X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Ffsck.c;h=b90710b958aca48b0b5b2bfb87a3368fec20fe04;hp=205a599c4eef10354b9ce9f7c4a08e17c05932a8;hb=390d25f0b80dd7418e147de3561c70461628574d;hpb=95921696a49d1eff058880c90a80efd208de959d diff --git a/src/fsck.c b/src/fsck.c index 205a599c..b90710b9 100644 --- a/src/fsck.c +++ b/src/fsck.c @@ -216,6 +216,7 @@ int fsck(const char *argv0) { return 1; } +#if !defined(HAVE_MINGW) && !defined(HAVE_CYGWIN) if(st.st_mode & 077) { fprintf(stderr, "WARNING: unsafe file permissions on %s.\n", fname); if(st.st_uid != uid) { @@ -227,6 +228,7 @@ int fsck(const char *argv0) { fprintf(stderr, "Fixed permissions of %s.\n", fname); } } +#endif } #endif @@ -255,6 +257,7 @@ int fsck(const char *argv0) { return 1; } +#if !defined(HAVE_MINGW) && !defined(HAVE_CYGWIN) if(st.st_mode & 077) { fprintf(stderr, "WARNING: unsafe file permissions on %s.\n", fname); if(st.st_uid != uid) { @@ -266,6 +269,7 @@ int fsck(const char *argv0) { fprintf(stderr, "Fixed permissions of %s.\n", fname); } } +#endif } #ifdef DISABLE_LEGACY @@ -281,7 +285,7 @@ int fsck(const char *argv0) { } // Check for public keys. - // TODO: use RSAPublicKeyFile and Ed25519PublicKeyFile variables if present. + // TODO: use RSAPublicKeyFile variable if present. snprintf(fname, sizeof fname, "%s/hosts/%s", confbase, name); if(access(fname, R_OK)) @@ -342,13 +346,17 @@ int fsck(const char *argv0) { fprintf(stderr, "WARNING: A public RSA key was found but no private key is known.\n"); } #endif - // - // TODO: this should read the Ed25519PublicKey config variable instead. + ecdsa_t *ecdsa_pub = NULL; f = fopen(fname, "r"); - if(f) - ecdsa_pub = ecdsa_read_pem_public_key(f); + if(f) { + ecdsa_pub = get_pubkey(f); + if(!f) { + rewind(f); + ecdsa_pub = ecdsa_read_pem_public_key(f); + } + } fclose(f); if(ecdsa_priv) {