diff options
author | Siarhei Vishniakou <svv@google.com> | 2018-07-16 17:01:40 +0100 |
---|---|---|
committer | Kim Low <kim-huei.low@sony.com> | 2018-11-29 15:26:00 -0800 |
commit | 6c6dd65deba7e66bb2c40ef995074dc4ad42e843 (patch) | |
tree | f8e33601f8f43b5fe2851d471c8364b7f8121cad /tools/aapt2/java/JavaClassGenerator_test.cpp | |
parent | f67ece13ad8a58017ac685c277ff344d00a4f6dc (diff) |
Refactor hid command, mitigate overflows
Currently there are a few overflows possible in the hid command by
sending malformed json requests. Refactor the code to avoid these
overflows. These are mostly memcpy usage, where the size comes
(indirectly) from the size of the json array.
The json array must still be valid, because invalid json will produce an
earlier exception in the java layer.
Test: hid malformed_commands.json
The file "malformed_commands.json" can be found in the bug.
Bug: 111363077
Merged-In: I2f9dd31e0bfa2badc58779f40f4a80e025754cd2
(cherry picked from commit d54b70c8bfe393ef57445bd59962e6730b0b13c0)
Change-Id: I2f9dd31e0bfa2badc58779f40f4a80e025754cd2
Diffstat (limited to 'tools/aapt2/java/JavaClassGenerator_test.cpp')
0 files changed, 0 insertions, 0 deletions