Commit 5ea787a7 authored by Jonathan Corbet's avatar Jonathan Corbet

docs: Fix some formatting issues in request-key.rst

The white space in the big enumerated list was inconsistent, leading to
some strange formatting artifacts.
Signed-off-by: default avatarJonathan Corbet <corbet@lwn.net>
parent 5395d312
...@@ -105,15 +105,15 @@ A request proceeds in the following manner: ...@@ -105,15 +105,15 @@ A request proceeds in the following manner:
UID, GID, groups and security info of process A as if it was process A, UID, GID, groups and security info of process A as if it was process A,
and come up with key W. and come up with key W.
(8) The program then does what it must to get the data with which to 8) The program then does what it must to get the data with which to
instantiate key U, using key W as a reference (perhaps it contacts a instantiate key U, using key W as a reference (perhaps it contacts a
Kerberos server using the TGT) and then instantiates key U. Kerberos server using the TGT) and then instantiates key U.
9) Upon instantiating key U, auth key V is automatically revoked so that it 9) Upon instantiating key U, auth key V is automatically revoked so that it
may not be used again. may not be used again.
10) The program then exits 0 and request_key() deletes key V and returns key 10) The program then exits 0 and request_key() deletes key V and returns key
U to the caller. U to the caller.
This also extends further. If key W (step 7 above) didn't exist, key W would This also extends further. If key W (step 7 above) didn't exist, key W would
be created uninstantiated, another auth key (X) would be created (as per step be created uninstantiated, another auth key (X) would be created (as per step
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment