Available on Windows only.
Expand description
Windows implementation of dynamic library loading.
Structs§
- Library
- The platform-specific counterpart of the cross-platform
Library
. - Symbol
- A symbol from a library.
Constants§
- LOAD_
IGNORE_ CODE_ AUTHZ_ LEVEL - Do not check AppLocker rules or apply Software Restriction Policies for the DLL.
- LOAD_
LIBRARY_ AS_ DATAFILE - Map the file into the calling process’ virtual address space as if it were a data file.
- LOAD_
LIBRARY_ AS_ DATAFILE_ EXCLUSIVE - Map the file into the calling process’ virtual address space as if it were a data file.
- LOAD_
LIBRARY_ AS_ IMAGE_ RESOURCE - Map the file into the process’ virtual address space as an image file.
- LOAD_
LIBRARY_ REQUIRE_ SIGNED_ TARGET - Specifies that the digital signature of the binary image must be checked at load time.
- LOAD_
LIBRARY_ SAFE_ CURRENT_ DIRS - Allow loading a DLL for execution from the current directory only if it is under a directory in the Safe load list.
- LOAD_
LIBRARY_ SEARCH_ APPLICATION_ DIR - Search the application’s installation directory for the DLL and its dependencies.
- LOAD_
LIBRARY_ SEARCH_ DEFAULT_ DIRS - Search default directories when looking for the DLL and its dependencies.
- LOAD_
LIBRARY_ SEARCH_ DLL_ LOAD_ DIR - Directory that contains the DLL is temporarily added to the beginning of the list of directories that are searched for the DLL’s dependencies.
- LOAD_
LIBRARY_ SEARCH_ SYSTE M32 - Search
%windows%\system32
for the DLL and its dependencies. - LOAD_
LIBRARY_ SEARCH_ USER_ DIRS - Directories added using the
AddDllDirectory
or theSetDllDirectory
function are searched for the DLL and its dependencies. - LOAD_
WITH_ ALTERED_ SEARCH_ PATH - If
filename
specifies an absolute path, the system uses the alternate file search strategy discussed in the [Remarks section] to find associated executable modules that the specified module causes to be loaded.