/external/apache-xml/src/main/java/org/apache/xml/serializer/ |
OutputPropertiesFactory.java | 401 // Repeat IOException handling for sandbox/applet case -sc 456 // No-op for sandbox/applet case, leave null -sc 469 // No-op for sandbox/applet case, leave null -sc
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_internal_defs.h | 91 // Notify the tools that the sandbox is going to be turned on. The reserved 93 // that the tools may call to bypass the sandbox.
|
sanitizer_procmaps.h | 53 // In some cases, e.g. when running under a sandbox on Linux, ASan is unable
|
/external/llvm/docs/HistoricalNotes/ |
2000-11-18-EarlyDesignIdeasResp.txt | 35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code, 48 for value add. The nice safe "sandbox" VM can be provided as a layer
|
/external/openssh/ |
ChangeLog | 12 regress errors for the sandbox to warnings. ok tim dtucker 34 an explicitly requested sandbox type 43 test with sandbox enabled; ok djm@ 89 [sandbox-systrace.c] 110 - (djm) [configure.ac Makefile.in sandbox-darwin.c] Add a sandbox for 124 This introduces a new "UsePrivilegeSeparation=sandbox" option for 130 The sandbox is implemented using systrace(4) in unsupervised "fast-path" 135 UsePrivilegeSeparation=sandbox will become the default in the future 144 [sshd.c ssh-sandbox.h sandbox.h sandbox-rlimit.c sandbox-systrace.c [all...] |
Makefile.in | 93 sandbox-null.o sandbox-rlimit.o sandbox-systrace.o sandbox-darwin.o
|
/external/chromium/chrome/browser/extensions/ |
sandboxed_extension_unpacker.h | 177 // put here because we cannot run windows crypto code in the sandbox. But we
|
sandboxed_extension_unpacker.cc | 126 // sandbox path, and the sandbox will deny the operation.
|
/external/chromium/chrome/browser/ |
utility_process_host.cc | 158 // TODO(port): Sandbox this on Linux. Also, zygote this to work with
|
memory_details_linux.cc | 185 // Handle the zygote separately. With the SUID sandbox and a separate
|
utility_process_host.h | 28 // If you need a single method call in the sandbox, use StartFooBar(p).
|
/external/chromium/crypto/ |
nss_util.h | 73 // sandbox is active.
|
/external/webkit/Source/WebCore/html/ |
HTMLIFrameElement.cpp | 89 // Turn off the corresponding sandbox flag if it's set as "allowed".
|
/external/webkit/Source/WebCore/platform/ |
UUID.cpp | 85 // This does not work for the linux system that turns on sandbox.
|
/external/webkit/Source/WebCore/platform/graphics/cocoa/ |
FontPlatformDataCocoa.mm | 58 // FIXME: Chromium: The following code isn't correct for the Chromium port since the sandbox might
|
/external/webkit/Source/WebKit2/Shared/mac/ |
SandboxExtensionMac.mm | 69 // Encoding will destroy the sandbox extension locally.
|
/external/webkit/Tools/iExploder/iexploder-1.7.2/src/html-attrs/ |
mozilla | 535 sandbox
|
/frameworks/base/docs/html/training/articles/ |
security-tips.jd | 38 <li>The Android Application Sandbox, which isolates your app data and code execution 179 capabilities not provided by the basic sandbox, including access to device features such as [all...] |
/external/webkit/Source/WebCore/loader/ |
FrameLoader.h | 253 // The following sandbox flags will be forced, regardless of changes to 254 // the sandbox attribute of any parent frames.
|
/external/chromium/chrome/browser/nacl_host/ |
nacl_process_host.cc | 275 // round trip out of the sandbox, we create an FD here.
|
/external/chromium/chrome/common/ |
utility_messages.h | 112 // sandbox.
|
/external/webkit/Source/WebCore/platform/graphics/ |
FontPlatformData.h | 304 // font as |nsFont|. This because the sandbox may block loading of the original font.
|
/external/webkit/Source/WebKit2/WebProcess/ |
com.apple.WebProcess.sb | 150 ;; sandbox violation spam, but some narrower rule should be
|
/frameworks/base/docs/html/guide/faq/ |
security.jd | 74 run in an Application Sandbox that limits access to sensitive information or data
|
/ndk/sources/host-tools/make-3.81/tests/ |
README | 89 fourth serious problem is that it doesn't create its own sandbox when
|