# -*- encoding: utf-8 -*- # stub: ciphersurfer 1.2.0 ruby lib Gem::Specification.new do |s| s.name = "ciphersurfer".freeze s.version = "1.2.0".freeze s.required_rubygems_version = Gem::Requirement.new(">= 0".freeze) if s.respond_to? :required_rubygems_version= s.require_paths = ["lib".freeze] s.authors = ["Paolo Perego".freeze] s.date = "2014-10-15" s.description = "ciphersurfer is a tool to check how strong is an SSL certificate. It also check for POODLE vulnerability, if your server supports SSLv3".freeze s.email = ["thesp0nge@gmail.com".freeze] s.executables = ["ciphersurfer".freeze] s.files = [".document".freeze, ".gitignore".freeze, ".rspec".freeze, ".rvmrc".freeze, "Gemfile".freeze, "Gemfile.lock".freeze, "LICENSE.txt".freeze, "README.md".freeze, "Rakefile".freeze, "VERSION".freeze, "bin/ciphersurfer".freeze, "ciphersurfer.gemspec".freeze, "lib/ciphersurfer.rb".freeze, "lib/ciphersurfer/scanner.rb".freeze, "lib/ciphersurfer/score.rb".freeze, "lib/ciphersurfer/version.rb".freeze, "spec/ciphersurfer_spec.rb".freeze, "spec/scoring_spec.rb".freeze, "spec/spec_helper.rb".freeze] s.homepage = "https://codiceinsicuro.it".freeze s.licenses = ["MIT".freeze] s.rubygems_version = "3.5.10".freeze s.summary = "ciphersurfer is a tool to check how strong is an SSL certificate. It also check for POODLE vulnerability, if your server supports SSLv3".freeze s.test_files = ["spec/ciphersurfer_spec.rb".freeze, "spec/scoring_spec.rb".freeze, "spec/spec_helper.rb".freeze] s.specification_version = 4 s.add_runtime_dependency(%q.freeze, [">= 0".freeze]) s.add_runtime_dependency(%q.freeze, [">= 0".freeze]) s.add_development_dependency(%q.freeze, ["~> 1.5".freeze]) s.add_development_dependency(%q.freeze, [">= 0".freeze]) end