HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 76 - 100 of 795) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/chromium_org/components/nacl/loader/
nacl_main_platform_delegate_linux.cc 24 // The sandbox is started in the zygote process: zygote_main_linux.cc
30 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc
33 // The seccomp sandbox is started in the renderer.
40 // The seccomp sandbox should not be enabled for Native Client until
43 // At best, NaCl will not work. At worst, enabling the seccomp sandbox
44 // could create a hole in the NaCl sandbox.
48 // The sandbox is started in the zygote process: zygote_main_linux.cc
nacl_main_platform_delegate_win.cc 12 #include "sandbox/win/src/sandbox.h"
35 sandbox::TargetServices* target_services =
55 VLOG(1) << "Testing NaCl sandbox\n";
61 sandbox::TargetServices* target_services =
65 // Cause advapi32 to load before the sandbox is turned on.
68 // Warm up language subsystems before the sandbox is turned on.
71 // Turn the sandbox on.
87 VLOG(1) << "Failed to get NaCl sandbox test function";
  /external/chromium_org/sandbox/win/src/
integrity_level_test.cc 10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_policy.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
90 } // namespace sandbox
named_pipe_policy.cc 5 #include "sandbox/win/src/named_pipe_policy.h"
9 #include "sandbox/win/src/ipc_tags.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_types.h"
43 namespace sandbox { namespace
86 } // namespace sandbox
target_interceptions.cc 5 #include "sandbox/win/src/target_interceptions.h"
7 #include "sandbox/win/src/interception_agent.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
100 } // namespace sandbox
named_pipe_policy_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_policy.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/tests/common/controller.h"
11 namespace sandbox { namespace
48 // Tests if we can create a pipe in the sandbox. On XP, the sandbox can create
78 } // namespace sandbox
named_pipe_policy.h 11 #include "sandbox/win/src/crosscall_server.h"
12 #include "sandbox/win/src/policy_low_level.h"
13 #include "sandbox/win/src/sandbox_policy.h"
15 namespace sandbox { namespace
42 } // namespace sandbox
win2k_threadpool.h 10 #include "sandbox/win/src/crosscall_server.h"
12 namespace sandbox { namespace
15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details
56 } // namespace sandbox
interceptors.h 9 #include "sandbox/win/src/interceptors_64.h"
12 namespace sandbox { namespace
52 } // namespace sandbox
policy_target.cc 5 #include "sandbox/win/src/policy_target.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_engine_processor.h"
10 #include "sandbox/win/src/policy_low_level.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
15 #include "sandbox/win/src/target_services.h
17 namespace sandbox { namespace
    [all...]
sandbox_factory.h 8 #include "sandbox/win/src/sandbox.h"
28 // The Sandbox library needs to be linked against the main executable, but
32 // the Sandbox API calls are made.
33 namespace sandbox { namespace
48 } // namespace sandbox
target_services.h 9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/win_utils.h"
12 namespace sandbox { namespace
38 // Look in the documentation of sandbox::TargetServices for more info.
69 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
suite.cc 5 // This file contains the validation tests for the sandbox.
7 // sandbox.
13 #include "sandbox/win/tests/common/controller.h"
19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) {
25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command))
48 namespace sandbox { namespace
    [all...]
  /external/chromium_org/chrome/
nacl.gypi 24 '../sandbox/sandbox.gyp:libc_urandom_override',
25 '../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/chrome/test/security_tests/
sandbox_browsertest_linux.cc 11 // Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox
25 // The setuid sandbox is required as our first-layer sandbox.
29 // A second-layer sandbox is also required to be adequately sandboxed.
security_tests.cc 11 #include "sandbox/win/tests/common/controller.h"
12 #include "sandbox/win/tests/validation_tests/commands.h"
14 using sandbox::TestOpenKey;
15 using sandbox::TestOpenReadFile;
16 using sandbox::TestOpenWriteFile;
19 if (sandbox::SBOX_TEST_DENIED != x) { \
28 // Runs the security tests of sandbox for the renderer process.
53 // Runs the security tests of sandbox for the plugin process.
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
remove-child-deep.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
8 var node = sandbox;
32 observer.observe(sandbox, {childList: true, subtree: true});
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/manifest/
sandbox.html 1 <h1 id="sandbox">Manifest - Sandbox</h1>
6 with them. Being in a sandbox has two implications:
21 served in a sandbox with a custom CSP:</p>
25 </span><span class="str">"sandbox"</span><span class="pun">:</span><span class="pln"> </span><span class="pun">{</span><span class="pln">
32 </span><span class="str">"sandbox allow-scripts; script-src https://www.google.com"</span><span class="pln">
39 <code>sandbox allow-scripts allow-forms</code>. You can specify your CSP
40 value to restrict the sandbox even further, but it must have the <code>sandbox</code>
42 <a href="http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-sandbox">th
    [all...]
  /external/chromium_org/content/common/
sandbox_mac_unittest_helper.h 13 // Helpers for writing unit tests that runs in the context of the Mac sandbox.
17 // its functions to run code before or after the sandbox is initialised in a
28 // .. test code that runs in sandbox goes here ..
43 // a given test in the sandbox.
46 // Runs a test specified by |test_name| in a sandbox of the type specified
48 // to the child process runing in the sandbox, or NULL if additional data is
56 // Runs the test specified by |test_name| in all the different sandbox types
63 // Additional sandbox types defined by the embedder (e.g. the NaCL sandbox)
69 // Class to ease writing test cases that run inside the OS X sandbox
    [all...]
sandbox_mac_unittest_helper.mm 8 #include <sandbox.h>
54 // Go through all the sandbox types, and run the test case in each of them
63 "Failed in sandbox type " << i <<
113 LOG(ERROR) << "Couldn't find sandbox test case(" << name << ")";
120 // Main function for driver process that enables the sandbox and runs test
128 LOG(ERROR) << "Sandbox type not specified";
134 LOG(ERROR) << "Sandbox test name not specified";
144 LOG(ERROR) << "Invalid sandbox test name (" << sandbox_test_name << ")";
152 LOG(ERROR) << sandbox_test_name << "Failed test before sandbox init";
156 Sandbox::SandboxWarmup(sandbox_type)
    [all...]
sandbox_init_mac.cc 16 // Warm up APIs before turning on the sandbox.
17 Sandbox::SandboxWarmup(sandbox_type);
19 // Actually sandbox the process.
20 return Sandbox::EnableSandbox(sandbox_type, allowed_dir);
25 // sandbox was disabled from the command line.
46 // Utility process sandbox.
51 // Worker process sandbox.
65 // the sandbox profile in ContentClient::GetSandboxProfileForSandboxType.
  /external/chromium_org/content/public/common/
sandbox_type_mac.h 10 // Defines the Mac sandbox types known within content. Embedders can add
11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE.
18 // The worker process uses the most restrictive sandbox which has almost
  /external/chromium_org/sandbox/win/wow_helper/
target_code.cc 5 #include "sandbox/win/wow_helper/target_code.h"
7 namespace sandbox { namespace
34 } // namespace sandbox
  /external/openssh/regress/
connect-privsep.sh 17 echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy
22 # XXX replace this with fail once sandbox has stabilised
23 warn "ssh privsep/sandbox+proxyconnect protocol $p failed"
  /external/chromium_org/content/browser/
worker.sb 6 ; This is the Sandbox configuration file used for safeguarding the worker
9 ; This is the most restrictive sandbox profile and only enables just enough

Completed in 561 milliseconds

1 2 34 5 6 7 8 91011>>