summaryrefslogtreecommitdiffstats
path: root/tdmlib
diff options
context:
space:
mode:
authorSlávek Banko <slavek.banko@axis.cz>2013-04-27 18:37:41 +0200
committerSlávek Banko <slavek.banko@axis.cz>2013-04-27 18:37:41 +0200
commit74b1fc6576fa920094463e6e4f1528bc7a25d6d0 (patch)
tree0eaf37372866eca87cc989b62ffae599e0338c9c /tdmlib
parent62d43d23e6dc10a351e64b95724810a94ceb1f0a (diff)
downloadtdebase-74b1fc6576fa920094463e6e4f1528bc7a25d6d0.tar.gz
tdebase-74b1fc6576fa920094463e6e4f1528bc7a25d6d0.zip
Cleanup output clutter
Diffstat (limited to 'tdmlib')
-rw-r--r--tdmlib/tdmtsak.h18
1 files changed, 9 insertions, 9 deletions
diff --git a/tdmlib/tdmtsak.h b/tdmlib/tdmtsak.h
index 1987a8218..8ce44392a 100644
--- a/tdmlib/tdmtsak.h
+++ b/tdmlib/tdmtsak.h
@@ -50,7 +50,7 @@ inline int tde_sak_verify_calling_process()
pid_t parentproc = getppid();
#ifdef DEBUG
- printf("Parent pid is: %d\n\r", parentproc);
+ printf("Parent pid is: %d\n", parentproc);
#endif
char parentexecutable[8192];
@@ -60,28 +60,28 @@ inline int tde_sak_verify_calling_process()
parentexecutable[8191] = 0;
procparent = parentexecutable;
#ifdef DEBUG
- printf("Parent executable name and full path is: %s\n\r", procparent.ascii());
+ printf("Parent executable name and full path is: %s\n", procparent.ascii());
#endif
TQString tdeBinaryPath = TQString(KDE_BINDIR "/");
#ifdef DEBUG
- printf("The TDE binary path is: %s\n\r", tdeBinaryPath.ascii());
+ printf("The TDE binary path is: %s\n", tdeBinaryPath.ascii());
#endif
if (!procparent.startsWith(tdeBinaryPath)) {
- printf("Unauthorized path detected in calling process\n\r");
+ printf("Unauthorized path detected in calling process\n");
return 2;
}
else {
procparent = procparent.mid(tdeBinaryPath.length());
#ifdef DEBUG
- printf("Parent executable name is: %s\n\r", procparent.ascii());
+ printf("Parent executable name is: %s\n", procparent.ascii());
#endif
if ((procparent == "kdesktop") || (procparent == "kdesktop_lock") || (procparent == "tdm")) {
authorized = true;
}
else if (procparent == "tdeinit") {
- printf("tdeinit detected\n\r");
+ printf("tdeinit detected\n");
// A bit more digging is needed to see if this is an authorized process or not
// Get the tdeinit command
char tdeinitcmdline[8192];
@@ -117,8 +117,8 @@ inline int tde_sak_verify_calling_process()
tdeinitenviron[8191] = 0;
#ifdef DEBUG
- printf("Called executable name is: %s\n\r", tdeinitCommand.ascii());
- printf("Environment is: %s\n\r", tdeinitEnvironment.ascii());
+ printf("Called executable name is: %s\n", tdeinitCommand.ascii());
+ printf("Environment is: %s\n", tdeinitEnvironment.ascii());
#endif
if ((tdeinitCommand == "kdesktop [tdeinit]") && (tdeinitEnvironment.startsWith(KDE_BINDIR))) {
@@ -129,7 +129,7 @@ inline int tde_sak_verify_calling_process()
}
}
else {
- printf("Unauthorized calling process detected\n\r");
+ printf("Unauthorized calling process detected\n");
return 3;
}