HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 126 - 150 of 240) sorted by null

1 2 3 4 56 7 8 910

  /external/chromium_org/sandbox/win/src/
policy_engine_params.h 9 #include "sandbox/win/src/internal_types.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
17 namespace sandbox { namespace
200 } // namespace sandbox
policy_engine_processor.cc 5 #include "sandbox/win/src/policy_engine_processor.h"
7 namespace sandbox { namespace
107 } // namespace sandbox
policy_engine_processor.h 9 #include "sandbox/win/src/policy_engine_params.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
12 namespace sandbox { namespace
143 } // namespace sandbox
registry_dispatcher.cc 5 #include "sandbox/win/src/registry_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/policy_broker.h"
15 #include "sandbox/win/src/policy_params.h"
16 #include "sandbox/win/src/sandbox.h
40 namespace sandbox { namespace
    [all...]
registry_interception.cc 5 #include "sandbox/win/src/registry_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
176 } // namespace sandbox
registry_policy_test.cc 8 #include "sandbox/win/src/registry_policy.h"
9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/win_utils.h"
14 #include "sandbox/win/tests/common/controller.h"
43 namespace sandbox { namespace
289 } // namespace sandbox
    [all...]
resolver_32.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
57 namespace sandbox { namespace
88 } // namespace sandbox
resolver_64.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
44 namespace sandbox { namespace
69 } // namespace sandbox
restricted_token.h 13 #include "sandbox/win/src/restricted_token_utils.h"
14 #include "sandbox/win/src/security_level.h"
15 #include "sandbox/win/src/sid.h"
25 namespace sandbox { namespace
197 } // namespace sandbox
shared_handles.h 18 namespace sandbox { namespace
106 } // namespace sandbox
sharedmem_ipc_client.cc 6 #include "sandbox/win/src/sharedmem_ipc_client.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/crosscall_params.h"
12 namespace sandbox { namespace
152 } // namespace sandbox
sync_dispatcher.cc 5 #include "sandbox/win/src/sync_dispatcher.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/interception.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_broker.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox.h"
15 #include "sandbox/win/src/sync_interception.h
18 namespace sandbox { namespace
    [all...]
sync_interception.cc 5 #include "sandbox/win/src/sync_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
sync_policy_test.cc 5 #include "sandbox/win/src/sync_policy_test.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_policy.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/src/nt_internals.h"
14 namespace sandbox { namespace
146 } // namespace sandbox
threadpool_unittest.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
16 namespace sandbox { namespace
94 } // namespace sandbox
win2k_threadpool.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
7 #include "sandbox/win/src/win_utils.h"
9 namespace sandbox { namespace
60 } // namespace sandbox
win_utils.h 14 namespace sandbox { namespace
108 } // namespace sandbox
window.cc 5 #include "sandbox/win/src/window.h"
11 #include "sandbox/win/src/acl.h"
12 #include "sandbox/win/src/sid.h"
35 namespace sandbox { namespace
155 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/integration_tests/
integration_tests_test.cc 8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
306 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
suite.cc 5 // This file contains the validation tests for the sandbox.
7 // sandbox.
13 #include "sandbox/win/tests/common/controller.h"
19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) {
25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command))
48 namespace sandbox { namespace
    [all...]
  /external/chromium_org/content/common/sandbox_linux/
sandbox_linux.h 18 namespace sandbox { class SetuidSandboxClient; } namespace
26 // This is a list of sandbox IPC methods which the renderer may send to the
27 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
43 // are enabled. If using the setuid sandbox, this should be called manually
44 // before the setuid sandbox is engaged.
47 // Initialize the sandbox with the given pre-built configuration. Currently
48 // seccomp-bpf and address space limitations (the setuid sandbox works
54 // Stop |thread| in a way that can be trusted by the sandbox.
57 // Returns the status of the renderer, worker and ppapi sandbox. Can only
70 // Simple accessor for our instance of the setuid sandbox. Will never retur
    [all...]
  /external/chromium_org/content/public/common/
content_client.h 37 namespace sandbox { namespace
141 // resource ID corresponding to the sandbox profile to use. The legal values
143 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox
146 // the sandbox profile to use and true is returned.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
bpf_tests.h 13 #include "sandbox/linux/tests/unit_tests.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
16 namespace sandbox { namespace
24 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX); \
26 sandbox::BPFTests<aux>::TestArgs arg(BPF_TEST_##test_name, policy); \
27 sandbox::BPFTests<aux>::RunTestInProcess( \
28 sandbox::BPFTests<aux>::TestWrapper, &arg, death); \
30 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX)
58 TestArgs(void (*t)(AuxType&), sandbox::SandboxBPF::EvaluateSyscall p)
62 sandbox::SandboxBPF::EvaluateSyscall policy() const { return policy_;
84 sandbox::SandboxBPF sandbox; local
101 sandbox::SandboxBPF sandbox; local
    [all...]
syscall_unittest.cc 15 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/seccomp-bpf/syscall.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
81 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, int sysno, void* aux) {
86 return sandbox->Trap(CopySyscallArgsToAux, aux);
201 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
sigsys_handlers.cc 7 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
15 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
67 namespace sandbox { namespace
146 } // namespace sandbox.

Completed in 342 milliseconds

1 2 3 4 56 7 8 910