summaryrefslogtreecommitdiff
path: root/ext
diff options
context:
space:
mode:
authornobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2011-11-04 07:19:23 +0000
committernobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2011-11-04 07:19:23 +0000
commit413f24d3b01ee6ceaf8b025cf64e05155689fdbe (patch)
tree8745c6ea3b40f5bc6a20630738b774554dda8c19 /ext
parentab682d95e077b43db7dfd293744aa546888d7e35 (diff)
* whitespace cleanup.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@33634 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'ext')
-rw-r--r--ext/bigdecimal/bigdecimal.c2
-rw-r--r--ext/dbm/dbm.c2
-rw-r--r--ext/etc/etc.c4
-rw-r--r--ext/openssl/ossl_asn1.c2
-rw-r--r--ext/openssl/ossl_digest.c2
-rw-r--r--ext/openssl/ossl_engine.c6
-rw-r--r--ext/openssl/ossl_pkey.h2
-rw-r--r--ext/readline/readline.c2
-rw-r--r--ext/socket/ancdata.c2
9 files changed, 12 insertions, 12 deletions
diff --git a/ext/bigdecimal/bigdecimal.c b/ext/bigdecimal/bigdecimal.c
index e70406a..06a424b 100644
--- a/ext/bigdecimal/bigdecimal.c
+++ b/ext/bigdecimal/bigdecimal.c
@@ -4334,7 +4334,7 @@ VpDivd(Real *c, Real *r, Real *a, Real *b)
VpAsgn(c, a, VpGetSign(b));
VpSetZero(r,VpGetSign(a));
goto Exit;
- }
+ }
word_a = a->Prec;
word_b = b->Prec;
diff --git a/ext/dbm/dbm.c b/ext/dbm/dbm.c
index 6e6ac90..2bfd62b 100644
--- a/ext/dbm/dbm.c
+++ b/ext/dbm/dbm.c
@@ -137,7 +137,7 @@ fdbm_initialize(int argc, VALUE *argv, VALUE obj)
FilePathValue(file);
- /*
+ /*
* Note:
* The dbm compatibility layer of gdbm 1.9 doesn't respect O_CLOEXEC.
*/
diff --git a/ext/etc/etc.c b/ext/etc/etc.c
index f8dc368..56aab7f 100644
--- a/ext/etc/etc.c
+++ b/ext/etc/etc.c
@@ -611,13 +611,13 @@ etc_systmpdir(void)
* the logged in user than environment variables such as $USER. For example:
*
* require 'etc'
- *
+ *
* login = Etc.getlogin
* info = Etc.getpwnam(login)
* username = info.gecos.split(/,/).first
* puts "Hello #{username}, I see your login name is #{login}"
*
- * Note that the methods provided by this module are not always secure.
+ * Note that the methods provided by this module are not always secure.
* It should be used for informational purposes, and not for security.
*/
void
diff --git a/ext/openssl/ossl_asn1.c b/ext/openssl/ossl_asn1.c
index 77f23e3..08b5753 100644
--- a/ext/openssl/ossl_asn1.c
+++ b/ext/openssl/ossl_asn1.c
@@ -869,7 +869,7 @@ int_ossl_asn1_decode0_cons(unsigned char **pp, long max_len, long length,
rb_ary_push(ary, value);
if (length > 0)
length -= inner_read;
-
+
if (infinite &&
NUM2INT(ossl_asn1_get_tag(value)) == V_ASN1_EOC &&
SYM2ID(ossl_asn1_get_tag_class(value)) == sUNIVERSAL) {
diff --git a/ext/openssl/ossl_digest.c b/ext/openssl/ossl_digest.c
index 8fd6b75..fdf13e9 100644
--- a/ext/openssl/ossl_digest.c
+++ b/ext/openssl/ossl_digest.c
@@ -409,7 +409,7 @@ Init_ossl_digest()
* data1 = File.read('file1')
* sha256 = OpenSSL::Digest::SHA256.new
* digest1 = sha256.digest(data1)
- *
+ *
* data2 = File.read('file2')
* sha256.reset
* digest2 = sha256.digest(data2)
diff --git a/ext/openssl/ossl_engine.c b/ext/openssl/ossl_engine.c
index defc851..f854541 100644
--- a/ext/openssl/ossl_engine.c
+++ b/ext/openssl/ossl_engine.c
@@ -82,10 +82,10 @@ ossl_engine_s_load(int argc, VALUE *argv, VALUE klass)
#if HAVE_ENGINE_LOAD_NURON
OSSL_ENGINE_LOAD_IF_MATCH(nuron);
#endif
-#if HAVE_ENGINE_LOAD_SUREWARE
+#if HAVE_ENGINE_LOAD_SUREWARE
OSSL_ENGINE_LOAD_IF_MATCH(sureware);
#endif
-#if HAVE_ENGINE_LOAD_UBSEC
+#if HAVE_ENGINE_LOAD_UBSEC
OSSL_ENGINE_LOAD_IF_MATCH(ubsec);
#endif
#if HAVE_ENGINE_LOAD_PADLOCK
@@ -136,7 +136,7 @@ ossl_engine_s_engines(VALUE klass)
/* Need a ref count of two here because of ENGINE_free being
* called internally by OpenSSL when moving to the next ENGINE
* and by us when releasing the ENGINE reference */
- ENGINE_up_ref(e);
+ ENGINE_up_ref(e);
WrapEngine(klass, obj, e);
rb_ary_push(ary, obj);
}
diff --git a/ext/openssl/ossl_pkey.h b/ext/openssl/ossl_pkey.h
index fa426a5..686e956 100644
--- a/ext/openssl/ossl_pkey.h
+++ b/ext/openssl/ossl_pkey.h
@@ -45,7 +45,7 @@ struct ossl_generate_cb_arg {
int yield;
int stop;
int state;
-};
+};
int ossl_generate_cb_2(int p, int n, BN_GENCB *cb);
void ossl_generate_cb_stop(void *ptr);
#endif
diff --git a/ext/readline/readline.c b/ext/readline/readline.c
index e0f0d1c..198f0e6 100644
--- a/ext/readline/readline.c
+++ b/ext/readline/readline.c
@@ -159,7 +159,7 @@ readline_getc(FILE *input)
}
}
}
-#endif
+#endif
c = rb_funcall(readline_instream, id_getbyte, 0, 0);
if (NIL_P(c)) return EOF;
return NUM2CHR(c);
diff --git a/ext/socket/ancdata.c b/ext/socket/ancdata.c
index 9bb2d31..f222f84 100644
--- a/ext/socket/ancdata.c
+++ b/ext/socket/ancdata.c
@@ -1385,7 +1385,7 @@ static void
discard_cmsg(struct cmsghdr *cmh, char *msg_end, int msg_peek_p)
{
# if !defined(FD_PASSING_WORK_WITH_RECVMSG_MSG_PEEK)
- /*
+ /*
* FreeBSD 8.2.0, NetBSD 5 and MacOS X Snow Leopard doesn't
* allocate fds by recvmsg with MSG_PEEK.
* [ruby-dev:44189]