Searched
full:sandbox (Results
601 -
625 of
795) sorted by null
<<21222324252627282930>>
/external/chromium_org/tools/ |
licenses.py | 89 os.path.join('sandbox', 'linux', 'seccomp-legacy'), 115 os.path.join('sandbox', 'linux', 'seccomp-legacy'): {
|
/external/chromium_org/ui/gl/ |
gl_surface_glx.cc | 212 // the sandbox goes up. 298 // for use on a separate thread. We must allocate this before the sandbox
|
/external/chromium/chrome/browser/ |
memory_details_linux.cc | 185 // Handle the zygote separately. With the SUID sandbox and a separate
|
utility_process_host.h | 28 // If you need a single method call in the sandbox, use StartFooBar(p).
|
/external/chromium/chrome/browser/nacl_host/ |
nacl_process_host.cc | 275 // round trip out of the sandbox, we create an FD here.
|
/external/chromium/chrome/common/ |
utility_messages.h | 112 // sandbox.
|
/external/chromium_org/base/ |
path_service.cc | 250 // For some locations this will fail if called from inside the sandbox there-
|
/external/chromium_org/base/threading/ |
platform_thread_mac.mm | 60 // pthread_setname() fails (harmlessly) in the sandbox, ignore when it does.
|
/external/chromium_org/chrome/browser/ |
chrome_content_browser_client.h | 259 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
|
/external/chromium_org/chrome/browser/extensions/ |
sandboxed_unpacker.h | 167 // was put here because we cannot run windows crypto code in the sandbox. But
|
/external/chromium_org/chrome/browser/nacl_host/ |
nacl_process_host.h | 107 // stub can use it to accept incoming connections even when the Chrome sandbox
|
/external/chromium_org/chrome/browser/sync_file_system/local/ |
syncable_file_system_unittest.cc | 106 // Brief combined testing. Just see if all the sandbox feature works.
|
/external/chromium_org/chrome/test/automation/ |
proxy_launcher.h | 180 // If true, runs the renderer outside the sandbox.
|
/external/chromium_org/chrome/test/base/ |
in_process_browser_test.h | 84 // InProcessBrowserTest disables the sandbox when running.
|
/external/chromium_org/chrome/utility/local_discovery/ |
service_discovery_message_handler.cc | 117 // TODO(vitalybuka) : implement socket access from sandbox for other
|
/external/chromium_org/content/browser/ |
plugin_data_remover_impl.cc | 109 // Use the broker since we run this function outside the sandbox.
|
utility_process_host_impl.cc | 247 // TODO(port): Sandbox this on Linux. Also, zygote this to work with
|
/external/chromium_org/content/browser/renderer_host/ |
render_message_filter.h | 206 // in the renderer on POSIX due to the sandbox.
|
/external/chromium_org/content/renderer/pepper/ |
ppb_image_data_impl.cc | 157 // work in the sandbox. Do this by sending a message to the browser
|
/external/chromium_org/content/worker/ |
worker_webkitplatformsupport_impl.cc | 120 // Always return true because WebKit should always act as though the Sandbox
|
/external/chromium_org/crypto/ |
nss_util.h | 84 // sandbox is active.
|
/external/chromium_org/ipc/ |
ipc_channel_posix.h | 22 // On Linux, the seccomp sandbox makes it very expensive to call
|
/external/chromium_org/net/http/ |
transport_security_state_unittest.cc | 448 EXPECT_TRUE(ShouldRedirect("sandbox.mydigipass.com")); 449 EXPECT_FALSE(ShouldRedirect("foo.sandbox.mydigipass.com")); 450 EXPECT_TRUE(ShouldRedirect("www.sandbox.mydigipass.com")); 451 EXPECT_FALSE(ShouldRedirect("foo.www.sandbox.mydigipass.com")); [all...] |
/external/chromium_org/ppapi/c/private/ |
ppb_nacl_private.h | 95 * use inside the Windows sandbox. Note that we provide this via dependency
|
/external/chromium_org/ppapi/proxy/ |
plugin_main_nacl.cc | 113 // NaCl sandbox.
|
Completed in 1100 milliseconds
<<21222324252627282930>>