nsec3hash.html revision fd2597f75693a2279fdf588bd40dfe2407c42028
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - Copyright (C) 2009, 2014, 2015 Internet Systems Consortium, Inc. ("ISC")
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - Permission to use, copy, modify, and/or distribute this software for any
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - purpose with or without fee is hereby granted, provided that the above
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - copyright notice and this permission notice appear in all copies.
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste - PERFORMANCE OF THIS SOFTWARE.
019fc51742057c34c398811286fff5d4f6ee355cJaco Jooste<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
019fc51742057c34c398811286fff5d4f6ee355cJaco Jooste<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry">
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste<a name="man.nsec3hash"></a><div class="titlepage"></div>
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste<p><span class="application">nsec3hash</span> — generate NSEC3 hash</p>
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste<div class="cmdsynopsis"><p><code class="command">nsec3hash</code> {<em class="replaceable"><code>salt</code></em>} {<em class="replaceable"><code>algorithm</code></em>} {<em class="replaceable"><code>iterations</code></em>} {<em class="replaceable"><code>domain</code></em>}</p></div>
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste <span class="command"><strong>nsec3hash</strong></span> generates an NSEC3 hash based on
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste a set of NSEC3 parameters. This can be used to check the validity
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste of NSEC3 records in a signed zone.
019fc51742057c34c398811286fff5d4f6ee355cJaco Jooste<div class="variablelist"><dl class="variablelist">
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste The salt provided to the hash algorithm.
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste A number indicating the hash algorithm. Currently the
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste only supported hash algorithm for NSEC3 is SHA-1, which is
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste indicated by the number 1; consequently "1" is the only
019fc51742057c34c398811286fff5d4f6ee355cJaco Jooste useful value for this argument.
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste The number of additional times the hash should be performed.
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste The domain name to be hashed.
74b502cf428d057e78572e9fd66fb2f1861887b0Jaco Jooste <em class="citetitle">BIND 9 Administrator Reference Manual</em>,