2 * PuTTY memory-handling header.
\r
5 #ifndef PUTTY_PUTTYMEM_H
\r
6 #define PUTTY_PUTTYMEM_H
\r
8 #include <stddef.h> /* for size_t */
\r
9 #include <string.h> /* for memcpy() */
\r
12 /* #define MALLOC_LOG do this if you suspect putty of leaking memory */
\r
14 #define smalloc(z) (mlog(__FILE__,__LINE__), safemalloc(z,1))
\r
15 #define snmalloc(z,s) (mlog(__FILE__,__LINE__), safemalloc(z,s))
\r
16 #define srealloc(y,z) (mlog(__FILE__,__LINE__), saferealloc(y,z,1))
\r
17 #define snrealloc(y,z,s) (mlog(__FILE__,__LINE__), saferealloc(y,z,s))
\r
18 #define sfree(z) (mlog(__FILE__,__LINE__), safefree(z))
\r
19 void mlog(char *, int);
\r
21 #define smalloc(z) safemalloc(z,1)
\r
22 #define snmalloc safemalloc
\r
23 #define srealloc(y,z) saferealloc(y,z,1)
\r
24 #define snrealloc saferealloc
\r
25 #define sfree safefree
\r
28 void *safemalloc(size_t, size_t);
\r
29 void *saferealloc(void *, size_t, size_t);
\r
30 void safefree(void *);
\r
33 * Direct use of smalloc within the code should be avoided where
\r
34 * possible, in favour of these type-casting macros which ensure
\r
35 * you don't mistakenly allocate enough space for one sort of
\r
36 * structure and assign it to a different sort of pointer.
\r
38 * The nasty trick in sresize with sizeof arranges for the compiler,
\r
39 * in passing, to type-check the expression ((type *)0 == (ptr)), i.e.
\r
40 * to type-check that the input pointer is a pointer to the correct
\r
41 * type. The construction sizeof(stuff) ? (b) : (b) looks like a
\r
42 * violation of the first principle of safe macros, but in fact it's
\r
43 * OK - although it _expands_ the macro parameter more than once, it
\r
44 * only _evaluates_ it once, so it's still side-effect safe.
\r
46 #define snew(type) ((type *)snmalloc(1, sizeof(type)))
\r
47 #define snewn(n, type) ((type *)snmalloc((n), sizeof(type)))
\r
48 #define sresize(ptr, n, type) \
\r
49 ((type *)snrealloc(sizeof((type *)0 == (ptr)) ? (ptr) : (ptr), \
\r