OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
276 - 300
of
851
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/chromium_org/sandbox/win/src/
handle_inheritance_test.cc
9
#include "
sandbox
/win/tests/common/controller.h"
12
namespace
sandbox
{
namespace
internal_types.h
8
namespace
sandbox
{
namespace
74
} // namespace
sandbox
sync_policy_test.cc
5
#include "
sandbox
/win/src/sync_policy_test.h"
8
#include "
sandbox
/win/src/
sandbox
.h"
9
#include "
sandbox
/win/src/sandbox_policy.h"
10
#include "
sandbox
/win/src/sandbox_factory.h"
11
#include "
sandbox
/win/src/nt_internals.h"
14
namespace
sandbox
{
namespace
146
} // namespace
sandbox
interception_agent.h
7
// http://dev.chromium.org/developers/design-documents/
sandbox
.
13
#include "
sandbox
/win/src/nt_internals.h"
14
#include "
sandbox
/win/src/sandbox_types.h"
16
namespace
sandbox
{
namespace
85
} // namespace
sandbox
window.cc
5
#include "
sandbox
/win/src/window.h"
11
#include "
sandbox
/win/src/acl.h"
12
#include "
sandbox
/win/src/sid.h"
35
namespace
sandbox
{
namespace
155
} // namespace
sandbox
registry_policy_test.cc
8
#include "
sandbox
/win/src/registry_policy.h"
9
#include "
sandbox
/win/src/
sandbox
.h"
10
#include "
sandbox
/win/src/sandbox_policy.h"
11
#include "
sandbox
/win/src/sandbox_factory.h"
12
#include "
sandbox
/win/src/nt_internals.h"
13
#include "
sandbox
/win/src/win_utils.h"
14
#include "
sandbox
/win/tests/common/controller.h"
43
namespace
sandbox
{
namespace
289
} // namespace
sandbox
[
all
...]
broker_services.cc
5
#include "
sandbox
/win/src/broker_services.h"
14
#include "
sandbox
/win/src/app_container.h"
15
#include "
sandbox
/win/src/process_mitigations.h"
16
#include "
sandbox
/win/src/sandbox_policy_base.h"
17
#include "
sandbox
/win/src/
sandbox
.h"
18
#include "
sandbox
/win/src/target_process.h"
19
#include "
sandbox
/win/src/win2k_threadpool.h"
20
#include "
sandbox
/win/src/win_utils.h"
34
sandbox
::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error)
85
namespace
sandbox
{
namespace
[
all
...]
sandbox_nt_util.cc
5
#include "
sandbox
/win/src/sandbox_nt_util.h"
8
#include "
sandbox
/win/src/sandbox_factory.h"
9
#include "
sandbox
/win/src/target_services.h"
11
namespace
sandbox
{
namespace
16
} // namespace
sandbox
22
using
sandbox
::g_nt;
76
using
sandbox
::g_nt;
105
namespace
sandbox
{
namespace
541
} // namespace
sandbox
543
void* operator new(size_t size,
sandbox
::AllocationType type
[
all
...]
sharedmem_ipc_client.cc
6
#include "
sandbox
/win/src/sharedmem_ipc_client.h"
7
#include "
sandbox
/win/src/
sandbox
.h"
8
#include "
sandbox
/win/src/crosscall_client.h"
9
#include "
sandbox
/win/src/crosscall_params.h"
12
namespace
sandbox
{
namespace
152
} // namespace
sandbox
/external/chromium_org/sandbox/win/tests/validation_tests/
commands.cc
9
#include "
sandbox
/win/tests/validation_tests/commands.h"
11
#include "
sandbox
/win/tests/common/controller.h"
48
return
sandbox
::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
61
return
sandbox
::SBOX_TEST_SUCCEEDED;
64
return
sandbox
::SBOX_TEST_DENIED;
66
return
sandbox
::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
73
namespace
sandbox
{
namespace
314
} // namespace
sandbox
commands.h
12
namespace
sandbox
{
namespace
46
} // namespace
sandbox
/external/openssh/
sandbox-null.c
32
#include "ssh-
sandbox
.h"
35
/* dummy
sandbox
*/
/external/chromium_org/chrome/android/testshell/java/
AndroidManifest.xml
13
<permission android:name="org.chromium.chrome.testshell.permission.
SANDBOX
"
61
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
66
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
71
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
76
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
81
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
86
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
91
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
96
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
101
android:permission="org.chromium.content_shell.permission.
SANDBOX
"
[
all
...]
/external/chromium_org/components/
breakpad.gypi
52
'../
sandbox
/
sandbox
.gyp:
sandbox
',
111
'../
sandbox
/
sandbox
.gyp:sandbox_win64',
/external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.cc
5
#include "
sandbox
/linux/seccomp-bpf/die.h"
6
#include "
sandbox
/linux/seccomp-bpf/errorcode.h"
8
namespace
sandbox
{
namespace
47
SANDBOX_DIE("Invalid opcode in BPF
sandbox
rules");
104
} // namespace
sandbox
syscall_iterator_unittest.cc
5
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf.h"
6
#include "
sandbox
/linux/seccomp-bpf/syscall_iterator.h"
7
#include "
sandbox
/linux/tests/unit_tests.h"
9
namespace
sandbox
{
namespace
136
} // namespace
sandbox
/external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.cc
15
#include "
sandbox
/win/sandbox_poc/main_ui_window.h"
17
#include "
sandbox
/win/sandbox_poc/resource.h"
18
#include "
sandbox
/win/src/acl.h"
19
#include "
sandbox
/win/src/
sandbox
.h"
20
#include "
sandbox
/win/src/win_utils.h"
43
sandbox
::BrokerServices* broker) {
103
::SetWindowText(window, L"
Sandbox
Proof of Concept");
508
sandbox
::TargetPolicy* policy = broker_->CreatePolicy();
509
policy->SetJobLevel(
sandbox
::JOB_LOCKDOWN, 0)
[
all
...]
/external/chromium_org/sandbox/
seccomp_bpf.target.darwin-arm.mk
27
sandbox
/linux/seccomp-bpf/basicblock.cc \
28
sandbox
/linux/seccomp-bpf/codegen.cc \
29
sandbox
/linux/seccomp-bpf/die.cc \
30
sandbox
/linux/seccomp-bpf/errorcode.cc \
31
sandbox
/linux/seccomp-bpf/sandbox_bpf.cc \
32
sandbox
/linux/seccomp-bpf/syscall.cc \
33
sandbox
/linux/seccomp-bpf/syscall_iterator.cc \
34
sandbox
/linux/seccomp-bpf/trap.cc \
35
sandbox
/linux/seccomp-bpf/verifier.cc
seccomp_bpf.target.darwin-x86.mk
27
sandbox
/linux/seccomp-bpf/basicblock.cc \
28
sandbox
/linux/seccomp-bpf/codegen.cc \
29
sandbox
/linux/seccomp-bpf/die.cc \
30
sandbox
/linux/seccomp-bpf/errorcode.cc \
31
sandbox
/linux/seccomp-bpf/sandbox_bpf.cc \
32
sandbox
/linux/seccomp-bpf/syscall.cc \
33
sandbox
/linux/seccomp-bpf/syscall_iterator.cc \
34
sandbox
/linux/seccomp-bpf/trap.cc \
35
sandbox
/linux/seccomp-bpf/verifier.cc
seccomp_bpf.target.linux-arm.mk
27
sandbox
/linux/seccomp-bpf/basicblock.cc \
28
sandbox
/linux/seccomp-bpf/codegen.cc \
29
sandbox
/linux/seccomp-bpf/die.cc \
30
sandbox
/linux/seccomp-bpf/errorcode.cc \
31
sandbox
/linux/seccomp-bpf/sandbox_bpf.cc \
32
sandbox
/linux/seccomp-bpf/syscall.cc \
33
sandbox
/linux/seccomp-bpf/syscall_iterator.cc \
34
sandbox
/linux/seccomp-bpf/trap.cc \
35
sandbox
/linux/seccomp-bpf/verifier.cc
seccomp_bpf.target.linux-x86.mk
27
sandbox
/linux/seccomp-bpf/basicblock.cc \
28
sandbox
/linux/seccomp-bpf/codegen.cc \
29
sandbox
/linux/seccomp-bpf/die.cc \
30
sandbox
/linux/seccomp-bpf/errorcode.cc \
31
sandbox
/linux/seccomp-bpf/sandbox_bpf.cc \
32
sandbox
/linux/seccomp-bpf/syscall.cc \
33
sandbox
/linux/seccomp-bpf/syscall_iterator.cc \
34
sandbox
/linux/seccomp-bpf/trap.cc \
35
sandbox
/linux/seccomp-bpf/verifier.cc
/external/chromium_org/build/
update-linux-sandbox.sh
11
CHROME_SANDBOX_INST_PATH="/usr/local/sbin/chrome-devel-
sandbox
"
62
echo "Your installed setuid
sandbox
is too old, installing it now."
68
echo "Your setuid
sandbox
is up to date"
/external/chromium_org/chrome/common/extensions/docs/templates/articles/
app_external.html
24
<a href="https://github.com/GoogleChrome/chrome-app-samples/tree/master/
sandbox
">
sandbox
</a> sample.
121
<h2 id="sandboxing">
Sandbox
local content</h2>
130
<a href="manifest/
sandbox
.html">
sandbox
</a>.
141
<h3 id="inline_scripts">Use inline scripts in
sandbox
</h3>
160
<h3 id="include_sandbox">Include
sandbox
in manifest</h3>
163
You need to include the <code>
sandbox
</code> field in the manifest
164
and list the app pages to be served in a
sandbox
:
168
"
sandbox
":
[
all
...]
/external/chromium_org/chrome/test/security_tests/
renderer_sandbox_tests_mac.mm
10
//---------------------
Sandbox
Tests ---------------------
11
// Below is a list of test functions that check the renderer
sandbox
.
74
LogInfoMessage("Running
sandbox
test: " + test_case->name);
/external/chromium_org/content/gpu/
gpu_child_thread.h
25
namespace
sandbox
{
namespace
82
// Windows specific client
sandbox
interface.
83
sandbox
::TargetServices* target_services_;
Completed in 183 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>