// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_COMMON_SANDBOX_INIT_MAC_H_
#define CONTENT_COMMON_SANDBOX_INIT_MAC_H_
namespace content {
// Initialize the sandbox for renderer, gpu, utility, worker, and plug-in
// processes, depending on the command line flags. For the browser process which
// is not sandboxed, this call is a no-op.
// Returns true if the sandbox was initialized succesfully, false if an error
// occurred. If process_type isn't one that needs sandboxing, true is always
// returned.
bool InitializeSandbox();
// The bootstrap server name of the real bootstrap port. This is never used
// with bootstrap_register, but is instead used with a POLICY_SUBSTITUTE_PORT
// in the bootstrap sandbox. In child processes, the the launchd/bootstrap
// sandbox will have replaced the bootstrap port with one controlled by the
// interception server. This server name can be used to request the original
// server, from the browser, in NPAPI plugins.
extern const char kBootstrapPortNameForNPAPIPlugins[];
} // namespace content
#endif // CONTENT_COMMON_SANDBOX_INIT_MAC_H_