diff options
author | Tianjie <xunchang@google.com> | 2020-07-09 17:04:28 -0700 |
---|---|---|
committer | Tianjie <xunchang@google.com> | 2020-07-09 21:14:29 -0700 |
commit | ef49160c9bd2621dd3084fa061f09d176304ca49 (patch) | |
tree | 7fb2550fb2d285376364fe3b90f914509ed3b50a /scripts/update_payload/format_utils.py | |
parent | 38b5a7d135308ca9be64d1b18b374a1810d0a49f (diff) |
Validate payload data for each operation
For streaming update, we currently verify:
1. the hash of manifest before applying ops
2. the hash of the entire payload after we apply all ops
3. the final patched on filesystems after the update
So there is some potential to exploit the patching libraries, if
some attacker manage to provide us malicious patch data after the
manifest verification. Therefore, this cl enables the validation of
patch data for each install operation. The hash itself is embedded
in the payload manifest; and thus has been verified upfront.
Bug: 160800689
Test: unittests, apply an OTA
Change-Id: Idd4cbe167ce63f197d821752f75e45add0ea829c
Diffstat (limited to 'scripts/update_payload/format_utils.py')
0 files changed, 0 insertions, 0 deletions