/external/chromium_org/sandbox/win/src/ |
sandbox_utils.cc | 21 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local 23 GetProcAddress(ntdll, "RtlInitUnicodeString"));
|
policy_broker.cc | 26 // This is the list of all imported symbols from ntdll.dll. 42 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local 43 base::win::PEImage ntdll_image(ntdll); 51 loader_get, &ntdll);
|
registry_policy_test.cc | 24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) 241 HMODULE ntdll = GetModuleHandle(L"ntdll.dll"); local 243 reinterpret_cast<NtDeleteKeyFunction>(GetProcAddress(ntdll,
|
policy_opcodes_unittest.cc | 14 ::GetProcAddress(ntdll, #member)); \ 23 HMODULE ntdll = ::GetModuleHandle(kNtdllName); local
|
win_utils.cc | 304 static volatile HMODULE ntdll = NULL; local 306 if (!ntdll) { 308 // Use PEImage to sanity-check that we have a valid ntdll handle. 311 // Race-safe way to set static ntdll. 313 reinterpret_cast<PVOID volatile*>(&ntdll), ntdll_local, NULL); 317 CHECK_NT(ntdll); 319 *function_ptr = ::GetProcAddress(ntdll, name);
|
/external/chromium_org/chrome/browser/extensions/api/system_cpu/ |
cpu_info_provider_win.cc | 16 const wchar_t kNtdll[] = L"ntdll.dll"; 31 HMODULE ntdll = GetModuleHandle(kNtdll); local 32 CHECK(ntdll != NULL); 35 ::GetProcAddress(ntdll, kNtQuerySystemInformationName));
|
/external/chromium_org/chrome_elf/blacklist/ |
blacklist_interceptions.cc | 32 // TODO(robertshield): Merge with ntdll exports cache. 34 HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName); local 35 return ::GetProcAddress(ntdll, export_name);
|
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.cc | 134 // Get pointers to the functions that we need from ntdll.dll. 136 wchar_t* ntdll_name = L"ntdll.dll"; 137 HMODULE ntdll = ::GetModuleHandle(ntdll_name); local 138 if (!ntdll) 141 void* signal = ::GetProcAddress(ntdll, "NtSignalAndWaitForSingleObject");
|