challenger

OAuth 2.0-based authentication service that validates user can receive messages at a certain address
Log | Files | Refs | Submodules | README | LICENSE

commit e49e33a13df92c6a1d6f119775baa31778163531
parent e068980125d2d7527839348ccc8930f996e385a8
Author: Christian Grothoff <christian@grothoff.org>
Date:   Mon, 17 Feb 2025 20:03:46 +0100

better use GNUNET_CONFIGURATION_get_value_string() to avoid filename expansion on binary names given without path

Diffstat:
Msrc/challenger/challenger-httpd.c | 8++++----
1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/src/challenger/challenger-httpd.c b/src/challenger/challenger-httpd.c @@ -602,10 +602,10 @@ run (void *cls, return; } if (GNUNET_OK != - GNUNET_CONFIGURATION_get_value_filename (config, - "CHALLENGER", - "AUTH_COMMAND", - &CH_auth_command)) + GNUNET_CONFIGURATION_get_value_string (config, + "CHALLENGER", + "AUTH_COMMAND", + &CH_auth_command)) { GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR, "CHALLENGER",