| OLD | NEW |
| 1 | 1 |
| 2 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 2 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 3 // Use of this source code is governed by a BSD-style license that can be | 3 // Use of this source code is governed by a BSD-style license that can be |
| 4 // found in the LICENSE file. | 4 // found in the LICENSE file. |
| 5 // | 5 // |
| 6 // This file implements the Windows service controlling Me2Me host processes | 6 // This file implements the Windows service controlling Me2Me host processes |
| 7 // running within user sessions. | 7 // running within user sessions. |
| 8 | 8 |
| 9 #include "remoting/host/win/unprivileged_process_delegate.h" | 9 #include "remoting/host/win/unprivileged_process_delegate.h" |
| 10 | 10 |
| (...skipping 361 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 372 } | 372 } |
| 373 } | 373 } |
| 374 | 374 |
| 375 bool UnprivilegedProcessDelegate::OnMessageReceived( | 375 bool UnprivilegedProcessDelegate::OnMessageReceived( |
| 376 const IPC::Message& message) { | 376 const IPC::Message& message) { |
| 377 DCHECK(CalledOnValidThread()); | 377 DCHECK(CalledOnValidThread()); |
| 378 | 378 |
| 379 return event_handler_->OnMessageReceived(message); | 379 return event_handler_->OnMessageReceived(message); |
| 380 } | 380 } |
| 381 | 381 |
| 382 void UnprivilegedProcessDelegate::OnChannelConnected(int32 peer_pid) { | 382 void UnprivilegedProcessDelegate::OnChannelConnected(int32_t peer_pid) { |
| 383 DCHECK(CalledOnValidThread()); | 383 DCHECK(CalledOnValidThread()); |
| 384 | 384 |
| 385 DWORD pid = GetProcessId(worker_process_.Get()); | 385 DWORD pid = GetProcessId(worker_process_.Get()); |
| 386 if (pid != static_cast<DWORD>(peer_pid)) { | 386 if (pid != static_cast<DWORD>(peer_pid)) { |
| 387 LOG(ERROR) << "The actual client PID " << pid | 387 LOG(ERROR) << "The actual client PID " << pid |
| 388 << " does not match the one reported by the client: " | 388 << " does not match the one reported by the client: " |
| 389 << peer_pid; | 389 << peer_pid; |
| 390 ReportFatalError(); | 390 ReportFatalError(); |
| 391 return; | 391 return; |
| 392 } | 392 } |
| (...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 432 PLOG(ERROR) << "Failed to duplicate a handle"; | 432 PLOG(ERROR) << "Failed to duplicate a handle"; |
| 433 ReportFatalError(); | 433 ReportFatalError(); |
| 434 return; | 434 return; |
| 435 } | 435 } |
| 436 ScopedHandle limited_handle(temp_handle); | 436 ScopedHandle limited_handle(temp_handle); |
| 437 | 437 |
| 438 event_handler_->OnProcessLaunched(limited_handle.Pass()); | 438 event_handler_->OnProcessLaunched(limited_handle.Pass()); |
| 439 } | 439 } |
| 440 | 440 |
| 441 } // namespace remoting | 441 } // namespace remoting |
| OLD | NEW |