Returns true if a reused session was negotiated during the handshake.
Returns the result of the peer certificates verification. See verify(1) for error values and descriptions.
If no peer certificate was presented X509_V_OK is returned.
Returns the ALPN protocol string that was finally selected by the client during the handshake.
Returns the protocol string that was finally selected by the client during the handshake.
Array to X509_EXTENSION Structure:
or
or
or the same for sn
Converts the name to DER encoding
Encodes this ASN1Data
into a DER-encoded String value. The result is DER-encoded except for the possibility of infinite length encodings. Infinite length encodings are not allowed in strict DER, so strictly speaking the result of such an encoding would be a BER-encoding.
See ASN1Data#to_der
for details. *
See ASN1Data#to_der
for details.
The short name of the ObjectId
, as defined in <openssl/objects.h>.
Returns the DER encoding of this SPKI
.
Returns the PEM encoding of this SPKI
.
Returns a textual representation of this SPKI
, useful for debugging purposes.
Returns this request as a DER-encoded string
Returns this response as a DER-encoded string.
Adds a validation status
(0 for good, 1 for revoked, 2 for unknown) to this response for certificate_id
. reason
describes the reason for the revocation, if any.
The revocation_time
, this_update
and next_update
are times for the certificate’s revocation time, the time of this status and the next update time for a new status, respectively.
extensions
may be an Array of OpenSSL::X509::Extension
that will be added to this response or nil.
Prints all parameters of key to buffer INSECURE: PRIVATE INFORMATIONS CAN LEAK OUT!!! Don’t use :-)) (I’s up to you)