Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 182) sorted by relevance

12345678

/third_party/cef/libcef_dll/sandbox/
Dsandbox_win.cc15 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) { in InitializeSandboxInfo()
16 info->broker_services = sandbox::SandboxFactory::GetBrokerServices(); in InitializeSandboxInfo()
18 info->target_services = sandbox::SandboxFactory::GetTargetServices(); in InitializeSandboxInfo()
21 sandbox::ApplyProcessMitigationsToCurrentProcess( in InitializeSandboxInfo()
22 sandbox::MITIGATION_DEP | sandbox::MITIGATION_DEP_NO_ATL_THUNK | in InitializeSandboxInfo()
23 sandbox::MITIGATION_HARDEN_TOKEN_IL_POLICY); in InitializeSandboxInfo()
33 sandbox::SandboxInterfaceInfo* info = new sandbox::SandboxInterfaceInfo(); in cef_sandbox_info_create()
34 memset(info, 0, sizeof(sandbox::SandboxInterfaceInfo)); in cef_sandbox_info_create()
40 delete static_cast<sandbox::SandboxInterfaceInfo*>(sandbox_info); in cef_sandbox_info_destroy()
Dsandbox_mac.mm10 #include "sandbox/mac/seatbelt_exec.h"
27 sandbox::SeatbeltExecServer::CreateFromArgumentsResult seatbelt =
28 sandbox::SeatbeltExecServer::CreateFromArguments(exec_path.get(), argc,
32 fprintf(stderr, "Failed to create the seatbelt sandbox server.\n");
36 fprintf(stderr, "Failed to initialize the sandbox.\n");
41 auto* copy = new sandbox::SeatbeltExecServer::CreateFromArgumentsResult();
48 delete static_cast<sandbox::SeatbeltExecServer::CreateFromArgumentsResult*>(
/third_party/node/test/parallel/
Dtest-vm-harmony-symbols.js28 let sandbox = {}; variable
29 vm.runInNewContext('this.Symbol = Symbol', sandbox);
30 assert.strictEqual(typeof sandbox.Symbol, 'function');
31 assert.notStrictEqual(sandbox.Symbol, Symbol);
34 sandbox = { Symbol };
35 vm.runInNewContext('this.Symbol = Symbol', sandbox);
36 assert.strictEqual(typeof sandbox.Symbol, 'function');
37 assert.strictEqual(sandbox.Symbol, Symbol);
Dtest-vm-proxies.js9 let sandbox = {}; variable
10 vm.runInNewContext('this.Proxy = Proxy', sandbox);
11 assert.strictEqual(typeof sandbox.Proxy, 'function');
12 assert.notStrictEqual(sandbox.Proxy, Proxy);
15 sandbox = { Proxy };
16 vm.runInNewContext('this.Proxy = Proxy', sandbox);
17 assert.strictEqual(typeof sandbox.Proxy, 'function');
18 assert.strictEqual(sandbox.Proxy, Proxy);
Dtest-vm-inherited_properties.js12 let sandbox = Object.create(base, {
16 const context = vm.createContext(sandbox);
28 sandbox = Object.create(base);
29 sandbox.z = 3;
31 assert.deepStrictEqual(Object.keys(sandbox), ['z']);
34 result = vm.runInNewContext(code, sandbox);
38 assert.deepStrictEqual(Object.keys(sandbox), ['z', 'x']);
Dtest-vm-property-not-on-sandbox.js26 const sandbox = { console }; constant
27 sandbox.document = { defaultView: sandbox };
28 vm.createContext(sandbox);
36 vm.runInContext(code, sandbox);
37 assert.strictEqual(sandbox.result, true);
Dtest-vm-basic.js29 const sandbox = {}; constant
32 sandbox
34 assert.deepStrictEqual(sandbox, {
43 const sandbox = { foo: 'bar' }; variable
44 const context = vm.createContext(sandbox);
49 assert.deepStrictEqual(sandbox, {
78 const sandbox = {};
79 const context = vm.createContext(sandbox);
80 assert.strictEqual(sandbox, context);
Dtest-vm-attributes-property-not-on-sandbox.js8 const sandbox = {}; constant
9 vm.createContext(sandbox);
17 vm.runInContext(code, sandbox);
18 assert.strictEqual(typeof sandbox.desc.get, 'function');
Dtest-vm-getters.js6 const sandbox = {}; constant
8 Object.defineProperty(sandbox, 'prop', {
14 const descriptor = Object.getOwnPropertyDescriptor(sandbox, 'prop');
15 const context = vm.createContext(sandbox);
Dtest-vm-indexed-properties.js13 const sandbox = {}; constant
14 const ctx = vm.createContext(sandbox);
17 assert.strictEqual(sandbox[99], 20);
Dtest-vm-create-context-arg.js38 const sandbox = {}; constant
39 vm.createContext(sandbox);
40 vm.createContext(sandbox);
Dtest-vm-context-async-script.js27 const sandbox = { setTimeout }; constant
29 const ctx = vm.createContext(sandbox);
33 assert.strictEqual(sandbox.x, 3);
Dtest-vm-is-context.js44 const sandbox = { foo: 'bar' }; variable
45 vm.createContext(sandbox);
46 assert.strictEqual(vm.isContext(sandbox), true);
Dtest-vm-create-and-run-in-context.js46 const sandbox = { x: 1 }; variable
47 vm.createContext(sandbox);
49 vm.runInContext('x = 2', sandbox);
Dtest-vm-context-property-forwarding.js27 const sandbox = { x: 3 }; variable
29 const ctx = vm.createContext(sandbox);
33 assert.strictEqual(sandbox.y, 4);
Dtest-vm-proxy-failure-CP.js12 const sandbox = new Proxy({ foo: 'bar' }, handler); constant
13 const context = vm.createContext(sandbox);
/third_party/cef/patch/patches/
Dwin_sandbox_3210.patch1 diff --git sandbox/policy/win/sandbox_win.cc sandbox/policy/win/sandbox_win.cc
3 --- sandbox/policy/win/sandbox_win.cc
4 +++ sandbox/policy/win/sandbox_win.cc
10 + // client, meaning that the sandbox is implicitly disabled.
Dlinux_assets_path_1936.patch14 diff --git sandbox/linux/suid/client/setuid_sandbox_host.cc sandbox/linux/suid/client/setuid_sandbo…
16 --- sandbox/linux/suid/client/setuid_sandbox_host.cc
17 +++ sandbox/linux/suid/client/setuid_sandbox_host.cc
24 base::FilePath sandbox_candidate = exe_dir.AppendASCII("chrome-sandbox");
/third_party/node/test/pummel/
Dtest-vm-race.js9 const sandbox = { timeout: 5 }; variable
10 const context = vm.createContext(sandbox);
27 ++sandbox.timeout;
29 --sandbox.timeout;
/third_party/node/test/known_issues/
Dtest-vm-ownpropertynames.js9 const sandbox = { variable
13 Object.defineProperty(sandbox, 'b', { value: true });
14 Object.defineProperty(sandbox, sym2, { value: true });
16 const ctx = vm.createContext(sandbox);
Dtest-vm-ownkeys.js9 const sandbox = { variable
13 Object.defineProperty(sandbox, 'b', { value: true });
14 Object.defineProperty(sandbox, sym2, { value: true });
16 const ctx = vm.createContext(sandbox);
Dtest-vm-ownpropertysymbols.js9 const sandbox = { variable
13 Object.defineProperty(sandbox, 'b', { value: true });
14 Object.defineProperty(sandbox, sym2, { value: true });
16 const ctx = vm.createContext(sandbox);
/third_party/boost/libs/proto/doc/
Dpropdocs.sh8 …h=ssh --recursive -p html/* eric_niebler,boost-sandbox@web.sourceforge.net:/home/groups/b/bo/boost…
10 …sh=ssh --recursive -p src/* eric_niebler,boost-sandbox@web.sourceforge.net:/home/groups/b/bo/boost…
/third_party/node/test/wasi/
Dtest-wasi-symlinks.js41 const sandbox = path.join(tmpdir.path, 'sandbox'); constant
42 const sandboxedFile = path.join(sandbox, 'input.txt');
44 const sandboxedDir = path.join(sandbox, 'subdir');
51 fs.mkdirSync(sandbox);
72 sandbox,
/third_party/node/src/
Dnode_contextify.cc269 Local<Object> sandbox = args[0].As<Object>(); in MakeContext() local
273 !sandbox->HasPrivate( in MakeContext()
302 std::make_unique<ContextifyContext>(env, sandbox, options); in MakeContext()
313 sandbox->SetPrivate( in MakeContext()
324 Local<Object> sandbox = args[0].As<Object>(); in IsContext() local
327 sandbox->HasPrivate(env->context(), in IsContext()
342 const Local<Object>& sandbox) { in ContextFromContextifiedSandbox() argument
344 sandbox->GetPrivate(env->context(), in ContextFromContextifiedSandbox()
375 Local<Object> sandbox = ctx->sandbox(); in PropertyGetterCallback() local
377 sandbox->GetRealNamedProperty(context, property); in PropertyGetterCallback()
[all …]

12345678