1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #ifndef CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 6 #define CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 7 8 namespace content { 9 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in 11 // processes, depending on the command line flags. For the browser process which 12 // is not sandboxed, this call is a no-op. 13 // Returns true if the sandbox was initialized succesfully, false if an error 14 // occurred. If process_type isn't one that needs sandboxing, true is always 15 // returned. 16 bool InitializeSandbox(); 17 18 // The bootstrap server name of the real bootstrap port. This is never used 19 // with bootstrap_register, but is instead used with a POLICY_SUBSTITUTE_PORT 20 // in the bootstrap sandbox. In child processes, the the launchd/bootstrap 21 // sandbox will have replaced the bootstrap port with one controlled by the 22 // interception server. This server name can be used to request the original 23 // server, from the browser, in NPAPI plugins. 24 extern const char kBootstrapPortNameForNPAPIPlugins[]; 25 26 } // namespace content 27 28 #endif // CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 29