sk_***_new_null() seems to be there to avoid exactly this sort of thing
[openssl.git] / crypto / asn1 / t_crl.c
index c2e447ce6ff3f1d5da206f438f7dce0ae7e29d40..d78e4a8f8878609ada45afb425f65af3f399a80e 100644 (file)
@@ -160,7 +160,7 @@ static void ext_print(BIO *out, X509_EXTENSION *ex)
        BIO_printf(out, ": %s\n", j ? "critical":"","");
        if(!X509V3_EXT_print(out, ex, 0, 16)) {
                BIO_printf(out, "%16s", "");
-               ASN1_OCTET_STRING_print(out,ex->value);
+               M_ASN1_OCTET_STRING_print(out,ex->value);
        }
        BIO_write(out,"\n",1);
 }