|REQUEST-KEY(8)||Linux Key Management Utilities||REQUEST-KEY(8)|
However, for debugging purposes, it can be given some options on the command line:
- Turn on debugging mode. In this mode, no attempts are made to access any keys and, if a handler program is selected, it won't be executed; instead, this program will print a message and exit 0.
- In debugging mode, use the proposed key description specified with this rather than the sample ("user;0;0;1f0000;debug:1234") built into the program.
- Use configuration from the current directory. The program will use request-key.d/* and request-key.conf from the current directory rather than from /etc.
- Don't log to the system log. Ordinarily, error messages and debugging messages will be copied to the system log - this will prevent that.
- Turn on debugging output. This may be specified multiple times to produce increasing levels of verbosity.
- Print the program version and exit.
/etc/request-key.conf Fallback configuration file.
|15 Nov 2011||Linux|