HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 726 - 750 of 990) sorted by null

<<21222324252627282930>>

  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMFilePath.cpp 125 // This method is only called on fully-evaluated absolute paths. Any sign of ".." or "." is likely an attempt to break out of the sandbox.
  /external/chromium_org/third_party/WebKit/Source/platform/fonts/
FontPlatformData.h 170 // font as |nsFont|. This because the sandbox may block loading of the original font.
  /external/chromium_org/third_party/WebKit/Source/platform/fonts/win/
FontPlatformDataWin.cpp 107 // SystemParametersInfo will fail only under full sandbox lockdown on Win8+.
  /external/chromium_org/third_party/jinja2/
exceptions.py 139 sandbox is enabled.
  /external/chromium_org/third_party/libjingle/overrides/
init_webrtc.cc 150 // explicitly before the sandbox is initialized. In that case, this call is
  /external/chromium_org/tools/perf/metrics/
v8_object_stats.py 178 '--no-sandbox'
  /external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/
tcmalloc_heap_profiler.py 122 options.AppendExtraBrowserArgs('--no-sandbox')
  /external/chromium_org/v8/tools/profviz/
profviz.html 99 --no-sandbox --js-flags="--prof --log-timer-events"
  /frameworks/base/docs/html/google/play-services/
wallet.jd 18 apply for production access by <a class="external-link" href="https://support.google.com/wallet/business/contact/ui_review">submitting your sandbox integration for review</a>.</p>
  /frameworks/base/docs/html/training/in-app-billing/
test-iab-app.jd 55 In-app Billing app, see <a href="{@docRoot}google/play/billing/billing_testing.html#test-purchases}">Test Purchases (In-app Billing Sandbox)</a>.
  /external/chromium_org/native_client_sdk/doc_generated/devguide/devcycle/
debugging.html 126 <code>--no-sandbox</code> flag. You must also be careful that each variable points to
305 version of the NaCl sandbox on your system, you can translate the
330 <li><p class="first">Launch Chrome with these three required flags: <code>--enable-nacl --enable-nacl-debug --no-sandbox</code>.</p>
334 chrome --enable-nacl --enable-nacl-debug --no-sandbox --disable-hang-monitor localhost:5103
346 <dt><code>--no-sandbox</code></dt>
347 <dd><p class="first last">Turns off the Chrome sandbox (not the Native Client sandbox). This enables
    [all...]
  /external/chromium_org/native_client_sdk/src/doc/
faq.rst 53 * **Security:** Users are kept secure with an ever-improving sandbox
124 * `Native Client: A Sandbox for Portable, Untrusted x86 Code
359 Native Client's sandbox works by validating the untrusted code (the
364 data sandbox. In particular this means that once loaded into memory,
376 The beauty of the Native Client sandbox is in reducing "safe" code to a
384 runtime also includes an outer sandbox that mediates system calls. For
385 more details about both sandboxes, see `Native Client: A Sandbox for
  /external/chromium_org/chrome/app/
chrome_main_delegate.cc 49 #include "sandbox/win/src/sandbox.h"
234 // Mac needs them too for scrollbar related images and for sandbox
703 // The renderer sandbox prevents us from accessing our .pak files directly.
841 // No sandbox needed for relauncher.
    [all...]
  /external/chromium_org/extensions/common/
manifest_constants.cc 125 const char kSandboxedPages[] = "sandbox.pages";
126 const char kSandboxedPagesCSP[] = "sandbox.content_security_policy";
565 "Invalid value for 'sandbox.pages'.";
567 "Invalid value for 'sandbox.pages[*]'.";
569 "Invalid value for 'sandbox.content_security_policy'.";
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.cc 8 #include "sandbox/linux/seccomp-bpf/codegen.h"
13 void TraverseRecursively(std::set<sandbox::Instruction*>* visited,
14 sandbox::Instruction* instruction) {
35 namespace sandbox { namespace
770 } // namespace sandbox
  /external/chromium_org/
GypAndroid.darwin-arm.mk 129 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-arm.mk
130 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-arm.mk
131 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-arm.mk
132 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-arm.mk
133 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.darwin-arm.mk
GypAndroid.darwin-x86.mk 132 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-x86.mk
133 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-x86.mk
134 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-x86.mk
135 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-x86.mk
136 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.darwin-x86.mk
GypAndroid.darwin-x86_64.mk 132 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-x86_64.mk
133 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-x86_64.mk
134 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-x86_64.mk
135 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-x86_64.mk
136 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.darwin-x86_64.mk
GypAndroid.linux-arm.mk 129 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-arm.mk
130 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-arm.mk
131 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-arm.mk
132 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-arm.mk
133 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.linux-arm.mk
GypAndroid.linux-x86.mk 132 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-x86.mk
133 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-x86.mk
134 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-x86.mk
135 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-x86.mk
136 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.linux-x86.mk
GypAndroid.linux-x86_64.mk 132 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-x86_64.mk
133 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-x86_64.mk
134 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-x86_64.mk
135 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-x86_64.mk
136 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.linux-x86_64.mk
  /frameworks/base/docs/html/training/articles/
security-tips.jd 38 <li>The Android Application Sandbox, which isolates your app data and code execution
179 capabilities not provided by the basic sandbox, including access to device features such as
    [all...]
  /external/chromium_org/content/child/
child_thread.cc 71 // This isn't needed on Windows because there the sandbox's job object
414 // since this is blocked by the sandbox.
  /external/chromium_org/ppapi/api/private/
ppb_nacl_private.idl 232 * use inside the Windows sandbox. Note that we provide this via dependency
337 /* Returns the kind of SFI sandbox implemented by NaCl on this
  /external/chromium_org/ppapi/c/private/
ppb_nacl_private.h 281 * use inside the Windows sandbox. Note that we provide this via dependency
370 /* Returns the kind of SFI sandbox implemented by NaCl on this

Completed in 691 milliseconds

<<21222324252627282930>>