/external/chromium_org/sandbox/win/src/ |
policy_engine_params.h | 9 #include "sandbox/win/src/internal_types.h" 10 #include "sandbox/win/src/nt_internals.h" 11 #include "sandbox/win/src/sandbox_nt_util.h" 17 namespace sandbox { namespace 200 } // namespace sandbox
|
policy_engine_processor.cc | 5 #include "sandbox/win/src/policy_engine_processor.h" 7 namespace sandbox { namespace 107 } // namespace sandbox
|
policy_engine_processor.h | 9 #include "sandbox/win/src/policy_engine_params.h" 10 #include "sandbox/win/src/policy_engine_opcodes.h" 12 namespace sandbox { namespace 143 } // namespace sandbox
|
registry_dispatcher.cc | 5 #include "sandbox/win/src/registry_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/sandbox_nt_util.h" 14 #include "sandbox/win/src/policy_broker.h" 15 #include "sandbox/win/src/policy_params.h" 16 #include "sandbox/win/src/sandbox.h 40 namespace sandbox { namespace [all...] |
registry_interception.cc | 5 #include "sandbox/win/src/registry_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_nt_util.h" 11 #include "sandbox/win/src/sharedmem_ipc_client.h" 12 #include "sandbox/win/src/target_services.h" 14 namespace sandbox { namespace 176 } // namespace sandbox
|
registry_policy_test.cc | 8 #include "sandbox/win/src/registry_policy.h" 9 #include "sandbox/win/src/sandbox.h" 10 #include "sandbox/win/src/sandbox_policy.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/win_utils.h" 14 #include "sandbox/win/tests/common/controller.h" 43 namespace sandbox { namespace 289 } // namespace sandbox [all...] |
resolver_32.cc | 5 #include "sandbox/win/src/resolver.h" 7 #include "sandbox/win/src/sandbox_nt_util.h" 57 namespace sandbox { namespace 88 } // namespace sandbox
|
resolver_64.cc | 5 #include "sandbox/win/src/resolver.h" 7 #include "sandbox/win/src/sandbox_nt_util.h" 44 namespace sandbox { namespace 69 } // namespace sandbox
|
restricted_token.h | 13 #include "sandbox/win/src/restricted_token_utils.h" 14 #include "sandbox/win/src/security_level.h" 15 #include "sandbox/win/src/sid.h" 25 namespace sandbox { namespace 197 } // namespace sandbox
|
shared_handles.h | 18 namespace sandbox { namespace 106 } // namespace sandbox
|
sharedmem_ipc_client.cc | 6 #include "sandbox/win/src/sharedmem_ipc_client.h" 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/crosscall_params.h" 12 namespace sandbox { namespace 152 } // namespace sandbox
|
sync_dispatcher.cc | 5 #include "sandbox/win/src/sync_dispatcher.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/interception.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_broker.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox.h" 15 #include "sandbox/win/src/sync_interception.h 18 namespace sandbox { namespace [all...] |
sync_interception.cc | 5 #include "sandbox/win/src/sync_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
sync_policy_test.cc | 5 #include "sandbox/win/src/sync_policy_test.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_policy.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/src/nt_internals.h" 14 namespace sandbox { namespace 146 } // namespace sandbox
|
threadpool_unittest.cc | 5 #include "sandbox/win/src/win2k_threadpool.h" 16 namespace sandbox { namespace 94 } // namespace sandbox
|
win2k_threadpool.cc | 5 #include "sandbox/win/src/win2k_threadpool.h" 7 #include "sandbox/win/src/win_utils.h" 9 namespace sandbox { namespace 60 } // namespace sandbox
|
win_utils.h | 14 namespace sandbox { namespace 108 } // namespace sandbox
|
window.cc | 5 #include "sandbox/win/src/window.h" 11 #include "sandbox/win/src/acl.h" 12 #include "sandbox/win/src/sid.h" 35 namespace sandbox { namespace 155 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/integration_tests/ |
integration_tests_test.cc | 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 306 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
suite.cc | 5 // This file contains the validation tests for the sandbox. 7 // sandbox. 13 #include "sandbox/win/tests/common/controller.h" 19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) { 25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)) 48 namespace sandbox { namespace [all...] |
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_linux.h | 18 namespace sandbox { class SetuidSandboxClient; } namespace 26 // This is a list of sandbox IPC methods which the renderer may send to the 27 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC 43 // are enabled. If using the setuid sandbox, this should be called manually 44 // before the setuid sandbox is engaged. 47 // Initialize the sandbox with the given pre-built configuration. Currently 48 // seccomp-bpf and address space limitations (the setuid sandbox works 54 // Stop |thread| in a way that can be trusted by the sandbox. 57 // Returns the status of the renderer, worker and ppapi sandbox. Can only 70 // Simple accessor for our instance of the setuid sandbox. Will never retur [all...] |
/external/chromium_org/content/public/common/ |
content_client.h | 37 namespace sandbox { namespace 141 // resource ID corresponding to the sandbox profile to use. The legal values 143 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox 146 // the sandbox profile to use and true is returned.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
bpf_tests.h | 13 #include "sandbox/linux/tests/unit_tests.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 16 namespace sandbox { namespace 24 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX); \ 26 sandbox::BPFTests<aux>::TestArgs arg(BPF_TEST_##test_name, policy); \ 27 sandbox::BPFTests<aux>::RunTestInProcess( \ 28 sandbox::BPFTests<aux>::TestWrapper, &arg, death); \ 30 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX) 58 TestArgs(void (*t)(AuxType&), sandbox::SandboxBPF::EvaluateSyscall p) 62 sandbox::SandboxBPF::EvaluateSyscall policy() const { return policy_; 84 sandbox::SandboxBPF sandbox; local 101 sandbox::SandboxBPF sandbox; local [all...] |
syscall_unittest.cc | 15 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 17 #include "sandbox/linux/seccomp-bpf/syscall.h" 18 #include "sandbox/linux/tests/unit_tests.h" 21 namespace sandbox { namespace 81 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, int sysno, void* aux) { 86 return sandbox->Trap(CopySyscallArgsToAux, aux); 201 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.cc | 7 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 15 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 67 namespace sandbox { namespace 146 } // namespace sandbox.
|