/external/chromium_org/content/common/ |
sandbox_win.h | 14 class TargetPolicy; 20 // Wrapper around sandbox::TargetPolicy::SetJobLevel that checks if the sandbox 25 sandbox::TargetPolicy* policy); 28 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy);
|
sandbox_win.cc | 113 sandbox::TargetPolicy::Semantics access, 114 sandbox::TargetPolicy* policy) { 123 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 133 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 144 sandbox::TargetPolicy::Semantics access, 145 sandbox::TargetPolicy* policy) { 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 153 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 180 sandbox::TargetPolicy* policy) { 217 void AddGenericDllEvictionPolicy(sandbox::TargetPolicy* policy) [all...] |
sandbox_init_win.cc | 31 sandbox::TargetPolicy* policy = broker_services->CreatePolicy();
|
/external/chromium_org/content/public/common/ |
sandboxed_process_launcher_delegate.h | 15 class TargetPolicy; 41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
/external/chromium_org/sandbox/win/src/ |
registry_policy_test.cc | 90 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, 91 TargetPolicy::REG_ALLOW_READONLY, 94 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, 95 TargetPolicy::REG_ALLOW_ANY, 140 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, 141 TargetPolicy::REG_ALLOW_READONLY, 155 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, 156 TargetPolicy::REG_ALLOW_READONLY, 159 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, 160 TargetPolicy::REG_ALLOW_READONLY [all...] |
sandbox.h | 33 class TargetPolicy; 60 virtual TargetPolicy* CreatePolicy() = 0; 78 TargetPolicy* policy,
|
sync_policy_test.cc | 92 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 93 TargetPolicy::EVENTS_ALLOW_ANY, 95 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 96 TargetPolicy::EVENTS_ALLOW_ANY, 116 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 117 TargetPolicy::EVENTS_ALLOW_READONLY, 119 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 120 TargetPolicy::EVENTS_ALLOW_READONLY, 122 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 123 TargetPolicy::EVENTS_ALLOW_READONLY [all...] |
handle_policy_test.cc | 62 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, 63 TargetPolicy::HANDLES_DUP_ANY, 84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, 85 TargetPolicy::HANDLES_DUP_ANY, 100 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, 101 TargetPolicy::HANDLES_DUP_ANY, 107 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, 108 TargetPolicy::HANDLES_DUP_BROKER,
|
unload_dll_test.cc | 50 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 51 TargetPolicy::EVENTS_ALLOW_ANY, L"t0001")); 64 sandbox::TargetPolicy* policy = runner.GetPolicy(); 75 sandbox::TargetPolicy* policy = runner.GetPolicy(); 84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, 85 TargetPolicy::REG_ALLOW_ANY, 87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 88 TargetPolicy::EVENTS_ALLOW_ANY, L"tst0001"));
|
handle_policy.h | 25 TargetPolicy::Semantics semantics, 28 // Processes a 'TargetPolicy::DuplicateHandle()' request from the target.
|
named_pipe_policy_test.cc | 67 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, 68 TargetPolicy::NAMEDPIPES_ALLOW_ANY, 87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, 88 TargetPolicy::NAMEDPIPES_ALLOW_ANY, 124 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, 125 TargetPolicy::NAMEDPIPES_ALLOW_ANY,
|
named_pipe_policy.h | 29 TargetPolicy::Semantics semantics,
|
handle_policy.cc | 20 TargetPolicy::Semantics semantics, 25 case TargetPolicy::HANDLES_DUP_ANY: { 33 case TargetPolicy::HANDLES_DUP_BROKER: {
|
process_policy_test.cc | 272 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS, 273 TargetPolicy::PROCESS_ALL_EXEC, 280 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS, 281 TargetPolicy::PROCESS_ALL_EXEC, 290 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, 291 TargetPolicy::PROCESS_MIN_EXEC, 296 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY, 304 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY, 344 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, 345 TargetPolicy::PROCESS_MIN_EXEC [all...] |
registry_policy.h | 27 TargetPolicy::Semantics semantics,
|
sync_policy.h | 30 TargetPolicy::Semantics semantics,
|
file_policy_test.cc | 248 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_DIR_ANY, 259 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"calc.exe")); 272 runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, nt_path.c_str()); 292 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, 323 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_ANY, temp_directory)); 336 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"App*.dll")); 350 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"n*.dll")); 363 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, 365 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, 367 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"drivers")) [all...] |
broker_services.h | 48 virtual TargetPolicy* CreatePolicy() OVERRIDE; 51 TargetPolicy* policy,
|
named_pipe_policy.cc | 46 TargetPolicy::Semantics semantics, 48 if (TargetPolicy::NAMEDPIPES_ALLOW_ANY != semantics) {
|
process_thread_policy.h | 30 TargetPolicy::Semantics semantics,
|
/external/chromium/chrome/common/ |
sandbox_policy.cc | 125 sandbox::TargetPolicy::Semantics access, 126 sandbox::TargetPolicy* policy) { 137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 158 sandbox::TargetPolicy::Semantics access, 159 sandbox::TargetPolicy* policy) { 161 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 167 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 193 sandbox::TargetPolicy* policy) { 224 void AddDllEvictionPolicy(sandbox::TargetPolicy* policy) [all...] |
/external/chromium_org/sandbox/win/tests/common/ |
controller.h | 82 bool AddRule(TargetPolicy::SubSystem subsystem, 83 TargetPolicy::Semantics semantics, 89 bool AddRuleSys32(TargetPolicy::Semantics semantics, const wchar_t* pattern); 93 bool AddFsRule(TargetPolicy::Semantics semantics, const wchar_t* pattern); 117 TargetPolicy* GetPolicy(); 137 TargetPolicy* policy_;
|
controller.cc | 127 TargetPolicy* TestRunner::GetPolicy() { 139 bool TestRunner::AddRule(TargetPolicy::SubSystem subsystem, 140 TargetPolicy::Semantics semantics, 148 bool TestRunner::AddRuleSys32(TargetPolicy::Semantics semantics, 157 if (!AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str())) 168 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str()); 171 bool TestRunner::AddFsRule(TargetPolicy::Semantics semantics, 176 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, pattern);
|
/external/chromium_org/components/nacl/broker/ |
nacl_broker_listener.h | 29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
nacl_broker_listener.cc | 50 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy, 58 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, 59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,
|