HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 276 - 300 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
handle_inheritance_test.cc 9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
internal_types.h 8 namespace sandbox { namespace
74 } // namespace sandbox
sync_policy_test.cc 5 #include "sandbox/win/src/sync_policy_test.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_policy.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/src/nt_internals.h"
14 namespace sandbox { namespace
146 } // namespace sandbox
interception_agent.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/sandbox_types.h"
16 namespace sandbox { namespace
85 } // namespace sandbox
window.cc 5 #include "sandbox/win/src/window.h"
11 #include "sandbox/win/src/acl.h"
12 #include "sandbox/win/src/sid.h"
35 namespace sandbox { namespace
155 } // namespace sandbox
registry_policy_test.cc 8 #include "sandbox/win/src/registry_policy.h"
9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/win_utils.h"
14 #include "sandbox/win/tests/common/controller.h"
43 namespace sandbox { namespace
289 } // namespace sandbox
    [all...]
broker_services.cc 5 #include "sandbox/win/src/broker_services.h"
14 #include "sandbox/win/src/app_container.h"
15 #include "sandbox/win/src/process_mitigations.h"
16 #include "sandbox/win/src/sandbox_policy_base.h"
17 #include "sandbox/win/src/sandbox.h"
18 #include "sandbox/win/src/target_process.h"
19 #include "sandbox/win/src/win2k_threadpool.h"
20 #include "sandbox/win/src/win_utils.h"
34 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error)
85 namespace sandbox { namespace
    [all...]
sandbox_nt_util.cc 5 #include "sandbox/win/src/sandbox_nt_util.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/target_services.h"
11 namespace sandbox { namespace
16 } // namespace sandbox
22 using sandbox::g_nt;
76 using sandbox::g_nt;
105 namespace sandbox { namespace
541 } // namespace sandbox
543 void* operator new(size_t size, sandbox::AllocationType type
    [all...]
sharedmem_ipc_client.cc 6 #include "sandbox/win/src/sharedmem_ipc_client.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/crosscall_params.h"
12 namespace sandbox { namespace
152 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
commands.cc 9 #include "sandbox/win/tests/validation_tests/commands.h"
11 #include "sandbox/win/tests/common/controller.h"
48 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
61 return sandbox::SBOX_TEST_SUCCEEDED;
64 return sandbox::SBOX_TEST_DENIED;
66 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
73 namespace sandbox { namespace
314 } // namespace sandbox
commands.h 12 namespace sandbox { namespace
46 } // namespace sandbox
  /external/openssh/
sandbox-null.c 32 #include "ssh-sandbox.h"
35 /* dummy sandbox */
  /external/chromium_org/chrome/android/testshell/java/
AndroidManifest.xml 13 <permission android:name="org.chromium.chrome.testshell.permission.SANDBOX"
61 android:permission="org.chromium.content_shell.permission.SANDBOX"
66 android:permission="org.chromium.content_shell.permission.SANDBOX"
71 android:permission="org.chromium.content_shell.permission.SANDBOX"
76 android:permission="org.chromium.content_shell.permission.SANDBOX"
81 android:permission="org.chromium.content_shell.permission.SANDBOX"
86 android:permission="org.chromium.content_shell.permission.SANDBOX"
91 android:permission="org.chromium.content_shell.permission.SANDBOX"
96 android:permission="org.chromium.content_shell.permission.SANDBOX"
101 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/components/
breakpad.gypi 52 '../sandbox/sandbox.gyp:sandbox',
111 '../sandbox/sandbox.gyp:sandbox_win64',
  /external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.cc 5 #include "sandbox/linux/seccomp-bpf/die.h"
6 #include "sandbox/linux/seccomp-bpf/errorcode.h"
8 namespace sandbox { namespace
47 SANDBOX_DIE("Invalid opcode in BPF sandbox rules");
104 } // namespace sandbox
syscall_iterator_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
6 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
7 #include "sandbox/linux/tests/unit_tests.h"
9 namespace sandbox { namespace
136 } // namespace sandbox
  /external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.cc 15 #include "sandbox/win/sandbox_poc/main_ui_window.h"
17 #include "sandbox/win/sandbox_poc/resource.h"
18 #include "sandbox/win/src/acl.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/win_utils.h"
43 sandbox::BrokerServices* broker) {
103 ::SetWindowText(window, L"Sandbox Proof of Concept");
508 sandbox::TargetPolicy* policy = broker_->CreatePolicy();
509 policy->SetJobLevel(sandbox::JOB_LOCKDOWN, 0)
    [all...]
  /external/chromium_org/sandbox/
seccomp_bpf.target.darwin-arm.mk 27 sandbox/linux/seccomp-bpf/basicblock.cc \
28 sandbox/linux/seccomp-bpf/codegen.cc \
29 sandbox/linux/seccomp-bpf/die.cc \
30 sandbox/linux/seccomp-bpf/errorcode.cc \
31 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
32 sandbox/linux/seccomp-bpf/syscall.cc \
33 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
34 sandbox/linux/seccomp-bpf/trap.cc \
35 sandbox/linux/seccomp-bpf/verifier.cc
seccomp_bpf.target.darwin-x86.mk 27 sandbox/linux/seccomp-bpf/basicblock.cc \
28 sandbox/linux/seccomp-bpf/codegen.cc \
29 sandbox/linux/seccomp-bpf/die.cc \
30 sandbox/linux/seccomp-bpf/errorcode.cc \
31 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
32 sandbox/linux/seccomp-bpf/syscall.cc \
33 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
34 sandbox/linux/seccomp-bpf/trap.cc \
35 sandbox/linux/seccomp-bpf/verifier.cc
seccomp_bpf.target.linux-arm.mk 27 sandbox/linux/seccomp-bpf/basicblock.cc \
28 sandbox/linux/seccomp-bpf/codegen.cc \
29 sandbox/linux/seccomp-bpf/die.cc \
30 sandbox/linux/seccomp-bpf/errorcode.cc \
31 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
32 sandbox/linux/seccomp-bpf/syscall.cc \
33 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
34 sandbox/linux/seccomp-bpf/trap.cc \
35 sandbox/linux/seccomp-bpf/verifier.cc
seccomp_bpf.target.linux-x86.mk 27 sandbox/linux/seccomp-bpf/basicblock.cc \
28 sandbox/linux/seccomp-bpf/codegen.cc \
29 sandbox/linux/seccomp-bpf/die.cc \
30 sandbox/linux/seccomp-bpf/errorcode.cc \
31 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
32 sandbox/linux/seccomp-bpf/syscall.cc \
33 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
34 sandbox/linux/seccomp-bpf/trap.cc \
35 sandbox/linux/seccomp-bpf/verifier.cc
  /external/chromium_org/build/
update-linux-sandbox.sh 11 CHROME_SANDBOX_INST_PATH="/usr/local/sbin/chrome-devel-sandbox"
62 echo "Your installed setuid sandbox is too old, installing it now."
68 echo "Your setuid sandbox is up to date"
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
app_external.html 24 <a href="https://github.com/GoogleChrome/chrome-app-samples/tree/master/sandbox">sandbox</a> sample.
121 <h2 id="sandboxing">Sandbox local content</h2>
130 <a href="manifest/sandbox.html">sandbox</a>.
141 <h3 id="inline_scripts">Use inline scripts in sandbox</h3>
160 <h3 id="include_sandbox">Include sandbox in manifest</h3>
163 You need to include the <code>sandbox</code> field in the manifest
164 and list the app pages to be served in a sandbox:
168 "sandbox":
    [all...]
  /external/chromium_org/chrome/test/security_tests/
renderer_sandbox_tests_mac.mm 10 //--------------------- Sandbox Tests ---------------------
11 // Below is a list of test functions that check the renderer sandbox.
74 LogInfoMessage("Running sandbox test: " + test_case->name);
  /external/chromium_org/content/gpu/
gpu_child_thread.h 25 namespace sandbox { namespace
82 // Windows specific client sandbox interface.
83 sandbox::TargetServices* target_services_;

Completed in 183 milliseconds

<<11121314151617181920>>