/external/chromium_org/sandbox/win/tests/common/ |
controller.cc | 5 #include "sandbox/win/tests/common/controller.h" 12 #include "sandbox/win/src/sandbox_factory.h" 63 namespace sandbox { namespace 216 arguments += no_sandbox_ ? L"-no-sandbox " : L" "; 329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) { 336 } // namespace sandbox
|
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.cc | 5 #include "sandbox/win/wow_helper/service64_resolver.h" 8 #include "sandbox/win/wow_helper/target_code.h" 97 sandbox::PatchInfo patch_info; 135 NTSTATUS ResolveNtdll(sandbox::PatchInfo* patch_info) { 153 namespace sandbox { namespace 342 } // namespace sandbox
|
/external/chromium_org/chrome/app/ |
client_util.h | 15 namespace sandbox { namespace 39 int Launch(HINSTANCE instance, sandbox::SandboxInterfaceInfo* sbox_info);
|
/external/chromium_org/chrome/common/ |
OWNERS | 8 # Mac Sandbox profiles. 13 # new sandbox escapes.
|
DEPS | 17 "+sandbox/win/src",
|
/external/chromium_org/chrome/common/extensions/docs/templates/json/ |
manifest.json | 171 "documentation": "manifest/sandbox.html", 173 "name": "sandbox"
|
/external/chromium_org/chrome/common/extensions/manifest_tests/ |
extension_manifests_sandboxed_unittest.cc | 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups"; 42 "sandbox; script-src: https://www.google.com";
|
/external/chromium_org/content/plugin/ |
plugin_main.cc | 26 #include "sandbox/win/src/sandbox.h"
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
die.h | 8 #include "sandbox/linux/seccomp-bpf/port.h" 22 // Terminate the program, even if the current sandbox policy prevents some
|
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
processes_and_threads.cc | 7 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 8 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/third_party/WebKit/public/platform/mac/ |
WebSandboxSupport.h | 44 // Put methods here that are required due to sandbox restrictions. 47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
|
/external/chromium_org/third_party/WebKit/public/platform/win/ |
WebSandboxSupport.h | 38 // Put methods here that are required due to sandbox restrictions. 42 // and due to sandbox restrictions, the current process may be unable
|
/external/chromium_org/content/gpu/ |
gpu_main.cc | 40 #include "sandbox/win/src/sandbox.h" 65 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo*); 212 // a GL context, so start the sandbox early. 341 // Warm up the random subsystem, which needs to be done pre-sandbox on all 347 // Warm up the crypto subsystem, which needs to done pre-sandbox on all 366 // Preload this DLL because the sandbox prevents it from loading. 375 // Initialize H/W video decoding stuff which fails in the sandbox. 398 TRACE_EVENT0("gpu", "Initialize sandbox"); 417 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo* sandbox_info) [all...] |
/external/chromium/base/ |
rand_util_posix.cc | 20 // it if we are later put in a sandbox. This class wraps the file descriptor so
|
/external/chromium/build/ |
all.gyp | 81 '../sandbox/sandbox.gyp:*', 112 '../sandbox/sandbox.gyp:*', 183 '../sandbox/sandbox.gyp:sbox_integration_tests', 184 '../sandbox/sandbox.gyp:sbox_unittests', 185 '../sandbox/sandbox.gyp:sbox_validation_tests' [all...] |
/external/chromium_org/base/ |
rand_util_posix.cc | 19 // it if we are later put in a sandbox. This class wraps the file descriptor so
|
/external/chromium_org/build/ |
all_android.gyp | 75 '../sandbox/sandbox.gyp:sandbox_linux_unittests', 106 '../sandbox/sandbox.gyp:sandbox_linux_jni_unittests_apk',
|
/external/chromium_org/chrome/test/functional/ |
test_clean_exit.py | 28 extra_flags = ['--no-sandbox', '--child-clean-exit',
|
/external/chromium_org/components/autofill/content/browser/wallet/ |
wallet_service_url.h | 36 // a sandbox or some malicious endpoint.
|
/external/chromium_org/components/nacl/broker/ |
nacl_broker_listener.h | 29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
/external/chromium_org/content/ |
OWNERS | 8 # Mac Sandbox profiles.
|
/external/chromium_org/content/browser/renderer_host/ |
render_sandbox_host_linux.h | 19 // This is a singleton object which handles sandbox requests from the
|
/external/chromium_org/content/public/common/ |
content_client.h | 37 namespace sandbox { namespace 141 // resource ID corresponding to the sandbox profile to use. The legal values 143 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox 146 // the sandbox profile to use and true is returned.
|
/external/chromium_org/content/test/ |
mock_render_process.cc | 27 // DIBs in the current process, since there is no sandbox protecting us (and
|
/external/chromium_org/ipc/ |
ipc_send_fds_test.cc | 10 #include <sandbox.h> 160 // Enable the sandbox. 170 // Make sure sandbox is really enabled. 172 LOG(ERROR) << "Sandbox wasn't properly enabled";
|