tmux/xmalloc.c

162 lines
3.0 KiB
C
Raw Permalink Normal View History

/* $OpenBSD$ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* All rights reserved
* Versions of malloc and friends that check their results, and never return
2016-04-04 16:19:43 +00:00
* failure (they call fatalx if they encounter an error).
*
* As far as I am concerned, the code I have written for this software
* can be used freely for any purpose. Any derived versions of this
* software must be clearly marked as such, and if the derived work is
* incompatible with the protocol description in the RFC file, it must be
* called by a name other than "ssh" or "Secure Shell".
*/
#include <errno.h>
#include <limits.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "tmux.h"
void *
xmalloc(size_t size)
{
void *ptr;
if (size == 0)
2016-04-04 16:19:43 +00:00
fatalx("xmalloc: zero size");
ptr = malloc(size);
if (ptr == NULL)
2016-04-04 16:19:43 +00:00
fatalx("xmalloc: allocating %zu bytes: %s",
size, strerror(errno));
return ptr;
}
void *
xcalloc(size_t nmemb, size_t size)
{
void *ptr;
2009-10-26 21:42:04 +00:00
if (size == 0 || nmemb == 0)
2016-04-04 16:19:43 +00:00
fatalx("xcalloc: zero size");
ptr = calloc(nmemb, size);
if (ptr == NULL)
2016-04-04 16:19:43 +00:00
fatalx("xcalloc: allocating %zu * %zu bytes: %s",
nmemb, size, strerror(errno));
return ptr;
}
void *
xrealloc(void *ptr, size_t size)
{
return xreallocarray(ptr, 1, size);
}
void *
xreallocarray(void *ptr, size_t nmemb, size_t size)
{
void *new_ptr;
if (nmemb == 0 || size == 0)
2016-04-04 16:19:43 +00:00
fatalx("xreallocarray: zero size");
new_ptr = reallocarray(ptr, nmemb, size);
if (new_ptr == NULL)
2016-04-04 16:19:43 +00:00
fatalx("xreallocarray: allocating %zu * %zu bytes: %s",
nmemb, size, strerror(errno));
return new_ptr;
}
2019-11-28 09:51:58 +00:00
void *
xrecallocarray(void *ptr, size_t oldnmemb, size_t nmemb, size_t size)
{
void *new_ptr;
if (nmemb == 0 || size == 0)
fatalx("xrecallocarray: zero size");
new_ptr = recallocarray(ptr, oldnmemb, nmemb, size);
if (new_ptr == NULL)
fatalx("xrecallocarray: allocating %zu * %zu bytes: %s",
nmemb, size, strerror(errno));
return new_ptr;
}
char *
xstrdup(const char *str)
{
char *cp;
if ((cp = strdup(str)) == NULL)
2016-04-04 16:19:43 +00:00
fatalx("xstrdup: %s", strerror(errno));
return cp;
}
char *
xstrndup(const char *str, size_t maxlen)
{
char *cp;
if ((cp = strndup(str, maxlen)) == NULL)
fatalx("xstrndup: %s", strerror(errno));
return cp;
}
int
xasprintf(char **ret, const char *fmt, ...)
{
2009-10-26 21:42:04 +00:00
va_list ap;
int i;
2009-10-26 21:42:04 +00:00
va_start(ap, fmt);
i = xvasprintf(ret, fmt, ap);
va_end(ap);
return i;
}
int
xvasprintf(char **ret, const char *fmt, va_list ap)
{
int i;
i = vasprintf(ret, fmt, ap);
if (i == -1)
2016-04-04 16:19:43 +00:00
fatalx("xasprintf: %s", strerror(errno));
return i;
}
int
xsnprintf(char *str, size_t len, const char *fmt, ...)
{
2009-10-26 21:42:04 +00:00
va_list ap;
int i;
2009-10-26 21:42:04 +00:00
va_start(ap, fmt);
i = xvsnprintf(str, len, fmt, ap);
2009-10-26 21:42:04 +00:00
va_end(ap);
return i;
}
int
xvsnprintf(char *str, size_t len, const char *fmt, va_list ap)
{
int i;
if (len > INT_MAX)
2016-04-04 16:19:43 +00:00
fatalx("xsnprintf: len > INT_MAX");
i = vsnprintf(str, len, fmt, ap);
if (i < 0 || i >= (int)len)
2016-04-04 16:19:43 +00:00
fatalx("xsnprintf: overflow");
return i;
}