/external/chromium_org/content/shell/android/linker_test_apk/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX" 34 android:permission="org.chromium.content_shell.permission.SANDBOX" 39 android:permission="org.chromium.content_shell.permission.SANDBOX" 44 android:permission="org.chromium.content_shell.permission.SANDBOX" 49 android:permission="org.chromium.content_shell.permission.SANDBOX" 54 android:permission="org.chromium.content_shell.permission.SANDBOX" 59 android:permission="org.chromium.content_shell.permission.SANDBOX" 64 android:permission="org.chromium.content_shell.permission.SANDBOX" 69 android:permission="org.chromium.content_shell.permission.SANDBOX" 74 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/content/shell/android/shell_apk/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX" 35 android:permission="org.chromium.content_shell.permission.SANDBOX" 40 android:permission="org.chromium.content_shell.permission.SANDBOX" 45 android:permission="org.chromium.content_shell.permission.SANDBOX" 50 android:permission="org.chromium.content_shell.permission.SANDBOX" 55 android:permission="org.chromium.content_shell.permission.SANDBOX" 60 android:permission="org.chromium.content_shell.permission.SANDBOX" 65 android:permission="org.chromium.content_shell.permission.SANDBOX" 70 android:permission="org.chromium.content_shell.permission.SANDBOX" 75 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/sandbox/win/src/ |
service_resolver_unittest.cc | 10 #include "sandbox/win/src/resolver.h" 11 #include "sandbox/win/src/sandbox_utils.h" 12 #include "sandbox/win/src/service_resolver.h" 58 typedef ResolverThunkTest<sandbox::ServiceResolverThunk> WinXpResolverTest; 61 typedef ResolverThunkTest<sandbox::Win2kResolverThunk> Win2kResolverTest; 62 typedef ResolverThunkTest<sandbox::Win8ResolverThunk> Win8ResolverTest; 63 typedef ResolverThunkTest<sandbox::Wow64ResolverThunk> Wow64ResolverTest; 64 typedef ResolverThunkTest<sandbox::Wow64W8ResolverThunk> Wow64W8ResolverTest; 91 sandbox::ServiceResolverThunk* resolver) { 133 sandbox::ServiceResolverThunk* GetTestResolver(bool relaxed) [all...] |
policy_engine_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 10 #define POLPARAM(p) sandbox::ParamPickerMake(p), 13 namespace sandbox { namespace 102 } // namespace sandbox
|
named_pipe_policy_test.cc | 6 #include "sandbox/win/src/handle_closer.h" 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_policy.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 62 // Tests if we can create a pipe in the sandbox. 74 // On XP, the sandbox can create a pipe without any help but it fails on 82 // Tests if we can create a pipe with a path traversal in the sandbox [all...] |
eat_resolver.cc | 5 #include "sandbox/win/src/eat_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 10 namespace sandbox { namespace 91 } // namespace sandbox
|
interception_internal.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 12 #include "sandbox/win/src/sandbox_types.h" 14 namespace sandbox { namespace 74 } // namespace sandbox
|
process_thread_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 99 } // namespace sandbox
|
sidestep_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 70 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
die.h | 10 namespace sandbox { namespace 14 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__) 18 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m) 21 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__) 25 // Terminate the program, even if the current sandbox policy prevents some 65 } // namespace sandbox
|
verifier.h | 13 namespace sandbox { namespace 26 static bool VerifyBPF(SandboxBPF* sandbox, 37 // is used for purposes other than verifying the output of the sandbox's 47 } // namespace sandbox
|
/external/chromium_org/content/common/ |
sandbox_mac.mm | 11 #include <sandbox.h> 44 // Is the sandbox currently active. 52 // Mapping from sandbox process types to resource IDs containing the sandbox 102 // Errors quoting strings for the Sandbox profile are always fatal, report them 114 NSString* Sandbox::AllowMetadataForPath(const base::FilePath& allowed_path) { 147 bool Sandbox::QuotePlainString(const std::string& src_utf8, std::string* dst) { 183 bool Sandbox::QuoteStringForRegex(const std::string& str_utf8, 185 // Characters with special meanings in sandbox profile syntax. 220 // The Mac sandbox regex parser only handles printable ASCII characters [all...] |
/external/chromium/chrome/browser/ |
utility.sb | 6 ; This is the Sandbox configuration file used for safeguarding the utility 11 ; directory. This is different from other sandbox configuration files where
|
/external/chromium_org/chrome/test/ |
DEPS | 20 "+sandbox/win/src", 21 "+sandbox/win/tests",
|
/external/chromium_org/components/nacl/loader/ |
nacl_sandbox_linux.cc | 17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 19 #include "sandbox/linux/services/linux_syscalls.h" 21 using sandbox::ErrorCode; 22 using sandbox::SandboxBPF; 23 using sandbox::SandboxBPFPolicy; 70 sandbox::SandboxBPF* sb, int sysno) const { 148 // Without the sandbox on, this ptrace call would ESRCH instead.
|
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_bpf_base_policy_linux.cc | 10 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 22 : baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {}
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_win.cc | 16 #include "sandbox/win/src/sandbox.h" 28 // Windows-only skia sandbox support 92 // cached and there's no more need to access the registry. If the sandbox 109 sandbox::TargetServices* target_services = 127 sandbox::TargetServices* target_services = 131 // Cause advapi32 to load before the sandbox is turned on. 134 // Warm up language subsystems before the sandbox is turned on.
|
/external/chromium_org/content/utility/ |
utility.sb | 6 ; This is the Sandbox configuration file used for safeguarding the utility 11 ; directory. This is different from other sandbox configuration files where
|
/external/chromium_org/sandbox/linux/services/ |
init_process_reaper.h | 10 namespace sandbox { namespace 21 } // namespace sandbox.
|
/external/chromium_org/sandbox/win/tests/common/ |
controller.h | 13 #include "sandbox/win/src/sandbox.h" 15 namespace sandbox { namespace 24 // the sandbox. 70 // Class to facilitate the launch of a test inside the sandbox. 81 // function in the sandbox. 95 // Starts a child process in the sandbox and ask it to run |command|. Returns 157 } // namespace sandbox
|
/external/chromium_org/tools/memory_watcher/ |
README | 9 (2) Run chromium with these flags "--memory-profile -no-sandbox" 10 (The instrumentation doesn't work with the sandbox)
|
/external/chromium_org/ui/views/examples/content_client/ |
examples_main.cc | 6 #include "sandbox/win/src/sandbox_types.h" 15 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/chrome/common/extensions/docs/examples/howto/sandbox/ |
eventpage.html | 12 <iframe id="theFrame" src="sandbox.html"></iframe>
|
/external/chromium_org/chrome/common/extensions/docs/server2/test_data/github_file_system/ |
expected_list.json | 24 "sandbox/",
|
/external/chromium_org/extensions/common/ |
csp_validator.h | 34 // Checks whether the given |policy| enforces a unique origin sandbox as 36 // the-iframe-element.html#attr-iframe-sandbox. The policy must have the 37 // "sandbox" directive, and the sandbox tokens must not include
|