Index: sandbox/win/src/restricted_token_utils.cc |
diff --git a/sandbox/win/src/restricted_token_utils.cc b/sandbox/win/src/restricted_token_utils.cc |
index f30a8a6f82eeaf6834cd73d31a5069b39f54d681..b5777b094d0525d834381ef1cd10d5a196e11af5 100644 |
--- a/sandbox/win/src/restricted_token_utils.cc |
+++ b/sandbox/win/src/restricted_token_utils.cc |
@@ -29,7 +29,7 @@ DWORD CreateRestrictedToken(HANDLE *token_handle, |
RestrictedToken restricted_token; |
restricted_token.Init(NULL); // Initialized with the current process token |
- std::vector<std::wstring> privilege_exceptions; |
+ std::vector<base::string16> privilege_exceptions; |
std::vector<Sid> sid_exceptions; |
bool deny_sids = true; |
@@ -237,7 +237,7 @@ DWORD SetObjectIntegrityLabel(HANDLE handle, SE_OBJECT_TYPE type, |
const wchar_t* ace_access, |
const wchar_t* integrity_level_sid) { |
// Build the SDDL string for the label. |
- std::wstring sddl = L"S:("; // SDDL for a SACL. |
+ base::string16 sddl = L"S:("; // SDDL for a SACL. |
sddl += SDDL_MANDATORY_LABEL; // Ace Type is "Mandatory Label". |
sddl += L";;"; // No Ace Flags. |
sddl += ace_access; // Add the ACE access. |