helper: Make unhexify() robust on invalid data
The current implementation is not suitable for user provided data because it does not detect invalid inputs in many cases. For example, the string "aa0xbb" is successfully converted to the 3 bytes: 0xaa, 0x00 and 0xbb. An other example is "aabi" which is successfully converted to the 2 bytes: 0xaa and 0x0b. Both are obviously incorrect. Make unhexify() robust on invalid data and use more appropriate data types for its parameters. Also, add a small documentation for the function. Change-Id: Idb799beb86fc608b066c8a76365021ed44c7f890 Signed-off-by: Marc Schink <openocd-dev@marcschink.de> Reviewed-on: http://openocd.zylin.com/3792 Tested-by: jenkins Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
This commit is contained in:
committed by
Andreas Fritiofson
parent
10aeff9259
commit
674141e8a7
@@ -1449,7 +1449,7 @@ static int gdb_write_memory_packet(struct connection *connection,
|
||||
|
||||
LOG_DEBUG("addr: 0x%8.8" PRIx32 ", len: 0x%8.8" PRIx32 "", addr, len);
|
||||
|
||||
if (unhexify((char *)buffer, separator, len) != (int)len)
|
||||
if (unhexify(buffer, separator, len) != len)
|
||||
LOG_ERROR("unable to decode memory packet");
|
||||
|
||||
retval = target_write_buffer(target, addr, len, buffer);
|
||||
@@ -2277,7 +2277,7 @@ static int gdb_query_packet(struct connection *connection,
|
||||
if (packet_size > 6) {
|
||||
char *cmd;
|
||||
cmd = malloc((packet_size - 6) / 2 + 1);
|
||||
int len = unhexify(cmd, packet + 6, (packet_size - 6) / 2);
|
||||
size_t len = unhexify((uint8_t *)cmd, packet + 6, (packet_size - 6) / 2);
|
||||
cmd[len] = 0;
|
||||
|
||||
/* We want to print all debug output to GDB connection */
|
||||
|
||||
Reference in New Issue
Block a user