/external/chromium_org/net/socket/ |
socket_descriptor.h | 28 // possible execution of some network code in sandbox.
|
/external/chromium_org/ppapi/shared_impl/ |
time_conversion.h | 27 // process only on Windows (the sandbox prevents this from working properly on
|
/external/chromium_org/remoting/client/plugin/ |
pepper_port_allocator.h | 23 // code doesn't work in sandbox.
|
/external/chromium_org/remoting/webapp/ |
wcs_sandbox_content.js | 8 * The sandbox side of the application/sandbox WCS interface, used by the 9 * sandbox to exchange messages with the application. 210 * Entry point for the WCS sandbox process.
|
/external/chromium_org/sandbox/linux/ |
sandbox_linux_test_sources.gypi | 9 'sandbox',
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.cc | 7 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 15 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 67 namespace sandbox { namespace 146 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/services/ |
credentials_unittest.cc | 5 #include "sandbox/linux/services/credentials.h" 17 #include "sandbox/linux/tests/unit_tests.h" 22 namespace sandbox { namespace 215 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/suid/common/ |
suid_unsafe_environment_variables.h | 9 // We need to save these environment variables before running a SUID sandbox
|
/external/chromium_org/sandbox/win/src/ |
Wow64.cc | 5 #include "sandbox/win/src/wow64.h" 13 #include "sandbox/win/src/target_process.h" 74 namespace sandbox { namespace 220 } // namespace sandbox
|
handle_table.cc | 5 #include "sandbox/win/src/handle_table.h" 12 #include "sandbox/win/src/win_utils.h" 23 namespace sandbox { namespace 183 } // namespace sandbox
|
policy_engine_processor.h | 9 #include "sandbox/win/src/policy_engine_params.h" 10 #include "sandbox/win/src/policy_engine_opcodes.h" 12 namespace sandbox { namespace 143 } // namespace sandbox
|
service_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 148 } // namespace sandbox
|
file_policy_test.cc | 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/src/win_utils.h" 17 #include "sandbox/win/tests/common/controller.h" 18 #include "sandbox/win/tests/common/test_utils.h" 25 namespace sandbox { namespace 599 } // namespace sandbox [all...] |
/external/chromium_org/sandbox/win/tools/finder/ |
finder_kernel.cc | 5 #include "sandbox/win/src/restricted_token.h" 6 #include "sandbox/win/src/restricted_token_utils.h" 7 #include "sandbox/win/tools/finder/finder.h" 8 #include "sandbox/win/tools/finder/ntundoc.h"
|
/external/chromium_org/third_party/WebKit/PerformanceTests/DOM/ |
TraverseChildNodes.html | 15 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/ |
html-parser-threaded.html | 13 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLIFrameElement.idl | 29 [Reflect, TreatNullAs=NullString] attribute DOMString sandbox;
|
/external/chromium_org/tools/cr/cr/base/ |
linux.py | 31 CHROME_DEVEL_SANDBOX='/usr/local/sbin/chrome-devel-sandbox',
|
/external/chromium_org/tools/perf/measurements/ |
skpicture_printer.py | 19 '--no-sandbox',
|
/external/chromium_org/ui/gfx/ozone/ |
surface_factory_ozone.h | 79 // process before the sandbox has been activated. 83 // This method must be safe to run inside of the sandbox. 125 // that this may be called after we have entered the sandbox so if there are 127 // must be done outside of the sandbox, they must have been completed
|
/external/openssh/ |
Android.mk | 122 sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.o
|
ssh-sandbox.h | 1 /* $OpenBSD: ssh-sandbox.h,v 1.1 2011/06/23 09:34:13 djm Exp $ */
|
/external/chromium_org/sandbox/win/tests/integration_tests/ |
integration_tests_test.cc | 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 306 } // namespace sandbox
|
/external/chromium_org/components/ |
nacl.gyp | 179 '../sandbox/sandbox.gyp:libc_urandom_override', 180 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/content/renderer/ |
renderer_main.cc | 204 // Load pepper plugins before engaging the sandbox. 208 // Initialize WebRTC before engaging the sandbox. 226 LOG(ERROR) << "Running without renderer sandbox"; 229 // symbols when the sandbox is enabled, so only try when the sandbox is
|