amattheu 2003/04/29 14:37:00
Modified: . build.xml
src/org/apache/xml/security/algorithms JCEMapper.java
MessageDigestAlgorithm.java SignatureAlgorithm.java
SignatureAlgorithmSpi.java
src/org/apache/xml/security/algorithms/encryption
EncryptionMethod.java EncryptionMethodSpi.java
src/org/apache/xml/security/algorithms/encryption/helper
OAEPCipher.java PKCS15Cipher.java
src/org/apache/xml/security/algorithms/implementations
IntegrityHmac.java SignatureBaseRSA.java
SignatureDSA.java
src/org/apache/xml/security/encryption XMLCipher.java
src/org/apache/xml/security/keys KeyInfo.java
src/org/apache/xml/security/keys/content KeyName.java
KeyValue.java MgmtData.java PGPData.java
RetrievalMethod.java SPKIData.java X509Data.java
src/org/apache/xml/security/keys/content/keyvalues
DSAKeyValue.java RSAKeyValue.java
src/org/apache/xml/security/keys/content/x509
XMLX509CRL.java XMLX509Certificate.java
XMLX509IssuerSerial.java XMLX509SKI.java
XMLX509SubjectName.java
src/org/apache/xml/security/keys/keyresolver
KeyResolver.java KeyResolverSpi.java
src/org/apache/xml/security/keys/keyresolver/implementations
RSAKeyValueResolver.java
RetrievalMethodResolver.java
X509CertificateResolver.java
X509IssuerSerialResolver.java X509SKIResolver.java
X509SubjectNameResolver.java
src/org/apache/xml/security/keys/storage
StorageResolver.java
src/org/apache/xml/security/keys/storage/implementations
CertsInFilesystemDirectoryResolver.java
src/org/apache/xml/security/resource config.xml
src/org/apache/xml/security/signature Manifest.java
ObjectContainer.java Reference.java
SignatureProperties.java SignatureProperty.java
SignedInfo.java XMLSignature.java
src/org/apache/xml/security/transforms Transform.java
TransformSpi.java Transforms.java
src/org/apache/xml/security/transforms/implementations
TransformXPath.java TransformXPath2Filter.java
TransformXPath2Filter04.java
src/org/apache/xml/security/utils Base64.java Constants.java
ElementProxy.java HelperNodeList.java
IdResolver.java IgnoreAllErrorHandler.java
JavaUtils.java RFC2253Parser.java XMLUtils.java
src/org/apache/xml/security/utils/resolver
ResourceResolver.java ResourceResolverSpi.java
src/org/apache/xml/security/utils/resolver/implementations
ResolverAnonymous.java ResolverDirectHTTP.java
ResolverFragment.java ResolverLocalFilesystem.java
ResolverXPointer.java
src_samples/org/apache/xml/security/samples/iaik
IAIKInterOp.java
src_samples/org/apache/xml/security/samples/signature
CreateCollectableSignature.java
CreateDonaldsAdditionalURISignature.java
CreateEnvelopingSignature.java
CreateMerlinsExampleSixteen.java
CreateNullURIReference.java CreateSignature.java
HereSigner.java NullURIReferenceResolver.java
VerifyCollectableSignature.java
VerifyMerlinsExamplesFifteen.java
VerifyMerlinsExamplesSixteen.java
src_samples/org/apache/xml/security/samples/transforms
SampleTransformNone.java
src_samples/org/apache/xml/security/samples/utils/resolver
OfflineResolver.java
src_unitTests/org/apache/xml/security/test AllTests.java
InteropTest.java ModuleTest.java
src_unitTests/org/apache/xml/security/test/algorithms/implementations
KeyWrapTest.java SignatureDSATest.java
src_unitTests/org/apache/xml/security/test/c14n/helper
C14nHelperTest.java
src_unitTests/org/apache/xml/security/test/c14n/implementations
C14NInterop.java
Canonicalizer20010315ExclusiveTest.java
Canonicalizer20010315Test.java
ExclusiveC14NInterop.java
src_unitTests/org/apache/xml/security/test/external/org/apache/xalan/XPathAPI
AttributeAncestorOrSelf.java XalanBug1425Test.java
src_unitTests/org/apache/xml/security/test/interop
BaltimoreTest.java IAIKTest.java IBMTest.java
InteropTest.java RSASecurityTest.java
src_unitTests/org/apache/xml/security/test/resource
TestVectorResolver.java
src_unitTests/org/apache/xml/security/test/signature
XMLSignatureInputTest.java
src_unitTests/org/apache/xml/security/test/transforms/implementations
TransformBase64DecodeTest.java
src_unitTests/org/apache/xml/security/test/utils
Base64Test.java
src_unitTests/org/apache/xml/security/test/utils/resolver
OfflineResolver.java ResourceResolverSpiTest.java
Log:
Replaced dependency on Log4J with commons-logging in keeping with the Apache
Commons policy.
Revision Changes Path
1.55 +26 -1 xml-security/build.xml
Index: build.xml
===================================================================
RCS file: /home/cvs/xml-security/build.xml,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -r1.54 -r1.55
--- build.xml 9 Sep 2002 14:14:24 -0000 1.54
+++ build.xml 29 Apr 2003 21:36:52 -0000 1.55
@@ -86,6 +86,7 @@
<property name="lib.jce"
value="${dir.libs}/bc-${jce.download.file}" />
<property name="lib.junit" value="${dir.libs}/junit3.7.jar"
/>
<property name="lib.log4j"
value="${dir.libs}/jakarta-log4j-1.2.6.jar" />
+ <property name="lib.logging"
value="${dir.libs}/commons-logging-1.0.3.jar" />
<property name="lib.styleApache"
value="${dir.libs}/style-apachexml.jar" />
<property name="lib.stylebook"
value="${dir.libs}/stylebook-1.0-b3_xalan-2.jar" />
<property name="lib.xalan.1" value="${dir.libs}/xalan.jar" />
@@ -99,6 +100,7 @@
<pathelement path="${lib.xalan.1}" />
<pathelement path="${lib.xalan.2}" />
<pathelement path="${lib.log4j}" />
+ <pathelement path="${lib.logging}" />
<pathelement path="${lib.jce}" />
</path>
@@ -648,6 +650,7 @@
<mkdir dir="${build.bindist}/${dir.libs}" />
<copy todir="${build.bindist}/${dir.libs}" file="${lib.junit}" />
<copy todir="${build.bindist}/${dir.libs}" file="${lib.log4j}" />
+ <copy todir="${build.bindist}/${dir.libs}" file="${lib.logging}" />
<copy todir="${build.bindist}/${dir.libs}" file="${lib.styleApache}" />
<copy todir="${build.bindist}/${dir.libs}" file="${lib.stylebook}" />
<copy todir="${build.bindist}/${dir.libs}" file="${lib.xerces.1}" />
@@ -733,6 +736,28 @@
<classpath refid="classpath.test" />
</java>
</target>
+
+ <target name="axis-sign"
+ description="axis sign sample"
+ depends="compile">
+ <java classname="org.apache.xml.security.samples.AxisSigner"
+ fork="yes"
+ taskname="SignAxis"
+ failonerror="true">
+ <classpath refid="classpath.test" />
+ </java>
+ </target>
+
+ <target name="axis-verify"
+ description="axis verify sample"
+ depends="compile">
+ <java classname="org.apache.xml.security.samples.AxisVerifier"
+ fork="yes"
+ taskname="VerifyAxis"
+ failonerror="true">
+ <classpath refid="classpath.test" />
+ </java>
+ </target>
<target name="signAndVerify"
description="creates and verifies a signature"
@@ -780,4 +805,4 @@
<classpath refid="classpath.library" />
</java>
</target>
-</project>
\ No newline at end of file
+</project>
1.16 +19 -19
xml-security/src/org/apache/xml/security/algorithms/JCEMapper.java
Index: JCEMapper.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/JCEMapper.java,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -r1.15 -r1.16
--- JCEMapper.java 11 Feb 2003 16:02:45 -0000 1.15
+++ JCEMapper.java 29 Apr 2003 21:36:53 -0000 1.16
@@ -81,9 +81,9 @@
*/
public class JCEMapper {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(JCEMapper.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(JCEMapper.class.getName());
/** Field _providerList */
private static Element _providerList = null;
@@ -128,7 +128,7 @@
.newInstance();
if (java.security.Security.getProvider(Id) == null) {
- cat.debug("The provider " + Id
+ log.debug("The provider " + Id
+ " had to be added to the java.security.Security");
java.security.Security.addProvider(prov);
@@ -211,7 +211,7 @@
*/
public static ProviderIdClass translateURItoJCEID(String AlgorithmURI) {
- cat.debug("Request for URI " + AlgorithmURI);
+ log.debug("Request for URI " + AlgorithmURI);
try {
@@ -237,14 +237,14 @@
ProviderIdClass result = new ProviderIdClass(jceName,
providerId);
- cat.debug("Found " + result.getAlgorithmID() + " from
provider "
+ log.debug("Found " + result.getAlgorithmID() + " from
provider "
+ result.getProviderId());
return result;
}
}
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
}
return null;
@@ -260,7 +260,7 @@
public static ProviderIdClass translateURItoJCEID(String AlgorithmURI,
String requestedProviderId) {
- cat.debug("Request for URI " + AlgorithmURI + " from provider "
+ log.debug("Request for URI " + AlgorithmURI + " from provider "
+ requestedProviderId);
if (!JCEMapper.getProviderIsInClassPath(requestedProviderId)) {
@@ -280,12 +280,12 @@
ProviderIdClass result = new ProviderIdClass(jceName,
requestedProviderId);
- cat.debug("Found " + result.getAlgorithmID() + " from provider "
+ log.debug("Found " + result.getAlgorithmID() + " from provider "
+ result.getProviderId());
return result;
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
}
return null;
@@ -299,7 +299,7 @@
*/
public static String getAlgorithmClassFromURI(String AlgorithmURI) {
- cat.debug("Request for URI " + AlgorithmURI);
+ log.debug("Request for URI " + AlgorithmURI);
try {
NodeList providers =
XPathAPI.selectNodeList(JCEMapper._providerList,
@@ -311,12 +311,12 @@
Element pro = (Element) providers.item(i);
Attr jceName = pro.getAttributeNodeNS(null, "JCEName");
- cat.debug("Found " + jceName.getNodeValue());
+ log.debug("Found " + jceName.getNodeValue());
}
return ((Element) providers.item(0)).getAttributeNS(null,
"JCEName");
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
return "";
}
@@ -354,7 +354,7 @@
}
}
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
}
return -1;
@@ -379,7 +379,7 @@
return Integer.parseInt(algoclassAttr.getNodeValue());
}
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
}
return 0;
@@ -408,7 +408,7 @@
return algoclassAttr.getNodeValue();
}
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
}
return null;
@@ -431,7 +431,7 @@
return algoclassAttr.getNodeValue();
}
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
}
return null;
@@ -476,7 +476,7 @@
return URI.getNodeValue();
}
} catch (TransformerException ex) {
- cat.debug("Found nothing: " + ex.getMessage());
+ log.debug("Found nothing: " + ex.getMessage());
}
return null;
1.11 +4 -4
xml-security/src/org/apache/xml/security/algorithms/MessageDigestAlgorithm.java
Index: MessageDigestAlgorithm.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/MessageDigestAlgorithm.java,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -r1.10 -r1.11
--- MessageDigestAlgorithm.java 11 Feb 2003 16:02:46 -0000 1.10
+++ MessageDigestAlgorithm.java 29 Apr 2003 21:36:53 -0000 1.11
@@ -78,10 +78,10 @@
*/
public class MessageDigestAlgorithm extends Algorithm {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(MessageDigestAlgorithm.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ MessageDigestAlgorithm.class.getName());
// Message Digest - NOT RECOMMENDED MD5
public static final String ALGO_ID_DIGEST_NOT_RECOMMENDED_MD5 =
Constants.MoreAlgorithmsSpecNS + "md5";
1.16 +11 -11
xml-security/src/org/apache/xml/security/algorithms/SignatureAlgorithm.java
Index: SignatureAlgorithm.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/SignatureAlgorithm.java,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -r1.15 -r1.16
--- SignatureAlgorithm.java 11 Feb 2003 16:02:46 -0000 1.15
+++ SignatureAlgorithm.java 29 Apr 2003 21:36:53 -0000 1.16
@@ -79,9 +79,9 @@
*/
public class SignatureAlgorithm extends Algorithm {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(SignatureAlgorithm.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(SignatureAlgorithm.class.getName());
/** Field _alreadyInitialized */
static boolean _alreadyInitialized = false;
@@ -108,7 +108,7 @@
String implementingClass =
SignatureAlgorithm.getImplementingClass(algorithmURI);
- cat.debug("Create URI \"" + algorithmURI + "\" class \""
+ log.debug("Create URI \"" + algorithmURI + "\" class \""
+ implementingClass + "\"");
this._signatureAlgorithm =
@@ -174,7 +174,7 @@
String implementingClass =
SignatureAlgorithm.getImplementingClass(algorithmURI);
- cat.debug("Create URI \"" + algorithmURI + "\" class \""
+ log.debug("Create URI \"" + algorithmURI + "\" class \""
+ implementingClass + "\"");
this._signatureAlgorithm =
@@ -362,13 +362,13 @@
*/
public static void providerInit() {
- if (SignatureAlgorithm.cat == null) {
- SignatureAlgorithm.cat =
- org.apache.log4j.Category
- .getInstance(SignatureAlgorithm.class.getName());
+ if (SignatureAlgorithm.log == null) {
+ SignatureAlgorithm.log =
+ org.apache.commons.logging.LogFactory
+ .getLog(SignatureAlgorithm.class.getName());
}
- cat.debug("Init() called");
+ log.debug("Init() called");
if (!SignatureAlgorithm._alreadyInitialized) {
SignatureAlgorithm._algorithmHash = new HashMap(10);
@@ -387,7 +387,7 @@
throws AlgorithmAlreadyRegisteredException {
{
- cat.debug("Try to register " + algorithmURI + " " +
implementingClass);
+ log.debug("Try to register " + algorithmURI + " " +
implementingClass);
// are we already registered?
String registeredClass =
1.7 +4 -5
xml-security/src/org/apache/xml/security/algorithms/SignatureAlgorithmSpi.java
Index: SignatureAlgorithmSpi.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/SignatureAlgorithmSpi.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- SignatureAlgorithmSpi.java 11 Feb 2003 16:02:46 -0000 1.6
+++ SignatureAlgorithmSpi.java 29 Apr 2003 21:36:53 -0000 1.7
@@ -75,10 +75,9 @@
*/
public abstract class SignatureAlgorithmSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(SignatureAlgorithmSpi.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(SignatureAlgorithmSpi.class.getName());
/** Field _signatureAlgorithmObject */
private SignatureAlgorithm _signatureAlgorithmObject = null;
1.11 +11 -11
xml-security/src/org/apache/xml/security/algorithms/encryption/EncryptionMethod.java
Index: EncryptionMethod.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/encryption/EncryptionMethod.java,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -r1.10 -r1.11
--- EncryptionMethod.java 11 Feb 2003 16:02:46 -0000 1.10
+++ EncryptionMethod.java 29 Apr 2003 21:36:53 -0000 1.11
@@ -85,9 +85,9 @@
*/
public class EncryptionMethod extends Algorithm {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(EncryptionMethod.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(EncryptionMethod.class.getName());
/** Field _emSpi */
EncryptionMethodSpi _emSpi = null;
@@ -219,7 +219,7 @@
if ((this._emSpi != null)
&& this._emSpi.getRequiredProviderAvailable()) {
- cat.debug("Create URI \"" + algorithmURI + "\" class \""
+ log.debug("Create URI \"" + algorithmURI + "\" class \""
+ implementingClass + "\"");
break searchForWorkingClass;
@@ -278,7 +278,7 @@
if ((this._emSpi != null)
&& this._emSpi.getRequiredProviderAvailable()) {
- cat.debug("Create URI \"" + algorithmURI + "\" class \""
+ log.debug("Create URI \"" + algorithmURI + "\" class \""
+ implementingClass + "\"");
break searchForWorkingClass;
@@ -474,22 +474,22 @@
return true;
} else {
- cat.debug("Try to register class " + implementingClass
+ log.debug("Try to register class " + implementingClass
+ " but Provider " + emSpi.getRequiredProviderName()
+ " not available");
}
} else {
- cat.debug("Try to register class " + implementingClass
+ log.debug("Try to register class " + implementingClass
+ " but Class not available");
}
} catch (ClassNotFoundException ex) {
- cat.debug("Try to register class " + implementingClass
+ log.debug("Try to register class " + implementingClass
+ " but Class not found: ", ex);
} catch (IllegalAccessException ex) {
- cat.debug("Try to register class " + implementingClass
+ log.debug("Try to register class " + implementingClass
+ " but Class not found: ", ex);
} catch (InstantiationException ex) {
- cat.debug("Try to register class " + implementingClass
+ log.debug("Try to register class " + implementingClass
+ " but Class not found: ", ex);
}
1.8 +3 -3
xml-security/src/org/apache/xml/security/algorithms/encryption/EncryptionMethodSpi.java
Index: EncryptionMethodSpi.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/encryption/EncryptionMethodSpi.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- EncryptionMethodSpi.java 11 Feb 2003 16:02:46 -0000 1.7
+++ EncryptionMethodSpi.java 29 Apr 2003 21:36:53 -0000 1.8
@@ -77,9 +77,9 @@
*/
public abstract class EncryptionMethodSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(EncryptionMethodSpi.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(EncryptionMethodSpi.class.getName());
/**
* Return <CODE>true</CODE> if this Provider which is required by this
1.4 +1 -6
xml-security/src/org/apache/xml/security/algorithms/encryption/helper/OAEPCipher.java
Index: OAEPCipher.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/encryption/helper/OAEPCipher.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- OAEPCipher.java 11 Feb 2003 16:02:46 -0000 1.3
+++ OAEPCipher.java 29 Apr 2003 21:36:53 -0000 1.4
@@ -76,13 +76,11 @@
import org.apache.xml.security.utils.Base64;
import org.apache.xml.security.utils.HexDump;
-import org.bouncycastle.jce.provider.BouncyCastleProvider;
/**
*
* @author $Author$
- * @see org.bouncycastle.crypto.encodings.OAEPEncoding
*/
public class OAEPCipher {
@@ -448,9 +446,6 @@
* @throws Exception
*/
public static void main(String[] args) throws Exception {
-
- Security.addProvider(new BouncyCastleProvider());
-
Cipher rsaCipher = Cipher.getInstance("RSA", "BC");
MessageDigest sha1 = MessageDigest.getInstance("SHA-1", "BC");
byte encodingParams[] = Base64.decode("9lWu3Q==");
1.4 +1 -2
xml-security/src/org/apache/xml/security/algorithms/encryption/helper/PKCS15Cipher.java
Index: PKCS15Cipher.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/encryption/helper/PKCS15Cipher.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- PKCS15Cipher.java 11 Feb 2003 16:02:46 -0000 1.3
+++ PKCS15Cipher.java 29 Apr 2003 21:36:53 -0000 1.4
@@ -71,7 +71,6 @@
/**
*
* @author $Author$
- * @see org.bouncycastle.crypto.encodings.PKCS1Encoding
*/
public class PKCS15Cipher {
1.7 +24 -24
xml-security/src/org/apache/xml/security/algorithms/implementations/IntegrityHmac.java
Index: IntegrityHmac.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/implementations/IntegrityHmac.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- IntegrityHmac.java 11 Feb 2003 16:02:47 -0000 1.6
+++ IntegrityHmac.java 29 Apr 2003 21:36:53 -0000 1.7
@@ -89,10 +89,10 @@
* @author $Author$
*/
public abstract class IntegrityHmac extends SignatureAlgorithmSpi {
-
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(IntegrityHmacSHA1.class.getName());
+
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(IntegrityHmacSHA1.class.getName());
/**
* Method engineGetURI
@@ -117,7 +117,7 @@
JCEMapper.ProviderIdClass algorithmID =
JCEMapper.translateURItoJCEID(this.engineGetURI());
- cat.debug("Created IntegrityHmacSHA1 using "
+ log.debug("Created IntegrityHmacSHA1 using "
+ algorithmID.getAlgorithmID() + " "
+ algorithmID.getProviderId());
@@ -164,22 +164,22 @@
byte[] completeResult = this._macAlgorithm.doFinal();
if ((this._HMACOutputLength == 0) || (this._HMACOutputLength >=
160)) {
- cat.debug("completeResult = "
+ log.debug("completeResult = "
+ HexDump.byteArrayToHexString(completeResult));
- cat.debug("signature = "
+ log.debug("signature = "
+ HexDump.byteArrayToHexString(signature));
return MessageDigestAlgorithm.isEqual(completeResult, signature);
} else {
- cat.debug("completeResult = "
+ log.debug("completeResult = "
+ HexDump.byteArrayToHexString(completeResult));
byte[] stripped = IntegrityHmac.reduceBitLength(completeResult,
this._HMACOutputLength);
- cat.debug("stripped = "
+ log.debug("stripped = "
+ HexDump.byteArrayToHexString(stripped));
- cat.debug("signature = "
+ log.debug("signature = "
+ HexDump.byteArrayToHexString(signature));
return MessageDigestAlgorithm.isEqual(stripped, signature);
@@ -387,7 +387,7 @@
*/
protected String engineGetJCEAlgorithmString() {
- cat.debug("engineGetJCEAlgorithmString()");
+ log.debug("engineGetJCEAlgorithmString()");
return this._macAlgorithm.getAlgorithm();
}
1.7 +17 -17
xml-security/src/org/apache/xml/security/algorithms/implementations/SignatureBaseRSA.java
Index: SignatureBaseRSA.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/implementations/SignatureBaseRSA.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- SignatureBaseRSA.java 11 Feb 2003 16:02:48 -0000 1.6
+++ SignatureBaseRSA.java 29 Apr 2003 21:36:53 -0000 1.7
@@ -82,9 +82,9 @@
*/
public abstract class SignatureBaseRSA extends SignatureAlgorithmSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(SignatureBaseRSA.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(SignatureBaseRSA.class.getName());
/**
* Method engineGetURI
@@ -106,7 +106,7 @@
JCEMapper.ProviderIdClass algorithmID =
JCEMapper.translateURItoJCEID(this.engineGetURI());
- cat.debug("Created SignatureDSA using " + algorithmID.getAlgorithmID()
+ log.debug("Created SignatureDSA using " + algorithmID.getAlgorithmID()
+ " " + algorithmID.getProviderId());
try {
1.8 +6 -125
xml-security/src/org/apache/xml/security/algorithms/implementations/SignatureDSA.java
Index: SignatureDSA.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/algorithms/implementations/SignatureDSA.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- SignatureDSA.java 11 Feb 2003 16:02:48 -0000 1.7
+++ SignatureDSA.java 29 Apr 2003 21:36:53 -0000 1.8
@@ -78,22 +78,15 @@
import org.apache.xml.security.utils.Constants;
-/*
-import org.bouncycastle.asn1.DERConstructedSequence;
-import org.bouncycastle.asn1.DERInputStream;
-import org.bouncycastle.asn1.DERInteger;
-import org.bouncycastle.asn1.DEROutputStream;
-*/
-
/**
*
* @author $Author$
*/
public class SignatureDSA extends SignatureAlgorithmSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(SignatureDSA.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(SignatureDSA.class.getName());
/** Field _URI */
public static final String _URI = Constants.SignatureSpecNS + "dsa-sha1";
@@ -120,7 +113,7 @@
JCEMapper.ProviderIdClass algorithmID =
JCEMapper.translateURItoJCEID(SignatureDSA._URI);
- cat.debug("Created SignatureDSA using " + algorithmID.getAlgorithmID()
+ log.debug("Created SignatureDSA using " + algorithmID.getAlgorithmID()
+ " " + algorithmID.getProviderId());
try {
@@ -169,7 +162,7 @@
throws XMLSignatureException {
try {
- cat.debug("Called DSA.verify() on " + Base64.encode(signature));
+ log.debug("Called DSA.verify() on " + Base64.encode(signature));
byte[] jcebytes = SignatureDSA.convertXMLDSIGtoASN1(signature);
@@ -348,118 +341,6 @@
return this._signatureAlgorithm.getProvider().getName();
}
- /*
- * Converts a XML Signature DSA Value to an ASN.1 DSA value.
- *
- * The JAVA JCE DSA Signature algorithm creates ASN.1 encoded (r,s) value
- * pairs; the XML Signature requires the core BigInteger values.
- *
- * @param xmldsigbytes
- *
- * @throws IOException
- * @see org.bouncycastle.jce.provider.JDKDSASigner#derEncode
- * @see <A HREF="http://www.w3.org/TR/xmldsig-core/#dsa-sha1">6.4.1
DSA</A>
- private static byte[] convertXMLDSIGtoASN1_BOUNCY(byte[] xmldsigbytes)
- throws IOException {
-
- byte rbytes[] = new byte[21];
- byte sbytes[] = new byte[21];
-
- rbytes[0] = (byte) 0x00;
- sbytes[0] = (byte) 0x00;
-
- System.arraycopy(xmldsigbytes, 0, rbytes, 1, 20);
- System.arraycopy(xmldsigbytes, 20, sbytes, 1, 20);
-
- BigInteger r = new BigInteger(rbytes);
- BigInteger s = new BigInteger(sbytes);
-
- cat.debug("Verify DSA r=" + r.toString());
- cat.debug("Verify DSA s=" + s.toString());
-
- ByteArrayOutputStream bOut = new ByteArrayOutputStream();
- DEROutputStream dOut = new DEROutputStream(bOut);
- DERConstructedSequence seq = new DERConstructedSequence();
-
- seq.addObject(new DERInteger(r));
- seq.addObject(new DERInteger(s));
- dOut.writeObject(seq);
-
- return bOut.toByteArray();
- }
- */
-
- /*
- * Converts an ASN.1 DSA value to a XML Signature DSA Value.
- *
- * The JAVA JCE DSA Signature algorithm creates ASN.1 encoded (r,s) value
- * pairs; the XML Signature requires the core BigInteger values.
- *
- * @param derbytes
- *
- * @throws IOException
- * @see org.bouncycastle.jce.provider.JDKDSASigner#derDecode
- * @see <A HREF="http://www.w3.org/TR/xmldsig-core/#dsa-sha1">6.4.1
DSA</A>
- private static byte[] convertASN1toXMLDSIG_BOUNCY(byte derbytes[])
- throws IOException {
-
- cat.debug("Input convertASN1toXMLDSIG("
- + HexDump.byteArrayToHexString(derbytes) + ")");
-
- ByteArrayInputStream bIn = new ByteArrayInputStream(derbytes);
- DERInputStream dIn = new DERInputStream(bIn);
- DERConstructedSequence seq = (DERConstructedSequence) dIn.readObject();
- BigInteger r = ((DERInteger) seq.getObjectAt(0)).getValue();
- BigInteger s = ((DERInteger) seq.getObjectAt(1)).getValue();
-
- cat.debug("Created DSA r=" + r.toString());
- cat.debug("Created DSA s=" + s.toString());
-
- byte rbytes[] = r.toByteArray();
- byte sbytes[] = s.toByteArray();
-
- cat.debug("r1=" + HexDump.byteArrayToHexString(rbytes));
- cat.debug("s1=" + HexDump.byteArrayToHexString(sbytes));
-
- rbytes = SignatureDSA.normalizeBigIntegerArray(rbytes);
- sbytes = SignatureDSA.normalizeBigIntegerArray(sbytes);
-
- cat.debug("r2=" + HexDump.byteArrayToHexString(rbytes));
- cat.debug("s2=" + HexDump.byteArrayToHexString(sbytes));
-
- byte result[] = new byte[40];
-
- System.arraycopy(rbytes, 0, result, 0, 20);
- System.arraycopy(sbytes, 0, result, 20, 20);
-
- return result;
- }
- */
-
- /*
- *
- * @see org.bouncycastle.jce.provider.JDKDSASigner#derEncode
- * @param bigIntegerArray
- *
- * @see <A HREF="http://www.w3.org/TR/xmldsig-core/#dsa-sha1">6.4.1
DSA</A>
- private static byte[] normalizeBigIntegerArray(byte bigIntegerArray[]) {
-
- byte resultBytes[] = new byte[20];
-
- for (int i = 0; i < 20; i++) {
- resultBytes[i] = (byte) 0x00;
- }
-
- if (bigIntegerArray.length == 21) {
- System.arraycopy(bigIntegerArray, 1, resultBytes, 0, 20);
- } else {
- System.arraycopy(bigIntegerArray, 0, resultBytes,
- 20 - bigIntegerArray.length,
bigIntegerArray.length);
- }
-
- return resultBytes;
- }
- */
/**
* Converts an ASN.1 DSA value to a XML Signature DSA Value.
1.2 +44 -45
xml-security/src/org/apache/xml/security/encryption/XMLCipher.java
Index: XMLCipher.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/encryption/XMLCipher.java,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- XMLCipher.java 18 Mar 2003 22:51:23 -0000 1.1
+++ XMLCipher.java 29 Apr 2003 21:36:53 -0000 1.2
@@ -88,7 +88,6 @@
import javax.xml.transform.dom.DOMSource;
import javax.xml.transform.stream.StreamResult;
import javax.xml.transform.stream.StreamSource;
-import org.apache.log4j.*;
import org.apache.xml.security.keys.KeyInfo;
import org.apache.xml.security.utils.Constants;
import org.apache.xml.security.utils.EncryptionConstants;
@@ -122,12 +121,9 @@
* @author Christian Geuer-Pollmann
*/
public class XMLCipher {
- private static final Logger logger =
- Logger.getLogger(XMLCipher.class.getName());
- static {
- BasicConfigurator.configure();
- }
+ private static org.apache.commons.logging.Log logger =
+
org.apache.commons.logging.LogFactory.getLog(XMLCipher.class.getName());
public static final String TRIPLEDES =
EncryptionConstants.ALGO_ID_BLOCKCIPHER_TRIPLEDES;
@@ -279,10 +275,10 @@
XMLEncryptionException {
// sanity checks
logger.info("Getting XMLCipher...");
- logger.assertLog(null != transformation,
- "Transformation unexpectedly null...");
- logger.assertLog(isValidEncryptionAlgorithm(transformation),
- "Alogorithm unvalid, expected one of " + ENC_ALGORITHMS);
+ if (null == transformation)
+ logger.error("Transformation unexpectedly null...");
+ if(!isValidEncryptionAlgorithm(transformation))
+ logger.error("Alogorithm unvalid, expected one of " +
ENC_ALGORITHMS);
if (null == instance) {
instance = new XMLCipher();
@@ -319,14 +315,14 @@
throws XMLEncryptionException {
// sanity checks
logger.info("Getting XMLCipher...");
- logger.assertLog(null != transformation,
- "Transformation unexpectedly null...");
- logger.assertLog(null != provider,
- "Provider unexpectedly null..");
- logger.assertLog("" != provider,
- "Provider's value unexpectedly not specified...");
- logger.assertLog(isValidEncryptionAlgorithm(transformation),
- "Alogorithm unvalid, expected one of " + ENC_ALGORITHMS);
+ if (null == transformation)
+ logger.error("Transformation unexpectedly null...");
+ if(null == provider)
+ logger.error("Provider unexpectedly null..");
+ if("" == provider)
+ logger.error("Provider's value unexpectedly not specified...");
+ if(!isValidEncryptionAlgorithm(transformation))
+ logger.error("Alogorithm unvalid, expected one of " +
ENC_ALGORITHMS);
if (null == instance) {
instance = new XMLCipher();
@@ -367,8 +363,8 @@
public void init(int opmode, Key key) throws XMLEncryptionException {
// sanity checks
logger.info("Initializing XMLCipher...");
- logger.assertLog(opmode == ENCRYPT_MODE || opmode == DECRYPT_MODE,
- "Mode unexpectedly invalid...");
+ if (opmode != ENCRYPT_MODE && opmode != DECRYPT_MODE)
+ logger.error("Mode unexpectedly invalid...");
logger.debug("opmode = " +
((opmode == ENCRYPT_MODE) ? "ENCRYPT_MODE" : "DECRYPT_MODE"));
@@ -394,9 +390,10 @@
private Document encryptElement(Element element) throws
XMLEncryptionException {
logger.info("Encrypting element...");
- logger.assertLog(null != element, "Element unexpectedly null...");
- logger.assertLog((cipherMode == ENCRYPT_MODE),
- "XMLCipher unexpectedly not in ENCRYPT_MODE...");
+ if(null == element)
+ logger.error("Element unexpectedly null...");
+ if(cipherMode != ENCRYPT_MODE)
+ logger.error("XMLCipher unexpectedly not in ENCRYPT_MODE...");
String serializedOctets = serializer.serialize(element);
logger.debug("Serialized octets:\n" + serializedOctets);
@@ -461,9 +458,10 @@
private Document encryptElementContent(Element element) throws
XMLEncryptionException {
logger.info("Encrypting element content...");
- logger.assertLog(null != element, "Element unexpectedly null...");
- logger.assertLog((cipherMode == ENCRYPT_MODE),
- "XMLCipher unexpectedly not in ENCRYPT_MODE...");
+ if(null == element)
+ logger.error("Element unexpectedly null...");
+ if(cipherMode != ENCRYPT_MODE)
+ logger.error("XMLCipher unexpectedly not in ENCRYPT_MODE...");
NodeList children = element.getChildNodes();
String serializedOctets = null;
@@ -530,10 +528,10 @@
public Document doFinal(Document context, Document source) throws
XMLEncryptionException {
logger.info("Processing source document...");
- logger.assertLog(null != context,
- "Context document unexpectedly null...");
- logger.assertLog(null != source,
- "Source document unexpectedly null...");
+ if(null == context)
+ logger.error("Context document unexpectedly null...");
+ if(null == source)
+ logger.error("Source document unexpectedly null...");
instance.contextDocument = context;
@@ -570,10 +568,10 @@
public Document doFinal(Document context, Element element) throws
XMLEncryptionException {
logger.info("Processing source element...");
- logger.assertLog(null != context,
- "Context document unexpectedly null...");
- logger.assertLog(null != element,
- "Source element unexpectedly null...");
+ if(null == context)
+ logger.error("Context document unexpectedly null...");
+ if(null == element)
+ logger.error("Source element unexpectedly null...");
instance.contextDocument = context;
@@ -612,10 +610,10 @@
public Document doFinal(Document context, Element element, boolean
content)
throws XMLEncryptionException {
logger.info("Processing source element...");
- logger.assertLog(null != context,
- "Context document unexpectedly null...");
- logger.assertLog(null != element,
- "Source element unexpectedly null...");
+ if(null == context)
+ logger.error("Context document unexpectedly null...");
+ if(null == element)
+ logger.error("Source element unexpectedly null...");
instance.contextDocument = context;
@@ -704,11 +702,12 @@
public EncryptedData encryptData(Document context, Element element)
throws
XMLEncryptionException {
logger.info("Encrypting element...");
- logger.assertLog(null != context,
- "Context document unexpectedly null...");
- logger.assertLog(null != element, "Element unexpectedly null...");
- logger.assertLog((cipherMode == ENCRYPT_MODE),
- "XMLCipher unexpectedly not in ENCRYPT_MODE...");
+ if(null == context)
+ logger.error("Context document unexpectedly null...");
+ if(null == element)
+ logger.error("Element unexpectedly null...");
+ if(cipherMode != ENCRYPT_MODE)
+ logger.error("XMLCipher unexpectedly not in ENCRYPT_MODE...");
instance.contextDocument = context;
@@ -787,8 +786,8 @@
private Document decryptElement(Element element) throws
XMLEncryptionException {
logger.info("Decrypting element...");
- logger.assertLog((cipherMode == DECRYPT_MODE),
- "XMLCipher unexpectedly not in DECRYPT_MODE...");
+ if(cipherMode != DECRYPT_MODE)
+ logger.error("XMLCipher unexpectedly not in DECRYPT_MODE...");
EncryptedData encryptedData = factory.newEncryptedData(element);
1.12 +20 -20
xml-security/src/org/apache/xml/security/keys/KeyInfo.java
Index: KeyInfo.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/KeyInfo.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- KeyInfo.java 11 Feb 2003 16:02:49 -0000 1.11
+++ KeyInfo.java 29 Apr 2003 21:36:53 -0000 1.12
@@ -126,9 +126,9 @@
*/
public class KeyInfo extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(KeyInfo.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(KeyInfo.class.getName());
/** Field _dsns */
Element _dsns = null;
@@ -721,21 +721,21 @@
PublicKey pk = this.getPublicKeyFromInternalResolvers();
if (pk != null) {
- cat.debug("I could find a key using the per-KeyInfo key resolvers");
+ log.debug("I could find a key using the per-KeyInfo key resolvers");
return pk;
} else {
- cat.debug("I couldn't find a key using the per-KeyInfo key
resolvers");
+ log.debug("I couldn't find a key using the per-KeyInfo key
resolvers");
}
pk = this.getPublicKeyFromStaticResolvers();
if (pk != null) {
- cat.debug("I could find a key using the system-wide key resolvers");
+ log.debug("I could find a key using the system-wide key resolvers");
return pk;
} else {
- cat.debug("I couldn't find a key using the system-wide key
resolvers");
+ log.debug("I couldn't find a key using the system-wide key
resolvers");
}
return null;
@@ -811,7 +811,7 @@
for (int i = 0; i < this.lengthInternalKeyResolver(); i++) {
KeyResolverSpi keyResolver = this.itemInternalKeyResolver(i);
- cat.debug("Try " + keyResolver.getClass().getName());
+ log.debug("Try " + keyResolver.getClass().getName());
for (int j = 0;
j < this._constructionElement.getChildNodes().getLength();
@@ -874,12 +874,12 @@
X509Certificate cert = this.getX509CertificateFromInternalResolvers();
if (cert != null) {
- cat.debug(
+ log.debug(
"I could find a X509Certificate using the per-KeyInfo key
resolvers");
return cert;
} else {
- cat.debug(
+ log.debug(
"I couldn't find a X509Certificate using the per-KeyInfo key
resolvers");
}
@@ -887,12 +887,12 @@
cert = this.getX509CertificateFromStaticResolvers();
if (cert != null) {
- cat.debug(
+ log.debug(
"I could find a X509Certificate using the system-wide key
resolvers");
return cert;
} else {
- cat.debug(
+ log.debug(
"I couldn't find a X509Certificate using the system-wide key
resolvers");
}
@@ -910,7 +910,7 @@
X509Certificate getX509CertificateFromStaticResolvers()
throws KeyResolverException {
- cat.debug("Start getX509CertificateFromStaticResolvers() with "
+ log.debug("Start getX509CertificateFromStaticResolvers() with "
+ KeyResolver.length() + " resolvers");
for (int i = 0; i < KeyResolver.length(); i++) {
@@ -972,13 +972,13 @@
X509Certificate getX509CertificateFromInternalResolvers()
throws KeyResolverException {
- cat.debug("Start getX509CertificateFromInternalResolvers() with "
+ log.debug("Start getX509CertificateFromInternalResolvers() with "
+ this.lengthInternalKeyResolver() + " resolvers");
for (int i = 0; i < this.lengthInternalKeyResolver(); i++) {
KeyResolverSpi keyResolver = this.itemInternalKeyResolver(i);
- cat.debug("Try " + keyResolver.getClass().getName());
+ log.debug("Try " + keyResolver.getClass().getName());
for (int j = 0;
j < this._constructionElement.getChildNodes().getLength();
@@ -1092,16 +1092,16 @@
public static void init() {
if (!KeyInfo._alreadyInitialized) {
- if (KeyInfo.cat == null) {
+ if (KeyInfo.log == null) {
/**
* $todo$ why the hell does the static initialization from the
* start not work ?
*/
- KeyInfo.cat =
-
org.apache.log4j.Category.getInstance(KeyInfo.class.getName());
+ KeyInfo.log =
+
org.apache.commons.logging.LogFactory.getLog(KeyInfo.class.getName());
- cat.error("Had to assign cat in the init() function");
+ log.error("Had to assign log in the init() function");
}
// KeyInfo._contentHandlerHash = new HashMap(10);
1.7 +4 -4
xml-security/src/org/apache/xml/security/keys/content/KeyName.java
Index: KeyName.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/KeyName.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- KeyName.java 11 Feb 2003 16:02:49 -0000 1.6
+++ KeyName.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -73,9 +73,9 @@
*/
public class KeyName extends SignatureElementProxy implements KeyInfoContent
{
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(KeyName.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(KeyName.class.getName());
/**
* Constructor KeyName
1.7 +4 -4
xml-security/src/org/apache/xml/security/keys/content/KeyValue.java
Index: KeyValue.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/KeyValue.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- KeyValue.java 11 Feb 2003 16:02:49 -0000 1.6
+++ KeyValue.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -89,9 +89,9 @@
*/
public class KeyValue extends SignatureElementProxy implements
KeyInfoContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(KeyValue.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(KeyValue.class.getName());
/**
* Constructor KeyValue
1.7 +4 -4
xml-security/src/org/apache/xml/security/keys/content/MgmtData.java
Index: MgmtData.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/MgmtData.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- MgmtData.java 11 Feb 2003 16:02:50 -0000 1.6
+++ MgmtData.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -73,9 +73,9 @@
*/
public class MgmtData extends SignatureElementProxy implements
KeyInfoContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(MgmtData.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(MgmtData.class.getName());
/**
* Constructor MgmtData
1.7 +4 -4
xml-security/src/org/apache/xml/security/keys/content/PGPData.java
Index: PGPData.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/PGPData.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- PGPData.java 11 Feb 2003 16:02:50 -0000 1.6
+++ PGPData.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -73,9 +73,9 @@
*/
public class PGPData extends SignatureElementProxy implements KeyInfoContent
{
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(PGPData.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(PGPData.class.getName());
/**
* Constructor PGPData
1.10 +4 -4
xml-security/src/org/apache/xml/security/keys/content/RetrievalMethod.java
Index: RetrievalMethod.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/RetrievalMethod.java,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -r1.9 -r1.10
--- RetrievalMethod.java 11 Feb 2003 16:02:50 -0000 1.9
+++ RetrievalMethod.java 29 Apr 2003 21:36:54 -0000 1.10
@@ -81,9 +81,9 @@
public class RetrievalMethod extends SignatureElementProxy
implements KeyInfoContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(RetrievalMethod.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(RetrievalMethod.class.getName());
//J-
public static final String TYPE_DSA = Constants.SignatureSpecNS +
"DSAKeyValue";
public static final String TYPE_RSA = Constants.SignatureSpecNS +
"RSAKeyValue";
1.7 +4 -4
xml-security/src/org/apache/xml/security/keys/content/SPKIData.java
Index: SPKIData.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/SPKIData.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- SPKIData.java 11 Feb 2003 16:02:50 -0000 1.6
+++ SPKIData.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -73,9 +73,9 @@
*/
public class SPKIData extends SignatureElementProxy implements
KeyInfoContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(SPKIData.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(SPKIData.class.getName());
/**
* Constructor SPKIData
1.8 +6 -6
xml-security/src/org/apache/xml/security/keys/content/X509Data.java
Index: X509Data.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/X509Data.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- X509Data.java 11 Feb 2003 16:02:50 -0000 1.7
+++ X509Data.java 29 Apr 2003 21:36:54 -0000 1.8
@@ -85,9 +85,9 @@
*/
public class X509Data extends SignatureElementProxy implements
KeyInfoContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(X509Data.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(X509Data.class.getName());
/**
* Constructor X509Data
@@ -157,12 +157,12 @@
this.add(crl);
} else {
- cat.warn("Found a " + currentElem.getTagName() + " element in
"
+ log.warn("Found a " + currentElem.getTagName() + " element in
"
+ Constants._TAG_X509DATA);
this.addUnknownElement(currentElem);
}
} else {
- cat.warn("Found a " + currentElem.getTagName() + " element in "
+ log.warn("Found a " + currentElem.getTagName() + " element in "
+ Constants._TAG_X509DATA);
this.addUnknownElement(currentElem);
}
1.8 +4 -4
xml-security/src/org/apache/xml/security/keys/content/keyvalues/DSAKeyValue.java
Index: DSAKeyValue.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/keyvalues/DSAKeyValue.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- DSAKeyValue.java 11 Feb 2003 16:02:50 -0000 1.7
+++ DSAKeyValue.java 29 Apr 2003 21:36:54 -0000 1.8
@@ -86,9 +86,9 @@
public class DSAKeyValue extends SignatureElementProxy
implements KeyValueContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(DSAKeyValue.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(DSAKeyValue.class.getName());
/**
* Constructor DSAKeyValue
1.8 +5 -4
xml-security/src/org/apache/xml/security/keys/content/keyvalues/RSAKeyValue.java
Index: RSAKeyValue.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/keyvalues/RSAKeyValue.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- RSAKeyValue.java 11 Feb 2003 16:02:50 -0000 1.7
+++ RSAKeyValue.java 29 Apr 2003 21:36:54 -0000 1.8
@@ -87,9 +87,10 @@
public class RSAKeyValue extends SignatureElementProxy
implements KeyValueContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(RSAKeyValue.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ RSAKeyValue.class.getName());
/**
* Constructor RSAKeyValue
1.7 +4 -4
xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509CRL.java
Index: XMLX509CRL.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509CRL.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- XMLX509CRL.java 11 Feb 2003 16:02:50 -0000 1.6
+++ XMLX509CRL.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -78,9 +78,9 @@
public class XMLX509CRL extends SignatureElementProxy
implements XMLX509DataContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(XMLX509CRL.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(XMLX509CRL.class.getName());
/**
* Constructor XMLX509CRL
1.8 +4 -4
xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509Certificate.java
Index: XMLX509Certificate.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509Certificate.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- XMLX509Certificate.java 11 Feb 2003 16:02:50 -0000 1.7
+++ XMLX509Certificate.java 29 Apr 2003 21:36:54 -0000 1.8
@@ -81,9 +81,9 @@
public class XMLX509Certificate extends SignatureElementProxy
implements XMLX509DataContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(XMLX509Certificate.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(XMLX509Certificate.class.getName());
/** Field JCA_CERT_ID */
public static final String JCA_CERT_ID = "X.509";
1.8 +6 -6
xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509IssuerSerial.java
Index: XMLX509IssuerSerial.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509IssuerSerial.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- XMLX509IssuerSerial.java 11 Feb 2003 16:02:50 -0000 1.7
+++ XMLX509IssuerSerial.java 29 Apr 2003 21:36:54 -0000 1.8
@@ -79,10 +79,10 @@
public class XMLX509IssuerSerial extends SignatureElementProxy
implements XMLX509DataContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(XMLX509IssuerSerial.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ XMLX509IssuerSerial.class.getName());
/**
* Constructor XMLX509IssuerSerial
@@ -164,7 +164,7 @@
this.getTextFromChildElement(Constants._TAG_X509SERIALNUMBER,
Constants.SignatureSpecNS);
- cat.debug("In dem X509SerialNumber wurde gefunden: " + text);
+ log.debug("In dem X509SerialNumber wurde gefunden: " + text);
return new BigInteger(text);
}
1.7 +5 -5
xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509SKI.java
Index: XMLX509SKI.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509SKI.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- XMLX509SKI.java 11 Feb 2003 16:02:50 -0000 1.6
+++ XMLX509SKI.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -83,9 +83,9 @@
public class XMLX509SKI extends SignatureElementProxy
implements XMLX509DataContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(XMLX509SKI.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(XMLX509SKI.class.getName());
/**
* <CODE>SubjectKeyIdentifier (id-ce-subjectKeyIdentifier)
(2.5.29.14)</CODE>:
@@ -198,7 +198,7 @@
byte abyte0[] = new byte[derEncodedValue.length - 4];
System.arraycopy(derEncodedValue, 4, abyte0, 0, abyte0.length);
*/
- cat.debug("Base64 of SKI is " + Base64.encode(abyte0));
+ log.debug("Base64 of SKI is " + Base64.encode(abyte0));
return abyte0;
} catch (IOException ex) {
1.8 +4 -4
xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509SubjectName.java
Index: XMLX509SubjectName.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/content/x509/XMLX509SubjectName.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- XMLX509SubjectName.java 11 Feb 2003 16:02:50 -0000 1.7
+++ XMLX509SubjectName.java 29 Apr 2003 21:36:54 -0000 1.8
@@ -80,9 +80,9 @@
public class XMLX509SubjectName extends SignatureElementProxy
implements XMLX509DataContent {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(XMLX509SubjectName.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(XMLX509SubjectName.class.getName());
/**
* Constructor X509SubjectName
1.7 +5 -5
xml-security/src/org/apache/xml/security/keys/keyresolver/KeyResolver.java
Index: KeyResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/KeyResolver.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- KeyResolver.java 11 Feb 2003 16:02:50 -0000 1.6
+++ KeyResolver.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -81,9 +81,9 @@
*/
public class KeyResolver {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(KeyResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(KeyResolver.class.getName());
/** Field _alreadyInitialized */
static boolean _alreadyInitialized = false;
@@ -172,7 +172,7 @@
throw new KeyResolverException("utils.resolver.noClass", exArgs,
e);
}
- cat.debug("check resolvability by class " + currentClass);
+ log.debug("check resolvability by class " + currentClass);
if ((resolver != null)
&& resolver.canResolve(element, BaseURI, storage)) {
1.8 +5 -5
xml-security/src/org/apache/xml/security/keys/keyresolver/KeyResolverSpi.java
Index: KeyResolverSpi.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/KeyResolverSpi.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- KeyResolverSpi.java 11 Feb 2003 16:02:50 -0000 1.7
+++ KeyResolverSpi.java 29 Apr 2003 21:36:54 -0000 1.8
@@ -84,9 +84,9 @@
*/
public abstract class KeyResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(KeyResolverSpi.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(KeyResolverSpi.class.getName());
/**
* This method helps the [EMAIL PROTECTED] ResourceResolver} to decide
whether a
1.6 +7 -7
xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/RSAKeyValueResolver.java
Index: RSAKeyValueResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/RSAKeyValueResolver.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- RSAKeyValueResolver.java 11 Feb 2003 16:02:51 -0000 1.5
+++ RSAKeyValueResolver.java 29 Apr 2003 21:36:54 -0000 1.6
@@ -83,10 +83,10 @@
*/
public class RSAKeyValueResolver extends KeyResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(RSAKeyValueResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ RSAKeyValueResolver.class.getName());
/** Field _rsaKeyElement */
private Element _rsaKeyElement = null;
@@ -102,7 +102,7 @@
public boolean engineCanResolve(Element element, String BaseURI,
StorageResolver storage) {
- cat.debug("Can I resolve " + element.getTagName());
+ log.debug("Can I resolve " + element.getTagName());
if (element == null) {
return false;
@@ -164,7 +164,7 @@
return rsaKeyValue.getPublicKey();
} catch (XMLSecurityException ex) {
- cat.debug("XMLSecurityException", ex);
+ log.debug("XMLSecurityException", ex);
}
return null;
1.7 +24 -24
xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/RetrievalMethodResolver.java
Index: RetrievalMethodResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/RetrievalMethodResolver.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- RetrievalMethodResolver.java 11 Feb 2003 16:02:51 -0000 1.6
+++ RetrievalMethodResolver.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -97,10 +97,10 @@
*/
public class RetrievalMethodResolver extends KeyResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(RetrievalMethodResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ RetrievalMethodResolver.class.getName());
/**
* Method engineCanResolve
@@ -148,18 +148,18 @@
if (resRes != null) {
XMLSignatureInput resource = resRes.resolve(uri, BaseURI);
- cat.debug("Before applying Transforms, resource has "
+ log.debug("Before applying Transforms, resource has "
+ resource.getBytes().length + "bytes");
if (transforms != null) {
- cat.debug("We have Transforms");
+ log.debug("We have Transforms");
resource = transforms.performTransforms(resource);
}
- cat.debug("After applying Transforms, resource has "
+ log.debug("After applying Transforms, resource has "
+ resource.getBytes().length + "bytes");
- cat.debug("Resolved to resource " + resource.getSourceURI());
+ log.debug("Resolved to resource " + resource.getSourceURI());
byte inputBytes[] = resource.getBytes();
@@ -179,11 +179,11 @@
} else {
// otherwise, we parse the resource, create an Element and
delegate
- cat.debug("we have to parse " + inputBytes.length + " bytes");
+ log.debug("we have to parse " + inputBytes.length + " bytes");
Element e = this.getDocFromBytes(inputBytes);
- cat.debug("Now we have a {" + e.getNamespaceURI() + "}"
+ log.debug("Now we have a {" + e.getNamespaceURI() + "}"
+ e.getLocalName() + " Element");
if (e != null) {
@@ -198,11 +198,11 @@
}
}
} catch (XMLSecurityException ex) {
- cat.debug("XMLSecurityException", ex);
+ log.debug("XMLSecurityException", ex);
} catch (CertificateException ex) {
- cat.debug("CertificateException", ex);
+ log.debug("CertificateException", ex);
} catch (IOException ex) {
- cat.debug("IOException", ex);
+ log.debug("IOException", ex);
}
return null;
@@ -227,25 +227,25 @@
String type = rm.getType();
Transforms transforms = rm.getTransforms();
- cat.debug("Asked to resolve URI " + uri);
+ log.debug("Asked to resolve URI " + uri);
ResourceResolver resRes = ResourceResolver.getInstance(uri,
BaseURI);
if (resRes != null) {
XMLSignatureInput resource = resRes.resolve(uri, BaseURI);
- cat.debug("Before applying Transforms, resource has "
+ log.debug("Before applying Transforms, resource has "
+ resource.getBytes().length + "bytes");
if (transforms != null) {
- cat.debug("We have Transforms");
+ log.debug("We have Transforms");
resource = transforms.performTransforms(resource);
}
- cat.debug("After applying Transforms, resource has "
+ log.debug("After applying Transforms, resource has "
+ resource.getBytes().length + "bytes");
- cat.debug("Resolved to resource " + resource.getSourceURI());
+ log.debug("Resolved to resource " + resource.getSourceURI());
byte inputBytes[] = resource.getBytes();
@@ -266,11 +266,11 @@
} else {
// otherwise, we parse the resource, create an Element and
delegate
- cat.debug("we have to parse " + inputBytes.length + " bytes");
+ log.debug("we have to parse " + inputBytes.length + " bytes");
Element e = this.getDocFromBytes(inputBytes);
- cat.debug("Now we have a {" + e.getNamespaceURI() + "}"
+ log.debug("Now we have a {" + e.getNamespaceURI() + "}"
+ e.getLocalName() + " Element");
if (e != null) {
@@ -285,11 +285,11 @@
}
}
} catch (XMLSecurityException ex) {
- cat.debug("XMLSecurityException", ex);
+ log.debug("XMLSecurityException", ex);
} catch (CertificateException ex) {
- cat.debug("CertificateException", ex);
+ log.debug("CertificateException", ex);
} catch (IOException ex) {
- cat.debug("IOException", ex);
+ log.debug("IOException", ex);
}
return null;
1.6 +9 -10
xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509CertificateResolver.java
Index: X509CertificateResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509CertificateResolver.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- X509CertificateResolver.java 11 Feb 2003 16:02:51 -0000 1.5
+++ X509CertificateResolver.java 29 Apr 2003 21:36:54 -0000 1.6
@@ -87,10 +87,9 @@
*/
public class X509CertificateResolver extends KeyResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(X509CertificateResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(X509CertificateResolver.class.getName());
/** Field _dsaKeyElement */
NodeList _x509CertKeyElements = null;
@@ -106,13 +105,13 @@
public boolean engineCanResolve(Element element, String BaseURI,
StorageResolver storage) {
- cat.debug("Can I resolve " + element.getTagName() + "?");
+ log.debug("Can I resolve " + element.getTagName() + "?");
try {
XMLUtils.guaranteeThatElementInSignatureSpace(element,
Constants._TAG_X509DATA);
} catch (XMLSignatureException ex) {
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -125,13 +124,13 @@
if ((this._x509CertKeyElements != null)
&& (this._x509CertKeyElements.getLength() > 0)) {
- cat.debug("Yes Sir, I can");
+ log.debug("Yes Sir, I can");
return true;
}
} catch (TransformerException ex) {}
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -207,7 +206,7 @@
return null;
} catch (XMLSecurityException ex) {
- cat.debug("XMLSecurityException", ex);
+ log.debug("XMLSecurityException", ex);
throw new KeyResolverException("generic.EmptyMessage", ex);
}
1.6 +18 -18
xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509IssuerSerialResolver.java
Index: X509IssuerSerialResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509IssuerSerialResolver.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- X509IssuerSerialResolver.java 11 Feb 2003 16:02:51 -0000 1.5
+++ X509IssuerSerialResolver.java 29 Apr 2003 21:36:54 -0000 1.6
@@ -81,10 +81,10 @@
*/
public class X509IssuerSerialResolver extends KeyResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(X509IssuerSerialResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ X509IssuerSerialResolver.class.getName());
/**
* Method engineCanResolve
@@ -97,23 +97,23 @@
public boolean engineCanResolve(Element element, String BaseURI,
StorageResolver storage) {
- cat.debug("Can I resolve " + element.getTagName() + "?");
+ log.debug("Can I resolve " + element.getTagName() + "?");
X509Data x509data = null;
try {
x509data = new X509Data(element, BaseURI);
} catch (XMLSignatureException ex) {
- cat.debug("I can't");
+ log.debug("I can't");
return false;
} catch (XMLSecurityException ex) {
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
if (x509data == null) {
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -121,7 +121,7 @@
return true;
}
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -168,7 +168,7 @@
new KeyResolverException("KeyResolver.needStorageResolver",
exArgs);
- cat.info("", ex);
+ log.info("", ex);
throw ex;
}
@@ -179,33 +179,33 @@
X509Certificate cert = storage.next();
XMLX509IssuerSerial certSerial = new
XMLX509IssuerSerial(element.getOwnerDocument(), cert);
- cat.debug("Found Certificate Issuer: "
+ log.debug("Found Certificate Issuer: "
+ certSerial.getIssuerName());
- cat.debug("Found Certificate Serial: "
+ log.debug("Found Certificate Serial: "
+ certSerial.getSerialNumber().toString());
for (int i=0; i<noOfISS; i++) {
XMLX509IssuerSerial xmliss = x509data.itemIssuerSerial(i);
- cat.debug("Found Element Issuer: "
+ log.debug("Found Element Issuer: "
+ xmliss.getIssuerName());
- cat.debug("Found Element Serial: "
+ log.debug("Found Element Serial: "
+ xmliss.getSerialNumber().toString());
if (certSerial.equals(xmliss)) {
- cat.debug("match !!! ");
+ log.debug("match !!! ");
return cert;
} else {
- cat.debug("no match...");
+ log.debug("no match...");
}
}
}
return null;
} catch (XMLSecurityException ex) {
- cat.debug("XMLSecurityException", ex);
+ log.debug("XMLSecurityException", ex);
throw new KeyResolverException("generic.EmptyMessage", ex);
}
1.6 +10 -10
xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509SKIResolver.java
Index: X509SKIResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509SKIResolver.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- X509SKIResolver.java 11 Feb 2003 16:02:51 -0000 1.5
+++ X509SKIResolver.java 29 Apr 2003 21:36:54 -0000 1.6
@@ -86,9 +86,9 @@
*/
public class X509SKIResolver extends KeyResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(X509SKIResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(X509SKIResolver.class.getName());
/** Field _x509childNodes */
private NodeList _x509childNodes = null;
@@ -110,13 +110,13 @@
public boolean engineCanResolve(Element element, String BaseURI,
StorageResolver storage) {
- cat.debug("Can I resolve " + element.getTagName() + "?");
+ log.debug("Can I resolve " + element.getTagName() + "?");
try {
XMLUtils.guaranteeThatElementInSignatureSpace(element,
Constants._TAG_X509DATA);
} catch (XMLSignatureException ex) {
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -129,13 +129,13 @@
if ((this._x509childNodes != null)
&& (this._x509childNodes.getLength() > 0)) {
- cat.debug("Yes Sir, I can");
+ log.debug("Yes Sir, I can");
return true;
}
} catch (TransformerException ex) {}
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -192,7 +192,7 @@
new KeyResolverException("KeyResolver.needStorageResolver",
exArgs);
- cat.info("", ex);
+ log.info("", ex);
throw ex;
}
@@ -211,7 +211,7 @@
for (int i = 0; i < this._x509childObject.length; i++) {
if (certSKI.equals(this._x509childObject[i])) {
- cat.debug("Return PublicKey from "
+ log.debug("Return PublicKey from "
+ cert.getSubjectDN().getName());
return cert;
1.7 +15 -15
xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509SubjectNameResolver.java
Index: X509SubjectNameResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/keyresolver/implementations/X509SubjectNameResolver.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- X509SubjectNameResolver.java 11 Feb 2003 16:02:51 -0000 1.6
+++ X509SubjectNameResolver.java 29 Apr 2003 21:36:54 -0000 1.7
@@ -84,10 +84,10 @@
*/
public class X509SubjectNameResolver extends KeyResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(X509SubjectNameResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ X509SubjectNameResolver.class.getName());
/** Field _x509childNodes */
private NodeList _x509childNodes = null;
@@ -109,13 +109,13 @@
public boolean engineCanResolve(Element element, String BaseURI,
StorageResolver storage) {
- cat.debug("Can I resolve " + element.getTagName() + "?");
+ log.debug("Can I resolve " + element.getTagName() + "?");
try {
XMLUtils.guaranteeThatElementInSignatureSpace(element,
Constants._TAG_X509DATA);
} catch (XMLSignatureException ex) {
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -130,13 +130,13 @@
if ((this._x509childNodes != null)
&& (this._x509childNodes.getLength() > 0)) {
- cat.debug("Yes Sir, I can");
+ log.debug("Yes Sir, I can");
return true;
}
} catch (TransformerException ex) {}
- cat.debug("I can't");
+ log.debug("I can't");
return false;
}
@@ -193,7 +193,7 @@
new KeyResolverException("KeyResolver.needStorageResolver",
exArgs);
- cat.info("", ex);
+ log.info("", ex);
throw ex;
}
@@ -212,25 +212,25 @@
XMLX509SubjectName certSN =
new XMLX509SubjectName(element.getOwnerDocument(), cert);
- cat.debug("Found Certificate SN: " + certSN.getSubjectName());
+ log.debug("Found Certificate SN: " + certSN.getSubjectName());
for (int i = 0; i < this._x509childObject.length; i++) {
- cat.debug("Found Element SN: "
+ log.debug("Found Element SN: "
+ this._x509childObject[i].getSubjectName());
if (certSN.equals(this._x509childObject[i])) {
- cat.debug("match !!! ");
+ log.debug("match !!! ");
return cert;
} else {
- cat.debug("no match...");
+ log.debug("no match...");
}
}
}
return null;
} catch (XMLSecurityException ex) {
- cat.debug("XMLSecurityException", ex);
+ log.debug("XMLSecurityException", ex);
throw new KeyResolverException("generic.EmptyMessage", ex);
}
1.6 +7 -7
xml-security/src/org/apache/xml/security/keys/storage/StorageResolver.java
Index: StorageResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/storage/StorageResolver.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- StorageResolver.java 11 Feb 2003 16:02:51 -0000 1.5
+++ StorageResolver.java 29 Apr 2003 21:36:55 -0000 1.6
@@ -77,9 +77,9 @@
*/
public class StorageResolver {
- /** Field cat */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(StorageResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(StorageResolver.class.getName());
/** Field _storageResolvers */
Vector _storageResolvers = new Vector();
@@ -133,7 +133,7 @@
try {
this.add(new KeyStoreResolver(keyStore));
} catch (StorageResolverException ex) {
- cat.error("Could not add KeyStore because of: ", ex);
+ log.error("Could not add KeyStore because of: ", ex);
}
}
1.5 +13 -13
xml-security/src/org/apache/xml/security/keys/storage/implementations/CertsInFilesystemDirectoryResolver.java
Index: CertsInFilesystemDirectoryResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/keys/storage/implementations/CertsInFilesystemDirectoryResolver.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- CertsInFilesystemDirectoryResolver.java 11 Feb 2003 16:02:51 -0000
1.4
+++ CertsInFilesystemDirectoryResolver.java 29 Apr 2003 21:36:55 -0000
1.5
@@ -87,10 +87,10 @@
*/
public class CertsInFilesystemDirectoryResolver extends StorageResolverSpi {
- /** Field cat */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(CertsInFilesystemDirectoryResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ CertsInFilesystemDirectoryResolver.class.getName());
/** Field _merlinsCertificatesDir */
String _merlinsCertificatesDir = null;
@@ -169,19 +169,19 @@
dn = cert.getSubjectDN().getName();
added = true;
} catch (FileNotFoundException ex) {
- cat.debug("Could not add certificate from file " + filename, ex);
+ log.debug("Could not add certificate from file " + filename, ex);
} catch (IOException ex) {
- cat.debug("Could not add certificate from file " + filename, ex);
+ log.debug("Could not add certificate from file " + filename, ex);
} catch (CertificateNotYetValidException ex) {
- cat.debug("Could not add certificate from file " + filename, ex);
+ log.debug("Could not add certificate from file " + filename, ex);
} catch (CertificateExpiredException ex) {
- cat.debug("Could not add certificate from file " + filename, ex);
+ log.debug("Could not add certificate from file " + filename, ex);
} catch (CertificateException ex) {
- cat.debug("Could not add certificate from file " + filename, ex);
+ log.debug("Could not add certificate from file " + filename, ex);
}
if (added) {
- cat.debug("Added certificate: " + dn);
+ log.debug("Added certificate: " + dn);
}
}
}
1.31 +1 -1
xml-security/src/org/apache/xml/security/resource/config.xml
Index: config.xml
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/resource/config.xml,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -r1.30 -r1.31
--- config.xml 28 Sep 2002 08:49:51 -0000 1.30
+++ config.xml 29 Apr 2003 21:36:55 -0000 1.31
@@ -515,7 +515,7 @@
-->
<root>
<priority value ="debug" />
- <!-- <appender-ref ref="LOGTXT" /> -->
+ <!-- appender-ref ref="LOGTXT" /-->
<appender-ref ref="NULL" />
<!-- <appender-ref ref="chainsaw" /> -->
</root>
1.25 +9 -9
xml-security/src/org/apache/xml/security/signature/Manifest.java
Index: Manifest.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/signature/Manifest.java,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -r1.24 -r1.25
--- Manifest.java 11 Feb 2003 16:02:51 -0000 1.24
+++ Manifest.java 29 Apr 2003 21:36:55 -0000 1.25
@@ -94,9 +94,9 @@
*/
public class Manifest extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(Manifest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(Manifest.class.getName());
/** Field _references */
Vector _references;
@@ -327,11 +327,11 @@
public boolean verifyReferences(boolean followManifests)
throws MissingResourceFailureException, XMLSecurityException {
- cat.debug(
+ log.debug(
"verify "
+ this.length(Constants.SignatureSpecNS, Constants._TAG_REFERENCE)
+ " References");
- cat.debug("I am " + (followManifests
+ log.debug("I am " + (followManifests
? ""
: "not") + " requested to follow nested
Manifests");
@@ -366,12 +366,12 @@
verify = false;
}
- cat.debug("The Reference has Type " + currentRef.getType());
+ log.debug("The Reference has Type " + currentRef.getType());
// was verification successful till now and do we want to verify
the Manifest?
if (verify && followManifests
&& currentRef.typeIsReferenceToManifest()) {
- cat.debug("We have to follow a nested Manifest");
+ log.debug("We have to follow a nested Manifest");
try {
currentRef.dereferenceURIandPerformTransforms();
@@ -421,9 +421,9 @@
if (!referencedManifestValid) {
verify = false;
- cat.warn("The nested Manifest was invalid (bad)");
+ log.warn("The nested Manifest was invalid (bad)");
} else {
- cat.debug("The nested Manifest was valid (good)");
+ log.debug("The nested Manifest was valid (good)");
}
} catch (IOException ex) {
throw new ReferenceNotInitializedException("empty", ex);
1.11 +3 -3
xml-security/src/org/apache/xml/security/signature/ObjectContainer.java
Index: ObjectContainer.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/signature/ObjectContainer.java,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -r1.10 -r1.11
--- ObjectContainer.java 11 Feb 2003 16:02:51 -0000 1.10
+++ ObjectContainer.java 29 Apr 2003 21:36:55 -0000 1.11
@@ -79,9 +79,9 @@
*/
public class ObjectContainer extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(ObjectContainer.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(ObjectContainer.class.getName());
/**
* Constructs [EMAIL PROTECTED] ObjectContainer}
1.30 +7 -7
xml-security/src/org/apache/xml/security/signature/Reference.java
Index: Reference.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/signature/Reference.java,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -r1.29 -r1.30
--- Reference.java 11 Feb 2003 16:02:51 -0000 1.29
+++ Reference.java 29 Apr 2003 21:36:55 -0000 1.30
@@ -140,9 +140,9 @@
/** Field CacheSignedNodes */
public static boolean CacheSignedNodes = false;
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(Reference.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(Reference.class.getName());
/** Field OBJECT_URI */
public static final String OBJECT_URI = Constants.SignatureSpecNS
@@ -793,9 +793,9 @@
//J-
if (data.length < 20) {
- cat.debug(new String(data));
+ log.debug(new String(data));
} else {
- cat.debug(new String(data).substring(0, 20) + " ...");
+ log.debug(new String(data).substring(0, 20) + " ...");
}
//J+
return calculatedDigestValue;
@@ -833,9 +833,9 @@
boolean equal = MessageDigestAlgorithm.isEqual(elemDig, calcDig);
if (!equal) {
- cat.warn("Verification failed for URI \"" + this.getURI() + "\"");
+ log.warn("Verification failed for URI \"" + this.getURI() + "\"");
} else {
- cat.info("Verification successful for URI \"" + this.getURI() +
"\"");
+ log.info("Verification successful for URI \"" + this.getURI() +
"\"");
}
return equal;
1.9 +3 -4
xml-security/src/org/apache/xml/security/signature/SignatureProperties.java
Index: SignatureProperties.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/signature/SignatureProperties.java,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -r1.8 -r1.9
--- SignatureProperties.java 11 Feb 2003 16:02:51 -0000 1.8
+++ SignatureProperties.java 29 Apr 2003 21:36:55 -0000 1.9
@@ -84,10 +84,9 @@
*/
public class SignatureProperties extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(SignatureProperties.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(SignatureProperties.class.getName());
/**
* Constructor SignatureProperties
1.10 +4 -6
xml-security/src/org/apache/xml/security/signature/SignatureProperty.java
Index: SignatureProperty.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/signature/SignatureProperty.java,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -r1.9 -r1.10
--- SignatureProperty.java 11 Feb 2003 16:02:51 -0000 1.9
+++ SignatureProperty.java 29 Apr 2003 21:36:55 -0000 1.10
@@ -58,8 +58,6 @@
*/
package org.apache.xml.security.signature;
-
-
import org.apache.xml.security.exceptions.XMLSecurityException;
import org.apache.xml.security.utils.Constants;
import org.apache.xml.security.utils.IdResolver;
@@ -68,7 +66,6 @@
import org.w3c.dom.Element;
import org.w3c.dom.Node;
-
/**
* Handles <code><ds:SignatureProperty></code> elements
* Addittional information item concerning the generation of the
signature(s) can
@@ -78,9 +75,10 @@
*/
public class SignatureProperty extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(SignatureProperty.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ SignatureProperty.class.getName());
/**
* [EMAIL PROTECTED] SignatureProperty} using specified
<code>Target</code> attribute
1.18 +1 -1
xml-security/src/org/apache/xml/security/signature/SignedInfo.java
Index: SignedInfo.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/signature/SignedInfo.java,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -r1.17 -r1.18
--- SignedInfo.java 11 Feb 2003 16:02:51 -0000 1.17
+++ SignedInfo.java 29 Apr 2003 21:36:55 -0000 1.18
@@ -344,7 +344,7 @@
for (int i = 0; i < children.getLength(); i++) {
Node n = children.item(i);
- cat.debug("Looking for SignatureMethodURI in " + n);
+ log.debug("Looking for SignatureMethodURI in " + n);
if (n.getNodeType() == Node.ELEMENT_NODE) {
boolean found = true;
1.35 +10 -9
xml-security/src/org/apache/xml/security/signature/XMLSignature.java
Index: XMLSignature.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/signature/XMLSignature.java,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -r1.34 -r1.35
--- XMLSignature.java 11 Feb 2003 16:02:51 -0000 1.34
+++ XMLSignature.java 29 Apr 2003 21:36:55 -0000 1.35
@@ -117,9 +117,10 @@
*/
public final class XMLSignature extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(XMLSignature.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(XMLSignature.class.getName());
+
//J-
/** MAC - Required HMAC-SHA1 */
public static final String ALGO_ID_MAC_HMAC_SHA1 =
Constants.SignatureSpecNS + "hmac-sha1";
@@ -654,10 +655,10 @@
new SignatureAlgorithm(this.getSignedInfo()
.getSignatureMethodElement(), this.getBaseURI());
- cat.debug("SignatureMethodURI = " + sa.getAlgorithmURI());
- cat.debug("jceSigAlgorithm = " + sa.getJCEAlgorithmString());
- cat.debug("jceSigProvider = " + sa.getJCEProviderName());
- cat.debug("PublicKey = " + pk);
+ log.debug("SignatureMethodURI = " + sa.getAlgorithmURI());
+ log.debug("jceSigAlgorithm = " + sa.getJCEAlgorithmString());
+ log.debug("jceSigProvider = " + sa.getJCEProviderName());
+ log.debug("PublicKey = " + pk);
sa.initVerify(pk);
// Get the canonicalized (normalized) SignedInfo
@@ -669,7 +670,7 @@
//retrieve the byte[] from the stored signature
byte sigBytes[] = this.getSignatureValue();
- cat.debug("SignatureValue = "
+ log.debug("SignatureValue = "
+ HexDump.byteArrayToHexString(sigBytes));
//Have SignatureAlgorithm sign the input bytes and compare them to
the
1.12 +5 -5
xml-security/src/org/apache/xml/security/transforms/Transform.java
Index: Transform.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/transforms/Transform.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- Transform.java 11 Feb 2003 16:02:52 -0000 1.11
+++ Transform.java 29 Apr 2003 21:36:55 -0000 1.12
@@ -97,9 +97,9 @@
*/
public final class Transform extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(Transform.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(Transform.class.getName());
/** Field _alreadyInitialized */
static boolean _alreadyInitialized = false;
@@ -130,9 +130,9 @@
String implementingClass =
Transform.getImplementingClass(algorithmURI);
- cat.debug("Create URI \"" + algorithmURI + "\" class \""
+ log.debug("Create URI \"" + algorithmURI + "\" class \""
+ implementingClass + "\"");
- cat.debug("The NodeList is " + contextNodes);
+ log.debug("The NodeList is " + contextNodes);
// create the custom Transform object
this.transformSpi =
1.4 +3 -3
xml-security/src/org/apache/xml/security/transforms/TransformSpi.java
Index: TransformSpi.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/transforms/TransformSpi.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- TransformSpi.java 11 Feb 2003 16:02:52 -0000 1.3
+++ TransformSpi.java 29 Apr 2003 21:36:55 -0000 1.4
@@ -79,9 +79,9 @@
*/
public abstract class TransformSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(TransformSpi.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(TransformSpi.class.getName());
protected Transform _transformObject = null;
protected void setTransform(Transform transform) {
1.12 +7 -7
xml-security/src/org/apache/xml/security/transforms/Transforms.java
Index: Transforms.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/transforms/Transforms.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- Transforms.java 11 Feb 2003 16:02:52 -0000 1.11
+++ Transforms.java 29 Apr 2003 21:36:55 -0000 1.12
@@ -91,9 +91,9 @@
*/
public class Transforms extends SignatureElementProxy {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(Transforms.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(Transforms.class.getName());
//J-
/** Canonicalization - Required Canonical XML (omits comments) */
public static final String TRANSFORM_C14N_OMIT_COMMENTS =
Canonicalizer.ALGO_ID_C14N_OMIT_COMMENTS;
@@ -171,7 +171,7 @@
throws TransformationException {
try {
- cat.debug("Transforms.addTransform(" + transformURI + ")");
+ log.debug("Transforms.addTransform(" + transformURI + ")");
Transform transform = Transform.getInstance(this._doc,
transformURI);
@@ -193,7 +193,7 @@
throws TransformationException {
try {
- cat.debug("Transforms.addTransform(" + transformURI + ")");
+ log.debug("Transforms.addTransform(" + transformURI + ")");
Transform transform = Transform.getInstance(this._doc, transformURI,
contextElement);
@@ -232,7 +232,7 @@
*/
private void addTransform(Transform transform) {
- cat.debug("Transforms.addTransform(" + transform.getURI() + ")");
+ log.debug("Transforms.addTransform(" + transform.getURI() + ")");
Element transformElement = transform.getElement();
@@ -254,7 +254,7 @@
for (int i = 0; i < this.getLength(); i++) {
Transform t = this.item(i);
- cat.debug("Preform the (" + i + ")th " + t.getURI() + "
transform");
+ log.debug("Preform the (" + i + ")th " + t.getURI() + "
transform");
xmlSignatureInput = t.performTransform(xmlSignatureInput);
}
1.12 +5 -4
xml-security/src/org/apache/xml/security/transforms/implementations/TransformXPath.java
Index: TransformXPath.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/transforms/implementations/TransformXPath.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- TransformXPath.java 11 Feb 2003 16:02:52 -0000 1.11
+++ TransformXPath.java 29 Apr 2003 21:36:56 -0000 1.12
@@ -98,8 +98,9 @@
*/
public class TransformXPath extends TransformSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
org.apache.log4j.Category.getInstance(TransformXPath.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(TransformXPath.class.getName());
/** Field implementedTransformURI */
public static final String implementedTransformURI =
@@ -204,9 +205,9 @@
if (includeInResult.bool()) {
resultNodes.add(currentNode);
- // cat.debug(" Added " +
org.apache.xml.security.c14n.implementations.Canonicalizer20010315.getXPath(currentNode));
+ // log.debug(" Added " +
org.apache.xml.security.c14n.implementations.Canonicalizer20010315.getXPath(currentNode));
} else {
- // cat.debug("Not added " +
org.apache.xml.security.c14n.implementations.Canonicalizer20010315.getXPath(currentNode));
+ // log.debug("Not added " +
org.apache.xml.security.c14n.implementations.Canonicalizer20010315.getXPath(currentNode));
}
}
1.8 +8 -6
xml-security/src/org/apache/xml/security/transforms/implementations/TransformXPath2Filter.java
Index: TransformXPath2Filter.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/transforms/implementations/TransformXPath2Filter.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- TransformXPath2Filter.java 11 Feb 2003 16:02:52 -0000 1.7
+++ TransformXPath2Filter.java 29 Apr 2003 21:36:56 -0000 1.8
@@ -100,8 +100,10 @@
*/
public class TransformXPath2Filter extends TransformSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- // static org.apache.log4j.Category cat =
org.apache.log4j.Category.getInstance(TransformXPath2Filter.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+// static org.apache.commons.logging.Log log =
+// org.apache.commons.logging.LogFactory.getLog(
+// TransformXPath2Filter.class.getName());
/** Field implementedTransformURI */
public static final String implementedTransformURI =
@@ -288,7 +290,7 @@
/*
if (currentNode.getNodeType() == Node.ELEMENT_NODE) {
- cat.debug(i + " " + ((Element) currentNode).getTagName()
+ log.debug(i + " " + ((Element) currentNode).getTagName()
+ " is " + type + " of " + rootNode.getNodeName());
}
*/
@@ -314,7 +316,7 @@
/*
if (currentNode.getNodeType() == Node.ELEMENT_NODE) {
- cat.debug("The intersect operation from step " + I
+ log.debug("The intersect operation from step " + I
+ " does not include " + currentNode.getNodeName());
}
*/
@@ -325,7 +327,7 @@
/*
if (currentNode.getNodeType() == Node.ELEMENT_NODE) {
- cat.debug("The subtract operation from step " + I
+ log.debug("The subtract operation from step " + I
+ " does subtract " + currentNode.getNodeName());
}
*/
1.4 +8 -8
xml-security/src/org/apache/xml/security/transforms/implementations/TransformXPath2Filter04.java
Index: TransformXPath2Filter04.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/transforms/implementations/TransformXPath2Filter04.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- TransformXPath2Filter04.java 11 Feb 2003 16:02:52 -0000 1.3
+++ TransformXPath2Filter04.java 29 Apr 2003 21:36:56 -0000 1.4
@@ -97,10 +97,10 @@
*/
public class TransformXPath2Filter04 extends TransformSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(TransformXPath2Filter04.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ TransformXPath2Filter04.class.getName());
/** Field implementedTransformURI */
public static final String implementedTransformURI =
@@ -135,7 +135,7 @@
try {
Set inputSet = input.getNodeSet();
- cat.debug("perform xfilter2 on " + inputSet.size() + " nodes");
+ log.debug("perform xfilter2 on " + inputSet.size() + " nodes");
CachedXPathFuncHereAPI xPathFuncHereAPI =
new CachedXPathFuncHereAPI(input.getCachedXPathAPI());
@@ -177,7 +177,7 @@
xpathContainer.getXPathFilterTextNode(),
xpathContainer.getElement());
- cat.debug("subtreeRoots contains " + subtreeRoots.getLength()
+ log.debug("subtreeRoots contains " + subtreeRoots.getLength()
+ " nodes");
/*
@@ -211,7 +211,7 @@
}
}
- cat.debug("selection process identified " + selectedNodes.size()
+ log.debug("selection process identified " + selectedNodes.size()
+ " nodes");
Set resultNodes = new HashSet();
1.10 +5 -5
xml-security/src/org/apache/xml/security/utils/Base64.java
Index: Base64.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/Base64.java,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -r1.9 -r1.10
--- Base64.java 11 Feb 2003 16:02:53 -0000 1.9
+++ Base64.java 29 Apr 2003 21:36:56 -0000 1.10
@@ -90,9 +90,9 @@
*/
public class Base64 {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(Base64.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(Base64.class.getName());
/** Field LINE_SEPARATOR */
public static final String LINE_SEPARATOR = "\n";
@@ -352,9 +352,9 @@
try {
if (base64.length() < 30) {
- cat.debug("I was asked to decode \"" + base64 + "\"");
+ log.debug("I was asked to decode \"" + base64 + "\"");
} else {
- cat.debug("I was asked to decode \"" + base64.substring(0, 20)
+ log.debug("I was asked to decode \"" + base64.substring(0, 20)
+ "...\"");
}
1.12 +4 -4
xml-security/src/org/apache/xml/security/utils/Constants.java
Index: Constants.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/Constants.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- Constants.java 11 Feb 2003 16:02:53 -0000 1.11
+++ Constants.java 29 Apr 2003 21:36:56 -0000 1.12
@@ -74,9 +74,9 @@
*/
public class Constants {
- /** Log4j logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(Constants.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(Constants.class.getName());
/** Field configurationFile */
public static String configurationFile = "data/websig.conf";
1.23 +6 -6
xml-security/src/org/apache/xml/security/utils/ElementProxy.java
Index: ElementProxy.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/ElementProxy.java,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -r1.22 -r1.23
--- ElementProxy.java 11 Feb 2003 16:02:53 -0000 1.22
+++ ElementProxy.java 29 Apr 2003 21:36:56 -0000 1.23
@@ -84,9 +84,9 @@
*/
public abstract class ElementProxy {
- /** Field cat */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(ElementProxy.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(ElementProxy.class.getName());
//J-
public static final int MODE_CREATE = 0;
public static final int MODE_PROCESS = 1;
@@ -206,7 +206,7 @@
throw new XMLSecurityException("ElementProxy.nullElement");
}
- cat.debug("setElement(" + element.getTagName() + ", \"" + BaseURI +
"\"");
+ log.debug("setElement(" + element.getTagName() + ", \"" + BaseURI +
"\"");
this._doc = element.getOwnerDocument();
this._state = ElementProxy.MODE_PROCESS;
@@ -230,7 +230,7 @@
throw new XMLSecurityException("ElementProxy.nullElement");
}
- cat.debug("setElement(\"" + element.getTagName() + "\", \"" + BaseURI
+ log.debug("setElement(\"" + element.getTagName() + "\", \"" + BaseURI
+ "\")");
this._doc = element.getOwnerDocument();
1.6 +4 -4
xml-security/src/org/apache/xml/security/utils/HelperNodeList.java
Index: HelperNodeList.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/HelperNodeList.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- HelperNodeList.java 11 Feb 2003 16:02:53 -0000 1.5
+++ HelperNodeList.java 29 Apr 2003 21:36:56 -0000 1.6
@@ -76,9 +76,9 @@
*/
public class HelperNodeList implements NodeList {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(HelperNodeList.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(HelperNodeList.class.getName());
/** Field nodes */
ArrayList nodes = new ArrayList(20);
@@ -101,7 +101,7 @@
*/
public Node item(int index) {
- // cat.debug("item(" + index + ") of " + this.getLength() + " nodes");
+ // log.debug("item(" + index + ") of " + this.getLength() + " nodes");
return (Node) nodes.get(index);
}
1.12 +22 -22
xml-security/src/org/apache/xml/security/utils/IdResolver.java
Index: IdResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/IdResolver.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- IdResolver.java 11 Feb 2003 16:02:53 -0000 1.11
+++ IdResolver.java 29 Apr 2003 21:36:56 -0000 1.12
@@ -85,9 +85,9 @@
*/
public class IdResolver {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(IdResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(IdResolver.class.getName());
/**
* Constructor IdResolver
@@ -136,7 +136,7 @@
result = IdResolver.getElementByIdType(doc, id);
if (result != null) {
- cat.debug(
+ log.debug(
"I could find an Element using the simple getElementById method:
"
+ result.getTagName());
@@ -146,7 +146,7 @@
result = IdResolver.getElementByIdInDSNamespace(doc, id);
if (result != null) {
- cat.debug(
+ log.debug(
"I could find an Element using the advanced ds:Namespace
searcher method: "
+ result.getTagName());
@@ -159,7 +159,7 @@
result = IdResolver.getElementByIdInXENCNamespace(doc, id);
if (result != null) {
- cat.debug(
+ log.debug(
"I could find an Element using the advanced xenc:Namespace
searcher method: "
+ result.getTagName());
@@ -172,7 +172,7 @@
result = IdResolver.getElementByIdInSOAPSignatureNamespace(doc, id);
if (result != null) {
- cat.debug(
+ log.debug(
"I could find an Element using the advanced SOAP-SEC:id searcher
method: "
+ result.getTagName());
@@ -185,7 +185,7 @@
result = IdResolver.getElementByIdInXKMSNamespace(doc, id);
if (result != null) {
- cat.debug("I could find an Element using the XKMS searcher method: "
+ log.debug("I could find an Element using the XKMS searcher method: "
+ result.getTagName());
// register the ID to speed up further queries on that ID
@@ -197,7 +197,7 @@
result = IdResolver.getElementByIdUnsafeMatchByIdName(doc, id);
if (result != null) {
- cat.warn(
+ log.warn(
"I could find an Element using the totally stupid and insecure
Id/ID/id searcher method: "
+ result.getTagName());
@@ -217,7 +217,7 @@
*/
private static Element getElementByIdType(Document doc, String id) {
- cat.debug("getElementByIdType() Search for ID " + id);
+ log.debug("getElementByIdType() Search for ID " + id);
return doc.getElementById(id);
}
@@ -231,7 +231,7 @@
*/
private static Element getElementByIdInDSNamespace(Document doc, String
id) {
- cat.debug("getElementByIdInDSNamespace() Search for ID " + id);
+ log.debug("getElementByIdInDSNamespace() Search for ID " + id);
try {
Element nscontext = XMLUtils.createDSctx(doc, "ds",
@@ -245,7 +245,7 @@
NodeList dsElements = XPathAPI.selectNodeList(doc, "//ds:*",
nscontext);
- cat.debug("Found ds:Elements: " + dsElements.getLength());
+ log.debug("Found ds:Elements: " + dsElements.getLength());
for (int i = 0; i < dsElements.getLength(); i++) {
Element currentElem = (Element) dsElements.item(i);
@@ -259,7 +259,7 @@
}
*/
} catch (TransformerException ex) {
- cat.fatal("empty", ex);
+ log.fatal("empty", ex);
}
return null;
@@ -275,7 +275,7 @@
private static Element getElementByIdInXENCNamespace(Document doc,
String id) {
- cat.debug("getElementByIdInXENCNamespace() Search for ID " + id);
+ log.debug("getElementByIdInXENCNamespace() Search for ID " + id);
try {
Element nscontext =
@@ -287,7 +287,7 @@
return element;
} catch (TransformerException ex) {
- cat.fatal("empty", ex);
+ log.fatal("empty", ex);
}
return null;
@@ -303,7 +303,7 @@
private static Element getElementByIdInSOAPSignatureNamespace(Document
doc,
String id) {
- cat.debug("getElementByIdInSOAPSignatureNamespace() Search for ID " +
id);
+ log.debug("getElementByIdInSOAPSignatureNamespace() Search for ID " +
id);
try {
Element nscontext = XMLUtils.createDSctx(
@@ -314,7 +314,7 @@
return element;
} catch (TransformerException ex) {
- cat.fatal("empty", ex);
+ log.fatal("empty", ex);
}
return null;
@@ -339,7 +339,7 @@
<attribute name="RequestID" type="ID" use="optional"/>
<attribute name="ResponseID" type="ID" use="required"/>
*/
- cat.debug("getElementByIdInXKMSNamespace() Search for ID " + id);
+ log.debug("getElementByIdInXKMSNamespace() Search for ID " + id);
try {
Element nscontext =
@@ -361,7 +361,7 @@
return null;
} catch (TransformerException ex) {
- cat.fatal("empty", ex);
+ log.fatal("empty", ex);
}
return null;
@@ -377,7 +377,7 @@
private static Element getElementByIdUnsafeMatchByIdName(Document doc,
String id) {
- cat.debug("getElementByIdUnsafeMatchByIdName() Search for ID " + id);
+ log.debug("getElementByIdUnsafeMatchByIdName() Search for ID " + id);
try {
Element element_Id = (Element) XPathAPI.selectSingleNode(doc,
@@ -401,7 +401,7 @@
return element_id;
}
} catch (TransformerException ex) {
- cat.fatal("empty", ex);
+ log.fatal("empty", ex);
}
return null;
1.4 +6 -7
xml-security/src/org/apache/xml/security/utils/IgnoreAllErrorHandler.java
Index: IgnoreAllErrorHandler.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/IgnoreAllErrorHandler.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- IgnoreAllErrorHandler.java 29 Jan 2002 08:32:36 -0000 1.3
+++ IgnoreAllErrorHandler.java 29 Apr 2003 21:36:56 -0000 1.4
@@ -73,10 +73,9 @@
*/
public class IgnoreAllErrorHandler implements ErrorHandler {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(IgnoreAllErrorHandler.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(IgnoreAllErrorHandler.class.getName());
/** Field throwExceptions */
static final boolean warnOnExceptions = true;
@@ -87,7 +86,7 @@
//J-
public void warning (SAXParseException ex) throws SAXException {
if (IgnoreAllErrorHandler.warnOnExceptions) {
- cat.warn("", ex);
+ log.warn("", ex);
}
if (IgnoreAllErrorHandler.throwExceptions) {
throw ex;
@@ -95,7 +94,7 @@
}
public void error (SAXParseException ex) throws SAXException {
if (IgnoreAllErrorHandler.warnOnExceptions) {
- cat.error("", ex);
+ log.error("", ex);
}
if (IgnoreAllErrorHandler.throwExceptions) {
throw ex;
@@ -103,7 +102,7 @@
}
public void fatalError (SAXParseException ex) throws SAXException {
if (IgnoreAllErrorHandler.warnOnExceptions) {
- cat.warn("", ex);
+ log.warn("", ex);
}
if (IgnoreAllErrorHandler.throwExceptions) {
throw ex;
1.7 +9 -9
xml-security/src/org/apache/xml/security/utils/JavaUtils.java
Index: JavaUtils.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/JavaUtils.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- JavaUtils.java 11 Feb 2003 16:02:53 -0000 1.6
+++ JavaUtils.java 29 Apr 2003 21:36:56 -0000 1.7
@@ -77,9 +77,9 @@
*/
public class JavaUtils {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(JavaUtils.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(JavaUtils.class.getName());
private JavaUtils() {
// we don't allow instantiation
@@ -267,7 +267,7 @@
fos.write(bytes);
fos.close();
} else {
- cat.debug("writeBytesToFilename got null byte[] pointed");
+ log.debug("writeBytesToFilename got null byte[] pointed");
}
} catch (Exception ex) {}
}
@@ -306,7 +306,7 @@
*/
public static void runGC() {
- cat.debug("<METHOD name=runGC()>");
+ log.debug("<METHOD name=runGC()>");
Runtime runtime = Runtime.getRuntime();
long lFreeMemBefore = runtime.freeMemory();
@@ -321,17 +321,17 @@
long lFreeMemAfter = runtime.freeMemory();
long lTotalMemAfter = runtime.totalMemory();
- cat.debug("* Garbage collection took " + time + " seconds.");
- cat.debug("* Memory before gc()... free:" + lFreeMemBefore + "= "
+ log.debug("* Garbage collection took " + time + " seconds.");
+ log.debug("* Memory before gc()... free:" + lFreeMemBefore + "= "
+ lFreeMemBefore / 1024 + "KB,...total:" + lTotalMemBefore
+ "= " + lTotalMemBefore / 1024 + "KB,... used:"
+ (lTotalMemBefore - lFreeMemBefore) + "= "
+ (lTotalMemBefore - lFreeMemBefore) / 1024 + "KB");
- cat.debug("* Memory after: gc()... free:" + lFreeMemAfter + "= "
+ log.debug("* Memory after: gc()... free:" + lFreeMemAfter + "= "
+ lFreeMemAfter / 1024 + "KB,...total:" + lTotalMemAfter +
"= "
+ lTotalMemAfter / 1024 + "KB,... used:"
+ (lTotalMemAfter - lFreeMemAfter) + "= "
+ (lTotalMemAfter - lFreeMemAfter) / 1024 + "KB");
- cat.debug("</METHOD>");
+ log.debug("</METHOD>");
}
}
1.5 +6 -5
xml-security/src/org/apache/xml/security/utils/RFC2253Parser.java
Index: RFC2253Parser.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/RFC2253Parser.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- RFC2253Parser.java 11 Feb 2003 16:02:53 -0000 1.4
+++ RFC2253Parser.java 29 Apr 2003 21:36:56 -0000 1.5
@@ -70,11 +70,12 @@
*/
public class RFC2253Parser {
- /** Field cat */
-
- /* static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(RFC2253Parser.class.getName());
+
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ /* static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(RFC2253Parser.class.getName());
*/
+
static boolean _TOXML = true;
/**
1.31 +15 -5
xml-security/src/org/apache/xml/security/utils/XMLUtils.java
Index: XMLUtils.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/XMLUtils.java,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -r1.30 -r1.31
--- XMLUtils.java 11 Feb 2003 16:02:53 -0000 1.30
+++ XMLUtils.java 29 Apr 2003 21:36:56 -0000 1.31
@@ -95,9 +95,9 @@
*/
public class XMLUtils {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(XMLUtils.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(XMLUtils.class.getName());
/**
* Constructor XMLUtils
@@ -341,7 +341,7 @@
}
}
- /**
+ /**
* Method spitOutVersions
*
* @param cat
@@ -350,6 +350,16 @@
cat.debug(XMLUtils.getXercesVersion());
cat.debug(XMLUtils.getXalanVersion());
}
+
+ /**
+ * Method spitOutVersions
+ *
+ * @param log
+ */
+ public static void spitOutVersions(org.apache.commons.logging.Log log) {
+ log.debug(XMLUtils.getXercesVersion());
+ log.debug(XMLUtils.getXalanVersion());
+ }
/** Field nodeTypeString */
private static String[] nodeTypeString = new String[]{ "", "ELEMENT",
@@ -931,7 +941,7 @@
throws XMLSignatureException {
/*
- cat.debug("guaranteeThatElementInSignatureSpace(" + element + ", "
+ log.debug("guaranteeThatElementInSignatureSpace(" + element + ", "
+ localName + ")");
*/
if (element == null) {
1.6 +9 -9
xml-security/src/org/apache/xml/security/utils/resolver/ResourceResolver.java
Index: ResourceResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/resolver/ResourceResolver.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- ResourceResolver.java 11 Feb 2003 16:02:54 -0000 1.5
+++ ResourceResolver.java 29 Apr 2003 21:36:56 -0000 1.6
@@ -90,9 +90,9 @@
*/
public class ResourceResolver {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(ResourceResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(ResourceResolver.class.getName());
/** Field _alreadyInitialized */
static boolean _alreadyInitialized = false;
@@ -157,7 +157,7 @@
exArgs, e, uri, BaseURI);
}
- cat.debug("check resolvability by class " + currentClass);
+ log.debug("check resolvability by class " + currentClass);
if ((resolver != null) && resolver.canResolve(uri, BaseURI)) {
return resolver;
@@ -185,8 +185,8 @@
Attr uri, String BaseURI, Vector individualResolvers)
throws ResourceResolverException {
- cat.debug("I was asked to create a ResourceResolver and got " +
individualResolvers.size());
- cat.debug(" extra resolvers to my existing " +
ResourceResolver._resolverVector.size() + " system-wide resolvers");
+ log.debug("I was asked to create a ResourceResolver and got " +
individualResolvers.size());
+ log.debug(" extra resolvers to my existing " +
ResourceResolver._resolverVector.size() + " system-wide resolvers");
// first check the individual Resolvers
if ((individualResolvers != null) && (individualResolvers.size() > 0))
{
@@ -197,7 +197,7 @@
if (resolver != null) {
String currentClass =
resolver._resolverSpi.getClass().getName();
- cat.debug("check resolvability by class " + currentClass);
+ log.debug("check resolvability by class " + currentClass);
if (resolver.canResolve(uri, BaseURI)) {
return resolver;
@@ -222,7 +222,7 @@
exArgs, e, uri, BaseURI);
}
- cat.debug("check resolvability by class " + currentClass);
+ log.debug("check resolvability by class " + currentClass);
if ((resolver != null) && resolver.canResolve(uri, BaseURI)) {
return resolver;
1.7 +6 -6
xml-security/src/org/apache/xml/security/utils/resolver/ResourceResolverSpi.java
Index: ResourceResolverSpi.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/resolver/ResourceResolverSpi.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- ResourceResolverSpi.java 11 Feb 2003 16:02:54 -0000 1.6
+++ ResourceResolverSpi.java 29 Apr 2003 21:36:56 -0000 1.7
@@ -74,10 +74,10 @@
*/
public abstract class ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(ResourceResolverSpi.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ ResourceResolverSpi.class.getName());
/** Field _properties */
protected java.util.Map _properties = new java.util.HashMap(10);
@@ -329,7 +329,7 @@
&& (ch3 != '/'));
if (isDosFilename) {
- cat.debug("Found DOS filename: " + str);
+ log.debug("Found DOS filename: " + str);
}
}
1.6 +5 -4
xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverAnonymous.java
Index: ResolverAnonymous.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverAnonymous.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- ResolverAnonymous.java 11 Feb 2003 16:02:55 -0000 1.5
+++ ResolverAnonymous.java 29 Apr 2003 21:36:57 -0000 1.6
@@ -14,9 +14,10 @@
* @author $Author$
*/
public class ResolverAnonymous extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(ResolverAnonymous.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ ResolverAnonymous.class.getName());
private XMLSignatureInput _input = null;
1.9 +11 -10
xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverDirectHTTP.java
Index: ResolverDirectHTTP.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverDirectHTTP.java,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -r1.8 -r1.9
--- ResolverDirectHTTP.java 11 Feb 2003 16:02:55 -0000 1.8
+++ ResolverDirectHTTP.java 29 Apr 2003 21:36:57 -0000 1.9
@@ -102,9 +102,10 @@
*/
public class ResolverDirectHTTP extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(ResolverDirectHTTP.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ ResolverDirectHTTP.class.getName());
/** Field properties[] */
static final String properties[] = { "http.proxy.host", "http.proxy.port",
@@ -168,7 +169,7 @@
// switch on proxy usage
if (useProxy) {
- cat.debug("Use of HTTP proxy enabled: " + proxyHost + ":"
+ log.debug("Use of HTTP proxy enabled: " + proxyHost + ":"
+ proxyPort);
System.getProperties().put("http.proxySet", "true");
System.getProperties().put("http.proxyHost", proxyHost);
@@ -253,7 +254,7 @@
summarized += read;
}
- cat.debug("Fetched " + summarized + " bytes from URI "
+ log.debug("Fetched " + summarized + " bytes from URI "
+ uriNew.toString());
XMLSignatureInput result = new
XMLSignatureInput(baos.toByteArray());
@@ -289,7 +290,7 @@
public boolean engineCanResolve(Attr uri, String BaseURI) {
if (uri == null) {
- cat.debug("quick fail, uri == null");
+ log.debug("quick fail, uri == null");
return false;
}
@@ -297,7 +298,7 @@
String uriNodeValue = uri.getNodeValue();
if (uriNodeValue.equals("") || uriNodeValue.startsWith("#")) {
- cat.debug("quick fail for empty URIs and local ones");
+ log.debug("quick fail for empty URIs and local ones");
return false;
}
@@ -307,16 +308,16 @@
try {
uriNew = getNewURI(uri.getNodeValue(), BaseURI);
} catch (URI.MalformedURIException ex) {
- cat.debug("", ex);
+ log.debug("", ex);
}
if ((uriNew != null) && uriNew.getScheme().equals("http")) {
- cat.debug("I state that I can resolve " + uriNew.toString());
+ log.debug("I state that I can resolve " + uriNew.toString());
return true;
}
- cat.debug("I state that I can't resolve " + uriNew.toString());
+ log.debug("I state that I can't resolve " + uriNew.toString());
return false;
}
1.14 +15 -14
xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverFragment.java
Index: ResolverFragment.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverFragment.java,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -r1.13 -r1.14
--- ResolverFragment.java 11 Feb 2003 16:02:55 -0000 1.13
+++ ResolverFragment.java 29 Apr 2003 21:36:57 -0000 1.14
@@ -87,9 +87,10 @@
*/
public class ResolverFragment extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(ResolverFragment.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ ResolverFragment.class.getName());
/**
* Method engineResolve
@@ -121,7 +122,7 @@
* resource containing the signature
*/
- cat.debug("ResolverFragment with empty URI (means complete
document)");
+ log.debug("ResolverFragment with empty URI (means complete
document)");
try {
resultNodes =
cXPathAPI.selectNodeList(doc,
@@ -145,7 +146,7 @@
// Element selectedElem = doc.getElementById(id);
Element selectedElem = IdResolver.getElementById(doc, id);
- cat.debug("Try to catch an Element with ID " + id + " and Element
was " + selectedElem);
+ log.debug("Try to catch an Element with ID " + id + " and Element
was " + selectedElem);
if (selectedElem == null) {
resultNodes = new HelperNodeList();
} else {
@@ -164,7 +165,7 @@
Set resultSet = XMLUtils.convertNodelistToSet(resultNodes);
XMLSignatureInput result = new XMLSignatureInput(resultSet, cXPathAPI);
- cat.debug("We return a nodeset with " + resultNodes.getLength() + "
nodes");
+ log.debug("We return a nodeset with " + resultNodes.getLength() + "
nodes");
result.setMIMEType("text/xml");
try {
@@ -188,7 +189,7 @@
public boolean engineCanResolve(Attr uri, String BaseURI) {
if (uri == null) {
- cat.debug("Quick fail for null uri");
+ log.debug("Quick fail for null uri");
return false;
}
@@ -197,10 +198,10 @@
if (uriNodeValue.equals("")
|| (uriNodeValue.startsWith("#")
&&!uriNodeValue.startsWith("#xpointer("))) {
- cat.debug("State I can resolve reference: \"" + uriNodeValue +
"\"");
+ log.debug("State I can resolve reference: \"" + uriNodeValue +
"\"");
return true;
}
- cat.debug("Do not seem to be able to resolve reference: \"" +
uriNodeValue + "\"");
+ log.debug("Do not seem to be able to resolve reference: \"" +
uriNodeValue + "\"");
return false;
}
@@ -237,7 +238,7 @@
* throws ResourceResolverException {
*
* try {
- * cat.debug("Got " + input.getBytes().length
+ * log.debug("Got " + input.getBytes().length
* + " bytes from source and URI oif " +
input.getSourceURI());
* } catch (Exception ex) {
* throw new ResourceResolverException("generic.EmptyMessage", ex,
uri,
@@ -257,14 +258,14 @@
* Document doc =
* db.parse(new java.io.ByteArrayInputStream(input.getBytes()));
*
- * cat.debug("Owner Document " +
doc.getDocumentElement().getTagName());
- * cat.debug("try to select fragment " + fragment);
+ * log.debug("Owner Document " +
doc.getDocumentElement().getTagName());
+ * log.debug("try to select fragment " + fragment);
*
* // Element selectedElem = doc.getElementById(fragment);
* Element selectedElem = IdResolver.getElementById(doc, fragment);
*
* if (selectedElem != null) {
- * cat.debug("Selection hat geklappt!!!: "
+ * log.debug("Selection hat geklappt!!!: "
* + selectedElem.getTagName());
* }
*
1.8 +7 -7
xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverLocalFilesystem.java
Index: ResolverLocalFilesystem.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverLocalFilesystem.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- ResolverLocalFilesystem.java 11 Feb 2003 16:02:55 -0000 1.7
+++ ResolverLocalFilesystem.java 29 Apr 2003 21:36:57 -0000 1.8
@@ -76,10 +76,10 @@
*/
public class ResolverLocalFilesystem extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(ResolverLocalFilesystem.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ ResolverLocalFilesystem.class.getName());
/**
* Method resolve
@@ -177,16 +177,16 @@
try {
URI uriNew = new URI(new URI(BaseURI), uri.getNodeValue());
- cat.debug("I was asked whether I can resolve " + uriNew.toString());
+ log.debug("I was asked whether I can resolve " + uriNew.toString());
if (uriNew.getScheme().equals("file")) {
- cat.debug("I state that I can resolve " + uriNew.toString());
+ log.debug("I state that I can resolve " + uriNew.toString());
return true;
}
} catch (Exception e) {}
- cat.debug("But I can't");
+ log.debug("But I can't");
return false;
}
1.15 +8 -7
xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverXPointer.java
Index: ResolverXPointer.java
===================================================================
RCS file:
/home/cvs/xml-security/src/org/apache/xml/security/utils/resolver/implementations/ResolverXPointer.java,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -r1.14 -r1.15
--- ResolverXPointer.java 11 Feb 2003 16:02:55 -0000 1.14
+++ ResolverXPointer.java 29 Apr 2003 21:36:57 -0000 1.15
@@ -93,9 +93,10 @@
*/
public class ResolverXPointer extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(ResolverXPointer.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ ResolverXPointer.class.getName());
/**
* Method engineResolve
@@ -129,7 +130,7 @@
String id = getXPointerId(uri, BaseURI);
Element selectedElem = IdResolver.getElementById(doc, id);
- // cat.debug("Use #xpointer(id('" + id + "')) on element " +
selectedElem);
+ // log.debug("Use #xpointer(id('" + id + "')) on element " +
selectedElem);
if (selectedElem == null) {
Object exArgs[] = { id };
@@ -235,13 +236,13 @@
uriNodeValue.length()
- "))".length());
- // cat.debug("idPlusDelim=" + idPlusDelim);
+ // log.debug("idPlusDelim=" + idPlusDelim);
if (((idPlusDelim.charAt(0) == '"') && (idPlusDelim
.charAt(idPlusDelim.length() - 1) == '"')) || ((idPlusDelim
.charAt(0) == '\'') && (idPlusDelim
.charAt(idPlusDelim.length() - 1) == '\''))) {
- cat.debug("Id="
+ log.debug("Id="
+ idPlusDelim.substring(1, idPlusDelim.length() - 1));
return true;
1.5 +3 -3
xml-security/src_samples/org/apache/xml/security/samples/iaik/IAIKInterOp.java
Index: IAIKInterOp.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/iaik/IAIKInterOp.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- IAIKInterOp.java 11 Feb 2003 16:02:55 -0000 1.4
+++ IAIKInterOp.java 29 Apr 2003 21:36:57 -0000 1.5
@@ -82,9 +82,9 @@
*/
public class IAIKInterOp {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(IAIKInterOp.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(IAIKInterOp.class.getName());
/** Field schemaValidate */
static final boolean schemaValidate = false;
1.8 +4 -4
xml-security/src_samples/org/apache/xml/security/samples/signature/CreateCollectableSignature.java
Index: CreateCollectableSignature.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/CreateCollectableSignature.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- CreateCollectableSignature.java 11 Feb 2003 16:02:56 -0000 1.7
+++ CreateCollectableSignature.java 29 Apr 2003 21:36:57 -0000 1.8
@@ -85,10 +85,10 @@
*/
public class CreateCollectableSignature {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(CreateCollectableSignature.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ CreateCollectableSignature.class.getName());
/** Field passphrase */
public static final String passphrase =
1.5 +5 -5
xml-security/src_samples/org/apache/xml/security/samples/signature/CreateDonaldsAdditionalURISignature.java
Index: CreateDonaldsAdditionalURISignature.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/CreateDonaldsAdditionalURISignature.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- CreateDonaldsAdditionalURISignature.java 11 Feb 2003 16:02:56 -0000
1.4
+++ CreateDonaldsAdditionalURISignature.java 29 Apr 2003 21:36:57 -0000
1.5
@@ -86,10 +86,10 @@
*/
public class CreateDonaldsAdditionalURISignature {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(CreateMerlinsExampleSixteen.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ CreateMerlinsExampleSixteen.class.getName());
static Document createDocument(DocumentBuilder db) throws Exception {
Document doc = db.newDocument();
1.8 +3 -3
xml-security/src_samples/org/apache/xml/security/samples/signature/CreateEnvelopingSignature.java
Index: CreateEnvelopingSignature.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/CreateEnvelopingSignature.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- CreateEnvelopingSignature.java 11 Feb 2003 16:02:56 -0000 1.7
+++ CreateEnvelopingSignature.java 29 Apr 2003 21:36:57 -0000 1.8
@@ -82,9 +82,9 @@
*/
public class CreateEnvelopingSignature {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(CreateSignature.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(CreateSignature.class.getName());
/**
* Method main
1.13 +4 -5
xml-security/src_samples/org/apache/xml/security/samples/signature/CreateMerlinsExampleSixteen.java
Index: CreateMerlinsExampleSixteen.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/CreateMerlinsExampleSixteen.java,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -r1.12 -r1.13
--- CreateMerlinsExampleSixteen.java 11 Feb 2003 16:02:56 -0000 1.12
+++ CreateMerlinsExampleSixteen.java 29 Apr 2003 21:36:57 -0000 1.13
@@ -97,11 +97,10 @@
* @author $Author$
*/
public class CreateMerlinsExampleSixteen {
-
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(CreateMerlinsExampleSixteen.class.getName());
+
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(CreateMerlinsExampleSixteen.class.getName());
/**
* Method main
1.4 +5 -5
xml-security/src_samples/org/apache/xml/security/samples/signature/CreateNullURIReference.java
Index: CreateNullURIReference.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/CreateNullURIReference.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- CreateNullURIReference.java 11 Feb 2003 16:02:56 -0000 1.3
+++ CreateNullURIReference.java 29 Apr 2003 21:36:57 -0000 1.4
@@ -80,10 +80,10 @@
*/
public class CreateNullURIReference {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(CreateNullURIReference.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ CreateNullURIReference.class.getName());
/**
* Method main
1.8 +3 -3
xml-security/src_samples/org/apache/xml/security/samples/signature/CreateSignature.java
Index: CreateSignature.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/CreateSignature.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- CreateSignature.java 11 Feb 2003 16:02:56 -0000 1.7
+++ CreateSignature.java 29 Apr 2003 21:36:57 -0000 1.8
@@ -81,9 +81,9 @@
*/
public class CreateSignature {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(CreateSignature.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(CreateSignature.class.getName());
/**
* Method main
1.7 +3 -3
xml-security/src_samples/org/apache/xml/security/samples/signature/HereSigner.java
Index: HereSigner.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/HereSigner.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- HereSigner.java 11 Feb 2003 16:02:56 -0000 1.6
+++ HereSigner.java 29 Apr 2003 21:36:57 -0000 1.7
@@ -85,9 +85,9 @@
*/
public class HereSigner {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(HereSigner.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(HereSigner.class.getName());
/**
* Method main
1.4 +5 -5
xml-security/src_samples/org/apache/xml/security/samples/signature/NullURIReferenceResolver.java
Index: NullURIReferenceResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/NullURIReferenceResolver.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- NullURIReferenceResolver.java 11 Feb 2003 16:02:56 -0000 1.3
+++ NullURIReferenceResolver.java 29 Apr 2003 21:36:57 -0000 1.4
@@ -74,10 +74,10 @@
*/
public class NullURIReferenceResolver extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(NullURIReferenceResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ NullURIReferenceResolver.class.getName());
/** Field _data[] */
byte _data[] = null;
1.4 +3 -4
xml-security/src_samples/org/apache/xml/security/samples/signature/VerifyCollectableSignature.java
Index: VerifyCollectableSignature.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/VerifyCollectableSignature.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- VerifyCollectableSignature.java 11 Feb 2003 16:02:56 -0000 1.3
+++ VerifyCollectableSignature.java 29 Apr 2003 21:36:57 -0000 1.4
@@ -77,10 +77,9 @@
*/
public class VerifyCollectableSignature {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(VerifyCollectableSignature.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(VerifyCollectableSignature.class.getName());
/**
* Method main
1.7 +4 -4
xml-security/src_samples/org/apache/xml/security/samples/signature/VerifyMerlinsExamplesFifteen.java
Index: VerifyMerlinsExamplesFifteen.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/VerifyMerlinsExamplesFifteen.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- VerifyMerlinsExamplesFifteen.java 11 Feb 2003 16:02:56 -0000 1.6
+++ VerifyMerlinsExamplesFifteen.java 29 Apr 2003 21:36:57 -0000 1.7
@@ -79,10 +79,10 @@
*/
public class VerifyMerlinsExamplesFifteen {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(VerifyMerlinsExamplesFifteen.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ VerifyMerlinsExamplesFifteen.class.getName());
/** Field schemaValidate */
static final boolean schemaValidate = false;
1.12 +4 -4
xml-security/src_samples/org/apache/xml/security/samples/signature/VerifyMerlinsExamplesSixteen.java
Index: VerifyMerlinsExamplesSixteen.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/signature/VerifyMerlinsExamplesSixteen.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- VerifyMerlinsExamplesSixteen.java 11 Feb 2003 16:02:56 -0000 1.11
+++ VerifyMerlinsExamplesSixteen.java 29 Apr 2003 21:36:57 -0000 1.12
@@ -82,10 +82,10 @@
*/
public class VerifyMerlinsExamplesSixteen {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(VerifyMerlinsExamplesSixteen.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ VerifyMerlinsExamplesSixteen.class.getName());
/** Field schemaValidate */
static final boolean schemaValidate = false;
1.4 +4 -4
xml-security/src_samples/org/apache/xml/security/samples/transforms/SampleTransformNone.java
Index: SampleTransformNone.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/transforms/SampleTransformNone.java,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- SampleTransformNone.java 11 Feb 2003 16:02:56 -0000 1.3
+++ SampleTransformNone.java 29 Apr 2003 21:36:57 -0000 1.4
@@ -72,10 +72,10 @@
*/
public class SampleTransformNone extends TransformSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(SampleTransformNone.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ SampleTransformNone.class.getName());
/** Field implementedTransformURI */
public static final String implementedTransformURI =
1.6 +8 -8
xml-security/src_samples/org/apache/xml/security/samples/utils/resolver/OfflineResolver.java
Index: OfflineResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src_samples/org/apache/xml/security/samples/utils/resolver/OfflineResolver.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- OfflineResolver.java 11 Feb 2003 16:02:57 -0000 1.5
+++ OfflineResolver.java 29 Apr 2003 21:36:57 -0000 1.6
@@ -82,9 +82,9 @@
*/
public class OfflineResolver extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(OfflineResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(OfflineResolver.class.getName());
/**
* Method engineResolve
@@ -103,11 +103,11 @@
if (OfflineResolver._uriMap.containsKey(URI)) {
String newURI = (String) OfflineResolver._uriMap.get(URI);
- cat.debug("Mapped " + URI + " to " + newURI);
+ log.debug("Mapped " + URI + " to " + newURI);
InputStream is = new FileInputStream(newURI);
- cat.debug("Available bytes = " + is.available());
+ log.debug("Available bytes = " + is.available());
XMLSignatureInput result = new XMLSignatureInput(is);
@@ -148,12 +148,12 @@
URI uriNew = new URI(new URI(BaseURI), uri.getNodeValue());
if (uriNew.getScheme().equals("http")) {
- cat.debug("I state that I can resolve " + uriNew.toString());
+ log.debug("I state that I can resolve " + uriNew.toString());
return true;
}
- cat.debug("I state that I can't resolve " + uriNew.toString());
+ log.debug("I state that I can't resolve " + uriNew.toString());
} catch (URI.MalformedURIException ex) {}
return false;
1.14 +20 -19
xml-security/src_unitTests/org/apache/xml/security/test/AllTests.java
Index: AllTests.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/AllTests.java,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -r1.13 -r1.14
--- AllTests.java 11 Feb 2003 16:02:57 -0000 1.13
+++ AllTests.java 29 Apr 2003 21:36:58 -0000 1.14
@@ -73,9 +73,10 @@
*/
public class AllTests extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(AllTests.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ AllTests.class.getName());
public AllTests(String test) {
super(test);
@@ -106,22 +107,22 @@
*/
public static void main(String[] args) {
- XMLUtils.spitOutVersions(cat);
- cat.debug("java.class.path : " +
System.getProperty("java.class.path"));
- cat.debug("java.library.path : " +
System.getProperty("java.library.path"));
- cat.debug("java.runtime.name : " +
System.getProperty("java.runtime.name"));
- cat.debug("java.runtime.version : " +
System.getProperty("java.runtime.version"));
- cat.debug("java.specification.name : " +
System.getProperty("java.specification.name"));
- cat.debug("java.specification.vendor : " +
System.getProperty("java.specification.vendor"));
- cat.debug("java.specification.version : " +
System.getProperty("java.specification.version"));
- cat.debug("java.vendor : " +
System.getProperty("java.vendor"));
- cat.debug("java.version : " +
System.getProperty("java.version"));
- cat.debug("java.vm.info : " +
System.getProperty("java.vm.info"));
- cat.debug("java.vm.name : " +
System.getProperty("java.vm.name"));
- cat.debug("java.vm.version : " +
System.getProperty("java.vm.version"));
- cat.debug("os.arch : " +
System.getProperty("os.arch"));
- cat.debug("os.name : " +
System.getProperty("os.name"));
- cat.debug("os.version : " +
System.getProperty("os.version"));
+ XMLUtils.spitOutVersions(log);
+ log.debug("java.class.path : " +
System.getProperty("java.class.path"));
+ log.debug("java.library.path : " +
System.getProperty("java.library.path"));
+ log.debug("java.runtime.name : " +
System.getProperty("java.runtime.name"));
+ log.debug("java.runtime.version : " +
System.getProperty("java.runtime.version"));
+ log.debug("java.specification.name : " +
System.getProperty("java.specification.name"));
+ log.debug("java.specification.vendor : " +
System.getProperty("java.specification.vendor"));
+ log.debug("java.specification.version : " +
System.getProperty("java.specification.version"));
+ log.debug("java.vendor : " +
System.getProperty("java.vendor"));
+ log.debug("java.version : " +
System.getProperty("java.version"));
+ log.debug("java.vm.info : " +
System.getProperty("java.vm.info"));
+ log.debug("java.vm.name : " +
System.getProperty("java.vm.name"));
+ log.debug("java.vm.version : " +
System.getProperty("java.vm.version"));
+ log.debug("os.arch : " +
System.getProperty("os.arch"));
+ log.debug("os.name : " +
System.getProperty("os.name"));
+ log.debug("os.version : " +
System.getProperty("os.version"));
boolean useTextUI = true;
1.6 +5 -5
xml-security/src_unitTests/org/apache/xml/security/test/InteropTest.java
Index: InteropTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/InteropTest.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- InteropTest.java 11 Feb 2003 16:02:57 -0000 1.5
+++ InteropTest.java 29 Apr 2003 21:36:58 -0000 1.6
@@ -17,9 +17,9 @@
public class InteropTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(InteropTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(InteropTest.class.getName());
public InteropTest(String test) {
super(test);
@@ -70,7 +70,7 @@
*/
public static void main(String[] args) {
- XMLUtils.spitOutVersions(cat);
+ XMLUtils.spitOutVersions(log);
boolean useTextUI = true;
1.6 +4 -4
xml-security/src_unitTests/org/apache/xml/security/test/ModuleTest.java
Index: ModuleTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/ModuleTest.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- ModuleTest.java 11 Feb 2003 16:00:51 -0000 1.5
+++ ModuleTest.java 29 Apr 2003 21:36:58 -0000 1.6
@@ -8,9 +8,9 @@
public class ModuleTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(ModuleTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(ModuleTest.class.getName());
public ModuleTest(String test) {
super(test);
@@ -50,7 +50,7 @@
*/
public static void main(String[] args) {
- XMLUtils.spitOutVersions(cat);
+ XMLUtils.spitOutVersions(log);
boolean useTextUI = true;
1.6 +6 -7
xml-security/src_unitTests/org/apache/xml/security/test/algorithms/implementations/KeyWrapTest.java
Index: KeyWrapTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/algorithms/implementations/KeyWrapTest.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- KeyWrapTest.java 11 Feb 2003 16:02:57 -0000 1.5
+++ KeyWrapTest.java 29 Apr 2003 21:36:58 -0000 1.6
@@ -82,10 +82,9 @@
*/
public class KeyWrapTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(KeyWrapTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(KeyWrapTest.class.getName());
/** Field FAILURE_OK */
static final int FAILURE_OK = 0;
@@ -196,7 +195,7 @@
if (!MessageDigest.isEqual(result,
HexDump.hexStringToByteArray(WrappedStr))) {
- cat.info("Wrap failed: " + HexDump.byteArrayToHexString(result));
+ log.info("Wrap failed: " + HexDump.byteArrayToHexString(result));
return FAILURE_WRAP;
}
@@ -205,7 +204,7 @@
SecretKeySpec unwrapped = (SecretKeySpec) kwa.unwrap(result, kek,
cekURI);
if (!MessageDigest.isEqual(unwrapped.getEncoded(), CEK)) {
- cat.info("Unwrap failed: " +
HexDump.byteArrayToHexString(unwrapped.getEncoded()));
+ log.info("Unwrap failed: " +
HexDump.byteArrayToHexString(unwrapped.getEncoded()));
return FAILURE_UNWRAP;
}
1.5 +4 -5
xml-security/src_unitTests/org/apache/xml/security/test/algorithms/implementations/SignatureDSATest.java
Index: SignatureDSATest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/algorithms/implementations/SignatureDSATest.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- SignatureDSATest.java 11 Feb 2003 16:02:57 -0000 1.4
+++ SignatureDSATest.java 29 Apr 2003 21:36:58 -0000 1.5
@@ -80,10 +80,9 @@
*/
public class SignatureDSATest extends TestCase{
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(SignatureDSATest.class.getName());
-
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(SignatureDSATest.class.getName());
public SignatureDSATest(String name) {
super(name);
1.5 +3 -3
xml-security/src_unitTests/org/apache/xml/security/test/c14n/helper/C14nHelperTest.java
Index: C14nHelperTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/c14n/helper/C14nHelperTest.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- C14nHelperTest.java 11 Feb 2003 16:02:58 -0000 1.4
+++ C14nHelperTest.java 29 Apr 2003 21:36:58 -0000 1.5
@@ -78,9 +78,9 @@
*/
public class C14nHelperTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(C14nHelperTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(C14nHelperTest.class.getName());
/**
* Method suite
1.7 +11 -11
xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/C14NInterop.java
Index: C14NInterop.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/C14NInterop.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- C14NInterop.java 11 Feb 2003 16:02:58 -0000 1.6
+++ C14NInterop.java 29 Apr 2003 21:36:58 -0000 1.7
@@ -88,9 +88,9 @@
*/
public class C14NInterop extends InteropTest {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(C14NInterop.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(C14NInterop.class.getName());
/**
* Method suite
@@ -208,7 +208,7 @@
long end = System.currentTimeMillis();
- cat.debug("fixSubtree took " + (int) (end - start));
+ log.debug("fixSubtree took " + (int) (end - start));
Element sigElement =
(Element) doc.getElementsByTagNameNS(Constants.SignatureSpecNS,
@@ -225,9 +225,9 @@
signature.getSignedInfo().getVerificationResult(i);
if (refVerify) {
- cat.debug("Reference " + i + " was OK");
+ log.debug("Reference " + i + " was OK");
} else {
- cat.debug("Reference " + i + " failed");
+ log.debug("Reference " + i + " failed");
failures++;
@@ -287,7 +287,7 @@
A_A.appendChild(A_B);
A_B.appendChild(A_C);
- cat.info("Created document");
+ log.info("Created document");
Canonicalizer20010315OmitComments c = new
Canonicalizer20010315OmitComments();
@@ -304,15 +304,15 @@
XPath2FilterContainer xf2_2 =
XPath2FilterContainer.newInstanceSubtract(doc,
"//namespace::*[local-name()='B']");
transforms.addTransform(Transforms.TRANSFORM_XPATH2FILTER,
xf2_2.getElement());
- cat.info("Created signature object");
+ log.info("Created signature object");
sig.addDocument("", transforms);
- cat.info("Reference added");
+ log.info("Reference added");
sig.sign(sig.createSecretKey("secret".getBytes()));
- cat.info("Signing finished");
+ log.info("Signing finished");
XMLSignatureInput s =
sig.getSignedInfo().getReferencedContentAfterTransformsItem(0);
Set nodes = s.getNodeSet();
@@ -326,7 +326,7 @@
System.out.println("<" + ((Element)n).getTagName() + " />");
}
}
- cat.info("finished");
+ log.info("finished");
System.out.println("###########################");
System.out.println(new String(s.getBytes()));
1.7 +4 -4
xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/Canonicalizer20010315ExclusiveTest.java
Index: Canonicalizer20010315ExclusiveTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/Canonicalizer20010315ExclusiveTest.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- Canonicalizer20010315ExclusiveTest.java 11 Feb 2003 16:02:58 -0000
1.6
+++ Canonicalizer20010315ExclusiveTest.java 29 Apr 2003 21:36:58 -0000
1.7
@@ -100,10 +100,10 @@
org.apache.xml.security.Init.init();
}
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(Canonicalizer20010315ExclusiveTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ Canonicalizer20010315ExclusiveTest.class.getName());
/**
* Method suite
1.15 +6 -7
xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/Canonicalizer20010315Test.java
Index: Canonicalizer20010315Test.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/Canonicalizer20010315Test.java,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -r1.14 -r1.15
--- Canonicalizer20010315Test.java 11 Feb 2003 16:02:58 -0000 1.14
+++ Canonicalizer20010315Test.java 29 Apr 2003 21:36:58 -0000 1.15
@@ -106,10 +106,9 @@
*/
public class Canonicalizer20010315Test extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(Canonicalizer20010315Test.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(Canonicalizer20010315Test.class.getName());
/**
* Method suite
@@ -769,7 +768,7 @@
*
* if (!equal) {
* JavaUtils.writeBytesToFilename(fileOut, c14nBytes);
- * cat.debug("Wrote malicious output from Test \"" + descri
+ * log.debug("Wrote malicious output from Test \"" + descri
* + "\" to file " + fileOut);
* }
*
@@ -832,7 +831,7 @@
} catch (CanonicalizationException cex) {
// if we reach this point - good.
- cat.debug("We catched the C14nEx, that's good: " +
cex.getMessage());
+ log.debug("We catched the C14nEx, that's good: " +
cex.getMessage());
weCatchedTheRelativeNS = true;
}
@@ -1218,7 +1217,7 @@
FileOutputStream fos = new FileOutputStream(f);
fos.write(c14nBytes);
- cat.debug("Wrote errornous result to file " + f.toURL().toString());
+ log.debug("Wrote errornous result to file " + f.toURL().toString());
}
return result;
1.9 +7 -7
xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/ExclusiveC14NInterop.java
Index: ExclusiveC14NInterop.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/c14n/implementations/ExclusiveC14NInterop.java,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -r1.8 -r1.9
--- ExclusiveC14NInterop.java 11 Feb 2003 16:02:58 -0000 1.8
+++ ExclusiveC14NInterop.java 29 Apr 2003 21:36:58 -0000 1.9
@@ -82,9 +82,9 @@
*/
public class ExclusiveC14NInterop extends InteropTest {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
org.apache.log4j.Category.getInstance(
- ExclusiveC14NInterop.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(ExclusiveC14NInterop.class.getName());
/**
* Method suite
@@ -197,7 +197,7 @@
long end = System.currentTimeMillis();
- cat.debug("fixSubtree took " + (int) (end - start));
+ log.debug("fixSubtree took " + (int) (end - start));
Element sigElement =
(Element) doc.getElementsByTagNameNS(Constants.SignatureSpecNS,
@@ -207,7 +207,7 @@
boolean verify =
signature.checkSignatureValue(signature.getKeyInfo().getPublicKey());
- cat.debug(" signature.checkSignatureValue finished: " + verify);
+ log.debug(" signature.checkSignatureValue finished: " + verify);
int failures = 0;
@@ -221,7 +221,7 @@
JavaUtils.writeBytesToFilename(directory + "/c14n-" + i +
".apache.html",
signature.getSignedInfo().item(i).getHTMLRepresentation().getBytes());
if (refVerify) {
- cat.debug("Reference " + i + " was OK");
+ log.debug("Reference " + i + " was OK");
} else {
failures++;
@@ -235,7 +235,7 @@
String algo = reference.getTransforms().item(length
- 1).getURI();
- cat.debug("Reference " + i + " failed: " + algo);
+ log.debug("Reference " + i + " failed: " + algo);
}
}
1.6 +5 -5
xml-security/src_unitTests/org/apache/xml/security/test/external/org/apache/xalan/XPathAPI/AttributeAncestorOrSelf.java
Index: AttributeAncestorOrSelf.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/external/org/apache/xalan/XPathAPI/AttributeAncestorOrSelf.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- AttributeAncestorOrSelf.java 11 Feb 2003 16:02:58 -0000 1.5
+++ AttributeAncestorOrSelf.java 29 Apr 2003 21:36:58 -0000 1.6
@@ -86,10 +86,10 @@
*/
public class AttributeAncestorOrSelf extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(AttributeAncestorOrSelf.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ AttributeAncestorOrSelf.class.getName());
/** Field xercesVerStr */
static String xercesVerStr = XMLUtils.getXercesVersion();
1.6 +4 -3
xml-security/src_unitTests/org/apache/xml/security/test/external/org/apache/xalan/XPathAPI/XalanBug1425Test.java
Index: XalanBug1425Test.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/external/org/apache/xalan/XPathAPI/XalanBug1425Test.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- XalanBug1425Test.java 11 Feb 2003 16:02:58 -0000 1.5
+++ XalanBug1425Test.java 29 Apr 2003 21:36:58 -0000 1.6
@@ -88,9 +88,10 @@
*/
public class XalanBug1425Test extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(XalanBug1425Test.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ XalanBug1425Test.class.getName());
/** Field xercesVerStr */
static String xercesVerStr = XMLUtils.getXercesVersion();
1.8 +21 -21
xml-security/src_unitTests/org/apache/xml/security/test/interop/BaltimoreTest.java
Index: BaltimoreTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/interop/BaltimoreTest.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- BaltimoreTest.java 11 Feb 2003 16:02:58 -0000 1.7
+++ BaltimoreTest.java 29 Apr 2003 21:36:58 -0000 1.8
@@ -77,9 +77,9 @@
*/
public class BaltimoreTest extends InteropTest {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(BaltimoreTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(BaltimoreTest.class.getName());
/** Field merlinsDir15 */
static final String merlinsDir15 =
@@ -129,7 +129,7 @@
"secret".getBytes("ASCII"));
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -151,12 +151,12 @@
try {
verify = this.verifyHMAC(filename, resolver, followManifests,
hmacKey);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -177,12 +177,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -203,12 +203,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -229,12 +229,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -255,12 +255,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -281,12 +281,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -307,12 +307,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -334,12 +334,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
1.8 +29 -28
xml-security/src_unitTests/org/apache/xml/security/test/interop/IAIKTest.java
Index: IAIKTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/interop/IAIKTest.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- IAIKTest.java 11 Feb 2003 16:02:58 -0000 1.7
+++ IAIKTest.java 29 Apr 2003 21:36:58 -0000 1.8
@@ -78,9 +78,10 @@
*/
public class IAIKTest extends InteropTest {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(IAIKTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ IAIKTest.class.getName());
/** Field gregorsDir */
static final String gregorsDir = "data/at/iaik/ixsil/";
@@ -136,13 +137,13 @@
try {
verify = this.verifyHMAC(filename, resolver, followManifests,
hmacKey);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -166,13 +167,13 @@
try {
verify = this.verifyHMAC(filename, resolver, followManifests,
hmacKey);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -195,13 +196,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Core validation crashed for " + filename);
+ log.error("Core validation crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Core validation failed for " + filename);
+ log.error("Core validation failed for " + filename);
}
assertTrue("Core validation failed for " + filename, verify);
@@ -224,13 +225,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Following the ds:Manifest failed for " + filename);
+ log.error("Following the ds:Manifest failed for " + filename);
}
assertTrue("Following the ds:Manifest failed for " + filename, verify);
@@ -253,13 +254,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue("Verification failed for " + filename, verify);
@@ -284,13 +285,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -313,13 +314,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -342,13 +343,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -371,13 +372,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -398,13 +399,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -427,13 +428,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -454,13 +455,13 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
1.10 +20 -20
xml-security/src_unitTests/org/apache/xml/security/test/interop/IBMTest.java
Index: IBMTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/interop/IBMTest.java,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -r1.9 -r1.10
--- IBMTest.java 11 Feb 2003 16:02:58 -0000 1.9
+++ IBMTest.java 29 Apr 2003 21:36:58 -0000 1.10
@@ -83,9 +83,9 @@
*/
public class IBMTest extends InteropTest {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(IBMTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(IBMTest.class.getName());
/** Field kentsDir */
static final String kentsDir = "data/com/ibm/xss4j-20011029/";
@@ -139,12 +139,12 @@
try {
verify = this.verifyHMAC(filename, resolver, followManifests,
hmacKey);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -164,12 +164,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -189,12 +189,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -214,12 +214,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -239,12 +239,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -264,12 +264,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -289,12 +289,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -318,12 +318,12 @@
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
- cat.error("Verification crashed for " + filename);
+ log.error("Verification crashed for " + filename);
throw ex;
}
if (verify) {
- cat.error("Verification failed for " + filename + ", had to be
broken but was successful");
+ log.error("Verification failed for " + filename + ", had to be
broken but was successful");
}
assertTrue(filename, !verify);
1.8 +4 -4
xml-security/src_unitTests/org/apache/xml/security/test/interop/InteropTest.java
Index: InteropTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/interop/InteropTest.java,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- InteropTest.java 11 Feb 2003 16:02:58 -0000 1.7
+++ InteropTest.java 29 Apr 2003 21:36:58 -0000 1.8
@@ -22,9 +22,9 @@
*/
public class InteropTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(BaltimoreTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(BaltimoreTest.class.getName());
/** Field xercesVerStr */
static String xercesVerStr = XMLUtils.getXercesVersion();
1.5 +6 -6
xml-security/src_unitTests/org/apache/xml/security/test/interop/RSASecurityTest.java
Index: RSASecurityTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/interop/RSASecurityTest.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- RSASecurityTest.java 11 Feb 2003 16:02:58 -0000 1.4
+++ RSASecurityTest.java 29 Apr 2003 21:36:58 -0000 1.5
@@ -76,9 +76,9 @@
*/
public class RSASecurityTest extends InteropTest {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(RSASecurityTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(RSASecurityTest.class.getName());
/** Field blakesDir */
static final String blakesDir =
@@ -123,7 +123,7 @@
boolean verify = this.verify(filename, resolver, followManifests);
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
@@ -138,7 +138,7 @@
boolean verify = this.verify(filename, resolver, followManifests);
if (!verify) {
- cat.error("Verification failed for " + filename);
+ log.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
1.5 +9 -8
xml-security/src_unitTests/org/apache/xml/security/test/resource/TestVectorResolver.java
Index: TestVectorResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/resource/TestVectorResolver.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- TestVectorResolver.java 11 Feb 2003 16:02:58 -0000 1.4
+++ TestVectorResolver.java 29 Apr 2003 21:36:59 -0000 1.5
@@ -80,9 +80,10 @@
*/
public class TestVectorResolver implements EntityResolver {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
-
org.apache.log4j.Category.getInstance(TestVectorResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ TestVectorResolver.class.getName());
/** Field _firstEntityResolved */
boolean _firstEntityResolved = false;
@@ -160,7 +161,7 @@
this._firstEntitySystemIdDirectory = getFilePath(systemId);
- cat.debug("this._firstEntitySystemIdDirectory = "
+ log.debug("this._firstEntitySystemIdDirectory = "
+ this._firstEntitySystemIdDirectory);
}
@@ -172,14 +173,14 @@
*/
private InputStream getInputStream(String systemId) {
- cat.debug("getInputStream(" + systemId + ")");
+ log.debug("getInputStream(" + systemId + ")");
// we don't use the file system but the ZIP resource
// return new InputSource(new FileInputStream(systemId));
byte result[] = (byte[]) TestVectorResolver.vectors.get(systemId);
if (result == null) {
- cat.fatal("requested " + systemId + " resulted in null");
+ log.fatal("requested " + systemId + " resulted in null");
}
return new ByteArrayInputStream(result);
@@ -201,7 +202,7 @@
systemId = this.getFileName(systemId);
- cat.debug("publicId=\"" + publicId + "\" systemId=\"" + systemId
+ log.debug("publicId=\"" + publicId + "\" systemId=\"" + systemId
+ "\"");
// InputStream result = this.getInputStream(systemId);
@@ -251,7 +252,7 @@
.getBytesFromStream(zis);
TestVectorResolver.vectors.put(ze.getName(), data);
- cat.debug("Contents of " + thisClass + "/" + testVectorFile
+ log.debug("Contents of " + thisClass + "/" + testVectorFile
+ "#" + ze.getName() + " " + data.length
+ " bytes");
}
1.12 +4 -4
xml-security/src_unitTests/org/apache/xml/security/test/signature/XMLSignatureInputTest.java
Index: XMLSignatureInputTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/signature/XMLSignatureInputTest.java,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -r1.11 -r1.12
--- XMLSignatureInputTest.java 11 Feb 2003 16:02:59 -0000 1.11
+++ XMLSignatureInputTest.java 29 Apr 2003 21:36:59 -0000 1.12
@@ -98,9 +98,9 @@
*/
public class XMLSignatureInputTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
org.apache.log4j.Category.getInstance(
- XMLSignatureInputTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(XMLSignatureInputTest.class.getName());
/**
* Method suite
@@ -149,7 +149,7 @@
private void printNodeSet(NodeList nl) {
for (int i = 0; i < nl.getLength(); i++) {
- cat.debug("Type "
+ log.debug("Type "
+ XMLUtils.getNodeTypeString(nl.item(i).getNodeType()));
}
}
1.7 +5 -5
xml-security/src_unitTests/org/apache/xml/security/test/transforms/implementations/TransformBase64DecodeTest.java
Index: TransformBase64DecodeTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/transforms/implementations/TransformBase64DecodeTest.java,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- TransformBase64DecodeTest.java 11 Feb 2003 16:02:59 -0000 1.6
+++ TransformBase64DecodeTest.java 29 Apr 2003 21:37:00 -0000 1.7
@@ -95,10 +95,10 @@
*/
public class TransformBase64DecodeTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(TransformBase64DecodeTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ TransformBase64DecodeTest.class.getName());
/**
* Method suite
@@ -143,7 +143,7 @@
if (doc == null) {
throw new RuntimeException("Could not create a Document");
} else {
- cat.debug("I could create the Document");
+ log.debug("I could create the Document");
}
return doc;
}
1.6 +3 -3
xml-security/src_unitTests/org/apache/xml/security/test/utils/Base64Test.java
Index: Base64Test.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/utils/Base64Test.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- Base64Test.java 11 Feb 2003 16:02:59 -0000 1.5
+++ Base64Test.java 29 Apr 2003 21:37:00 -0000 1.6
@@ -75,9 +75,9 @@
*/
public class Base64Test extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(Base64Test.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(Base64Test.class.getName());
/**
* Method suite
1.5 +8 -8
xml-security/src_unitTests/org/apache/xml/security/test/utils/resolver/OfflineResolver.java
Index: OfflineResolver.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/utils/resolver/OfflineResolver.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- OfflineResolver.java 11 Feb 2003 16:02:59 -0000 1.4
+++ OfflineResolver.java 29 Apr 2003 21:37:00 -0000 1.5
@@ -87,9 +87,9 @@
*/
public class OfflineResolver extends ResourceResolverSpi {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category.getInstance(OfflineResolver.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+
org.apache.commons.logging.LogFactory.getLog(OfflineResolver.class.getName());
/**
* Method engineResolve
@@ -108,11 +108,11 @@
if (OfflineResolver._uriMap.containsKey(URI)) {
String newURI = (String) OfflineResolver._uriMap.get(URI);
- cat.debug("Mapped " + URI + " to " + newURI);
+ log.debug("Mapped " + URI + " to " + newURI);
InputStream is = new FileInputStream(newURI);
- cat.debug("Available bytes = " + is.available());
+ log.debug("Available bytes = " + is.available());
XMLSignatureInput result = new XMLSignatureInput(is);
@@ -153,12 +153,12 @@
URI uriNew = new URI(new URI(BaseURI), uri.getNodeValue());
if (uriNew.getScheme().equals("http")) {
- cat.debug("I state that I can resolve " + uriNew.toString());
+ log.debug("I state that I can resolve " + uriNew.toString());
return true;
}
- cat.debug("I state that I can't resolve " + uriNew.toString());
+ log.debug("I state that I can't resolve " + uriNew.toString());
} catch (URI.MalformedURIException ex) {}
return false;
1.5 +5 -5
xml-security/src_unitTests/org/apache/xml/security/test/utils/resolver/ResourceResolverSpiTest.java
Index: ResourceResolverSpiTest.java
===================================================================
RCS file:
/home/cvs/xml-security/src_unitTests/org/apache/xml/security/test/utils/resolver/ResourceResolverSpiTest.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- ResourceResolverSpiTest.java 11 Feb 2003 16:02:59 -0000 1.4
+++ ResourceResolverSpiTest.java 29 Apr 2003 21:37:00 -0000 1.5
@@ -78,10 +78,10 @@
*/
public class ResourceResolverSpiTest extends TestCase {
- /** [EMAIL PROTECTED] org.apache.log4j} logging facility */
- static org.apache.log4j.Category cat =
- org.apache.log4j.Category
- .getInstance(ResourceResolverSpiTest.class.getName());
+ /** [EMAIL PROTECTED] org.apache.commons.logging} logging facility */
+ static org.apache.commons.logging.Log log =
+ org.apache.commons.logging.LogFactory.getLog(
+ ResourceResolverSpiTest.class.getName());
/**
* Method suite