HomeSort by relevance Sort by last modified time
    Searched full:sandboxed (Results 1 - 25 of 57) sorted by null

1 2 3

  /external/autotest/client/site_tests/security_RendererSandbox/
control 3 PURPOSE = "Basic check to ensure renderer is sandboxed/jailed in Chromium OS."
6 sandboxed/jailed.
16 This test simply checks if a page is loaded within the sandboxed/jailed
security_RendererSandbox.py 29 # which is not setuid sandboxed, as the pid of a renderer,
62 # Check if renderer is sandboxed.
  /external/autotest/client/site_tests/security_SandboxStatus/
security_SandboxStatus.py 36 '''Checks that chrome://sandbox shows "You are adequately sandboxed."'''
41 text = 'You are adequately sandboxed.'
48 Checks that chrome://gpu has "Sandboxed" row, and "Sandboxed" is True.
54 raise error.TestFail('"Sandboxed" not True in %s' % url)
57 '''Open various sandbox-related pages and test that we are sandboxed.'''
  /external/autotest/client/site_tests/security_SandboxedServices/
control 9 PURPOSE = "To maintain sensitive system services correctly sandboxed."
security_SandboxedServices.py 82 whether (and how) they are sandboxed.
139 each running service is sandboxed.
170 """Inspects the process list, looking for root and sandboxed processes
172 confirms it's an exact match. Warns if we see root or sandboxed
225 # If this process is supposed to be sandboxed
228 # it's not sandboxed wrt the baseline.
  /external/libchrome/sandbox/linux/syscall_broker/
broker_host.h 17 // The BrokerHost class should be embedded in a (presumably not sandboxed)
broker_client.h 18 // This class can be embedded in a sandboxed process and can be
20 // non-sandboxed process (which embeds BrokerHost).
  /external/opencv3/3rdparty/jinja2/
sandbox.py 181 """The sandboxed environment. It works like the regular environment but
182 tells the compiler to generate sandboxed code. Additionally subclasses of
190 sandboxed = True variable in class:SandboxedEnvironment
193 #: available on each instance of a sandboxed environment as
206 #: available on each instance of a sandboxed environment as
269 """The sandboxed environment will call this method to check if the
305 """Subscribe an object from sandboxed code."""
326 """Subscribe an object from sandboxed code and prefer the
351 """Call an object from sandboxed code."""
__init__.py 8 an optional sandboxed environment.
  /external/libchrome/sandbox/linux/suid/common/
sandbox.h 27 // These are the magic byte values which the sandboxed process uses to request
  /external/chromium-trace/catapult/third_party/webapp2/docs/tutorials/
virtualenv.rst 13 a "sandboxed environment" that serves almost the same purposes.
  /external/libchrome/base/trace_event/
process_memory_totals_dump_provider.cc 60 // TODO(ssid): Fix crbug.com/461788 to write to the file from sandboxed
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.h 23 // code in a sandboxed environment.
syscall_parameters_restrictions.h 72 // of the sandboxed process or 0 (indicating the current thread). The following
  /external/libchrome/sandbox/win/src/
interception_internal.h 6 // for the sandboxed process. For more details see:
sandbox_policy.h 54 // the sandboxed application is at least INTERACTIVE.
138 // Sets a hard limit on the size of the commit set for the sandboxed process.
175 // Sets the AppContainer to be used for the sandboxed process. Any capability
179 // launching the sandboxed process will fail. See BrokerServices for details
186 // Sets a capability to be enabled for the sandboxed process' AppContainer.
189 // Sets the LowBox token for sandboxed process. This is mutually exclusive
  /build/core/combo/
HOST_darwin-x86_64.mk 24 # Statically-linked binaries are desirable for sandboxed environment
HOST_linux-x86_64.mk 40 # Statically-linked binaries are desirable for sandboxed environment
HOST_CROSS_windows-x86.mk 55 # Statically-linked binaries are desirable for sandboxed environment
HOST_CROSS_windows-x86_64.mk 55 # Statically-linked binaries are desirable for sandboxed environment
HOST_darwin-x86.mk 24 # Statically-linked binaries are desirable for sandboxed environment
HOST_linux-x86.mk 41 # Statically-linked binaries are desirable for sandboxed environment
  /external/chromium-trace/catapult/telemetry/telemetry/testing/internal/
fake_gpu_info.py 39 'sandboxed': True,
  /external/libchrome/base/debug/
stack_trace.h 31 // In sandboxed processes, this has to be called before the sandbox is turned
  /external/libchrome/base/threading/
platform_thread_linux.cc 98 // We expect EPERM failures in sandboxed processes, just ignore those.

Completed in 752 milliseconds

1 2 3