@@ -664,7 +664,7 @@ ossl_crypto_fixed_length_secure_compare(VALUE dummy, VALUE str1, VALUE str2)
664
664
* ahold of the key may use it unless it is encrypted. In order to securely
665
665
* export a key you may export it with a pass phrase.
666
666
*
667
- * cipher = OpenSSL::Cipher.new 'AES -256-CBC '
667
+ * cipher = OpenSSL::Cipher.new 'aes -256-cbc '
668
668
* pass_phrase = 'my secure pass phrase goes here'
669
669
*
670
670
* key_secure = key.export cipher, pass_phrase
@@ -772,7 +772,7 @@ ossl_crypto_fixed_length_secure_compare(VALUE dummy, VALUE str1, VALUE str2)
772
772
* using PBKDF2. PKCS #5 v2.0 recommends at least 8 bytes for the salt,
773
773
* the number of iterations largely depends on the hardware being used.
774
774
*
775
- * cipher = OpenSSL::Cipher.new 'AES -256-CBC '
775
+ * cipher = OpenSSL::Cipher.new 'aes -256-cbc '
776
776
* cipher.encrypt
777
777
* iv = cipher.random_iv
778
778
*
@@ -795,7 +795,7 @@ ossl_crypto_fixed_length_secure_compare(VALUE dummy, VALUE str1, VALUE str2)
795
795
* Use the same steps as before to derive the symmetric AES key, this time
796
796
* setting the Cipher up for decryption.
797
797
*
798
- * cipher = OpenSSL::Cipher.new 'AES -256-CBC '
798
+ * cipher = OpenSSL::Cipher.new 'aes -256-cbc '
799
799
* cipher.decrypt
800
800
* cipher.iv = iv # the one generated with #random_iv
801
801
*
@@ -830,7 +830,7 @@ ossl_crypto_fixed_length_secure_compare(VALUE dummy, VALUE str1, VALUE str2)
830
830
*
831
831
* First set up the cipher for encryption
832
832
*
833
- * encryptor = OpenSSL::Cipher.new 'AES -256-CBC '
833
+ * encryptor = OpenSSL::Cipher.new 'aes -256-cbc '
834
834
* encryptor.encrypt
835
835
* encryptor.pkcs5_keyivgen pass_phrase, salt
836
836
*
@@ -843,7 +843,7 @@ ossl_crypto_fixed_length_secure_compare(VALUE dummy, VALUE str1, VALUE str2)
843
843
*
844
844
* Use a new Cipher instance set up for decryption
845
845
*
846
- * decryptor = OpenSSL::Cipher.new 'AES -256-CBC '
846
+ * decryptor = OpenSSL::Cipher.new 'aes -256-cbc '
847
847
* decryptor.decrypt
848
848
* decryptor.pkcs5_keyivgen pass_phrase, salt
849
849
*
@@ -931,7 +931,7 @@ ossl_crypto_fixed_length_secure_compare(VALUE dummy, VALUE str1, VALUE str2)
931
931
* ca_key = OpenSSL::PKey::RSA.new 2048
932
932
* pass_phrase = 'my secure pass phrase goes here'
933
933
*
934
- * cipher = OpenSSL::Cipher.new 'AES -256-CBC '
934
+ * cipher = OpenSSL::Cipher.new 'aes -256-cbc '
935
935
*
936
936
* open 'ca_key.pem', 'w', 0400 do |io|
937
937
* io.write ca_key.export(cipher, pass_phrase)
0 commit comments