HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 601 - 625 of 795) sorted by null

<<21222324252627282930>>

  /external/chromium_org/tools/
licenses.py 89 os.path.join('sandbox', 'linux', 'seccomp-legacy'),
115 os.path.join('sandbox', 'linux', 'seccomp-legacy'): {
  /external/chromium_org/ui/gl/
gl_surface_glx.cc 212 // the sandbox goes up.
298 // for use on a separate thread. We must allocate this before the sandbox
  /external/chromium/chrome/browser/
memory_details_linux.cc 185 // Handle the zygote separately. With the SUID sandbox and a separate
utility_process_host.h 28 // If you need a single method call in the sandbox, use StartFooBar(p).
  /external/chromium/chrome/browser/nacl_host/
nacl_process_host.cc 275 // round trip out of the sandbox, we create an FD here.
  /external/chromium/chrome/common/
utility_messages.h 112 // sandbox.
  /external/chromium_org/base/
path_service.cc 250 // For some locations this will fail if called from inside the sandbox there-
  /external/chromium_org/base/threading/
platform_thread_mac.mm 60 // pthread_setname() fails (harmlessly) in the sandbox, ignore when it does.
  /external/chromium_org/chrome/browser/
chrome_content_browser_client.h 259 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
  /external/chromium_org/chrome/browser/extensions/
sandboxed_unpacker.h 167 // was put here because we cannot run windows crypto code in the sandbox. But
  /external/chromium_org/chrome/browser/nacl_host/
nacl_process_host.h 107 // stub can use it to accept incoming connections even when the Chrome sandbox
  /external/chromium_org/chrome/browser/sync_file_system/local/
syncable_file_system_unittest.cc 106 // Brief combined testing. Just see if all the sandbox feature works.
  /external/chromium_org/chrome/test/automation/
proxy_launcher.h 180 // If true, runs the renderer outside the sandbox.
  /external/chromium_org/chrome/test/base/
in_process_browser_test.h 84 // InProcessBrowserTest disables the sandbox when running.
  /external/chromium_org/chrome/utility/local_discovery/
service_discovery_message_handler.cc 117 // TODO(vitalybuka) : implement socket access from sandbox for other
  /external/chromium_org/content/browser/
plugin_data_remover_impl.cc 109 // Use the broker since we run this function outside the sandbox.
utility_process_host_impl.cc 247 // TODO(port): Sandbox this on Linux. Also, zygote this to work with
  /external/chromium_org/content/browser/renderer_host/
render_message_filter.h 206 // in the renderer on POSIX due to the sandbox.
  /external/chromium_org/content/renderer/pepper/
ppb_image_data_impl.cc 157 // work in the sandbox. Do this by sending a message to the browser
  /external/chromium_org/content/worker/
worker_webkitplatformsupport_impl.cc 120 // Always return true because WebKit should always act as though the Sandbox
  /external/chromium_org/crypto/
nss_util.h 84 // sandbox is active.
  /external/chromium_org/ipc/
ipc_channel_posix.h 22 // On Linux, the seccomp sandbox makes it very expensive to call
  /external/chromium_org/net/http/
transport_security_state_unittest.cc 448 EXPECT_TRUE(ShouldRedirect("sandbox.mydigipass.com"));
449 EXPECT_FALSE(ShouldRedirect("foo.sandbox.mydigipass.com"));
450 EXPECT_TRUE(ShouldRedirect("www.sandbox.mydigipass.com"));
451 EXPECT_FALSE(ShouldRedirect("foo.www.sandbox.mydigipass.com"));
    [all...]
  /external/chromium_org/ppapi/c/private/
ppb_nacl_private.h 95 * use inside the Windows sandbox. Note that we provide this via dependency
  /external/chromium_org/ppapi/proxy/
plugin_main_nacl.cc 113 // NaCl sandbox.

Completed in 1100 milliseconds

<<21222324252627282930>>