09-18-2008
Thanks.
Why is that it didn't create any output file?
10 More Discussions You Might Find Interesting
1. Linux
we hv a big enviroment networked.
we use squid proxy.
access allowed by src address previously.
we have win2000 network with ads.
my requirement is the proxy should allow domain users only for access.
how can i map my windows userdatabase with squid
is there any thing specific which has 2 b... (1 Reply)
Discussion started by: sriram.s
1 Replies
2. UNIX for Dummies Questions & Answers
Hi, I'm a newbie.
I need help on my first assignment in UNIX.
1. How do I determine the number of non-empty directories?
I was told to create a variable ARCHIVE, which points to the directory that contains the archive of the messages. But I'm so dumb and I don't even know how to do this.
2. In... (1 Reply)
Discussion started by: hygsg
1 Replies
3. UNIX for Dummies Questions & Answers
Hi every one
I have got very very bad Email, My question is:
How can I get all information about that f*** Email, I do mean
IP,reall name, Adress, user name, password etc... I wonder if there is any program or website that I can see that email, help me please
When I used windows Xp(old... (2 Replies)
Discussion started by: Cano
2 Replies
4. UNIX for Dummies Questions & Answers
Hi...
Why should I press F1 to start windows?! I have Xp in my computer... thx 4 help
Cano (1 Reply)
Discussion started by: Cano
1 Replies
5. Shell Programming and Scripting
I have a list of variables: ss1, ss5, ss6, ss8, st2 etc. (these values are not fixed, configurable). Now, I have assigned ss5=”test”. And I want to search in the list for the string “test” to know which variable is having the value “test”. Can u pls tell me how to do this? (10 Replies)
Discussion started by: kanchan_cp
10 Replies
6. Shell Programming and Scripting
Hi,
I need your help guys. I have two data files, namely 101.amberized.pdb & 101.pdb .
Now I want to replace the whole 3rd column of 101.amberized.pdb with the 3rd column of 101.pdb file. How do I do it in shell?
Thanks in advance
Parimal (11 Replies)
Discussion started by: chuchu
11 Replies
7. Shell Programming and Scripting
Hi Folks,
I am new to this forum. and I just started learning shell scripting. I have a file called energy.out which looks like:
-218213.3729
-224215.0059
-221509.3651
-221094.2627
-220660.3223
-222630.2339
-218697.8693
Now I want to calculate the average of energies and then average... (3 Replies)
Discussion started by: pkar
3 Replies
8. Shell Programming and Scripting
When i run this command, everything is ok. The file can be email and attached but soon after i download the file, the file cant be read. It's seem corrupted. Totally cant be read although i'm using context or wordfile. Original file generated at ek_bkup/alert/tbspace_datafile.log is OK.....
... (7 Replies)
Discussion started by: adzuanamir
7 Replies
9. Shell Programming and Scripting
I have downloaded the Putty SSH configuration. I have entered my Host name as illinois.engr.sjsu.edu and i am trying to save that. But i am unable to save.
Also i opened the session and entered my log in name
But it says using keyboard interactive authentication.I am not able to get into $
... (2 Replies)
Discussion started by: VamsiVasili
2 Replies
10. Homework & Coursework Questions
How to find the ten most common words in a file (1 Reply)
Discussion started by: jass
1 Replies
LEARN ABOUT CENTOS
keyctl_search
KEYCTL_SEARCH(3) Linux Key Management Calls KEYCTL_SEARCH(3)
NAME
keyctl_search - Search a keyring for a key
SYNOPSIS
#include <keyutils.h>
long keyctl_search(key_serial_t keyring, const char *type,
const char *description, key_serial_t destination);
DESCRIPTION
keyctl_search() recursively searches the keyring for a key of the specified type and description.
If found, the key will be attached to the destination keyring (if given), and its serial number will be returned.
The source keyring must grant search permission to the caller, and for a key to be found, it must also grant search permission to the call-
er. Child keyrings will be only be recursively searched if they grant search permission to the caller as well.
If the destination keyring is zero, no attempt will be made to forge a link to the key, and just the serial number will be returned.
If the destination keyring is given, then the link may only be formed if the found key grants the caller link permission and the destina-
tion keyring grants the caller write permission.
If the search is successful, and if the destination keyring already contains a link to a key that matches the specified type and descrip-
tion, then that link will be replaced by a link to the found key.
The source keyring and destination keyring serial numbers may be those of valid keyrings to which the caller has appropriate permission, or
they may be special keyring IDs:
KEY_SPEC_THREAD_KEYRING
This specifies the caller's thread-specific keyring.
KEY_SPEC_PROCESS_KEYRING
This specifies the caller's process-specific keyring.
KEY_SPEC_SESSION_KEYRING
This specifies the caller's session-specific keyring.
KEY_SPEC_USER_KEYRING
This specifies the caller's UID-specific keyring.
KEY_SPEC_USER_SESSION_KEYRING
This specifies the caller's UID-session keyring.
RETURN VALUE
On success keyctl_search() returns the serial number of the key it found. On error, the value -1 will be returned and errno will have been
set to an appropriate error.
ERRORS
ENOKEY One of the keyrings doesn't exist, no key was found by the search, or the only key found by the search was a negative key.
ENOTDIR
One of the keyrings is a valid key that isn't a keyring.
EKEYEXPIRED
One of the keyrings has expired, or the only key found was expired.
EKEYREVOKED
One of the keyrings has been revoked, or the only key found was revoked.
ENOMEM Insufficient memory to expand the destination keyring.
EDQUOT The key quota for this user would be exceeded by creating a link to the found key in the destination keyring.
EACCES The source keyring didn't grant search permission, the destination keyring didn't grant write permission or the found key didn't
grant link permission to the caller.
LINKING
Although this is a Linux system call, it is not present in libc but can be found rather in libkeyutils. When linking, -lkeyutils should be
specified to the linker.
SEE ALSO
keyctl(1),
add_key(2),
keyctl(2),
request_key(2),
keyctl(3),
request-key(8)
Linux 4 May 2006 KEYCTL_SEARCH(3)