[前][次][番号順一覧][スレッド一覧]

ruby-changes:55103

From: nobu <ko1@a...>
Date: Wed, 20 Mar 2019 10:17:22 +0900 (JST)
Subject: [ruby-changes:55103] nobu:r67310 (trunk): string.c: [DOC] fix indent [ci skip]

nobu	2019-03-20 10:17:16 +0900 (Wed, 20 Mar 2019)

  New Revision: 67310

  https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=67310

  Log:
    string.c: [DOC] fix indent [ci skip]
    
    * string.c (rb_str_crypt): fix indent not to make the whole list
      verbatim entirely.

  Modified files:
    trunk/string.c
Index: string.c
===================================================================
--- string.c	(revision 67309)
+++ string.c	(revision 67310)
@@ -9219,49 +9219,49 @@ rb_str_oct(VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L9219
  *  backward compatibility with ruby scripts in earlier days.  It is
  *  bad to use in contemporary programs for several reasons:
  *
- *    * Behaviour of C's <code>crypt(3)</code> depends on the OS it is
- *      run.  The generated string lacks data portability.
+ *  * Behaviour of C's <code>crypt(3)</code> depends on the OS it is
+ *    run.  The generated string lacks data portability.
  *
- *    * On some OSes such as Mac OS, <code>crypt(3)</code> never fails
- *      (i.e. silently ends up in unexpected results).
+ *  * On some OSes such as Mac OS, <code>crypt(3)</code> never fails
+ *    (i.e. silently ends up in unexpected results).
  *
- *    * On some OSes such as Mac OS, <code>crypt(3)</code> is not
- *      thread safe.
+ *  * On some OSes such as Mac OS, <code>crypt(3)</code> is not
+ *    thread safe.
  *
- *    * So-called "traditional" usage of <code>crypt(3)</code> is very
- *      very very weak.  According to its manpage, Linux's traditional
- *      <code>crypt(3)</code> output has only 2**56 variations; too
- *      easy to brute force today.  And this is the default behaviour.
- *
- *    * In order to make things robust some OSes implement so-called
- *      "modular" usage. To go through, you have to do a complex
- *      build-up of the <code>salt_str</code> parameter, by hand.
- *      Failure in generation of a proper salt string tends not to
- *      yield any errors; typos in parameters are normally not
- *      detectable.
- *
- *        * For instance, in the following example, the second invocation
- *          of <code>String#crypt</code> is wrong; it has a typo in
- *          "round=" (lacks "s").  However the call does not fail and
- *          something unexpected is generated.
- *
- *             "foo".crypt("$5$rounds=1000$salt$") # OK, proper usage
- *             "foo".crypt("$5$round=1000$salt$")  # Typo not detected
- *
- *    * Even in the "modular" mode, some hash functions are considered
- *      archaic and no longer recommended at all; for instance module
- *      <code>$1$</code> is officially abandoned by its author: see
- *      http://phk.freebsd.dk/sagas/md5crypt_eol.html .  For another
- *      instance module <code>$3$</code> is considered completely
- *      broken: see the manpage of FreeBSD.
- *
- *    * On some OS such as Mac OS, there is no modular mode. Yet, as
- *      written above, <code>crypt(3)</code> on Mac OS never fails.
- *      This means even if you build up a proper salt string it
- *      generates a traditional DES hash anyways, and there is no way
- *      for you to be aware of.
+ *  * So-called "traditional" usage of <code>crypt(3)</code> is very
+ *    very very weak.  According to its manpage, Linux's traditional
+ *    <code>crypt(3)</code> output has only 2**56 variations; too
+ *    easy to brute force today.  And this is the default behaviour.
+ *
+ *  * In order to make things robust some OSes implement so-called
+ *    "modular" usage. To go through, you have to do a complex
+ *    build-up of the <code>salt_str</code> parameter, by hand.
+ *    Failure in generation of a proper salt string tends not to
+ *    yield any errors; typos in parameters are normally not
+ *    detectable.
+ *
+ *    * For instance, in the following example, the second invocation
+ *      of <code>String#crypt</code> is wrong; it has a typo in
+ *      "round=" (lacks "s").  However the call does not fail and
+ *      something unexpected is generated.
+ *
+ *         "foo".crypt("$5$rounds=1000$salt$") # OK, proper usage
+ *         "foo".crypt("$5$round=1000$salt$")  # Typo not detected
+ *
+ *  * Even in the "modular" mode, some hash functions are considered
+ *    archaic and no longer recommended at all; for instance module
+ *    <code>$1$</code> is officially abandoned by its author: see
+ *    http://phk.freebsd.dk/sagas/md5crypt_eol.html .  For another
+ *    instance module <code>$3$</code> is considered completely
+ *    broken: see the manpage of FreeBSD.
+ *
+ *  * On some OS such as Mac OS, there is no modular mode. Yet, as
+ *    written above, <code>crypt(3)</code> on Mac OS never fails.
+ *    This means even if you build up a proper salt string it
+ *    generates a traditional DES hash anyways, and there is no way
+ *    for you to be aware of.
  *
- *          "foo".crypt("$5$rounds=1000$salt$") # => "$5fNPQMxC5j6."
+ *        "foo".crypt("$5$rounds=1000$salt$") # => "$5fNPQMxC5j6."
  *
  *  If for some reason you cannot migrate to other secure contemporary
  *  password hashing algorithms, install the string-crypt gem and

--
ML: ruby-changes@q...
Info: http://www.atdot.net/~ko1/quickml/

[前][次][番号順一覧][スレッド一覧]