Loading libcutils/strdup16to8.c +86 −22 Original line number Diff line number Diff line Loading @@ -15,6 +15,8 @@ ** limitations under the License. */ #include <limits.h> /* for SIZE_MAX */ #include <cutils/jstring.h> #include <assert.h> #include <stdlib.h> Loading @@ -28,8 +30,48 @@ extern size_t strnlen16to8(const char16_t* utf16Str, size_t len) { size_t utf8Len = 0; /* A small note on integer overflow. The result can * potentially be as big as 3*len, which will overflow * for len > SIZE_MAX/3. * * Moreover, the result of a strnlen16to8 is typically used * to allocate a destination buffer to strncpy16to8 which * requires one more byte to terminate the UTF-8 copy, and * this is generally done by careless users by incrementing * the result without checking for integer overflows, e.g.: * * dst = malloc(strnlen16to8(utf16,len)+1) * * Due to this, the following code will try to detect * overflows, and never return more than (SIZE_MAX-1) * when it detects one. A careless user will try to malloc * SIZE_MAX bytes, which will return NULL which can at least * be detected appropriately. * * As far as I know, this function is only used by strndup16(), * but better be safe than sorry. */ /* Fast path for the usual case where 3*len is < SIZE_MAX-1. */ if (len < (SIZE_MAX-1)/3) { while (len--) { unsigned int uic = *utf16Str++; if (uic > 0x07ff) utf8Len += 3; else if (uic > 0x7f || uic == 0) utf8Len += 2; else utf8Len++; } return utf8Len; } /* The slower but paranoid version */ while (len--) { unsigned int uic = *utf16Str++; size_t utf8Cur = utf8Len; if (uic > 0x07ff) utf8Len += 3; Loading @@ -37,7 +79,15 @@ extern size_t strnlen16to8(const char16_t* utf16Str, size_t len) utf8Len += 2; else utf8Len++; if (utf8Len < utf8Cur) /* overflow detected */ return SIZE_MAX-1; } /* don't return SIZE_MAX to avoid common user bug */ if (utf8Len == SIZE_MAX) utf8Len = SIZE_MAX-1; return utf8Len; } Loading @@ -58,6 +108,10 @@ extern char* strncpy16to8(char* utf8Str, const char16_t* utf16Str, size_t len) { char* utf8cur = utf8Str; /* Note on overflows: We assume the user did check the result of * strnlen16to8() properly or at a minimum checked the result of * its malloc(SIZE_MAX) in case of overflow. */ while (len--) { unsigned int uic = *utf16Str++; Loading Loading @@ -85,18 +139,28 @@ extern char* strncpy16to8(char* utf8Str, const char16_t* utf16Str, size_t len) /** * Convert a UTF-16 string to UTF-8. * * Make sure you allocate "dest" with the result of strblen16to8(), * not just "strlen16()". */ char * strndup16to8 (const char16_t* s, size_t n) { char* ret; size_t len; if (s == NULL) { return NULL; } ret = malloc(strnlen16to8(s, n) + 1); len = strnlen16to8(s, n); /* We are paranoid, and we check for SIZE_MAX-1 * too since it is an overflow value for our * strnlen16to8 implementation. */ if (len >= SIZE_MAX-1) return NULL; ret = malloc(len + 1); if (ret == NULL) return NULL; strncpy16to8 (ret, s, n); Loading Loading
libcutils/strdup16to8.c +86 −22 Original line number Diff line number Diff line Loading @@ -15,6 +15,8 @@ ** limitations under the License. */ #include <limits.h> /* for SIZE_MAX */ #include <cutils/jstring.h> #include <assert.h> #include <stdlib.h> Loading @@ -28,8 +30,48 @@ extern size_t strnlen16to8(const char16_t* utf16Str, size_t len) { size_t utf8Len = 0; /* A small note on integer overflow. The result can * potentially be as big as 3*len, which will overflow * for len > SIZE_MAX/3. * * Moreover, the result of a strnlen16to8 is typically used * to allocate a destination buffer to strncpy16to8 which * requires one more byte to terminate the UTF-8 copy, and * this is generally done by careless users by incrementing * the result without checking for integer overflows, e.g.: * * dst = malloc(strnlen16to8(utf16,len)+1) * * Due to this, the following code will try to detect * overflows, and never return more than (SIZE_MAX-1) * when it detects one. A careless user will try to malloc * SIZE_MAX bytes, which will return NULL which can at least * be detected appropriately. * * As far as I know, this function is only used by strndup16(), * but better be safe than sorry. */ /* Fast path for the usual case where 3*len is < SIZE_MAX-1. */ if (len < (SIZE_MAX-1)/3) { while (len--) { unsigned int uic = *utf16Str++; if (uic > 0x07ff) utf8Len += 3; else if (uic > 0x7f || uic == 0) utf8Len += 2; else utf8Len++; } return utf8Len; } /* The slower but paranoid version */ while (len--) { unsigned int uic = *utf16Str++; size_t utf8Cur = utf8Len; if (uic > 0x07ff) utf8Len += 3; Loading @@ -37,7 +79,15 @@ extern size_t strnlen16to8(const char16_t* utf16Str, size_t len) utf8Len += 2; else utf8Len++; if (utf8Len < utf8Cur) /* overflow detected */ return SIZE_MAX-1; } /* don't return SIZE_MAX to avoid common user bug */ if (utf8Len == SIZE_MAX) utf8Len = SIZE_MAX-1; return utf8Len; } Loading @@ -58,6 +108,10 @@ extern char* strncpy16to8(char* utf8Str, const char16_t* utf16Str, size_t len) { char* utf8cur = utf8Str; /* Note on overflows: We assume the user did check the result of * strnlen16to8() properly or at a minimum checked the result of * its malloc(SIZE_MAX) in case of overflow. */ while (len--) { unsigned int uic = *utf16Str++; Loading Loading @@ -85,18 +139,28 @@ extern char* strncpy16to8(char* utf8Str, const char16_t* utf16Str, size_t len) /** * Convert a UTF-16 string to UTF-8. * * Make sure you allocate "dest" with the result of strblen16to8(), * not just "strlen16()". */ char * strndup16to8 (const char16_t* s, size_t n) { char* ret; size_t len; if (s == NULL) { return NULL; } ret = malloc(strnlen16to8(s, n) + 1); len = strnlen16to8(s, n); /* We are paranoid, and we check for SIZE_MAX-1 * too since it is an overflow value for our * strnlen16to8 implementation. */ if (len >= SIZE_MAX-1) return NULL; ret = malloc(len + 1); if (ret == NULL) return NULL; strncpy16to8 (ret, s, n); Loading