Categories:
Audio (13)
Biotech (29)
Bytecode (36)
Database (77)
Framework (7)
Game (7)
General (507)
Graphics (53)
I/O (35)
IDE (2)
JAR Tools (101)
JavaBeans (21)
JDBC (121)
JDK (426)
JSP (20)
Logging (108)
Mail (58)
Messaging (8)
Network (84)
PDF (97)
Report (7)
Scripting (84)
Security (32)
Server (121)
Servlet (26)
SOAP (24)
Testing (54)
Web (15)
XML (309)
Collections:
Other Resources:
JDK 17 java.xml.crypto.jmod - XML Crypto Module
JDK 17 java.xml.crypto.jmod is the JMOD file for JDK 17 XML (eXtensible Markup Language) Crypto module.
JDK 17 XML Crypto module compiled class files are stored in \fyicenter\jdk-17.0.5\jmods\java.xml.crypto.jmod.
JDK 17 XML Crypto module compiled class files are also linked and stored in the \fyicenter\jdk-17.0.5\lib\modules JImage file.
JDK 17 XML Crypto module source code files are stored in \fyicenter\jdk-17.0.5\lib\src.zip\java.xml.crypto.
You can click and view the content of each source code file in the list below.
✍: FYIcenter
⏎ com/sun/org/apache/xml/internal/security/c14n/implementations/Canonicalizer20010315Excl.java
/* * Copyright (c) 2007, 2022, Oracle and/or its affiliates. All rights reserved. * ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. */ /** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package com.sun.org.apache.xml.internal.security.c14n.implementations; import java.io.IOException; import java.io.OutputStream; import java.util.Collections; import java.util.Map; import java.util.Set; import java.util.SortedSet; import java.util.TreeSet; import com.sun.org.apache.xml.internal.security.c14n.CanonicalizationException; import com.sun.org.apache.xml.internal.security.c14n.helper.C14nHelper; import com.sun.org.apache.xml.internal.security.parser.XMLParserException; import com.sun.org.apache.xml.internal.security.signature.XMLSignatureInput; import com.sun.org.apache.xml.internal.security.transforms.params.InclusiveNamespaces; import com.sun.org.apache.xml.internal.security.utils.XMLUtils; import org.w3c.dom.Attr; import org.w3c.dom.DOMException; import org.w3c.dom.Document; import org.w3c.dom.Element; import org.w3c.dom.NamedNodeMap; import org.w3c.dom.Node; /** * Implements " <A * HREF="http://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/">Exclusive XML * Canonicalization, Version 1.0 </A>" <p></p> * Credits: During restructuring of the Canonicalizer framework, Ren?? * Kollmorgen from Software AG submitted an implementation of ExclC14n which * fitted into the old architecture and which based heavily on my old (and slow) * implementation of "Canonical XML". A big "thank you" to Ren?? for this. * <p></p> * <i>THIS </i> implementation is a complete rewrite of the algorithm. * * @see <a href="http://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/"> * Exclusive XML Canonicalization, Version 1.0</a> */ public abstract class Canonicalizer20010315Excl extends CanonicalizerBase { /** * This Set contains the names (Strings like "xmlns" or "xmlns:foo") of * the inclusive namespaces. */ private SortedSet<String> inclusiveNSSet = Collections.emptySortedSet(); private boolean propagateDefaultNamespace = false; /** * Constructor Canonicalizer20010315Excl * * @param includeComments */ public Canonicalizer20010315Excl(boolean includeComments) { super(includeComments); } /** * Method engineCanonicalizeSubTree * {@inheritDoc} * @param rootNode * @param writer OutputStream to write the canonicalization result * @throws CanonicalizationException */ public void engineCanonicalizeSubTree(Node rootNode, OutputStream writer) throws CanonicalizationException { engineCanonicalizeSubTree(rootNode, "", null, writer); } /** * Method engineCanonicalizeSubTree * {@inheritDoc} * @param rootNode * @param inclusiveNamespaces * @param writer OutputStream to write the canonicalization result * @throws CanonicalizationException */ public void engineCanonicalizeSubTree( Node rootNode, String inclusiveNamespaces, OutputStream writer ) throws CanonicalizationException { engineCanonicalizeSubTree(rootNode, inclusiveNamespaces, null, writer); } /** * Method engineCanonicalizeSubTree * {@inheritDoc} * @param rootNode * @param inclusiveNamespaces * @param propagateDefaultNamespace If true the default namespace will be propagated to the c14n-ized root element * @param writer OutputStream to write the canonicalization result * @throws CanonicalizationException */ public void engineCanonicalizeSubTree( Node rootNode, String inclusiveNamespaces, boolean propagateDefaultNamespace, OutputStream writer ) throws CanonicalizationException { this.propagateDefaultNamespace = propagateDefaultNamespace; engineCanonicalizeSubTree(rootNode, inclusiveNamespaces, null, writer); } /** * Method engineCanonicalizeSubTree * @param rootNode * @param inclusiveNamespaces * @param excl A element to exclude from the c14n process. * @param writer OutputStream to write the canonicalization result * @throws CanonicalizationException */ public void engineCanonicalizeSubTree( Node rootNode, String inclusiveNamespaces, Node excl, OutputStream writer ) throws CanonicalizationException{ inclusiveNSSet = InclusiveNamespaces.prefixStr2Set(inclusiveNamespaces); super.engineCanonicalizeSubTree(rootNode, excl, writer); } /** * * @param rootNode * @param inclusiveNamespaces * @param writer OutputStream to write the canonicalization result * @param secureValidation Whether secure validation is enabled * @throws CanonicalizationException */ public void engineCanonicalize( XMLSignatureInput rootNode, String inclusiveNamespaces, OutputStream writer, boolean secureValidation ) throws CanonicalizationException { inclusiveNSSet = InclusiveNamespaces.prefixStr2Set(inclusiveNamespaces); super.engineCanonicalize(rootNode, writer, secureValidation); } /** * Method engineCanonicalizeXPathNodeSet * {@inheritDoc} * @param xpathNodeSet * @param inclusiveNamespaces * @param writer OutputStream to write the canonicalization result * @throws CanonicalizationException */ public void engineCanonicalizeXPathNodeSet( Set<Node> xpathNodeSet, String inclusiveNamespaces, OutputStream writer ) throws CanonicalizationException { inclusiveNSSet = InclusiveNamespaces.prefixStr2Set(inclusiveNamespaces); super.engineCanonicalizeXPathNodeSet(xpathNodeSet, writer); } @Override protected void outputAttributesSubtree(Element element, NameSpaceSymbTable ns, Map<String, byte[]> cache, OutputStream writer) throws CanonicalizationException, DOMException, IOException { // result will contain the attrs which have to be output SortedSet<Attr> result = new TreeSet<>(COMPARE); // The prefix visibly utilized (in the attribute or in the name) in // the element SortedSet<String> visiblyUtilized = new TreeSet<>(); if (!inclusiveNSSet.isEmpty()) { visiblyUtilized.addAll(inclusiveNSSet); } if (element.hasAttributes()) { NamedNodeMap attrs = element.getAttributes(); int attrsLength = attrs.getLength(); for (int i = 0; i < attrsLength; i++) { Attr attribute = (Attr) attrs.item(i); String NName = attribute.getLocalName(); String NNodeValue = attribute.getNodeValue(); if (!XMLNS_URI.equals(attribute.getNamespaceURI())) { // Not a namespace definition. // The Element is output element, add the prefix (if used) to // visiblyUtilized String prefix = attribute.getPrefix(); if (prefix != null && !(prefix.equals(XML) || prefix.equals(XMLNS))) { visiblyUtilized.add(prefix); } // Add to the result. result.add(attribute); } else if (!(XML.equals(NName) && XML_LANG_URI.equals(NNodeValue)) && ns.addMapping(NName, NNodeValue, attribute) && C14nHelper.namespaceIsRelative(NNodeValue)) { // The default mapping for xml must not be output. // New definition check if it is relative. Object[] exArgs = {element.getTagName(), NName, attribute.getNodeValue()}; throw new CanonicalizationException( "c14n.Canonicalizer.RelativeNamespace", exArgs ); } } } if (propagateDefaultNamespace && ns.getLevel() == 1 && inclusiveNSSet.contains(XMLNS) && ns.getMappingWithoutRendered(XMLNS) == null) { ns.removeMapping(XMLNS); ns.addMapping( XMLNS, "", getNullNode(element.getOwnerDocument())); } String prefix = null; if (element.getNamespaceURI() != null && !(element.getPrefix() == null || element.getPrefix().length() == 0)) { prefix = element.getPrefix(); } else { prefix = XMLNS; } visiblyUtilized.add(prefix); for (String s : visiblyUtilized) { Attr key = ns.getMapping(s); if (key != null) { result.add(key); } } //we output all Attrs which are available for (Attr attr : result) { outputAttrToWriter(attr.getNodeName(), attr.getNodeValue(), writer, cache); } } @Override protected void outputAttributes(Element element, NameSpaceSymbTable ns, Map<String, byte[]> cache, OutputStream writer) throws CanonicalizationException, DOMException, IOException { // result will contain the attrs which have to be output SortedSet<Attr> result = new TreeSet<>(COMPARE); // The prefix visibly utilized (in the attribute or in the name) in // the element Set<String> visiblyUtilized = null; // It's the output selected. boolean isOutputElement = isVisibleDO(element, ns.getLevel()) == 1; if (isOutputElement) { visiblyUtilized = new TreeSet<>(); if (!inclusiveNSSet.isEmpty()) { visiblyUtilized.addAll(inclusiveNSSet); } } if (element.hasAttributes()) { NamedNodeMap attrs = element.getAttributes(); int attrsLength = attrs.getLength(); for (int i = 0; i < attrsLength; i++) { Attr attribute = (Attr) attrs.item(i); String NName = attribute.getLocalName(); String NNodeValue = attribute.getNodeValue(); if (!XMLNS_URI.equals(attribute.getNamespaceURI())) { if (isVisible(attribute) && isOutputElement) { // The Element is output element, add the prefix (if used) // to visibyUtilized String prefix = attribute.getPrefix(); if (prefix != null && !(prefix.equals(XML) || prefix.equals(XMLNS))) { visiblyUtilized.add(prefix); } // Add to the result. result.add(attribute); } } else if (isOutputElement && !isVisible(attribute) && !XMLNS.equals(NName)) { ns.removeMappingIfNotRender(NName); } else { if (!isOutputElement && isVisible(attribute) && inclusiveNSSet.contains(NName) && !ns.removeMappingIfRender(NName)) { Node n = ns.addMappingAndRender(NName, NNodeValue, attribute); if (n != null) { result.add((Attr)n); if (C14nHelper.namespaceIsRelative(attribute)) { Object[] exArgs = { element.getTagName(), NName, attribute.getNodeValue() }; throw new CanonicalizationException( "c14n.Canonicalizer.RelativeNamespace", exArgs ); } } } if (ns.addMapping(NName, NNodeValue, attribute) && C14nHelper.namespaceIsRelative(NNodeValue)) { // New definition check if it is relative Object[] exArgs = { element.getTagName(), NName, attribute.getNodeValue() }; throw new CanonicalizationException( "c14n.Canonicalizer.RelativeNamespace", exArgs ); } } } } if (isOutputElement) { // The element is visible, handle the xmlns definition Attr xmlns = element.getAttributeNodeNS(XMLNS_URI, XMLNS); if (xmlns != null && !isVisible(xmlns)) { // There is a definition but the xmlns is not selected by the // xpath. then xmlns="" ns.addMapping(XMLNS, "", getNullNode(xmlns.getOwnerDocument())); } String prefix = null; if (element.getNamespaceURI() != null && !(element.getPrefix() == null || element.getPrefix().length() == 0)) { prefix = element.getPrefix(); } else { prefix = XMLNS; } visiblyUtilized.add(prefix); for (String s : visiblyUtilized) { Attr key = ns.getMapping(s); if (key != null) { result.add(key); } } } //we output all Attrs which are available for (Attr attr : result) { outputAttrToWriter(attr.getNodeName(), attr.getNodeValue(), writer, cache); } } protected void circumventBugIfNeeded(XMLSignatureInput input) throws XMLParserException, IOException { if (!input.isNeedsToBeExpanded() || inclusiveNSSet.isEmpty()) { return; } Document doc = null; if (input.getSubNode() != null) { doc = XMLUtils.getOwnerDocument(input.getSubNode()); } else { doc = XMLUtils.getOwnerDocument(input.getNodeSet()); } XMLUtils.circumventBug2650(doc); } }
⏎ com/sun/org/apache/xml/internal/security/c14n/implementations/Canonicalizer20010315Excl.java
Or download all of them as a single archive file:
File name: java.xml.crypto-17.0.5-src.zip File size: 555559 bytes Release date: 2022-09-13 Download
⇒ JDK 17 jdk.accessibility.jmod - Accessibility Module
2023-07-01, 14385👍, 0💬
Popular Posts:
JDK 11 jdk.jfr.jmod is the JMOD file for JDK 11 JFR module. JDK 11 JFR module compiled class files a...
JAX-WS is an API for building web services and clients. It is the next generation Web Services API r...
JRE 8 plugin.jar is the JAR file for JRE 8 Java Control Panel Plugin interface and tools. JRE (Java ...
JDK 11 java.security.jgss.jmod is the JMOD file for JDK 11 Security JGSS (Java Generic Security Serv...
JDK 11 jdk.internal.opt.jmod is the JMOD file for JDK 11 Internal Opt module. JDK 11 Internal Opt mo...