HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 126 - 150 of 299) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/chromium_org/sandbox/linux/tests/
scoped_temporary_file_unittest.cc 5 #include "sandbox/linux/tests/scoped_temporary_file.h"
21 namespace sandbox { namespace
76 } // namespace sandbox
  /external/chromium_org/sandbox/mac/
launchd_interception_server.h 12 #include "sandbox/mac/message_server.h"
13 #include "sandbox/mac/os_compatibility.h"
15 namespace sandbox { namespace
27 explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox);
41 // Given a look_up2 request message, this looks up the appropriate sandbox
53 // The sandbox for which this message server is running.
71 } // namespace sandbox
xpc_message_server.h 10 #include "sandbox/mac/message_server.h"
11 #include "sandbox/mac/xpc.h"
12 #include "sandbox/sandbox_export.h"
14 namespace sandbox { namespace
60 } // namespace sandbox
  /external/chromium_org/sandbox/win/src/
handle_policy_test.cc 6 #include "sandbox/win/src/handle_policy.h"
7 #include "sandbox/win/src/nt_internals.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/win_utils.h"
12 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
113 } // namespace sandbox
    [all...]
job.cc 5 #include "sandbox/win/src/job.h"
8 #include "sandbox/win/src/restricted_token.h"
10 namespace sandbox { namespace
118 } // namespace sandbox
named_pipe_policy_test.cc 6 #include "sandbox/win/src/handle_closer.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_policy.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
62 // Tests if we can create a pipe in the sandbox.
74 // On XP, the sandbox can create a pipe without any help but it fails on
82 // Tests if we can create a pipe with a path traversal in the sandbox
    [all...]
policy_broker.cc 7 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/policy_target.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_nt_types.h"
18 #include "sandbox/win/src/sandbox_types.h"
19 #include "sandbox/win/src/target_process.h
24 namespace sandbox { namespace
    [all...]
policy_target.cc 5 #include "sandbox/win/src/policy_target.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_engine_processor.h"
10 #include "sandbox/win/src/policy_low_level.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
15 #include "sandbox/win/src/target_services.h
17 namespace sandbox { namespace
    [all...]
shared_handles.cc 5 #include "sandbox/win/src/shared_handles.h"
7 namespace sandbox { namespace
67 } // namespace sandbox
sidestep_resolver.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
70 } // namespace sandbox
target_interceptions.cc 5 #include "sandbox/win/src/target_interceptions.h"
7 #include "sandbox/win/src/interception_agent.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
100 } // namespace sandbox
unload_dll_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
64 sandbox::TargetPolicy* policy = runner.GetPolicy();
75 sandbox::TargetPolicy* policy = runner.GetPolicy();
96 } // namespace sandbox
win2k_threadpool.h 10 #include "sandbox/win/src/crosscall_server.h"
12 namespace sandbox { namespace
15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details
56 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
target_code.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
16 // on sandbox/win/src/wow64.cc.
39 } // namespace sandbox
  /external/chromium_org/components/nacl/loader/sandbox_linux/
nacl_sandbox_linux.h 12 namespace sandbox { namespace
21 // layer-2 uses seccomp-bpf. It requires the layer-1 sandbox to not yet be
23 // For the layer-1 sandbox to work, the current process must be a child of
24 // the setuid sandbox. InitializeLayerOneSandbox() can only be called once
25 // per instance of the setuid sandbox.
42 // This API will only work if the layer-1 sandbox is not sealed and the
43 // layer-2 sandbox is not engaged.
48 // This API will only work if the layer-1 sandbox is not sealed and the
49 // layer-2 sandbox is not engaged.
51 // Will attempt to initialize the layer-1 sandbox, depending on flags and th
    [all...]
  /external/chromium_org/content/browser/
bootstrap_sandbox_mac.cc 15 #include "sandbox/mac/bootstrap_sandbox.h"
27 sandbox::BootstrapSandbox* sandbox() const { function in class:content::__anon11651::BootstrapSandboxPolicy
44 scoped_ptr<sandbox::BootstrapSandbox> sandbox_;
53 sandbox()->ChildDied(data.handle);
58 sandbox()->ChildDied(data.handle);
62 : sandbox_(sandbox::BootstrapSandbox::Create()) {
82 sandbox::BootstrapSandbox* GetBootstrapSandbox() {
83 return BootstrapSandboxPolicy::GetInstance()->sandbox();
  /external/chromium_org/content/gpu/
gpu_child_thread.h 25 namespace sandbox { namespace
82 // Windows specific client sandbox interface.
83 sandbox::TargetServices* target_services_;
  /external/chromium_org/sandbox/linux/bpf_dsl/
cons.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
44 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.h 11 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
12 #include "sandbox/sandbox_export.h"
14 namespace sandbox { namespace
47 // // any C++ destructors after starting the sandbox.
150 } // namespace sandbox
errorcode_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/errorcode.h"
9 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
10 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
11 #include "sandbox/linux/tests/unit_tests.h"
13 namespace sandbox { namespace
27 SandboxBPF sandbox; local
28 ErrorCode e3 = sandbox.Trap(NULL, NULL);
44 SandboxBPF sandbox; local
45 ErrorCode e0 = sandbox.Trap(NULL, "a");
46 ErrorCode e1 = sandbox.Trap(NULL, "b")
65 SandboxBPF sandbox; local
86 SandboxBPF sandbox; local
    [all...]
  /external/chromium_org/sandbox/linux/services/
init_process_reaper.cc 5 #include "sandbox/linux/services/init_process_reaper.h"
18 namespace sandbox { namespace
101 } // namespace sandbox.
scoped_process.cc 5 #include "sandbox/linux/services/scoped_process.h"
20 #include "sandbox/linux/services/thread_helpers.h"
22 namespace sandbox { namespace
119 } // namespace sandbox
scoped_process_unittest.cc 21 #include "sandbox/linux/services/scoped_process.h"
22 #include "sandbox/linux/tests/unit_tests.h"
25 namespace sandbox { namespace
130 } // namespace sandbox
thread_helpers.cc 5 #include "sandbox/linux/services/thread_helpers.h"
23 namespace sandbox { namespace
102 } // namespace sandbox
thread_helpers_unittests.cc 5 #include "sandbox/linux/services/thread_helpers.h"
21 #include "sandbox/linux/tests/unit_tests.h"
26 namespace sandbox { namespace
111 } // namespace sandbox

Completed in 811 milliseconds

1 2 3 4 56 7 8 91011>>