mirror of
https://github.com/tmux/tmux.git
synced 2024-12-24 18:28:56 +00:00
6ce38b7395
(very sloppy specification) leaves an undefined value in *ret, so it is wrong to inspect it, the error condition is enough. discussed a little with nicm, and then much more with millert until we were exasperated
148 lines
2.7 KiB
C
148 lines
2.7 KiB
C
/* $OpenBSD$ */
|
|
|
|
/*
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
* Versions of malloc and friends that check their results, and never return
|
|
* failure (they call fatalx if they encounter an error).
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <limits.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "tmux.h"
|
|
|
|
void *
|
|
xmalloc(size_t size)
|
|
{
|
|
void *ptr;
|
|
|
|
if (size == 0)
|
|
fatalx("xmalloc: zero size");
|
|
ptr = malloc(size);
|
|
if (ptr == NULL)
|
|
fatalx("xmalloc: allocating %zu bytes: %s",
|
|
size, strerror(errno));
|
|
return ptr;
|
|
}
|
|
|
|
void *
|
|
xcalloc(size_t nmemb, size_t size)
|
|
{
|
|
void *ptr;
|
|
|
|
if (size == 0 || nmemb == 0)
|
|
fatalx("xcalloc: zero size");
|
|
ptr = calloc(nmemb, size);
|
|
if (ptr == NULL)
|
|
fatalx("xcalloc: allocating %zu * %zu bytes: %s",
|
|
nmemb, size, strerror(errno));
|
|
return ptr;
|
|
}
|
|
|
|
void *
|
|
xrealloc(void *ptr, size_t size)
|
|
{
|
|
return xreallocarray(ptr, 1, size);
|
|
}
|
|
|
|
void *
|
|
xreallocarray(void *ptr, size_t nmemb, size_t size)
|
|
{
|
|
void *new_ptr;
|
|
|
|
if (nmemb == 0 || size == 0)
|
|
fatalx("xreallocarray: zero size");
|
|
new_ptr = reallocarray(ptr, nmemb, size);
|
|
if (new_ptr == NULL)
|
|
fatalx("xreallocarray: allocating %zu * %zu bytes: %s",
|
|
nmemb, size, strerror(errno));
|
|
return new_ptr;
|
|
}
|
|
|
|
char *
|
|
xstrdup(const char *str)
|
|
{
|
|
char *cp;
|
|
|
|
if ((cp = strdup(str)) == NULL)
|
|
fatalx("xstrdup: %s", strerror(errno));
|
|
return cp;
|
|
}
|
|
|
|
char *
|
|
xstrndup(const char *str, size_t maxlen)
|
|
{
|
|
char *cp;
|
|
|
|
if ((cp = strndup(str, maxlen)) == NULL)
|
|
fatalx("xstrndup: %s", strerror(errno));
|
|
return cp;
|
|
}
|
|
|
|
int
|
|
xasprintf(char **ret, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
int i;
|
|
|
|
va_start(ap, fmt);
|
|
i = xvasprintf(ret, fmt, ap);
|
|
va_end(ap);
|
|
|
|
return i;
|
|
}
|
|
|
|
int
|
|
xvasprintf(char **ret, const char *fmt, va_list ap)
|
|
{
|
|
int i;
|
|
|
|
i = vasprintf(ret, fmt, ap);
|
|
|
|
if (i == -1)
|
|
fatalx("xasprintf: %s", strerror(errno));
|
|
|
|
return i;
|
|
}
|
|
|
|
int
|
|
xsnprintf(char *str, size_t len, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
int i;
|
|
|
|
va_start(ap, fmt);
|
|
i = xvsnprintf(str, len, fmt, ap);
|
|
va_end(ap);
|
|
|
|
return i;
|
|
}
|
|
|
|
int
|
|
xvsnprintf(char *str, size_t len, const char *fmt, va_list ap)
|
|
{
|
|
int i;
|
|
|
|
if (len > INT_MAX)
|
|
fatalx("xsnprintf: len > INT_MAX");
|
|
|
|
i = vsnprintf(str, len, fmt, ap);
|
|
|
|
if (i < 0 || i >= (int)len)
|
|
fatalx("xsnprintf: overflow");
|
|
|
|
return i;
|
|
}
|