openssl_rsa_pss_verify 0.1.4 → 0.1.5
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 8088eac905ea9588ec02a16d2b82771b480e472a
|
4
|
+
data.tar.gz: 8cb1ee01dbdbd697d81b0687dd932ac2e4afeac2
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b4fd09a916f79378971b5d5ab2be68b3b2cfdaa75bf3abd061625a9de32358191a0d0fbd4e63ae1b43a79c5be4416d21c403d9c9735d391bfb575812c6174676
|
7
|
+
data.tar.gz: b0c2209f1470a14595a42415b72fa4cb48835ca810d4793fe5acc36f9a04d94898d42051a46930bc3c978a3f68a8858c0e3675c68ad2ea8803a12755a39e1ff5
|
data/Gemfile.lock
CHANGED
@@ -36,7 +36,7 @@ enum ORPV_errors {
|
|
36
36
|
|
37
37
|
static void bind_err_strs(char * strs, int max) {
|
38
38
|
int i;
|
39
|
-
char last_err[OSSL_ERR_STR_LEN]
|
39
|
+
char last_err[OSSL_ERR_STR_LEN];
|
40
40
|
|
41
41
|
if (! ERR_peek_error()) {
|
42
42
|
strcat(strs, "[no internal OpenSSL error was flagged]");
|
@@ -49,16 +49,15 @@ static void bind_err_strs(char * strs, int max) {
|
|
49
49
|
}
|
50
50
|
|
51
51
|
if (i == (max-1) && ERR_peek_error()) {
|
52
|
-
|
52
|
+
snprintf(last_err, OSSL_ERR_STR_LEN, "\n%s", ERR_error_string(ERR_get_error(), NULL));
|
53
53
|
|
54
54
|
if (ERR_peek_error()) {
|
55
55
|
// Still yet another error past max
|
56
|
-
|
57
|
-
while(ERR_get_error());
|
58
|
-
|
59
|
-
strcat(strs, "\n");
|
60
|
-
strcat(strs, last_err);
|
56
|
+
++i;
|
57
|
+
while(ERR_get_error()) ++i;
|
58
|
+
snprintf(last_err, OSSL_ERR_STR_LEN, "\n[%i additional errors truncated]", i);
|
61
59
|
}
|
60
|
+
strncat(strs, last_err, OSSL_ERR_STR_LEN);
|
62
61
|
}
|
63
62
|
}
|
64
63
|
|