Skip to content

Commit a152c41

Browse files
author
zzak
committed
* ext/openssl/*: Document synonymous methods, by windwiny [GH-277]
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@40316 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
1 parent 582ba0a commit a152c41

9 files changed

+20
-9
lines changed

ChangeLog

+4
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
Tue Apr 16 11:23:00 2013 Zachary Scott <zachary@zacharyscott.net>
2+
3+
* ext/openssl/*: Document synonymous methods, by windwiny [GH-277]
4+
15
Mon Apr 15 22:21:42 2013 Tanaka Akira <akr@fsij.org>
26

37
* ext/fiddle/depend: New file.

ext/openssl/ossl_hmac.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ ossl_hmac_s_digest(VALUE klass, VALUE digest, VALUE key, VALUE data)
206206

207207
/*
208208
* call-seq:
209-
* HMAC.digest(digest, key, data) -> aString
209+
* HMAC.hexdigest(digest, key, data) -> aString
210210
*
211211
*/
212212
static VALUE

ext/openssl/ossl_ocsp.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ ossl_ocspreq_add_nonce(int argc, VALUE *argv, VALUE self)
149149
* 2: nonces both absent.
150150
* 3: nonce present in response only.
151151
* 0: nonces both present and not equal.
152-
* -1: nonce in request only.
152+
* -1: nonce in request only.
153153
*
154154
* For most responders clients can check return > 0.
155155
* If responder doesn't handle nonces return != 0 may be

ext/openssl/ossl_pkey_dh.c

+3-1
Original file line numberDiff line numberDiff line change
@@ -278,7 +278,9 @@ ossl_dh_is_private(VALUE self)
278278

279279
/*
280280
* call-seq:
281+
* dh.export -> aString
281282
* dh.to_pem -> aString
283+
* dh.to_s -> aString
282284
*
283285
* Encodes this DH to its PEM encoding. Note that any existing per-session
284286
* public/private keys will *not* get encoded, just the Diffie-Hellman
@@ -428,7 +430,7 @@ ossl_dh_to_public_key(VALUE self)
428430

429431
/*
430432
* call-seq:
431-
* dh.check_params -> true | false
433+
* dh.params_ok? -> true | false
432434
*
433435
* Validates the Diffie-Hellman parameters associated with this instance.
434436
* It checks whether a safe prime and a suitable generator are used. If this

ext/openssl/ossl_pkey_dsa.c

+2
Original file line numberDiff line numberDiff line change
@@ -291,7 +291,9 @@ ossl_dsa_is_private(VALUE self)
291291

292292
/*
293293
* call-seq:
294+
* dsa.export([cipher, password]) -> aString
294295
* dsa.to_pem([cipher, password]) -> aString
296+
* dsa.to_s([cipher, password]) -> aString
295297
*
296298
* Encodes this DSA to its PEM encoding.
297299
*

ext/openssl/ossl_pkey_ec.c

+4-2
Original file line numberDiff line numberDiff line change
@@ -533,8 +533,8 @@ static VALUE ossl_ec_key_to_string(VALUE self, VALUE ciph, VALUE pass, int forma
533533

534534
/*
535535
* call-seq:
536-
* key.export => String
537-
* key.export(cipher, pass_phrase) => String
536+
* key.export([cipher, pass_phrase]) => String
537+
* key.to_pem([cipher, pass_phrase]) => String
538538
*
539539
* Outputs the EC key in PEM encoding. If +cipher+ and +pass_phrase+ are
540540
* given they will be used to encrypt the key. +cipher+ must be an
@@ -843,6 +843,7 @@ static VALUE ossl_ec_group_initialize(int argc, VALUE *argv, VALUE self)
843843
}
844844

845845
/* call-seq:
846+
* group1.eql?(group2) => true | false
846847
* group1 == group2 => true | false
847848
*
848849
*/
@@ -1312,6 +1313,7 @@ static VALUE ossl_ec_point_initialize(int argc, VALUE *argv, VALUE self)
13121313

13131314
/*
13141315
* call-seq:
1316+
* point1.eql?(point2) => true | false
13151317
* point1 == point2 => true | false
13161318
*
13171319
*/

ext/openssl/ossl_pkey_rsa.c

+3-2
Original file line numberDiff line numberDiff line change
@@ -291,8 +291,9 @@ ossl_rsa_is_private(VALUE self)
291291

292292
/*
293293
* call-seq:
294-
* rsa.to_pem => PEM-format String
295-
* rsa.to_pem(cipher, pass_phrase) => PEM-format String
294+
* rsa.export([cipher, pass_phrase]) => PEM-format String
295+
* rsa.to_pem([cipher, pass_phrase]) => PEM-format String
296+
* rsa.to_s([cipher, pass_phrase]) => PEM-format String
296297
*
297298
* Outputs this keypair in PEM encoding. If +cipher+ and +pass_phrase+ are
298299
* given they will be used to encrypt the key. +cipher+ must be an

ext/openssl/ossl_ssl.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1634,7 +1634,7 @@ ossl_ssl_get_peer_cert_chain(VALUE self)
16341634

16351635
/*
16361636
* call-seq:
1637-
* ssl.version => String
1637+
* ssl.ssl_version => String
16381638
*
16391639
* Returns a String representing the SSL/TLS version that was negotiated
16401640
* for the connection, for example "TLSv1.2".

ext/openssl/ossl_x509store.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -257,7 +257,7 @@ ossl_x509store_add_path(VALUE self, VALUE dir)
257257

258258
/*
259259
* call-seq:
260-
* store.set_default_path
260+
* store.set_default_paths
261261
*
262262
* Adds the default certificates to the certificate store. These certificates
263263
* are loaded from the default configuration directory which can usually be

0 commit comments

Comments
 (0)