| /src/secure/libexec/sshd-auth/ |
| H A D | Makefile | 15 sandbox-null.c sandbox-rlimit.c sandbox-darwin.c \ 16 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-solaris.c \
|
| /src/usr.bin/mandoc/ |
| H A D | mandoc.ucl | 8 sandbox: false 17 sandbox: false
|
| /src/contrib/openbsm/bin/auditdistd/ |
| H A D | Makefile.in | 114 auditdistd-sandbox.$(OBJEXT) auditdistd-sender.$(OBJEXT) \ 378 sandbox.c \ 490 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/auditdistd-sandbox.Po@am__quote@ 657 auditdistd-sandbox.o: sandbox.c 658 …auditdistd-sandbox.o -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o auditdistd-sandbox.o `test… 659 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po 662 …(auditdistd_CFLAGS) $(CFLAGS) -c -o auditdistd-sandbox.o `test -f 'sandbox.c' || echo '$(srcdir)/'… 664 auditdistd-sandbox.obj: sandbox.c 665 …td_CFLAGS) $(CFLAGS) -MT auditdistd-sandbox.obj -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o… 666 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po [all …]
|
| H A D | sandbox.h | 35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
|
| H A D | Makefile.am | 25 sandbox.c \
|
| H A D | sandbox.c | 63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() function
|
| H A D | proto_tls.c | 388 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) in tls_exec_client() 695 if (sandbox(user, true, "proto_tls server") != 0) in tls_exec_server()
|
| H A D | receiver.c | 699 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_receiver()
|
| H A D | sender.c | 805 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_sender()
|
| /src/tools/build/options/ |
| H A D | WITHOUT_MAKE_CHECK_USE_SANDBOX | 3 in limited sandbox mode.
|
| /src/contrib/blocklist/diff/ |
| H A D | ssh.diff | 53 - roaming_common.c roaming_serv.c sandbox-rlimit.c 54 + roaming_common.c roaming_serv.c sandbox-rlimit.c pfilter.c
|
| /src/contrib/file/src/ |
| H A D | file.c | 203 int sandbox = 1; in main() local 326 sandbox = 0; in main() 368 if (sandbox && enable_sandbox() == -1) in main() 370 if (sandbox) in main()
|
| /src/usr.sbin/auditdistd/ |
| H A D | Makefile | 22 SRCS+= sandbox.c sender.c subr.c
|
| /src/contrib/bmake/mk/ |
| H A D | srctop.mk | 37 _SRCTOP_TEST_?= [ -f ../.sandbox-env -o -d share/mk ]
|
| /src/contrib/sendmail/contrib/ |
| H A D | domainmap.m4 | 28 jdoe janedoe@sandbox.bar.com 32 relayed to janedoe@sandbox.bar.com.
|
| /src/usr.bin/xz/ |
| H A D | Makefile | 29 sandbox.c \
|
| /src/crypto/openssh/ |
| H A D | .skipped-commit-ids | 51 052fd565e3ff2d8cec3bc957d1788f50c827f8e2 Switch to tame-based sandbox
|
| H A D | configure.ac | 626 # the --with-solaris-privs option and --with-sandbox=solaris). 800 AC_CHECK_HEADERS([sandbox.h]) 801 AC_CHECK_LIB([sandbox], [sandbox_apply], [ 3750 # Decide which sandbox style to use 3752 AC_ARG_WITH([sandbox], optwith 3753 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec… 3767 # NOFILES so check that both work before enabling the rlimit sandbox. 3875 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function]) 3888 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host]) 3890 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS]) [all …]
|
| H A D | .depend | 105 sandbox-capsicum.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs… 106 sandbox-darwin.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-… 107 sandbox-null.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-co… 108 sandbox-rlimit.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-… 109 sandbox-seccomp-filter.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h … 110 sandbox-solaris.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd… 162 … session.h monitor.h monitor_wrap.h auth-options.h version.h sk-api.h srclimit.h ssh-sandbox.h dh.h
|
| /src/contrib/googletest/docs/ |
| H A D | quickstart-bazel.md | 131 INFO: 27 processes: 8 internal, 19 linux-sandbox.
|
| /src/contrib/tcpdump/ |
| H A D | configure.ac | 243 AC_ARG_WITH(sandbox-capsicum, 244 AS_HELP_STRING([--with-sandbox-capsicum], 277 AC_MSG_CHECKING([whether to sandbox using capsicum]) 284 AC_MSG_CHECKING([whether to sandbox using Casper library])
|
| H A D | configure.in | 206 AC_ARG_WITH(sandbox-capsicum, 207 AS_HELP_STRING([--with-sandbox-capsicum], 229 AC_MSG_CHECKING([whether to sandbox using capsicum])
|
| /src/contrib/xz/ |
| H A D | ChangeLog | 646 Translations: Add src/xz/sandbox.c to POTFILES.in 651 Fixes: 374868d81d47 ("xz: Move sandboxing code to sandbox.c and improve Landlock sandbox.") 660 xz: Never translate "Failed to enable the sandbox" 663 src/xz/sandbox.c in po/POTFILES.in. However, it seems better to never 668 src/xz/sandbox.c | 24 +++++++++++++++--------- 1044 on RHEL 9, xz will fail with the message "Failed to enable the sandbox". 1051 The sandbox is meant to be transparent to users, thus there isn't and 1600 xz, xzdec: Capsicum sandbox: Fix incorrect use of cap_rights_clear() 1606 Fixes: a0eecc235d3b ("xz: Make Capsicum sandbox more strict with stdin and stdout.") 1609 src/xz/sandbox.c | 2 +- [all …]
|
| /src/contrib/openbsm/ |
| H A D | NEWS | 40 available, it uses Capsicum to sandbox the service. This work was
|
| /src/ |
| H A D | UPDATING | 2099 execute from a limited sandbox, as opposed to executing from 2108 If the limited sandbox mode is enabled, "make check" will execute 2110 sandbox if successful. 2115 environment if executing "make check" with limited sandbox mode using
|