summaryrefslogtreecommitdiff
path: root/scripts/update_payload/format_utils.py
diff options
context:
space:
mode:
authorTianjie <xunchang@google.com>2020-07-09 17:04:28 -0700
committerTianjie <xunchang@google.com>2020-07-09 21:14:29 -0700
commitef49160c9bd2621dd3084fa061f09d176304ca49 (patch)
tree7fb2550fb2d285376364fe3b90f914509ed3b50a /scripts/update_payload/format_utils.py
parent38b5a7d135308ca9be64d1b18b374a1810d0a49f (diff)
Validate payload data for each operation
For streaming update, we currently verify: 1. the hash of manifest before applying ops 2. the hash of the entire payload after we apply all ops 3. the final patched on filesystems after the update So there is some potential to exploit the patching libraries, if some attacker manage to provide us malicious patch data after the manifest verification. Therefore, this cl enables the validation of patch data for each install operation. The hash itself is embedded in the payload manifest; and thus has been verified upfront. Bug: 160800689 Test: unittests, apply an OTA Change-Id: Idd4cbe167ce63f197d821752f75e45add0ea829c
Diffstat (limited to 'scripts/update_payload/format_utils.py')
0 files changed, 0 insertions, 0 deletions