Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/src/java.base/share/classes/sun/security/tools/keytool/Resources.java
41161 views
1
/*
2
* Copyright (c) 2000, 2021, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation. Oracle designates this
8
* particular file as subject to the "Classpath" exception as provided
9
* by Oracle in the LICENSE file that accompanied this code.
10
*
11
* This code is distributed in the hope that it will be useful, but WITHOUT
12
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14
* version 2 for more details (a copy is included in the LICENSE file that
15
* accompanied this code).
16
*
17
* You should have received a copy of the GNU General Public License version
18
* 2 along with this work; if not, write to the Free Software Foundation,
19
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
*
21
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22
* or visit www.oracle.com if you need additional information or have any
23
* questions.
24
*/
25
26
package sun.security.tools.keytool;
27
28
/**
29
* <p> This class represents the <code>ResourceBundle</code>
30
* for the keytool.
31
*
32
*/
33
public class Resources extends java.util.ListResourceBundle {
34
35
private static final Object[][] contents = {
36
{"NEWLINE", "\n"},
37
{"STAR",
38
"*******************************************"},
39
{"STARNN",
40
"*******************************************\n\n"},
41
42
// keytool: Help part
43
{".OPTION.", " [OPTION]..."},
44
{"Options.", "Options:"},
45
{"option.1.set.twice", "The %s option is specified multiple times. All except the last one will be ignored."},
46
{"multiple.commands.1.2", "Only one command is allowed: both %1$s and %2$s were specified."},
47
{"Use.keytool.help.for.all.available.commands",
48
"Use \"keytool -?, -h, or --help\" for this help message"},
49
{"Key.and.Certificate.Management.Tool",
50
"Key and Certificate Management Tool"},
51
{"Commands.", "Commands:"},
52
{"Use.keytool.command.name.help.for.usage.of.command.name",
53
"Use \"keytool -command_name --help\" for usage of command_name.\n" +
54
"Use the -conf <url> option to specify a pre-configured options file."},
55
// keytool: help: commands
56
{"Generates.a.certificate.request",
57
"Generates a certificate request"}, //-certreq
58
{"Changes.an.entry.s.alias",
59
"Changes an entry's alias"}, //-changealias
60
{"Deletes.an.entry",
61
"Deletes an entry"}, //-delete
62
{"Exports.certificate",
63
"Exports certificate"}, //-exportcert
64
{"Generates.a.key.pair",
65
"Generates a key pair"}, //-genkeypair
66
{"Generates.a.secret.key",
67
"Generates a secret key"}, //-genseckey
68
{"Generates.certificate.from.a.certificate.request",
69
"Generates certificate from a certificate request"}, //-gencert
70
{"Generates.CRL", "Generates CRL"}, //-gencrl
71
{"Generated.keyAlgName.secret.key",
72
"Generated {0} secret key"}, //-genseckey
73
{"Generated.keysize.bit.keyAlgName.secret.key",
74
"Generated {0}-bit {1} secret key"}, //-genseckey
75
{"Imports.entries.from.a.JDK.1.1.x.style.identity.database",
76
"Imports entries from a JDK 1.1.x-style identity database"}, //-identitydb
77
{"Imports.a.certificate.or.a.certificate.chain",
78
"Imports a certificate or a certificate chain"}, //-importcert
79
{"Imports.a.password",
80
"Imports a password"}, //-importpass
81
{"Imports.one.or.all.entries.from.another.keystore",
82
"Imports one or all entries from another keystore"}, //-importkeystore
83
{"Clones.a.key.entry",
84
"Clones a key entry"}, //-keyclone
85
{"Changes.the.key.password.of.an.entry",
86
"Changes the key password of an entry"}, //-keypasswd
87
{"Lists.entries.in.a.keystore",
88
"Lists entries in a keystore"}, //-list
89
{"Prints.the.content.of.a.certificate",
90
"Prints the content of a certificate"}, //-printcert
91
{"Prints.the.content.of.a.certificate.request",
92
"Prints the content of a certificate request"}, //-printcertreq
93
{"Prints.the.content.of.a.CRL.file",
94
"Prints the content of a CRL file"}, //-printcrl
95
{"Generates.a.self.signed.certificate",
96
"Generates a self-signed certificate"}, //-selfcert
97
{"Changes.the.store.password.of.a.keystore",
98
"Changes the store password of a keystore"}, //-storepasswd
99
{"showinfo.command.help", "Displays security-related information"},
100
101
// keytool: help: options
102
{"alias.name.of.the.entry.to.process",
103
"alias name of the entry to process"}, //-alias
104
{"groupname.option.help",
105
"Group name. For example, an Elliptic Curve name."}, //-groupname
106
{"destination.alias",
107
"destination alias"}, //-destalias
108
{"destination.key.password",
109
"destination key password"}, //-destkeypass
110
{"destination.keystore.name",
111
"destination keystore name"}, //-destkeystore
112
{"destination.keystore.password.protected",
113
"destination keystore password protected"}, //-destprotected
114
{"destination.keystore.provider.name",
115
"destination keystore provider name"}, //-destprovidername
116
{"destination.keystore.password",
117
"destination keystore password"}, //-deststorepass
118
{"destination.keystore.type",
119
"destination keystore type"}, //-deststoretype
120
{"distinguished.name",
121
"distinguished name"}, //-dname
122
{"X.509.extension",
123
"X.509 extension"}, //-ext
124
{"output.file.name",
125
"output file name"}, //-file and -outfile
126
{"input.file.name",
127
"input file name"}, //-file and -infile
128
{"key.algorithm.name",
129
"key algorithm name"}, //-keyalg
130
{"key.password",
131
"key password"}, //-keypass
132
{"key.bit.size",
133
"key bit size"}, //-keysize
134
{"keystore.name",
135
"keystore name"}, //-keystore
136
{"access.the.cacerts.keystore",
137
"access the cacerts keystore"}, // -cacerts
138
{"warning.cacerts.option",
139
"Warning: use -cacerts option to access cacerts keystore"},
140
{"new.password",
141
"new password"}, //-new
142
{"do.not.prompt",
143
"do not prompt"}, //-noprompt
144
{"password.through.protected.mechanism",
145
"password through protected mechanism"}, //-protected
146
{"tls.option.help", "Displays TLS configuration information"},
147
148
// The following 2 values should span 2 lines, the first for the
149
// option itself, the second for its -providerArg value.
150
{"addprovider.option",
151
"add security provider by name (e.g. SunPKCS11)\n" +
152
"configure argument for -addprovider"}, //-addprovider
153
{"provider.class.option",
154
"add security provider by fully-qualified class name\n" +
155
"configure argument for -providerclass"}, //-providerclass
156
157
{"provider.name",
158
"provider name"}, //-providername
159
{"provider.classpath",
160
"provider classpath"}, //-providerpath
161
{"output.in.RFC.style",
162
"output in RFC style"}, //-rfc
163
{"signature.algorithm.name",
164
"signature algorithm name"}, //-sigalg
165
{"signer.alias",
166
"signer alias"}, //-signer
167
{"signer.key.password",
168
"signer key password"}, //-signerkeypass
169
{"source.alias",
170
"source alias"}, //-srcalias
171
{"source.key.password",
172
"source key password"}, //-srckeypass
173
{"source.keystore.name",
174
"source keystore name"}, //-srckeystore
175
{"source.keystore.password.protected",
176
"source keystore password protected"}, //-srcprotected
177
{"source.keystore.provider.name",
178
"source keystore provider name"}, //-srcprovidername
179
{"source.keystore.password",
180
"source keystore password"}, //-srcstorepass
181
{"source.keystore.type",
182
"source keystore type"}, //-srcstoretype
183
{"SSL.server.host.and.port",
184
"SSL server host and port"}, //-sslserver
185
{"signed.jar.file",
186
"signed jar file"}, //=jarfile
187
{"certificate.validity.start.date.time",
188
"certificate validity start date/time"}, //-startdate
189
{"keystore.password",
190
"keystore password"}, //-storepass
191
{"keystore.type",
192
"keystore type"}, //-storetype
193
{"trust.certificates.from.cacerts",
194
"trust certificates from cacerts"}, //-trustcacerts
195
{"verbose.output",
196
"verbose output"}, //-v
197
{"validity.number.of.days",
198
"validity number of days"}, //-validity
199
{"Serial.ID.of.cert.to.revoke",
200
"Serial ID of cert to revoke"}, //-id
201
// keytool: Running part
202
{"keytool.error.", "keytool error: "},
203
{"Illegal.option.", "Illegal option: "},
204
{"Illegal.value.", "Illegal value: "},
205
{"Unknown.password.type.", "Unknown password type: "},
206
{"Cannot.find.environment.variable.",
207
"Cannot find environment variable: "},
208
{"Cannot.find.file.", "Cannot find file: "},
209
{"Command.option.flag.needs.an.argument.", "Command option {0} needs an argument."},
210
{"Warning.Different.store.and.key.passwords.not.supported.for.PKCS12.KeyStores.Ignoring.user.specified.command.value.",
211
"Warning: Different store and key passwords not supported for PKCS12 KeyStores. Ignoring user-specified {0} value."},
212
{"the.keystore.or.storetype.option.cannot.be.used.with.the.cacerts.option",
213
"The -keystore or -storetype option cannot be used with the -cacerts option"},
214
{".keystore.must.be.NONE.if.storetype.is.{0}",
215
"-keystore must be NONE if -storetype is {0}"},
216
{"Too.many.retries.program.terminated",
217
"Too many retries, program terminated"},
218
{".storepasswd.and.keypasswd.commands.not.supported.if.storetype.is.{0}",
219
"-storepasswd and -keypasswd commands not supported if -storetype is {0}"},
220
{".keypasswd.commands.not.supported.if.storetype.is.PKCS12",
221
"-keypasswd commands not supported if -storetype is PKCS12"},
222
{".keypass.and.new.can.not.be.specified.if.storetype.is.{0}",
223
"-keypass and -new can not be specified if -storetype is {0}"},
224
{"if.protected.is.specified.then.storepass.keypass.and.new.must.not.be.specified",
225
"if -protected is specified, then -storepass, -keypass, and -new must not be specified"},
226
{"if.srcprotected.is.specified.then.srcstorepass.and.srckeypass.must.not.be.specified",
227
"if -srcprotected is specified, then -srcstorepass and -srckeypass must not be specified"},
228
{"if.keystore.is.not.password.protected.then.storepass.keypass.and.new.must.not.be.specified",
229
"if keystore is not password protected, then -storepass, -keypass, and -new must not be specified"},
230
{"if.source.keystore.is.not.password.protected.then.srcstorepass.and.srckeypass.must.not.be.specified",
231
"if source keystore is not password protected, then -srcstorepass and -srckeypass must not be specified"},
232
{"Illegal.startdate.value", "Illegal startdate value"},
233
{"Validity.must.be.greater.than.zero",
234
"Validity must be greater than zero"},
235
{"provclass.not.a.provider", "%s not a provider"},
236
{"provider.name.not.found", "Provider named \"%s\" not found"},
237
{"provider.class.not.found", "Provider \"%s\" not found"},
238
{"Usage.error.no.command.provided", "Usage error: no command provided"},
239
{"Source.keystore.file.exists.but.is.empty.", "Source keystore file exists, but is empty: "},
240
{"Please.specify.srckeystore", "Please specify -srckeystore"},
241
{"Must.not.specify.both.v.and.rfc.with.list.command",
242
"Must not specify both -v and -rfc with 'list' command"},
243
{"Key.password.must.be.at.least.6.characters",
244
"Key password must be at least 6 characters"},
245
{"New.password.must.be.at.least.6.characters",
246
"New password must be at least 6 characters"},
247
{"Keystore.file.exists.but.is.empty.",
248
"Keystore file exists, but is empty: "},
249
{"Keystore.file.does.not.exist.",
250
"Keystore file does not exist: "},
251
{"Must.specify.destination.alias", "Must specify destination alias"},
252
{"Must.specify.alias", "Must specify alias"},
253
{"Keystore.password.must.be.at.least.6.characters",
254
"Keystore password must be at least 6 characters"},
255
{"Enter.the.password.to.be.stored.",
256
"Enter the password to be stored: "},
257
{"Enter.keystore.password.", "Enter keystore password: "},
258
{"Enter.source.keystore.password.", "Enter source keystore password: "},
259
{"Enter.destination.keystore.password.", "Enter destination keystore password: "},
260
{"Keystore.password.is.too.short.must.be.at.least.6.characters",
261
"Keystore password is too short - must be at least 6 characters"},
262
{"Unknown.Entry.Type", "Unknown Entry Type"},
263
{"Entry.for.alias.alias.successfully.imported.",
264
"Entry for alias {0} successfully imported."},
265
{"Entry.for.alias.alias.not.imported.", "Entry for alias {0} not imported."},
266
{"Problem.importing.entry.for.alias.alias.exception.Entry.for.alias.alias.not.imported.",
267
"Problem importing entry for alias {0}: {1}.\nEntry for alias {0} not imported."},
268
{"Import.command.completed.ok.entries.successfully.imported.fail.entries.failed.or.cancelled",
269
"Import command completed: {0} entries successfully imported, {1} entries failed or cancelled"},
270
{"Warning.Overwriting.existing.alias.alias.in.destination.keystore",
271
"Warning: Overwriting existing alias {0} in destination keystore"},
272
{"Existing.entry.alias.alias.exists.overwrite.no.",
273
"Existing entry alias {0} exists, overwrite? [no]: "},
274
{"Too.many.failures.try.later", "Too many failures - try later"},
275
{"Certification.request.stored.in.file.filename.",
276
"Certification request stored in file <{0}>"},
277
{"Submit.this.to.your.CA", "Submit this to your CA"},
278
{"if.alias.not.specified.destalias.and.srckeypass.must.not.be.specified",
279
"if alias not specified, destalias and srckeypass must not be specified"},
280
{"The.destination.pkcs12.keystore.has.different.storepass.and.keypass.Please.retry.with.destkeypass.specified.",
281
"The destination pkcs12 keystore has different storepass and keypass. Please retry with -destkeypass specified."},
282
{"Certificate.stored.in.file.filename.",
283
"Certificate stored in file <{0}>"},
284
{"Certificate.reply.was.installed.in.keystore",
285
"Certificate reply was installed in keystore"},
286
{"Certificate.reply.was.not.installed.in.keystore",
287
"Certificate reply was not installed in keystore"},
288
{"Certificate.was.added.to.keystore",
289
"Certificate was added to keystore"},
290
{"Certificate.was.not.added.to.keystore",
291
"Certificate was not added to keystore"},
292
{".Storing.ksfname.", "[Storing {0}]"},
293
{"alias.has.no.public.key.certificate.",
294
"{0} has no public key (certificate)"},
295
{"Cannot.derive.signature.algorithm",
296
"Cannot derive signature algorithm"},
297
{"Alias.alias.does.not.exist",
298
"Alias <{0}> does not exist"},
299
{"Alias.alias.has.no.certificate",
300
"Alias <{0}> has no certificate"},
301
{"groupname.keysize.coexist",
302
"Cannot specify both -groupname and -keysize"},
303
{"deprecate.keysize.for.ec",
304
"Specifying -keysize for generating EC keys is deprecated, please use \"-groupname %s\" instead."},
305
{"Key.pair.not.generated.alias.alias.already.exists",
306
"Key pair not generated, alias <{0}> already exists"},
307
{"Generating.keysize.bit.keyAlgName.key.pair.and.self.signed.certificate.sigAlgName.with.a.validity.of.validality.days.for",
308
"Generating {0} bit {1} key pair and self-signed certificate ({2}) with a validity of {3} days\n\tfor: {4}"},
309
{"Generating.keysize.bit.keyAlgName.key.pair.and.a.certificate.sigAlgName.issued.by.signerAlias.with.a.validity.of.validality.days.for",
310
"Generating {0} bit {1} key pair and a certificate ({2}) issued by <{3}> with a validity of {4} days\n\tfor: {5}"},
311
{"Enter.key.password.for.alias.", "Enter key password for <{0}>"},
312
{".RETURN.if.same.as.keystore.password.",
313
"\t(RETURN if same as keystore password): "},
314
{"Key.password.is.too.short.must.be.at.least.6.characters",
315
"Key password is too short - must be at least 6 characters"},
316
{"Too.many.failures.key.not.added.to.keystore",
317
"Too many failures - key not added to keystore"},
318
{"Destination.alias.dest.already.exists",
319
"Destination alias <{0}> already exists"},
320
{"Password.is.too.short.must.be.at.least.6.characters",
321
"Password is too short - must be at least 6 characters"},
322
{"Too.many.failures.Key.entry.not.cloned",
323
"Too many failures. Key entry not cloned"},
324
{"key.password.for.alias.", "key password for <{0}>"},
325
{"No.entries.from.identity.database.added",
326
"No entries from identity database added"},
327
{"Alias.name.alias", "Alias name: {0}"},
328
{"Creation.date.keyStore.getCreationDate.alias.",
329
"Creation date: {0,date}"},
330
{"alias.keyStore.getCreationDate.alias.",
331
"{0}, {1,date}, "},
332
{"alias.", "{0}, "},
333
{"Entry.type.type.", "Entry type: {0}"},
334
{"Certificate.chain.length.", "Certificate chain length: "},
335
{"Certificate.i.1.", "Certificate[{0,number,integer}]:"},
336
{"Certificate.fingerprint.SHA.256.", "Certificate fingerprint (SHA-256): "},
337
{"Keystore.type.", "Keystore type: "},
338
{"Keystore.provider.", "Keystore provider: "},
339
{"Your.keystore.contains.keyStore.size.entry",
340
"Your keystore contains {0,number,integer} entry"},
341
{"Your.keystore.contains.keyStore.size.entries",
342
"Your keystore contains {0,number,integer} entries"},
343
{"Failed.to.parse.input", "Failed to parse input"},
344
{"Empty.input", "Empty input"},
345
{"Not.X.509.certificate", "Not X.509 certificate"},
346
{"alias.has.no.public.key", "{0} has no public key"},
347
{"alias.has.no.X.509.certificate", "{0} has no X.509 certificate"},
348
{"New.certificate.self.signed.", "New certificate (self-signed):"},
349
{"Reply.has.no.certificates", "Reply has no certificates"},
350
{"Certificate.not.imported.alias.alias.already.exists",
351
"Certificate not imported, alias <{0}> already exists"},
352
{"Input.not.an.X.509.certificate", "Input not an X.509 certificate"},
353
{"Certificate.already.exists.in.keystore.under.alias.trustalias.",
354
"Certificate already exists in keystore under alias <{0}>"},
355
{"Do.you.still.want.to.add.it.no.",
356
"Do you still want to add it? [no]: "},
357
{"Certificate.already.exists.in.system.wide.CA.keystore.under.alias.trustalias.",
358
"Certificate already exists in system-wide CA keystore under alias <{0}>"},
359
{"Do.you.still.want.to.add.it.to.your.own.keystore.no.",
360
"Do you still want to add it to your own keystore? [no]: "},
361
{"Trust.this.certificate.no.", "Trust this certificate? [no]: "},
362
{"New.prompt.", "New {0}: "},
363
{"Passwords.must.differ", "Passwords must differ"},
364
{"Re.enter.new.prompt.", "Re-enter new {0}: "},
365
{"Re.enter.password.", "Re-enter password: "},
366
{"Re.enter.new.password.", "Re-enter new password: "},
367
{"They.don.t.match.Try.again", "They don't match. Try again"},
368
{"Enter.prompt.alias.name.", "Enter {0} alias name: "},
369
{"Enter.new.alias.name.RETURN.to.cancel.import.for.this.entry.",
370
"Enter new alias name\t(RETURN to cancel import for this entry): "},
371
{"Enter.alias.name.", "Enter alias name: "},
372
{".RETURN.if.same.as.for.otherAlias.",
373
"\t(RETURN if same as for <{0}>)"},
374
{"What.is.your.first.and.last.name.",
375
"What is your first and last name?"},
376
{"What.is.the.name.of.your.organizational.unit.",
377
"What is the name of your organizational unit?"},
378
{"What.is.the.name.of.your.organization.",
379
"What is the name of your organization?"},
380
{"What.is.the.name.of.your.City.or.Locality.",
381
"What is the name of your City or Locality?"},
382
{"What.is.the.name.of.your.State.or.Province.",
383
"What is the name of your State or Province?"},
384
{"What.is.the.two.letter.country.code.for.this.unit.",
385
"What is the two-letter country code for this unit?"},
386
{"Is.name.correct.", "Is {0} correct?"},
387
{"no", "no"},
388
{"yes", "yes"},
389
{"y", "y"},
390
{".defaultValue.", " [{0}]: "},
391
{"Alias.alias.has.no.key",
392
"Alias <{0}> has no key"},
393
{"Alias.alias.references.an.entry.type.that.is.not.a.private.key.entry.The.keyclone.command.only.supports.cloning.of.private.key",
394
"Alias <{0}> references an entry type that is not a private key entry. The -keyclone command only supports cloning of private key entries"},
395
396
{".WARNING.WARNING.WARNING.",
397
"***************** WARNING WARNING WARNING *****************"},
398
{"Signer.d.", "Signer #%d:"},
399
{"Timestamp.", "Timestamp:"},
400
{"Signature.", "Signature:"},
401
{"Certificate.owner.", "Certificate owner: "},
402
{"Not.a.signed.jar.file", "Not a signed jar file"},
403
{"No.certificate.from.the.SSL.server",
404
"No certificate from the SSL server"},
405
406
{".The.integrity.of.the.information.stored.in.your.keystore.",
407
"* The integrity of the information stored in your keystore *\n" +
408
"* has NOT been verified! In order to verify its integrity, *\n" +
409
"* you must provide your keystore password. *"},
410
{".The.integrity.of.the.information.stored.in.the.srckeystore.",
411
"* The integrity of the information stored in the srckeystore*\n" +
412
"* has NOT been verified! In order to verify its integrity, *\n" +
413
"* you must provide the srckeystore password. *"},
414
415
{"Certificate.reply.does.not.contain.public.key.for.alias.",
416
"Certificate reply does not contain public key for <{0}>"},
417
{"Incomplete.certificate.chain.in.reply",
418
"Incomplete certificate chain in reply"},
419
{"Top.level.certificate.in.reply.",
420
"Top-level certificate in reply:\n"},
421
{".is.not.trusted.", "... is not trusted. "},
422
{"Install.reply.anyway.no.", "Install reply anyway? [no]: "},
423
{"Public.keys.in.reply.and.keystore.don.t.match",
424
"Public keys in reply and keystore don't match"},
425
{"Certificate.reply.and.certificate.in.keystore.are.identical",
426
"Certificate reply and certificate in keystore are identical"},
427
{"Failed.to.establish.chain.from.reply",
428
"Failed to establish chain from reply"},
429
{"n", "n"},
430
{"Wrong.answer.try.again", "Wrong answer, try again"},
431
{"Secret.key.not.generated.alias.alias.already.exists",
432
"Secret Key not generated, alias <{0}> already exists"},
433
{"Please.provide.keysize.for.secret.key.generation",
434
"Please provide -keysize for secret key generation"},
435
436
{"warning.not.verified.make.sure.keystore.is.correct",
437
"WARNING: not verified. Make sure -keystore is correct."},
438
{"warning.not.verified.make.sure.keystore.is.correct.or.specify.trustcacerts",
439
"WARNING: not verified. Make sure -keystore is correct or specify -trustcacerts."},
440
441
{"Extensions.", "Extensions: "},
442
{".Empty.value.", "(Empty value)"},
443
{"Extension.Request.", "Extension Request:"},
444
{"Unknown.keyUsage.type.", "Unknown keyUsage type: "},
445
{"Unknown.extendedkeyUsage.type.", "Unknown extendedkeyUsage type: "},
446
{"Unknown.AccessDescription.type.", "Unknown AccessDescription type: "},
447
{"Unrecognized.GeneralName.type.", "Unrecognized GeneralName type: "},
448
{"This.extension.cannot.be.marked.as.critical.",
449
"This extension cannot be marked as critical. "},
450
{"Odd.number.of.hex.digits.found.", "Odd number of hex digits found: "},
451
{"Unknown.extension.type.", "Unknown extension type: "},
452
{"command.{0}.is.ambiguous.", "command {0} is ambiguous:"},
453
454
// 8171319: keytool should print out warnings when reading or
455
// generating cert/cert req using weak algorithms
456
{"the.certificate.request", "The certificate request"},
457
{"the.issuer", "The issuer"},
458
{"the.generated.certificate", "The generated certificate"},
459
{"the.generated.crl", "The generated CRL"},
460
{"the.generated.certificate.request", "The generated certificate request"},
461
{"the.certificate", "The certificate"},
462
{"the.crl", "The CRL"},
463
{"the.tsa.certificate", "The TSA certificate"},
464
{"the.input", "The input"},
465
{"reply", "Reply"},
466
{"one.in.many", "%1$s #%2$d of %3$d"},
467
{"alias.in.cacerts", "Issuer <%s> in cacerts"},
468
{"alias.in.keystore", "Issuer <%s>"},
469
{"with.weak", "%s (weak)"},
470
{"with.disabled", "%s (disabled)"},
471
{"key.bit", "%1$d-bit %2$s key"},
472
{"key.bit.weak", "%1$d-bit %2$s key (weak)"},
473
{"key.bit.disabled", "%1$d-bit %2$s key (disabled)"},
474
{"unknown.size.1", "%s key of unknown size"},
475
{".PATTERN.printX509Cert.with.weak",
476
"Owner: {0}\nIssuer: {1}\nSerial number: {2}\nValid from: {3} until: {4}\nCertificate fingerprints:\n\t SHA1: {5}\n\t SHA256: {6}\nSignature algorithm name: {7}\nSubject Public Key Algorithm: {8}\nVersion: {9}"},
477
{"PKCS.10.with.weak",
478
"PKCS #10 Certificate Request (Version 1.0)\n" +
479
"Subject: %1$s\nFormat: %2$s\nPublic Key: %3$s\nSignature algorithm: %4$s\n"},
480
{"verified.by.s.in.s.weak", "Verified by %1$s in %2$s with a %3$s"},
481
{"whose.sigalg.disabled", "%1$s uses the %2$s signature algorithm which is considered a security risk and is disabled."},
482
{"whose.sigalg.weak", "%1$s uses the %2$s signature algorithm which is considered a security risk. This algorithm will be disabled in a future update."},
483
{"whose.key.disabled", "%1$s uses a %2$s which is considered a security risk and is disabled."},
484
{"whose.key.weak", "%1$s uses a %2$s which is considered a security risk. This key size will be disabled in a future update."},
485
{"jks.storetype.warning", "The %1$s keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using \"keytool -importkeystore -srckeystore %2$s -destkeystore %2$s -deststoretype pkcs12\"."},
486
{"migrate.keystore.warning", "Migrated \"%1$s\" to %4$s. The %2$s keystore is backed up as \"%3$s\"."},
487
{"backup.keystore.warning", "The original keystore \"%1$s\" is backed up as \"%3$s\"..."},
488
{"importing.keystore.status", "Importing keystore %1$s to %2$s..."},
489
{"keyalg.option.missing.error", "The -keyalg option must be specified."},
490
{"showinfo.no.option", "Missing option for -showinfo. Try \"keytool -showinfo -tls\"."},
491
};
492
493
494
/**
495
* Returns the contents of this <code>ResourceBundle</code>.
496
*
497
* <p>
498
*
499
* @return the contents of this <code>ResourceBundle</code>.
500
*/
501
@Override
502
public Object[][] getContents() {
503
return contents;
504
}
505
}
506
507