Results for: "module_function"

Re-composes a prime factorization and returns the product.

Parameters

pd

Array of pairs of integers. The each internal pair consists of a prime number – a prime factor – and a natural number – an exponent.

Example

For [[p_1, e_1], [p_2, e_2], ...., [p_n, e_n]], it returns:

p_1**e_1 * p_2**e_2 * .... * p_n**e_n.

Prime.int_from_prime_division([[2,2], [3,1]])  #=> 12

Waits up to the continue timeout for a response from the server provided we’re speaking HTTP 1.1 and are expecting a 100-continue response.

No documentation available
No documentation available
No documentation available
No documentation available
No documentation available

The version of Ruby required by this gem. The ruby version can be specified to the patch-level:

$ ruby -v -e 'p Gem.ruby_version'
ruby 2.0.0p247 (2013-06-27 revision 41674) [x86_64-darwin12.4.0]
#<Gem::Version "2.0.0.247">

Because patch-level is taken into account, be very careful specifying using ‘<=`: `<= 2.2.2` will not match any patch-level of 2.2.2 after the `p0` release. It is much safer to specify `< 2.2.3` instead

Usage:

# This gem will work with 1.8.6 or greater...
spec.required_ruby_version = '>= 1.8.6'

# Only with ruby 2.0.x
spec.required_ruby_version = '~> 2.0'

# Only with ruby between 2.2.0 and 2.2.2
spec.required_ruby_version = ['>= 2.2.0', '< 2.2.3']

The RubyGems version required by this gem

No documentation available
No documentation available
No documentation available
No documentation available

You can get a list of valid versions with OpenSSL::SSL::SSLContext::METHODS

Adds session to the session cache

Removes sessions in the internal cache that have expired at time.

Returns a String representing the SSL/TLS version that was negotiated for the connection, for example “TLSv1.2”.

Returns true if a reused session was negotiated during the handshake.

No documentation available
No documentation available
No documentation available

Adds a nonce to the OCSP request. If no nonce is given a random one will be generated.

The nonce is used to prevent replay attacks but some servers do not support it.

Checks the nonce validity for this request and response.

The return value is one of the following:

-1

nonce in request only.

0

nonces both present and not equal.

1

nonces present and equal.

2

nonces both absent.

3

nonce present in response only.

For most responses, clients can check result > 0. If a responder doesn’t handle nonces result.nonzero? may be necessary. A result of 0 is always an error.

Copies the nonce from request into this response. Returns 1 on success and 0 on failure.

Adds nonce to this response. If no nonce was provided a random nonce will be added.

Search took: 7ms  ·  Total Results: 3558