HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 201 - 225 of 523) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/libchrome/base/
base.isolate 8 # exception is the Windows sandbox (?).
  /external/libchrome/base/power_monitor/
power_monitor_device_source.h 47 // and before the Sandbox is initialized.
  /external/libchrome/dbus/
file_descriptor.h 74 // We disallow directories to avoid potential sandbox escapes.
  /external/libchrome/sandbox/linux/suid/
process_util_linux.c 13 #include "sandbox/linux/suid/process_util.h"
  /external/libchrome/sandbox/win/src/
sandbox.vcproj 5 Name="sandbox"
7 RootNamespace="sandbox"
564 RelativePath=".\sandbox.cc"
568 RelativePath=".\sandbox.h"
crosscall_client.h 11 #include "sandbox/win/src/crosscall_params.h"
12 #include "sandbox/win/src/sandbox.h"
42 namespace sandbox { namespace
524 } // namespace sandbox
  /external/llvm/docs/
HowToCrossCompileLLVM.rst 167 $ ./sandbox/bin/python sandbox/bin/lnt runtest nt \
168 --sandbox sandbox \
ReleaseProcess.rst 111 ./sandbox/bin/python sandbox/bin/lnt runtest \
114 --sandbox sandbox \
  /hardware/bsp/intel/peripheral/libupm/src/mg811/
mg811.cxx 7 * and sandbox electronics (http://sandboxelectronics.com/?p=147).
  /sdk/eclipse/
dictionary.txt 261 sandbox
  /external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/
vtune_profiler.py 145 '--no-sandbox',
146 '--allow-sandbox-debugging',
  /external/llvm/test/DebugInfo/X86/
empty-and-one-elem-array.ll 70 !6 = !DIFile(filename: "test.c", directory: "/Volumes/Sandbox/llvm")
96 !32 = !DIFile(filename: "test.c", directory: "/Volumes/Sandbox/llvm")
  /external/minijail/
minijail0.1 3 minijail0 \- sandbox a process
9 Runs PROGRAM inside a sandbox.
  /external/webrtc/webrtc/base/
systeminfo.cc 88 // is running in a sandbox, we may only be able to read the value once (before
89 // the sandbox is initialized) and not thereafter.
  /frameworks/base/docs/html/google/play/billing/
index.jd 48 <li><strong>IAB Sandbox</strong>&mdash;The In-app Billing Sandbox now supports
  /frameworks/base/docs/html/training/permissions/
declaring.jd 36 Every Android app runs in a limited-access sandbox. If an app needs to use
37 resources or information outside of its own sandbox, the app has to request
  /prebuilts/go/darwin-x86/misc/nacl/
README 19 Native Client programs are executed inside a sandbox, the NaCl runtime. This
75 script which sets up a Native Client environment and invokes the NaCl sandbox.
  /prebuilts/go/linux-x86/misc/nacl/
README 19 Native Client programs are executed inside a sandbox, the NaCl runtime. This
75 script which sets up a Native Client environment and invokes the NaCl sandbox.
  /external/selinux/libsemanage/src/
semanage_store.c 27 * local module store. Sandbox routines, used by both source and
94 * a sandbox */
873 /********************* sandbox management routines *********************/
875 /* Creates a sandbox for a single client. Returns 0 if a
876 * sandbox was created, -1 on error.
880 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); local
884 if (stat(sandbox, &buf) == -1) {
886 ERR(sh, "Error scanning directory %s.", sandbox);
891 /* remove the old sandbox */
892 if (semanage_remove_directory(sandbox) != 0)
1617 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); local
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/
mturk 97 dest = 'sandbox', action = 'store_false', default = True,
98 help = 'use the production site (default: use the sandbox)')
106 init(args.sandbox, args.nicknames_path)
108 def init(sandbox = False, nicknames_path = default_nicknames_path):
111 mturk_website = 'workersandbox.mturk.com' if sandbox else 'www.mturk.com'
113 host = 'mechanicalturk.sandbox.amazonaws.com' if sandbox else 'mechanicalturk.amazonaws.com')
  /external/libchrome/sandbox/linux/syscall_broker/
broker_process_unittest.cc 5 #include "sandbox/linux/syscall_broker/broker_process.h"
29 #include "sandbox/linux/syscall_broker/broker_client.h"
30 #include "sandbox/linux/tests/scoped_temporary_file.h"
31 #include "sandbox/linux/tests/test_utils.h"
32 #include "sandbox/linux/tests/unit_tests.h"
35 namespace sandbox { namespace
658 } // namespace sandbox
  /external/google-breakpad/src/client/linux/minidump_writer/
linux_ptrace_dumper.cc 78 // the seccomp sandbox. Not only does this cause difficulties down the line
83 // the seccomp sandbox's trusted code.
284 // it was part of the seccomp sandbox's trusted code, it is OK to
  /docs/source.android.com/src/security/enhancements/
enhancements50.jd 18 <li><strong>Android sandbox reinforced with SELinux</strong>. Android now
  /external/autotest/client/cros/
chrome_binary_test.py 20 CHROME_SANDBOX = '/opt/google/chrome/chrome-sandbox'
  /external/autotest/client/site_tests/security_BundledExtensions/
baseline 103 "https://www-googleapis-test.sandbox.google.com/*",

Completed in 1195 milliseconds

1 2 3 4 5 6 7 891011>>