This source file includes following definitions.
- CreateNamedPipeHelper
- GenerateRules
- CreateNamedPipeAction
#include "sandbox/win/src/named_pipe_policy.h"
#include <string>
#include "sandbox/win/src/ipc_tags.h"
#include "sandbox/win/src/policy_engine_opcodes.h"
#include "sandbox/win/src/policy_params.h"
#include "sandbox/win/src/sandbox_types.h"
namespace {
HANDLE CreateNamedPipeHelper(HANDLE target_process, LPCWSTR pipe_name,
DWORD open_mode, DWORD pipe_mode,
DWORD max_instances, DWORD out_buffer_size,
DWORD in_buffer_size, DWORD default_timeout,
LPSECURITY_ATTRIBUTES security_attributes) {
HANDLE pipe = ::CreateNamedPipeW(pipe_name, open_mode, pipe_mode,
max_instances, out_buffer_size,
in_buffer_size, default_timeout,
security_attributes);
if (INVALID_HANDLE_VALUE == pipe)
return pipe;
HANDLE new_pipe;
if (!::DuplicateHandle(::GetCurrentProcess(), pipe,
target_process, &new_pipe,
0, FALSE,
DUPLICATE_CLOSE_SOURCE | DUPLICATE_SAME_ACCESS)) {
return INVALID_HANDLE_VALUE;
}
return new_pipe;
}
}
namespace sandbox {
bool NamedPipePolicy::GenerateRules(const wchar_t* name,
TargetPolicy::Semantics semantics,
LowLevelPolicy* policy) {
if (TargetPolicy::NAMEDPIPES_ALLOW_ANY != semantics) {
return false;
}
PolicyRule pipe(ASK_BROKER);
if (!pipe.AddStringMatch(IF, NameBased::NAME, name, CASE_INSENSITIVE)) {
return false;
}
if (!policy->AddRule(IPC_CREATENAMEDPIPEW_TAG, &pipe)) {
return false;
}
return true;
}
DWORD NamedPipePolicy::CreateNamedPipeAction(EvalResult eval_result,
const ClientInfo& client_info,
const base::string16 &name,
DWORD open_mode, DWORD pipe_mode,
DWORD max_instances,
DWORD out_buffer_size,
DWORD in_buffer_size,
DWORD default_timeout,
HANDLE* pipe) {
if (ASK_BROKER != eval_result) {
return ERROR_ACCESS_DENIED;
}
*pipe = CreateNamedPipeHelper(client_info.process, name.c_str(),
open_mode, pipe_mode, max_instances,
out_buffer_size, in_buffer_size,
default_timeout, NULL);
if (INVALID_HANDLE_VALUE == *pipe)
return ERROR_ACCESS_DENIED;
return ERROR_SUCCESS;
}
}