/third_party/cef/libcef_dll/sandbox/ |
D | sandbox_win.cc | 15 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) { in InitializeSandboxInfo() 16 info->broker_services = sandbox::SandboxFactory::GetBrokerServices(); in InitializeSandboxInfo() 18 info->target_services = sandbox::SandboxFactory::GetTargetServices(); in InitializeSandboxInfo() 21 sandbox::ApplyProcessMitigationsToCurrentProcess( in InitializeSandboxInfo() 22 sandbox::MITIGATION_DEP | sandbox::MITIGATION_DEP_NO_ATL_THUNK | in InitializeSandboxInfo() 23 sandbox::MITIGATION_HARDEN_TOKEN_IL_POLICY); in InitializeSandboxInfo() 33 sandbox::SandboxInterfaceInfo* info = new sandbox::SandboxInterfaceInfo(); in cef_sandbox_info_create() 34 memset(info, 0, sizeof(sandbox::SandboxInterfaceInfo)); in cef_sandbox_info_create() 40 delete static_cast<sandbox::SandboxInterfaceInfo*>(sandbox_info); in cef_sandbox_info_destroy()
|
D | sandbox_mac.mm | 10 #include "sandbox/mac/seatbelt_exec.h" 27 sandbox::SeatbeltExecServer::CreateFromArgumentsResult seatbelt = 28 sandbox::SeatbeltExecServer::CreateFromArguments(exec_path.get(), argc, 32 fprintf(stderr, "Failed to create the seatbelt sandbox server.\n"); 36 fprintf(stderr, "Failed to initialize the sandbox.\n"); 41 auto* copy = new sandbox::SeatbeltExecServer::CreateFromArgumentsResult(); 48 delete static_cast<sandbox::SeatbeltExecServer::CreateFromArgumentsResult*>(
|
/third_party/node/test/parallel/ |
D | test-vm-harmony-symbols.js | 28 let sandbox = {}; variable 29 vm.runInNewContext('this.Symbol = Symbol', sandbox); 30 assert.strictEqual(typeof sandbox.Symbol, 'function'); 31 assert.notStrictEqual(sandbox.Symbol, Symbol); 34 sandbox = { Symbol }; 35 vm.runInNewContext('this.Symbol = Symbol', sandbox); 36 assert.strictEqual(typeof sandbox.Symbol, 'function'); 37 assert.strictEqual(sandbox.Symbol, Symbol);
|
D | test-vm-proxies.js | 9 let sandbox = {}; variable 10 vm.runInNewContext('this.Proxy = Proxy', sandbox); 11 assert.strictEqual(typeof sandbox.Proxy, 'function'); 12 assert.notStrictEqual(sandbox.Proxy, Proxy); 15 sandbox = { Proxy }; 16 vm.runInNewContext('this.Proxy = Proxy', sandbox); 17 assert.strictEqual(typeof sandbox.Proxy, 'function'); 18 assert.strictEqual(sandbox.Proxy, Proxy);
|
D | test-vm-inherited_properties.js | 12 let sandbox = Object.create(base, { 16 const context = vm.createContext(sandbox); 28 sandbox = Object.create(base); 29 sandbox.z = 3; 31 assert.deepStrictEqual(Object.keys(sandbox), ['z']); 34 result = vm.runInNewContext(code, sandbox); 38 assert.deepStrictEqual(Object.keys(sandbox), ['z', 'x']);
|
D | test-vm-property-not-on-sandbox.js | 26 const sandbox = { console }; constant 27 sandbox.document = { defaultView: sandbox }; 28 vm.createContext(sandbox); 36 vm.runInContext(code, sandbox); 37 assert.strictEqual(sandbox.result, true);
|
D | test-vm-basic.js | 29 const sandbox = {}; constant 32 sandbox 34 assert.deepStrictEqual(sandbox, { 43 const sandbox = { foo: 'bar' }; variable 44 const context = vm.createContext(sandbox); 49 assert.deepStrictEqual(sandbox, { 78 const sandbox = {}; 79 const context = vm.createContext(sandbox); 80 assert.strictEqual(sandbox, context);
|
D | test-vm-attributes-property-not-on-sandbox.js | 8 const sandbox = {}; constant 9 vm.createContext(sandbox); 17 vm.runInContext(code, sandbox); 18 assert.strictEqual(typeof sandbox.desc.get, 'function');
|
D | test-vm-getters.js | 6 const sandbox = {}; constant 8 Object.defineProperty(sandbox, 'prop', { 14 const descriptor = Object.getOwnPropertyDescriptor(sandbox, 'prop'); 15 const context = vm.createContext(sandbox);
|
D | test-vm-indexed-properties.js | 13 const sandbox = {}; constant 14 const ctx = vm.createContext(sandbox); 17 assert.strictEqual(sandbox[99], 20);
|
D | test-vm-create-context-arg.js | 38 const sandbox = {}; constant 39 vm.createContext(sandbox); 40 vm.createContext(sandbox);
|
D | test-vm-context-async-script.js | 27 const sandbox = { setTimeout }; constant 29 const ctx = vm.createContext(sandbox); 33 assert.strictEqual(sandbox.x, 3);
|
D | test-vm-is-context.js | 44 const sandbox = { foo: 'bar' }; variable 45 vm.createContext(sandbox); 46 assert.strictEqual(vm.isContext(sandbox), true);
|
D | test-vm-create-and-run-in-context.js | 46 const sandbox = { x: 1 }; variable 47 vm.createContext(sandbox); 49 vm.runInContext('x = 2', sandbox);
|
D | test-vm-context-property-forwarding.js | 27 const sandbox = { x: 3 }; variable 29 const ctx = vm.createContext(sandbox); 33 assert.strictEqual(sandbox.y, 4);
|
D | test-vm-proxy-failure-CP.js | 12 const sandbox = new Proxy({ foo: 'bar' }, handler); constant 13 const context = vm.createContext(sandbox);
|
/third_party/cef/patch/patches/ |
D | win_sandbox_3210.patch | 1 diff --git sandbox/policy/win/sandbox_win.cc sandbox/policy/win/sandbox_win.cc 3 --- sandbox/policy/win/sandbox_win.cc 4 +++ sandbox/policy/win/sandbox_win.cc 10 + // client, meaning that the sandbox is implicitly disabled.
|
D | linux_assets_path_1936.patch | 14 diff --git sandbox/linux/suid/client/setuid_sandbox_host.cc sandbox/linux/suid/client/setuid_sandbo… 16 --- sandbox/linux/suid/client/setuid_sandbox_host.cc 17 +++ sandbox/linux/suid/client/setuid_sandbox_host.cc 24 base::FilePath sandbox_candidate = exe_dir.AppendASCII("chrome-sandbox");
|
/third_party/node/test/pummel/ |
D | test-vm-race.js | 9 const sandbox = { timeout: 5 }; variable 10 const context = vm.createContext(sandbox); 27 ++sandbox.timeout; 29 --sandbox.timeout;
|
/third_party/node/test/known_issues/ |
D | test-vm-ownpropertynames.js | 9 const sandbox = { variable 13 Object.defineProperty(sandbox, 'b', { value: true }); 14 Object.defineProperty(sandbox, sym2, { value: true }); 16 const ctx = vm.createContext(sandbox);
|
D | test-vm-ownkeys.js | 9 const sandbox = { variable 13 Object.defineProperty(sandbox, 'b', { value: true }); 14 Object.defineProperty(sandbox, sym2, { value: true }); 16 const ctx = vm.createContext(sandbox);
|
D | test-vm-ownpropertysymbols.js | 9 const sandbox = { variable 13 Object.defineProperty(sandbox, 'b', { value: true }); 14 Object.defineProperty(sandbox, sym2, { value: true }); 16 const ctx = vm.createContext(sandbox);
|
/third_party/boost/libs/proto/doc/ |
D | propdocs.sh | 8 …h=ssh --recursive -p html/* eric_niebler,boost-sandbox@web.sourceforge.net:/home/groups/b/bo/boost… 10 …sh=ssh --recursive -p src/* eric_niebler,boost-sandbox@web.sourceforge.net:/home/groups/b/bo/boost…
|
/third_party/node/test/wasi/ |
D | test-wasi-symlinks.js | 41 const sandbox = path.join(tmpdir.path, 'sandbox'); constant 42 const sandboxedFile = path.join(sandbox, 'input.txt'); 44 const sandboxedDir = path.join(sandbox, 'subdir'); 51 fs.mkdirSync(sandbox); 72 sandbox,
|
/third_party/node/src/ |
D | node_contextify.cc | 269 Local<Object> sandbox = args[0].As<Object>(); in MakeContext() local 273 !sandbox->HasPrivate( in MakeContext() 302 std::make_unique<ContextifyContext>(env, sandbox, options); in MakeContext() 313 sandbox->SetPrivate( in MakeContext() 324 Local<Object> sandbox = args[0].As<Object>(); in IsContext() local 327 sandbox->HasPrivate(env->context(), in IsContext() 342 const Local<Object>& sandbox) { in ContextFromContextifiedSandbox() argument 344 sandbox->GetPrivate(env->context(), in ContextFromContextifiedSandbox() 375 Local<Object> sandbox = ctx->sandbox(); in PropertyGetterCallback() local 377 sandbox->GetRealNamedProperty(context, property); in PropertyGetterCallback() [all …]
|