diff options
-rw-r--r-- | ChangeLog | 4 | ||||
-rw-r--r-- | ext/openssl/ossl_cipher.c | 4 | ||||
-rw-r--r-- | ext/openssl/ossl_x509name.c | 2 |
3 files changed, 5 insertions, 5 deletions
@@ -46,9 +46,9 @@ Wed Feb 8 13:12:02 2012 Martin Bosslet <Martin.Bosslet@googlemail.com> * ext/openssl/ossl_x509name.c: Use the numerical representation of unrecognized OIDs instead of the sn "UNDEF". - + * test/openssl/test_x509name.rb: Add tests for the fixed behavior. - + Patch provided by Paul Kehrer, thank you! [ruby-core:41769] [Feature #5787] diff --git a/ext/openssl/ossl_cipher.c b/ext/openssl/ossl_cipher.c index 4e758b6a26..26851515cd 100644 --- a/ext/openssl/ossl_cipher.c +++ b/ext/openssl/ossl_cipher.c @@ -337,7 +337,7 @@ ossl_cipher_pkcs5_keyivgen(int argc, VALUE *argv, VALUE self) * Encrypts data in a streaming fashion. Hand consecutive blocks of data * to the +update+ method in order to encrypt it. Returns the encrypted * data chunk. When done, the output of Cipher#final should be additionally - * added to the result. + * added to the result. * * === Parameters * +data+ is a nonempty string. @@ -690,7 +690,7 @@ Init_ossl_cipher(void) * as an IV. There are elaborate ways how an attacker can take advantage * of such an IV. As a general rule of thumb, exposing the key directly * or indirectly should be avoided at all cost and exceptions only be - * made with good reason. + * made with good reason. * * === Calling Cipher#final * diff --git a/ext/openssl/ossl_x509name.c b/ext/openssl/ossl_x509name.c index 247b3c724a..a8f288f4a5 100644 --- a/ext/openssl/ossl_x509name.c +++ b/ext/openssl/ossl_x509name.c @@ -253,7 +253,7 @@ ossl_x509name_to_a(VALUE self) short_name = OBJ_nid2sn(nid); vname = rb_str_new2(short_name); /*do not free*/ } - ary = rb_ary_new3(3, + ary = rb_ary_new3(3, vname, rb_str_new((const char *)entry->value->data, entry->value->length), INT2FIX(entry->value->type)); |