jpayne@68
|
1 .\"
|
jpayne@68
|
2 .\" Copyright (C) 2004 Red Hat, Inc. All Rights Reserved.
|
jpayne@68
|
3 .\" Written by David Howells (dhowells@redhat.com)
|
jpayne@68
|
4 .\"
|
jpayne@68
|
5 .\" This program is free software; you can redistribute it and/or
|
jpayne@68
|
6 .\" modify it under the terms of the GNU General Public License
|
jpayne@68
|
7 .\" as published by the Free Software Foundation; either version
|
jpayne@68
|
8 .\" 2 of the License, or (at your option) any later version.
|
jpayne@68
|
9 .\"
|
jpayne@68
|
10 .TH REQUEST-KEY 8 "15 Nov 2011" Linux "Linux Key Management Utilities"
|
jpayne@68
|
11 .SH NAME
|
jpayne@68
|
12 request\-key \- handle key instantiation callback requests from the kernel
|
jpayne@68
|
13 .SH SYNOPSIS
|
jpayne@68
|
14 \fB/sbin/request\-key \fR<op> <key> <uid> <gid> <threadring> <processring>
|
jpayne@68
|
15 <sessionring> [<info>]
|
jpayne@68
|
16 .SH DESCRIPTION
|
jpayne@68
|
17 This program is invoked by the kernel when the kernel is asked for a key that
|
jpayne@68
|
18 it doesn't have immediately available. The kernel creates a partially set up
|
jpayne@68
|
19 key and then calls out to this program to instantiate it. It is not intended
|
jpayne@68
|
20 to be called directly.
|
jpayne@68
|
21 .PP
|
jpayne@68
|
22 However, for debugging purposes, it can be given some options on the command
|
jpayne@68
|
23 line:
|
jpayne@68
|
24 .IP \fB-d\fP
|
jpayne@68
|
25 Turn on debugging mode. In this mode, no attempts are made to access any keys
|
jpayne@68
|
26 and, if a handler program is selected, it won't be executed; instead, this
|
jpayne@68
|
27 program will print a message and exit 0.
|
jpayne@68
|
28 .IP \fB-D <description>\fP
|
jpayne@68
|
29 In debugging mode, use the proposed key description specified with this rather
|
jpayne@68
|
30 than the sample ("user;0;0;1f0000;debug:1234") built into the program.
|
jpayne@68
|
31 .IP \fB-l\fP
|
jpayne@68
|
32 Use configuration from the current directory. The program will use
|
jpayne@68
|
33 .IR request-key.d/* " and " request-key.conf
|
jpayne@68
|
34 from the current directory rather than from
|
jpayne@68
|
35 .IR /etc .
|
jpayne@68
|
36 .IP \fB-n\fP
|
jpayne@68
|
37 Don't log to the system log. Ordinarily, error messages and debugging messages
|
jpayne@68
|
38 will be copied to the system log - this will prevent that.
|
jpayne@68
|
39 .IP \fB-v\fP
|
jpayne@68
|
40 Turn on debugging output. This may be specified multiple times to produce
|
jpayne@68
|
41 increasing levels of verbosity.
|
jpayne@68
|
42 .IP \fB--version\fP
|
jpayne@68
|
43 Print the program version and exit.
|
jpayne@68
|
44 .SH ERRORS
|
jpayne@68
|
45 All errors will be logged to the syslog.
|
jpayne@68
|
46 .SH FILES
|
jpayne@68
|
47 .ul
|
jpayne@68
|
48 /etc/request\-key.d/*.conf
|
jpayne@68
|
49 .ul 0
|
jpayne@68
|
50 Individual configuration files.
|
jpayne@68
|
51 .P
|
jpayne@68
|
52 .ul
|
jpayne@68
|
53 /etc/request\-key.conf
|
jpayne@68
|
54 .ul 0
|
jpayne@68
|
55 Fallback configuration file.
|
jpayne@68
|
56 .SH SEE ALSO
|
jpayne@68
|
57 .ad l
|
jpayne@68
|
58 .nh
|
jpayne@68
|
59 .BR keyctl (1),
|
jpayne@68
|
60 .BR request\-key.conf (5),
|
jpayne@68
|
61 .BR keyrings (7)
|