So far the lengths provided in event and ACL packets were not being checked at all, which could have caused an overflow if the contents were not to fit inside the net_buf. Check the length and discard the packet when it doesn't fit. Signed-off-by: Carles Cufi <carles.cufi@nordicsemi.no> |
||
|---|---|---|
| .. | ||
| hci | ||
| CMakeLists.txt | ||
| Kconfig | ||
| util.h | ||