[前][次][番号順一覧][スレッド一覧]

ruby-changes:20943

From: emboss <ko1@a...>
Date: Wed, 17 Aug 2011 06:48:16 +0900 (JST)
Subject: [ruby-changes:20943] emboss:r32992 (trunk): * ext/openssl/ossl_x509cert.c: fixed whitespace issues

emboss	2011-08-17 06:41:25 +0900 (Wed, 17 Aug 2011)

  New Revision: 32992

  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=32992

  Log:
    * ext/openssl/ossl_x509cert.c: fixed whitespace issues

  Modified files:
    trunk/ext/openssl/ossl_x509cert.c

Index: ext/openssl/ossl_x509cert.c
===================================================================
--- ext/openssl/ossl_x509cert.c	(revision 32991)
+++ ext/openssl/ossl_x509cert.c	(revision 32992)
@@ -765,13 +765,13 @@
      *   File.open("cert.pem", "wb") { |f| f.print cert.to_pem }
      *
      * X.509 certificates are associated with a private/public key pair,
-     * typically a RSA, DSA or ECC key (see also OpenSSL::PKey::RSA, 
-     * OpenSSL::PKey::DSA and OpenSSL::PKey::EC), the public key itself is 
-     * stored within the certificate and can be accessed in form of an 
+     * typically a RSA, DSA or ECC key (see also OpenSSL::PKey::RSA,
+     * OpenSSL::PKey::DSA and OpenSSL::PKey::EC), the public key itself is
+     * stored within the certificate and can be accessed in form of an
      * OpenSSL::PKey. Certificates are typically used to be able to associate
      * some form of identity with a key pair, for example web servers serving
      * pages over HTTPs use certificates to authenticate themselves to the user.
-     * 
+     *
      * The public key infrastructure (PKI) model relies on trusted certificate
      * authorities ("root CAs") that issue these certificates, so that end
      * users need to base their trust just on a selected few authorities
@@ -787,7 +787,7 @@
      * First, we need to create a "self-signed" root certificate. To do so,
      * we need to generate a key first. Please note that the choice of "1"
      * as a serial number is considered a security flaw for real certificates.
-     * Secure choices are integers in the two-digit byte range and ideally 
+     * Secure choices are integers in the two-digit byte range and ideally
      * not sequential but secure random numbers, steps omitted here to keep
      * the example concise.
      *
@@ -811,7 +811,7 @@
      *
      * The next step is to create the end-entity certificate using the root CA
      * certificate.
-     * 
+     *
      *   key = OpenSSL::PKey::RSA.new 2048
      *   cert = OpenSSL::X509::Certificate.new
      *   cert.version = 2
@@ -827,7 +827,7 @@
      *   cert.add_extension(ef.create_extension("keyUsage","digitalSignature", true))
      *   cert.add_extension(ef.create_extension("subjectKeyIdentifier","hash",false))
      *   cert.sign(root_key, OpenSSL::Digest::SHA256.new)
-     *   
+     *
      */
     cX509Cert = rb_define_class_under(mX509, "Certificate", rb_cObject);
 

--
ML: ruby-changes@q...
Info: http://www.atdot.net/~ko1/quickml/

[前][次][番号順一覧][スレッド一覧]