HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 501 - 525 of 795) sorted by null

<<21222324252627282930>>

  /external/chromium_org/sandbox/linux/services/
broker_process.cc 5 #include "sandbox/linux/services/broker_process.h"
24 #include "sandbox/linux/services/linux_syscalls.h"
121 namespace sandbox { namespace
179 // Enable the sandbox if provided.
522 } // namespace sandbox.
broker_process_unittest.cc 5 #include "sandbox/linux/services/broker_process.h"
20 #include "sandbox/linux/tests/unit_tests.h"
23 namespace sandbox { namespace
358 // Sandbox test because we could get a SIGPIPE.
438 } // namespace sandbox
  /external/chromium_org/sandbox/win/src/
crosscall_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
39 namespace sandbox { namespace
481 } // namespace sandbox
policy_low_level_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
7 #include "sandbox/win/src/policy_low_level.h"
10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
11 #define POLPARAM(p) sandbox::ParamPickerMake(p),
14 namespace sandbox { namespace
617 } // namespace sandbox
policy_low_level.cc 8 #include "sandbox/win/src/policy_low_level.h"
32 namespace sandbox { namespace
348 } // namespace sandbox
restricted_token_unittest.cc 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/sid.h"
15 namespace sandbox { namespace
593 } // namespace sandbox
  /external/chromium_org/chrome/installer/linux/common/
installer.include 134 # sandbox
135 # Rename sandbox binary with hyphen instead of underscore because that's what
138 "${STAGEDIR}/${INSTALLDIR}/${PROGNAME}-sandbox"
  /external/chromium_org/remoting/host/win/
unprivileged_process_delegate.cc 32 #include "sandbox/win/src/restricted_token.h"
83 sandbox::RestrictedToken restricted_token;
93 if (restricted_token.SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW)
  /external/chromium/base/i18n/
icu_util.cc 105 // Instead, Mac maps the file in and hands off the data so the sandbox won't
  /external/chromium/chrome/browser/
crash_handler_host_linux.h 29 // allows us to be outside the sandbox.
  /external/chromium_org/base/i18n/
icu_util.cc 109 // Instead, Mac maps the file in and hands off the data so the sandbox won't
  /external/chromium_org/chrome/browser/chromeos/contacts/
contact.proto 42 // must be decoded within a sandbox by e.g. ImageDecoder before being used.
  /external/chromium_org/chrome/browser/
crash_handler_host_linux.h 26 // because it allows us to be outside the sandbox.
  /external/chromium_org/chrome/browser/nacl_host/test/
debug_stub_browser_tests.py 57 # Breakpoints and single-stepping might interfere with Chrome sandbox. So we
  /external/chromium_org/chrome/common/
chrome_paths_win.cc 117 // lies on a network share the sandbox will prevent us from accessing it.
  /external/chromium_org/chrome/common/extensions/manifest_handlers/
sandboxed_page_info.cc 25 "sandbox allow-scripts allow-forms allow-popups";
  /external/chromium_org/chrome/utility/
chrome_content_utility_client.cc 94 // Load the pdf plugin before the sandbox is turned on. This is for Windows
333 // used by the Chrome PDF plugin that will fail in the sandbox.
341 // CreateDC fails behind the sandbox, but not CreateCompatibleDC.
395 // Patch the IAT for handling specific APIs known to fail in the sandbox.
  /external/chromium_org/content/
DEPS 43 "+sandbox",
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.vcproj 189 Name="sandbox"
  /external/chromium_org/third_party/WebKit/Source/core/platform/chromium/
PlatformKeyboardEventChromium.cpp 77 // FIXME: Does this even work inside the sandbox?
  /external/chromium_org/third_party/WebKit/Source/core/platform/graphics/chromium/
CrossProcessFontLoading.h 56 // by the sandbox.
  /external/chromium_org/third_party/WebKit/public/
README 32 Blink is designed to run in a sandbox and interacts with the operating system
  /external/chromium_org/third_party/libjingle/overrides/
init_webrtc.cc 112 // explicitly before the sandbox is initialized. In that case, this call is
  /external/chromium_org/third_party/tcmalloc/chromium/src/base/
spinlock_linux-inl.h 46 // is necessary to make the code compatible with the seccomp sandbox,
  /external/chromium_org/tools/code_coverage/
coverage.py 58 ['page_cycler_tests.exe', '--gtest_filter=*File --no-sandbox'],
59 ['reliability_tests.exe', '--no-sandbox'],
60 ['startup_tests.exe', '--no-sandbox'],
61 ['tab_switching_test.exe', '--no-sandbox'],

Completed in 5277 milliseconds

<<21222324252627282930>>