OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:Sandbox
(Results
1 - 7
of
7
) sorted by null
/external/chromium_org/content/common/
sandbox_init_mac.cc
16
// Warm up APIs before turning on the
sandbox
.
17
Sandbox
::SandboxWarmup(sandbox_type);
19
// Actually
sandbox
the process.
20
return
Sandbox
::EnableSandbox(sandbox_type, allowed_dir);
25
//
sandbox
was disabled from the command line.
46
// Utility process
sandbox
.
51
// Worker process
sandbox
.
65
// the
sandbox
profile in ContentClient::GetSandboxProfileForSandboxType.
80
"org.chromium.
sandbox
.real_bootstrap_server";
sandbox_mac.h
30
// Class representing a substring of the
sandbox
profile tagged with its type.
57
class CONTENT_EXPORT
Sandbox
{
64
//
sandbox
is turned on. |sandbox_type| is the type of
sandbox
to warm up.
70
// Turns on the OS X
sandbox
for this process.
71
// |sandbox_type| - type of
Sandbox
to use. See SandboxWarmup() for legal
73
// |allowed_dir| - directory to allow access to, currently the only
sandbox
76
// Returns true on success, false if an error occurred enabling the
sandbox
.
80
// Returns true if the
sandbox
has been enabled for the current process.
86
// Build the
Sandbox
command necessary to allow access to a named director
[
all
...]
/external/chromium_org/content/worker/
worker_main.cc
18
#include "
sandbox
/win/src/
sandbox
.h"
35
sandbox
::TargetServices* target_services =
40
// Cause advapi32 to load before the
sandbox
is turned on.
43
// Warm up language subsystems before the
sandbox
is turned on.
49
//
Sandbox
should already be activated at this point.
50
CHECK(
Sandbox
::SandboxIsCurrentlyActive());
52
// On Linux, the
sandbox
must be initialized early, before any thread is
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.h
72
static const char
Sandbox
[];
ContentSecurityPolicy.cpp
78
const char ContentSecurityPolicy::
Sandbox
[] = "
sandbox
";
101
|| equalIgnoringCase(name,
Sandbox
)
712
logToConsole("Error while parsing the '
sandbox
' Content Security Policy directive: " + invalidFlags);
[
all
...]
CSPDirectiveList.cpp
654
} else if (equalIgnoringCase(name, ContentSecurityPolicy::
Sandbox
)) {
/external/chromium_org/native_client_sdk/src/doc/
faq.rst
53
* **Security:** Users are kept secure with an ever-improving
sandbox
124
* `Native Client: A
Sandbox
for Portable, Untrusted x86 Code
359
Native Client's
sandbox
works by validating the untrusted code (the
364
data
sandbox
. In particular this means that once loaded into memory,
376
The beauty of the Native Client
sandbox
is in reducing "safe" code to a
384
runtime also includes an outer
sandbox
that mediates system calls. For
385
more details about both sandboxes, see `Native Client: A
Sandbox
for
Completed in 171 milliseconds