/external/chromium_org/ash/shell/ |
DEPS | 3 "+sandbox",
|
/external/chromium_org/remoting/host/win/ |
DEPS | 2 "+sandbox/win/src",
|
/external/chromium_org/chrome/common/extensions/docs/templates/public/apps/manifest/ |
sandbox.html | 1 {{+partials.standard_apps_article article:intros.manifest/sandbox}}
|
/external/chromium_org/chrome/common/extensions/docs/templates/public/extensions/manifest/ |
sandbox.html | 1 {{+partials.standard_extensions_article article:intros.manifest/sandbox}}
|
/external/chromium_org/ui/views/examples/ |
DEPS | 4 "+sandbox",
|
/external/chromium/third_party/libjingle/source/ |
README.chrome-sandbox | 1 The chrome-sandbox branch contains some experemental changes that are needed 2 to make libjingle work in sandbox in Chrome.
|
/external/chromium_org/components/nacl/broker/ |
DEPS | 3 "+sandbox/win/src",
|
/external/chromium_org/content/gpu/ |
DEPS | 5 "+sandbox",
|
/external/chromium_org/content/utility/ |
DEPS | 4 "+sandbox/win/src",
|
OWNERS | 3 # Mac Sandbox profiles.
|
/external/chromium_org/content/worker/ |
DEPS | 3 "+sandbox/win/src",
|
/external/chromium_org/content/common/ |
sandbox_win.h | 8 #include "sandbox/win/src/security_level.h" 12 namespace sandbox { namespace 20 // Wrapper around sandbox::TargetPolicy::SetJobLevel that checks if the sandbox 23 sandbox::JobLevel job_level, 25 sandbox::TargetPolicy* policy); 28 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy); 30 bool InitBrokerServices(sandbox::BrokerServices* broker_services); 32 bool InitTargetServices(sandbox::TargetServices* target_services);
|
/external/chromium_org/sandbox/win/src/ |
handle_interception.cc | 5 #include "sandbox/win/src/handle_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_nt_util.h" 11 #include "sandbox/win/src/sharedmem_ipc_client.h" 12 #include "sandbox/win/src/target_services.h" 14 namespace sandbox { namespace 44 } // namespace sandbox
|
handle_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 21 } // namespace sandbox
|
named_pipe_dispatcher.cc | 5 #include "sandbox/win/src/named_pipe_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/named_pipe_interception.h" 14 #include "sandbox/win/src/named_pipe_policy.h" 15 #include "sandbox/win/src/policy_broker.h" 16 #include "sandbox/win/src/policy_params.h" 17 #include "sandbox/win/src/sandbox.h 20 namespace sandbox { namespace [all...] |
Wow64_64.cc | 7 #include "sandbox/win/src/wow64.h" 9 namespace sandbox { namespace 18 } // namespace sandbox
|
sync_policy_test.h | 8 #include "sandbox/win/tests/common/controller.h" 10 namespace sandbox { namespace 16 } // namespace sandbox
|
named_pipe_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 34 } // namespace sandbox
|
/external/chromium_org/chrome/nacl/ |
DEPS | 7 "+sandbox/linux/services", 8 "+sandbox/win/src",
|
/external/chromium_org/chrome/service/ |
DEPS | 5 "+sandbox/win/src/sandbox_types.h",
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
errorcode_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 6 #include "sandbox/linux/tests/unit_tests.h" 22 Sandbox sandbox; local 23 ErrorCode e3 = sandbox.Trap(NULL, NULL); 28 Sandbox sandbox; local 29 ErrorCode e0 = sandbox.Trap(NULL, "a"); 30 ErrorCode e1 = sandbox.Trap(NULL, "b"); 34 ErrorCode e2 = sandbox.Trap(NULL, "a") 49 Sandbox sandbox; local 70 Sandbox sandbox; local [all...] |
/external/chromium_org/components/nacl/loader/ |
DEPS | 5 "+sandbox/linux/seccomp-bpf", 6 "+sandbox/linux/services", 7 "+sandbox/win/src",
|
/external/chromium_org/content/plugin/ |
DEPS | 5 "+sandbox/win/src",
|
/external/chromium_org/content/ppapi_plugin/ |
OWNERS | 3 # Mac Sandbox profiles.
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
remove-child.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 29 observer.observe(sandbox, {childList: true}); 42 sandbox.appendChild(document.createElement('div')); 45 while (sandbox.firstChild) 46 sandbox.removeChild(sandbox.firstChild); 50 observer.observe(sandbox, {childList: true});
|