Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Use SPICE_{BEGIN,END}_DECLS | Marc-André Lureau | 2012-03-20 | 1 | -6/+3 |
| | |||||
* | mingw: don't try to redefine alloca | Christophe Fergeau | 2012-03-20 | 1 | -0/+2 |
| | | | | | mingw already has a #define alloca __builtin_alloca so trying to redefine it triggers a warning. | ||||
* | common: mem.h add alloca definition | Marc-André Lureau | 2012-03-20 | 1 | -0/+30 |
| | | | | | We don't support the autoconf ALLOCA/C_ALLOC fallback. If one day, someone cares for a weird platform, he can fix it. | ||||
* | common: add extern "C" guards to headers | Christophe Fergeau | 2012-03-20 | 1 | -0/+7 |
| | | | | | | Since some spice C++ code is using code from common/, the C functions need to be marked as such for the C++ compiler, otherwise we'll get linkage issues. | ||||
* | common: add SpiceBuffer - based on qemu-vnc Buffer | Marc-André Lureau | 2012-03-20 | 1 | -0/+17 |
| | | | | https://bugs.freedesktop.org/show_bug.cgi?id=34795 | ||||
* | Move SpiceChunks to mem.h | Alexander Larsson | 2012-03-20 | 1 | -1/+17 |
| | |||||
* | Move in spice/draw.h from spice-protocol to common/ | Alexander Larsson | 2012-03-20 | 1 | -1/+1 |
| | |||||
* | Add spice_chunks_* helpers | Alexander Larsson | 2012-03-20 | 1 | -0/+5 |
| | |||||
* | Add spice_strnlen | Alexander Larsson | 2012-03-20 | 1 | -0/+2 |
| | |||||
* | Fix spelling errors in comments and strings | Alexander Larsson | 2012-03-20 | 1 | -2/+2 |
| | |||||
* | Relicense everything from GPL to LGPL 2.1+ | Alexander Larsson | 2012-03-20 | 1 | -9/+9 |
| | |||||
* | Add spice_strndup | Alexander Larsson | 2012-03-20 | 1 | -0/+1 |
| | | | | Also, make str(n)dup handle NULL correctly | ||||
* | New memory allocators that exit on OOM and handle multiplication overflow | Alexander Larsson | 2012-03-20 | 1 | -0/+82 |
Every place that does a regular malloc/calloc and aborts on failure should use spice_malloc/spice_mallo0 instead, which is leaner and cleaner. Allocations of dynamically sized arrays can use g_malloc_n or g_new etc which correctly handle multiplication overflow if some of the arguments are not trusted. |