challenger

OAuth 2.0-based authentication service that validates user can receive messages at a certain address
Log | Files | Refs | Submodules | README | LICENSE

commit f59ca9dfea6926571d4b9f0d4f40f665dcfc7fc7
parent a25540d70167cc869f85f647815ba8aab04fce28
Author: Christian Grothoff <christian@grothoff.org>
Date:   Mon, 16 Mar 2026 23:39:00 +0100

adapt to revised GNUNET_process() API one more time

Diffstat:
Msrc/challenger/challenger-httpd_challenge.c | 18+++++++++---------
1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/src/challenger/challenger-httpd_challenge.c b/src/challenger/challenger-httpd_challenge.c @@ -355,21 +355,21 @@ send_tan (struct ChallengeContext *bc) CH_auth_command, address); #endif - bc->child = GNUNET_process_create (); + bc->child = GNUNET_process_create (GNUNET_OS_INHERIT_STD_ERR); GNUNET_assert (GNUNET_OK == GNUNET_process_set_options ( bc->child, GNUNET_process_option_inherit_rpipe (p, STDIN_FILENO))); - if ( (GNUNET_OK != - GNUNET_process_set_command_va (bc->child, - CH_auth_command, - CH_auth_command, - address, - NULL)) || - (GNUNET_OK != - GNUNET_process_start (bc->child)) ) + if (GNUNET_OK != + GNUNET_process_run_command_va (bc->child, + CH_auth_command, + CH_auth_command, + address, + NULL)) { + GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, + "exec"); GNUNET_process_destroy (bc->child); bc->child = NULL; }