| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef CONTENT_COMMON_SANDBOX_INIT_MAC_H_ |
| #define CONTENT_COMMON_SANDBOX_INIT_MAC_H_ |
| |
| namespace content { |
| |
| // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in |
| // processes, depending on the command line flags. For the browser process which |
| // is not sandboxed, this call is a no-op. |
| // Returns true if the sandbox was initialized succesfully, false if an error |
| // occurred. If process_type isn't one that needs sandboxing, true is always |
| // returned. |
| bool InitializeSandbox(); |
| |
| // The bootstrap server name of the real bootstrap port. This is never used |
| // with bootstrap_register, but is instead used with a POLICY_SUBSTITUTE_PORT |
| // in the bootstrap sandbox. In child processes, the the launchd/bootstrap |
| // sandbox will have replaced the bootstrap port with one controlled by the |
| // interception server. This server name can be used to request the original |
| // server, from the browser, in NPAPI plugins. |
| extern const char kBootstrapPortNameForNPAPIPlugins[]; |
| |
| } // namespace content |
| |
| #endif // CONTENT_COMMON_SANDBOX_INIT_MAC_H_ |