summaryrefslogtreecommitdiffstats
path: root/security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h
diff options
context:
space:
mode:
Diffstat (limited to 'security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h')
-rw-r--r--security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h91
1 files changed, 91 insertions, 0 deletions
diff --git a/security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h b/security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h
new file mode 100644
index 0000000000..0c2b2dff95
--- /dev/null
+++ b/security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h
@@ -0,0 +1,91 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_
+#define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_
+
+#include <string>
+
+#include "sandbox/win/src/crosscall_server.h"
+#include "sandbox/win/src/policy_low_level.h"
+#include "sandbox/win/src/sandbox_policy.h"
+
+namespace sandbox {
+
+// A callback function type to get a function for testing.
+typedef void* (*OverrideForTestFunction)(const char* name);
+
+// This class centralizes most of the knowledge related to the process
+// mitigations Win32K lockdown policy.
+class ProcessMitigationsWin32KLockdownPolicy {
+ public:
+ // Creates the required low-level policy rules to evaluate a high-level
+ // policy rule for the Win32K process mitigation policy.
+ // name is the object name, semantics is the desired semantics for the
+ // open or create and policy is the policy generator to which the rules are
+ // going to be added.
+ static bool GenerateRules(const wchar_t* name,
+ TargetPolicy::Semantics semantics,
+ LowLevelPolicy* policy);
+
+ static uint32_t EnumDisplayMonitorsAction(const ClientInfo& client_info,
+ HMONITOR* monitor_list,
+ uint32_t monitor_list_size);
+ static bool GetMonitorInfoAction(const ClientInfo& client_info,
+ HMONITOR monitor,
+ MONITORINFO* monitor_info);
+
+ static NTSTATUS GetSuggestedOPMProtectedOutputArraySizeAction(
+ const ClientInfo& client_info,
+ const std::wstring& device_name,
+ uint32_t* suggested_array_size);
+
+ static NTSTATUS CreateOPMProtectedOutputsAction(
+ const ClientInfo& client_info,
+ const std::wstring& device_name,
+ HANDLE* protected_outputs,
+ uint32_t array_input_size,
+ uint32_t* array_output_size);
+
+ static NTSTATUS GetCertificateSizeAction(const ClientInfo& client_info,
+ const std::wstring& device_name,
+ uint32_t* cert_size);
+ static NTSTATUS GetCertificateAction(const ClientInfo& client_info,
+ const std::wstring& device_name,
+ BYTE* cert_data,
+ uint32_t cert_size);
+ static NTSTATUS GetCertificateSizeByHandleAction(
+ const ClientInfo& client_info,
+ HANDLE protected_output,
+ uint32_t* cert_size);
+ static NTSTATUS GetCertificateByHandleAction(const ClientInfo& client_info,
+ HANDLE protected_output,
+ BYTE* cert_data,
+ uint32_t cert_size);
+ static NTSTATUS GetOPMRandomNumberAction(const ClientInfo& client_info,
+ HANDLE protected_output,
+ void* random_number);
+ static NTSTATUS SetOPMSigningKeyAndSequenceNumbersAction(
+ const ClientInfo& client_info,
+ HANDLE protected_output,
+ void* parameters);
+ static NTSTATUS ConfigureOPMProtectedOutputAction(
+ const ClientInfo& client_info,
+ HANDLE protected_output,
+ void* parameters_ptr);
+ static NTSTATUS GetOPMInformationAction(const ClientInfo& client_info,
+ HANDLE protected_output,
+ void* parameters_ptr,
+ void* requested_information_ptr);
+ static NTSTATUS DestroyOPMProtectedOutputAction(HANDLE protected_output);
+ static void SetOverrideForTestCallback(OverrideForTestFunction callback);
+ static OverrideForTestFunction GetOverrideForTestCallback();
+
+ private:
+ static OverrideForTestFunction override_callback_;
+};
+
+} // namespace sandbox
+
+#endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_