aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordrbrain <drbrain@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2013-02-19 01:36:30 +0000
committerdrbrain <drbrain@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2013-02-19 01:36:30 +0000
commit2163738ffb01c5891f8e1d441811b8b3b50261bb (patch)
treee3150effe3e57abd71865c6a650999721f678bd6
parentb043b0592bf284dc53555b7e6d0238a3796da45e (diff)
downloadruby-2163738ffb01c5891f8e1d441811b8b3b50261bb.tar.gz
* ext/openssl/ossl.c (class OpenSSL): Use only inner parenthesis in
create_extension examples. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@39310 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
-rw-r--r--ChangeLog5
-rw-r--r--ext/openssl/ossl.c43
2 files changed, 30 insertions, 18 deletions
diff --git a/ChangeLog b/ChangeLog
index 9858a6b34b..10ba888d1c 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,8 @@
+Tue Feb 19 10:35:52 2013 Eric Hodel <drbrain@segment7.net>
+
+ * ext/openssl/ossl.c (class OpenSSL): Use only inner parenthesis in
+ create_extension examples.
+
Tue Feb 19 10:27:12 2013 Eric Hodel <drbrain@segment7.net>
* ext/openssl/ossl.c (class OpenSSL): Fixed ExtensionFactory example.
diff --git a/ext/openssl/ossl.c b/ext/openssl/ossl.c
index f388f3cc07..99307b4a75 100644
--- a/ext/openssl/ossl.c
+++ b/ext/openssl/ossl.c
@@ -701,12 +701,15 @@ ossl_fips_mode_set(VALUE self, VALUE enabled)
*
* extension_factory = OpenSSL::X509::ExtensionFactory.new nil, cert
*
- * cert.add_extension(extension_factory.create_extension
- * 'basicConstraints', 'CA:FALSE')
- * cert.add_extension(extension_factory.create_extension
- * 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature')
- * cert.add_extension(extension_factory.create_extension
- * 'subjectKeyIdentifier', 'hash')
+ * cert.add_extension \
+ * extension_factory.create_extension('basicConstraints', 'CA:FALSE', true)
+ *
+ * cert.add_extension \
+ * extension_factory.create_extension(
+ * 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature')
+ *
+ * cert.add_extension \
+ * extension_factory.create_extension('subjectKeyIdentifier', 'hash')
*
* The list of supported extensions (and in some cases their possible values)
* can be derived from the "objects.h" file in the OpenSSL source code.
@@ -777,19 +780,20 @@ ossl_fips_mode_set(VALUE self, VALUE enabled)
* extension_factory.subject_certificate = ca_cert
* extension_factory.issuer_certificate = ca_cert
*
- * ca_cert.add_extension(extension_factory.create_extension
- * 'subjectKeyIdentifier', 'hash')
+ * ca_cert.add_extension \
+ * extension_factory.create_extension('subjectKeyIdentifier', 'hash')
*
* This extension indicates the CA's key may be used as a CA.
*
- * ca_cert.add_extension(extension_factory.create_extension
- * 'basicConstraints', 'CA:TRUE', true)
+ * ca_cert.add_extension \
+ * extension_factory.create_extension('basicConstraints', 'CA:TRUE', true)
*
* This extension indicates the CA's key may be used to verify signatures on
* both certificates and certificate revocations.
*
- * ca_cert.add_extension(extension_factory.create_extension
- * 'keyUsage', 'cRLSign,keyCertSign', true)
+ * ca_cert.add_extension \
+ * extension_factory.create_extension(
+ * 'keyUsage', 'cRLSign,keyCertSign', true)
*
* Root CA certificates are self-signed.
*
@@ -845,12 +849,15 @@ ossl_fips_mode_set(VALUE self, VALUE enabled)
* extension_factory.subject_certificate = csr_cert
* extension_factory.issuer_certificate = ca_cert
*
- * csr_cert.add_extension(extension_factory.create_extension
- * 'basicConstraints', 'CA:FALSE')
- * csr_cert.add_extension(extension_factory.create_extension
- * 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature')
- * csr_cert.add_extension(extension_factory.create_extension
- * 'subjectKeyIdentifier', 'hash')
+ * csr_cert.add_extension \
+ * extension_factory.create_extension('basicConstraints', 'CA:FALSE')
+ *
+ * csr_cert.add_extension \
+ * extension_factory.create_extension(
+ * 'keyUsage', 'keyEncipherment,dataEncipherment,digitalSignature')
+ *
+ * csr_cert.add_extension \
+ * extension_factory.create_extension('subjectKeyIdentifier', 'hash')
*
* csr_cert.sign ca_key, OpenSSL::Digest::SHA1.new
*