The list of cipher suites configured for this context.
Sets the list of available cipher suites for this context. Note in a server context some ciphers require the appropriate certificates. For example, an RSA cipher suite can only be chosen when an RSA certificate is available.
Sends “close notify” to the peer and tries to shut down the SSL
connection gracefully.
If sync_close
is set to true
, the underlying IO
is also closed.
The X509
certificate for this socket endpoint.
The cipher being used for the current connection
See IO#close
for details.
Checks that cert signature is made with PRIVversion of this PUBLIC ‘key’
This adds a new ObjectId
to the internal tables. Where object_id
is the numerical form, short_name
is the short name, and long_name
is the long name.
Returns true
if successful. Raises an OpenSSL::ASN1::ASN1Error
if it fails.
key
- the public key to be used for verifying the SPKI
signature
Returns true
if the signature is valid, false
otherwise. To verify an SPKI
, the public key contained within the SPKI
should be used.
Returns the challenge string associated with this SPKI
.
str
- the challenge string to be set for this instance
Sets the challenge to be associated with the SPKI
. May be used by the server, e.g. to prevent replay.
Returns all certificate IDs in this request.
Verifies this request using the given certificates
and store
. certificates
is an array of OpenSSL::X509::Certificate
, store
is an OpenSSL::X509::Store
.
Verifies the signature of the response using the given certificates
and store
. This works in the similar way as OpenSSL::OCSP::Request#verify
.
Returns the CertificateId
for which this SingleResponse
is.
Returns the serial number of the certificate for which status is being requested.