| Index: remoting/host/win/launch_process_with_token.cc
|
| diff --git a/remoting/host/win/launch_process_with_token.cc b/remoting/host/win/launch_process_with_token.cc
|
| index c0ee4b89e5f73fd6aa86410eb9bccae7f576b565..d851e13d8227ade09b7fd86047e78f67784d8efe 100644
|
| --- a/remoting/host/win/launch_process_with_token.cc
|
| +++ b/remoting/host/win/launch_process_with_token.cc
|
| @@ -116,7 +116,7 @@ bool ConnectToExecutionServer(uint32 session_id,
|
| return false;
|
| }
|
|
|
| - *pipe_out = pipe.Pass();
|
| + *pipe_out = std::move(pipe);
|
| return true;
|
| }
|
|
|
| @@ -171,7 +171,7 @@ bool CreatePrivilegedToken(ScopedHandle* token_out) {
|
| return false;
|
| }
|
|
|
| - *token_out = privileged_token.Pass();
|
| + *token_out = std::move(privileged_token);
|
| return true;
|
| }
|
|
|
| @@ -443,7 +443,7 @@ bool CreateSessionToken(uint32 session_id, ScopedHandle* token_out) {
|
| // Revert to the default token.
|
| CHECK(RevertToSelf());
|
|
|
| - *token_out = session_token.Pass();
|
| + *token_out = std::move(session_token);
|
| return true;
|
| }
|
|
|
|
|