HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 126 - 150 of 795) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/chromium_org/sandbox/win/src/
resolver.cc 5 #include "sandbox/win/src/resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
10 namespace sandbox { namespace
62 } // namespace sandbox
resolver_64.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
44 namespace sandbox { namespace
69 } // namespace sandbox
sandbox_utils.cc 5 #include "sandbox/win/src/sandbox_utils.h"
11 #include "sandbox/win/src/internal_types.h"
13 namespace sandbox { namespace
38 }; // namespace sandbox
target_interceptions.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
33 } // namespace sandbox
win2k_threadpool.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
7 #include "sandbox/win/src/win_utils.h"
9 namespace sandbox { namespace
60 } // namespace sandbox
handle_policy_test.cc 6 #include "sandbox/win/src/handle_policy.h"
7 #include "sandbox/win/src/nt_internals.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/win_utils.h"
12 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
113 } // namespace sandbox
    [all...]
handle_closer_test.cc 7 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
51 namespace sandbox { namespace
111 sandbox::TargetPolicy* policy = runner.GetPolicy();
118 CHECK(sandbox::GetHandleName(marker, &handle_name));
131 sandbox::TargetPolicy* policy = runner.GetPolicy()
    [all...]
registry_dispatcher.cc 5 #include "sandbox/win/src/registry_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/policy_broker.h"
15 #include "sandbox/win/src/policy_params.h"
16 #include "sandbox/win/src/sandbox.h
40 namespace sandbox { namespace
    [all...]
broker_services.h 14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sharedmem_ipc_server.h"
18 #include "sandbox/win/src/win2k_threadpool.h"
19 #include "sandbox/win/src/win_utils.h"
28 namespace sandbox { namespace
111 } // namespace sandbox
unload_dll_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
64 sandbox::TargetPolicy* policy = runner.GetPolicy();
75 sandbox::TargetPolicy* policy = runner.GetPolicy();
96 } // namespace sandbox
policy_engine_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
10 #define POLPARAM(p) sandbox::ParamPickerMake(p),
13 namespace sandbox { namespace
102 } // namespace sandbox
service_resolver_unittest.cc 10 #include "sandbox/win/src/resolver.h"
11 #include "sandbox/win/src/sandbox_utils.h"
12 #include "sandbox/win/src/service_resolver.h"
58 typedef ResolverThunkTest<sandbox::ServiceResolverThunk> WinXpResolverTest;
61 typedef ResolverThunkTest<sandbox::Win2kResolverThunk> Win2kResolverTest;
62 typedef ResolverThunkTest<sandbox::Win8ResolverThunk> Win8ResolverTest;
63 typedef ResolverThunkTest<sandbox::Wow64ResolverThunk> Wow64ResolverTest;
64 typedef ResolverThunkTest<sandbox::Wow64W8ResolverThunk> Wow64W8ResolverTest;
91 sandbox::ServiceResolverThunk* resolver) {
131 sandbox::ServiceResolverThunk* GetTestResolver(bool relaxed)
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
target_code.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
16 // on sandbox/win/src/wow64.cc.
39 } // namespace sandbox
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.h 12 namespace sandbox { namespace
14 // Helper class to use the setuid sandbox. This class is to be used both
20 // 2. The browser launches a renderer through the setuid sandbox.
29 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
56 } // namespace sandbox
setuid_sandbox_client.cc 15 #include "sandbox/linux/suid/common/sandbox.h"
16 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h"
22 // setuid sandbox. Old versions of the sandbox will ignore this.
24 env->SetVar(sandbox::kSandboxEnvironmentApiRequest,
25 base::IntToString(sandbox::kSUIDSandboxApiNumber));
43 // different names here so that the SUID sandbox can resolve them for the
64 if (env->GetVar(sandbox::kSandboxEnvironmentApiProvides, &api_string) &&
85 return EnvToInt(env, sandbox::kSandboxHelperPidEnvironmentVarName)
95 namespace sandbox { namespace
    [all...]
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
append-child-deep.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
8 var node = sandbox;
42 observer.observe(sandbox, {childList: true, subtree: true});
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf.h 19 #include "sandbox/linux/seccomp-bpf/die.h"
20 #include "sandbox/linux/seccomp-bpf/errorcode.h"
21 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
22 #include "sandbox/linux/seccomp-bpf/port.h"
23 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy_forward.h"
44 class Sandbox {
51 STATUS_ENABLED // The sandbox is now active
55 // ErrorCode (Sandbox *sb, int sysnum, void *aux);
57 // pointer in |aux|. This pointer will then be forwarded to the sandbox
69 // NOTE: Setting a policy and starting the sandbox is a one-way operation
    [all...]
  /external/chromium_org/chrome/android/testshell/java/
AndroidManifest.xml 12 <permission android:name="org.chromium.chrome.testshell.permission.SANDBOX"
35 android:permission="org.chromium.content_shell.permission.SANDBOX"
40 android:permission="org.chromium.content_shell.permission.SANDBOX"
45 android:permission="org.chromium.content_shell.permission.SANDBOX"
50 android:permission="org.chromium.content_shell.permission.SANDBOX"
55 android:permission="org.chromium.content_shell.permission.SANDBOX"
60 android:permission="org.chromium.content_shell.permission.SANDBOX"
65 android:permission="org.chromium.content_shell.permission.SANDBOX"
70 android:permission="org.chromium.content_shell.permission.SANDBOX"
75 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/content/shell/android/browsertests_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
34 android:permission="org.chromium.content_shell.permission.SANDBOX"
39 android:permission="org.chromium.content_shell.permission.SANDBOX"
44 android:permission="org.chromium.content_shell.permission.SANDBOX"
49 android:permission="org.chromium.content_shell.permission.SANDBOX"
54 android:permission="org.chromium.content_shell.permission.SANDBOX"
59 android:permission="org.chromium.content_shell.permission.SANDBOX"
64 android:permission="org.chromium.content_shell.permission.SANDBOX"
69 android:permission="org.chromium.content_shell.permission.SANDBOX"
74 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/content/shell/android/shell_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
34 android:permission="org.chromium.content_shell.permission.SANDBOX"
39 android:permission="org.chromium.content_shell.permission.SANDBOX"
44 android:permission="org.chromium.content_shell.permission.SANDBOX"
49 android:permission="org.chromium.content_shell.permission.SANDBOX"
54 android:permission="org.chromium.content_shell.permission.SANDBOX"
59 android:permission="org.chromium.content_shell.permission.SANDBOX"
64 android:permission="org.chromium.content_shell.permission.SANDBOX"
69 android:permission="org.chromium.content_shell.permission.SANDBOX"
74 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/content/common/
sandbox_mac.mm 10 #include <sandbox.h>
42 // Is the sandbox currently active.
50 // Mapping from sandbox process types to resource IDs containing the sandbox
100 // Errors quoting strings for the Sandbox profile are always fatal, report them
112 NSString* Sandbox::AllowMetadataForPath(const base::FilePath& allowed_path) {
145 bool Sandbox::QuotePlainString(const std::string& src_utf8, std::string* dst) {
181 bool Sandbox::QuoteStringForRegex(const std::string& str_utf8,
183 // Characters with special meanings in sandbox profile syntax.
218 // The Mac sandbox regex parser only handles printable ASCII characters
    [all...]
sandbox_seccomp_bpf_linux.cc 38 #include "sandbox/linux/services/broker_process.h"
47 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
48 #include "sandbox/linux/services/linux_syscalls.h"
52 using playground2::Sandbox;
53 using sandbox::BrokerProcess;
57 void StartSandboxWithPolicy(Sandbox::EvaluateSyscall syscall_policy,
1020 // These give a lot of ambient authority and bypass the setuid sandbox.
1298 ErrorCode RestrictMmapFlags(Sandbox* sandbox) {
1307 return sandbox->Cond(3, ErrorCode::TP_32BIT, ErrorCode::OP_HAS_ANY_BITS
1976 Sandbox sandbox; local
    [all...]
  /external/chromium/chrome/browser/
utility.sb 6 ; This is the Sandbox configuration file used for safeguarding the utility
11 ; directory. This is different from other sandbox configuration files where
  /external/chromium_org/ash/shell/
shell_main.cc 6 #include "sandbox/win/src/sandbox_types.h"
15 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/chrome/app/
chrome_main.cc 15 sandbox::SandboxInterfaceInfo* sandbox_info);
26 sandbox::SandboxInterfaceInfo* sandbox_info) {

Completed in 2593 milliseconds

1 2 3 4 56 7 8 91011>>