Credentials 369 content/common/sandbox_linux/sandbox_linux.cc return sandbox::Credentials().HasOpenDirectory(proc_fd_); Credentials 170 sandbox/linux/services/credentials.cc Credentials::Credentials() { Credentials 173 sandbox/linux/services/credentials.cc Credentials::~Credentials() { Credentials 176 sandbox/linux/services/credentials.cc bool Credentials::HasOpenDirectory(int proc_fd) { Credentials 227 sandbox/linux/services/credentials.cc bool Credentials::DropAllCapabilities() { Credentials 235 sandbox/linux/services/credentials.cc bool Credentials::HasAnyCapability() const { Credentials 243 sandbox/linux/services/credentials.cc scoped_ptr<std::string> Credentials::GetCurrentCapString() const { Credentials 252 sandbox/linux/services/credentials.cc bool Credentials::SupportsNewUserNS() { Credentials 282 sandbox/linux/services/credentials.cc bool Credentials::MoveToNewUserNS() { Credentials 311 sandbox/linux/services/credentials.cc bool Credentials::DropFileSystemAccess() { Credentials 25 sandbox/linux/services/credentials.h class SANDBOX_EXPORT Credentials { Credentials 27 sandbox/linux/services/credentials.h Credentials(); Credentials 28 sandbox/linux/services/credentials.h ~Credentials(); Credentials 82 sandbox/linux/services/credentials.h DISALLOW_COPY_AND_ASSIGN(Credentials); Credentials 52 sandbox/linux/services/credentials_unittest.cc TEST(Credentials, CreateAndDestroy) { Credentials 54 sandbox/linux/services/credentials_unittest.cc Credentials cred1; Credentials 57 sandbox/linux/services/credentials_unittest.cc scoped_ptr<Credentials> cred2(new Credentials); Credentials 60 sandbox/linux/services/credentials_unittest.cc TEST(Credentials, HasOpenDirectory) { Credentials 61 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 73 sandbox/linux/services/credentials_unittest.cc TEST(Credentials, HasOpenDirectoryWithFD) { Credentials 74 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 98 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, DropAllCaps) { Credentials 99 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 104 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, GetCurrentCapString) { Credentials 105 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 111 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, MoveToNewUserNS) { Credentials 112 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 130 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, SupportsUserNS) { Credentials 131 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 133 sandbox/linux/services/credentials_unittest.cc bool user_ns_supported = Credentials::SupportsNewUserNS(); Credentials 138 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, UidIsPreserved) { Credentials 139 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 160 sandbox/linux/services/credentials_unittest.cc bool NewUserNSCycle(Credentials* creds) { Credentials 171 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, NestedUserNS) { Credentials 172 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 186 sandbox/linux/services/credentials_unittest.cc TEST(Credentials, CanDetectRoot) { Credentials 193 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, DropFileSystemAccessIsSafe) { Credentials 194 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 208 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, CannotRegainPrivileges) { Credentials 209 sandbox/linux/services/credentials_unittest.cc Credentials creds; Credentials 218 sandbox/linux/services/credentials_unittest.cc CHECK(!Credentials::SupportsNewUserNS());