HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 426 - 450 of 795) sorted by null

<<11121314151617181920>>

  /external/chromium_org/net/base/
winsock_util.h 30 // execution of some network code in sandbox.
  /external/chromium_org/net/cert/
cert_verify_result.h 37 // running within the sandbox.
  /external/chromium_org/remoting/webapp/
appsv2.patch 65 + "sandbox": {
  /external/chromium_org/sandbox/win/sandbox_poc/
sandbox.rc 93 IDI_SANDBOX ICON "sandbox.ico"
  /external/chromium_org/sandbox/win/src/
interceptors_64.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
167 } // namespace sandbox
job_unittest.cc 8 #include "sandbox/win/src/job.h"
11 namespace sandbox { namespace
193 } // namespace sandbox
crosscall_params.h 14 #include "sandbox/win/src/internal_types.h"
15 #include "sandbox/win/src/sandbox_types.h"
27 // This header is part of CrossCall: the sandbox inter-process communication.
45 namespace sandbox { namespace
291 } // namespace sandbox
crosscall_server.h 12 #include "sandbox/win/src/crosscall_params.h"
14 // This is the IPC server interface for CrossCall: The IPC for the Sandbox
24 // of the CrossCallParams class of /sandbox/crosscall_params.h The difference
43 namespace sandbox { namespace
222 } // namespace sandbox
policy_engine_opcodes.cc 5 #include "sandbox/win/src/policy_engine_opcodes.h"
8 #include "sandbox/win/src/sandbox_nt_types.h"
9 #include "sandbox/win/src/sandbox_types.h"
28 namespace sandbox { namespace
454 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/common/
test_utils.cc 5 #include "sandbox/win/tests/common/test_utils.h"
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
FileSystemType.h 44 // Non-sandbox filesystem.
  /external/chromium_org/third_party/libjingle/overrides/
init_webrtc.h 53 // initializing the sandbox in Chrome).
  /external/chromium_org/third_party/polymer/
build.log 41 polymer.sandbox.min.js: dbdfbb0e57423136557f9fe8959709e294d9560c
  /external/chromium_org/tools/perf/measurements/
loading_profile.py 32 options.AppendExtraBrowserArg('--no-sandbox')
  /external/chromium_org/chrome/service/
service_utility_process_host.h 104 // in a sandbox.
117 // path to the exposed to the sandbox. This is ignored if |no_sandbox| is
123 // |exposed_dir| is the path to tbe exposed to the sandbox. This is ignored
  /external/chromium_org/content/common/gpu/media/
vaapi_wrapper.h 81 // Do any necessary initialization before the sandbox is enabled.
97 // Lazily initialize static data after sandbox is enabled. Return false on
125 // Has static initialization of pre-sandbox components completed successfully?
  /external/chromium_org/sandbox/
sandbox_services.target.darwin-mips.mk 26 sandbox/linux/services/broker_process.cc
93 $(LOCAL_PATH)/sandbox \
177 $(LOCAL_PATH)/sandbox \
sandbox_services.target.darwin-x86.mk 26 sandbox/linux/services/broker_process.cc
96 $(LOCAL_PATH)/sandbox \
184 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-mips.mk 26 sandbox/linux/services/broker_process.cc
93 $(LOCAL_PATH)/sandbox \
177 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-x86.mk 26 sandbox/linux/services/broker_process.cc
96 $(LOCAL_PATH)/sandbox \
184 $(LOCAL_PATH)/sandbox \
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
handles.cc 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
7 #include "sandbox/win/tools/finder/ntundoc.h"
  /external/chromium_org/sandbox/win/tools/finder/
finder.h 8 #include "sandbox/win/src/restricted_token_utils.h"
9 #include "sandbox/win/tools/finder/ntundoc.h"
57 DWORD Init(sandbox::TokenLevel token_type, DWORD object_type,
  /external/openssh/
sandbox-systrace.c 1 /* $OpenBSD: sandbox-systrace.c,v 1.4 2011/07/29 14:42:45 djm Exp $ */
41 #include "ssh-sandbox.h"
83 debug3("%s: preparing systrace sandbox", __func__);
  /external/chromium_org/content/public/common/
content_switches.cc 19 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job";
22 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging";
173 // Disable the GPU process sandbox.
174 const char kDisableGpuSandbox[] = "disable-gpu-sandbox";
232 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only).
233 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox";
238 // Disable the setuid sandbox (Linux only).
239 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox";
452 // Cause the OS X sandbox write to syslog every time an access to a resource
453 // is denied by the sandbox
    [all...]
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
in_app_payments.html 160 <code>sandbox</code> (test server that accepts test credit cards to simulate transactions).
161 The default setting is <code>sandbox</code>.
180 Switch from the sandbox server to the production server and test your app using real credit cards.
208 The app has options to use either the production server or the sandbox server. When testing with the sandbox server,

Completed in 1073 milliseconds

<<11121314151617181920>>