HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 76 - 100 of 240) sorted by null

1 2 34 5 6 7 8 910

  /external/chromium_org/sandbox/win/src/
interception_agent.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/sandbox_types.h"
16 namespace sandbox { namespace
85 } // namespace sandbox
named_pipe_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
36 } // namespace sandbox
named_pipe_interception.cc 5 #include "sandbox/win/src/named_pipe_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
process_thread_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
49 } // namespace sandbox
process_thread_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
99 } // namespace sandbox
registry_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
38 } // namespace sandbox
resolver.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
103 } // namespace sandbox
sandbox_utils.cc 5 #include "sandbox/win/src/sandbox_utils.h"
11 #include "sandbox/win/src/internal_types.h"
13 namespace sandbox { namespace
38 } // namespace sandbox
sid_unittest.cc 11 #include "sandbox/win/src/sid.h"
14 namespace sandbox { namespace
71 } // namespace sandbox
sync_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
36 } // namespace sandbox
handle_policy_test.cc 6 #include "sandbox/win/src/handle_policy.h"
7 #include "sandbox/win/src/nt_internals.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/win_utils.h"
12 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
113 } // namespace sandbox
    [all...]
job.cc 5 #include "sandbox/win/src/job.h"
8 #include "sandbox/win/src/restricted_token.h"
10 namespace sandbox { namespace
116 } // namespace sandbox
named_pipe_policy_test.cc 6 #include "sandbox/win/src/handle_closer.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_policy.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
62 // Tests if we can create a pipe in the sandbox.
74 // On XP, the sandbox can create a pipe without any help but it fails on
82 // Tests if we can create a pipe with a path traversal in the sandbox
    [all...]
policy_broker.cc 7 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/policy_target.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_nt_types.h"
18 #include "sandbox/win/src/sandbox_types.h"
19 #include "sandbox/win/src/target_process.h
24 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.h 8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
69 } // namespace sandbox
  /external/chromium_org/content/public/common/
main_function_params.h 7 // (e.g., POSIX doesn't need to pass any sandbox information).
16 namespace sandbox { namespace
40 sandbox::SandboxInterfaceInfo* sandbox_info;
  /external/chromium_org/sandbox/linux/seccomp-bpf/
basicblock.h 10 #include "sandbox/linux/seccomp-bpf/instruction.h"
12 namespace sandbox { namespace
47 } // namespace sandbox
die.cc 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
15 #include "sandbox/linux/seccomp-bpf/syscall.h"
17 namespace sandbox { namespace
85 } // namespace sandbox
die.h 10 namespace sandbox { namespace
14 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
18 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m)
21 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__)
25 // Terminate the program, even if the current sandbox policy prevents some
65 } // namespace sandbox
errorcode_unittest.cc 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/tests/unit_tests.h"
10 namespace sandbox { namespace
24 SandboxBPF sandbox; local
25 ErrorCode e3 = sandbox.Trap(NULL, NULL);
30 SandboxBPF sandbox; local
31 ErrorCode e0 = sandbox.Trap(NULL, "a");
32 ErrorCode e1 = sandbox.Trap(NULL, "b");
36 ErrorCode e2 = sandbox.Trap(NULL, "a");
51 SandboxBPF sandbox; local
72 SandboxBPF sandbox; local
    [all...]
instruction.h 10 namespace sandbox { namespace
60 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
14 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
15 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
16 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
19 #include "sandbox/linux/services/linux_syscalls.h"
24 namespace sandbox { namespace
84 ErrorCode EvaluateSyscallImpl(int fs_denied_errno, SandboxBPF* sandbox,
94 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, AF_UNIX
    [all...]
  /external/chromium_org/sandbox/linux/services/
thread_helpers.cc 5 #include "sandbox/linux/services/thread_helpers.h"
22 namespace sandbox { namespace
84 } // namespace sandbox
thread_helpers_unittests.cc 5 #include "sandbox/linux/services/thread_helpers.h"
20 #include "sandbox/linux/tests/unit_tests.h"
25 namespace sandbox { namespace
93 } // namespace sandbox
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client_unittest.cc 11 #include "sandbox/linux/suid/common/sandbox.h"
14 namespace sandbox { namespace
71 // Set-up a fake environment as if we went through the setuid sandbox.
93 } // namespace sandbox

Completed in 340 milliseconds

1 2 34 5 6 7 8 910