aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation/security
diff options
context:
space:
mode:
authorJonathan Corbet <corbet@lwn.net>2017-05-18 12:46:25 -0400
committerJonathan Corbet <corbet@lwn.net>2017-05-18 12:46:25 -0400
commit5ea787a7ec6c11240168e92a677f4f2a78dc6586 (patch)
tree3749d6aee83f29806a4e66adb5a0c9230481bedd /Documentation/security
parent5395d312dff00d9e94702d28fe1e08dacd1cbe31 (diff)
docs: Fix some formatting issues in request-key.rst
The white space in the big enumerated list was inconsistent, leading to some strange formatting artifacts. Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'Documentation/security')
-rw-r--r--Documentation/security/keys/request-key.rst6
1 files changed, 3 insertions, 3 deletions
diff --git a/Documentation/security/keys/request-key.rst b/Documentation/security/keys/request-key.rst
index 5cdcee28479e..aba32784174c 100644
--- a/Documentation/security/keys/request-key.rst
+++ b/Documentation/security/keys/request-key.rst
@@ -105,15 +105,15 @@ A request proceeds in the following manner:
105 UID, GID, groups and security info of process A as if it was process A, 105 UID, GID, groups and security info of process A as if it was process A,
106 and come up with key W. 106 and come up with key W.
107 107
108 (8) The program then does what it must to get the data with which to 108 8) The program then does what it must to get the data with which to
109 instantiate key U, using key W as a reference (perhaps it contacts a 109 instantiate key U, using key W as a reference (perhaps it contacts a
110 Kerberos server using the TGT) and then instantiates key U. 110 Kerberos server using the TGT) and then instantiates key U.
111 111
112 9) Upon instantiating key U, auth key V is automatically revoked so that it 112 9) Upon instantiating key U, auth key V is automatically revoked so that it
113 may not be used again. 113 may not be used again.
114 114
115 10) The program then exits 0 and request_key() deletes key V and returns key 115 10) The program then exits 0 and request_key() deletes key V and returns key
116 U to the caller. 116 U to the caller.
117 117
118This also extends further. If key W (step 7 above) didn't exist, key W would 118This also extends further. If key W (step 7 above) didn't exist, key W would
119be created uninstantiated, another auth key (X) would be created (as per step 119be created uninstantiated, another auth key (X) would be created (as per step