From 9b3fc207df053f6d90901260119cb6884796ea0b Mon Sep 17 00:00:00 2001
From: Tinderbox User algorithm must be one of RSAMD5, RSASHA1,
DSA, NSEC3RSASHA1, NSEC3DSA, RSASHA256, RSASHA512, ECCGOST,
ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. For
- TKEY and SIG(0) keys, the value must be DH (Diffie Hellman);
- specifying this value will automatically set the
- -T KEY option as well.
+ TKEY, the value must be DH (Diffie Hellman); specifying
+ his value will automatically set the -T KEY
+ option as well.
- TSIG keys can also by generated by setting the value to
+ TSIG keys can also be generated by setting the value to
one of HMAC-MD5, HMAC-SHA1, HMAC-SHA224, HMAC-SHA256,
HMAC-SHA384, or HMAC-SHA512. As with DH, specifying these
values will automatically set -T KEY. Note,
diff --git a/doc/arm/man.dnssec-keygen.html b/doc/arm/man.dnssec-keygen.html
index 6ed08b9177..f55b7f3ac4 100644
--- a/doc/arm/man.dnssec-keygen.html
+++ b/doc/arm/man.dnssec-keygen.html
@@ -121,12 +121,12 @@
of algorithm must be one of RSAMD5, RSASHA1,
DSA, NSEC3RSASHA1, NSEC3DSA, RSASHA256, RSASHA512, ECCGOST,
ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. For
- TKEY and SIG(0) keys, the value must be DH (Diffie Hellman);
- specifying this value will automatically set the
- -T KEY option as well.
+ TKEY, the value must be DH (Diffie Hellman); specifying
+ his value will automatically set the -T KEY
+ option as well.
- TSIG keys can also by generated by setting the value to
+ TSIG keys can also be generated by setting the value to
one of HMAC-MD5, HMAC-SHA1, HMAC-SHA224, HMAC-SHA256,
HMAC-SHA384, or HMAC-SHA512. As with DH, specifying these
values will automatically set -T KEY. Note,