{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":82696757,"defaultBranch":"main","name":"node","ownerLogin":"tniessen","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2017-02-21T15:39:16.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/3109072?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1721231485.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"e9f5fa02addf46610db88ad894957b5980a58bf9","ref":"refs/heads/src-simplify-aesciphertraits-additionalconfig","pushedAt":"2024-07-17T15:51:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: simplify AESCipherTraits::AdditionalConfig\n\nInstead of a giant switch statement and a lot of duplicate code, add the\nNID and the block cipher mode of operation to the VARIANTS list and use\nthose fields to perform configuration appropriately.","shortMessageHtmlLink":"src: simplify AESCipherTraits::AdditionalConfig"}},{"before":null,"after":"e117b5a8ba3bab69f29f98d4c624b00a3af757d0","ref":"refs/heads/crypto-maybe-void-securecontext","pushedAt":"2024-07-17T12:13:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: use Maybe in SecureContext\n\nWith recent versions of V8, it is not necessary to use Maybe\nanymore. This changes member functions of SecureContext to use\nMaybe instead.","shortMessageHtmlLink":"src: use Maybe<void> in SecureContext"}},{"before":"8ae7af26a129e865998198b666a60edc11599a9f","after":"96ec1db6a4891f9e99492c4fd3e760856619d3e5","ref":"refs/heads/crypto-no-strcmp-importjwkasymmetrickey","pushedAt":"2024-07-17T10:26:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: avoid strcmp in ImportJWKAsymmetricKey\n\nUse std::string_view and its operator== instead of calling strcmp on a\nconst char*.","shortMessageHtmlLink":"src: avoid strcmp in ImportJWKAsymmetricKey"}},{"before":"2af55e14755f3c824218396558fc62883afb51d1","after":"1714eda1906cc801d3ac1a6635e24c44c87ccad5","ref":"refs/heads/sqlite-dont-coerce-int-silently","pushedAt":"2024-07-17T10:11:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src,test: disallow unsafe integer coercion in SQLite\n\nCurrently, by default (i.e., when use_big_ints_ has not explicitly been\nset to true), reading a SQLite integer value that is not a safe integer\nin JavaScript is likely to yield an incorrect number.\n\nInstead, err on the side of caution and throw if the stored integer is\nnot a safe integer in JavaScript and if use_big_ints_ has not been set\nto true.","shortMessageHtmlLink":"src,test: disallow unsafe integer coercion in SQLite"}},{"before":"190f061e1dca57fcd48bef1fe3f833221f1e2d33","after":"2af55e14755f3c824218396558fc62883afb51d1","ref":"refs/heads/sqlite-dont-coerce-int-silently","pushedAt":"2024-07-17T10:10:38.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src,test: disallow unsafe integer coercion\n\nCurrently, by default (i.e., when use_big_ints_ has not explicitly been\nset to true), reading a SQLite integer value that is not a safe integer\nin JavaScript is likely to yield an incorrect number.\n\nInstead, err on the side of caution and throw if the stored integer is\nnot a safe integer in JavaScript and if use_big_ints_ has not been set\nto true.","shortMessageHtmlLink":"src,test: disallow unsafe integer coercion"}},{"before":null,"after":"190f061e1dca57fcd48bef1fe3f833221f1e2d33","ref":"refs/heads/sqlite-dont-coerce-int-silently","pushedAt":"2024-07-14T23:25:19.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"sqlite: disallow unsafe integer coercion\n\nCurrently, by default (i.e., when use_big_ints_ has not explicitly been\nset to true), reading a SQLite integer value that is not a safe integer\nin JavaScript is likely to yield an incorrect number.\n\nInstead, err on the side of caution and throw if the stored integer is\nnot a safe integer in JavaScript and if use_big_ints_ has not been set\nto true.","shortMessageHtmlLink":"sqlite: disallow unsafe integer coercion"}},{"before":null,"after":"b776bbdf15ff6de53794aa6203776c5e7182599b","ref":"refs/heads/sqlite-check-empty","pushedAt":"2024-07-14T21:53:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: fix potential segmentation fault in SQLite\n\nThe Local returned from ColumnToValue() and ColumnNameToValue()\nmay be empty (if a JavaScript exception is pending), in which case a\nsegmentation fault may occur at the call sites, which do not check if\nthe Local is empty. Fix this bug returning early if an exception\nis pending (as indicated by the Local being empty).\n\nIn the long term, these functions should return MaybeLocal instead of\nLocal, but this patch is supposed to be a minimal bug fix only.","shortMessageHtmlLink":"src: fix potential segmentation fault in SQLite"}},{"before":null,"after":"8c5a03c4908fe34c09782f1c6ad03b070fc06fee","ref":"refs/heads/ecma-ref-util","pushedAt":"2024-07-13T10:06:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: update outdated references to spec sections\n\nThe exact section has changed in recent versions of ECMA-262, so fix the\nsection number and explicitly mark the edition of the standard to avoid\nhaving to update it in the future.","shortMessageHtmlLink":"src: update outdated references to spec sections"}},{"before":null,"after":"8ae7af26a129e865998198b666a60edc11599a9f","ref":"refs/heads/crypto-no-strcmp-importjwkasymmetrickey","pushedAt":"2024-07-11T13:52:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: avoid strcmp in ImportJWKAsymmetricKey\n\nDo not unnecessarily resolve the Utf8Value into a const char* just to\nthen use strcmp. Instead, just take a reference to the Utf8Value and use\nits operator==.","shortMessageHtmlLink":"src: avoid strcmp in ImportJWKAsymmetricKey"}},{"before":null,"after":"eba952392208d9c70570f136bd119ed08d5cfba6","ref":"refs/heads/crypto-managedevppkey-maybe-void","pushedAt":"2024-07-11T12:49:20.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: use Maybe in ManagedEVPPKey\n\nWith recent versions of V8, it is not necessary to use Maybe\nanymore. This changes member functions of ManagedEVPPKey to use\nMaybe instead, as well as (transitive) dependencies.","shortMessageHtmlLink":"src: use Maybe<void> in ManagedEVPPKey"}},{"before":null,"after":"c31d53d9aba0c616cd31fbbf35e9cd7161dd58fb","ref":"refs/heads/doc-crypto-decipher-update-authenticity","pushedAt":"2024-07-09T13:26:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"doc: clarify authenticity of plaintexts in update","shortMessageHtmlLink":"doc: clarify authenticity of plaintexts in update"}},{"before":"4c730aed7f825af1691740663d599e9de5958f89","after":"c0962dc3bfd94409162fcb77a9da20bce98848c7","ref":"refs/heads/main","pushedAt":"2024-07-09T11:07:02.000Z","pushType":"push","commitsCount":100,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"vm,src: add property query interceptors\n\nDistinguish named property and indexed property when enumerating keys\nand handle query interceptions.\n\nCo-Authored-By: Michaël Zasso \nPR-URL: https://github.com/nodejs/node/pull/53517\nFixes: https://github.com/nodejs/node/issues/52720\nReviewed-By: Michaël Zasso \nReviewed-By: Joyee Cheung ","shortMessageHtmlLink":"vm,src: add property query interceptors"}},{"before":null,"after":"ab41ce832cd51a1426a6ae9f8132ba9db3fd55af","ref":"refs/heads/crypto-fix-error-handling-in-exportjwkasymmetrickey","pushedAt":"2024-07-08T20:40:18.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: fix error handling in ExportJWKAsymmetricKey\n\nBecause call sites check IsNothing() on the return value of\nExportJWKAsymmetricKey() and ignore the boolean value if the return\nvalue is Just (i.e., not nothing), this function must return Nothing()\ninstead of Just(false) when throwing a JavaScript error.","shortMessageHtmlLink":"src: fix error handling in ExportJWKAsymmetricKey"}},{"before":null,"after":"5f013f577864bcc0d18f1197863a25bd028951ef","ref":"refs/heads/crypto-error-decorate-maybe-void","pushedAt":"2024-07-08T19:39:30.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: use Maybe in node::crypto::error\n\nWith recent versions of V8, it is not necessary to use Maybe\nanymore.","shortMessageHtmlLink":"src: use Maybe<void> in node::crypto::error"}},{"before":null,"after":"c0a17618c78b2f9b7a7e393ee58dfe20c6b3ea79","ref":"refs/heads/crypto-avoid-stdfunction","pushedAt":"2024-07-02T08:46:45.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"crypto: avoid std::function\n\nUsing a template type lets the compiler choose an appropriate type\nthat likely is more efficient than std::function since the lambda\nexpressions at the call sites do not capture any values from surrounding\nscopes.","shortMessageHtmlLink":"crypto: avoid std::function"}},{"before":null,"after":"17031909ff8d63b0b56913ee9785be2f70593811","ref":"refs/heads/doc-fs-exists-symlink","pushedAt":"2024-06-24T09:32:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"doc: clarify that fs.exists() may return false for existing symlink\n\nGiven that this API is problematic in any case, we should be precise\r\nabout its (perhaps surprising) behavior.","shortMessageHtmlLink":"doc: clarify that fs.exists() may return false for existing symlink"}},{"before":"b26a260ce595a464b933187c72e9ed06880f75f5","after":"4c730aed7f825af1691740663d599e9de5958f89","ref":"refs/heads/main","pushedAt":"2024-06-24T09:24:37.000Z","pushType":"push","commitsCount":120,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"deps: V8: cherry-pick 9ebca66a5740\n\nOriginal commit message:\n\n [rab/gsab] Remove --harmony-rab-gsab (has been on by default for a while)\n\n Bug: v8:11111\n Change-Id: Ie74e7737f3e2e8730820cf00f1cbc7ae02b515af\n Reviewed-on: https://chromium-review.googlesource.com/c/v8/v8/+/5516580\n Commit-Queue: Marja Hölttä \n Reviewed-by: Camillo Bruni \n Reviewed-by: Shu-yu Guo \n Reviewed-by: Nico Hartmann \n Cr-Commit-Position: refs/heads/main@{#93848}\n\nRefs: https://github.com/v8/v8/commit/9ebca66a57409dd9441868a9ce429c0c3f61409d\nPR-URL: https://github.com/nodejs/node/pull/53522\nReviewed-By: Yagiz Nizipli \nReviewed-By: Michaël Zasso \nReviewed-By: Luigi Pinca ","shortMessageHtmlLink":"deps: V8: cherry-pick 9ebca66a5740"}},{"before":null,"after":"ac9c3521a1a683d1f6064c6aa3d8f2fe6c1260d9","ref":"refs/heads/crypto-no-ownership","pushedAt":"2024-06-14T22:56:43.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"crypto: avoid taking ownership of OpenSSL objects\n\nIt is often unnecessary to obtain (shared) ownership of OpenSSL objects\nin this code, and it generally is more costly to do so as opposed to\njust obtaining a pointer to the respective OpenSSL object. Therefore,\nthis patch replaces various OpenSSL function calls that take ownership\nwith ones that do not.\n\nRefs: https://github.com/nodejs/node/pull/53436","shortMessageHtmlLink":"crypto: avoid taking ownership of OpenSSL objects"}},{"before":null,"after":"6cbf3757d867e2474af3ef62b12f9ae41183d7c2","ref":"refs/heads/tls-dont-ignore-version-setter-ret","pushedAt":"2024-06-14T22:42:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"tls: check result of SSL_CTX_set_*_proto_version\n\nThese functions generally should not fail, but we also shouldn't ignore\npotential failures entirely since security properties of the application\nmight depend on successful configuration.\n\nThis also is consistent with the existing CHECKs in SetMinProto() and\nSetMaxProto().","shortMessageHtmlLink":"tls: check result of SSL_CTX_set_*_proto_version"}},{"before":null,"after":"669be2d7e6e1319b207da5f97bc1baf593aab00d","ref":"refs/heads/buffer-fast-indexofnumber","pushedAt":"2024-06-14T17:07:55.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"buffer: make indexOf(byte) faster\n\nAdd a V8 fast API implementation for indexOfNumber, which significantly\nimproves the performance of finding a single byte within a buffer.\n\nRefs: https://github.com/nodejs/node/pull/52993","shortMessageHtmlLink":"buffer: make indexOf(byte) faster"}},{"before":"906bd1faddbd26ebd29c7a1f8fca4122809ae004","after":"f974aaff78fe72f922b70f39491fef952c26c579","ref":"refs/heads/tls-no-ownership","pushedAt":"2024-06-13T19:00:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"tls: avoid taking ownership of OpenSSL objects\n\nIt is often unnecessary to obtain (shared) ownership of OpenSSL objects\nin this code, and it generally is more costly to do so as opposed to\njust obtaining a pointer to the respective OpenSSL object. Therefore,\nthis patch replaces various OpenSSL function calls that take ownership\nwith ones that do not.","shortMessageHtmlLink":"tls: avoid taking ownership of OpenSSL objects"}},{"before":null,"after":"7b71724d6ba10f64a1a7a368c3da9bc1c2e90114","ref":"refs/heads/src-avoid-strcmp","pushedAt":"2024-06-13T11:09:28.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"src: avoid strcmp in favor of operator==","shortMessageHtmlLink":"src: avoid strcmp in favor of operator=="}},{"before":null,"after":"906bd1faddbd26ebd29c7a1f8fca4122809ae004","ref":"refs/heads/tls-no-ownership","pushedAt":"2024-06-12T20:47:46.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"tls: avoid taking ownership of OpenSSL objects\n\nIt is often unnecessary to obtain (shared) ownership of OpenSSL objects\nin this code, and it generally is more costly to do so as opposed to\njust obtaining a pointer to the respective OpenSSL object. Therefore,\nthis patch replaces various OpenSSL function calls that take ownership\nwith ones that do not.","shortMessageHtmlLink":"tls: avoid taking ownership of OpenSSL objects"}},{"before":null,"after":"121d487d0bcd673af092ac3c9a8188167160f509","ref":"refs/heads/v20.x-revert-fast-timingsafeequal","pushedAt":"2024-06-08T21:17:39.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"Revert \"crypto: make timingSafeEqual faster for Uint8Array\"\n\nThis reverts commit 0f784c96ba1f41f59b7a54c3177496e789199a68 because it\ntriggers a bug in the V8 version that Node.js 20.x uses.","shortMessageHtmlLink":"Revert \"crypto: make timingSafeEqual faster for Uint8Array\""}},{"before":"5d1c5309ba23b799b19e5dc389d95d14c7c46941","after":"b557618d5400a139109bf9c231e4e3b93a547596","ref":"refs/heads/ecgroupbits","pushedAt":"2024-06-07T19:48:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"crypto: improve GetECGroupBits signature\n\nRemove the unused ECPointer argument and rename the function since the\ncurrent name is misleading.","shortMessageHtmlLink":"crypto: improve GetECGroupBits signature"}},{"before":"95420da4ece334a8cea1ff6420f7f8a22555e0f1","after":"80105b0617a89556567992229c77dbef8ae9e95a","ref":"refs/heads/ssl-get-peer-tmp-key","pushedAt":"2024-06-07T19:47:43.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"tls: use SSL_get_peer_tmp_key\n\nBoth OpenSSL 1.1.1 and 3.x support SSL_get_peer_tmp_key as a replacement\nfor SSL_get_server_tmp_key. While the old function name still exists as\nan alias, it does not accurately reflect the function's behavior\n(anymore). Hence, use the new function name here.","shortMessageHtmlLink":"tls: use SSL_get_peer_tmp_key"}},{"before":"935360e321deed17e33b874d3059e4e04c4a1c89","after":"95420da4ece334a8cea1ff6420f7f8a22555e0f1","ref":"refs/heads/ssl-get-peer-tmp-key","pushedAt":"2024-06-06T15:07:57.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"tls: use SSL_get_peer_tmp_key\n\nBoth OpenSSL 1.1.1 and 3.x support SSL_get_peer_tmp_key as a replacement\nfor SSL_get_server_tmp_key. While the old function name still exists as\nan alias, it does not accurately reflect the function's behavior\n(anymore). Hence, use the new function name here.","shortMessageHtmlLink":"tls: use SSL_get_peer_tmp_key"}},{"before":"aeaab54cdf05718271131d81d95e85d95eb84cd7","after":"5d1c5309ba23b799b19e5dc389d95d14c7c46941","ref":"refs/heads/ecgroupbits","pushedAt":"2024-06-06T14:57:20.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"crypto: improve GetECGroupBits signature\n\nRemove the unused ECPointer argument and rename the function since the\ncurrent name is misleading.","shortMessageHtmlLink":"crypto: improve GetECGroupBits signature"}},{"before":null,"after":"935360e321deed17e33b874d3059e4e04c4a1c89","ref":"refs/heads/ssl-get-peer-tmp-key","pushedAt":"2024-06-06T14:39:07.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"tls: use SSL_get_peer_tmp_key\n\nBoth OpenSSL 1.1.1 and 3.x support SSL_get_peer_tmp_key as a replacement\nfor SSL_get_server_tmp_key. While the old function name still exists as\nan alias, it does not accurately reflect the function's behavior\n(anymore). Hence, use the new function name here.","shortMessageHtmlLink":"tls: use SSL_get_peer_tmp_key"}},{"before":null,"after":"aeaab54cdf05718271131d81d95e85d95eb84cd7","ref":"refs/heads/ecgroupbits","pushedAt":"2024-06-06T14:31:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tniessen","name":"Tobias Nießen","path":"/tniessen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3109072?s=80&v=4"},"commit":{"message":"crypto: improve GetECGroupBits signature\n\nRemove the unused ECPointer argument and rename the function since the\ncurrent name is misleading. The remaining changes are mandated by\nformat-cpp.","shortMessageHtmlLink":"crypto: improve GetECGroupBits signature"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEggYoJAA","startCursor":null,"endCursor":null}},"title":"Activity · tniessen/node"}