Revert "Fix integer overflow in NDEF_MsgValidate."
This reverts commit a5db70f3c684767ec5160cea79743e9420b65f5d.
BUG: 132227011
Merged-In: Iaed90d46f77e20091fd868ddd89567c471e58b6a
Change-Id: I0b67ee1436263c8997c20212d9a08fc96b113c9c
Signed-off-by: Raj Mojumder <rmojumder@google.com>
(cherry picked from commit 6edef8e4c4b108f8deb5856d885ba9da504c2e9c)
diff --git a/src/nfc/ndef/ndef_utils.cc b/src/nfc/ndef/ndef_utils.cc
index e236e75..fa2c007 100644
--- a/src/nfc/ndef/ndef_utils.cc
+++ b/src/nfc/ndef/ndef_utils.cc
@@ -23,8 +23,6 @@
*
******************************************************************************/
#include "ndef_utils.h"
-#include <log/log.h>
-#include <stddef.h>
#include <string.h>
/*******************************************************************************
@@ -197,13 +195,6 @@
}
}
- /* Check for integer overflow */
- if (((uint8_t*)(~0U) - p_rec) <
- (ptrdiff_t)(payload_len + type_len + id_len)) {
- android_errorWriteLog(0x534e4554, "126200054");
- return (NDEF_MSG_LENGTH_MISMATCH);
- }
-
/* Point to next record */
p_rec += (payload_len + type_len + id_len);