Sponsored Content
Operating Systems Linux Red Hat Cisco UC Unattended installation Post 302944981 by linuxn00b1 on Monday 25th of May 2015 04:04:47 AM
Old 05-25-2015
I tried the "autostep" but it didn't work.
 

6 More Discussions You Might Find Interesting

1. Linux

Unattended ftp to Solaris

I have a Red Hat 9 server which I am attempting to ftp a file to a Solaris 8 server using a shell script to perform an unattended ftp. I have the following script setup to run: #!/bin/sh # cd /tmp ftp -v 192.20.20.5 << EOF 2>&1 cd /tmp put gatherstats bye EOF I created the .netrc... (1 Reply)
Discussion started by: bubba112557
1 Replies

2. Shell Programming and Scripting

Running scripts unattended

Hi guys just wondering how i could make one of my scripts run unattended without the use of cron? (3 Replies)
Discussion started by: musicmancanora
3 Replies

3. UNIX for Advanced & Expert Users

Unattended disk image deployment?

Hi I need a system that allows a PC to PXE boot and then fully unattended deploy a diskimage created from a Linux system with identical hardware and then reboot when finished. I have been looking around but have not found a tool that is capable of doing this without too many bells and whistles,... (2 Replies)
Discussion started by: smith0083
2 Replies

4. Red Hat

cisco anyconnect VPN client installation??

Anyone had installed Cisco AnyConnect VPN client on RedHat5.3 EL or CentOS 5.3? I tried on CentOS 5.3 but always getting host unreachable error. Same for windows xp works fine. The error log reports: Sep 1 19:14:03 localhost vpnagent: Function: tableCallbackHandler File: RouteMgr.cpp Line:... (3 Replies)
Discussion started by: zing_foru
3 Replies

5. IP Networking

How to stack Cisco 2960-S and Cisco 2960X?

Is there an easy way to stack Cisco 2960-S and Cisco 2960X switches? If you have no idea, follow this: 1. Stacking is not supported on switches running the LAN Lite image. All switches in the stack must be running the LAN Base image. 2. In a mixed stack of Catalyst 2960-X and Catalyst 2960-S... (0 Replies)
Discussion started by: Ayaerlee
0 Replies

6. AIX

Unattended installation of AIX 7.2

While doing an unattended installation of AIX 7.2 -- 002 I noticed this error when I was passing by the screen Filesets processed: 428 of 761 System Installation Time: 1 hr 12 mins Tasks Complete: 60% installp: APPLYING software for: Java5.sdk 5.0.0.620 Restoring... (3 Replies)
Discussion started by: filosophizer
3 Replies
KEYCTL_SEARCH(3)					    Linux Key Management Calls						  KEYCTL_SEARCH(3)

NAME
keyctl_search - Search a keyring for a key SYNOPSIS
#include <keyutils.h> long keyctl_search(key_serial_t keyring, const char *type, const char *description, key_serial_t destination); DESCRIPTION
keyctl_search() recursively searches the keyring for a key of the specified type and description. If found, the key will be attached to the destination keyring (if given), and its serial number will be returned. The source keyring must grant search permission to the caller, and for a key to be found, it must also grant search permission to the call- er. Child keyrings will be only be recursively searched if they grant search permission to the caller as well. If the destination keyring is zero, no attempt will be made to forge a link to the key, and just the serial number will be returned. If the destination keyring is given, then the link may only be formed if the found key grants the caller link permission and the destina- tion keyring grants the caller write permission. If the search is successful, and if the destination keyring already contains a link to a key that matches the specified type and descrip- tion, then that link will be replaced by a link to the found key. The source keyring and destination keyring serial numbers may be those of valid keyrings to which the caller has appropriate permission, or they may be special keyring IDs: KEY_SPEC_THREAD_KEYRING This specifies the caller's thread-specific keyring. KEY_SPEC_PROCESS_KEYRING This specifies the caller's process-specific keyring. KEY_SPEC_SESSION_KEYRING This specifies the caller's session-specific keyring. KEY_SPEC_USER_KEYRING This specifies the caller's UID-specific keyring. KEY_SPEC_USER_SESSION_KEYRING This specifies the caller's UID-session keyring. RETURN VALUE
On success keyctl_search() returns the serial number of the key it found. On error, the value -1 will be returned and errno will have been set to an appropriate error. ERRORS
ENOKEY One of the keyrings doesn't exist, no key was found by the search, or the only key found by the search was a negative key. ENOTDIR One of the keyrings is a valid key that isn't a keyring. EKEYEXPIRED One of the keyrings has expired, or the only key found was expired. EKEYREVOKED One of the keyrings has been revoked, or the only key found was revoked. ENOMEM Insufficient memory to expand the destination keyring. EDQUOT The key quota for this user would be exceeded by creating a link to the found key in the destination keyring. EACCES The source keyring didn't grant search permission, the destination keyring didn't grant write permission or the found key didn't grant link permission to the caller. LINKING
Although this is a Linux system call, it is not present in libc but can be found rather in libkeyutils. When linking, -lkeyutils should be specified to the linker. SEE ALSO
keyctl(1), add_key(2), keyctl(2), request_key(2), keyctl(3), request-key(8) Linux 4 May 2006 KEYCTL_SEARCH(3)
All times are GMT -4. The time now is 04:05 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy