| 
    Chromium Embedded Framework (CEF)
    126.2.0+g5c56e98+chromium-126.0.6478.62
    
   | 
 
The sandbox is used to restrict sub-processes (renderer, GPU, etc) from directly accessing system resources. More...
Classes | |
| class | CefScopedSandboxContext | 
| Scoped helper for managing the life span of a sandbox context handle.  More... | |
Functions | |
| CEF_EXPORT void * | cef_sandbox_initialize (int argc, char **argv) | 
| Initialize the sandbox for this process.  More... | |
| CEF_EXPORT void | cef_sandbox_destroy (void *sandbox_context) | 
| Destroy the specified sandbox context handle.  More... | |
The sandbox is used to restrict sub-processes (renderer, GPU, etc) from directly accessing system resources.
This helps to protect the user from untrusted and potentially malicious Web content. See http://www.chromium.org/developers/design-documents/sandbox for complete details.
To enable the sandbox on macOS the following requirements must be met:
| CEF_EXPORT void cef_sandbox_destroy | ( | void * | sandbox_context | ) | 
Destroy the specified sandbox context handle.
| CEF_EXPORT void* cef_sandbox_initialize | ( | int | argc, | 
| char ** | argv | ||
| ) | 
Initialize the sandbox for this process.
Returns the sandbox context handle on success or NULL on failure. The returned handle should be passed to cef_sandbox_destroy() immediately before process termination.