| Index: remoting/host/win/launch_process_with_token.cc
|
| diff --git a/remoting/host/win/launch_process_with_token.cc b/remoting/host/win/launch_process_with_token.cc
|
| index 3619a55454ffff9f4e6656e25490ad00b06ae93c..549d8c39080ddc924034e738eecb27af188e99ee 100644
|
| --- a/remoting/host/win/launch_process_with_token.cc
|
| +++ b/remoting/host/win/launch_process_with_token.cc
|
| @@ -380,7 +380,7 @@ bool CreateRemoteSessionProcess(
|
| DWORD creation_flags,
|
| PROCESS_INFORMATION* process_information_out)
|
| {
|
| - DCHECK(base::win::GetVersion() == base::win::VERSION_XP);
|
| + DCHECK_LT(base::win::GetVersion(), base::win::VERSION_VISTA);
|
|
|
| base::win::ScopedHandle pipe;
|
| if (!ConnectToExecutionServer(session_id, &pipe))
|
| @@ -592,7 +592,7 @@ bool LaunchProcessWithToken(const FilePath& binary,
|
| // of |user_token|. Since Winlogon runs as SYSTEM, this suits our needs.
|
| if (!result &&
|
| GetLastError() == ERROR_PIPE_NOT_CONNECTED &&
|
| - base::win::GetVersion() == base::win::VERSION_XP) {
|
| + base::win::GetVersion() < base::win::VERSION_VISTA) {
|
| DWORD session_id;
|
| DWORD return_length;
|
| result = GetTokenInformation(user_token,
|
|
|