/external/chromium/third_party/libjingle/source/ |
README.chrome-sandbox | 1 The chrome-sandbox branch contains some experemental changes that are needed 2 to make libjingle work in sandbox in Chrome.
|
/external/chromium/chrome/common/ |
sandbox_policy.cc | 25 #include "sandbox/src/sandbox.h" 27 static sandbox::BrokerServices* g_broker_services = NULL; 125 sandbox::TargetPolicy::Semantics access, 126 sandbox::TargetPolicy* policy) { 136 sandbox::ResultCode result; 137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 139 if (result != sandbox::SBOX_ALL_OK) 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 149 if (result != sandbox::SBOX_ALL_OK 563 namespace sandbox { namespace [all...] |
sandbox_policy.h | 14 namespace sandbox { namespace 18 void InitBrokerServices(sandbox::BrokerServices* broker_services); 25 } // namespace sandbox
|
DEPS | 11 "+sandbox/src",
|
/external/openssh/regress/ |
connect-privsep.sh | 17 echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy 22 # XXX replace this with fail once sandbox has stabilised 23 warn "ssh privsep/sandbox+proxyconnect protocol $p failed"
|
/external/chromium/chrome/browser/resources/gpu_internals/ |
timeline_test.html | 30 <div id="sandbox"></div> 33 var sandbox = document.getElementById('sandbox'); 41 sandbox.appendChild(timeline);
|
overlay_test.html | 23 <div id="sandbox"></div> 26 var sandbox = document.getElementById('sandbox');
|
/external/skia/legacy/src/ports/ |
SkFontHost_sandbox_none.cpp | 13 //No sandbox, nothing to do.
|
/external/skia/src/ports/ |
SkFontHost_sandbox_none.cpp | 13 //No sandbox, nothing to do.
|
/external/chromium/chrome/browser/ |
utility.sb | 6 ; This is the Sandbox configuration file used for safeguarding the utility 11 ; directory. This is different from other sandbox configuration files where
|
DEPS | 15 "+sandbox/linux", 16 "+sandbox/src", # The path doesn't say it, but this is the Windows sandbox.
|
nacl_loader.sb | 6 ; This is the Sandbox configuration file used for safeguarding the user's
|
/external/openssh/ |
sandbox-darwin.c | 23 #include <sandbox.h> 33 #include "sandbox.h" 36 /* Darwin/OS X sandbox */ 51 debug3("%s: preparing Darwin sandbox", __func__); 64 debug3("%s: starting Darwin sandbox", __func__);
|
sandbox-rlimit.c | 1 /* $OpenBSD: sandbox-rlimit.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */ 35 #include "ssh-sandbox.h" 38 /* Minimal sandbox that sets zero nfiles, nprocs and filesize rlimits */ 53 debug3("%s: preparing rlimit sandbox", __func__);
|
sandbox-null.c | 32 #include "ssh-sandbox.h" 35 /* dummy sandbox */
|
Android.mk | 122 sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.o
|
/external/chromium-trace/trace-viewer/src/ |
overlay_test.html | 20 var sandbox = document.getElementById('sandbox');
|
/external/chromium/webkit/glue/ |
idb_bindings.h | 18 // sandbox.
|
/external/chromium/base/debug/ |
debugger.h | 28 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled. 32 // BEFORE the sandbox is enabled.
|
/external/webkit/Source/WebCore/platform/graphics/chromium/ |
CrossProcessFontLoading.mm | 26 // font loading being blocked by the sandbox, we need a mechnasim to both 43 // On 10.5, font loading is not blocked by the sandbox and thus there is no 168 // parameter. If loading is blocked by the sandbox, the font may be loaded 170 // If sandbox loading also fails, a fallback font is loaded. 193 // Font loading was blocked by the Sandbox.
|
/external/compiler-rt/include/sanitizer/ |
common_interface_defs.h | 34 // Notify the tools that the sandbox is going to be turned on. The reserved 36 // that the tools may call to bypass the sandbox.
|
/external/webkit/Source/WebKit/chromium/public/mac/ |
WebSandboxSupport.h | 44 // Put methods here that are required due to sandbox restrictions. 47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
|
/external/webkit/Source/WebKit/chromium/public/win/ |
WebSandboxSupport.h | 38 // Put methods here that are required due to sandbox restrictions. 42 // and due to sandbox restrictions, the current process may be unable
|
/external/chromium/base/ |
rand_util_posix.cc | 20 // it if we are later put in a sandbox. This class wraps the file descriptor so
|
/external/chromium/build/ |
all.gyp | 81 '../sandbox/sandbox.gyp:*', 112 '../sandbox/sandbox.gyp:*', 183 '../sandbox/sandbox.gyp:sbox_integration_tests', 184 '../sandbox/sandbox.gyp:sbox_unittests', 185 '../sandbox/sandbox.gyp:sbox_validation_tests' [all...] |