summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ext/bigdecimal/bigdecimal.c2
-rw-r--r--ext/openssl/ossl_asn1.c2
-rw-r--r--ext/openssl/ossl_cipher.c4
-rw-r--r--ext/openssl/ossl_digest.c2
-rw-r--r--ext/openssl/ossl_engine.c2
-rw-r--r--ext/openssl/ossl_x509name.c2
-rw-r--r--ext/readline/readline.c2
-rw-r--r--ext/socket/ancdata.c2
-rw-r--r--io.c2
9 files changed, 10 insertions, 10 deletions
diff --git a/ext/bigdecimal/bigdecimal.c b/ext/bigdecimal/bigdecimal.c
index a02bcc98aa..f57ea9051d 100644
--- a/ext/bigdecimal/bigdecimal.c
+++ b/ext/bigdecimal/bigdecimal.c
@@ -4335,7 +4335,7 @@ VpDivd(Real *c, Real *r, Real *a, Real *b)
VpAsgn(c, a, VpGetSign(b));
VpSetZero(r,VpGetSign(a));
goto Exit;
- }
+ }
word_a = a->Prec;
word_b = b->Prec;
diff --git a/ext/openssl/ossl_asn1.c b/ext/openssl/ossl_asn1.c
index c06d0f40d6..31c9c45f05 100644
--- a/ext/openssl/ossl_asn1.c
+++ b/ext/openssl/ossl_asn1.c
@@ -869,7 +869,7 @@ int_ossl_asn1_decode0_cons(unsigned char **pp, long max_len, long length,
rb_ary_push(ary, value);
if (length > 0)
length -= inner_read;
-
+
if (infinite &&
NUM2INT(ossl_asn1_get_tag(value)) == V_ASN1_EOC &&
SYM2ID(ossl_asn1_get_tag_class(value)) == sUNIVERSAL) {
diff --git a/ext/openssl/ossl_cipher.c b/ext/openssl/ossl_cipher.c
index 4e758b6a26..26851515cd 100644
--- a/ext/openssl/ossl_cipher.c
+++ b/ext/openssl/ossl_cipher.c
@@ -337,7 +337,7 @@ ossl_cipher_pkcs5_keyivgen(int argc, VALUE *argv, VALUE self)
* Encrypts data in a streaming fashion. Hand consecutive blocks of data
* to the +update+ method in order to encrypt it. Returns the encrypted
* data chunk. When done, the output of Cipher#final should be additionally
- * added to the result.
+ * added to the result.
*
* === Parameters
* +data+ is a nonempty string.
@@ -690,7 +690,7 @@ Init_ossl_cipher(void)
* as an IV. There are elaborate ways how an attacker can take advantage
* of such an IV. As a general rule of thumb, exposing the key directly
* or indirectly should be avoided at all cost and exceptions only be
- * made with good reason.
+ * made with good reason.
*
* === Calling Cipher#final
*
diff --git a/ext/openssl/ossl_digest.c b/ext/openssl/ossl_digest.c
index 8fd6b75c36..fdf13e98e5 100644
--- a/ext/openssl/ossl_digest.c
+++ b/ext/openssl/ossl_digest.c
@@ -409,7 +409,7 @@ Init_ossl_digest()
* data1 = File.read('file1')
* sha256 = OpenSSL::Digest::SHA256.new
* digest1 = sha256.digest(data1)
- *
+ *
* data2 = File.read('file2')
* sha256.reset
* digest2 = sha256.digest(data2)
diff --git a/ext/openssl/ossl_engine.c b/ext/openssl/ossl_engine.c
index 79f51b8cdb..a7d1e315fd 100644
--- a/ext/openssl/ossl_engine.c
+++ b/ext/openssl/ossl_engine.c
@@ -118,7 +118,7 @@ ossl_engine_s_engines(VALUE klass)
/* Need a ref count of two here because of ENGINE_free being
* called internally by OpenSSL when moving to the next ENGINE
* and by us when releasing the ENGINE reference */
- ENGINE_up_ref(e);
+ ENGINE_up_ref(e);
WrapEngine(klass, obj, e);
rb_ary_push(ary, obj);
}
diff --git a/ext/openssl/ossl_x509name.c b/ext/openssl/ossl_x509name.c
index 247b3c724a..a8f288f4a5 100644
--- a/ext/openssl/ossl_x509name.c
+++ b/ext/openssl/ossl_x509name.c
@@ -253,7 +253,7 @@ ossl_x509name_to_a(VALUE self)
short_name = OBJ_nid2sn(nid);
vname = rb_str_new2(short_name); /*do not free*/
}
- ary = rb_ary_new3(3,
+ ary = rb_ary_new3(3,
vname,
rb_str_new((const char *)entry->value->data, entry->value->length),
INT2FIX(entry->value->type));
diff --git a/ext/readline/readline.c b/ext/readline/readline.c
index 1f0da33ccb..9066004f8d 100644
--- a/ext/readline/readline.c
+++ b/ext/readline/readline.c
@@ -166,7 +166,7 @@ readline_getc(FILE *input)
}
}
}
-#endif
+#endif
c = rb_funcall(readline_instream, id_getbyte, 0, 0);
if (NIL_P(c)) return EOF;
return NUM2CHR(c);
diff --git a/ext/socket/ancdata.c b/ext/socket/ancdata.c
index 9db4426a80..c01a1c272a 100644
--- a/ext/socket/ancdata.c
+++ b/ext/socket/ancdata.c
@@ -1380,7 +1380,7 @@ static void
discard_cmsg(struct cmsghdr *cmh, char *msg_end, int msg_peek_p)
{
# if !defined(FD_PASSING_WORK_WITH_RECVMSG_MSG_PEEK)
- /*
+ /*
* FreeBSD 8.2.0, NetBSD 5 and MacOS X Snow Leopard doesn't
* allocate fds by recvmsg with MSG_PEEK.
* [ruby-dev:44189]
diff --git a/io.c b/io.c
index 9846596aba..cc9e50e685 100644
--- a/io.c
+++ b/io.c
@@ -5500,7 +5500,7 @@ rb_open_file(int argc, VALUE *argv, VALUE io)
* be passed the opened +file+ as an argument, and the File object will
* automatically be closed when the block terminates. In this instance,
* <code>File.open</code> returns the value of the block.
- *
+ *
* See IO.new for a list of values for the +opt+ parameter.
*/