Home
last modified time | relevance | path

Searched refs:TargetPolicy (Results 1 – 25 of 47) sorted by relevance

12

/external/chromium_org/sandbox/win/src/
Dregistry_policy_test.cc90 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST()
91 TargetPolicy::REG_ALLOW_READONLY, in TEST()
94 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST()
95 TargetPolicy::REG_ALLOW_ANY, in TEST()
140 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST()
141 TargetPolicy::REG_ALLOW_READONLY, in TEST()
155 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST()
156 TargetPolicy::REG_ALLOW_READONLY, in TEST()
159 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST()
160 TargetPolicy::REG_ALLOW_READONLY, in TEST()
[all …]
Dsync_policy_test.cc92 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST()
93 TargetPolicy::EVENTS_ALLOW_ANY, in TEST()
95 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST()
96 TargetPolicy::EVENTS_ALLOW_ANY, in TEST()
116 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST()
117 TargetPolicy::EVENTS_ALLOW_READONLY, in TEST()
119 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST()
120 TargetPolicy::EVENTS_ALLOW_READONLY, in TEST()
122 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST()
123 TargetPolicy::EVENTS_ALLOW_READONLY, in TEST()
[all …]
Dunload_dll_test.cc50 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST()
51 TargetPolicy::EVENTS_ALLOW_ANY, L"t0001")); in TEST()
64 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
75 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST()
85 TargetPolicy::REG_ALLOW_ANY, in TEST()
87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST()
88 TargetPolicy::EVENTS_ALLOW_ANY, L"tst0001")); in TEST()
Dhandle_policy_test.cc62 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST()
63 TargetPolicy::HANDLES_DUP_ANY, in TEST()
84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST()
85 TargetPolicy::HANDLES_DUP_ANY, in TEST()
100 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST()
101 TargetPolicy::HANDLES_DUP_ANY, in TEST()
107 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST()
108 TargetPolicy::HANDLES_DUP_BROKER, in TEST()
Dprocess_policy_test.cc272 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST()
273 TargetPolicy::PROCESS_ALL_EXEC, in TEST()
280 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST()
281 TargetPolicy::PROCESS_ALL_EXEC, in TEST()
290 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST()
291 TargetPolicy::PROCESS_MIN_EXEC, in TEST()
296 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY, in TEST()
304 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY, in TEST()
344 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST()
345 TargetPolicy::PROCESS_MIN_EXEC, in TEST()
[all …]
Dfile_policy_test.cc248 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_DIR_ANY, in TEST()
259 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"calc.exe")); in TEST()
272 runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, nt_path.c_str()); in TEST()
292 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, in TEST()
323 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_ANY, temp_directory)); in TEST()
336 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"App*.dll")); in TEST()
350 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"n*.dll")); in TEST()
363 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, in TEST()
365 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, in TEST()
367 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"drivers")); in TEST()
[all …]
Dnamed_pipe_policy_test.cc67 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, in TEST()
68 TargetPolicy::NAMEDPIPES_ALLOW_ANY, in TEST()
87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, in TEST()
88 TargetPolicy::NAMEDPIPES_ALLOW_ANY, in TEST()
124 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, in TEST()
125 TargetPolicy::NAMEDPIPES_ALLOW_ANY, in TEST()
Dsandbox.h33 class TargetPolicy; variable
60 virtual TargetPolicy* CreatePolicy() = 0;
78 TargetPolicy* policy,
Dhandle_policy.cc20 TargetPolicy::Semantics semantics, in GenerateRules()
25 case TargetPolicy::HANDLES_DUP_ANY: { in GenerateRules()
33 case TargetPolicy::HANDLES_DUP_BROKER: { in GenerateRules()
Dsync_policy.cc134 TargetPolicy::Semantics semantics, in GenerateRules()
141 if (TargetPolicy::EVENTS_ALLOW_ANY != semantics && in GenerateRules()
142 TargetPolicy::EVENTS_ALLOW_READONLY != semantics) { in GenerateRules()
155 if (TargetPolicy::EVENTS_ALLOW_READONLY == semantics) { in GenerateRules()
167 if (TargetPolicy::EVENTS_ALLOW_READONLY != semantics) { in GenerateRules()
Dfilesystem_policy.cc62 TargetPolicy::Semantics semantics, in GenerateRules()
108 case TargetPolicy::FILES_ALLOW_DIR_ANY: { in GenerateRules()
113 case TargetPolicy::FILES_ALLOW_READONLY: { in GenerateRules()
127 case TargetPolicy::FILES_ALLOW_QUERY: { in GenerateRules()
133 case TargetPolicy::FILES_ALLOW_ANY: { in GenerateRules()
Dbroker_services.h48 virtual TargetPolicy* CreatePolicy() OVERRIDE;
51 TargetPolicy* policy,
Dnamed_pipe_policy.cc46 TargetPolicy::Semantics semantics, in GenerateRules()
48 if (TargetPolicy::NAMEDPIPES_ALLOW_ANY != semantics) { in GenerateRules()
Dregistry_policy.cc118 TargetPolicy::Semantics semantics, in GenerateRules()
136 case TargetPolicy::REG_ALLOW_READONLY: { in GenerateRules()
145 case TargetPolicy::REG_ALLOW_ANY: { in GenerateRules()
Dhandle_closer_test.cc111 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
131 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
186 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
Dpolicy_target_test.cc222 TargetPolicy* temp_policy = broker->CreatePolicy(); in TEST()
240 TargetPolicy* policy = broker->CreatePolicy(); in TEST()
285 TargetPolicy* temp_policy = broker->CreatePolicy(); in TEST()
303 TargetPolicy* policy = broker->CreatePolicy(); in TEST()
Dprocess_thread_policy.cc77 TargetPolicy::Semantics semantics, in GenerateRules()
81 case TargetPolicy::PROCESS_MIN_EXEC: { in GenerateRules()
85 case TargetPolicy::PROCESS_ALL_EXEC: { in GenerateRules()
Dprocess_mitigations_test.cc121 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
195 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
/external/chromium/chrome/common/
Dsandbox_policy.cc125 sandbox::TargetPolicy::Semantics access, in AddDirectory()
126 sandbox::TargetPolicy* policy) { in AddDirectory()
137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory()
147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory()
158 sandbox::TargetPolicy::Semantics access, in AddKeyAndSubkeys()
159 sandbox::TargetPolicy* policy) { in AddKeyAndSubkeys()
161 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys()
167 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys()
193 sandbox::TargetPolicy* policy) { in BlacklistAddOneDll()
224 void AddDllEvictionPolicy(sandbox::TargetPolicy* policy) { in AddDllEvictionPolicy()
[all …]
/external/chromium_org/content/common/
Dsandbox_win.cc113 sandbox::TargetPolicy::Semantics access, in AddDirectory()
114 sandbox::TargetPolicy* policy) { in AddDirectory()
123 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory()
133 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory()
144 sandbox::TargetPolicy::Semantics access, in AddKeyAndSubkeys()
145 sandbox::TargetPolicy* policy) { in AddKeyAndSubkeys()
147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys()
153 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys()
180 sandbox::TargetPolicy* policy) { in BlacklistAddOneDll()
217 void AddGenericDllEvictionPolicy(sandbox::TargetPolicy* policy) { in AddGenericDllEvictionPolicy()
[all …]
Dsandbox_win.h14 class TargetPolicy; variable
25 sandbox::TargetPolicy* policy);
28 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy);
/external/chromium_org/sandbox/win/tests/common/
Dcontroller.h82 bool AddRule(TargetPolicy::SubSystem subsystem,
83 TargetPolicy::Semantics semantics,
89 bool AddRuleSys32(TargetPolicy::Semantics semantics, const wchar_t* pattern);
93 bool AddFsRule(TargetPolicy::Semantics semantics, const wchar_t* pattern);
117 TargetPolicy* GetPolicy();
137 TargetPolicy* policy_;
Dcontroller.cc127 TargetPolicy* TestRunner::GetPolicy() { in GetPolicy()
139 bool TestRunner::AddRule(TargetPolicy::SubSystem subsystem, in AddRule()
140 TargetPolicy::Semantics semantics, in AddRule()
148 bool TestRunner::AddRuleSys32(TargetPolicy::Semantics semantics, in AddRuleSys32()
157 if (!AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str())) in AddRuleSys32()
168 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str()); in AddRuleSys32()
171 bool TestRunner::AddFsRule(TargetPolicy::Semantics semantics, in AddFsRule()
176 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, pattern); in AddFsRule()
/external/chromium_org/content/public/common/
Dsandboxed_process_launcher_delegate.h15 class TargetPolicy; variable
41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, in PreSpawnTarget()
/external/chromium_org/components/nacl/broker/
Dnacl_broker_listener.cc50 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy, in PreSpawnTarget()
58 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, in PreSpawnTarget()
59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, in PreSpawnTarget()

12