Sid 108 base/process/process_handle_win.cc DWORD integrity_level = *GetSidSubAuthority(token_label->Label.Sid, Sid 109 base/process/process_handle_win.cc (DWORD)(UCHAR)(*GetSidSubAuthorityCount(token_label->Label.Sid)-1)); Sid 92 base/win/win_util.cc if (!user->User.Sid) Sid 97 base/win/win_util.cc if (!::ConvertSidToStringSid(user->User.Sid, &sid_string)) Sid 337 chrome/installer/gcapi/gcapi.cc PSID sid = reinterpret_cast<TOKEN_USER*>(token_user)->User.Sid; Sid 66 chrome_elf/breakpad.cc user->User.Sid && Sid 67 chrome_elf/breakpad.cc ::ConvertSidToStringSid(user->User.Sid, &sid_string)) { Sid 75 remoting/host/win/chromoting_module.cc *GetSidSubAuthorityCount(mandatory_label->Label.Sid); Sid 76 remoting/host/win/chromoting_module.cc DWORD* current_level = GetSidSubAuthority(mandatory_label->Label.Sid, Sid 56 remoting/host/win/security_descriptor.cc length = GetLengthSid(groups->Groups[i].Sid); Sid 58 remoting/host/win/security_descriptor.cc if (!CopySid(length, logon_sid.get(), groups->Groups[i].Sid)) Sid 66 rlz/win/lib/process_info.cc PSID user_sid = token_user->User.Sid; Sid 40 sandbox/win/src/acl.cc bool AddSidToDacl(const Sid& sid, ACL* old_dacl, ACCESS_MODE access_mode, Sid 59 sandbox/win/src/acl.cc bool AddSidToDefaultDacl(HANDLE token, const Sid& sid, ACCESS_MASK access) { Sid 91 sandbox/win/src/acl.cc reinterpret_cast<SID*>(token_user->User.Sid), Sid 96 sandbox/win/src/acl.cc const Sid& sid, ACCESS_MODE access_mode, Sid 24 sandbox/win/src/acl.h bool AddSidToDacl(const Sid& sid, ACL* old_dacl, ACCESS_MODE access_mode, Sid 29 sandbox/win/src/acl.h bool AddSidToDefaultDacl(HANDLE token, const Sid& sid, ACCESS_MASK access); Sid 38 sandbox/win/src/acl.h const Sid& sid, ACCESS_MODE access_mode, Sid 47 sandbox/win/src/app_container.cc LocalFree(attributes_[i].Sid); Sid 62 sandbox/win/src/app_container.cc sid_and_attributes.Sid = ConvertSid(capabilities[i]); Sid 63 sandbox/win/src/app_container.cc if (!sid_and_attributes.Sid) Sid 37 sandbox/win/src/integrity_level_test.cc BOOL is_low_sid = ::EqualSid(label->Label.Sid, sid_low); Sid 62 sandbox/win/src/restricted_token.cc deny_only_array[i].Sid = Sid 73 sandbox/win/src/restricted_token.cc sids_to_restrict_array[i].Sid = Sid 190 sandbox/win/src/restricted_token.cc unsigned RestrictedToken::AddAllSidsForDenyOnly(std::vector<Sid> *exceptions) { Sid 225 sandbox/win/src/restricted_token.cc token_groups->Groups[i].Sid)) { Sid 233 sandbox/win/src/restricted_token.cc reinterpret_cast<SID*>(token_groups->Groups[i].Sid)); Sid 243 sandbox/win/src/restricted_token.cc unsigned RestrictedToken::AddSidForDenyOnly(const Sid &sid) { Sid 271 sandbox/win/src/restricted_token.cc Sid user = reinterpret_cast<SID*>(token_user->User.Sid); Sid 347 sandbox/win/src/restricted_token.cc unsigned RestrictedToken::AddRestrictingSid(const Sid &sid) { Sid 386 sandbox/win/src/restricted_token.cc logon_sid = static_cast<SID*>(token_groups->Groups[i].Sid); Sid 418 sandbox/win/src/restricted_token.cc Sid user = reinterpret_cast<SID*>(token_user->User.Sid); Sid 459 sandbox/win/src/restricted_token.cc AddRestrictingSid(reinterpret_cast<SID*>(token_groups->Groups[i].Sid)); Sid 97 sandbox/win/src/restricted_token.h unsigned AddAllSidsForDenyOnly(std::vector<Sid> *exceptions); Sid 105 sandbox/win/src/restricted_token.h unsigned AddSidForDenyOnly(const Sid &sid); Sid 151 sandbox/win/src/restricted_token.h unsigned AddRestrictingSid(const Sid &sid); Sid 182 sandbox/win/src/restricted_token.h std::vector<Sid> sids_to_restrict_; Sid 186 sandbox/win/src/restricted_token.h std::vector<Sid> sids_for_deny_only_; Sid 179 sandbox/win/src/restricted_token_unittest.cc ASSERT_EQ(ERROR_SUCCESS, token.AddSidForDenyOnly(Sid(WinWorldSid))); Sid 234 sandbox/win/src/restricted_token_unittest.cc std::vector<Sid> sids_exception; Sid 235 sandbox/win/src/restricted_token_unittest.cc sids_exception.push_back(Sid(WinWorldSid)); Sid 33 sandbox/win/src/restricted_token_utils.cc std::vector<Sid> sid_exceptions; Sid 314 sandbox/win/src/restricted_token_utils.cc label.Label.Sid = integrity_sid; Sid 11 sandbox/win/src/sid.cc Sid::Sid(const SID *sid) { Sid 15 sandbox/win/src/sid.cc Sid::Sid(WELL_KNOWN_SID_TYPE type) { Sid 22 sandbox/win/src/sid.cc const SID *Sid::GetPSID() const { Sid 13 sandbox/win/src/sid.h class Sid { Sid 17 sandbox/win/src/sid.h Sid(const SID *sid); Sid 18 sandbox/win/src/sid.h Sid(WELL_KNOWN_SID_TYPE type); Sid 28 sandbox/win/src/sid_unittest.cc Sid sid_sid_star(sid_world_pointer); Sid 32 sandbox/win/src/sid_unittest.cc Sid sid_copy(sid_sid_star); Sid 42 sandbox/win/src/sid_unittest.cc ASSERT_NE(static_cast<SID*>(NULL), Sid(::WinLocalSid).GetPSID()); Sid 43 sandbox/win/src/sid_unittest.cc ASSERT_NE(static_cast<SID*>(NULL), Sid(::WinCreatorOwnerSid).GetPSID()); Sid 44 sandbox/win/src/sid_unittest.cc ASSERT_NE(static_cast<SID*>(NULL), Sid(::WinBatchSid).GetPSID()); Sid 46 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinNullSid).GetPSID(), Sid 49 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinWorldSid).GetPSID(), Sid 52 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinDialupSid).GetPSID(), Sid 55 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinNetworkSid).GetPSID(), Sid 58 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinBuiltinAdministratorsSid).GetPSID(), Sid 61 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinBuiltinUsersSid).GetPSID(), Sid 64 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinBuiltinGuestsSid).GetPSID(), Sid 67 sandbox/win/src/sid_unittest.cc ASSERT_TRUE(EqualSid(Sid(::WinProxySid).GetPSID(), Sid 110 sandbox/win/src/window.cc AddKnownSidToObject(*desktop, SE_WINDOW_OBJECT, Sid(WinRestrictedCodeSid),