Index: recovery/repair_exe/mspexecutableelevator.h |
diff --git a/recovery/repair_exe/mspexecutableelevator.h b/recovery/repair_exe/mspexecutableelevator.h |
deleted file mode 100644 |
index 0cc35d50b2bc6db16fdb5700c12c718c4f6bd488..0000000000000000000000000000000000000000 |
--- a/recovery/repair_exe/mspexecutableelevator.h |
+++ /dev/null |
@@ -1,65 +0,0 @@ |
-// Copyright 2007-2009 Google Inc. |
-// |
-// Licensed under the Apache License, Version 2.0 (the "License"); |
-// you may not use this file except in compliance with the License. |
-// You may obtain a copy of the License at |
-// |
-// http://www.apache.org/licenses/LICENSE-2.0 |
-// |
-// Unless required by applicable law or agreed to in writing, software |
-// distributed under the License is distributed on an "AS IS" BASIS, |
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
-// See the License for the specific language governing permissions and |
-// limitations under the License. |
-// ======================================================================== |
-// |
-// This is the API for verifying and executing an executable under high |
-// integrity using an Msi Patch. This API assumes its needed Msi has already |
-// been installed and its needed Msp is in the same directory as this module. |
-// |
-// This class encapsulates the code for passing information between a process |
-// requesting that an executable be elevated and the custom action DLL |
-// in the patch which actually elevates the executable. |
- |
-#ifndef OMAHA_RECOVERY_REPAIR_EXE_MSPEXECUTABLEELEVATOR_H__ |
-#define OMAHA_RECOVERY_REPAIR_EXE_MSPEXECUTABLEELEVATOR_H__ |
- |
-#include <windows.h> |
-#include <tchar.h> |
- |
-namespace omaha { |
- |
-namespace msp_executable_elevator { |
- |
-// The following function should be called by the code requesting that |
-// an executable be elevated: |
- |
-// Use an MSI patch to verify and execute an executable. Returns a handle |
-// to the process executed. |
-HRESULT ExecuteGoogleSignedExe(const TCHAR* executable, |
- const TCHAR* arguments, |
- const TCHAR* kProductGuid, |
- const TCHAR* kPatchGuid, |
- const TCHAR* kPatchName, |
- HANDLE* process); |
- |
-// The following functions should be called by the code (i.e., the custom action |
-// DLL) that actually elevates the executable: |
- |
-// From the command line passed to the MSP, retrieve the parameters that will be |
-// passed to VerifyFileAndExecute. |
-// This function is destructive to the passed command line buffer. The pointers |
-// "executable" and "arguments" will point into the command line buffer. |
-bool ParseMSPCommandLine(TCHAR* command_line, |
- TCHAR** executable, |
- TCHAR** arguments, |
- DWORD* calling_process_id); |
- |
-// Records the result of the call to VerifyFileAndExecute. |
-bool SetResultOfExecute(HANDLE process, HRESULT result); |
- |
-} // namespace msp_executable_elevator |
- |
-} // namespace omaha |
- |
-#endif // OMAHA_RECOVERY_REPAIR_EXE_MSPEXECUTABLEELEVATOR_H__ |