/external/autotest/client/cros/ |
chrome_binary_test.py | 20 CHROME_SANDBOX = '/opt/google/chrome/chrome-sandbox'
|
enterprise_policy_base.py | 19 '--google-apis-url=https://www-googleapis-test.sandbox.google.com', 23 'https://cloudprint-nightly-ps.sandbox.google.com/cloudprint'), 27 'https://cloudprint-nightly-ps.sandbox.google.com/cloudprint'), 42 'cr-dev': 'https://cros-dev.sandbox.google.com/devicemanagement/data/api', 43 'cr-auto': 'https://cros-auto.sandbox.google.com/devicemanagement/data/api',
|
/external/autotest/client/site_tests/security_BundledExtensions/ |
baseline | 103 "https://www-googleapis-test.sandbox.google.com/*",
|
/external/boringssl/src/include/openssl/ |
rand.h | 42 * if, due to a sandbox, /dev/urandom isn't available. If used, it must be
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/fps/ |
test.py | 24 self.fps = FPSConnection(host='fps.sandbox.amazonaws.com')
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_procmaps.h | 41 // In some cases, e.g. when running under a sandbox on Linux, ASan is unable
|
/external/libchrome/base/debug/ |
stack_trace.h | 31 // In sandboxed processes, this has to be called before the sandbox is turned
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
codegen_unittest.cc | 5 #include "sandbox/linux/bpf_dsl/codegen.h" 17 #include "sandbox/linux/system_headers/linux_filter.h" 20 namespace sandbox { namespace 404 } // namespace sandbox
|
/external/libchrome/sandbox/linux/seccomp-bpf/ |
syscall.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall.h" 11 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" 13 namespace sandbox { namespace 421 } // namespace sandbox
|
/external/libchrome/sandbox/win/wow_helper/ |
wow_helper.vcproj | 189 Name="sandbox"
|
/external/minijail/ |
elfparse.c | 92 * static interpreters escaping the sandbox.
|
/external/selinux/libsemanage/src/ |
semanage_store.h | 39 /* sandbox filenames and paths */
|
/external/selinux/policycoreutils/sepolicy/ |
Makefile | 13 SHAREDIR ?= $(PREFIX)/share/sandbox
|
sepolicy.py | 44 usage_dict = {' --newtype': ('-t [TYPES [TYPES ...]]',), ' --customize': ('-d DOMAIN', '-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --admin_user': ('[-r TRANSITION_ROLE ]', "[ -w WRITEPATHS ]",), ' --application': ('COMMAND', "[ -w WRITEPATHS ]",), ' --cgi': ('COMMAND', "[ -w WRITEPATHS ]",), ' --confined_admin': ('-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --dbus': ('COMMAND', "[ -w WRITEPATHS ]",), ' --desktop_user': ('', "[ -w WRITEPATHS ]",), ' --inetd': ('COMMAND', "[ -w WRITEPATHS ]",), ' --init': ('COMMAND', "[ -w WRITEPATHS ]",), ' --sandbox': ("[ -w WRITEPATHS ]",), ' --term_user': ("[ -w WRITEPATHS ]",), ' --x_user': ("[ -w WRITEPATHS ]",)} 507 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE 593 from sepolicy.generate import DAEMON, get_poltype_desc, poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE 658 group.add_argument("--sandbox", dest="policytype", const=SANDBOX, 660 help=_("Generate '%s' policy") % poltype[SANDBOX])
|
/docs/source.android.com/src/security/apksigning/ |
index.jd | 44 its Application Sandbox. The signed application certificate defines which user 68 relationship with a shared Application Sandbox is allowed via the <a
|
/docs/source.android.com/src/security/ |
index.jd | 66 restricted by the Application Sandbox.</p> 89 Application Sandbox. Applications get a dedicated part of the filesystem in
|
/docs/source.android.com/src/security/selinux/ |
index.jd | 30 sandboxes. Each application runs in its own sandbox. Prior to Android 4.3, 34 the Android application sandbox.</p>
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/ |
perf_profiler.py | 219 '--no-sandbox', 220 '--allow-sandbox-debugging',
|
strace_profiler.py | 233 '--no-sandbox', 234 '--allow-sandbox-debugging'
|
/external/libvpx/libvpx/third_party/libyuv/source/ |
cpu_id.cc | 132 // This will occur for Chrome sandbox for Pepper or Render process. 161 // This will occur for Chrome sandbox for Pepper or Render process.
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
syscall_sets.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 8 #include "sandbox/linux/system_headers/linux_syscalls.h" 10 namespace sandbox { namespace 819 // These give a lot of ambient authority and bypass the setuid sandbox. 1060 } // namespace sandbox.
|
/external/apache-xml/src/main/java/org/apache/xml/serializer/ |
OutputPropertiesFactory.java | 401 // Repeat IOException handling for sandbox/applet case -sc 456 // No-op for sandbox/applet case, leave null -sc 469 // No-op for sandbox/applet case, leave null -sc
|
/external/autotest/client/cros/bluetooth/ |
bluetooth_semiauto_helper.py | 222 sandbox = 'SANDBOX:<input type="text"/>' 223 html = '<h3>%s</h3>%s' % (message, sandbox)
|
/external/google-breakpad/src/processor/ |
stackwalker_amd64.cc | 278 // Apply constraints from Native Client's x86-64 sandbox. These 279 // registers have the 4GB-aligned sandbox base address (from r15)
|
/external/llvm/docs/HistoricalNotes/ |
2000-11-18-EarlyDesignIdeasResp.txt | 35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code, 48 for value add. The nice safe "sandbox" VM can be provided as a layer
|