Skip to content

bluetooth: bt_set_name rejects names of size CONFIG_BT_DEVICE_NAME_MAX #15067

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
paulgavrikov opened this issue Apr 1, 2019 · 0 comments
Closed
Assignees
Labels
area: Bluetooth bug The issue is a bug, or the PR is fixing a bug priority: low Low impact/importance bug
Milestone

Comments

@paulgavrikov
Copy link

paulgavrikov commented Apr 1, 2019

Describe the bug
bt_set_name(const char *name) in hci_core.c will refuse names that are of length CONFIG_BT_DEVICE_NAME_MAX

@paulgavrikov paulgavrikov added the bug The issue is a bug, or the PR is fixing a bug label Apr 1, 2019
@jhedberg jhedberg assigned Vudentz and unassigned jhedberg Apr 1, 2019
@jhedberg jhedberg added the priority: low Low impact/importance bug label Apr 1, 2019
@jhedberg jhedberg added this to the v1.14.0 milestone Apr 1, 2019
Vudentz added a commit to Vudentz/zephyr that referenced this issue Apr 1, 2019
In order to accept string of the same size entered in
CONFIG_BT_DEVICE_NAME_MAX an extra byte must be allocated to guarantee
it will always be NULL terminated.

Fixes zephyrproject-rtos#15067

Signed-off-by: Luiz Augusto von Dentz <[email protected]>
jhedberg pushed a commit that referenced this issue Apr 1, 2019
In order to accept string of the same size entered in
CONFIG_BT_DEVICE_NAME_MAX an extra byte must be allocated to guarantee
it will always be NULL terminated.

Fixes #15067

Signed-off-by: Luiz Augusto von Dentz <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area: Bluetooth bug The issue is a bug, or the PR is fixing a bug priority: low Low impact/importance bug
Projects
None yet
Development

No branches or pull requests

4 participants