mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
* remove trailing spaces.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@34505 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
parent
70b504badb
commit
57b2175207
3 changed files with 5 additions and 5 deletions
|
@ -46,9 +46,9 @@ Wed Feb 8 13:12:02 2012 Martin Bosslet <Martin.Bosslet@googlemail.com>
|
|||
|
||||
* ext/openssl/ossl_x509name.c: Use the numerical representation of
|
||||
unrecognized OIDs instead of the sn "UNDEF".
|
||||
|
||||
|
||||
* test/openssl/test_x509name.rb: Add tests for the fixed behavior.
|
||||
|
||||
|
||||
Patch provided by Paul Kehrer, thank you!
|
||||
[ruby-core:41769] [Feature #5787]
|
||||
|
||||
|
|
|
@ -337,7 +337,7 @@ ossl_cipher_pkcs5_keyivgen(int argc, VALUE *argv, VALUE self)
|
|||
* Encrypts data in a streaming fashion. Hand consecutive blocks of data
|
||||
* to the +update+ method in order to encrypt it. Returns the encrypted
|
||||
* data chunk. When done, the output of Cipher#final should be additionally
|
||||
* added to the result.
|
||||
* added to the result.
|
||||
*
|
||||
* === Parameters
|
||||
* +data+ is a nonempty string.
|
||||
|
@ -690,7 +690,7 @@ Init_ossl_cipher(void)
|
|||
* as an IV. There are elaborate ways how an attacker can take advantage
|
||||
* of such an IV. As a general rule of thumb, exposing the key directly
|
||||
* or indirectly should be avoided at all cost and exceptions only be
|
||||
* made with good reason.
|
||||
* made with good reason.
|
||||
*
|
||||
* === Calling Cipher#final
|
||||
*
|
||||
|
|
|
@ -253,7 +253,7 @@ ossl_x509name_to_a(VALUE self)
|
|||
short_name = OBJ_nid2sn(nid);
|
||||
vname = rb_str_new2(short_name); /*do not free*/
|
||||
}
|
||||
ary = rb_ary_new3(3,
|
||||
ary = rb_ary_new3(3,
|
||||
vname,
|
||||
rb_str_new((const char *)entry->value->data, entry->value->length),
|
||||
INT2FIX(entry->value->type));
|
||||
|
|
Loading…
Reference in a new issue