Index: content/public/common/sandbox_init.h |
diff --git a/content/public/common/sandbox_init.h b/content/public/common/sandbox_init.h |
index cbd8142fc9fcd7cf8d65c71d2741d67590d7cb11..44802dcb37ad026b58b567822799f4b35041d574 100644 |
--- a/content/public/common/sandbox_init.h |
+++ b/content/public/common/sandbox_init.h |
@@ -41,16 +41,6 @@ class SandboxedProcessLauncherDelegate; |
CONTENT_EXPORT bool InitializeSandbox( |
sandbox::SandboxInterfaceInfo* sandbox_info); |
-// This is a restricted version of Windows' DuplicateHandle() function |
-// that works inside the sandbox and can send handles but not retrieve |
-// them. Unlike DuplicateHandle(), it takes a process ID rather than |
-// a process handle. It returns true on success, false otherwise. |
-CONTENT_EXPORT bool BrokerDuplicateHandle(HANDLE source_handle, |
- DWORD target_process_id, |
- HANDLE* target_handle, |
- DWORD desired_access, |
- DWORD options); |
- |
// Inform the current process's sandbox broker (e.g. the broker for |
// 32-bit processes) about a process created under a different sandbox |
// broker (e.g. the broker for 64-bit processes). This allows |