HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 301 - 325 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
interception_agent.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
8 #include "sandbox/win/src/interception_agent.h"
10 #include "sandbox/win/src/interception_internal.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/eat_resolver.h"
13 #include "sandbox/win/src/sidestep_resolver.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
26 namespace sandbox { namespace
233 } // namespace sandbox
job.cc 5 #include "sandbox/win/src/job.h"
8 #include "sandbox/win/src/restricted_token.h"
10 namespace sandbox { namespace
118 } // namespace sandbox
process_thread_policy.cc 5 #include "sandbox/win/src/process_thread_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
74 namespace sandbox { namespace
243 } // namespace sandbox
registry_interception.cc 5 #include "sandbox/win/src/registry_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
176 } // namespace sandbox
registry_policy.cc 7 #include "sandbox/win/src/registry_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
115 namespace sandbox { namespace
225 } // namespace sandbox
resolver_32.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
57 namespace sandbox { namespace
88 } // namespace sandbox
sandbox_nt_util.h 11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/sandbox_nt_types.h"
15 void* __cdecl operator new(size_t size, sandbox::AllocationType type,
17 void __cdecl operator delete(void* memory, sandbox::AllocationType type);
22 void __cdecl operator delete(void* memory, sandbox::AllocationType type,
27 sandbox::AllocationType type);
29 sandbox::AllocationType type);
52 namespace sandbox { namespace
183 } // namespace sandbox
sandbox_policy_base.h 16 #include "sandbox/win/src/crosscall_server.h"
17 #include "sandbox/win/src/handle_closer.h"
18 #include "sandbox/win/src/ipc_tags.h"
19 #include "sandbox/win/src/policy_engine_opcodes.h"
20 #include "sandbox/win/src/policy_engine_params.h"
21 #include "sandbox/win/src/sandbox_policy.h"
22 #include "sandbox/win/src/win_utils.h"
24 namespace sandbox { namespace
164 } // namespace sandbox
sandbox_types.h 8 namespace sandbox { namespace
10 // Operation result codes returned by the sandbox API.
52 // If the sandbox cannot create a secure environment for the target, the
90 } // namespace sandbox
win_utils_unittest.cc 8 #include "sandbox/win/src/win_utils.h"
9 #include "sandbox/win/tests/common/test_utils.h"
13 using sandbox::IsReparsePoint;
55 using sandbox::SameObject;
filesystem_interception.cc 5 #include "sandbox/win/src/filesystem_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
process_thread_interception.cc 5 #include "sandbox/win/src/process_thread_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
broker_services.cc 5 #include "sandbox/win/src/broker_services.h"
16 #include "sandbox/win/src/app_container.h"
17 #include "sandbox/win/src/process_mitigations.h"
18 #include "sandbox/win/src/sandbox_policy_base.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/target_process.h"
21 #include "sandbox/win/src/win2k_threadpool.h"
22 #include "sandbox/win/src/win_utils.h"
36 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error)
110 namespace sandbox { namespace
    [all...]
handle_closer.cc 5 #include "sandbox/win/src/handle_closer.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/process_thread_interception.h"
14 #include "sandbox/win/src/win_utils.h"
30 namespace sandbox { namespace
182 } // namespace sandbox
handle_inheritance_test.cc 9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
internal_types.h 8 namespace sandbox { namespace
74 } // namespace sandbox
sync_policy_test.cc 5 #include "sandbox/win/src/sync_policy_test.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_policy.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/src/nt_internals.h"
14 namespace sandbox { namespace
146 } // namespace sandbox
  /external/chromium_org/third_party/WebKit/PerformanceTests/Parser/
html-parser.html 10 iframe.sandbox = 'allow-same-origin'; // Prevent external script loads which could cause write() to return before completing the parse.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
28 #include "sandbox/linux/seccomp-bpf/codegen.h"
29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
30 #include "sandbox/linux/seccomp-bpf/syscall.h"
31 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
32 #include "sandbox/linux/seccomp-bpf/verifier.h"
34 namespace sandbox { namespace
58 // We define a really simple sandbox policy. It is just good enough for us
59 // to tell that the sandbox has actually been activated.
169 // This means, we must conditionally disable the sandbox -- and that's no
177 SandboxBPF* sandbox = static_cast<SandboxBPF*>(aux); local
416 SandboxBPF sandbox; local
    [all...]
sandbox_bpf_unittest.cc 31 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
32 #include "sandbox/linux/seccomp-bpf/syscall.h"
33 #include "sandbox/linux/seccomp-bpf/trap.h"
34 #include "sandbox/linux/seccomp-bpf/verifier.h"
35 #include "sandbox/linux/services/broker_process.h"
36 #include "sandbox/linux/services/linux_syscalls.h"
37 #include "sandbox/linux/tests/unit_tests.h"
49 namespace sandbox { namespace
82 // setting up the sandbox. But it wouldn't hurt to have at least one test
95 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
114 SandboxBPF sandbox; local
362 SandboxBPF sandbox; local
    [all...]
  /external/chromium_org/chrome_elf/blacklist/
blacklist_interceptions.h 8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/sandbox_types.h"
  /external/chromium_org/content/shell/app/
shell_main.cc 10 #include "sandbox/win/src/sandbox_types.h"
20 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/extensions/common/manifest_handlers/
sandboxed_page_info.h 36 // Content Security Policy that should be used to enforce the sandbox used
37 // by sandboxed pages (guaranteed to have the "sandbox" directive without the
  /external/chromium_org/sandbox/win/tests/validation_tests/
commands.h 12 namespace sandbox { namespace
46 } // namespace sandbox
  /external/chromium_org/ui/ozone/public/
surface_ozone_egl.h 40 // called after we have entered the sandbox so if there are operations (e.g.
42 // outside of the sandbox, they must have been completed in

Completed in 917 milliseconds

<<11121314151617181920>>