/external/chromium_org/sandbox/win/src/ |
sandbox_nt_types.h | 8 #include "sandbox/win/src/nt_internals.h" 10 namespace sandbox { namespace 44 } // namespace sandbox
|
sandbox_factory.h | 8 #include "sandbox/win/src/sandbox.h" 28 // The Sandbox library needs to be linked against the main executable, but 32 // the Sandbox API calls are made. 33 namespace sandbox { namespace 48 } // namespace sandbox
|
target_services.h | 9 #include "sandbox/win/src/sandbox.h" 10 #include "sandbox/win/src/win_utils.h" 12 namespace sandbox { namespace 38 // Look in the documentation of sandbox::TargetServices for more info. 69 } // namespace sandbox
|
ipc_tags.h | 8 namespace sandbox { namespace 35 } // namespace sandbox
|
sid.h | 10 namespace sandbox { namespace 27 } // namespace sandbox
|
sync_interception.cc | 5 #include "sandbox/win/src/sync_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
target_services.cc | 5 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/crosscall_client.h" 11 #include "sandbox/win/src/handle_closer_agent.h" 12 #include "sandbox/win/src/handle_interception.h" 13 #include "sandbox/win/src/ipc_tags.h" 14 #include "sandbox/win/src/process_mitigations.h" 15 #include "sandbox/win/src/restricted_token_utils.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_types.h 61 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
target_code.cc | 5 #include "sandbox/win/wow_helper/target_code.h" 7 namespace sandbox { namespace 34 } // namespace sandbox
|
/external/openssh/regress/ |
connect-privsep.sh | 17 echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy 22 # XXX replace this with fail once sandbox has stabilised 23 warn "ssh privsep/sandbox+proxyconnect protocol $p failed"
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client.h | 13 namespace sandbox { namespace 15 // Helper class to use the setuid sandbox. This class is to be used both 21 // 2. The browser launches a renderer through the setuid sandbox. 30 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us 36 // See sandbox/linux/services/init_process_reaper.h for more information 62 } // namespace sandbox
|
setuid_sandbox_client.cc | 15 #include "sandbox/linux/services/init_process_reaper.h" 16 #include "sandbox/linux/suid/common/sandbox.h" 17 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 23 // setuid sandbox. Old versions of the sandbox will ignore this. 25 env->SetVar(sandbox::kSandboxEnvironmentApiRequest, 26 base::IntToString(sandbox::kSUIDSandboxApiNumber)); 44 // different names here so that the SUID sandbox can resolve them for the 65 if (env->GetVar(sandbox::kSandboxEnvironmentApiProvides, &api_string) & 96 namespace sandbox { namespace [all...] |
/external/chromium_org/chrome/test/security_tests/ |
security_tests.cc | 11 #include "sandbox/win/tests/common/controller.h" 12 #include "sandbox/win/tests/validation_tests/commands.h" 14 using sandbox::TestOpenKey; 15 using sandbox::TestOpenReadFile; 16 using sandbox::TestOpenWriteFile; 19 if (sandbox::SBOX_TEST_DENIED != x) { \ 28 // Runs the security tests of sandbox for the renderer process. 53 // Runs the security tests of sandbox for the plugin process.
|
/external/chromium_org/content/browser/ |
worker.sb | 6 ; This is the Sandbox configuration file used for safeguarding the worker 9 ; This is the most restrictive sandbox profile and only enables just enough
|
/external/chromium_org/content/common/ |
sandbox_init_mac.cc | 16 // Warm up APIs before turning on the sandbox. 17 Sandbox::SandboxWarmup(sandbox_type); 19 // Actually sandbox the process. 20 return Sandbox::EnableSandbox(sandbox_type, allowed_dir); 25 // sandbox was disabled from the command line. 46 // Utility process sandbox. 51 // Worker process sandbox. 65 // the sandbox profile in ContentClient::GetSandboxProfileForSandboxType.
|
sandbox_init_mac.h | 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in 13 // Returns true if the sandbox was initialized succesfully, false if an error
|
/external/chromium_org/content/worker/ |
worker_main.cc | 18 #include "sandbox/win/src/sandbox.h" 35 sandbox::TargetServices* target_services = 40 // Cause advapi32 to load before the sandbox is turned on. 43 // Warm up language subsystems before the sandbox is turned on. 49 // Sandbox should already be activated at this point. 50 CHECK(Sandbox::SandboxIsCurrentlyActive()); 52 // On Linux, the sandbox must be initialized early, before any thread is
|
/external/chromium_org/sandbox/linux/services/ |
android_ucontext.h | 11 #include "sandbox/linux/services/android_arm_ucontext.h" 13 #include "sandbox/linux/services/android_i386_ucontext.h"
|
/external/chromium_org/sandbox/ |
sandbox.gyp | 21 # A 'default' to accomodate the "sandbox" target. 24 'target_name': 'sandbox',
|
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
pocdll.cc | 6 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 7 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
unit_tests.cc | 6 #include "sandbox/win/tests/common/controller.h" 11 return sandbox::DispatchCall(argc, argv);
|
suite.cc | 5 // This file contains the validation tests for the sandbox. 7 // sandbox. 13 #include "sandbox/win/tests/common/controller.h" 19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) { 25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)) 48 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/win/tools/finder/ |
main.cc | 5 #include "sandbox/win/src/restricted_token_utils.h" 6 #include "sandbox/win/tools/finder/finder.h" 32 sandbox::TokenLevel token_type = sandbox::USER_LOCKDOWN; 48 token_type = sandbox::USER_LOCKDOWN; 50 token_type = sandbox::USER_RESTRICTED; 52 token_type = sandbox::USER_LIMITED; 54 token_type = sandbox::USER_INTERACTIVE; 56 token_type = sandbox::USER_NON_ADMIN; 58 token_type = sandbox::USER_RESTRICTED_SAME_ACCESS [all...] |
/external/chromium_org/content/common/sandbox_linux/ |
bpf_gpu_policy_linux.cc | 26 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 27 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 28 #include "sandbox/linux/services/broker_process.h" 29 #include "sandbox/linux/services/linux_syscalls.h" 31 using sandbox::BrokerProcess; 32 using sandbox::ErrorCode; 33 using sandbox::SandboxBPF; 34 using sandbox::SyscallSets; 35 using sandbox::arch_seccomp_data; 127 ErrorCode GpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, [all...] |
sandbox_linux.h | 18 namespace sandbox { class SetuidSandboxClient; } namespace 26 // This is a list of sandbox IPC methods which the renderer may send to the 27 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC 43 // are enabled. If using the setuid sandbox, this should be called manually 44 // before the setuid sandbox is engaged. 47 // Initialize the sandbox with the given pre-built configuration. Currently 48 // seccomp-bpf and address space limitations (the setuid sandbox works 54 // Stop |thread| in a way that can be trusted by the sandbox. 57 // Returns the status of the renderer, worker and ppapi sandbox. Can only 70 // Simple accessor for our instance of the setuid sandbox. Will never retur [all...] |
/external/chromium/chrome/browser/resources/gpu_internals/ |
timeline_test.html | 30 <div id="sandbox"></div> 33 var sandbox = document.getElementById('sandbox'); 41 sandbox.appendChild(timeline);
|