ISO8859-10.8gz.  5- c  0\5 QV 4   +I 4 ~ !  '   . G f  {! " #" $ % & '! 0(" R)! u* + , -% .) / "0! :1U \2 3( 4, 5,$6+Q7J}8_9`(:$; < =,>( ?.3@bAB5CDiE+OF#{GHI"JK)LFM`N-zO!P$Q R$S(5T)^UVWXY%Z[(,\(U]!~^'_`abc-d5e)Tf~gh%ij4k*l@@mndop  q!r 8sdFtu vw/x)y#;z_{0n|}2~ )$$Ns1*N kw1 /(/I"R u.&(A%j$()# C,d"))6*`]1 + LXmt%#  , Ia W! ) !%!#"!I"!l%!!'!! ""#"8"O"i""("1"# #1#>&#D #k4#x #'# #)# $/$&$V$\$b$h$}$$Usage: %s -a alg -b bits -n type [options] name Required options: -a algorithm: %s -b key size, in bits: RSAMD5: [512..%d] DH: [128..4096] DSA: [512..1024] and divisible by 64 HMAC-MD5: [1..512] -n nametype: ZONE | HOST | ENTITY | USER | OTHER name: owner of the key Other options: -c (default: IN) -e use large exponent (RSAMD5/RSASHA1 only) -f keyflag: KSK -t : AUTHCONF | NOAUTHCONF | NOAUTH | NOCONF (default: AUTHCONF) -p : default: 3 [dnssec] -s value this key signs DNS records with (default: 0) -r : (a file containing random data) -v Output: K++.key, K++.private %s: invalid argument -%c out of memory-b requires a non-negative number-g requires a positive number-s must be followed by a number [0..15]-v must be followed by a numbercould not initialize dstthe key name was not specifiedextraneous argumentsno algorithm was specifiedunknown algorithm %sinvalid type %skey size not specified (-b option)RSA key size %d out of rangeDH key size %d out of rangeInvalid DSS key size: %dHMAC-MD5 key size %d out of rangespecified RSA exponent without RSAspecified DH generator without DHno nametype specifiedinvalid nametype %sunknown class %sSpecified null key with non-zero sizeSpecified null key with signing authorityinvalid key name %s: %sfailed to generate key %s/%s: %s cannot generate a null key when a key with id 0 already existsfailed to write key %s: %s -p must be followed by a number [0..255]%s: %s already exists, generating a new key creating KEY from signedkey file for %s: %s verifying SIG in signedkey file for %s: %s %s: warning: BIND 9 doesn't properly handle wildcards in secure zones: - wildcard nonexistence proof is not generated by the server - wildcard nonexistence proof is not required by the resolver %s: warning: wildcard name seen: %s out of memorykey '%s' failed to sign data: %sfailure looking for '%s KEY' in database: %sfailed while looking for '%s SIG %s': %scould not convert KEY into internal format: %sfailure looking for null keysname '%s' is too longzone signedkey file is invalid or does not match zonefailed to build null key%s has both a signedkey file and null keys in the zone. Aborting.rdataset iteration for name '%s' failed: %sfailed to add SIGs at node '%s': %srdataset iteration failed: %srdataset iteration failed: %sfailed to iterate through the zonerdataset iteration failed: %siterating through the database failed: %sfailed to allocate event failed to allocate event failed converting name '%s' to dns format: %sfailed loading zone from '%s': %sfailed to find the zone's origin: %sfailed to find the zone keys: %sfailed to find the zone's origin: %sfailed to find keys at the zone apex: %scycle period must be numeric and positiveverbose level must be numericnumber of cpus must be numericcould not initialize dstunknown class %sfailed to rename temp file to %s: %s cannot load key %s: %scannot sign zone with non-private key %sfailed to open temporary output file: %sfailed to create task manager: %sfailed to find '%s SOA' in the zone: %sfailed to create task: %sfailed to create task: %sfailed to start task: %sprocess aborted by userUsage: %s [options] zonefile [keys] Options: (default value in parenthesis) -c class (IN) -d directory directory to find keyset files (.) -s YYYYMMDDHHMMSS|+offset: RRSIG start time - absolute|offset (now - 1 hour) -e YYYYMMDDHHMMSS|+offset|"now"+offset]: RRSIG end time - absolute|from start|from now(now + 30 days) -i interval: cycle interval - resign if < interval from end ( (end-start)/4 ) -v debuglevel (0) -o origin: zone origin (name of zonefile) -f outfile: file the signed zone is written in (zonefile + .signed) -r randomdev: a file containing random data verify generated signatures use pseudorandom data (faster but less secure) print statistics -n ncpus (number of cpus present) Signing Keys: (default: all zone keys that have private keys) keyfile (Kname+alg+tag) stderr, "%s: warning: No keys specified or found "; File written on %sUsage: %s [options] keyset keys Options: (default value in parenthesis) failed to write database to '%s': %s verify generated signatures -c class (IN) -s YYYYMMDDHHMMSS|+offset: SIG start time - absolute|offset (from keyset) -e YYYYMMDDHHMMSS|+offset|"now"+offset]: SIG end time - absolute|from start|from now (from keyset) -v level: verbose level (0) use pseudorandom data (faster but less secure) -r randomdev: a file containing random data keyset: file with keyset to be signed (keyset-) keys: keyfile (Kname+alg+tag) Output: signed keyset (signedkey-) out of memoryfailure traversing key listsignature generated by non-zone or missing keyverbose level must be numericunknown class %scould not initialize dst: %sif -s or -e is specified, both must bekeyset file '%s' must start with keyset-failed to load database from '%s': %sfailed to find rdataset '%s KEY': %sno SIG KEY set presentsignature by key '%s' did not verify: %sNot all zone keys self signed the key setfailed to read key %s from disk: %skey '%s' failed to sign data: %ssignature from key '%s' failed to verify: %sfailed to find data in keyset fileUsage: %s [options] keys Options: (default value in parenthesis) verify generated signatures -s YYYYMMDDHHMMSS|+offset: SIG start time - absolute|offset (now) -e YYYYMMDDHHMMSS|+offset|"now"+offset]: SIG end time - absolute|from start|from now (now + 30 days) use pseudorandom data (faster but less secure) -r randomdev: a file containing random data -v level: verbose level (0) keys: keyfile (Kname+alg+tag) Output: keyset (keyset-) %s: TTL not specified, assuming 3600 failed to create memory context: %sTTL must be numericverbose level must be numericcould not initialize dst: %sout of memoryall keys must have the same owner - %s and %s do not matchfailed to read private key %s: %sfailed to convert key %s to a DNS KEY: %serror loading key from %s: %sfailed to sign keyset with key %s: %ssignature from key '%s' failed to failed to create a database for %sfailed to write database for %s to %scould not create entropy objectcould not initialize entropy source: %stime value %s is invalidVersion: %s RSASHA1: [512..%d] HMAC-SHA1: [1..160] HMAC-SHA224: [1..224] HMAC-SHA256: [1..256] HMAC-SHA384: [1..384] HMAC-SHA512: [1..512] -d (0 => max, default) -g use specified generator(DH only) -k : generate a TYPE=KEY key Version: %s -g: generate DS records from keyset files -j jitter: randomize signature end time up to jitter seconds -I format: file format of input zonefile (text) -O format: file format of signed zone file (text) -N format: soa serial format of signed zone file (keep) -a: -p: -t: -k key_signing_key -l lookasidezone -z: ignore KSK flag in DNSKEYs