challenger

OAuth 2.0-based authentication service that validates user can receive messages at a certain address
Log | Files | Refs | Submodules | README | LICENSE

commit 1ed794a8e17edb01108bf157a04f381467e72508
parent 64e0c599060ac766fc43c95358f0e68a66ce7010
Author: Bohdan Potuzhnyi <potub1@bfh.ch>
Date:   Mon, 12 Aug 2024 12:49:09 +0000

version update

Diffstat:
Msrc/challenger/challenger-httpd_authorize.c | 2+-
Msrc/challenger/challenger-httpd_config.c | 4+++-
2 files changed, 4 insertions(+), 2 deletions(-)

diff --git a/src/challenger/challenger-httpd_authorize.c b/src/challenger/challenger-httpd_authorize.c @@ -192,7 +192,7 @@ CH_handler_authorize (struct CH_HandlerContext *hc, (0 != strncmp (redirect_uri, "https://", strlen ("https://"))) && - ( (0 == strcmp(code_challenge_method, "plain")) || code_challenge_method == NULL) ) + ( code_challenge_method == NULL || (0 == strcmp(code_challenge_method, "plain")) ) ) { GNUNET_break_op (0); return reply_error ( diff --git a/src/challenger/challenger-httpd_config.c b/src/challenger/challenger-httpd_config.c @@ -28,6 +28,8 @@ * * 0: original design * 1: revision to support SPA + * 2: + * 3: added support for RFC7636 */ @@ -73,7 +75,7 @@ CH_handler_config (struct CH_HandlerContext *hc, GNUNET_JSON_pack_object_incref ("restrictions", CH_restrictions), GNUNET_JSON_pack_string ("version", - "2:0:0")); + "3:0:1")); GNUNET_break (MHD_YES == MHD_add_response_header (response, MHD_HTTP_HEADER_EXPIRES,