src/java.base/share/classes/java/security/cert/PKIXParameters.java
Print this page
rev 10521 : 8055723[core]: Replace concat String to append in StringBuilder parameters
Contributed-by: Otavio Santana <otaviojava@java.net>
*** 696,736 ****
StringBuilder sb = new StringBuilder();
sb.append("[\n");
/* start with trusted anchor info */
if (unmodTrustAnchors != null) {
! sb.append(" Trust Anchors: " + unmodTrustAnchors.toString()
! + "\n");
}
/* now, append initial state information */
if (unmodInitialPolicies != null) {
if (unmodInitialPolicies.isEmpty()) {
sb.append(" Initial Policy OIDs: any\n");
} else {
! sb.append(" Initial Policy OIDs: ["
! + unmodInitialPolicies.toString() + "]\n");
}
}
/* now, append constraints on all certificates in the path */
! sb.append(" Validity Date: " + String.valueOf(date) + "\n");
! sb.append(" Signature Provider: " + String.valueOf(sigProvider) + "\n");
! sb.append(" Default Revocation Enabled: " + revocationEnabled + "\n");
! sb.append(" Explicit Policy Required: " + explicitPolicyRequired + "\n");
! sb.append(" Policy Mapping Inhibited: " + policyMappingInhibited + "\n");
! sb.append(" Any Policy Inhibited: " + anyPolicyInhibited + "\n");
! sb.append(" Policy Qualifiers Rejected: " + policyQualifiersRejected + "\n");
/* now, append target cert requirements */
! sb.append(" Target Cert Constraints: " + String.valueOf(certSelector) + "\n");
/* finally, append miscellaneous parameters */
! if (certPathCheckers != null)
! sb.append(" Certification Path Checkers: ["
! + certPathCheckers.toString() + "]\n");
! if (certStores != null)
! sb.append(" CertStores: [" + certStores.toString() + "]\n");
! sb.append("]");
return sb.toString();
}
}
--- 696,747 ----
StringBuilder sb = new StringBuilder();
sb.append("[\n");
/* start with trusted anchor info */
if (unmodTrustAnchors != null) {
! sb.append(" Trust Anchors: ").append(unmodTrustAnchors)
! .append('\n');
}
/* now, append initial state information */
if (unmodInitialPolicies != null) {
if (unmodInitialPolicies.isEmpty()) {
sb.append(" Initial Policy OIDs: any\n");
} else {
! sb.append(" Initial Policy OIDs: [")
! .append(unmodInitialPolicies).append("]\n");
}
}
/* now, append constraints on all certificates in the path */
! sb.append(" Validity Date: ").append(date)
! .append('\n');
! sb.append(" Signature Provider: ").append(sigProvider)
! .append('\n');
! sb.append(" Default Revocation Enabled: ").append(revocationEnabled)
! .append('\n');
! sb.append(" Explicit Policy Required: ")
! .append(explicitPolicyRequired).append('\n');
! sb.append(" Policy Mapping Inhibited: ")
! .append(policyMappingInhibited).append('\n');
! sb.append(" Any Policy Inhibited: ").append(anyPolicyInhibited)
! .append('\n');
! sb.append(" Policy Qualifiers Rejected: ")
! .append(policyQualifiersRejected).append('\n');
/* now, append target cert requirements */
! sb.append(" Target Cert Constraints: ")
! .append(certSelector).append('\n');
/* finally, append miscellaneous parameters */
! if (certPathCheckers != null) {
! sb.append(" Certification Path Checkers: [")
! .append(certPathCheckers).append("]\n");
! }
! if (certStores != null) {
! sb.append(" CertStores: [").append(certStores)
! .append("]\n");
! }
! sb.append(']');
return sb.toString();
}
}