.\" .\" Copyright (C) 2004 Red Hat, Inc. All Rights Reserved. .\" Written by David Howells (dhowells@redhat.com) .\" .\" This program is free software; you can redistribute it and/or .\" modify it under the terms of the GNU General Public License .\" as published by the Free Software Foundation; either version .\" 2 of the License, or (at your option) any later version. .\" .TH REQUEST-KEY 8 "15 Nov 2011" Linux "Linux Key Management Utilities" .SH NAME request\-key \- handle key instantiation callback requests from the kernel .SH SYNOPSIS \fB/sbin/request\-key \fR [] .SH DESCRIPTION This program is invoked by the kernel when the kernel is asked for a key that it doesn't have immediately available. The kernel creates a partially set up key and then calls out to this program to instantiate it. It is not intended to be called directly. .PP However, for debugging purposes, it can be given some options on the command line: .IP \fB-d\fP Turn on debugging mode. In this mode, no attempts are made to access any keys and, if a handler program is selected, it won't be executed; instead, this program will print a message and exit 0. .IP "\fB-D \fP" In debugging mode, use the proposed key description specified with this rather than the sample ("user;0;0;1f0000;debug:1234") built into the program. .IP \fB-l\fP Use configuration from the current directory. The program will use .IR request-key.d/* " and " request-key.conf from the current directory rather than from .IR /etc . .IP \fB-n\fP Don't log to the system log. Ordinarily, error messages and debugging messages will be copied to the system log - this will prevent that. .IP \fB-v\fP Turn on debugging output. This may be specified multiple times to produce increasing levels of verbosity. .IP \fB--version\fP Print the program version and exit. .SH ERRORS All errors will be logged to the syslog. .SH FILES .ul /etc/request\-key.d/*.conf .ul 0 Individual configuration files. .P .ul /etc/request\-key.conf .ul 0 Fallback configuration file. .SH SEE ALSO .ad l .nh .BR keyctl (1), .BR request\-key.conf (5), .BR keyrings (7)