ruby-paseto 0.1.2 → 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (80) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +7 -0
  3. data/README.md +55 -50
  4. data/lib/paseto/asn1/ecdsa_signature.rb +2 -2
  5. data/lib/paseto/asymmetric_key.rb +7 -4
  6. data/lib/paseto/configuration/decode_configuration.rb +7 -7
  7. data/lib/paseto/interface/key.rb +5 -2
  8. data/lib/paseto/interface/pbkd.rb +4 -20
  9. data/lib/paseto/interface/pie.rb +5 -26
  10. data/lib/paseto/interface/pke.rb +15 -51
  11. data/lib/paseto/interface/version.rb +30 -117
  12. data/lib/paseto/operations/id/i_dv3.rb +1 -1
  13. data/lib/paseto/operations/id/i_dv4.rb +1 -1
  14. data/lib/paseto/operations/pbkd/p_b_k_dv3.rb +4 -5
  15. data/lib/paseto/operations/pbkd/p_b_k_dv4.rb +3 -4
  16. data/lib/paseto/operations/pbkw.rb +6 -6
  17. data/lib/paseto/operations/pke/p_k_ev3.rb +23 -25
  18. data/lib/paseto/operations/pke/p_k_ev4.rb +33 -34
  19. data/lib/paseto/operations/pke.rb +9 -10
  20. data/lib/paseto/operations/wrap.rb +1 -1
  21. data/lib/paseto/paserk.rb +1 -1
  22. data/lib/paseto/paserk_types.rb +2 -2
  23. data/lib/paseto/protocol/version3.rb +17 -16
  24. data/lib/paseto/protocol/version4.rb +17 -16
  25. data/lib/paseto/symmetric_key.rb +16 -10
  26. data/lib/paseto/token.rb +17 -15
  27. data/lib/paseto/token_types.rb +2 -2
  28. data/lib/paseto/util.rb +1 -1
  29. data/lib/paseto/v3/local.rb +1 -1
  30. data/lib/paseto/v3/public.rb +5 -4
  31. data/lib/paseto/v4/local.rb +3 -3
  32. data/lib/paseto/v4/public.rb +3 -6
  33. data/lib/paseto/validator.rb +1 -1
  34. data/lib/paseto/version.rb +1 -1
  35. data/lib/paseto/versions.rb +2 -2
  36. data/lib/paseto/wrappers/pie/pie_v3.rb +18 -21
  37. data/lib/paseto/wrappers/pie/pie_v4.rb +17 -20
  38. data/lib/paseto/wrappers/pie.rb +3 -17
  39. data/lib/paseto.rb +2 -5
  40. data/paseto.gemspec +5 -5
  41. data/sorbet/rbi/annotations/.gitattributes +1 -0
  42. data/sorbet/rbi/annotations/rainbow.rbi +4 -4
  43. data/sorbet/rbi/gems/.gitattributes +1 -0
  44. data/sorbet/rbi/gems/diff-lcs@1.5.0.rbi +1 -1
  45. data/sorbet/rbi/gems/docile@1.4.0.rbi +1 -1
  46. data/sorbet/rbi/gems/{ffi@1.15.5.rbi → ffi@1.16.3.rbi} +260 -117
  47. data/sorbet/rbi/gems/{oj@3.14.2.rbi → oj@3.16.1.rbi} +26 -37
  48. data/sorbet/rbi/gems/{rake@13.0.6.rbi → rake@13.1.0.rbi} +75 -69
  49. data/sorbet/rbi/gems/rbnacl@7.1.1.rbi +2 -2
  50. data/sorbet/rbi/gems/{rspec-core@3.12.1.rbi → rspec-core@3.12.2.rbi} +1 -1
  51. data/sorbet/rbi/gems/{rspec-expectations@3.12.2.rbi → rspec-expectations@3.12.3.rbi} +27 -33
  52. data/sorbet/rbi/gems/{rspec-mocks@3.12.4.rbi → rspec-mocks@3.12.6.rbi} +60 -61
  53. data/sorbet/rbi/gems/{rspec-support@3.12.0.rbi → rspec-support@3.12.1.rbi} +35 -43
  54. data/sorbet/rbi/gems/rspec@3.12.0.rbi +22 -28
  55. data/sorbet/rbi/gems/simplecov-html@0.12.3.rbi +41 -44
  56. data/sorbet/rbi/gems/simplecov_json_formatter@0.1.4.rbi +232 -2
  57. data/sorbet/rbi/gems/{timecop@0.9.6.rbi → timecop@0.9.8.rbi} +13 -16
  58. data/sorbet/rbi/shims/multi_json.rbi +2 -0
  59. data/sorbet/rbi/shims/openssl.rbi +0 -8
  60. data/sorbet/rbi/todo.rbi +5 -1
  61. metadata +19 -42
  62. data/sorbet/rbi/gems/ast@2.4.2.rbi +0 -584
  63. data/sorbet/rbi/gems/io-console@0.6.0.rbi +0 -8
  64. data/sorbet/rbi/gems/irb@1.6.3.rbi +0 -342
  65. data/sorbet/rbi/gems/json@2.6.3.rbi +0 -1541
  66. data/sorbet/rbi/gems/multi_json@1.15.0.rbi +0 -267
  67. data/sorbet/rbi/gems/netrc@0.11.0.rbi +0 -158
  68. data/sorbet/rbi/gems/openssl@3.1.0.rbi +0 -1739
  69. data/sorbet/rbi/gems/parallel@1.22.1.rbi +0 -277
  70. data/sorbet/rbi/gems/rainbow@3.1.1.rbi +0 -407
  71. data/sorbet/rbi/gems/regexp_parser@2.7.0.rbi +0 -3580
  72. data/sorbet/rbi/gems/reline@0.3.2.rbi +0 -8
  73. data/sorbet/rbi/gems/rexml@3.2.5.rbi +0 -4717
  74. data/sorbet/rbi/gems/ruby-progressbar@1.13.0.rbi +0 -1317
  75. data/sorbet/rbi/gems/thor@1.2.1.rbi +0 -3956
  76. data/sorbet/rbi/gems/unicode-display_width@2.4.2.rbi +0 -65
  77. data/sorbet/rbi/gems/webrick@1.7.0.rbi +0 -2555
  78. data/sorbet/rbi/gems/yard-sorbet@0.8.0.rbi +0 -441
  79. data/sorbet/rbi/gems/yard@0.9.28.rbi +0 -17816
  80. data/sorbet/rbi/gems/zeitwerk@2.6.7.rbi +0 -8
@@ -1,1739 +0,0 @@
1
- # typed: false
2
-
3
- # DO NOT EDIT MANUALLY
4
- # This is an autogenerated file for types exported from the `openssl` gem.
5
- # Please instead update this file by running `bin/tapioca gem openssl`.
6
-
7
- # --
8
- # Add double dispatch to Integer
9
- # ++
10
- class Integer < ::Numeric
11
- # Casts an Integer as an OpenSSL::BN
12
- #
13
- # See `man bn` for more info.
14
- #
15
- # source://openssl//openssl/bn.rb#37
16
- def to_bn; end
17
- end
18
-
19
- Integer::GMP_VERSION = T.let(T.unsafe(nil), String)
20
-
21
- module OpenSSL
22
- private
23
-
24
- # Returns a Digest subclass by _name_
25
- #
26
- # require 'openssl'
27
- #
28
- # OpenSSL::Digest("MD5")
29
- # # => OpenSSL::Digest::MD5
30
- #
31
- # Digest("Foo")
32
- # # => NameError: wrong constant name Foo
33
- #
34
- # source://openssl//openssl/digest.rb#67
35
- def Digest(name); end
36
-
37
- class << self
38
- # Returns a Digest subclass by _name_
39
- #
40
- # require 'openssl'
41
- #
42
- # OpenSSL::Digest("MD5")
43
- # # => OpenSSL::Digest::MD5
44
- #
45
- # Digest("Foo")
46
- # # => NameError: wrong constant name Foo
47
- #
48
- # source://openssl//openssl/digest.rb#67
49
- def Digest(name); end
50
-
51
- # call-seq:
52
- # OpenSSL.secure_compare(string, string) -> boolean
53
- #
54
- # Constant time memory comparison. Inputs are hashed using SHA-256 to mask
55
- # the length of the secret. Returns +true+ if the strings are identical,
56
- # +false+ otherwise.
57
- #
58
- # source://openssl//openssl.rb#32
59
- def secure_compare(a, b); end
60
- end
61
- end
62
-
63
- class OpenSSL::BN
64
- include ::Comparable
65
-
66
- # source://openssl//openssl/bn.rb#20
67
- def pretty_print(q); end
68
- end
69
-
70
- OpenSSL::BN::CONSTTIME = T.let(T.unsafe(nil), Integer)
71
-
72
- # OpenSSL IO buffering mix-in module.
73
- #
74
- # This module allows an OpenSSL::SSL::SSLSocket to behave like an IO.
75
- #
76
- # You typically won't use this module directly, you can see it implemented in
77
- # OpenSSL::SSL::SSLSocket.
78
- module OpenSSL::Buffering
79
- include ::Enumerable
80
-
81
- # Creates an instance of OpenSSL's buffering IO module.
82
- #
83
- # source://openssl//openssl/buffering.rb#63
84
- def initialize(*_arg0); end
85
-
86
- # Writes _s_ to the stream. _s_ will be converted to a String using
87
- # +.to_s+ method.
88
- #
89
- # source://openssl//openssl/buffering.rb#422
90
- def <<(s); end
91
-
92
- # Closes the SSLSocket and flushes any unwritten data.
93
- #
94
- # source://openssl//openssl/buffering.rb#483
95
- def close; end
96
-
97
- # Executes the block for every line in the stream where lines are separated
98
- # by _eol_.
99
- #
100
- # See also #gets
101
- #
102
- # source://openssl//openssl/buffering.rb#259
103
- def each(eol = T.unsafe(nil)); end
104
-
105
- # Calls the given block once for each byte in the stream.
106
- #
107
- # source://openssl//openssl/buffering.rb#300
108
- def each_byte; end
109
-
110
- # Executes the block for every line in the stream where lines are separated
111
- # by _eol_.
112
- #
113
- # See also #gets
114
- #
115
- # source://openssl//openssl/buffering.rb#259
116
- def each_line(eol = T.unsafe(nil)); end
117
-
118
- # Returns true if the stream is at file which means there is no more data to
119
- # be read.
120
- #
121
- # @return [Boolean]
122
- #
123
- # source://openssl//openssl/buffering.rb#331
124
- def eof; end
125
-
126
- # Returns true if the stream is at file which means there is no more data to
127
- # be read.
128
- #
129
- # @return [Boolean]
130
- #
131
- # source://openssl//openssl/buffering.rb#331
132
- def eof?; end
133
-
134
- # Flushes buffered data to the SSLSocket.
135
- #
136
- # source://openssl//openssl/buffering.rb#471
137
- def flush; end
138
-
139
- # call-seq:
140
- # ssl.getbyte => 81
141
- #
142
- # Get the next 8bit byte from `ssl`. Returns `nil` on EOF
143
- #
144
- # source://openssl//openssl/buffering.rb#108
145
- def getbyte; end
146
-
147
- # Reads one character from the stream. Returns nil if called at end of
148
- # file.
149
- #
150
- # source://openssl//openssl/buffering.rb#293
151
- def getc; end
152
-
153
- # Reads the next "line" from the stream. Lines are separated by _eol_. If
154
- # _limit_ is provided the result will not be longer than the given number of
155
- # bytes.
156
- #
157
- # _eol_ may be a String or Regexp.
158
- #
159
- # Unlike IO#gets the line read will not be assigned to +$_+.
160
- #
161
- # Unlike IO#gets the separator must be provided if a limit is provided.
162
- #
163
- # source://openssl//openssl/buffering.rb#235
164
- def gets(eol = T.unsafe(nil), limit = T.unsafe(nil)); end
165
-
166
- # Writes _args_ to the stream.
167
- #
168
- # See IO#print for full details.
169
- #
170
- # source://openssl//openssl/buffering.rb#450
171
- def print(*args); end
172
-
173
- # Formats and writes to the stream converting parameters under control of
174
- # the format string.
175
- #
176
- # See Kernel#sprintf for format string details.
177
- #
178
- # source://openssl//openssl/buffering.rb#463
179
- def printf(s, *args); end
180
-
181
- # Writes _args_ to the stream along with a record separator.
182
- #
183
- # See IO#puts for full details.
184
- #
185
- # source://openssl//openssl/buffering.rb#432
186
- def puts(*args); end
187
-
188
- # Reads _size_ bytes from the stream. If _buf_ is provided it must
189
- # reference a string which will receive the data.
190
- #
191
- # See IO#read for full details.
192
- #
193
- # source://openssl//openssl/buffering.rb#119
194
- def read(size = T.unsafe(nil), buf = T.unsafe(nil)); end
195
-
196
- # Reads at most _maxlen_ bytes in the non-blocking manner.
197
- #
198
- # When no data can be read without blocking it raises
199
- # OpenSSL::SSL::SSLError extended by IO::WaitReadable or IO::WaitWritable.
200
- #
201
- # IO::WaitReadable means SSL needs to read internally so read_nonblock
202
- # should be called again when the underlying IO is readable.
203
- #
204
- # IO::WaitWritable means SSL needs to write internally so read_nonblock
205
- # should be called again after the underlying IO is writable.
206
- #
207
- # OpenSSL::Buffering#read_nonblock needs two rescue clause as follows:
208
- #
209
- # # emulates blocking read (readpartial).
210
- # begin
211
- # result = ssl.read_nonblock(maxlen)
212
- # rescue IO::WaitReadable
213
- # IO.select([io])
214
- # retry
215
- # rescue IO::WaitWritable
216
- # IO.select(nil, [io])
217
- # retry
218
- # end
219
- #
220
- # Note that one reason that read_nonblock writes to the underlying IO is
221
- # when the peer requests a new TLS/SSL handshake. See openssl the FAQ for
222
- # more details. http://www.openssl.org/support/faq.html
223
- #
224
- # By specifying a keyword argument _exception_ to +false+, you can indicate
225
- # that read_nonblock should not raise an IO::Wait*able exception, but
226
- # return the symbol +:wait_writable+ or +:wait_readable+ instead. At EOF,
227
- # it will return +nil+ instead of raising EOFError.
228
- #
229
- # source://openssl//openssl/buffering.rb#204
230
- def read_nonblock(maxlen, buf = T.unsafe(nil), exception: T.unsafe(nil)); end
231
-
232
- # Reads a one-character string from the stream. Raises an EOFError at end
233
- # of file.
234
- #
235
- # @raise [EOFError]
236
- #
237
- # source://openssl//openssl/buffering.rb#310
238
- def readchar; end
239
-
240
- # Reads a line from the stream which is separated by _eol_.
241
- #
242
- # Raises EOFError if at end of file.
243
- #
244
- # @raise [EOFError]
245
- #
246
- # source://openssl//openssl/buffering.rb#284
247
- def readline(eol = T.unsafe(nil)); end
248
-
249
- # Reads lines from the stream which are separated by _eol_.
250
- #
251
- # See also #gets
252
- #
253
- # source://openssl//openssl/buffering.rb#271
254
- def readlines(eol = T.unsafe(nil)); end
255
-
256
- # Reads at most _maxlen_ bytes from the stream. If _buf_ is provided it
257
- # must reference a string which will receive the data.
258
- #
259
- # See IO#readpartial for full details.
260
- #
261
- # source://openssl//openssl/buffering.rb#146
262
- def readpartial(maxlen, buf = T.unsafe(nil)); end
263
-
264
- # The "sync mode" of the SSLSocket.
265
- #
266
- # See IO#sync for full details.
267
- #
268
- # source://openssl//openssl/buffering.rb#53
269
- def sync; end
270
-
271
- # The "sync mode" of the SSLSocket.
272
- #
273
- # See IO#sync for full details.
274
- #
275
- # source://openssl//openssl/buffering.rb#53
276
- def sync=(_arg0); end
277
-
278
- # Pushes character _c_ back onto the stream such that a subsequent buffered
279
- # character read will return it.
280
- #
281
- # Unlike IO#getc multiple bytes may be pushed back onto the stream.
282
- #
283
- # Has no effect on unbuffered reads (such as #sysread).
284
- #
285
- # source://openssl//openssl/buffering.rb#323
286
- def ungetc(c); end
287
-
288
- # Writes _s_ to the stream. If the argument is not a String it will be
289
- # converted using +.to_s+ method. Returns the number of bytes written.
290
- #
291
- # source://openssl//openssl/buffering.rb#369
292
- def write(*s); end
293
-
294
- # Writes _s_ in the non-blocking manner.
295
- #
296
- # If there is buffered data, it is flushed first. This may block.
297
- #
298
- # write_nonblock returns number of bytes written to the SSL connection.
299
- #
300
- # When no data can be written without blocking it raises
301
- # OpenSSL::SSL::SSLError extended by IO::WaitReadable or IO::WaitWritable.
302
- #
303
- # IO::WaitReadable means SSL needs to read internally so write_nonblock
304
- # should be called again after the underlying IO is readable.
305
- #
306
- # IO::WaitWritable means SSL needs to write internally so write_nonblock
307
- # should be called again after underlying IO is writable.
308
- #
309
- # So OpenSSL::Buffering#write_nonblock needs two rescue clause as follows.
310
- #
311
- # # emulates blocking write.
312
- # begin
313
- # result = ssl.write_nonblock(str)
314
- # rescue IO::WaitReadable
315
- # IO.select([io])
316
- # retry
317
- # rescue IO::WaitWritable
318
- # IO.select(nil, [io])
319
- # retry
320
- # end
321
- #
322
- # Note that one reason that write_nonblock reads from the underlying IO
323
- # is when the peer requests a new TLS/SSL handshake. See the openssl FAQ
324
- # for more details. http://www.openssl.org/support/faq.html
325
- #
326
- # By specifying a keyword argument _exception_ to +false+, you can indicate
327
- # that write_nonblock should not raise an IO::Wait*able exception, but
328
- # return the symbol +:wait_writable+ or +:wait_readable+ instead.
329
- #
330
- # source://openssl//openssl/buffering.rb#413
331
- def write_nonblock(s, exception: T.unsafe(nil)); end
332
-
333
- private
334
-
335
- # Consumes _size_ bytes from the buffer
336
- #
337
- # source://openssl//openssl/buffering.rb#91
338
- def consume_rbuff(size = T.unsafe(nil)); end
339
-
340
- # Writes _s_ to the buffer. When the buffer is full or #sync is true the
341
- # buffer is flushed to the underlying socket.
342
- #
343
- # source://openssl//openssl/buffering.rb#346
344
- def do_write(s); end
345
-
346
- # Fills the buffer from the underlying SSLSocket
347
- #
348
- # source://openssl//openssl/buffering.rb#78
349
- def fill_rbuff; end
350
- end
351
-
352
- # A buffer which will retain binary encoding.
353
- class OpenSSL::Buffering::Buffer < ::String
354
- # @return [Buffer] a new instance of Buffer
355
- #
356
- # source://openssl//openssl/buffering.rb#29
357
- def initialize; end
358
-
359
- # source://openssl//openssl/buffering.rb#35
360
- def <<(string); end
361
-
362
- # source://openssl//openssl/buffering.rb#35
363
- def concat(string); end
364
- end
365
-
366
- # source://openssl//openssl/buffering.rb#27
367
- OpenSSL::Buffering::Buffer::BINARY = T.let(T.unsafe(nil), Encoding)
368
-
369
- class OpenSSL::Cipher
370
- # call-seq:
371
- # cipher.random_iv -> iv
372
- #
373
- # Generate a random IV with OpenSSL::Random.random_bytes and sets it to the
374
- # cipher, and returns it.
375
- #
376
- # You must call #encrypt or #decrypt before calling this method.
377
- #
378
- # source://openssl//openssl/cipher.rb#55
379
- def random_iv; end
380
-
381
- # call-seq:
382
- # cipher.random_key -> key
383
- #
384
- # Generate a random key with OpenSSL::Random.random_bytes and sets it to
385
- # the cipher, and returns it.
386
- #
387
- # You must call #encrypt or #decrypt before calling this method.
388
- #
389
- # source://openssl//openssl/cipher.rb#43
390
- def random_key; end
391
- end
392
-
393
- class OpenSSL::Cipher::AES < ::OpenSSL::Cipher
394
- # source://openssl//openssl/cipher.rb#19
395
- def initialize(*args); end
396
- end
397
-
398
- class OpenSSL::Cipher::AES128 < ::OpenSSL::Cipher
399
- # source://openssl//openssl/cipher.rb#29
400
- def initialize(mode = T.unsafe(nil)); end
401
- end
402
-
403
- class OpenSSL::Cipher::AES192 < ::OpenSSL::Cipher
404
- # source://openssl//openssl/cipher.rb#29
405
- def initialize(mode = T.unsafe(nil)); end
406
- end
407
-
408
- class OpenSSL::Cipher::AES256 < ::OpenSSL::Cipher
409
- # source://openssl//openssl/cipher.rb#29
410
- def initialize(mode = T.unsafe(nil)); end
411
- end
412
-
413
- class OpenSSL::Cipher::BF < ::OpenSSL::Cipher
414
- # source://openssl//openssl/cipher.rb#19
415
- def initialize(*args); end
416
- end
417
-
418
- class OpenSSL::Cipher::CAST5 < ::OpenSSL::Cipher
419
- # source://openssl//openssl/cipher.rb#19
420
- def initialize(*args); end
421
- end
422
-
423
- # Deprecated.
424
- #
425
- # This class is only provided for backwards compatibility.
426
- # Use OpenSSL::Cipher.
427
- class OpenSSL::Cipher::Cipher < ::OpenSSL::Cipher; end
428
-
429
- class OpenSSL::Cipher::DES < ::OpenSSL::Cipher
430
- # source://openssl//openssl/cipher.rb#19
431
- def initialize(*args); end
432
- end
433
-
434
- class OpenSSL::Cipher::IDEA < ::OpenSSL::Cipher
435
- # source://openssl//openssl/cipher.rb#19
436
- def initialize(*args); end
437
- end
438
-
439
- class OpenSSL::Cipher::RC2 < ::OpenSSL::Cipher
440
- # source://openssl//openssl/cipher.rb#19
441
- def initialize(*args); end
442
- end
443
-
444
- class OpenSSL::Cipher::RC4 < ::OpenSSL::Cipher
445
- # source://openssl//openssl/cipher.rb#19
446
- def initialize(*args); end
447
- end
448
-
449
- class OpenSSL::Cipher::RC5 < ::OpenSSL::Cipher
450
- # source://openssl//openssl/cipher.rb#19
451
- def initialize(*args); end
452
- end
453
-
454
- class OpenSSL::Config
455
- include ::Enumerable
456
- end
457
-
458
- class OpenSSL::Digest < ::Digest::Class
459
- class << self
460
- # Return the hash value computed with _name_ Digest. _name_ is either the
461
- # long name or short name of a supported digest algorithm.
462
- #
463
- # === Examples
464
- #
465
- # OpenSSL::Digest.digest("SHA256", "abc")
466
- #
467
- # which is equivalent to:
468
- #
469
- # OpenSSL::Digest.digest('SHA256', "abc")
470
- #
471
- # source://openssl//openssl/digest.rb#29
472
- def digest(name, data); end
473
- end
474
- end
475
-
476
- # Deprecated.
477
- #
478
- # This class is only provided for backwards compatibility.
479
- # Use OpenSSL::Digest instead.
480
- class OpenSSL::Digest::Digest < ::OpenSSL::Digest; end
481
-
482
- class OpenSSL::Digest::MD4 < ::OpenSSL::Digest
483
- # source://openssl//openssl/digest.rb#35
484
- def initialize(data = T.unsafe(nil)); end
485
-
486
- class << self
487
- # source://openssl//openssl/digest.rb#41
488
- def digest(data); end
489
-
490
- # source://openssl//openssl/digest.rb#42
491
- def hexdigest(data); end
492
- end
493
- end
494
-
495
- class OpenSSL::Digest::MD5 < ::OpenSSL::Digest
496
- # source://openssl//openssl/digest.rb#35
497
- def initialize(data = T.unsafe(nil)); end
498
-
499
- class << self
500
- # source://openssl//openssl/digest.rb#41
501
- def digest(data); end
502
-
503
- # source://openssl//openssl/digest.rb#42
504
- def hexdigest(data); end
505
- end
506
- end
507
-
508
- class OpenSSL::Digest::RIPEMD160 < ::OpenSSL::Digest
509
- # source://openssl//openssl/digest.rb#35
510
- def initialize(data = T.unsafe(nil)); end
511
-
512
- class << self
513
- # source://openssl//openssl/digest.rb#41
514
- def digest(data); end
515
-
516
- # source://openssl//openssl/digest.rb#42
517
- def hexdigest(data); end
518
- end
519
- end
520
-
521
- class OpenSSL::Digest::SHA1 < ::OpenSSL::Digest
522
- # source://openssl//openssl/digest.rb#35
523
- def initialize(data = T.unsafe(nil)); end
524
-
525
- class << self
526
- # source://openssl//openssl/digest.rb#41
527
- def digest(data); end
528
-
529
- # source://openssl//openssl/digest.rb#42
530
- def hexdigest(data); end
531
- end
532
- end
533
-
534
- class OpenSSL::Digest::SHA224 < ::OpenSSL::Digest
535
- # source://openssl//openssl/digest.rb#35
536
- def initialize(data = T.unsafe(nil)); end
537
-
538
- class << self
539
- # source://openssl//openssl/digest.rb#41
540
- def digest(data); end
541
-
542
- # source://openssl//openssl/digest.rb#42
543
- def hexdigest(data); end
544
- end
545
- end
546
-
547
- class OpenSSL::Digest::SHA256 < ::OpenSSL::Digest
548
- # source://openssl//openssl/digest.rb#35
549
- def initialize(data = T.unsafe(nil)); end
550
-
551
- class << self
552
- # source://openssl//openssl/digest.rb#41
553
- def digest(data); end
554
-
555
- # source://openssl//openssl/digest.rb#42
556
- def hexdigest(data); end
557
- end
558
- end
559
-
560
- class OpenSSL::Digest::SHA384 < ::OpenSSL::Digest
561
- # source://openssl//openssl/digest.rb#35
562
- def initialize(data = T.unsafe(nil)); end
563
-
564
- class << self
565
- # source://openssl//openssl/digest.rb#41
566
- def digest(data); end
567
-
568
- # source://openssl//openssl/digest.rb#42
569
- def hexdigest(data); end
570
- end
571
- end
572
-
573
- class OpenSSL::Digest::SHA512 < ::OpenSSL::Digest
574
- # source://openssl//openssl/digest.rb#35
575
- def initialize(data = T.unsafe(nil)); end
576
-
577
- class << self
578
- # source://openssl//openssl/digest.rb#41
579
- def digest(data); end
580
-
581
- # source://openssl//openssl/digest.rb#42
582
- def hexdigest(data); end
583
- end
584
- end
585
-
586
- class OpenSSL::HMAC
587
- # Securely compare with another HMAC instance in constant time.
588
- #
589
- # source://openssl//openssl/hmac.rb#6
590
- def ==(other); end
591
-
592
- # :call-seq:
593
- # hmac.base64digest -> string
594
- #
595
- # Returns the authentication code an a Base64-encoded string.
596
- #
597
- # source://openssl//openssl/hmac.rb#17
598
- def base64digest; end
599
-
600
- class << self
601
- # :call-seq:
602
- # HMAC.base64digest(digest, key, data) -> aString
603
- #
604
- # Returns the authentication code as a Base64-encoded string. The _digest_
605
- # parameter specifies the digest algorithm to use. This may be a String
606
- # representing the algorithm name or an instance of OpenSSL::Digest.
607
- #
608
- # === Example
609
- # key = 'key'
610
- # data = 'The quick brown fox jumps over the lazy dog'
611
- #
612
- # hmac = OpenSSL::HMAC.base64digest('SHA1', key, data)
613
- # #=> "3nybhbi3iqa8ino29wqQcBydtNk="
614
- #
615
- # source://openssl//openssl/hmac.rb#73
616
- def base64digest(digest, key, data); end
617
-
618
- # :call-seq:
619
- # HMAC.digest(digest, key, data) -> aString
620
- #
621
- # Returns the authentication code as a binary string. The _digest_ parameter
622
- # specifies the digest algorithm to use. This may be a String representing
623
- # the algorithm name or an instance of OpenSSL::Digest.
624
- #
625
- # === Example
626
- # key = 'key'
627
- # data = 'The quick brown fox jumps over the lazy dog'
628
- #
629
- # hmac = OpenSSL::HMAC.digest('SHA1', key, data)
630
- # #=> "\xDE|\x9B\x85\xB8\xB7\x8A\xA6\xBC\x8Az6\xF7\n\x90p\x1C\x9D\xB4\xD9"
631
- #
632
- # source://openssl//openssl/hmac.rb#35
633
- def digest(digest, key, data); end
634
-
635
- # :call-seq:
636
- # HMAC.hexdigest(digest, key, data) -> aString
637
- #
638
- # Returns the authentication code as a hex-encoded string. The _digest_
639
- # parameter specifies the digest algorithm to use. This may be a String
640
- # representing the algorithm name or an instance of OpenSSL::Digest.
641
- #
642
- # === Example
643
- # key = 'key'
644
- # data = 'The quick brown fox jumps over the lazy dog'
645
- #
646
- # hmac = OpenSSL::HMAC.hexdigest('SHA1', key, data)
647
- # #=> "de7c9b85b8b78aa6bc8a7a36f70a90701c9db4d9"
648
- #
649
- # source://openssl//openssl/hmac.rb#54
650
- def hexdigest(digest, key, data); end
651
- end
652
- end
653
-
654
- module OpenSSL::Marshal
655
- mixes_in_class_methods ::OpenSSL::Marshal::ClassMethods
656
-
657
- # source://openssl//openssl/marshal.rb#26
658
- def _dump(_level); end
659
-
660
- class << self
661
- # @private
662
- #
663
- # source://openssl//openssl/marshal.rb#16
664
- def included(base); end
665
- end
666
- end
667
-
668
- module OpenSSL::Marshal::ClassMethods
669
- # source://openssl//openssl/marshal.rb#21
670
- def _load(string); end
671
- end
672
-
673
- module OpenSSL::PKCS5
674
- private
675
-
676
- # OpenSSL::PKCS5.pbkdf2_hmac has been renamed to OpenSSL::KDF.pbkdf2_hmac.
677
- # This method is provided for backwards compatibility.
678
- #
679
- # source://openssl//openssl/pkcs5.rb#13
680
- def pbkdf2_hmac(pass, salt, iter, keylen, digest); end
681
-
682
- # source://openssl//openssl/pkcs5.rb#18
683
- def pbkdf2_hmac_sha1(pass, salt, iter, keylen); end
684
-
685
- class << self
686
- # OpenSSL::PKCS5.pbkdf2_hmac has been renamed to OpenSSL::KDF.pbkdf2_hmac.
687
- # This method is provided for backwards compatibility.
688
- #
689
- # source://openssl//openssl/pkcs5.rb#13
690
- def pbkdf2_hmac(pass, salt, iter, keylen, digest); end
691
-
692
- # source://openssl//openssl/pkcs5.rb#18
693
- def pbkdf2_hmac_sha1(pass, salt, iter, keylen); end
694
- end
695
- end
696
-
697
- class OpenSSL::PKey::DH < ::OpenSSL::PKey::PKey
698
- include ::OpenSSL::Marshal
699
- extend ::OpenSSL::Marshal::ClassMethods
700
-
701
- # :call-seq:
702
- # dh.compute_key(pub_bn) -> string
703
- #
704
- # Returns a String containing a shared secret computed from the other
705
- # party's public value.
706
- #
707
- # This method is provided for backwards compatibility, and calls #derive
708
- # internally.
709
- #
710
- # === Parameters
711
- # * _pub_bn_ is a OpenSSL::BN, *not* the DH instance returned by
712
- # DH#public_key as that contains the DH parameters only.
713
- #
714
- # source://openssl//openssl/pkey.rb#49
715
- def compute_key(pub_bn); end
716
-
717
- # :call-seq:
718
- # dh.generate_key! -> self
719
- #
720
- # Generates a private and public key unless a private key already exists.
721
- # If this DH instance was generated from public \DH parameters (e.g. by
722
- # encoding the result of DH#public_key), then this method needs to be
723
- # called first in order to generate the per-session keys before performing
724
- # the actual key exchange.
725
- #
726
- # <b>Deprecated in version 3.0</b>. This method is incompatible with
727
- # OpenSSL 3.0.0 or later.
728
- #
729
- # See also OpenSSL::PKey.generate_key.
730
- #
731
- # Example:
732
- # # DEPRECATED USAGE: This will not work on OpenSSL 3.0 or later
733
- # dh0 = OpenSSL::PKey::DH.new(2048)
734
- # dh = dh0.public_key # #public_key only copies the DH parameters (contrary to the name)
735
- # dh.generate_key!
736
- # puts dh.private? # => true
737
- # puts dh0.pub_key == dh.pub_key #=> false
738
- #
739
- # # With OpenSSL::PKey.generate_key
740
- # dh0 = OpenSSL::PKey::DH.new(2048)
741
- # dh = OpenSSL::PKey.generate_key(dh0)
742
- # puts dh0.pub_key == dh.pub_key #=> false
743
- #
744
- # source://openssl//openssl/pkey.rb#91
745
- def generate_key!; end
746
-
747
- # :call-seq:
748
- # dh.public_key -> dhnew
749
- #
750
- # Returns a new DH instance that carries just the \DH parameters.
751
- #
752
- # Contrary to the method name, the returned DH object contains only
753
- # parameters and not the public key.
754
- #
755
- # This method is provided for backwards compatibility. In most cases, there
756
- # is no need to call this method.
757
- #
758
- # For the purpose of re-generating the key pair while keeping the
759
- # parameters, check OpenSSL::PKey.generate_key.
760
- #
761
- # Example:
762
- # # OpenSSL::PKey::DH.generate by default generates a random key pair
763
- # dh1 = OpenSSL::PKey::DH.generate(2048)
764
- # p dh1.priv_key #=> #<OpenSSL::BN 1288347...>
765
- # dhcopy = dh1.public_key
766
- # p dhcopy.priv_key #=> nil
767
- #
768
- # source://openssl//openssl/pkey.rb#33
769
- def public_key; end
770
-
771
- class << self
772
- # :call-seq:
773
- # DH.generate(size, generator = 2) -> dh
774
- #
775
- # Creates a new DH instance from scratch by generating random parameters
776
- # and a key pair.
777
- #
778
- # See also OpenSSL::PKey.generate_parameters and
779
- # OpenSSL::PKey.generate_key.
780
- #
781
- # +size+::
782
- # The desired key size in bits.
783
- # +generator+::
784
- # The generator.
785
- #
786
- # source://openssl//openssl/pkey.rb#118
787
- def generate(size, generator = T.unsafe(nil), &blk); end
788
-
789
- # Handle DH.new(size, generator) form here; new(str) and new() forms
790
- # are handled by #initialize
791
- #
792
- # source://openssl//openssl/pkey.rb#128
793
- def new(*args, &blk); end
794
- end
795
- end
796
-
797
- class OpenSSL::PKey::DSA < ::OpenSSL::PKey::PKey
798
- include ::OpenSSL::Marshal
799
- extend ::OpenSSL::Marshal::ClassMethods
800
-
801
- # :call-seq:
802
- # dsa.public_key -> dsanew
803
- #
804
- # Returns a new DSA instance that carries just the \DSA parameters and the
805
- # public key.
806
- #
807
- # This method is provided for backwards compatibility. In most cases, there
808
- # is no need to call this method.
809
- #
810
- # For the purpose of serializing the public key, to PEM or DER encoding of
811
- # X.509 SubjectPublicKeyInfo format, check PKey#public_to_pem and
812
- # PKey#public_to_der.
813
- #
814
- # source://openssl//openssl/pkey.rb#153
815
- def public_key; end
816
-
817
- # :call-seq:
818
- # dsa.syssign(string) -> string
819
- #
820
- # Computes and returns the \DSA signature of +string+, where +string+ is
821
- # expected to be an already-computed message digest of the original input
822
- # data. The signature is issued using the private key of this DSA instance.
823
- #
824
- # <b>Deprecated in version 3.0</b>.
825
- # Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw instead.
826
- #
827
- # +string+::
828
- # A message digest of the original input data to be signed.
829
- #
830
- # Example:
831
- # dsa = OpenSSL::PKey::DSA.new(2048)
832
- # doc = "Sign me"
833
- # digest = OpenSSL::Digest.digest('SHA1', doc)
834
- #
835
- # # With legacy #syssign and #sysverify:
836
- # sig = dsa.syssign(digest)
837
- # p dsa.sysverify(digest, sig) #=> true
838
- #
839
- # # With #sign_raw and #verify_raw:
840
- # sig = dsa.sign_raw(nil, digest)
841
- # p dsa.verify_raw(nil, sig, digest) #=> true
842
- #
843
- # source://openssl//openssl/pkey.rb#220
844
- def syssign(string); end
845
-
846
- # :call-seq:
847
- # dsa.sysverify(digest, sig) -> true | false
848
- #
849
- # Verifies whether the signature is valid given the message digest input.
850
- # It does so by validating +sig+ using the public key of this DSA instance.
851
- #
852
- # <b>Deprecated in version 3.0</b>.
853
- # Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw instead.
854
- #
855
- # +digest+::
856
- # A message digest of the original input data to be signed.
857
- # +sig+::
858
- # A \DSA signature value.
859
- #
860
- # source://openssl//openssl/pkey.rb#243
861
- def sysverify(digest, sig); end
862
-
863
- class << self
864
- # :call-seq:
865
- # DSA.generate(size) -> dsa
866
- #
867
- # Creates a new DSA instance by generating a private/public key pair
868
- # from scratch.
869
- #
870
- # See also OpenSSL::PKey.generate_parameters and
871
- # OpenSSL::PKey.generate_key.
872
- #
873
- # +size+::
874
- # The desired key size in bits.
875
- #
876
- # source://openssl//openssl/pkey.rb#169
877
- def generate(size, &blk); end
878
-
879
- # Handle DSA.new(size) form here; new(str) and new() forms
880
- # are handled by #initialize
881
- #
882
- # source://openssl//openssl/pkey.rb#186
883
- def new(*args, &blk); end
884
- end
885
- end
886
-
887
- class OpenSSL::PKey::EC < ::OpenSSL::PKey::PKey
888
- include ::OpenSSL::Marshal
889
- extend ::OpenSSL::Marshal::ClassMethods
890
-
891
- # :call-seq:
892
- # ec.dh_compute_key(pubkey) -> string
893
- #
894
- # Derives a shared secret by ECDH. _pubkey_ must be an instance of
895
- # OpenSSL::PKey::EC::Point and must belong to the same group.
896
- #
897
- # This method is provided for backwards compatibility, and calls #derive
898
- # internally.
899
- #
900
- # source://openssl//openssl/pkey.rb#284
901
- def dh_compute_key(pubkey); end
902
-
903
- # :call-seq:
904
- # key.dsa_sign_asn1(data) -> String
905
- #
906
- # <b>Deprecated in version 3.0</b>.
907
- # Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw instead.
908
- #
909
- # source://openssl//openssl/pkey.rb#259
910
- def dsa_sign_asn1(data); end
911
-
912
- # :call-seq:
913
- # key.dsa_verify_asn1(data, sig) -> true | false
914
- #
915
- # <b>Deprecated in version 3.0</b>.
916
- # Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw instead.
917
- #
918
- # source://openssl//openssl/pkey.rb#270
919
- def dsa_verify_asn1(data, sig); end
920
- end
921
-
922
- OpenSSL::PKey::EC::EXPLICIT_CURVE = T.let(T.unsafe(nil), Integer)
923
-
924
- class OpenSSL::PKey::EC::Point
925
- # :call-seq:
926
- # point.to_bn([conversion_form]) -> OpenSSL::BN
927
- #
928
- # Returns the octet string representation of the EC point as an instance of
929
- # OpenSSL::BN.
930
- #
931
- # If _conversion_form_ is not given, the _point_conversion_form_ attribute
932
- # set to the group is used.
933
- #
934
- # See #to_octet_string for more information.
935
- #
936
- # source://openssl//openssl/pkey.rb#307
937
- def to_bn(conversion_form = T.unsafe(nil)); end
938
- end
939
-
940
- class OpenSSL::PKey::RSA < ::OpenSSL::PKey::PKey
941
- include ::OpenSSL::Marshal
942
- extend ::OpenSSL::Marshal::ClassMethods
943
-
944
- # :call-seq:
945
- # rsa.private_decrypt(string) -> String
946
- # rsa.private_decrypt(string, padding) -> String
947
- #
948
- # Decrypt +string+, which has been encrypted with the public key, with the
949
- # private key. +padding+ defaults to PKCS1_PADDING, which is known to be
950
- # insecure but is kept for backwards compatibility.
951
- #
952
- # <b>Deprecated in version 3.0</b>.
953
- # Consider using PKey::PKey#encrypt and PKey::PKey#decrypt instead.
954
- #
955
- # source://openssl//openssl/pkey.rb#439
956
- def private_decrypt(data, padding = T.unsafe(nil)); end
957
-
958
- # :call-seq:
959
- # rsa.private_encrypt(string) -> String
960
- # rsa.private_encrypt(string, padding) -> String
961
- #
962
- # Encrypt +string+ with the private key. +padding+ defaults to
963
- # PKCS1_PADDING, which is known to be insecure but is kept for backwards
964
- # compatibility. The encrypted string output can be decrypted using
965
- # #public_decrypt.
966
- #
967
- # <b>Deprecated in version 3.0</b>.
968
- # Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw, and
969
- # PKey::PKey#verify_recover instead.
970
- #
971
- # source://openssl//openssl/pkey.rb#373
972
- def private_encrypt(string, padding = T.unsafe(nil)); end
973
-
974
- # :call-seq:
975
- # rsa.public_decrypt(string) -> String
976
- # rsa.public_decrypt(string, padding) -> String
977
- #
978
- # Decrypt +string+, which has been encrypted with the private key, with the
979
- # public key. +padding+ defaults to PKCS1_PADDING which is known to be
980
- # insecure but is kept for backwards compatibility.
981
- #
982
- # <b>Deprecated in version 3.0</b>.
983
- # Consider using PKey::PKey#sign_raw and PKey::PKey#verify_raw, and
984
- # PKey::PKey#verify_recover instead.
985
- #
986
- # source://openssl//openssl/pkey.rb#396
987
- def public_decrypt(string, padding = T.unsafe(nil)); end
988
-
989
- # :call-seq:
990
- # rsa.public_encrypt(string) -> String
991
- # rsa.public_encrypt(string, padding) -> String
992
- #
993
- # Encrypt +string+ with the public key. +padding+ defaults to
994
- # PKCS1_PADDING, which is known to be insecure but is kept for backwards
995
- # compatibility. The encrypted string output can be decrypted using
996
- # #private_decrypt.
997
- #
998
- # <b>Deprecated in version 3.0</b>.
999
- # Consider using PKey::PKey#encrypt and PKey::PKey#decrypt instead.
1000
- #
1001
- # source://openssl//openssl/pkey.rb#418
1002
- def public_encrypt(data, padding = T.unsafe(nil)); end
1003
-
1004
- # :call-seq:
1005
- # rsa.public_key -> rsanew
1006
- #
1007
- # Returns a new RSA instance that carries just the public key components.
1008
- #
1009
- # This method is provided for backwards compatibility. In most cases, there
1010
- # is no need to call this method.
1011
- #
1012
- # For the purpose of serializing the public key, to PEM or DER encoding of
1013
- # X.509 SubjectPublicKeyInfo format, check PKey#public_to_pem and
1014
- # PKey#public_to_der.
1015
- #
1016
- # source://openssl//openssl/pkey.rb#327
1017
- def public_key; end
1018
-
1019
- private
1020
-
1021
- # source://openssl//openssl/pkey.rb#456
1022
- def translate_padding_mode(num); end
1023
-
1024
- class << self
1025
- # :call-seq:
1026
- # RSA.generate(size, exponent = 65537) -> RSA
1027
- #
1028
- # Generates an \RSA keypair.
1029
- #
1030
- # See also OpenSSL::PKey.generate_key.
1031
- #
1032
- # +size+::
1033
- # The desired key size in bits.
1034
- # +exponent+::
1035
- # An odd Integer, normally 3, 17, or 65537.
1036
- #
1037
- # source://openssl//openssl/pkey.rb#343
1038
- def generate(size, exp = T.unsafe(nil), &blk); end
1039
-
1040
- # Handle RSA.new(size, exponent) form here; new(str) and new() forms
1041
- # are handled by #initialize
1042
- #
1043
- # source://openssl//openssl/pkey.rb#352
1044
- def new(*args, &blk); end
1045
- end
1046
- end
1047
-
1048
- module OpenSSL::SSL
1049
- private
1050
-
1051
- # source://openssl//openssl/ssl.rb#276
1052
- def verify_certificate_identity(cert, hostname); end
1053
-
1054
- # source://openssl//openssl/ssl.rb#309
1055
- def verify_hostname(hostname, san); end
1056
-
1057
- # source://openssl//openssl/ssl.rb#342
1058
- def verify_wildcard(domain_component, san_component); end
1059
-
1060
- class << self
1061
- # source://openssl//openssl/ssl.rb#276
1062
- def verify_certificate_identity(cert, hostname); end
1063
-
1064
- # source://openssl//openssl/ssl.rb#309
1065
- def verify_hostname(hostname, san); end
1066
-
1067
- # source://openssl//openssl/ssl.rb#342
1068
- def verify_wildcard(domain_component, san_component); end
1069
- end
1070
- end
1071
-
1072
- OpenSSL::SSL::OP_ALLOW_CLIENT_RENEGOTIATION = T.let(T.unsafe(nil), Integer)
1073
- OpenSSL::SSL::OP_ALLOW_NO_DHE_KEX = T.let(T.unsafe(nil), Integer)
1074
- OpenSSL::SSL::OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION = T.let(T.unsafe(nil), Integer)
1075
- OpenSSL::SSL::OP_CLEANSE_PLAINTEXT = T.let(T.unsafe(nil), Integer)
1076
- OpenSSL::SSL::OP_CRYPTOPRO_TLSEXT_BUG = T.let(T.unsafe(nil), Integer)
1077
- OpenSSL::SSL::OP_DISABLE_TLSEXT_CA_NAMES = T.let(T.unsafe(nil), Integer)
1078
- OpenSSL::SSL::OP_ENABLE_KTLS = T.let(T.unsafe(nil), Integer)
1079
- OpenSSL::SSL::OP_ENABLE_MIDDLEBOX_COMPAT = T.let(T.unsafe(nil), Integer)
1080
- OpenSSL::SSL::OP_IGNORE_UNEXPECTED_EOF = T.let(T.unsafe(nil), Integer)
1081
- OpenSSL::SSL::OP_LEGACY_SERVER_CONNECT = T.let(T.unsafe(nil), Integer)
1082
- OpenSSL::SSL::OP_NO_ANTI_REPLAY = T.let(T.unsafe(nil), Integer)
1083
- OpenSSL::SSL::OP_NO_ENCRYPT_THEN_MAC = T.let(T.unsafe(nil), Integer)
1084
- OpenSSL::SSL::OP_NO_RENEGOTIATION = T.let(T.unsafe(nil), Integer)
1085
- OpenSSL::SSL::OP_NO_TLSv1_3 = T.let(T.unsafe(nil), Integer)
1086
- OpenSSL::SSL::OP_PRIORITIZE_CHACHA = T.let(T.unsafe(nil), Integer)
1087
- OpenSSL::SSL::OP_SAFARI_ECDHE_ECDSA_BUG = T.let(T.unsafe(nil), Integer)
1088
- OpenSSL::SSL::OP_TLSEXT_PADDING = T.let(T.unsafe(nil), Integer)
1089
- OpenSSL::SSL::SSL2_VERSION = T.let(T.unsafe(nil), Integer)
1090
- OpenSSL::SSL::SSL3_VERSION = T.let(T.unsafe(nil), Integer)
1091
-
1092
- class OpenSSL::SSL::SSLContext
1093
- # call-seq:
1094
- # SSLContext.new -> ctx
1095
- # SSLContext.new(:TLSv1) -> ctx
1096
- # SSLContext.new("SSLv23") -> ctx
1097
- #
1098
- # Creates a new SSL context.
1099
- #
1100
- # If an argument is given, #ssl_version= is called with the value. Note
1101
- # that this form is deprecated. New applications should use #min_version=
1102
- # and #max_version= as necessary.
1103
- #
1104
- # @return [SSLContext] a new instance of SSLContext
1105
- #
1106
- # source://openssl//openssl/ssl.rb#127
1107
- def initialize(version = T.unsafe(nil)); end
1108
-
1109
- # call-seq:
1110
- # ctx.max_version = OpenSSL::SSL::TLS1_2_VERSION
1111
- # ctx.max_version = :TLS1_2
1112
- # ctx.max_version = nil
1113
- #
1114
- # Sets the upper bound of the supported SSL/TLS protocol version. See
1115
- # #min_version= for the possible values.
1116
- #
1117
- # source://openssl//openssl/ssl.rb#190
1118
- def max_version=(version); end
1119
-
1120
- # call-seq:
1121
- # ctx.min_version = OpenSSL::SSL::TLS1_2_VERSION
1122
- # ctx.min_version = :TLS1_2
1123
- # ctx.min_version = nil
1124
- #
1125
- # Sets the lower bound on the supported SSL/TLS protocol version. The
1126
- # version may be specified by an integer constant named
1127
- # OpenSSL::SSL::*_VERSION, a Symbol, or +nil+ which means "any version".
1128
- #
1129
- # Be careful that you don't overwrite OpenSSL::SSL::OP_NO_{SSL,TLS}v*
1130
- # options by #options= once you have called #min_version= or
1131
- # #max_version=.
1132
- #
1133
- # === Example
1134
- # ctx = OpenSSL::SSL::SSLContext.new
1135
- # ctx.min_version = OpenSSL::SSL::TLS1_1_VERSION
1136
- # ctx.max_version = OpenSSL::SSL::TLS1_2_VERSION
1137
- #
1138
- # sock = OpenSSL::SSL::SSLSocket.new(tcp_sock, ctx)
1139
- # sock.connect # Initiates a connection using either TLS 1.1 or TLS 1.2
1140
- #
1141
- # source://openssl//openssl/ssl.rb#178
1142
- def min_version=(version); end
1143
-
1144
- # A callback invoked at connect time to distinguish between multiple
1145
- # server names.
1146
- #
1147
- # The callback is invoked with an SSLSocket and a server name. The
1148
- # callback must return an SSLContext for the server name or nil.
1149
- #
1150
- # source://openssl//openssl/ssl.rb#115
1151
- def servername_cb; end
1152
-
1153
- # A callback invoked at connect time to distinguish between multiple
1154
- # server names.
1155
- #
1156
- # The callback is invoked with an SSLSocket and a server name. The
1157
- # callback must return an SSLContext for the server name or nil.
1158
- #
1159
- # source://openssl//openssl/ssl.rb#115
1160
- def servername_cb=(_arg0); end
1161
-
1162
- # call-seq:
1163
- # ctx.set_params(params = {}) -> params
1164
- #
1165
- # Sets saner defaults optimized for the use with HTTP-like protocols.
1166
- #
1167
- # If a Hash _params_ is given, the parameters are overridden with it.
1168
- # The keys in _params_ must be assignment methods on SSLContext.
1169
- #
1170
- # If the verify_mode is not VERIFY_NONE and ca_file, ca_path and
1171
- # cert_store are not set then the system default certificate store is
1172
- # used.
1173
- #
1174
- # source://openssl//openssl/ssl.rb#146
1175
- def set_params(params = T.unsafe(nil)); end
1176
-
1177
- # call-seq:
1178
- # ctx.ssl_version = :TLSv1
1179
- # ctx.ssl_version = "SSLv23"
1180
- #
1181
- # Sets the SSL/TLS protocol version for the context. This forces
1182
- # connections to use only the specified protocol version. This is
1183
- # deprecated and only provided for backwards compatibility. Use
1184
- # #min_version= and #max_version= instead.
1185
- #
1186
- # === History
1187
- # As the name hints, this used to call the SSL_CTX_set_ssl_version()
1188
- # function which sets the SSL method used for connections created from
1189
- # the context. As of Ruby/OpenSSL 2.1, this accessor method is
1190
- # implemented to call #min_version= and #max_version= instead.
1191
- #
1192
- # source://openssl//openssl/ssl.rb#209
1193
- def ssl_version=(meth); end
1194
-
1195
- # A callback invoked when DH parameters are required for ephemeral DH key
1196
- # exchange.
1197
- #
1198
- # The callback is invoked with the SSLSocket, a
1199
- # flag indicating the use of an export cipher and the keylength
1200
- # required.
1201
- #
1202
- # The callback must return an OpenSSL::PKey::DH instance of the correct
1203
- # key length.
1204
- #
1205
- # <b>Deprecated in version 3.0.</b> Use #tmp_dh= instead.
1206
- #
1207
- # source://openssl//openssl/ssl.rb#108
1208
- def tmp_dh_callback; end
1209
-
1210
- # A callback invoked when DH parameters are required for ephemeral DH key
1211
- # exchange.
1212
- #
1213
- # The callback is invoked with the SSLSocket, a
1214
- # flag indicating the use of an export cipher and the keylength
1215
- # required.
1216
- #
1217
- # The callback must return an OpenSSL::PKey::DH instance of the correct
1218
- # key length.
1219
- #
1220
- # <b>Deprecated in version 3.0.</b> Use #tmp_dh= instead.
1221
- #
1222
- # source://openssl//openssl/ssl.rb#108
1223
- def tmp_dh_callback=(_arg0); end
1224
- end
1225
-
1226
- # source://openssl//openssl/ssl.rb#37
1227
- OpenSSL::SSL::SSLContext::DEFAULT_2048 = T.let(T.unsafe(nil), OpenSSL::PKey::DH)
1228
-
1229
- # source://openssl//openssl/ssl.rb#49
1230
- OpenSSL::SSL::SSLContext::DEFAULT_TMP_DH_CALLBACK = T.let(T.unsafe(nil), Proc)
1231
-
1232
- # The list of available SSL/TLS methods. This constant is only provided
1233
- # for backwards compatibility.
1234
- #
1235
- # source://openssl//openssl/ssl.rb#235
1236
- OpenSSL::SSL::SSLContext::METHODS = T.let(T.unsafe(nil), Array)
1237
-
1238
- # source://openssl//openssl/ssl.rb#223
1239
- OpenSSL::SSL::SSLContext::METHODS_MAP = T.let(T.unsafe(nil), Hash)
1240
-
1241
- class OpenSSL::SSL::SSLErrorWaitReadable < ::OpenSSL::SSL::SSLError
1242
- include ::IO::WaitReadable
1243
- end
1244
-
1245
- class OpenSSL::SSL::SSLErrorWaitWritable < ::OpenSSL::SSL::SSLError
1246
- include ::IO::WaitWritable
1247
- end
1248
-
1249
- # SSLServer represents a TCP/IP server socket with Secure Sockets Layer.
1250
- class OpenSSL::SSL::SSLServer
1251
- include ::OpenSSL::SSL::SocketForwarder
1252
-
1253
- # Creates a new instance of SSLServer.
1254
- # * _srv_ is an instance of TCPServer.
1255
- # * _ctx_ is an instance of OpenSSL::SSL::SSLContext.
1256
- #
1257
- # @return [SSLServer] a new instance of SSLServer
1258
- #
1259
- # source://openssl//openssl/ssl.rb#491
1260
- def initialize(svr, ctx); end
1261
-
1262
- # Works similar to TCPServer#accept.
1263
- #
1264
- # source://openssl//openssl/ssl.rb#519
1265
- def accept; end
1266
-
1267
- # See IO#close for details.
1268
- #
1269
- # source://openssl//openssl/ssl.rb#540
1270
- def close; end
1271
-
1272
- # See TCPServer#listen for details.
1273
- #
1274
- # source://openssl//openssl/ssl.rb#509
1275
- def listen(backlog = T.unsafe(nil)); end
1276
-
1277
- # See BasicSocket#shutdown for details.
1278
- #
1279
- # source://openssl//openssl/ssl.rb#514
1280
- def shutdown(how = T.unsafe(nil)); end
1281
-
1282
- # When true then #accept works exactly the same as TCPServer#accept
1283
- #
1284
- # source://openssl//openssl/ssl.rb#486
1285
- def start_immediately; end
1286
-
1287
- # When true then #accept works exactly the same as TCPServer#accept
1288
- #
1289
- # source://openssl//openssl/ssl.rb#486
1290
- def start_immediately=(_arg0); end
1291
-
1292
- # Returns the TCPServer passed to the SSLServer when initialized.
1293
- #
1294
- # source://openssl//openssl/ssl.rb#504
1295
- def to_io; end
1296
- end
1297
-
1298
- class OpenSSL::SSL::SSLSocket
1299
- include ::Enumerable
1300
- include ::OpenSSL::Buffering
1301
- include ::OpenSSL::SSL::SocketForwarder
1302
-
1303
- # The SSLContext object used in this connection.
1304
- #
1305
- # source://openssl//openssl/ssl.rb#371
1306
- def context; end
1307
-
1308
- # Returns the value of attribute hostname.
1309
- #
1310
- # source://openssl//openssl/ssl.rb#364
1311
- def hostname; end
1312
-
1313
- # The underlying IO object.
1314
- #
1315
- # source://openssl//openssl/ssl.rb#367
1316
- def io; end
1317
-
1318
- # call-seq:
1319
- # ssl.post_connection_check(hostname) -> true
1320
- #
1321
- # Perform hostname verification following RFC 6125.
1322
- #
1323
- # This method MUST be called after calling #connect to ensure that the
1324
- # hostname of a remote peer has been verified.
1325
- #
1326
- # source://openssl//openssl/ssl.rb#397
1327
- def post_connection_check(hostname); end
1328
-
1329
- # call-seq:
1330
- # ssl.session -> aSession
1331
- #
1332
- # Returns the SSLSession object currently used, or nil if the session is
1333
- # not established.
1334
- #
1335
- # source://openssl//openssl/ssl.rb#418
1336
- def session; end
1337
-
1338
- # Whether to close the underlying socket as well, when the SSL/TLS
1339
- # connection is shut down. This defaults to +false+.
1340
- #
1341
- # source://openssl//openssl/ssl.rb#375
1342
- def sync_close; end
1343
-
1344
- # Whether to close the underlying socket as well, when the SSL/TLS
1345
- # connection is shut down. This defaults to +false+.
1346
- #
1347
- # source://openssl//openssl/ssl.rb#375
1348
- def sync_close=(_arg0); end
1349
-
1350
- # call-seq:
1351
- # ssl.sysclose => nil
1352
- #
1353
- # Sends "close notify" to the peer and tries to shut down the SSL
1354
- # connection gracefully.
1355
- #
1356
- # If sync_close is set to +true+, the underlying IO is also closed.
1357
- #
1358
- # source://openssl//openssl/ssl.rb#384
1359
- def sysclose; end
1360
-
1361
- # The underlying IO object.
1362
- #
1363
- # source://openssl//openssl/ssl.rb#367
1364
- def to_io; end
1365
-
1366
- private
1367
-
1368
- # source://openssl//openssl/ssl.rb#432
1369
- def client_cert_cb; end
1370
-
1371
- # source://openssl//openssl/ssl.rb#444
1372
- def session_get_cb; end
1373
-
1374
- # source://openssl//openssl/ssl.rb#440
1375
- def session_new_cb; end
1376
-
1377
- # source://openssl//openssl/ssl.rb#436
1378
- def tmp_dh_callback; end
1379
-
1380
- # @return [Boolean]
1381
- #
1382
- # source://openssl//openssl/ssl.rb#426
1383
- def using_anon_cipher?; end
1384
-
1385
- class << self
1386
- # call-seq:
1387
- # open(remote_host, remote_port, local_host=nil, local_port=nil, context: nil)
1388
- #
1389
- # Creates a new instance of SSLSocket.
1390
- # _remote\_host_ and _remote\_port_ are used to open TCPSocket.
1391
- # If _local\_host_ and _local\_port_ are specified,
1392
- # then those parameters are used on the local end to establish the connection.
1393
- # If _context_ is provided,
1394
- # the SSL Sockets initial params will be taken from the context.
1395
- #
1396
- # === Examples
1397
- #
1398
- # sock = OpenSSL::SSL::SSLSocket.open('localhost', 443)
1399
- # sock.connect # Initiates a connection to localhost:443
1400
- #
1401
- # with SSLContext:
1402
- #
1403
- # ctx = OpenSSL::SSL::SSLContext.new
1404
- # sock = OpenSSL::SSL::SSLSocket.open('localhost', 443, context: ctx)
1405
- # sock.connect # Initiates a connection to localhost:443 with SSLContext
1406
- #
1407
- # source://openssl//openssl/ssl.rb#470
1408
- def open(remote_host, remote_port, local_host = T.unsafe(nil), local_port = T.unsafe(nil), context: T.unsafe(nil)); end
1409
- end
1410
- end
1411
-
1412
- module OpenSSL::SSL::SocketForwarder
1413
- # source://openssl//openssl/ssl.rb#247
1414
- def addr; end
1415
-
1416
- # @return [Boolean]
1417
- #
1418
- # source://openssl//openssl/ssl.rb#267
1419
- def closed?; end
1420
-
1421
- # source://openssl//openssl/ssl.rb#271
1422
- def do_not_reverse_lookup=(flag); end
1423
-
1424
- # source://openssl//openssl/ssl.rb#263
1425
- def fcntl(*args); end
1426
-
1427
- # The file descriptor for the socket.
1428
- #
1429
- # source://openssl//openssl/ssl.rb#243
1430
- def fileno; end
1431
-
1432
- # source://openssl//openssl/ssl.rb#259
1433
- def getsockopt(level, optname); end
1434
-
1435
- # source://openssl//openssl/ssl.rb#251
1436
- def peeraddr; end
1437
-
1438
- # source://openssl//openssl/ssl.rb#255
1439
- def setsockopt(level, optname, optval); end
1440
- end
1441
-
1442
- OpenSSL::SSL::TLS1_1_VERSION = T.let(T.unsafe(nil), Integer)
1443
- OpenSSL::SSL::TLS1_2_VERSION = T.let(T.unsafe(nil), Integer)
1444
- OpenSSL::SSL::TLS1_3_VERSION = T.let(T.unsafe(nil), Integer)
1445
- OpenSSL::SSL::TLS1_VERSION = T.let(T.unsafe(nil), Integer)
1446
- module OpenSSL::Timestamp; end
1447
-
1448
- class OpenSSL::Timestamp::Factory
1449
- def additional_certs; end
1450
- def additional_certs=(_arg0); end
1451
- def allowed_digests; end
1452
- def allowed_digests=(_arg0); end
1453
- def create_timestamp(_arg0, _arg1, _arg2); end
1454
- def default_policy_id; end
1455
- def default_policy_id=(_arg0); end
1456
- def gen_time; end
1457
- def gen_time=(_arg0); end
1458
- def serial_number; end
1459
- def serial_number=(_arg0); end
1460
- end
1461
-
1462
- class OpenSSL::Timestamp::Request
1463
- def initialize(*_arg0); end
1464
-
1465
- def algorithm; end
1466
- def algorithm=(_arg0); end
1467
- def cert_requested=(_arg0); end
1468
- def cert_requested?; end
1469
- def message_imprint; end
1470
- def message_imprint=(_arg0); end
1471
- def nonce; end
1472
- def nonce=(_arg0); end
1473
- def policy_id; end
1474
- def policy_id=(_arg0); end
1475
- def to_der; end
1476
- def version; end
1477
- def version=(_arg0); end
1478
- end
1479
-
1480
- class OpenSSL::Timestamp::Response
1481
- def initialize(_arg0); end
1482
-
1483
- def failure_info; end
1484
- def status; end
1485
- def status_text; end
1486
- def to_der; end
1487
- def token; end
1488
- def token_info; end
1489
- def tsa_certificate; end
1490
- def verify(*_arg0); end
1491
- end
1492
-
1493
- OpenSSL::Timestamp::Response::GRANTED = T.let(T.unsafe(nil), Integer)
1494
- OpenSSL::Timestamp::Response::GRANTED_WITH_MODS = T.let(T.unsafe(nil), Integer)
1495
- OpenSSL::Timestamp::Response::REJECTION = T.let(T.unsafe(nil), Integer)
1496
- OpenSSL::Timestamp::Response::REVOCATION_NOTIFICATION = T.let(T.unsafe(nil), Integer)
1497
- OpenSSL::Timestamp::Response::REVOCATION_WARNING = T.let(T.unsafe(nil), Integer)
1498
- OpenSSL::Timestamp::Response::WAITING = T.let(T.unsafe(nil), Integer)
1499
- class OpenSSL::Timestamp::TimestampError < ::OpenSSL::OpenSSLError; end
1500
-
1501
- class OpenSSL::Timestamp::TokenInfo
1502
- def initialize(_arg0); end
1503
-
1504
- def algorithm; end
1505
- def gen_time; end
1506
- def message_imprint; end
1507
- def nonce; end
1508
- def ordering; end
1509
- def policy_id; end
1510
- def serial_number; end
1511
- def to_der; end
1512
- def version; end
1513
- end
1514
-
1515
- class OpenSSL::X509::Attribute
1516
- include ::OpenSSL::Marshal
1517
- extend ::OpenSSL::Marshal::ClassMethods
1518
-
1519
- # source://openssl//openssl/x509.rb#330
1520
- def ==(other); end
1521
- end
1522
-
1523
- class OpenSSL::X509::CRL
1524
- include ::OpenSSL::Marshal
1525
- include ::OpenSSL::X509::Extension::Helpers
1526
- include ::OpenSSL::X509::Extension::AuthorityKeyIdentifier
1527
- extend ::OpenSSL::Marshal::ClassMethods
1528
-
1529
- # source://openssl//openssl/x509.rb#369
1530
- def ==(other); end
1531
- end
1532
-
1533
- class OpenSSL::X509::Certificate
1534
- include ::OpenSSL::Marshal
1535
- include ::OpenSSL::X509::Extension::Helpers
1536
- include ::OpenSSL::X509::Extension::SubjectKeyIdentifier
1537
- include ::OpenSSL::X509::Extension::AuthorityKeyIdentifier
1538
- include ::OpenSSL::X509::Extension::CRLDistributionPoints
1539
- include ::OpenSSL::X509::Extension::AuthorityInfoAccess
1540
- extend ::OpenSSL::Marshal::ClassMethods
1541
-
1542
- # source://openssl//openssl/x509.rb#349
1543
- def pretty_print(q); end
1544
-
1545
- class << self
1546
- # source://openssl//openssl/x509.rb#360
1547
- def load_file(path); end
1548
- end
1549
- end
1550
-
1551
- class OpenSSL::X509::Extension
1552
- include ::OpenSSL::Marshal
1553
- extend ::OpenSSL::Marshal::ClassMethods
1554
-
1555
- # source://openssl//openssl/x509.rb#48
1556
- def ==(other); end
1557
-
1558
- # source://openssl//openssl/x509.rb#64
1559
- def to_a; end
1560
-
1561
- # {"oid"=>sn|ln, "value"=>value, "critical"=>true|false}
1562
- #
1563
- # source://openssl//openssl/x509.rb#60
1564
- def to_h; end
1565
-
1566
- # "oid = critical, value"
1567
- #
1568
- # source://openssl//openssl/x509.rb#53
1569
- def to_s; end
1570
- end
1571
-
1572
- module OpenSSL::X509::Extension::AuthorityInfoAccess
1573
- include ::OpenSSL::X509::Extension::Helpers
1574
-
1575
- # Get the information and services for the issuer from the certificate's
1576
- # authority information access extension exteension, as described in RFC5280
1577
- # Section 4.2.2.1.
1578
- #
1579
- # Returns an array of strings or nil or raises ASN1::ASN1Error.
1580
- #
1581
- # source://openssl//openssl/x509.rb#162
1582
- def ca_issuer_uris; end
1583
-
1584
- # Get the URIs for OCSP from the certificate's authority information access
1585
- # extension exteension, as described in RFC5280 Section 4.2.2.1.
1586
- #
1587
- # Returns an array of strings or nil or raises ASN1::ASN1Error.
1588
- #
1589
- # source://openssl//openssl/x509.rb#177
1590
- def ocsp_uris; end
1591
-
1592
- private
1593
-
1594
- # source://openssl//openssl/x509.rb#190
1595
- def parse_aia_asn1; end
1596
- end
1597
-
1598
- module OpenSSL::X509::Extension::AuthorityKeyIdentifier
1599
- include ::OpenSSL::X509::Extension::Helpers
1600
-
1601
- # Get the issuing certificate's key identifier from the
1602
- # authorityKeyIdentifier extension, as described in RFC5280
1603
- # Section 4.2.1.1
1604
- #
1605
- # Returns the binary String keyIdentifier or nil or raises
1606
- # ASN1::ASN1Error.
1607
- #
1608
- # source://openssl//openssl/x509.rb#104
1609
- def authority_key_identifier; end
1610
- end
1611
-
1612
- module OpenSSL::X509::Extension::CRLDistributionPoints
1613
- include ::OpenSSL::X509::Extension::Helpers
1614
-
1615
- # Get the distributionPoint fullName URI from the certificate's CRL
1616
- # distribution points extension, as described in RFC5280 Section
1617
- # 4.2.1.13
1618
- #
1619
- # Returns an array of strings or nil or raises ASN1::ASN1Error.
1620
- #
1621
- # source://openssl//openssl/x509.rb#129
1622
- def crl_uris; end
1623
- end
1624
-
1625
- module OpenSSL::X509::Extension::Helpers
1626
- # source://openssl//openssl/x509.rb#69
1627
- def find_extension(oid); end
1628
- end
1629
-
1630
- module OpenSSL::X509::Extension::SubjectKeyIdentifier
1631
- include ::OpenSSL::X509::Extension::Helpers
1632
-
1633
- # Get the subject's key identifier from the subjectKeyIdentifier
1634
- # exteension, as described in RFC5280 Section 4.2.1.2.
1635
- #
1636
- # Returns the binary String key identifier or nil or raises
1637
- # ASN1::ASN1Error.
1638
- #
1639
- # source://openssl//openssl/x509.rb#82
1640
- def subject_key_identifier; end
1641
- end
1642
-
1643
- class OpenSSL::X509::Name
1644
- include ::Comparable
1645
- include ::OpenSSL::Marshal
1646
- extend ::OpenSSL::Marshal::ClassMethods
1647
-
1648
- # source://openssl//openssl/x509.rb#319
1649
- def pretty_print(q); end
1650
-
1651
- class << self
1652
- # Parses the string representation of a distinguished name. Two
1653
- # different forms are supported:
1654
- #
1655
- # - \OpenSSL format (<tt>X509_NAME_oneline()</tt>) used by
1656
- # <tt>#to_s</tt>. For example: <tt>/DC=com/DC=example/CN=nobody</tt>
1657
- # - \OpenSSL format (<tt>X509_NAME_print()</tt>)
1658
- # used by <tt>#to_s(OpenSSL::X509::Name::COMPAT)</tt>. For example:
1659
- # <tt>DC=com, DC=example, CN=nobody</tt>
1660
- #
1661
- # Neither of them is standardized and has quirks and inconsistencies
1662
- # in handling of escaped characters or multi-valued RDNs.
1663
- #
1664
- # Use of this method is discouraged in new applications. See
1665
- # Name.parse_rfc2253 and #to_utf8 for the alternative.
1666
- #
1667
- # source://openssl//openssl/x509.rb#305
1668
- def parse(str, template = T.unsafe(nil)); end
1669
-
1670
- # Parses the string representation of a distinguished name. Two
1671
- # different forms are supported:
1672
- #
1673
- # - \OpenSSL format (<tt>X509_NAME_oneline()</tt>) used by
1674
- # <tt>#to_s</tt>. For example: <tt>/DC=com/DC=example/CN=nobody</tt>
1675
- # - \OpenSSL format (<tt>X509_NAME_print()</tt>)
1676
- # used by <tt>#to_s(OpenSSL::X509::Name::COMPAT)</tt>. For example:
1677
- # <tt>DC=com, DC=example, CN=nobody</tt>
1678
- #
1679
- # Neither of them is standardized and has quirks and inconsistencies
1680
- # in handling of escaped characters or multi-valued RDNs.
1681
- #
1682
- # Use of this method is discouraged in new applications. See
1683
- # Name.parse_rfc2253 and #to_utf8 for the alternative.
1684
- #
1685
- # source://openssl//openssl/x509.rb#305
1686
- def parse_openssl(str, template = T.unsafe(nil)); end
1687
-
1688
- # Parses the UTF-8 string representation of a distinguished name,
1689
- # according to RFC 2253.
1690
- #
1691
- # See also #to_utf8 for the opposite operation.
1692
- #
1693
- # source://openssl//openssl/x509.rb#286
1694
- def parse_rfc2253(str, template = T.unsafe(nil)); end
1695
- end
1696
- end
1697
-
1698
- module OpenSSL::X509::Name::RFC2253DN
1699
- private
1700
-
1701
- # source://openssl//openssl/x509.rb#237
1702
- def expand_hexstring(str); end
1703
-
1704
- # source://openssl//openssl/x509.rb#225
1705
- def expand_pair(str); end
1706
-
1707
- # source://openssl//openssl/x509.rb#244
1708
- def expand_value(str1, str2, str3); end
1709
-
1710
- # source://openssl//openssl/x509.rb#251
1711
- def scan(dn); end
1712
-
1713
- class << self
1714
- # source://openssl//openssl/x509.rb#237
1715
- def expand_hexstring(str); end
1716
-
1717
- # source://openssl//openssl/x509.rb#225
1718
- def expand_pair(str); end
1719
-
1720
- # source://openssl//openssl/x509.rb#244
1721
- def expand_value(str1, str2, str3); end
1722
-
1723
- # source://openssl//openssl/x509.rb#251
1724
- def scan(dn); end
1725
- end
1726
- end
1727
-
1728
- class OpenSSL::X509::Request
1729
- include ::OpenSSL::Marshal
1730
- extend ::OpenSSL::Marshal::ClassMethods
1731
-
1732
- # source://openssl//openssl/x509.rb#385
1733
- def ==(other); end
1734
- end
1735
-
1736
- class OpenSSL::X509::Revoked
1737
- # source://openssl//openssl/x509.rb#376
1738
- def ==(other); end
1739
- end