Index: remoting/host/win/launch_process_with_token.cc |
diff --git a/remoting/host/win/launch_process_with_token.cc b/remoting/host/win/launch_process_with_token.cc |
index ab754f72e6045e9dbe1a0f242b655c11f8ad9825..3640b9a770999644072cced7c72d77cdf731330f 100644 |
--- a/remoting/host/win/launch_process_with_token.cc |
+++ b/remoting/host/win/launch_process_with_token.cc |
@@ -117,17 +117,16 @@ bool CreateSessionToken(uint32_t session_id, ScopedHandle* token_out) { |
return true; |
} |
-bool LaunchProcessWithToken( |
- const base::FilePath& binary, |
- const base::CommandLine::StringType& command_line, |
- HANDLE user_token, |
- SECURITY_ATTRIBUTES* process_attributes, |
- SECURITY_ATTRIBUTES* thread_attributes, |
- const base::HandlesToInheritVector& handles_to_inherit, |
- DWORD creation_flags, |
- const base::char16* desktop_name, |
- ScopedHandle* process_out, |
- ScopedHandle* thread_out) { |
+bool LaunchProcessWithToken(const base::FilePath& binary, |
+ const base::CommandLine::StringType& command_line, |
+ HANDLE user_token, |
+ SECURITY_ATTRIBUTES* process_attributes, |
+ SECURITY_ATTRIBUTES* thread_attributes, |
+ const std::vector<HANDLE>& handles_to_inherit, |
+ DWORD creation_flags, |
+ const base::char16* desktop_name, |
+ ScopedHandle* process_out, |
+ ScopedHandle* thread_out) { |
base::FilePath::StringType application_name = binary.value(); |
base::win::StartupInformation startup_info_wrapper; |