Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 35) sorted by relevance

12

/freebsd/secure/libexec/sshd-session/
H A DMakefile16 sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.c \
17 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-pledge.c \
18 sandbox-solaris.c uidswap.c
/freebsd/contrib/openbsm/bin/auditdistd/
H A DMakefile.in114 auditdistd-sandbox.$(OBJEXT) auditdistd-sender.$(OBJEXT) \
378 sandbox.c \
490 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/auditdistd-sandbox.Po@am__quote@
657 auditdistd-sandbox.o: sandbox.c
658 …auditdistd-sandbox.o -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o auditdistd-sandbox.o `test…
659 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po
662 …(auditdistd_CFLAGS) $(CFLAGS) -c -o auditdistd-sandbox.o `test -f 'sandbox.c' || echo '$(srcdir)/'…
664 auditdistd-sandbox.obj: sandbox.c
665 …td_CFLAGS) $(CFLAGS) -MT auditdistd-sandbox.obj -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o…
666 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po
[all …]
H A Dsandbox.h35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
H A DMakefile.am25 sandbox.c \
H A Dsandbox.c63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() function
H A Dproto_tls.c388 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) in tls_exec_client()
695 if (sandbox(user, true, "proto_tls server") != 0) in tls_exec_server()
H A Dreceiver.c699 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_receiver()
H A Dsender.c805 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_sender()
/freebsd/tools/build/options/
H A DWITHOUT_MAKE_CHECK_USE_SANDBOX3 in limited sandbox mode.
/freebsd/contrib/blocklist/diff/
H A Dssh.diff53 - roaming_common.c roaming_serv.c sandbox-rlimit.c
54 + roaming_common.c roaming_serv.c sandbox-rlimit.c pfilter.c
/freebsd/contrib/file/src/
H A Dfile.c203 int sandbox = 1; in main() local
326 sandbox = 0; in main()
368 if (sandbox && enable_sandbox() == -1) in main()
370 if (sandbox) in main()
/freebsd/usr.sbin/auditdistd/
H A DMakefile22 SRCS+= sandbox.c sender.c subr.c
/freebsd/contrib/sendmail/contrib/
H A Ddomainmap.m428 jdoe janedoe@sandbox.bar.com
32 relayed to janedoe@sandbox.bar.com.
/freebsd/contrib/bmake/mk/
H A Dsrctop.mk44 _SRCTOP_TEST_?= [ -f ../.sandbox-env -o -d share/mk ]
/freebsd/usr.bin/xz/
H A DMakefile27 sandbox.c \
/freebsd/crypto/openssh/
H A D.skipped-commit-ids49 052fd565e3ff2d8cec3bc957d1788f50c827f8e2 Switch to tame-based sandbox
H A Dconfigure.ac619 # the --with-solaris-privs option and --with-sandbox=solaris).
788 AC_CHECK_HEADERS([sandbox.h])
789 AC_CHECK_LIB([sandbox], [sandbox_apply], [
3669 # Decide which sandbox style to use
3671 AC_ARG_WITH([sandbox], optwith
3672 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec…
3686 # NOFILES so check that both work before enabling the rlimit sandbox.
3792 AC_MSG_ERROR([pledge sandbox requires pledge(2) support])
3798 AC_MSG_ERROR([systrace sandbox requires systrace headers and SYSTR_POLICY_KILL support])
3806 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function])
[all …]
H A D.depend105 sandbox-capsicum.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs…
106 sandbox-darwin.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
107 sandbox-null.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-co…
108 sandbox-pledge.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
109 sandbox-rlimit.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
110 sandbox-seccomp-filter.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h …
111 sandbox-solaris.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd…
112 sandbox-systrace.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs…
164 …inrec.h authfd.h msg.h channels.h session.h monitor.h monitor_wrap.h ssh-sandbox.h auth-options.h …
/freebsd/contrib/googletest/docs/
H A Dquickstart-bazel.md138 INFO: 27 processes: 8 internal, 19 linux-sandbox.
/freebsd/contrib/tcpdump/
H A Dconfigure.ac238 AC_ARG_WITH(sandbox-capsicum,
239 AS_HELP_STRING([--with-sandbox-capsicum],
272 AC_MSG_CHECKING([whether to sandbox using capsicum])
279 AC_MSG_CHECKING([whether to sandbox using Casper library])
H A Dconfigure.in206 AC_ARG_WITH(sandbox-capsicum,
207 AS_HELP_STRING([--with-sandbox-capsicum],
229 AC_MSG_CHECKING([whether to sandbox using capsicum])
/freebsd/
H A DUPDATING1680 execute from a limited sandbox, as opposed to executing from
1689 If the limited sandbox mode is enabled, "make check" will execute
1691 sandbox if successful.
1696 environment if executing "make check" with limited sandbox mode using
/freebsd/contrib/openbsm/
H A DNEWS40 available, it uses Capsicum to sandbox the service. This work was
/freebsd/contrib/llvm-project/libcxx/include/
H A D__config295 // NaCl's sandbox (which PNaCl also runs in) doesn't allow filesystem access,
/freebsd/contrib/ntp/
H A DCommitLog4842 tests/sandbox/smeartest.c@1.12 +0 -0
5184 tests/sandbox/smeartest.c@1.11 +1 -1
7710 tests/sandbox/Makefile.am@1.14 +3 -20
12312 tests/sandbox/run-modetoa.c@1.5 +2 -0
12316 tests/sandbox/run-uglydate.c@1.9 +2 -0
12320 tests/sandbox/run-ut-2803.c@1.4 +2 -0
12324 tests/sandbox/testconf.yml@1.2 +2 -1
14989 tests/sandbox/Makefile.am@1.13 +1 -0
15860 tests/sandbox/Makefile.am@1.12 +4 -0
16064 tests/sandbox/Makefil
[all...]

12