HomeSort by relevance Sort by last modified time
    Searched full:dacl (Results 1 - 22 of 22) sorted by null

  /external/chromium_org/sandbox/win/src/
acl.h 16 // Returns the default dacl from the token passed in.
22 // |old_dacl|. If the function succeeds, new_dacl contains the new dacl and
27 // Adds and ACE represented by |sid| and |access| to the default dacl present
31 // Adds an ACE represented by the user sid and |access| to the default dacl
36 // the dacl of the kernel object referenced by |object| and of |object_type|.
window.cc 23 PACL dacl = NULL; local
25 DACL_SECURITY_INFORMATION, NULL, NULL, &dacl,
100 // Replace the DACL on the new Desktop with a reduced privilege version.
restricted_token_unittest.cc 140 // Verifies that the token created has "Restricted" in its default dacl.
154 ATL::CDacl dacl; local
155 ASSERT_TRUE(restricted_token.GetDefaultDacl(&dacl));
159 unsigned int ace_count = dacl.GetAceCount();
163 dacl.GetAclEntry(i, &sid, &mask);
restricted_token.cc 124 // Modify the default dacl on the token to contain Restricted and the user.
  /external/chromium_org/rlz/win/lib/
rlz_lib_win.cc 45 // Check if this SID has the desired access by scanning the ACEs in the DACL.
48 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl) {
49 if (dacl == NULL)
53 if (!GetAclInformation(dacl, &info, sizeof(info), AclSizeInformation))
62 if (GetAce(dacl, i, reinterpret_cast<void**>(&ace))) {
129 // Make sure the DACL is big enough to add one more ACE.
130 typed_buffer_ptr<ACL> dacl(dacl_size + SECURITY_MAX_SID_SIZE);
135 if (!::MakeAbsoluteSD(original_sd, new_sd, &new_sd_size, dacl, &dacl_size,
145 if (HasAccess(users_sid, KEY_ALL_ACCESS, dacl)) {
159 result = SetEntriesInAcl(1, &ea, dacl, &new_dacl)
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
fwpmu.h 190 PACL *dacl,
201 const ACL *dacl,
230 PACL *dacl,
246 const ACL *dacl,
297 PACL *dacl,
308 const ACL *dacl,
380 PACL *dacl,
391 const ACL *dacl,
419 PACL *dacl,
429 const ACL *dacl,
    [all...]
wtypes.h 275 PACL Dacl;
winnt.h     [all...]
  /external/chromium_org/base/test/
test_file_util_win.cc 28 ACL dacl; member in struct:base::__anon7105::PermissionInfo
73 PACL dacl = NULL; local
77 DACL_SECURITY_INFORMATION, NULL, NULL, &dacl,
81 DCHECK(dacl != NULL);
83 *length = sizeof(PSECURITY_DESCRIPTOR) + dacl->AclSize;
86 memcpy(&info->dacl, dacl, dacl->AclSize);
104 NULL, NULL, &perm->dacl, NULL);
  /external/chromium_org/rlz/lib/
rlz_lib_test.cc 593 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl);
623 typed_buffer_ptr<ACL> dacl(kMaxAclSize);
624 InitializeAcl(dacl, kMaxAclSize, ACL_REVISION);
626 // Empty DACL mean no access.
627 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl));
630 EXPECT_TRUE(AddAccessAllowedAce(dacl, ACL_REVISION, KEY_READ, users_sid));
631 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl));
634 EXPECT_TRUE(EmptyAcl(dacl));
635 EXPECT_TRUE(AddAccessAllowedAce(dacl, ACL_REVISION, KEY_WRITE, users_sid));
636 EXPECT_FALSE(rlz_lib::HasAccess(users_sid, KEY_ALL_ACCESS, dacl));
    [all...]
  /external/chromium_org/remoting/host/win/
com_security.cc 32 ScopedAcl dacl; local
36 if (!MakeScopedAbsoluteSd(relative_sd, &absolute_sd, &dacl, &group, &owner,
security_descriptor.cc 70 ScopedAcl* dacl,
118 dacl->Swap(local_dacl);
security_descriptor.h 34 ScopedAcl* dacl,
  /external/chromium_org/cloud_print/service/win/
setup_listener.cc 98 ATL::CDacl dacl; local
104 dacl.AddAllowedAce(user_sid, GENERIC_READ | GENERIC_WRITE);
108 desk.SetDacl(dacl);
  /external/chromium_org/chrome/installer/util/
user_experiment.cc 152 // The general strategy to is to add an ACE to the exe DACL the quick
153 // and dirty way: a) read the DACL b) convert it to sddl string c) add the
154 // new ACE to the string d) convert sddl string back to DACL and finally
155 // e) write new dacl.
183 // All good, time to change the dacl.
  /external/chromium_org/third_party/icu/source/common/
umapfile.c 119 /* give the security descriptor a Null Dacl done using the "TRUE, (PACL)NULL" here */
  /external/icu/icu4c/source/common/
umapfile.c 118 /* give the security descriptor a Null Dacl done using the "TRUE, (PACL)NULL" here */
  /ndk/sources/host-tools/make-3.81/w32/subproc/
sub_proc.c 272 Instead we use a security descriptor with no DACL. This
  /external/wpa_supplicant_8/wpa_supplicant/
config.h 469 * ctrl_interface=SDDL=D: would set an empty DACL (which will reject
    [all...]
wpa_supplicant.conf 72 # DACL (which will reject all connections). See README-Windows.txt for more
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ddk/
ntifs.h 401 ULONG Dacl;
411 PACL Dacl;
    [all...]
wdm.h     [all...]

Completed in 1969 milliseconds