diff options
Diffstat (limited to 'kdmlib/kdmtsak.h')
-rw-r--r-- | kdmlib/kdmtsak.h | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/kdmlib/kdmtsak.h b/kdmlib/kdmtsak.h index c9664ae34..fba73d9c5 100644 --- a/kdmlib/kdmtsak.h +++ b/kdmlib/kdmtsak.h @@ -50,7 +50,7 @@ inline int tde_sak_verify_calling_process() pid_t parentproc = getppid(); #ifdef DEBUG - printf("Parent pid is: %d\n\r", parentproc); + printf("Parent pid is: %d\n", parentproc); #endif char parentexecutable[8192]; @@ -60,28 +60,28 @@ inline int tde_sak_verify_calling_process() parentexecutable[8191] = 0; procparent = parentexecutable; #ifdef DEBUG - printf("Parent executable name and full path is: %s\n\r", procparent.ascii()); + printf("Parent executable name and full path is: %s\n", procparent.ascii()); #endif TQString tdeBinaryPath = TQString(KDE_BINDIR "/"); #ifdef DEBUG - printf("The TDE binary path is: %s\n\r", tdeBinaryPath.ascii()); + printf("The TDE binary path is: %s\n", tdeBinaryPath.ascii()); #endif if (!procparent.startsWith(tdeBinaryPath)) { - printf("Unauthorized path detected in calling process\n\r"); + printf("Unauthorized path detected in calling process\n"); return 2; } else { procparent = procparent.mid(tdeBinaryPath.length()); #ifdef DEBUG - printf("Parent executable name is: %s\n\r", procparent.ascii()); + printf("Parent executable name is: %s\n", procparent.ascii()); #endif if ((procparent == "kdesktop") || (procparent == "kdesktop_lock") || (procparent == "kdm")) { authorized = true; } else if (procparent == "kdeinit") { - printf("kdeinit detected\n\r"); + printf("kdeinit detected\n"); // A bit more digging is needed to see if this is an authorized process or not // Get the kdeinit command char kdeinitcmdline[8192]; @@ -117,8 +117,8 @@ inline int tde_sak_verify_calling_process() kdeinitenviron[8191] = 0; #ifdef DEBUG - printf("Called executable name is: %s\n\r", kdeinitCommand.ascii()); - printf("Environment is: %s\n\r", kdeinitEnvironment.ascii()); + printf("Called executable name is: %s\n", kdeinitCommand.ascii()); + printf("Environment is: %s\n", kdeinitEnvironment.ascii()); #endif if ((kdeinitCommand == "kdesktop [kdeinit]") && (kdeinitEnvironment.startsWith(KDE_BINDIR))) { @@ -129,7 +129,7 @@ inline int tde_sak_verify_calling_process() } } else { - printf("Unauthorized calling process detected\n\r"); + printf("Unauthorized calling process detected\n"); return 3; } |