openssl_rsa_pss_verify 0.1.5 → 0.1.6
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6c58b108ec48929abb1135b1349bff9b6e98b0c0
|
4
|
+
data.tar.gz: 72d30ebba65d423d45474401620ef51888a5eb25
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7da90308d6908f5a29562a78afd741e0a1da40e6425b9b89a813b19350428f157dec9641c357a1acd31935ff5fbc65cc6504835b18c9ada461589fc572bf91ee
|
7
|
+
data.tar.gz: 27cc549535293e4dbf7cf61e10f9c73acadbc89b471dfa557b6052e92f15054eff3475e6934ed45af1eb59e172f81f06d2881d63e3824729a6e3fc850cdcd9cc
|
data/Gemfile.lock
CHANGED
@@ -35,7 +35,7 @@ enum ORPV_errors {
|
|
35
35
|
};
|
36
36
|
|
37
37
|
static void bind_err_strs(char * strs, int max) {
|
38
|
-
int
|
38
|
+
int err_cnt;
|
39
39
|
char last_err[OSSL_ERR_STR_LEN];
|
40
40
|
|
41
41
|
if (! ERR_peek_error()) {
|
@@ -43,20 +43,21 @@ static void bind_err_strs(char * strs, int max) {
|
|
43
43
|
return;
|
44
44
|
}
|
45
45
|
|
46
|
-
|
47
|
-
|
46
|
+
strncat(strs, ERR_error_string(ERR_get_error(), NULL), OSSL_ERR_STR_LEN);
|
47
|
+
for(err_cnt = 1; ERR_peek_error() && err_cnt < (max-1); ++err_cnt) {
|
48
48
|
strcat(strs, "\n");
|
49
|
+
strncat(strs, ERR_error_string(ERR_get_error(), NULL), OSSL_ERR_STR_LEN);
|
49
50
|
}
|
50
51
|
|
51
|
-
if (
|
52
|
-
|
52
|
+
if (err_cnt == (max-1) && ERR_peek_error()) {
|
53
|
+
ERR_error_string_n(ERR_get_error(), last_err, OSSL_ERR_STR_LEN);
|
54
|
+
++err_cnt;
|
53
55
|
|
54
56
|
if (ERR_peek_error()) {
|
55
|
-
|
56
|
-
|
57
|
-
while(ERR_get_error()) ++i;
|
58
|
-
snprintf(last_err, OSSL_ERR_STR_LEN, "\n[%i additional errors truncated]", i);
|
57
|
+
while(ERR_get_error()) ++err_cnt;
|
58
|
+
snprintf(last_err, OSSL_ERR_STR_LEN, "[%i additional errors truncated]", err_cnt);
|
59
59
|
}
|
60
|
+
strcat(strs, "\n");
|
60
61
|
strncat(strs, last_err, OSSL_ERR_STR_LEN);
|
61
62
|
}
|
62
63
|
}
|