Results for: "tally"

No documentation available
No documentation available
No documentation available

Verifies that data matches the signature created by public_key and the digest algorithm.

No documentation available
No documentation available

The full name of the specification to be activated.

The Gem::Specification for this activation request.

Adds a local gem requested using dep_name with the given spec that can be loaded and installed using the source.

The name and version of the specification.

Unlike Gem::Specification#full_name, the platform is not included.

The name and version of the specification.

Unlike Gem::Specification#full_name, the platform is not included.

Factory for servlet instances that will handle a request from server using options from the mount point. By default a new servlet instance is created for every call.

Adds data at the end of the chain of entries

This is called by WEBrick::HTTPUtils.parse_form_data for you.

Yields each entry in this FormData

Check is passed argument valid ‘number’ in RFC 3501 terminology

No documentation available

Raises a MissingTagError or NotExpectedTagError if the element is not properly formatted.

No documentation available
No documentation available

Raises NotAvailableValueError if element content is nil

Returns a new lazy enumerator with the concatenated results of running block once for every element in the lazy enumerator.

["foo", "bar"].lazy.flat_map {|i| i.each_char.lazy}.force
#=> ["f", "o", "o", "b", "a", "r"]

A value x returned by block is decomposed if either of the following conditions is true:

Otherwise, x is contained as-is in the return value.

[{a:1}, {b:2}].lazy.flat_map {|i| i}.force
#=> [{:a=>1}, {:b=>2}]

Like Enumerable#take_while, but chains operation to be lazy-evaluated.

Returns the Object#object_id of the internal object.

Sets the length of the authentication tag to be generated or to be given for AEAD ciphers that requires it as in input parameter. Note that not all AEAD ciphers support this method.

In OCB mode, the length must be supplied both when encrypting and when decrypting, and must be before specifying an IV.

No documentation available
Search took: 4ms  ·  Total Results: 1429