001: /**
002: * <copyright>
003: * </copyright>
004: *
005: * $Id$
006: */package com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl;
007:
008: import com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.SSL;
009: import com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.SSLMode;
010: import com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.componentflowPackage;
011:
012: import org.eclipse.emf.common.notify.Notification;
013:
014: import org.eclipse.emf.ecore.EClass;
015:
016: import org.eclipse.emf.ecore.impl.ENotificationImpl;
017: import org.eclipse.emf.ecore.impl.EObjectImpl;
018:
019: /**
020: * <!-- begin-user-doc -->
021: * An implementation of the model object '<em><b>SSL</b></em>'.
022: * <!-- end-user-doc -->
023: * <p>
024: * The following features are implemented:
025: * <ul>
026: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#getSslProtocol <em>Ssl Protocol</em>}</li>
027: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#isAllowAnonymous <em>Allow Anonymous</em>}</li>
028: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#isUsePrivateKey <em>Use Private Key</em>}</li>
029: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#getKeyStoreFile <em>Key Store File</em>}</li>
030: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#getKeyStorePassword <em>Key Store Password</em>}</li>
031: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#isUseDefaultTrustStore <em>Use Default Trust Store</em>}</li>
032: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#getTrustStoreFile <em>Trust Store File</em>}</li>
033: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#getTrustStorePassword <em>Trust Store Password</em>}</li>
034: * <li>{@link com.bostechcorp.cbesb.ui.componentflow.componentFlowEditor.impl.SSLImpl#isAuthenticatePeer <em>Authenticate Peer</em>}</li>
035: * </ul>
036: * </p>
037: *
038: * @generated
039: */
040: public class SSLImpl extends EObjectImpl implements SSL {
041: /**
042: * <!-- begin-user-doc -->
043: * <!-- end-user-doc -->
044: * @generated
045: */
046: public static final String copyright = "Copyright, Bostech Corp.";
047:
048: /**
049: * The default value of the '{@link #getSslProtocol() <em>Ssl Protocol</em>}' attribute.
050: * <!-- begin-user-doc -->
051: * <!-- end-user-doc -->
052: * @see #getSslProtocol()
053: * @generated
054: * @ordered
055: */
056: protected static final SSLMode SSL_PROTOCOL_EDEFAULT = SSLMode.TLS_LITERAL;
057:
058: /**
059: * The cached value of the '{@link #getSslProtocol() <em>Ssl Protocol</em>}' attribute.
060: * <!-- begin-user-doc -->
061: * <!-- end-user-doc -->
062: * @see #getSslProtocol()
063: * @generated
064: * @ordered
065: */
066: protected SSLMode sslProtocol = SSL_PROTOCOL_EDEFAULT;
067:
068: /**
069: * The default value of the '{@link #isAllowAnonymous() <em>Allow Anonymous</em>}' attribute.
070: * <!-- begin-user-doc -->
071: * <!-- end-user-doc -->
072: * @see #isAllowAnonymous()
073: * @generated
074: * @ordered
075: */
076: protected static final boolean ALLOW_ANONYMOUS_EDEFAULT = true;
077:
078: /**
079: * The cached value of the '{@link #isAllowAnonymous() <em>Allow Anonymous</em>}' attribute.
080: * <!-- begin-user-doc -->
081: * <!-- end-user-doc -->
082: * @see #isAllowAnonymous()
083: * @generated
084: * @ordered
085: */
086: protected boolean allowAnonymous = ALLOW_ANONYMOUS_EDEFAULT;
087:
088: /**
089: * The default value of the '{@link #isUsePrivateKey() <em>Use Private Key</em>}' attribute.
090: * <!-- begin-user-doc -->
091: * <!-- end-user-doc -->
092: * @see #isUsePrivateKey()
093: * @generated
094: * @ordered
095: */
096: protected static final boolean USE_PRIVATE_KEY_EDEFAULT = false;
097:
098: /**
099: * The cached value of the '{@link #isUsePrivateKey() <em>Use Private Key</em>}' attribute.
100: * <!-- begin-user-doc -->
101: * <!-- end-user-doc -->
102: * @see #isUsePrivateKey()
103: * @generated
104: * @ordered
105: */
106: protected boolean usePrivateKey = USE_PRIVATE_KEY_EDEFAULT;
107:
108: /**
109: * The default value of the '{@link #getKeyStoreFile() <em>Key Store File</em>}' attribute.
110: * <!-- begin-user-doc -->
111: * <!-- end-user-doc -->
112: * @see #getKeyStoreFile()
113: * @generated
114: * @ordered
115: */
116: protected static final String KEY_STORE_FILE_EDEFAULT = null;
117:
118: /**
119: * The cached value of the '{@link #getKeyStoreFile() <em>Key Store File</em>}' attribute.
120: * <!-- begin-user-doc -->
121: * <!-- end-user-doc -->
122: * @see #getKeyStoreFile()
123: * @generated
124: * @ordered
125: */
126: protected String keyStoreFile = KEY_STORE_FILE_EDEFAULT;
127:
128: /**
129: * The default value of the '{@link #getKeyStorePassword() <em>Key Store Password</em>}' attribute.
130: * <!-- begin-user-doc -->
131: * <!-- end-user-doc -->
132: * @see #getKeyStorePassword()
133: * @generated
134: * @ordered
135: */
136: protected static final String KEY_STORE_PASSWORD_EDEFAULT = null;
137:
138: /**
139: * The cached value of the '{@link #getKeyStorePassword() <em>Key Store Password</em>}' attribute.
140: * <!-- begin-user-doc -->
141: * <!-- end-user-doc -->
142: * @see #getKeyStorePassword()
143: * @generated
144: * @ordered
145: */
146: protected String keyStorePassword = KEY_STORE_PASSWORD_EDEFAULT;
147:
148: /**
149: * The default value of the '{@link #isUseDefaultTrustStore() <em>Use Default Trust Store</em>}' attribute.
150: * <!-- begin-user-doc -->
151: * <!-- end-user-doc -->
152: * @see #isUseDefaultTrustStore()
153: * @generated
154: * @ordered
155: */
156: protected static final boolean USE_DEFAULT_TRUST_STORE_EDEFAULT = false;
157:
158: /**
159: * The cached value of the '{@link #isUseDefaultTrustStore() <em>Use Default Trust Store</em>}' attribute.
160: * <!-- begin-user-doc -->
161: * <!-- end-user-doc -->
162: * @see #isUseDefaultTrustStore()
163: * @generated
164: * @ordered
165: */
166: protected boolean useDefaultTrustStore = USE_DEFAULT_TRUST_STORE_EDEFAULT;
167:
168: /**
169: * The default value of the '{@link #getTrustStoreFile() <em>Trust Store File</em>}' attribute.
170: * <!-- begin-user-doc -->
171: * <!-- end-user-doc -->
172: * @see #getTrustStoreFile()
173: * @generated
174: * @ordered
175: */
176: protected static final String TRUST_STORE_FILE_EDEFAULT = null;
177:
178: /**
179: * The cached value of the '{@link #getTrustStoreFile() <em>Trust Store File</em>}' attribute.
180: * <!-- begin-user-doc -->
181: * <!-- end-user-doc -->
182: * @see #getTrustStoreFile()
183: * @generated
184: * @ordered
185: */
186: protected String trustStoreFile = TRUST_STORE_FILE_EDEFAULT;
187:
188: /**
189: * The default value of the '{@link #getTrustStorePassword() <em>Trust Store Password</em>}' attribute.
190: * <!-- begin-user-doc -->
191: * <!-- end-user-doc -->
192: * @see #getTrustStorePassword()
193: * @generated
194: * @ordered
195: */
196: protected static final String TRUST_STORE_PASSWORD_EDEFAULT = null;
197:
198: /**
199: * The cached value of the '{@link #getTrustStorePassword() <em>Trust Store Password</em>}' attribute.
200: * <!-- begin-user-doc -->
201: * <!-- end-user-doc -->
202: * @see #getTrustStorePassword()
203: * @generated
204: * @ordered
205: */
206: protected String trustStorePassword = TRUST_STORE_PASSWORD_EDEFAULT;
207:
208: /**
209: * The default value of the '{@link #isAuthenticatePeer() <em>Authenticate Peer</em>}' attribute.
210: * <!-- begin-user-doc -->
211: * <!-- end-user-doc -->
212: * @see #isAuthenticatePeer()
213: * @generated
214: * @ordered
215: */
216: protected static final boolean AUTHENTICATE_PEER_EDEFAULT = false;
217:
218: /**
219: * The cached value of the '{@link #isAuthenticatePeer() <em>Authenticate Peer</em>}' attribute.
220: * <!-- begin-user-doc -->
221: * <!-- end-user-doc -->
222: * @see #isAuthenticatePeer()
223: * @generated
224: * @ordered
225: */
226: protected boolean authenticatePeer = AUTHENTICATE_PEER_EDEFAULT;
227:
228: /**
229: * <!-- begin-user-doc -->
230: * <!-- end-user-doc -->
231: * @generated
232: */
233: protected SSLImpl() {
234: super ();
235: }
236:
237: /**
238: * <!-- begin-user-doc -->
239: * <!-- end-user-doc -->
240: * @generated
241: */
242: protected EClass eStaticClass() {
243: return componentflowPackage.Literals.SSL;
244: }
245:
246: /**
247: * <!-- begin-user-doc -->
248: * <!-- end-user-doc -->
249: * @generated
250: */
251: public SSLMode getSslProtocol() {
252: return sslProtocol;
253: }
254:
255: /**
256: * <!-- begin-user-doc -->
257: * <!-- end-user-doc -->
258: * @generated
259: */
260: public void setSslProtocol(SSLMode newSslProtocol) {
261: SSLMode oldSslProtocol = sslProtocol;
262: sslProtocol = newSslProtocol == null ? SSL_PROTOCOL_EDEFAULT
263: : newSslProtocol;
264: if (eNotificationRequired())
265: eNotify(new ENotificationImpl(this , Notification.SET,
266: componentflowPackage.SSL__SSL_PROTOCOL,
267: oldSslProtocol, sslProtocol));
268: }
269:
270: /**
271: * <!-- begin-user-doc -->
272: * <!-- end-user-doc -->
273: * @generated
274: */
275: public boolean isAllowAnonymous() {
276: return allowAnonymous;
277: }
278:
279: /**
280: * <!-- begin-user-doc -->
281: * <!-- end-user-doc -->
282: * @generated
283: */
284: public void setAllowAnonymous(boolean newAllowAnonymous) {
285: boolean oldAllowAnonymous = allowAnonymous;
286: allowAnonymous = newAllowAnonymous;
287: if (eNotificationRequired())
288: eNotify(new ENotificationImpl(this , Notification.SET,
289: componentflowPackage.SSL__ALLOW_ANONYMOUS,
290: oldAllowAnonymous, allowAnonymous));
291: }
292:
293: /**
294: * <!-- begin-user-doc -->
295: * <!-- end-user-doc -->
296: * @generated
297: */
298: public boolean isUsePrivateKey() {
299: return usePrivateKey;
300: }
301:
302: /**
303: * <!-- begin-user-doc -->
304: * <!-- end-user-doc -->
305: * @generated
306: */
307: public void setUsePrivateKey(boolean newUsePrivateKey) {
308: boolean oldUsePrivateKey = usePrivateKey;
309: usePrivateKey = newUsePrivateKey;
310: if (eNotificationRequired())
311: eNotify(new ENotificationImpl(this , Notification.SET,
312: componentflowPackage.SSL__USE_PRIVATE_KEY,
313: oldUsePrivateKey, usePrivateKey));
314: }
315:
316: /**
317: * <!-- begin-user-doc -->
318: * <!-- end-user-doc -->
319: * @generated
320: */
321: public String getKeyStoreFile() {
322: return keyStoreFile;
323: }
324:
325: /**
326: * <!-- begin-user-doc -->
327: * <!-- end-user-doc -->
328: * @generated
329: */
330: public void setKeyStoreFile(String newKeyStoreFile) {
331: String oldKeyStoreFile = keyStoreFile;
332: keyStoreFile = newKeyStoreFile;
333: if (eNotificationRequired())
334: eNotify(new ENotificationImpl(this , Notification.SET,
335: componentflowPackage.SSL__KEY_STORE_FILE,
336: oldKeyStoreFile, keyStoreFile));
337: }
338:
339: /**
340: * <!-- begin-user-doc -->
341: * <!-- end-user-doc -->
342: * @generated
343: */
344: public String getKeyStorePassword() {
345: return keyStorePassword;
346: }
347:
348: /**
349: * <!-- begin-user-doc -->
350: * <!-- end-user-doc -->
351: * @generated
352: */
353: public void setKeyStorePassword(String newKeyStorePassword) {
354: String oldKeyStorePassword = keyStorePassword;
355: keyStorePassword = newKeyStorePassword;
356: if (eNotificationRequired())
357: eNotify(new ENotificationImpl(this , Notification.SET,
358: componentflowPackage.SSL__KEY_STORE_PASSWORD,
359: oldKeyStorePassword, keyStorePassword));
360: }
361:
362: /**
363: * <!-- begin-user-doc -->
364: * <!-- end-user-doc -->
365: * @generated
366: */
367: public boolean isUseDefaultTrustStore() {
368: return useDefaultTrustStore;
369: }
370:
371: /**
372: * <!-- begin-user-doc -->
373: * <!-- end-user-doc -->
374: * @generated
375: */
376: public void setUseDefaultTrustStore(boolean newUseDefaultTrustStore) {
377: boolean oldUseDefaultTrustStore = useDefaultTrustStore;
378: useDefaultTrustStore = newUseDefaultTrustStore;
379: if (eNotificationRequired())
380: eNotify(new ENotificationImpl(this , Notification.SET,
381: componentflowPackage.SSL__USE_DEFAULT_TRUST_STORE,
382: oldUseDefaultTrustStore, useDefaultTrustStore));
383: }
384:
385: /**
386: * <!-- begin-user-doc -->
387: * <!-- end-user-doc -->
388: * @generated
389: */
390: public String getTrustStoreFile() {
391: return trustStoreFile;
392: }
393:
394: /**
395: * <!-- begin-user-doc -->
396: * <!-- end-user-doc -->
397: * @generated
398: */
399: public void setTrustStoreFile(String newTrustStoreFile) {
400: String oldTrustStoreFile = trustStoreFile;
401: trustStoreFile = newTrustStoreFile;
402: if (eNotificationRequired())
403: eNotify(new ENotificationImpl(this , Notification.SET,
404: componentflowPackage.SSL__TRUST_STORE_FILE,
405: oldTrustStoreFile, trustStoreFile));
406: }
407:
408: /**
409: * <!-- begin-user-doc -->
410: * <!-- end-user-doc -->
411: * @generated
412: */
413: public String getTrustStorePassword() {
414: return trustStorePassword;
415: }
416:
417: /**
418: * <!-- begin-user-doc -->
419: * <!-- end-user-doc -->
420: * @generated
421: */
422: public void setTrustStorePassword(String newTrustStorePassword) {
423: String oldTrustStorePassword = trustStorePassword;
424: trustStorePassword = newTrustStorePassword;
425: if (eNotificationRequired())
426: eNotify(new ENotificationImpl(this , Notification.SET,
427: componentflowPackage.SSL__TRUST_STORE_PASSWORD,
428: oldTrustStorePassword, trustStorePassword));
429: }
430:
431: /**
432: * <!-- begin-user-doc -->
433: * <!-- end-user-doc -->
434: * @generated
435: */
436: public boolean isAuthenticatePeer() {
437: return authenticatePeer;
438: }
439:
440: /**
441: * <!-- begin-user-doc -->
442: * <!-- end-user-doc -->
443: * @generated
444: */
445: public void setAuthenticatePeer(boolean newAuthenticatePeer) {
446: boolean oldAuthenticatePeer = authenticatePeer;
447: authenticatePeer = newAuthenticatePeer;
448: if (eNotificationRequired())
449: eNotify(new ENotificationImpl(this , Notification.SET,
450: componentflowPackage.SSL__AUTHENTICATE_PEER,
451: oldAuthenticatePeer, authenticatePeer));
452: }
453:
454: /**
455: * <!-- begin-user-doc -->
456: * <!-- end-user-doc -->
457: * @generated
458: */
459: public Object eGet(int featureID, boolean resolve, boolean coreType) {
460: switch (featureID) {
461: case componentflowPackage.SSL__SSL_PROTOCOL:
462: return getSslProtocol();
463: case componentflowPackage.SSL__ALLOW_ANONYMOUS:
464: return isAllowAnonymous() ? Boolean.TRUE : Boolean.FALSE;
465: case componentflowPackage.SSL__USE_PRIVATE_KEY:
466: return isUsePrivateKey() ? Boolean.TRUE : Boolean.FALSE;
467: case componentflowPackage.SSL__KEY_STORE_FILE:
468: return getKeyStoreFile();
469: case componentflowPackage.SSL__KEY_STORE_PASSWORD:
470: return getKeyStorePassword();
471: case componentflowPackage.SSL__USE_DEFAULT_TRUST_STORE:
472: return isUseDefaultTrustStore() ? Boolean.TRUE
473: : Boolean.FALSE;
474: case componentflowPackage.SSL__TRUST_STORE_FILE:
475: return getTrustStoreFile();
476: case componentflowPackage.SSL__TRUST_STORE_PASSWORD:
477: return getTrustStorePassword();
478: case componentflowPackage.SSL__AUTHENTICATE_PEER:
479: return isAuthenticatePeer() ? Boolean.TRUE : Boolean.FALSE;
480: }
481: return super .eGet(featureID, resolve, coreType);
482: }
483:
484: /**
485: * <!-- begin-user-doc -->
486: * <!-- end-user-doc -->
487: * @generated
488: */
489: public void eSet(int featureID, Object newValue) {
490: switch (featureID) {
491: case componentflowPackage.SSL__SSL_PROTOCOL:
492: setSslProtocol((SSLMode) newValue);
493: return;
494: case componentflowPackage.SSL__ALLOW_ANONYMOUS:
495: setAllowAnonymous(((Boolean) newValue).booleanValue());
496: return;
497: case componentflowPackage.SSL__USE_PRIVATE_KEY:
498: setUsePrivateKey(((Boolean) newValue).booleanValue());
499: return;
500: case componentflowPackage.SSL__KEY_STORE_FILE:
501: setKeyStoreFile((String) newValue);
502: return;
503: case componentflowPackage.SSL__KEY_STORE_PASSWORD:
504: setKeyStorePassword((String) newValue);
505: return;
506: case componentflowPackage.SSL__USE_DEFAULT_TRUST_STORE:
507: setUseDefaultTrustStore(((Boolean) newValue).booleanValue());
508: return;
509: case componentflowPackage.SSL__TRUST_STORE_FILE:
510: setTrustStoreFile((String) newValue);
511: return;
512: case componentflowPackage.SSL__TRUST_STORE_PASSWORD:
513: setTrustStorePassword((String) newValue);
514: return;
515: case componentflowPackage.SSL__AUTHENTICATE_PEER:
516: setAuthenticatePeer(((Boolean) newValue).booleanValue());
517: return;
518: }
519: super .eSet(featureID, newValue);
520: }
521:
522: /**
523: * <!-- begin-user-doc -->
524: * <!-- end-user-doc -->
525: * @generated
526: */
527: public void eUnset(int featureID) {
528: switch (featureID) {
529: case componentflowPackage.SSL__SSL_PROTOCOL:
530: setSslProtocol(SSL_PROTOCOL_EDEFAULT);
531: return;
532: case componentflowPackage.SSL__ALLOW_ANONYMOUS:
533: setAllowAnonymous(ALLOW_ANONYMOUS_EDEFAULT);
534: return;
535: case componentflowPackage.SSL__USE_PRIVATE_KEY:
536: setUsePrivateKey(USE_PRIVATE_KEY_EDEFAULT);
537: return;
538: case componentflowPackage.SSL__KEY_STORE_FILE:
539: setKeyStoreFile(KEY_STORE_FILE_EDEFAULT);
540: return;
541: case componentflowPackage.SSL__KEY_STORE_PASSWORD:
542: setKeyStorePassword(KEY_STORE_PASSWORD_EDEFAULT);
543: return;
544: case componentflowPackage.SSL__USE_DEFAULT_TRUST_STORE:
545: setUseDefaultTrustStore(USE_DEFAULT_TRUST_STORE_EDEFAULT);
546: return;
547: case componentflowPackage.SSL__TRUST_STORE_FILE:
548: setTrustStoreFile(TRUST_STORE_FILE_EDEFAULT);
549: return;
550: case componentflowPackage.SSL__TRUST_STORE_PASSWORD:
551: setTrustStorePassword(TRUST_STORE_PASSWORD_EDEFAULT);
552: return;
553: case componentflowPackage.SSL__AUTHENTICATE_PEER:
554: setAuthenticatePeer(AUTHENTICATE_PEER_EDEFAULT);
555: return;
556: }
557: super .eUnset(featureID);
558: }
559:
560: /**
561: * <!-- begin-user-doc -->
562: * <!-- end-user-doc -->
563: * @generated
564: */
565: public boolean eIsSet(int featureID) {
566: switch (featureID) {
567: case componentflowPackage.SSL__SSL_PROTOCOL:
568: return sslProtocol != SSL_PROTOCOL_EDEFAULT;
569: case componentflowPackage.SSL__ALLOW_ANONYMOUS:
570: return allowAnonymous != ALLOW_ANONYMOUS_EDEFAULT;
571: case componentflowPackage.SSL__USE_PRIVATE_KEY:
572: return usePrivateKey != USE_PRIVATE_KEY_EDEFAULT;
573: case componentflowPackage.SSL__KEY_STORE_FILE:
574: return KEY_STORE_FILE_EDEFAULT == null ? keyStoreFile != null
575: : !KEY_STORE_FILE_EDEFAULT.equals(keyStoreFile);
576: case componentflowPackage.SSL__KEY_STORE_PASSWORD:
577: return KEY_STORE_PASSWORD_EDEFAULT == null ? keyStorePassword != null
578: : !KEY_STORE_PASSWORD_EDEFAULT
579: .equals(keyStorePassword);
580: case componentflowPackage.SSL__USE_DEFAULT_TRUST_STORE:
581: return useDefaultTrustStore != USE_DEFAULT_TRUST_STORE_EDEFAULT;
582: case componentflowPackage.SSL__TRUST_STORE_FILE:
583: return TRUST_STORE_FILE_EDEFAULT == null ? trustStoreFile != null
584: : !TRUST_STORE_FILE_EDEFAULT.equals(trustStoreFile);
585: case componentflowPackage.SSL__TRUST_STORE_PASSWORD:
586: return TRUST_STORE_PASSWORD_EDEFAULT == null ? trustStorePassword != null
587: : !TRUST_STORE_PASSWORD_EDEFAULT
588: .equals(trustStorePassword);
589: case componentflowPackage.SSL__AUTHENTICATE_PEER:
590: return authenticatePeer != AUTHENTICATE_PEER_EDEFAULT;
591: }
592: return super .eIsSet(featureID);
593: }
594:
595: /**
596: * <!-- begin-user-doc -->
597: * <!-- end-user-doc -->
598: * @generated
599: */
600: public String toString() {
601: if (eIsProxy())
602: return super .toString();
603:
604: StringBuffer result = new StringBuffer(super .toString());
605: result.append(" (sslProtocol: ");
606: result.append(sslProtocol);
607: result.append(", allowAnonymous: ");
608: result.append(allowAnonymous);
609: result.append(", usePrivateKey: ");
610: result.append(usePrivateKey);
611: result.append(", keyStoreFile: ");
612: result.append(keyStoreFile);
613: result.append(", keyStorePassword: ");
614: result.append(keyStorePassword);
615: result.append(", useDefaultTrustStore: ");
616: result.append(useDefaultTrustStore);
617: result.append(", trustStoreFile: ");
618: result.append(trustStoreFile);
619: result.append(", trustStorePassword: ");
620: result.append(trustStorePassword);
621: result.append(", authenticatePeer: ");
622: result.append(authenticatePeer);
623: result.append(')');
624: return result.toString();
625: }
626:
627: } //SSLImpl
|