HardenedBSD/crypto/openssh/xmalloc.c

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

119 lines
2.5 KiB
C
Raw Permalink Normal View History

2022-04-08 19:19:17 +02:00
/* $OpenBSD: xmalloc.c,v 1.37 2022/03/13 23:27:54 cheloha Exp $ */
2000-02-24 15:29:47 +01:00
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* All rights reserved
* Versions of malloc and friends that check their results, and never return
* failure (they call fatal if they encounter an error).
*
* As far as I am concerned, the code I have written for this software
* can be used freely for any purpose. Any derived versions of this
* software must be clearly marked as such, and if the derived work is
* incompatible with the protocol description in the RFC file, it must be
* called by a name other than "ssh" or "Secure Shell".
2000-02-24 15:29:47 +01:00
*/
#include "includes.h"
2006-09-30 15:29:51 +02:00
#include <stdarg.h>
2015-07-02 15:15:34 +02:00
#ifdef HAVE_STDINT_H
2021-02-14 22:00:25 +01:00
# include <stdint.h>
2015-07-02 15:15:34 +02:00
#endif
2006-09-30 15:29:51 +02:00
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
2000-02-24 15:29:47 +01:00
#include "xmalloc.h"
#include "log.h"
2000-02-24 15:29:47 +01:00
2016-03-10 21:10:25 +01:00
#if defined(__OpenBSD__)
2021-02-14 22:00:25 +01:00
char *malloc_options = "S";
2016-03-10 21:10:25 +01:00
#endif /* __OpenBSD__ */
2000-02-24 15:29:47 +01:00
void *
xmalloc(size_t size)
{
void *ptr;
if (size == 0)
fatal("xmalloc: zero size");
ptr = malloc(size);
2000-02-24 15:29:47 +01:00
if (ptr == NULL)
2014-01-30 11:56:49 +01:00
fatal("xmalloc: out of memory (allocating %zu bytes)", size);
2000-02-24 15:29:47 +01:00
return ptr;
}
void *
2006-09-30 15:29:51 +02:00
xcalloc(size_t nmemb, size_t size)
{
void *ptr;
if (size == 0 || nmemb == 0)
fatal("xcalloc: zero size");
2015-07-02 15:15:34 +02:00
if (SIZE_MAX / nmemb < size)
fatal("xcalloc: nmemb * size > SIZE_MAX");
2006-09-30 15:29:51 +02:00
ptr = calloc(nmemb, size);
if (ptr == NULL)
2014-01-30 11:56:49 +01:00
fatal("xcalloc: out of memory (allocating %zu bytes)",
size * nmemb);
2006-09-30 15:29:51 +02:00
return ptr;
}
void *
2015-07-02 15:18:50 +02:00
xreallocarray(void *ptr, size_t nmemb, size_t size)
2000-02-24 15:29:47 +01:00
{
void *new_ptr;
2015-07-02 15:18:50 +02:00
new_ptr = reallocarray(ptr, nmemb, size);
2000-02-24 15:29:47 +01:00
if (new_ptr == NULL)
2015-07-02 15:18:50 +02:00
fatal("xreallocarray: out of memory (%zu elements of %zu bytes)",
nmemb, size);
2000-02-24 15:29:47 +01:00
return new_ptr;
}
2018-05-06 14:24:45 +02:00
void *
xrecallocarray(void *ptr, size_t onmemb, size_t nmemb, size_t size)
{
void *new_ptr;
new_ptr = recallocarray(ptr, onmemb, nmemb, size);
if (new_ptr == NULL)
fatal("xrecallocarray: out of memory (%zu elements of %zu bytes)",
nmemb, size);
return new_ptr;
}
2000-02-24 15:29:47 +01:00
char *
xstrdup(const char *str)
{
2002-03-18 10:55:03 +01:00
size_t len;
char *cp;
2000-02-24 15:29:47 +01:00
2002-03-18 10:55:03 +01:00
len = strlen(str) + 1;
cp = xmalloc(len);
2022-04-08 19:19:17 +02:00
return memcpy(cp, str, len);
2000-02-24 15:29:47 +01:00
}
2006-09-30 15:29:51 +02:00
2021-02-14 22:04:52 +01:00
int
xvasprintf(char **ret, const char *fmt, va_list ap)
{
int i;
i = vasprintf(ret, fmt, ap);
if (i < 0 || *ret == NULL)
fatal("xvasprintf: could not allocate memory");
return i;
}
2006-09-30 15:29:51 +02:00
int
xasprintf(char **ret, const char *fmt, ...)
{
va_list ap;
int i;
va_start(ap, fmt);
2021-02-14 22:04:52 +01:00
i = xvasprintf(ret, fmt, ap);
2006-09-30 15:29:51 +02:00
va_end(ap);
2021-02-14 22:04:52 +01:00
return i;
2006-09-30 15:29:51 +02:00
}