Index: sandbox/win/src/handle_interception.cc |
diff --git a/sandbox/win/src/handle_interception.cc b/sandbox/win/src/handle_interception.cc |
deleted file mode 100644 |
index a0df8d653d40d9facfb6e54d29a50bb722464f31..0000000000000000000000000000000000000000 |
--- a/sandbox/win/src/handle_interception.cc |
+++ /dev/null |
@@ -1,45 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "sandbox/win/src/handle_interception.h" |
- |
-#include "sandbox/win/src/crosscall_client.h" |
-#include "sandbox/win/src/ipc_tags.h" |
-#include "sandbox/win/src/sandbox_factory.h" |
-#include "sandbox/win/src/sandbox_nt_util.h" |
-#include "sandbox/win/src/sharedmem_ipc_client.h" |
-#include "sandbox/win/src/target_services.h" |
- |
-namespace sandbox { |
- |
-ResultCode DuplicateHandleProxy(HANDLE source_handle, |
- DWORD target_process_id, |
- HANDLE* target_handle, |
- DWORD desired_access, |
- DWORD options) { |
- *target_handle = NULL; |
- |
- void* memory = GetGlobalIPCMemory(); |
- if (NULL == memory) |
- return SBOX_ERROR_NO_SPACE; |
- |
- SharedMemIPCClient ipc(memory); |
- CrossCallReturn answer = {0}; |
- ResultCode code = CrossCall(ipc, IPC_DUPLICATEHANDLEPROXY_TAG, |
- source_handle, target_process_id, |
- desired_access, options, &answer); |
- if (SBOX_ALL_OK != code) |
- return code; |
- |
- if (answer.win32_result) { |
- ::SetLastError(answer.win32_result); |
- return SBOX_ERROR_GENERIC; |
- } |
- |
- *target_handle = answer.handle; |
- return SBOX_ALL_OK; |
-} |
- |
-} // namespace sandbox |
- |