Index: remoting/host/win/launch_process_with_token.cc |
diff --git a/remoting/host/win/launch_process_with_token.cc b/remoting/host/win/launch_process_with_token.cc |
index c0ee4b89e5f73fd6aa86410eb9bccae7f576b565..27689ad52b0fb5f37b603db250661ae1fba0ff89 100644 |
--- a/remoting/host/win/launch_process_with_token.cc |
+++ b/remoting/host/win/launch_process_with_token.cc |
@@ -5,6 +5,7 @@ |
#include "remoting/host/win/launch_process_with_token.h" |
#include <windows.h> |
+#include <stddef.h> |
#include <winternl.h> |
#include <limits> |
@@ -52,7 +53,7 @@ void CloseHandlesAndTerminateProcess(PROCESS_INFORMATION* process_information) { |
} |
// Connects to the executor server corresponding to |session_id|. |
-bool ConnectToExecutionServer(uint32 session_id, |
+bool ConnectToExecutionServer(uint32_t session_id, |
base::win::ScopedHandle* pipe_out) { |
base::string16 pipe_name; |
@@ -369,7 +370,7 @@ bool SendCreateProcessRequest( |
// using the default (i.e. Winlogon) token. This routine relies on undocumented |
// OS functionality and will likely not work on anything but XP or W2K3. |
bool CreateRemoteSessionProcess( |
- uint32 session_id, |
+ uint32_t session_id, |
const base::FilePath::StringType& application_name, |
const base::CommandLine::StringType& command_line, |
DWORD creation_flags, |
@@ -408,7 +409,7 @@ base::LazyInstance<base::Lock>::Leaky g_inherit_handles_lock = |
// Creates a copy of the current process token for the given |session_id| so |
// it can be used to launch a process in that session. |
-bool CreateSessionToken(uint32 session_id, ScopedHandle* token_out) { |
+bool CreateSessionToken(uint32_t session_id, ScopedHandle* token_out) { |
ScopedHandle session_token; |
DWORD desired_access = TOKEN_ADJUST_DEFAULT | TOKEN_ADJUST_SESSIONID | |
TOKEN_ASSIGN_PRIMARY | TOKEN_DUPLICATE | TOKEN_QUERY; |