Blame


1 014c66b6 2023-06-25 op /* $OpenBSD: xmalloc.h,v 1.3 2015/11/17 18:25:03 tobias Exp $ */
2 014c66b6 2023-06-25 op
3 014c66b6 2023-06-25 op /*
4 014c66b6 2023-06-25 op * Author: Tatu Ylonen <ylo@cs.hut.fi>
5 014c66b6 2023-06-25 op * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 014c66b6 2023-06-25 op * All rights reserved
7 014c66b6 2023-06-25 op * Created: Mon Mar 20 22:09:17 1995 ylo
8 014c66b6 2023-06-25 op *
9 014c66b6 2023-06-25 op * Versions of malloc and friends that check their results, and never return
10 014c66b6 2023-06-25 op * failure (they call fatal if they encounter an error).
11 014c66b6 2023-06-25 op *
12 014c66b6 2023-06-25 op * As far as I am concerned, the code I have written for this software
13 014c66b6 2023-06-25 op * can be used freely for any purpose. Any derived versions of this
14 014c66b6 2023-06-25 op * software must be clearly marked as such, and if the derived work is
15 014c66b6 2023-06-25 op * incompatible with the protocol description in the RFC file, it must be
16 014c66b6 2023-06-25 op * called by a name other than "ssh" or "Secure Shell".
17 014c66b6 2023-06-25 op */
18 014c66b6 2023-06-25 op
19 014c66b6 2023-06-25 op #ifndef XMALLOC_H
20 014c66b6 2023-06-25 op #define XMALLOC_H
21 014c66b6 2023-06-25 op
22 014c66b6 2023-06-25 op void *xmalloc(size_t);
23 014c66b6 2023-06-25 op void *xcalloc(size_t, size_t);
24 014c66b6 2023-06-25 op void *xreallocarray(void *, size_t, size_t);
25 014c66b6 2023-06-25 op void *xrecallocarray(void *, size_t, size_t, size_t);
26 014c66b6 2023-06-25 op char *xstrdup(const char *);
27 014c66b6 2023-06-25 op int xasprintf(char **, const char *, ...)
28 014c66b6 2023-06-25 op __attribute__((__format__ (printf, 2, 3)))
29 014c66b6 2023-06-25 op __attribute__((__nonnull__ (2)));
30 014c66b6 2023-06-25 op
31 014c66b6 2023-06-25 op #endif /* XMALLOC_H */