HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 376 - 400 of 795) sorted by null

<<11121314151617181920>>

  /external/chromium_org/ppapi/shared_impl/
time_conversion.h 27 // process only on Windows (the sandbox prevents this from working properly on
  /external/chromium_org/remoting/client/plugin/
pepper_port_allocator.h 23 // code doesn't work in sandbox.
  /external/chromium_org/remoting/webapp/
wcs_sandbox_content.js 8 * The sandbox side of the application/sandbox WCS interface, used by the
9 * sandbox to exchange messages with the application.
210 * Entry point for the WCS sandbox process.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
basicblock.h 10 #include "sandbox/linux/seccomp-bpf/instruction.h"
trap.h 14 #include "sandbox/linux/seccomp-bpf/port.h"
27 // time. For the purposes of our sandbox, this assertion should always be
28 // true. Threads are incompatible with the seccomp sandbox anyway.
56 // Once unsafe traps are enabled, the sandbox is essentially compromised.
trap.cc 16 #include "sandbox/linux/seccomp-bpf/codegen.h"
17 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
19 #include "sandbox/linux/seccomp-bpf/trap.h"
23 #include "sandbox/linux/services/android_ucontext.h"
92 // to avoid race conditions. Normally, this is a non-issue as the sandbox
169 // evaluator registered with the sandbox.
261 // threaded while the sandbox is being set up). But we nonetheless are
323 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes");
326 SANDBOX_INFO("Cannot disable sandbox and use unsafe traps unless
    [all...]
  /external/chromium_org/sandbox/linux/suid/common/
suid_unsafe_environment_variables.h 9 // We need to save these environment variables before running a SUID sandbox
  /external/chromium_org/sandbox/win/src/
Wow64.cc 5 #include "sandbox/win/src/wow64.h"
13 #include "sandbox/win/src/target_process.h"
74 namespace sandbox { namespace
219 } // namespace sandbox
handle_table.cc 5 #include "sandbox/win/src/handle_table.h"
12 #include "sandbox/win/src/win_utils.h"
23 namespace sandbox { namespace
183 } // namespace sandbox
policy_engine_processor.h 9 #include "sandbox/win/src/policy_engine_params.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
12 namespace sandbox { namespace
143 } // namespace sandbox
service_resolver_64.cc 5 #include "sandbox/win/src/service_resolver.h"
9 #include "sandbox/win/src/win_utils.h"
83 namespace sandbox { namespace
193 } // namespace sandbox
file_policy_test.cc 12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/src/win_utils.h"
17 #include "sandbox/win/tests/common/controller.h"
18 #include "sandbox/win/tests/common/test_utils.h"
25 namespace sandbox { namespace
599 } // namespace sandbox
    [all...]
restricted_token.h 12 #include "sandbox/win/src/restricted_token_utils.h"
13 #include "sandbox/win/src/security_level.h"
14 #include "sandbox/win/src/sid.h"
24 namespace sandbox { namespace
196 } // namespace sandbox
  /external/chromium_org/sandbox/win/tools/finder/
finder_kernel.cc 5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
8 #include "sandbox/win/tools/finder/ntundoc.h"
  /external/chromium_org/third_party/WebKit/PerformanceTests/DOM/
TraverseChildNodes.html 15 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
  /external/chromium_org/third_party/WebKit/PerformanceTests/Parser/
html-parser-threaded.html 13 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.cpp 89 // http://www.w3.org/TR/html5/the-iframe-element.html#attr-iframe-sandbox
105 // Turn off the corresponding sandbox flag if it's set as "allowed".
135 tokenErrors.appendLiteral(" are invalid sandbox flags.");
137 tokenErrors.appendLiteral(" is an invalid sandbox flag.");
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLIFrameElement.idl 29 [Reflect] attribute DOMString sandbox;
  /external/chromium_org/tools/perf/measurements/
skpicture_printer.py 19 '--no-sandbox',
  /external/openssh/
Android.mk 122 sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.o
ssh-sandbox.h 1 /* $OpenBSD: ssh-sandbox.h,v 1.1 2011/06/23 09:34:13 djm Exp $ */
  /external/chromium_org/sandbox/win/tests/integration_tests/
integration_tests_test.cc 8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
306 } // namespace sandbox
  /external/chromium_org/content/renderer/
renderer_main.cc 195 // Load pepper plugins before engaging the sandbox.
199 // Initialize WebRTC before engaging the sandbox.
217 LOG(ERROR) << "Running without renderer sandbox";
220 // symbols when the sandbox is enabled, so only try when the sandbox is
  /external/chromium_org/sandbox/linux/tests/
unit_tests.cc 16 #include "sandbox/linux/tests/unit_tests.h"
42 namespace sandbox { namespace
105 // in the BPF sandbox, as it potentially makes global state changes and as
121 ASSERT_EQ(1, num_threads) << "Running sandbox tests with multiple threads "
187 // run (e.g. when testing sandbox features on a kernel that doesn't
  /external/chromium_org/chrome/
chrome_exe.gypi 67 # We still want the _win entry point for sandbox, etc.
462 '../sandbox/sandbox.gyp:sandbox',
477 '../sandbox/sandbox.gyp:sandbox',
587 '../sandbox/sandbox.gyp:sandbox_win64',

Completed in 2496 milliseconds

<<11121314151617181920>>