request-key(8) — Linux manual page


REQUEST-KEY(8)         Linux Key Management Utilities         REQUEST-KEY(8)

NAME         top

       request-key  -  handle  key  instantiation callback requests from the

SYNOPSIS         top

       /sbin/request-key <op> <key> <uid> <gid> <threadring> <processring>
            <sessionring> [<info>]

DESCRIPTION         top

       This program is invoked by the kernel when the kernel is asked for a
       key that it doesn't have immediately available. The kernel creates a
       partially set up key and then calls out to this program to
       instantiate it. It is not intended to be called directly.

       However, for debugging purposes, it can be given some options on the
       command line:

       -d     Turn on debugging mode.  In this mode, no attempts are made to
              access any keys and, if a handler program is selected, it
              won't be executed; instead, this program will print a message
              and exit 0.

       -D     In debugging mode, use the proposed key description specified
              with this rather than the sample
              ("user;0;0;1f0000;debug:1234") built into the program.

       -l     Use configuration from the current directory.  The program
              will use request-key.d/* and request-key.conf from the current
              directory rather than from /etc.

       -n     Don't log to the system log.  Ordinarily, error messages and
              debugging messages will be copied to the system log - this
              will prevent that.

       -v     Turn on debugging output.  This may be specified multiple
              times to produce increasing levels of verbosity.

              Print the program version and exit.

ERRORS         top

       All errors will be logged to the syslog.

FILES         top

       /etc/request-key.d/*.conf Individual configuration files.

       /etc/request-key.conf Fallback configuration file.

SEE ALSO         top

       keyctl(1), request-key.conf(5), keyrings(7)

COLOPHON         top

       This page is part of the keyutils (key management utilities) project.
       Information about the project can be found at [unknown -- if you
       know, please contact] If you have a bug report for
       this manual page, send it to  This page was
       obtained from the project's upstream Git repository
       on 2020-09-18.  (At that time, the date of the most recent commit
       that was found in the repository was 2020-07-07.)  If you discover
       any rendering problems in this HTML version of the page, or you
       believe there is a better or more up-to-date source for the page, or
       you have corrections or improvements to the information in this
       COLOPHON (which is not part of the original manual page), send a mail

Linux                            15 Nov 2011                  REQUEST-KEY(8)

Pages that refer to this page: keyctl(1)keyctl(2)request_key(2)keyctl_assume_authority(3)keyctl_instantiate(3)keyctl_instantiate_iov(3)keyctl_negate(3)keyctl_reject(3)keyctl_set_reqkey_keyring(3)nfsidmap(5)keyrings(7)keyutils(7)key.dns_resolver(8)