This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

t4t_lib NFC NDEF Malformed/Overflow Check?

I'm concerned about users writing too much or invalid NDEF data to the NFC function.

This could result in parse errors or buffer overflows leading to system crashes/malfunction.

Since the t4t_lib is closed source, by any chance, are these conditions at least checked internally at Nordic?

Parents Reply
  • It seems that FFF0 is about 64k, which is nearly all the RAM in the NRF52832. So I'm looking for a way to safely further restrict the bounds checking.

    Do you happen to know if this following command will further restrict valid data length? ret_code_t nfc_t4t_ndef_rwpayload_set(uint8_t * p_emulation_buffer, size_t buffer_length);

    Or is it safe to assume that a buffer overflow beyond "buffer_length" could occur at any time?

Children
No Data
Related