Searched refs:dll_name (Results 1 - 25 of 26) sorted by relevance

12

/external/chromium_org/chrome_elf/dll_hash/
H A Ddll_hash.cc8 int DllNameToHash(std::string dll_name) { argument
9 uint32 data = base::Hash(dll_name);
H A Ddll_hash.h11 int DllNameToHash(std::string dll_name);
/external/chromium_org/chrome/app/
H A Ddelay_load_hook_win.cc34 std::string dll_name(info->szDll);
36 if (EndsWith(dll_name, kDelaySuffix, false)) {
38 dll_name.resize(dll_name.length() - (sizeof(kDelaySuffix) - 1));
39 dll_name.append(".dll");
41 return reinterpret_cast<FARPROC>(::LoadLibraryA(dll_name.c_str()));
H A Ddelay_load_hook_unittest_win.cc30 void SetupInfo(const char* dll_name) { argument
34 info_.szDll = dll_name;
H A Dclient_util.cc160 const wchar_t* dll_name,
163 dir->append(dll_name);
238 const wchar_t* dll_name = metro_mode_ ? local
248 HMODULE dll = LoadModuleWithDirectory(out_file, dll_name, pre_read);
258 dll = LoadModuleWithDirectory(out_file, dll_name, pre_read);
159 LoadModuleWithDirectory(base::string16* dir, const wchar_t* dll_name, bool pre_read) argument
/external/chromium_org/chrome_elf/blacklist/
H A Dblacklist.h43 // Returns the index of the DLL named |dll_name| on the blacklist, or -1 if not
45 extern "C" int GetBlacklistIndex(const wchar_t* dll_name);
49 // |dll_name| and will leak it on exit if the string is not subsequently removed
52 extern "C" bool AddDllToBlacklist(const wchar_t* dll_name);
57 extern "C" bool RemoveDllFromBlacklist(const wchar_t* dll_name);
H A Dblacklist.cc232 int GetBlacklistIndex(const wchar_t* dll_name) { argument
234 if (_wcsicmp(dll_name, g_troublesome_dlls[i]) == 0)
240 bool AddDllToBlacklist(const wchar_t* dll_name) { argument
246 if (!_wcsicmp(g_troublesome_dlls[i], dll_name))
251 wchar_t* str_buffer = new wchar_t[wcslen(dll_name) + 1];
252 wcscpy(str_buffer, dll_name);
259 bool RemoveDllFromBlacklist(const wchar_t* dll_name) { argument
262 if (!_wcsicmp(g_troublesome_dlls[i], dll_name)) {
/external/compiler-rt/test/asan/TestCases/Windows/
H A Ddll_host.cc27 const char *dll_name = argv[1]; local
29 HMODULE h = LoadLibrary(dll_name);
32 dll_name, GetLastError());
/external/chromium_org/sandbox/win/sandbox_poc/
H A Dsandbox.cc18 std::string * dll_name,
21 DCHECK(dll_name);
24 if (!dll_name || !entry_point || !log_file)
41 *dll_name = std::string(dll_name_wide.begin(), dll_name_wide.end());
128 std::string dll_name, entry_point; local
131 &dll_name,
152 HMODULE dll_module = ::LoadLibraryA(dll_name.c_str());
17 ParseCommandLine(wchar_t * command_line, std::string * dll_name, std::string * entry_point, base::string16 * log_file) argument
/external/chromium_org/build/win/importlibs/
H A Dcreate_importlib_win.py77 def _WriteDefFile(self, dll_name, import_names, output_file):
79 output_file.write('NAME %s\n' % dll_name)
85 def _CreateObj(self, dll_name, imports):
110 asm_name = dll_name + '.asm'
116 obj_name = dll_name + '.obj'
122 def _CreateImportLib(self, dll_name, imports, architecture, output_file):
123 """Creates an import lib binding imports to dll_name for architecture.
132 obj_file = self._CreateObj(dll_name, imports)
136 def_name = dll_name + '.def'
139 self._WriteDefFile(dll_name, import
[all...]
/external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/
H A Dwin_pgo_profiler.py37 def _GetNextProfileIndex(self, dll_name):
38 """Scan the directory containing the DLL |dll_name| to find the next index
42 dll_name: The name of the DLL for which we want to get the next index to
47 '%s!*.pgc' % dll_name))
53 def _RunPGOSweep(self, pid, dll_name, index):
58 dll_name: The name of the DLL for which we want the profile data.
63 pgc_filename = '%s\\%s!%d.pgc' % (self._browser_dir, dll_name, index)
66 '%s.dll' % dll_name,
/external/chromium_org/third_party/webrtc/modules/audio_device/linux/
H A Dlatebindingsymboltable_linux.cc52 DllHandle InternalLoadDll(const char dll_name[]) { argument
54 DllHandle handle = dlopen(dll_name, RTLD_NOW);
60 "Can't load %s : %s", dll_name, GetDllError());
H A Dlatebindingsymboltable_linux.h54 DllHandle InternalLoadDll(const char dll_name[]);
/external/chromium_org/chrome_elf/blacklist/test/
H A Dblacklist_test.cc36 __declspec(dllimport) bool TestDll_AddDllToBlacklist(const wchar_t* dll_name);
39 const wchar_t* dll_name);
74 const wchar_t* dll_name; member in struct:__anon6044::TestData
168 current_dir.Append(test_data[i].dll_name));
178 EXPECT_EQ(test_data[i].dll_name, base::string16(blocked_dll));
182 EXPECT_TRUE(TestDll_RemoveDllFromBlacklist(test_data[i].dll_name));
183 base::ScopedNativeLibrary dll(current_dir.Append(test_data[i].dll_name));
192 base::string16 uppercase_name = base::i18n::ToUpper(test_data[i].dll_name);
195 current_dir.Append(test_data[i].dll_name));
228 EXPECT_TRUE(TestDll_AddDllToBlacklist(test_data[i].dll_name));
[all...]
/external/chromium_org/sandbox/win/src/
H A Dinterception_internal.h44 wchar_t dll_name[1]; // placeholder for null terminated name member in struct:sandbox::DllPatchInfo
H A Dinterception.h74 // Patches function_name inside dll_name to point to replacement_code_address.
75 // function_name has to be an exported symbol of dll_name.
105 bool AddToPatchedFunctions(const wchar_t* dll_name,
111 // Patches function_name inside dll_name to point to
113 bool AddToPatchedFunctions(const wchar_t* dll_name,
119 // The interception agent will unload the dll with dll_name.
120 bool AddToUnloadModules(const wchar_t* dll_name);
H A Dinterception.cc74 const wchar_t* dll_name, const char* function_name,
80 function.dll = dll_name;
89 const wchar_t* dll_name, const char* function_name,
95 function.dll = dll_name;
105 bool InterceptionManager::AddToUnloadModules(const wchar_t* dll_name) { argument
108 module_to_unload.dll = dll_name;
158 buffer_bytes += RoundUpToMultiple(offsetof(DllPatchInfo, dll_name) +
244 size_t required = offsetof(DllPatchInfo, dll_name) +
258 data.dll._Copy_s(dll_info->dll_name, data.dll.size(), data.dll.size());
259 dll_info->dll_name[dat
73 AddToPatchedFunctions( const wchar_t* dll_name, const char* function_name, InterceptionType interception_type, const void* replacement_code_address, InterceptorId id) argument
88 AddToPatchedFunctions( const wchar_t* dll_name, const char* function_name, InterceptionType interception_type, const char* replacement_function_name, InterceptorId id) argument
[all...]
H A Dsandbox_policy.h234 virtual ResultCode AddDllToUnload(const wchar_t* dll_name) = 0;
H A Dinterception_agent.cc67 current_name.Length = static_cast<USHORT>(g_nt.wcslen(dll_info->dll_name) *
70 current_name.Buffer = const_cast<wchar_t*>(dll_info->dll_name);
H A Dsandbox_policy_base.h69 virtual ResultCode AddDllToUnload(const wchar_t* dll_name);
H A Dinterception_unittest.cc40 ASSERT_NE(0u, wcslen(dll->dll_name));
/external/chromium_org/third_party/webrtc/base/
H A Dlatebindingsymboltable.h35 const char *dll_name; member in struct:rtc::LateBindingSymbolTable::TableInfo
H A Dlatebindingsymboltable.cc79 ASSERT(info_->dll_name != NULL);
80 return LoadFromPath(info_->dll_name);
/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/
H A Denvironment_data_collection_win.cc107 base::FilePath dll_name(iter.Value());
108 path_sanitizer.StripHomeDirectory(&dll_name);
109 process->add_blacklisted_dll(dll_name.AsUTF8Unsafe());
H A Denvironment_data_collection_win_unittest.cc28 // Helper function that returns true if a dll with filename |dll_name| is
33 const base::FilePath& dll_name) {
38 if (current_dll.BaseName() == dll_name)
30 ProcessReportContainsDll( const safe_browsing::ClientIncidentReport_EnvironmentData_Process& process_report, const base::FilePath& dll_name) argument

Completed in 411 milliseconds

12