HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 76 - 100 of 851) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/chromium_org/content/common/sandbox_linux/
sandbox_seccomp_bpf_linux.cc 35 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
36 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
37 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
38 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
39 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
40 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
41 #include "sandbox/linux/services/linux_syscalls.h"
43 using sandbox::BaselinePolicy;
44 using sandbox::SyscallSets;
50 void StartSandboxWithPolicy(sandbox::SandboxBPFPolicy* policy)
154 SandboxBPF sandbox; local
    [all...]
  /external/chromium_org/content/common/
sandbox_win.cc 29 #include "sandbox/win/src/process_mitigations.h"
30 #include "sandbox/win/src/sandbox.h"
31 #include "sandbox/win/src/sandbox_nt_util.h"
32 #include "sandbox/win/src/win_utils.h"
34 static sandbox::BrokerServices* g_broker_services = NULL;
35 static sandbox::TargetServices* g_target_services = NULL;
113 sandbox::TargetPolicy::Semantics access,
114 sandbox::TargetPolicy* policy) {
122 sandbox::ResultCode result
    [all...]
sandbox_mac_diraccess_unittest.mm 9 #include <sandbox.h>
29 // Tests need to be in the same namespace as the Sandbox class to be useable
68 EXPECT_TRUE(Sandbox::QuotePlainString(in, &out));
91 EXPECT_FALSE(Sandbox::QuoteStringForRegex(fail_string, &out));
92 EXPECT_TRUE(Sandbox::QuoteStringForRegex(ok_string, &out));
99 EXPECT_TRUE(Sandbox::QuoteStringForRegex("}", &out)); // } == 0x7D == 125
100 EXPECT_FALSE(Sandbox::QuoteStringForRegex("~", &out)); // ~ == 0x7E == 126
102 Sandbox::QuoteStringForRegex(WideToUTF8(L"^\u2135.\u2136$"), &out));
109 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in, &out));
128 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out))
    [all...]
sandbox_mac.h 30 // Class representing a substring of the sandbox profile tagged with its type.
57 class CONTENT_EXPORT Sandbox {
64 // sandbox is turned on. |sandbox_type| is the type of sandbox to warm up.
70 // Turns on the OS X sandbox for this process.
71 // |sandbox_type| - type of Sandbox to use. See SandboxWarmup() for legal
73 // |allowed_dir| - directory to allow access to, currently the only sandbox
76 // Returns true on success, false if an error occurred enabling the sandbox.
80 // Returns true if the sandbox has been enabled for the current process.
86 // Build the Sandbox command necessary to allow access to a named director
    [all...]
sandbox_mac_unittest_helper.h 13 // Helpers for writing unit tests that runs in the context of the Mac sandbox.
17 // its functions to run code before or after the sandbox is initialised in a
28 // .. test code that runs in sandbox goes here ..
43 // a given test in the sandbox.
46 // Runs a test specified by |test_name| in a sandbox of the type specified
48 // to the child process runing in the sandbox, or NULL if additional data is
56 // Runs the test specified by |test_name| in all the different sandbox types
63 // Additional sandbox types defined by the embedder (e.g. the NaCl sandbox)
69 // Class to ease writing test cases that run inside the OS X sandbox
    [all...]
sandbox_mac_unittest_helper.mm 8 #include <sandbox.h>
54 // Go through all the sandbox types, and run the test case in each of them
63 "Failed in sandbox type " << i <<
113 LOG(ERROR) << "Couldn't find sandbox test case(" << name << ")";
120 // Main function for driver process that enables the sandbox and runs test
128 LOG(ERROR) << "Sandbox type not specified";
134 LOG(ERROR) << "Sandbox test name not specified";
144 LOG(ERROR) << "Invalid sandbox test name (" << sandbox_test_name << ")";
152 LOG(ERROR) << sandbox_test_name << "Failed test before sandbox init";
156 Sandbox::SandboxWarmup(sandbox_type)
    [all...]
  /external/chromium_org/sandbox/win/tools/launcher/
launcher.cc 5 #include "sandbox/win/src/restricted_token_utils.h"
27 sandbox::TokenLevel* level) {
29 *level = sandbox::USER_LOCKDOWN;
31 *level = sandbox::USER_RESTRICTED;
33 *level = sandbox::USER_LIMITED;
35 *level = sandbox::USER_INTERACTIVE;
37 *level = sandbox::USER_NON_ADMIN;
39 *level = sandbox::USER_RESTRICTED_SAME_ACCESS;
41 *level = sandbox::USER_UNPROTECTED;
49 bool GetJobLevelFromString(const wchar_t *param, sandbox::JobLevel* level)
    [all...]
  /external/chromium_org/sandbox/win/src/
process_mitigations_test.cc 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/process_mitigations.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/target_services.h"
15 #include "sandbox/win/src/win_utils.h"
16 #include "sandbox/win/tests/common/controller.h"
85 namespace sandbox { namespace
    [all...]
integrity_level_test.cc 10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_policy.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
90 } // namespace sandbox
named_pipe_policy.cc 5 #include "sandbox/win/src/named_pipe_policy.h"
9 #include "sandbox/win/src/ipc_tags.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_types.h"
43 namespace sandbox { namespace
86 } // namespace sandbox
target_interceptions.cc 5 #include "sandbox/win/src/target_interceptions.h"
7 #include "sandbox/win/src/interception_agent.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
100 } // namespace sandbox
named_pipe_dispatcher.cc 5 #include "sandbox/win/src/named_pipe_dispatcher.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/interception.h"
12 #include "sandbox/win/src/interceptors.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/named_pipe_interception.h"
15 #include "sandbox/win/src/named_pipe_policy.h"
16 #include "sandbox/win/src/policy_broker.h"
17 #include "sandbox/win/src/policy_params.h"
18 #include "sandbox/win/src/sandbox.h
21 namespace sandbox { namespace
    [all...]
handle_policy.cc 5 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/broker_services.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/sandbox_utils.h"
17 namespace sandbox { namespace
93 } // namespace sandbox
named_pipe_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/policy_low_level.h"
14 #include "sandbox/win/src/sandbox_policy.h"
16 namespace sandbox { namespace
43 } // namespace sandbox
service_resolver.cc 5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/internal_types.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
11 namespace sandbox { namespace
46 } // namespace sandbox
win2k_threadpool.h 10 #include "sandbox/win/src/crosscall_server.h"
12 namespace sandbox { namespace
15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details
56 } // namespace sandbox
interceptors.h 9 #include "sandbox/win/src/interceptors_64.h"
12 namespace sandbox { namespace
52 } // namespace sandbox
policy_target.cc 5 #include "sandbox/win/src/policy_target.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_engine_processor.h"
10 #include "sandbox/win/src/policy_low_level.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
15 #include "sandbox/win/src/target_services.h
17 namespace sandbox { namespace
    [all...]
  /external/chromium_org/chrome/test/security_tests/
sandbox_browsertest_linux.cc 11 // Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox
25 // The setuid sandbox is required as our first-layer sandbox.
29 // A second-layer sandbox is also required to be adequately sandboxed.
  /external/chromium_org/components/nacl/loader/
nacl_main_platform_delegate_linux.cc 16 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc
19 // The seccomp sandbox is started in the renderer.
26 // The seccomp sandbox should not be enabled for Native Client until
29 // At best, NaCl will not work. At worst, enabling the seccomp sandbox
30 // could create a hole in the NaCl sandbox.
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.h 8 #include "sandbox/linux/seccomp-bpf/errorcode.h"
9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
11 namespace sandbox { namespace
16 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox
41 } // namespace sandbox.
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
remove-child-deep.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
8 var node = sandbox;
32 observer.observe(sandbox, {childList: true, subtree: true});
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/manifest/
sandbox.html 1 <h1 id="sandbox">Manifest - Sandbox</h1>
6 with them. Being in a sandbox has two implications:
21 served in a sandbox with a custom CSP:</p>
26 "sandbox": {
33 "sandbox allow-scripts; script-src https://www.google.com"
41 <code>sandbox allow-scripts allow-forms</code>. You can specify your CSP
42 value to restrict the sandbox even further, but it must have the <code>sandbox</code>
44 <a href="http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-sandbox">th
    [all...]
  /external/chromium_org/content/public/common/
sandbox_type_mac.h 10 // Defines the Mac sandbox types known within content. Embedders can add
11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE.
18 // The worker process uses the most restrictive sandbox which has almost
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf_policy.h 10 namespace sandbox { namespace
15 // This is the interface to implement to define a BPF sandbox policy.
33 } // namespace sandbox

Completed in 503 milliseconds

1 2 34 5 6 7 8 91011>>