HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 351 - 375 of 795) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/tests/common/
controller.cc 5 #include "sandbox/win/tests/common/controller.h"
12 #include "sandbox/win/src/sandbox_factory.h"
63 namespace sandbox { namespace
216 arguments += no_sandbox_ ? L"-no-sandbox " : L" ";
329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) {
336 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.cc 5 #include "sandbox/win/wow_helper/service64_resolver.h"
8 #include "sandbox/win/wow_helper/target_code.h"
97 sandbox::PatchInfo patch_info;
135 NTSTATUS ResolveNtdll(sandbox::PatchInfo* patch_info) {
153 namespace sandbox { namespace
342 } // namespace sandbox
  /external/chromium_org/chrome/app/
client_util.h 15 namespace sandbox { namespace
39 int Launch(HINSTANCE instance, sandbox::SandboxInterfaceInfo* sbox_info);
  /external/chromium_org/chrome/common/
OWNERS 8 # Mac Sandbox profiles.
13 # new sandbox escapes.
DEPS 17 "+sandbox/win/src",
  /external/chromium_org/chrome/common/extensions/docs/templates/json/
manifest.json 171 "documentation": "manifest/sandbox.html",
173 "name": "sandbox"
  /external/chromium_org/chrome/common/extensions/manifest_tests/
extension_manifests_sandboxed_unittest.cc 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups";
42 "sandbox; script-src: https://www.google.com";
  /external/chromium_org/content/plugin/
plugin_main.cc 26 #include "sandbox/win/src/sandbox.h"
  /external/chromium_org/sandbox/linux/seccomp-bpf/
die.h 8 #include "sandbox/linux/seccomp-bpf/port.h"
22 // Terminate the program, even if the current sandbox policy prevents some
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
processes_and_threads.cc 7 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
8 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/third_party/WebKit/public/platform/mac/
WebSandboxSupport.h 44 // Put methods here that are required due to sandbox restrictions.
47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
  /external/chromium_org/third_party/WebKit/public/platform/win/
WebSandboxSupport.h 38 // Put methods here that are required due to sandbox restrictions.
42 // and due to sandbox restrictions, the current process may be unable
  /external/chromium_org/content/gpu/
gpu_main.cc 40 #include "sandbox/win/src/sandbox.h"
65 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo*);
212 // a GL context, so start the sandbox early.
341 // Warm up the random subsystem, which needs to be done pre-sandbox on all
347 // Warm up the crypto subsystem, which needs to done pre-sandbox on all
366 // Preload this DLL because the sandbox prevents it from loading.
375 // Initialize H/W video decoding stuff which fails in the sandbox.
398 TRACE_EVENT0("gpu", "Initialize sandbox");
417 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo* sandbox_info)
    [all...]
  /external/chromium/base/
rand_util_posix.cc 20 // it if we are later put in a sandbox. This class wraps the file descriptor so
  /external/chromium/build/
all.gyp 81 '../sandbox/sandbox.gyp:*',
112 '../sandbox/sandbox.gyp:*',
183 '../sandbox/sandbox.gyp:sbox_integration_tests',
184 '../sandbox/sandbox.gyp:sbox_unittests',
185 '../sandbox/sandbox.gyp:sbox_validation_tests'
    [all...]
  /external/chromium_org/base/
rand_util_posix.cc 19 // it if we are later put in a sandbox. This class wraps the file descriptor so
  /external/chromium_org/build/
all_android.gyp 75 '../sandbox/sandbox.gyp:sandbox_linux_unittests',
106 '../sandbox/sandbox.gyp:sandbox_linux_jni_unittests_apk',
  /external/chromium_org/chrome/test/functional/
test_clean_exit.py 28 extra_flags = ['--no-sandbox', '--child-clean-exit',
  /external/chromium_org/components/autofill/content/browser/wallet/
wallet_service_url.h 36 // a sandbox or some malicious endpoint.
  /external/chromium_org/components/nacl/broker/
nacl_broker_listener.h 29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
  /external/chromium_org/content/
OWNERS 8 # Mac Sandbox profiles.
  /external/chromium_org/content/browser/renderer_host/
render_sandbox_host_linux.h 19 // This is a singleton object which handles sandbox requests from the
  /external/chromium_org/content/public/common/
content_client.h 37 namespace sandbox { namespace
141 // resource ID corresponding to the sandbox profile to use. The legal values
143 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox
146 // the sandbox profile to use and true is returned.
  /external/chromium_org/content/test/
mock_render_process.cc 27 // DIBs in the current process, since there is no sandbox protecting us (and
  /external/chromium_org/ipc/
ipc_send_fds_test.cc 10 #include <sandbox.h>
160 // Enable the sandbox.
170 // Make sure sandbox is really enabled.
172 LOG(ERROR) << "Sandbox wasn't properly enabled";

Completed in 920 milliseconds

<<11121314151617181920>>