Checks that cert signature is made with PRIVversion of this PUBLIC ‘key’
key - the public key to be used for verifying the SPKI
signature
Returns true
if the signature is valid, false
otherwise. To verify an SPKI
, the public key contained within the SPKI
should be used.
Verifies this request using the given certificates and store. certificates is an array of OpenSSL::X509::Certificate
, store is an OpenSSL::X509::Store
.
Note that false
is returned if the request does not have a signature. Use signed?
to check whether the request is signed or not.
Creates an OpenSSL::OCSP::Response
from status and basic_response.
Verifies the signature of the response using the given certificates and store. This works in the similar way as OpenSSL::OCSP::Request#verify
.
To verify the String signature, digest, an instance of OpenSSL::Digest
, must be provided to re-compute the message digest of the original data, also a String. The return value is true
if the signature is valid, false
otherwise. A PKeyError
is raised should errors occur. Any previous state of the Digest
instance is irrelevant to the validation outcome, the digest instance is reset to its initial state during the operation.
data = 'Sign me!' digest = OpenSSL::Digest::SHA256.new pkey = OpenSSL::PKey::RSA.new(2048) signature = pkey.sign(digest, data) pub_key = pkey.public_key puts pub_key.verify(digest, signature, data) # => true
Verifies whether the signature is valid given the message digest input. It does so by validating sig using the public key of this DSA
instance.
digest is a message digest of the original input data to be signed
sig is a DSA
signature value
dsa = OpenSSL::PKey::DSA.new(2048) doc = "Sign me" digest = OpenSSL::Digest::SHA1.digest(doc) sig = dsa.syssign(digest) puts dsa.sysverify(digest, sig) # => true
Performs a certificate verification on the OpenSSL::X509::Certificate
cert.
chain can be an array of OpenSSL::X509::Certificate
that is used to construct the certificate chain.
If a block is given, it overrides the callback set by verify_callback=
.
After finishing the verification, the error information can be retrieved by error
, error_string
, and the resulting complete certificate chain can be retrieved by chain
.
Returns true
if the entry is a directory (i.e., the value of the type fact is dir, cdir, or pdir).
Returns true
if files may be created in the directory by STOU, STOR, APPE, and RNTO.
Returns true
if the file or directory may be renamed by RNFR.
Returns true
if the RETR command may be applied to the file.
Creates a new DNS
name from arg
. arg
can be:
Creates a new LOC::Size
from arg
which may be:
LOC::Size
returns arg
.
arg
must match the LOC::Size::Regex constant
Creates a new LOC::Coord
from arg
which may be:
LOC::Coord
returns arg
.
arg
must match the LOC::Coord::Regex constant
Creates a new LOC::Alt
from arg
which may be:
LOC::Alt
returns arg
.
arg
must match the LOC::Alt::Regex constant