HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 451 - 475 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/mac/
os_compatibility.cc 5 #include "sandbox/mac/os_compatibility.h"
12 namespace sandbox { namespace
127 } // namespace sandbox
bootstrap_sandbox_unittest.mm 5 #include "sandbox/mac/bootstrap_sandbox.h"
77 namespace sandbox {
117 // Run the test without the sandbox.
133 // Run the test with the sandbox enabled without notifications on the policy
318 char service_name[] = "org.chromium.sandbox.test.ForwardMessageInProcess";
346 "org.chromium.sandbox.test.DefaultRuleAllow";
348 "org.chromium.sandbox.test.DefaultRuleAllow.Deny";
417 } // namespace sandbox
  /external/chromium_org/sandbox/win/src/
app_container_test.cc 14 #include "sandbox/win/src/sync_policy_test.h"
69 namespace sandbox { namespace
144 } // namespace sandbox
handle_table.h 13 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
157 } // namespace sandbox
interception.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/interception.h"
17 #include "sandbox/win/src/interception_internal.h"
18 #include "sandbox/win/src/interceptors.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/service_resolver.h"
21 #include "sandbox/win/src/target_interceptions.h"
22 #include "sandbox/win/src/target_process.h"
23 #include "sandbox/win/src/wow64.h
54 namespace sandbox { namespace
    [all...]
crosscall_server.cc 8 #include "sandbox/win/src/crosscall_server.h"
9 #include "sandbox/win/src/crosscall_params.h"
10 #include "sandbox/win/src/crosscall_client.h"
20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize;
24 namespace sandbox { namespace
300 } // namespace sandbox
interception_unittest.cc 12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/interception_internal.h"
15 #include "sandbox/win/src/target_process.h"
18 namespace sandbox { namespace
212 } // namespace sandbox
  /external/chromium_org/tools/perf/page_sets/data/
key_mobile_sites.json 5 "http://mobile-news.sandbox.google.com/news/pt0"
8 "http://mobile-news.sandbox.google.com/news/p#2"
17 "http://mobile-news.sandbox.google.com/news/pt1"
  /external/chromium_org/win8/metro_driver/
metro_driver.gyp 74 '../../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/remoting/webapp/
wcs_sandbox_container.js 8 * The application side of the application/sandbox WCS interface, used by the
9 * application to exchange messages with the sandbox.
18 * @param {Window} sandbox The Javascript Window object representing the
22 remoting.WcsSandboxContainer = function(sandbox) {
24 this.sandbox_ = sandbox;
130 * Event handler to process messages from the sandbox.
  /external/chromium_org/sandbox/win/tests/common/
controller.cc 5 #include "sandbox/win/tests/common/controller.h"
12 #include "sandbox/win/src/sandbox_factory.h"
63 namespace sandbox { namespace
216 arguments += no_sandbox_ ? L"-no-sandbox " : L" ";
329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) {
336 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.cc 5 #include "sandbox/win/wow_helper/service64_resolver.h"
8 #include "sandbox/win/wow_helper/target_code.h"
97 sandbox::PatchInfo patch_info;
135 NTSTATUS ResolveNtdll(sandbox::PatchInfo* patch_info) {
153 namespace sandbox { namespace
342 } // namespace sandbox
  /external/chromium_org/components/breakpad/browser/
crash_handler_host_linux.h 26 // This is the host for processes which run breakpad inside the sandbox on
28 // allows us to be outside the sandbox.
  /external/chromium_org/content/common/
OWNERS 10 # Mac Sandbox.
22 # new sandbox escapes.
  /external/chromium_org/content/public/browser/
utility_process_host.h 51 // Allows a directory to be opened through the sandbox, in case it's needed by
58 // Make the process run without a sandbox.
  /external/chromium_org/extensions/renderer/
script_context_browsertest.cc 33 " <iframe name='frame1_2' sandbox=''></iframe>"
35 "<iframe name='frame2' sandbox='' srcdoc=\""
  /external/chromium_org/native_client_sdk/src/doc/
sitemap.rst 58 reference/sandbox_internals/arm-32-bit-sandbox.rst
59 reference/sandbox_internals/x86-64-sandbox.rst
  /external/chromium_org/sandbox/linux/seccomp-bpf/
instruction.h 10 namespace sandbox { namespace
60 } // namespace sandbox
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
processes_and_threads.cc 7 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
8 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SandboxFlags.h 35 // See http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-sandbox for a list of the sandbox flags.
  /external/chromium_org/third_party/WebKit/public/platform/mac/
WebSandboxSupport.h 44 // Put methods here that are required due to sandbox restrictions.
47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
  /external/chromium_org/third_party/WebKit/public/platform/win/
WebSandboxSupport.h 38 // Put methods here that are required due to sandbox restrictions.
42 // and due to sandbox restrictions, the current process may be unable
  /external/llvm/lib/Target/Mips/MCTargetDesc/
MipsNaClELFStreamer.cpp 11 // as required by NaCl's SFI sandbox. It inserts address-masking instructions
103 // Sandbox indirect branch or return instruction by inserting mask operation
114 // Sandbox memory access or SP change. Insert mask operation before and/or
121 // Sandbox memory access.
127 // Sandbox SP change.
140 // Sandbox indirect jumps.
148 // Sandbox loads, stores and SP changes.
168 // Sandbox calls by aligning call and branch delay to the bundle end.
  /external/chromium_org/components/nacl/browser/
pnacl_translation_cache_unittest.cc 136 "sandbox:x86-32;extra_flags:;",
142 "sandbox:x86-32;extra_flags:;",
148 "sandbox:x86-32;extra_flags:;",
154 "sandbox:x86-32;extra_flags:;",
161 "sandbox:x86-32;extra_flags:;",
168 "sandbox:x86-32;extra_flags:;",
173 "sandbox:x86-32;extra_flags:;",
178 "sandbox:x86-32;extra_flags:;",
184 "sandbox:x86-32;extra_flags:-mavx-neon;",
191 "sandbox:x86-32;extra_flags:-mavx-neon;"
    [all...]
  /external/chromium_org/components/nacl/zygote/
nacl_fork_delegate_linux.cc 38 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
39 #include "sandbox/linux/suid/common/sandbox.h"
149 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client(
150 sandbox::SetuidSandboxClient::Create());
153 // the SUID sandbox.
169 // NaCl's x86-64 sandbox is not zero-address-based. Starting
178 // non-zero-address-based sandbox on x86-32 because it provides some
181 // sandbox on those.
240 // setuid sandbox wrapper manually
    [all...]

Completed in 835 milliseconds

<<11121314151617181920>>