REQUEST-KEY(8)         Linux Key Management Utilities         REQUEST-KEY(8)

NAME         top

       request-key  -  handle  key  instantiation callback requests from the

SYNOPSIS         top

       /sbin/request-key <op> <key> <uid> <gid> <threadring> <processring>
            <sessionring> [<info>]

DESCRIPTION         top

       This program is invoked by the kernel when the kernel is asked for a
       key that it doesn't have immediately available. The kernel creates a
       partially set up key and then calls out to this program to
       instantiate it. It is not intended to be called directly.

ERRORS         top

       All errors will be logged to the syslog.

FILES         top

       /etc/request-key.conf Instantiation handler configuration file.

       /etc/request-key.d/<keytype>.conf Keytype specific configuration

SEE ALSO         top

       keyctl(1), request-key.conf(5), keyrings(7)

COLOPHON         top

       This page is part of the keyutils (key management utilities) project.
       Information about the project can be found at [unknown -- if you
       know, please contact] If you have a bug report for
       this manual page, send it to  This page was
       obtained from the project's upstream Git repository
       on 2018-10-29.  (At that time, the date of the most recent commit
       that was found in the repository was 2018-08-21.)  If you discover
       any rendering problems in this HTML version of the page, or you
       believe there is a better or more up-to-date source for the page, or
       you have corrections or improvements to the information in this
       COLOPHON (which is not part of the original manual page), send a mail

Linux                            15 Nov 2011                  REQUEST-KEY(8)

Pages that refer to this page: keyctl(1)keyctl(2)request_key(2)keyctl_instantiate(3)keyctl_set_reqkey_keyring(3)nfsidmap(5)keyrings(7)keyutils(7)key.dns_resolver(8)