/external/chromium_org/sandbox/win/src/ |
restricted_token_utils.h | 11 #include "sandbox/win/src/restricted_token.h" 12 #include "sandbox/win/src/security_level.h" 17 namespace sandbox { namespace 81 } // namespace sandbox
|
target_process.h | 14 #include "sandbox/win/src/crosscall_server.h" 15 #include "sandbox/win/src/sandbox_types.h" 25 namespace sandbox { namespace 130 } // namespace sandbox
|
interception.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 18 #include "sandbox/win/src/sandbox_types.h" 20 namespace sandbox { namespace 42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1)) 47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2)) 62 // do not work with sandbox tests. 238 sandbox::INTERCEPTION_SERVICE_CALL, \ 251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \ 264 sandbox::INTERCEPTION_SERVICE_CALL, \ 275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, [all...] |
process_thread_interception.cc | 5 #include "sandbox/win/src/process_thread_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
win_utils.cc | 5 #include "sandbox/win/src/win_utils.h" 10 #include "sandbox/win/src/internal_types.h" 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 38 if (0 == path.compare(0, sandbox::kNTPrefixLen, sandbox::kNTPrefix)) 39 start = sandbox::kNTPrefixLen; 47 namespace sandbox { namespace 300 }; // namespace sandbox 311 static HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName) [all...] |
sharedmem_ipc_server.h | 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 32 namespace sandbox { namespace 56 // do not work with sandbox tests. 125 } // namespace sandbox
|
filesystem_policy.cc | 7 #include "sandbox/win/src/filesystem_policy.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_utils.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/win_utils.h" 43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) { 59 namespace sandbox { namespace 386 } // namespace sandbox [all...] |
policy_target_test.cc | 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/sandbox_utils.h" 10 #include "sandbox/win/src/target_services.h" 11 #include "sandbox/win/tests/common/controller.h" 14 namespace sandbox { namespace 214 // Launches the app in the sandbox and ask it to wait in an 277 // Launches the app in the sandbox and ask it to wait in an 344 } // namespace sandbox [all...] |
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SandboxFlags.cpp | 37 // http://www.w3.org/TR/html5/the-iframe-element.html#attr-iframe-sandbox 53 // Turn off the corresponding sandbox flag if it's set as "allowed". 83 tokenErrors.appendLiteral(" are invalid sandbox flags."); 85 tokenErrors.appendLiteral(" is an invalid sandbox flag.");
|
SandboxFlags.h | 35 // See http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-sandbox for a list of the sandbox flags.
|
/external/chromium/base/debug/ |
debugger.h | 28 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled. 32 // BEFORE the sandbox is enabled.
|
/external/chromium_org/base/debug/ |
debugger.h | 27 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled. 31 // BEFORE the sandbox is enabled.
|
/external/chromium_org/chrome/common/extensions/manifest_tests/ |
extension_manifests_sandboxed_unittest.cc | 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups"; 42 "sandbox; script-src: https://www.google.com";
|
/external/chromium_org/components/autofill/core/common/ |
autofill_switches.cc | 50 // Use the sandbox Online Wallet service URL (for developer testing). 51 const char kWalletServiceUseSandbox[] = "wallet-service-use-sandbox";
|
/external/chromium_org/content/common/ |
OWNERS | 10 # Mac Sandbox. 22 # new sandbox escapes.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
syscall_iterator.h | 12 namespace sandbox { namespace 53 } // namespace sandbox
|
codegen.h | 12 #include "sandbox/linux/seccomp-bpf/basicblock.h" 13 #include "sandbox/linux/seccomp-bpf/instruction.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 16 namespace sandbox { namespace 48 // // any C++ destructors after starting the sandbox. 157 } // namespace sandbox
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
main_ui_window.h | 13 namespace sandbox { namespace 23 // The purpose of this is to be able to spawn an EXE inside a SandBox, have it 25 // sandbox. This is useful for developer debugging and for security testing. 54 // BrokerService that will launch a new EXE inside the sandbox and load the 59 sandbox::BrokerServices* broker); 116 // Spawns a target EXE inside the sandbox (with the help of the 159 // The BrokerServices will be used to spawn an EXE in a sandbox and ask 161 sandbox::BrokerServices* broker_;
|
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
fs.cc | 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
network.cc | 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
registry.cc | 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
spyware.cc | 8 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 9 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/ |
MemoryActivatedFont.mm | 26 // font loading being blocked by the sandbox, we need a mechnasim to both 59 // from inside the sandbox). 83 // the sandbox to construct a key which we hope will be as unique as possible 118 // font due to being blocked by the sandbox. 119 // This by definition shouldn't happen if there is no sandbox support. 168 // parameter. If loading is blocked by the sandbox, the font may be loaded 170 // If sandbox loading also fails, a fallback font is loaded. 192 // Font loading was blocked by the Sandbox.
|
/external/chromium_org/ui/gl/ |
gl_surface_cgl.cc | 30 // This is called from the sandbox warmup code on Mac OS X. 32 // the sandbox prevents loading graphics drivers or some such.
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_mac.mm | 37 // right after the sandbox is initialized. 50 // renderer sandbox blocks that. TIS then becomes very vocal about this on 159 // Enable the sandbox. 163 // After the sandbox is initialized, call into TIS. Doing this before 164 // the sandbox is in place will open up renderer access to the 183 LOG(ERROR) << "Running renderer with failing sandbox tests!";
|