openssl_rsa_pss_verify 0.1.4 → 0.1.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 8088eac905ea9588ec02a16d2b82771b480e472a
|
4
|
+
data.tar.gz: 8cb1ee01dbdbd697d81b0687dd932ac2e4afeac2
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b4fd09a916f79378971b5d5ab2be68b3b2cfdaa75bf3abd061625a9de32358191a0d0fbd4e63ae1b43a79c5be4416d21c403d9c9735d391bfb575812c6174676
|
7
|
+
data.tar.gz: b0c2209f1470a14595a42415b72fa4cb48835ca810d4793fe5acc36f9a04d94898d42051a46930bc3c978a3f68a8858c0e3675c68ad2ea8803a12755a39e1ff5
|
data/Gemfile.lock
CHANGED
@@ -36,7 +36,7 @@ enum ORPV_errors {
|
|
36
36
|
|
37
37
|
static void bind_err_strs(char * strs, int max) {
|
38
38
|
int i;
|
39
|
-
char last_err[OSSL_ERR_STR_LEN]
|
39
|
+
char last_err[OSSL_ERR_STR_LEN];
|
40
40
|
|
41
41
|
if (! ERR_peek_error()) {
|
42
42
|
strcat(strs, "[no internal OpenSSL error was flagged]");
|
@@ -49,16 +49,15 @@ static void bind_err_strs(char * strs, int max) {
|
|
49
49
|
}
|
50
50
|
|
51
51
|
if (i == (max-1) && ERR_peek_error()) {
|
52
|
-
|
52
|
+
snprintf(last_err, OSSL_ERR_STR_LEN, "\n%s", ERR_error_string(ERR_get_error(), NULL));
|
53
53
|
|
54
54
|
if (ERR_peek_error()) {
|
55
55
|
// Still yet another error past max
|
56
|
-
|
57
|
-
while(ERR_get_error());
|
58
|
-
|
59
|
-
strcat(strs, "\n");
|
60
|
-
strcat(strs, last_err);
|
56
|
+
++i;
|
57
|
+
while(ERR_get_error()) ++i;
|
58
|
+
snprintf(last_err, OSSL_ERR_STR_LEN, "\n[%i additional errors truncated]", i);
|
61
59
|
}
|
60
|
+
strncat(strs, last_err, OSSL_ERR_STR_LEN);
|
62
61
|
}
|
63
62
|
}
|
64
63
|
|