This integer returns the current initial length of the buffer.
This sets the initial length of the buffer to length
, if length
> 0, otherwise its value isn’t changed.
Returns the set of targets for a MultiTargetNode or a MultiWriteNode.
Wonky heredoc tab/spaces rules. github.com/ruby/prism/blob/v1.3.0/src/prism.c#L10548-L10558
Wonky heredoc tab/spaces rules. github.com/ruby/prism/blob/v1.3.0/src/prism.c#L16528-L16545
In a percent array, certain whitespace can be preceeded with a backslash, causing the following characters to be part of the previous element.
Get the subject’s key identifier from the subjectKeyIdentifier exteension, as described in RFC5280 Section 4.2.1.2.
Returns the binary String
key identifier or nil or raises ASN1::ASN1Error
.
Get the issuing certificate’s key identifier from the authorityKeyIdentifier extension, as described in RFC5280 Section 4.2.1.1
Returns the binary String
keyIdentifier or nil or raises ASN1::ASN1Error
.
@@foo += bar ^^^^^^^^^^^^
$foo += bar ^^^^^^^^^^^
@foo += bar ^^^^^^^^^^^
foo += bar ^^^^^^^^^^
@@foo += bar ^^^^^^^^^^^^
$foo += bar ^^^^^^^^^^^
@foo += bar ^^^^^^^^^^^
foo += bar ^^^^^^^^^^
The logical inverse of ‘capture_last_end_same_indent`
When there is an invalid block with an ‘end` missing a keyword right after another `end`, it is unclear where which end is missing the keyword.
Take this example:
class Dog # 1 puts "woof" # 2 end # 3 end # 4
the problem line will be identified as:
> end # 4
This happens because lines 1, 2, and 3 are technically valid code and are expanded first, deemed valid, and hidden. We need to un-hide the matching keyword on line 1. Also work backwards and if there’s a mis-matched end, show it too
Creates a new DH
instance from scratch by generating random parameters and a key pair.
See also OpenSSL::PKey.generate_parameters
and OpenSSL::PKey.generate_key
.
size
The desired key size in bits.
generator
The generator.
Creates a new DSA
instance by generating a private/public key pair from scratch.
See also OpenSSL::PKey.generate_parameters
and OpenSSL::PKey.generate_key
.
size
The desired key size in bits.
Verifies whether the signature is valid given the message digest input. It does so by validating sig
using the public key of this DSA
instance.
Deprecated in version 3.0. Consider using PKey::PKey#sign_raw
and PKey::PKey#verify_raw
instead.
digest
A message digest of the original input data to be signed.
sig
A DSA signature value.
Creates a new EC
instance with a new random private and public key.
Generates an RSA keypair.
See also OpenSSL::PKey.generate_key
.
size
The desired key size in bits.
exponent
An odd Integer
, normally 3, 17, or 65537.