Results for: "Array.new"

Parses the current JSON text source and returns the complete data structure as a result. It raises JSON::ParseError if fail to parse.

Initiates an SSL/TLS handshake with a server.

No documentation available

Returns the error code of stctx. This is typically called after verify is done, or from the verification callback set to OpenSSL::X509::Store#verify_callback=.

See also the man page X509_STORE_CTX_get_error(3).

Sets the error code of stctx. This is used by the verification callback set to OpenSSL::X509::Store#verify_callback=.

See also the man page X509_STORE_CTX_set_error(3).

Returns true if the request is signed, false otherwise. Note that the validity of the signature is not checked. Use verify to verify that.

Used primarily to check if an OpenSSL::X509::Certificate#public_key compares to its private key.

Example

x509 = OpenSSL::X509::Certificate.new(pem_encoded_certificate)
rsa_key = OpenSSL::PKey::RSA.new(pem_encoded_private_key)

rsa_key.compare?(x509.public_key) => true | false
No documentation available
No documentation available
No documentation available
No documentation available
No documentation available
No documentation available
No documentation available

Connect to IO tcp, with context of the current certificate configuration

Raises an exception if any arguments given.

Raises an exception if argument is not present.

Parses argument if given, or uses default value.

Returns nil if argument is not present or begins with ‘-’ and is not ‘-’.

No documentation available
No documentation available
No documentation available

Wraps io and updates digest for each of the digest algorithms in the digests Hash. Returns the digests hash. Example:

io = StringIO.new
digests = {
  'SHA1'   => OpenSSL::Digest.new('SHA1'),
  'SHA512' => OpenSSL::Digest.new('SHA512'),
}

Gem::Package::DigestIO.wrap io, digests do |digest_io|
  digest_io.write "hello"
end

digests['SHA1'].hexdigest   #=> "aaf4c61d[...]"
digests['SHA512'].hexdigest #=> "9b71d224[...]"

NOTE: Do not call rewind during each

Return the ActivationRequest that contained the dependency that we were activated for.

Search took: 2ms  ·  Total Results: 2278