comparison CSP2/CSP2_env/env-d9b9114564458d9d-741b3de822f2aaca6c6caa4325c4afce/share/man/man3/keyctl.3 @ 68:5028fdace37b

planemo upload commit 2e9511a184a1ca667c7be0c6321a36dc4e3d116d
author jpayne
date Tue, 18 Mar 2025 16:23:26 -0400
parents
children
comparison
equal deleted inserted replaced
67:0e9998148a16 68:5028fdace37b
1 .\"
2 .\" Copyright (C) 2010 Red Hat, Inc. All Rights Reserved.
3 .\" Written by David Howells (dhowells@redhat.com)
4 .\"
5 .\" This program is free software; you can redistribute it and/or
6 .\" modify it under the terms of the GNU General Public Licence
7 .\" as published by the Free Software Foundation; either version
8 .\" 2 of the Licence, or (at your option) any later version.
9 .\"
10 .TH KEYCTL 3 "21 Feb 2014" Linux "Linux Key Management Calls"
11 .\"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
12 .SH NAME
13 keyctl_*() \- key management function wrappers
14 .\"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
15 .SH DESCRIPTION
16 The
17 .BR keyctl ()
18 system call is a multiplexor for a number of key management functions. These
19 should be called via the wrappers in the libkeyutils library.
20 .P
21 The functions can be compiled in by including the \fBkeyutils\fR header file:
22 .sp
23 .RS
24 .nf
25 .B #include <keyutils.h>
26 .RE
27 .P
28 and then telling the linker it should link in the library:
29 .sp
30 .RS
31 .nf
32 .B \-lkeyutils
33 .RE
34 .\"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
35 .SH KEYCTL FUNCTIONS
36 .BR keyctl_assume_authority (3)
37 .br
38 .BR keyctl_chown (3)
39 .br
40 .BR keyctl_capabilities (3)
41 .br
42 .BR keyctl_clear (3)
43 .br
44 .BR keyctl_describe (3)
45 .br
46 .BR keyctl_describe_alloc (3)
47 .br
48 .BR keyctl_dh_compute (3)
49 .br
50 .BR keyctl_dh_compute_alloc (3)
51 .br
52 .BR keyctl_get_keyring_ID (3)
53 .br
54 .BR keyctl_get_persistent (3)
55 .br
56 .BR keyctl_get_security (3)
57 .br
58 .BR keyctl_get_security_alloc (3)
59 .br
60 .BR keyctl_instantiate (3)
61 .br
62 .BR keyctl_instantiate_iov (3)
63 .br
64 .BR keyctl_invalidate (3)
65 .br
66 .BR keyctl_join_session_keyring (3)
67 .br
68 .BR keyctl_link (3)
69 .br
70 .BR keyctl_move (3)
71 .br
72 .BR keyctl_negate (3)
73 .br
74 .BR keyctl_pkey_dec (3)
75 .br
76 .BR keyctl_pkey_enc (3)
77 .br
78 .BR keyctl_pkey_query (3)
79 .br
80 .BR keyctl_pkey_sign (3)
81 .br
82 .BR keyctl_pkey_verify (3)
83 .br
84 .BR keyctl_read (3)
85 .br
86 .BR keyctl_read_alloc (3)
87 .br
88 .BR keyctl_reject (3)
89 .br
90 .BR keyctl_restrict_keyring (3)
91 .br
92 .BR keyctl_revoke (3)
93 .br
94 .BR keyctl_search (3)
95 .br
96 .BR keyctl_session_to_parent (3)
97 .br
98 .BR keyctl_set_reqkey_keyring (3)
99 .br
100 .BR keyctl_set_timeout (3)
101 .br
102 .BR keyctl_setperm (3)
103 .br
104 .BR keyctl_unlink (3)
105 .br
106 .BR keyctl_update (3)
107 .\"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
108 .SH UTILITY FUNCTIONS
109 .BR find_key_by_type_and_name (3)
110 .br
111 .BR recursive_key_scan (3)
112 .br
113 .BR recursive_session_key_scan (3)
114 .\"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
115 .SH SEE ALSO
116 .ad l
117 .nh
118 .BR keyctl (1),
119 .BR add_key (2),
120 .BR keyctl (2),
121 .BR request_key (2),
122 .BR keyrings (7),
123 .BR keyutils (7)