Hi,
First attempt to create a cleaner api in bb_pwd.c by removing
bb_getgrgid, bb_getpwuid and bb_getug and substituting
them with these functions:

struct passwd* xgetpwuid(uid_t uid) FAST_FUNC;
char* xuid2uname(uid_t uid) FAST_FUNC;
char* uid2uname(uid_t uid) FAST_FUNC;
char* uid2uname_utoa(uid_t uid) FAST_FUNC;
struct group* xgetgrgid(gid_t gid) FAST_FUNC;
char* xgid2group(gid_t gid) FAST_FUNC;
char* gid2group(gid_t gid) FAST_FUNC;
char* gid2group_utoa(gid_t gid) FAST_FUNC;

The patches are mostly trivial but not well tested especially the 
one touching logger.c.

The series is:
01-bb_pwd.patch
02-include_libbb.patch
03-id.patch
04-whoami.patch
05-procps.patch
06-passwd.patch
07-sendmail.patch
09-logger.patch
10-sulogin.patch
11-vlock.patch
12-crontab.patch

Bloat-o-meter:
scripts/bloat-o-meter busybox_old busybox_unstripped
function                                             old     new   delta
xgetpwuid                                              -      27     +27
uid2uname_utoa                                         -      22     +22
gid2group_utoa                                         -      22     +22
uid2uname                                              -      18     +18
gid2group                                              -      18     +18
print_user                                            12      24     +12
print_group                                           12      24     +12
find_main                                            406     418     +12
get_cached                                            89      99     +10
xuid2uname                                             -       8      +8
bbunpack                                             440     448      +8
display_speed                                         85      90      +5
parse_command                                       1460    1463      +3
pack_gzip                                           1660    1658      -2
compare_keys                                         737     735      -2
.rodata                                           117358  117356      -2
whoami_main                                           50      43      -7
sendmail_main                                       1486    1479      -7
lpqr_main                                           1149    1142      -7
passwd_main                                         1053    1043     -10
print_common                                         121     107     -14
logger_main                                          410     394     -16
vlock_main                                           431     412     -19
sulogin_main                                         509     489     -20
crontab_main                                         642     609     -33
bb_getpwuid                                           42       -     -42
bb_getgrgid                                           42       -     -42
bb_getug                                              80       -     -80
------------------------------------------------------------------------------
(add/remove: 6/3 grow/shrink: 7/12 up/down: 177/-303)        Total: -126 bytes

Please take a look at them  and apply if you like them.

Ciao,
Tito


--- busybox.old/libbb/bb_pwd.c	2008-07-22 13:43:09.000000000 +0200
+++ busybox/libbb/bb_pwd.c	2008-11-05 17:08:47.000000000 +0100
@@ -3,64 +3,63 @@
  * password utility routines.
  *
  * Copyright (C) 1999-2004 by Erik Andersen <[EMAIL PROTECTED]>
+ * Copyright (C) 2008 by Tito Ragusa <[EMAIL PROTECTED]>
  *
  * Licensed under the GPL v2 or later, see the file LICENSE in this tarball.
  */
 
 #include "libbb.h"
 
-#define assert(x) ((void)0)
+struct passwd* FAST_FUNC xgetpwuid(uid_t uid)
+{
+	struct passwd *pw = getpwuid(uid);
+	if (!pw)
+		bb_error_msg_and_die("unknown uid %u", uid);
+	return pw;
+}
 
-/* internal function for bb_getpwuid and bb_getgrgid */
-/* Hacked by Tito Ragusa (c) 2004 <[EMAIL PROTECTED]> to make it more
- * flexible:
- *
- * bufsize > 0:      If idname is not NULL it is copied to buffer,
- *                   and buffer is returned. Else id as string is written
- *                   to buffer, and NULL is returned.
- *
- * bufsize == 0:     idname is returned.
- *
- * bufsize < 0:      If idname is not NULL it is returned.
- *                   Else an error message is printed and the program exits.
- */
-static char* bb_getug(char *buffer, int bufsize, char *idname, long id, char prefix)
+char* FAST_FUNC xuid2uname(uid_t uid)
 {
-	if (bufsize > 0) {
-		assert(buffer != NULL);
-		if (idname) {
-			return safe_strncpy(buffer, idname, bufsize);
-		}
-		snprintf(buffer, bufsize, "%ld", id);
-	} else if (bufsize < 0 && !idname) {
-		bb_error_msg_and_die("unknown %cid %ld", prefix, id);
-	}
-	return idname;
-}
-
-/* bb_getpwuid, bb_getgrgid:
- * bb_getXXXid(buf, bufsz, id) - copy user/group name or id
- *               as a string to buf, return user/group name or NULL
- * bb_getXXXid(NULL, 0, id) - return user/group name or NULL
- * bb_getXXXid(NULL, -1, id) - return user/group name or exit
- */
-/* gets a username given a uid */
-char* FAST_FUNC bb_getpwuid(char *name, int bufsize, long uid)
+	struct passwd *pw = xgetpwuid(uid);
+	return pw->pw_name;
+}
+
+char* FAST_FUNC uid2uname(uid_t uid)
+{
+	struct passwd *pw = getpwuid(uid);
+	return (pw) ? pw->pw_name : NULL;
+}
+
+char* FAST_FUNC uid2uname_utoa(uid_t uid)
+{
+	char *name = uid2uname(uid);
+	return (name) ? name : utoa(uid);
+}
+
+struct group* FAST_FUNC xgetgrgid(gid_t gid)
 {
-	struct passwd *myuser = getpwuid(uid);
+	struct group *gr = getgrgid(gid);
+	if (!gr)
+		bb_error_msg_and_die("unknown gid %u", gid);
+	return gr;
+}
 
-	return bb_getug(name, bufsize,
-			(myuser ? myuser->pw_name : (char*)myuser),
-			uid, 'u');
+char* FAST_FUNC xgid2group(gid_t gid)
+{
+	struct group *gr = xgetgrgid(gid);
+	return gr->gr_name;
 }
-/* gets a groupname given a gid */
-char* FAST_FUNC bb_getgrgid(char *group, int bufsize, long gid)
+
+char* FAST_FUNC gid2group(gid_t gid)
 {
-	struct group *mygroup = getgrgid(gid);
+	struct group *gr = getgrgid(gid);
+	return (gr) ? gr->gr_name : NULL;
+}
 
-	return bb_getug(group, bufsize,
-			(mygroup ? mygroup->gr_name : (char*)mygroup),
-			gid, 'g');
+char* FAST_FUNC gid2group_utoa(gid_t gid)
+{
+	char *name = gid2group(gid);
+	return (name) ? name : utoa(gid);
 }
 
 /* returns a gid given a group name */
--- busybox.old/include/libbb.h	2008-11-04 22:03:37.000000000 +0100
+++ busybox/include/libbb.h	2008-11-05 10:07:59.000000000 +0100
@@ -701,14 +701,14 @@
 void xget_uidgid(struct bb_uidgid_t*, const char*) FAST_FUNC;
 /* chown-like handling of "user[:[group]" */
 void parse_chown_usergroup_or_die(struct bb_uidgid_t *u, char *user_group) FAST_FUNC;
-/* bb_getpwuid, bb_getgrgid:
- * bb_getXXXid(buf, bufsz, id) - copy user/group name or id
- *              as a string to buf, return user/group name or NULL
- * bb_getXXXid(NULL, 0, id) - return user/group name or NULL
- * bb_getXXXid(NULL, -1, id) - return user/group name or exit
-*/
-char *bb_getpwuid(char *name, int bufsize, long uid) FAST_FUNC;
-char *bb_getgrgid(char *group, int bufsize, long gid) FAST_FUNC;
+struct passwd* xgetpwuid(uid_t uid) FAST_FUNC;
+char* xuid2uname(uid_t uid) FAST_FUNC;
+char* uid2uname(uid_t uid) FAST_FUNC;
+char* uid2uname_utoa(uid_t uid) FAST_FUNC;
+struct group* xgetgrgid(gid_t gid) FAST_FUNC;
+char* xgid2group(gid_t gid) FAST_FUNC;
+char* gid2group(gid_t gid) FAST_FUNC;
+char* gid2group_utoa(gid_t gid) FAST_FUNC;
 /* versions which cache results (useful for ps, ls etc) */
 const char* get_cached_username(uid_t uid) FAST_FUNC;
 const char* get_cached_groupname(gid_t gid) FAST_FUNC;
--- busybox.old/libbb/procps.c	2008-09-25 13:59:34.000000000 +0200
+++ busybox/libbb/procps.c	2008-11-05 17:21:46.000000000 +0100
@@ -52,8 +52,8 @@
 }
 #endif
 
-typedef char* FAST_FUNC ug_func(char *name, int bufsize, long uid);
-static char* get_cached(cache_t *cp, unsigned id, ug_func* fp)
+static char* get_cached(cache_t *cp, unsigned id,
+			char* FAST_FUNC x2x_utoa(unsigned id))
 {
 	int i;
 	for (i = 0; i < cp->size; i++)
@@ -63,16 +63,16 @@
 	cp->cache = xrealloc_vector(cp->cache, 2, i);
 	cp->cache[i].id = id;
 	/* Never fails. Generates numeric string if name isn't found */
-	fp(cp->cache[i].name, sizeof(cp->cache[i].name), id);
+	strncpy(cp->cache[i].name, x2x_utoa(id), sizeof(cp->cache[i].name));
 	return cp->cache[i].name;
 }
 const char* FAST_FUNC get_cached_username(uid_t uid)
 {
-	return get_cached(&username, uid, bb_getpwuid);
+	return get_cached(&username, uid, uid2uname_utoa);
 }
 const char* FAST_FUNC get_cached_groupname(gid_t gid)
 {
-	return get_cached(&groupname, gid, bb_getgrgid);
+	return get_cached(&groupname, gid, gid2group_utoa);
 }
 
 
--- busybox.old/coreutils/id.c	2008-11-05 10:30:28.000000000 +0100
+++ busybox/coreutils/id.c	2008-11-05 17:16:13.000000000 +0100
@@ -28,12 +28,8 @@
 #endif
 };
 
-static int print_common(unsigned id,
-		char* FAST_FUNC bb_getXXXid(char *name, int bufsize, long uid),
-		const char *prefix)
+static int print_common(unsigned id, const char *name, const char *prefix)
 {
-	const char *name = bb_getXXXid(NULL, 0, id);
-
 	if (prefix) {
 		printf("%s", prefix);
 	}
@@ -57,12 +53,12 @@
 
 static int print_group(gid_t id, const char *prefix)
 {
-	return print_common(id, bb_getgrgid, prefix);
+	return print_common(id, gid2group(id), prefix);
 }
 
 static int print_user(uid_t id, const char *prefix)
 {
-	return print_common(id, bb_getpwuid, prefix);
+	return print_common(id, uid2uname(id), prefix);
 }
 
 /* On error set *n < 0 and return >= 0
--- busybox.old/loginutils/passwd.c	2008-07-22 13:43:09.000000000 +0200
+++ busybox/loginutils/passwd.c	2008-11-05 17:25:49.000000000 +0100
@@ -115,7 +115,7 @@
 		bb_show_usage();
 
 	/* Will complain and die if username not found */
-	myname = xstrdup(bb_getpwuid(NULL, -1, myuid));
+	myname = xuid2uname(myuid);
 	name = argv[0] ? argv[0] : myname;
 
 	pw = getpwnam(name);
--- busybox.old/networking/sendmail.c	2008-11-04 22:03:36.000000000 +0100
+++ busybox/networking/sendmail.c	2008-11-05 17:27:39.000000000 +0100
@@ -310,7 +310,7 @@
 	// username must be defined!
 	if (!opt_user) {
 		// N.B. IMHO getenv("USER") can be way easily spoofed!
-		opt_user = bb_getpwuid(NULL, -1, getuid());
+		opt_user = xuid2uname(getuid());
 	}
 
 	// SSL ordered? ->
--- busybox.old/coreutils/whoami.c	2008-07-05 21:07:45.000000000 +0200
+++ busybox/coreutils/whoami.c	2008-11-05 17:19:34.000000000 +0100
@@ -20,7 +20,7 @@
 		bb_show_usage();
 
 	/* Will complain and die if username not found */
-	puts(bb_getpwuid(NULL, -1, geteuid()));
+	puts(xuid2uname(geteuid()));
 
 	return fflush(stdout);
 }
--- busybox.old/sysklogd/logger.c	2008-06-13 21:12:23.000000000 +0200
+++ busybox/sysklogd/logger.c	2008-11-05 17:31:16.000000000 +0100
@@ -73,11 +73,8 @@
 {
 	char *str_p, *str_t;
 	int i = 0;
-	char name[80];
-
 	/* Fill out the name string early (may be overwritten later) */
-	bb_getpwuid(name, sizeof(name), geteuid());
-	str_t = name;
+	str_t = uid2uname_utoa(geteuid());
 
 	/* Parse any options */
 	getopt32(argv, "p:st:", &str_p, &str_t);
--- busybox.old/loginutils/sulogin.c	2008-07-05 21:07:46.000000000 +0200
+++ busybox/loginutils/sulogin.c	2008-11-05 17:38:00.000000000 +0100
@@ -53,11 +53,7 @@
 // bb_askpass() already handles this
 //	signal(SIGALRM, catchalarm);
 
-	pwd = getpwuid(0);
-	if (!pwd) {
-		goto auth_error;
-	}
-
+	pwd = xgetpwuid(0);
 #if ENABLE_FEATURE_SHADOWPASSWDS
 	{
 		/* getspnam_r may return 0 yet set result to NULL.
@@ -65,7 +61,7 @@
 		struct spwd *result = NULL;
 		int r = getspnam_r(pwd->pw_name, &spw, buffer, sizeof(buffer), &result);
 		if (r || !result) {
-			goto auth_error;
+			bb_error_msg_and_die("no password entry for root");
 		}
 		pwd->pw_passwd = result->sp_pwdp;
 	}
@@ -110,7 +106,4 @@
 	}
 	/* Exec login shell with no additional parameters. Never returns. */
 	run_shell(shell, 1, NULL, NULL);
-
- auth_error:
-	bb_error_msg_and_die("no password entry for root");
 }
--- busybox.old/loginutils/vlock.c	2008-07-22 13:43:09.000000000 +0200
+++ busybox/loginutils/vlock.c	2008-11-05 17:40:19.000000000 +0100
@@ -38,14 +38,9 @@
 	struct termios term;
 	struct termios oterm;
 	struct vt_mode ovtm;
-	uid_t uid;
 	struct passwd *pw;
-/* XXX: xgetpwuid */
-	uid = getuid();
-	pw = getpwuid(uid);
-	if (pw == NULL)
-		bb_error_msg_and_die("unknown uid %d", (int)uid);
 
+	pw = xgetpwuid(getuid());
 	opt_complementary = "=0"; /* no params! */
 	getopt32(argv, "a");
 
--- busybox.old/printutils/lpr.c	2008-07-23 00:57:43.000000000 +0200
+++ busybox/printutils/lpr.c	2008-11-05 17:29:22.000000000 +0100
@@ -65,7 +65,7 @@
 	const char *server = "localhost"; // server[:port] of printer queue
 	char *hostname;
 	// N.B. IMHO getenv("USER") can be way easily spoofed!
-	const char *user = bb_getpwuid(NULL, -1, getuid());
+	const char *user = xuid2uname(getuid());
 	unsigned job;
 	unsigned opts;
 	int fd;
--- busybox.old/miscutils/crontab.c	2008-09-21 22:37:21.000000000 +0200
+++ busybox/miscutils/crontab.c	2008-11-05 17:42:44.000000000 +0100
@@ -130,11 +130,7 @@
 		if (!pas)
 			bb_error_msg_and_die("user %s is not known", user_name);
 	} else {
-/* XXX: xgetpwuid */
-		uid_t my_uid = getuid();
-		pas = getpwuid(my_uid);
-		if (!pas)
-			bb_perror_msg_and_die("unknown uid %d", (int)my_uid);
+		pas = xgetpwuid(getuid());
 	}
 
 #define user_name DONT_USE_ME_BEYOND_THIS_POINT
_______________________________________________
busybox mailing list
[email protected]
http://busybox.net/cgi-bin/mailman/listinfo/busybox

Reply via email to