HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 1 - 25 of 121) sorted by null

1 2 3 4 5

  /external/chromium/third_party/libjingle/source/
README.chrome-sandbox 1 The chrome-sandbox branch contains some experemental changes that are needed
2 to make libjingle work in sandbox in Chrome.
  /external/chromium/chrome/common/
sandbox_policy.cc 25 #include "sandbox/src/sandbox.h"
27 static sandbox::BrokerServices* g_broker_services = NULL;
125 sandbox::TargetPolicy::Semantics access,
126 sandbox::TargetPolicy* policy) {
136 sandbox::ResultCode result;
137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
139 if (result != sandbox::SBOX_ALL_OK)
147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
149 if (result != sandbox::SBOX_ALL_OK
563 namespace sandbox { namespace
    [all...]
sandbox_policy.h 14 namespace sandbox { namespace
18 void InitBrokerServices(sandbox::BrokerServices* broker_services);
25 } // namespace sandbox
DEPS 11 "+sandbox/src",
  /external/openssh/regress/
connect-privsep.sh 17 echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy
22 # XXX replace this with fail once sandbox has stabilised
23 warn "ssh privsep/sandbox+proxyconnect protocol $p failed"
  /external/chromium/chrome/browser/resources/gpu_internals/
timeline_test.html 30 <div id="sandbox"></div>
33 var sandbox = document.getElementById('sandbox');
41 sandbox.appendChild(timeline);
overlay_test.html 23 <div id="sandbox"></div>
26 var sandbox = document.getElementById('sandbox');
  /external/skia/legacy/src/ports/
SkFontHost_sandbox_none.cpp 13 //No sandbox, nothing to do.
  /external/skia/src/ports/
SkFontHost_sandbox_none.cpp 13 //No sandbox, nothing to do.
  /external/chromium/chrome/browser/
utility.sb 6 ; This is the Sandbox configuration file used for safeguarding the utility
11 ; directory. This is different from other sandbox configuration files where
DEPS 15 "+sandbox/linux",
16 "+sandbox/src", # The path doesn't say it, but this is the Windows sandbox.
nacl_loader.sb 6 ; This is the Sandbox configuration file used for safeguarding the user's
  /external/openssh/
sandbox-darwin.c 23 #include <sandbox.h>
33 #include "sandbox.h"
36 /* Darwin/OS X sandbox */
51 debug3("%s: preparing Darwin sandbox", __func__);
64 debug3("%s: starting Darwin sandbox", __func__);
sandbox-rlimit.c 1 /* $OpenBSD: sandbox-rlimit.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */
35 #include "ssh-sandbox.h"
38 /* Minimal sandbox that sets zero nfiles, nprocs and filesize rlimits */
53 debug3("%s: preparing rlimit sandbox", __func__);
sandbox-null.c 32 #include "ssh-sandbox.h"
35 /* dummy sandbox */
Android.mk 122 sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.o
  /external/chromium-trace/trace-viewer/src/
overlay_test.html 20 var sandbox = document.getElementById('sandbox');
  /external/chromium/webkit/glue/
idb_bindings.h 18 // sandbox.
  /external/chromium/base/debug/
debugger.h 28 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled.
32 // BEFORE the sandbox is enabled.
  /external/webkit/Source/WebCore/platform/graphics/chromium/
CrossProcessFontLoading.mm 26 // font loading being blocked by the sandbox, we need a mechnasim to both
43 // On 10.5, font loading is not blocked by the sandbox and thus there is no
168 // parameter. If loading is blocked by the sandbox, the font may be loaded
170 // If sandbox loading also fails, a fallback font is loaded.
193 // Font loading was blocked by the Sandbox.
  /external/compiler-rt/include/sanitizer/
common_interface_defs.h 34 // Notify the tools that the sandbox is going to be turned on. The reserved
36 // that the tools may call to bypass the sandbox.
  /external/webkit/Source/WebKit/chromium/public/mac/
WebSandboxSupport.h 44 // Put methods here that are required due to sandbox restrictions.
47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
  /external/webkit/Source/WebKit/chromium/public/win/
WebSandboxSupport.h 38 // Put methods here that are required due to sandbox restrictions.
42 // and due to sandbox restrictions, the current process may be unable
  /external/chromium/base/
rand_util_posix.cc 20 // it if we are later put in a sandbox. This class wraps the file descriptor so
  /external/chromium/build/
all.gyp 81 '../sandbox/sandbox.gyp:*',
112 '../sandbox/sandbox.gyp:*',
183 '../sandbox/sandbox.gyp:sbox_integration_tests',
184 '../sandbox/sandbox.gyp:sbox_unittests',
185 '../sandbox/sandbox.gyp:sbox_validation_tests'
    [all...]

Completed in 494 milliseconds

1 2 3 4 5