So apparently MRI brings along its own statically linked OpenSSL:
$ openssl version
OpenSSL 0.9.8y 5 Feb 2013
$ ruby -v
ruby 2.1.1p76 (2014-02-24 revision 45161) [x86_64-darwin12.0]
$ ruby -r openssl -e 'puts OpenSSL::OPENSSL_VERSION'
# grunt ---stack | |
# Running "clean:build" (clean) task | |
# Running "emberTemplates:app" (emberTemplates) task | |
# File "./app/.templates.js" created. | |
# Running "build-index" task | |
# generating from: | |
# - node_modules/loom-generators-ember/loom | |
# created: app/.index.js |
#include <pthread.h> | |
#include <stdio.h> | |
#include <stdlib.h> | |
void * print_message(void *); | |
int main(void) { | |
pthread_t thread_1; | |
pthread_t thread_2; |
function change-prompt -d "Change your fish prompt." | |
set fish_main_config_dir $HOME/.config/fish | |
set fish_current_prompt_location $fish_main_config_dir/functions/fish_prompt.fish | |
set fish_new_prompt_location $fish_main_config_dir/prompts/$argv[1].fish | |
if test -f $fish_new_prompt_location | |
if test -f $fish_current_prompt_location | |
mv -f $fish_current_prompt_location $fish_current_prompt_location.bak | |
end |
git symbolic-ref HEAD 2>/dev/null | sed -e 's|^refs/heads/||' |
git symbolic-ref HEAD ^/dev/null | sed -e 's|^refs/heads/||' |
git diff --ignore-submodules --quiet HEAD |
########################################### | |
# Copyright (c) 2014 Jonathan Barronville # | |
# License: MIT. # | |
########################################### | |
function fish_prompt | |
set last_command_status $status | |
echo '' |
function extend() { | |
var consumer = arguments[0]; | |
var providers = ([]).slice.call(arguments, 1); | |
for (var a = 0; a < providers.length; a++) { | |
var provider = providers[a]; | |
var except = (provider['except'] || []); | |
except.push('except'); |
So apparently MRI brings along its own statically linked OpenSSL:
$ openssl version
OpenSSL 0.9.8y 5 Feb 2013
$ ruby -v
ruby 2.1.1p76 (2014-02-24 revision 45161) [x86_64-darwin12.0]
$ ruby -r openssl -e 'puts OpenSSL::OPENSSL_VERSION'
#!/usr/bin/python | |
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions. | |
# Michael Davis ([email protected]) | |
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
import select |