From ea05a6160c17460f8cdde00ac35f6023e47dd6a7 Mon Sep 17 00:00:00 2001 From: Mike Gabriel Date: Thu, 7 Dec 2017 11:01:51 +0100 Subject: White-space clean-up. --- src/pam-freerdp.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'src') diff --git a/src/pam-freerdp.c b/src/pam-freerdp.c index d411f56..21bff56 100644 --- a/src/pam-freerdp.c +++ b/src/pam-freerdp.c @@ -312,7 +312,7 @@ pam_sm_open_session (pam_handle_t *pamh, int flags, int argc, const char ** argv pid_t pid = fork(); if (pid == 0) { - + int ret = session_socket_handler(pwdent, sessionready[1], ruser, rhost, rdomain, password); close(sessionready[1]); @@ -367,7 +367,7 @@ done: return retval; } -/* Drop privs and try to kill the process with the PID of session_pid. +/* Drop privs and try to kill the process with the PID of session_pid. This ensures that we don't kill something important if there is PID wrap around. */ static int @@ -403,7 +403,7 @@ unpriveleged_kill (struct passwd * pwdent) track that but there are a lot of reason that we could fail there and it's not a bad thing. Really we're attempting a best effort to clean up we won't be able to gaurantee it. */ - _exit(EXIT_SUCCESS); + _exit(EXIT_SUCCESS); } else if (pid < 0) { retval = PAM_SYSTEM_ERR; } else { -- cgit v1.2.3