| /freebsd/secure/libexec/sshd-auth/ |
| H A D | Makefile | 15 sandbox-null.c sandbox-rlimit.c sandbox-darwin.c \ 16 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-solaris.c \
|
| /freebsd/usr.bin/mandoc/ |
| H A D | mandoc.ucl | 8 sandbox: false 17 sandbox: false
|
| /freebsd/contrib/openbsm/bin/auditdistd/ |
| H A D | Makefile.in | 114 auditdistd-sandbox.$(OBJEXT) auditdistd-sender.$(OBJEXT) \ 378 sandbox.c \ 490 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/auditdistd-sandbox.Po@am__quote@ 657 auditdistd-sandbox.o: sandbox.c 658 …auditdistd-sandbox.o -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o auditdistd-sandbox.o `test… 659 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po 662 …(auditdistd_CFLAGS) $(CFLAGS) -c -o auditdistd-sandbox.o `test -f 'sandbox.c' || echo '$(srcdir)/'… 664 auditdistd-sandbox.obj: sandbox.c 665 …td_CFLAGS) $(CFLAGS) -MT auditdistd-sandbox.obj -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o… 666 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po [all …]
|
| H A D | sandbox.h | 35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
|
| H A D | Makefile.am | 25 sandbox.c \
|
| H A D | sandbox.c | 63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() function
|
| H A D | proto_tls.c | 388 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) in tls_exec_client() 695 if (sandbox(user, true, "proto_tls server") != 0) in tls_exec_server()
|
| H A D | receiver.c | 699 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_receiver()
|
| H A D | sender.c | 805 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_sender()
|
| /freebsd/crypto/openssh/ |
| H A D | .skipped-commit-ids | 48 7e8178786157e863f6ff63c5d55200d7b6b04f9e remove old sandbox files 59 052fd565e3ff2d8cec3bc957d1788f50c827f8e2 Switch to tame-based sandbox
|
| H A D | configure.ac | 683 # the --with-solaris-privs option and --with-sandbox=solaris). 858 AC_CHECK_HEADERS([sandbox.h]) 859 AC_CHECK_LIB([sandbox], [sandbox_apply], [ 3911 # Decide which sandbox style to use 3913 AC_ARG_WITH([sandbox], optwith 3914 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec… 3928 # NOFILES so check that both work before enabling the rlimit sandbox. 4036 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function]) 4049 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host]) 4051 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS]) [all …]
|
| H A D | ChangeLog | 286 seccomp sandbox: allow riscv_hwprobe syscall if present 292 As the seccomp sandbox of OpenSSH will raise SIGSYS for filtered out 2193 seccomp sandbox: allow uname(3) 2199 Allow it in the seccomp sandbox. 4309 OpenBSD has recently relaxed the pledge(2) sandbox to allow some 4422 allow some socket syscalls in seccomp sandbox 4431 terminate the whole process with a sandbox violation). 4439 handle futex_time64 properly in seccomp sandbox 4443 in the sandbox, but because of a macro error only __NR_futex was 7988 the first use of the RNG comes after the sandbox init and it can't [all …]
|
| H A D | .depend | 104 sandbox-capsicum.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs… 105 sandbox-darwin.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-… 106 sandbox-null.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-co… 107 sandbox-rlimit.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-… 108 sandbox-seccomp-filter.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h … 109 sandbox-solaris.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd… 159 … session.h monitor.h monitor_wrap.h auth-options.h version.h sk-api.h srclimit.h ssh-sandbox.h dh.h
|
| /freebsd/tools/build/options/ |
| H A D | WITHOUT_MAKE_CHECK_USE_SANDBOX | 3 in limited sandbox mode.
|
| /freebsd/contrib/blocklist/diff/ |
| H A D | ssh.diff | 53 - roaming_common.c roaming_serv.c sandbox-rlimit.c 54 + roaming_common.c roaming_serv.c sandbox-rlimit.c pfilter.c
|
| /freebsd/contrib/file/src/ |
| H A D | file.c | 203 int sandbox = 1; in main() local 326 sandbox = 0; in main() 368 if (sandbox && enable_sandbox() == -1) in main() 370 if (sandbox) in main()
|
| /freebsd/usr.sbin/auditdistd/ |
| H A D | Makefile | 22 SRCS+= sandbox.c sender.c subr.c
|
| /freebsd/contrib/bmake/mk/ |
| H A D | srctop.mk | 37 _SRCTOP_TEST_?= [ -f ../.sandbox-env -o -d share/mk ]
|
| /freebsd/contrib/sendmail/contrib/ |
| H A D | domainmap.m4 | 28 jdoe janedoe@sandbox.bar.com 32 relayed to janedoe@sandbox.bar.com.
|
| /freebsd/usr.bin/xz/ |
| H A D | Makefile | 29 sandbox.c \
|
| /freebsd/contrib/googletest/docs/ |
| H A D | quickstart-bazel.md | 131 INFO: 27 processes: 8 internal, 19 linux-sandbox.
|
| /freebsd/contrib/tcpdump/ |
| H A D | configure.ac | 243 AC_ARG_WITH(sandbox-capsicum, 244 AS_HELP_STRING([--with-sandbox-capsicum], 277 AC_MSG_CHECKING([whether to sandbox using capsicum]) 284 AC_MSG_CHECKING([whether to sandbox using Casper library])
|
| H A D | configure.in | 206 AC_ARG_WITH(sandbox-capsicum, 207 AS_HELP_STRING([--with-sandbox-capsicum], 229 AC_MSG_CHECKING([whether to sandbox using capsicum])
|
| /freebsd/contrib/xz/ |
| H A D | ChangeLog | 646 Translations: Add src/xz/sandbox.c to POTFILES.in 651 Fixes: 374868d81d47 ("xz: Move sandboxing code to sandbox.c and improve Landlock sandbox.") 660 xz: Never translate "Failed to enable the sandbox" 663 src/xz/sandbox.c in po/POTFILES.in. However, it seems better to never 668 src/xz/sandbox.c | 24 +++++++++++++++--------- 1044 on RHEL 9, xz will fail with the message "Failed to enable the sandbox". 1051 The sandbox is meant to be transparent to users, thus there isn't and 1600 xz, xzdec: Capsicum sandbox: Fix incorrect use of cap_rights_clear() 1606 Fixes: a0eecc235d3b ("xz: Make Capsicum sandbox more strict with stdin and stdout.") 1609 src/xz/sandbox.c | 2 +- [all …]
|
| /freebsd/contrib/llvm-project/llvm/lib/Passes/ |
| H A D | PassRegistry.def | 527 FUNCTION_PASS("sandbox-vectorizer", SandboxVectorizerPass())
|