HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 51 - 75 of 299) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/sandbox/win/src/
resolver.cc 5 #include "sandbox/win/src/resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
10 namespace sandbox { namespace
62 } // namespace sandbox
sandbox.h 5 // Sandbox is a sandbox library for windows processes. Use when you want a
16 // there are cases where the Sandbox library is linked against the main .exe
25 #include "sandbox/win/src/sandbox_policy.h"
26 #include "sandbox/win/src/sandbox_types.h"
28 // sandbox: Google User-Land Application Sandbox
29 namespace sandbox { namespace
58 // interface to specify the sandbox policy for new processes created by
69 // policy: This is the pointer to the policy object for the sandbox t
    [all...]
sandbox_factory.h 8 #include "sandbox/win/src/sandbox.h"
28 // The Sandbox library needs to be linked against the main executable, but
32 // the Sandbox API calls are made.
33 namespace sandbox { namespace
48 } // namespace sandbox
sandbox_globals.cc 7 #include "sandbox/win/src/sandbox_nt_types.h"
8 #include "sandbox/win/src/sandbox_types.h"
10 namespace sandbox { namespace
18 } // namespace sandbox
sandbox_utils.cc 5 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/internal_types.h"
12 namespace sandbox { namespace
30 } // namespace sandbox
service_resolver.cc 5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/internal_types.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
11 namespace sandbox { namespace
46 } // namespace sandbox
sid.h 10 namespace sandbox { namespace
27 } // namespace sandbox
sync_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
44 } // namespace sandbox
sync_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
49 } // namespace sandbox
app_container_unittest.cc 6 #include "sandbox/win/src/app_container.h"
9 namespace sandbox { namespace
58 } // namespace sandbox
eat_resolver.cc 5 #include "sandbox/win/src/eat_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
10 namespace sandbox { namespace
91 } // namespace sandbox
handle_interception.cc 5 #include "sandbox/win/src/handle_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
44 } // namespace sandbox
ipc_ping_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
11 namespace sandbox { namespace
58 } // namespace sandbox
named_pipe_policy.cc 5 #include "sandbox/win/src/named_pipe_policy.h"
9 #include "sandbox/win/src/ipc_tags.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_types.h"
43 namespace sandbox { namespace
86 } // namespace sandbox
policy_params.h 8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
64 } // namespace sandbox
process_mitigations_win32k_interception.h 10 #include "sandbox/win/src/sandbox_types.h"
12 namespace sandbox { namespace
43 } // namespace sandbox
restricted_token_utils.h 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/security_level.h"
17 namespace sandbox { namespace
85 } // namespace sandbox
sid.cc 5 #include "sandbox/win/src/sid.h"
9 namespace sandbox { namespace
26 } // namespace sandbox
  /external/chromium_org/content/common/sandbox_linux/
sandbox_seccomp_bpf_linux.h 13 namespace sandbox { namespace
21 // This class has two main sets of APIs. One can be used to start the sandbox
26 // This is the API to enable a seccomp-bpf sandbox for content/
28 // Is the sandbox globally enabled, can anything use it at all ?
29 // This looks at global command line flags to see if the sandbox
32 // Should the sandbox be enabled for process_type ?
34 // Check if the kernel supports this sandbox. It's useful to "prewarm"
37 // Start the sandbox and apply the policy for process_type, depending on
41 // This is the API to enable a seccomp-bpf sandbox by using an
44 scoped_ptr<sandbox::bpf_dsl::SandboxBPFDSLPolicy> policy)
    [all...]
  /external/chromium_org/content/public/common/
sandbox_init.h 18 namespace sandbox { namespace
30 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in
34 // Returns true if the sandbox was initialized succesfully, false if an error
38 sandbox::SandboxInterfaceInfo* sandbox_info);
41 // that works inside the sandbox and can send handles but not retrieve
50 // Inform the current process's sandbox broker (e.g. the broker for
51 // 32-bit processes) about a process created under a different sandbox
67 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
69 // supported by the sandbox profile associated with the given |sandbox_type|.
76 // sandbox::SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf_policy.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
16 // This is the interface to implement to define a BPF sandbox policy.
39 } // namespace sandbox
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.h 13 #include "sandbox/sandbox_export.h"
15 namespace sandbox { namespace
17 // Helper class to use the setuid sandbox. This class is to be used both
28 // setuid sandbox ABI.
33 // 6.b (optional) B uses sandbox::Credentials::HasOpenDirectory() to verify
35 // sandbox).
49 // Close the dummy file descriptor leftover from the sandbox ABI.
51 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
57 // See sandbox/linux/services/init_process_reaper.h for more information
72 // The setuid sandbox may still be disabled via the environment
    [all...]
  /external/chromium_org/sandbox/linux/tests/
sandbox_test_runner.cc 5 #include "sandbox/linux/tests/sandbox_test_runner.h"
7 namespace sandbox { namespace
19 } // namespace sandbox
sandbox_test_runner_function_pointer.cc 5 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h"
10 namespace sandbox { namespace
25 } // namespace sandbox
sandbox_test_runner_function_pointer.h 9 #include "sandbox/linux/tests/sandbox_test_runner.h"
11 namespace sandbox { namespace
24 } // namespace sandbox

Completed in 87 milliseconds

1 23 4 5 6 7 8 91011>>