HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 476 - 500 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
job_unittest.cc 8 #include "sandbox/win/src/job.h"
11 namespace sandbox { namespace
194 } // namespace sandbox
crosscall_params.h 14 #include "sandbox/win/src/internal_types.h"
15 #include "sandbox/win/src/sandbox_types.h"
27 // This header is part of CrossCall: the sandbox inter-process communication.
45 namespace sandbox { namespace
292 } // namespace sandbox
crosscall_server.h 13 #include "sandbox/win/src/crosscall_params.h"
15 // This is the IPC server interface for CrossCall: The IPC for the Sandbox
25 // of the CrossCallParams class of /sandbox/crosscall_params.h The difference
44 namespace sandbox { namespace
223 } // namespace sandbox
policy_engine_opcodes.cc 5 #include "sandbox/win/src/policy_engine_opcodes.h"
8 #include "sandbox/win/src/sandbox_nt_types.h"
9 #include "sandbox/win/src/sandbox_types.h"
28 namespace sandbox { namespace
454 } // namespace sandbox
restricted_token.cc 5 #include "sandbox/win/src/restricted_token.h"
10 #include "sandbox/win/src/acl.h"
11 #include "sandbox/win/src/win_utils.h"
14 namespace sandbox { namespace
472 } // namespace sandbox
security_level.h 10 namespace sandbox { namespace
12 // List of all the integrity levels supported in the sandbox. This is used
14 // in the sandbox to a level higher than yours.
27 // provide the bulk of the security of sandbox.
135 // Some mitigations are implemented directly by the sandbox or emulated to
201 } // namespace sandbox
  /external/chromium_org/sandbox/win/tools/finder/
finder.h 8 #include "sandbox/win/src/restricted_token_utils.h"
9 #include "sandbox/win/tools/finder/ntundoc.h"
57 DWORD Init(sandbox::TokenLevel token_type, DWORD object_type,
  /external/chromium_org/webkit/browser/fileapi/
sandbox_file_system_backend_delegate.h 52 // Delegate implementation of the some methods in Sandbox/SyncFileSystemBackend.
75 // Returns the type directory name in sandbox directory for given |type|.
87 // Returns an origin enumerator of sandbox filesystem.
  /external/openssh/
sandbox-systrace.c 1 /* $OpenBSD: sandbox-systrace.c,v 1.4 2011/07/29 14:42:45 djm Exp $ */
41 #include "ssh-sandbox.h"
83 debug3("%s: preparing systrace sandbox", __func__);
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
google_wallet.html 156 <code>sandbox</code> (test server that accepts test credit cards to simulate transactions).
157 The default setting is <code>sandbox</code>.
176 Switch from the sandbox server to the production server and test your app using real credit cards.
204 The app has options to use either the production server or the sandbox server. When testing with the sandbox server,
  /external/chromium_org/third_party/jinja2/
sandbox.py 3 jinja2.sandbox
6 Adds a sandbox layer to Jinja as it was the default behavior in the old
7 Jinja 1 releases. This sandbox is slightly different from Jinja 1 as the
44 module='jinja2.sandbox')
126 >>> from jinja2.sandbox import is_internal_attribute
  /external/chromium_org/content/ppapi_plugin/
ppapi_thread.cc 48 #include "sandbox/win/src/sandbox.h"
54 extern sandbox::TargetServices* g_target_services;
284 // Once we lower the token the sandbox is locked down and no new modules
295 // Cause advapi32 to load before the sandbox is turned on.
298 // Warm up language subsystems before the sandbox is turned on.
331 // doing something nontrivial with the library), else the sandbox
  /external/chromium_org/native_client_sdk/src/doc/
overview.rst 61 * **Security:** Native Client uses a double sandbox model designed to protect
146 * The NaCl sandbox ensures that code accesses system resources only through
152 The above security measures are in addition to the existing sandbox in the
156 combination of the NaCl sandbox and the Chrome sandbox, we say that
157 Native Client employs a double sandbox design.
171 the nexe within the Native Client sandbox as described above. It also uses
  /external/chromium_org/sandbox/linux/suid/
sandbox.c 7 #include "common/sandbox.h"
62 const char msg[] = "\nThe setuid sandbox got signaled, exiting.\n";
389 fprintf(stderr, "The setuid sandbox provides API version %ld, "
399 // use an old sandbox.
427 // In the SUID sandbox, if we succeed in calling MoveToNewNamespaces()
433 // a dummy socket, which has a unique inode number. Then it asks the sandbox
472 // Protect the core setuid sandbox functionality with an API version
  /external/llvm/test/CodeGen/ARM/
debug-info-blocks.ll 246 !149 = metadata !{metadata !"header3.h", metadata !"/Volumes/Sandbox/llvm"}
247 !150 = metadata !{metadata !"Private.h", metadata !"/Volumes/Sandbox/llvm"}
248 !151 = metadata !{metadata !"header4.h", metadata !"/Volumes/Sandbox/llvm"}
249 !152 = metadata !{metadata !"MyLibrary.m", metadata !"/Volumes/Sandbox/llvm"}
250 !153 = metadata !{metadata !"MyLibrary.i", metadata !"/Volumes/Sandbox/llvm"}
251 !154 = metadata !{metadata !"header11.h", metadata !"/Volumes/Sandbox/llvm"}
252 !155 = metadata !{metadata !"NSO.h", metadata !"/Volumes/Sandbox/llvm"}
253 !156 = metadata !{metadata !"header12.h", metadata !"/Volumes/Sandbox/llvm"}
254 !157 = metadata !{metadata !"header13.h", metadata !"/Volumes/Sandbox/llvm"}
255 !158 = metadata !{metadata !"header14.h", metadata !"/Volumes/Sandbox/llvm"
    [all...]
  /external/chromium_org/content/browser/
ppapi_plugin_process_host.cc 32 #include "sandbox/win/src/sandbox_policy.h"
51 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
57 sandbox::ResultCode result;
58 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_NAMED_PIPES,
59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,
61 *success = (result == sandbox::SBOX_ALL_OK);
  /external/chromium_org/build/
all.gyp 112 '../sandbox/sandbox.gyp:*',
164 '../sandbox/sandbox.gyp:*',
280 '../sandbox/sandbox.gyp:sbox_integration_tests',
281 '../sandbox/sandbox.gyp:sbox_unittests',
282 '../sandbox/sandbox.gyp:sbox_validation_tests'
    [all...]
  /external/chromium_org/sandbox/linux/services/
credentials.cc 5 #include "sandbox/linux/services/credentials.h"
151 namespace sandbox { namespace
272 } // namespace sandbox.
  /external/chromium_org/sandbox/win/src/sidestep/
preamble_patcher_with_stub.cpp 7 #include "sandbox/win/src/sidestep/preamble_patcher.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
10 #include "sandbox/win/src/sidestep/mini_disassembler.h"
  /external/chromium_org/third_party/tcmalloc/chromium/src/
malloc_hook_mmap_linux.h 84 // Chromium's sandbox.
216 // by Chromium's sandbox.
229 // Chromium's sandbox.
  /external/llvm/test/DebugInfo/X86/
empty-and-one-elem-array.ll 62 !0 = metadata !{i32 786449, metadata !32, i32 12, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !3, metadata !1, metadata !1, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/test.c] [DW_LANG_C99]
71 !11 = metadata !{i32 786443, metadata !6, metadata !5, i32 11, i32 0, i32 0} ; [ DW_TAG_lexical_block ] [/Volumes/Sandbox/llvm/test.c]
92 !32 = metadata !{metadata !"test.c", metadata !"/Volumes/Sandbox/llvm"}
  /external/chromium/base/debug/
debug_on_start_win.cc 61 // It will fails if we run in a sandbox. That is expected.
  /external/chromium_org/base/debug/
debug_on_start_win.cc 61 // It will fails if we run in a sandbox. That is expected.
  /external/chromium_org/base/power_monitor/
power_monitor_device_source.h 46 // and before the Sandbox is initialized.
power_monitor_device_source_mac.mm 54 // allocated at sandbox initialization time, before there's a runloop.

Completed in 499 milliseconds

<<11121314151617181920>>