/external/chromium_org/sandbox/win/src/ |
D | registry_policy_test.cc | 90 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST() 91 TargetPolicy::REG_ALLOW_READONLY, in TEST() 94 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST() 95 TargetPolicy::REG_ALLOW_ANY, in TEST() 140 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST() 141 TargetPolicy::REG_ALLOW_READONLY, in TEST() 155 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST() 156 TargetPolicy::REG_ALLOW_READONLY, in TEST() 159 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST() 160 TargetPolicy::REG_ALLOW_READONLY, in TEST() [all …]
|
D | sync_policy_test.cc | 92 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST() 93 TargetPolicy::EVENTS_ALLOW_ANY, in TEST() 95 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST() 96 TargetPolicy::EVENTS_ALLOW_ANY, in TEST() 116 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST() 117 TargetPolicy::EVENTS_ALLOW_READONLY, in TEST() 119 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST() 120 TargetPolicy::EVENTS_ALLOW_READONLY, in TEST() 122 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST() 123 TargetPolicy::EVENTS_ALLOW_READONLY, in TEST() [all …]
|
D | unload_dll_test.cc | 50 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST() 51 TargetPolicy::EVENTS_ALLOW_ANY, L"t0001")); in TEST() 64 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST() 75 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST() 84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_REGISTRY, in TEST() 85 TargetPolicy::REG_ALLOW_ANY, in TEST() 87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, in TEST() 88 TargetPolicy::EVENTS_ALLOW_ANY, L"tst0001")); in TEST()
|
D | handle_policy_test.cc | 62 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST() 63 TargetPolicy::HANDLES_DUP_ANY, in TEST() 84 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST() 85 TargetPolicy::HANDLES_DUP_ANY, in TEST() 100 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST() 101 TargetPolicy::HANDLES_DUP_ANY, in TEST() 107 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, in TEST() 108 TargetPolicy::HANDLES_DUP_BROKER, in TEST()
|
D | process_policy_test.cc | 272 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST() 273 TargetPolicy::PROCESS_ALL_EXEC, in TEST() 280 runner.GetPolicy()->AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST() 281 TargetPolicy::PROCESS_ALL_EXEC, in TEST() 290 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST() 291 TargetPolicy::PROCESS_MIN_EXEC, in TEST() 296 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY, in TEST() 304 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_DIR_ANY, in TEST() 344 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, in TEST() 345 TargetPolicy::PROCESS_MIN_EXEC, in TEST() [all …]
|
D | file_policy_test.cc | 248 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_DIR_ANY, in TEST() 259 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"calc.exe")); in TEST() 272 runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, nt_path.c_str()); in TEST() 292 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, in TEST() 323 EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_ANY, temp_directory)); in TEST() 336 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"App*.dll")); in TEST() 350 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"n*.dll")); in TEST() 363 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, in TEST() 365 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, in TEST() 367 EXPECT_TRUE(runner.AddRuleSys32(TargetPolicy::FILES_ALLOW_ANY, L"drivers")); in TEST() [all …]
|
D | named_pipe_policy_test.cc | 67 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, in TEST() 68 TargetPolicy::NAMEDPIPES_ALLOW_ANY, in TEST() 87 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, in TEST() 88 TargetPolicy::NAMEDPIPES_ALLOW_ANY, in TEST() 124 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_NAMED_PIPES, in TEST() 125 TargetPolicy::NAMEDPIPES_ALLOW_ANY, in TEST()
|
D | sandbox.h | 33 class TargetPolicy; variable 60 virtual TargetPolicy* CreatePolicy() = 0; 78 TargetPolicy* policy,
|
D | handle_policy.cc | 20 TargetPolicy::Semantics semantics, in GenerateRules() 25 case TargetPolicy::HANDLES_DUP_ANY: { in GenerateRules() 33 case TargetPolicy::HANDLES_DUP_BROKER: { in GenerateRules()
|
D | sync_policy.cc | 134 TargetPolicy::Semantics semantics, in GenerateRules() 141 if (TargetPolicy::EVENTS_ALLOW_ANY != semantics && in GenerateRules() 142 TargetPolicy::EVENTS_ALLOW_READONLY != semantics) { in GenerateRules() 155 if (TargetPolicy::EVENTS_ALLOW_READONLY == semantics) { in GenerateRules() 167 if (TargetPolicy::EVENTS_ALLOW_READONLY != semantics) { in GenerateRules()
|
D | filesystem_policy.cc | 62 TargetPolicy::Semantics semantics, in GenerateRules() 108 case TargetPolicy::FILES_ALLOW_DIR_ANY: { in GenerateRules() 113 case TargetPolicy::FILES_ALLOW_READONLY: { in GenerateRules() 127 case TargetPolicy::FILES_ALLOW_QUERY: { in GenerateRules() 133 case TargetPolicy::FILES_ALLOW_ANY: { in GenerateRules()
|
D | broker_services.h | 48 virtual TargetPolicy* CreatePolicy() OVERRIDE; 51 TargetPolicy* policy,
|
D | named_pipe_policy.cc | 46 TargetPolicy::Semantics semantics, in GenerateRules() 48 if (TargetPolicy::NAMEDPIPES_ALLOW_ANY != semantics) { in GenerateRules()
|
D | registry_policy.cc | 118 TargetPolicy::Semantics semantics, in GenerateRules() 136 case TargetPolicy::REG_ALLOW_READONLY: { in GenerateRules() 145 case TargetPolicy::REG_ALLOW_ANY: { in GenerateRules()
|
D | handle_closer_test.cc | 111 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST() 131 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST() 186 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
|
D | policy_target_test.cc | 222 TargetPolicy* temp_policy = broker->CreatePolicy(); in TEST() 240 TargetPolicy* policy = broker->CreatePolicy(); in TEST() 285 TargetPolicy* temp_policy = broker->CreatePolicy(); in TEST() 303 TargetPolicy* policy = broker->CreatePolicy(); in TEST()
|
D | process_thread_policy.cc | 77 TargetPolicy::Semantics semantics, in GenerateRules() 81 case TargetPolicy::PROCESS_MIN_EXEC: { in GenerateRules() 85 case TargetPolicy::PROCESS_ALL_EXEC: { in GenerateRules()
|
D | process_mitigations_test.cc | 121 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST() 195 sandbox::TargetPolicy* policy = runner.GetPolicy(); in TEST()
|
/external/chromium/chrome/common/ |
D | sandbox_policy.cc | 125 sandbox::TargetPolicy::Semantics access, in AddDirectory() 126 sandbox::TargetPolicy* policy) { in AddDirectory() 137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory() 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory() 158 sandbox::TargetPolicy::Semantics access, in AddKeyAndSubkeys() 159 sandbox::TargetPolicy* policy) { in AddKeyAndSubkeys() 161 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys() 167 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys() 193 sandbox::TargetPolicy* policy) { in BlacklistAddOneDll() 224 void AddDllEvictionPolicy(sandbox::TargetPolicy* policy) { in AddDllEvictionPolicy() [all …]
|
/external/chromium_org/content/common/ |
D | sandbox_win.cc | 113 sandbox::TargetPolicy::Semantics access, in AddDirectory() 114 sandbox::TargetPolicy* policy) { in AddDirectory() 123 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory() 133 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, in AddDirectory() 144 sandbox::TargetPolicy::Semantics access, in AddKeyAndSubkeys() 145 sandbox::TargetPolicy* policy) { in AddKeyAndSubkeys() 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys() 153 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, in AddKeyAndSubkeys() 180 sandbox::TargetPolicy* policy) { in BlacklistAddOneDll() 217 void AddGenericDllEvictionPolicy(sandbox::TargetPolicy* policy) { in AddGenericDllEvictionPolicy() [all …]
|
D | sandbox_win.h | 14 class TargetPolicy; variable 25 sandbox::TargetPolicy* policy); 28 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy);
|
/external/chromium_org/sandbox/win/tests/common/ |
D | controller.h | 82 bool AddRule(TargetPolicy::SubSystem subsystem, 83 TargetPolicy::Semantics semantics, 89 bool AddRuleSys32(TargetPolicy::Semantics semantics, const wchar_t* pattern); 93 bool AddFsRule(TargetPolicy::Semantics semantics, const wchar_t* pattern); 117 TargetPolicy* GetPolicy(); 137 TargetPolicy* policy_;
|
D | controller.cc | 127 TargetPolicy* TestRunner::GetPolicy() { in GetPolicy() 139 bool TestRunner::AddRule(TargetPolicy::SubSystem subsystem, in AddRule() 140 TargetPolicy::Semantics semantics, in AddRule() 148 bool TestRunner::AddRuleSys32(TargetPolicy::Semantics semantics, in AddRuleSys32() 157 if (!AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str())) in AddRuleSys32() 168 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str()); in AddRuleSys32() 171 bool TestRunner::AddFsRule(TargetPolicy::Semantics semantics, in AddFsRule() 176 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, pattern); in AddFsRule()
|
/external/chromium_org/content/public/common/ |
D | sandboxed_process_launcher_delegate.h | 15 class TargetPolicy; variable 41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, in PreSpawnTarget()
|
/external/chromium_org/components/nacl/broker/ |
D | nacl_broker_listener.cc | 50 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy, in PreSpawnTarget() 58 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, in PreSpawnTarget() 59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, in PreSpawnTarget()
|