HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 151 - 175 of 990) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/chromium_org/sandbox/win/src/
sync_interception.cc 5 #include "sandbox/win/src/sync_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
target_services.cc 5 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/handle_closer_agent.h"
12 #include "sandbox/win/src/handle_interception.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/process_mitigations.h"
15 #include "sandbox/win/src/restricted_token_utils.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_types.h
61 namespace sandbox { namespace
    [all...]
filesystem_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
58 } // namespace sandbox
filesystem_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
51 } // namespace sandbox
policy_params.h 8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
64 } // namespace sandbox
policy_target.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
43 } // namespace sandbox
process_mitigations.h 11 #include "sandbox/win/src/security_level.h"
13 namespace sandbox { namespace
23 // Converts sandbox flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES
41 } // namespace sandbox
process_thread_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
49 } // namespace sandbox
resolver.cc 5 #include "sandbox/win/src/resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
10 namespace sandbox { namespace
62 } // namespace sandbox
resolver_64.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
44 namespace sandbox { namespace
69 } // namespace sandbox
target_interceptions.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
33 } // namespace sandbox
win2k_threadpool.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
7 #include "sandbox/win/src/win_utils.h"
9 namespace sandbox { namespace
60 } // namespace sandbox
  /external/chromium_org/sandbox/win/tools/finder/
main.cc 5 #include "sandbox/win/src/restricted_token_utils.h"
6 #include "sandbox/win/tools/finder/finder.h"
32 sandbox::TokenLevel token_type = sandbox::USER_LOCKDOWN;
48 token_type = sandbox::USER_LOCKDOWN;
50 token_type = sandbox::USER_RESTRICTED;
52 token_type = sandbox::USER_LIMITED;
54 token_type = sandbox::USER_INTERACTIVE;
56 token_type = sandbox::USER_NON_ADMIN;
58 token_type = sandbox::USER_RESTRICTED_SAME_ACCESS
    [all...]
  /external/chromium_org/content/common/sandbox_linux/
sandbox_linux.h 23 namespace sandbox { class SetuidSandboxClient; } namespace
31 // This is a list of sandbox IPC methods which the renderer may send to the
32 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
48 // are enabled. If using the setuid sandbox, this should be called manually
49 // before the setuid sandbox is engaged.
52 // Initialize the sandbox with the given pre-built configuration. Currently
53 // seccomp-bpf and address space limitations (the setuid sandbox works
59 // Stop |thread| in a way that can be trusted by the sandbox.
62 // Returns the status of the renderer, worker and ppapi sandbox. Can only
75 // Simple accessor for our instance of the setuid sandbox. Will never retur
    [all...]
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.h 13 #include "sandbox/sandbox_export.h"
15 namespace sandbox { namespace
17 // Helper class to use the setuid sandbox. This class is to be used both
28 // setuid sandbox ABI.
33 // 6.b (optional) B uses sandbox::Credentials::HasOpenDirectory() to verify
35 // sandbox).
49 // Close the dummy file descriptor leftover from the sandbox ABI.
51 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
57 // See sandbox/linux/services/init_process_reaper.h for more information
72 // The setuid sandbox may still be disabled via the environment
    [all...]
  /external/chromium_org/sandbox/win/tests/validation_tests/
suite.cc 5 // This file contains the validation tests for the sandbox.
7 // sandbox.
13 #include "sandbox/win/tests/common/controller.h"
19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) {
25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command))
48 namespace sandbox { namespace
    [all...]
  /external/chromium_org/components/nacl/loader/nonsfi/
DEPS 3 "+sandbox/linux/seccomp-bpf-helpers",
  /external/chromium_org/content/browser/resources/gpu/
timeline_test.html 29 <div id="sandbox"></div>
32 var sandbox = document.getElementById('sandbox');
40 sandbox.appendChild(timeline);
  /external/chromium_org/content/common/
sandbox_init_mac.h 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in
13 // Returns true if the sandbox was initialized succesfully, false if an error
20 // in the bootstrap sandbox. In child processes, the the launchd/bootstrap
21 // sandbox will have replaced the bootstrap port with one controlled by the
  /external/chromium_org/content/public/app/
startup_helper_win.h 12 namespace sandbox { namespace
22 // Initializes the sandbox code and turns on DEP. Note: This function
24 // sandbox library); it will not work correctly if it is exported from a
26 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* sandbox_info);
  /external/chromium_org/content/public/common/
sandbox_type_mac.h 10 // Defines the Mac sandbox types known within content. Embedders can add
11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE.
14 // Not a valid sandbox type.
21 // The worker process uses the most restrictive sandbox which has almost
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf_policy.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
16 // This is the interface to implement to define a BPF sandbox policy.
39 } // namespace sandbox
  /external/chromium_org/sandbox/win/sandbox_poc/
sandbox.cc 8 #include "sandbox/win/sandbox_poc/sandbox.h"
10 #include "sandbox/win/sandbox_poc/main_ui_window.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
54 sandbox::BrokerServices* broker_service =
55 sandbox::SandboxFactory::GetBrokerServices();
56 sandbox::ResultCode result;
59 // spawns an instance of itself (called a 'target') inside the sandbox
    [all...]
sandbox.h 8 #include "sandbox/win/sandbox_poc/resource.h"
  /external/chromium_org/sandbox/win/wow_helper/
target_code.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
16 // on sandbox/win/src/wow64.cc.
39 } // namespace sandbox

Completed in 100 milliseconds

1 2 3 4 5 67 8 91011>>