* Run the login shell or command as the given user in a new pty to prevent
* terminal injection attacks.
*
- * Copyright (C) 2016-2017 Simon Ruderich
+ * Copyright (C) 2016-2018 Simon Ruderich
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
if (*pty_slave == -1) {
die("open slave tty");
}
- /* The user must be able to write to the new TTY. Normally grantpt() would
+ /*
+ * The user must be able to write to the new TTY. Normally grantpt() would
* do this for us, but we don't trust the user and thus don't want to pass
- * the pty_master to a process running under that uid. */
+ * the pty_master to a process running under that uid.
+ */
if (chown(slave_path, uid, (gid_t)-1) != 0) {
die("chown slave tty");
}