SANTUARIO-540 - Optimizing some codes. Thanks to Alanscut <wp_scut@163.com> for the patch. This closes #29.
git-svn-id: https://svn.apache.org/repos/asf/santuario/xml-security-java/trunk@1877223 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/src/main/java/org/apache/jcp/xml/dsig/internal/dom/DOMXMLObject.java b/src/main/java/org/apache/jcp/xml/dsig/internal/dom/DOMXMLObject.java
index 1dcf69f..948cee6 100644
--- a/src/main/java/org/apache/jcp/xml/dsig/internal/dom/DOMXMLObject.java
+++ b/src/main/java/org/apache/jcp/xml/dsig/internal/dom/DOMXMLObject.java
@@ -162,7 +162,7 @@
throws MarshalException {
Document ownerDoc = DOMUtils.getOwnerDocument(parent);
- Element objElem = objectElem != null ? objectElem : null;
+ Element objElem = objectElem;
if (objElem == null) {
objElem = DOMUtils.createElement(ownerDoc, "Object",
XMLSignature.XMLNS, dsPrefix);
diff --git a/src/main/java/org/apache/jcp/xml/dsig/internal/dom/Utils.java b/src/main/java/org/apache/jcp/xml/dsig/internal/dom/Utils.java
index f4f28c6..aa62dd2 100644
--- a/src/main/java/org/apache/jcp/xml/dsig/internal/dom/Utils.java
+++ b/src/main/java/org/apache/jcp/xml/dsig/internal/dom/Utils.java
@@ -87,7 +87,7 @@
return null;
}
String id = uri.substring(1);
- if (id != null && id.startsWith("xpointer(id(")) {
+ if (id.startsWith("xpointer(id(")) {
int i1 = id.indexOf('\'');
int i2 = id.indexOf('\'', i1+1);
id = id.substring(i1+1, i2);
@@ -111,6 +111,6 @@
private static boolean getBoolean(XMLCryptoContext xc, String name) {
Boolean value = (Boolean)xc.getProperty(name);
- return value != null && value.booleanValue();
+ return value != null && value;
}
}
diff --git a/src/main/java/org/apache/xml/security/algorithms/MessageDigestAlgorithm.java b/src/main/java/org/apache/xml/security/algorithms/MessageDigestAlgorithm.java
index 894a3d7..cdd443e 100644
--- a/src/main/java/org/apache/xml/security/algorithms/MessageDigestAlgorithm.java
+++ b/src/main/java/org/apache/xml/security/algorithms/MessageDigestAlgorithm.java
@@ -19,6 +19,7 @@
package org.apache.xml.security.algorithms;
import java.security.MessageDigest;
+import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import org.apache.xml.security.signature.XMLSignatureException;
@@ -114,11 +115,7 @@
} else {
md = MessageDigest.getInstance(algorithmID, provider);
}
- } catch (java.security.NoSuchAlgorithmException ex) {
- Object[] exArgs = { algorithmID, ex.getLocalizedMessage() };
-
- throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs);
- } catch (NoSuchProviderException ex) {
+ } catch (NoSuchAlgorithmException | NoSuchProviderException ex) {
Object[] exArgs = { algorithmID, ex.getLocalizedMessage() };
throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs);
diff --git a/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLEncryptedKeyInputHandler.java b/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLEncryptedKeyInputHandler.java
index dd0cf3b..944db66 100644
--- a/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLEncryptedKeyInputHandler.java
+++ b/src/main/java/org/apache/xml/security/stax/impl/processor/input/XMLEncryptedKeyInputHandler.java
@@ -233,15 +233,8 @@
|| encryptedKeyType.getCipherData().getCipherValue().getContent().isEmpty()) {
throw new XMLSecurityException("stax.encryption.noCipherValue");
}
- } catch (NoSuchPaddingException e) {
- throw new XMLSecurityException(e);
- } catch (NoSuchAlgorithmException e) {
- throw new XMLSecurityException(e);
- } catch (InvalidAlgorithmParameterException e) {
- throw new XMLSecurityException(e);
- } catch (InvalidKeyException e) {
- throw new XMLSecurityException(e);
- } catch (NoSuchProviderException e) {
+ } catch (NoSuchPaddingException | NoSuchAlgorithmException | InvalidAlgorithmParameterException
+ | InvalidKeyException | NoSuchProviderException e) {
throw new XMLSecurityException(e);
}
diff --git a/src/main/java/org/apache/xml/security/stax/securityToken/SecurityTokenFactory.java b/src/main/java/org/apache/xml/security/stax/securityToken/SecurityTokenFactory.java
index 54cdbdb..324d396 100644
--- a/src/main/java/org/apache/xml/security/stax/securityToken/SecurityTokenFactory.java
+++ b/src/main/java/org/apache/xml/security/stax/securityToken/SecurityTokenFactory.java
@@ -50,11 +50,7 @@
Class<SecurityTokenFactory> securityTokenFactoryClass =
(Class<SecurityTokenFactory>) ClassLoaderUtils.loadClass(stf, callingClass);
instance = securityTokenFactoryClass.newInstance();
- } catch (ClassNotFoundException e) {
- throw new XMLSecurityException(e, "algorithm.ClassDoesNotExist", new Object[]{stf});
- } catch (InstantiationException e) {
- throw new XMLSecurityException(e, "algorithm.ClassDoesNotExist", new Object[]{stf});
- } catch (IllegalAccessException e) {
+ } catch (ClassNotFoundException | InstantiationException | IllegalAccessException e) {
throw new XMLSecurityException(e, "algorithm.ClassDoesNotExist", new Object[]{stf});
}
}
diff --git a/src/main/java/org/apache/xml/security/transforms/Transform.java b/src/main/java/org/apache/xml/security/transforms/Transform.java
index 7e42832..fe6bb5f 100644
--- a/src/main/java/org/apache/xml/security/transforms/Transform.java
+++ b/src/main/java/org/apache/xml/security/transforms/Transform.java
@@ -196,12 +196,7 @@
ClassLoaderUtils.loadClass(implementingClass, Transform.class);
try {
transformSpiHash.put(algorithmURI, transformSpiClass.newInstance());
- } catch (InstantiationException ex) {
- Object[] exArgs = { algorithmURI };
- throw new InvalidTransformException(
- ex, "signature.Transform.UnknownTransform", exArgs
- );
- } catch (IllegalAccessException ex) {
+ } catch (InstantiationException | IllegalAccessException ex) {
Object[] exArgs = { algorithmURI };
throw new InvalidTransformException(
ex, "signature.Transform.UnknownTransform", exArgs
@@ -232,12 +227,7 @@
}
try {
transformSpiHash.put(algorithmURI, implementingClass.newInstance());
- } catch (InstantiationException ex) {
- Object[] exArgs = { algorithmURI };
- throw new InvalidTransformException(
- ex, "signature.Transform.UnknownTransform", exArgs
- );
- } catch (IllegalAccessException ex) {
+ } catch (InstantiationException | IllegalAccessException ex) {
Object[] exArgs = { algorithmURI };
throw new InvalidTransformException(
ex, "signature.Transform.UnknownTransform", exArgs
diff --git a/src/main/java/org/apache/xml/security/transforms/Transforms.java b/src/main/java/org/apache/xml/security/transforms/Transforms.java
index 6028dfb..34910db 100644
--- a/src/main/java/org/apache/xml/security/transforms/Transforms.java
+++ b/src/main/java/org/apache/xml/security/transforms/Transforms.java
@@ -268,11 +268,7 @@
}
return xmlSignatureInput;
- } catch (IOException ex) {
- throw new TransformationException(ex);
- } catch (CanonicalizationException ex) {
- throw new TransformationException(ex);
- } catch (InvalidCanonicalizerException ex) {
+ } catch (IOException | CanonicalizationException | InvalidCanonicalizerException ex) {
throw new TransformationException(ex);
}
}
diff --git a/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath2Filter.java b/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath2Filter.java
index 17244b4..2158be9 100644
--- a/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath2Filter.java
+++ b/src/main/java/org/apache/xml/security/transforms/implementations/TransformXPath2Filter.java
@@ -27,8 +27,6 @@
import javax.xml.transform.TransformerException;
-import org.apache.xml.security.c14n.CanonicalizationException;
-import org.apache.xml.security.c14n.InvalidCanonicalizerException;
import org.apache.xml.security.exceptions.XMLSecurityException;
import org.apache.xml.security.signature.NodeFilter;
import org.apache.xml.security.signature.XMLSignatureInput;
@@ -124,17 +122,7 @@
);
input.setNodeSet(true);
return input;
- } catch (TransformerException ex) {
- throw new TransformationException(ex);
- } catch (DOMException ex) {
- throw new TransformationException(ex);
- } catch (CanonicalizationException ex) {
- throw new TransformationException(ex);
- } catch (InvalidCanonicalizerException ex) {
- throw new TransformationException(ex);
- } catch (XMLSecurityException ex) {
- throw new TransformationException(ex);
- } catch (IOException ex) {
+ } catch (TransformerException | DOMException | XMLSecurityException | IOException ex) {
throw new TransformationException(ex);
}
}
diff --git a/src/main/java/org/apache/xml/security/transforms/implementations/TransformXSLT.java b/src/main/java/org/apache/xml/security/transforms/implementations/TransformXSLT.java
index 7e2330c..82f42f9 100644
--- a/src/main/java/org/apache/xml/security/transforms/implementations/TransformXSLT.java
+++ b/src/main/java/org/apache/xml/security/transforms/implementations/TransformXSLT.java
@@ -27,7 +27,6 @@
import javax.xml.XMLConstants;
import javax.xml.transform.Source;
import javax.xml.transform.Transformer;
-import javax.xml.transform.TransformerConfigurationException;
import javax.xml.transform.TransformerException;
import javax.xml.transform.TransformerFactory;
import javax.xml.transform.dom.DOMSource;
@@ -160,11 +159,7 @@
output.setSecureValidation(secureValidation);
output.setOutputStream(baos);
return output;
- } catch (XMLSecurityException ex) {
- throw new TransformationException(ex);
- } catch (TransformerConfigurationException ex) {
- throw new TransformationException(ex);
- } catch (TransformerException ex) {
+ } catch (XMLSecurityException | TransformerException ex) {
throw new TransformationException(ex);
}
}
diff --git a/src/main/java/org/apache/xml/security/utils/ClassLoaderUtils.java b/src/main/java/org/apache/xml/security/utils/ClassLoaderUtils.java
index abffe8e..47c9b0b 100644
--- a/src/main/java/org/apache/xml/security/utils/ClassLoaderUtils.java
+++ b/src/main/java/org/apache/xml/security/utils/ClassLoaderUtils.java
@@ -86,7 +86,7 @@
url = callingClass.getResource(resourceName);
}
- if (url == null && resourceName != null && resourceName.charAt(0) != '/') {
+ if (url == null && resourceName.charAt(0) != '/') {
return getResource('/' + resourceName, callingClass);
}
diff --git a/src/main/java/org/apache/xml/security/utils/XMLUtils.java b/src/main/java/org/apache/xml/security/utils/XMLUtils.java
index b6b4661..f145753 100644
--- a/src/main/java/org/apache/xml/security/utils/XMLUtils.java
+++ b/src/main/java/org/apache/xml/security/utils/XMLUtils.java
@@ -27,9 +27,9 @@
import java.util.ArrayList;
import java.util.Base64;
import java.util.HashSet;
-import java.util.Iterator;
import java.util.List;
import java.util.Set;
+import java.util.stream.Collectors;
import org.apache.xml.security.c14n.CanonicalizationException;
import org.apache.xml.security.c14n.Canonicalizer;
@@ -222,12 +222,7 @@
Canonicalizer.getInstance(
Canonicalizer.ALGO_ID_C14N_PHYSICAL).canonicalizeSubtree(contextNode, os);
- } catch (IOException ex) {
- LOG.debug(ex.getMessage(), ex);
- }
- catch (InvalidCanonicalizerException ex) {
- LOG.debug(ex.getMessage(), ex);
- } catch (CanonicalizationException ex) {
+ } catch (IOException | InvalidCanonicalizerException | CanonicalizationException ex) {
LOG.debug(ex.getMessage(), ex);
}
}
@@ -249,10 +244,7 @@
try {
Canonicalizer.getInstance(
Canonicalizer.ALGO_ID_C14N_WITH_COMMENTS).canonicalizeSubtree(contextNode, os);
- } catch (InvalidCanonicalizerException ex) {
- LOG.debug(ex.getMessage(), ex);
- // throw new RuntimeException(ex.getMessage());
- } catch (CanonicalizationException ex) {
+ } catch (InvalidCanonicalizerException | CanonicalizationException ex) {
LOG.debug(ex.getMessage(), ex);
// throw new RuntimeException(ex.getMessage());
}
@@ -779,17 +771,8 @@
* @return nodes with the constrain
*/
public static Set<Node> excludeNodeFromSet(Node signatureElement, Set<Node> inputSet) {
- Set<Node> resultSet = new HashSet<>();
- Iterator<Node> iterator = inputSet.iterator();
-
- while (iterator.hasNext()) {
- Node inputNode = iterator.next();
-
- if (!XMLUtils.isDescendantOrSelf(signatureElement, inputNode)) {
- resultSet.add(inputNode);
- }
- }
- return resultSet;
+ return inputSet.stream().filter((inputNode) ->
+ !XMLUtils.isDescendantOrSelf(signatureElement, inputNode)).collect(Collectors.toSet());
}
/**