HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 151 - 175 of 851) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/chromium_org/content/shell/android/linker_test_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
34 android:permission="org.chromium.content_shell.permission.SANDBOX"
39 android:permission="org.chromium.content_shell.permission.SANDBOX"
44 android:permission="org.chromium.content_shell.permission.SANDBOX"
49 android:permission="org.chromium.content_shell.permission.SANDBOX"
54 android:permission="org.chromium.content_shell.permission.SANDBOX"
59 android:permission="org.chromium.content_shell.permission.SANDBOX"
64 android:permission="org.chromium.content_shell.permission.SANDBOX"
69 android:permission="org.chromium.content_shell.permission.SANDBOX"
74 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/content/shell/android/shell_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
35 android:permission="org.chromium.content_shell.permission.SANDBOX"
40 android:permission="org.chromium.content_shell.permission.SANDBOX"
45 android:permission="org.chromium.content_shell.permission.SANDBOX"
50 android:permission="org.chromium.content_shell.permission.SANDBOX"
55 android:permission="org.chromium.content_shell.permission.SANDBOX"
60 android:permission="org.chromium.content_shell.permission.SANDBOX"
65 android:permission="org.chromium.content_shell.permission.SANDBOX"
70 android:permission="org.chromium.content_shell.permission.SANDBOX"
75 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/sandbox/win/src/
service_resolver_unittest.cc 10 #include "sandbox/win/src/resolver.h"
11 #include "sandbox/win/src/sandbox_utils.h"
12 #include "sandbox/win/src/service_resolver.h"
58 typedef ResolverThunkTest<sandbox::ServiceResolverThunk> WinXpResolverTest;
61 typedef ResolverThunkTest<sandbox::Win2kResolverThunk> Win2kResolverTest;
62 typedef ResolverThunkTest<sandbox::Win8ResolverThunk> Win8ResolverTest;
63 typedef ResolverThunkTest<sandbox::Wow64ResolverThunk> Wow64ResolverTest;
64 typedef ResolverThunkTest<sandbox::Wow64W8ResolverThunk> Wow64W8ResolverTest;
91 sandbox::ServiceResolverThunk* resolver) {
133 sandbox::ServiceResolverThunk* GetTestResolver(bool relaxed)
    [all...]
policy_engine_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
10 #define POLPARAM(p) sandbox::ParamPickerMake(p),
13 namespace sandbox { namespace
102 } // namespace sandbox
named_pipe_policy_test.cc 6 #include "sandbox/win/src/handle_closer.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_policy.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
62 // Tests if we can create a pipe in the sandbox.
74 // On XP, the sandbox can create a pipe without any help but it fails on
82 // Tests if we can create a pipe with a path traversal in the sandbox
    [all...]
eat_resolver.cc 5 #include "sandbox/win/src/eat_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
10 namespace sandbox { namespace
91 } // namespace sandbox
interception_internal.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
12 #include "sandbox/win/src/sandbox_types.h"
14 namespace sandbox { namespace
74 } // namespace sandbox
process_thread_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
99 } // namespace sandbox
sidestep_resolver.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
70 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf/
die.h 10 namespace sandbox { namespace
14 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
18 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m)
21 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__)
25 // Terminate the program, even if the current sandbox policy prevents some
65 } // namespace sandbox
verifier.h 13 namespace sandbox { namespace
26 static bool VerifyBPF(SandboxBPF* sandbox,
37 // is used for purposes other than verifying the output of the sandbox's
47 } // namespace sandbox
  /external/chromium_org/content/common/
sandbox_mac.mm 11 #include <sandbox.h>
44 // Is the sandbox currently active.
52 // Mapping from sandbox process types to resource IDs containing the sandbox
102 // Errors quoting strings for the Sandbox profile are always fatal, report them
114 NSString* Sandbox::AllowMetadataForPath(const base::FilePath& allowed_path) {
147 bool Sandbox::QuotePlainString(const std::string& src_utf8, std::string* dst) {
183 bool Sandbox::QuoteStringForRegex(const std::string& str_utf8,
185 // Characters with special meanings in sandbox profile syntax.
220 // The Mac sandbox regex parser only handles printable ASCII characters
    [all...]
  /external/chromium/chrome/browser/
utility.sb 6 ; This is the Sandbox configuration file used for safeguarding the utility
11 ; directory. This is different from other sandbox configuration files where
  /external/chromium_org/chrome/test/
DEPS 20 "+sandbox/win/src",
21 "+sandbox/win/tests",
  /external/chromium_org/components/nacl/loader/
nacl_sandbox_linux.cc 17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
19 #include "sandbox/linux/services/linux_syscalls.h"
21 using sandbox::ErrorCode;
22 using sandbox::SandboxBPF;
23 using sandbox::SandboxBPFPolicy;
70 sandbox::SandboxBPF* sb, int sysno) const {
148 // Without the sandbox on, this ptrace call would ESRCH instead.
  /external/chromium_org/content/common/sandbox_linux/
sandbox_bpf_base_policy_linux.cc 10 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
22 : baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {}
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_win.cc 16 #include "sandbox/win/src/sandbox.h"
28 // Windows-only skia sandbox support
92 // cached and there's no more need to access the registry. If the sandbox
109 sandbox::TargetServices* target_services =
127 sandbox::TargetServices* target_services =
131 // Cause advapi32 to load before the sandbox is turned on.
134 // Warm up language subsystems before the sandbox is turned on.
  /external/chromium_org/content/utility/
utility.sb 6 ; This is the Sandbox configuration file used for safeguarding the utility
11 ; directory. This is different from other sandbox configuration files where
  /external/chromium_org/sandbox/linux/services/
init_process_reaper.h 10 namespace sandbox { namespace
21 } // namespace sandbox.
  /external/chromium_org/sandbox/win/tests/common/
controller.h 13 #include "sandbox/win/src/sandbox.h"
15 namespace sandbox { namespace
24 // the sandbox.
70 // Class to facilitate the launch of a test inside the sandbox.
81 // function in the sandbox.
95 // Starts a child process in the sandbox and ask it to run |command|. Returns
157 } // namespace sandbox
  /external/chromium_org/tools/memory_watcher/
README 9 (2) Run chromium with these flags "--memory-profile -no-sandbox"
10 (The instrumentation doesn't work with the sandbox)
  /external/chromium_org/ui/views/examples/content_client/
examples_main.cc 6 #include "sandbox/win/src/sandbox_types.h"
15 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/chrome/common/extensions/docs/examples/howto/sandbox/
eventpage.html 12 <iframe id="theFrame" src="sandbox.html"></iframe>
  /external/chromium_org/chrome/common/extensions/docs/server2/test_data/github_file_system/
expected_list.json 24 "sandbox/",
  /external/chromium_org/extensions/common/
csp_validator.h 34 // Checks whether the given |policy| enforces a unique origin sandbox as
36 // the-iframe-element.html#attr-iframe-sandbox. The policy must have the
37 // "sandbox" directive, and the sandbox tokens must not include

Completed in 154 milliseconds

1 2 3 4 5 67 8 91011>>