summaryrefslogtreecommitdiffstats
path: root/sandbox/src/named_pipe_interception.cc
diff options
context:
space:
mode:
authorjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-07-18 00:59:15 +0000
committerjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-07-18 00:59:15 +0000
commit18149178646e45f3d7dde865efbeabbab431799a (patch)
treecc19ce0fc5cc1927695c789212fab93a195b9d9f /sandbox/src/named_pipe_interception.cc
parent4633cdb53427b31197d3c6f991f07bee2a04e0df (diff)
downloadchromium_src-18149178646e45f3d7dde865efbeabbab431799a.zip
chromium_src-18149178646e45f3d7dde865efbeabbab431799a.tar.gz
chromium_src-18149178646e45f3d7dde865efbeabbab431799a.tar.bz2
Move the Windows sandbox to sandbox/win
This is a rather large refactor to move the Windows sandbox to the right place. BUG= TEST= NOTRY=true TBR=sky@chromium.org Review URL: https://chromiumcodereview.appspot.com/10689170 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@147151 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/src/named_pipe_interception.cc')
-rw-r--r--sandbox/src/named_pipe_interception.cc72
1 files changed, 0 insertions, 72 deletions
diff --git a/sandbox/src/named_pipe_interception.cc b/sandbox/src/named_pipe_interception.cc
deleted file mode 100644
index 4599441..0000000
--- a/sandbox/src/named_pipe_interception.cc
+++ /dev/null
@@ -1,72 +0,0 @@
-// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "sandbox/src/named_pipe_interception.h"
-
-#include "sandbox/src/crosscall_client.h"
-#include "sandbox/src/ipc_tags.h"
-#include "sandbox/src/policy_params.h"
-#include "sandbox/src/policy_target.h"
-#include "sandbox/src/sandbox_factory.h"
-#include "sandbox/src/sandbox_nt_util.h"
-#include "sandbox/src/sharedmem_ipc_client.h"
-#include "sandbox/src/target_services.h"
-
-namespace sandbox {
-
-HANDLE WINAPI TargetCreateNamedPipeW(
- CreateNamedPipeWFunction orig_CreateNamedPipeW, LPCWSTR pipe_name,
- DWORD open_mode, DWORD pipe_mode, DWORD max_instance, DWORD out_buffer_size,
- DWORD in_buffer_size, DWORD default_timeout,
- LPSECURITY_ATTRIBUTES security_attributes) {
- HANDLE pipe = orig_CreateNamedPipeW(pipe_name, open_mode, pipe_mode,
- max_instance, out_buffer_size,
- in_buffer_size, default_timeout,
- security_attributes);
- if (INVALID_HANDLE_VALUE != pipe)
- return pipe;
-
- DWORD original_error = ::GetLastError();
-
- // We don't trust that the IPC can work this early.
- if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled())
- return INVALID_HANDLE_VALUE;
-
- // We don't support specific Security Attributes.
- if (security_attributes)
- return INVALID_HANDLE_VALUE;
-
- do {
- void* memory = GetGlobalIPCMemory();
- if (NULL == memory)
- break;
-
- CountedParameterSet<NameBased> params;
- params[NameBased::NAME] = ParamPickerMake(pipe_name);
-
- if (!QueryBroker(IPC_CREATENAMEDPIPEW_TAG, params.GetBase()))
- break;
-
- SharedMemIPCClient ipc(memory);
- CrossCallReturn answer = {0};
- ResultCode code = CrossCall(ipc, IPC_CREATENAMEDPIPEW_TAG, pipe_name,
- open_mode, pipe_mode, max_instance,
- out_buffer_size, in_buffer_size,
- default_timeout, &answer);
- if (SBOX_ALL_OK != code)
- break;
-
- ::SetLastError(answer.win32_result);
-
- if (ERROR_SUCCESS != answer.win32_result)
- return INVALID_HANDLE_VALUE;
-
- return answer.handle;
- } while (false);
-
- ::SetLastError(original_error);
- return INVALID_HANDLE_VALUE;
-}
-
-} // namespace sandbox