HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 176 - 200 of 299) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium_org/sandbox/win/src/
restricted_token.h 13 #include "sandbox/win/src/restricted_token_utils.h"
14 #include "sandbox/win/src/security_level.h"
15 #include "sandbox/win/src/sid.h"
25 namespace sandbox { namespace
197 } // namespace sandbox
shared_handles.h 18 namespace sandbox { namespace
106 } // namespace sandbox
sharedmem_ipc_client.cc 6 #include "sandbox/win/src/sharedmem_ipc_client.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/crosscall_params.h"
12 namespace sandbox { namespace
152 } // namespace sandbox
sync_dispatcher.cc 5 #include "sandbox/win/src/sync_dispatcher.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/interception.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_broker.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox.h"
15 #include "sandbox/win/src/sync_interception.h
18 namespace sandbox { namespace
    [all...]
sync_interception.cc 5 #include "sandbox/win/src/sync_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
sync_policy_test.cc 5 #include "sandbox/win/src/sync_policy_test.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_policy.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/src/nt_internals.h"
14 namespace sandbox { namespace
147 } // namespace sandbox
threadpool_unittest.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
16 namespace sandbox { namespace
94 } // namespace sandbox
win2k_threadpool.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
7 #include "sandbox/win/src/win_utils.h"
9 namespace sandbox { namespace
60 } // namespace sandbox
win_utils.h 14 namespace sandbox { namespace
108 } // namespace sandbox
window.cc 5 #include "sandbox/win/src/window.h"
11 #include "sandbox/win/src/acl.h"
12 #include "sandbox/win/src/sid.h"
35 namespace sandbox { namespace
157 } // namespace sandbox
filesystem_interception.cc 5 #include "sandbox/win/src/filesystem_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/tests/integration_tests/
integration_tests_test.cc 8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
306 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
suite.cc 5 // This file contains the validation tests for the sandbox.
7 // sandbox.
13 #include "sandbox/win/tests/common/controller.h"
19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) {
25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command))
48 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.cc 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
15 #include "sandbox/win/wow_helper/service64_resolver.h"
16 #include "sandbox/win/wow_helper/target_code.h"
18 namespace sandbox { namespace
54 } // namespace sandbox
85 return sandbox::PatchNtdll(child, thunk, kPageSize);
  /external/chromium_org/ui/views_content_client/
views_content_client.h 17 namespace sandbox { namespace
34 // sandbox::SandboxInterfaceInfo sandbox_info = {0};
53 sandbox::SandboxInterfaceInfo* sandbox_info);
71 sandbox::SandboxInterfaceInfo* sandbox_info_;
  /external/chromium_org/content/public/common/
content_client.h 36 namespace sandbox { namespace
126 // resource ID corresponding to the sandbox profile to use. The legal values
128 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox
131 // the sandbox profile to use and true is returned.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
bpf_tests.h 11 #include "sandbox/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h"
12 #include "sandbox/linux/tests/unit_tests.h"
14 namespace sandbox { namespace
35 sandbox::SandboxBPFTestRunner bpf_test_runner( \
36 new sandbox::BPFTesterSimpleDelegate<bpf_policy_class_name>( \
38 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
54 sandbox::SandboxBPFTestRunner bpf_test_runner( \
56 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
89 sandbox::SandboxBPFTestRunner bpf_test_runner( \
90 new sandbox::BPFTesterCompatibilityDelegate<policy, aux>(
    [all...]
trap.h 14 #include "sandbox/sandbox_export.h"
16 namespace sandbox { namespace
32 // time. For the purposes of our sandbox, this assertion should always be
33 // true. Threads are incompatible with the seccomp sandbox anyway.
61 // Once unsafe traps are enabled, the sandbox is essentially compromised.
124 } // namespace sandbox
  /external/chromium_org/sandbox/linux/services/
broker_process.h 15 #include "sandbox/sandbox_export.h"
17 namespace sandbox { namespace
27 // 3. Enable sandbox.
104 } // namespace sandbox
yama.cc 5 #include "sandbox/linux/services/yama.h"
27 namespace sandbox { namespace
116 } // namespace sandbox
yama_unittests.cc 17 #include "sandbox/linux/services/scoped_process.h"
18 #include "sandbox/linux/services/yama.h"
19 #include "sandbox/linux/tests/unit_tests.h"
22 namespace sandbox { namespace
172 } // namespace sandbox
  /external/chromium_org/sandbox/linux/tests/
unit_tests.h 10 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h"
13 namespace sandbox { namespace
55 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL
57 sandbox::UnitTests::DeathSuccessAllowNoise, NULL
59 sandbox::UnitTests::DeathMessage, \
62 sandbox::UnitTests::DeathSEGVMessage, \
65 sandbox::UnitTests::DeathExitCode, \
68 sandbox::UnitTests::DeathBySignal, \
79 sandbox::UnitTests::RunTestInProcess(&sandbox_test_runner, death); \
85 // changes to the system (i.e. they install a sandbox). GTest provides deat
    [all...]
  /external/chromium_org/sandbox/mac/
bootstrap_sandbox.cc 5 #include "sandbox/mac/bootstrap_sandbox.h"
14 #include "sandbox/mac/launchd_interception_server.h"
16 namespace sandbox { namespace
23 scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox());
24 sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get()));
30 sandbox->server_bootstrap_name().c_str(), &port);
33 << "Failed to bootstrap_check_in the sandbox server.";
38 // Start the sandbox server.
39 if (sandbox->server_->Initialize(scoped_port.get())
    [all...]
launchd_interception_server.cc 5 #include "sandbox/mac/launchd_interception_server.h"
11 #include "sandbox/mac/bootstrap_sandbox.h"
12 #include "sandbox/mac/mach_message_server.h"
14 namespace sandbox { namespace
22 const BootstrapSandbox* sandbox)
23 : sandbox_(sandbox),
35 // Allocate the dummy sandbox port.
39 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port.";
45 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right.";
63 // No sandbox policy is in place for the sender of this message, whic
    [all...]
xpc_message_server_unittest.cc 5 #include "sandbox/mac/xpc_message_server.h"
17 #include "sandbox/mac/xpc.h"
21 namespace sandbox { namespace
132 char kGetSenderPID[] = "org.chromium.sandbox.test.GetSenderPID";
170 CHECK(sandbox::InitializeXPC());
219 } // namespace sandbox

Completed in 1124 milliseconds

1 2 3 4 5 6 78 91011>>