die(_("unknown user or group: %s"), baduser, EC_BADCONF);
#ifdef HAVE_DNSSEC
- badtime = setup_timestamp(ent_pw->pw_uid);
+ badtime = setup_timestamp(ent_pw);
#endif
/* implement group defaults, "dip" if available, or group associated with uid */
int dnskey_keytag(int alg, int flags, unsigned char *rdata, int rdlen);
size_t filter_rrsigs(struct dns_header *header, size_t plen);
unsigned char* hash_questions(struct dns_header *header, size_t plen, char *name);
-int setup_timestamp(uid_t uid);
+int setup_timestamp(struct passwd *ent_pw);
/* util.c */
void rand_init(void);
static time_t timestamp_time;
static int back_to_the_future;
-int setup_timestamp(uid_t uid)
+int setup_timestamp(struct passwd *ent_pw)
{
struct stat statbuf;
timestamp_time = timbuf.actime = timbuf.modtime = 1420070400; /* 1-1-2015 */
if (utime(daemon->timestamp_file, &timbuf) == 0 &&
- (getuid() != 0 || chown(daemon->timestamp_file, uid, -1) == 0))
+ (!ent_pw || getuid() != 0 || chown(daemon->timestamp_file, ent_pw->pw_uid, -1) == 0))
goto check_and_exit;
}
}