NetBSD/crypto/dist/ssh/xmalloc.c

71 lines
1.6 KiB
C
Raw Normal View History

/* $NetBSD: xmalloc.c,v 1.7 2003/07/10 01:09:49 lukem Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* All rights reserved
* Versions of malloc and friends that check their results, and never return
* failure (they call fatal if they encounter an error).
2001-02-07 19:46:40 +03:00
*
* As far as I am concerned, the code I have written for this software
* can be used freely for any purpose. Any derived versions of this
* software must be clearly marked as such, and if the derived work is
* incompatible with the protocol description in the RFC file, it must be
* called by a name other than "ssh" or "Secure Shell".
*/
#include "includes.h"
2001-09-27 07:24:01 +04:00
RCSID("$OpenBSD: xmalloc.c,v 1.16 2001/07/23 18:21:46 stevesk Exp $");
__RCSID("$NetBSD: xmalloc.c,v 1.7 2003/07/10 01:09:49 lukem Exp $");
#include "xmalloc.h"
2001-02-07 19:46:40 +03:00
#include "log.h"
void *
xmalloc(size_t size)
{
2001-02-07 19:46:40 +03:00
void *ptr;
if (size == 0)
fatal("xmalloc: zero size");
ptr = malloc(size);
if (ptr == NULL)
fatal("xmalloc: out of memory (allocating %lu bytes)", (u_long) size);
return ptr;
}
void *
xrealloc(void *ptr, size_t new_size)
{
void *new_ptr;
2001-02-07 19:46:40 +03:00
if (new_size == 0)
2001-02-08 22:02:14 +03:00
fatal("xrealloc: zero size");
if (ptr == NULL)
new_ptr = malloc(new_size);
else
new_ptr = realloc(ptr, new_size);
if (new_ptr == NULL)
fatal("xrealloc: out of memory (new_size %lu bytes)", (u_long) new_size);
return new_ptr;
}
void
xfree(void *ptr)
{
if (ptr == NULL)
fatal("xfree: NULL pointer given as argument");
free(ptr);
}
char *
xstrdup(const char *str)
{
2001-09-27 07:24:01 +04:00
size_t len;
2001-02-07 19:46:40 +03:00
char *cp;
2001-09-27 07:24:01 +04:00
len = strlen(str) + 1;
2001-02-07 19:46:40 +03:00
cp = xmalloc(len);
strlcpy(cp, str, len);
return cp;
}