HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 126 - 150 of 851) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/chromium_org/content/browser/resources/gpu/
timeline_test.html 29 <div id="sandbox"></div>
32 var sandbox = document.getElementById('sandbox');
40 sandbox.appendChild(timeline);
  /external/chromium_org/content/public/app/
startup_helper_win.h 10 namespace sandbox { namespace
20 // Initializes the sandbox code and turns on DEP. Note: This function
22 // sandbox library); it will not work correctly if it is exported from a
24 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* sandbox_info);
  /external/chromium_org/sandbox/win/sandbox_poc/
sandbox.cc 8 #include "sandbox/win/sandbox_poc/sandbox.h"
10 #include "sandbox/win/sandbox_poc/main_ui_window.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
54 sandbox::BrokerServices* broker_service =
55 sandbox::SandboxFactory::GetBrokerServices();
56 sandbox::ResultCode result;
59 // spawns an instance of itself (called a 'target') inside the sandbox
    [all...]
sandbox.h 8 #include "sandbox/win/sandbox_poc/resource.h"
  /external/chromium_org/sandbox/win/src/
filesystem_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
58 } // namespace sandbox
filesystem_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
51 } // namespace sandbox
policy_params.h 8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
64 } // namespace sandbox
policy_target.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
43 } // namespace sandbox
process_mitigations.h 11 #include "sandbox/win/src/security_level.h"
13 namespace sandbox { namespace
23 // Converts sandbox flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES
41 } // namespace sandbox
process_thread_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
49 } // namespace sandbox
resolver.cc 5 #include "sandbox/win/src/resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
10 namespace sandbox { namespace
62 } // namespace sandbox
resolver_64.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
44 namespace sandbox { namespace
69 } // namespace sandbox
sandbox_utils.cc 5 #include "sandbox/win/src/sandbox_utils.h"
11 #include "sandbox/win/src/internal_types.h"
13 namespace sandbox { namespace
38 } // namespace sandbox
target_interceptions.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
33 } // namespace sandbox
win2k_threadpool.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
7 #include "sandbox/win/src/win_utils.h"
9 namespace sandbox { namespace
60 } // namespace sandbox
handle_policy_test.cc 6 #include "sandbox/win/src/handle_policy.h"
7 #include "sandbox/win/src/nt_internals.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/win_utils.h"
12 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
113 } // namespace sandbox
    [all...]
handle_closer_test.cc 7 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
51 namespace sandbox { namespace
111 sandbox::TargetPolicy* policy = runner.GetPolicy();
118 CHECK(sandbox::GetHandleName(marker, &handle_name));
131 sandbox::TargetPolicy* policy = runner.GetPolicy()
    [all...]
registry_dispatcher.cc 5 #include "sandbox/win/src/registry_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/policy_broker.h"
15 #include "sandbox/win/src/policy_params.h"
16 #include "sandbox/win/src/sandbox.h
40 namespace sandbox { namespace
    [all...]
broker_services.h 14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sharedmem_ipc_server.h"
18 #include "sandbox/win/src/win2k_threadpool.h"
19 #include "sandbox/win/src/win_utils.h"
28 namespace sandbox { namespace
111 } // namespace sandbox
unload_dll_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
64 sandbox::TargetPolicy* policy = runner.GetPolicy();
75 sandbox::TargetPolicy* policy = runner.GetPolicy();
96 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
target_code.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
16 // on sandbox/win/src/wow64.cc.
39 } // namespace sandbox
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
append-child-deep.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
8 var node = sandbox;
42 observer.observe(sandbox, {childList: true, subtree: true});
  /external/chromium_org/content/common/sandbox_linux/
bpf_cros_arm_gpu_policy_linux.cc 24 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
25 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
26 #include "sandbox/linux/services/linux_syscalls.h"
28 using sandbox::ErrorCode;
29 using sandbox::SandboxBPF;
30 using sandbox::SyscallSets;
105 // On ARM we're enabling the sandbox before the X connection is made,
137 ErrorCode CrosArmGpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
145 return CrosArmGpuProcessPolicy::EvaluateSyscall(sandbox, sysno);
151 scoped_ptr<sandbox::SandboxBPFPolicy>(new CrosArmGpuBrokerProcessPolicy))
    [all...]
  /external/chromium_org/components/autofill/content/browser/wallet/
wallet_service_url_unittest.cc 18 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
21 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/"
24 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/w/1/paymentMethods",
26 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/w/1/settings/"
29 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
32 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/2/"
35 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
38 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
41 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/"
44 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/
    [all...]
  /external/chromium_org/content/shell/android/browsertests_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
34 android:permission="org.chromium.content_shell.permission.SANDBOX"
39 android:permission="org.chromium.content_shell.permission.SANDBOX"
44 android:permission="org.chromium.content_shell.permission.SANDBOX"
49 android:permission="org.chromium.content_shell.permission.SANDBOX"
54 android:permission="org.chromium.content_shell.permission.SANDBOX"
59 android:permission="org.chromium.content_shell.permission.SANDBOX"
64 android:permission="org.chromium.content_shell.permission.SANDBOX"
69 android:permission="org.chromium.content_shell.permission.SANDBOX"
74 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]

Completed in 3225 milliseconds

1 2 3 4 56 7 8 91011>>