/external/chromium_org/sandbox/win/src/ |
resolver.cc | 5 #include "sandbox/win/src/resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 10 namespace sandbox { namespace 62 } // namespace sandbox
|
resolver_64.cc | 5 #include "sandbox/win/src/resolver.h" 7 #include "sandbox/win/src/sandbox_nt_util.h" 44 namespace sandbox { namespace 69 } // namespace sandbox
|
sandbox_utils.cc | 5 #include "sandbox/win/src/sandbox_utils.h" 11 #include "sandbox/win/src/internal_types.h" 13 namespace sandbox { namespace 38 }; // namespace sandbox
|
target_interceptions.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 33 } // namespace sandbox
|
win2k_threadpool.cc | 5 #include "sandbox/win/src/win2k_threadpool.h" 7 #include "sandbox/win/src/win_utils.h" 9 namespace sandbox { namespace 60 } // namespace sandbox
|
handle_policy_test.cc | 6 #include "sandbox/win/src/handle_policy.h" 7 #include "sandbox/win/src/nt_internals.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_policy.h" 11 #include "sandbox/win/src/win_utils.h" 12 #include "sandbox/win/tests/common/controller.h" 15 namespace sandbox { namespace 113 } // namespace sandbox [all...] |
handle_closer_test.cc | 7 #include "sandbox/win/src/handle_closer_agent.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/target_services.h" 11 #include "sandbox/win/tests/common/controller.h" 51 namespace sandbox { namespace 111 sandbox::TargetPolicy* policy = runner.GetPolicy(); 118 CHECK(sandbox::GetHandleName(marker, &handle_name)); 131 sandbox::TargetPolicy* policy = runner.GetPolicy() [all...] |
registry_dispatcher.cc | 5 #include "sandbox/win/src/registry_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/sandbox_nt_util.h" 14 #include "sandbox/win/src/policy_broker.h" 15 #include "sandbox/win/src/policy_params.h" 16 #include "sandbox/win/src/sandbox.h 40 namespace sandbox { namespace [all...] |
broker_services.h | 14 #include "sandbox/win/src/crosscall_server.h" 15 #include "sandbox/win/src/job.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sharedmem_ipc_server.h" 18 #include "sandbox/win/src/win2k_threadpool.h" 19 #include "sandbox/win/src/win_utils.h" 28 namespace sandbox { namespace 111 } // namespace sandbox
|
unload_dll_test.cc | 6 #include "sandbox/win/src/sandbox.h" 7 #include "sandbox/win/src/sandbox_factory.h" 8 #include "sandbox/win/src/target_services.h" 9 #include "sandbox/win/tests/common/controller.h" 12 namespace sandbox { namespace 64 sandbox::TargetPolicy* policy = runner.GetPolicy(); 75 sandbox::TargetPolicy* policy = runner.GetPolicy(); 96 } // namespace sandbox
|
policy_engine_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 10 #define POLPARAM(p) sandbox::ParamPickerMake(p), 13 namespace sandbox { namespace 102 } // namespace sandbox
|
service_resolver_unittest.cc | 10 #include "sandbox/win/src/resolver.h" 11 #include "sandbox/win/src/sandbox_utils.h" 12 #include "sandbox/win/src/service_resolver.h" 58 typedef ResolverThunkTest<sandbox::ServiceResolverThunk> WinXpResolverTest; 61 typedef ResolverThunkTest<sandbox::Win2kResolverThunk> Win2kResolverTest; 62 typedef ResolverThunkTest<sandbox::Win8ResolverThunk> Win8ResolverTest; 63 typedef ResolverThunkTest<sandbox::Wow64ResolverThunk> Wow64ResolverTest; 64 typedef ResolverThunkTest<sandbox::Wow64W8ResolverThunk> Wow64W8ResolverTest; 91 sandbox::ServiceResolverThunk* resolver) { 131 sandbox::ServiceResolverThunk* GetTestResolver(bool relaxed) [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
target_code.h | 8 #include "sandbox/win/src/nt_internals.h" 10 namespace sandbox { namespace 16 // on sandbox/win/src/wow64.cc. 39 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client.h | 12 namespace sandbox { namespace 14 // Helper class to use the setuid sandbox. This class is to be used both 20 // 2. The browser launches a renderer through the setuid sandbox. 29 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us 56 } // namespace sandbox
|
setuid_sandbox_client.cc | 15 #include "sandbox/linux/suid/common/sandbox.h" 16 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 22 // setuid sandbox. Old versions of the sandbox will ignore this. 24 env->SetVar(sandbox::kSandboxEnvironmentApiRequest, 25 base::IntToString(sandbox::kSUIDSandboxApiNumber)); 43 // different names here so that the SUID sandbox can resolve them for the 64 if (env->GetVar(sandbox::kSandboxEnvironmentApiProvides, &api_string) && 85 return EnvToInt(env, sandbox::kSandboxHelperPidEnvironmentVarName) 95 namespace sandbox { namespace [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
append-child-deep.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 8 var node = sandbox; 42 observer.observe(sandbox, {childList: true, subtree: true});
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf.h | 19 #include "sandbox/linux/seccomp-bpf/die.h" 20 #include "sandbox/linux/seccomp-bpf/errorcode.h" 21 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 22 #include "sandbox/linux/seccomp-bpf/port.h" 23 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy_forward.h" 44 class Sandbox { 51 STATUS_ENABLED // The sandbox is now active 55 // ErrorCode (Sandbox *sb, int sysnum, void *aux); 57 // pointer in |aux|. This pointer will then be forwarded to the sandbox 69 // NOTE: Setting a policy and starting the sandbox is a one-way operation [all...] |
/external/chromium_org/chrome/android/testshell/java/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.chrome.testshell.permission.SANDBOX" 35 android:permission="org.chromium.content_shell.permission.SANDBOX" 40 android:permission="org.chromium.content_shell.permission.SANDBOX" 45 android:permission="org.chromium.content_shell.permission.SANDBOX" 50 android:permission="org.chromium.content_shell.permission.SANDBOX" 55 android:permission="org.chromium.content_shell.permission.SANDBOX" 60 android:permission="org.chromium.content_shell.permission.SANDBOX" 65 android:permission="org.chromium.content_shell.permission.SANDBOX" 70 android:permission="org.chromium.content_shell.permission.SANDBOX" 75 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/content/shell/android/browsertests_apk/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX" 34 android:permission="org.chromium.content_shell.permission.SANDBOX" 39 android:permission="org.chromium.content_shell.permission.SANDBOX" 44 android:permission="org.chromium.content_shell.permission.SANDBOX" 49 android:permission="org.chromium.content_shell.permission.SANDBOX" 54 android:permission="org.chromium.content_shell.permission.SANDBOX" 59 android:permission="org.chromium.content_shell.permission.SANDBOX" 64 android:permission="org.chromium.content_shell.permission.SANDBOX" 69 android:permission="org.chromium.content_shell.permission.SANDBOX" 74 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/content/shell/android/shell_apk/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX" 34 android:permission="org.chromium.content_shell.permission.SANDBOX" 39 android:permission="org.chromium.content_shell.permission.SANDBOX" 44 android:permission="org.chromium.content_shell.permission.SANDBOX" 49 android:permission="org.chromium.content_shell.permission.SANDBOX" 54 android:permission="org.chromium.content_shell.permission.SANDBOX" 59 android:permission="org.chromium.content_shell.permission.SANDBOX" 64 android:permission="org.chromium.content_shell.permission.SANDBOX" 69 android:permission="org.chromium.content_shell.permission.SANDBOX" 74 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/content/common/ |
sandbox_mac.mm | 10 #include <sandbox.h> 42 // Is the sandbox currently active. 50 // Mapping from sandbox process types to resource IDs containing the sandbox 100 // Errors quoting strings for the Sandbox profile are always fatal, report them 112 NSString* Sandbox::AllowMetadataForPath(const base::FilePath& allowed_path) { 145 bool Sandbox::QuotePlainString(const std::string& src_utf8, std::string* dst) { 181 bool Sandbox::QuoteStringForRegex(const std::string& str_utf8, 183 // Characters with special meanings in sandbox profile syntax. 218 // The Mac sandbox regex parser only handles printable ASCII characters [all...] |
sandbox_seccomp_bpf_linux.cc | 38 #include "sandbox/linux/services/broker_process.h" 47 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 48 #include "sandbox/linux/services/linux_syscalls.h" 52 using playground2::Sandbox; 53 using sandbox::BrokerProcess; 57 void StartSandboxWithPolicy(Sandbox::EvaluateSyscall syscall_policy, 1020 // These give a lot of ambient authority and bypass the setuid sandbox. 1298 ErrorCode RestrictMmapFlags(Sandbox* sandbox) { 1307 return sandbox->Cond(3, ErrorCode::TP_32BIT, ErrorCode::OP_HAS_ANY_BITS 1976 Sandbox sandbox; local [all...] |
/external/chromium/chrome/browser/ |
utility.sb | 6 ; This is the Sandbox configuration file used for safeguarding the utility 11 ; directory. This is different from other sandbox configuration files where
|
/external/chromium_org/ash/shell/ |
shell_main.cc | 6 #include "sandbox/win/src/sandbox_types.h" 15 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/chrome/app/ |
chrome_main.cc | 15 sandbox::SandboxInterfaceInfo* sandbox_info); 26 sandbox::SandboxInterfaceInfo* sandbox_info) {
|