| Index: remoting/host/win/launch_process_with_token.h
|
| diff --git a/remoting/host/win/launch_process_with_token.h b/remoting/host/win/launch_process_with_token.h
|
| index f72567ce57200f1d97a36a619d6cf04d64a968a9..5a2c309e698c806fff57c52eabda8b6afad1c860 100644
|
| --- a/remoting/host/win/launch_process_with_token.h
|
| +++ b/remoting/host/win/launch_process_with_token.h
|
| @@ -14,12 +14,34 @@
|
| #include "base/memory/scoped_ptr.h"
|
| #include "base/win/scoped_handle.h"
|
|
|
| +namespace base {
|
| +class SingleThreadTaskRunner;
|
| +} // namespace base
|
| +
|
| +namespace IPC {
|
| +class ChannelProxy;
|
| +class Listener;
|
| +} // namespace IPC
|
| +
|
| namespace remoting {
|
|
|
| // Pipe name prefix used by Chrome IPC channels to convert a channel name into
|
| // a pipe name.
|
| extern const char kChromePipeNamePrefix[];
|
|
|
| +// Creates an already connected IPC channel. The server end of the channel
|
| +// is wrapped into a channel proxy that will invoke methods of |delegate|
|
| +// on the caller's thread while using |io_task_runner| to send and receive
|
| +// messages in the background. The client end is returned as an inheritable NT
|
| +// handle. |pipe_security_descriptor| is applied to the underlying pipe.
|
| +bool CreateConnectedIpcChannel(
|
| + const std::string& channel_name,
|
| + const std::string& pipe_security_descriptor,
|
| + scoped_refptr<base::SingleThreadTaskRunner> io_task_runner,
|
| + IPC::Listener* delegate,
|
| + base::win::ScopedHandle* client_out,
|
| + scoped_ptr<IPC::ChannelProxy>* server_out);
|
| +
|
| // Creates the server end of the IPC channel and applies the security
|
| // descriptor |pipe_security_descriptor| to it.
|
| bool CreateIpcChannel(
|
| @@ -31,9 +53,6 @@ bool CreateIpcChannel(
|
| // it can be used to launch a process in that session.
|
| bool CreateSessionToken(uint32 session_id, base::win::ScopedHandle* token_out);
|
|
|
| -// Generates a unique IPC channel name.
|
| -std::string GenerateIpcChannelName(void* client);
|
| -
|
| // Launches |binary| in the security context of the user represented by
|
| // |user_token|. The session ID specified by the token is respected as well.
|
| bool LaunchProcessWithToken(const FilePath& binary,
|
|
|