summaryrefslogtreecommitdiffstats
path: root/kdmlib/kdmtsak.h
diff options
context:
space:
mode:
Diffstat (limited to 'kdmlib/kdmtsak.h')
-rw-r--r--kdmlib/kdmtsak.h18
1 files changed, 9 insertions, 9 deletions
diff --git a/kdmlib/kdmtsak.h b/kdmlib/kdmtsak.h
index c9664ae34..fba73d9c5 100644
--- a/kdmlib/kdmtsak.h
+++ b/kdmlib/kdmtsak.h
@@ -50,7 +50,7 @@ inline int tde_sak_verify_calling_process()
pid_t parentproc = getppid();
#ifdef DEBUG
- printf("Parent pid is: %d\n\r", parentproc);
+ printf("Parent pid is: %d\n", parentproc);
#endif
char parentexecutable[8192];
@@ -60,28 +60,28 @@ inline int tde_sak_verify_calling_process()
parentexecutable[8191] = 0;
procparent = parentexecutable;
#ifdef DEBUG
- printf("Parent executable name and full path is: %s\n\r", procparent.ascii());
+ printf("Parent executable name and full path is: %s\n", procparent.ascii());
#endif
TQString tdeBinaryPath = TQString(KDE_BINDIR "/");
#ifdef DEBUG
- printf("The TDE binary path is: %s\n\r", tdeBinaryPath.ascii());
+ printf("The TDE binary path is: %s\n", tdeBinaryPath.ascii());
#endif
if (!procparent.startsWith(tdeBinaryPath)) {
- printf("Unauthorized path detected in calling process\n\r");
+ printf("Unauthorized path detected in calling process\n");
return 2;
}
else {
procparent = procparent.mid(tdeBinaryPath.length());
#ifdef DEBUG
- printf("Parent executable name is: %s\n\r", procparent.ascii());
+ printf("Parent executable name is: %s\n", procparent.ascii());
#endif
if ((procparent == "kdesktop") || (procparent == "kdesktop_lock") || (procparent == "kdm")) {
authorized = true;
}
else if (procparent == "kdeinit") {
- printf("kdeinit detected\n\r");
+ printf("kdeinit detected\n");
// A bit more digging is needed to see if this is an authorized process or not
// Get the kdeinit command
char kdeinitcmdline[8192];
@@ -117,8 +117,8 @@ inline int tde_sak_verify_calling_process()
kdeinitenviron[8191] = 0;
#ifdef DEBUG
- printf("Called executable name is: %s\n\r", kdeinitCommand.ascii());
- printf("Environment is: %s\n\r", kdeinitEnvironment.ascii());
+ printf("Called executable name is: %s\n", kdeinitCommand.ascii());
+ printf("Environment is: %s\n", kdeinitEnvironment.ascii());
#endif
if ((kdeinitCommand == "kdesktop [kdeinit]") && (kdeinitEnvironment.startsWith(KDE_BINDIR))) {
@@ -129,7 +129,7 @@ inline int tde_sak_verify_calling_process()
}
}
else {
- printf("Unauthorized calling process detected\n\r");
+ printf("Unauthorized calling process detected\n");
return 3;
}