Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 40) sorted by relevance

12

/freebsd/secure/libexec/sshd-auth/
H A DMakefile15 sandbox-null.c sandbox-rlimit.c sandbox-darwin.c \
16 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-solaris.c \
/freebsd/usr.bin/mandoc/
H A Dmandoc.ucl8 sandbox: false
17 sandbox: false
/freebsd/contrib/openbsm/bin/auditdistd/
H A DMakefile.in114 auditdistd-sandbox.$(OBJEXT) auditdistd-sender.$(OBJEXT) \
378 sandbox.c \
490 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/auditdistd-sandbox.Po@am__quote@
657 auditdistd-sandbox.o: sandbox.c
658 …auditdistd-sandbox.o -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o auditdistd-sandbox.o `test…
659 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po
662 …(auditdistd_CFLAGS) $(CFLAGS) -c -o auditdistd-sandbox.o `test -f 'sandbox.c' || echo '$(srcdir)/'…
664 auditdistd-sandbox.obj: sandbox.c
665 …td_CFLAGS) $(CFLAGS) -MT auditdistd-sandbox.obj -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o…
666 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po
[all …]
H A Dsandbox.h35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
H A DMakefile.am25 sandbox.c \
H A Dsandbox.c63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() function
H A Dproto_tls.c388 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) in tls_exec_client()
695 if (sandbox(user, true, "proto_tls server") != 0) in tls_exec_server()
H A Dreceiver.c699 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_receiver()
H A Dsender.c805 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_sender()
/freebsd/crypto/openssh/
H A D.skipped-commit-ids48 7e8178786157e863f6ff63c5d55200d7b6b04f9e remove old sandbox files
59 052fd565e3ff2d8cec3bc957d1788f50c827f8e2 Switch to tame-based sandbox
H A Dconfigure.ac683 # the --with-solaris-privs option and --with-sandbox=solaris).
858 AC_CHECK_HEADERS([sandbox.h])
859 AC_CHECK_LIB([sandbox], [sandbox_apply], [
3911 # Decide which sandbox style to use
3913 AC_ARG_WITH([sandbox], optwith
3914 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec…
3928 # NOFILES so check that both work before enabling the rlimit sandbox.
4036 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function])
4049 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host])
4051 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS])
[all …]
H A DChangeLog286 seccomp sandbox: allow riscv_hwprobe syscall if present
292 As the seccomp sandbox of OpenSSH will raise SIGSYS for filtered out
2193 seccomp sandbox: allow uname(3)
2199 Allow it in the seccomp sandbox.
4309 OpenBSD has recently relaxed the pledge(2) sandbox to allow some
4422 allow some socket syscalls in seccomp sandbox
4431 terminate the whole process with a sandbox violation).
4439 handle futex_time64 properly in seccomp sandbox
4443 in the sandbox, but because of a macro error only __NR_futex was
7988 the first use of the RNG comes after the sandbox init and it can't
[all …]
H A D.depend104 sandbox-capsicum.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs…
105 sandbox-darwin.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
106 sandbox-null.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-co…
107 sandbox-rlimit.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
108 sandbox-seccomp-filter.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h …
109 sandbox-solaris.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd…
159 … session.h monitor.h monitor_wrap.h auth-options.h version.h sk-api.h srclimit.h ssh-sandbox.h dh.h
/freebsd/tools/build/options/
H A DWITHOUT_MAKE_CHECK_USE_SANDBOX3 in limited sandbox mode.
/freebsd/contrib/blocklist/diff/
H A Dssh.diff53 - roaming_common.c roaming_serv.c sandbox-rlimit.c
54 + roaming_common.c roaming_serv.c sandbox-rlimit.c pfilter.c
/freebsd/contrib/file/src/
H A Dfile.c203 int sandbox = 1; in main() local
326 sandbox = 0; in main()
368 if (sandbox && enable_sandbox() == -1) in main()
370 if (sandbox) in main()
/freebsd/usr.sbin/auditdistd/
H A DMakefile22 SRCS+= sandbox.c sender.c subr.c
/freebsd/contrib/bmake/mk/
H A Dsrctop.mk37 _SRCTOP_TEST_?= [ -f ../.sandbox-env -o -d share/mk ]
/freebsd/contrib/sendmail/contrib/
H A Ddomainmap.m428 jdoe janedoe@sandbox.bar.com
32 relayed to janedoe@sandbox.bar.com.
/freebsd/usr.bin/xz/
H A DMakefile29 sandbox.c \
/freebsd/contrib/googletest/docs/
H A Dquickstart-bazel.md131 INFO: 27 processes: 8 internal, 19 linux-sandbox.
/freebsd/contrib/tcpdump/
H A Dconfigure.ac243 AC_ARG_WITH(sandbox-capsicum,
244 AS_HELP_STRING([--with-sandbox-capsicum],
277 AC_MSG_CHECKING([whether to sandbox using capsicum])
284 AC_MSG_CHECKING([whether to sandbox using Casper library])
H A Dconfigure.in206 AC_ARG_WITH(sandbox-capsicum,
207 AS_HELP_STRING([--with-sandbox-capsicum],
229 AC_MSG_CHECKING([whether to sandbox using capsicum])
/freebsd/contrib/xz/
H A DChangeLog646 Translations: Add src/xz/sandbox.c to POTFILES.in
651 Fixes: 374868d81d47 ("xz: Move sandboxing code to sandbox.c and improve Landlock sandbox.")
660 xz: Never translate "Failed to enable the sandbox"
663 src/xz/sandbox.c in po/POTFILES.in. However, it seems better to never
668 src/xz/sandbox.c | 24 +++++++++++++++---------
1044 on RHEL 9, xz will fail with the message "Failed to enable the sandbox".
1051 The sandbox is meant to be transparent to users, thus there isn't and
1600 xz, xzdec: Capsicum sandbox: Fix incorrect use of cap_rights_clear()
1606 Fixes: a0eecc235d3b ("xz: Make Capsicum sandbox more strict with stdin and stdout.")
1609 src/xz/sandbox.c | 2 +-
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Passes/
H A DPassRegistry.def527 FUNCTION_PASS("sandbox-vectorizer", SandboxVectorizerPass())

12