/external/chromium_org/sandbox/win/src/ |
acl.h | 16 // Returns the default dacl from the token passed in. 22 // |old_dacl|. If the function succeeds, new_dacl contains the new dacl and 27 // Adds and ACE represented by |sid| and |access| to the default dacl present 31 // Adds an ACE represented by the user sid and |access| to the default dacl 36 // the dacl of the kernel object referenced by |object| and of |object_type|.
|
window.cc | 23 PACL dacl = NULL; local 25 DACL_SECURITY_INFORMATION, NULL, NULL, &dacl, 100 // Replace the DACL on the new Desktop with a reduced privilege version.
|
restricted_token_unittest.cc | 140 // Verifies that the token created has "Restricted" in its default dacl. 154 ATL::CDacl dacl; local 155 ASSERT_TRUE(restricted_token.GetDefaultDacl(&dacl)); 159 unsigned int ace_count = dacl.GetAceCount(); 163 dacl.GetAclEntry(i, &sid, &mask);
|
restricted_token.cc | 124 // Modify the default dacl on the token to contain Restricted and the user.
|
/external/chromium_org/rlz/win/lib/ |
rlz_lib_win.cc | 45 // Check if this SID has the desired access by scanning the ACEs in the DACL. 48 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl) { 49 if (dacl == NULL) 53 if (!GetAclInformation(dacl, &info, sizeof(info), AclSizeInformation)) 62 if (GetAce(dacl, i, reinterpret_cast<void**>(&ace))) { 129 // Make sure the DACL is big enough to add one more ACE. 130 typed_buffer_ptr<ACL> dacl(dacl_size + SECURITY_MAX_SID_SIZE); 135 if (!::MakeAbsoluteSD(original_sd, new_sd, &new_sd_size, dacl, &dacl_size, 145 if (HasAccess(users_sid, KEY_ALL_ACCESS, dacl)) { 159 result = SetEntriesInAcl(1, &ea, dacl, &new_dacl) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
fwpmu.h | 190 PACL *dacl, 201 const ACL *dacl, 230 PACL *dacl, 246 const ACL *dacl, 297 PACL *dacl, 308 const ACL *dacl, 380 PACL *dacl, 391 const ACL *dacl, 419 PACL *dacl, 429 const ACL *dacl, [all...] |
wtypes.h | 275 PACL Dacl;
|
winnt.h | [all...] |
/external/chromium_org/base/test/ |
test_file_util_win.cc | 28 ACL dacl; member in struct:base::__anon7105::PermissionInfo 73 PACL dacl = NULL; local 77 DACL_SECURITY_INFORMATION, NULL, NULL, &dacl, 81 DCHECK(dacl != NULL); 83 *length = sizeof(PSECURITY_DESCRIPTOR) + dacl->AclSize; 86 memcpy(&info->dacl, dacl, dacl->AclSize); 104 NULL, NULL, &perm->dacl, NULL);
|
/external/chromium_org/rlz/lib/ |
rlz_lib_test.cc | 593 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl); 623 typed_buffer_ptr<ACL> dacl(kMaxAclSize); 624 InitializeAcl(dacl, kMaxAclSize, ACL_REVISION); 626 // Empty DACL mean no access. 627 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl)); 630 EXPECT_TRUE(AddAccessAllowedAce(dacl, ACL_REVISION, KEY_READ, users_sid)); 631 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl)); 634 EXPECT_TRUE(EmptyAcl(dacl)); 635 EXPECT_TRUE(AddAccessAllowedAce(dacl, ACL_REVISION, KEY_WRITE, users_sid)); 636 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl)); [all...] |
/external/chromium_org/remoting/host/win/ |
com_security.cc | 32 ScopedAcl dacl; local 36 if (!MakeScopedAbsoluteSd(relative_sd, &absolute_sd, &dacl, &group, &owner,
|
security_descriptor.cc | 70 ScopedAcl* dacl, 118 dacl->Swap(local_dacl);
|
security_descriptor.h | 34 ScopedAcl* dacl,
|
/external/chromium_org/cloud_print/service/win/ |
setup_listener.cc | 98 ATL::CDacl dacl; local 104 dacl.AddAllowedAce(user_sid, GENERIC_READ | GENERIC_WRITE); 108 desk.SetDacl(dacl);
|
/external/chromium_org/chrome/installer/util/ |
user_experiment.cc | 152 // The general strategy to is to add an ACE to the exe DACL the quick 153 // and dirty way: a) read the DACL b) convert it to sddl string c) add the 154 // new ACE to the string d) convert sddl string back to DACL and finally 155 // e) write new dacl. 183 // All good, time to change the dacl.
|
/external/chromium_org/third_party/icu/source/common/ |
umapfile.c | 119 /* give the security descriptor a Null Dacl done using the "TRUE, (PACL)NULL" here */
|
/external/icu/icu4c/source/common/ |
umapfile.c | 118 /* give the security descriptor a Null Dacl done using the "TRUE, (PACL)NULL" here */
|
/ndk/sources/host-tools/make-3.81/w32/subproc/ |
sub_proc.c | 272 Instead we use a security descriptor with no DACL. This
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 469 * ctrl_interface=SDDL=D: would set an empty DACL (which will reject [all...] |
wpa_supplicant.conf | 72 # DACL (which will reject all connections). See README-Windows.txt for more [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ddk/ |
ntifs.h | 401 ULONG Dacl; 411 PACL Dacl; [all...] |
wdm.h | [all...] |