
> --- a/patches/icedtea-lc_ctype.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-lc_ctype.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,31 +1,28 @@
> -diff -Nru openjdk.orig/jdk/src/solaris/native/java/lang/java_props_md.c openjdk/jdk/src/solaris/native/java/lang/java_props_md.c
> ---- openjdk.orig/jdk/src/solaris/native/java/lang/java_props_md.c	2010-11-12 01:20:49.000000000 +0000
> -+++ openjdk/jdk/src/solaris/native/java/lang/java_props_md.c	2010-11-12 18:31:00.049493600 +0000
> -@@ -118,7 +118,7 @@
> - #endif
> +--- openjdka/jdk/src/solaris/native/java/lang/java_props_md.c
> ++++ openjdk/jdk/src/solaris/native/java/lang/java_props_md.c
> +@@ -119,7 +119,7 @@
>   
> - static int ParseLocale(int cat, char ** std_language, char ** std_country, char ** std_variant, char ** std_encoding) {
> + static int ParseLocale(int cat, char ** std_language, char ** std_script,
> +                        char ** std_country, char ** std_variant, char ** std_encoding) {
>  -    char temp[64];
>  +    char *temp;
>       char *language = NULL, *country = NULL, *variant = NULL,
>            *encoding = NULL;
>       char *p, encoding_variant[64];
> -@@ -162,6 +162,7 @@
> +@@ -162,7 +162,7 @@
> +      * <language name>_<country name>.<encoding name>@<variant name>
>        * <country name>, <encoding name>, and <variant name> are optional.
>        */
> - 
> +-
>  +    temp = (char*) malloc(strlen(lc)+1);
>       strcpy(temp, lc);
>   
>       /* Parse the language, country, encoding, and variant from the
> -@@ -282,6 +283,10 @@
> +@@ -301,6 +301,7 @@
>   #endif
>       }
>   
> -+	
> -+    /* Free temp */
> -+    free(temp);
> -+
> ++    free (temp);
>       return 1;
>   }
>   
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-signed-types.patch
> --- a/patches/icedtea-signed-types.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-signed-types.patch	Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk.orig/hotspot/src/share/vm/asm/codeBuffer.hpp openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp
> ---- openjdk.orig/hotspot/src/share/vm/asm/codeBuffer.hpp	2008-05-27 21:18:54.000000000 +0100
> -+++ openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp	2008-05-27 21:56:42.000000000 +0100
> -@@ -81,7 +81,7 @@
> +--- openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp.orig
> ++++ openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp
> +@@ -93,7 +93,7 @@
>     address     _locs_point;      // last relocated position (grows upward)
>     bool        _locs_own;        // did I allocate the locs myself?
>     bool        _frozen;          // no more expansion of this section
> @@ -10,22 +9,20 @@
>     CodeBuffer* _outer;           // enclosing CodeBuffer
>   
>     // (Note:  _locs_point used to be called _last_reloc_offset.)
> -diff -Nru openjdk.orig/hotspot/src/share/vm/utilities/ostream.cpp openjdk/hotspot/src/share/vm/utilities/ostream.cpp
> ---- openjdk.orig/hotspot/src/share/vm/utilities/ostream.cpp	2008-05-27 21:18:54.000000000 +0100
> -+++ openjdk/hotspot/src/share/vm/utilities/ostream.cpp	2008-05-27 21:59:01.000000000 +0100
> -@@ -829,7 +829,7 @@
> +--- openjdk/hotspot/src/share/vm/utilities/ostream.cpp.orig
> ++++ openjdk/hotspot/src/share/vm/utilities/ostream.cpp
> +@@ -915,7 +915,7 @@
>     server.sin_port = htons(port);
>   
>     server.sin_addr.s_addr = inet_addr(ip);
>  -  if (server.sin_addr.s_addr == (uint32_t)-1) {
>  +  if (server.sin_addr.s_addr == (in_addr_t)-1) {
> - #ifdef _WINDOWS
> -     struct hostent* host = hpi::get_host_by_name((char*)ip);
> - #else
> -diff -r ca98ea212429 openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp
> ---- openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp	Fri Aug 08 16:06:52 2008 +0100
> -+++ openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp	Fri Aug 08 16:15:45 2008 +0100
> -@@ -388,7 +388,7 @@ const ciTypeFlow::StateVector* ciTypeFlo
> +     struct hostent* host = os::get_host_by_name((char*)ip);
> +     if (host != NULL) {
> +       memcpy(&server.sin_addr, host->h_addr_list[0], host->h_length);
> +--- openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp.orig
> ++++ openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp
> +@@ -403,7 +403,7 @@
>     // Set the rest of the locals to bottom.
>     Cell cell = state->next_cell(state->tos());
>     state->set_stack_size(0);
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-ssl.patch
> --- a/patches/icedtea-ssl.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
> @@ -1,43 +0,0 @@
> ---- ../openjdkb23/openjdk/jdk/src/share/classes/sun/security/ssl/Handshaker.java	2007-10-30 04:38:10.000000000 -0400
> -+++ openjdk/jdk/src/share/classes/sun/security/ssl/Handshaker.java	2007-11-13 13:06:01.000000000 -0500
> -@@ -36,6 +36,7 @@
> - import java.security.PrivilegedExceptionAction;
> - import java.security.PrivilegedActionException;
> - import java.security.cert.X509Certificate;
> -+import java.security.spec.AlgorithmParameterSpec;
> - 
> - import javax.crypto.*;
> - import javax.crypto.spec.*;
> -@@ -688,8 +683,8 @@
> -         SecretKey masterSecret;
> -         try {
> -             KeyGenerator kg = JsseJce.getKeyGenerator("SunTlsMasterSecret");
> --            kg.init(spec);
> --            masterSecret = kg.generateKey();
> -+            kg.init((AlgorithmParameterSpec) spec);
> -+	    masterSecret = kg.generateKey();
> -         } catch (GeneralSecurityException e) {
> -             // For RSA premaster secrets, do not signal a protocol error
> -             // due to the Bleichenbacher attack. See comments further down.
> ---- ../openjdkb23/openjdk/jdk/src/share/classes/sun/security/ssl/RSAClientKeyExchange.java	2007-10-30 04:38:10.000000000 -0400
> -+++ openjdk/jdk/src/share/classes/sun/security/ssl/RSAClientKeyExchange.java	2007-11-13 13:06:42.000000000 -0500
> -@@ -36,6 +36,8 @@
> - import javax.net.ssl.*;
> - 
> - import sun.security.internal.spec.TlsRsaPremasterSecretParameterSpec;
> -+import java.security.spec.AlgorithmParameterSpec;
> -+
> - 
> - /**
> -  * This is the client key exchange message (CLIENT --> SERVER) used with
> -@@ -104,8 +106,8 @@
> - 
> -         try {
> -             KeyGenerator kg = JsseJce.getKeyGenerator("SunTlsRsaPremasterSecret");
> --            kg.init(new TlsRsaPremasterSecretParameterSpec(major, minor));
> --            preMaster = kg.generateKey();
> -+            kg.init((AlgorithmParameterSpec) (new TlsRsaPremasterSecretParameterSpec(major, minor)));
> -+	    preMaster = kg.generateKey();
> - 
> -             Cipher cipher = JsseJce.getCipher(JsseJce.CIPHER_RSA_PKCS1);
> -             cipher.init(Cipher.WRAP_MODE, publicKey, generator);
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/no-precompiled.patch
> --- a/patches/no-precompiled.patch	Wed Jan 26 01:03:53 2011 +0100
> +++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
> @@ -1,35 +0,0 @@
> ---- openjdk/hotspot/make/linux/makefiles/gcc.make~	2009-10-30 11:54:26.000000000 +0100
> -+++ openjdk/hotspot/make/linux/makefiles/gcc.make	2009-10-30 11:55:34.000000000 +0100
> -@@ -34,13 +34,14 @@
> - CC_VER_MAJOR := $(shell $(CC) -dumpversion | sed 's/egcs-//' | cut -d'.' -f1)
> - CC_VER_MINOR := $(shell $(CC) -dumpversion | sed 's/egcs-//' | cut -d'.' -f2)
> - 
> -+ifeq (,$(DISABLE_PRECOMPILED_HEADER))
> - # check for precompiled headers support
> - ifneq "$(shell expr \( $(CC_VER_MAJOR) \> 3 \) \| \( \( $(CC_VER_MAJOR) = 3 \) \& \( $(CC_VER_MINOR) \>= 4 \) \))" "0"
> - USE_PRECOMPILED_HEADER=1
> - PRECOMPILED_HEADER_DIR=.
> - PRECOMPILED_HEADER=$(PRECOMPILED_HEADER_DIR)/incls/_precompiled.incl.gch
> - endif
> --
> -+endif
> - 
> - #------------------------------------------------------------------------
> - # Compiler flags
> ---- openjdk/hotspot/make/solaris/makefiles/gcc.make~	2009-10-30 11:54:26.000000000 +0100
> -+++ openjdk/hotspot/make/solaris/makefiles/gcc.make	2009-10-30 11:56:05.000000000 +0100
> -@@ -45,12 +45,14 @@
> - $(shell $(CC) -dumpversion | sed 's/egcs-//' | cut -d'.' -f2)
> - 
> - 
> -+ifeq (,$(DISABLE_PRECOMPILED_HEADER))
> - # check for precompiled headers support
> - ifneq "$(shell expr \( $(CC_VER_MAJOR) \> 3 \) \| \( \( $(CC_VER_MAJOR) = 3 \) \& \( $(CC_VER_MINOR) \>= 4 \) \))" "0"
> - USE_PRECOMPILED_HEADER=1
> - PRECOMPILED_HEADER_DIR=.
> - PRECOMPILED_HEADER=$(PRECOMPILED_HEADER_DIR)/incls/_precompiled.incl.gch
> - endif
> -+endif
> - 
> - 
> - #------------------------------------------------------------------------


-- 
Andrew :)

Free Java Software Engineer
Red Hat, Inc. (http://www.redhat.com)

Support Free Java!
Contribute to GNU Classpath and IcedTea
http://www.gnu.org/software/classpath
http://icedtea.classpath.org
PGP Key: 94EFD9D8 (http://subkeys.pgp.net)
Fingerprint = F8EF F1EA 401E 2E60 15FA  7927 142C 2591 94EF D9D8



More information about the distro-pkg-dev mailing list