OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
176 - 200
of
523
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/libchrome/sandbox/linux/
sandbox_linux_nacl_nonsfi.gyp
31
# nacl_helper_nonsfi's
sandbox
implementation.
sandbox_linux_test_sources.gypi
9
'
sandbox
',
/external/libchrome/sandbox/linux/suid/common/
suid_unsafe_environment_variables.h
9
// We need to save these environment variables before running a SUID
sandbox
/external/libchrome/sandbox/win/sandbox_poc/
sandbox.rc
93
IDI_SANDBOX ICON "
sandbox
.ico"
/system/sepolicy/
postinstall_dexopt.te
48
# Run dex2oat/patchoat in its own
sandbox
.
untrusted_app.te
29
# to their
sandbox
directory and then execute.
176
# Do not allow untrusted_app to create/unlink files outside of its
sandbox
,
186
-app_data_file # The apps
sandbox
itself
/external/libchrome/sandbox/linux/bpf_dsl/
cons.h
10
#include "
sandbox
/sandbox_export.h"
12
namespace
sandbox
{
namespace
137
} // namespace
sandbox
/external/selinux/policycoreutils/sepolicy/
sepolicy-generate.8
47
.B sepolicy generate \-\-
sandbox
\-n NAME
147
.I \-\-
sandbox
148
Generate Policy for
Sandbox
/prebuilts/clang/linux-x86/host/3.6/lib/clang/3.6/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/fps/
connection.py
111
kw.setdefault('host', 'fps.
sandbox
.amazonaws.com')
201
sandbox
= '
sandbox
' in self.host and 'payments-
sandbox
' or 'payments'
202
endpoint = 'authorize.{0}.amazon.com'.format(
sandbox
)
/external/libchrome/sandbox/win/src/
crosscall_params.h
16
#include "
sandbox
/win/src/internal_types.h"
17
#include "
sandbox
/win/src/sandbox_types.h"
26
// This header is part of CrossCall: the
sandbox
inter-process communication.
44
namespace
sandbox
{
namespace
285
} // namespace
sandbox
security_level.h
10
namespace
sandbox
{
namespace
12
// List of all the integrity levels supported in the
sandbox
. This is used
14
// in the
sandbox
to a level higher than yours.
27
// provide the bulk of the security of
sandbox
.
136
// Some mitigations are implemented directly by the
sandbox
or emulated to
207
} // namespace
sandbox
/external/opencv3/3rdparty/jinja2/
sandbox.py
3
jinja2.
sandbox
6
Adds a
sandbox
layer to Jinja as it was the default behavior in the old
7
Jinja 1 releases. This
sandbox
is slightly different from Jinja 1 as the
44
module='jinja2.
sandbox
')
126
>>> from jinja2.
sandbox
import is_internal_attribute
/external/jsoncpp/
makerelease.py
1
"""Tag the
sandbox
for release, make source and doc tarballs.
62
"""Checks that there is no pending commit in the
sandbox
."""
72
msg.insert(0, 'Pending change to commit found in
sandbox
. Commit them first!' )
96
"""Commit the
sandbox
, providing the specified comment.
101
"""Makes a tag based on the
sandbox
revisions.
255
Tags the
sandbox
revision with release_version.
/external/compiler-rt/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/external/libchrome/sandbox/win/src/sidestep/
preamble_patcher_with_stub.cpp
7
#include "
sandbox
/win/src/sidestep/preamble_patcher.h"
11
#include "
sandbox
/win/src/sandbox_nt_util.h"
12
#include "
sandbox
/win/src/sidestep/mini_disassembler.h"
/prebuilts/clang/host/darwin-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/prebuilts/clang/host/darwin-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/prebuilts/clang/host/darwin-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/prebuilts/clang/host/linux-x86/3.8/lib/clang/3.8/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/prebuilts/clang/host/linux-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/prebuilts/clang/host/linux-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/prebuilts/clang/host/linux-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h
29
// Enable
sandbox
support in sanitizer coverage.
45
// Notify the tools that the
sandbox
is going to be turned on. The reserved
47
// that the tools may call to bypass the
sandbox
.
/external/autotest/client/site_tests/security_RendererSandbox/
security_RendererSandbox.py
45
"""For the setuid
sandbox
, make sure there is no content in the CWD
/external/compiler-rt/lib/sanitizer_common/
sanitizer_interface_internal.h
35
// Notify the tools that the
sandbox
is going to be turned on.
Completed in 686 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>