···443443 /sbin/request-key will be invoked in an attempt to obtain a key. The444444 callout_info string will be passed as an argument to the program.445445446446- See also Documentation/security/keys-request-key.txt.446446+ See also Documentation/security/keys/request-key.rst.447447448448449449The keyctl syscall functions are:···973973 If successful, the key will have been attached to the default keyring for974974 implicitly obtained request-key keys, as set by KEYCTL_SET_REQKEY_KEYRING.975975976976- See also Documentation/security/keys-request-key.txt.976976+ See also Documentation/security/keys/request-key.rst.977977978978979979 * To search for a key, passing auxiliary data to the upcaller, call::
+1-1
Documentation/security/keys/request-key.rst
···33===================4455The key request service is part of the key retention service (refer to66-Documentation/security/keys.txt). This document explains more fully how66+Documentation/security/core.rst). This document explains more fully how77the requesting algorithm works.8899The process starts by either the kernel requesting a service by calling
+1-1
Documentation/security/keys/trusted-encrypted.rst
···172172are anticipated. In particular the new format 'ecryptfs' has been defined in173173in order to use encrypted keys to mount an eCryptfs filesystem. More details174174about the usage can be found in the file175175-``Documentation/security/keys-ecryptfs.txt``.175175+``Documentation/security/keys/ecryptfs.rst``.