| Index: remoting/host/win/launch_process_with_token.cc
|
| diff --git a/remoting/host/win/launch_process_with_token.cc b/remoting/host/win/launch_process_with_token.cc
|
| index c0ee4b89e5f73fd6aa86410eb9bccae7f576b565..27689ad52b0fb5f37b603db250661ae1fba0ff89 100644
|
| --- a/remoting/host/win/launch_process_with_token.cc
|
| +++ b/remoting/host/win/launch_process_with_token.cc
|
| @@ -5,6 +5,7 @@
|
| #include "remoting/host/win/launch_process_with_token.h"
|
|
|
| #include <windows.h>
|
| +#include <stddef.h>
|
| #include <winternl.h>
|
|
|
| #include <limits>
|
| @@ -52,7 +53,7 @@ void CloseHandlesAndTerminateProcess(PROCESS_INFORMATION* process_information) {
|
| }
|
|
|
| // Connects to the executor server corresponding to |session_id|.
|
| -bool ConnectToExecutionServer(uint32 session_id,
|
| +bool ConnectToExecutionServer(uint32_t session_id,
|
| base::win::ScopedHandle* pipe_out) {
|
| base::string16 pipe_name;
|
|
|
| @@ -369,7 +370,7 @@ bool SendCreateProcessRequest(
|
| // using the default (i.e. Winlogon) token. This routine relies on undocumented
|
| // OS functionality and will likely not work on anything but XP or W2K3.
|
| bool CreateRemoteSessionProcess(
|
| - uint32 session_id,
|
| + uint32_t session_id,
|
| const base::FilePath::StringType& application_name,
|
| const base::CommandLine::StringType& command_line,
|
| DWORD creation_flags,
|
| @@ -408,7 +409,7 @@ base::LazyInstance<base::Lock>::Leaky g_inherit_handles_lock =
|
|
|
| // Creates a copy of the current process token for the given |session_id| so
|
| // it can be used to launch a process in that session.
|
| -bool CreateSessionToken(uint32 session_id, ScopedHandle* token_out) {
|
| +bool CreateSessionToken(uint32_t session_id, ScopedHandle* token_out) {
|
| ScopedHandle session_token;
|
| DWORD desired_access = TOKEN_ADJUST_DEFAULT | TOKEN_ADJUST_SESSIONID |
|
| TOKEN_ASSIGN_PRIMARY | TOKEN_DUPLICATE | TOKEN_QUERY;
|
|
|