/external/chromium_org/components/nacl/loader/ |
nacl_main_platform_delegate_linux.cc | 24 // The sandbox is started in the zygote process: zygote_main_linux.cc 30 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc 33 // The seccomp sandbox is started in the renderer. 40 // The seccomp sandbox should not be enabled for Native Client until 43 // At best, NaCl will not work. At worst, enabling the seccomp sandbox 44 // could create a hole in the NaCl sandbox. 48 // The sandbox is started in the zygote process: zygote_main_linux.cc
|
nacl_main_platform_delegate_win.cc | 12 #include "sandbox/win/src/sandbox.h" 35 sandbox::TargetServices* target_services = 55 VLOG(1) << "Testing NaCl sandbox\n"; 61 sandbox::TargetServices* target_services = 65 // Cause advapi32 to load before the sandbox is turned on. 68 // Warm up language subsystems before the sandbox is turned on. 71 // Turn the sandbox on. 87 VLOG(1) << "Failed to get NaCl sandbox test function";
|
/external/chromium_org/sandbox/win/src/ |
integrity_level_test.cc | 10 #include "sandbox/win/src/sandbox.h" 11 #include "sandbox/win/src/sandbox_policy.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/tests/common/controller.h" 15 namespace sandbox { namespace 90 } // namespace sandbox
|
named_pipe_policy.cc | 5 #include "sandbox/win/src/named_pipe_policy.h" 9 #include "sandbox/win/src/ipc_tags.h" 10 #include "sandbox/win/src/policy_engine_opcodes.h" 11 #include "sandbox/win/src/policy_params.h" 12 #include "sandbox/win/src/sandbox_types.h" 43 namespace sandbox { namespace 86 } // namespace sandbox
|
target_interceptions.cc | 5 #include "sandbox/win/src/target_interceptions.h" 7 #include "sandbox/win/src/interception_agent.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/sandbox_nt_util.h" 10 #include "sandbox/win/src/target_services.h" 12 namespace sandbox { namespace 100 } // namespace sandbox
|
named_pipe_policy_test.cc | 6 #include "sandbox/win/src/sandbox.h" 7 #include "sandbox/win/src/sandbox_policy.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/tests/common/controller.h" 11 namespace sandbox { namespace 48 // Tests if we can create a pipe in the sandbox. On XP, the sandbox can create 78 } // namespace sandbox
|
named_pipe_policy.h | 11 #include "sandbox/win/src/crosscall_server.h" 12 #include "sandbox/win/src/policy_low_level.h" 13 #include "sandbox/win/src/sandbox_policy.h" 15 namespace sandbox { namespace 42 } // namespace sandbox
|
win2k_threadpool.h | 10 #include "sandbox/win/src/crosscall_server.h" 12 namespace sandbox { namespace 15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details 56 } // namespace sandbox
|
interceptors.h | 9 #include "sandbox/win/src/interceptors_64.h" 12 namespace sandbox { namespace 52 } // namespace sandbox
|
policy_target.cc | 5 #include "sandbox/win/src/policy_target.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_engine_processor.h" 10 #include "sandbox/win/src/policy_low_level.h" 11 #include "sandbox/win/src/policy_params.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/src/sandbox_nt_util.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 15 #include "sandbox/win/src/target_services.h 17 namespace sandbox { namespace [all...] |
sandbox_factory.h | 8 #include "sandbox/win/src/sandbox.h" 28 // The Sandbox library needs to be linked against the main executable, but 32 // the Sandbox API calls are made. 33 namespace sandbox { namespace 48 } // namespace sandbox
|
target_services.h | 9 #include "sandbox/win/src/sandbox.h" 10 #include "sandbox/win/src/win_utils.h" 12 namespace sandbox { namespace 38 // Look in the documentation of sandbox::TargetServices for more info. 69 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
suite.cc | 5 // This file contains the validation tests for the sandbox. 7 // sandbox. 13 #include "sandbox/win/tests/common/controller.h" 19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) { 25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)) 48 namespace sandbox { namespace [all...] |
/external/chromium_org/chrome/ |
nacl.gypi | 24 '../sandbox/sandbox.gyp:libc_urandom_override', 25 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/chrome/test/security_tests/ |
sandbox_browsertest_linux.cc | 11 // Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox 25 // The setuid sandbox is required as our first-layer sandbox. 29 // A second-layer sandbox is also required to be adequately sandboxed.
|
security_tests.cc | 11 #include "sandbox/win/tests/common/controller.h" 12 #include "sandbox/win/tests/validation_tests/commands.h" 14 using sandbox::TestOpenKey; 15 using sandbox::TestOpenReadFile; 16 using sandbox::TestOpenWriteFile; 19 if (sandbox::SBOX_TEST_DENIED != x) { \ 28 // Runs the security tests of sandbox for the renderer process. 53 // Runs the security tests of sandbox for the plugin process.
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
remove-child-deep.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 8 var node = sandbox; 32 observer.observe(sandbox, {childList: true, subtree: true});
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/manifest/ |
sandbox.html | 1 <h1 id="sandbox">Manifest - Sandbox</h1> 6 with them. Being in a sandbox has two implications: 21 served in a sandbox with a custom CSP:</p> 25 </span><span class="str">"sandbox"</span><span class="pun">:</span><span class="pln"> </span><span class="pun">{</span><span class="pln"> 32 </span><span class="str">"sandbox allow-scripts; script-src https://www.google.com"</span><span class="pln"> 39 <code>sandbox allow-scripts allow-forms</code>. You can specify your CSP 40 value to restrict the sandbox even further, but it must have the <code>sandbox</code> 42 <a href="http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-sandbox">th [all...] |
/external/chromium_org/content/common/ |
sandbox_mac_unittest_helper.h | 13 // Helpers for writing unit tests that runs in the context of the Mac sandbox. 17 // its functions to run code before or after the sandbox is initialised in a 28 // .. test code that runs in sandbox goes here .. 43 // a given test in the sandbox. 46 // Runs a test specified by |test_name| in a sandbox of the type specified 48 // to the child process runing in the sandbox, or NULL if additional data is 56 // Runs the test specified by |test_name| in all the different sandbox types 63 // Additional sandbox types defined by the embedder (e.g. the NaCL sandbox) 69 // Class to ease writing test cases that run inside the OS X sandbox [all...] |
sandbox_mac_unittest_helper.mm | 8 #include <sandbox.h> 54 // Go through all the sandbox types, and run the test case in each of them 63 "Failed in sandbox type " << i << 113 LOG(ERROR) << "Couldn't find sandbox test case(" << name << ")"; 120 // Main function for driver process that enables the sandbox and runs test 128 LOG(ERROR) << "Sandbox type not specified"; 134 LOG(ERROR) << "Sandbox test name not specified"; 144 LOG(ERROR) << "Invalid sandbox test name (" << sandbox_test_name << ")"; 152 LOG(ERROR) << sandbox_test_name << "Failed test before sandbox init"; 156 Sandbox::SandboxWarmup(sandbox_type) [all...] |
sandbox_init_mac.cc | 16 // Warm up APIs before turning on the sandbox. 17 Sandbox::SandboxWarmup(sandbox_type); 19 // Actually sandbox the process. 20 return Sandbox::EnableSandbox(sandbox_type, allowed_dir); 25 // sandbox was disabled from the command line. 46 // Utility process sandbox. 51 // Worker process sandbox. 65 // the sandbox profile in ContentClient::GetSandboxProfileForSandboxType.
|
/external/chromium_org/content/public/common/ |
sandbox_type_mac.h | 10 // Defines the Mac sandbox types known within content. Embedders can add 11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE. 18 // The worker process uses the most restrictive sandbox which has almost
|
/external/chromium_org/sandbox/win/wow_helper/ |
target_code.cc | 5 #include "sandbox/win/wow_helper/target_code.h" 7 namespace sandbox { namespace 34 } // namespace sandbox
|
/external/openssh/regress/ |
connect-privsep.sh | 17 echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy 22 # XXX replace this with fail once sandbox has stabilised 23 warn "ssh privsep/sandbox+proxyconnect protocol $p failed"
|
/external/chromium_org/content/browser/ |
worker.sb | 6 ; This is the Sandbox configuration file used for safeguarding the worker 9 ; This is the most restrictive sandbox profile and only enables just enough
|