aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation/security
diff options
context:
space:
mode:
authorJosh Holland <anowlcalledjosh@gmail.com>2017-08-19 11:21:06 -0400
committerJonathan Corbet <corbet@lwn.net>2017-08-24 15:10:58 -0400
commitadf31eebd75e9e7c2eda222695637398b3872a68 (patch)
tree2352462d33087ec088e50293e15cf039466aeebd /Documentation/security
parent8ac5ac1b0ef8709b78b9242903b070f1c3b2cedb (diff)
docs: Fix paths in security/keys
Several paths in the security/keys documentation were incorrect. Signed-off-by: Josh Holland <anowlcalledjosh@gmail.com> Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'Documentation/security')
-rw-r--r--Documentation/security/keys/core.rst4
-rw-r--r--Documentation/security/keys/request-key.rst2
-rw-r--r--Documentation/security/keys/trusted-encrypted.rst2
3 files changed, 4 insertions, 4 deletions
diff --git a/Documentation/security/keys/core.rst b/Documentation/security/keys/core.rst
index 1648fa80b3bf..312f981fa4a0 100644
--- a/Documentation/security/keys/core.rst
+++ b/Documentation/security/keys/core.rst
@@ -443,7 +443,7 @@ The main syscalls are:
443 /sbin/request-key will be invoked in an attempt to obtain a key. The 443 /sbin/request-key will be invoked in an attempt to obtain a key. The
444 callout_info string will be passed as an argument to the program. 444 callout_info string will be passed as an argument to the program.
445 445
446 See also Documentation/security/keys-request-key.txt. 446 See also Documentation/security/keys/request-key.rst.
447 447
448 448
449The keyctl syscall functions are: 449The keyctl syscall functions are:
@@ -973,7 +973,7 @@ payload contents" for more information.
973 If successful, the key will have been attached to the default keyring for 973 If successful, the key will have been attached to the default keyring for
974 implicitly obtained request-key keys, as set by KEYCTL_SET_REQKEY_KEYRING. 974 implicitly obtained request-key keys, as set by KEYCTL_SET_REQKEY_KEYRING.
975 975
976 See also Documentation/security/keys-request-key.txt. 976 See also Documentation/security/keys/request-key.rst.
977 977
978 978
979 * To search for a key, passing auxiliary data to the upcaller, call:: 979 * To search for a key, passing auxiliary data to the upcaller, call::
diff --git a/Documentation/security/keys/request-key.rst b/Documentation/security/keys/request-key.rst
index aba32784174c..b2d16abaa9e9 100644
--- a/Documentation/security/keys/request-key.rst
+++ b/Documentation/security/keys/request-key.rst
@@ -3,7 +3,7 @@ Key Request Service
3=================== 3===================
4 4
5The key request service is part of the key retention service (refer to 5The key request service is part of the key retention service (refer to
6Documentation/security/keys.txt). This document explains more fully how 6Documentation/security/core.rst). This document explains more fully how
7the requesting algorithm works. 7the requesting algorithm works.
8 8
9The process starts by either the kernel requesting a service by calling 9The process starts by either the kernel requesting a service by calling
diff --git a/Documentation/security/keys/trusted-encrypted.rst b/Documentation/security/keys/trusted-encrypted.rst
index 7b503831bdea..3bb24e09a332 100644
--- a/Documentation/security/keys/trusted-encrypted.rst
+++ b/Documentation/security/keys/trusted-encrypted.rst
@@ -172,4 +172,4 @@ Other uses for trusted and encrypted keys, such as for disk and file encryption
172are anticipated. In particular the new format 'ecryptfs' has been defined in 172are anticipated. In particular the new format 'ecryptfs' has been defined in
173in order to use encrypted keys to mount an eCryptfs filesystem. More details 173in order to use encrypted keys to mount an eCryptfs filesystem. More details
174about the usage can be found in the file 174about the usage can be found in the file
175``Documentation/security/keys-ecryptfs.txt``. 175``Documentation/security/keys/ecryptfs.rst``.