nsec3hash.docbook revision 2eeb74d1cf5355dd98f6d507a10086e16bb08c4b
938440694b33cd752e9e4b71a526368b4811c177Tinderbox User - Copyright (C) 2009, 2014 Internet Systems Consortium, Inc. ("ISC")
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - Permission to use, copy, modify, and/or distribute this software for any
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - purpose with or without fee is hereby granted, provided that the above
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - copyright notice and this permission notice appear in all copies.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - PERFORMANCE OF THIS SOFTWARE.
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt<!-- Converted by db4-upgrade version 1.0 -->
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt<refentry xmlns="http://docbook.org/ns/docbook" version="5.0" xml:id="man.nsec3hash">
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refentryinfo>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <corpauthor>Internet Systems Consortium, Inc.</corpauthor>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refentryinfo>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refentrytitle><application>nsec3hash</application></refentrytitle>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refnamediv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refname><application>nsec3hash</application></refname>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refnamediv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <holder>Internet Systems Consortium, Inc. ("ISC")</holder>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </copyright>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refsynopsisdiv>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <arg choice="req" rep="norepeat"><replaceable class="parameter">salt</replaceable></arg>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <arg choice="req" rep="norepeat"><replaceable class="parameter">algorithm</replaceable></arg>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <arg choice="req" rep="norepeat"><replaceable class="parameter">iterations</replaceable></arg>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <arg choice="req" rep="norepeat"><replaceable class="parameter">domain</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </cmdsynopsis>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refsynopsisdiv>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <refsection><info><title>DESCRIPTION</title></info>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <command>nsec3hash</command> generates an NSEC3 hash based on
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt a set of NSEC3 parameters. This can be used to check the validity
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt of NSEC3 records in a signed zone.
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt </refsection>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <variablelist>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The salt provided to the hash algorithm.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt A number indicating the hash algorithm. Currently the
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt only supported hash algorithm for NSEC3 is SHA-1, which is
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt indicated by the number 1; consequently "1" is the only
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt useful value for this argument.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The number of additional times the hash should be performed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The domain name to be hashed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </variablelist>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt </refsection>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <citetitle>BIND 9 Administrator Reference Manual</citetitle>,
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt </refsection>