HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 226 - 250 of 534) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/autotest/client/cros/
chrome_binary_test.py 20 CHROME_SANDBOX = '/opt/google/chrome/chrome-sandbox'
enterprise_policy_base.py 19 '--google-apis-url=https://www-googleapis-test.sandbox.google.com',
23 'https://cloudprint-nightly-ps.sandbox.google.com/cloudprint'),
27 'https://cloudprint-nightly-ps.sandbox.google.com/cloudprint'),
42 'cr-dev': 'https://cros-dev.sandbox.google.com/devicemanagement/data/api',
43 'cr-auto': 'https://cros-auto.sandbox.google.com/devicemanagement/data/api',
  /external/autotest/client/site_tests/security_BundledExtensions/
baseline 103 "https://www-googleapis-test.sandbox.google.com/*",
  /external/boringssl/src/include/openssl/
rand.h 42 * if, due to a sandbox, /dev/urandom isn't available. If used, it must be
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/fps/
test.py 24 self.fps = FPSConnection(host='fps.sandbox.amazonaws.com')
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_procmaps.h 41 // In some cases, e.g. when running under a sandbox on Linux, ASan is unable
  /external/libchrome/base/debug/
stack_trace.h 31 // In sandboxed processes, this has to be called before the sandbox is turned
  /external/libchrome/sandbox/linux/bpf_dsl/
codegen_unittest.cc 5 #include "sandbox/linux/bpf_dsl/codegen.h"
17 #include "sandbox/linux/system_headers/linux_filter.h"
20 namespace sandbox { namespace
404 } // namespace sandbox
  /external/libchrome/sandbox/linux/seccomp-bpf/
syscall.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
11 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
13 namespace sandbox { namespace
421 } // namespace sandbox
  /external/libchrome/sandbox/win/wow_helper/
wow_helper.vcproj 189 Name="sandbox"
  /external/minijail/
elfparse.c 92 * static interpreters escaping the sandbox.
  /external/selinux/libsemanage/src/
semanage_store.h 39 /* sandbox filenames and paths */
  /external/selinux/policycoreutils/sepolicy/
Makefile 13 SHAREDIR ?= $(PREFIX)/share/sandbox
sepolicy.py 44 usage_dict = {' --newtype': ('-t [TYPES [TYPES ...]]',), ' --customize': ('-d DOMAIN', '-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --admin_user': ('[-r TRANSITION_ROLE ]', "[ -w WRITEPATHS ]",), ' --application': ('COMMAND', "[ -w WRITEPATHS ]",), ' --cgi': ('COMMAND', "[ -w WRITEPATHS ]",), ' --confined_admin': ('-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --dbus': ('COMMAND', "[ -w WRITEPATHS ]",), ' --desktop_user': ('', "[ -w WRITEPATHS ]",), ' --inetd': ('COMMAND', "[ -w WRITEPATHS ]",), ' --init': ('COMMAND', "[ -w WRITEPATHS ]",), ' --sandbox': ("[ -w WRITEPATHS ]",), ' --term_user': ("[ -w WRITEPATHS ]",), ' --x_user': ("[ -w WRITEPATHS ]",)}
507 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE
593 from sepolicy.generate import DAEMON, get_poltype_desc, poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE
658 group.add_argument("--sandbox", dest="policytype", const=SANDBOX,
660 help=_("Generate '%s' policy") % poltype[SANDBOX])
  /docs/source.android.com/src/security/apksigning/
index.jd 44 its Application Sandbox. The signed application certificate defines which user
68 relationship with a shared Application Sandbox is allowed via the <a
  /docs/source.android.com/src/security/
index.jd 66 restricted by the Application Sandbox.</p>
89 Application Sandbox. Applications get a dedicated part of the filesystem in
  /docs/source.android.com/src/security/selinux/
index.jd 30 sandboxes. Each application runs in its own sandbox. Prior to Android 4.3,
34 the Android application sandbox.</p>
  /external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/
perf_profiler.py 219 '--no-sandbox',
220 '--allow-sandbox-debugging',
strace_profiler.py 233 '--no-sandbox',
234 '--allow-sandbox-debugging'
  /external/libvpx/libvpx/third_party/libyuv/source/
cpu_id.cc 132 // This will occur for Chrome sandbox for Pepper or Render process.
161 // This will occur for Chrome sandbox for Pepper or Render process.
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
8 #include "sandbox/linux/system_headers/linux_syscalls.h"
10 namespace sandbox { namespace
819 // These give a lot of ambient authority and bypass the setuid sandbox.
1060 } // namespace sandbox.
  /external/apache-xml/src/main/java/org/apache/xml/serializer/
OutputPropertiesFactory.java 401 // Repeat IOException handling for sandbox/applet case -sc
456 // No-op for sandbox/applet case, leave null -sc
469 // No-op for sandbox/applet case, leave null -sc
  /external/autotest/client/cros/bluetooth/
bluetooth_semiauto_helper.py 222 sandbox = 'SANDBOX:<input type="text"/>'
223 html = '<h3>%s</h3>%s' % (message, sandbox)
  /external/google-breakpad/src/processor/
stackwalker_amd64.cc 278 // Apply constraints from Native Client's x86-64 sandbox. These
279 // registers have the 4GB-aligned sandbox base address (from r15)
  /external/llvm/docs/HistoricalNotes/
2000-11-18-EarlyDesignIdeasResp.txt 35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code,
48 for value add. The nice safe "sandbox" VM can be provided as a layer

Completed in 1449 milliseconds

1 2 3 4 5 6 7 8 91011>>