.BR request_key ()
on behalf of some other process to generate a key, then the keyrings of that
other process will be searched next, using that other process's UID, GID,
-groups and security context to control access.
+groups, and security context to control access.
.P
The keys in each keyring searched are checked for a match before any child
keyrings are recursed into.
.B searchable
keyrings may be searched.
.P
-If the key is not found then, if
+If the key is not found, then, if
.I callout_info
is set, this function will attempt to look further afield.
In such a case, the
.BR add_key (2),
.BR keyctl (2),
.BR request-key (8)
+.SH COLOPHON
+This page is part of release 3.68 of the Linux
+.I man-pages
+project.
+A description of the project,
+information about reporting bugs,
+and the latest version of this page,
+can be found at
+\%http://www.kernel.org/doc/man\-pages/.