{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":2514481,"defaultBranch":"main","name":"pesign","ownerLogin":"rhboot","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2011-10-04T20:13:26.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/29258823?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1675290087.5893152","currentOid":""},"activityList":{"items":[{"before":"f3cf5031560ec07b0da71a090deaa67afdffd95f","after":"d734b6a00c95eaf205d713ea580a9df8f9b6c1ec","ref":"refs/heads/main","pushedAt":"2024-03-07T20:43:16.000Z","pushType":"pr_merge","commitsCount":3,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"efikeygen: Account for the signature size in bundle_signature()\n\nIn ea7a2c41f92d, when bundling the signature, the bitstring type field\nis being set manually with a hacky offset. That offset is only valid\nwith specific signature types, and so with any signature of a different\nsize, this is just corrupting data either in the signature or after it.\n\nThis change from Egor fixes the egregious hack to manually set the type\nso that it computes the location based on the signature length, rather\nthan hard-coding a value.\n\nSigned-off-by: Peter Jones ","shortMessageHtmlLink":"efikeygen: Account for the signature size in bundle_signature()"}},{"before":"d0e20ad652fd03192ed779bd1da1e4613d7c68b3","after":"f3cf5031560ec07b0da71a090deaa67afdffd95f","ref":"refs/heads/main","pushedAt":"2024-03-07T18:03:28.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Initialize pwdata in efikeygen and pesign\n\nFixes: github issue #105\nFixes: 12f1671 (Rework the wildly undocumented NSS password file goo.)\nComplements: 1a4481e (Add more ways to use a password with the token)\n\nSigned-off-by: Egor Ignatov ","shortMessageHtmlLink":"Initialize pwdata in efikeygen and pesign"}},{"before":"27cd9e59ed8da1e6a34a3545947489b3ca4f2b24","after":"d0e20ad652fd03192ed779bd1da1e4613d7c68b3","ref":"refs/heads/main","pushedAt":"2024-03-07T18:02:07.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Make.defaults: disable arm32 warnings about wchar_t\n\nSigned-off-by: Steve McIntyre <93sam@debian.org>","shortMessageHtmlLink":"Make.defaults: disable arm32 warnings about wchar_t"}},{"before":"f1ee951aaf455fcdb978617bf3c2c28f5e62b772","after":"27cd9e59ed8da1e6a34a3545947489b3ca4f2b24","ref":"refs/heads/main","pushedAt":"2024-03-07T18:01:27.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Remove bashisms in Make fragments\n\nSigned-off-by: Steve McIntyre <93sam@debian.org>","shortMessageHtmlLink":"Remove bashisms in Make fragments"}},{"before":"1f9e2fa0b4d872fdd01ca3ba81b04dfb1211a187","after":"f1ee951aaf455fcdb978617bf3c2c28f5e62b772","ref":"refs/heads/main","pushedAt":"2024-03-07T18:01:02.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"wincert: ignore empty cert list in finalize_signatures\n\nSigned-off-by: Egor Ignatov ","shortMessageHtmlLink":"wincert: ignore empty cert list in finalize_signatures"}},{"before":"1fb3c85d929f530dfee3c598049c1e1ec604a943","after":"1f9e2fa0b4d872fdd01ca3ba81b04dfb1211a187","ref":"refs/heads/main","pushedAt":"2024-02-02T18:16:10.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Fix reversed calloc() arguments\n\nThe prototype is \"void *calloc(size_t nelem, size_t elsize);\"\n\nThese two instances had them reversed, almost certainly leading to\nbuffer overflow issues. This was detected by\n-Werror=calloc-transposed-args on gcc.\n\nSigned-off-by: Stephen Gallagher ","shortMessageHtmlLink":"Fix reversed calloc() arguments"}},{"before":"23fd0cef8388142a59f1f6763e1246e545cf1f03","after":"1fb3c85d929f530dfee3c598049c1e1ec604a943","ref":"refs/heads/main","pushedAt":"2023-11-14T17:39:37.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"make: add option to disable building/installing the docs\n\nENABLE_DOCS=0 make will remove the man page files from the list of\ntargets to build and install. This is useful if the target OS does not\nship manpages and so the builder doesn't have mandoc.\n\nSigned-off-by: Nicholas Bishop ","shortMessageHtmlLink":"make: add option to disable building/installing the docs"}},{"before":"d4cede0234fb8523e34fea43ae58ebb8f461d835","after":"23fd0cef8388142a59f1f6763e1246e545cf1f03","ref":"refs/heads/main","pushedAt":"2023-11-14T17:39:04.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"pesign-rpmbuild-helper: add inplace edit support for %pesign macro\n\nSigned-off-by: Egor Ignatov ","shortMessageHtmlLink":"pesign-rpmbuild-helper: add inplace edit support for %pesign macro"}},{"before":"013cc9a1be50eb10af337c20094f9fcdc3404cc0","after":"d4cede0234fb8523e34fea43ae58ebb8f461d835","ref":"refs/heads/main","pushedAt":"2023-11-14T17:38:28.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"daemon: fix pid value by using getpid() in the child process\n\nPreviously ctx.pid was getting it's value indirectly from fork(),\nwhich is always zero in the child process.\n\nFixed a bug introduced in 2b3ca2b.\n\nSigned-off-by: Egor Ignatov ","shortMessageHtmlLink":"daemon: fix pid value by using getpid() in the child process"}},{"before":"227435af461f38fc4abeafe02884675ad4b1feb4","after":"013cc9a1be50eb10af337c20094f9fcdc3404cc0","ref":"refs/heads/main","pushedAt":"2023-11-14T17:37:55.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Various pesign.1.mdoc fixes and improvements\n\nThe following changes have been introduced:\n- Documented how to read password from file/environment variable\n- Documented how to make use of /etc/pki/pesign as regular user\n- Added the --pinfile/--pwfile options to synopsis\n- Bumped Mdocdate\n- Added and example on OpenDNSSEC's SoftHSM usage\n- Fixed a typo: cryptorgaphic -> cryptographic\n- Added myself to the document authors list\n\nSigned-off-by: Kamil Aronowski ","shortMessageHtmlLink":"Various pesign.1.mdoc fixes and improvements"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAED4QoEAA","startCursor":null,"endCursor":null}},"title":"Activity ยท rhboot/pesign"}