#endif\r
Category& log=Category::getInstance(XMLTOOLING_LOGCAT".KeyResolver");\r
\r
+ if (!keyInfo)\r
+ return NULL;\r
+\r
// Check for ds:X509Data\r
const vector<X509Data*>& x509Datas=keyInfo->getX509Datas();\r
for (vector<X509Data*>::const_iterator j=x509Datas.begin(); j!=x509Datas.end(); ++j) {\r
#endif\r
Category& log=Category::getInstance(XMLTOOLING_LOGCAT".KeyResolver");\r
\r
+ if (!keyInfo)\r
+ return 0;\r
+\r
// Check for ds:X509Data\r
const vector<X509Data*>& x509Datas=keyInfo->getX509Datas();\r
for (vector<X509Data*>::const_iterator j=x509Datas.begin(); certs.empty() && j!=x509Datas.end(); ++j) {\r
#endif\r
Category& log=Category::getInstance(XMLTOOLING_LOGCAT".KeyResolver");\r
\r
+ if (!keyInfo)\r
+ return NULL;\r
+\r
// Check for ds:X509Data\r
const vector<X509Data*>& x509Datas=keyInfo->getX509Datas();\r
for (vector<X509Data*>::const_iterator j=x509Datas.begin(); j!=x509Datas.end(); ++j) {\r
NDC ndc("resolveKey");\r
#endif\r
\r
+ if (!keyInfo)\r
+ return NULL;\r
+\r
// Default resolver handles RSA/DSAKeyValue and X509Certificate elements.\r
try {\r
XSECKeyInfoResolverDefault def;\r
{\r
accessCertificates(certs).clear();\r
accessOwned(certs) = false;\r
+\r
+ if (!keyInfo)\r
+ return 0;\r
+\r
DSIGKeyInfoList::size_type sz = keyInfo->getSize();\r
for (DSIGKeyInfoList::size_type i=0; accessCertificates(certs).empty() && i<sz; ++i) {\r
if (keyInfo->item(i)->getKeyInfoType()==DSIGKeyInfo::KEYINFO_X509) {\r
NDC ndc("resolveCRL");\r
#endif\r
\r
+ if (!keyInfo)\r
+ return NULL;\r
+\r
DSIGKeyInfoList::size_type sz = keyInfo->getSize();\r
for (DSIGKeyInfoList::size_type i=0; i<sz; ++i) {\r
if (keyInfo->item(i)->getKeyInfoType()==DSIGKeyInfo::KEYINFO_X509) {\r