HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 101 - 125 of 851) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium_org/sandbox/win/src/
sandbox_nt_types.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
44 } // namespace sandbox
sandbox_factory.h 8 #include "sandbox/win/src/sandbox.h"
28 // The Sandbox library needs to be linked against the main executable, but
32 // the Sandbox API calls are made.
33 namespace sandbox { namespace
48 } // namespace sandbox
target_services.h 9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/win_utils.h"
12 namespace sandbox { namespace
38 // Look in the documentation of sandbox::TargetServices for more info.
69 } // namespace sandbox
ipc_tags.h 8 namespace sandbox { namespace
35 } // namespace sandbox
sid.h 10 namespace sandbox { namespace
27 } // namespace sandbox
sync_interception.cc 5 #include "sandbox/win/src/sync_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
target_services.cc 5 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/handle_closer_agent.h"
12 #include "sandbox/win/src/handle_interception.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/process_mitigations.h"
15 #include "sandbox/win/src/restricted_token_utils.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_types.h
61 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
target_code.cc 5 #include "sandbox/win/wow_helper/target_code.h"
7 namespace sandbox { namespace
34 } // namespace sandbox
  /external/openssh/regress/
connect-privsep.sh 17 echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy
22 # XXX replace this with fail once sandbox has stabilised
23 warn "ssh privsep/sandbox+proxyconnect protocol $p failed"
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.h 13 namespace sandbox { namespace
15 // Helper class to use the setuid sandbox. This class is to be used both
21 // 2. The browser launches a renderer through the setuid sandbox.
30 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
36 // See sandbox/linux/services/init_process_reaper.h for more information
62 } // namespace sandbox
setuid_sandbox_client.cc 15 #include "sandbox/linux/services/init_process_reaper.h"
16 #include "sandbox/linux/suid/common/sandbox.h"
17 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h"
23 // setuid sandbox. Old versions of the sandbox will ignore this.
25 env->SetVar(sandbox::kSandboxEnvironmentApiRequest,
26 base::IntToString(sandbox::kSUIDSandboxApiNumber));
44 // different names here so that the SUID sandbox can resolve them for the
65 if (env->GetVar(sandbox::kSandboxEnvironmentApiProvides, &api_string) &
96 namespace sandbox { namespace
    [all...]
  /external/chromium_org/chrome/test/security_tests/
security_tests.cc 11 #include "sandbox/win/tests/common/controller.h"
12 #include "sandbox/win/tests/validation_tests/commands.h"
14 using sandbox::TestOpenKey;
15 using sandbox::TestOpenReadFile;
16 using sandbox::TestOpenWriteFile;
19 if (sandbox::SBOX_TEST_DENIED != x) { \
28 // Runs the security tests of sandbox for the renderer process.
53 // Runs the security tests of sandbox for the plugin process.
  /external/chromium_org/content/browser/
worker.sb 6 ; This is the Sandbox configuration file used for safeguarding the worker
9 ; This is the most restrictive sandbox profile and only enables just enough
  /external/chromium_org/content/common/
sandbox_init_mac.cc 16 // Warm up APIs before turning on the sandbox.
17 Sandbox::SandboxWarmup(sandbox_type);
19 // Actually sandbox the process.
20 return Sandbox::EnableSandbox(sandbox_type, allowed_dir);
25 // sandbox was disabled from the command line.
46 // Utility process sandbox.
51 // Worker process sandbox.
65 // the sandbox profile in ContentClient::GetSandboxProfileForSandboxType.
sandbox_init_mac.h 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in
13 // Returns true if the sandbox was initialized succesfully, false if an error
  /external/chromium_org/content/worker/
worker_main.cc 18 #include "sandbox/win/src/sandbox.h"
35 sandbox::TargetServices* target_services =
40 // Cause advapi32 to load before the sandbox is turned on.
43 // Warm up language subsystems before the sandbox is turned on.
49 // Sandbox should already be activated at this point.
50 CHECK(Sandbox::SandboxIsCurrentlyActive());
52 // On Linux, the sandbox must be initialized early, before any thread is
  /external/chromium_org/sandbox/linux/services/
android_ucontext.h 11 #include "sandbox/linux/services/android_arm_ucontext.h"
13 #include "sandbox/linux/services/android_i386_ucontext.h"
  /external/chromium_org/sandbox/
sandbox.gyp 21 # A 'default' to accomodate the "sandbox" target.
24 'target_name': 'sandbox',
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
pocdll.cc 6 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
7 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/sandbox/win/tests/validation_tests/
unit_tests.cc 6 #include "sandbox/win/tests/common/controller.h"
11 return sandbox::DispatchCall(argc, argv);
suite.cc 5 // This file contains the validation tests for the sandbox.
7 // sandbox.
13 #include "sandbox/win/tests/common/controller.h"
19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) {
25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command))
48 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/tools/finder/
main.cc 5 #include "sandbox/win/src/restricted_token_utils.h"
6 #include "sandbox/win/tools/finder/finder.h"
32 sandbox::TokenLevel token_type = sandbox::USER_LOCKDOWN;
48 token_type = sandbox::USER_LOCKDOWN;
50 token_type = sandbox::USER_RESTRICTED;
52 token_type = sandbox::USER_LIMITED;
54 token_type = sandbox::USER_INTERACTIVE;
56 token_type = sandbox::USER_NON_ADMIN;
58 token_type = sandbox::USER_RESTRICTED_SAME_ACCESS
    [all...]
  /external/chromium_org/content/common/sandbox_linux/
bpf_gpu_policy_linux.cc 26 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
27 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
28 #include "sandbox/linux/services/broker_process.h"
29 #include "sandbox/linux/services/linux_syscalls.h"
31 using sandbox::BrokerProcess;
32 using sandbox::ErrorCode;
33 using sandbox::SandboxBPF;
34 using sandbox::SyscallSets;
35 using sandbox::arch_seccomp_data;
127 ErrorCode GpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
    [all...]
sandbox_linux.h 18 namespace sandbox { class SetuidSandboxClient; } namespace
26 // This is a list of sandbox IPC methods which the renderer may send to the
27 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
43 // are enabled. If using the setuid sandbox, this should be called manually
44 // before the setuid sandbox is engaged.
47 // Initialize the sandbox with the given pre-built configuration. Currently
48 // seccomp-bpf and address space limitations (the setuid sandbox works
54 // Stop |thread| in a way that can be trusted by the sandbox.
57 // Returns the status of the renderer, worker and ppapi sandbox. Can only
70 // Simple accessor for our instance of the setuid sandbox. Will never retur
    [all...]
  /external/chromium/chrome/browser/resources/gpu_internals/
timeline_test.html 30 <div id="sandbox"></div>
33 var sandbox = document.getElementById('sandbox');
41 sandbox.appendChild(timeline);

Completed in 298 milliseconds

1 2 3 45 6 7 8 91011>>