HomeSort by relevance Sort by last modified time
    Searched refs:TargetPolicy (Results 1 - 25 of 47) sorted by null

1 2

  /external/chromium_org/content/common/
sandbox_win.h 14 class TargetPolicy;
20 // Wrapper around sandbox::TargetPolicy::SetJobLevel that checks if the sandbox
25 sandbox::TargetPolicy* policy);
28 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy);
sandbox_win.cc 113 sandbox::TargetPolicy::Semantics access,
114 sandbox::TargetPolicy* policy) {
123 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
133 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
144 sandbox::TargetPolicy::Semantics access,
145 sandbox::TargetPolicy* policy) {
147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access,
153 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access,
180 sandbox::TargetPolicy* policy) {
217 void AddGenericDllEvictionPolicy(sandbox::TargetPolicy* policy)
    [all...]
sandbox_init_win.cc 31 sandbox::TargetPolicy* policy = broker_services->CreatePolicy();
  /external/chromium_org/content/public/common/
sandboxed_process_launcher_delegate.h 15 class TargetPolicy;
41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
  /external/chromium_org/sandbox/win/src/
registry_policy_test.cc 90 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY,
91 TargetPolicy::REG_ALLOW_READONLY,
94 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY,
95 TargetPolicy::REG_ALLOW_ANY,
140 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY,
141 TargetPolicy::REG_ALLOW_READONLY,
155 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY,
156 TargetPolicy::REG_ALLOW_READONLY,
159 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY,
160 TargetPolicy::REG_ALLOW_READONLY
    [all...]
sandbox.h 33 class TargetPolicy;
60 virtual TargetPolicy* CreatePolicy() = 0;
78 TargetPolicy* policy,
sync_policy_test.cc 92 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
93 TargetPolicy::EVENTS_ALLOW_ANY,
95 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
96 TargetPolicy::EVENTS_ALLOW_ANY,
116 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
117 TargetPolicy::EVENTS_ALLOW_READONLY,
119 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
120 TargetPolicy::EVENTS_ALLOW_READONLY,
122 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
123 TargetPolicy::EVENTS_ALLOW_READONLY
    [all...]
handle_policy_test.cc 62 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
63 TargetPolicy::HANDLES_DUP_ANY,
84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
85 TargetPolicy::HANDLES_DUP_ANY,
100 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
101 TargetPolicy::HANDLES_DUP_ANY,
107 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
108 TargetPolicy::HANDLES_DUP_BROKER,
unload_dll_test.cc 50 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
51 TargetPolicy::EVENTS_ALLOW_ANY, L"t0001"));
64 sandbox::TargetPolicy* policy = runner.GetPolicy();
75 sandbox::TargetPolicy* policy = runner.GetPolicy();
84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY,
85 TargetPolicy::REG_ALLOW_ANY,
87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
88 TargetPolicy::EVENTS_ALLOW_ANY, L"tst0001"));
handle_policy.h 25 TargetPolicy::Semantics semantics,
28 // Processes a 'TargetPolicy::DuplicateHandle()' request from the target.
named_pipe_policy_test.cc 67 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES,
68 TargetPolicy::NAMEDPIPES_ALLOW_ANY,
87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES,
88 TargetPolicy::NAMEDPIPES_ALLOW_ANY,
124 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES,
125 TargetPolicy::NAMEDPIPES_ALLOW_ANY,
named_pipe_policy.h 29 TargetPolicy::Semantics semantics,
handle_policy.cc 20 TargetPolicy::Semantics semantics,
25 case TargetPolicy::HANDLES_DUP_ANY: {
33 case TargetPolicy::HANDLES_DUP_BROKER: {
process_policy_test.cc 272 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS,
273 TargetPolicy::PROCESS_ALL_EXEC,
280 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS,
281 TargetPolicy::PROCESS_ALL_EXEC,
290 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS,
291 TargetPolicy::PROCESS_MIN_EXEC,
296 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY,
304 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY,
344 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS,
345 TargetPolicy::PROCESS_MIN_EXEC
    [all...]
registry_policy.h 27 TargetPolicy::Semantics semantics,
sync_policy.h 30 TargetPolicy::Semantics semantics,
file_policy_test.cc 248 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_DIR_ANY,
259 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"calc.exe"));
272 runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, nt_path.c_str());
292 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY,
323 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_ANY, temp_directory));
336 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"App*.dll"));
350 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"n*.dll"));
363 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY,
365 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY,
367 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"drivers"))
    [all...]
broker_services.h 48 virtual TargetPolicy* CreatePolicy() OVERRIDE;
51 TargetPolicy* policy,
named_pipe_policy.cc 46 TargetPolicy::Semantics semantics,
48 if (TargetPolicy::NAMEDPIPES_ALLOW_ANY != semantics) {
process_thread_policy.h 30 TargetPolicy::Semantics semantics,
  /external/chromium/chrome/common/
sandbox_policy.cc 125 sandbox::TargetPolicy::Semantics access,
126 sandbox::TargetPolicy* policy) {
137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
158 sandbox::TargetPolicy::Semantics access,
159 sandbox::TargetPolicy* policy) {
161 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access,
167 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access,
193 sandbox::TargetPolicy* policy) {
224 void AddDllEvictionPolicy(sandbox::TargetPolicy* policy)
    [all...]
  /external/chromium_org/sandbox/win/tests/common/
controller.h 82 bool AddRule(TargetPolicy::SubSystem subsystem,
83 TargetPolicy::Semantics semantics,
89 bool AddRuleSys32(TargetPolicy::Semantics semantics, const wchar_t* pattern);
93 bool AddFsRule(TargetPolicy::Semantics semantics, const wchar_t* pattern);
117 TargetPolicy* GetPolicy();
137 TargetPolicy* policy_;
controller.cc 127 TargetPolicy* TestRunner::GetPolicy() {
139 bool TestRunner::AddRule(TargetPolicy::SubSystem subsystem,
140 TargetPolicy::Semantics semantics,
148 bool TestRunner::AddRuleSys32(TargetPolicy::Semantics semantics,
157 if (!AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str()))
168 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str());
171 bool TestRunner::AddFsRule(TargetPolicy::Semantics semantics,
176 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, pattern);
  /external/chromium_org/components/nacl/broker/
nacl_broker_listener.h 29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
nacl_broker_listener.cc 50 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy,
58 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES,
59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,

Completed in 288 milliseconds

1 2