11/*******************************************************************************
2- * Copyright (c) 1997, 2020 IBM Corporation and others.
2+ * Copyright (c) 1997, 2025 IBM Corporation and others.
33 * All rights reserved. This program and the accompanying materials
44 * are made available under the terms of the Eclipse Public License 2.0
55 * which accompanies this distribution, and is available at
66 * http://www.eclipse.org/legal/epl-2.0/
7- *
7+ *
88 * SPDX-License-Identifier: EPL-2.0
99 *
1010 * Contributors:
@@ -130,6 +130,9 @@ private void initializeDefaults() {
130130 }
131131
132132 JSSEProvider defaultProvider = JSSEProviderFactory .getInstance ();
133+ if (TraceComponent .isAnyTracingEnabled () && tc .isDebugEnabled ()) {
134+ Tr .debug (tc , "Defafult JSSEProvider: " + defaultProvider .toString ());
135+ }
133136
134137 if (getProperty (Constants .SSLPROP_KEY_MANAGER ) == null )
135138 setProperty (Constants .SSLPROP_KEY_MANAGER , JSSEProviderFactory .getKeyManagerFactoryAlgorithm ());
@@ -138,9 +141,10 @@ private void initializeDefaults() {
138141 && null != defaultProvider .getKeyStoreProvider ())
139142 setProperty (Constants .SSLPROP_KEY_STORE_PROVIDER , defaultProvider .getKeyStoreProvider ());
140143
141- if (getProperty (Constants .SSLPROP_PROTOCOL ) == null )
144+ if (getProperty (Constants .SSLPROP_PROTOCOL ) == null ) {
142145 setProperty (Constants .SSLPROP_PROTOCOL , defaultProvider .getDefaultProtocol ());
143-
146+ Tr .debug (tc , "Default protocol: " + defaultProvider .getDefaultProtocol ());
147+ }
144148 if (getProperty (Constants .SSLPROP_CLIENT_AUTHENTICATION ) == null )
145149 setProperty (Constants .SSLPROP_CLIENT_AUTHENTICATION , Constants .FALSE );
146150
@@ -190,14 +194,16 @@ private void initializeDefaults() {
190194 // When only a trust store is specified, use it as the key store as well.
191195 if (keyStore == null && trustStore != null && trustStorePassword != null && trustStoreType != null ) {
192196 setProperty (Constants .SSLPROP_KEY_STORE , trustStore );
193- if (trustStoreName != null ) setProperty (Constants .SSLPROP_KEY_STORE_NAME , trustStoreName );
197+ if (trustStoreName != null )
198+ setProperty (Constants .SSLPROP_KEY_STORE_NAME , trustStoreName );
194199 setProperty (Constants .SSLPROP_KEY_STORE_PASSWORD , trustStorePassword );
195200 setProperty (Constants .SSLPROP_KEY_STORE_TYPE , trustStoreType );
196201 }
197202 // When only a key store is specified, use it as the trust store as well.
198203 else if (trustStore == null && keyStore != null && keyStorePassword != null && keyStoreType != null ) {
199204 setProperty (Constants .SSLPROP_TRUST_STORE , keyStore );
200- if (keyStoreName != null ) setProperty (Constants .SSLPROP_TRUST_STORE_NAME , keyStoreName );
205+ if (keyStoreName != null )
206+ setProperty (Constants .SSLPROP_TRUST_STORE_NAME , keyStoreName );
201207 setProperty (Constants .SSLPROP_TRUST_STORE_PASSWORD , keyStorePassword );
202208 setProperty (Constants .SSLPROP_TRUST_STORE_TYPE , keyStoreType );
203209 }
@@ -298,7 +304,7 @@ public String toString() {
298304 * Load ConfigURL from a url string that names a properties file. This
299305 * method does not check that values are in valid range,
300306 *
301- * @param propertiesURL - the properties file to load the SSL properties
307+ * @param propertiesURL - the properties file to load the SSL properties
302308 * @param multiConfigURL
303309 * @return SSLConfig[]
304310 */
0 commit comments