security/sandbox/win/src/sandbox_factory.h

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
michael@0 2 // Use of this source code is governed by a BSD-style license that can be
michael@0 3 // found in the LICENSE file.
michael@0 4
michael@0 5 #ifndef SANDBOX_SRC_SANDBOX_FACTORY_H__
michael@0 6 #define SANDBOX_SRC_SANDBOX_FACTORY_H__
michael@0 7
michael@0 8 #include "sandbox/win/src/sandbox.h"
michael@0 9
michael@0 10 // SandboxFactory is a set of static methods to get access to the broker
michael@0 11 // or target services object. Only one of the two methods (GetBrokerServices,
michael@0 12 // GetTargetServices) will return a non-null pointer and that should be used
michael@0 13 // as the indication that the process is the broker or the target:
michael@0 14 //
michael@0 15 // BrokerServices* broker_services = SandboxFactory::GetBrokerServices();
michael@0 16 // if (NULL != broker_services) {
michael@0 17 // //we are the broker, call broker api here
michael@0 18 // broker_services->Init();
michael@0 19 // } else {
michael@0 20 // TargetServices* target_services = SandboxFactory::GetTargetServices();
michael@0 21 // if (NULL != target_services) {
michael@0 22 // //we are the target, call target api here
michael@0 23 // target_services->Init();
michael@0 24 // }
michael@0 25 //
michael@0 26 // The methods in this class are expected to be called from a single thread
michael@0 27 //
michael@0 28 // The Sandbox library needs to be linked against the main executable, but
michael@0 29 // sometimes the API calls are issued from a DLL that loads into the exe
michael@0 30 // process. These factory methods then need to be called from the main
michael@0 31 // exe and the interface pointers then can be safely passed to the DLL where
michael@0 32 // the Sandbox API calls are made.
michael@0 33 namespace sandbox {
michael@0 34
michael@0 35 class SandboxFactory {
michael@0 36 public:
michael@0 37 // Returns the Broker API interface, returns NULL if this process is the
michael@0 38 // target.
michael@0 39 static BrokerServices* GetBrokerServices();
michael@0 40
michael@0 41 // Returns the Target API interface, returns NULL if this process is the
michael@0 42 // broker.
michael@0 43 static TargetServices* GetTargetServices();
michael@0 44 private:
michael@0 45 DISALLOW_IMPLICIT_CONSTRUCTORS(SandboxFactory);
michael@0 46 };
michael@0 47
michael@0 48 } // namespace sandbox
michael@0 49
michael@0 50 #endif // SANDBOX_SRC_SANDBOX_FACTORY_H__

mercurial