Categories:
Audio (13)
Biotech (29)
Bytecode (36)
Database (77)
Framework (7)
Game (7)
General (507)
Graphics (53)
I/O (35)
IDE (2)
JAR Tools (101)
JavaBeans (21)
JDBC (121)
JDK (426)
JSP (20)
Logging (108)
Mail (58)
Messaging (8)
Network (84)
PDF (97)
Report (7)
Scripting (84)
Security (32)
Server (121)
Servlet (26)
SOAP (24)
Testing (54)
Web (15)
XML (309)
Collections:
Other Resources:
JDK 11 java.xml.crypto.jmod - XML Crypto Module
JDK 11 java.xml.crypto.jmod is the JMOD file for JDK 11 XML (eXtensible Markup Language) Crypto module.
JDK 11 XML Crypto module compiled class files are stored in \fyicenter\jdk-11.0.1\jmods\java.xml.crypto.jmod.
JDK 11 XML Crypto module compiled class files are also linked and stored in the \fyicenter\jdk-11.0.1\lib\modules JImage file.
JDK 11 XML Crypto module source code files are stored in \fyicenter\jdk-11.0.1\lib\src.zip\java.xml.crypto.
You can click and view the content of each source code file in the list below.
✍: FYIcenter
⏎ com/sun/org/apache/xml/internal/security/c14n/Canonicalizer.java
/* * Copyright (c) 2007, 2018, Oracle and/or its affiliates. All rights reserved. * ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. */ /** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package com.sun.org.apache.xml.internal.security.c14n; import java.io.ByteArrayInputStream; import java.io.InputStream; import java.io.OutputStream; import java.nio.charset.StandardCharsets; import java.util.Map; import java.util.Set; import java.util.concurrent.ConcurrentHashMap; import javax.xml.parsers.DocumentBuilder; import com.sun.org.apache.xml.internal.security.c14n.implementations.Canonicalizer11_OmitComments; import com.sun.org.apache.xml.internal.security.c14n.implementations.Canonicalizer11_WithComments; import com.sun.org.apache.xml.internal.security.c14n.implementations.Canonicalizer20010315ExclOmitComments; import com.sun.org.apache.xml.internal.security.c14n.implementations.Canonicalizer20010315ExclWithComments; import com.sun.org.apache.xml.internal.security.c14n.implementations.Canonicalizer20010315OmitComments; import com.sun.org.apache.xml.internal.security.c14n.implementations.Canonicalizer20010315WithComments; import com.sun.org.apache.xml.internal.security.c14n.implementations.CanonicalizerPhysical; import com.sun.org.apache.xml.internal.security.exceptions.AlgorithmAlreadyRegisteredException; import com.sun.org.apache.xml.internal.security.utils.JavaUtils; import com.sun.org.apache.xml.internal.security.utils.XMLUtils; import org.w3c.dom.Document; import org.w3c.dom.Node; import org.w3c.dom.NodeList; import org.xml.sax.InputSource; /** * */ public class Canonicalizer { /** The output encoding of canonicalized data */ public static final String ENCODING = StandardCharsets.UTF_8.name(); /** * XPath Expression for selecting every node and continuous comments joined * in only one node */ public static final String XPATH_C14N_WITH_COMMENTS_SINGLE_NODE = "(.//. | .//@* | .//namespace::*)"; /** * The URL defined in XML-SEC Rec for inclusive c14n <b>without</b> comments. */ public static final String ALGO_ID_C14N_OMIT_COMMENTS = "http://www.w3.org/TR/2001/REC-xml-c14n-20010315"; /** * The URL defined in XML-SEC Rec for inclusive c14n <b>with</b> comments. */ public static final String ALGO_ID_C14N_WITH_COMMENTS = ALGO_ID_C14N_OMIT_COMMENTS + "#WithComments"; /** * The URL defined in XML-SEC Rec for exclusive c14n <b>without</b> comments. */ public static final String ALGO_ID_C14N_EXCL_OMIT_COMMENTS = "http://www.w3.org/2001/10/xml-exc-c14n#"; /** * The URL defined in XML-SEC Rec for exclusive c14n <b>with</b> comments. */ public static final String ALGO_ID_C14N_EXCL_WITH_COMMENTS = ALGO_ID_C14N_EXCL_OMIT_COMMENTS + "WithComments"; /** * The URI for inclusive c14n 1.1 <b>without</b> comments. */ public static final String ALGO_ID_C14N11_OMIT_COMMENTS = "http://www.w3.org/2006/12/xml-c14n11"; /** * The URI for inclusive c14n 1.1 <b>with</b> comments. */ public static final String ALGO_ID_C14N11_WITH_COMMENTS = ALGO_ID_C14N11_OMIT_COMMENTS + "#WithComments"; /** * Non-standard algorithm to serialize the physical representation for XML Encryption */ public static final String ALGO_ID_C14N_PHYSICAL = "http://santuario.apache.org/c14n/physical"; private static Map<String, Class<? extends CanonicalizerSpi>> canonicalizerHash = new ConcurrentHashMap<String, Class<? extends CanonicalizerSpi>>(); private final CanonicalizerSpi canonicalizerSpi; private boolean secureValidation; /** * Constructor Canonicalizer * * @param algorithmURI * @throws InvalidCanonicalizerException */ private Canonicalizer(String algorithmURI) throws InvalidCanonicalizerException { try { Class<? extends CanonicalizerSpi> implementingClass = canonicalizerHash.get(algorithmURI); @SuppressWarnings("deprecation") CanonicalizerSpi tmp = implementingClass.newInstance(); canonicalizerSpi = tmp; canonicalizerSpi.reset = true; } catch (Exception e) { Object exArgs[] = { algorithmURI }; throw new InvalidCanonicalizerException( e, "signature.Canonicalizer.UnknownCanonicalizer", exArgs ); } } /** * Method getInstance * * @param algorithmURI * @return a Canonicalizer instance ready for the job * @throws InvalidCanonicalizerException */ public static final Canonicalizer getInstance(String algorithmURI) throws InvalidCanonicalizerException { return new Canonicalizer(algorithmURI); } /** * Method register * * @param algorithmURI * @param implementingClass * @throws AlgorithmAlreadyRegisteredException * @throws SecurityException if a security manager is installed and the * caller does not have permission to register the canonicalizer */ @SuppressWarnings("unchecked") public static void register(String algorithmURI, String implementingClass) throws AlgorithmAlreadyRegisteredException, ClassNotFoundException { JavaUtils.checkRegisterPermission(); // check whether URI is already registered Class<? extends CanonicalizerSpi> registeredClass = canonicalizerHash.get(algorithmURI); if (registeredClass != null) { Object exArgs[] = { algorithmURI, registeredClass }; throw new AlgorithmAlreadyRegisteredException("algorithm.alreadyRegistered", exArgs); } canonicalizerHash.put( algorithmURI, (Class<? extends CanonicalizerSpi>) ClassLoaderUtils.loadClass(implementingClass, Canonicalizer.class) ); } /** * Method register * * @param algorithmURI * @param implementingClass * @throws AlgorithmAlreadyRegisteredException * @throws SecurityException if a security manager is installed and the * caller does not have permission to register the canonicalizer */ public static void register(String algorithmURI, Class<? extends CanonicalizerSpi> implementingClass) throws AlgorithmAlreadyRegisteredException, ClassNotFoundException { JavaUtils.checkRegisterPermission(); // check whether URI is already registered Class<? extends CanonicalizerSpi> registeredClass = canonicalizerHash.get(algorithmURI); if (registeredClass != null) { Object exArgs[] = { algorithmURI, registeredClass }; throw new AlgorithmAlreadyRegisteredException("algorithm.alreadyRegistered", exArgs); } canonicalizerHash.put(algorithmURI, implementingClass); } /** * This method registers the default algorithms. */ public static void registerDefaultAlgorithms() { canonicalizerHash.put( Canonicalizer.ALGO_ID_C14N_OMIT_COMMENTS, Canonicalizer20010315OmitComments.class ); canonicalizerHash.put( Canonicalizer.ALGO_ID_C14N_WITH_COMMENTS, Canonicalizer20010315WithComments.class ); canonicalizerHash.put( Canonicalizer.ALGO_ID_C14N_EXCL_OMIT_COMMENTS, Canonicalizer20010315ExclOmitComments.class ); canonicalizerHash.put( Canonicalizer.ALGO_ID_C14N_EXCL_WITH_COMMENTS, Canonicalizer20010315ExclWithComments.class ); canonicalizerHash.put( Canonicalizer.ALGO_ID_C14N11_OMIT_COMMENTS, Canonicalizer11_OmitComments.class ); canonicalizerHash.put( Canonicalizer.ALGO_ID_C14N11_WITH_COMMENTS, Canonicalizer11_WithComments.class ); canonicalizerHash.put( Canonicalizer.ALGO_ID_C14N_PHYSICAL, CanonicalizerPhysical.class ); } /** * Method getURI * * @return the URI defined for this c14n instance. */ public final String getURI() { return canonicalizerSpi.engineGetURI(); } /** * Method getIncludeComments * * @return true if the c14n respect the comments. */ public boolean getIncludeComments() { return canonicalizerSpi.engineGetIncludeComments(); } /** * This method tries to canonicalize the given bytes. It's possible to even * canonicalize non-wellformed sequences if they are well-formed after being * wrapped with a {@code >a<...>/a<}. * * @param inputBytes * @return the result of the canonicalization. * @throws CanonicalizationException * @throws java.io.IOException * @throws javax.xml.parsers.ParserConfigurationException * @throws org.xml.sax.SAXException */ public byte[] canonicalize(byte[] inputBytes) throws javax.xml.parsers.ParserConfigurationException, java.io.IOException, org.xml.sax.SAXException, CanonicalizationException { Document document = null; try (InputStream bais = new ByteArrayInputStream(inputBytes)) { InputSource in = new InputSource(bais); // needs to validate for ID attribute normalization DocumentBuilder db = XMLUtils.createDocumentBuilder(true, secureValidation); /* * for some of the test vectors from the specification, * there has to be a validating parser for ID attributes, default * attribute values, NMTOKENS, etc. * Unfortunately, the test vectors do use different DTDs or * even no DTD. So Xerces 1.3.1 fires many warnings about using * ErrorHandlers. * * Text from the spec: * * The input octet stream MUST contain a well-formed XML document, * but the input need not be validated. However, the attribute * value normalization and entity reference resolution MUST be * performed in accordance with the behaviors of a validating * XML processor. As well, nodes for default attributes (declared * in the ATTLIST with an AttValue but not specified) are created * in each element. Thus, the declarations in the document type * declaration are used to help create the canonical form, even * though the document type declaration is not retained in the * canonical form. */ db.setErrorHandler(new com.sun.org.apache.xml.internal.security.utils.IgnoreAllErrorHandler()); document = db.parse(in); } return this.canonicalizeSubtree(document); } /** * Canonicalizes the subtree rooted by {@code node}. * * @param node The node to canonicalize * @return the result of the c14n. * * @throws CanonicalizationException */ public byte[] canonicalizeSubtree(Node node) throws CanonicalizationException { canonicalizerSpi.secureValidation = secureValidation; return canonicalizerSpi.engineCanonicalizeSubTree(node); } /** * Canonicalizes the subtree rooted by {@code node}. * * @param node * @param inclusiveNamespaces * @return the result of the c14n. * @throws CanonicalizationException */ public byte[] canonicalizeSubtree(Node node, String inclusiveNamespaces) throws CanonicalizationException { canonicalizerSpi.secureValidation = secureValidation; return canonicalizerSpi.engineCanonicalizeSubTree(node, inclusiveNamespaces); } /** * Canonicalizes the subtree rooted by {@code node}. * * @param node * @param inclusiveNamespaces * @return the result of the c14n. * @throws CanonicalizationException */ public byte[] canonicalizeSubtree(Node node, String inclusiveNamespaces, boolean propagateDefaultNamespace) throws CanonicalizationException { canonicalizerSpi.secureValidation = secureValidation; return canonicalizerSpi.engineCanonicalizeSubTree(node, inclusiveNamespaces, propagateDefaultNamespace); } /** * Canonicalizes an XPath node set. The {@code xpathNodeSet} is treated * as a list of XPath nodes, not as a list of subtrees. * * @param xpathNodeSet * @return the result of the c14n. * @throws CanonicalizationException */ public byte[] canonicalizeXPathNodeSet(NodeList xpathNodeSet) throws CanonicalizationException { canonicalizerSpi.secureValidation = secureValidation; return canonicalizerSpi.engineCanonicalizeXPathNodeSet(xpathNodeSet); } /** * Canonicalizes an XPath node set. The {@code xpathNodeSet} is treated * as a list of XPath nodes, not as a list of subtrees. * * @param xpathNodeSet * @param inclusiveNamespaces * @return the result of the c14n. * @throws CanonicalizationException */ public byte[] canonicalizeXPathNodeSet( NodeList xpathNodeSet, String inclusiveNamespaces ) throws CanonicalizationException { canonicalizerSpi.secureValidation = secureValidation; return canonicalizerSpi.engineCanonicalizeXPathNodeSet(xpathNodeSet, inclusiveNamespaces); } /** * Canonicalizes an XPath node set. * * @param xpathNodeSet * @return the result of the c14n. * @throws CanonicalizationException */ public byte[] canonicalizeXPathNodeSet(Set<Node> xpathNodeSet) throws CanonicalizationException { canonicalizerSpi.secureValidation = secureValidation; return canonicalizerSpi.engineCanonicalizeXPathNodeSet(xpathNodeSet); } /** * Canonicalizes an XPath node set. * * @param xpathNodeSet * @param inclusiveNamespaces * @return the result of the c14n. * @throws CanonicalizationException */ public byte[] canonicalizeXPathNodeSet( Set<Node> xpathNodeSet, String inclusiveNamespaces ) throws CanonicalizationException { canonicalizerSpi.secureValidation = secureValidation; return canonicalizerSpi.engineCanonicalizeXPathNodeSet(xpathNodeSet, inclusiveNamespaces); } /** * Sets the writer where the canonicalization ends. ByteArrayOutputStream * if none is set. * @param os */ public void setWriter(OutputStream os) { canonicalizerSpi.setWriter(os); } /** * Returns the name of the implementing {@link CanonicalizerSpi} class * * @return the name of the implementing {@link CanonicalizerSpi} class */ public String getImplementingCanonicalizerClass() { return canonicalizerSpi.getClass().getName(); } /** * Set the canonicalizer behaviour to not reset. */ public void notReset() { canonicalizerSpi.reset = false; } public boolean isSecureValidation() { return secureValidation; } public void setSecureValidation(boolean secureValidation) { this.secureValidation = secureValidation; } }
⏎ com/sun/org/apache/xml/internal/security/c14n/Canonicalizer.java
Or download all of them as a single archive file:
File name: java.xml.crypto-11.0.1-src.zip File size: 539662 bytes Release date: 2018-11-04 Download
⇒ JDK 11 jdk.accessibility.jmod - Accessibility Module
2020-08-25, 72633👍, 0💬
Popular Posts:
How to download and install JDK (Java Development Kit) 8? If you want to write Java applications, yo...
Java Cryptography Extension 1.6 JAR File Size and Download Location: File name: jce.jar, jce-1.6.jar...
XOM™ is a new XML object model. It is an open source (LGPL), tree-based API for processing XML with ...
JDK 11 java.xml.crypto.jmod is the JMOD file for JDK 11 XML (eXtensible Markup Language) Crypto modu...
What Is HttpComponents httpcore-4.2.2.jar? HttpComponents httpcore-4.2.2.jar is the JAR file for Apa...