nsec3hash.docbook revision 938440694b33cd752e9e4b71a526368b4811c177
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt "http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd"
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt [<!ENTITY mdash "—">]>
938440694b33cd752e9e4b71a526368b4811c177Tinderbox User - Copyright (C) 2009, 2014 Internet Systems Consortium, Inc. ("ISC")
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - Permission to use, copy, modify, and/or distribute this software for any
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - purpose with or without fee is hereby granted, provided that the above
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - copyright notice and this permission notice appear in all copies.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - PERFORMANCE OF THIS SOFTWARE.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refentryinfo>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refentryinfo>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refentrytitle><application>nsec3hash</application></refentrytitle>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refnamediv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refname><application>nsec3hash</application></refname>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refnamediv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <holder>Internet Systems Consortium, Inc. ("ISC")</holder>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </copyright>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refsynopsisdiv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <cmdsynopsis>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">salt</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">algorithm</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">iterations</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">domain</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </cmdsynopsis>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refsynopsisdiv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <command>nsec3hash</command> generates an NSEC3 hash based on
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt a set of NSEC3 parameters. This can be used to check the validity
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt of NSEC3 records in a signed zone.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <variablelist>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The salt provided to the hash algorithm.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt A number indicating the hash algorithm. Currently the
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt only supported hash algorithm for NSEC3 is SHA-1, which is
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt indicated by the number 1; consequently "1" is the only
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt useful value for this argument.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The number of additional times the hash should be performed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The domain name to be hashed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </variablelist>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <citetitle>BIND 9 Administrator Reference Manual</citetitle>,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para><corpauthor>Internet Systems Consortium</corpauthor>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - Local variables:
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - mode: sgml