/external/chromium_org/remoting/host/win/ |
com_security.cc | 32 ScopedAcl dacl; local 36 if (!MakeScopedAbsoluteSd(relative_sd, &absolute_sd, &dacl, &group, &owner,
|
security_descriptor.h | 34 ScopedAcl* dacl,
|
security_descriptor.cc | 70 ScopedAcl* dacl, 118 dacl->Swap(local_dacl);
|
/external/chromium_org/rlz/win/lib/ |
rlz_lib_win.cc | 45 // Check if this SID has the desired access by scanning the ACEs in the DACL. 48 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl) { 49 if (dacl == NULL) 53 if (!GetAclInformation(dacl, &info, sizeof(info), AclSizeInformation)) 62 if (GetAce(dacl, i, reinterpret_cast<void**>(&ace))) { 129 // Make sure the DACL is big enough to add one more ACE. 130 typed_buffer_ptr<ACL> dacl(dacl_size + SECURITY_MAX_SID_SIZE); 135 if (!::MakeAbsoluteSD(original_sd, new_sd, &new_sd_size, dacl, &dacl_size, 145 if (HasAccess(users_sid, KEY_ALL_ACCESS, dacl)) { 159 result = SetEntriesInAcl(1, &ea, dacl, &new_dacl) [all...] |
/external/chromium_org/base/test/ |
test_file_util_win.cc | 28 ACL dacl; member in struct:base::__anon7105::PermissionInfo 73 PACL dacl = NULL; local 77 DACL_SECURITY_INFORMATION, NULL, NULL, &dacl, 81 DCHECK(dacl != NULL); 83 *length = sizeof(PSECURITY_DESCRIPTOR) + dacl->AclSize; 86 memcpy(&info->dacl, dacl, dacl->AclSize); 104 NULL, NULL, &perm->dacl, NULL);
|
/external/chromium_org/rlz/lib/ |
rlz_lib_test.cc | 593 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl); 623 typed_buffer_ptr<ACL> dacl(kMaxAclSize); 624 InitializeAcl(dacl, kMaxAclSize, ACL_REVISION); 626 // Empty DACL mean no access. 627 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl)); 630 EXPECT_TRUE(AddAccessAllowedAce(dacl, ACL_REVISION, KEY_READ, users_sid)); 631 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl)); 634 EXPECT_TRUE(EmptyAcl(dacl)); 635 EXPECT_TRUE(AddAccessAllowedAce(dacl, ACL_REVISION, KEY_WRITE, users_sid)); 636 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl)); [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
fwpmu.h | 190 PACL *dacl, 201 const ACL *dacl, 230 PACL *dacl, 246 const ACL *dacl, 297 PACL *dacl, 308 const ACL *dacl, 380 PACL *dacl, 391 const ACL *dacl, 419 PACL *dacl, 429 const ACL *dacl, [all...] |
/external/chromium_org/cloud_print/service/win/ |
setup_listener.cc | 98 ATL::CDacl dacl; local 104 dacl.AddAllowedAce(user_sid, GENERIC_READ | GENERIC_WRITE); 108 desk.SetDacl(dacl);
|
/external/chromium_org/sandbox/win/src/ |
window.cc | 23 PACL dacl = NULL; local 25 DACL_SECURITY_INFORMATION, NULL, NULL, &dacl, 100 // Replace the DACL on the new Desktop with a reduced privilege version.
|
restricted_token_unittest.cc | 140 // Verifies that the token created has "Restricted" in its default dacl. 154 ATL::CDacl dacl; local 155 ASSERT_TRUE(restricted_token.GetDefaultDacl(&dacl)); 159 unsigned int ace_count = dacl.GetAceCount(); 163 dacl.GetAclEntry(i, &sid, &mask);
|
/packages/apps/OMA-DM/engine/dmlib/dmengine/dm_tnm/src/ |
dm_tree_class_public.cc | 2070 DMString dacl; local [all...] |