HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 626 - 650 of 990) sorted by null

<<21222324252627282930>>

  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
invasive.cc 6 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
7 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/sandbox/win/src/
ipc_unittest.cc 6 #include "sandbox/win/src/crosscall_client.h"
7 #include "sandbox/win/src/crosscall_server.h"
8 #include "sandbox/win/src/sharedmem_ipc_client.h"
9 #include "sandbox/win/src/sharedmem_ipc_server.h"
12 namespace sandbox { namespace
623 sandbox::SharedMemIPCServer::ServerControl srv_control = {
628 sandbox::CrossCallReturn call_return = {0};
639 } // namespace sandbox
crosscall_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
39 namespace sandbox { namespace
481 } // namespace sandbox
policy_low_level_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
7 #include "sandbox/win/src/policy_low_level.h"
10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
11 #define POLPARAM(p) sandbox::ParamPickerMake(p),
14 namespace sandbox { namespace
617 } // namespace sandbox
policy_low_level.cc 8 #include "sandbox/win/src/policy_low_level.h"
32 namespace sandbox { namespace
348 } // namespace sandbox
  /external/chromium_org/tools/
run-bisect-manual-test.py 13 to setup the sandbox manually before running the script. Otherwise the script
138 print 'SUID sandbox has not been setup.'\
  /external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/
vtune_profiler.py 142 '--no-sandbox',
143 '--allow-sandbox-debugging',
  /external/chromium_org/ui/ozone/public/
surface_factory_ozone.h 89 // process before the sandbox has been activated.
93 // This method must be safe to run inside of the sandbox.
  /external/llvm/test/DebugInfo/X86/
nondefault-subrange-array.ll 33 !0 = metadata !{i32 786449, metadata !20, i32 4, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !1, metadata !3, metadata !1, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/t.cpp] [DW_LANG_C_plus_plus]
51 !20 = metadata !{metadata !"t.cpp", metadata !"/Volumes/Sandbox/llvm"}
  /external/chromium_org/chrome/app/
client_util.cc 38 #include "sandbox/win/src/sandbox.h"
42 typedef int (*DLL_MAIN)(HINSTANCE, sandbox::SandboxInterfaceInfo*);
288 // Initialize the sandbox services.
289 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/sandbox/linux/services/
broker_process.cc 5 #include "sandbox/linux/services/broker_process.h"
32 #include "sandbox/linux/services/linux_syscalls.h"
44 // process' system calls profile to be able to loosely sandbox it.
137 namespace sandbox { namespace
545 } // namespace sandbox.
broker_process_unittest.cc 5 #include "sandbox/linux/services/broker_process.h"
27 #include "sandbox/linux/tests/test_utils.h"
28 #include "sandbox/linux/tests/unit_tests.h"
31 namespace sandbox { namespace
503 } // namespace sandbox
credentials.cc 5 #include "sandbox/linux/services/credentials.h"
168 namespace sandbox { namespace
347 } // namespace sandbox.
  /external/chromium_org/third_party/sinonjs/src/
sinon.js 964 sinon.sandbox = require("./sinon/sandbox");
    [all...]
  /external/chromium_org/native_client_sdk/doc_generated/
overview.html 66 <li><strong>Security:</strong> Native Client uses a double sandbox model designed to protect
141 <li>The NaCl sandbox ensures that code accesses system resources only through
147 <p>The above security measures are in addition to the existing sandbox in the
151 combination of the NaCl sandbox and the Chrome sandbox, we say that
152 Native Client employs a double sandbox design.</p>
163 the nexe within the Native Client sandbox as described above. It also uses
  /external/chromium_org/chrome/test/nacl/
nacl_browsertest.cc 237 // On windows, the debug stub requires --no-sandbox:
246 // TODO(jvoung): Make this test work on Windows 32-bit. When --no-sandbox
247 // is used, the required 1GB sandbox address space is not reserved.
  /external/chromium_org/components/nacl/loader/nonsfi/
nonsfi_sandbox_sigsys_unittest.cc 11 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
12 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
23 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), \
  /external/chromium_org/remoting/host/win/
unprivileged_process_delegate.cc 33 #include "sandbox/win/src/restricted_token.h"
85 sandbox::RestrictedToken restricted_token;
95 if (restricted_token.SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW)
  /external/chromium_org/sandbox/linux/seccomp-bpf/
syscall.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
12 namespace sandbox { namespace
268 } // namespace sandbox
  /cts/tests/tests/security/src/android/security/cts/
SeccompDeathTestService.java 29 * Service used to run tests for seccomp-bpf sandboxing. Since sandbox violations
  /external/chromium_org/chrome/browser/nacl_host/test/
debug_stub_browser_tests.py 57 # Breakpoints and single-stepping might interfere with Chrome sandbox. So we
  /external/chromium_org/chrome/browser/ui/startup/
bad_flags_prompt.cc 41 // These flags disable sandbox-related security.
  /external/chromium_org/chrome/common/
chrome_paths_win.cc 107 // lies on a network share the sandbox will prevent us from accessing it.
  /external/chromium_org/chrome/test/base/
chrome_test_launcher.cc 33 #include "sandbox/win/src/sandbox_types.h"
  /external/chromium_org/chrome_elf/blacklist/
blacklist.h 9 #include "sandbox/win/src/sandbox_nt_types.h"

Completed in 296 milliseconds

<<21222324252627282930>>