HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 176 - 200 of 795) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium_org/sandbox/
sandbox.target.darwin-mips.mk 7 LOCAL_MODULE_STEM := sandbox
28 .PHONY: sandbox
29 sandbox: sandbox_sandbox_gyp
sandbox.target.darwin-x86.mk 7 LOCAL_MODULE_STEM := sandbox
29 .PHONY: sandbox
30 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-arm.mk 7 LOCAL_MODULE_STEM := sandbox
29 .PHONY: sandbox
30 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-mips.mk 7 LOCAL_MODULE_STEM := sandbox
28 .PHONY: sandbox
29 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-x86.mk 7 LOCAL_MODULE_STEM := sandbox
29 .PHONY: sandbox
30 sandbox: sandbox_sandbox_gyp
  /external/chromium_org/sandbox/win/src/
Wow64.h 11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
48 } // namespace sandbox
acl.h 11 #include "sandbox/win/src/sid.h"
13 namespace sandbox { namespace
38 } // namespace sandbox
service_resolver.cc 5 #include "sandbox/win/src/service_resolver.h"
10 namespace sandbox { namespace
42 } // namespace sandbox
window.h 11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
37 } // namespace sandbox
sandbox.h 5 // Sandbox is a sandbox library for windows processes. Use when you want a
16 // there are cases where the Sandbox library is linked against the main .exe
25 #include "sandbox/win/src/sandbox_policy.h"
26 #include "sandbox/win/src/sandbox_types.h"
28 // sandbox: Google User-Land Application Sandbox
29 namespace sandbox { namespace
58 // interface to specify the sandbox policy for new processes created by
69 // policy: This is the pointer to the policy object for the sandbox t
    [all...]
handle_closer.h 13 #include "sandbox/win/src/interception.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/target_process.h"
17 namespace sandbox { namespace
73 } // namespace sandbox
process_thread_policy.h 10 #include "sandbox/win/src/policy_low_level.h"
13 #include "sandbox/win/src/crosscall_server.h"
14 #include "sandbox/win/src/sandbox_policy.h"
16 namespace sandbox { namespace
79 } // namespace sandbox
filesystem_dispatcher.cc 5 #include "sandbox/win/src/filesystem_dispatcher.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/filesystem_policy.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox.h
18 namespace sandbox { namespace
    [all...]
process_policy_test.cc 13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/tests/common/controller.h"
38 sandbox::SboxTestResult CreateProcessHelper(const string16& exe,
52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED;
59 ret1 = sandbox::SBOX_TEST_DENIED;
61 ret1 = sandbox::SBOX_TEST_FAILED
100 namespace sandbox { namespace
    [all...]
interceptors_64.cc 5 #include "sandbox/win/src/interceptors_64.h"
7 #include "sandbox/win/src/interceptors.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/named_pipe_interception.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/process_thread_interception.h"
12 #include "sandbox/win/src/registry_interception.h"
13 #include "sandbox/win/src/sandbox_nt_types.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/sync_interception.h
18 namespace sandbox { namespace
    [all...]
process_thread_dispatcher.cc 5 #include "sandbox/win/src/process_thread_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/process_thread_policy.h"
17 #include "sandbox/win/src/sandbox.h
95 namespace sandbox { namespace
    [all...]
  /external/chromium_org/content/common/
sandbox_linux.cc 24 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
33 "Activated " + sandbox_name + " sandbox for process type: " +
72 setuid_sandbox_client_(sandbox::SetuidSandboxClient::Create()) {
74 LOG(FATAL) << "Failed to instantiate the setuid sandbox client.";
88 // ASan API call to notify the tool the sandbox is going to be turned on.
96 // ASan needs to open some resources before the sandbox is enabled.
103 // produce a sandbox escape in Release mode.
110 VLOG(1) << "Lacking support for seccomp-bpf sandbox.";
121 // We need to make absolutely sure that our sandbox is "sealed" before
134 // TSAN starts a helper thread. So we don't start the sandbox and don'
    [all...]
handle_enumerator_win.cc 17 #include "sandbox/win/src/handle_table.h"
26 handle_types[sandbox::HandleTable::kTypeProcess] = ProcessHandle;
27 handle_types[sandbox::HandleTable::kTypeThread] = ThreadHandle;
28 handle_types[sandbox::HandleTable::kTypeFile] = FileHandle;
29 handle_types[sandbox::HandleTable::kTypeDirectory] = DirectoryHandle;
30 handle_types[sandbox::HandleTable::kTypeKey] = KeyHandle;
31 handle_types[sandbox::HandleTable::kTypeWindowStation] = WindowStationHandle;
32 handle_types[sandbox::HandleTable::kTypeDesktop] = DesktopHandle;
33 handle_types[sandbox::HandleTable::kTypeService] = ServiceHandle;
34 handle_types[sandbox::HandleTable::kTypeMutex] = MutexHandle
    [all...]
  /external/chromium_org/components/nacl/loader/
nacl_main_platform_delegate_mac.mm 44 // Be sure not to load the sandbox test DLL if the sandbox isn't on.
46 // TODO(jvoung): allow testing without sandbox, but change expected ret vals.
60 << "Error initializing sandbox for " << switches::kNaClLoaderProcess;
75 VLOG(1) << "Failed to get NaCl sandbox test function";
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_linux.cc 43 // The sandbox is started in the zygote process: zygote_main_linux.cc
49 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc
67 // about:sandbox uses a value returned from LinuxSandbox::GetStatus() before
76 // Under the setuid sandbox, we should not be able to open any file via the
87 // but we know that under the seccomp-bpf sandbox, this should return EPERM.
  /external/chromium_org/remoting/webapp/
xhr_proxy.js 8 * The sandbox isn't allowed to make XHRs, so they have to be proxied to the
13 * creations by JS running in the sandbox.
74 console.error('Sandbox: unproxied getResponseHeader(' + header + ') called.');
78 console.error('Sandbox: unproxied getAllResponseHeaders called.');
82 console.error('Sandbox: unproxied overrideMimeType called.');
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client_unittest.cc 11 #include "sandbox/linux/suid/common/sandbox.h"
14 namespace sandbox { namespace
71 // Set-up a fake environment as if we went through the setuid sandbox.
93 } // namespace sandbox
  /external/openssh/
sandbox-darwin.c 23 #include <sandbox.h>
33 #include "sandbox.h"
36 /* Darwin/OS X sandbox */
51 debug3("%s: preparing Darwin sandbox", __func__);
64 debug3("%s: starting Darwin sandbox", __func__);
  /external/chromium_org/sandbox/linux/seccomp-bpf/
verifier.cc 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
9 #include "sandbox/linux/seccomp-bpf/verifier.h"
15 using playground2::Sandbox;
38 uint32_t EvaluateErrorCode(Sandbox *sandbox, const ErrorCode& code,
48 return sandbox->Unexpected64bitArgument().err();
52 return EvaluateErrorCode(sandbox,
60 return EvaluateErrorCode(sandbox,
69 return EvaluateErrorCode(sandbox,
    [all...]
  /external/chromium_org/chrome/common/extensions/
csp_validator_unittest.cc 154 // Sandbox directive is required.
156 "sandbox", Manifest::TYPE_EXTENSION));
158 // Additional sandbox tokens are OK.
160 "sandbox allow-scripts", Manifest::TYPE_EXTENSION));
163 "sandbox allow-same-origin", Manifest::TYPE_EXTENSION));
167 "sandbox; img-src https://google.com", Manifest::TYPE_EXTENSION));
171 "sandbox allow-top-navigation", Manifest::TYPE_EXTENSION));
173 "sandbox allow-top-navigation", Manifest::TYPE_PLATFORM_APP));
177 "sandbox allow-popups", Manifest::TYPE_EXTENSION));
179 "sandbox allow-popups", Manifest::TYPE_PLATFORM_APP))
    [all...]

Completed in 1153 milliseconds

1 2 3 4 5 6 78 91011>>