Fixing some bugs identified by findbugs
git-svn-id: https://svn.apache.org/repos/asf/santuario/xml-security-java/trunk@1770670 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/src/main/java/org/apache/xml/security/algorithms/implementations/ECDSAUtils.java b/src/main/java/org/apache/xml/security/algorithms/implementations/ECDSAUtils.java
index 1c62650..fab3958 100644
--- a/src/main/java/org/apache/xml/security/algorithms/implementations/ECDSAUtils.java
+++ b/src/main/java/org/apache/xml/security/algorithms/implementations/ECDSAUtils.java
@@ -769,7 +769,6 @@
field = ecFieldFp.getP();
} else {
ECFieldF2m ecFieldF2m = (ECFieldF2m) ecField;
- ecFieldF2m.getReductionPolynomial();
field = ecFieldF2m.getReductionPolynomial();
}
diff --git a/src/main/java/org/apache/xml/security/encryption/XMLCipher.java b/src/main/java/org/apache/xml/security/encryption/XMLCipher.java
index c3a1a24..eafc1ff 100644
--- a/src/main/java/org/apache/xml/security/encryption/XMLCipher.java
+++ b/src/main/java/org/apache/xml/security/encryption/XMLCipher.java
@@ -38,6 +38,7 @@
import java.util.LinkedList;
import java.util.List;
import java.util.Map;
+import java.util.Map.Entry;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
@@ -3403,9 +3404,9 @@
}
if (!attributeMap.isEmpty()) {
- for (String attribute : attributeMap.keySet()) {
+ for (Entry<String, String> entry : attributeMap.entrySet()) {
result.setAttributeNS(Constants.XML_LANG_SPACE_SpecNS,
- attribute, attributeMap.get(attribute));
+ entry.getKey(), entry.getValue());
}
}
diff --git a/src/main/java/org/apache/xml/security/stax/impl/XMLSecurityStreamWriter.java b/src/main/java/org/apache/xml/security/stax/impl/XMLSecurityStreamWriter.java
index 5e2a2dc..9b534b3 100644
--- a/src/main/java/org/apache/xml/security/stax/impl/XMLSecurityStreamWriter.java
+++ b/src/main/java/org/apache/xml/security/stax/impl/XMLSecurityStreamWriter.java
@@ -371,7 +371,7 @@
this.encryptEntireRequestPart = encryptEntireRequestPart;
}
- private class Element {
+ private static class Element {
private Element parentElement;
@@ -483,7 +483,7 @@
}
}
- private class NSContext implements NamespaceContext {
+ private static class NSContext implements NamespaceContext {
private NamespaceContext parentNamespaceContext;
private List<String> prefixNsList = Collections.emptyList();
diff --git a/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLSecurityInputProcessor.java b/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLSecurityInputProcessor.java
index 290a640..c65037f 100644
--- a/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLSecurityInputProcessor.java
+++ b/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLSecurityInputProcessor.java
@@ -216,7 +216,7 @@
/**
* Temporary processor to replay the buffered events
*/
- public class InternalReplayProcessor extends AbstractInputProcessor {
+ public static class InternalReplayProcessor extends AbstractInputProcessor {
private final ArrayDeque<XMLSecEvent> xmlSecEventList;
diff --git a/src/main/java/org/apache/xml/security/stax/impl/transformer/TransformIdentity.java b/src/main/java/org/apache/xml/security/stax/impl/transformer/TransformIdentity.java
index 6512427..c30dea4 100644
--- a/src/main/java/org/apache/xml/security/stax/impl/transformer/TransformIdentity.java
+++ b/src/main/java/org/apache/xml/security/stax/impl/transformer/TransformIdentity.java
@@ -172,7 +172,9 @@
}
}
}
- childOutputMethod.transform(xmlSecEvent);
+ if (childOutputMethod != null) {
+ childOutputMethod.transform(xmlSecEvent);
+ }
}
}
@@ -242,7 +244,9 @@
}
}
}
- childOutputMethod.transform(inputStream);
+ if (childOutputMethod != null) {
+ childOutputMethod.transform(inputStream);
+ }
}
}
diff --git a/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath.java b/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath.java
index 22302e9..d5b87d5 100644
--- a/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath.java
+++ b/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath.java
@@ -93,13 +93,13 @@
throw new TransformationException("xml.WrongContent", exArgs);
}
Node xpathnode = xpathElement.getFirstChild();
- String str = XMLUtils.getStrFromNode(xpathnode);
- input.setNeedsToBeExpanded(needsCircumvent(str));
if (xpathnode == null) {
throw new DOMException(
DOMException.HIERARCHY_REQUEST_ERR, "Text must be in ds:Xpath"
);
}
+ String str = XMLUtils.getStrFromNode(xpathnode);
+ input.setNeedsToBeExpanded(needsCircumvent(str));
XPathFactory xpathFactory = XPathFactory.newInstance();
XPathAPI xpathAPIInstance = xpathFactory.newXPathAPI();
diff --git a/src/main/java/org/apache/xml/security/utils/DOMNamespaceContext.java b/src/main/java/org/apache/xml/security/utils/DOMNamespaceContext.java
index fad7ae2..5e05063 100644
--- a/src/main/java/org/apache/xml/security/utils/DOMNamespaceContext.java
+++ b/src/main/java/org/apache/xml/security/utils/DOMNamespaceContext.java
@@ -21,6 +21,7 @@
import java.util.HashMap;
import java.util.Iterator;
import java.util.Map;
+import java.util.Map.Entry;
import javax.xml.namespace.NamespaceContext;
@@ -44,10 +45,9 @@
}
public String getPrefix(String arg0) {
- for (String key : namespaceMap.keySet()) {
- String value = namespaceMap.get(key);
- if (value.equals(arg0)) {
- return key;
+ for (Entry<String, String> entry : namespaceMap.entrySet()) {
+ if (entry.getValue().equals(arg0)) {
+ return entry.getKey();
}
}
return null;