@@ -317,7 +317,7 @@ class LdapError < StandardError; end
317317 DefaultPort = 389
318318 DefaultAuth = { :method => :anonymous }
319319 DefaultTreebase = "dc=com"
320- DefaultForceNoPage = false
320+ DefaultForceNoPage = false
321321
322322 StartTlsOid = "1.3.6.1.4.1.1466.20037"
323323
@@ -398,7 +398,7 @@ def initialize(args = {})
398398 @verbose = false # Make this configurable with a switch on the class.
399399 @auth = args [ :auth ] || DefaultAuth
400400 @base = args [ :base ] || DefaultTreebase
401- @force_no_page = args [ :force_no_page ] || DefaultForceNoPage
401+ @force_no_page = args [ :force_no_page ] || DefaultForceNoPage
402402 encryption args [ :encryption ] # may be nil
403403
404404 if pr = @auth [ :password ] and pr . respond_to? ( :call )
@@ -486,7 +486,7 @@ def authenticate(username, password)
486486 # standard port for simple-TLS encrypted connections is 636. Be sure you
487487 # are using the correct port.
488488 #
489- # The :start_tls like the :simple_tls encryption method also encrypts all
489+ # The :start_tls like the :simple_tls encryption method also encrypts all
490490 # communcations with the LDAP server. With the exception that it operates
491491 # over the standard TCP port.
492492 def encryption ( args )
@@ -1168,10 +1168,10 @@ def search_subschema_entry
11681168 # MUST refactor the root_dse call out.
11691169 #++
11701170 def paged_searches_supported?
1171- # active directory returns that it supports paged results. However
1172- # it returns binary data in the rfc2696_cookie which throws an
1173- # encoding exception breaking searching.
1174- return false if @force_no_page
1171+ # active directory returns that it supports paged results. However
1172+ # it returns binary data in the rfc2696_cookie which throws an
1173+ # encoding exception breaking searching.
1174+ return false if @force_no_page
11751175 @server_caps ||= search_root_dse
11761176 @server_caps [ :supportedcontrol ] . include? ( Net ::LDAP ::LDAPControls ::PAGED_RESULTS )
11771177 end
0 commit comments