ruby-paseto 0.1.0 → 0.1.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +9 -0
- data/lib/paseto/paserk_types.rb +1 -1
- data/lib/paseto/util.rb +1 -2
- data/lib/paseto/v3/public.rb +3 -65
- data/lib/paseto/version.rb +1 -1
- data/paseto.gemspec +1 -13
- data/sorbet/rbi/gems/{irb@1.5.1.rbi → irb@1.6.3.rbi} +44 -44
- data/sorbet/rbi/gems/{oj@3.13.23.rbi → oj@3.14.2.rbi} +4 -2
- data/sorbet/rbi/gems/{openssl@3.0.1.rbi → openssl@3.1.0.rbi} +63 -59
- data/sorbet/rbi/gems/{regexp_parser@2.6.1.rbi → regexp_parser@2.7.0.rbi} +250 -151
- data/sorbet/rbi/gems/{rspec-core@3.12.0.rbi → rspec-core@3.12.1.rbi} +30 -112
- data/sorbet/rbi/gems/{rspec-expectations@3.12.0.rbi → rspec-expectations@3.12.2.rbi} +201 -185
- data/sorbet/rbi/gems/{rspec-mocks@3.12.0.rbi → rspec-mocks@3.12.4.rbi} +218 -207
- data/sorbet/rbi/gems/{ruby-progressbar@1.11.0.rbi → ruby-progressbar@1.13.0.rbi} +364 -286
- data/sorbet/rbi/gems/{simplecov@0.21.2.rbi → simplecov@0.22.0.rbi} +62 -49
- data/sorbet/rbi/gems/{unicode-display_width@2.3.0.rbi → unicode-display_width@2.4.2.rbi} +24 -7
- data/sorbet/rbi/gems/{yard-sorbet@0.7.0.rbi → yard-sorbet@0.8.0.rbi} +91 -41
- data/sorbet/rbi/gems/zeitwerk@2.6.7.rbi +8 -0
- data/sorbet/tapioca/config.yml +1 -1
- metadata +25 -173
- data/sorbet/rbi/gems/zeitwerk@2.6.6.rbi +0 -950
- /data/sorbet/rbi/gems/{io-console@0.5.11.rbi → io-console@0.6.0.rbi} +0 -0
- /data/sorbet/rbi/gems/{reline@0.3.1.rbi → reline@0.3.2.rbi} +0 -0
@@ -946,12 +946,13 @@ class OpenSSL::PKey::RSA < ::OpenSSL::PKey::PKey
|
|
946
946
|
# rsa.private_decrypt(string, padding) -> String
|
947
947
|
#
|
948
948
|
# Decrypt +string+, which has been encrypted with the public key, with the
|
949
|
-
# private key. +padding+ defaults to PKCS1_PADDING
|
949
|
+
# private key. +padding+ defaults to PKCS1_PADDING, which is known to be
|
950
|
+
# insecure but is kept for backwards compatibility.
|
950
951
|
#
|
951
952
|
# <b>Deprecated in version 3.0</b>.
|
952
953
|
# Consider using PKey::PKey#encrypt and PKey::PKey#decrypt instead.
|
953
954
|
#
|
954
|
-
# source://openssl//openssl/pkey.rb#
|
955
|
+
# source://openssl//openssl/pkey.rb#439
|
955
956
|
def private_decrypt(data, padding = T.unsafe(nil)); end
|
956
957
|
|
957
958
|
# :call-seq:
|
@@ -959,14 +960,15 @@ class OpenSSL::PKey::RSA < ::OpenSSL::PKey::PKey
|
|
959
960
|
# rsa.private_encrypt(string, padding) -> String
|
960
961
|
#
|
961
962
|
# Encrypt +string+ with the private key. +padding+ defaults to
|
962
|
-
# PKCS1_PADDING
|
963
|
+
# PKCS1_PADDING, which is known to be insecure but is kept for backwards
|
964
|
+
# compatibility. The encrypted string output can be decrypted using
|
963
965
|
# #public_decrypt.
|
964
966
|
#
|
965
967
|
# <b>Deprecated in version 3.0</b>.
|
966
968
|
# Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw, and
|
967
969
|
# PKey::PKey#verify_recover instead.
|
968
970
|
#
|
969
|
-
# source://openssl//openssl/pkey.rb#
|
971
|
+
# source://openssl//openssl/pkey.rb#373
|
970
972
|
def private_encrypt(string, padding = T.unsafe(nil)); end
|
971
973
|
|
972
974
|
# :call-seq:
|
@@ -974,13 +976,14 @@ class OpenSSL::PKey::RSA < ::OpenSSL::PKey::PKey
|
|
974
976
|
# rsa.public_decrypt(string, padding) -> String
|
975
977
|
#
|
976
978
|
# Decrypt +string+, which has been encrypted with the private key, with the
|
977
|
-
# public key. +padding+ defaults to PKCS1_PADDING
|
979
|
+
# public key. +padding+ defaults to PKCS1_PADDING which is known to be
|
980
|
+
# insecure but is kept for backwards compatibility.
|
978
981
|
#
|
979
982
|
# <b>Deprecated in version 3.0</b>.
|
980
983
|
# Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw, and
|
981
984
|
# PKey::PKey#verify_recover instead.
|
982
985
|
#
|
983
|
-
# source://openssl//openssl/pkey.rb#
|
986
|
+
# source://openssl//openssl/pkey.rb#396
|
984
987
|
def public_decrypt(string, padding = T.unsafe(nil)); end
|
985
988
|
|
986
989
|
# :call-seq:
|
@@ -988,13 +991,14 @@ class OpenSSL::PKey::RSA < ::OpenSSL::PKey::PKey
|
|
988
991
|
# rsa.public_encrypt(string, padding) -> String
|
989
992
|
#
|
990
993
|
# Encrypt +string+ with the public key. +padding+ defaults to
|
991
|
-
# PKCS1_PADDING
|
994
|
+
# PKCS1_PADDING, which is known to be insecure but is kept for backwards
|
995
|
+
# compatibility. The encrypted string output can be decrypted using
|
992
996
|
# #private_decrypt.
|
993
997
|
#
|
994
998
|
# <b>Deprecated in version 3.0</b>.
|
995
999
|
# Consider using PKey::PKey#encrypt and PKey::PKey#decrypt instead.
|
996
1000
|
#
|
997
|
-
# source://openssl//openssl/pkey.rb#
|
1001
|
+
# source://openssl//openssl/pkey.rb#418
|
998
1002
|
def public_encrypt(data, padding = T.unsafe(nil)); end
|
999
1003
|
|
1000
1004
|
# :call-seq:
|
@@ -1014,7 +1018,7 @@ class OpenSSL::PKey::RSA < ::OpenSSL::PKey::PKey
|
|
1014
1018
|
|
1015
1019
|
private
|
1016
1020
|
|
1017
|
-
# source://openssl//openssl/pkey.rb#
|
1021
|
+
# source://openssl//openssl/pkey.rb#456
|
1018
1022
|
def translate_padding_mode(num); end
|
1019
1023
|
|
1020
1024
|
class << self
|
@@ -1044,23 +1048,23 @@ end
|
|
1044
1048
|
module OpenSSL::SSL
|
1045
1049
|
private
|
1046
1050
|
|
1047
|
-
# source://openssl//openssl/ssl.rb#
|
1051
|
+
# source://openssl//openssl/ssl.rb#276
|
1048
1052
|
def verify_certificate_identity(cert, hostname); end
|
1049
1053
|
|
1050
|
-
# source://openssl//openssl/ssl.rb#
|
1054
|
+
# source://openssl//openssl/ssl.rb#309
|
1051
1055
|
def verify_hostname(hostname, san); end
|
1052
1056
|
|
1053
|
-
# source://openssl//openssl/ssl.rb#
|
1057
|
+
# source://openssl//openssl/ssl.rb#342
|
1054
1058
|
def verify_wildcard(domain_component, san_component); end
|
1055
1059
|
|
1056
1060
|
class << self
|
1057
|
-
# source://openssl//openssl/ssl.rb#
|
1061
|
+
# source://openssl//openssl/ssl.rb#276
|
1058
1062
|
def verify_certificate_identity(cert, hostname); end
|
1059
1063
|
|
1060
|
-
# source://openssl//openssl/ssl.rb#
|
1064
|
+
# source://openssl//openssl/ssl.rb#309
|
1061
1065
|
def verify_hostname(hostname, san); end
|
1062
1066
|
|
1063
|
-
# source://openssl//openssl/ssl.rb#
|
1067
|
+
# source://openssl//openssl/ssl.rb#342
|
1064
1068
|
def verify_wildcard(domain_component, san_component); end
|
1065
1069
|
end
|
1066
1070
|
end
|
@@ -1099,7 +1103,7 @@ class OpenSSL::SSL::SSLContext
|
|
1099
1103
|
#
|
1100
1104
|
# @return [SSLContext] a new instance of SSLContext
|
1101
1105
|
#
|
1102
|
-
# source://openssl//openssl/ssl.rb#
|
1106
|
+
# source://openssl//openssl/ssl.rb#127
|
1103
1107
|
def initialize(version = T.unsafe(nil)); end
|
1104
1108
|
|
1105
1109
|
# call-seq:
|
@@ -1110,7 +1114,7 @@ class OpenSSL::SSL::SSLContext
|
|
1110
1114
|
# Sets the upper bound of the supported SSL/TLS protocol version. See
|
1111
1115
|
# #min_version= for the possible values.
|
1112
1116
|
#
|
1113
|
-
# source://openssl//openssl/ssl.rb#
|
1117
|
+
# source://openssl//openssl/ssl.rb#190
|
1114
1118
|
def max_version=(version); end
|
1115
1119
|
|
1116
1120
|
# call-seq:
|
@@ -1134,7 +1138,7 @@ class OpenSSL::SSL::SSLContext
|
|
1134
1138
|
# sock = OpenSSL::SSL::SSLSocket.new(tcp_sock, ctx)
|
1135
1139
|
# sock.connect # Initiates a connection using either TLS 1.1 or TLS 1.2
|
1136
1140
|
#
|
1137
|
-
# source://openssl//openssl/ssl.rb#
|
1141
|
+
# source://openssl//openssl/ssl.rb#178
|
1138
1142
|
def min_version=(version); end
|
1139
1143
|
|
1140
1144
|
# A callback invoked at connect time to distinguish between multiple
|
@@ -1143,7 +1147,7 @@ class OpenSSL::SSL::SSLContext
|
|
1143
1147
|
# The callback is invoked with an SSLSocket and a server name. The
|
1144
1148
|
# callback must return an SSLContext for the server name or nil.
|
1145
1149
|
#
|
1146
|
-
# source://openssl//openssl/ssl.rb#
|
1150
|
+
# source://openssl//openssl/ssl.rb#115
|
1147
1151
|
def servername_cb; end
|
1148
1152
|
|
1149
1153
|
# A callback invoked at connect time to distinguish between multiple
|
@@ -1152,7 +1156,7 @@ class OpenSSL::SSL::SSLContext
|
|
1152
1156
|
# The callback is invoked with an SSLSocket and a server name. The
|
1153
1157
|
# callback must return an SSLContext for the server name or nil.
|
1154
1158
|
#
|
1155
|
-
# source://openssl//openssl/ssl.rb#
|
1159
|
+
# source://openssl//openssl/ssl.rb#115
|
1156
1160
|
def servername_cb=(_arg0); end
|
1157
1161
|
|
1158
1162
|
# call-seq:
|
@@ -1167,7 +1171,7 @@ class OpenSSL::SSL::SSLContext
|
|
1167
1171
|
# cert_store are not set then the system default certificate store is
|
1168
1172
|
# used.
|
1169
1173
|
#
|
1170
|
-
# source://openssl//openssl/ssl.rb#
|
1174
|
+
# source://openssl//openssl/ssl.rb#146
|
1171
1175
|
def set_params(params = T.unsafe(nil)); end
|
1172
1176
|
|
1173
1177
|
# call-seq:
|
@@ -1185,7 +1189,7 @@ class OpenSSL::SSL::SSLContext
|
|
1185
1189
|
# the context. As of Ruby/OpenSSL 2.1, this accessor method is
|
1186
1190
|
# implemented to call #min_version= and #max_version= instead.
|
1187
1191
|
#
|
1188
|
-
# source://openssl//openssl/ssl.rb#
|
1192
|
+
# source://openssl//openssl/ssl.rb#209
|
1189
1193
|
def ssl_version=(meth); end
|
1190
1194
|
|
1191
1195
|
# A callback invoked when DH parameters are required for ephemeral DH key
|
@@ -1200,7 +1204,7 @@ class OpenSSL::SSL::SSLContext
|
|
1200
1204
|
#
|
1201
1205
|
# <b>Deprecated in version 3.0.</b> Use #tmp_dh= instead.
|
1202
1206
|
#
|
1203
|
-
# source://openssl//openssl/ssl.rb#
|
1207
|
+
# source://openssl//openssl/ssl.rb#108
|
1204
1208
|
def tmp_dh_callback; end
|
1205
1209
|
|
1206
1210
|
# A callback invoked when DH parameters are required for ephemeral DH key
|
@@ -1215,23 +1219,23 @@ class OpenSSL::SSL::SSLContext
|
|
1215
1219
|
#
|
1216
1220
|
# <b>Deprecated in version 3.0.</b> Use #tmp_dh= instead.
|
1217
1221
|
#
|
1218
|
-
# source://openssl//openssl/ssl.rb#
|
1222
|
+
# source://openssl//openssl/ssl.rb#108
|
1219
1223
|
def tmp_dh_callback=(_arg0); end
|
1220
1224
|
end
|
1221
1225
|
|
1222
|
-
# source://openssl//openssl/ssl.rb#
|
1226
|
+
# source://openssl//openssl/ssl.rb#37
|
1223
1227
|
OpenSSL::SSL::SSLContext::DEFAULT_2048 = T.let(T.unsafe(nil), OpenSSL::PKey::DH)
|
1224
1228
|
|
1225
|
-
# source://openssl//openssl/ssl.rb#
|
1229
|
+
# source://openssl//openssl/ssl.rb#49
|
1226
1230
|
OpenSSL::SSL::SSLContext::DEFAULT_TMP_DH_CALLBACK = T.let(T.unsafe(nil), Proc)
|
1227
1231
|
|
1228
1232
|
# The list of available SSL/TLS methods. This constant is only provided
|
1229
1233
|
# for backwards compatibility.
|
1230
1234
|
#
|
1231
|
-
# source://openssl//openssl/ssl.rb#
|
1235
|
+
# source://openssl//openssl/ssl.rb#235
|
1232
1236
|
OpenSSL::SSL::SSLContext::METHODS = T.let(T.unsafe(nil), Array)
|
1233
1237
|
|
1234
|
-
# source://openssl//openssl/ssl.rb#
|
1238
|
+
# source://openssl//openssl/ssl.rb#223
|
1235
1239
|
OpenSSL::SSL::SSLContext::METHODS_MAP = T.let(T.unsafe(nil), Hash)
|
1236
1240
|
|
1237
1241
|
class OpenSSL::SSL::SSLErrorWaitReadable < ::OpenSSL::SSL::SSLError
|
@@ -1252,42 +1256,42 @@ class OpenSSL::SSL::SSLServer
|
|
1252
1256
|
#
|
1253
1257
|
# @return [SSLServer] a new instance of SSLServer
|
1254
1258
|
#
|
1255
|
-
# source://openssl//openssl/ssl.rb#
|
1259
|
+
# source://openssl//openssl/ssl.rb#491
|
1256
1260
|
def initialize(svr, ctx); end
|
1257
1261
|
|
1258
1262
|
# Works similar to TCPServer#accept.
|
1259
1263
|
#
|
1260
|
-
# source://openssl//openssl/ssl.rb#
|
1264
|
+
# source://openssl//openssl/ssl.rb#519
|
1261
1265
|
def accept; end
|
1262
1266
|
|
1263
1267
|
# See IO#close for details.
|
1264
1268
|
#
|
1265
|
-
# source://openssl//openssl/ssl.rb#
|
1269
|
+
# source://openssl//openssl/ssl.rb#540
|
1266
1270
|
def close; end
|
1267
1271
|
|
1268
1272
|
# See TCPServer#listen for details.
|
1269
1273
|
#
|
1270
|
-
# source://openssl//openssl/ssl.rb#
|
1274
|
+
# source://openssl//openssl/ssl.rb#509
|
1271
1275
|
def listen(backlog = T.unsafe(nil)); end
|
1272
1276
|
|
1273
1277
|
# See BasicSocket#shutdown for details.
|
1274
1278
|
#
|
1275
|
-
# source://openssl//openssl/ssl.rb#
|
1279
|
+
# source://openssl//openssl/ssl.rb#514
|
1276
1280
|
def shutdown(how = T.unsafe(nil)); end
|
1277
1281
|
|
1278
1282
|
# When true then #accept works exactly the same as TCPServer#accept
|
1279
1283
|
#
|
1280
|
-
# source://openssl//openssl/ssl.rb#
|
1284
|
+
# source://openssl//openssl/ssl.rb#486
|
1281
1285
|
def start_immediately; end
|
1282
1286
|
|
1283
1287
|
# When true then #accept works exactly the same as TCPServer#accept
|
1284
1288
|
#
|
1285
|
-
# source://openssl//openssl/ssl.rb#
|
1289
|
+
# source://openssl//openssl/ssl.rb#486
|
1286
1290
|
def start_immediately=(_arg0); end
|
1287
1291
|
|
1288
1292
|
# Returns the TCPServer passed to the SSLServer when initialized.
|
1289
1293
|
#
|
1290
|
-
# source://openssl//openssl/ssl.rb#
|
1294
|
+
# source://openssl//openssl/ssl.rb#504
|
1291
1295
|
def to_io; end
|
1292
1296
|
end
|
1293
1297
|
|
@@ -1298,17 +1302,17 @@ class OpenSSL::SSL::SSLSocket
|
|
1298
1302
|
|
1299
1303
|
# The SSLContext object used in this connection.
|
1300
1304
|
#
|
1301
|
-
# source://openssl//openssl/ssl.rb#
|
1305
|
+
# source://openssl//openssl/ssl.rb#371
|
1302
1306
|
def context; end
|
1303
1307
|
|
1304
1308
|
# Returns the value of attribute hostname.
|
1305
1309
|
#
|
1306
|
-
# source://openssl//openssl/ssl.rb#
|
1310
|
+
# source://openssl//openssl/ssl.rb#364
|
1307
1311
|
def hostname; end
|
1308
1312
|
|
1309
1313
|
# The underlying IO object.
|
1310
1314
|
#
|
1311
|
-
# source://openssl//openssl/ssl.rb#
|
1315
|
+
# source://openssl//openssl/ssl.rb#367
|
1312
1316
|
def io; end
|
1313
1317
|
|
1314
1318
|
# call-seq:
|
@@ -1319,7 +1323,7 @@ class OpenSSL::SSL::SSLSocket
|
|
1319
1323
|
# This method MUST be called after calling #connect to ensure that the
|
1320
1324
|
# hostname of a remote peer has been verified.
|
1321
1325
|
#
|
1322
|
-
# source://openssl//openssl/ssl.rb#
|
1326
|
+
# source://openssl//openssl/ssl.rb#397
|
1323
1327
|
def post_connection_check(hostname); end
|
1324
1328
|
|
1325
1329
|
# call-seq:
|
@@ -1328,19 +1332,19 @@ class OpenSSL::SSL::SSLSocket
|
|
1328
1332
|
# Returns the SSLSession object currently used, or nil if the session is
|
1329
1333
|
# not established.
|
1330
1334
|
#
|
1331
|
-
# source://openssl//openssl/ssl.rb#
|
1335
|
+
# source://openssl//openssl/ssl.rb#418
|
1332
1336
|
def session; end
|
1333
1337
|
|
1334
1338
|
# Whether to close the underlying socket as well, when the SSL/TLS
|
1335
1339
|
# connection is shut down. This defaults to +false+.
|
1336
1340
|
#
|
1337
|
-
# source://openssl//openssl/ssl.rb#
|
1341
|
+
# source://openssl//openssl/ssl.rb#375
|
1338
1342
|
def sync_close; end
|
1339
1343
|
|
1340
1344
|
# Whether to close the underlying socket as well, when the SSL/TLS
|
1341
1345
|
# connection is shut down. This defaults to +false+.
|
1342
1346
|
#
|
1343
|
-
# source://openssl//openssl/ssl.rb#
|
1347
|
+
# source://openssl//openssl/ssl.rb#375
|
1344
1348
|
def sync_close=(_arg0); end
|
1345
1349
|
|
1346
1350
|
# call-seq:
|
@@ -1351,31 +1355,31 @@ class OpenSSL::SSL::SSLSocket
|
|
1351
1355
|
#
|
1352
1356
|
# If sync_close is set to +true+, the underlying IO is also closed.
|
1353
1357
|
#
|
1354
|
-
# source://openssl//openssl/ssl.rb#
|
1358
|
+
# source://openssl//openssl/ssl.rb#384
|
1355
1359
|
def sysclose; end
|
1356
1360
|
|
1357
1361
|
# The underlying IO object.
|
1358
1362
|
#
|
1359
|
-
# source://openssl//openssl/ssl.rb#
|
1363
|
+
# source://openssl//openssl/ssl.rb#367
|
1360
1364
|
def to_io; end
|
1361
1365
|
|
1362
1366
|
private
|
1363
1367
|
|
1364
|
-
# source://openssl//openssl/ssl.rb#
|
1368
|
+
# source://openssl//openssl/ssl.rb#432
|
1365
1369
|
def client_cert_cb; end
|
1366
1370
|
|
1367
|
-
# source://openssl//openssl/ssl.rb#
|
1371
|
+
# source://openssl//openssl/ssl.rb#444
|
1368
1372
|
def session_get_cb; end
|
1369
1373
|
|
1370
|
-
# source://openssl//openssl/ssl.rb#
|
1374
|
+
# source://openssl//openssl/ssl.rb#440
|
1371
1375
|
def session_new_cb; end
|
1372
1376
|
|
1373
|
-
# source://openssl//openssl/ssl.rb#
|
1377
|
+
# source://openssl//openssl/ssl.rb#436
|
1374
1378
|
def tmp_dh_callback; end
|
1375
1379
|
|
1376
1380
|
# @return [Boolean]
|
1377
1381
|
#
|
1378
|
-
# source://openssl//openssl/ssl.rb#
|
1382
|
+
# source://openssl//openssl/ssl.rb#426
|
1379
1383
|
def using_anon_cipher?; end
|
1380
1384
|
|
1381
1385
|
class << self
|
@@ -1400,38 +1404,38 @@ class OpenSSL::SSL::SSLSocket
|
|
1400
1404
|
# sock = OpenSSL::SSL::SSLSocket.open('localhost', 443, context: ctx)
|
1401
1405
|
# sock.connect # Initiates a connection to localhost:443 with SSLContext
|
1402
1406
|
#
|
1403
|
-
# source://openssl//openssl/ssl.rb#
|
1407
|
+
# source://openssl//openssl/ssl.rb#470
|
1404
1408
|
def open(remote_host, remote_port, local_host = T.unsafe(nil), local_port = T.unsafe(nil), context: T.unsafe(nil)); end
|
1405
1409
|
end
|
1406
1410
|
end
|
1407
1411
|
|
1408
1412
|
module OpenSSL::SSL::SocketForwarder
|
1409
|
-
# source://openssl//openssl/ssl.rb#
|
1413
|
+
# source://openssl//openssl/ssl.rb#247
|
1410
1414
|
def addr; end
|
1411
1415
|
|
1412
1416
|
# @return [Boolean]
|
1413
1417
|
#
|
1414
|
-
# source://openssl//openssl/ssl.rb#
|
1418
|
+
# source://openssl//openssl/ssl.rb#267
|
1415
1419
|
def closed?; end
|
1416
1420
|
|
1417
|
-
# source://openssl//openssl/ssl.rb#
|
1421
|
+
# source://openssl//openssl/ssl.rb#271
|
1418
1422
|
def do_not_reverse_lookup=(flag); end
|
1419
1423
|
|
1420
|
-
# source://openssl//openssl/ssl.rb#
|
1424
|
+
# source://openssl//openssl/ssl.rb#263
|
1421
1425
|
def fcntl(*args); end
|
1422
1426
|
|
1423
1427
|
# The file descriptor for the socket.
|
1424
1428
|
#
|
1425
|
-
# source://openssl//openssl/ssl.rb#
|
1429
|
+
# source://openssl//openssl/ssl.rb#243
|
1426
1430
|
def fileno; end
|
1427
1431
|
|
1428
|
-
# source://openssl//openssl/ssl.rb#
|
1432
|
+
# source://openssl//openssl/ssl.rb#259
|
1429
1433
|
def getsockopt(level, optname); end
|
1430
1434
|
|
1431
|
-
# source://openssl//openssl/ssl.rb#
|
1435
|
+
# source://openssl//openssl/ssl.rb#251
|
1432
1436
|
def peeraddr; end
|
1433
1437
|
|
1434
|
-
# source://openssl//openssl/ssl.rb#
|
1438
|
+
# source://openssl//openssl/ssl.rb#255
|
1435
1439
|
def setsockopt(level, optname, optval); end
|
1436
1440
|
end
|
1437
1441
|
|