nsec3hash.docbook revision 938440694b33cd752e9e4b71a526368b4811c177
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt "http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd"
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt [<!ENTITY mdash "&#8212;">]>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<!--
938440694b33cd752e9e4b71a526368b4811c177Tinderbox User - Copyright (C) 2009, 2014 Internet Systems Consortium, Inc. ("ISC")
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt -
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - Permission to use, copy, modify, and/or distribute this software for any
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - purpose with or without fee is hereby granted, provided that the above
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - copyright notice and this permission notice appear in all copies.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt -
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - PERFORMANCE OF THIS SOFTWARE.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt-->
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<refentry id="man.nsec3hash">
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refentryinfo>
1753d3c4d74241a847794f7e7cfd94cc79be6600Evan Hunt <date>March 02, 2009</date>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refentryinfo>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refmeta>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refentrytitle><application>nsec3hash</application></refentrytitle>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <manvolnum>8</manvolnum>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refmiscinfo>BIND9</refmiscinfo>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refmeta>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refnamediv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refname><application>nsec3hash</application></refname>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refpurpose>generate NSEC3 hash</refpurpose>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refnamediv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <docinfo>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <copyright>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <year>2009</year>
938440694b33cd752e9e4b71a526368b4811c177Tinderbox User <year>2014</year>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <holder>Internet Systems Consortium, Inc. ("ISC")</holder>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </copyright>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </docinfo>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refsynopsisdiv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <cmdsynopsis>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <command>nsec3hash</command>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">salt</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">algorithm</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">iterations</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <arg choice="req"><replaceable class="parameter">domain</replaceable></arg>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </cmdsynopsis>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refsynopsisdiv>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <title>DESCRIPTION</title>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <command>nsec3hash</command> generates an NSEC3 hash based on
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt a set of NSEC3 parameters. This can be used to check the validity
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt of NSEC3 records in a signed zone.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <title>ARGUMENTS</title>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <variablelist>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <term>salt</term>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The salt provided to the hash algorithm.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <term>algorithm</term>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt A number indicating the hash algorithm. Currently the
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt only supported hash algorithm for NSEC3 is SHA-1, which is
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt indicated by the number 1; consequently "1" is the only
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt useful value for this argument.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <term>iterations</term>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The number of additional times the hash should be performed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <term>domain</term>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The domain name to be hashed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </listitem>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </varlistentry>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </variablelist>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <title>SEE ALSO</title>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <citetitle>BIND 9 Administrator Reference Manual</citetitle>,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <citetitle>RFC 5155</citetitle>.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <title>AUTHOR</title>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <para><corpauthor>Internet Systems Consortium</corpauthor>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </para>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt </refsect1>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt</refentry><!--
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - Local variables:
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - mode: sgml
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - End:
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt-->