HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 151 - 175 of 240) sorted by null

1 2 3 4 5 67 8 910

  /external/chromium_org/sandbox/linux/services/
broker_process.h 15 namespace sandbox { namespace
25 // 3. Enable sandbox.
46 // sandbox in the broker.
100 } // namespace sandbox
credentials_unittest.cc 5 #include "sandbox/linux/services/credentials.h"
17 #include "sandbox/linux/tests/unit_tests.h"
22 namespace sandbox { namespace
215 } // namespace sandbox.
libc_urandom_override.cc 5 #include "sandbox/linux/services/libc_urandom_override.h"
23 namespace sandbox { namespace
  /external/chromium_org/sandbox/win/src/
filesystem_interception.cc 5 #include "sandbox/win/src/filesystem_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
interception.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
18 #include "sandbox/win/src/sandbox_types.h"
20 namespace sandbox { namespace
42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1))
47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2))
62 // do not work with sandbox tests.
238 sandbox::INTERCEPTION_SERVICE_CALL, \
251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \
264 sandbox::INTERCEPTION_SERVICE_CALL, \
275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT,
    [all...]
job_unittest.cc 8 #include "sandbox/win/src/job.h"
11 namespace sandbox { namespace
194 } // namespace sandbox
policy_engine_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
10 #define POLPARAM(p) sandbox::ParamPickerMake(p),
13 namespace sandbox { namespace
102 } // namespace sandbox
registry_policy.cc 7 #include "sandbox/win/src/registry_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
115 namespace sandbox { namespace
225 } // namespace sandbox
sharedmem_ipc_server.h 12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
32 namespace sandbox { namespace
56 // do not work with sandbox tests.
125 } // namespace sandbox
sidestep_resolver.cc 5 #include "sandbox/win/src/sidestep_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/sidestep/preamble_patcher.h"
28 namespace sandbox { namespace
202 } // namespace sandbox
app_container.cc 5 #include "sandbox/win/src/app_container.h"
13 #include "sandbox/win/src/internal_types.h"
28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName);
31 module = GetModuleHandle(sandbox::kKernelBasedllName);
39 namespace sandbox { namespace
182 } // namespace sandbox
crosscall_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
39 namespace sandbox { namespace
481 } // namespace sandbox
filesystem_dispatcher.cc 5 #include "sandbox/win/src/filesystem_dispatcher.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/filesystem_policy.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox.h
18 namespace sandbox { namespace
    [all...]
handle_closer.cc 5 #include "sandbox/win/src/handle_closer.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/process_thread_interception.h"
14 #include "sandbox/win/src/win_utils.h"
30 namespace sandbox { namespace
202 } // namespace sandbox
handle_closer_test.cc 7 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
51 namespace sandbox { namespace
111 sandbox::TargetPolicy* policy = runner.GetPolicy();
118 CHECK(sandbox::GetHandleName(marker, &handle_name));
131 sandbox::TargetPolicy* policy = runner.GetPolicy()
    [all...]
interception_internal.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
12 #include "sandbox/win/src/sandbox_types.h"
14 namespace sandbox { namespace
74 } // namespace sandbox
interceptors_64.cc 5 #include "sandbox/win/src/interceptors_64.h"
7 #include "sandbox/win/src/interceptors.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/named_pipe_interception.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/process_thread_interception.h"
12 #include "sandbox/win/src/registry_interception.h"
13 #include "sandbox/win/src/sandbox_nt_types.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/sync_interception.h
18 namespace sandbox { namespace
    [all...]
internal_types.h 8 namespace sandbox { namespace
74 } // namespace sandbox
ipc_tags.h 8 namespace sandbox { namespace
35 } // namespace sandbox
policy_low_level.h 12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_engine_params.h"
14 #include "sandbox/win/src/policy_engine_opcodes.h"
40 namespace sandbox { namespace
181 } // namespace sandbox
policy_target_test.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
14 namespace sandbox { namespace
214 // Launches the app in the sandbox and ask it to wait in an
277 // Launches the app in the sandbox and ask it to wait in an
344 } // namespace sandbox
    [all...]
process_mitigations.cc 5 #include "sandbox/win/src/process_mitigations.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/sandbox_utils.h"
12 #include "sandbox/win/src/win_utils.h"
29 namespace sandbox { namespace
333 } // namespace sandbox
process_mitigations_test.cc 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/process_mitigations.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/target_services.h"
15 #include "sandbox/win/src/win_utils.h"
16 #include "sandbox/win/tests/common/controller.h"
85 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.cc 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
15 #include "sandbox/win/wow_helper/service64_resolver.h"
16 #include "sandbox/win/wow_helper/target_code.h"
55 namespace sandbox { namespace
91 } // namespace sandbox
122 return sandbox::PatchNtdll(child, thunk, kPageSize);
  /external/chromium_org/sandbox/linux/seccomp-bpf/
verifier.cc 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
10 #include "sandbox/linux/seccomp-bpf/verifier.h"
13 namespace sandbox { namespace
31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
42 return sandbox->Unexpected64bitArgument().err();
46 return EvaluateErrorCode(sandbox,
54 return EvaluateErrorCode(sandbox,
63 return EvaluateErrorCode(sandbox,
    [all...]

Completed in 330 milliseconds

1 2 3 4 5 67 8 910