OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
426 - 450
of
795
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/chromium_org/net/base/
winsock_util.h
30
// execution of some network code in
sandbox
.
/external/chromium_org/net/cert/
cert_verify_result.h
37
// running within the
sandbox
.
/external/chromium_org/remoting/webapp/
appsv2.patch
65
+ "
sandbox
": {
/external/chromium_org/sandbox/win/sandbox_poc/
sandbox.rc
93
IDI_SANDBOX ICON "
sandbox
.ico"
/external/chromium_org/sandbox/win/src/
interceptors_64.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
167
} // namespace
sandbox
job_unittest.cc
8
#include "
sandbox
/win/src/job.h"
11
namespace
sandbox
{
namespace
193
} // namespace
sandbox
crosscall_params.h
14
#include "
sandbox
/win/src/internal_types.h"
15
#include "
sandbox
/win/src/sandbox_types.h"
27
// This header is part of CrossCall: the
sandbox
inter-process communication.
45
namespace
sandbox
{
namespace
291
} // namespace
sandbox
crosscall_server.h
12
#include "
sandbox
/win/src/crosscall_params.h"
14
// This is the IPC server interface for CrossCall: The IPC for the
Sandbox
24
// of the CrossCallParams class of /
sandbox
/crosscall_params.h The difference
43
namespace
sandbox
{
namespace
222
} // namespace
sandbox
policy_engine_opcodes.cc
5
#include "
sandbox
/win/src/policy_engine_opcodes.h"
8
#include "
sandbox
/win/src/sandbox_nt_types.h"
9
#include "
sandbox
/win/src/sandbox_types.h"
28
namespace
sandbox
{
namespace
454
} // namespace
sandbox
/external/chromium_org/sandbox/win/tests/common/
test_utils.cc
5
#include "
sandbox
/win/tests/common/test_utils.h"
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
FileSystemType.h
44
// Non-
sandbox
filesystem.
/external/chromium_org/third_party/libjingle/overrides/
init_webrtc.h
53
// initializing the
sandbox
in Chrome).
/external/chromium_org/third_party/polymer/
build.log
41
polymer.
sandbox
.min.js: dbdfbb0e57423136557f9fe8959709e294d9560c
/external/chromium_org/tools/perf/measurements/
loading_profile.py
32
options.AppendExtraBrowserArg('--no-
sandbox
')
/external/chromium_org/chrome/service/
service_utility_process_host.h
104
// in a
sandbox
.
117
// path to the exposed to the
sandbox
. This is ignored if |no_sandbox| is
123
// |exposed_dir| is the path to tbe exposed to the
sandbox
. This is ignored
/external/chromium_org/content/common/gpu/media/
vaapi_wrapper.h
81
// Do any necessary initialization before the
sandbox
is enabled.
97
// Lazily initialize static data after
sandbox
is enabled. Return false on
125
// Has static initialization of pre-
sandbox
components completed successfully?
/external/chromium_org/sandbox/
sandbox_services.target.darwin-mips.mk
26
sandbox
/linux/services/broker_process.cc
93
$(LOCAL_PATH)/
sandbox
\
177
$(LOCAL_PATH)/
sandbox
\
sandbox_services.target.darwin-x86.mk
26
sandbox
/linux/services/broker_process.cc
96
$(LOCAL_PATH)/
sandbox
\
184
$(LOCAL_PATH)/
sandbox
\
sandbox_services.target.linux-mips.mk
26
sandbox
/linux/services/broker_process.cc
93
$(LOCAL_PATH)/
sandbox
\
177
$(LOCAL_PATH)/
sandbox
\
sandbox_services.target.linux-x86.mk
26
sandbox
/linux/services/broker_process.cc
96
$(LOCAL_PATH)/
sandbox
\
184
$(LOCAL_PATH)/
sandbox
\
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/
handles.cc
5
#include "
sandbox
/win/sandbox_poc/pocdll/exports.h"
6
#include "
sandbox
/win/sandbox_poc/pocdll/utils.h"
7
#include "
sandbox
/win/tools/finder/ntundoc.h"
/external/chromium_org/sandbox/win/tools/finder/
finder.h
8
#include "
sandbox
/win/src/restricted_token_utils.h"
9
#include "
sandbox
/win/tools/finder/ntundoc.h"
57
DWORD Init(
sandbox
::TokenLevel token_type, DWORD object_type,
/external/openssh/
sandbox-systrace.c
1
/* $OpenBSD:
sandbox
-systrace.c,v 1.4 2011/07/29 14:42:45 djm Exp $ */
41
#include "ssh-
sandbox
.h"
83
debug3("%s: preparing systrace
sandbox
", __func__);
/external/chromium_org/content/public/common/
content_switches.cc
19
const char kAllowNoSandboxJob[] = "allow-no-
sandbox
-job";
22
const char kAllowSandboxDebugging[] = "allow-
sandbox
-debugging";
173
// Disable the GPU process
sandbox
.
174
const char kDisableGpuSandbox[] = "disable-gpu-
sandbox
";
232
// Disable the seccomp filter
sandbox
(seccomp-bpf) (Linux only).
233
const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-
sandbox
";
238
// Disable the setuid
sandbox
(Linux only).
239
const char kDisableSetuidSandbox[] = "disable-setuid-
sandbox
";
452
// Cause the OS X
sandbox
write to syslog every time an access to a resource
453
// is denied by the
sandbox
[
all
...]
/external/chromium_org/chrome/common/extensions/docs/templates/articles/
in_app_payments.html
160
<code>
sandbox
</code> (test server that accepts test credit cards to simulate transactions).
161
The default setting is <code>
sandbox
</code>.
180
Switch from the
sandbox
server to the production server and test your app using real credit cards.
208
The app has options to use either the production server or the
sandbox
server. When testing with the
sandbox
server,
Completed in 1073 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>