annotate CSP2/CSP2_env/env-d9b9114564458d9d-741b3de822f2aaca6c6caa4325c4afce/share/man/man8/request-key.8 @ 68:5028fdace37b

planemo upload commit 2e9511a184a1ca667c7be0c6321a36dc4e3d116d
author jpayne
date Tue, 18 Mar 2025 16:23:26 -0400
parents
children
rev   line source
jpayne@68 1 .\"
jpayne@68 2 .\" Copyright (C) 2004 Red Hat, Inc. All Rights Reserved.
jpayne@68 3 .\" Written by David Howells (dhowells@redhat.com)
jpayne@68 4 .\"
jpayne@68 5 .\" This program is free software; you can redistribute it and/or
jpayne@68 6 .\" modify it under the terms of the GNU General Public License
jpayne@68 7 .\" as published by the Free Software Foundation; either version
jpayne@68 8 .\" 2 of the License, or (at your option) any later version.
jpayne@68 9 .\"
jpayne@68 10 .TH REQUEST-KEY 8 "15 Nov 2011" Linux "Linux Key Management Utilities"
jpayne@68 11 .SH NAME
jpayne@68 12 request\-key \- handle key instantiation callback requests from the kernel
jpayne@68 13 .SH SYNOPSIS
jpayne@68 14 \fB/sbin/request\-key \fR<op> <key> <uid> <gid> <threadring> <processring>
jpayne@68 15 <sessionring> [<info>]
jpayne@68 16 .SH DESCRIPTION
jpayne@68 17 This program is invoked by the kernel when the kernel is asked for a key that
jpayne@68 18 it doesn't have immediately available. The kernel creates a partially set up
jpayne@68 19 key and then calls out to this program to instantiate it. It is not intended
jpayne@68 20 to be called directly.
jpayne@68 21 .PP
jpayne@68 22 However, for debugging purposes, it can be given some options on the command
jpayne@68 23 line:
jpayne@68 24 .IP \fB-d\fP
jpayne@68 25 Turn on debugging mode. In this mode, no attempts are made to access any keys
jpayne@68 26 and, if a handler program is selected, it won't be executed; instead, this
jpayne@68 27 program will print a message and exit 0.
jpayne@68 28 .IP \fB-D <description>\fP
jpayne@68 29 In debugging mode, use the proposed key description specified with this rather
jpayne@68 30 than the sample ("user;0;0;1f0000;debug:1234") built into the program.
jpayne@68 31 .IP \fB-l\fP
jpayne@68 32 Use configuration from the current directory. The program will use
jpayne@68 33 .IR request-key.d/* " and " request-key.conf
jpayne@68 34 from the current directory rather than from
jpayne@68 35 .IR /etc .
jpayne@68 36 .IP \fB-n\fP
jpayne@68 37 Don't log to the system log. Ordinarily, error messages and debugging messages
jpayne@68 38 will be copied to the system log - this will prevent that.
jpayne@68 39 .IP \fB-v\fP
jpayne@68 40 Turn on debugging output. This may be specified multiple times to produce
jpayne@68 41 increasing levels of verbosity.
jpayne@68 42 .IP \fB--version\fP
jpayne@68 43 Print the program version and exit.
jpayne@68 44 .SH ERRORS
jpayne@68 45 All errors will be logged to the syslog.
jpayne@68 46 .SH FILES
jpayne@68 47 .ul
jpayne@68 48 /etc/request\-key.d/*.conf
jpayne@68 49 .ul 0
jpayne@68 50 Individual configuration files.
jpayne@68 51 .P
jpayne@68 52 .ul
jpayne@68 53 /etc/request\-key.conf
jpayne@68 54 .ul 0
jpayne@68 55 Fallback configuration file.
jpayne@68 56 .SH SEE ALSO
jpayne@68 57 .ad l
jpayne@68 58 .nh
jpayne@68 59 .BR keyctl (1),
jpayne@68 60 .BR request\-key.conf (5),
jpayne@68 61 .BR keyrings (7)