/development/host/windows/prebuilt/usb/ |
Android.mk | 16 LOCAL_SRC_FILES_x86 := AdbWinApi.dll 17 LOCAL_MODULE_SUFFIX := .dll 25 LOCAL_SRC_FILES_x86 := AdbWinUsbApi.dll 26 LOCAL_MODULE_SUFFIX := .dll
|
/external/chromium_org/third_party/angle/src/ |
copy_compiler_dll.bat | 4 copy %2"\Redist\D3D\"%_arch%"\d3dcompiler_46.dll" %3 > NUL
|
/external/chromium_org/third_party/libusb/src/libusb/os/ |
windows_common.h | 74 #define DLL_STRINGIFY(dll) #dll 75 #define DLL_GET_MODULE_HANDLE(dll) GetModuleHandleA(DLL_STRINGIFY(dll)) 76 #define DLL_LOAD_LIBRARY(dll) LoadLibraryA(DLL_STRINGIFY(dll)) 78 #define DLL_STRINGIFY(dll) L#dll 79 #define DLL_GET_MODULE_HANDLE(dll) GetModuleHandle(DLL_STRINGIFY(dll)) [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/d3d1x/mstools/ |
download-mstools | 3 for i in fxc.exe D3DCompiler_43.dll d3dx9_43.dll d3dx10_43.dll d3dx11_43.dll; do 69 cabextract -F "*.dll" "$i"
|
/external/mesa3d/src/gallium/state_trackers/d3d1x/mstools/ |
download-mstools | 3 for i in fxc.exe D3DCompiler_43.dll d3dx9_43.dll d3dx10_43.dll d3dx11_43.dll; do 69 cabextract -F "*.dll" "$i"
|
/external/chromium_org/sandbox/win/src/ |
process_mitigations_win32k_interception.h | 17 HANDLE dll, 28 HANDLE dll,
|
process_mitigations_win32k_interception.cc | 11 HANDLE dll,
|
interception.h | 41 // L"ntdll.dll", "NtCreateFile", 46 // L"kernel32.dll", "CreateDirectoryW", 119 // The interception agent will unload the dll with dll_name. 139 base::string16 dll; // Name of dll to intercept. member in struct:sandbox::InterceptionManager::InterceptionData 163 // about one dll to patch. 164 // data is the first recorded interception for this dll. 176 // dll_info points to the dll being updated with the interception stored on 201 // thunks is the memory to store all the thunks for this dll (on the child), 202 // and dll_data is a local buffer to hold global dll interception info [all...] |
interception_unittest.cc | 37 DllPatchInfo *dll = &memory->dll_list[0]; local 40 ASSERT_NE(0u, wcslen(dll->dll_name)); 41 ASSERT_EQ(0u, dll->record_bytes % sizeof(size_t)); 42 ASSERT_EQ(0u, dll->offset_to_functions % sizeof(size_t)); 43 ASSERT_NE(0, dll->num_functions); 46 reinterpret_cast<char*>(dll) + dll->offset_to_functions); 48 for (int j = 0; j < dll->num_functions; j++) { 73 dll = reinterpret_cast<DllPatchInfo*>(reinterpret_cast<char*>(dll) [all...] |
interception.cc | 80 function.dll = dll_name; 95 function.dll = dll_name; 108 module_to_unload.dll = dll_name; 153 if (!dlls.count(it->dll)) { 154 // NULL terminate the dll name on the structure 155 size_t dll_name_bytes = (it->dll.size() + 1) * sizeof(wchar_t); 157 // include the dll related size 160 dlls.insert(it->dll); 180 // but keeping together all interceptions that belong to the same dll. 205 const base::string16 dll = it->dll local [all...] |
/external/chromium_org/third_party/apache-win32/ |
remove_files_not_needed_for_chromium.sh | 18 -path ./bin/libapr-1.dll -o \ 19 -path ./bin/libapriconv-1.dll -o \ 20 -path ./bin/libaprutil-1.dll -o \ 21 -path ./bin/libeay32.dll -o \ 22 -path ./bin/libhttpd.dll -o \ 24 -path ./bin/php5ts.dll -o \ 25 -path ./bin/ssleay32.dll -o \ 26 -path ./bin/zlib1.dll -o \ 41 -path ./modules/php5apache2_2.dll -o \
|
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/d3d1x/winedlls/ |
Makefile | 11 sudo install */*.dll.so /usr/lib/wine
|
/external/chromium_org/third_party/sqlite/src/ |
mkextw.sh | 21 -dllname fts2.dll -lmsvcrt fts2amal.o 22 zip fts2dll.zip fts2.dll fts2.def
|
/external/mesa3d/src/gallium/state_trackers/d3d1x/winedlls/ |
Makefile | 11 sudo install */*.dll.so /usr/lib/wine
|
/external/chromium_org/tools/python/google/httpd_config/ |
httpd.conf | 201 # LoadModule foo_module lib/apache/mod_foo.dll 202 #LoadModule vhost_alias_module lib/apache/mod_vhost_alias.dll 203 #LoadModule env_module lib/apache/mod_env.dll 204 LoadModule config_log_module lib/apache/mod_log_config.dll 205 #LoadModule mime_magic_module lib/apache/mod_mime_magic.dll 206 LoadModule mime_module lib/apache/mod_mime.dll 207 LoadModule negotiation_module lib/apache/mod_negotiation.dll 208 #LoadModule status_module lib/apache/mod_status.dll 209 #LoadModule info_module lib/apache/mod_info.dll 210 LoadModule includes_module lib/apache/mod_include.dll [all...] |
/external/chromium_org/chrome_elf/ |
elf_imports_unittest.cc | 52 base::FilePath dll; local 53 ASSERT_TRUE(PathService::Get(base::DIR_EXE, &dll)); 54 dll = dll.Append(L"chrome_elf.dll"); 55 GetImports(dll, &elf_imports); 64 "KERNEL32.dll", 67 "syzyasan_rtl.dll", 69 "ADVAPI32.dll" 79 ASSERT_TRUE(match) << "Illegal import in chrome_elf.dll." [all...] |
/development/build/ |
sdk-windows-x86.atree | 37 bin/AdbWinUsbApi.dll platform-tools/AdbWinUsbApi.dll 38 bin/AdbWinApi.dll platform-tools/AdbWinApi.dll 82 lib/libLLVM.dll strip build-tools/${PLATFORM_NAME}/libLLVM.dll 85 lib/libclang.dll strip build-tools/${PLATFORM_NAME}/libclang.dll 90 lib/libbcc.dll strip build-tools/${PLATFORM_NAME}/libbcc.dll [all...] |
/external/chromium_org/third_party/mesa/src/scons/ |
crossmingw.py | 81 dll = env.FindIxes(target, 'SHLIBPREFIX', 'SHLIBSUFFIX') 82 if dll: cmd.extend(['-o', dll]) 95 dll = env.FindIxes(target, 'SHLIBPREFIX', 'SHLIBSUFFIX') 98 if not dll: 105 target.append(env.ReplaceIxes(dll, 116 target.append(env.ReplaceIxes(dll, 220 env['SHLIBSUFFIX'] = '.dll'
|
/external/mesa3d/scons/ |
crossmingw.py | 81 dll = env.FindIxes(target, 'SHLIBPREFIX', 'SHLIBSUFFIX') 82 if dll: cmd.extend(['-o', dll]) 95 dll = env.FindIxes(target, 'SHLIBPREFIX', 'SHLIBSUFFIX') 98 if not dll: 105 target.append(env.ReplaceIxes(dll, 116 target.append(env.ReplaceIxes(dll, 220 env['SHLIBSUFFIX'] = '.dll'
|
/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/ |
environment_data_collection_win_unittest.cc | 26 const wchar_t test_dll[] = L"test_name.dll"; 28 // Helper function that returns true if a dll with filename |dll_name| is 36 base::FilePath::FromUTF8Unsafe(process_report.dll(i).path()); 45 // Look through dll entries and check for the presence of the LSP feature for 46 // |dll|. 50 const std::string& dll) { 52 if (process_report.dll(i).path() == dll) { 53 // Verify each feature of |dll|. 54 for (int j = 0; j < process_report.dll(i).feature_size(); ++j) [all...] |
environment_data_collection_win.cc | 28 L"chrome.dll", 29 L"chrome_elf.dll", 30 L"ntdll.dll", 70 ClientIncidentReport_EnvironmentData_Process_Dll* dll = process->add_dll(); local 71 dll->set_path(base::WideToUTF8(base::i18n::ToLower(dll_path.value()))); 72 dll->set_base_address(it->base_address); 73 dll->set_length(it->size); 94 if (lsp_paths.count(base::UTF8ToWide(process->dll(i).path()))) {
|
/development/build/tools/ |
patch_windows_sdk.sh | 89 for i in fastboot.exe adb.exe AdbWinApi.dll AdbWinUsbApi.dll; do
|
/external/chromium_org/native_client_sdk/src/libraries/third_party/pthreads-win32/ |
Makefile | 2 # replacement for buildlib.bat. I've changed the target from an ordinary dll 3 # (/LD) to a debugging dll (/LDd). 6 # dll and the lib, respectively. Probably all that needs to change is $DEVROOT. 16 DLLDEST = $(DEVROOT)\dll 20 DLLS = pthreadVCE$(DLL_VER).dll pthreadVSE$(DLL_VER).dll pthreadVC$(DLL_VER).dll \ 21 pthreadVCE$(DLL_VERD).dll pthreadVSE$(DLL_VERD).dll pthreadVC$(DLL_VERD).dll [all...] |
/external/chromium_org/third_party/icu/source/config/ |
mh-os390 | 53 # For a dynamically called DLL module to share access to the POSIX external 54 # variables, with its caller, the DLL module must define these _SHR_* macros. 66 # The DLL option must be used by the callee and caller code when using shared libraries. 69 CFLAGS += -Wc,DLL,ROS,RENT,'ARCH(7)','LOC(POSIX)',NOANSIALIAS,'LANGLVL(EXTENDED)' $(ICU_IEEE) 70 CXXFLAGS += -Wc,DLL,ROS,RTTI,'ARCH(7)','LOC(POSIX)',NOANSIALIAS,'LANGLVL(EXTENDED)' $(ICU_IEEE) -+ 105 LINK.c= $(COMPILE_LINK_ENVVAR) $(CC) $(CFLAGS) -Wl,dll $(LDFLAGS) $(ICU_XPLINK_L) 106 LINK.cc= $(COMPILE_LINK_ENVVAR) $(CXX) $(CXXFLAGS) -Wl,dll $(LDFLAGS) $(ICU_XPLINK_L) 108 ## Commands for shared library (dll) 187 SO = dll
|
/external/chromium_org/third_party/icu/source/samples/ufortune/ |
fortunedefs.mk | 6 # dll - will create a dynamically linked library 28 # DLL and static modes are identical here 29 ifeq ($(RESMODE),dll)
|