mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-29 05:32:07 +00:00
ffb1e7e896
Add a function to enable security-related malloc_options. With and ok deraadt@, something similar has been in the snaps for a while. Upstream-ID: 43a95523b832b7f3b943d2908662191110c380ed
27 lines
1.0 KiB
C
27 lines
1.0 KiB
C
/* $OpenBSD: xmalloc.h,v 1.16 2016/02/15 09:47:49 dtucker Exp $ */
|
|
|
|
/*
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
* Created: Mon Mar 20 22:09:17 1995 ylo
|
|
*
|
|
* Versions of malloc and friends that check their results, and never return
|
|
* failure (they call fatal if they encounter an error).
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
*/
|
|
|
|
void ssh_malloc_init(void);
|
|
void *xmalloc(size_t);
|
|
void *xcalloc(size_t, size_t);
|
|
void *xreallocarray(void *, size_t, size_t);
|
|
char *xstrdup(const char *);
|
|
int xasprintf(char **, const char *, ...)
|
|
__attribute__((__format__ (printf, 2, 3)))
|
|
__attribute__((__nonnull__ (2)));
|