src/java.base/share/classes/java/security/cert/PKIXParameters.java
Print this page
rev 10526 : 8038277: Improve the bootstrap performance of cacerts keystore (core and security)
Contributed-by: Otavio Santana <otaviojava@java.net>
@@ -696,41 +696,52 @@
StringBuilder sb = new StringBuilder();
sb.append("[\n");
/* start with trusted anchor info */
if (unmodTrustAnchors != null) {
- sb.append(" Trust Anchors: " + unmodTrustAnchors.toString()
- + "\n");
+ sb.append(" Trust Anchors: ").append(unmodTrustAnchors.toString())
+ .append('\n');
}
/* now, append initial state information */
if (unmodInitialPolicies != null) {
if (unmodInitialPolicies.isEmpty()) {
sb.append(" Initial Policy OIDs: any\n");
} else {
- sb.append(" Initial Policy OIDs: ["
- + unmodInitialPolicies.toString() + "]\n");
+ sb.append(" Initial Policy OIDs: [")
+ .append(unmodInitialPolicies.toString()).append("]\n");
}
}
/* now, append constraints on all certificates in the path */
- sb.append(" Validity Date: " + String.valueOf(date) + "\n");
- sb.append(" Signature Provider: " + String.valueOf(sigProvider) + "\n");
- sb.append(" Default Revocation Enabled: " + revocationEnabled + "\n");
- sb.append(" Explicit Policy Required: " + explicitPolicyRequired + "\n");
- sb.append(" Policy Mapping Inhibited: " + policyMappingInhibited + "\n");
- sb.append(" Any Policy Inhibited: " + anyPolicyInhibited + "\n");
- sb.append(" Policy Qualifiers Rejected: " + policyQualifiersRejected + "\n");
+ sb.append(" Validity Date: ").append(String.valueOf(date))
+ .append('\n');
+ sb.append(" Signature Provider: ").append(String.valueOf(sigProvider))
+ .append('\n');
+ sb.append(" Default Revocation Enabled: ").append(revocationEnabled)
+ .append('\n');
+ sb.append(" Explicit Policy Required: ")
+ .append(explicitPolicyRequired).append('\n');
+ sb.append(" Policy Mapping Inhibited: ")
+ .append(policyMappingInhibited).append('\n');
+ sb.append(" Any Policy Inhibited: ").append(anyPolicyInhibited)
+ .append('\n');
+ sb.append(" Policy Qualifiers Rejected: ")
+ .append(policyQualifiersRejected).append('\n');
/* now, append target cert requirements */
- sb.append(" Target Cert Constraints: " + String.valueOf(certSelector) + "\n");
+ sb.append(" Target Cert Constraints: ")
+ .append(String.valueOf(certSelector)).append('\n');
/* finally, append miscellaneous parameters */
- if (certPathCheckers != null)
- sb.append(" Certification Path Checkers: ["
- + certPathCheckers.toString() + "]\n");
- if (certStores != null)
- sb.append(" CertStores: [" + certStores.toString() + "]\n");
- sb.append("]");
+ if (certPathCheckers != null) {
+ sb.append(" Certification Path Checkers: [")
+ .append(certPathCheckers.toString()).append("]\n");
+ }
+ if (certStores != null) {
+ sb.append(" CertStores: [").append(certStores.toString())
+ .append("]\n");
+ }
+ sb.append(']');
return sb.toString();
}
}