Provides standards-based support for processing XML.
Implements a single-threaded XmlNameTable.
A unique identifier optimized for Guids.
Represents an attribute. Valid and default values for the attribute are defined in a document type definition (DTD) or schema.
Represents a collection of attributes that can be accessed by name or index.
Enables optimized strings to be managed in a dynamic way.
Enables using a dynamic dictionary to compress common strings that appear in a message and maintain state.
Represents a CDATA section.
Provides text manipulation methods that are used by several classes.
Represents the content of an XML comment.
Encodes and decodes XML names, and provides methods for converting between common language runtime types and XML Schema definition language (XSD) types. When converting data types, the values returned are locale-independent.
Allows structured data to be stored, retrieved, and manipulated through a relational DataSet.
Represents the XML declaration node <?xml version='1.0'...?>.
Implements a dictionary used to optimize Windows Communication Foundation (WCF)'s XML reader/writer implementations.
Contains configurable quota values for XmlDictionaryReaders.
Represents an entry stored in a XmlDictionary.
Represents an abstract class that Windows Communication Foundation (WCF) derives from XmlWriter to do serialization and deserialization.
Represents an XML document. You can use this class to load, validate, edit, add, and position XML in a document.
Represents a lightweight object that is useful for tree insert operations.
Represents the document type declaration.
Represents an element.
Represents an entity declaration, such as <!ENTITY... >.
Represents an entity reference node.
Returns detailed information about the last exception.
Defines the context for a set of XmlDocument objects.
Gets the node immediately preceding or following this node.
Represents a collection of nodes that can be accessed by name or index.
Resolves, adds, and removes namespaces to a collection and provides scope management for these namespaces.
Table of atomized string objects.
Represents a single node in the XML document.
Represents an ordered collection of nodes.
Represents a reader that provides fast, non-cached forward only access to XML data in an XmlNode.
Represents a notation declaration, such as <!NOTATION... >.
Provides all the context information required by the XmlReader to parse an XML fragment.
Represents a processing instruction, which XML defines to keep processor-specific information in the text of the document.
Represents an XML qualified name.
Represents a reader that provides fast, noncached, forward-only access to XML data.
Resolves external XML resources named by a Uniform Resource Identifier (URI).
Represents white space between markup in a mixed content node or white space within an xml:space= 'preserve' scope. This is also referred to as significant white space.
Represents the text content of an element or attribute.
Represents a reader that provides fast, non-cached, forward-only access to XML data.
Starting with the .NET Framework 2.0, we recommend that you use the XmlReader class instead.
Represents a writer that provides a fast, non-cached, forward-only way of generating streams or files containing XML data that conforms to the W3C Extensible Markup Language (XML) 1.0 and the Namespaces in XML recommendations.
Starting with the .NET Framework 2.0, we recommend that you use the XmlWriter class instead.
Resolves external XML resources named by a Uniform Resource Identifier (URI).
Represents a reader that provides document type definition (DTD), XML-Data Reduced (XDR) schema, and XML Schema definition language (XSD) validation.
Represents white space in element content.
Represents a writer that provides a fast, non-cached, forward-only way to generate streams or files that contain XML data.
The XmlXapResolver type is used to resolve resources in the Silverlight application's XAP package.
Represents an application resource stream resolver.
Contains properties and methods that when implemented by a XmlDictionaryWriter, allows processing of XML fragments.
Enables a class to return an XmlNode from the current context or position.
Represents an interface that can be implemented by classes providing streams.
Provides methods for reinitializing a binary reader to read a new document.
Specifies implementation requirements for XML binary writers that derive from this interface.
Provides an interface to enable a class to return line and position information.
Specifies implementation requirements for XML MTOM readers that derive from this interface.
When implemented by an MTOM writer, this interface ensures initialization for an MTOM writer.
Provides read-only access to a set of prefix and namespace mappings.
Specifies implementation requirements for XML text readers that derive from this interface.
Specifies implementation requirements for XML text writers that derive from this interface.
Specifies formatting options for the XmlTextWriter.
Specifies whether to remove duplicate namespace declarations in the XmlWriter.
Specifies how to handle line breaks.
Specifies the state of the reader.
Specifies the type of validation to perform.
Specifies how white space is handled.
Specifies the state of the XmlWriter.
Specifies how to treat the time value when converting between string and DateTime.
Enumerates the configurable quota values for XmlDictionaryReaders.
Defines the namespace scope.
Specifies the type of node change.
Describes the document order of a node compared to a second node.
Specifies the type of node.
Specifies the method used to serialize the XmlWriter output.
Specifies the current
Represents the XML type for the string. This allows the string to be read as a particular XML type, for example a CDATA section type.
The System.Xml namespace supports these standards:
XML namespaces, both stream-level and DOM
See the section Differences from the W3C specs for two cases in which the XML classes differ from the W3C recommendations.
.NET also provides other namespaces for XML-related operations. For a list, descriptions, and links, see System.Xml Namespaces.
Processing XML asynchronously
The System.Xml.XmlReader and System.Xml.XmlWriter classes include a number of asynchronous methods that are based on the asynchronous programming model. These methods can be identified by the string "Async" at the end of their names. With these methods, you can write asynchronous code that's similar to your synchronous code, and you can migrate your existing synchronous code to asynchronous code easily.
Use the asynchronous methods in apps where there is significant network stream latency. Avoid using the asynchronous APIs for memory stream or local file stream read/write operations. The input stream, XmlTextReader, and XmlTextWriter should support asynchronous operations as well. Otherwise, threads will still be blocked by I/O operations.
We don't recommend mixing synchronous and asynchronous function calls, because you might forget to use the
awaitkeyword or use a synchronous API where an asynchronous one is necessary.
If you forget to specify the
awaitkeyword when you call an asynchronous method, the results are non-deterministic: You might receive the result you expected or an exception.
When an XmlReader object is reading a large text node, it might cache only a partial text value and return the text node, so retrieving the XmlReader.Value property might be blocked by an I/O operation. Use the XmlReader.GetValueAsync method to get the text value in asynchronous mode, or use the XmlReader.ReadValueChunkAsync method to read a large text block in chunks.
Differences from the W3C specs
In two cases that involve constraints on model group schema components, the System.Xml namespace differs from the W3C recommendations.
Consistency in element declarations:
In some cases, when substitution groups are used, the System.Xml implementation does not satisfy the "Schema Component Constraint: Element Declarations Consistent," which is described in the Constraints on Model Group Schema Components section of the W3C spec.
For example, the following schema includes elements that have the same name but different types in the same content model, and substitution groups are used. This should cause an error, but System.Xml compiles and validates the schema without errors.
<?xml version="1.0" encoding="utf-8" ?> <xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified"> <xs:element name="e1" type="t1"/> <xs:complexType name="t1"/> <xs:element name="e2" type="t2" substitutionGroup="e1"/> <xs:complexType name="t2"> <xs:complexContent> <xs:extension base="t1"> </xs:extension> </xs:complexContent> </xs:complexType> <xs:complexType name="t3"> <xs:sequence> <xs:element ref="e1"/> <xs:element name="e2" type="xs:int"/> </xs:sequence> </xs:complexType> </xs:schema>
In this schema, type
t3 contains a sequence of elements. Because of the substitution, the reference to element
e1 from the sequence can result either in element
e1 of type
t1 or in element
e2 of type
t2. The latter case would result in a sequence of two
e2 elements, where one is of type
t2 and the other is of type
Unique particle attribution:
Under the following conditions, the System.Xml implementation does not satisfy the "Schema Component Constraint: Unique Particle Attribution," which is described in the Constraints on Model Group Schema Components section of the W3C spec.
One of the elements in the group references another element.
The referenced element is a head element of a substitution group.
The substitution group contains an element that has the same name as one of the elements in the group.
The cardinality of the element that references the substitution group head element and the element with the same name as a substitution group element is not fixed (minOccurs < maxOccurs).
The definition of the element that references the substitution group precedes the definition of the element with the same name as a substitution group element.
For example, in the schema below the content model is ambiguous and should cause a compilation error, but System.Xml compiles the schema without errors.
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified"> <xs:element name="e1" type="xs:int"/> <xs:element name="e2" type="xs:int" substitutionGroup="e1"/> <xs:complexType name="t3"> <xs:sequence> <xs:element ref="e1" minOccurs="0" maxOccurs="1"/> <xs:element name="e2" type="xs:int" minOccurs="0" maxOccurs="1"/> </xs:sequence> </xs:complexType> <xs:element name="e3" type="t3"/> </xs:schema>
If you try to validate the following XML against the schema above, the validation will fail with the following message: "The element 'e3' has invalid child element 'e2'." and an XmlSchemaValidationException exception will be thrown.
<e3> <e2>1</e2> <e2>2</e2> </e3>
To work around this problem, you can swap element declarations in the XSD document. For example:
<xs:sequence> <xs:element ref="e1" minOccurs="0" maxOccurs="1"/> <xs:element name="e2" type="xs:int" minOccurs="0" maxOccurs="1"/> </xs:sequence>
<xs:sequence> <xs:element name="e2" type="xs:int" minOccurs="0" maxOccurs="1"/> <xs:element ref="e1" minOccurs="0" maxOccurs="1"/> </xs:sequence>
Here's another example of the same issue:
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified"> <xs:element name="e1" type="xs:string"/> <xs:element name="e2" type="xs:string" substitutionGroup="e1"/> <xs:complexType name="t3"> <xs:sequence> <xs:element ref="e1" minOccurs="0" maxOccurs="1"/> <xs:element name="e2" type="xs:int" minOccurs="0" maxOccurs="1"/> </xs:sequence> </xs:complexType> <xs:element name="e3" type="t3"/> </xs:schema>
If you try to validate the following XML against the schema above, the validation will fail with the following exception: "Unhandled Exception: System.Xml.Schema.XmlSchemaValidationException: The 'e2' el element is invalid - The value 'abc' is invalid according to its datatype
'http://www.w3.org/2001/XMLSchema:int' - The string 'abc' is not a valid Int32 value."
Also note that when you use the System.Xml types and members, if the XML contains data that has potential privacy implications, you need to implement your app in a way that respects your end users' privacy.
Several XML technologies have the ability to retrieve other documents during processing. For example, a document type definition (DTD) can reside in the document being parsed. The DTD can also live in an external document that is referenced by the document being parsed. The XML Schema definition language (XSD) and XSLT technologies also have the ability to include information from other files. These external resources can present some security concerns. For example, you'll want to ensure that your app retrieves files only from trusted sites, and that the file it retrieves doesn't contain malicious data.
The XmlUrlResolver class is used to load XML documents and to resolve external resources such as entities, DTDs, or schemas, and import or include directives.
You can override this class and specify the XmlResolver object to use. Use the XmlSecureResolver class if you need to open a resource that you do not control, or that is untrusted. The XmlSecureResolver wraps an XmlResolver and allows you to restrict the resources that the underlying XmlResolver has access to.
Denial of service
The following scenarios are considered to be less vulnerable to denial of service attacks because the System.Xml classes provide a means of protection from such attacks.
Parsing text XML data.
Parsing binary XML data if the binary XML data was generated by Microsoft SQL Server.
Navigating the DOM object.
The following scenarios are not recommended if you are concerned about denial of service attacks, or if you are working in an untrusted environment.
Schema processing. This includes adding an untrusted schema to the schema collection, compiling an untrusted schema, and validating by using an untrusted schema.
Parsing any arbitrary stream of user supplied binary XML data.
DOM operations such as querying, editing, moving sub-trees between documents, and saving DOM objects.
If you are concerned about denial of service issues or if you are dealing with untrusted sources, do not enable DTD processing. This is disabled by default on XmlReader objects that the XmlReader.Create method creates.
If you have DTD processing enabled, you can use the XmlSecureResolver class to restrict the resources that the XmlReader can access. You can also design your app so that the XML processing is memory and time constrained. For example, you can configure timeout limits in your ASP.NET app.
Because XML documents can include references to other files, it is difficult to determine how much processing power is required to parse an XML document. For example, XML documents can include a DTD. If the DTD contains nested entities or complex content models, it could take an excessive amount of time to parse the document.
When using XmlReader, you can limit the size of the document that can be parsed by setting the XmlReaderSettings.MaxCharactersInDocument property. You can limit the number of characters that result from expanding entities by setting the XmlReaderSettings.MaxCharactersFromEntities property. See the appropriate reference topics for examples of setting these properties.
The XSD and XSLT technologies have additional capabilities that can affect processing performance. For example, it is possible to construct an XML schema that requires a substantial amount of time to process when evaluated over a relatively small document. It is also possible to embed script blocks within an XSLT style sheet. Both cases pose a potential security threat to your app.
When creating an app that uses the XslCompiledTransform class, you should be aware of the following items and their implications:
XSLT scripting is disabled by default. XSLT scripting should be enabled only if you require script support and you are working in a fully trusted environment.
document()function is disabled by default. If you enable the
document()function, restrict the resources that can be accessed by passing an XmlSecureResolver object to the XslCompiledTransform.Transform method.
XSLT style sheets can include references to other files and embedded script blocks. A malicious user can exploit this by supplying you with data or style sheets that, when executed, can cause your system to process until the computer runs low on resources.
XSLT apps that run in a mixed trust environment can result in style sheet spoofing. For example, a malicious user can load an object with a harmful style sheet and hand it off to another user who subsequently calls the XslCompiledTransform.Transform method and executes the transformation.
These security issues can be mitigated by not enabling scripting or the
document() function unless the style sheet comes from a trusted source, and by not accepting XslCompiledTransform objects, XSLT style sheets, or XML source data from an untrusted source.
Exceptions thrown by lower level components can disclose path information that you do not want exposed to the app. Your apps must catch exceptions and process them appropriately.