/freebsd/secure/libexec/sshd-session/ |
H A D | Makefile | 16 sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.c \ 17 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-pledge.c \ 18 sandbox-solaris.c uidswap.c
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | Makefile.in | 114 auditdistd-sandbox.$(OBJEXT) auditdistd-sender.$(OBJEXT) \ 378 sandbox.c \ 490 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/auditdistd-sandbox.Po@am__quote@ 657 auditdistd-sandbox.o: sandbox.c 658 …auditdistd-sandbox.o -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o auditdistd-sandbox.o `test… 659 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po 662 …(auditdistd_CFLAGS) $(CFLAGS) -c -o auditdistd-sandbox.o `test -f 'sandbox.c' || echo '$(srcdir)/'… 664 auditdistd-sandbox.obj: sandbox.c 665 …td_CFLAGS) $(CFLAGS) -MT auditdistd-sandbox.obj -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o… 666 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po [all …]
|
H A D | sandbox.h | 35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
|
H A D | Makefile.am | 25 sandbox.c \
|
H A D | sandbox.c | 63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() function
|
H A D | proto_tls.c | 388 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) in tls_exec_client() 695 if (sandbox(user, true, "proto_tls server") != 0) in tls_exec_server()
|
H A D | receiver.c | 699 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_receiver()
|
H A D | sender.c | 805 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_sender()
|
/freebsd/tools/build/options/ |
H A D | WITHOUT_MAKE_CHECK_USE_SANDBOX | 3 in limited sandbox mode.
|
/freebsd/contrib/blocklist/diff/ |
H A D | ssh.diff | 53 - roaming_common.c roaming_serv.c sandbox-rlimit.c 54 + roaming_common.c roaming_serv.c sandbox-rlimit.c pfilter.c
|
/freebsd/contrib/file/src/ |
H A D | file.c | 203 int sandbox = 1; in main() local 326 sandbox = 0; in main() 368 if (sandbox && enable_sandbox() == -1) in main() 370 if (sandbox) in main()
|
/freebsd/usr.sbin/auditdistd/ |
H A D | Makefile | 22 SRCS+= sandbox.c sender.c subr.c
|
/freebsd/contrib/sendmail/contrib/ |
H A D | domainmap.m4 | 28 jdoe janedoe@sandbox.bar.com 32 relayed to janedoe@sandbox.bar.com.
|
/freebsd/contrib/bmake/mk/ |
H A D | srctop.mk | 44 _SRCTOP_TEST_?= [ -f ../.sandbox-env -o -d share/mk ]
|
/freebsd/usr.bin/xz/ |
H A D | Makefile | 27 sandbox.c \
|
/freebsd/crypto/openssh/ |
H A D | .skipped-commit-ids | 49 052fd565e3ff2d8cec3bc957d1788f50c827f8e2 Switch to tame-based sandbox
|
H A D | configure.ac | 619 # the --with-solaris-privs option and --with-sandbox=solaris). 788 AC_CHECK_HEADERS([sandbox.h]) 789 AC_CHECK_LIB([sandbox], [sandbox_apply], [ 3669 # Decide which sandbox style to use 3671 AC_ARG_WITH([sandbox], optwith 3672 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec… 3686 # NOFILES so check that both work before enabling the rlimit sandbox. 3792 AC_MSG_ERROR([pledge sandbox requires pledge(2) support]) 3798 AC_MSG_ERROR([systrace sandbox requires systrace headers and SYSTR_POLICY_KILL support]) 3806 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function]) [all …]
|
H A D | .depend | 105 sandbox-capsicum.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs… 106 sandbox-darwin.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-… 107 sandbox-null.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-co… 108 sandbox-pledge.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-… 109 sandbox-rlimit.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-… 110 sandbox-seccomp-filter.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h … 111 sandbox-solaris.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd… 112 sandbox-systrace.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs… 164 …inrec.h authfd.h msg.h channels.h session.h monitor.h monitor_wrap.h ssh-sandbox.h auth-options.h …
|
/freebsd/contrib/googletest/docs/ |
H A D | quickstart-bazel.md | 138 INFO: 27 processes: 8 internal, 19 linux-sandbox.
|
/freebsd/contrib/tcpdump/ |
H A D | configure.ac | 238 AC_ARG_WITH(sandbox-capsicum, 239 AS_HELP_STRING([--with-sandbox-capsicum], 272 AC_MSG_CHECKING([whether to sandbox using capsicum]) 279 AC_MSG_CHECKING([whether to sandbox using Casper library])
|
H A D | configure.in | 206 AC_ARG_WITH(sandbox-capsicum, 207 AS_HELP_STRING([--with-sandbox-capsicum], 229 AC_MSG_CHECKING([whether to sandbox using capsicum])
|
/freebsd/ |
H A D | UPDATING | 1680 execute from a limited sandbox, as opposed to executing from 1689 If the limited sandbox mode is enabled, "make check" will execute 1691 sandbox if successful. 1696 environment if executing "make check" with limited sandbox mode using
|
/freebsd/contrib/openbsm/ |
H A D | NEWS | 40 available, it uses Capsicum to sandbox the service. This work was
|
/freebsd/contrib/llvm-project/libcxx/include/ |
H A D | __config | 295 // NaCl's sandbox (which PNaCl also runs in) doesn't allow filesystem access,
|
/freebsd/contrib/ntp/ |
H A D | CommitLog | 4842 tests/sandbox/smeartest.c@1.12 +0 -0 5184 tests/sandbox/smeartest.c@1.11 +1 -1 7710 tests/sandbox/Makefile.am@1.14 +3 -20 12312 tests/sandbox/run-modetoa.c@1.5 +2 -0 12316 tests/sandbox/run-uglydate.c@1.9 +2 -0 12320 tests/sandbox/run-ut-2803.c@1.4 +2 -0 12324 tests/sandbox/testconf.yml@1.2 +2 -1 14989 tests/sandbox/Makefile.am@1.13 +1 -0 15860 tests/sandbox/Makefile.am@1.12 +4 -0 16064 tests/sandbox/Makefil [all...] |