OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
126 - 150
of
851
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/chromium_org/content/browser/resources/gpu/
timeline_test.html
29
<div id="
sandbox
"></div>
32
var
sandbox
= document.getElementById('
sandbox
');
40
sandbox
.appendChild(timeline);
/external/chromium_org/content/public/app/
startup_helper_win.h
10
namespace
sandbox
{
namespace
20
// Initializes the
sandbox
code and turns on DEP. Note: This function
22
//
sandbox
library); it will not work correctly if it is exported from a
24
void InitializeSandboxInfo(
sandbox
::SandboxInterfaceInfo* sandbox_info);
/external/chromium_org/sandbox/win/sandbox_poc/
sandbox.cc
8
#include "
sandbox
/win/sandbox_poc/
sandbox
.h"
10
#include "
sandbox
/win/sandbox_poc/main_ui_window.h"
11
#include "
sandbox
/win/src/
sandbox
.h"
12
#include "
sandbox
/win/src/sandbox_factory.h"
54
sandbox
::BrokerServices* broker_service =
55
sandbox
::SandboxFactory::GetBrokerServices();
56
sandbox
::ResultCode result;
59
// spawns an instance of itself (called a 'target') inside the
sandbox
[
all
...]
sandbox.h
8
#include "
sandbox
/win/sandbox_poc/resource.h"
/external/chromium_org/sandbox/win/src/
filesystem_dispatcher.h
10
#include "
sandbox
/win/src/crosscall_server.h"
11
#include "
sandbox
/win/src/sandbox_policy_base.h"
13
namespace
sandbox
{
namespace
58
} // namespace
sandbox
filesystem_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
51
} // namespace
sandbox
policy_params.h
8
#include "
sandbox
/win/src/policy_engine_params.h"
10
namespace
sandbox
{
namespace
19
typedef
sandbox
::ParameterSet type##Array [type::PolParamLast];
64
} // namespace
sandbox
policy_target.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
43
} // namespace
sandbox
process_mitigations.h
11
#include "
sandbox
/win/src/security_level.h"
13
namespace
sandbox
{
namespace
23
// Converts
sandbox
flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES
41
} // namespace
sandbox
process_thread_dispatcher.h
10
#include "
sandbox
/win/src/crosscall_server.h"
11
#include "
sandbox
/win/src/sandbox_policy_base.h"
13
namespace
sandbox
{
namespace
49
} // namespace
sandbox
resolver.cc
5
#include "
sandbox
/win/src/resolver.h"
8
#include "
sandbox
/win/src/sandbox_nt_util.h"
10
namespace
sandbox
{
namespace
62
} // namespace
sandbox
resolver_64.cc
5
#include "
sandbox
/win/src/resolver.h"
7
#include "
sandbox
/win/src/sandbox_nt_util.h"
44
namespace
sandbox
{
namespace
69
} // namespace
sandbox
sandbox_utils.cc
5
#include "
sandbox
/win/src/sandbox_utils.h"
11
#include "
sandbox
/win/src/internal_types.h"
13
namespace
sandbox
{
namespace
38
} // namespace
sandbox
target_interceptions.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
33
} // namespace
sandbox
win2k_threadpool.cc
5
#include "
sandbox
/win/src/win2k_threadpool.h"
7
#include "
sandbox
/win/src/win_utils.h"
9
namespace
sandbox
{
namespace
60
} // namespace
sandbox
handle_policy_test.cc
6
#include "
sandbox
/win/src/handle_policy.h"
7
#include "
sandbox
/win/src/nt_internals.h"
8
#include "
sandbox
/win/src/
sandbox
.h"
9
#include "
sandbox
/win/src/sandbox_factory.h"
10
#include "
sandbox
/win/src/sandbox_policy.h"
11
#include "
sandbox
/win/src/win_utils.h"
12
#include "
sandbox
/win/tests/common/controller.h"
15
namespace
sandbox
{
namespace
113
} // namespace
sandbox
[
all
...]
handle_closer_test.cc
7
#include "
sandbox
/win/src/handle_closer_agent.h"
8
#include "
sandbox
/win/src/
sandbox
.h"
9
#include "
sandbox
/win/src/sandbox_factory.h"
10
#include "
sandbox
/win/src/target_services.h"
11
#include "
sandbox
/win/tests/common/controller.h"
51
namespace
sandbox
{
namespace
111
sandbox
::TargetPolicy* policy = runner.GetPolicy();
118
CHECK(
sandbox
::GetHandleName(marker, &handle_name));
131
sandbox
::TargetPolicy* policy = runner.GetPolicy()
[
all
...]
registry_dispatcher.cc
5
#include "
sandbox
/win/src/registry_dispatcher.h"
9
#include "
sandbox
/win/src/crosscall_client.h"
10
#include "
sandbox
/win/src/interception.h"
11
#include "
sandbox
/win/src/interceptors.h"
12
#include "
sandbox
/win/src/ipc_tags.h"
13
#include "
sandbox
/win/src/sandbox_nt_util.h"
14
#include "
sandbox
/win/src/policy_broker.h"
15
#include "
sandbox
/win/src/policy_params.h"
16
#include "
sandbox
/win/src/
sandbox
.h
40
namespace
sandbox
{
namespace
[
all
...]
broker_services.h
14
#include "
sandbox
/win/src/crosscall_server.h"
15
#include "
sandbox
/win/src/job.h"
16
#include "
sandbox
/win/src/
sandbox
.h"
17
#include "
sandbox
/win/src/sharedmem_ipc_server.h"
18
#include "
sandbox
/win/src/win2k_threadpool.h"
19
#include "
sandbox
/win/src/win_utils.h"
28
namespace
sandbox
{
namespace
111
} // namespace
sandbox
unload_dll_test.cc
6
#include "
sandbox
/win/src/
sandbox
.h"
7
#include "
sandbox
/win/src/sandbox_factory.h"
8
#include "
sandbox
/win/src/target_services.h"
9
#include "
sandbox
/win/tests/common/controller.h"
12
namespace
sandbox
{
namespace
64
sandbox
::TargetPolicy* policy = runner.GetPolicy();
75
sandbox
::TargetPolicy* policy = runner.GetPolicy();
96
} // namespace
sandbox
/external/chromium_org/sandbox/win/wow_helper/
target_code.h
8
#include "
sandbox
/win/src/nt_internals.h"
10
namespace
sandbox
{
namespace
16
// on
sandbox
/win/src/wow64.cc.
39
} // namespace
sandbox
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
append-child-deep.html
5
<div id="
sandbox
" style="display:none"></div>
7
var
sandbox
= document.getElementById('
sandbox
');
8
var node =
sandbox
;
42
observer.observe(
sandbox
, {childList: true, subtree: true});
/external/chromium_org/content/common/sandbox_linux/
bpf_cros_arm_gpu_policy_linux.cc
24
#include "
sandbox
/linux/seccomp-bpf-helpers/syscall_sets.h"
25
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf.h"
26
#include "
sandbox
/linux/services/linux_syscalls.h"
28
using
sandbox
::ErrorCode;
29
using
sandbox
::SandboxBPF;
30
using
sandbox
::SyscallSets;
105
// On ARM we're enabling the
sandbox
before the X connection is made,
137
ErrorCode CrosArmGpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF*
sandbox
,
145
return CrosArmGpuProcessPolicy::EvaluateSyscall(
sandbox
, sysno);
151
scoped_ptr<
sandbox
::SandboxBPFPolicy>(new CrosArmGpuBrokerProcessPolicy))
[
all
...]
/external/chromium_org/components/autofill/content/browser/wallet/
wallet_service_url_unittest.cc
18
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online/v2/u/1/wallet/"
21
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online-secure/v2/u/1/"
24
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/manage/w/1/paymentMethods",
26
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/manage/w/1/settings/"
29
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online/v2/u/1/wallet/"
32
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online-secure/v2/u/2/"
35
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online/v2/u/1/wallet/"
38
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online/v2/u/1/wallet/"
41
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online-secure/v2/u/1/"
44
EXPECT_EQ("https://wallet-web.
sandbox
.google.com/online/v2/u/1/
[
all
...]
/external/chromium_org/content/shell/android/browsertests_apk/
AndroidManifest.xml
12
<permission android:name="org.chromium.content_shell.permission.
SANDBOX
"
34
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
39
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
44
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
49
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
54
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
59
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
64
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
69
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
74
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
[
all
...]
Completed in 3225 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>