OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
726 - 750
of
990
) sorted by null
<<
21
22
23
24
25
26
27
28
29
30
>>
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMFilePath.cpp
125
// This method is only called on fully-evaluated absolute paths. Any sign of ".." or "." is likely an attempt to break out of the
sandbox
.
/external/chromium_org/third_party/WebKit/Source/platform/fonts/
FontPlatformData.h
170
// font as |nsFont|. This because the
sandbox
may block loading of the original font.
/external/chromium_org/third_party/WebKit/Source/platform/fonts/win/
FontPlatformDataWin.cpp
107
// SystemParametersInfo will fail only under full
sandbox
lockdown on Win8+.
/external/chromium_org/third_party/jinja2/
exceptions.py
139
sandbox
is enabled.
/external/chromium_org/third_party/libjingle/overrides/
init_webrtc.cc
150
// explicitly before the
sandbox
is initialized. In that case, this call is
/external/chromium_org/tools/perf/metrics/
v8_object_stats.py
178
'--no-
sandbox
'
/external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/
tcmalloc_heap_profiler.py
122
options.AppendExtraBrowserArgs('--no-
sandbox
')
/external/chromium_org/v8/tools/profviz/
profviz.html
99
--no-
sandbox
--js-flags="--prof --log-timer-events"
/frameworks/base/docs/html/google/play-services/
wallet.jd
18
apply for production access by <a class="external-link" href="https://support.google.com/wallet/business/contact/ui_review">submitting your
sandbox
integration for review</a>.</p>
/frameworks/base/docs/html/training/in-app-billing/
test-iab-app.jd
55
In-app Billing app, see <a href="{@docRoot}google/play/billing/billing_testing.html#test-purchases}">Test Purchases (In-app Billing
Sandbox
)</a>.
/external/chromium_org/native_client_sdk/doc_generated/devguide/devcycle/
debugging.html
126
<code>--no-
sandbox
</code> flag. You must also be careful that each variable points to
305
version of the NaCl
sandbox
on your system, you can translate the
330
<li><p class="first">Launch Chrome with these three required flags: <code>--enable-nacl --enable-nacl-debug --no-
sandbox
</code>.</p>
334
chrome --enable-nacl --enable-nacl-debug --no-
sandbox
--disable-hang-monitor localhost:5103
346
<dt><code>--no-
sandbox
</code></dt>
347
<dd><p class="first last">Turns off the Chrome
sandbox
(not the Native Client
sandbox
). This enables
[
all
...]
/external/chromium_org/native_client_sdk/src/doc/
faq.rst
53
* **Security:** Users are kept secure with an ever-improving
sandbox
124
* `Native Client: A
Sandbox
for Portable, Untrusted x86 Code
359
Native Client's
sandbox
works by validating the untrusted code (the
364
data
sandbox
. In particular this means that once loaded into memory,
376
The beauty of the Native Client
sandbox
is in reducing "safe" code to a
384
runtime also includes an outer
sandbox
that mediates system calls. For
385
more details about both sandboxes, see `Native Client: A
Sandbox
for
/external/chromium_org/chrome/app/
chrome_main_delegate.cc
49
#include "
sandbox
/win/src/
sandbox
.h"
234
// Mac needs them too for scrollbar related images and for
sandbox
703
// The renderer
sandbox
prevents us from accessing our .pak files directly.
841
// No
sandbox
needed for relauncher.
[
all
...]
/external/chromium_org/extensions/common/
manifest_constants.cc
125
const char kSandboxedPages[] = "
sandbox
.pages";
126
const char kSandboxedPagesCSP[] = "
sandbox
.content_security_policy";
565
"Invalid value for '
sandbox
.pages'.";
567
"Invalid value for '
sandbox
.pages[*]'.";
569
"Invalid value for '
sandbox
.content_security_policy'.";
[
all
...]
/external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.cc
8
#include "
sandbox
/linux/seccomp-bpf/codegen.h"
13
void TraverseRecursively(std::set<
sandbox
::Instruction*>* visited,
14
sandbox
::Instruction* instruction) {
35
namespace
sandbox
{
namespace
770
} // namespace
sandbox
/external/chromium_org/
GypAndroid.darwin-arm.mk
129
include $(LOCAL_PATH)/
sandbox
/
sandbox
.target.darwin-arm.mk
130
include $(LOCAL_PATH)/
sandbox
/sandbox_services.target.darwin-arm.mk
131
include $(LOCAL_PATH)/
sandbox
/sandbox_services_headers.target.darwin-arm.mk
132
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf.target.darwin-arm.mk
133
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf_helpers.target.darwin-arm.mk
GypAndroid.darwin-x86.mk
132
include $(LOCAL_PATH)/
sandbox
/
sandbox
.target.darwin-x86.mk
133
include $(LOCAL_PATH)/
sandbox
/sandbox_services.target.darwin-x86.mk
134
include $(LOCAL_PATH)/
sandbox
/sandbox_services_headers.target.darwin-x86.mk
135
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf.target.darwin-x86.mk
136
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf_helpers.target.darwin-x86.mk
GypAndroid.darwin-x86_64.mk
132
include $(LOCAL_PATH)/
sandbox
/
sandbox
.target.darwin-x86_64.mk
133
include $(LOCAL_PATH)/
sandbox
/sandbox_services.target.darwin-x86_64.mk
134
include $(LOCAL_PATH)/
sandbox
/sandbox_services_headers.target.darwin-x86_64.mk
135
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf.target.darwin-x86_64.mk
136
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf_helpers.target.darwin-x86_64.mk
GypAndroid.linux-arm.mk
129
include $(LOCAL_PATH)/
sandbox
/
sandbox
.target.linux-arm.mk
130
include $(LOCAL_PATH)/
sandbox
/sandbox_services.target.linux-arm.mk
131
include $(LOCAL_PATH)/
sandbox
/sandbox_services_headers.target.linux-arm.mk
132
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf.target.linux-arm.mk
133
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf_helpers.target.linux-arm.mk
GypAndroid.linux-x86.mk
132
include $(LOCAL_PATH)/
sandbox
/
sandbox
.target.linux-x86.mk
133
include $(LOCAL_PATH)/
sandbox
/sandbox_services.target.linux-x86.mk
134
include $(LOCAL_PATH)/
sandbox
/sandbox_services_headers.target.linux-x86.mk
135
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf.target.linux-x86.mk
136
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf_helpers.target.linux-x86.mk
GypAndroid.linux-x86_64.mk
132
include $(LOCAL_PATH)/
sandbox
/
sandbox
.target.linux-x86_64.mk
133
include $(LOCAL_PATH)/
sandbox
/sandbox_services.target.linux-x86_64.mk
134
include $(LOCAL_PATH)/
sandbox
/sandbox_services_headers.target.linux-x86_64.mk
135
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf.target.linux-x86_64.mk
136
include $(LOCAL_PATH)/
sandbox
/seccomp_bpf_helpers.target.linux-x86_64.mk
/frameworks/base/docs/html/training/articles/
security-tips.jd
38
<li>The Android Application
Sandbox
, which isolates your app data and code execution
179
capabilities not provided by the basic
sandbox
, including access to device features such as
[
all
...]
/external/chromium_org/content/child/
child_thread.cc
71
// This isn't needed on Windows because there the
sandbox
's job object
414
// since this is blocked by the
sandbox
.
/external/chromium_org/ppapi/api/private/
ppb_nacl_private.idl
232
* use inside the Windows
sandbox
. Note that we provide this via dependency
337
/* Returns the kind of SFI
sandbox
implemented by NaCl on this
/external/chromium_org/ppapi/c/private/
ppb_nacl_private.h
281
* use inside the Windows
sandbox
. Note that we provide this via dependency
370
/* Returns the kind of SFI
sandbox
implemented by NaCl on this
Completed in 691 milliseconds
<<
21
22
23
24
25
26
27
28
29
30
>>