/external/chromium_org/sandbox/win/src/ |
job_unittest.cc | 8 #include "sandbox/win/src/job.h" 11 namespace sandbox { namespace 194 } // namespace sandbox
|
crosscall_params.h | 14 #include "sandbox/win/src/internal_types.h" 15 #include "sandbox/win/src/sandbox_types.h" 27 // This header is part of CrossCall: the sandbox inter-process communication. 45 namespace sandbox { namespace 292 } // namespace sandbox
|
crosscall_server.h | 13 #include "sandbox/win/src/crosscall_params.h" 15 // This is the IPC server interface for CrossCall: The IPC for the Sandbox 25 // of the CrossCallParams class of /sandbox/crosscall_params.h The difference 44 namespace sandbox { namespace 223 } // namespace sandbox
|
policy_engine_opcodes.cc | 5 #include "sandbox/win/src/policy_engine_opcodes.h" 8 #include "sandbox/win/src/sandbox_nt_types.h" 9 #include "sandbox/win/src/sandbox_types.h" 28 namespace sandbox { namespace 454 } // namespace sandbox
|
restricted_token.cc | 5 #include "sandbox/win/src/restricted_token.h" 10 #include "sandbox/win/src/acl.h" 11 #include "sandbox/win/src/win_utils.h" 14 namespace sandbox { namespace 472 } // namespace sandbox
|
security_level.h | 10 namespace sandbox { namespace 12 // List of all the integrity levels supported in the sandbox. This is used 14 // in the sandbox to a level higher than yours. 27 // provide the bulk of the security of sandbox. 135 // Some mitigations are implemented directly by the sandbox or emulated to 201 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tools/finder/ |
finder.h | 8 #include "sandbox/win/src/restricted_token_utils.h" 9 #include "sandbox/win/tools/finder/ntundoc.h" 57 DWORD Init(sandbox::TokenLevel token_type, DWORD object_type,
|
/external/chromium_org/webkit/browser/fileapi/ |
sandbox_file_system_backend_delegate.h | 52 // Delegate implementation of the some methods in Sandbox/SyncFileSystemBackend. 75 // Returns the type directory name in sandbox directory for given |type|. 87 // Returns an origin enumerator of sandbox filesystem.
|
/external/openssh/ |
sandbox-systrace.c | 1 /* $OpenBSD: sandbox-systrace.c,v 1.4 2011/07/29 14:42:45 djm Exp $ */ 41 #include "ssh-sandbox.h" 83 debug3("%s: preparing systrace sandbox", __func__);
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
google_wallet.html | 156 <code>sandbox</code> (test server that accepts test credit cards to simulate transactions). 157 The default setting is <code>sandbox</code>. 176 Switch from the sandbox server to the production server and test your app using real credit cards. 204 The app has options to use either the production server or the sandbox server. When testing with the sandbox server,
|
/external/chromium_org/third_party/jinja2/ |
sandbox.py | 3 jinja2.sandbox 6 Adds a sandbox layer to Jinja as it was the default behavior in the old 7 Jinja 1 releases. This sandbox is slightly different from Jinja 1 as the 44 module='jinja2.sandbox') 126 >>> from jinja2.sandbox import is_internal_attribute
|
/external/chromium_org/content/ppapi_plugin/ |
ppapi_thread.cc | 48 #include "sandbox/win/src/sandbox.h" 54 extern sandbox::TargetServices* g_target_services; 284 // Once we lower the token the sandbox is locked down and no new modules 295 // Cause advapi32 to load before the sandbox is turned on. 298 // Warm up language subsystems before the sandbox is turned on. 331 // doing something nontrivial with the library), else the sandbox
|
/external/chromium_org/native_client_sdk/src/doc/ |
overview.rst | 61 * **Security:** Native Client uses a double sandbox model designed to protect 146 * The NaCl sandbox ensures that code accesses system resources only through 152 The above security measures are in addition to the existing sandbox in the 156 combination of the NaCl sandbox and the Chrome sandbox, we say that 157 Native Client employs a double sandbox design. 171 the nexe within the Native Client sandbox as described above. It also uses
|
/external/chromium_org/sandbox/linux/suid/ |
sandbox.c | 7 #include "common/sandbox.h" 62 const char msg[] = "\nThe setuid sandbox got signaled, exiting.\n"; 389 fprintf(stderr, "The setuid sandbox provides API version %ld, " 399 // use an old sandbox. 427 // In the SUID sandbox, if we succeed in calling MoveToNewNamespaces() 433 // a dummy socket, which has a unique inode number. Then it asks the sandbox 472 // Protect the core setuid sandbox functionality with an API version
|
/external/llvm/test/CodeGen/ARM/ |
debug-info-blocks.ll | 246 !149 = metadata !{metadata !"header3.h", metadata !"/Volumes/Sandbox/llvm"} 247 !150 = metadata !{metadata !"Private.h", metadata !"/Volumes/Sandbox/llvm"} 248 !151 = metadata !{metadata !"header4.h", metadata !"/Volumes/Sandbox/llvm"} 249 !152 = metadata !{metadata !"MyLibrary.m", metadata !"/Volumes/Sandbox/llvm"} 250 !153 = metadata !{metadata !"MyLibrary.i", metadata !"/Volumes/Sandbox/llvm"} 251 !154 = metadata !{metadata !"header11.h", metadata !"/Volumes/Sandbox/llvm"} 252 !155 = metadata !{metadata !"NSO.h", metadata !"/Volumes/Sandbox/llvm"} 253 !156 = metadata !{metadata !"header12.h", metadata !"/Volumes/Sandbox/llvm"} 254 !157 = metadata !{metadata !"header13.h", metadata !"/Volumes/Sandbox/llvm"} 255 !158 = metadata !{metadata !"header14.h", metadata !"/Volumes/Sandbox/llvm" [all...] |
/external/chromium_org/content/browser/ |
ppapi_plugin_process_host.cc | 32 #include "sandbox/win/src/sandbox_policy.h" 51 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, 57 sandbox::ResultCode result; 58 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, 59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, 61 *success = (result == sandbox::SBOX_ALL_OK);
|
/external/chromium_org/build/ |
all.gyp | 112 '../sandbox/sandbox.gyp:*', 164 '../sandbox/sandbox.gyp:*', 280 '../sandbox/sandbox.gyp:sbox_integration_tests', 281 '../sandbox/sandbox.gyp:sbox_unittests', 282 '../sandbox/sandbox.gyp:sbox_validation_tests' [all...] |
/external/chromium_org/sandbox/linux/services/ |
credentials.cc | 5 #include "sandbox/linux/services/credentials.h" 151 namespace sandbox { namespace 272 } // namespace sandbox.
|
/external/chromium_org/sandbox/win/src/sidestep/ |
preamble_patcher_with_stub.cpp | 7 #include "sandbox/win/src/sidestep/preamble_patcher.h" 9 #include "sandbox/win/src/sandbox_nt_util.h" 10 #include "sandbox/win/src/sidestep/mini_disassembler.h"
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
malloc_hook_mmap_linux.h | 84 // Chromium's sandbox. 216 // by Chromium's sandbox. 229 // Chromium's sandbox.
|
/external/llvm/test/DebugInfo/X86/ |
empty-and-one-elem-array.ll | 62 !0 = metadata !{i32 786449, metadata !32, i32 12, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !3, metadata !1, metadata !1, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/test.c] [DW_LANG_C99] 71 !11 = metadata !{i32 786443, metadata !6, metadata !5, i32 11, i32 0, i32 0} ; [ DW_TAG_lexical_block ] [/Volumes/Sandbox/llvm/test.c] 92 !32 = metadata !{metadata !"test.c", metadata !"/Volumes/Sandbox/llvm"}
|
/external/chromium/base/debug/ |
debug_on_start_win.cc | 61 // It will fails if we run in a sandbox. That is expected.
|
/external/chromium_org/base/debug/ |
debug_on_start_win.cc | 61 // It will fails if we run in a sandbox. That is expected.
|
/external/chromium_org/base/power_monitor/ |
power_monitor_device_source.h | 46 // and before the Sandbox is initialized.
|
power_monitor_device_source_mac.mm | 54 // allocated at sandbox initialization time, before there's a runloop.
|