манипулировать средствами управления ключами ядра (manipulate the kernel's key management facility)
Смотри также (See also)
keyctl(1), add_key(2), request_key(2), keyctl(3),
keyctl_assume_authority(3), keyctl_chown(3), keyctl_clear(3),
keyctl_describe(3), keyctl_describe_alloc
(3),
keyctl_dh_compute(3), keyctl_dh_compute_alloc
(3),
keyctl_get_keyring_ID(3), keyctl_get_persistent(3),
keyctl_get_security(3), keyctl_get_security_alloc
(3),
keyctl_instantiate(3), keyctl_instantiate_iov(3),
keyctl_invalidate(3), keyctl_join_session_keyring(3),
keyctl_link(3), keyctl_negate(3), keyctl_read(3),
keyctl_read_alloc
(3), keyctl_reject(3), keyctl_revoke(3),
keyctl_search(3), keyctl_session_to_parent(3),
keyctl_set_reqkey_keyring(3), keyctl_set_timeout(3),
keyctl_setperm(3), keyctl_unlink(3), keyctl_update(3),
recursive_key_scan(3), recursive_session_key_scan(3),
capabilities(7), credentials(7), keyrings(7), keyutils(7),
persistent-keyring(7), process-keyring(7), session-keyring(7),
thread-keyring(7), user-keyring(7), user_namespaces(7),
user-session-keyring(7), request-key(8)
The kernel source files under Documentation/security/keys/ (or,
before Linux 4.13, in the file Documentation/security/keys.txt).