- 11 Jul, 2016 3 commits
-
-
Daniel Xie authored
Merge "DO NOT MERGE: This test verifies Security Vulnerability: SMS Resend Vulnerability in Android." into kitkat-cts-dev
-
Daniel Xie authored
Merge "DO NOT MERGE: This test is to test the Remote Code Execution Vulnerabilities in libstagefright" into lollipop-cts-dev
- 21 Jun, 2016 2 commits
-
-
Daniel Xie authored
-
Selim Gurun authored
This is a performance test with a hardcoded timeout (1 hour). Webview team does not have a use case for this test or resulting report. Bug: 28655634, 28748719 Change-Id: I005a568287a921838ea53894cccbcf319fce1840
-
- 20 Jun, 2016 13 commits
-
-
Daniel Xie authored
-
Daniel Xie authored
Change-Id: I2d9b6d1aea5d7e11f2e51e696ac036f3f6236002
-
Android Merger authored
Merge "Merge \"DO NOT MERGE Add CTS for bug-15428797\" into kitkat-cts-dev am: 75c6dee1 -s ours" into lollipop-cts-dev
-
Android Merger authored
Merge "Merge \"DO NOT MERGE: CTS test case for verifying overflow in libskia JPG processing\" into kitkat-cts-dev am: e50ec09f -s ours" into lollipop-cts-dev
-
Utsav Singh authored
Merge \"DO NOT MERGE: CTS test case for verifying overflow in libskia JPG processing\" into kitkat-cts-dev am: e50ec09f -s ours Change-Id: Ic07ca954efb84df37143343605b3e0001e1a3997
-
Daniel Xie authored
-
Upendra authored
Add CTS for bug-15428797 This test verifies that vulnerability of MediaFocusControl building PendingIntent using its own uid is fixed Bug : 15428797 Change-Id: I4bea03d6daea587aad71f89aab5189cb7b7c428f Signed-off-by:
Upendra <pupendra@google.com>
-
Daniel Xie authored
Merge "DO NOT MERGE: CTS test case for verifying overflow in libskia JPG processing" into kitkat-cts-dev
-
Daniel Xie authored
Merge "DO NOT MERGE: CTS test case for verifying overflow in libskia JPG processing" into lollipop-cts-dev
-
Daniel Xie authored
-
Daniel Xie authored
Merge "DO NOT MERGE: Revert "Verifier: Enable and disable non-market apps" [DO NOT MERGE]" into lollipop-cts-dev
-
- 13 Jun, 2016 1 commit
-
-
Utsav Singh authored
libstagefright Bug: 20718524, 23036083, 23248776, 23213430, 22954006, 21814993 Change-Id: I8c134f137e8c8606cba2d77110c1b4d784e6fc50 Signed-off-by:
Utsav Singh <utsavs@google.com>
-
- 07 Jun, 2016 2 commits
-
-
Utsav Singh authored
This test case opens a corrupt image file in an activity's ImageVIew which causes Process crash on an unpatched device, thus failing the test Bug: 18894965 Change-Id: Ib2550628550b115ec93698ef7df28c58ae8e378f Signed-off-by:
Utsav Singh <utsavs@google.com>
-
Utsav Singh authored
This test case opens a corrupt image file in an activity's ImageVIew which causes Process crash on an unpatched device, thus failing the test Bug: 18894965 Change-Id: Ib2550628550b115ec93698ef7df28c58ae8e378f Signed-off-by:
Utsav Singh <utsavs@google.com>
-
- 06 Jun, 2016 1 commit
-
-
Utsav Singh authored
Verifies for Heap overflow in libpng(9patch) which is exposed via BitmapFactory.decodeStream in Java. The test case uses a a crafted PNG image with incorrect npTc chunk to trigger the vulnerability. Bug: 19151999 Change-Id: I4c0b95236619acd417000c24726d8f77a4d7e078 Signed-off-by:
Utsav Singh <utsavs@google.com>
-
- 25 May, 2016 2 commits
-
-
Daniel Xie authored
-
Daniel Xie authored
Change-Id: I2c4b3462fd5eb679007db75a5e4b571bad6aeb6a
-
- 23 May, 2016 3 commits
-
-
Daniel Xie authored
-
Daniel Xie authored
Merge "DO NOT MERGE: This test case tries to decode a corrupt image file using BitmapFactory.decodeStream which causes Process crash on an unpatched device, thus failing the test." into lollipop-cts-dev
-
Utsav Singh authored
BitmapFactory.decodeStream which causes Process crash on an unpatched device, thus failing the test. Bug: 19270126 Change-Id: If750791b1e200ab7ac0172d9b036ba3b2a104212 Signed-off-by:
Utsav Singh <utsavs@google.com>
-
- 19 May, 2016 1 commit
-
-
Henrik Engström authored
The test case testCheckForDuplicateOutput attempts to first create a map of sequences of random numbers from the SecureRandomService together with their pid during that run. Generally, these pids span about 4000 pids, with a gap of about 20-30 between each pid in the map. It then tries to waste enough pids to make the pid numbering loop around in an attempt to make a new instance of the SecureRandomService with a pid already seen. However, since the map is so sparse, the chance of actually hitting a pid that has been seen previously is small, even in the correct span. Therefore, many pids need to be tested. Wasting enough pids to make it overflow takes a long time, so to make the test run time effective (and not trigger the ten minute timeout) a large number of pids need to be tested before running wastePids again. The current wastePids method tries to prevent running if it tries to run when the current pid is less than 2048 from the first pid. However, since the wastePids method doesn't do anything to account for any pids already taken, it generally misses by at least 1400 pids, often more, especially if there are more background processes with extra threads taking up pids. This means that the majority of the map (the ones who have pids more than 2048 than the first pid) are not checked, and of these, a majority (1400+ on nexus phones) are not checked since they are skipped over by the wastePids function. With any kind of extra processes running, this small gap can easily shrink, even to 0, meaning only a single pid gets tested between wasting pids to overflow. This means that the test is extremely time ineffective and highly likely to time out, resulting in false failures. Making sure that wastePids is not run before all pids from where wastePids ends up to the last pid in the map vastly increases the hitrate, making the test run a lot faster, and makes it more likely to pass even on phones with more background threads are present. If needed, improvements to the wastePids function to attempt to not over-waste as much would also help this, but that would be more complex, so may not be worth it unless more problems become apparent. Change-Id: I3221c1c7bbb991b8c5d580a1c146927aaebd811f
-
- 12 May, 2016 4 commits
-
-
Android Merger authored
Merge "Merge "BannedFilesTest: Detect "rootmydevice" vulnerability" into kitkat-cts-dev am: dd8ee3dc" into lollipop-cts-dev
-
Nick Kralevich authored
am: dd8ee3dc * commit 'dd8ee3dc': BannedFilesTest: Detect "rootmydevice" vulnerability Change-Id: I047e807c55baba3cde4c8b91482c8da604d9c4ce
-
Daniel Xie authored
-
Upendra authored
Vulnerability in Android. Bug: 17671795 Change-Id: I5adfafb9a0d66b0a27bcdb293ab5578900d141ff Signed-off-by:
Upendra <pupendra@google.com>
-
- 11 May, 2016 1 commit
-
-
Nick Kralevich authored
See http://www.theregister.co.uk/2016/05/09/allwinners_allloser_custom_kernel_has_a_nasty_root_backdoor/ for details. Change-Id: Id9ba2fadb4b07b3171d24e8970b7bf4426c5cfb1
-
- 05 May, 2016 4 commits
-
-
Android Merger authored
Merge "Merge "DO NOT MERGE: Fix AudioPolicyBinderTest test_isStreamActive" into kitkat-cts-dev am: a914c7ff -s ours" into lollipop-cts-dev
-
Daniel Xie authored
-
Andy Hung authored
bool return value check. Bug: 18001784 Bug: 18002005 Change-Id: I44bf140372ec49ba260f929d54f41f71ac715ee4
-
- 29 Apr, 2016 1 commit
-
-
Daniel Xie authored
-
- 28 Apr, 2016 2 commits
-
-
Jeff Vander Stoep authored
Change-Id: Icb6873e1f0a01383c59a95f30ab1aa136d1750aa
-
Daniel Xie authored
-