mirror of
https://github.com/vanitasvitae/Smack.git
synced 2024-11-24 21:12:05 +01:00
Improve TLS/SSL support
Add TLSUtils. Make it possible to set the enabled SSL/TLS protocols and ciphers and provide sane error reporting.
This commit is contained in:
parent
8cc2a76e7f
commit
8977f5b3f0
6 changed files with 274 additions and 23 deletions
|
@ -209,7 +209,7 @@ public abstract class AbstractXMPPConnection implements XMPPConnection {
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
private IOException connectionException;
|
private Exception connectionException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Flag that indicates if the user is currently authenticated with the server.
|
* Flag that indicates if the user is currently authenticated with the server.
|
||||||
|
@ -435,13 +435,19 @@ public abstract class AbstractXMPPConnection implements XMPPConnection {
|
||||||
return userJID;
|
return userJID;
|
||||||
}
|
}
|
||||||
|
|
||||||
protected void setConnectionException(IOException exception) {
|
protected void setConnectionException(Exception e) {
|
||||||
connectionException = exception;
|
connectionException = e;
|
||||||
}
|
}
|
||||||
|
|
||||||
protected void throwConnectionExceptionOrNoResponse() throws IOException, NoResponseException {
|
protected void throwConnectionExceptionOrNoResponse() throws IOException, NoResponseException, SmackException {
|
||||||
if (connectionException != null) {
|
if (connectionException != null) {
|
||||||
throw connectionException;
|
if (connectionException instanceof IOException) {
|
||||||
|
throw (IOException) connectionException;
|
||||||
|
} else if (connectionException instanceof SmackException) {
|
||||||
|
throw (SmackException) connectionException;
|
||||||
|
} else {
|
||||||
|
throw new SmackException(connectionException);
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
throw new NoResponseException();
|
throw new NoResponseException();
|
||||||
}
|
}
|
||||||
|
|
|
@ -80,6 +80,16 @@ public class ConnectionConfiguration implements Cloneable {
|
||||||
private boolean useDnsSrvRr = true;
|
private boolean useDnsSrvRr = true;
|
||||||
private SecurityMode securityMode = SecurityMode.enabled;
|
private SecurityMode securityMode = SecurityMode.enabled;
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
private String[] enabledSSLProtocols;
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
private String[] enabledSSLCiphers;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Permanent store for the Roster, needed for roster versioning
|
* Permanent store for the Roster, needed for roster versioning
|
||||||
*/
|
*/
|
||||||
|
@ -310,6 +320,42 @@ public class ConnectionConfiguration implements Cloneable {
|
||||||
this.customSSLContext = context;
|
this.customSSLContext = context;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the enabled SSL/TLS protocols.
|
||||||
|
*
|
||||||
|
* @param enabledSSLProtocols
|
||||||
|
*/
|
||||||
|
public void setEnabledSSLProtocols(String[] enabledSSLProtocols) {
|
||||||
|
this.enabledSSLProtocols = enabledSSLProtocols;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return the enabled SSL/TLS protocols.
|
||||||
|
*
|
||||||
|
* @return the enabled SSL/TLS protocols
|
||||||
|
*/
|
||||||
|
public String[] getEnabledSSLProtocols() {
|
||||||
|
return enabledSSLProtocols;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the enabled SSL/TLS ciphers.
|
||||||
|
*
|
||||||
|
* @param enabledSSLCiphers the enabled SSL/TLS ciphers
|
||||||
|
*/
|
||||||
|
public void setEnabledSSLCiphers(String[] enabledSSLCiphers) {
|
||||||
|
this.enabledSSLCiphers = enabledSSLCiphers;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return the enabled SSL/TLS ciphers.
|
||||||
|
*
|
||||||
|
* @return the enabled SSL/TLS ciphers
|
||||||
|
*/
|
||||||
|
public String[] getEnabledSSLCiphers() {
|
||||||
|
return enabledSSLCiphers;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns true if the connection is going to use stream compression. Stream compression
|
* Returns true if the connection is going to use stream compression. Stream compression
|
||||||
* will be requested after TLS was established (if TLS was enabled) and only if the server
|
* will be requested after TLS was established (if TLS was enabled) and only if the server
|
||||||
|
|
|
@ -122,6 +122,18 @@ public class SmackException extends Exception {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static class SecurityNotPossibleException extends SmackException {
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
private static final long serialVersionUID = -6836090872690331336L;
|
||||||
|
|
||||||
|
public SecurityNotPossibleException(String message) {
|
||||||
|
super(message);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
public static class ConnectionException extends SmackException {
|
public static class ConnectionException extends SmackException {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -20,6 +20,7 @@ package org.jivesoftware.smack.util;
|
||||||
import java.io.UnsupportedEncodingException;
|
import java.io.UnsupportedEncodingException;
|
||||||
import java.security.MessageDigest;
|
import java.security.MessageDigest;
|
||||||
import java.security.NoSuchAlgorithmException;
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.util.Collection;
|
||||||
import java.util.Random;
|
import java.util.Random;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
|
@ -536,4 +537,16 @@ public class StringUtils {
|
||||||
public static boolean isNullOrEmpty(CharSequence cs) {
|
public static boolean isNullOrEmpty(CharSequence cs) {
|
||||||
return cs == null || cs.length() == 0;
|
return cs == null || cs.length() == 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static String collectionToString(Collection<String> collection) {
|
||||||
|
StringBuilder sb = new StringBuilder();
|
||||||
|
for (String s : collection) {
|
||||||
|
sb.append(s);
|
||||||
|
sb.append(" ");
|
||||||
|
}
|
||||||
|
String res = sb.toString();
|
||||||
|
// Remove the trailing whitespace
|
||||||
|
res = res.substring(0, res.length() - 1);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,156 @@
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* Copyright 2014 Florian Schmaus
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.jivesoftware.smack.util;
|
||||||
|
|
||||||
|
import java.security.KeyManagementException;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.SecureRandom;
|
||||||
|
import java.security.cert.CertificateException;
|
||||||
|
import java.security.cert.X509Certificate;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import javax.net.ssl.SSLContext;
|
||||||
|
import javax.net.ssl.SSLSocket;
|
||||||
|
import javax.net.ssl.TrustManager;
|
||||||
|
import javax.net.ssl.X509TrustManager;
|
||||||
|
|
||||||
|
import org.jivesoftware.smack.ConnectionConfiguration;
|
||||||
|
import org.jivesoftware.smack.SmackException.SecurityNotPossibleException;
|
||||||
|
|
||||||
|
|
||||||
|
public class TLSUtils {
|
||||||
|
|
||||||
|
public static final String SSL = "SSL";
|
||||||
|
public static final String TLS = "TLS";
|
||||||
|
public static final String PROTO_SSL3 = SSL + "v3";
|
||||||
|
public static final String PROTO_TLSV1 = TLS + "v1";
|
||||||
|
public static final String PROTO_TLSV1_1 = TLS + "v1.1";
|
||||||
|
public static final String PROTO_TLSV1_2 = TLS + "v1.2";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Enable only TLS. Connections created with the given ConnectionConfiguration will only support TLS.
|
||||||
|
* <p>
|
||||||
|
* According to the <a
|
||||||
|
* href="https://raw.githubusercontent.com/stpeter/manifesto/master/manifesto.txt">Encrypted
|
||||||
|
* XMPP Manifesto</a>, TLSv1.2 shall be deployed, providing fallback support for SSLv3 and
|
||||||
|
* TLSv1.1. This method goes one step boyond and upgrades the handshake to use TLSv1 or better.
|
||||||
|
* This method requires the underlying OS to support all of TLSv1.2 , 1.1 and 1.0.
|
||||||
|
* </p>
|
||||||
|
*
|
||||||
|
* @param conf the configuration to apply this setting to
|
||||||
|
*/
|
||||||
|
public static void setTLSOnly(ConnectionConfiguration conf) {
|
||||||
|
conf.setEnabledSSLProtocols(new String[] { PROTO_TLSV1_2, PROTO_TLSV1_1, PROTO_TLSV1 });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Enable only TLS and SSLv3. Connections created with the given ConnectionConfiguration will
|
||||||
|
* only support TLS and SSLv3.
|
||||||
|
* <p>
|
||||||
|
* According to the <a
|
||||||
|
* href="https://raw.githubusercontent.com/stpeter/manifesto/master/manifesto.txt">Encrypted
|
||||||
|
* XMPP Manifesto</a>, TLSv1.2 shall be deployed, providing fallback support for SSLv3 and
|
||||||
|
* TLSv1.1.
|
||||||
|
* </p>
|
||||||
|
*
|
||||||
|
* @param conf the configuration to apply this setting to
|
||||||
|
*/
|
||||||
|
public static void setSSLv3AndTLSOnly(ConnectionConfiguration conf) {
|
||||||
|
conf.setEnabledSSLProtocols(new String[] { PROTO_TLSV1_2, PROTO_TLSV1_1, PROTO_TLSV1, PROTO_SSL3 });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Accept all SSL/TLS certificates.
|
||||||
|
* <p>
|
||||||
|
* <b>Warning</b> Use with care. Only use this method if you understand the implications.
|
||||||
|
* </p>
|
||||||
|
*
|
||||||
|
* @param conf
|
||||||
|
* @throws NoSuchAlgorithmException
|
||||||
|
* @throws KeyManagementException
|
||||||
|
*/
|
||||||
|
public static void acceptAllCertificates(ConnectionConfiguration conf) throws NoSuchAlgorithmException, KeyManagementException {
|
||||||
|
SSLContext context = SSLContext.getInstance(TLS);
|
||||||
|
context.init(null, new TrustManager[] { new AcceptAllTrustManager() }, new SecureRandom());
|
||||||
|
conf.setCustomSSLContext(context);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setEnabledProtocolsAndCiphers(final SSLSocket sslSocket,
|
||||||
|
String[] enabledProtocols, String[] enabledCiphers)
|
||||||
|
throws SecurityNotPossibleException {
|
||||||
|
if (enabledProtocols != null) {
|
||||||
|
Set<String> enabledProtocolsSet = new HashSet<String>(Arrays.asList(enabledProtocols));
|
||||||
|
Set<String> supportedProtocolsSet = new HashSet<String>(
|
||||||
|
Arrays.asList(sslSocket.getSupportedProtocols()));
|
||||||
|
Set<String> protocolsIntersection = new HashSet<String>(supportedProtocolsSet);
|
||||||
|
protocolsIntersection.retainAll(enabledProtocolsSet);
|
||||||
|
if (protocolsIntersection.isEmpty()) {
|
||||||
|
throw new SecurityNotPossibleException("Request to enable SSL/TLS protocols '"
|
||||||
|
+ StringUtils.collectionToString(enabledProtocolsSet)
|
||||||
|
+ "', but only '"
|
||||||
|
+ StringUtils.collectionToString(supportedProtocolsSet)
|
||||||
|
+ "' are supported.");
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the enabled protocols
|
||||||
|
enabledProtocols = new String[protocolsIntersection.size()];
|
||||||
|
enabledProtocols = protocolsIntersection.toArray(enabledProtocols);
|
||||||
|
sslSocket.setEnabledProtocols(enabledProtocols);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (enabledCiphers != null) {
|
||||||
|
Set<String> enabledCiphersSet = new HashSet<String>(Arrays.asList(enabledCiphers));
|
||||||
|
Set<String> supportedCiphersSet = new HashSet<String>(
|
||||||
|
Arrays.asList(sslSocket.getEnabledCipherSuites()));
|
||||||
|
Set<String> ciphersIntersection = new HashSet<String>(supportedCiphersSet);
|
||||||
|
ciphersIntersection.retainAll(enabledCiphersSet);
|
||||||
|
if (ciphersIntersection.isEmpty()) {
|
||||||
|
throw new SecurityNotPossibleException("Request to enable SSL/TLS ciphers '"
|
||||||
|
+ StringUtils.collectionToString(enabledCiphersSet)
|
||||||
|
+ "', but only '"
|
||||||
|
+ StringUtils.collectionToString(supportedCiphersSet)
|
||||||
|
+ "' are supported.");
|
||||||
|
}
|
||||||
|
|
||||||
|
enabledCiphers = new String[ciphersIntersection.size()];
|
||||||
|
enabledCiphers = ciphersIntersection.toArray(enabledCiphers);
|
||||||
|
sslSocket.setEnabledCipherSuites(enabledCiphers);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public static class AcceptAllTrustManager implements X509TrustManager {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void checkClientTrusted(X509Certificate[] arg0, String arg1)
|
||||||
|
throws CertificateException {
|
||||||
|
// Nothing to do here
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void checkServerTrusted(X509Certificate[] arg0, String arg1)
|
||||||
|
throws CertificateException {
|
||||||
|
// Nothing to do here
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public X509Certificate[] getAcceptedIssuers() {
|
||||||
|
throw new UnsupportedOperationException();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -23,9 +23,9 @@ import org.jivesoftware.smack.ConnectionListener;
|
||||||
import org.jivesoftware.smack.SmackConfiguration;
|
import org.jivesoftware.smack.SmackConfiguration;
|
||||||
import org.jivesoftware.smack.SmackException;
|
import org.jivesoftware.smack.SmackException;
|
||||||
import org.jivesoftware.smack.SmackException.AlreadyLoggedInException;
|
import org.jivesoftware.smack.SmackException.AlreadyLoggedInException;
|
||||||
import org.jivesoftware.smack.SmackException.NoResponseException;
|
|
||||||
import org.jivesoftware.smack.SmackException.NotConnectedException;
|
import org.jivesoftware.smack.SmackException.NotConnectedException;
|
||||||
import org.jivesoftware.smack.SmackException.ConnectionException;
|
import org.jivesoftware.smack.SmackException.ConnectionException;
|
||||||
|
import org.jivesoftware.smack.SmackException.SecurityNotPossibleException;
|
||||||
import org.jivesoftware.smack.SmackException.SecurityRequiredException;
|
import org.jivesoftware.smack.SmackException.SecurityRequiredException;
|
||||||
import org.jivesoftware.smack.XMPPException.StreamErrorException;
|
import org.jivesoftware.smack.XMPPException.StreamErrorException;
|
||||||
import org.jivesoftware.smack.XMPPConnection;
|
import org.jivesoftware.smack.XMPPConnection;
|
||||||
|
@ -41,6 +41,7 @@ import org.jivesoftware.smack.sasl.SASLMechanism.Success;
|
||||||
import org.jivesoftware.smack.util.ArrayBlockingQueueWithShutdown;
|
import org.jivesoftware.smack.util.ArrayBlockingQueueWithShutdown;
|
||||||
import org.jivesoftware.smack.util.PacketParserUtils;
|
import org.jivesoftware.smack.util.PacketParserUtils;
|
||||||
import org.jivesoftware.smack.util.StringUtils;
|
import org.jivesoftware.smack.util.StringUtils;
|
||||||
|
import org.jivesoftware.smack.util.TLSUtils;
|
||||||
import org.jivesoftware.smack.util.dns.HostAddress;
|
import org.jivesoftware.smack.util.dns.HostAddress;
|
||||||
import org.xmlpull.v1.XmlPullParser;
|
import org.xmlpull.v1.XmlPullParser;
|
||||||
import org.xmlpull.v1.XmlPullParserException;
|
import org.xmlpull.v1.XmlPullParserException;
|
||||||
|
@ -68,9 +69,15 @@ import java.io.UnsupportedEncodingException;
|
||||||
import java.io.Writer;
|
import java.io.Writer;
|
||||||
import java.lang.reflect.Constructor;
|
import java.lang.reflect.Constructor;
|
||||||
import java.net.Socket;
|
import java.net.Socket;
|
||||||
|
import java.security.KeyManagementException;
|
||||||
import java.security.KeyStore;
|
import java.security.KeyStore;
|
||||||
|
import java.security.KeyStoreException;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.NoSuchProviderException;
|
||||||
import java.security.Provider;
|
import java.security.Provider;
|
||||||
import java.security.Security;
|
import java.security.Security;
|
||||||
|
import java.security.UnrecoverableKeyException;
|
||||||
|
import java.security.cert.CertificateException;
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
import java.util.LinkedList;
|
import java.util.LinkedList;
|
||||||
|
@ -578,10 +585,18 @@ public class XMPPTCPConnection extends AbstractXMPPConnection {
|
||||||
* The server has indicated that TLS negotiation can start. We now need to secure the
|
* The server has indicated that TLS negotiation can start. We now need to secure the
|
||||||
* existing plain connection and perform a handshake. This method won't return until the
|
* existing plain connection and perform a handshake. This method won't return until the
|
||||||
* connection has finished the handshake or an error occurred while securing the connection.
|
* connection has finished the handshake or an error occurred while securing the connection.
|
||||||
|
* @throws IOException
|
||||||
|
* @throws CertificateException
|
||||||
|
* @throws NoSuchAlgorithmException
|
||||||
|
* @throws NoSuchProviderException
|
||||||
|
* @throws KeyStoreException
|
||||||
|
* @throws UnrecoverableKeyException
|
||||||
|
* @throws KeyManagementException
|
||||||
|
* @throws SecurityNotPossibleException
|
||||||
*
|
*
|
||||||
* @throws Exception if an exception occurs.
|
* @throws Exception if an exception occurs.
|
||||||
*/
|
*/
|
||||||
private void proceedTLSReceived() throws Exception {
|
private void proceedTLSReceived() throws NoSuchAlgorithmException, CertificateException, IOException, KeyStoreException, NoSuchProviderException, UnrecoverableKeyException, KeyManagementException, SecurityNotPossibleException {
|
||||||
SSLContext context = this.config.getCustomSSLContext();
|
SSLContext context = this.config.getCustomSSLContext();
|
||||||
KeyStore ks = null;
|
KeyStore ks = null;
|
||||||
KeyManager[] kms = null;
|
KeyManager[] kms = null;
|
||||||
|
@ -655,14 +670,12 @@ public class XMPPTCPConnection extends AbstractXMPPConnection {
|
||||||
// Initialize the reader and writer with the new secured version
|
// Initialize the reader and writer with the new secured version
|
||||||
initReaderAndWriter();
|
initReaderAndWriter();
|
||||||
|
|
||||||
try {
|
final SSLSocket sslSocket = (SSLSocket) socket;
|
||||||
// Proceed to do the handshake
|
TLSUtils.setEnabledProtocolsAndCiphers(sslSocket, config.getEnabledSSLProtocols(), config.getEnabledSSLCiphers());
|
||||||
((SSLSocket) socket).startHandshake();
|
|
||||||
}
|
// Proceed to do the handshake
|
||||||
catch (IOException e) {
|
sslSocket.startHandshake();
|
||||||
setConnectionException(e);
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
//if (((SSLSocket) socket).getWantClientAuth()) {
|
//if (((SSLSocket) socket).getWantClientAuth()) {
|
||||||
// System.err.println("XMPPConnection wants client auth");
|
// System.err.println("XMPPConnection wants client auth");
|
||||||
//}
|
//}
|
||||||
|
@ -907,11 +920,10 @@ public class XMPPTCPConnection extends AbstractXMPPConnection {
|
||||||
* has been established or if the server's features could not be parsed within
|
* has been established or if the server's features could not be parsed within
|
||||||
* the connection's PacketReplyTimeout.
|
* the connection's PacketReplyTimeout.
|
||||||
*
|
*
|
||||||
* @throws NoResponseException if the server fails to send an opening stream back
|
|
||||||
* within packetReplyTimeout.
|
|
||||||
* @throws IOException
|
* @throws IOException
|
||||||
|
* @throws SmackException
|
||||||
*/
|
*/
|
||||||
synchronized void startup() throws NoResponseException, IOException {
|
synchronized void startup() throws IOException, SmackException {
|
||||||
readerThread.start();
|
readerThread.start();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
|
@ -1006,11 +1018,17 @@ public class XMPPTCPConnection extends AbstractXMPPConnection {
|
||||||
parseFeatures(parser);
|
parseFeatures(parser);
|
||||||
}
|
}
|
||||||
else if (name.equals("proceed")) {
|
else if (name.equals("proceed")) {
|
||||||
// Secure the connection by negotiating TLS
|
try {
|
||||||
proceedTLSReceived();
|
// Secure the connection by negotiating TLS
|
||||||
// Reset the state of the parser since a new stream element is going
|
proceedTLSReceived();
|
||||||
// to be sent by the server
|
// Reset the state of the parser since a new stream element is going
|
||||||
resetParser();
|
// to be sent by the server
|
||||||
|
resetParser();
|
||||||
|
}
|
||||||
|
catch (Exception e) {
|
||||||
|
setConnectionException(e);
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
else if (name.equals("failure")) {
|
else if (name.equals("failure")) {
|
||||||
String namespace = parser.getNamespace(null);
|
String namespace = parser.getNamespace(null);
|
||||||
|
|
Loading…
Reference in a new issue