aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--ChangeLog4
-rw-r--r--ext/openssl/ossl_cipher.c4
-rw-r--r--ext/openssl/ossl_x509name.c2
3 files changed, 5 insertions, 5 deletions
diff --git a/ChangeLog b/ChangeLog
index e288d05b9e..528a228094 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -46,9 +46,9 @@ Wed Feb 8 13:12:02 2012 Martin Bosslet <Martin.Bosslet@googlemail.com>
* ext/openssl/ossl_x509name.c: Use the numerical representation of
unrecognized OIDs instead of the sn "UNDEF".
-
+
* test/openssl/test_x509name.rb: Add tests for the fixed behavior.
-
+
Patch provided by Paul Kehrer, thank you!
[ruby-core:41769] [Feature #5787]
diff --git a/ext/openssl/ossl_cipher.c b/ext/openssl/ossl_cipher.c
index 4e758b6a26..26851515cd 100644
--- a/ext/openssl/ossl_cipher.c
+++ b/ext/openssl/ossl_cipher.c
@@ -337,7 +337,7 @@ ossl_cipher_pkcs5_keyivgen(int argc, VALUE *argv, VALUE self)
* Encrypts data in a streaming fashion. Hand consecutive blocks of data
* to the +update+ method in order to encrypt it. Returns the encrypted
* data chunk. When done, the output of Cipher#final should be additionally
- * added to the result.
+ * added to the result.
*
* === Parameters
* +data+ is a nonempty string.
@@ -690,7 +690,7 @@ Init_ossl_cipher(void)
* as an IV. There are elaborate ways how an attacker can take advantage
* of such an IV. As a general rule of thumb, exposing the key directly
* or indirectly should be avoided at all cost and exceptions only be
- * made with good reason.
+ * made with good reason.
*
* === Calling Cipher#final
*
diff --git a/ext/openssl/ossl_x509name.c b/ext/openssl/ossl_x509name.c
index 247b3c724a..a8f288f4a5 100644
--- a/ext/openssl/ossl_x509name.c
+++ b/ext/openssl/ossl_x509name.c
@@ -253,7 +253,7 @@ ossl_x509name_to_a(VALUE self)
short_name = OBJ_nid2sn(nid);
vname = rb_str_new2(short_name); /*do not free*/
}
- ary = rb_ary_new3(3,
+ ary = rb_ary_new3(3,
vname,
rb_str_new((const char *)entry->value->data, entry->value->length),
INT2FIX(entry->value->type));