OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:ntdll
(Results
1 - 6
of
6
) sorted by null
/external/chromium_org/sandbox/win/src/
sandbox_utils.cc
29
HMODULE
ntdll
= ::GetModuleHandle(kNtdllName);
local
31
GetProcAddress(
ntdll
, "RtlInitUnicodeString"));
policy_broker.cc
26
// This is the list of all imported symbols from
ntdll
.dll.
42
HMODULE
ntdll
= ::GetModuleHandle(kNtdllName);
local
43
base::win::PEImage ntdll_image(
ntdll
);
51
loader_get, &
ntdll
);
registry_policy_test.cc
24
::GetProcAddress(::GetModuleHandle(L"
ntdll
.dll"), #name))
241
HMODULE
ntdll
= GetModuleHandle(L"
ntdll
.dll");
local
243
reinterpret_cast<NtDeleteKeyFunction>(GetProcAddress(
ntdll
,
policy_opcodes_unittest.cc
14
::GetProcAddress(
ntdll
, #member)); \
23
HMODULE
ntdll
= ::GetModuleHandle(kNtdllName);
local
win_utils.cc
304
// with
ntdll
/imports underneath us. So, we retry a few times, and in the
311
static HMODULE
ntdll
= ::GetModuleHandle(sandbox::kNtdllName);
local
314
*function_ptr = ::GetProcAddress(
ntdll
, name);
319
ntdll
= ::GetModuleHandle(sandbox::kNtdllName);
320
*function_ptr = ::GetProcAddress(
ntdll
, name);
/external/chromium_org/sandbox/win/wow_helper/
service64_resolver.cc
134
// Get pointers to the functions that we need from
ntdll
.dll.
136
wchar_t* ntdll_name = L"
ntdll
.dll";
137
HMODULE
ntdll
= ::GetModuleHandle(ntdll_name);
local
138
if (!
ntdll
)
141
void* signal = ::GetProcAddress(
ntdll
, "NtSignalAndWaitForSingleObject");
Completed in 55 milliseconds