Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(262)

Side by Side Diff: sandbox/win/src/sandbox_policy_base.h

Issue 119713003: Add base:: to string16s in sandbox/. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « sandbox/win/src/process_policy_test.cc ('k') | sandbox/win/src/sandbox_policy_base.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_ 5 #ifndef SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_
6 #define SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_ 6 #define SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_
7 7
8 #include <windows.h> 8 #include <windows.h>
9 9
10 #include <list> 10 #include <list>
(...skipping 26 matching lines...) Expand all
37 PolicyBase(); 37 PolicyBase();
38 38
39 // TargetPolicy: 39 // TargetPolicy:
40 virtual void AddRef() OVERRIDE; 40 virtual void AddRef() OVERRIDE;
41 virtual void Release() OVERRIDE; 41 virtual void Release() OVERRIDE;
42 virtual ResultCode SetTokenLevel(TokenLevel initial, 42 virtual ResultCode SetTokenLevel(TokenLevel initial,
43 TokenLevel lockdown) OVERRIDE; 43 TokenLevel lockdown) OVERRIDE;
44 virtual ResultCode SetJobLevel(JobLevel job_level, 44 virtual ResultCode SetJobLevel(JobLevel job_level,
45 uint32 ui_exceptions) OVERRIDE; 45 uint32 ui_exceptions) OVERRIDE;
46 virtual ResultCode SetAlternateDesktop(bool alternate_winstation) OVERRIDE; 46 virtual ResultCode SetAlternateDesktop(bool alternate_winstation) OVERRIDE;
47 virtual string16 GetAlternateDesktop() const OVERRIDE; 47 virtual base::string16 GetAlternateDesktop() const OVERRIDE;
48 virtual ResultCode CreateAlternateDesktop(bool alternate_winstation) OVERRIDE; 48 virtual ResultCode CreateAlternateDesktop(bool alternate_winstation) OVERRIDE;
49 virtual void DestroyAlternateDesktop() OVERRIDE; 49 virtual void DestroyAlternateDesktop() OVERRIDE;
50 virtual ResultCode SetIntegrityLevel(IntegrityLevel integrity_level) OVERRIDE; 50 virtual ResultCode SetIntegrityLevel(IntegrityLevel integrity_level) OVERRIDE;
51 virtual ResultCode SetDelayedIntegrityLevel( 51 virtual ResultCode SetDelayedIntegrityLevel(
52 IntegrityLevel integrity_level) OVERRIDE; 52 IntegrityLevel integrity_level) OVERRIDE;
53 virtual ResultCode SetAppContainer(const wchar_t* sid) OVERRIDE; 53 virtual ResultCode SetAppContainer(const wchar_t* sid) OVERRIDE;
54 virtual ResultCode SetCapability(const wchar_t* sid) OVERRIDE; 54 virtual ResultCode SetCapability(const wchar_t* sid) OVERRIDE;
55 virtual ResultCode SetProcessMitigations(MitigationFlags flags) OVERRIDE; 55 virtual ResultCode SetProcessMitigations(MitigationFlags flags) OVERRIDE;
56 virtual MitigationFlags GetProcessMitigations() OVERRIDE; 56 virtual MitigationFlags GetProcessMitigations() OVERRIDE;
57 virtual ResultCode SetDelayedProcessMitigations( 57 virtual ResultCode SetDelayedProcessMitigations(
(...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after
134 IntegrityLevel delayed_integrity_level_; 134 IntegrityLevel delayed_integrity_level_;
135 MitigationFlags mitigations_; 135 MitigationFlags mitigations_;
136 MitigationFlags delayed_mitigations_; 136 MitigationFlags delayed_mitigations_;
137 // The array of objects that will answer IPC calls. 137 // The array of objects that will answer IPC calls.
138 Dispatcher* ipc_targets_[IPC_LAST_TAG]; 138 Dispatcher* ipc_targets_[IPC_LAST_TAG];
139 // Object in charge of generating the low level policy. 139 // Object in charge of generating the low level policy.
140 LowLevelPolicy* policy_maker_; 140 LowLevelPolicy* policy_maker_;
141 // Memory structure that stores the low level policy. 141 // Memory structure that stores the low level policy.
142 PolicyGlobal* policy_; 142 PolicyGlobal* policy_;
143 // The list of dlls to unload in the target process. 143 // The list of dlls to unload in the target process.
144 std::vector<string16> blacklisted_dlls_; 144 std::vector<base::string16> blacklisted_dlls_;
145 // This is a map of handle-types to names that we need to close in the 145 // This is a map of handle-types to names that we need to close in the
146 // target process. A null set means we need to close all handles of the 146 // target process. A null set means we need to close all handles of the
147 // given type. 147 // given type.
148 HandleCloser handle_closer_; 148 HandleCloser handle_closer_;
149 std::vector<string16> capabilities_; 149 std::vector<base::string16> capabilities_;
150 scoped_ptr<AppContainerAttributes> appcontainer_list_; 150 scoped_ptr<AppContainerAttributes> appcontainer_list_;
151 151
152 static HDESK alternate_desktop_handle_; 152 static HDESK alternate_desktop_handle_;
153 static HWINSTA alternate_winstation_handle_; 153 static HWINSTA alternate_winstation_handle_;
154 154
155 DISALLOW_COPY_AND_ASSIGN(PolicyBase); 155 DISALLOW_COPY_AND_ASSIGN(PolicyBase);
156 }; 156 };
157 157
158 } // namespace sandbox 158 } // namespace sandbox
159 159
160 #endif // SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_ 160 #endif // SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_
OLDNEW
« no previous file with comments | « sandbox/win/src/process_policy_test.cc ('k') | sandbox/win/src/sandbox_policy_base.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698