/external/chromium_org/sandbox/win/src/ |
eat_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 45 } // namespace sandbox
|
handle_closer_agent.h | 10 #include "sandbox/win/src/handle_closer.h" 11 #include "sandbox/win/src/sandbox_types.h" 13 namespace sandbox { namespace 35 } // namespace sandbox
|
handle_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 34 } // namespace sandbox
|
named_pipe_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 35 } // namespace sandbox
|
registry_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 37 } // namespace sandbox
|
registry_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 36 } // namespace sandbox
|
sync_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 36 } // namespace sandbox
|
sync_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 39 } // namespace sandbox
|
sync_interception.cc | 5 #include "sandbox/win/src/sync_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
registry_policy.h | 11 #include "sandbox/win/src/crosscall_server.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/policy_low_level.h" 14 #include "sandbox/win/src/sandbox_policy.h" 16 namespace sandbox { namespace 55 } // namespace sandbox
|
sync_policy.h | 11 #include "sandbox/win/src/crosscall_server.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/policy_low_level.h" 14 #include "sandbox/win/src/sandbox_policy.h" 16 namespace sandbox { namespace 49 } // namespace sandbox
|
process_mitigations_test.cc | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/process_mitigations.h" 11 #include "sandbox/win/src/sandbox.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/target_services.h" 15 #include "sandbox/win/src/win_utils.h" 16 #include "sandbox/win/tests/common/controller.h" 85 namespace sandbox { namespace [all...] |
/external/chromium_org/components/autofill/content/browser/wallet/ |
wallet_service_url_unittest.cc | 15 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/" 18 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/" 21 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/paymentMethods", 23 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/settings/addresses", 25 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/" 28 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/" 31 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/" 34 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/" 37 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/" 40 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/ [all...] |
/external/chromium_org/chrome/test/security_tests/ |
security_tests.gyp | 14 '../../../sandbox/win/tests/validation_tests/commands.cc', 15 '../../../sandbox/win/tests/validation_tests/commands.h',
|
/external/chromium_org/content/app/ |
startup_helper_win.cc | 13 #include "sandbox/win/src/process_mitigations.h" 14 #include "sandbox/win/src/sandbox_factory.h" 38 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) { 39 info->broker_services = sandbox::SandboxFactory::GetBrokerServices(); 41 info->target_services = sandbox::SandboxFactory::GetTargetServices(); 44 sandbox::ApplyProcessMitigationsToCurrentProcess( 45 sandbox::MITIGATION_DEP | 46 sandbox::MITIGATION_DEP_NO_ATL_THUNK);
|
/external/chromium_org/content/worker/ |
worker_main.cc | 18 #include "sandbox/win/src/sandbox.h" 34 sandbox::TargetServices* target_services = 39 // Cause advapi32 to load before the sandbox is turned on. 42 // Warm up language subsystems before the sandbox is turned on. 48 // Sandbox should already be activated at this point. 49 CHECK(Sandbox::SandboxIsCurrentlyActive()); 51 // On Linux, the sandbox must be initialized early, before any thread is
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf_policy_forward.h | 12 class Sandbox; 15 Sandbox* sandbox_compiler,
|
/external/chromium_org/content/public/common/ |
sandboxed_process_launcher_delegate.h | 14 namespace sandbox { namespace 21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, 29 // |in_sandbox| to false if this process should be launched without a sandbox 33 // Called before the default sandbox is applied. If the default policy is too 36 //directory through the sandbox. 41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
sandbox_init.h | 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy_forward.h" 23 namespace sandbox { namespace 32 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in 36 // Returns true if the sandbox was initialized succesfully, false if an error 40 sandbox::SandboxInterfaceInfo* sandbox_info); 43 // that works inside the sandbox and can send handles but not retrieve 52 // Inform the current process's sandbox broker (e.g. the broker for 53 // 32-bit processes) about a process created under a different sandbox 69 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a 71 // supported by the sandbox profile associated with the given |sandbox_type| [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
append-child.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 37 sandbox.innerHTML = ''; 39 observer.observe(sandbox, {childList: true}); 42 sandbox.appendChild(elems[i]);
|
/external/chromium_org/content/common/ |
sandbox_win.cc | 29 #include "sandbox/win/src/process_mitigations.h" 30 #include "sandbox/win/src/sandbox.h" 31 #include "sandbox/win/src/sandbox_nt_util.h" 32 #include "sandbox/win/src/win_utils.h" 34 static sandbox::BrokerServices* g_broker_services = NULL; 35 static sandbox::TargetServices* g_target_services = NULL; 109 sandbox::TargetPolicy::Semantics access, 110 sandbox::TargetPolicy* policy) { 118 sandbox::ResultCode result [all...] |
sandbox_mac_diraccess_unittest.mm | 9 #include <sandbox.h> 29 // Tests need to be in the same namespace as the Sandbox class to be useable 68 EXPECT_TRUE(Sandbox::QuotePlainString(in, &out)); 91 EXPECT_FALSE(Sandbox::QuoteStringForRegex(fail_string, &out)); 92 EXPECT_TRUE(Sandbox::QuoteStringForRegex(ok_string, &out)); 99 EXPECT_TRUE(Sandbox::QuoteStringForRegex("}", &out)); // } == 0x7D == 125 100 EXPECT_FALSE(Sandbox::QuoteStringForRegex("~", &out)); // ~ == 0x7E == 126 102 Sandbox::QuoteStringForRegex(WideToUTF8(L"^\u2135.\u2136$"), &out)); 109 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in, &out)); 128 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out)) [all...] |
sandbox_mac.h | 30 // Class representing a substring of the sandbox profile tagged with its type. 57 class CONTENT_EXPORT Sandbox { 64 // sandbox is turned on. |sandbox_type| is the type of sandbox to warm up. 70 // Turns on the OS X sandbox for this process. 71 // |sandbox_type| - type of Sandbox to use. See SandboxWarmup() for legal 73 // |allowed_dir| - directory to allow access to, currently the only sandbox 76 // Returns true on success, false if an error occurred enabling the sandbox. 80 // Returns true if the sandbox has been enabled for the current process. 86 // Build the Sandbox command necessary to allow access to a named director [all...] |
sandbox_linux.h | 15 namespace sandbox { class SetuidSandboxClient; } namespace 23 // This is a list of sandbox IPC methods which the renderer may send to the 24 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC 40 // are enabled. If using the setuid sandbox, this should be called manually 41 // before the setuid sandbox is engaged. 44 // Initialize the sandbox with the given pre-built configuration. Currently 45 // seccomp-bpf and address space limitations (the setuid sandbox works 50 // Returns the Status of the renderers' sandbox. Can only be queried after 63 // Simple accessor for our instance of the setuid sandbox. Will never return 67 sandbox::SetuidSandboxClient* setuid_sandbox_client() const [all...] |
/external/chromium_org/sandbox/win/tools/launcher/ |
launcher.cc | 5 #include "sandbox/win/src/restricted_token_utils.h" 27 sandbox::TokenLevel* level) { 29 *level = sandbox::USER_LOCKDOWN; 31 *level = sandbox::USER_RESTRICTED; 33 *level = sandbox::USER_LIMITED; 35 *level = sandbox::USER_INTERACTIVE; 37 *level = sandbox::USER_NON_ADMIN; 39 *level = sandbox::USER_RESTRICTED_SAME_ACCESS; 41 *level = sandbox::USER_UNPROTECTED; 49 bool GetJobLevelFromString(const wchar_t *param, sandbox::JobLevel* level) [all...] |