diff options
author | Gustavo André dos Santos Lopes <cataphract@php.net> | 2012-06-10 13:26:28 +0200 |
---|---|---|
committer | Gustavo André dos Santos Lopes <cataphract@php.net> | 2012-06-10 13:26:28 +0200 |
commit | 87dd0269ba262649402bf00207f80aede181f1e7 (patch) | |
tree | 8fc01828af206a20161d5c48e993008dbfe89498 /ext/intl/breakiterator/rulebasedbreakiterator_methods.cpp | |
parent | a4925fae9b89dcd7912dce5852b4170a978e1bd0 (diff) | |
download | php-git-87dd0269ba262649402bf00207f80aede181f1e7.tar.gz |
Remove trailing space
Diffstat (limited to 'ext/intl/breakiterator/rulebasedbreakiterator_methods.cpp')
-rw-r--r-- | ext/intl/breakiterator/rulebasedbreakiterator_methods.cpp | 28 |
1 files changed, 14 insertions, 14 deletions
diff --git a/ext/intl/breakiterator/rulebasedbreakiterator_methods.cpp b/ext/intl/breakiterator/rulebasedbreakiterator_methods.cpp index 4e96450d28..f0f680355b 100644 --- a/ext/intl/breakiterator/rulebasedbreakiterator_methods.cpp +++ b/ext/intl/breakiterator/rulebasedbreakiterator_methods.cpp @@ -44,7 +44,7 @@ static void _php_intlgregcal_constructor_body(INTERNAL_FUNCTION_PARAMETERS) "rbbi_create_instance: bad arguments", 0 TSRMLS_CC); RETURN_NULL(); } - + // instantiation of ICU object RuleBasedBreakIterator *rbbi; @@ -108,11 +108,11 @@ U_CFUNC PHP_FUNCTION(rbbi_get_rules) "rbbi_get_rules: bad arguments", 0 TSRMLS_CC); RETURN_FALSE; } - + BREAKITER_METHOD_FETCH_OBJECT; - + const UnicodeString rules = fetch_rbbi(bio)->getRules(); - + Z_TYPE_P(return_value) = IS_STRING; if (intl_charFromString(rules, &Z_STRVAL_P(return_value), &Z_STRLEN_P(return_value), BREAKITER_ERROR_CODE_P(bio)) == FAILURE) @@ -134,9 +134,9 @@ U_CFUNC PHP_FUNCTION(rbbi_get_rule_status) "rbbi_get_rule_status: bad arguments", 0 TSRMLS_CC); RETURN_FALSE; } - + BREAKITER_METHOD_FETCH_OBJECT; - + RETURN_LONG(fetch_rbbi(bio)->getRuleStatus()); } @@ -150,9 +150,9 @@ U_CFUNC PHP_FUNCTION(rbbi_get_rule_status_vec) "rbbi_get_rule_status_vec: bad arguments", 0 TSRMLS_CC); RETURN_FALSE; } - + BREAKITER_METHOD_FETCH_OBJECT; - + int32_t num_rules = fetch_rbbi(bio)->getRuleStatusVec(NULL, 0, BREAKITER_ERROR_CODE(bio)); if (BREAKITER_ERROR_CODE(bio) == U_BUFFER_OVERFLOW_ERROR) { @@ -172,7 +172,7 @@ U_CFUNC PHP_FUNCTION(rbbi_get_rule_status_vec) 0 TSRMLS_CC); RETURN_FALSE; } - + array_init_size(return_value, num_rules); for (int32_t i = 0; i < num_rules; i++) { add_next_index_long(return_value, rules[i]); @@ -190,22 +190,22 @@ U_CFUNC PHP_FUNCTION(rbbi_get_binary_rules) "rbbi_get_binary_rules: bad arguments", 0 TSRMLS_CC); RETURN_FALSE; } - + BREAKITER_METHOD_FETCH_OBJECT; - + uint32_t rules_len; const uint8_t *rules = fetch_rbbi(bio)->getBinaryRules(rules_len); - + if (rules_len > INT_MAX - 1) { intl_errors_set(BREAKITER_ERROR_P(bio), BREAKITER_ERROR_CODE(bio), "rbbi_get_binary_rules: the rules are too large", 0 TSRMLS_CC); RETURN_FALSE; } - + char *ret_rules = static_cast<char*>(emalloc(rules_len + 1)); memcpy(ret_rules, rules, rules_len); ret_rules[rules_len] = '\0'; - + RETURN_STRINGL(ret_rules, rules_len, 0); } |