Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 38) sorted by relevance

12

/src/secure/libexec/sshd-auth/
H A DMakefile15 sandbox-null.c sandbox-rlimit.c sandbox-darwin.c \
16 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-solaris.c \
/src/usr.bin/mandoc/
H A Dmandoc.ucl8 sandbox: false
17 sandbox: false
/src/contrib/openbsm/bin/auditdistd/
H A DMakefile.in114 auditdistd-sandbox.$(OBJEXT) auditdistd-sender.$(OBJEXT) \
378 sandbox.c \
490 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/auditdistd-sandbox.Po@am__quote@
657 auditdistd-sandbox.o: sandbox.c
658 …auditdistd-sandbox.o -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o auditdistd-sandbox.o `test…
659 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po
662 …(auditdistd_CFLAGS) $(CFLAGS) -c -o auditdistd-sandbox.o `test -f 'sandbox.c' || echo '$(srcdir)/'…
664 auditdistd-sandbox.obj: sandbox.c
665 …td_CFLAGS) $(CFLAGS) -MT auditdistd-sandbox.obj -MD -MP -MF $(DEPDIR)/auditdistd-sandbox.Tpo -c -o…
666 …astdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/auditdistd-sandbox.Tpo $(DEPDIR)/auditdistd-sandbox.Po
[all …]
H A Dsandbox.h35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
H A DMakefile.am25 sandbox.c \
H A Dsandbox.c63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() function
H A Dproto_tls.c388 if (sandbox(user, true, "proto_tls client: %s", dstaddr) != 0) in tls_exec_client()
695 if (sandbox(user, true, "proto_tls server") != 0) in tls_exec_server()
H A Dreceiver.c699 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_receiver()
H A Dsender.c805 if (sandbox(ADIST_USER, true, "auditdistd: %s (%s)", in adist_sender()
/src/tools/build/options/
H A DWITHOUT_MAKE_CHECK_USE_SANDBOX3 in limited sandbox mode.
/src/contrib/blocklist/diff/
H A Dssh.diff53 - roaming_common.c roaming_serv.c sandbox-rlimit.c
54 + roaming_common.c roaming_serv.c sandbox-rlimit.c pfilter.c
/src/contrib/file/src/
H A Dfile.c203 int sandbox = 1; in main() local
326 sandbox = 0; in main()
368 if (sandbox && enable_sandbox() == -1) in main()
370 if (sandbox) in main()
/src/usr.sbin/auditdistd/
H A DMakefile22 SRCS+= sandbox.c sender.c subr.c
/src/contrib/bmake/mk/
H A Dsrctop.mk37 _SRCTOP_TEST_?= [ -f ../.sandbox-env -o -d share/mk ]
/src/contrib/sendmail/contrib/
H A Ddomainmap.m428 jdoe janedoe@sandbox.bar.com
32 relayed to janedoe@sandbox.bar.com.
/src/usr.bin/xz/
H A DMakefile29 sandbox.c \
/src/crypto/openssh/
H A D.skipped-commit-ids51 052fd565e3ff2d8cec3bc957d1788f50c827f8e2 Switch to tame-based sandbox
H A Dconfigure.ac626 # the --with-solaris-privs option and --with-sandbox=solaris).
800 AC_CHECK_HEADERS([sandbox.h])
801 AC_CHECK_LIB([sandbox], [sandbox_apply], [
3750 # Decide which sandbox style to use
3752 AC_ARG_WITH([sandbox], optwith
3753 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec…
3767 # NOFILES so check that both work before enabling the rlimit sandbox.
3875 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function])
3888 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host])
3890 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS])
[all …]
H A D.depend105 sandbox-capsicum.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbs…
106 sandbox-darwin.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
107 sandbox-null.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-co…
108 sandbox-rlimit.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
109 sandbox-seccomp-filter.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h …
110 sandbox-solaris.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd…
162 … session.h monitor.h monitor_wrap.h auth-options.h version.h sk-api.h srclimit.h ssh-sandbox.h dh.h
/src/contrib/googletest/docs/
H A Dquickstart-bazel.md131 INFO: 27 processes: 8 internal, 19 linux-sandbox.
/src/contrib/tcpdump/
H A Dconfigure.ac243 AC_ARG_WITH(sandbox-capsicum,
244 AS_HELP_STRING([--with-sandbox-capsicum],
277 AC_MSG_CHECKING([whether to sandbox using capsicum])
284 AC_MSG_CHECKING([whether to sandbox using Casper library])
H A Dconfigure.in206 AC_ARG_WITH(sandbox-capsicum,
207 AS_HELP_STRING([--with-sandbox-capsicum],
229 AC_MSG_CHECKING([whether to sandbox using capsicum])
/src/contrib/xz/
H A DChangeLog646 Translations: Add src/xz/sandbox.c to POTFILES.in
651 Fixes: 374868d81d47 ("xz: Move sandboxing code to sandbox.c and improve Landlock sandbox.")
660 xz: Never translate "Failed to enable the sandbox"
663 src/xz/sandbox.c in po/POTFILES.in. However, it seems better to never
668 src/xz/sandbox.c | 24 +++++++++++++++---------
1044 on RHEL 9, xz will fail with the message "Failed to enable the sandbox".
1051 The sandbox is meant to be transparent to users, thus there isn't and
1600 xz, xzdec: Capsicum sandbox: Fix incorrect use of cap_rights_clear()
1606 Fixes: a0eecc235d3b ("xz: Make Capsicum sandbox more strict with stdin and stdout.")
1609 src/xz/sandbox.c | 2 +-
[all …]
/src/contrib/openbsm/
H A DNEWS40 available, it uses Capsicum to sandbox the service. This work was
/src/
H A DUPDATING2099 execute from a limited sandbox, as opposed to executing from
2108 If the limited sandbox mode is enabled, "make check" will execute
2110 sandbox if successful.
2115 environment if executing "make check" with limited sandbox mode using

12