/external/chromium_org/chrome_elf/dll_hash/ |
H A D | dll_hash.cc | 8 int DllNameToHash(std::string dll_name) { argument 9 uint32 data = base::Hash(dll_name);
|
H A D | dll_hash.h | 11 int DllNameToHash(std::string dll_name);
|
/external/chromium_org/chrome/app/ |
H A D | delay_load_hook_win.cc | 34 std::string dll_name(info->szDll); 36 if (EndsWith(dll_name, kDelaySuffix, false)) { 38 dll_name.resize(dll_name.length() - (sizeof(kDelaySuffix) - 1)); 39 dll_name.append(".dll"); 41 return reinterpret_cast<FARPROC>(::LoadLibraryA(dll_name.c_str()));
|
H A D | delay_load_hook_unittest_win.cc | 30 void SetupInfo(const char* dll_name) { argument 34 info_.szDll = dll_name;
|
H A D | client_util.cc | 159 const wchar_t* dll_name, 162 dir->append(dll_name); 237 const wchar_t* dll_name = metro_mode_ ? local 247 HMODULE dll = LoadModuleWithDirectory(out_file, dll_name, pre_read); 257 dll = LoadModuleWithDirectory(out_file, dll_name, pre_read); 158 LoadModuleWithDirectory(base::string16* dir, const wchar_t* dll_name, bool pre_read) argument
|
/external/compiler-rt/test/asan/TestCases/Windows/ |
H A D | dll_host.cc | 27 const char *dll_name = argv[1]; local 29 HMODULE h = LoadLibrary(dll_name); 32 dll_name, GetLastError());
|
/external/chromium_org/chrome_elf/blacklist/ |
H A D | blacklist.h | 45 // |dll_name| and will leak it on exit if the string is not subsequently removed 48 extern "C" bool AddDllToBlacklist(const wchar_t* dll_name); 53 extern "C" bool RemoveDllFromBlacklist(const wchar_t* dll_name);
|
H A D | blacklist.cc | 231 bool AddDllToBlacklist(const wchar_t* dll_name) { argument 237 if (!_wcsicmp(g_troublesome_dlls[i], dll_name)) 242 wchar_t* str_buffer = new wchar_t[wcslen(dll_name) + 1]; 243 wcscpy(str_buffer, dll_name); 250 bool RemoveDllFromBlacklist(const wchar_t* dll_name) { argument 253 if (!_wcsicmp(g_troublesome_dlls[i], dll_name)) {
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
H A D | sandbox.cc | 18 std::string * dll_name, 21 DCHECK(dll_name); 24 if (!dll_name || !entry_point || !log_file) 41 *dll_name = std::string(dll_name_wide.begin(), dll_name_wide.end()); 128 std::string dll_name, entry_point; local 131 &dll_name, 152 HMODULE dll_module = ::LoadLibraryA(dll_name.c_str()); 17 ParseCommandLine(wchar_t * command_line, std::string * dll_name, std::string * entry_point, base::string16 * log_file) argument
|
/external/chromium_org/build/win/importlibs/ |
H A D | create_importlib_win.py | 77 def _WriteDefFile(self, dll_name, import_names, output_file): 79 output_file.write('NAME %s\n' % dll_name) 85 def _CreateObj(self, dll_name, imports): 110 asm_name = dll_name + '.asm' 116 obj_name = dll_name + '.obj' 122 def _CreateImportLib(self, dll_name, imports, architecture, output_file): 123 """Creates an import lib binding imports to dll_name for architecture. 132 obj_file = self._CreateObj(dll_name, imports) 136 def_name = dll_name + '.def' 139 self._WriteDefFile(dll_name, import [all...] |
/external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/ |
H A D | win_pgo_profiler.py | 38 def _GetNextProfileIndex(self, dll_name): 39 """Scan the directory containing the DLL |dll_name| to find the next index 43 dll_name: The name of the DLL for which we want to get the next index to 48 '%s!*.pgc' % dll_name)) 54 def _RunPGOSweep(self, pid, dll_name, index): 59 dll_name: The name of the DLL for which we want the profile data. 64 pgc_filename = '%s\\%s!%d.pgc' % (self._browser_dir, dll_name, index) 67 '%s.dll' % dll_name,
|
/external/chromium_org/third_party/webrtc/modules/audio_device/linux/ |
H A D | latebindingsymboltable_linux.cc | 52 DllHandle InternalLoadDll(const char dll_name[]) { argument 54 DllHandle handle = dlopen(dll_name, RTLD_NOW); 60 "Can't load %s : %s", dll_name, GetDllError());
|
H A D | latebindingsymboltable_linux.h | 54 DllHandle InternalLoadDll(const char dll_name[]);
|
/external/chromium_org/chrome_elf/blacklist/test/ |
H A D | blacklist_test.cc | 36 __declspec(dllimport) bool TestDll_AddDllToBlacklist(const wchar_t* dll_name); 39 const wchar_t* dll_name); 74 const wchar_t* dll_name; member in struct:__anon5972::TestData 158 current_dir.Append(test_data[i].dll_name)); 168 EXPECT_EQ(test_data[i].dll_name, base::string16(blocked_dll)); 172 EXPECT_TRUE(TestDll_RemoveDllFromBlacklist(test_data[i].dll_name)); 173 base::ScopedNativeLibrary dll(current_dir.Append(test_data[i].dll_name)); 182 base::string16 uppercase_name = base::i18n::ToUpper(test_data[i].dll_name); 185 current_dir.Append(test_data[i].dll_name)); 218 EXPECT_TRUE(TestDll_AddDllToBlacklist(test_data[i].dll_name)); [all...] |
/external/chromium_org/sandbox/win/src/ |
H A D | interception_internal.h | 44 wchar_t dll_name[1]; // placeholder for null terminated name member in struct:sandbox::DllPatchInfo
|
H A D | interception.h | 74 // Patches function_name inside dll_name to point to replacement_code_address. 75 // function_name has to be an exported symbol of dll_name. 105 bool AddToPatchedFunctions(const wchar_t* dll_name, 111 // Patches function_name inside dll_name to point to 113 bool AddToPatchedFunctions(const wchar_t* dll_name, 119 // The interception agent will unload the dll with dll_name. 120 bool AddToUnloadModules(const wchar_t* dll_name);
|
H A D | interception.cc | 74 const wchar_t* dll_name, const char* function_name, 80 function.dll = dll_name; 89 const wchar_t* dll_name, const char* function_name, 95 function.dll = dll_name; 105 bool InterceptionManager::AddToUnloadModules(const wchar_t* dll_name) { argument 108 module_to_unload.dll = dll_name; 158 buffer_bytes += RoundUpToMultiple(offsetof(DllPatchInfo, dll_name) + 244 size_t required = offsetof(DllPatchInfo, dll_name) + 258 data.dll._Copy_s(dll_info->dll_name, data.dll.size(), data.dll.size()); 259 dll_info->dll_name[dat 73 AddToPatchedFunctions( const wchar_t* dll_name, const char* function_name, InterceptionType interception_type, const void* replacement_code_address, InterceptorId id) argument 88 AddToPatchedFunctions( const wchar_t* dll_name, const char* function_name, InterceptionType interception_type, const char* replacement_function_name, InterceptorId id) argument [all...] |
H A D | sandbox_policy.h | 234 virtual ResultCode AddDllToUnload(const wchar_t* dll_name) = 0;
|
H A D | interception_agent.cc | 67 current_name.Length = static_cast<USHORT>(g_nt.wcslen(dll_info->dll_name) * 70 current_name.Buffer = const_cast<wchar_t*>(dll_info->dll_name);
|
H A D | sandbox_policy_base.h | 69 virtual ResultCode AddDllToUnload(const wchar_t* dll_name);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | latebindingsymboltable.h | 52 const char *dll_name; member in struct:talk_base::LateBindingSymbolTable::TableInfo
|
H A D | latebindingsymboltable.cc | 96 ASSERT(info_->dll_name != NULL); 97 return LoadFromPath(info_->dll_name);
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | latebindingsymboltable.h | 35 const char *dll_name; member in struct:rtc::LateBindingSymbolTable::TableInfo
|
H A D | latebindingsymboltable.cc | 79 ASSERT(info_->dll_name != NULL); 80 return LoadFromPath(info_->dll_name);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | environment_data_collection_win_unittest.cc | 17 // Helper function that returns true if a dll with filename |dll_name| is 22 const base::FilePath& dll_name) { 27 if (current_dll.BaseName() == dll_name) 19 ProcessReportContainsDll( const safe_browsing::ClientIncidentReport_EnvironmentData_Process& process_report, const base::FilePath& dll_name) argument
|