From owner-man-jp-reviewer@jp.freebsd.org  Fri Dec 24 01:25:00 1999
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id BAA28705;
	Fri, 24 Dec 1999 01:25:00 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from serio.al.rim.or.jp (serio.al.rim.or.jp [202.247.191.251] (may be forged))
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id BAA28698
	for <man-jp-reviewer@jp.freebsd.org>; Fri, 24 Dec 1999 01:25:00 +0900 (JST)
	(envelope-from k-horik@yk.rim.or.jp)
Received: from mail-relay.rim.or.jp by serio.al.rim.or.jp (8.8.8/3.7W/HMX-12) with ESMTP id BAA20807 for <man-jp-reviewer@jp.freebsd.org>; Fri, 24 Dec 1999 01:25:00 +0900 (JST)
Received: from localhost (pppa27.yk.rim.or.jp [202.247.186.27]) by mail-relay.rim.or.jp (3.7W/HMX-12) id BAA03742 for <man-jp-reviewer@jp.freebsd.org>; Fri, 24 Dec 1999 01:24:58 +0900 (JST)
To: man-jp-reviewer@jp.freebsd.org
X-Mailer: Mew version 1.93 on Emacs 19.34 / Mule 2.3 (SUETSUMUHANA)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Message-Id: <19991224012419B.k-horik@yk.rim.or.jp>
Date: Fri, 24 Dec 1999 01:24:19 +0900
From: Kazuo Horikawa <k-horik@yk.rim.or.jp>
X-Dispatcher: imput version 980905(IM100)
Lines: 192
Reply-To: man-jp-reviewer@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+990727
X-Sequence: man-jp-reviewer 1842
Subject: [man-jp-reviewer 1842] dnskeygen.1
Errors-To: owner-man-jp-reviewer@jp.freebsd.org
Sender: owner-man-jp-reviewer@jp.freebsd.org
X-Originator: k-horik@yk.rim.or.jp

dnskeygen.1 $B$N=iLu$G$9!#(B

--- dnskeygen.1.eng	Thu Dec 23 19:30:16 1999
+++ dnskeygen.1	Thu Dec 23 20:46:43 1999
@@ -14,14 +14,15 @@
 .\" SOFTWARE.
 .\"
 .\" $Id: dnskeygen.1,v 8.5 1999/02/23 05:20:18 vixie Exp $
+.\" jpman %Id: dnskeygen.1,v 0.0 1999/12/19 12:27:05 horikawa Stab %
 .\"
 .Dd December 2, 1998
 .Dt DNSKEYGEN 1
 .Os BSD 4
-.Sh NAME
+.Sh $BL>>N(B
 .Nm dnskeygen 
-.Nd generate public, private, and shared secret keys for DNS Security
-.Sh SYNOPSIS
+.Nd DNS $B%;%-%e%j%F%#MQ$K!"8x3+80!&;dM-80!&6&M-HkL)80$r@8@.$9$k(B
+.Sh $B=q<0(B
 .Nm dnskeygen
 .Oo Fl
 .Op Cm DHR
@@ -34,99 +35,107 @@
 .Op Cm Fl p Ar num
 .Op Cm Fl s Ar num
 .Fl n Ar name
-.Sh DESCRIPTION
-.Ic Dnskeygen
-(DNS Key Generator) is a tool to generate and maintain keys for DNS Security
-within the DNS (Domain Name System).
-.Nm Dnskeygen
-can generate public and private keys to authenticate zone data, and shared
-secret keys to be used for Request/Transaction signatures.
+.Sh $B2r@b(B
+.Ic dnskeygen
+(DNS Key Generator; DNS $B80@8@.4o(B)
+$B$O!"(BDNS (Domain Name System) $B$NOHAH$K$*$1$k(B DNS $B%;%-%e%j%F%#MQ$K!"(B
+$B80$N@8@.$H0];}$r9T$&%D!<%k$G$9!#(B
+.Nm dnskeygen
+$B$O!"%>!<%s%G!<%?G'>ZMQ$K8x3+80$H;dM-80$r@8@.2DG=$G$"$j!"(B
+$B%j%/%(%9%H$H%H%i%s%6%/%7%g%s$N=pL>MQ$K6&M-HkL)80$r@8@.2DG=$G$9!#(B
 .Bl -tag -width Fl
 .It Fl D
-Dnskeygen will generate a
+dnskeygen $B$O!"C10l$N(B
 .Ic DSA/DSS
-key.
+$B80$r@8@.$7$^$9!#(B
 .Dq size
-must be one of [512, 576, 640, 704, 768, 832, 896, 960, 1024].
+$B$O!"(B[512, 576, 640, 704, 768, 832, 896, 960, 1024] $B$N$$$:$l$+(B
+$B$R$H$D$G$"$kI,MW$,$"$j$^$9!#(B
 .It Fl H
-Dnskeygen will generate an
+dnskeygen $B$O!"C10l$N(B
 .Ic HMAC-MD5
-key.
+$B80$r@8@.$7$^$9!#(B
 .Dq size
-must be between 128 and 504.
+$B$O(B 128 $B$H(B 504 $B$N4V$G$"$kI,MW$,$"$j$^$9!#(B
 .It Fl R
-Dnskeygen will generate an
+dnskeygen $B$O!"C10l$N(B
 .Ic RSA
-key.
+$B80$r@8@.$7$^$9!#(B
 .Dq size
-must be between 512 and 4096.
+$B$O(B 512 $B$H(B 4096 $B$N4V$G$"$kI,MW$,$"$j$^$9!#(B
 .It Fl F
-.Ic (RSA only)
-Use a large exponent for key generation.
+.Ic (RSA $B$N$_(B)
+$B80@8@.$KBg$-$J;X?t$r;HMQ$7$^$9!#(B
 .It Fl z Fl h Fl u
-These flags define the type of key being generated: Zone (DNS validation) key,
-Host (host or service) key or User (e.g. email) key, respectively.
-Each key is only allowed to be one of these.
+$B$3$l$i$N%U%i%0$O!"@8@.$5$l$k80$N%?%$%W$rDj5A$7$^$9!#(B
+$B$=$l$>$l!"%>!<%s(B (DNS $B@5Ev@-3NG'(B) $B80!"%[%9%H(B ($B%[%9%H$^$?$O%5!<%S%9(B) $B80!"(B
+$B%f!<%6(B ($BNc$($PEE;R%a!<%k(B) $B80$G$9!#(B
+$B3F80$O!"BP1~$9$k;vJA$KBP$7$F$N$_;HMQ2DG=$G$9!#(B
 .It Fl a 
-Indicates that the key
-.Ic CANNOT
-be used for authentication.
+$B80$,G'>Z$K;HMQ(B
+.Ic $BIT2D(B
+$B$G$"$k$3$H$r<($7$^$9!#(B
 .It Fl c 
-Indicates that the key
-.Ic CANNOT
-be used for encryption.
+$B80$,0E9f2=$K;HMQ(B
+.Ic $BIT2D(B
+$B$G$"$k$3$H$r<($7$^$9!#(B
 .It Fl p Ar num
-Sets the key's protocol field to
+$B80$N%W%m%H%3%k%U%#!<%k%I$r(B
 .Ar num
-; the default is
-.Ic 3
-(DNSSEC) if
+$B$K@_Dj$7$^$9!#%G%U%)%k%H$O!"(B
 .Dq Fl z
-or
+$B$^$?$O(B
 .Dq Fl h
-is specified and
+$B$,;XDj$5$l$?>l9g$O(B
+.Ic 3
+(DNSSEC) $B$G$"$j!"$=$NB>$N>l9g$O(B
 .Ic 2
-(EMAIL) otherwise.  Other accepted values are
+(EMAIL) $B$G$9!#(B
+$BB>$K<uM}$5$l$kCM$O(B
 .Ic 1
 (TLS),
 .Ic 4
-(IPSEC), and
+(IPSEC),
 .Ic 255
-(ANY).
+(ANY) $B$G$9!#(B
 .It Fl s Ar num
-Sets the key's strength field to
-.Ar num;
-the default is
-.Sy 0.
+$B80$N6/$5$N%U%#!<%k%I$r(B
+.Ar num
+$B$K@_Dj$7$^$9!#%G%U%)%k%H$O!"(B
+.Sy 0
+$B$G$9!#(B
 .It Fl n Ar name
-Sets the key's name to
-.Ar name.
+$B80$NL>A0$r(B
+.Ar name
+$B$K@_Dj$7$^$9!#(B
 .El
-.Ss DETAILS
-.Ic Dnskeygen
-stores each key in two files:
+.Ss $B>\:Y(B
+.Ic dnskeygen
+$B$O!"3F80$r(B 2 $B8D$N%U%!%$%k(B
 .Pa K<name>+<alg>+<footprint>.private
-and 
+$B$H(B
 .Pa K<name>+<alg>+<footprint>.key
-The file 
+$B$K3JG<$7$^$9!#(B
+$B%U%!%$%k(B
 .Pa K<name>+<alg>+<footprint>.private
-contains the private key in a portable format.  The file 
+$B$O!"2DHB=q<0$G;dM-80$r3JG<$7$^$9!#(B
+$B%U%!%$%k(B
 .Pa K<name>+<alg>+<footprint>.key
-contains the public key in the DNS zone file format:
+$B$O!"2<5-$N(B DNS $B%>!<%s%U%!%$%k=q<0$G!"6&M-80$r3JG<$7$^$9(B:
 .Pp
 .D1 Ar <name> IN KEY <flags> <algorithm> <protocol> <exponent|modulus>
 .Pp
-.Sh ENVIRONMENT
-No environmental variables are used.
-.Sh SEE ALSO
+.Sh $B4D6-JQ?t(B
+$B;HMQ$5$l$k4D6-JQ?t$O$"$j$^$;$s!#(B
+.Sh $B4XO"9`L\(B
 .Em RFC 2065
-on secure DNS and the
+$B$N%;%-%e%"(B DNS $BItJ,$H(B
 .Em TSIG
-Internet Draft.
-.Sh AUTHOR
-Olafur Gudmundsson (ogud@tis.com).
-.Sh ACKNOWLEDGMENTS
-The underlying cryptographic math is done by the DNSSAFE and/or Foundation
-Toolkit libraries.
-.Sh BUGS
-None are known at this time
+Internet Draft
+.Sh $B:n<T(B
+Olafur Gudmundsson (ogud@tis.com)
+.Sh $B<U<-(B
+$B5r=j$H$9$k0E9f?t3X$O!"(BDNSSAFE $B$d(B Foundation Toolkit $B%i%$%V%i%j$K(B
+$B$h$k$b$N$G$9!#(B
+.Sh $B%P%0(B
+$B8=:_4{CN$N$b$N$O$"$j$^$;$s!#(B
