HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 176 - 200 of 523) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/libchrome/sandbox/linux/
sandbox_linux_nacl_nonsfi.gyp 31 # nacl_helper_nonsfi's sandbox implementation.
sandbox_linux_test_sources.gypi 9 'sandbox',
  /external/libchrome/sandbox/linux/suid/common/
suid_unsafe_environment_variables.h 9 // We need to save these environment variables before running a SUID sandbox
  /external/libchrome/sandbox/win/sandbox_poc/
sandbox.rc 93 IDI_SANDBOX ICON "sandbox.ico"
  /system/sepolicy/
postinstall_dexopt.te 48 # Run dex2oat/patchoat in its own sandbox.
untrusted_app.te 29 # to their sandbox directory and then execute.
176 # Do not allow untrusted_app to create/unlink files outside of its sandbox,
186 -app_data_file # The apps sandbox itself
  /external/libchrome/sandbox/linux/bpf_dsl/
cons.h 10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
137 } // namespace sandbox
  /external/selinux/policycoreutils/sepolicy/
sepolicy-generate.8 47 .B sepolicy generate \-\-sandbox \-n NAME
147 .I \-\-sandbox
148 Generate Policy for Sandbox
  /prebuilts/clang/linux-x86/host/3.6/lib/clang/3.6/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/fps/
connection.py 111 kw.setdefault('host', 'fps.sandbox.amazonaws.com')
201 sandbox = 'sandbox' in self.host and 'payments-sandbox' or 'payments'
202 endpoint = 'authorize.{0}.amazon.com'.format(sandbox)
  /external/libchrome/sandbox/win/src/
crosscall_params.h 16 #include "sandbox/win/src/internal_types.h"
17 #include "sandbox/win/src/sandbox_types.h"
26 // This header is part of CrossCall: the sandbox inter-process communication.
44 namespace sandbox { namespace
285 } // namespace sandbox
security_level.h 10 namespace sandbox { namespace
12 // List of all the integrity levels supported in the sandbox. This is used
14 // in the sandbox to a level higher than yours.
27 // provide the bulk of the security of sandbox.
136 // Some mitigations are implemented directly by the sandbox or emulated to
207 } // namespace sandbox
  /external/opencv3/3rdparty/jinja2/
sandbox.py 3 jinja2.sandbox
6 Adds a sandbox layer to Jinja as it was the default behavior in the old
7 Jinja 1 releases. This sandbox is slightly different from Jinja 1 as the
44 module='jinja2.sandbox')
126 >>> from jinja2.sandbox import is_internal_attribute
  /external/jsoncpp/
makerelease.py 1 """Tag the sandbox for release, make source and doc tarballs.
62 """Checks that there is no pending commit in the sandbox."""
72 msg.insert(0, 'Pending change to commit found in sandbox. Commit them first!' )
96 """Commit the sandbox, providing the specified comment.
101 """Makes a tag based on the sandbox revisions.
255 Tags the sandbox revision with release_version.
  /external/compiler-rt/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /external/libchrome/sandbox/win/src/sidestep/
preamble_patcher_with_stub.cpp 7 #include "sandbox/win/src/sidestep/preamble_patcher.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
12 #include "sandbox/win/src/sidestep/mini_disassembler.h"
  /prebuilts/clang/host/darwin-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /prebuilts/clang/host/darwin-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /prebuilts/clang/host/darwin-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /prebuilts/clang/host/linux-x86/3.8/lib/clang/3.8/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /prebuilts/clang/host/linux-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /prebuilts/clang/host/linux-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /prebuilts/clang/host/linux-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
common_interface_defs.h 29 // Enable sandbox support in sanitizer coverage.
45 // Notify the tools that the sandbox is going to be turned on. The reserved
47 // that the tools may call to bypass the sandbox.
  /external/autotest/client/site_tests/security_RendererSandbox/
security_RendererSandbox.py 45 """For the setuid sandbox, make sure there is no content in the CWD
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_interface_internal.h 35 // Notify the tools that the sandbox is going to be turned on.

Completed in 686 milliseconds

1 2 3 4 5 6 78 91011>>