OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:sandbox
(Results
1 - 25
of
199
) sorted by null
1
2
3
4
5
6
7
8
/external/chromium/chrome/common/
sandbox_policy.h
14
namespace
sandbox
{
namespace
18
void InitBrokerServices(
sandbox
::BrokerServices* broker_services);
25
} // namespace
sandbox
/external/chromium_org/sandbox/linux/services/
libc_urandom_override.h
8
namespace
sandbox
{
namespace
12
} // namespace
sandbox
/external/chromium_org/sandbox/win/src/
acl.h
11
#include "
sandbox
/win/src/sid.h"
13
namespace
sandbox
{
namespace
38
} // namespace
sandbox
filesystem_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
51
} // namespace
sandbox
handle_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
21
} // namespace
sandbox
interceptors_64.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
167
} // namespace
sandbox
policy_broker.h
8
#include "
sandbox
/win/src/interception.h"
10
namespace
sandbox
{
namespace
21
} // namespace
sandbox
policy_target.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
43
} // namespace
sandbox
process_mitigations.h
11
#include "
sandbox
/win/src/security_level.h"
13
namespace
sandbox
{
namespace
23
// Converts
sandbox
flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES
41
} // namespace
sandbox
registry_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
36
} // namespace
sandbox
sandbox_utils.h
12
#include "
sandbox
/win/src/nt_internals.h"
14
namespace
sandbox
{
namespace
25
}; // namespace
sandbox
sync_policy_test.h
8
#include "
sandbox
/win/tests/common/controller.h"
10
namespace
sandbox
{
namespace
16
} // namespace
sandbox
target_interceptions.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
33
} // namespace
sandbox
window.h
11
#include "
sandbox
/win/src/sandbox_types.h"
13
namespace
sandbox
{
namespace
37
} // namespace
sandbox
Wow64_64.cc
7
#include "
sandbox
/win/src/wow64.h"
9
namespace
sandbox
{
namespace
18
} // namespace
sandbox
filesystem_policy.h
11
#include "
sandbox
/win/src/crosscall_server.h"
12
#include "
sandbox
/win/src/nt_internals.h"
13
#include "
sandbox
/win/src/policy_low_level.h"
14
#include "
sandbox
/win/src/sandbox_policy.h"
16
namespace
sandbox
{
namespace
105
} // namespace
sandbox
handle_closer_agent.h
10
#include "
sandbox
/win/src/handle_closer.h"
11
#include "
sandbox
/win/src/sandbox_types.h"
13
namespace
sandbox
{
namespace
35
} // namespace
sandbox
handle_policy.h
11
#include "
sandbox
/win/src/crosscall_server.h"
12
#include "
sandbox
/win/src/policy_low_level.h"
13
#include "
sandbox
/win/src/sandbox_policy.h"
15
namespace
sandbox
{
namespace
38
} // namespace
sandbox
job.h
9
#include "
sandbox
/win/src/restricted_token_utils.h"
11
namespace
sandbox
{
namespace
59
} // namespace
sandbox
named_pipe_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
34
} // namespace
sandbox
/external/chromium_org/sandbox/win/tests/validation_tests/
commands.h
8
namespace
sandbox
{
namespace
35
} // namespace
sandbox
/external/chromium_org/content/common/
sandbox_win.h
8
#include "
sandbox
/win/src/security_level.h"
12
namespace
sandbox
{
namespace
20
// Wrapper around
sandbox
::TargetPolicy::SetJobLevel that checks if the
sandbox
23
sandbox
::JobLevel job_level,
25
sandbox
::TargetPolicy* policy);
28
void AddBaseHandleClosePolicy(
sandbox
::TargetPolicy* policy);
30
bool InitBrokerServices(
sandbox
::BrokerServices* broker_services);
32
bool InitTargetServices(
sandbox
::TargetServices* target_services);
/external/chromium_org/content/public/app/
content_main.h
15
namespace
sandbox
{
namespace
32
sandbox
::SandboxInterfaceInfo* sandbox_info,
startup_helper_win.h
10
namespace
sandbox
{
namespace
20
// Initializes the
sandbox
code and turns on DEP. Note: This function
22
//
sandbox
library); it will not work correctly if it is exported from a
24
void InitializeSandboxInfo(
sandbox
::SandboxInterfaceInfo* sandbox_info);
/external/chromium_org/content/public/common/
sandbox_init.h
14
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf_policy_forward.h"
23
namespace
sandbox
{
namespace
32
// Initialize the
sandbox
for renderer, gpu, utility, worker, nacl, and plug-in
36
// Returns true if the
sandbox
was initialized succesfully, false if an error
40
sandbox
::SandboxInterfaceInfo* sandbox_info);
43
// that works inside the
sandbox
and can send handles but not retrieve
52
// Inform the current process's
sandbox
broker (e.g. the broker for
53
// 32-bit processes) about a process created under a different
sandbox
69
// Initialize the
sandbox
of the given |sandbox_type|, optionally specifying a
71
// supported by the
sandbox
profile associated with the given |sandbox_type|
[
all
...]
Completed in 988 milliseconds
1
2
3
4
5
6
7
8