sk_***_new_null() seems to be there to avoid exactly this sort of thing
authorGeoff Thorpe <geoff@openssl.org>
Wed, 31 May 2000 17:41:34 +0000 (17:41 +0000)
committerGeoff Thorpe <geoff@openssl.org>
Wed, 31 May 2000 17:41:34 +0000 (17:41 +0000)
which is a cast between NULL and a function pointer.

crypto/asn1/x_name.c

index 64baf57..62e0ed0 100644 (file)
@@ -217,7 +217,7 @@ X509_NAME *X509_NAME_new(void)
        ASN1_CTX c;
 
        M_ASN1_New_Malloc(ret,X509_NAME);
-       if ((ret->entries=sk_X509_NAME_ENTRY_new(NULL)) == NULL)
+       if ((ret->entries=sk_X509_NAME_ENTRY_new_null()) == NULL)
                { c.line=__LINE__; goto err2; }
        M_ASN1_New(ret->bytes,BUF_MEM_new);
        ret->modified=1;