The list of ciphers configured for this context.
Sets the list of available ciphers for this context. Note in a server context some ciphers require the appropriate certificates. For example, an RSA cipher can only be chosen when an RSA certificate is available.
See also OpenSSL::Cipher
and OpenSSL::Cipher::ciphers
Sends “close notify” to the peer and tries to shut down the SSL
connection gracefully.
If sync_close is set to true
, the underlying IO
is also closed.
The X509
certificate for this socket endpoint.
The cipher being used for the current connection
See IO#close
for details.
Checks that cert signature is made with PRIVversion of this PUBLIC ‘key’
This adds a new ObjectId
to the internal tables. Where object_id
is the numerical form, short_name
is the short name, and long_name
is the long name.
Returns true
if successful. Raises an OpenSSL::ASN1::ASN1Error
if it fails.
key
- the public key to be used for verifying the SPKI
signature
Returns true
if the signature is valid, false
otherwise. To verify an SPKI
, the public key contained within the SPKI
should be used.
Returns the challenge string associated with this SPKI
.
str
- the challenge string to be set for this instance
Sets the challenge to be associated with the SPKI
. May be used by the server, e.g. to prevent replay.
Returns all certificate IDs in this request.
Verifies this request using the given certificates
and X509
store
.
Verifies the signature of the response using the given certificates
, store
and flags
.
Returns the serial number of the issuing certificate.