HomeSort by relevance Sort by last modified time
    Searched refs:Sandbox (Results 1 - 7 of 7) sorted by null

  /external/chromium_org/content/common/
sandbox_init_mac.cc 16 // Warm up APIs before turning on the sandbox.
17 Sandbox::SandboxWarmup(sandbox_type);
19 // Actually sandbox the process.
20 return Sandbox::EnableSandbox(sandbox_type, allowed_dir);
25 // sandbox was disabled from the command line.
46 // Utility process sandbox.
51 // Worker process sandbox.
65 // the sandbox profile in ContentClient::GetSandboxProfileForSandboxType.
80 "org.chromium.sandbox.real_bootstrap_server";
sandbox_mac.h 30 // Class representing a substring of the sandbox profile tagged with its type.
57 class CONTENT_EXPORT Sandbox {
64 // sandbox is turned on. |sandbox_type| is the type of sandbox to warm up.
70 // Turns on the OS X sandbox for this process.
71 // |sandbox_type| - type of Sandbox to use. See SandboxWarmup() for legal
73 // |allowed_dir| - directory to allow access to, currently the only sandbox
76 // Returns true on success, false if an error occurred enabling the sandbox.
80 // Returns true if the sandbox has been enabled for the current process.
86 // Build the Sandbox command necessary to allow access to a named director
    [all...]
  /external/chromium_org/content/worker/
worker_main.cc 18 #include "sandbox/win/src/sandbox.h"
35 sandbox::TargetServices* target_services =
40 // Cause advapi32 to load before the sandbox is turned on.
43 // Warm up language subsystems before the sandbox is turned on.
49 // Sandbox should already be activated at this point.
50 CHECK(Sandbox::SandboxIsCurrentlyActive());
52 // On Linux, the sandbox must be initialized early, before any thread is
  /external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.h 72 static const char Sandbox[];
ContentSecurityPolicy.cpp 78 const char ContentSecurityPolicy::Sandbox[] = "sandbox";
101 || equalIgnoringCase(name, Sandbox)
712 logToConsole("Error while parsing the 'sandbox' Content Security Policy directive: " + invalidFlags);
    [all...]
CSPDirectiveList.cpp 654 } else if (equalIgnoringCase(name, ContentSecurityPolicy::Sandbox)) {
  /external/chromium_org/native_client_sdk/src/doc/
faq.rst 53 * **Security:** Users are kept secure with an ever-improving sandbox
124 * `Native Client: A Sandbox for Portable, Untrusted x86 Code
359 Native Client's sandbox works by validating the untrusted code (the
364 data sandbox. In particular this means that once loaded into memory,
376 The beauty of the Native Client sandbox is in reducing "safe" code to a
384 runtime also includes an outer sandbox that mediates system calls. For
385 more details about both sandboxes, see `Native Client: A Sandbox for

Completed in 171 milliseconds