diff options
| author | 2023-04-05 15:15:41 +0000 | |
|---|---|---|
| committer | 2023-05-04 16:07:04 +0100 | |
| commit | bb7e82ceaa6d16267e7b0e14563161b506d26be8 (patch) | |
| tree | 765e7d39faf93970f57b389d570e0d8313e7c7d0 /api/api.go | |
| parent | 5664378a7cac48184ec0702a41aaed0677d41136 (diff) | |
Ensure policy has no absurdly long strings
The following APIs now enforce limits and throw IllegalArgumentException
when limits are violated:
* DPM.setTrustAgentConfiguration() limits agent packgage name,
  component name, and strings within configuration bundle.
* DPM.setPermittedAccessibilityServices() limits package names.
* DPM.setPermittedInputMethods() limits package names.
* DPM.setAccountManagementDisabled() limits account name.
* DPM.setLockTaskPackages() limits package names.
* DPM.setAffiliationIds() limits id.
* DPM.transferOwnership() limits strings inside the bundle.
Package names are limited at 223, because they become directory names
and it is a filesystem restriction, see FrameworkParsingPackageUtils.
All other strings are limited at 65535, because longer ones break binary
XML serializer.
The following APIs silently truncate strings that are long beyond reason:
* DPM.setShortSupportMessage() truncates message at 200.
* DPM.setLongSupportMessage() truncates message at 20000.
* DPM.setOrganizationName() truncates org name at 200.
Bug: 260729089
Test: atest com.android.server.devicepolicy
Merged-In: Idcf54e408722f164d16bf2f24a00cd1f5b626d23
Change-Id: Idcf54e408722f164d16bf2f24a00cd1f5b626d23
Diffstat (limited to 'api/api.go')
0 files changed, 0 insertions, 0 deletions