| Index: content/public/common/sandbox_init.h
|
| diff --git a/content/public/common/sandbox_init.h b/content/public/common/sandbox_init.h
|
| index cbd8142fc9fcd7cf8d65c71d2741d67590d7cb11..44802dcb37ad026b58b567822799f4b35041d574 100644
|
| --- a/content/public/common/sandbox_init.h
|
| +++ b/content/public/common/sandbox_init.h
|
| @@ -41,16 +41,6 @@ class SandboxedProcessLauncherDelegate;
|
| CONTENT_EXPORT bool InitializeSandbox(
|
| sandbox::SandboxInterfaceInfo* sandbox_info);
|
|
|
| -// This is a restricted version of Windows' DuplicateHandle() function
|
| -// that works inside the sandbox and can send handles but not retrieve
|
| -// them. Unlike DuplicateHandle(), it takes a process ID rather than
|
| -// a process handle. It returns true on success, false otherwise.
|
| -CONTENT_EXPORT bool BrokerDuplicateHandle(HANDLE source_handle,
|
| - DWORD target_process_id,
|
| - HANDLE* target_handle,
|
| - DWORD desired_access,
|
| - DWORD options);
|
| -
|
| // Inform the current process's sandbox broker (e.g. the broker for
|
| // 32-bit processes) about a process created under a different sandbox
|
| // broker (e.g. the broker for 64-bit processes). This allows
|
|
|