Provided by: manpages-dev_3.35-0.1ubuntu1_all bug

NAME

       request_key - Request a key from the kernel's key management facility

SYNOPSIS

       #include <keyutils.h>

       key_serial_t request_key(const char *type, const char *description,
       const char *callout_info, key_serial_t keyring);

DESCRIPTION

       request_key()  asks  the  kernel  to  find a key of the given type that
       matches the specified description and, if successful, to attach  it  to
       the nominated keyring and to return its serial number.

       request_key()  first  recursively searches all the keyrings attached to
       the calling process in  the  order  thread-specific  keyring,  process-
       specific keyring and then session keyring for a matching key.

       If  request_key()  is called from a program invoked by request_key() on
       behalf of some other process to generate a key, then  the  keyrings  of
       that  other  process  will be searched next, using that other process's
       UID, GID, groups and security context to control access.

       The keys in each keyring searched are checked for a  match  before  any
       child  keyrings  are  recursed into.  Only keys that are searchable for
       the caller may be found, and only searchable keyrings may be searched.

       If the key is not found then, if callout_info  is  set,  this  function
       will  attempt to look further afield.  In such a case, the callout_info
       is passed to a userspace service such as /sbin/request-key to  generate
       the key.

       If  that  is  unsuccessful  also, then an error will be returned, and a
       temporary negative key will be  installed  in  the  nominated  keyring.
       This  will  expire after a few seconds, but will cause subsequent calls
       to request_key() to fail until it does.

       The keyring serial number may be that of a valid keyring to  which  the
       caller has write permission, or it may be a special keyring ID:

       KEY_SPEC_THREAD_KEYRING
              This specifies the caller's thread-specific keyring.

       KEY_SPEC_PROCESS_KEYRING
              This specifies the caller's process-specific keyring.

       KEY_SPEC_SESSION_KEYRING
              This specifies the caller's session-specific keyring.

       KEY_SPEC_USER_KEYRING
              This specifies the caller's UID-specific keyring.

       KEY_SPEC_USER_SESSION_KEYRING
              This specifies the caller's UID-session keyring.

       If  a  key is created, no matter whether it's a valid key or a negative
       key, it will displace any other key of the same  type  and  description
       from the destination keyring.

RETURN VALUE

       On success request_key() returns the serial number of the key it found.
       On error, the value -1 will be returned and errno will have been set to
       an appropriate error.

ERRORS

       EACCES The keyring wasn't available for modification by the user.

       EINTR  The request was interrupted by a signal.

       EDQUOT The  key  quota for this user would be exceeded by creating this
              key or linking it to the keyring.

       EKEYEXPIRED
              An expired key was found, but no replacement could be obtained.

       EKEYREJECTED
              The attempt to generate a new key was rejected.

       EKEYREVOKED
              A revoked key was found, but no replacement could be obtained.

       ENOMEM Insufficient memory to create a key.

       ENOKEY No matching key was found.

LINKING

       Although this is a Linux system call, it is not present in libc but can
       be  found  rather  in  libkeyutils.  When linking, -lkeyutils should be
       specified to the linker.

SEE ALSO

       keyctl(1), add_key(2), keyctl(2), request-key(8)

COLOPHON

       This page is part of release 3.35 of the Linux  man-pages  project.   A
       description  of  the project, and information about reporting bugs, can
       be found at http://man7.org/linux/man-pages/.