tag | 5a7b068b410f853b3f4f44e2ec327d08df118e50 | |
---|---|---|
tagger | The Android Open Source Project <initial-contribution@android.com> | Tue May 03 10:31:31 2016 -0700 |
object | 9c5bc291dba57a9582e7a7ab6f439ee5e142fe31 |
Android 6.0.1 release 25 (MTC19T)
commit | 9c5bc291dba57a9582e7a7ab6f439ee5e142fe31 | [log] [tgz] |
---|---|---|
author | Marie Janssen <jamuraa@google.com> | Wed Mar 09 15:31:48 2016 -0800 |
committer | The Android Automerger <android-build@google.com> | Fri Mar 25 19:59:39 2016 -0700 |
tree | 11d675df022acd539f3e8800f2b62c800f8380a1 | |
parent | 388db89341c81cf97cd2d39d60fc86539e460b71 [diff] |
DO NOT MERGE Check size of pin before replying If a malicious client set a pin that was too long it would overflow the pin code memory. Bug: 27411268 Change-Id: I9197ac6fdaa92a4799dacb6364e04671a39450cc