This is an automated email from the ASF dual-hosted git repository.

buhhunyx pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
     new 75fb6bb  cxf-rt-ws-security: fix PMD rule: UnusedAssignment
75fb6bb is described below

commit 75fb6bb56d82f72771a9ee6ecab5d36168303f51
Author: Alexey Markevich <[email protected]>
AuthorDate: Tue Mar 23 23:33:23 2021 +0300

    cxf-rt-ws-security: fix PMD rule: UnusedAssignment
---
 .../org/apache/cxf/js/rhino/ProviderFactory.java   |  8 +--
 .../saml/interceptor/WSS4JBasicAuthValidator.java  |  2 +-
 .../cxf/rt/security/saml/utils/SAMLUtils.java      |  8 +--
 .../saml/xacml2/DefaultXACMLRequestBuilder.java    |  4 +-
 .../KerberosTokenInterceptorProvider.java          |  2 +-
 .../security/policy/interceptors/STSInvoker.java   |  4 +-
 .../sts/provider/SecurityTokenServiceProvider.java |  2 +-
 .../cxf/ws/security/trust/AbstractSTSClient.java   |  2 +-
 .../ws/security/trust/DefaultSTSTokenCacher.java   |  2 +-
 .../cxf/ws/security/trust/STSLoginModule.java      |  2 +-
 .../ws/security/trust/STSStaxTokenValidator.java   | 11 ++--
 .../cxf/ws/security/trust/STSTokenValidator.java   |  2 +-
 .../org/apache/cxf/ws/security/trust/STSUtils.java |  5 +-
 .../delegation/WSSUsernameCallbackHandler.java     |  2 +-
 .../security/wss4j/AbstractTokenInterceptor.java   |  2 +-
 ...ractUsernameTokenAuthenticatingInterceptor.java |  2 +-
 .../wss4j/AbstractWSS4JStaxInterceptor.java        |  2 +-
 .../ws/security/wss4j/CryptoCoverageChecker.java   |  5 +-
 .../wss4j/PolicyBasedWSS4JInInterceptor.java       |  6 +--
 .../wss4j/PolicyBasedWSS4JOutInterceptor.java      |  2 +-
 .../wss4j/PolicyBasedWSS4JStaxInInterceptor.java   |  6 +--
 .../wss4j/PolicyBasedWSS4JStaxOutInterceptor.java  |  6 +--
 .../wss4j/StaxSecurityContextInInterceptor.java    |  4 +-
 .../cxf/ws/security/wss4j/StaxSerializer.java      |  9 ++--
 .../security/wss4j/UsernameTokenInterceptor.java   |  2 +-
 .../cxf/ws/security/wss4j/WSS4JInInterceptor.java  |  7 +--
 .../cxf/ws/security/wss4j/WSS4JOutInterceptor.java |  7 ++-
 .../apache/cxf/ws/security/wss4j/WSS4JUtils.java   |  6 +--
 .../policyhandlers/AbstractBindingBuilder.java     | 10 ++--
 .../policyhandlers/AsymmetricBindingHandler.java   |  6 +--
 .../StaxAsymmetricBindingHandler.java              |  4 +-
 .../StaxSymmetricBindingHandler.java               |  4 +-
 .../policyhandlers/SymmetricBindingHandler.java    | 18 +++----
 .../policyhandlers/TransportBindingHandler.java    |  2 +-
 .../AbstractSupportingTokenPolicyValidator.java    |  4 +-
 .../security/wss4j/SignatureConfirmationTest.java  |  4 +-
 .../cxf/ws/security/wss4j/WSS4JFaultCodeTest.java  |  8 +--
 .../cxf/ws/security/wss4j/WSS4JInOutTest.java      |  4 +-
 .../cxf/ws/security/wss4j/saml/SamlTokenTest.java  | 58 +++++++++++-----------
 39 files changed, 114 insertions(+), 130 deletions(-)

diff --git 
a/rt/frontend/js/src/main/java/org/apache/cxf/js/rhino/ProviderFactory.java 
b/rt/frontend/js/src/main/java/org/apache/cxf/js/rhino/ProviderFactory.java
index a1068bf..1f15685 100644
--- a/rt/frontend/js/src/main/java/org/apache/cxf/js/rhino/ProviderFactory.java
+++ b/rt/frontend/js/src/main/java/org/apache/cxf/js/rhino/ProviderFactory.java
@@ -75,12 +75,8 @@ public class ProviderFactory {
         boolean isE4X = f.getName().endsWith(".jsx");
         StringBuilder sb = new StringBuilder();
         try (BufferedReader bufrd = new BufferedReader(new FileReader(f))) {
-            String line = null;
-            for (;;) {
-                line = bufrd.readLine();
-                if (line == null) {
-                    break;
-                }
+            String line;
+            while (null != (line = bufrd.readLine())) {
                 sb.append(line).append('\n');
             }
         }
diff --git 
a/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/interceptor/WSS4JBasicAuthValidator.java
 
b/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/interceptor/WSS4JBasicAuthValidator.java
index 77f4413..dfefd99 100644
--- 
a/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/interceptor/WSS4JBasicAuthValidator.java
+++ 
b/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/interceptor/WSS4JBasicAuthValidator.java
@@ -83,7 +83,7 @@ public abstract class WSS4JBasicAuthValidator {
         credential = getValidator().validate(credential, data);
 
         // Create a Principal/SecurityContext
-        SecurityContext sc = null;
+        final SecurityContext sc;
         if (credential != null && credential.getPrincipal() != null) {
             sc = createSecurityContext(message, credential);
         } else {
diff --git 
a/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/utils/SAMLUtils.java
 
b/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/utils/SAMLUtils.java
index 692d075..27354cf6 100644
--- 
a/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/utils/SAMLUtils.java
+++ 
b/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/utils/SAMLUtils.java
@@ -109,10 +109,10 @@ public final class SAMLUtils {
         String name,
         String nameFormat
     ) {
-        String roleAttributeName = name;
-        if (roleAttributeName == null) {
-            roleAttributeName = SAMLClaim.SAML_ROLE_ATTRIBUTENAME_DEFAULT;
-        }
+//        String roleAttributeName = name;
+//        if (roleAttributeName == null) {
+//            roleAttributeName = SAMLClaim.SAML_ROLE_ATTRIBUTENAME_DEFAULT;
+//        }
 
         Set<Principal> roles = new HashSet<>();
 
diff --git 
a/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/xacml2/DefaultXACMLRequestBuilder.java
 
b/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/xacml2/DefaultXACMLRequestBuilder.java
index 1fa959c..407c877 100644
--- 
a/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/xacml2/DefaultXACMLRequestBuilder.java
+++ 
b/rt/security-saml/src/main/java/org/apache/cxf/rt/security/saml/xacml2/DefaultXACMLRequestBuilder.java
@@ -86,14 +86,14 @@ public class DefaultXACMLRequestBuilder implements 
XACMLRequestBuilder {
         List<AttributeType> attributes = new ArrayList<>();
 
         // Resource-id
-        String resourceId = null;
+        String resourceId;
         boolean isSoapService = messageParser.isSOAPService();
         if (isSoapService) {
             QName serviceName = messageParser.getWSDLService();
             QName operationName = messageParser.getWSDLOperation();
 
             if (serviceName != null) {
-                resourceId = serviceName.toString() + "#";
+                resourceId = serviceName.toString() + '#';
                 if (serviceName.getNamespaceURI() != null
                     && 
serviceName.getNamespaceURI().equals(operationName.getNamespaceURI())) {
                     resourceId += operationName.getLocalPart();
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java
index 8d49175..a1c546c 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java
@@ -116,7 +116,7 @@ public class KerberosTokenInterceptorProvider extends 
AbstractPolicyInterceptorP
                     return;
                 }
                 if (isRequestor(message)) {
-                    SecurityToken tok = null;
+                    final SecurityToken tok;
                     try {
                         KerberosClient client = 
KerberosUtils.getClient(message, "kerberos");
                         synchronized (client) {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/STSInvoker.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/STSInvoker.java
index 82f431d..6dd0903 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/STSInvoker.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/STSInvoker.java
@@ -78,7 +78,7 @@ abstract class STSInvoker implements Invoker {
         MessageContentsList lst = (MessageContentsList)o;
         DOMSource src = (DOMSource)lst.get(0);
         Node nd = src.getNode();
-        Element requestEl = null;
+        final Element requestEl;
         if (nd instanceof Document) {
             requestEl = ((Document)nd).getDocumentElement();
         } else {
@@ -204,7 +204,7 @@ abstract class STSInvoker implements Invoker {
         byte[] clientEntropy,
         int keySize
     ) throws NoSuchAlgorithmException, WSSecurityException, XMLStreamException 
{
-        byte[] secret = null;
+        final byte[] secret;
         writer.writeStartElement(prefix, "RequestedProofToken", namespace);
         if (clientEntropy == null) {
             secret = WSSecurityUtil.generateNonce(keySize / 8);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/sts/provider/SecurityTokenServiceProvider.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/sts/provider/SecurityTokenServiceProvider.java
index 6bdfcf1..3f618ab 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/sts/provider/SecurityTokenServiceProvider.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/sts/provider/SecurityTokenServiceProvider.java
@@ -212,7 +212,7 @@ public class SecurityTokenServiceProvider implements 
Provider<Source> {
 
 
     public Source invoke(Source request) {
-        Source response = null;
+        final Source response;
         try {
             Object obj = convertToJAXBObject(request);
             Object operationImpl = null;
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/AbstractSTSClient.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/AbstractSTSClient.java
index 11d38f8..89ab2d4 100755
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/AbstractSTSClient.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/AbstractSTSClient.java
@@ -1333,7 +1333,7 @@ public abstract class AbstractSTSClient implements 
Configurable, InterceptorProv
         writer.writeEndElement();
 
         writer.writeStartElement("wst", "CancelTarget", namespace);
-        Element el = null;
+        Element el;
         if (attachTokenDirectly) {
             el = token.getToken();
         } else {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/DefaultSTSTokenCacher.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/DefaultSTSTokenCacher.java
index cc3acc6..2e47098 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/DefaultSTSTokenCacher.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/DefaultSTSTokenCacher.java
@@ -41,7 +41,7 @@ import org.apache.wss4j.common.util.XMLUtils;
 public class DefaultSTSTokenCacher implements STSTokenCacher {
 
     public SecurityToken retrieveToken(Message message, boolean 
retrieveTokenFromEndpoint) throws TokenStoreException {
-        SecurityToken tok = null;
+        SecurityToken tok;
         if (retrieveTokenFromEndpoint) {
             tok = 
(SecurityToken)message.getContextualProperty(SecurityConstants.TOKEN);
             if (tok == null) {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSLoginModule.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSLoginModule.java
index 205803c..d11f4a5 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSLoginModule.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSLoginModule.java
@@ -276,7 +276,7 @@ public class STSLoginModule implements LoginModule {
     }
 
     private STSClient configureSTSClient(Message msg) throws BusException, 
EndpointException {
-        STSClient c = null;
+        final STSClient c;
         if (cxfSpringCfg != null) {
             SpringBusFactory bf = new SpringBusFactory();
             URL busFile = Loader.getResource(cxfSpringCfg);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java
index 57429e2..24e241d 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java
@@ -429,7 +429,7 @@ public class STSStaxTokenValidator
                         new 
Object[]{binarySecurityTokenType.getEncodingType()});
             }
 
-            byte[] securityTokenData = null;
+            final byte[] securityTokenData;
             try {
                 securityTokenData =
                     getBinarySecurityTokenBytes(binarySecurityTokenType, 
tokenContext.getWssSecurityProperties());
@@ -450,7 +450,6 @@ public class STSStaxTokenValidator
             final boolean stsValidated = valid;
 
             try {
-                final byte[] bytes = securityTokenData;
                 if 
(WSSConstants.NS_X509_V3_TYPE.equals(binarySecurityTokenType.getValueType())) {
                     Crypto crypto = 
getCrypto(tokenContext.getWssSecurityProperties());
                     X509V3SecurityTokenImpl x509V3SecurityToken = new 
X509V3SecurityTokenImpl(
@@ -471,7 +470,7 @@ public class STSStaxTokenValidator
                                 super.verify();
                             } catch (XMLSecurityException ex) {
                                 Element tokenElement =
-                                    convertToDOM(binarySecurityTokenType, 
bytes);
+                                    convertToDOM(binarySecurityTokenType, 
securityTokenData);
                                 validateTokenToSTS(tokenElement, message);
                             }
                         }
@@ -500,7 +499,7 @@ public class STSStaxTokenValidator
                                     super.verify();
                                 } catch (XMLSecurityException ex) {
                                     Element tokenElement =
-                                        convertToDOM(binarySecurityTokenType, 
bytes);
+                                        convertToDOM(binarySecurityTokenType, 
securityTokenData);
                                     validateTokenToSTS(tokenElement, message);
                                 }
                             }
@@ -527,7 +526,7 @@ public class STSStaxTokenValidator
                                     super.verify();
                                 } catch (XMLSecurityException ex) {
                                     Element tokenElement =
-                                        convertToDOM(binarySecurityTokenType, 
bytes);
+                                        convertToDOM(binarySecurityTokenType, 
securityTokenData);
                                     validateTokenToSTS(tokenElement, message);
                                 }
                             }
@@ -577,7 +576,7 @@ public class STSStaxTokenValidator
             byte[] securityTokenData
         ) throws WSSecurityException {
             Document doc = DOMUtils.getEmptyDocument();
-            BinarySecurity binarySecurity = null;
+            final BinarySecurity binarySecurity;
             if 
(WSSConstants.NS_X509_V3_TYPE.equals(binarySecurityTokenType.getValueType())) {
                 binarySecurity = new X509Security(doc);
             } else if 
(WSSConstants.NS_X509_PKIPATH_V1.equals(binarySecurityTokenType.getValueType()))
 {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSTokenValidator.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSTokenValidator.java
index e1b4e3e..df76fb0 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSTokenValidator.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSTokenValidator.java
@@ -132,7 +132,7 @@ public class STSTokenValidator implements Validator {
             synchronized (c) {
                 System.setProperty("noprint", "true");
 
-                SecurityToken returnedToken = null;
+                final SecurityToken returnedToken;
 
                 if (useIssueBinding && useOnBehalfOf) {
                     ElementCallbackHandler callbackHandler = new 
ElementCallbackHandler(tokenElement);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSUtils.java 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSUtils.java
index 34540bd..abaf3eb 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSUtils.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSUtils.java
@@ -138,7 +138,7 @@ public final class STSUtils {
         // Only parse the EPR if we really have to
         if (issuer != null
             && (preferWSMex || client.getLocation() == null && 
client.getWsdlLocation() == null)) {
-            EndpointReferenceType epr = null;
+            final EndpointReferenceType epr;
             try {
                 epr = VersionTransformer.parseEndpointReference(issuer);
             } catch (JAXBException e) {
@@ -308,7 +308,6 @@ public final class STSUtils {
                                              boolean sc) throws BusException, 
EndpointException {
         //CHECKSTYLE:ON
 
-        Service service = null;
         String ns = namespace + "/wsdl";
         ServiceInfo si = new ServiceInfo();
 
@@ -321,7 +320,7 @@ public final class STSUtils {
         OperationInfo roi = addRenewOperation(ii, namespace, ns);
 
         si.setInterface(ii);
-        service = new ServiceImpl(si);
+        Service service = new ServiceImpl(si);
 
         BindingFactoryManager bfm = 
bus.getExtension(BindingFactoryManager.class);
         BindingFactory bindingFactory = bfm.getBindingFactory(soapVersion);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/delegation/WSSUsernameCallbackHandler.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/delegation/WSSUsernameCallbackHandler.java
index 2ea8b81..063e32f 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/delegation/WSSUsernameCallbackHandler.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/delegation/WSSUsernameCallbackHandler.java
@@ -52,7 +52,7 @@ public class WSSUsernameCallbackHandler implements 
CallbackHandler {
                     
(String)SecurityUtils.getSecurityPropertyValue(SecurityConstants.USERNAME, 
message);
                 if (username != null) {
                     Node contentNode = message.getContent(Node.class);
-                    Document doc = null;
+                    final Document doc;
                     if (contentNode != null) {
                         doc = contentNode.getOwnerDocument();
                     } else {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
index b39c84a..3a563a7 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
@@ -180,7 +180,7 @@ public abstract class AbstractTokenInterceptor extends 
AbstractSoapInterceptor {
     protected String getPassword(String userName, AbstractToken info,
                                  int usage, SoapMessage message) {
         //Then try to get the password from the given callback handler
-        CallbackHandler handler = null;
+        final CallbackHandler handler;
         try {
             Object o = 
SecurityUtils.getSecurityPropertyValue(SecurityConstants.CALLBACK_HANDLER, 
message);
             handler = SecurityUtils.getCallbackHandler(o);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractUsernameTokenAuthenticatingInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractUsernameTokenAuthenticatingInterceptor.java
index e0bed7b..af3f4fb 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractUsernameTokenAuthenticatingInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractUsernameTokenAuthenticatingInterceptor.java
@@ -156,7 +156,7 @@ public abstract class 
AbstractUsernameTokenAuthenticatingInterceptor extends WSS
         if (msg == null) {
             throw new IllegalStateException("Current message is not 
available");
         }
-        Subject subject = null;
+        final Subject subject;
         try {
             subject = createSubject(name, password, isDigest, nonce, created);
         } catch (Exception ex) {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JStaxInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JStaxInterceptor.java
index 585e908..092ee7f 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JStaxInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JStaxInterceptor.java
@@ -204,7 +204,7 @@ public abstract class AbstractWSS4JStaxInterceptor 
implements SoapInterceptor,
         SoapMessage soapMessage, WSSSecurityProperties securityProperties
     ) throws WSSecurityException {
         Object o = 
SecurityUtils.getSecurityPropertyValue(SecurityConstants.CALLBACK_HANDLER, 
soapMessage);
-        CallbackHandler callbackHandler = null;
+        CallbackHandler callbackHandler;
         try {
             callbackHandler = SecurityUtils.getCallbackHandler(o);
         } catch (Exception ex) {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/CryptoCoverageChecker.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/CryptoCoverageChecker.java
index a7331f5..e3b1b80 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/CryptoCoverageChecker.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/CryptoCoverageChecker.java
@@ -121,15 +121,14 @@ public class CryptoCoverageChecker extends 
AbstractSoapInterceptor {
             throw new SoapFault("Error obtaining SOAP document", 
Fault.FAULT_CODE_CLIENT);
         }
 
-        Element documentElement = null;
+        final Element documentElement;
         try {
             SOAPMessage saajDoc = message.getContent(SOAPMessage.class);
             SOAPEnvelope envelope = saajDoc.getSOAPPart().getEnvelope();
             if (!checkFaults && envelope.getBody().hasFault()) {
                 return;
             }
-            documentElement = envelope;
-            documentElement = (Element)DOMUtils.getDomElement(documentElement);
+            documentElement = (Element)DOMUtils.getDomElement(envelope);
         } catch (SOAPException e) {
             throw new SoapFault("Error obtaining SOAP document", 
Fault.FAULT_CODE_CLIENT);
         }
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
index 640165e..74e97ca 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
@@ -202,7 +202,7 @@ public class PolicyBasedWSS4JInInterceptor extends 
WSS4JInInterceptor {
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, data);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
@@ -243,7 +243,7 @@ public class PolicyBasedWSS4JInInterceptor extends 
WSS4JInInterceptor {
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, data);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
@@ -352,7 +352,7 @@ public class PolicyBasedWSS4JInInterceptor extends 
WSS4JInInterceptor {
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, data);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JOutInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JOutInterceptor.java
index 520bb23..34f269c 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JOutInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JOutInterceptor.java
@@ -140,7 +140,7 @@ public class PolicyBasedWSS4JOutInterceptor extends 
AbstractPhaseInterceptor<Soa
 
             if (binding != null) {
                 WSSecHeader secHeader = new WSSecHeader(actor, mustUnderstand, 
saaj.getSOAPPart());
-                Element el = null;
+                final Element el;
                 try {
                     el = secHeader.insertSecurityHeader();
                 } catch (WSSecurityException e) {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java
index b321e5b..7a8b582 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java
@@ -104,7 +104,7 @@ public class PolicyBasedWSS4JStaxInInterceptor extends 
WSS4JStaxInInterceptor {
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, 
securityProperties);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
@@ -161,7 +161,7 @@ public class PolicyBasedWSS4JStaxInInterceptor extends 
WSS4JStaxInInterceptor {
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, 
securityProperties);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
@@ -209,7 +209,7 @@ public class PolicyBasedWSS4JStaxInInterceptor extends 
WSS4JStaxInInterceptor {
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, 
securityProperties);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxOutInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxOutInterceptor.java
index a30ef1f..af39f04 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxOutInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxOutInterceptor.java
@@ -71,7 +71,7 @@ public class PolicyBasedWSS4JStaxOutInterceptor extends 
WSS4JStaxOutInterceptor
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, 
securityProperties);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
@@ -102,7 +102,7 @@ public class PolicyBasedWSS4JStaxOutInterceptor extends 
WSS4JStaxOutInterceptor
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, 
securityProperties);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
@@ -133,7 +133,7 @@ public class PolicyBasedWSS4JStaxOutInterceptor extends 
WSS4JStaxOutInterceptor
         }
 
         Crypto encrCrypto = getEncryptionCrypto(e, message, 
securityProperties);
-        Crypto signCrypto = null;
+        final Crypto signCrypto;
         if (e != null && e.equals(s)) {
             signCrypto = encrCrypto;
         } else {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java
index 4752198..c341230 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java
@@ -129,8 +129,6 @@ public class StaxSecurityContextInInterceptor extends 
AbstractPhaseInterceptor<S
                     break;
                 } else if (p != null) {
 
-                    Object receivedAssertion = null;
-
                     if (desiredEvent == WSSecurityEventConstants.SAML_TOKEN) {
                         String roleAttributeName = 
(String)SecurityUtils.getSecurityPropertyValue(
                                 SecurityConstants.SAML_ROLE_ATTRIBUTENAME, 
msg);
@@ -138,7 +136,7 @@ public class StaxSecurityContextInInterceptor extends 
AbstractPhaseInterceptor<S
                             roleAttributeName = 
SAML_ROLE_ATTRIBUTENAME_DEFAULT;
                         }
 
-                        receivedAssertion = 
((SAMLTokenPrincipal)token.getPrincipal()).getToken();
+                        Object receivedAssertion = 
((SAMLTokenPrincipal)token.getPrincipal()).getToken();
                         if (receivedAssertion != null) {
                             ClaimCollection claims =
                                 
SAMLUtils.getClaims((SamlAssertionWrapper)receivedAssertion);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSerializer.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSerializer.java
index 57248fe..8f3b312 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSerializer.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSerializer.java
@@ -223,14 +223,13 @@ public class StaxSerializer extends AbstractSerializer {
     }
 
     private Node deserialize(Node ctx, XMLStreamReader reader, boolean 
wrapped) throws XMLEncryptionException {
-        Document contextDocument = null;
+        final Document contextDocument;
         if (Node.DOCUMENT_NODE == ctx.getNodeType()) {
             contextDocument = (Document)ctx;
         } else {
             contextDocument = ctx.getOwnerDocument();
         }
 
-        XMLStreamWriter writer = null;
         try {
             if (ctx instanceof SOAPElement) {
                 SOAPElement el = (SOAPElement)ctx;
@@ -240,19 +239,19 @@ public class StaxSerializer extends AbstractSerializer {
                 //cannot load into fragment due to a ClassCastException within 
SAAJ addChildElement
                 //which only checks for Document as parent, not 
DocumentFragment
                 Element element = 
ctx.getOwnerDocument().createElementNS("dummy", "dummy");
-                writer = new SAAJStreamWriter((SOAPEnvelope)el, element);
+                XMLStreamWriter writer = new 
SAAJStreamWriter((SOAPEnvelope)el, element);
                 return appendNewChild(reader, wrapped, contextDocument, 
writer, element);
             }
             if (DOMUtils.isJava9SAAJ()) {
                 //cannot load into fragment due to a ClassCastException within 
SAAJ addChildElement
                 //which only checks for Document as parent, not 
DocumentFragment
                 Element element = 
ctx.getOwnerDocument().createElementNS("dummy", "dummy");
-                writer = new OverlayW3CDOMStreamWriter(ctx.getOwnerDocument(), 
element);
+                XMLStreamWriter writer = new 
OverlayW3CDOMStreamWriter(ctx.getOwnerDocument(), element);
                 return appendNewChild(reader, wrapped, contextDocument, 
writer, element);
             }
             // Import to a dummy fragment
             DocumentFragment dummyFragment = 
contextDocument.createDocumentFragment();
-            writer = StaxUtils.createXMLStreamWriter(new 
DOMResult(dummyFragment));
+            XMLStreamWriter writer = StaxUtils.createXMLStreamWriter(new 
DOMResult(dummyFragment));
             StaxUtils.copy(reader, writer);
 
             // Remove the "dummy" wrapper
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/UsernameTokenInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/UsernameTokenInterceptor.java
index c5b4e28..bd3f303 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/UsernameTokenInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/UsernameTokenInterceptor.java
@@ -101,7 +101,7 @@ public class UsernameTokenInterceptor extends 
AbstractTokenInterceptor {
                 try {
                     boolean bspCompliant = isWsiBSPCompliant(message);
                     boolean allowNSPasswdTypes = 
allowNamespaceQualifiedPWDTypes(message);
-                    Principal principal = null;
+                    Principal principal;
                     Subject subject = null;
                     Object transformedToken = null;
 
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JInInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JInInterceptor.java
index 5ea6209..25f1ef3 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JInInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JInInterceptor.java
@@ -384,8 +384,6 @@ public class WSS4JInInterceptor extends 
AbstractWSS4JInterceptor {
             throw new SoapFault(new Message("STAX_EX", LOG), e, 
version.getSender());
         } catch (SOAPException e) {
             throw new SoapFault(new Message("SAAJ_EX", LOG), e, 
version.getSender());
-        } finally {
-            reqData = null;
         }
     }
     private void importNewDomToSAAJ(SOAPMessage doc, Element elem,
@@ -405,9 +403,8 @@ public class WSS4JInInterceptor extends 
AbstractWSS4JInterceptor {
                     
getDocumentElement().getFirstChild().getNextSibling().getFirstChild();
             }
             if (document != null && node != null) {
-                Node newNode = null;
                 try {
-                    newNode = DOMUtils.getDomElement(document.importNode(node, 
true));
+                    Node newNode = 
DOMUtils.getDomElement(document.importNode(node, true));
                     
elem.getOwnerDocument().getDocumentElement().getFirstChild().
                         getNextSibling().replaceChild(newNode, node);
                     List<WSSecurityEngineResult> encryptResults = 
wsResult.getActionResults().get(WSConstants.ENCR);
@@ -638,7 +635,7 @@ public class WSS4JInInterceptor extends 
AbstractWSS4JInterceptor {
         Object o =
             
SecurityUtils.getSecurityPropertyValue(SecurityConstants.CALLBACK_HANDLER,
                                                    
(SoapMessage)reqData.getMsgContext());
-        CallbackHandler cbHandler = null;
+        CallbackHandler cbHandler;
         try {
             cbHandler = SecurityUtils.getCallbackHandler(o);
         } catch (Exception ex) {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JOutInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JOutInterceptor.java
index c052412..cd96fe5 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JOutInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JOutInterceptor.java
@@ -157,13 +157,14 @@ public class WSS4JOutInterceptor extends 
AbstractWSS4JInterceptor {
                 return;
             }
             SoapVersion version = mc.getVersion();
-            RequestData reqData = new RequestData();
 
             /*
              * The overall try, just to have a finally at the end to perform 
some
              * housekeeping.
              */
             try {
+                RequestData reqData = new RequestData();
+
                 WSSConfig config = WSSConfig.getNewInstance();
                 reqData.setWssConfig(config);
                 reqData.setEncryptionSerializer(new StaxSerializer());
@@ -272,8 +273,6 @@ public class WSS4JOutInterceptor extends 
AbstractWSS4JInterceptor {
             } catch (InvalidCanonicalizerException | WSSecurityException e) {
                 throw new SoapFault(new Message("SECURITY_FAILED", LOG), e, 
version
                         .getSender());
-            } finally {
-                reqData = null;
             }
         }
 
@@ -308,7 +307,7 @@ public class WSS4JOutInterceptor extends 
AbstractWSS4JInterceptor {
                 (Map<?, ?>)getProperty(mc, WSS4J_ACTION_MAP));
             if (actionMap != null && !actionMap.isEmpty()) {
                 for (Map.Entry<Integer, Object> entry : actionMap.entrySet()) {
-                    Class<?> removedAction = null;
+                    final Class<?> removedAction;
 
                     // Be defensive here since the cast above is slightly risky
                     // with the handler config options not being strongly 
typed.
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java
index 7e3851e..b2eda68 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java
@@ -139,7 +139,7 @@ public final class WSS4JUtils {
                     }
                     if (WSS4JCacheUtil.isEhCacheInstalled()) {
                         Bus bus = message.getExchange().getBus();
-                        Path diskstoreParent = null;
+                        final Path diskstoreParent;
                         try {
                             diskstoreParent = Files.createTempDirectory("cxf");
                         } catch (IOException ex) {
@@ -221,8 +221,8 @@ public final class WSS4JUtils {
     ) {
         SoapFault fault;
 
-        String errorMessage = null;
-        javax.xml.namespace.QName faultCode = null;
+        final String errorMessage;
+        final javax.xml.namespace.QName faultCode;
 
         boolean returnSecurityError =
             MessageUtils.getContextualBoolean(message, 
SecurityConstants.RETURN_SECURITY_ERROR, false);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java
index 7bda697..6d1010d 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java
@@ -586,7 +586,7 @@ public abstract class AbstractBindingBuilder extends 
AbstractCommonBindingHandle
         
sig.setSigCanonicalization(binding.getAlgorithmSuite().getC14n().getValue());
 
         Crypto crypto = secToken.getCrypto();
-        String uname = null;
+        final String uname;
         try {
             uname = crypto.getX509Identifier(secToken.getX509Certificate());
         } catch (WSSecurityException e1) {
@@ -798,7 +798,7 @@ public abstract class AbstractBindingBuilder extends 
AbstractCommonBindingHandle
             secRefSaml.setReference(ref);
         } else {
             Element keyId = doc.createElementNS(WSS4JConstants.WSSE_NS, 
"wsse:KeyIdentifier");
-            String valueType = null;
+            final String valueType;
             if (saml1) {
                 valueType = WSS4JConstants.WSS_SAML_KI_VALUE_TYPE;
                 secRefSaml.addTokenType(WSS4JConstants.WSS_SAML_TOKEN_TYPE);
@@ -1020,7 +1020,7 @@ public abstract class AbstractBindingBuilder extends 
AbstractCommonBindingHandle
     protected String getPassword(String userName, Assertion info, int usage) {
         //Then try to get the password from the given callback handler
         Object o = 
SecurityUtils.getSecurityPropertyValue(SecurityConstants.CALLBACK_HANDLER, 
message);
-        CallbackHandler handler = null;
+        final CallbackHandler handler;
         try {
             handler = SecurityUtils.getCallbackHandler(o);
             if (handler == null) {
@@ -1078,7 +1078,7 @@ public abstract class AbstractBindingBuilder extends 
AbstractCommonBindingHandle
         } else {
             //Add an id
             id = wssConfig.getIdAllocator().createId("_", element);
-            String pfx = null;
+            String pfx;
             try {
                 pfx = element.lookupPrefix(PolicyConstants.WSU_NAMESPACE_URI);
             } catch (Throwable t) {
@@ -1454,7 +1454,7 @@ public abstract class AbstractBindingBuilder extends 
AbstractCommonBindingHandle
 
                         if (!found.contains(el)) {
                             found.add(el);
-                            WSEncryptionPart part = null;
+                            final WSEncryptionPart part;
                             boolean saml1 = 
WSS4JConstants.SAML_NS.equals(el.getNamespaceURI())
                                 && "Assertion".equals(el.getLocalName());
                             boolean saml2 = 
WSS4JConstants.SAML2_NS.equals(el.getNamespaceURI())
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AsymmetricBindingHandler.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AsymmetricBindingHandler.java
index 9dc3043..a944b99 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AsymmetricBindingHandler.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AsymmetricBindingHandler.java
@@ -235,8 +235,8 @@ public class AsymmetricBindingHandler extends 
AbstractBindingBuilder {
             }
 
             if (encToken != null) {
-                WSSecBase encr = null;
                 if (encToken.getToken() != null && !enc.isEmpty()) {
+                    final WSSecBase encr;
                     if (encToken.getToken().getDerivedKeys() == 
DerivedKeys.RequireDerivedKeys) {
                         encr = doEncryptionDerived(encToken, enc);
                     } else {
@@ -342,7 +342,7 @@ public class AsymmetricBindingHandler extends 
AbstractBindingBuilder {
             unassertPolicy(encryptionToken, ex);
         }
 
-        List<WSEncryptionPart> encrParts = null;
+        final List<WSEncryptionPart> encrParts;
         try {
             encrParts = getEncryptedParts();
             //Signed parts are determined before encryption because encrypted 
signed headers
@@ -492,7 +492,7 @@ public class AsymmetricBindingHandler extends 
AbstractBindingBuilder {
 
             Crypto crypto = getEncryptionCrypto();
 
-            SecurityToken securityToken = null;
+            final SecurityToken securityToken;
             try {
                 securityToken = getSecurityToken();
                 if (!isRequestor() && securityToken != null
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java
index fd3c42a..59e8e0f 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java
@@ -276,8 +276,8 @@ public class StaxAsymmetricBindingHandler extends 
AbstractStaxBindingHandler {
                 }
             }
 
-            List<SecurePart> encrParts = null;
-            List<SecurePart> sigParts = null;
+            final List<SecurePart> encrParts;
+            final List<SecurePart> sigParts;
             try {
                 encrParts = getEncryptedParts();
                 //Signed parts are determined before encryption because 
encrypted signed headers
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java
index 5917b33..3ead191 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java
@@ -226,8 +226,8 @@ public class StaxSymmetricBindingHandler extends 
AbstractStaxBindingHandler {
                 storeSecurityToken(encryptionToken, tok);
             }
 
-            List<SecurePart> encrParts = null;
-            List<SecurePart> sigParts = null;
+            final List<SecurePart> encrParts;
+            final List<SecurePart> sigParts;
             try {
                 encrParts = getEncryptedParts();
                 //Signed parts are determined before encryption because 
encrypted signed headers
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java
index 0497f17..bd14ac7 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java
@@ -272,7 +272,7 @@ public class SymmetricBindingHandler extends 
AbstractBindingBuilder {
                     }
 
                     if (!secondEncrParts.isEmpty()) {
-                        Element secondRefList = null;
+                        final Element secondRefList;
 
                         if (encryptionToken.getDerivedKeys() == 
DerivedKeys.RequireDerivedKeys) {
                             secondRefList = 
((WSSecDKEncrypt)encr).encryptForExternalRef(null, secondEncrParts);
@@ -304,7 +304,6 @@ public class SymmetricBindingHandler extends 
AbstractBindingBuilder {
         assertTokenWrapper(sigAbstractTokenWrapper);
         AbstractToken sigToken = sigAbstractTokenWrapper.getToken();
         String sigTokId = null;
-        Element sigTokElem = null;
 
         try {
             SecurityToken sigTok = null;
@@ -348,11 +347,11 @@ public class SymmetricBindingHandler extends 
AbstractBindingBuilder {
             boolean tokIncluded = true;
             if (isTokenRequired(sigToken.getIncludeTokenType())) {
                 Element el = sigTok.getToken();
-                sigTokElem = cloneElement(el);
+                Element sigTokElem = cloneElement(el);
                 this.addEncryptedKeyElement(sigTokElem);
             } else if (isRequestor() && sigToken instanceof X509Token) {
                 Element el = sigTok.getToken();
-                sigTokElem = cloneElement(el);
+                Element sigTokElem = cloneElement(el);
                 this.addEncryptedKeyElement(sigTokElem);
             } else {
                 tokIncluded = false;
@@ -384,7 +383,7 @@ public class SymmetricBindingHandler extends 
AbstractBindingBuilder {
             //Encryption
             AbstractTokenWrapper encrAbstractTokenWrapper = 
getEncryptionToken();
             AbstractToken encrToken = encrAbstractTokenWrapper.getToken();
-            SecurityToken encrTok = null;
+            final SecurityToken encrTok;
             if (sigToken.equals(encrToken)) {
                 //Use the same token
                 encrTok = sigTok;
@@ -414,12 +413,12 @@ public class SymmetricBindingHandler extends 
AbstractBindingBuilder {
             }
 
             if (encrAbstractTokenWrapper.getToken() != null && !enc.isEmpty()) 
{
-                WSSecBase encr = null;
+                final WSSecBase encr;
                 if (encrAbstractTokenWrapper.getToken().getDerivedKeys() == 
DerivedKeys.RequireDerivedKeys) {
                     encr = doEncryptionDerived(encrAbstractTokenWrapper, 
encrTok, tokIncluded, enc, false);
                 } else {
                     byte[] ephemeralKey = encrTok.getSecret();
-                    SecretKey symmetricKey = null;
+                    final SecretKey symmetricKey;
                     String symEncAlgorithm = 
sbinding.getAlgorithmSuite().getAlgorithmSuiteType().getEncryption();
                     if (ephemeralKey != null) {
                         symmetricKey = 
KeyUtils.prepareSecretKey(symEncAlgorithm, ephemeralKey);
@@ -531,8 +530,7 @@ public class SymmetricBindingHandler extends 
AbstractBindingBuilder {
             dkEncr.setSymmetricEncAlgorithm(algType.getEncryption());
             dkEncr.setDerivedKeyLength(algType.getEncryptionDerivedKeyLength() 
/ 8);
             dkEncr.prepare(encrTok.getSecret());
-            Element encrDKTokenElem = null;
-            encrDKTokenElem = dkEncr.getdktElement();
+            Element encrDKTokenElem = dkEncr.getdktElement();
             addDerivedKeyElement(encrDKTokenElem);
 
             Element refList = dkEncr.encryptForExternalRef(null, encrParts);
@@ -925,7 +923,7 @@ public class SymmetricBindingHandler extends 
AbstractBindingBuilder {
         AlgorithmSuiteType algType = 
sbinding.getAlgorithmSuite().getAlgorithmSuiteType();
         sig.setDigestAlgo(algType.getDigest());
         
sig.setSigCanonicalization(sbinding.getAlgorithmSuite().getC14n().getValue());
-        Crypto crypto = null;
+        final Crypto crypto;
         if (sbinding.getProtectionToken() != null) {
             crypto = getEncryptionCrypto();
         } else {
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java
index f0fc873..2ff0b99 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java
@@ -577,7 +577,7 @@ public class TransportBindingHandler extends 
AbstractBindingBuilder {
                 sig.setCustomTokenValueType(tokenType);
             }
         }
-        Crypto crypto = null;
+        Crypto crypto;
         if (secTok.getSecret() == null) {
             sig.setX509Certificate(secTok.getX509Certificate());
 
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java
index ee03c6b..0fc0548 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java
@@ -647,7 +647,7 @@ public abstract class 
AbstractSupportingTokenPolicyValidator extends AbstractSec
 
         if (parts.isBody()) {
             SOAPMessage soapMessage = message.getContent(SOAPMessage.class);
-            Element soapBody = null;
+            final Element soapBody;
             try {
                 soapBody = soapMessage.getSOAPBody();
             } catch (SOAPException ex) {
@@ -662,7 +662,7 @@ public abstract class 
AbstractSupportingTokenPolicyValidator extends AbstractSec
 
         for (Header h : parts.getHeaders()) {
             SOAPMessage soapMessage = message.getContent(SOAPMessage.class);
-            Element soapHeader = null;
+            final Element soapHeader;
             try {
                 soapHeader = soapMessage.getSOAPHeader();
             } catch (SOAPException ex) {
diff --git 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/SignatureConfirmationTest.java
 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/SignatureConfirmationTest.java
index 1746449..b08a048 100644
--- 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/SignatureConfirmationTest.java
+++ 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/SignatureConfirmationTest.java
@@ -89,7 +89,7 @@ public class SignatureConfirmationTest extends 
AbstractSecurityTest {
         assertFalse(sigv.isEmpty());
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         WSS4JInInterceptor inHandler = new WSS4JInInterceptor();
 
@@ -139,7 +139,7 @@ public class SignatureConfirmationTest extends 
AbstractSecurityTest {
         // assertValid("//wsse:Security/wsse11:SignatureConfirmation", doc);
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         WSS4JInInterceptor inHandler = new WSS4JInInterceptor();
 
diff --git 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JFaultCodeTest.java
 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JFaultCodeTest.java
index c37fd11..8431d79 100644
--- 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JFaultCodeTest.java
+++ 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JFaultCodeTest.java
@@ -63,7 +63,7 @@ public class WSS4JFaultCodeTest extends AbstractSecurityTest {
         doc = saajMsg.getSOAPPart();
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         WSS4JInInterceptor inHandler = new WSS4JInInterceptor();
 
@@ -112,7 +112,7 @@ public class WSS4JFaultCodeTest extends 
AbstractSecurityTest {
         assertValid("//wsse:Security", doc);
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         WSS4JInInterceptor inHandler = new WSS4JInInterceptor();
 
@@ -161,7 +161,7 @@ public class WSS4JFaultCodeTest extends 
AbstractSecurityTest {
         assertValid("//wsse:Security", doc);
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         WSS4JInInterceptor inHandler = new WSS4JInInterceptor();
 
@@ -197,7 +197,7 @@ public class WSS4JFaultCodeTest extends 
AbstractSecurityTest {
         doc = saajMsg.getSOAPPart();
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         WSS4JInInterceptor inHandler = new WSS4JInInterceptor();
 
diff --git 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
index d029a6c..467c661 100644
--- 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
+++ 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
@@ -293,7 +293,7 @@ public class WSS4JInOutTest extends AbstractSecurityTest {
         assertValid("//wsse:Security/ds:Signature", doc);
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         final Map<String, Object> properties = new HashMap<>();
         properties.put(
@@ -341,7 +341,7 @@ public class WSS4JInOutTest extends AbstractSecurityTest {
         assertValid("//wsse:Security/ds:Signature", doc);
 
         byte[] docbytes = getMessageBytes(doc);
-        doc = StaxUtils.read(new ByteArrayInputStream(docbytes));
+        StaxUtils.read(new ByteArrayInputStream(docbytes));
 
         final Map<String, Object> properties = new HashMap<>();
         final Map<QName, Object> customMap = new HashMap<>();
diff --git 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
index 51a80d2..965660a 100644
--- 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
+++ 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
@@ -19,7 +19,7 @@
 package org.apache.cxf.ws.security.wss4j.saml;
 
 import java.io.ByteArrayInputStream;
-import java.util.ArrayList;
+import java.util.Arrays;
 import java.util.Collections;
 import java.util.HashMap;
 import java.util.List;
@@ -102,9 +102,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml1:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml1:Assertion");
 
         Map<String, String> inMessageProperties = new HashMap<>();
         if (allowUnsignedPrincipal) {
@@ -149,9 +149,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml1:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml1:Assertion");
 
         Map<String, String> inMessageProperties = new HashMap<>();
         Message message = makeInvocation(outProperties, xpaths, inProperties, 
inMessageProperties);
@@ -185,9 +185,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml2:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml2:Assertion");
 
         Map<String, String> inMessageProperties = new HashMap<>();
         
inMessageProperties.put(SecurityConstants.VALIDATE_SAML_SUBJECT_CONFIRMATION, 
"false");
@@ -227,9 +227,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml2:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml2:Assertion");
 
         Map<String, String> inMessageProperties = new HashMap<>();
         
inMessageProperties.put(SecurityConstants.VALIDATE_SAML_SUBJECT_CONFIRMATION, 
"false");
@@ -276,9 +276,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml1:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml1:Assertion");
 
         try {
             makeInvocation(outProperties, xpaths, inProperties, 
Collections.emptyMap());
@@ -332,9 +332,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml2:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml2:Assertion");
 
         try {
             makeInvocation(outProperties, xpaths, inProperties, 
Collections.emptyMap());
@@ -401,9 +401,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml2:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml2:Assertion");
 
         Map<String, String> inMessageProperties = new HashMap<>();
         
inMessageProperties.put(SecurityConstants.VALIDATE_SAML_SUBJECT_CONFIRMATION, 
"false");
@@ -459,9 +459,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml2:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml2:Assertion");
 
         Map<String, String> inMessageProperties = new HashMap<>();
         
inMessageProperties.put(SecurityConstants.VALIDATE_SAML_SUBJECT_CONFIRMATION, 
"false");
@@ -516,9 +516,9 @@ public class SamlTokenTest extends AbstractSecurityTest {
         customMap.put(WSConstants.SAML2_TOKEN, validator);
         inProperties.put(WSS4JInInterceptor.VALIDATOR_MAP, customMap);
 
-        List<String> xpaths = new ArrayList<>();
-        xpaths.add("//wsse:Security");
-        xpaths.add("//wsse:Security/saml1:Assertion");
+        List<String> xpaths = Arrays.asList(
+            "//wsse:Security",
+            "//wsse:Security/saml1:Assertion");
 
         Map<String, String> inMessageProperties = new HashMap<>();
         
inMessageProperties.put(SecurityConstants.VALIDATE_SAML_SUBJECT_CONFIRMATION, 
"false");
@@ -578,7 +578,7 @@ public class SamlTokenTest extends AbstractSecurityTest {
 
         DocumentBuilder db = dbf.newDocumentBuilder();
         db.setEntityResolver(new NullResolver());
-        doc = StaxUtils.read(db, reader, false);
+        StaxUtils.read(db, reader, false);
 
         WSS4JInInterceptor inHandler = new WSS4JInInterceptor(inProperties);
 

Reply via email to