ELF3@X@8 @@@@888TT8p  TTTDDPtdPPPQtdRtd  /lib/ld-linux-aarch64.so.1GNUS묣_z~[%2kGNU[[\%$ ZNv<L{)!,8YF{"w.tg Wfm2mC %L&l|  Z , QVn @?  `AT__gmon_start___ITM_deregisterTMCloneTable_ITM_registerTMCloneTableERR_print_errors_fpldns_rdf_deep_freeldns_rr_printldns_dname_left_chopldns_rr_list_rr_countldns_rr_rrsig_expirationldns_resolver_set_dnssecldns_rr_descriptldns_dnssec_zone_mark_glueldns_b64_ntopldns_duration2timeldns_resolver_freeldns_dnssec_zone_verify_zonemdldns_dname_label_countldns_b64_ptonldns_mktime_from_utcldns_dnssec_rrsets_contains_typeldns_rdf2native_int32ldns_rr_compare_dsldns_dnssec_zone_deep_freeldns_rr_list_printldns_dnssec_zone_printldns_rbtree_firstldns_dnssec_zone_find_rrsetldns_rr_rdfldns_fetch_valid_domain_keysldns_nsec3_next_ownerldns_rr_rrsig_inceptionldns_rr_list_newldns_rr_list_push_rrldns_duration_create_from_stringldns_dname_new_frm_strldns_rr_list_rrldns_rbtree_null_nodeldns_dnssec_name_node_next_nonglueldns_resolver_new_frm_fileldns_rdf_printldns_dnssec_zone_is_nsec3_optoutldns_resolver_deep_freeldns_rr_list_freeldns_validate_domain_dsldns_get_errorstr_by_idldns_verify_rrsig_keylist_timeldns_rr_get_typeldns_rdf2strldns_dnssec_zone_new_frm_fp_lldns_versionldns_rbtree_searchldns_resolver_set_dnssec_cdldns_rr_new_frm_fp_lldns_rr_ownerldns_dnssec_name_is_glueldns_dname_compareldns_rbtree_nextoptindstdin__stack_chk_fail__printf_chkexit__assert_failfopen__isoc23_sscanfstrlen__ctype_b_locfeof__isoc23_strtolgetpidstdoutoptarg__fprintf_chk__libc_start_mainstderrgetoptsrandom__cxa_finalizestrchrstrerrorfclosefputcfputsfwrite__errno_locationabort__stack_chk_guardlibcrypto.so.3libldns.so.3libc.so.6ld-linux-aarch64.so.1OPENSSL_3.0.0GLIBC_2.17GLIBC_2.34GLIBC_2.38 +pO9 ]/hs]44HPX`hpx      (08 @!H"P#X%`&h'p(x)*+,-./0123456789:;<= >(?0@8A@BHCPDXE`FhGpHxIJLMNOPQRSTUVWXYZ($0K8V {{_{F4    F4 F4 F4 cG{CBFS*[-ck?s@@9G`?a@М{G{G ?@ R`@ ^G)#*?*1T@OQqTJ`8a $@!G ?\*@qT!G R ? ? N@@9?jT@G@kA TG@@,G$RR?@4!@?qmT3 @!G ?G@ARB`/? @G?@!(GT@ ?GARB`*?@@qT*T@3 @!G ?GARB*?֤q T`@@@@ ! G ?4@ql T@RsbG@!@`?3@q@T@R#@!@`?@@!0G ?րbt@@s6G4@`?֔@@!0G ?`@q T@G!@.?WBGs`!` @?@qMT @G?@!(G ?GARB/?7@qmTGc @!/?)G 0c @b!Ҁ?@qmT@@BHG@?ք@qMTGb c @! )?@qTGc @!+?@qMTG1c @!Ҁ?fGyR@?3@`@!F ?֠@5@ q,T5@q[T@!F ?@!F ?!G* ?Gc@! >?@4 R@qTGc @!@??@q-TC@B`+ @ARG?֧@R@!@`?@3@R@95#@!GW@ ?!G`STR#@4#@ R@@?AdT@ RcGK@B!|@q 64Gg!G7ן!FsGK!dG @6DG5!lGcF'GCw*;@?ց ҂  !?@?T*'@* ?-T@qT@@@q,T/@ ?֓ @ 6R*C@@ @`@qTaRZ@c@@!Ҡ?ց@@`@@?a@ R?`@A @c@!@Ҡ?aR@*@`@qTyRqKzTqT*@4+@fG c@@!Ҡ?ց@`@@@?c@bs@!Ҡ??/q9@*7@@77@y @?7@7g@@?@7@*7@k@ ?ր@o@ ?q Tq@ TY5*4K@AR@?*5 @R7**S` @4qBzT`@!@@@74qKzTqT*s@*,qQ?qTq@@zT` @+@@q TG @!77?ց@ @BDG@?#@7@@8b!Ҁ?ր@!G ?qTqATyR@6#@BF@@? 7!Fk@ @`?aT#@W@@ ?c@Bc@!Ҡ?ց@@`@@?a@@RC@@?@G!$Gk@ ?!F ?7!F ?G@GBF[@@?*G@!G ?7@!G ?@A4+@@qTG# @ ;7!G?w@@@@FG?7@G@# @;!S?7@[@G @@?7@S@# @?@qlTbRcbGc @`4!Ҁ?bRX?/q9B9/@ ?7 @ARK@@?4 @aRK@@? 5* #@!F ? *#@W@@ ?7@ ?#@W@@ ?Gc`c`!4@: R?Gc`c`!4:"!R?@!LG ?rTBF#@?*@ 5B8G!R@?@!RBG@?@ @!F ?`@F?@cG`?@@`@@**Gc`!4@5RR?@R?qmT4 @!G ?GARB3? @qTR@4 @!G ?GARB2?!G ?@qmT@4 @!G ?GARB 2?           @#FG@_      `!`?T!Ga_`!`!"A !ABGb_{ `b@9@7!G@ ? R`b9 @{¨_          CBF{SsC@!` BG @?c|RGk3G[c#?֠5C?* 4QR q)T!F ?[EcFkGF@@BT{C*SDsHC_ @sG`?qT @`?q`TR @B4GR@?*RF[ck?{c3GS[ksZsG9GG?ֿT@? ?qT?ֿTSA[BcCkDsE{ƨ_s@s@`@?`6a@B4G@?{!TGGS ?֠?*!F ?֠?"#@A@aK?kKTB @ R@B kSA {è_@ RSA{è_{B ARGSG?B! ?! ? !?b !@?B!?! ?"!?B !@?B!?ARcB? ! ?!`?"!@?"!@?B!?! ?!!`!? !%?@SA&{è!  {S**!G ? @SA{¨F*SA{¨B'GAR{GSB'AR?!GnG ?BDG@? R?!G ?*@@RSA{è   {S[ckGk9@y!@@?5 @*5[B*SAcCkD{ʨ_tG;XG?lGCG7GKpGRZ3Gs{GG!C@9q!R*@ 69 @@?֠@q, TqdKzTq T@@@ҹ?*@5@*5@TsE*SA[BcCkD{ʨ_*G@@?O7@*@?a@?qTO@[`@qJzT qMT!(`?;@@?b!(`?ց@?@@?C@@R@?ֱqT (Ӛ73R7@* ?K@ARB(?@*/qT3R!G ?`@{#G[Sc?@S6G?s@a@a @(*!dG ?#@*SA[BcC{Ũ_ @qT@qlTR@R@B(!@BFR@?֠5 {cRk@9_4[|GSG?_@sBRRB@#Chcxh7?qT? q TqTqT7TBS"788R  @855SA[B*cCkD{ƨ_֙~@!?"T"w8D SB*"78 k!8XR7T!w8 * 78R~@!?T"w8BSB*"78 k!8xR@8 q`Tq`T*SA[BcCkD{ƨ_ր5@84Ahaxo7qT@84@h`x`o6@8 w8@4      )?T)*g8'f8&e8%k88888?T@9 _8! ѫS|S SfF _8EE T_R_9_T*_h(8_!@9?AT@9|S SS|S TL R d8f8Mh%89?@T g8Ih+8R@h*8RR@_ _ {{_rUsage: %s [OPTIONS] Reads the zonefile and checks for DNSSEC errors. It checks whether NSEC(3)s are present, and verifies all signatures It also checks the NSEC(3) chain, but it will error on opted-out delegations It also checks whether ZONEMDs are present, and if so, needs one of them to match the zone's data. OPTIONS: -h show this text -a apex only, check only the zone apex -e signatures may not expire within this period. (default no period is used) -i signatures must have been valid at least this long. (default signatures should just be valid now) /etc/trusted-key.key -k specify a file that contains a trusted DNSKEY or DS rr. This option may be given more than once. Default is %s -p [0-100] only checks this percentage of the zone. Defaults to 100 -S chase signature(s) to a known key. The network may be accessed to validate the zone's DNSKEYs. (implies -k) -t YYYYMMDDhhmmss | [+|-]offset set the validation time either by an absolute time value or as an offset in seconds from . For data that came from the network (while chasing), system time will be used for validating it regardless. -v shows the version and exits -V [0-5] set verbosity level (default 3) -Z Requires a valid ZONEMD RR to be present. When given once, this option will permit verifying just the ZONEMD RR of an unsigned zone. When given more than once, the zone needs to be validly DNSSEC signed as well. With three times a -Z option (-ZZZ) a ZONEMD RR without signatures is allowed. s are given in ISO 8601 duration format: P[n]Y[n]M[n]DT[n]H[n]M[n]S if no file is given standard input is read TYPE%uError: %s for Error: %s for RRSet: Signature: no signatures should be in ISO 8601 duration format: P[n]Y[n]M[n]DT[n]H[n]M[n]S Error opening %s: %s Could not parse key file %s: %s No keys found in file %s percentage needs to fall between 0..100 %4d%2d%2d%2d%2d%2d1.8.4verify-zone version %s (ldns version %s) ae:hi:k:vV:p:St:ZUnable to chase signature without keys. Unable to open %s: %s %s at line %d ; Error: no SOA in the zone There were errors identifying the glue in the zone Error: No DNSKEY records at zone apex Cannot chase the root: %s Could not create resolver: %s Could not get valid DNSKEY RRset to validate domain's DS: %s Could not get valid DS RRset for domain: %s Error: Empty zone? examples/ldns-verify-zone.ccur_node->data == dnssec_zone->soaChecking: Error: has signature(s), but is occluded (or glue) has an NSEC(3), but is occluded (or glue) Error: the NSEC(3) record of has no signatures Error: the NSEC record for points to the wrong next owner name : i.s.o. . name->hashed_name != NULLnext_node != NULLError: The NSEC3 record for points to the wrong next hashed owner name should point to , whose hashed name is Error: there is no NSEC(3) for Could not validate zone digest: %s Zone digest matched the zone content Zone is verified and complete There were errors in the zone yr]G2"verify_dnssec_zoneverify_next_hashed_nameABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/;<l <0`\H\L|zRx 44A,0@< THA BNxtAC C MEEWAALA  UEAA@ A` BD D^ A 0HA0DCX A D(|A0FCx,pA BL C E$DA0GB^TABBC D U A U j FA 4X`AP BDC_ A 0|AC E CCEd A` BBEE eADA`  p ACA ,T44"/9  Bo  ~ H8p oooooGCC: (GNU) 14.1.1 20240507GCC: (crosstool-NG 1.26.0.72_810021d) 14.1.1 20240507.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.got.data.bss.comment 88TT$&xx 4o,> F ~No[oj88ptBH~yP4&@BBBBPPpQpQ@ 80Qi