file with the private keydata and a .ds with the DS record of the
DNSKEY record.
-It prints out the basename for these files: K<name>+<alg>+<id>
+\fBldns-keygen\fR can also be used to create symmetric keys (for TSIG) by
+selecting the appropriate algorithm: \%\fIhmac-md5.sig-alg.reg.int\fR,
+\%\fIhmac-sha1\fR or \%\fIhmac-sha256\fR.
+In that case no DS record will be created and no .ds file.
+
+\fBldns-keygen\fR prints the basename for the key files:
+K<name>+<alg>+<id>
.SH OPTIONS
.TP
if (!cur_next_name) {
cur_next_name = cur_first_name;
}
- assert(cur_next_name); /* Because this function is called on nsec
- * occurrence, it must be there!
- */
+ assert(cur_next_name != NULL);
+ /* Because this function is called on nsec occurrence,
+ * there must be a cur_next_name!
+ */
next_owner_str = ldns_rdf2str(ldns_nsec3_next_owner(name->nsec));
next_owner_dname = ldns_dname_new_frm_str(next_owner_str);