diff options
author | Jonathan Corbet <corbet@lwn.net> | 2017-05-18 12:46:25 -0400 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2017-05-18 12:46:25 -0400 |
commit | 5ea787a7ec6c11240168e92a677f4f2a78dc6586 (patch) | |
tree | 3749d6aee83f29806a4e66adb5a0c9230481bedd /Documentation/security | |
parent | 5395d312dff00d9e94702d28fe1e08dacd1cbe31 (diff) |
docs: Fix some formatting issues in request-key.rst
The white space in the big enumerated list was inconsistent, leading to
some strange formatting artifacts.
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'Documentation/security')
-rw-r--r-- | Documentation/security/keys/request-key.rst | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/Documentation/security/keys/request-key.rst b/Documentation/security/keys/request-key.rst index 5cdcee28479e..aba32784174c 100644 --- a/Documentation/security/keys/request-key.rst +++ b/Documentation/security/keys/request-key.rst | |||
@@ -105,15 +105,15 @@ A request proceeds in the following manner: | |||
105 | UID, GID, groups and security info of process A as if it was process A, | 105 | UID, GID, groups and security info of process A as if it was process A, |
106 | and come up with key W. | 106 | and come up with key W. |
107 | 107 | ||
108 | (8) The program then does what it must to get the data with which to | 108 | 8) The program then does what it must to get the data with which to |
109 | instantiate key U, using key W as a reference (perhaps it contacts a | 109 | instantiate key U, using key W as a reference (perhaps it contacts a |
110 | Kerberos server using the TGT) and then instantiates key U. | 110 | Kerberos server using the TGT) and then instantiates key U. |
111 | 111 | ||
112 | 9) Upon instantiating key U, auth key V is automatically revoked so that it | 112 | 9) Upon instantiating key U, auth key V is automatically revoked so that it |
113 | may not be used again. | 113 | may not be used again. |
114 | 114 | ||
115 | 10) The program then exits 0 and request_key() deletes key V and returns key | 115 | 10) The program then exits 0 and request_key() deletes key V and returns key |
116 | U to the caller. | 116 | U to the caller. |
117 | 117 | ||
118 | This also extends further. If key W (step 7 above) didn't exist, key W would | 118 | This also extends further. If key W (step 7 above) didn't exist, key W would |
119 | be created uninstantiated, another auth key (X) would be created (as per step | 119 | be created uninstantiated, another auth key (X) would be created (as per step |