ELF>@@@8 @@@@888T3T3 ;; ; x ;; ; TTTDDPtd000ttQtdRtd;; ; hh/lib64/ld-linux-x86-64.so.2GNUGNUd)bW^ߒq%m%= <1&: /*-0.+$;2%4!#9,5 6 7 '38)"(3!M)35;BE|a*j|3rqX 8 BY 3.h".C>?5R!R` /tj<T( w @ hA K`A @@ E p@ 0&& &libdns.so.88isc_result_totextisc___mem_getisc__buffer_initisc_entropy_detachisc___mem_put_Jv_RegisterClassesisc__buffer_usedregionisc__mem_create_ITM_deregisterTMCloneTableisc_base64_totext__gmon_start___ITM_registerTMCloneTabledst_key_generatedst_key_tobufferdst_key_freedns_rootnamedst_lib_destroydst_lib_initlibgssapi_krb5.so.2libcrypto.so.1.0.0libisc.so.84isc_commandline_parseisc_commandline_argumentisc_entropy_destroysourceisc_file_safecreateisc__mem_destroyisc_entropy_usebestsourceisc_commandline_errprintisc_entropy_createisc__mem_statsisc_file_prognameisc_commandline_indexisc_commandline_optionisc_mem_debugginglibdl.so.2libcap.so.2libpthread.so.0__errno_locationlibxml2.so.2libc.so.6fflush__printf_chkexitputs__stack_chk_failgetpwnam__fprintf_chkfchownfputcfclosestderr__snprintf_chkfileno__vfprintf_chk__cxa_finalize__libc_start_mainferror_edata__bss_start_endverbose__libc_csu_init__libc_csu_finiGLIBC_2.2.5GLIBC_2.4GLIBC_2.3.4 ui ii ui ti ; ; x? `A ? ? @@ ? 0&?  &@ @ ?  ?  ? ? ? ? ? %? &? '? -? 1? 2H> P> X> `> h> p> x> >  >  >  > > > > > > > > > > > > > ? ? ?  ? ! ? "(? #0? $8? (@? )H? *P? +X? ,`? .h? /p? 0HH5) %) @%) h%) h%) h%) h%) h%) h%) h%z) hp%r) h`%j) h P%b) h @%Z) h 0%R) h %J) h %B) h%:) h%2) h%*) h%") h%) h%) h% ) h%) h%( hp%( h`%( hP%( h@%( h0%( h %( h%( h%( h%( h %( h!%( h"%( h#%( h$%( h%AWAVAUATUSHHdH%(H$1HD$XH;H5*) IH&( H) L%PD$HAHD$(HD$0E1HD$@HH' D$<D$8HHމl?;vBH' H ( HjDH' H81f.IcL1 H' L0LAkD$H^HK' LH!' :HG' DA?tH?' H ' HH81H& HHD$0H& HHD$(H& HHD$@D$<D$8H& L8HD' H5 HH& +(H|$(AH|$0D$OHT$X11DCH5H=1M11H$H|$`L$HHt$@LD$`H|$XA|$<$LL$hDD$tH5LL1HtH|$XH HcAH|$8u5H|$X1H$dH3%(Hĸ[]A\A]A^A_Hl% H|$XH0ELD$(IL1LHH|$XLD$Hэi LcLLT$ ]HHLD$LT$  L$L .LLLH1I}H= |LL$hDD$tH5c1LLiEt/LD$(H5pL1LFH=7*|$Ot=HT$0H5L1ˀ|$OLD$011L=hH5L1듉H5H=H1zH= 1lEiIH=L1H1I^HHPTL# H # H=d# HH# HtHÐH# H=# UH)HHw]H\# Ht]@Hy# H=r# UH)HHHH?HHHu]H4# Ht]@=I# u'H=" UHt H=# Mh] # fffff.H= tH" HtUH=z H]WRH1" SH HHh" H81&SHHt$(HT$0HL$8LD$@LL$Ht7)D$P)L$`)T$p)$)$)$)$)$H! tPH! H$HHL$D$HD$HD$ D$ 0H;HD$H3 H[fffff.USHHt$(HT$0HL$8LD$@LL$Ht7)D$P)L$`)T$p)$)$)$)$)$H! H HHHH;1H$H;HL$HD$HD$HD$ D$ 0HD$H3 c@vHH@HcH@HuH.H'H!HHHH= Hָ@@8u fH= Hָ@@8tH= Hָ@@8tH= Hָ@@8tH=s Hָ@@8iH=YHֹ )ffffff.c1@wH~@DAVMAUAATIUSHHdH%(H$1HD$(HD$0HD$8t H= 1fDA=Ht$0LH5 H=" 1HH= H)҃ɃҺHDH|$0Ht$(H+HH5X H= 1Ht$0L~H5> H= 1H\$8jH H\$E1Ld$$1@ADH8HIH5 H=5 1H$H|$P@H|$8Ht$P%H5 H= 1Ht$@H|$PH3 H|$@LH5 H= 1H|$(t H|$(AH|$8tHaH|$0BH$dH3%(H[]A\A]A^A=H=; 1f.9?H5 H= H1 H5 H= H1H5 H= H1yH5 H= H1ZH5 H= H1;H5 H=e H1H=( 1H\$Hl$HLd$Ll$ALt$HHIIHHt$HIHD$H5 H=1MtH|$LHEDMHH|$MLH$1H|$ H|$u|H|$u]H H HپH81MH\$ Hl$(Ld$0Ll$8Lt$@HHÉXH5 H=H1H=C H1H= H1H= 1H\$Hl$HHHHt*hHH\$ljHl$HH\$Hl$HÐfffff.Hl$Ld$H-_ L%P Ll$Lt$L|$H\$H8L)AIHIHt1@LLDAHH9rH\$Hl$Ld$Ll$ Lt$(L|$0H8ÐHHUsage: %s [-a alg] [-k keyname] [-r randomfile] [-q] [-s name | -z zone] -a alg: algorithm (default hmac-sha256) -k keyname: name of the key as it will be used in named.conf -r randomfile: source of random data (use "keyboard" for key timing) -s name: domain name to be updated using the created key -z zone: name of the zone as it will be used in named.conf -q: quiet mode: print the key, with no explanatory text failed to allocate memory for keyname# To activate this key, place the following in named.conf, and # in a separate keyfile on the system or systems from which nsupdate # will be run:key "%s" { algorithm %s; secret "%.*s"; }; # Then, in the "zone" statement for the zone containing the # name "%s", place an "update-policy" statement # like this one, adjusted as needed for your preferred permissions: update-policy { grant %s name %s ANY; }; # Then, in the "zone" definition statement for "%s", # place an "update-policy" statement like this one, adjusted as # needed for your preferred permissions: update-policy { grant %s zonesub ANY; }; # Then, in the "zone" statement for each zone you wish to dynamically # update, place an "update-policy" statement granting update permission # to this key. For example, the following statement grants this key # permission to update any name within the zone: update-policy { grant %s zonesub ANY; }; # After the keyfile has been placed, the following command will # execute nsupdate using this key: nsupdate -k ddns-keyddns-confgenUnsupported algorithm '%s'%s: invalid argument -%c %s: unhandled option -%c a:hk:Mmr:qs:Vy:z:create memory context%s: %s%s.%s./ddns-confgen.cpiVI<(V%s: hmac-md5hmac-sha1hmac-sha224hmac-sha256hmac-sha384hmac-sha512(unknown)unsupported algorithm %d create entropy contextkeyboardstart entropy sourceinitialize dst librarygenerate keydump key to bufferbsse64 encode secretcreate keyfileunable to set file owner write to %s failed fclose(%s) failed wrote key file "%s" p999`keysize %d out of range (must be 1-512) keysize %d out of range (must be 1-256) ;t (x Hhh XHh`zRx $ pFJ w?;*3$"D1HL\PBBB B(A0H8J? 8A0A(B BBBA $AGA8AAG p$HD<PyBEE D(C0JO 0A(A BBBD $`JZP A $gJG o H ^$Q_@FK_r p &; ; o(0 x  0>  oooo"o; &6FVfv&6FVfv`A @@ 0& &@ .shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.jcr.dynamic.got.data.bss 88TT !tt$84o((L> xxF0 0 No""z[o`jt ~ppyp&& && 00t@1@1; ;; ;; ;; ;0> 0>@ @ @ @H @