nsec3hash.8 revision bd537d750f489826deed5165648a8774ff5b2c11
Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
$Id: nsec3hash.8,v 1.4 2009/03/03 01:12:26 tbox Exp $
Title: nsec3hash
Author:
Generator: DocBook XSL Stylesheets v1.71.1 <http://docbook.sf.net/>
Date: Feb 18, 2009
Manual: BIND9
Source: BIND9
disable justification (adjust text to left margin only)
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
$Id: nsec3hash.8,v 1.4 2009/03/03 01:12:26 tbox Exp $
Title: nsec3hash
Author:
Generator: DocBook XSL Stylesheets v1.71.1 <http://docbook.sf.net/>
Date: Feb 18, 2009
Manual: BIND9
Source: BIND9
"NSEC3HASH" "8" "Feb 18, 2009" "BIND9" "BIND9"
disable hyphenationdisable justification (adjust text to left margin only)
"NAME"
nsec3hash - generate NSEC3 hash
"SYNOPSIS"
10 nsec3hash {salt} {algorithm} {iterations} {domain}
"DESCRIPTION"
nsec3hash generates an NSEC3 hash based on a set of NSEC3 parameters. This can be used to check the validity of NSEC3 records in a signed zone.
"ARGUMENTS"
salt
The salt provided to the hash algorithm.
algorithm
A number indicating the hash algorithm. Currently the only supported hash algorithm for NSEC3 is SHA-1, which is indicated by the number 1; consequently "1" is the only useful value for this argument.
iterations
The number of additional times the hash should be performed.
domain
The domain name to be hashed.
"SEE ALSO"
BIND 9 Administrator Reference Manual, RFC 5155.
"AUTHOR"
Internet Systems Consortium
"COPYRIGHT"
Copyright \(co 2009 Internet Systems Consortium, Inc. ("ISC")