nsec3hash.html revision bef75d63d74f58abc0f834ed271526672777ba29
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein - Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - Permission to use, copy, modify, and/or distribute this software for any
c651f15b30f1dae5cc2f00878fb5da5b3a35a468Mark Andrews - purpose with or without fee is hereby granted, provided that the above
c651f15b30f1dae5cc2f00878fb5da5b3a35a468Mark Andrews - copyright notice and this permission notice appear in all copies.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - PERFORMANCE OF THIS SOFTWARE.
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews<!-- $Id: nsec3hash.html,v 1.5 2010/05/19 01:14:14 tbox Exp $ -->
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en">
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein<a name="man.nsec3hash"></a><div class="titlepage"></div>
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein<p><span class="application">nsec3hash</span> — generate NSEC3 hash</p>
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein<div class="cmdsynopsis"><p><code class="command">nsec3hash</code> {<em class="replaceable"><code>salt</code></em>} {<em class="replaceable"><code>algorithm</code></em>} {<em class="replaceable"><code>iterations</code></em>} {<em class="replaceable"><code>domain</code></em>}</p></div>
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein <span><strong class="command">nsec3hash</strong></span> generates an NSEC3 hash based on
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein a set of NSEC3 parameters. This can be used to check the validity
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein of NSEC3 records in a signed zone.
86b0285d7e65601645db4090d62ee6cb63abad6cAndreas Gustafsson The salt provided to the hash algorithm.
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein A number indicating the hash algorithm. Currently the
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein only supported hash algorithm for NSEC3 is SHA-1, which is
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein indicated by the number 1; consequently "1" is the only
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein useful value for this argument.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<dt><span class="term">iterations</span></dt>
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein The number of additional times the hash should be performed.
268a4475065fe6a8cd7cc707820982cf5e98f430Rob Austein The domain name to be hashed.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <em class="citetitle">BIND 9 Administrator Reference Manual</em>,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<p><span class="corpauthor">Internet Systems Consortium</span>