4f52dfbb8d
This completely removes client-side support for the SSH 1 protocol, which was already disabled in 12 but is still enabled in 11. For that reason, we will not be able to merge 7.6p1 or newer back to 11.
28 lines
1.1 KiB
C
28 lines
1.1 KiB
C
/* $OpenBSD: xmalloc.h,v 1.17 2017/05/31 09:15:42 deraadt Exp $ */
|
|
|
|
/*
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
* Created: Mon Mar 20 22:09:17 1995 ylo
|
|
*
|
|
* Versions of malloc and friends that check their results, and never return
|
|
* failure (they call fatal if they encounter an error).
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
*/
|
|
|
|
void ssh_malloc_init(void);
|
|
void *xmalloc(size_t);
|
|
void *xcalloc(size_t, size_t);
|
|
void *xreallocarray(void *, size_t, size_t);
|
|
void *xrecallocarray(void *, size_t, size_t, size_t);
|
|
char *xstrdup(const char *);
|
|
int xasprintf(char **, const char *, ...)
|
|
__attribute__((__format__ (printf, 2, 3)))
|
|
__attribute__((__nonnull__ (2)));
|