| Index: sandbox/src/named_pipe_policy.cc
|
| diff --git a/sandbox/src/named_pipe_policy.cc b/sandbox/src/named_pipe_policy.cc
|
| deleted file mode 100644
|
| index 00182cf84c43ba3688dbdee5f0bb85055236712f..0000000000000000000000000000000000000000
|
| --- a/sandbox/src/named_pipe_policy.cc
|
| +++ /dev/null
|
| @@ -1,86 +0,0 @@
|
| -// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sandbox/src/named_pipe_policy.h"
|
| -
|
| -#include <string>
|
| -
|
| -#include "sandbox/src/ipc_tags.h"
|
| -#include "sandbox/src/policy_engine_opcodes.h"
|
| -#include "sandbox/src/policy_params.h"
|
| -#include "sandbox/src/sandbox_types.h"
|
| -
|
| -namespace {
|
| -
|
| -// Creates a named pipe and duplicates the handle to 'target_process'. The
|
| -// remaining parameters are the same as CreateNamedPipeW().
|
| -HANDLE CreateNamedPipeHelper(HANDLE target_process, LPCWSTR pipe_name,
|
| - DWORD open_mode, DWORD pipe_mode,
|
| - DWORD max_instances, DWORD out_buffer_size,
|
| - DWORD in_buffer_size, DWORD default_timeout,
|
| - LPSECURITY_ATTRIBUTES security_attributes) {
|
| - HANDLE pipe = ::CreateNamedPipeW(pipe_name, open_mode, pipe_mode,
|
| - max_instances, out_buffer_size,
|
| - in_buffer_size, default_timeout,
|
| - security_attributes);
|
| - if (INVALID_HANDLE_VALUE == pipe)
|
| - return pipe;
|
| -
|
| - HANDLE new_pipe;
|
| - if (!::DuplicateHandle(::GetCurrentProcess(), pipe, target_process, &new_pipe,
|
| - 0, FALSE, DUPLICATE_CLOSE_SOURCE |
|
| - DUPLICATE_SAME_ACCESS)) {
|
| - ::CloseHandle(pipe);
|
| - return INVALID_HANDLE_VALUE;
|
| - }
|
| -
|
| - return new_pipe;
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -namespace sandbox {
|
| -
|
| -bool NamedPipePolicy::GenerateRules(const wchar_t* name,
|
| - TargetPolicy::Semantics semantics,
|
| - LowLevelPolicy* policy) {
|
| - if (TargetPolicy::NAMEDPIPES_ALLOW_ANY != semantics) {
|
| - return false;
|
| - }
|
| - PolicyRule pipe(ASK_BROKER);
|
| - if (!pipe.AddStringMatch(IF, NameBased::NAME, name, CASE_INSENSITIVE)) {
|
| - return false;
|
| - }
|
| - if (!policy->AddRule(IPC_CREATENAMEDPIPEW_TAG, &pipe)) {
|
| - return false;
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -DWORD NamedPipePolicy::CreateNamedPipeAction(EvalResult eval_result,
|
| - const ClientInfo& client_info,
|
| - const std::wstring &name,
|
| - DWORD open_mode, DWORD pipe_mode,
|
| - DWORD max_instances,
|
| - DWORD out_buffer_size,
|
| - DWORD in_buffer_size,
|
| - DWORD default_timeout,
|
| - HANDLE* pipe) {
|
| - // The only action supported is ASK_BROKER which means create the pipe.
|
| - if (ASK_BROKER != eval_result) {
|
| - return ERROR_ACCESS_DENIED;
|
| - }
|
| -
|
| - *pipe = CreateNamedPipeHelper(client_info.process, name.c_str(),
|
| - open_mode, pipe_mode, max_instances,
|
| - out_buffer_size, in_buffer_size,
|
| - default_timeout, NULL);
|
| -
|
| - if (INVALID_HANDLE_VALUE == *pipe)
|
| - return ERROR_ACCESS_DENIED;
|
| -
|
| - return ERROR_SUCCESS;
|
| -}
|
| -
|
| -} // namespace sandbox
|
|
|