Writes string to the SSL
connection in a non-blocking manner. Raises an SSLError
if writing would block.
Checks the nonce validity for this request and response.
The return value is one of the following:
nonce in request only.
nonces both present and not equal.
nonces present and equal.
nonces both absent.
nonce present in response only.
For most responses, clients can check result > 0. If a responder doesn’t handle nonces result.nonzero?
may be necessary. A result of 0
is always an error.
Checks the validity of thisUpdate and nextUpdate fields of this SingleResponse
. This checks the current time is within the range thisUpdate to nextUpdate.
It is possible that the OCSP
request takes a few seconds or the time is not accurate. To avoid rejecting a valid response, this method allows the times to be within nsec seconds of the current time.
Some responders don’t set the nextUpdate field. This may cause a very old response to be considered valid. The maxsec parameter can be used to limit the age of responses.
Verifies that data
matches the signature
created by public_key
and the digest
algorithm.
Ensures that signer
is valid for time
and was signed by the issuer
. If the issuer
is nil
no verification is performed.
Ensures the public key of key
matches the public key in signer
Ensures the root certificate in chain
is self-signed and valid for time
.
Ensures the root of chain
has a trusted certificate in trust_dir
and the digests of the two certificates match according to digester
Updates the TarHeader’s checksum
Adds symlink name
with permissions mode
, linking to target
.
Does this dependency request match spec
?
NOTE: matches_spec?
matches prerelease versions. See also match?
Enumerates trusted certificates.
Delegates to the wrapped source’s fetch_spec
method.