Index: content/common/sandbox_win.h |
diff --git a/content/common/sandbox_win.h b/content/common/sandbox_win.h |
index f2800fd5d2804503a237ffbacbfb6e83ea3a43da..c3afea96824fd45811e80ed1ae5252ba4eae92af 100644 |
--- a/content/common/sandbox_win.h |
+++ b/content/common/sandbox_win.h |
@@ -7,40 +7,17 @@ |
#include <stdint.h> |
-#include "content/common/content_export.h" |
-#include "sandbox/win/src/security_level.h" |
- |
-namespace base { |
-class CommandLine; |
-} |
+#include <windows.h> |
-namespace sandbox { |
-class BrokerServices; |
-class TargetPolicy; |
-class TargetServices; |
-} |
+#include "content/common/content_export.h" |
namespace content { |
-// Wrapper around sandbox::TargetPolicy::SetJobLevel that checks if the sandbox |
-// should be let to run without a job object assigned. |
-void SetJobLevel(const base::CommandLine& cmd_line, |
- sandbox::JobLevel job_level, |
- uint32_t ui_exceptions, |
- sandbox::TargetPolicy* policy); |
- |
-// Closes handles that are opened at process creation and initialization. |
-void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy); |
- |
-// Add AppContainer policy for |sid| on supported OS. |
-void AddAppContainerPolicy(sandbox::TargetPolicy* policy, const wchar_t* sid); |
- |
-// Add the win32k lockdown policy on supported OS. |
-bool AddWin32kLockdownPolicy(sandbox::TargetPolicy* policy); |
- |
-bool InitBrokerServices(sandbox::BrokerServices* broker_services); |
- |
-bool InitTargetServices(sandbox::TargetServices* target_services); |
+bool BrokerDuplicateHandle(HANDLE source_handle, |
+ DWORD target_process_id, |
+ HANDLE* target_handle, |
+ DWORD desired_access, |
+ DWORD options); |
} // namespace content |