/external/chromium_org/chrome/test/ |
DEPS | 19 "+sandbox/win/src", 20 "+sandbox/win/tests",
|
/external/chromium_org/content/utility/ |
utility.sb | 6 ; This is the Sandbox configuration file used for safeguarding the utility 11 ; directory. This is different from other sandbox configuration files where
|
/external/chromium_org/sandbox/win/tests/common/ |
controller.h | 12 #include "sandbox/win/src/sandbox.h" 14 namespace sandbox { namespace 23 // the sandbox. 69 // Class to facilitate the launch of a test inside the sandbox. 80 // function in the sandbox. 94 // Starts a child process in the sandbox and ask it to run |command|. Returns 156 } // namespace sandbox
|
/external/chromium_org/tools/memory_watcher/ |
README | 9 (2) Run chromium with these flags "--memory-profile -no-sandbox" 10 (The instrumentation doesn't work with the sandbox)
|
/external/chromium_org/ui/views/examples/content_client/ |
examples_main.cc | 6 #include "sandbox/win/src/sandbox_types.h" 15 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/chrome/common/extensions/ |
csp_validator.h | 34 // Checks whether the given |policy| enforces a unique origin sandbox as 36 // the-iframe-element.html#attr-iframe-sandbox. The policy must have the 37 // "sandbox" directive, and the sandbox tokens must not include
|
/external/chromium_org/chrome/common/extensions/docs/examples/howto/sandbox/ |
eventpage.html | 12 <iframe id="theFrame" src="sandbox.html"></iframe>
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
verifier.h | 25 static bool VerifyBPF(Sandbox *sandbox, 27 const Sandbox::Evaluators& evaluators, 36 // is used for purposes other than verifying the output of the sandbox's
|
/external/chromium_org/sandbox/win/src/ |
eat_resolver.cc | 5 #include "sandbox/win/src/eat_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 10 namespace sandbox { namespace 91 } // namespace sandbox
|
interception_internal.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 12 #include "sandbox/win/src/sandbox_types.h" 14 namespace sandbox { namespace 74 } // namespace sandbox
|
process_thread_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 99 } // namespace sandbox
|
sidestep_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 70 } // namespace sandbox
|
sandbox_policy_base.cc | 5 #include "sandbox/win/src/sandbox_policy_base.h" 11 #include "sandbox/win/src/app_container.h" 12 #include "sandbox/win/src/filesystem_dispatcher.h" 13 #include "sandbox/win/src/filesystem_policy.h" 14 #include "sandbox/win/src/handle_dispatcher.h" 15 #include "sandbox/win/src/handle_policy.h" 16 #include "sandbox/win/src/job.h" 17 #include "sandbox/win/src/interception.h" 18 #include "sandbox/win/src/process_mitigations.h" 19 #include "sandbox/win/src/named_pipe_dispatcher.h 68 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 69 } // namespace sandbox
|
/external/chromium/chrome/browser/ |
DEPS | 15 "+sandbox/linux", 16 "+sandbox/src", # The path doesn't say it, but this is the Windows sandbox.
|
/external/chromium/chrome/browser/resources/gpu_internals/ |
overlay_test.html | 23 <div id="sandbox"></div> 26 var sandbox = document.getElementById('sandbox');
|
/external/chromium_org/components/nacl/loader/ |
nacl_main_platform_delegate.h | 21 // the sandbox is enabled. 26 // the sandbox. 32 // Runs the sandbox tests for the NaCl Loader, if tests supplied.
|
/external/chromium_org/content/common/ |
zygote_commands_linux.h | 23 // setuid sandbox. 26 // This number must be kept in sync in sandbox/linux/suid/sandbox.c
|
/external/chromium_org/content/ |
content_app.gypi | 36 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/content/public/common/ |
injection_test_mac.h | 12 // Callback function used by sandbox tests to print error messages. It's 21 // An ObjC wrapper around sandbox tests. 29 // after the sandbox has been turned on.
|
main_function_params.h | 7 // (e.g., POSIX doesn't need to pass any sandbox information). 16 namespace sandbox { namespace 40 sandbox::SandboxInterfaceInfo* sandbox_info;
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate.h | 33 // the sandbox is enabled. 38 // the sandbox. 44 // Runs Sandbox tests.
|
/external/chromium_org/ppapi/native_client/src/trusted/plugin/ |
nexe_arch.h | 16 // Returns the kind of SFI sandbox implemented by sel_ldr on this 22 // capable of launching a 64-bit NaCl sandbox if a 64-bit sel_ldr is 24 // sandbox).
|
/external/chromium_org/sandbox/linux/suid/common/ |
sandbox.h | 9 namespace sandbox { namespace 13 // (e.g. Chrome) to construct a command line for the sandbox. 40 } // namespace sandbox
|
/external/chromium_org/sandbox/ |
sandbox.target.darwin-arm.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|