HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 151 - 175 of 299) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/chromium_org/sandbox/linux/suid/common/
sandbox.h 9 namespace sandbox { namespace
13 // (e.g. Chrome) to construct a command line for the sandbox.
38 } // namespace sandbox
  /external/chromium_org/sandbox/mac/
bootstrap_sandbox.h 17 #include "sandbox/mac/policy.h"
18 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit
29 // With this sandbox, the parent process must replace the bootstrap port prior
35 // launchd for servicing. If it is not, then the sandbox will reply with a
38 // Clients that which to use the sandbox must inform it of the creation and
39 // death of child processes for which the sandbox should be enforced. The
40 // client of the sandbox is intended to be an unsandboxed parent process that
43 // When the parent is ready to fork a new child process with this sandbox
    [all...]
dispatch_source_mach_unittest.cc 5 #include "sandbox/mac/dispatch_source_mach.h"
15 namespace sandbox { namespace
47 DispatchSourceMach source("org.chromium.sandbox.test.ReceiveAfterResume",
78 "org.chromium.sandbox.test.NoMessagesAfterDestruction",
90 dispatch_queue_create("org.chromium.sandbox.test.MessageSend", NULL);
119 } // namespace sandbox
mach_message_server.h 13 #include "sandbox/mac/message_server.h"
15 namespace sandbox { namespace
72 } // namespace sandbox
message_server.h 11 #include "sandbox/mac/xpc.h"
13 namespace sandbox { namespace
69 } // namespace sandbox
os_compatibility.h 6 // that occur between different OS versions. The Mach messages that the sandbox
19 #include "sandbox/mac/message_server.h"
21 namespace sandbox { namespace
57 } // namespace sandbox
policy.h 13 #include "sandbox/sandbox_export.h"
15 namespace sandbox { namespace
68 } // namespace sandbox
  /external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.h 13 namespace sandbox { namespace
23 // The purpose of this is to be able to spawn an EXE inside a SandBox, have it
25 // sandbox. This is useful for developer debugging and for security testing.
54 // BrokerService that will launch a new EXE inside the sandbox and load the
59 sandbox::BrokerServices* broker);
116 // Spawns a target EXE inside the sandbox (with the help of the
159 // The BrokerServices will be used to spawn an EXE in a sandbox and ask
161 sandbox::BrokerServices* broker_;
  /external/chromium_org/sandbox/win/src/
acl.cc 5 #include "sandbox/win/src/acl.h"
12 namespace sandbox { namespace
125 } // namespace sandbox
app_container_test.cc 14 #include "sandbox/win/src/sync_policy_test.h"
69 namespace sandbox { namespace
144 } // namespace sandbox
broker_services.h 15 #include "sandbox/win/src/crosscall_server.h"
16 #include "sandbox/win/src/job.h"
17 #include "sandbox/win/src/sandbox.h"
18 #include "sandbox/win/src/sharedmem_ipc_server.h"
19 #include "sandbox/win/src/win2k_threadpool.h"
20 #include "sandbox/win/src/win_utils.h"
29 namespace sandbox { namespace
115 } // namespace sandbox
handle_closer.h 13 #include "sandbox/win/src/interception.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/target_process.h"
17 namespace sandbox { namespace
72 } // namespace sandbox
handle_closer_agent.cc 5 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/win_utils.h"
35 namespace sandbox { namespace
145 } // namespace sandbox
handle_dispatcher.cc 5 #include "sandbox/win/src/handle_dispatcher.h"
8 #include "sandbox/win/src/handle_interception.h"
9 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
15 #include "sandbox/win/src/sandbox_types.h
18 namespace sandbox { namespace
    [all...]
handle_inheritance_test.cc 9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
interception_unittest.cc 12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/interception_internal.h"
15 #include "sandbox/win/src/target_process.h"
18 namespace sandbox { namespace
212 } // namespace sandbox
named_pipe_dispatcher.cc 5 #include "sandbox/win/src/named_pipe_dispatcher.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/interception.h"
12 #include "sandbox/win/src/interceptors.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/named_pipe_interception.h"
15 #include "sandbox/win/src/named_pipe_policy.h"
16 #include "sandbox/win/src/policy_broker.h"
17 #include "sandbox/win/src/policy_params.h"
18 #include "sandbox/win/src/sandbox.h
21 namespace sandbox { namespace
    [all...]
policy_engine_params.h 9 #include "sandbox/win/src/internal_types.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
17 namespace sandbox { namespace
200 } // namespace sandbox
policy_engine_processor.cc 5 #include "sandbox/win/src/policy_engine_processor.h"
7 namespace sandbox { namespace
107 } // namespace sandbox
policy_engine_processor.h 9 #include "sandbox/win/src/policy_engine_params.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
12 namespace sandbox { namespace
143 } // namespace sandbox
registry_dispatcher.cc 5 #include "sandbox/win/src/registry_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/policy_broker.h"
15 #include "sandbox/win/src/policy_params.h"
16 #include "sandbox/win/src/sandbox.h
40 namespace sandbox { namespace
    [all...]
registry_interception.cc 5 #include "sandbox/win/src/registry_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
176 } // namespace sandbox
registry_policy_test.cc 8 #include "sandbox/win/src/registry_policy.h"
9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/win_utils.h"
14 #include "sandbox/win/tests/common/controller.h"
43 namespace sandbox { namespace
289 } // namespace sandbox
    [all...]
resolver_32.cc 5 #include "sandbox/win/src/resolver.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
61 namespace sandbox { namespace
92 } // namespace sandbox
resolver_64.cc 5 #include "sandbox/win/src/resolver.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
48 namespace sandbox { namespace
73 } // namespace sandbox

Completed in 209 milliseconds

1 2 3 4 5 67 8 91011>>