You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@santuario.apache.org by co...@apache.org on 2018/06/06 08:24:44 UTC
svn commit: r1832986 [2/7] - in
/santuario/xml-security-java/branches/2.0.x-fixes: ./
src/main/java/org/apache/jcp/xml/dsig/internal/dom/
src/main/java/org/apache/xml/security/
src/main/java/org/apache/xml/security/c14n/
src/main/java/org/apache/xml/se...
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/HMACSignatureAlgorithmTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/HMACSignatureAlgorithmTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/HMACSignatureAlgorithmTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/HMACSignatureAlgorithmTest.java Wed Jun 6 08:24:42 2018
@@ -29,7 +29,6 @@ import java.util.UUID;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathFactory;
@@ -88,8 +87,7 @@ public class HMACSignatureAlgorithmTest
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
byte[] hmacKey = "secret".getBytes("ASCII");
@@ -109,8 +107,7 @@ public class HMACSignatureAlgorithmTest
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
byte[] hmacKey = "secret".getBytes("ASCII");
@@ -130,8 +127,7 @@ public class HMACSignatureAlgorithmTest
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
byte[] hmacKey = "secret".getBytes("ASCII");
@@ -151,8 +147,7 @@ public class HMACSignatureAlgorithmTest
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
byte[] hmacKey = "secret".getBytes("ASCII");
@@ -172,8 +167,7 @@ public class HMACSignatureAlgorithmTest
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
byte[] hmacKey = "secret".getBytes("ASCII");
@@ -193,8 +187,7 @@ public class HMACSignatureAlgorithmTest
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
byte[] hmacKey = "secret".getBytes("ASCII");
@@ -217,8 +210,7 @@ public class HMACSignatureAlgorithmTest
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
byte[] hmacKey = "secret".getBytes("ASCII");
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/KeyWrapEncryptionAlgorithmTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/KeyWrapEncryptionAlgorithmTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/KeyWrapEncryptionAlgorithmTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/KeyWrapEncryptionAlgorithmTest.java Wed Jun 6 08:24:42 2018
@@ -30,7 +30,6 @@ import java.util.List;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathFactory;
@@ -95,8 +94,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -136,8 +134,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -177,8 +174,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -218,8 +214,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("DESede");
@@ -257,8 +252,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("DESede");
@@ -294,8 +288,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("DESede");
@@ -331,8 +324,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("DESede");
@@ -371,8 +363,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("Camellia");
@@ -415,8 +406,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("Camellia");
@@ -459,8 +449,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("Camellia");
@@ -503,8 +492,7 @@ public class KeyWrapEncryptionAlgorithmT
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("SEED");
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/PKSignatureAlgorithmTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/PKSignatureAlgorithmTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/PKSignatureAlgorithmTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/PKSignatureAlgorithmTest.java Wed Jun 6 08:24:42 2018
@@ -29,7 +29,6 @@ import java.util.ArrayList;
import java.util.List;
import java.util.UUID;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathFactory;
@@ -95,8 +94,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -112,8 +110,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -129,8 +126,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -146,8 +142,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -163,8 +158,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -180,8 +174,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -200,8 +193,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -220,8 +212,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -240,8 +231,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -260,8 +250,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -280,8 +269,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -300,8 +288,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -319,8 +306,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -338,8 +324,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -357,8 +342,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -376,8 +360,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -393,8 +376,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -410,8 +392,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -427,8 +408,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -444,8 +424,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -461,8 +440,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
@@ -481,8 +459,7 @@ public class PKSignatureAlgorithmTest ex
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
List<String> localNames = new ArrayList<String>();
localNames.add("PaymentInfo");
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SignatureAlgorithmTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SignatureAlgorithmTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SignatureAlgorithmTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SignatureAlgorithmTest.java Wed Jun 6 08:24:42 2018
@@ -38,7 +38,7 @@ public class SignatureAlgorithmTest exte
@org.junit.Test
public void testSameKeySeveralAlgorithmSigning() throws Exception {
- Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+ Document doc = XMLUtils.newDocument(false);
SignatureAlgorithm signatureAlgorithm =
new SignatureAlgorithm(doc, XMLSignature.ALGO_ID_SIGNATURE_RSA_SHA1);
PrivateKey pk = KeyPairGenerator.getInstance("RSA").genKeyPair().getPrivate();
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SymmetricEncryptionAlgorithmTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SymmetricEncryptionAlgorithmTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SymmetricEncryptionAlgorithmTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/algorithms/SymmetricEncryptionAlgorithmTest.java Wed Jun 6 08:24:42 2018
@@ -28,7 +28,6 @@ import java.util.List;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathFactory;
@@ -87,8 +86,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -120,8 +118,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -153,8 +150,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -186,8 +182,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -219,8 +214,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -252,8 +246,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("AES");
@@ -285,8 +278,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("DESede");
@@ -320,8 +312,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("SEED");
@@ -356,8 +347,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("Camellia");
@@ -392,8 +382,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("Camellia");
@@ -428,8 +417,7 @@ public class SymmetricEncryptionAlgorith
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream(
"ie/baltimore/merlin-examples/merlin-xmlenc-five/plaintext.xml");
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(sourceDocument);
+ Document document = XMLUtils.parse(sourceDocument, false);
// Set up the Key
KeyGenerator keygen = KeyGenerator.getInstance("Camellia");
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/helper/AttrCompareTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/helper/AttrCompareTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/helper/AttrCompareTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/helper/AttrCompareTest.java Wed Jun 6 08:24:42 2018
@@ -18,7 +18,6 @@
*/
package org.apache.xml.security.test.dom.c14n.helper;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.ParserConfigurationException;
import org.apache.xml.security.c14n.helper.AttrCompare;
@@ -217,9 +216,7 @@ public class AttrCompareTest extends org
private static Document createDoc(
String documentElement
) throws ParserConfigurationException {
- DocumentBuilder documentBuilder = XMLUtils.createDocumentBuilder(false);
-
- Document doc = documentBuilder.newDocument();
+ Document doc = XMLUtils.newDocument(false);
Element root = doc.createElementNS(null, documentElement);
doc.appendChild(root);
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Bug45961Test.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Bug45961Test.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Bug45961Test.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Bug45961Test.java Wed Jun 6 08:24:42 2018
@@ -23,8 +23,6 @@ import java.security.KeyStore;
import java.security.PrivateKey;
import java.security.cert.X509Certificate;
-import javax.xml.parsers.DocumentBuilder;
-
import org.apache.xml.security.Init;
import org.apache.xml.security.c14n.Canonicalizer;
import org.apache.xml.security.keys.KeyInfo;
@@ -45,14 +43,12 @@ public class Bug45961Test extends org.ju
MockCanonicalizationMethod.MOCK_CANONICALIZATION_METHOD;
private static final char[] PASSWORD = "changeit".toCharArray();
private static final String ALIAS = "mullan";
- private DocumentBuilder _builder;
private ObjectContainer object;
public Bug45961Test() throws Exception {
Init.init();
Canonicalizer.register(MOCK_CANONICALIZATION_METHOD,
MockCanonicalizationMethod.class.getName());
- _builder = XMLUtils.createDocumentBuilder(false);
}
@org.junit.Test
@@ -82,7 +78,7 @@ public class Bug45961Test extends org.ju
X509Certificate signingCert = (X509Certificate) ks
.getCertificate(ALIAS);
- Document document = _builder.newDocument();
+ Document document = XMLUtils.newDocument(false);
XMLSignature signature = new XMLSignature(document, null,
XMLSignature.ALGO_ID_SIGNATURE_DSA,
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer11Test.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer11Test.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer11Test.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer11Test.java Wed Jun 6 08:24:42 2018
@@ -26,6 +26,7 @@ import java.util.HashMap;
import java.util.Map;
import javax.xml.parsers.DocumentBuilder;
+import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.parsers.ParserConfigurationException;
import javax.xml.transform.TransformerException;
import javax.xml.xpath.XPath;
@@ -39,7 +40,6 @@ import org.apache.xml.security.c14n.Inva
import org.apache.xml.security.test.dom.DSNamespaceContext;
import org.apache.xml.security.utils.IgnoreAllErrorHandler;
import org.apache.xml.security.utils.JavaUtils;
-import org.apache.xml.security.utils.XMLUtils;
import org.w3c.dom.Document;
import org.w3c.dom.NodeList;
import org.xml.sax.SAXException;
@@ -355,17 +355,20 @@ public class Canonicalizer11Test extends
ParserConfigurationException, CanonicalizationException,
InvalidCanonicalizerException, TransformerException, XPathExpressionException {
- DocumentBuilder documentBuilder = XMLUtils.createDocumentBuilder(validating, false);
-
- // throw away all warnings and errors
- documentBuilder.setErrorHandler(new IgnoreAllErrorHandler());
-
// org.xml.sax.EntityResolver resolver = new TestVectorResolver();
// documentBuilder.setEntityResolver(resolver);
// Document doc = documentBuilder.parse(resolver.resolveEntity(null, fileIn));
- Document doc = documentBuilder.parse(fileIn);
+ DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();
+ dbf.setNamespaceAware(true);
+ dbf.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true);
+ dbf.setValidating(validating);
+ DocumentBuilder documentBuilder = dbf.newDocumentBuilder();
+
+ // throw away all warnings and errors
+ documentBuilder.setErrorHandler(new IgnoreAllErrorHandler());
+ Document doc = documentBuilder.parse(fileIn);
Canonicalizer c14n = Canonicalizer.getInstance(c14nURI);
byte c14nBytes[] = null;
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315ExclusiveTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315ExclusiveTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315ExclusiveTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315ExclusiveTest.java Wed Jun 6 08:24:42 2018
@@ -19,13 +19,13 @@
package org.apache.xml.security.test.dom.c14n.implementations;
import java.io.File;
+import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.io.StringReader;
import java.util.HashSet;
import java.util.Set;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.ParserConfigurationException;
import javax.xml.transform.TransformerException;
import javax.xml.xpath.XPath;
@@ -70,13 +70,6 @@ public class Canonicalizer20010315Exclus
Canonicalizer20010315ExclusiveTest.class
);
- /** Field db */
- DocumentBuilder db;
-
- public Canonicalizer20010315ExclusiveTest() throws ParserConfigurationException {
- this.db = XMLUtils.createDocumentBuilder(false);
- }
-
/**
* Method testA
*
@@ -105,7 +98,7 @@ public class Canonicalizer20010315Exclus
// File fileIn = new File("signature.xml");
assertTrue("file exists", fileIn.exists());
- Document doc = this.db.parse(fileIn);
+ Document doc = XMLUtils.parse(new FileInputStream(fileIn), false);
Element signatureElement =
(Element) doc.getElementsByTagNameNS(
Constants.SignatureSpecNS, Constants._TAG_SIGNATURE).item(0);
@@ -150,8 +143,8 @@ public class Canonicalizer20010315Exclus
XMLSignatureException, XMLSecurityException {
Document doc =
- this.db.parse(
- getAbsolutePath("src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_1.xml")
+ XMLUtils.parse(
+ new FileInputStream(getAbsolutePath("src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_1.xml")), false
);
Node root = doc.getElementsByTagNameNS("http://example.net", "elem2").item(0);
Canonicalizer20010315 c = new Canonicalizer20010315WithComments();
@@ -183,8 +176,8 @@ public class Canonicalizer20010315Exclus
InvalidCanonicalizerException, TransformerException,
XMLSignatureException, XMLSecurityException {
Document doc =
- this.db.parse(getAbsolutePath(
- "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_2.xml")
+ XMLUtils.parse(new FileInputStream(getAbsolutePath(
+ "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_2.xml")), false
);
Node root = doc.getElementsByTagNameNS("http://example.net", "elem2").item(0);
Canonicalizer20010315 c = new Canonicalizer20010315WithComments();
@@ -216,8 +209,8 @@ public class Canonicalizer20010315Exclus
InvalidCanonicalizerException, TransformerException,
XMLSignatureException, XMLSecurityException {
Document doc =
- this.db.parse(getAbsolutePath(
- "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_1.xml"));
+ XMLUtils.parse(new FileInputStream(getAbsolutePath(
+ "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_1.xml")), false);
Node root = doc.getElementsByTagNameNS("http://example.net", "elem2").item(0);
Canonicalizer20010315Excl c = new Canonicalizer20010315ExclWithComments();
byte[] reference = JavaUtils.getBytesFromFile(getAbsolutePath(
@@ -248,8 +241,8 @@ public class Canonicalizer20010315Exclus
InvalidCanonicalizerException, TransformerException,
XMLSignatureException, XMLSecurityException {
Document doc =
- this.db.parse(getAbsolutePath(
- "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_2.xml"));
+ XMLUtils.parse(new FileInputStream(getAbsolutePath(
+ "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_2.xml")), false);
Node root = doc.getElementsByTagNameNS("http://example.net", "elem2").item(0);
Canonicalizer20010315Excl c = new Canonicalizer20010315ExclWithComments();
byte[] reference = JavaUtils.getBytesFromFile(getAbsolutePath(
@@ -283,8 +276,8 @@ public class Canonicalizer20010315Exclus
InvalidCanonicalizerException, TransformerException,
XMLSignatureException, XMLSecurityException, XPathExpressionException {
Document doc =
- this.db.parse(getAbsolutePath(
- "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_3.xml"));
+ XMLUtils.parse(new FileInputStream(getAbsolutePath(
+ "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_2_3.xml")), false);
XPathFactory xpf = XPathFactory.newInstance();
XPath xpath = xpf.newXPath();
@@ -335,7 +328,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
Set<Node> nodeSet = new HashSet<Node>();
@@ -353,9 +346,9 @@ public class Canonicalizer20010315Exclus
@org.junit.Test
public void test24excl() throws Exception {
Document doc =
- this.db.parse(
- getAbsolutePath(
- "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_4.xml"));
+ XMLUtils.parse(
+ new FileInputStream(getAbsolutePath(
+ "src/test/resources/org/apache/xml/security/c14n/inExcl/example2_4.xml")), false);
Node root =
doc.getElementsByTagNameNS("http://example.net", "elem2").item(0);
Canonicalizer20010315Excl c = new Canonicalizer20010315ExclWithComments();
@@ -375,7 +368,7 @@ public class Canonicalizer20010315Exclus
*/
@org.junit.Test
public void test24Aexcl() throws Exception {
- Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+ Document doc = XMLUtils.newDocument(false);
Element local = doc.createElementNS("foo:bar", "dsig:local");
Element test = doc.createElementNS("http://example.net", "etsi:test");
Element elem2 = doc.createElementNS("http://example.net", "etsi:elem2");
@@ -428,7 +421,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
{
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
@@ -491,7 +484,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
{
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
@@ -541,7 +534,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
{
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
@@ -591,7 +584,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
{
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
@@ -641,7 +634,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
byte[] bytes = c14n.engineCanonicalizeSubTree(doc.getDocumentElement().getFirstChild(), "#default", true);
@@ -676,7 +669,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
byte[] bytes = c14n.engineCanonicalizeSubTree(doc.getDocumentElement().getFirstChild(), "#default", true);
@@ -711,7 +704,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
byte[] bytes = c14n.engineCanonicalizeSubTree(doc.getDocumentElement().getFirstChild(), "#default", true);
@@ -746,7 +739,7 @@ public class Canonicalizer20010315Exclus
+ "</ns0:Ping>"
+ "</env:Body>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
byte[] bytes = c14n.engineCanonicalizeSubTree(doc.getDocumentElement().getFirstChild(), "#default", true);
@@ -776,7 +769,7 @@ public class Canonicalizer20010315Exclus
+ "<ns0:text xsi:type=\"xsd:string\">hello</ns0:text>"
+ "</ns0:Ping>";
- Document doc = this.db.parse(new InputSource(new StringReader(XML)));
+ Document doc = XMLUtils.parse(new InputSource(new StringReader(XML)), false);
Canonicalizer20010315ExclOmitComments c14n =
new Canonicalizer20010315ExclOmitComments();
byte[] bytes = c14n.engineCanonicalizeSubTree(doc.getDocumentElement().getFirstChild().getFirstChild(), "#default", true);
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315Test.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315Test.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315Test.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Canonicalizer20010315Test.java Wed Jun 6 08:24:42 2018
@@ -29,6 +29,7 @@ import java.util.HashMap;
import java.util.Map;
import javax.xml.parsers.DocumentBuilder;
+import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.parsers.ParserConfigurationException;
import javax.xml.transform.OutputKeys;
import javax.xml.transform.Transformer;
@@ -608,7 +609,12 @@ public class Canonicalizer20010315Test e
//String c14nURI = Canonicalizer.ALGO_ID_C14N_OMIT_COMMENTS;
//boolean validating = true;
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false, false);
+ DocumentBuilderFactory f = DocumentBuilderFactory.newInstance();
+ f.setNamespaceAware(true);
+ f.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true);
+ f.setValidating(false);
+
+ DocumentBuilder db = f.newDocumentBuilder();
org.xml.sax.EntityResolver resolver = new TestVectorResolver();
db.setEntityResolver(resolver);
@@ -675,8 +681,7 @@ public class Canonicalizer20010315Test e
+ "";
//J+
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new ByteArrayInputStream(inputStr.getBytes()));
+ Document doc = XMLUtils.parse(new ByteArrayInputStream(inputStr.getBytes()), false);
boolean weCatchedTheRelativeNS = false;
try {
@@ -984,11 +989,8 @@ public class Canonicalizer20010315Test e
ParserConfigurationException, CanonicalizationException,
InvalidCanonicalizerException, TransformerException, XPathExpressionException {
- DocumentBuilder db = XMLUtils.createDocumentBuilder(true);
-
- db.setErrorHandler(new IgnoreAllErrorHandler());
+ Document doc = XMLUtils.parse(new ByteArrayInputStream(input.getBytes()), true, true, true);
- Document doc = db.parse(new ByteArrayInputStream(input.getBytes()));
Canonicalizer c14nizer =
Canonicalizer.getInstance(Canonicalizer.ALGO_ID_C14N_OMIT_COMMENTS);
@@ -1036,17 +1038,20 @@ public class Canonicalizer20010315Test e
ParserConfigurationException, CanonicalizationException,
InvalidCanonicalizerException, TransformerException, XPathExpressionException {
- DocumentBuilder documentBuilder = XMLUtils.createDocumentBuilder(validating, false);
-
- // throw away all warnings and errors
- documentBuilder.setErrorHandler(new IgnoreAllErrorHandler());
-
// org.xml.sax.EntityResolver resolver = new TestVectorResolver();
// documentBuilder.setEntityResolver(resolver);
// Document doc = documentBuilder.parse(resolver.resolveEntity(null, fileIn));
- Document doc = documentBuilder.parse(fileIn);
+ DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();
+ dbf.setNamespaceAware(true);
+ dbf.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true);
+ dbf.setValidating(validating);
+
+ DocumentBuilder documentBuilder = dbf.newDocumentBuilder();
+ // throw away all warnings and errors
+ documentBuilder.setErrorHandler(new IgnoreAllErrorHandler());
+ Document doc = documentBuilder.parse(fileIn);
Canonicalizer c14n = Canonicalizer.getInstance(c14nURI);
byte c14nBytes[] = null;
@@ -1074,7 +1079,7 @@ public class Canonicalizer20010315Test e
// if everything is OK, result is true; we do a binary compare, byte by byte
boolean result = java.security.MessageDigest.isEqual(refBytes, c14nBytes);
- if (!result) {
+ if (!result) {
File f = new File(fileOut);
if (!f.exists()) {
File parent = new File(f.getParent());
@@ -1110,8 +1115,8 @@ public class Canonicalizer20010315Test e
//String ENCODING_ISO8859_1 = "ISO-8859-1";
//String ENCODING_UTF8 = "UTF-8";
String ENCODING_UTF16 = "UTF-16";
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new ByteArrayInputStream(input));
+ Document doc = XMLUtils.parse(new ByteArrayInputStream(input), false);
+
TransformerFactory tFactory = TransformerFactory.newInstance();
Transformer transformer = tFactory.newTransformer();
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/ExclusiveC14NInteropTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/ExclusiveC14NInteropTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/ExclusiveC14NInteropTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/ExclusiveC14NInteropTest.java Wed Jun 6 08:24:42 2018
@@ -19,6 +19,7 @@
package org.apache.xml.security.test.dom.c14n.implementations;
import java.io.File;
+import java.io.FileInputStream;
import org.apache.xml.security.signature.Reference;
import org.apache.xml.security.signature.XMLSignature;
@@ -125,8 +126,7 @@ public class ExclusiveC14NInteropTest ex
File f = new File(directory + "/" + file);
- javax.xml.parsers.DocumentBuilder db = XMLUtils.createDocumentBuilder(false, false);
- org.w3c.dom.Document doc = db.parse(f);
+ org.w3c.dom.Document doc = XMLUtils.parse(new FileInputStream(f), false, false);
Element sigElement =
(Element) doc.getElementsByTagNameNS(Constants.SignatureSpecNS,
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/NameSpaceSymbTableTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/NameSpaceSymbTableTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/NameSpaceSymbTableTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/NameSpaceSymbTableTest.java Wed Jun 6 08:24:42 2018
@@ -30,7 +30,7 @@ public class NameSpaceSymbTableTest exte
static Attr node1,node2;
static {
try {
- Document doc = XMLUtils.createDocumentBuilder(false).newDocument();
+ Document doc = XMLUtils.newDocument(false);
node1 = doc.createAttributeNS("a","b");
node2 = doc.createAttributeNS("b","c");
} catch (Exception e) {
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario191Test.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario191Test.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario191Test.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario191Test.java Wed Jun 6 08:24:42 2018
@@ -21,8 +21,6 @@ package org.apache.xml.security.test.dom
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
-import javax.xml.parsers.DocumentBuilder;
-
import org.w3c.dom.Document;
import org.w3c.dom.NodeList;
import org.apache.xml.security.c14n.implementations.Canonicalizer11;
@@ -52,8 +50,6 @@ public class Santuario191Test extends or
+ " <user2>Bob</user2>"
+ "</data>";
- private DocumentBuilder db;
-
static {
org.apache.xml.security.Init.init();
}
@@ -63,8 +59,7 @@ public class Santuario191Test extends or
//
// Parse the Data
//
- db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new ByteArrayInputStream(INPUT_DATA.getBytes("UTF8")));
+ Document doc = XMLUtils.parse(new ByteArrayInputStream(INPUT_DATA.getBytes("UTF8")), false);
//
// Canonicalize the data
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario273Test.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario273Test.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario273Test.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/c14n/implementations/Santuario273Test.java Wed Jun 6 08:24:42 2018
@@ -20,7 +20,6 @@ package org.apache.xml.security.test.dom
import java.io.ByteArrayInputStream;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathFactory;
@@ -76,12 +75,9 @@ public class Santuario273Test extends or
@org.junit.Test
public void testC14n11Base() throws Exception {
- DocumentBuilder documentBuilder = XMLUtils.createDocumentBuilder(true);
-
- documentBuilder.setErrorHandler(new org.apache.xml.security.utils.IgnoreAllErrorHandler());
byte inputBytes[] = input.getBytes();
Document doc =
- documentBuilder.parse(new ByteArrayInputStream(inputBytes));
+ XMLUtils.parse(new ByteArrayInputStream(inputBytes), true, true, true);
Canonicalizer c14n =
Canonicalizer.getInstance(Canonicalizer.ALGO_ID_C14N11_OMIT_COMMENTS);
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/BaltimoreEncTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/BaltimoreEncTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/BaltimoreEncTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/BaltimoreEncTest.java Wed Jun 6 08:24:42 2018
@@ -32,7 +32,6 @@ import javax.crypto.Cipher;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathExpressionException;
@@ -89,8 +88,7 @@ public class BaltimoreEncTest extends or
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
cardNumber = retrieveCCNumber(doc);
@@ -390,8 +388,7 @@ public class BaltimoreEncTest extends or
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
// Now we have the document, lets build the XMLCipher element
Element ee = null;
@@ -430,8 +427,7 @@ public class BaltimoreEncTest extends or
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
// Now we have the document, lets build the XMLCipher element
Element ee = null;
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/EncryptContentTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/EncryptContentTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/EncryptContentTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/EncryptContentTest.java Wed Jun 6 08:24:42 2018
@@ -26,7 +26,6 @@ import javax.crypto.NoSuchPaddingExcepti
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESedeKeySpec;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.transform.TransformerFactory;
import org.apache.xml.security.algorithms.JCEMapper;
@@ -67,13 +66,11 @@ public class EncryptContentTest extends
" </user>\n" +
"</users>\n";
- private DocumentBuilder db;
private SecretKey secretKey;
private boolean haveISOPadding;
public EncryptContentTest() throws Exception {
org.apache.xml.security.Init.init();
- db = XMLUtils.createDocumentBuilder(false);
byte[] bits192 = "abcdefghijklmnopqrstuvwx".getBytes();
DESedeKeySpec keySpec = new DESedeKeySpec(bits192);
@@ -112,7 +109,8 @@ public class EncryptContentTest extends
return;
}
- Document doc = db.parse(new ByteArrayInputStream(DATA.getBytes("UTF8")));
+ Document doc = XMLUtils.parse(new ByteArrayInputStream(DATA.getBytes("UTF8")), false);
+
NodeList dataToEncrypt = doc.getElementsByTagName("user");
XMLCipher dataCipher = XMLCipher.getInstance(XMLCipher.TRIPLEDES);
@@ -161,7 +159,8 @@ public class EncryptContentTest extends
return;
}
- Document doc = db.parse(new ByteArrayInputStream(MULTIPLE_USER_DATA.getBytes("UTF8")));
+ Document doc = XMLUtils.parse(new ByteArrayInputStream(MULTIPLE_USER_DATA.getBytes("UTF8")), false);
+
NodeList dataToEncrypt = doc.getElementsByTagName("user");
XMLCipher dataCipher = XMLCipher.getInstance(XMLCipher.TRIPLEDES);
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/ReferenceListTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/ReferenceListTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/ReferenceListTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/ReferenceListTest.java Wed Jun 6 08:24:42 2018
@@ -20,8 +20,6 @@ package org.apache.xml.security.test.dom
import java.util.Iterator;
-import javax.xml.parsers.DocumentBuilder;
-
import org.apache.xml.security.encryption.Reference;
import org.apache.xml.security.encryption.ReferenceList;
import org.apache.xml.security.encryption.XMLCipher;
@@ -35,16 +33,13 @@ public class ReferenceListTest extends o
static org.slf4j.Logger log =
org.slf4j.LoggerFactory.getLogger(ReferenceListTest.class);
- private DocumentBuilder db;
-
public ReferenceListTest() throws Exception {
org.apache.xml.security.Init.init();
- db = XMLUtils.createDocumentBuilder(false);
}
@org.junit.Test
public void testReferenceList() throws Exception {
- Document doc = db.newDocument();
+ Document doc = XMLUtils.newDocument(false);
XMLCipher dataCipher = XMLCipher.getInstance();
dataCipher.init(XMLCipher.DECRYPT_MODE, null);
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/SignedEncryptedTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/SignedEncryptedTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/SignedEncryptedTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/SignedEncryptedTest.java Wed Jun 6 08:24:42 2018
@@ -34,7 +34,6 @@ import org.w3c.dom.Element;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.transform.TransformerFactory;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
@@ -100,8 +99,7 @@ public class SignedEncryptedTest extends
}
public void secureAndVerify(TransformerFactory transformerFactory, boolean useDocumentSerializer) throws Exception {
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(new ByteArrayInputStream(SAMPLE_MSG.getBytes("UTF-8")));
+ Document document = XMLUtils.parse(new ByteArrayInputStream(SAMPLE_MSG.getBytes("UTF-8")), false);
// Set up the Key
KeyPairGenerator rsaKeygen = KeyPairGenerator.getInstance("RSA");
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLCipherTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLCipherTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLCipherTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLCipherTest.java Wed Jun 6 08:24:42 2018
@@ -22,6 +22,7 @@ import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.File;
import java.lang.reflect.Constructor;
+import java.io.FileInputStream;
import java.security.Key;
import java.security.KeyPairGenerator;
import java.security.KeyPair;
@@ -38,7 +39,6 @@ import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESedeKeySpec;
import javax.crypto.spec.SecretKeySpec;
-import javax.xml.parsers.DocumentBuilder;
import org.apache.xml.security.algorithms.JCEMapper;
import org.apache.xml.security.c14n.Canonicalizer;
@@ -651,9 +651,8 @@ public class XMLCipherTest extends org.j
public void testSameDocumentCipherReference() throws Exception {
if (haveISOPadding) {
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document d = db.newDocument();
+ Document d = XMLUtils.newDocument(false);
Element docElement = d.createElement("EncryptedDoc");
d.appendChild(docElement);
@@ -724,7 +723,6 @@ public class XMLCipherTest extends org.j
public void testPhysicalRepresentation() throws Exception {
if (haveISOPadding) {
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
byte[] bits192 = "abcdefghijklmnopqrstuvwx".getBytes();
DESedeKeySpec keySpec = new DESedeKeySpec(bits192);
@@ -734,7 +732,7 @@ public class XMLCipherTest extends org.j
// Test inherited namespaces don't add extra attributes
// Test unused namespaces are preserved
final String DATA1 = "<ns:root xmlns:ns=\"ns.com\"><ns:elem xmlns:ns2=\"ns2.com\">11</ns:elem></ns:root>";
- Document doc = db.parse(new ByteArrayInputStream(DATA1.getBytes("UTF8")));
+ Document doc = XMLUtils.parse(new ByteArrayInputStream(DATA1.getBytes("UTF8")), false);
Element elem = (Element)doc.getDocumentElement().getFirstChild();
XMLCipher dataCipher = XMLCipher.getInstance(XMLCipher.TRIPLEDES);
@@ -758,7 +756,7 @@ public class XMLCipherTest extends org.j
// Test default namespace undeclaration is preserved
final String DATA2 = "<ns:root xmlns=\"defns.com\" xmlns:ns=\"ns.com\"><elem xmlns=\"\">11</elem></ns:root>";
- doc = db.parse(new ByteArrayInputStream(DATA2.getBytes("UTF8")));
+ doc = XMLUtils.parse(new ByteArrayInputStream(DATA2.getBytes("UTF8")), false);
elem = (Element)doc.getDocumentElement().getFirstChild();
dataCipher = XMLCipher.getInstance(XMLCipher.TRIPLEDES);
@@ -783,8 +781,9 @@ public class XMLCipherTest extends org.j
// Test comments and PIs are not treated specially when serializing element content.
// Other c14n algorithms add a newline after comments and PIs, when they are before or after the document element.
final String DATA3 = "<root><!--comment1--><?pi1 target1?><elem/><!--comment2--><?pi2 target2?></root>";
- doc = db.parse(new ByteArrayInputStream(DATA3.getBytes("UTF8")));
- elem = (Element)doc.getDocumentElement();
+
+ doc = XMLUtils.parse(new ByteArrayInputStream(DATA3.getBytes("UTF8")), false);
+ elem = doc.getDocumentElement();
dataCipher = XMLCipher.getInstance(XMLCipher.TRIPLEDES);
dataCipher.init(XMLCipher.ENCRYPT_MODE, secretKey);
@@ -877,8 +876,7 @@ public class XMLCipherTest extends org.j
}
File f = new File(filename);
- DocumentBuilder builder = XMLUtils.createDocumentBuilder(false);
- Document document = builder.parse(f);
+ Document document = XMLUtils.parse(new FileInputStream(f), false);
XMLCipher keyCipher = XMLCipher.getInstance();
keyCipher.init(XMLCipher.UNWRAP_MODE, null);
@@ -1002,9 +1000,8 @@ public class XMLCipherTest extends org.j
private Document document() {
Document d = null;
try {
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
File f = new File(documentName);
- d = db.parse(f);
+ d = XMLUtils.parse(new FileInputStream(f), false);
} catch (Exception e) {
e.printStackTrace();
System.exit(-1);
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLEncryption11Test.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLEncryption11Test.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLEncryption11Test.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/encryption/XMLEncryption11Test.java Wed Jun 6 08:24:42 2018
@@ -34,7 +34,6 @@ import java.util.Map;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.NoSuchPaddingException;
-import javax.xml.parsers.DocumentBuilder;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathExpressionException;
@@ -106,8 +105,7 @@ public class XMLEncryption11Test extends
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
cardNumber = retrieveCCNumber(doc);
@@ -207,8 +205,7 @@ public class XMLEncryption11Test extends
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
Key sessionKey = getSessionKey("http://www.w3.org/2009/xmlenc11#aes128-gcm");
EncryptedKey encryptedKey =
@@ -309,8 +306,7 @@ public class XMLEncryption11Test extends
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
Key sessionKey = getSessionKey("http://www.w3.org/2009/xmlenc11#aes192-gcm");
EncryptedKey encryptedKey =
@@ -411,8 +407,7 @@ public class XMLEncryption11Test extends
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
Key sessionKey = getSessionKey("http://www.w3.org/2009/xmlenc11#aes256-gcm");
EncryptedKey encryptedKey =
@@ -513,8 +508,7 @@ public class XMLEncryption11Test extends
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
Key sessionKey = getSessionKey("http://www.w3.org/2009/xmlenc11#aes256-gcm");
EncryptedKey encryptedKey =
@@ -566,8 +560,7 @@ public class XMLEncryption11Test extends
}
File f = new File(filename);
- DocumentBuilder db = XMLUtils.createDocumentBuilder(false);
- Document doc = db.parse(new java.io.FileInputStream(f));
+ Document doc = XMLUtils.parse(new java.io.FileInputStream(f), false);
return decryptElement(doc, rsaKey, rsaCert);
}
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/interop/InteropTestBase.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/interop/InteropTestBase.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/interop/InteropTestBase.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/interop/InteropTestBase.java Wed Jun 6 08:24:42 2018
@@ -19,6 +19,7 @@
package org.apache.xml.security.test.dom.interop;
import java.io.File;
+import java.io.FileInputStream;
import java.security.PublicKey;
import java.security.cert.X509Certificate;
import java.util.Iterator;
@@ -58,8 +59,7 @@ public class InteropTestBase extends org
String filename, ResourceResolverSpi resolver, boolean followManifests, byte[] hmacKey
) throws Exception {
File f = new File(filename);
- javax.xml.parsers.DocumentBuilder db = XMLUtils.createDocumentBuilder(false, false);
- org.w3c.dom.Document doc = db.parse(new java.io.FileInputStream(f));
+ org.w3c.dom.Document doc = XMLUtils.parse(new FileInputStream(f), false, false);
XPathFactory xpf = XPathFactory.newInstance();
XPath xpath = xpf.newXPath();
@@ -92,8 +92,7 @@ public class InteropTestBase extends org
public boolean verify(String filename, ResourceResolverSpi resolver, boolean followManifests)
throws Exception {
File f = new File(filename);
- javax.xml.parsers.DocumentBuilder db = XMLUtils.createDocumentBuilder(false, false);
- org.w3c.dom.Document doc = db.parse(f);
+ org.w3c.dom.Document doc = XMLUtils.parse(new FileInputStream(f), false, false);
XPathFactory xpf = XPathFactory.newInstance();
XPath xpath = xpf.newXPath();
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/DEREncodedKeyValueTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/DEREncodedKeyValueTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/DEREncodedKeyValueTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/DEREncodedKeyValueTest.java Wed Jun 6 08:24:42 2018
@@ -26,8 +26,6 @@ import java.security.PublicKey;
import java.security.Security;
import java.security.spec.X509EncodedKeySpec;
-import javax.xml.parsers.DocumentBuilder;
-
import org.apache.xml.security.keys.content.DEREncodedKeyValue;
import org.apache.xml.security.utils.Base64;
import org.apache.xml.security.utils.Constants;
@@ -43,8 +41,6 @@ public class DEREncodedKeyValueTest exte
private static final String BASEDIR = System.getProperty("basedir") == null ? "./": System.getProperty("basedir");
private static final String SEP = System.getProperty("file.separator");
- private DocumentBuilder documentBuilder;
-
private PublicKey rsaKeyControl;
private PublicKey dsaKeyControl;
private PublicKey ecKeyControl;
@@ -52,7 +48,6 @@ public class DEREncodedKeyValueTest exte
private final String idControl = "abc123";
public DEREncodedKeyValueTest() throws Exception {
- documentBuilder = XMLUtils.createDocumentBuilder(false);
//
// If the BouncyCastle provider is not installed, then try to load it
@@ -84,7 +79,7 @@ public class DEREncodedKeyValueTest exte
@org.junit.Test
public void testSchema() throws Exception {
- DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(documentBuilder.newDocument(), rsaKeyControl);
+ DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(XMLUtils.newDocument(false), rsaKeyControl);
Element element = derEncodedKeyValue.getElement();
assertEquals("http://www.w3.org/2009/xmldsig11#", element.getNamespaceURI());
@@ -133,14 +128,14 @@ public class DEREncodedKeyValueTest exte
@org.junit.Test
public void testRSAPublicKeyFromKey() throws Exception {
- DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(documentBuilder.newDocument(), rsaKeyControl);
+ DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(XMLUtils.newDocument(false), rsaKeyControl);
assertEquals(rsaKeyControl, derEncodedKeyValue.getPublicKey());
assertArrayEquals(rsaKeyControl.getEncoded(), derEncodedKeyValue.getBytesFromTextChild());
}
@org.junit.Test
public void testDSAPublicKeyFromKey() throws Exception {
- DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(documentBuilder.newDocument(), dsaKeyControl);
+ DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(XMLUtils.newDocument(false), dsaKeyControl);
assertEquals(dsaKeyControl, derEncodedKeyValue.getPublicKey());
assertArrayEquals(dsaKeyControl.getEncoded(), derEncodedKeyValue.getBytesFromTextChild());
}
@@ -151,14 +146,14 @@ public class DEREncodedKeyValueTest exte
return;
}
- DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(documentBuilder.newDocument(), ecKeyControl);
+ DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(XMLUtils.newDocument(false), ecKeyControl);
assertEquals(ecKeyControl, derEncodedKeyValue.getPublicKey());
assertArrayEquals(ecKeyControl.getEncoded(), derEncodedKeyValue.getBytesFromTextChild());
}
@org.junit.Test
public void testId() throws Exception {
- DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(documentBuilder.newDocument(), rsaKeyControl);
+ DEREncodedKeyValue derEncodedKeyValue = new DEREncodedKeyValue(XMLUtils.newDocument(false), rsaKeyControl);
assertEquals("", derEncodedKeyValue.getId());
assertNull(derEncodedKeyValue.getElement().getAttributeNodeNS(null, Constants._ATT_ID));
@@ -181,7 +176,7 @@ public class DEREncodedKeyValueTest exte
}
private Document loadXML(String fileName) throws Exception {
- return documentBuilder.parse(new FileInputStream(getControlFilePath(fileName)));
+ return XMLUtils.parse(new FileInputStream(getControlFilePath(fileName)), false);
}
private PublicKey loadPublicKey(String filePath, String algorithm) throws Exception {
Modified: santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/KeyInfoReferenceTest.java
URL: http://svn.apache.org/viewvc/santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/KeyInfoReferenceTest.java?rev=1832986&r1=1832985&r2=1832986&view=diff
==============================================================================
--- santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/KeyInfoReferenceTest.java (original)
+++ santuario/xml-security-java/branches/2.0.x-fixes/src/test/java/org/apache/xml/security/test/dom/keys/KeyInfoReferenceTest.java Wed Jun 6 08:24:42 2018
@@ -20,8 +20,6 @@ package org.apache.xml.security.test.dom
import java.io.FileInputStream;
-import javax.xml.parsers.DocumentBuilder;
-
import org.apache.xml.security.keys.content.KeyInfoReference;
import org.apache.xml.security.utils.Constants;
import org.apache.xml.security.utils.XMLUtils;
@@ -35,18 +33,12 @@ public class KeyInfoReferenceTest extend
private static final String BASEDIR = System.getProperty("basedir") == null ? "./": System.getProperty("basedir");
private static final String SEP = System.getProperty("file.separator");
- private DocumentBuilder documentBuilder;
-
private final String idControl = "abc123";
private final String uriControl = "http://www.example.org/keyinfo.xml";
- public KeyInfoReferenceTest() throws Exception {
- documentBuilder = XMLUtils.createDocumentBuilder(false);
- }
-
@org.junit.Test
public void testSchema() throws Exception {
- KeyInfoReference keyInfoReference = new KeyInfoReference(documentBuilder.newDocument(), uriControl);
+ KeyInfoReference keyInfoReference = new KeyInfoReference(XMLUtils.newDocument(false), uriControl);
Element element = keyInfoReference.getElement();
assertEquals("http://www.w3.org/2009/xmldsig11#", element.getNamespaceURI());
@@ -66,13 +58,13 @@ public class KeyInfoReferenceTest extend
@org.junit.Test
public void testURIOnConstruction() throws Exception {
- KeyInfoReference keyInfoReference = new KeyInfoReference(documentBuilder.newDocument(), uriControl);
+ KeyInfoReference keyInfoReference = new KeyInfoReference(XMLUtils.newDocument(false), uriControl);
assertEquals(uriControl, keyInfoReference.getURI());
}
@org.junit.Test
public void testId() throws Exception {
- KeyInfoReference keyInfoReference = new KeyInfoReference(documentBuilder.newDocument(), uriControl);
+ KeyInfoReference keyInfoReference = new KeyInfoReference(XMLUtils.newDocument(false), uriControl);
assertEquals("", keyInfoReference.getId());
assertNull(keyInfoReference.getElement().getAttributeNodeNS(null, Constants._ATT_ID));
@@ -95,7 +87,7 @@ public class KeyInfoReferenceTest extend
}
private Document loadXML(String fileName) throws Exception {
- return documentBuilder.parse(new FileInputStream(getControlFilePath(fileName)));
+ return XMLUtils.parse(new FileInputStream(getControlFilePath(fileName)), false);
}
}