/ndk/sources/host-tools/make-3.81/tests/ |
README | 89 fourth serious problem is that it doesn't create its own sandbox when
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/gle2/ |
RenderLogger.java | 313 // Append the given message to the ADT log. Bypass the sandbox if necessary
|
RenderService.java | 223 * @param credential the sandbox credential 251 * @param credential the sandbox credential
|
/docs/source.android.com/src/security/overview/ |
app-security.jd | 66 <p>All applications on Android run in an Application Sandbox, described earlier in this document. 295 its Application Sandbox. The signed application certificate defines which user 313 relationship with a shared Application Sandbox is allowed via the <a href="https://developer.android.com/guide/topics/manifest/manifest-element.html#uid">shared UID
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
generate.py | 125 SANDBOX = 4 140 poltype[SANDBOX] = _("Sandbox") 790 if self.type != SANDBOX: [all...] |
/external/autotest/client/bin/ |
site_utils.py | 77 8602 ? 00:00:00 chrome-sandbox 80 chrome-sandbox would not be matched. 132 31478 ? 0:00 /opt/google/chrome/chrome-sandbox /opt/google/chrome/ [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/ |
connection.py | 51 if config.has_option('MTurk', 'sandbox') and config.get('MTurk', 'sandbox') == 'True': 52 host = 'mechanicalturk.sandbox.amazonaws.com' [all...] |
/external/google-breakpad/src/build/ |
common.gypi | 164 # This is the location of the sandbox binary. Chrome looks for this before 166 # sandbox the zygote process and, thus, all renderer processes. 184 # Set to 1 to turn on seccomp sandbox by default. [all...] |
/external/tcpdump/ |
configure.in | 200 AC_ARG_WITH(sandbox-capsicum, 201 AS_HELP_STRING([--with-sandbox-capsicum], 223 AC_MSG_CHECKING([whether to sandbox using capsicum])
|
/external/chromium-trace/catapult/third_party/beautifulsoup4/bs4/builder/ |
__init__.py | 251 "iframe" : ["sandbox"],
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
seccomp_macros.h | 22 #include "sandbox/linux/system_headers/linux_seccomp.h" // For AUDIT_ARCH_*
|
/external/selinux/policycoreutils/sepolicy/ |
sepolicy-bash-completion.sh | 83 [generate]='-a --admin --admin_user --application --cgi --confined_admin --customize -d --domain --dbus --desktop_user -h --help --inetd --init -n --name --newtype -p --path --sandbox -T --test --term_user -u --user -w --writepath --x_user'
|
/frameworks/base/core/java/android/os/ |
Process.java | 831 * app-specific sandbox. It is different from {@link #myUserHandle} in that 832 * a uid identifies a specific app sandbox in a specific user. 851 * @return Whether the uid corresponds to an application sandbox running in 859 * Returns whether the current process is in an isolated sandbox. [all...] |
/frameworks/base/docs/html/guide/topics/security/ |
permissions.jd | 95 <p>Because each Android application operates in a process sandbox, applications 98 the basic sandbox. Applications statically declare the permissions they 101 <p>The application sandbox does not depend on the technology used to build 290 or resources outside the app's sandbox, but where there's very little risk [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/ |
ProjectCallback.java | 106 * @param credential the sandbox credential 673 // Append the given message to the ADT log. Bypass the sandbox if necessary
|
/external/chromium-trace/catapult/catapult_build/ |
run_dev_server_tests.py | 267 '--no-sandbox',
|
/external/libchrome/sandbox/win/src/sidestep/ |
mini_disassembler.cpp | 11 #include "sandbox/win/src/sidestep/mini_disassembler.h"
|
/external/libcxx/include/ |
__config | 127 // NaCl's sandbox (which PNaCl also runs in) doesn't allow filesystem access,
|
/external/llvm/lib/Target/Mips/ |
MipsRegisterInfo.cpp | 158 // Reserve registers for the NaCl sandbox.
|
/frameworks/base/docs/html/google/play/billing/ |
billing_reference.jd | 233 purchase made through the In-app Billing Sandbox, {@code orderId} is
|
/packages/apps/Settings/src/com/android/settings/fuelgauge/ |
PowerUsageSummary.java | 216 // Use the system UID for all UIDs running in their own sandbox that
|
/packages/apps/UnifiedEmail/src/com/android/mail/preferences/ |
MailPrefs.java | 577 * sanitization will be deemed untrustworthy and emails will be displayed in a sandbox that does
|
/prebuilts/go/darwin-x86/src/syscall/ |
syscall_unix_test.go | 332 // increase the soft limit of rlimit sandbox, though
|
/prebuilts/go/linux-x86/src/syscall/ |
syscall_unix_test.go | 332 // increase the soft limit of rlimit sandbox, though
|
/prebuilts/tools/common/proguard/proguard4.7/docs/ |
FAQ.html | 82 accidentally or intentionally break out of the sandbox of the virtual machine.
|