/aosp_15_r20/external/sandboxed-api/oss-internship-2020/curl/ |
H A D | README.md | 3 This library is a sandboxed version of curl's C API, 4 [libcurl](https://curl.haxx.se/libcurl/c/), implemented using Sandboxed API. 14 The full list of Sandboxed API dependencies can be found on 15 [Sandboxed API Getting Started page](https://developers.google.com/code-sandboxing/sandboxed-api/ge… 22 cmake .. -G Ninja -D SAPI_ROOT=<path to sandboxed-api> 29 have different signatures defined in the sandboxed header `custom_curl.h`, which 32 This is necessary because Sandboxed API sandboxes most of libcurl correctly, but 35 can also be sandboxed. 42 Variadic methods are currently not supported by Sandboxed API. To solve this, 58 Incomplete array arguments are currently not supported by Sandboxed API. To [all …]
|
/aosp_15_r20/external/sandboxed-api/ |
H A D | README.md | 5 …2f662d7bddfd1c07d25bf92d243538c8344bc6fbf38fe187f8.svg)](https://buildkite.com/bazel/sandboxed-api) 6 …ild status](https://github.com/google/sandboxed-api/workflows/CMake/badge.svg)](https://github.com… 8 ## What is Sandboxed API? 10 The Sandboxed API project (**SAPI**) makes sandboxing of C/C++ libraries less 13 custom RPC layer to the real library running inside a sandboxed environment. 16 contrast to the typical sandboxed project, where security policies must cover 22 [Sandboxed API](https://developers.google.com/code-sandboxing/sandboxed-api). 25 [Getting Started](https://developers.google.com/code-sandboxing/sandboxed-api/getting-started) 35 [mailing list](mailto:sandboxed[email protected]) or sign up with this 36 [link](https://groups.google.com/forum/#!forum/sandboxed-api-users).
|
/aosp_15_r20/external/sandboxed-api/oss-internship-2020/libuv/ |
H A D | README.md | 3 This library is a sandboxed version of [LibUV](https://libuv.org/), implemented 4 using Sandboxed API. 20 The full list of Sandboxed API dependencies can be found on 21 [Sandboxed API Getting Started page](https://developers.google.com/code-sandboxing/sandboxed-api/ge… 28 cmake .. -G Ninja -D SAPI_ROOT=[path to sandboxed-api] 34 LibUV can't be directly sandboxed by Sandboxed API. Because of the size and 37 a wrapper library, whose methods (which can be sandboxed properly) internally 66 The `examples` directory contains the sandboxed versions of example source codes 72 `SAPI_UV_ENABLE_EXAMPLES` must be set to `ON`. This enables Sandboxed API 80 `SAPI_UV_ENABLE_TESTS` must be set to `ON`. This enables Sandboxed API tests as
|
/aosp_15_r20/external/sandboxed-api/oss-internship-2020/guetzli/ |
H A D | README.md | 2 …(https://github.com/google/guetzli) library using [Sandboxed API](https://github.com/google/sandbo… 6 …sandboxed API that handles internal errors. The original Guetzli has a command-line utility to enc… 10 ## Build Guetzli Sandboxed 11 Right now Sandboxed API support only Linux systems, so you need one to build it. Guetzli sandboxed … 13 To build Guetzli sandboxed encoding utility you can use this command: 24 …two different sets of unit tests which demonstrate how to use different parts of Guetzli sandboxed: 25 * `tests/guetzli_sapi_test.cc` - example usage of Guetzli sandboxed API.
|
/aosp_15_r20/external/sandboxed-api/contrib/c-blosc/test/ |
H A D | test_blosc.cc | 17 #include "contrib/c-blosc/sandboxed.h" 84 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 92 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 101 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 111 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 124 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 133 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 147 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST_P() 182 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST_P() 213 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST_P() [all …]
|
/aosp_15_r20/external/sandboxed-api/contrib/zstd/test/ |
H A D | zstd_test.cc | 23 #include "contrib/zstd/sandboxed.h" 68 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 80 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 91 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 102 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 126 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 153 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 193 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 218 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() 244 ASSERT_THAT(sandbox.Init(), IsOk()) << "Couldn't initialize Sandboxed API"; in TEST() [all …]
|
/aosp_15_r20/external/sandboxed-api/sandboxed_api/examples/hello_sapi/ |
H A D | CMakeLists.txt | 15 # Example that demonstrates how to embed Sandboxed API into a project using 22 # Path to the Sandboxed API source tree. Unlike Bazel, CMake does not download 26 # a regular checkout of Sandboxed API. 28 CACHE PATH "Path to the Sandboxed API source tree") 30 # Configure options and include Sandboxed API as a sub-directory. 34 "${CMAKE_BINARY_DIR}/sandboxed-api-build" EXCLUDE_FROM_ALL) 44 # Library with code that should be sandboxed 52 # Sandboxed API for the library above 62 # Main executable demonstrating how the sandboxed library is used
|
H A D | WORKSPACE.bazel | 15 # Example workspace demonstrating how to embed Sandboxed API into a project 23 # Include the Sandboxed API dependency if it does not already exist in this 25 # dependencies that might use Sandboxed API. 30 # is advisable to pin Sandboxed API to a specific revision instead. 33 remote = "https://github.com/google/sandboxed-api.git", 36 # From here on, Sandboxed API files are available. The statements below setup
|
/aosp_15_r20/external/sandboxed-api/oss-internship-2020/curl/examples/ |
H A D | README.md | 3 Each example in this folder is the sandboxed version of a code snippet from 7 and sandboxed code compare to each other. 11 - **example1**: sandboxed version of 15 - **example2**: sandboxed version of 19 - **example3**: sandboxed version of 24 - **example4**: sandboxed version of 29 - **example5**: sandboxed version of 35 - **example6**: sandboxed version of
|
/aosp_15_r20/external/sandboxed-api/contrib/jsonnet/ |
H A D | README.md | 1 # Jsonnet Sandboxed API 3 This library was sandboxed as part of Google's summer 2020 internship program 11 If your project does not include Sandboxed API as a dependency yet, add the 17 FetchContent_Declare(sandboxed-api 18 GIT_REPOSITORY https://github.com/google/sandboxed-api 21 FetchContent_MakeAvailable(sandboxed-api) # CMake 3.14 or higher 27 for the sandboxed jsonnet targets. 49 ### Build as part of Sandboxed API
|
/aosp_15_r20/external/sandboxed-api/contrib/pffft/ |
H A D | README.md | 3 This library was sandboxed as part of Google's summer 2020 internship program 11 If your project does not include Sandboxed API as a dependency yet, add the 17 FetchContent_Declare(sandboxed-api 18 GIT_REPOSITORY https://github.com/google/sandboxed-api 21 FetchContent_MakeAvailable(sandboxed-api) # CMake 3.14 or higher 27 for the sandboxed jsonnet targets. 46 currently implemented sandboxed version). 77 #### Sandboxed main observations resume:
|
/aosp_15_r20/external/sandboxed-api/oss-internship-2020/gdal/raster_to_gtiff/ |
H A D | README.md | 2 This repository is an example of how Sandboxed API can be used with GDAL C Raster API to implement … 16 …Sandboxed API and GDAL, a raster data parser using unsandboxed GDAL to generate sample input for t… 53 …static libraries as the CMake arguments to build the project. Also, the Sandboxed API generator ne… 55 ### Build sandboxed GDAL 63 Also, you need to have `gdal.h` header so Sandboxed API generator could parse it, the default expec… 95 Note that it will also run Sandboxed API related tests. To run tests manually you will need to spec…
|
/aosp_15_r20/external/sandboxed-api/sandboxed_api/bazel/ |
H A D | sapi.bzl | 15 """Starlark rules for projects using Sandboxed API.""" 259 """Provides the implementation of a Sandboxed API library. 262 name: Name of the sandboxed library 271 api_version: Which version of the Sandboxed API to generate. Currently, 273 srcs: Any additional sources to include with the sandboxed library 275 to the sandboxed library. 276 hdrs: Like srcs, any additional headers to include with the sandboxed 292 compiler front-end for parsing. Both emit equivalent Sandboxed APIs. 328 # Library that contains generated interface and sandboxed binary as a data 357 "-Wl,-E", # symbols used in the sandboxed library, so these
|
/aosp_15_r20/external/python/jinja/src/jinja2/ |
D | sandbox.py | 179 """The sandboxed environment. It works like the regular environment but 180 tells the compiler to generate sandboxed code. Additionally subclasses of 189 sandboxed = True variable in SandboxedEnvironment 192 #: available on each instance of a sandboxed environment as 205 #: available on each instance of a sandboxed environment as 264 """The sandboxed environment will call this method to check if the 301 """Subscribe an object from sandboxed code.""" 322 """Subscribe an object from sandboxed code and prefer the 371 """Call an object from sandboxed code."""
|
/aosp_15_r20/frameworks/base/core/java/android/service/voice/ |
H A D | HotwordDetector.java | 34 * Basic functionality for sandboxed detectors. This interface will be used by detectors that 71 * Starts sandboxed detection recognition. 96 * Stops sandboxed detection recognition. 121 * Set configuration and pass read-only data to sandboxed detection service. 123 * @param options Application configuration data to provide to sandboxed detection services. 126 * @param sharedMemory The unrestricted data blob to provide to sandboxed detection services. 129 * sandboxed detection service when it was created. 140 * sandboxed detection service, the service will be shutdown.
|
H A D | SandboxedDetectionInitializer.java | 31 * Provides common initialzation methods for sandboxed detection services. 98 * Called when sandboxed detectors that extend {@link HotwordDetector} are created or 100 * update of the sandboxed detection parameters. 102 * @param options Application configuration data to provide to sandboxed detection services. 105 * @param sharedMemory The unrestricted data blob to provide to sandboxed detection services. 111 * This is non-null only when sandboxed detection services are being initialized; and it
|
/aosp_15_r20/external/bazelbuild-rules_android/rules/android_sandboxed_sdk/ |
H A D | providers.bzl | 15 """Providers for Android Sandboxed SDK rules.""" 18 doc = "Provides information about a sandboxed Android SDK.", 22 "other sandboxed SDK rules.", 32 doc = "Provides information about an Android Sandboxed SDK archive.", 34 asar = "Android Sandboxed SDK archive file, as generated by Bundletool.", 42 doc = "Provides information about a sandboxed Android SDK Bundle (ASB).",
|
/aosp_15_r20/out/soong/raw-aosp_shiba/c3/ |
D | c38a2b4317706c85783739ca4cc11fce50d6659e | 3 …from: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_filewrapper/linux_glibc_x86_6… 13 from: "external/sandboxed-api/android/placeholder_exe" 14 to: "external/sandboxed-api/android/placeholder_exe" 17 …r_bin_embed.h __SBOX_SANDBOX_DIR__/out/forkserver_bin_embed.cc external/sandboxed-api/android/plac… 20 …to: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_embed_forkserver_h/linux_glibc_… 24 …to: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_embed_forkserver_h/linux_glibc_…
|
/aosp_15_r20/out/soong/raw-aosp_shiba/1e/ |
D | 1e53b4a7366d52848aea98a941b30710cc536d5a | 3 …from: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_filewrapper/linux_glibc_x86_6… 13 …from: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_forkserver/linux_glibc_x86_64… 14 …to: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_forkserver/linux_glibc_x86_64/s… 17 …ver_bin_embed.cc __SBOX_SANDBOX_DIR__/out/soong/.intermediates/external/sandboxed-api/sandboxed_ap… 20 …to: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_embed_forkserver_h/linux_glibc_… 24 …to: "out/soong/.intermediates/external/sandboxed-api/sandboxed_api_embed_forkserver_h/linux_glibc_…
|
/aosp_15_r20/external/libchrome/third_party/jinja2/ |
H A D | sandbox.py | 236 """The sandboxed environment. It works like the regular environment but 237 tells the compiler to generate sandboxed code. Additionally subclasses of 245 sandboxed = True variable in SandboxedEnvironment 248 #: available on each instance of a sandboxed environment as 261 #: available on each instance of a sandboxed environment as 324 """The sandboxed environment will call this method to check if the 360 """Subscribe an object from sandboxed code.""" 381 """Subscribe an object from sandboxed code and prefer the 418 """Call an object from sandboxed code."""
|
/aosp_15_r20/external/sandboxed-api/contrib/lodepng/ |
H A D | README.md | 1 # LodePNG Sandboxed API 3 This library was sandboxed as part of Google's summer 2020 internship program 11 With Sandboxed API, many of the library's functions can be sandboxed. However, they need the `exter… 13 Even if many of the functions from the library can be sandboxed, there are some that are not suppor… 38 - `main_sandboxed.cc` - sandboxed version of the example
|
/aosp_15_r20/external/sandboxed-api/sandboxed_api/tools/clang_generator/ |
H A D | generator_tool.cc | 39 new llvm::cl::OptionCategory("Sandboxed API Options"); 45 "<https://developers.google.com/code-sandboxing/sandboxed-api/>\n" 46 "Report bugs to <https://github.com/google/sandboxed-api/issues>\n"); 57 llvm::cl::desc("List of functions to generate a Sandboxed API for. If " 75 "sapi_name", llvm::cl::desc("Name of the Sandboxed API library"), 78 "sapi_ns", llvm::cl::desc("C++ namespace to wrap Sandboxed API class in"), 115 "Generates a Sandboxed API header for C/C++ translation units."); in GeneratorMain()
|
/aosp_15_r20/cts/tests/framework/base/windowmanager/src/android/server/wm/display/ |
H A D | CompatChangeTests.java | 917 * Test that a min aspect ratio activity eligible for size compat mode results in sandboxed 936 * APIs sandboxed when the {@link ActivityInfo#NEVER_SANDBOX_DISPLAY_APIS} compat change is 949 * Display APIs sandboxed when the 'never_constrain_display_apis_all_packages' Device Config 964 * APIs sandboxed when the 'never_constrain_display_apis' Device Config flag contains the test 980 * APIs sandboxed when the 'never_constrain_display_apis' Device Config flag contains the test 998 * APIs sandboxed when the 'never_constrain_display_apis' Device Config flag contains the test 1016 * APIs sandboxed when the 'never_constrain_display_apis' Device Config flag doesn't contain the 1031 * APIs sandboxed when the 'never_constrain_display_apis' Device Config flag is empty. 1044 * APIs sandboxed when the 'never_constrain_display_apis' Device Config flag contains an invalid 1143 // to be sandboxed, unless it is also eligible for size compat mode. [all …]
|
/aosp_15_r20/external/sandboxed-api/oss-internship-2020/openjpeg/ |
H A D | README.md | 1 # OpenJPEG Sandboxed API 3 This library provides sandboxed version of the [OpenJPEG](https://github.com/uclouvain/openjpeg) li… 7 The examples are sandboxed and simplified version of the main tools provided by the OpenJPEG librar… 9 In `decompress_example.cc` the library's sandboxed API is used to convert the _.jp2_ to _.pnm_ imag… 19 Then in the `sandboxed-api/oss-internship-2020/openjpeg` run
|
/aosp_15_r20/frameworks/base/services/tests/wmtests/src/com/android/server/wm/ |
H A D | SizeCompatTests.java | 465 // Activity max bounds should be sandboxed; activity is letterboxed due to aspect ratio. in testFixedAspectRatioBoundsWithDecorInSquareDisplay() 478 // Activity max bounds are sandboxed. in testFixedAspectRatioBoundsWithDecorInSquareDisplay() 483 // Activity max bounds should be sandboxed; activity is letterboxed due to aspect ratio. in testFixedAspectRatioBoundsWithDecorInSquareDisplay() 511 // Activity is sandboxed; it is in size compat mode since it is not resizable and has a in testFixedScreenConfigurationWhenMovingToDisplay() 523 // Activity inherits bounds from TaskDisplayArea, since not sandboxed. in testFixedScreenBoundsWhenDisplaySizeChanged() 544 // Activity is sandboxed to the offset size compat bounds. in testFixedScreenBoundsWhenDisplaySizeChanged() 554 // Activity is sandboxed to the offset size compat bounds. in testFixedScreenBoundsWhenDisplaySizeChanged() 575 // Activity is sandboxed due to size compat mode. in testFixedScreenBoundsWhenDisplaySizeChanged() 621 // Activity max bounds should be sandboxed since it is letterboxed. in testLetterboxFullscreenBoundsAndNotImeAttachable() 634 // Activity max bounds should be sandboxed since it is letterboxed. in testLetterboxFullscreenBoundsAndNotImeAttachable() [all …]
|