summaryrefslogtreecommitdiff
path: root/tools/aapt2/java/JavaClassGenerator_test.cpp
diff options
context:
space:
mode:
authorlumark <lumark@google.com>2019-03-30 18:31:45 +0800
committerlumark <lumark@google.com>2019-04-30 16:43:09 +0800
commit9a72d2285c09bf2a3380d47304f3a35c831b7b2b (patch)
treeb2f92240a6335769962b51c091c4988b64850d64 /tools/aapt2/java/JavaClassGenerator_test.cpp
parentc17691b323f450d20e5eda3f82a53d3c9ae0532d (diff)
Don't allow showing IME on untrusted virtual displays
Sometimes users can have sensitive information in IME window, such as predictions or custom background. If app could create a virtual display with system decorations support, the security leak may happen that app can read the text or image from the surface. Add a check if the display is trusted that owned by system When showSoftInput requested, if the display is not trusted then show IME on default display. Note that we also modified ImeDisplayValidator to use dedicated API IWindowManager#shouldShowIme for checking if IME support on a display. (And add it as @TestApi for CTS to verify) Fix: 129443632 Fix: 129881992 Test: atest MultiDisplaySystemDecorationTests Change-Id: Icfd66689dad4b782c50b56a515194dd138d3b280
Diffstat (limited to 'tools/aapt2/java/JavaClassGenerator_test.cpp')
0 files changed, 0 insertions, 0 deletions