HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 51 - 75 of 795) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/sandbox/win/src/
eat_resolver.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
45 } // namespace sandbox
handle_closer_agent.h 10 #include "sandbox/win/src/handle_closer.h"
11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
35 } // namespace sandbox
handle_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
34 } // namespace sandbox
named_pipe_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
35 } // namespace sandbox
registry_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
37 } // namespace sandbox
registry_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
36 } // namespace sandbox
sync_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
36 } // namespace sandbox
sync_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
39 } // namespace sandbox
sync_interception.cc 5 #include "sandbox/win/src/sync_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
registry_policy.h 11 #include "sandbox/win/src/crosscall_server.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/policy_low_level.h"
14 #include "sandbox/win/src/sandbox_policy.h"
16 namespace sandbox { namespace
55 } // namespace sandbox
sync_policy.h 11 #include "sandbox/win/src/crosscall_server.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/policy_low_level.h"
14 #include "sandbox/win/src/sandbox_policy.h"
16 namespace sandbox { namespace
49 } // namespace sandbox
process_mitigations_test.cc 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/process_mitigations.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/target_services.h"
15 #include "sandbox/win/src/win_utils.h"
16 #include "sandbox/win/tests/common/controller.h"
85 namespace sandbox { namespace
    [all...]
  /external/chromium_org/components/autofill/content/browser/wallet/
wallet_service_url_unittest.cc 15 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/"
18 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/"
21 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/paymentMethods",
23 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/settings/addresses",
25 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/"
28 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/"
31 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/"
34 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/wallet/"
37 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/"
40 EXPECT_EQ("https://payments-form-dogfood.sandbox.google.com/online/v2/
    [all...]
  /external/chromium_org/chrome/test/security_tests/
security_tests.gyp 14 '../../../sandbox/win/tests/validation_tests/commands.cc',
15 '../../../sandbox/win/tests/validation_tests/commands.h',
  /external/chromium_org/content/app/
startup_helper_win.cc 13 #include "sandbox/win/src/process_mitigations.h"
14 #include "sandbox/win/src/sandbox_factory.h"
38 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) {
39 info->broker_services = sandbox::SandboxFactory::GetBrokerServices();
41 info->target_services = sandbox::SandboxFactory::GetTargetServices();
44 sandbox::ApplyProcessMitigationsToCurrentProcess(
45 sandbox::MITIGATION_DEP |
46 sandbox::MITIGATION_DEP_NO_ATL_THUNK);
  /external/chromium_org/content/worker/
worker_main.cc 18 #include "sandbox/win/src/sandbox.h"
34 sandbox::TargetServices* target_services =
39 // Cause advapi32 to load before the sandbox is turned on.
42 // Warm up language subsystems before the sandbox is turned on.
48 // Sandbox should already be activated at this point.
49 CHECK(Sandbox::SandboxIsCurrentlyActive());
51 // On Linux, the sandbox must be initialized early, before any thread is
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf_policy_forward.h 12 class Sandbox;
15 Sandbox* sandbox_compiler,
  /external/chromium_org/content/public/common/
sandboxed_process_launcher_delegate.h 14 namespace sandbox { namespace
21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy,
29 // |in_sandbox| to false if this process should be launched without a sandbox
33 // Called before the default sandbox is applied. If the default policy is too
36 //directory through the sandbox.
41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
sandbox_init.h 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy_forward.h"
23 namespace sandbox { namespace
32 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in
36 // Returns true if the sandbox was initialized succesfully, false if an error
40 sandbox::SandboxInterfaceInfo* sandbox_info);
43 // that works inside the sandbox and can send handles but not retrieve
52 // Inform the current process's sandbox broker (e.g. the broker for
53 // 32-bit processes) about a process created under a different sandbox
69 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
71 // supported by the sandbox profile associated with the given |sandbox_type|
    [all...]
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
append-child.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
37 sandbox.innerHTML = '';
39 observer.observe(sandbox, {childList: true});
42 sandbox.appendChild(elems[i]);
  /external/chromium_org/content/common/
sandbox_win.cc 29 #include "sandbox/win/src/process_mitigations.h"
30 #include "sandbox/win/src/sandbox.h"
31 #include "sandbox/win/src/sandbox_nt_util.h"
32 #include "sandbox/win/src/win_utils.h"
34 static sandbox::BrokerServices* g_broker_services = NULL;
35 static sandbox::TargetServices* g_target_services = NULL;
109 sandbox::TargetPolicy::Semantics access,
110 sandbox::TargetPolicy* policy) {
118 sandbox::ResultCode result
    [all...]
sandbox_mac_diraccess_unittest.mm 9 #include <sandbox.h>
29 // Tests need to be in the same namespace as the Sandbox class to be useable
68 EXPECT_TRUE(Sandbox::QuotePlainString(in, &out));
91 EXPECT_FALSE(Sandbox::QuoteStringForRegex(fail_string, &out));
92 EXPECT_TRUE(Sandbox::QuoteStringForRegex(ok_string, &out));
99 EXPECT_TRUE(Sandbox::QuoteStringForRegex("}", &out)); // } == 0x7D == 125
100 EXPECT_FALSE(Sandbox::QuoteStringForRegex("~", &out)); // ~ == 0x7E == 126
102 Sandbox::QuoteStringForRegex(WideToUTF8(L"^\u2135.\u2136$"), &out));
109 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in, &out));
128 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out))
    [all...]
sandbox_mac.h 30 // Class representing a substring of the sandbox profile tagged with its type.
57 class CONTENT_EXPORT Sandbox {
64 // sandbox is turned on. |sandbox_type| is the type of sandbox to warm up.
70 // Turns on the OS X sandbox for this process.
71 // |sandbox_type| - type of Sandbox to use. See SandboxWarmup() for legal
73 // |allowed_dir| - directory to allow access to, currently the only sandbox
76 // Returns true on success, false if an error occurred enabling the sandbox.
80 // Returns true if the sandbox has been enabled for the current process.
86 // Build the Sandbox command necessary to allow access to a named director
    [all...]
sandbox_linux.h 15 namespace sandbox { class SetuidSandboxClient; } namespace
23 // This is a list of sandbox IPC methods which the renderer may send to the
24 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
40 // are enabled. If using the setuid sandbox, this should be called manually
41 // before the setuid sandbox is engaged.
44 // Initialize the sandbox with the given pre-built configuration. Currently
45 // seccomp-bpf and address space limitations (the setuid sandbox works
50 // Returns the Status of the renderers' sandbox. Can only be queried after
63 // Simple accessor for our instance of the setuid sandbox. Will never return
67 sandbox::SetuidSandboxClient* setuid_sandbox_client() const
    [all...]
  /external/chromium_org/sandbox/win/tools/launcher/
launcher.cc 5 #include "sandbox/win/src/restricted_token_utils.h"
27 sandbox::TokenLevel* level) {
29 *level = sandbox::USER_LOCKDOWN;
31 *level = sandbox::USER_RESTRICTED;
33 *level = sandbox::USER_LIMITED;
35 *level = sandbox::USER_INTERACTIVE;
37 *level = sandbox::USER_NON_ADMIN;
39 *level = sandbox::USER_RESTRICTED_SAME_ACCESS;
41 *level = sandbox::USER_UNPROTECTED;
49 bool GetJobLevelFromString(const wchar_t *param, sandbox::JobLevel* level)
    [all...]

Completed in 3946 milliseconds

1 23 4 5 6 7 8 91011>>