request-key(8) — Linux manual page


REQUEST-KEY(8)       Linux Key Management Utilities       REQUEST-KEY(8)

NAME         top

       request-key - handle key instantiation callback requests from the

SYNOPSIS         top

       /sbin/request-key <op> <key> <uid> <gid> <threadring>
       <processring>      <sessionring> [<info>]

DESCRIPTION         top

       This program is invoked by the kernel when the kernel is asked
       for a key that it doesn't have immediately available. The kernel
       creates a partially set up key and then calls out to this program
       to instantiate it. It is not intended to be called directly.

       However, for debugging purposes, it can be given some options on
       the command line:

       -d     Turn on debugging mode.  In this mode, no attempts are
              made to access any keys and, if a handler program is
              selected, it won't be executed; instead, this program will
              print a message and exit 0.

       -D     In debugging mode, use the proposed key description
              specified with this rather than the sample
              ("user;0;0;1f0000;debug:1234") built into the program.

       -l     Use configuration from the current directory.  The program
              will use request-key.d/* and request-key.conf from the
              current directory rather than from /etc.

       -n     Don't log to the system log.  Ordinarily, error messages
              and debugging messages will be copied to the system log -
              this will prevent that.

       -v     Turn on debugging output.  This may be specified multiple
              times to produce increasing levels of verbosity.

              Print the program version and exit.

ERRORS         top

       All errors will be logged to the syslog.

FILES         top

       /etc/request-key.d/*.conf Individual configuration files.

       /etc/request-key.conf Fallback configuration file.

SEE ALSO         top

       keyctl(1), request-key.conf(5), keyrings(7)

COLOPHON         top

       This page is part of the keyutils (key management utilities)
       project.  Information about the project can be found at [unknown
       -- if you know, please contact] If you have a
       bug report for this manual page, send it to  This page was obtained from the
       project's upstream Git repository
       on 2023-12-22.  (At that time, the date of the most recent commit
       that was found in the repository was 2023-03-20.)  If you
       discover any rendering problems in this HTML version of the page,
       or you believe there is a better or more up-to-date source for
       the page, or you have corrections or improvements to the
       information in this COLOPHON (which is not part of the original
       manual page), send a mail to

Linux                          15 Nov 2011                REQUEST-KEY(8)

Pages that refer to this page: keyctl(1)keyctl(2)request_key(2)keyctl_instantiate(3)keyctl_set_reqkey_keyring(3)keyrings(7)keyutils(7)key.dns_resolver(8)nfsidmap(8)