nsec3hash.html revision bef75d63d74f58abc0f834ed271526672777ba29
bef75d63d74f58abc0f834ed271526672777ba29Automatic Updater - Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
4f91bcae4368308b0bfd13769a059de222a3769dAutomatic Updater - Permission to use, copy, modify, and/or distribute this software for any
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - purpose with or without fee is hereby granted, provided that the above
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - copyright notice and this permission notice appear in all copies.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
bef75d63d74f58abc0f834ed271526672777ba29Automatic Updater - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - PERFORMANCE OF THIS SOFTWARE.
bef75d63d74f58abc0f834ed271526672777ba29Automatic Updater<!-- $Id: nsec3hash.html,v 1.5 2010/05/19 01:14:14 tbox Exp $ -->
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
bd537d750f489826deed5165648a8774ff5b2c11Automatic Updater<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en">
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<a name="man.nsec3hash"></a><div class="titlepage"></div>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<p><span class="application">nsec3hash</span> — generate NSEC3 hash</p>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<div class="cmdsynopsis"><p><code class="command">nsec3hash</code> {<em class="replaceable"><code>salt</code></em>} {<em class="replaceable"><code>algorithm</code></em>} {<em class="replaceable"><code>iterations</code></em>} {<em class="replaceable"><code>domain</code></em>}</p></div>
bd537d750f489826deed5165648a8774ff5b2c11Automatic Updater<a name="id2543367"></a><h2>DESCRIPTION</h2>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <span><strong class="command">nsec3hash</strong></span> generates an NSEC3 hash based on
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt a set of NSEC3 parameters. This can be used to check the validity
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt of NSEC3 records in a signed zone.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The salt provided to the hash algorithm.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt A number indicating the hash algorithm. Currently the
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt only supported hash algorithm for NSEC3 is SHA-1, which is
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt indicated by the number 1; consequently "1" is the only
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt useful value for this argument.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The number of additional times the hash should be performed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The domain name to be hashed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <em class="citetitle">BIND 9 Administrator Reference Manual</em>,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<p><span class="corpauthor">Internet Systems Consortium</span>