| Index: sandbox/src/restricted_token_utils.cc
|
| ===================================================================
|
| --- sandbox/src/restricted_token_utils.cc (revision 62510)
|
| +++ sandbox/src/restricted_token_utils.cc (working copy)
|
| @@ -1,4 +1,4 @@
|
| -// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
|
| +// Copyright (c) 2010 The Chromium Authors. All rights reserved.
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| @@ -10,7 +10,7 @@
|
|
|
| #include "base/logging.h"
|
| #include "base/scoped_handle_win.h"
|
| -#include "base/win_util.h"
|
| +#include "base/win/windows_version.h"
|
| #include "sandbox/src/job.h"
|
| #include "sandbox/src/restricted_token.h"
|
| #include "sandbox/src/security_level.h"
|
| @@ -85,9 +85,8 @@
|
| // in the token to achieve this. You should also set the process to be
|
| // low integrity level so it can't access object created by other
|
| // processes.
|
| - if (win_util::GetWinVersion() >= win_util::WINVERSION_VISTA) {
|
| + if (base::win::GetVersion() >= base::win::VERSION_VISTA)
|
| restricted_token.AddRestrictingSidLogonSession();
|
| - }
|
| break;
|
| }
|
| case USER_RESTRICTED: {
|
| @@ -286,7 +285,7 @@
|
| return NULL;
|
| }
|
| DWORD SetTokenIntegrityLevel(HANDLE token, IntegrityLevel integrity_level) {
|
| - if (win_util::GetWinVersion() < win_util::WINVERSION_VISTA)
|
| + if (base::win::GetVersion() < base::win::VERSION_VISTA)
|
| return ERROR_SUCCESS;
|
|
|
| const wchar_t* integrity_level_str = GetIntegrityLevelString(integrity_level);
|
| @@ -312,7 +311,7 @@
|
| }
|
|
|
| DWORD SetProcessIntegrityLevel(IntegrityLevel integrity_level) {
|
| - if (win_util::GetWinVersion() < win_util::WINVERSION_VISTA)
|
| + if (base::win::GetVersion() < base::win::VERSION_VISTA)
|
| return ERROR_SUCCESS;
|
|
|
| const wchar_t* integrity_level_str = GetIntegrityLevelString(integrity_level);
|
|
|