nsec3hash.html revision ca42dcc0686fefd3db202edab80e5adb09d6add5
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - Permission to use, copy, modify, and distribute this software for any
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - purpose with or without fee is hereby granted, provided that the above
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - copyright notice and this permission notice appear in all copies.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt - PERFORMANCE OF THIS SOFTWARE.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<!-- $Id: nsec3hash.html,v 1.2 2009/03/02 03:53:30 each Exp $ -->
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<meta name="generator" content="DocBook XSL Stylesheets V1.67.2">
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en">
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<a name="man.nsec3hash"></a><div class="titlepage"></div>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<p><span class="application">nsec3hash</span> — generate NSEC3 hash</p>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<div class="cmdsynopsis"><p><code class="command">nsec3hash</code> {<em class="replaceable"><code>salt</code></em>} {<em class="replaceable"><code>algorithm</code></em>} {<em class="replaceable"><code>iterations</code></em>} {<em class="replaceable"><code>domain</code></em>}</p></div>
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <span><strong class="command">nsec3hash</strong></span> generates an NSEC3 hash based on
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt a set of NSEC3 parameters. This can be used to check the validity
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt of NSEC3 records in a signed zone.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The salt provided to the hash algorithm.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt A number indicating the hash algorithm. Currently the
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt only supported hash algorithm for NSEC3 is SHA-1, which is
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt indicated by the number 1; consequently "1" is the only
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt useful value for this argument.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The number of additional times the hash should be performed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt The domain name to be hashed.
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt <em class="citetitle">BIND 9 Administrator Reference Manual</em>,
ca42dcc0686fefd3db202edab80e5adb09d6add5Evan Hunt<p><span class="corpauthor">Internet Systems Consortium</span>