Searched defs:dll (Results 1 - 16 of 16) sorted by relevance

/external/chromium_org/sandbox/win/src/
H A Dinterception_unittest.cc37 DllPatchInfo *dll = &memory->dll_list[0]; local
40 ASSERT_NE(0u, wcslen(dll->dll_name));
41 ASSERT_EQ(0u, dll->record_bytes % sizeof(size_t));
42 ASSERT_EQ(0u, dll->offset_to_functions % sizeof(size_t));
43 ASSERT_NE(0, dll->num_functions);
46 reinterpret_cast<char*>(dll) + dll->offset_to_functions);
48 for (int j = 0; j < dll->num_functions; j++) {
73 dll = reinterpret_cast<DllPatchInfo*>(reinterpret_cast<char*>(dll)
[all...]
H A Dprocess_mitigations_win32k_interception.cc11 HANDLE dll,
9 TargetGdiDllInitialize( GdiDllInitializeFunction orig_gdi_dll_initialize, HANDLE dll, DWORD reason) argument
H A Dinterception.h41 // L"ntdll.dll", "NtCreateFile",
46 // L"kernel32.dll", "CreateDirectoryW",
119 // The interception agent will unload the dll with dll_name.
139 base::string16 dll; // Name of dll to intercept. member in struct:sandbox::InterceptionManager::InterceptionData
163 // about one dll to patch.
164 // data is the first recorded interception for this dll.
176 // dll_info points to the dll being updated with the interception stored on
201 // thunks is the memory to store all the thunks for this dll (on the child),
202 // and dll_data is a local buffer to hold global dll interceptio
[all...]
H A Dinterception.cc80 function.dll = dll_name;
95 function.dll = dll_name;
108 module_to_unload.dll = dll_name;
153 if (!dlls.count(it->dll)) {
154 // NULL terminate the dll name on the structure
155 size_t dll_name_bytes = (it->dll.size() + 1) * sizeof(wchar_t);
157 // include the dll related size
160 dlls.insert(it->dll);
180 // but keeping together all interceptions that belong to the same dll.
205 const base::string16 dll local
[all...]
H A Dinterceptors_64.cc258 HANDLE dll,
262 return TargetGdiDllInitialize(orig_fn, dll, reason);
257 TargetGdiDllInitialize64( HANDLE dll, DWORD reason) argument
/external/chromium_org/chrome_elf/
H A Delf_imports_unittest.cc52 base::FilePath dll; local
53 ASSERT_TRUE(PathService::Get(base::DIR_EXE, &dll));
54 dll = dll.Append(L"chrome_elf.dll");
55 GetImports(dll, &elf_imports);
64 "KERNEL32.dll",
67 "syzyasan_rtl.dll",
69 "ADVAPI32.dll"
79 ASSERT_TRUE(match) << "Illegal import in chrome_elf.dll
[all...]
/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/
H A Denvironment_data_collection_win.cc28 L"chrome.dll",
29 L"chrome_elf.dll",
30 L"ntdll.dll",
70 ClientIncidentReport_EnvironmentData_Process_Dll* dll = process->add_dll(); local
71 dll->set_path(base::WideToUTF8(base::i18n::ToLower(dll_path.value())));
72 dll->set_base_address(it->base_address);
73 dll->set_length(it->size);
94 if (lsp_paths.count(base::UTF8ToWide(process->dll(i).path()))) {
H A Denvironment_data_collection_win_unittest.cc26 const wchar_t test_dll[] = L"test_name.dll";
28 // Helper function that returns true if a dll with filename |dll_name| is
36 base::FilePath::FromUTF8Unsafe(process_report.dll(i).path());
45 // Look through dll entries and check for the presence of the LSP feature for
46 // |dll|.
50 const std::string& dll) {
52 if (process_report.dll(i).path() == dll) {
53 // Verify each feature of |dll|.
54 for (int j = 0; j < process_report.dll(
47 DllEntryContainsLspFeature( const safe_browsing::ClientIncidentReport_EnvironmentData_Process& process_report, const std::string& dll) argument
[all...]
/external/chromium_org/chrome/app/
H A Dclient_util.cc42 // The entry point signature of chrome.dll.
158 // value not being null to determine if this path contains a valid dll.
248 HMODULE dll = LoadModuleWithDirectory(out_file, dll_name, pre_read); local
249 if (!dll) {
258 dll = LoadModuleWithDirectory(out_file, dll_name, pre_read);
259 if (!dll) {
265 DCHECK(dll);
266 return dll;
269 // Launching is a matter of loading the right dll, setting the CHROME_VERSION
/external/chromium_org/chrome/browser/
H A Denumerate_modules_model_win.cc117 // NOTE: Please keep this list sorted by dll name, then location.
121 // accelerator.dll, "%programfiles%\\speedbit video accelerator\\".
124 // apiqq0.dll, "%temp%\\".
127 // arking0.dll, "%systemroot%\\system32\\".
130 // arking1.dll, "%systemroot%\\system32\\".
133 // aswjsflt.dll, "%ProgramFiles%\\avast software\\avast\\", "AVAST Software".
140 // aswjsflt.dll, "%ProgramFiles%\\alwil software\\avast5\\", "AVAST Software".
149 // bfllr.dll, "%systemroot%\\system32\\".
152 // clickpotatolitesahook.dll, "". Different version each report.
153 { "0396e037.dll", "", "", "", "", AL
540 base::string16 dll; local
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_cryptoapi.c39 = NULL; /* to be loaded from crypt32.dll */
44 HINSTANCE dll; local
52 dll = LoadLibrary("crypt32");
53 if (dll == NULL) {
60 dll, "CryptImportPublicKeyInfo");
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_cryptoapi.c39 = NULL; /* to be loaded from crypt32.dll */
44 HINSTANCE dll; local
52 dll = LoadLibrary("crypt32");
53 if (dll == NULL) {
60 dll, "CryptImportPublicKeyInfo");
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_cryptoapi.c39 = NULL; /* to be loaded from crypt32.dll */
44 HINSTANCE dll; local
52 dll = LoadLibrary("crypt32");
53 if (dll == NULL) {
60 dll, "CryptImportPublicKeyInfo");
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dpcsc_funcs.c120 * dynamically from winscard.dll for now. */
122 static HINSTANCE dll = NULL; /* winscard.dll */ variable
187 if (dll)
190 dll = LoadLibrary("winscard");
191 if (dll == NULL) {
192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
199 dll_ ## s = (void *) GetProcAddress(dll, sym); \
220 "winscard.dll", sym);
221 FreeLibrary(dll);
[all...]
/external/wpa_supplicant_8/src/utils/
H A Dpcsc_funcs.c120 * dynamically from winscard.dll for now. */
122 static HINSTANCE dll = NULL; /* winscard.dll */ variable
187 if (dll)
190 dll = LoadLibrary("winscard");
191 if (dll == NULL) {
192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
199 dll_ ## s = (void *) GetProcAddress(dll, sym); \
220 "winscard.dll", sym);
221 FreeLibrary(dll);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dpcsc_funcs.c120 * dynamically from winscard.dll for now. */
122 static HINSTANCE dll = NULL; /* winscard.dll */ variable
187 if (dll)
190 dll = LoadLibrary("winscard");
191 if (dll == NULL) {
192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
199 dll_ ## s = (void *) GetProcAddress(dll, sym); \
220 "winscard.dll", sym);
221 FreeLibrary(dll);
[all...]

Completed in 546 milliseconds