HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 326 - 350 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
restricted_token_utils.h 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/security_level.h"
17 namespace sandbox { namespace
81 } // namespace sandbox
target_process.h 14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/sandbox_types.h"
25 namespace sandbox { namespace
130 } // namespace sandbox
interception.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
18 #include "sandbox/win/src/sandbox_types.h"
20 namespace sandbox { namespace
42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1))
47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2))
62 // do not work with sandbox tests.
238 sandbox::INTERCEPTION_SERVICE_CALL, \
251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \
264 sandbox::INTERCEPTION_SERVICE_CALL, \
275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT,
    [all...]
process_thread_interception.cc 5 #include "sandbox/win/src/process_thread_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
win_utils.cc 5 #include "sandbox/win/src/win_utils.h"
10 #include "sandbox/win/src/internal_types.h"
11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
38 if (0 == path.compare(0, sandbox::kNTPrefixLen, sandbox::kNTPrefix))
39 start = sandbox::kNTPrefixLen;
47 namespace sandbox { namespace
300 }; // namespace sandbox
311 static HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName)
    [all...]
sharedmem_ipc_server.h 12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
32 namespace sandbox { namespace
56 // do not work with sandbox tests.
125 } // namespace sandbox
filesystem_policy.cc 7 #include "sandbox/win/src/filesystem_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_utils.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/win_utils.h"
43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) {
59 namespace sandbox { namespace
386 } // namespace sandbox
    [all...]
policy_target_test.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
14 namespace sandbox { namespace
214 // Launches the app in the sandbox and ask it to wait in an
277 // Launches the app in the sandbox and ask it to wait in an
344 } // namespace sandbox
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SandboxFlags.cpp 37 // http://www.w3.org/TR/html5/the-iframe-element.html#attr-iframe-sandbox
53 // Turn off the corresponding sandbox flag if it's set as "allowed".
83 tokenErrors.appendLiteral(" are invalid sandbox flags.");
85 tokenErrors.appendLiteral(" is an invalid sandbox flag.");
SandboxFlags.h 35 // See http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-sandbox for a list of the sandbox flags.
  /external/chromium/base/debug/
debugger.h 28 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled.
32 // BEFORE the sandbox is enabled.
  /external/chromium_org/base/debug/
debugger.h 27 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled.
31 // BEFORE the sandbox is enabled.
  /external/chromium_org/chrome/common/extensions/manifest_tests/
extension_manifests_sandboxed_unittest.cc 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups";
42 "sandbox; script-src: https://www.google.com";
  /external/chromium_org/components/autofill/core/common/
autofill_switches.cc 50 // Use the sandbox Online Wallet service URL (for developer testing).
51 const char kWalletServiceUseSandbox[] = "wallet-service-use-sandbox";
  /external/chromium_org/content/common/
OWNERS 10 # Mac Sandbox.
22 # new sandbox escapes.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
syscall_iterator.h 12 namespace sandbox { namespace
53 } // namespace sandbox
codegen.h 12 #include "sandbox/linux/seccomp-bpf/basicblock.h"
13 #include "sandbox/linux/seccomp-bpf/instruction.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
16 namespace sandbox { namespace
48 // // any C++ destructors after starting the sandbox.
157 } // namespace sandbox
  /external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.h 13 namespace sandbox { namespace
23 // The purpose of this is to be able to spawn an EXE inside a SandBox, have it
25 // sandbox. This is useful for developer debugging and for security testing.
54 // BrokerService that will launch a new EXE inside the sandbox and load the
59 sandbox::BrokerServices* broker);
116 // Spawns a target EXE inside the sandbox (with the help of the
159 // The BrokerServices will be used to spawn an EXE in a sandbox and ask
161 sandbox::BrokerServices* broker_;
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
fs.cc 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
network.cc 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
registry.cc 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
spyware.cc 8 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
9 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/
MemoryActivatedFont.mm 26 // font loading being blocked by the sandbox, we need a mechnasim to both
59 // from inside the sandbox).
83 // the sandbox to construct a key which we hope will be as unique as possible
118 // font due to being blocked by the sandbox.
119 // This by definition shouldn't happen if there is no sandbox support.
168 // parameter. If loading is blocked by the sandbox, the font may be loaded
170 // If sandbox loading also fails, a fallback font is loaded.
192 // Font loading was blocked by the Sandbox.
  /external/chromium_org/ui/gl/
gl_surface_cgl.cc 30 // This is called from the sandbox warmup code on Mac OS X.
32 // the sandbox prevents loading graphics drivers or some such.
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_mac.mm 37 // right after the sandbox is initialized.
50 // renderer sandbox blocks that. TIS then becomes very vocal about this on
159 // Enable the sandbox.
163 // After the sandbox is initialized, call into TIS. Doing this before
164 // the sandbox is in place will open up renderer access to the
183 LOG(ERROR) << "Running renderer with failing sandbox tests!";

Completed in 230 milliseconds

<<11121314151617181920>>