keyctl.2: Note libkeyutils equivalents of various operations

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2016-10-19 10:24:10 +02:00
parent cbf0e35e65
commit efd4c0cdd1
1 changed files with 96 additions and 0 deletions

View File

@ -217,6 +217,11 @@ to the new user should the attribute be changed.
The
.I arg5
argument is ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_chown (3).
.TP
.B KEYCTL_SETPERM
Change the permissions of the key with the ID provided in the
@ -290,6 +295,11 @@ and
The
.IR arg4 " and " arg5
arguments are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_setperm (3).
.TP
.B KEYCTL_DESCRIBE
Describe a key.
@ -323,6 +333,11 @@ The description itself is provided in the format:
The
.I arg5
argument is ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_describe (3).
.TP
.B KEYCTL_CLEAR
Clear the contents of the keyring with the ID provided in the
@ -340,6 +355,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_clear (3).
.TP
.B KEYCTL_LINK
Link a key (provided in the
@ -364,6 +384,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_link (3).
.TP
.B KEYCTL_UNLINK
Unlink a key (provided in the
@ -388,6 +413,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_unlink (3).
.TP
.B KEYCTL_SEARCH
Search for a key in a keyring with the ID provided in the
@ -422,6 +452,11 @@ argument (converted to
.I key_serial_t
type) contains a non-zero value, it is interpreted as a keyring ID to which
the found key should be linked.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_search (3).
.TP
.B KEYCTL_READ
Read the payload of the key whose ID is provided in the
@ -448,6 +483,11 @@ permission when searched for from the process keyrings.
The
.I arg5
argument is ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_read (3).
.TP
.B KEYCTL_INSTANTIATE
Instantiate a partially constructed key whose ID is provided in the
@ -470,6 +510,10 @@ argument (converted to
type).
The caller must have the appropriate instantiation permit set (auth key).
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_instantiate (3).
.TP
.B KEYCTL_NEGATE
Negatively instantiate a partially constructed key with the ID provided in the
@ -505,6 +549,11 @@ This is equivalent to the call
The
.I arg5
argument is ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_negate (3).
.TP
.BR KEYCTL_SET_REQKEY_KEYRING " (since Linux 2.6.13)"
Read or set the default keyring in which
@ -553,6 +602,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_set_reqkey_keyring (3).
.TP
.BR KEYCTL_SET_TIMEOUT " (since Linux 2.6.16)"
Set timeout on a key.
@ -579,6 +633,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_set_timeout (3).
.TP
.BR KEYCTL_ASSUME_AUTHORITY " (since Linux 2.6.16)"
Assume (or clear) the authority for the key instantiation.
@ -603,6 +662,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_assume_authority (3).
.TP
.BR KEYCTL_GET_SECURITY " (since Linux 2.6.26)"
Get the LSM security label of the specified key.
@ -624,6 +688,13 @@ type).
The
.I arg5
argument is ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_get_security (3)
and
.BR keyctl_get_security_alloc (3).
.TP
.BR KEYCTL_SESSION_TO_PARENT " (since Linux 2.6.32)"
Apply session keyring to parent process.
@ -645,6 +716,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_session_to_parent (3).
.TP
.BR KEYCTL_REJECT " (since Linux 2.6.39)"
Negatively instantiate a partially constructed key with the ID provided in the
@ -675,6 +751,11 @@ Negative keys are used to rate limit repeated
.BR request_key (2)
calls by causing them to return the error specified until the negative key
expires.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_reject (3).
.TP
.BR KEYCTL_INSTANTIATE_IOV " (since Linux 2.6.39)"
Instantiate a key (with the ID specified in the
@ -703,6 +784,11 @@ No other permissions are required.
The
.I arg5
argument is ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_instantiate_iov (3).
.TP
.BR KEYCTL_INVALIDATE " (since Linux 3.5)"
Invalidate a key with the ID provided in the
@ -724,6 +810,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_invalidate (3).
.TP
.BR KEYCTL_GET_PERSISTENT " (since Linux 3.13)"
Get the persistent keyring of the user specified in the
@ -742,6 +833,11 @@ The arguments
and
.IR arg5
are ignored.
This operation is exposed by
.I libkeyutils
via the function
.BR keyctl_get_persistent (3).
.TP
.BR KEYCTL_DH_COMPUTE " (since Linux 4.7)"
Compute Diffie-Hellman values.