diff --git a/handler/src/main/java/io/netty/handler/ssl/IdentityCipherSuiteFilter.java b/handler/src/main/java/io/netty/handler/ssl/IdentityCipherSuiteFilter.java index fc6235c2aa..c9ebfb0da2 100644 --- a/handler/src/main/java/io/netty/handler/ssl/IdentityCipherSuiteFilter.java +++ b/handler/src/main/java/io/netty/handler/ssl/IdentityCipherSuiteFilter.java @@ -15,8 +15,7 @@ */ package io.netty.handler.ssl; -import io.netty.util.internal.InternalThreadLocalMap; - +import java.util.ArrayList; import java.util.List; import java.util.Set; @@ -34,7 +33,7 @@ public final class IdentityCipherSuiteFilter implements CipherSuiteFilter { if (ciphers == null) { return defaultCiphers.toArray(new String[defaultCiphers.size()]); } else { - List newCiphers = InternalThreadLocalMap.get().arrayList(supportedCiphers.size()); + List newCiphers = new ArrayList(supportedCiphers.size()); for (String c : ciphers) { if (c == null) { break; diff --git a/handler/src/main/java/io/netty/handler/ssl/ReferenceCountedOpenSslEngine.java b/handler/src/main/java/io/netty/handler/ssl/ReferenceCountedOpenSslEngine.java index fce7410bb4..6c3785623b 100644 --- a/handler/src/main/java/io/netty/handler/ssl/ReferenceCountedOpenSslEngine.java +++ b/handler/src/main/java/io/netty/handler/ssl/ReferenceCountedOpenSslEngine.java @@ -24,7 +24,6 @@ import io.netty.util.ResourceLeak; import io.netty.util.ResourceLeakDetector; import io.netty.util.ResourceLeakDetectorFactory; import io.netty.util.internal.EmptyArrays; -import io.netty.util.internal.InternalThreadLocalMap; import io.netty.util.internal.PlatformDependent; import io.netty.util.internal.StringUtil; import io.netty.util.internal.ThrowableUtil; @@ -39,6 +38,7 @@ import java.nio.ByteBuffer; import java.nio.ReadOnlyBufferException; import java.security.Principal; import java.security.cert.Certificate; +import java.util.ArrayList; import java.util.Arrays; import java.util.Collections; import java.util.HashMap; @@ -1149,7 +1149,7 @@ public class ReferenceCountedOpenSslEngine extends SSLEngine implements Referenc @Override public final String[] getEnabledProtocols() { - List enabled = InternalThreadLocalMap.get().arrayList(); + List enabled = new ArrayList(6); // Seems like there is no way to explict disable SSLv2Hello in openssl so it is always enabled enabled.add(OpenSsl.PROTOCOL_SSL_V2_HELLO); diff --git a/handler/src/main/java/io/netty/handler/ssl/SupportedCipherSuiteFilter.java b/handler/src/main/java/io/netty/handler/ssl/SupportedCipherSuiteFilter.java index a90f3c8ffc..132f1a0e5e 100644 --- a/handler/src/main/java/io/netty/handler/ssl/SupportedCipherSuiteFilter.java +++ b/handler/src/main/java/io/netty/handler/ssl/SupportedCipherSuiteFilter.java @@ -15,9 +15,8 @@ */ package io.netty.handler.ssl; -import io.netty.util.internal.InternalThreadLocalMap; - import javax.net.ssl.SSLEngine; +import java.util.ArrayList; import java.util.List; import java.util.Set; @@ -41,10 +40,10 @@ public final class SupportedCipherSuiteFilter implements CipherSuiteFilter { final List newCiphers; if (ciphers == null) { - newCiphers = InternalThreadLocalMap.get().arrayList(defaultCiphers.size()); + newCiphers = new ArrayList(defaultCiphers.size()); ciphers = defaultCiphers; } else { - newCiphers = InternalThreadLocalMap.get().arrayList(supportedCiphers.size()); + newCiphers = new ArrayList(supportedCiphers.size()); } for (String c : ciphers) { if (c == null) { diff --git a/handler/src/main/java/io/netty/handler/ssl/util/FingerprintTrustManagerFactory.java b/handler/src/main/java/io/netty/handler/ssl/util/FingerprintTrustManagerFactory.java index 79e434655a..b5a65019e3 100644 --- a/handler/src/main/java/io/netty/handler/ssl/util/FingerprintTrustManagerFactory.java +++ b/handler/src/main/java/io/netty/handler/ssl/util/FingerprintTrustManagerFactory.java @@ -20,7 +20,6 @@ import io.netty.buffer.ByteBufUtil; import io.netty.buffer.Unpooled; import io.netty.util.internal.EmptyArrays; import io.netty.util.concurrent.FastThreadLocal; -import io.netty.util.internal.InternalThreadLocalMap; import javax.net.ssl.ManagerFactoryParameters; import javax.net.ssl.TrustManager; @@ -32,6 +31,7 @@ import java.security.NoSuchAlgorithmException; import java.security.cert.CertificateEncodingException; import java.security.cert.CertificateException; import java.security.cert.X509Certificate; +import java.util.ArrayList; import java.util.Arrays; import java.util.List; import java.util.regex.Pattern; @@ -159,7 +159,7 @@ public final class FingerprintTrustManagerFactory extends SimpleTrustManagerFact throw new NullPointerException("fingerprints"); } - List list = InternalThreadLocalMap.get().arrayList(); + List list = new ArrayList(fingerprints.length); for (byte[] f: fingerprints) { if (f == null) { break; @@ -179,7 +179,7 @@ public final class FingerprintTrustManagerFactory extends SimpleTrustManagerFact throw new NullPointerException("fingerprints"); } - List list = InternalThreadLocalMap.get().arrayList(); + List list = new ArrayList(); for (String f: fingerprints) { if (f == null) { break; diff --git a/resolver-dns/src/main/java/io/netty/resolver/dns/DnsNameResolverBuilder.java b/resolver-dns/src/main/java/io/netty/resolver/dns/DnsNameResolverBuilder.java index 477ccab99e..dd6fed0e34 100644 --- a/resolver-dns/src/main/java/io/netty/resolver/dns/DnsNameResolverBuilder.java +++ b/resolver-dns/src/main/java/io/netty/resolver/dns/DnsNameResolverBuilder.java @@ -23,9 +23,9 @@ import io.netty.channel.ReflectiveChannelFactory; import io.netty.channel.socket.DatagramChannel; import io.netty.channel.socket.InternetProtocolFamily; import io.netty.resolver.HostsFileEntriesResolver; -import io.netty.util.internal.InternalThreadLocalMap; import io.netty.util.internal.UnstableApi; +import java.util.ArrayList; import java.util.List; import static io.netty.util.internal.ObjectUtil.checkNotNull; @@ -160,8 +160,8 @@ public final class DnsNameResolverBuilder { public DnsNameResolverBuilder resolvedAddressTypes(InternetProtocolFamily... resolvedAddressTypes) { checkNotNull(resolvedAddressTypes, "resolvedAddressTypes"); - final List list = - InternalThreadLocalMap.get().arrayList(InternetProtocolFamily.values().length); + final List list = new ArrayList( + InternetProtocolFamily.values().length); for (InternetProtocolFamily f : resolvedAddressTypes) { if (f == null) { @@ -197,8 +197,8 @@ public final class DnsNameResolverBuilder { public DnsNameResolverBuilder resolvedAddressTypes(Iterable resolvedAddressTypes) { checkNotNull(resolvedAddressTypes, "resolveAddressTypes"); - final List list = - InternalThreadLocalMap.get().arrayList(InternetProtocolFamily.values().length); + final List list = new ArrayList( + InternetProtocolFamily.values().length); for (InternetProtocolFamily f : resolvedAddressTypes) { if (f == null) { @@ -299,8 +299,7 @@ public final class DnsNameResolverBuilder { public DnsNameResolverBuilder searchDomains(Iterable searchDomains) { checkNotNull(searchDomains, "searchDomains"); - final List list = - InternalThreadLocalMap.get().arrayList(4); + final List list = new ArrayList(4); for (String f : searchDomains) { if (f == null) { diff --git a/resolver-dns/src/main/java/io/netty/resolver/dns/DnsServerAddresses.java b/resolver-dns/src/main/java/io/netty/resolver/dns/DnsServerAddresses.java index 6272433548..05d87d72e1 100644 --- a/resolver-dns/src/main/java/io/netty/resolver/dns/DnsServerAddresses.java +++ b/resolver-dns/src/main/java/io/netty/resolver/dns/DnsServerAddresses.java @@ -16,7 +16,6 @@ package io.netty.resolver.dns; -import io.netty.util.internal.InternalThreadLocalMap; import io.netty.util.internal.UnstableApi; import io.netty.util.internal.logging.InternalLogger; import io.netty.util.internal.logging.InternalLoggerFactory; @@ -243,7 +242,7 @@ public abstract class DnsServerAddresses { throw new NullPointerException("addresses"); } - List list = InternalThreadLocalMap.get().arrayList(addresses.length); + List list = new ArrayList(addresses.length); for (InetSocketAddress a: addresses) { if (a == null) { break;