You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@santuario.apache.org by co...@apache.org on 2017/02/13 11:09:16 UTC

svn commit: r1782742 [3/4] - in /santuario/xml-security-java/trunk/src: main/java/org/apache/jcp/xml/dsig/internal/dom/ main/java/org/apache/xml/security/algorithms/ main/java/org/apache/xml/security/algorithms/implementations/ main/java/org/apache/xml...

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/dom/utils/resolver/ResolverDirectHTTPTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/dom/utils/resolver/ResolverDirectHTTPTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/dom/utils/resolver/ResolverDirectHTTPTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/dom/utils/resolver/ResolverDirectHTTPTest.java Mon Feb 13 11:09:13 2017
@@ -1,156 +1,156 @@
-/**
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-package org.apache.xml.security.test.dom.utils.resolver;
-
-import org.apache.xml.security.Init;
-import org.apache.xml.security.utils.XMLUtils;
-import org.apache.xml.security.utils.resolver.ResourceResolver;
-import org.apache.xml.security.utils.resolver.ResourceResolverContext;
-import org.apache.xml.security.utils.resolver.ResourceResolverException;
-import org.apache.xml.security.utils.resolver.implementations.ResolverDirectHTTP;
-import org.junit.Assert;
-import org.junit.Before;
-import org.junit.Ignore;
-import org.junit.Test;
-import org.w3c.dom.Attr;
-import org.w3c.dom.Document;
-
-public class ResolverDirectHTTPTest extends Assert {
-
-    //change these properties to match your environment
-    private static final String url = "http://www.apache.org";
-    private static final String proxyHost = "127.0.0.1";
-    private static final String proxyPort = "3128";
-    private static final String proxyUsername = "proxyUser";
-    private static final String proxyPassword = "proxyPass";
-    private static final String serverUsername = "serverUser";
-    private static final String serverPassword = "serverPass";
-
-    @Before
-    public void setUp() {
-        Init.init();
-    }
-
-    @Test
-    public void testBug40783() throws Exception {
-        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
-        Attr uri = doc.createAttribute("id");
-        uri.setNodeValue("urn:ddd:uuu");
-        doc.createElement("test").setAttributeNode(uri);
-        try {
-            ResourceResolver resolver = ResourceResolver.getInstance(uri, null, true);
-            fail("No exception thrown, but resolver found: " + resolver);
-        } catch (ResourceResolverException e) {
-            //
-        }
-    }
-
-    @Test
-    @Ignore
-    public void testProxyAuth() throws Exception {
-        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
-        Attr uri = doc.createAttribute("URI");
-        uri.setNodeValue(url);
-
-        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
-        resolverDirectHTTP.engineSetProperty("http.proxy.host",proxyHost);
-        resolverDirectHTTP.engineSetProperty("http.proxy.port", proxyPort);
-        resolverDirectHTTP.engineSetProperty("http.proxy.username", proxyUsername);
-        resolverDirectHTTP.engineSetProperty("http.proxy.password", proxyPassword);
-        ResourceResolverContext context = 
-            new ResourceResolverContext(uri, url, true);
-        resolverDirectHTTP.engineResolveURI(context);
-    }
-
-    @Test
-    @Ignore
-    public void testProxyAuthWithWrongPassword() throws Exception {
-        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
-        Attr uri = doc.createAttribute("URI");
-        uri.setNodeValue(url);
-
-        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
-        resolverDirectHTTP.engineSetProperty("http.proxy.host",proxyHost);
-        resolverDirectHTTP.engineSetProperty("http.proxy.port", proxyPort);
-        resolverDirectHTTP.engineSetProperty("http.proxy.username", proxyUsername);
-        resolverDirectHTTP.engineSetProperty("http.proxy.password", "wrongPassword");
-        ResourceResolverContext context = 
-            new ResourceResolverContext(uri, url, true);
-        try {
-            resolverDirectHTTP.engineResolveURI(context);
-            Assert.fail("Expected ResourceResolverException");
-        } catch (ResourceResolverException e) {
-            Assert.assertEquals("Server returned HTTP response code: 407 for URL: " + url, e.getMessage());
-        }
-    }
-
-    @Test
-    @Ignore
-    public void testServerAuth() throws Exception {
-        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
-        Attr uri = doc.createAttribute("URI");
-        uri.setNodeValue(url);
-
-        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
-        resolverDirectHTTP.engineSetProperty("http.basic.username", serverUsername);
-        resolverDirectHTTP.engineSetProperty("http.basic.password", serverPassword);
-        ResourceResolverContext context = 
-            new ResourceResolverContext(uri, url, true);
-        resolverDirectHTTP.engineResolveURI(context);
-    }
-
-    @Test
-    @Ignore
-    public void testServerAuthWithWrongPassword() throws Exception {
-        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
-        Attr uri = doc.createAttribute("URI");
-        uri.setNodeValue(url);
-
-        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
-        resolverDirectHTTP.engineSetProperty("http.basic.username", serverUsername);
-        resolverDirectHTTP.engineSetProperty("http.basic.password", "wrongPassword");
-        ResourceResolverContext context = 
-            new ResourceResolverContext(uri, url, true);
-        try {
-            resolverDirectHTTP.engineResolveURI(context);
-            Assert.fail("Expected ResourceResolverException");
-        } catch (ResourceResolverException e) {
-            Assert.assertEquals("Server returned HTTP response code: 401 for URL: " + url, e.getMessage());
-        }
-    }
-
-    @Test
-    @Ignore
-    public void testProxyAndServerAuth() throws Exception {
-        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
-        Attr uri = doc.createAttribute("URI");
-        uri.setNodeValue(url);
-
-        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
-        resolverDirectHTTP.engineSetProperty("http.proxy.host",proxyHost);
-        resolverDirectHTTP.engineSetProperty("http.proxy.port", proxyPort);
-        resolverDirectHTTP.engineSetProperty("http.proxy.username", proxyUsername);
-        resolverDirectHTTP.engineSetProperty("http.proxy.password", proxyPassword);
-        resolverDirectHTTP.engineSetProperty("http.basic.username", serverUsername);
-        resolverDirectHTTP.engineSetProperty("http.basic.password", serverPassword);
-        ResourceResolverContext context = 
-            new ResourceResolverContext(uri, url, true);
-        resolverDirectHTTP.engineResolveURI(context);
-    }
-}
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.xml.security.test.dom.utils.resolver;
+
+import org.apache.xml.security.Init;
+import org.apache.xml.security.utils.XMLUtils;
+import org.apache.xml.security.utils.resolver.ResourceResolver;
+import org.apache.xml.security.utils.resolver.ResourceResolverContext;
+import org.apache.xml.security.utils.resolver.ResourceResolverException;
+import org.apache.xml.security.utils.resolver.implementations.ResolverDirectHTTP;
+import org.junit.Assert;
+import org.junit.Before;
+import org.junit.Ignore;
+import org.junit.Test;
+import org.w3c.dom.Attr;
+import org.w3c.dom.Document;
+
+public class ResolverDirectHTTPTest extends Assert {
+
+    //change these properties to match your environment
+    private static final String url = "http://www.apache.org";
+    private static final String proxyHost = "127.0.0.1";
+    private static final String proxyPort = "3128";
+    private static final String proxyUsername = "proxyUser";
+    private static final String proxyPassword = "proxyPass";
+    private static final String serverUsername = "serverUser";
+    private static final String serverPassword = "serverPass";
+
+    @Before
+    public void setUp() {
+        Init.init();
+    }
+
+    @Test
+    public void testBug40783() throws Exception {
+        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+        Attr uri = doc.createAttribute("id");
+        uri.setNodeValue("urn:ddd:uuu");
+        doc.createElement("test").setAttributeNode(uri);
+        try {
+            ResourceResolver resolver = ResourceResolver.getInstance(uri, null, true);
+            fail("No exception thrown, but resolver found: " + resolver);
+        } catch (ResourceResolverException e) {
+            //
+        }
+    }
+
+    @Test
+    @Ignore
+    public void testProxyAuth() throws Exception {
+        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+        Attr uri = doc.createAttribute("URI");
+        uri.setNodeValue(url);
+
+        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
+        resolverDirectHTTP.engineSetProperty("http.proxy.host",proxyHost);
+        resolverDirectHTTP.engineSetProperty("http.proxy.port", proxyPort);
+        resolverDirectHTTP.engineSetProperty("http.proxy.username", proxyUsername);
+        resolverDirectHTTP.engineSetProperty("http.proxy.password", proxyPassword);
+        ResourceResolverContext context =
+            new ResourceResolverContext(uri, url, true);
+        resolverDirectHTTP.engineResolveURI(context);
+    }
+
+    @Test
+    @Ignore
+    public void testProxyAuthWithWrongPassword() throws Exception {
+        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+        Attr uri = doc.createAttribute("URI");
+        uri.setNodeValue(url);
+
+        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
+        resolverDirectHTTP.engineSetProperty("http.proxy.host",proxyHost);
+        resolverDirectHTTP.engineSetProperty("http.proxy.port", proxyPort);
+        resolverDirectHTTP.engineSetProperty("http.proxy.username", proxyUsername);
+        resolverDirectHTTP.engineSetProperty("http.proxy.password", "wrongPassword");
+        ResourceResolverContext context =
+            new ResourceResolverContext(uri, url, true);
+        try {
+            resolverDirectHTTP.engineResolveURI(context);
+            Assert.fail("Expected ResourceResolverException");
+        } catch (ResourceResolverException e) {
+            Assert.assertEquals("Server returned HTTP response code: 407 for URL: " + url, e.getMessage());
+        }
+    }
+
+    @Test
+    @Ignore
+    public void testServerAuth() throws Exception {
+        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+        Attr uri = doc.createAttribute("URI");
+        uri.setNodeValue(url);
+
+        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
+        resolverDirectHTTP.engineSetProperty("http.basic.username", serverUsername);
+        resolverDirectHTTP.engineSetProperty("http.basic.password", serverPassword);
+        ResourceResolverContext context =
+            new ResourceResolverContext(uri, url, true);
+        resolverDirectHTTP.engineResolveURI(context);
+    }
+
+    @Test
+    @Ignore
+    public void testServerAuthWithWrongPassword() throws Exception {
+        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+        Attr uri = doc.createAttribute("URI");
+        uri.setNodeValue(url);
+
+        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
+        resolverDirectHTTP.engineSetProperty("http.basic.username", serverUsername);
+        resolverDirectHTTP.engineSetProperty("http.basic.password", "wrongPassword");
+        ResourceResolverContext context =
+            new ResourceResolverContext(uri, url, true);
+        try {
+            resolverDirectHTTP.engineResolveURI(context);
+            Assert.fail("Expected ResourceResolverException");
+        } catch (ResourceResolverException e) {
+            Assert.assertEquals("Server returned HTTP response code: 401 for URL: " + url, e.getMessage());
+        }
+    }
+
+    @Test
+    @Ignore
+    public void testProxyAndServerAuth() throws Exception {
+        Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+        Attr uri = doc.createAttribute("URI");
+        uri.setNodeValue(url);
+
+        ResolverDirectHTTP resolverDirectHTTP = new ResolverDirectHTTP();
+        resolverDirectHTTP.engineSetProperty("http.proxy.host",proxyHost);
+        resolverDirectHTTP.engineSetProperty("http.proxy.port", proxyPort);
+        resolverDirectHTTP.engineSetProperty("http.proxy.username", proxyUsername);
+        resolverDirectHTTP.engineSetProperty("http.proxy.password", proxyPassword);
+        resolverDirectHTTP.engineSetProperty("http.basic.username", serverUsername);
+        resolverDirectHTTP.engineSetProperty("http.basic.password", serverPassword);
+        ResourceResolverContext context =
+            new ResourceResolverContext(uri, url, true);
+        resolverDirectHTTP.engineResolveURI(context);
+    }
+}

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/c14n/ExclusiveC14NInteropTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/c14n/ExclusiveC14NInteropTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/c14n/ExclusiveC14NInteropTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/c14n/ExclusiveC14NInteropTest.java Mon Feb 13 11:09:13 2017
@@ -94,7 +94,7 @@ public class ExclusiveC14NInteropTest ex
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/BaltimoreEncTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/BaltimoreEncTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/BaltimoreEncTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/BaltimoreEncTest.java Mon Feb 13 11:09:13 2017
@@ -126,7 +126,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -164,7 +164,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -202,7 +202,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -240,7 +240,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -274,7 +274,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -312,7 +312,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -348,7 +348,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -384,7 +384,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -416,7 +416,7 @@ public class BaltimoreEncTest extends or
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/DecryptionTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/DecryptionTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/DecryptionTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/DecryptionTest.java Mon Feb 13 11:09:13 2017
@@ -180,7 +180,7 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -245,7 +245,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(secretKey);
@@ -304,7 +304,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(secretKey);
@@ -376,7 +376,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(kek);
@@ -448,7 +448,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(priv);
@@ -516,7 +516,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(priv);
@@ -588,7 +588,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(kek);
@@ -651,7 +651,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(secretKey);
@@ -714,7 +714,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(secretKey);
@@ -779,7 +779,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(secretKey);
@@ -846,7 +846,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(secretKey);
@@ -909,7 +909,7 @@ public class DecryptionTest extends Asse
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(secretKey);
@@ -1584,7 +1584,7 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1656,7 +1656,7 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1736,7 +1736,7 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1799,12 +1799,12 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(priv);
@@ -1850,7 +1850,7 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1912,7 +1912,7 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1971,7 +1971,7 @@ public class DecryptionTest extends Asse
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/EncryptionCreationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/EncryptionCreationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/EncryptionCreationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/EncryptionCreationTest.java Mon Feb 13 11:09:13 2017
@@ -1574,7 +1574,7 @@ public class EncryptionCreationTest exte
                 "<ns:root xmlns=\"defns.com\" xmlns:ns=\"ns.com\"><elem xmlns=\"\">11</elem></ns:root>";
         try (InputStream sourceDocument = new ByteArrayInputStream(DATA2.getBytes("UTF8"))) {
             XMLStreamReader xmlStreamReader = xmlInputFactory.createXMLStreamReader(sourceDocument);
-    
+
             XmlReaderToWriter.writeAll(xmlStreamReader, xmlStreamWriter);
             xmlStreamWriter.close();
         }

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionCreationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionCreationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionCreationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionCreationTest.java Mon Feb 13 11:09:13 2017
@@ -613,7 +613,7 @@ public class KeyWrapEncryptionCreationTe
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
             document = XMLUtils.createDocumentBuilder(false).parse(is);
         }
-        
+
         NodeList nodeList = document.getElementsByTagNameNS("urn:example:po", "PaymentInfo");
         Assert.assertEquals(nodeList.getLength(), 0);
 

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionVerificationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionVerificationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionVerificationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/KeyWrapEncryptionVerificationTest.java Mon Feb 13 11:09:13 2017
@@ -314,7 +314,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -371,7 +371,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -428,7 +428,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -485,7 +485,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -548,7 +548,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -611,7 +611,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -674,7 +674,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -737,7 +737,7 @@ public class KeyWrapEncryptionVerificati
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/SymmetricEncryptionVerificationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/SymmetricEncryptionVerificationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/SymmetricEncryptionVerificationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/encryption/SymmetricEncryptionVerificationTest.java Mon Feb 13 11:09:13 2017
@@ -134,7 +134,7 @@ public class SymmetricEncryptionVerifica
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -187,7 +187,7 @@ public class SymmetricEncryptionVerifica
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -240,7 +240,7 @@ public class SymmetricEncryptionVerifica
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -293,7 +293,7 @@ public class SymmetricEncryptionVerifica
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -346,7 +346,7 @@ public class SymmetricEncryptionVerifica
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -404,7 +404,7 @@ public class SymmetricEncryptionVerifica
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(key);
@@ -456,7 +456,7 @@ public class SymmetricEncryptionVerifica
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(key);
@@ -512,7 +512,7 @@ public class SymmetricEncryptionVerifica
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(key);
@@ -568,7 +568,7 @@ public class SymmetricEncryptionVerifica
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(key);
@@ -624,7 +624,7 @@ public class SymmetricEncryptionVerifica
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(key);
@@ -680,7 +680,7 @@ public class SymmetricEncryptionVerifica
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Decrypt
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setDecryptionKey(key);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/AbstractSignatureCreationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/AbstractSignatureCreationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/AbstractSignatureCreationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/AbstractSignatureCreationTest.java Mon Feb 13 11:09:13 2017
@@ -76,7 +76,7 @@ public class AbstractSignatureCreationTe
     ) throws Exception {
         verifyUsingDOM(document, cert, secureParts, null);
     }
-    
+
     /**
      * Verify the document using DOM
      */
@@ -88,7 +88,7 @@ public class AbstractSignatureCreationTe
     ) throws Exception {
         verifyUsingDOM(document, cert, secureParts, resourceResolverSpi, true, "Id");
     }
-    
+
     /**
      * Verify the document using DOM
      */

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/BaltimoreTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/BaltimoreTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/BaltimoreTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/BaltimoreTest.java Mon Feb 13 11:09:13 2017
@@ -137,7 +137,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -177,7 +177,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -214,7 +214,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -249,7 +249,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -284,7 +284,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -319,7 +319,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -369,7 +369,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -425,7 +425,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -469,7 +469,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -509,7 +509,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -549,7 +549,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -588,7 +588,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -624,7 +624,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -659,7 +659,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -710,7 +710,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -766,7 +766,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -827,7 +827,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -888,7 +888,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -935,7 +935,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -981,7 +981,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1035,7 +1035,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1096,7 +1096,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1151,7 +1151,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1191,7 +1191,7 @@ public class BaltimoreTest extends Asser
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1240,7 +1240,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1301,7 +1301,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1348,7 +1348,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1399,7 +1399,7 @@ public class BaltimoreTest extends Asser
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
             }
-            
+
             // Verify signature
             XMLSecurityProperties properties = new XMLSecurityProperties();
             InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -1448,7 +1448,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1509,7 +1509,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -1564,7 +1564,7 @@ public class BaltimoreTest extends Asser
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/IAIKTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/IAIKTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/IAIKTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/IAIKTest.java Mon Feb 13 11:09:13 2017
@@ -120,7 +120,7 @@ public class IAIKTest extends Assert {
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -192,7 +192,7 @@ public class IAIKTest extends Assert {
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -227,7 +227,7 @@ public class IAIKTest extends Assert {
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -333,7 +333,7 @@ public class IAIKTest extends Assert {
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PKSignatureVerificationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PKSignatureVerificationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PKSignatureVerificationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PKSignatureVerificationTest.java Mon Feb 13 11:09:13 2017
@@ -121,7 +121,7 @@ public class PKSignatureVerificationTest
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -162,7 +162,7 @@ public class PKSignatureVerificationTest
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -203,7 +203,7 @@ public class PKSignatureVerificationTest
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -249,7 +249,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(rsaKeyPair.getPublic());
@@ -293,7 +293,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(rsaKeyPair.getPublic());
@@ -332,12 +332,12 @@ public class PKSignatureVerificationTest
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(rsaKeyPair.getPublic());
@@ -376,12 +376,12 @@ public class PKSignatureVerificationTest
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(rsaKeyPair.getPublic());
@@ -425,7 +425,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(rsaKeyPair.getPublic());
@@ -469,7 +469,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(rsaKeyPair.getPublic());
@@ -513,7 +513,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(rsaKeyPair.getPublic());
@@ -554,7 +554,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(ecKeyPair.getPublic());
@@ -595,7 +595,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(ecKeyPair.getPublic());
@@ -636,7 +636,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(ecKeyPair.getPublic());
@@ -677,7 +677,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(ecKeyPair.getPublic());
@@ -718,7 +718,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(ecKeyPair.getPublic());
@@ -762,7 +762,7 @@ public class PKSignatureVerificationTest
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(ecKeyPair.getPublic());

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PhaosTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PhaosTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PhaosTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/PhaosTest.java Mon Feb 13 11:09:13 2017
@@ -99,7 +99,7 @@ public class PhaosTest extends Assert {
             javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
             ByteArrayOutputStream baos = new ByteArrayOutputStream();
             transformer.transform(new DOMSource(document), new StreamResult(baos));
-            
+
             XMLStreamReader xmlStreamReader = null;
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -140,7 +140,7 @@ public class PhaosTest extends Assert {
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -171,7 +171,7 @@ public class PhaosTest extends Assert {
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -219,7 +219,7 @@ public class PhaosTest extends Assert {
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
             }
-            
+
             // Verify signature
             XMLSecurityProperties properties = new XMLSecurityProperties();
             properties.setSignatureVerificationKey(key);
@@ -260,7 +260,7 @@ public class PhaosTest extends Assert {
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(key);
@@ -296,7 +296,7 @@ public class PhaosTest extends Assert {
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(key);
@@ -346,7 +346,7 @@ public class PhaosTest extends Assert {
             try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
                xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
             }
-            
+
             // Verify signature
             XMLSecurityProperties properties = new XMLSecurityProperties();
             InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -382,7 +382,7 @@ public class PhaosTest extends Assert {
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -418,7 +418,7 @@ public class PhaosTest extends Assert {
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -449,7 +449,7 @@ public class PhaosTest extends Assert {
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/RSASecurityTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/RSASecurityTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/RSASecurityTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/RSASecurityTest.java Mon Feb 13 11:09:13 2017
@@ -81,7 +81,7 @@ public class RSASecurityTest extends Abs
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -117,7 +117,7 @@ public class RSASecurityTest extends Abs
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureCreationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureCreationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureCreationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureCreationTest.java Mon Feb 13 11:09:13 2017
@@ -377,7 +377,7 @@ public class SignatureCreationTest exten
 
         // Specify the signature position
         properties.setIdAttributeNS(new QName(null, "ID"));
-        
+
         // Set the key up
         KeyStore keyStore = KeyStore.getInstance("jks");
         keyStore.load(
@@ -422,8 +422,8 @@ public class SignatureCreationTest exten
         // Verify using DOM
         verifyUsingDOM(document, cert, properties.getSignatureSecureParts(),null,true,"ID");
     }
-    
-    
+
+
     @Test
     public void testMultipleElements() throws Exception {
         // Set up the Configuration
@@ -986,7 +986,7 @@ public class SignatureCreationTest exten
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
             document = XMLUtils.createDocumentBuilder(false).parse(is);
         }
-        
+
         // Verify using DOM
         verifyUsingDOM(document, cert, properties.getSignatureSecureParts());
     }

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureDigestVerificationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureDigestVerificationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureDigestVerificationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureDigestVerificationTest.java Mon Feb 13 11:09:13 2017
@@ -133,7 +133,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -185,7 +185,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -237,7 +237,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -289,7 +289,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -341,7 +341,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -396,7 +396,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -451,7 +451,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -506,7 +506,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -561,7 +561,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -616,7 +616,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);
@@ -671,7 +671,7 @@ public class SignatureDigestVerification
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         InboundXMLSec inboundXMLSec = XMLSec.getInboundWSSec(properties);

Modified: santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureHMACVerificationTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureHMACVerificationTest.java?rev=1782742&r1=1782741&r2=1782742&view=diff
==============================================================================
--- santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureHMACVerificationTest.java (original)
+++ santuario/xml-security-java/trunk/src/test/java/org/apache/xml/security/test/stax/signature/SignatureHMACVerificationTest.java Mon Feb 13 11:09:13 2017
@@ -119,7 +119,7 @@ public class SignatureHMACVerificationTe
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-       
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -165,7 +165,7 @@ public class SignatureHMACVerificationTe
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -211,7 +211,7 @@ public class SignatureHMACVerificationTe
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -257,12 +257,12 @@ public class SignatureHMACVerificationTe
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
         }
-        
+
         // Verify signature
         XMLSecurityProperties properties = new XMLSecurityProperties();
         properties.setSignatureVerificationKey(key);
@@ -303,7 +303,7 @@ public class SignatureHMACVerificationTe
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);
@@ -352,7 +352,7 @@ public class SignatureHMACVerificationTe
         javax.xml.transform.Transformer transformer = transformerFactory.newTransformer();
         ByteArrayOutputStream baos = new ByteArrayOutputStream();
         transformer.transform(new DOMSource(document), new StreamResult(baos));
-        
+
         XMLStreamReader xmlStreamReader = null;
         try (InputStream is = new ByteArrayInputStream(baos.toByteArray())) {
            xmlStreamReader = xmlInputFactory.createXMLStreamReader(is);