OpenCores
URL https://opencores.org/ocsvn/openrisc/openrisc/trunk

Subversion Repositories openrisc

[/] [openrisc/] [trunk/] [gnu-dev/] [or1k-gcc/] [libjava/] [classpath/] [tools/] [resource/] [gnu/] [classpath/] [tools/] [keytool/] [messages.properties] - Blame information for rev 779

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 779 jeremybenn
# messages.properties -- English language messages and message formats
2
# Copyright (C) 2006  Free Software Foundation, Inc.
3
#
4
# This file is part of GNU Classpath.
5
#
6
# GNU Classpath is free software; you can redistribute it and/or modify
7
# it under the terms of the GNU General Public License as published by
8
# the Free Software Foundation; either version 2, or (at your option)
9
# any later version.
10
#
11
# GNU Classpath is distributed in the hope that it will be useful, but
12
# WITHOUT ANY WARRANTY; without even the implied warranty of
13
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
# General Public License for more details.
15
#
16
# You should have received a copy of the GNU General Public License
17
# along with GNU Classpath; see the file COPYING.  If not, write to the
18
# Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
19
# 02110-1301 USA.
20
#
21
# Linking this library statically or dynamically with other modules is
22
# making a combined work based on this library.  Thus, the terms and
23
# conditions of the GNU General Public License cover the whole
24
# combination.
25
#
26
# As a special exception, the copyright holders of this library give you
27
# permission to link this library with independent modules to produce an
28
# executable, regardless of the license terms of these independent
29
# modules, and to copy and distribute the resulting executable under
30
# terms of your choice, provided that you also meet, for each linked
31
# independent module, the terms and conditions of the license of that
32
# module.  An independent module is a module which is not derived from
33
# or based on this library.  If you modify this library, you may extend
34
# this exception to your version of the library, but you are not
35
# obligated to do so.  If you do not wish to do so, delete this
36
# exception statement from your version.
37
#
38
# for gnu.classpath.tools.keytool package
39
#
40
 
41
Main.6=keytool: {0}
42
Main.8=keytool error: {0}
43
Main.5=Import a CA's Trusted Certificate.\n\
44
[-file FILE] [-storetype STORE_TYPE] [-keystore URL]\n\
45
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
46
Main.18=Unrecognized command: {0}
47
Main.19=Usage:  keytool [COMMAND] [-- COMMAND]...\n\
48
Manage private keys and public certificates.
49
Main.20=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
50
Main.21=Available commands
51
Main.22=Generate a Key Entry, eventually creating a key store.\n\
52
[-alias ALIAS] [-keyalg ALGORITHM] [-keysize KEY_SIZE]\n\
53
[-sigalg ALGORITHM] [-dname NAME] [-keypass PASSWORD]\n\
54
[-validity DAY_COUNT] [-storetype STORE_TYPE]\n\
55
[-keystore URL] [-storepass PASSWORD]\n\
56
[-provider PROVIDER_CLASS_NAME] [-v].
57
Main.23=Add Key Entries and Trusted Certificates.\n\
58
[-alias ALIAS] [-file FILE] [-keypass PASSWORD]\n\
59
[-noprompt] [-trustcacerts] [-storetype STORE_TYPE]\n\
60
[-keystore URL] [-storepass PASSWORD]\n\
61
[-provider PROVIDER_CLASS_NAME] [-v].
62
Main.24=Generate a self-signed Trusted Certificate.\n\
63
[-alias ALIAS] [-sigalg ALGORITHM] [-dname NAME]\n\
64
[-validity DAY_COUNT] [-keypass PASSWORD]\n\
65
[-storetype STORE_TYPE] [-keystore URL]\n\
66
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
67
Main.25=NOT IMPLEMENTED YET.  Import JDK1.1 Identity Database.\n\
68
[-file FILE] [-storetype STORE_TYPE] [-keystore URL]\n\
69
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
70
Main.26=Issue a Certificate Signing Request (CSR).\n\
71
[-alias ALIAS] [-sigalg ALGORITHM] [-file FILE]\n\
72
[-keypass PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
73
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v]\n\
74
[-attributes].
75
Main.27=Export a Certificate from a key store.\n\
76
[-alias ALIAS] [-file FILE] [-storetype STORE_TYPE]\n\
77
[-keystore URL] [-storepass PASSWORD]\n\
78
[-provider PROVIDER_CLASS_NAME] [-rfc] [-v].
79
Main.28=Print one or all Certificates in a key store to STDOUT.\n\
80
[-alias ALIAS] [-storetype STORE_TYPE] [-keystore URL]\n\
81
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-rfc] [-v].
82
Main.29=Print a human-readable form of a Certificate in a FILE.\n\
83
[-file FILE] [-v].
84
Main.30=Clone a Key Entry in a key store.\n\
85
[-alias ALIAS] [-dest ALIAS] [-keypass PASSWORD]\n\
86
[-new PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
87
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
88
Main.31=Change the password protecting a key store.\n\
89
[-new PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
90
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
91
Main.32=Change the password protecting a Key Entry in a key store.\n\
92
[-alias ALIAS] [-keypass PASSWORD] [-new PASSWORD]\n\
93
[-storetype STORE_TYPE] [-keystore URL]\n\
94
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
95
Main.33=Delete a Key Entry or a Trusted Certificate from a key store.\n\
96
[-alias ALIAS] [-storetype STORE_TYPE] [-keystore URL]\n\
97
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
98
 
99
Command.19=Failed creating new file at {0}
100
Command.20=Unable to find a suitable signature algorithm named {0}, although we found a key-pair generation algorithm named {1}
101
Command.21=Enter key password for <{0}>:
102
Command.23=A correct key password MUST be provided
103
Command.24=Enter key store password:
104
#Command.36=Option '-keystore' is undefined, or is an empty string, and 'user.home' is unknown
105
Command.36=Unable to locate a valid key store
106
Command.40=Provider fully qualified class name:
107
Command.42=File object [{0}] exists but is NOT a file
108
Command.44=File [{0}] exists but is NOT writable
109
Command.46=File object [{0}] MUST be an existing readable file
110
Command.48=Signature algorithm is missing and private key is of unknown or unsupported type
111
Command.51=Validity period MUST be greater than zero
112
Command.52=Unable to get signature algorithm name
113
Command.60=Unknown or unsupported signature algorithm: {0}
114
Command.63=Saving key store at {0}
115
Command.66=Owner: {0}
116
Command.67=Issuer: {0}
117
Command.68=Serial number: {0,number}
118
Command.69=Valid from: {0,date,full} - {0,time,full}
119
Command.70=\ \ \ \ \ until: {0,date,full} - {0,time,full}
120
Command.71=Certificate fingerprints
121
Command.72=\ \ \ \ \ \ MD5: {0}
122
Command.73=\ \ SHA-160: {0}
123
Command.75=Alias [{0}] MUST be knwon to the key store
124
Command.77=Alias [{0}] MUST be associated with a Key Entry
125
 
126
CertReqCmd.27=Certification request stored in {0}
127
CertReqCmd.28=Submit this to your CA
128
CertReqCmd.25=Usage:  keytool -certreq [OPTION]...\n\
129
Generate a PKCS#10 Certificate Signing Request (CSR) and write it to a \
130
designated output destination.\n\n\
131
IMPORTANT: Some documentation claims that the Attributes field, in the CSR is \
132
OPTIONAL while RFC-2986 implies the opposite.  This implementation considers \
133
this field, by default, as OPTIONAL, unless option -attributes is specified.
134
CertReqCmd.24=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
135
CertReqCmd.23=Command options
136
CertReqCmd.22=Alias of an entry in the key store on whose behalf the CSR is \
137
generated.  The value "mykey" (all lower case, without the enclosing quotes) \
138
is used when this option is omitted.
139
CertReqCmd.21=ALIAS
140
CertReqCmd.20=Name of the digital signature algorithm to use for signing the \
141
certificate.  If omitted, a default value is chosen based on the type of the \
142
private key associated with ALIAS.  If the key is a "DSA" one, the value for \
143
signature algorithm will be "SHA1withDSA".  If on the other hand the key is \
144
an "RSA" one, then "MD5withRSA" will be the signature algorithm.
145
CertReqCmd.19=ALGORITHM
146
CertReqCmd.18=Destination of the generated CSR.  STDOUT is used if this \
147
option is omitted.
148
CertReqCmd.17=FILE
149
CertReqCmd.16=Password to unlock the Key Entry associated with ALIAS.  If \
150
omitted, the tool will attempt to unlock the Key Entry using the same password \
151
protecting the key store.  If this fails, you will be prompted for a password.
152
CertReqCmd.14=Type of the key store to use.  If omitted, the default value is \
153
that of the property "keystore.type" in the security properties file.
154
CertReqCmd.13=STORE_TYPE
155
CertReqCmd.12=Location of the key store to use.  The default value is a \
156
file-based scheme whose path is the file named ".keystore" in your home \
157
directory.\n\
158
If URL is malformed, the tool will use URL as a file-name of a key store; \
159
i.e. as if the protocol was "file:".
160
CertReqCmd.11=URL
161
CertReqCmd.10=Password to unlock the key store.  If omitted, you will be \
162
prompted for one.
163
CertReqCmd.9=PASSWORD
164
CertReqCmd.8=Fully qualified class name of a Security Provider to add to the \
165
JVM in-use.
166
CertReqCmd.7=PROVIDER_CLASS_NAME
167
CertReqCmd.6=Emit more verbose messages.
168
CertReqCmd.5=Force the tool to encode a NULL DER value in the CSR as the value \
169
of the Attributes field.
170
 
171
DeleteCmd.19=Enter the Alias to delete:
172
DeleteCmd.18=Usage:  keytool -delete [OPTION]...\n\
173
Delete a designated key store entry.
174
DeleteCmd.17=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
175
DeleteCmd.16=Command options
176
DeleteCmd.15=Alias of an entry to delete.  The value "mykey" (all lower case, \
177
without the enclosing quotes) is used when this option is omitted.
178
DeleteCmd.14=ALIAS
179
DeleteCmd.13=Type of the key store to use.  If omitted, the default value is \
180
that of the property "keystore.type" in the security properties file.
181
DeleteCmd.12=STORE_TYPE
182
DeleteCmd.11=Location of the key store to use.  The default value is a \
183
file-based scheme whose path is the file named ".keystore" in your home \
184
directory.\n\
185
If URL is malformed, the tool will use URL as a file-name of a key store; \
186
i.e. as if the protocol was "file:".
187
DeleteCmd.10=URL
188
DeleteCmd.20=Alias MUST NOT be null or an empty string
189
DeleteCmd.9=Password to unlock the key store.  If omitted, you will be \
190
prompted for one.
191
DeleteCmd.8=PASSWORD
192
DeleteCmd.7=Fully qualified class name of a Security Provider to add to the \
193
JVM in-use.
194
DeleteCmd.6=PROVIDER_CLASS_NAME
195
DeleteCmd.5=Emit more verbose messages.
196
 
197
GenKeyCmd.0=\nYou are about to enter information that will be incorporated into\n\
198
your certificate request.  This information is what is called a\n\
199
Distinguished Name or DN.  There are quite a few fields but you\n\
200
can use supplied default values, displayed between brackets, by just\n\
201
hitting , or blank the field by entering the <.> character\n\
202
before hitting .\n\n
203
GenKeyCmd.6=The Sample Company
204
GenKeyCmd.7=Sydney
205
GenKeyCmd.8=NSW
206
GenKeyCmd.9=AU
207
GenKeyCmd.10=Common Name (hostname, IP, or your name):
208
GenKeyCmd.11=Organization Name (company) [{0}]:
209
GenKeyCmd.13=Organizational Unit Name (department, division):
210
GenKeyCmd.14=Locality Name (city, district) [{0}]:
211
GenKeyCmd.16=State or Province Name (full name) [{0}]:
212
GenKeyCmd.18=Country Name (2 letter code) [{0}]:
213
GenKeyCmd.54=Key size MUST be greater than zero
214
GenKeyCmd.57=Usage:  keytool -genkey [OPTION]...\n\
215
Generate a new key-pair and save these credentials in the key store as a Key \
216
Entry, associated with a designated Alias.
217
GenKeyCmd.58=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
218
GenKeyCmd.59=Command options
219
GenKeyCmd.60=Alias of the Key Entry to generate.  The value "mykey" (all lower \
220
case, without the enclosing quotes) is used when this option is omitted.
221
GenKeyCmd.61=ALIAS
222
GenKeyCmd.62=Name of the key-pair generation algorithm.  The default value is \
223
"DSS" (a synonym for the Digital Signature Algorithm also known as DSA).
224
GenKeyCmd.63=ALGORITHM
225
GenKeyCmd.64=Number of bits of the shared modulus, for both the public and \
226
private keys, to use for the new keys.  If omitted, 1024 is used.
227
GenKeyCmd.65=SIZE
228
GenKeyCmd.66=Name of the digital signature algorithm to use for signing the \
229
certificate.  If omitted, a default value is chosen based on the type of the \
230
private key associated with ALIAS.  If the key is a "DSA" one, the value for \
231
signature algorithm will be "SHA1withDSA".  If on the other hand the key is \
232
an "RSA" one, then "MD5withRSA" will be the signature algorithm.
233
GenKeyCmd.68=The X.500 Distinguished Name of the Subject of the generated \
234
certificate.  If omitted you will be prompted for one.
235
GenKeyCmd.69=NAME
236
GenKeyCmd.70=Password to protect the newly created Key Entry.  If omitted, \
237
you will be prompted to provide a password.
238
GenKeyCmd.71=PASSWORD
239
GenKeyCmd.72=Number of days the generated certificate is valid for.  If \
240
omitted, 90 is used.
241
GenKeyCmd.73=DAY_COUNT
242
GenKeyCmd.74=Type of the key store to use.  If omitted, the default value is \
243
that of the property "keystore.type" in the security properties file.
244
GenKeyCmd.75=STORE_TYPE
245
GenKeyCmd.76=Location of the key store to use.  The default value is a \
246
file-based scheme whose path is the file named ".keystore" in your home \
247
directory.\n\
248
If URL is malformed, the tool will use URL as a file-name of a key store; \
249
i.e. as if the protocol was "file:".
250
GenKeyCmd.77=URL
251
GenKeyCmd.78=Password to unlock the key store.  If omitted, you will be \
252
prompted for one.
253
GenKeyCmd.80=Fully qualified class name of a Security Provider to add to the \
254
JVM in-use.
255
GenKeyCmd.81=PROVIDER_CLASS_NAME
256
GenKeyCmd.82=Emit more verbose messages.
257
 
258
StorePasswdCmd.19=Too many failed attempts
259
StorePasswdCmd.18=Usage:  keytool -storepasswd [OPTION]...\n\
260
Change the password protecting a key store.
261
StorePasswdCmd.17=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
262
StorePasswdCmd.16=Command options
263
StorePasswdCmd.15=The new, and different, password to protect the key store.  \
264
If omitted, you will be prompted for one.
265
StorePasswdCmd.13=Type of the key store to use.  If omitted, the default value is \
266
that of the property "keystore.type" in the security properties file.
267
StorePasswdCmd.12=STORE_TYPE
268
StorePasswdCmd.11=Location of the key store to use.  The default value is a \
269
file-based scheme whose path is the file named ".keystore" in your home \
270
directory.\n\
271
If URL is malformed, the tool will use URL as a file-name of a key store; \
272
i.e. as if the protocol was "file:".
273
StorePasswdCmd.10=URL
274
StorePasswdCmd.20=Enter new key store password:
275
StorePasswdCmd.21=Password MUST be at least 6 characters.
276
StorePasswdCmd.22=New password MUST be different than the old one.
277
StorePasswdCmd.23=Re-enter new key store password:
278
StorePasswdCmd.24=Passwords MUST be the same in both attempts.
279
StorePasswdCmd.9=Password to unlock the key store.  If omitted, you will be \
280
prompted for one.
281
StorePasswdCmd.8=PASSWORD
282
StorePasswdCmd.7=Fully qualified class name of a Security Provider to add to the \
283
JVM in-use.
284
StorePasswdCmd.6=PROVIDER_CLASS_NAME
285
StorePasswdCmd.5=Emit more verbose messages.
286
 
287
KeyPasswdCmd.24=Enter new key password for <{0}>:
288
KeyPasswdCmd.28=Re-enter new key password for <{0}>:
289
KeyPasswdCmd.23=Usage:  keytool -keypasswd [OPTION]...\n\
290
Change the password protecting a Key Entry.
291
KeyPasswdCmd.22=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
292
KeyPasswdCmd.21=Command options
293
KeyPasswdCmd.20=The Alias which password is to be changed.
294
KeyPasswdCmd.19=ALIAS
295
KeyPasswdCmd.18=Password to unlock ALIAS.  If omitted, the tool will attempt \
296
to unlock the Key Entry using the same password protecting the key store.  If \
297
this fails, you will be prompted for a password.
298
KeyPasswdCmd.16=The new, and different, password to protect ALIAS.
299
KeyPasswdCmd.14=Type of the key store to use.  If omitted, the default value is \
300
that of the property "keystore.type" in the security properties file.
301
KeyPasswdCmd.13=STORE_TYPE
302
KeyPasswdCmd.12=Location of the key store to use.  The default value is a \
303
file-based scheme whose path is the file named ".keystore" in your home \
304
directory.\n\
305
If URL is malformed, the tool will use URL as a file-name of a key store; \
306
i.e. as if the protocol was "file:".
307
KeyPasswdCmd.11=URL
308
KeyPasswdCmd.10=Password to unlock the key store.  If omitted, you will be \
309
prompted for one.
310
KeyPasswdCmd.9=PASSWORD
311
KeyPasswdCmd.8=Fully qualified class name of a Security Provider to add to the \
312
JVM in-use.
313
KeyPasswdCmd.7=PROVIDER_CLASS_NAME
314
KeyPasswdCmd.6=Emit more verbose messages.
315
 
316
KeyCloneCmd.23=Destination Alias MUST NOT exist in key store
317
KeyCloneCmd.26=Enter destination alias:
318
KeyCloneCmd.27=Destination alias MUST NOT be null nor empty
319
KeyCloneCmd.28=Enter new key password for <{0}> [{1}]:
320
KeyCloneCmd.22=Usage:  keytool -keyclone [OPTION]...\n\
321
Clone an existing Key Entry and store it under a new (different) Alias \
322
protecting its private key material with possibly a new password.
323
KeyCloneCmd.21=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
324
KeyCloneCmd.20=Command options
325
KeyCloneCmd.19=Alias of an entry to clone.  The value "mykey" (all lower case, \
326
without the enclosing quotes) is used when this option is omitted.
327
KeyCloneCmd.17=Alias to identify the cloned copy of the Key Entry.
328
KeyCloneCmd.16=ALIAS
329
KeyCloneCmd.15=Password to unlock the Key Entry associated with the Alias to \
330
clone.  If omitted, the tool will attempt to unlock the Key Entry using the \
331
same password protecting the key store.  If this fails, you will be prompted \
332
for a password.
333
KeyCloneCmd.13=Password to protect the cloned copy of the Key Entry.  If \
334
omitted, you will be prompted to provide one.
335
KeyCloneCmd.11=Type of the key store to use.  If omitted, the default value is \
336
that of the property "keystore.type" in the security properties file.
337
KeyCloneCmd.10=STORE_TYPE
338
KeyCloneCmd.9=Location of the key store to use.  The default value is a \
339
file-based scheme whose path is the file named ".keystore" in your home \
340
directory.\n\
341
If URL is malformed, the tool will use URL as a file-name of a key store; \
342
i.e. as if the protocol was "file:".
343
KeyCloneCmd.8=URL
344
KeyCloneCmd.7=Password to unlock the key store.  If omitted, you will be \
345
prompted for one.
346
KeyCloneCmd.6=PASSWORD
347
KeyCloneCmd.5=Fully qualified class name of a Security Provider to add to the \
348
JVM in-use.
349
KeyCloneCmd.4=PROVIDER_CLASS_NAME
350
KeyCloneCmd.3=Emit more verbose messages.
351
 
352
ListCmd.21=Key store type: {0}
353
ListCmd.22=Key store provider: {0}
354
ListCmd.24=Key store contains {0,number} entry(ies)
355
ListCmd.20=Usage:  keytool -list [OPTION]...\n\
356
Print one or all of the key store entries to STDOUT.  Usually this command \
357
will only print a fingerprint of the certificate, unless either -rfc or -v \
358
is specified.
359
ListCmd.30=Alias name: {0}
360
ListCmd.31=Creation timestamp: {0,date,full} - {0,time,full}
361
ListCmd.32=Entry type: trusted-certificate
362
ListCmd.33=Entry type: key-entry
363
ListCmd.34=Alias [{0}] is unknown to the key store
364
ListCmd.38=Certificate chain length: {0,number}
365
ListCmd.39=Certificate[1]:
366
ListCmd.40=Certificate[{0,number}]:
367
ListCmd.42=*******************************************
368
ListCmd.43=-----BEGIN CERTIFICATE-----
369
ListCmd.44=-----END CERTIFICATE-----
370
ListCmd.45=Certificate fingerprint (MD5): {0}
371
ListCmd.19=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
372
ListCmd.18=Command options
373
ListCmd.17=Alias of an entry to list.  If omitted, all entries are listed.
374
ListCmd.16=ALIAS
375
ListCmd.15=Type of the key store to use.  If omitted, the default value is \
376
that of the property "keystore.type" in the security properties file.
377
ListCmd.14=STORE_TYPE
378
ListCmd.13=Location of the key store to use.  The default value is a \
379
file-based scheme whose path is the file named ".keystore" in your home \
380
directory.\n\
381
If URL is malformed, the tool will use URL as a file-name of a key store; \
382
i.e. as if the protocol was "file:".
383
ListCmd.12=URL
384
ListCmd.11=Password to unlock the key store.  If omitted, you will be \
385
prompted for one.
386
ListCmd.10=PASSWORD
387
ListCmd.9=Fully qualified class name of a Security Provider to add to the \
388
JVM in-use.
389
ListCmd.8=PROVIDER_CLASS_NAME
390
ListCmd.7=Output the certificate in human-readable format, even if -rfc is \
391
also specified.
392
ListCmd.6=Use RFC-1421 specifications when encoding the output.
393
 
394
ImportCmd.34=Failed to establish chain-of-trust from reply
395
ImportCmd.37=Unable to find anchor certificate for {0}
396
ImportCmd.38=Public keys, in key store and certificate, MUST be of the same type
397
ImportCmd.32=Can this certificate be trusted?
398
ImportCmd.40=Key entry associated with {0} has an unknown or unsupported public key type {1}
399
ImportCmd.41=Public keys, in key store and certificate, MUST be the same
400
ImportCmd.29=Certificate was added to the key store
401
ImportCmd.28=Certificate was not added to the key store
402
ImportCmd.27=Usage:  keytool -import [OPTION]...\n\
403
Read an X.509 certificate, or a PKCS#7 Certificate Reply from a designated \
404
input source and incorporate the certificates into the key store.
405
ImportCmd.26=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
406
ImportCmd.25=Command options
407
ImportCmd.24=If ALIAS does not already exist in the key store, the tool treats \
408
the certificate in FILE as a new Trusted Certificate.\n\
409
If ALIAS exists in the key store, the tool will treat the certificate(s) in \
410
FILE as a Certificate Reply (which can be a chain of certificates).
411
ImportCmd.23=ALIAS
412
ImportCmd.22=Location of the Certificate or Certificate Reply to import.
413
ImportCmd.21=FILE
414
ImportCmd.20=Password to protect the Key Entry associated with ALIAS.  If \
415
this option is omitted, and the chain-of-trust for the Certificate Reply has \
416
been established, the tool will first attempt to unlock the Key Entry using \
417
the same password protecting the key store.  If this fails, you will be \
418
prompted to provide a password.
419
ImportCmd.19=PASSWORD
420
ImportCmd.18=Prevent the tool from prompting the user.
421
ImportCmd.17=Additionally use a key store, of type "JKS", named "cacerts", \
422
and located in lib/security in an installed Java Runtime Environment, when \
423
trying to establish chains-of-trust.
424
ImportCmd.16=Type of the key store to use.  If omitted, the default value is \
425
that of the property "keystore.type" in the security properties file.
426
ImportCmd.15=STORE_TYPE
427
ImportCmd.14=Location of the key store to use.  The default value is a \
428
file-based scheme whose path is the file named ".keystore" in your home \
429
directory.\n\
430
If URL is malformed, the tool will use URL as a file-name of a key store; \
431
i.e. as if the protocol was "file:".
432
ImportCmd.13=URL
433
ImportCmd.12=Password to unlock the key store.  If omitted, you will be \
434
prompted for one.
435
ImportCmd.11=PASSWORD
436
ImportCmd.10=Fully qualified class name of a Security Provider to add to the \
437
JVM in-use.
438
ImportCmd.9=PROVIDER_CLASS_NAME
439
ImportCmd.8=Emit more verbose messages.
440
ImportCmd.7=Was unable to build a certificate-chain. Only {0,number} out of {1,number} certificates were processed
441
 
442
ExportCmd.17=Usage:  keytool -export [OPTION]...\n\
443
Export a certificate stored in the key store to a designated output \
444
destination, either in binary format or in RFC-1421 compliant encoding.
445
ExportCmd.18=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
446
ExportCmd.19=Command options
447
ExportCmd.20=Alias of an entry to export.  The value "mykey" (all lower case, \
448
without the enclosing quotes) is used when this option is omitted.
449
ExportCmd.21=ALIAS
450
ExportCmd.22=Destination of the exported certificate.  STDOUT is used if this \
451
option is omitted.
452
ExportCmd.23=FILE
453
ExportCmd.24=Type of the key store to use.  If omitted, the default value is \
454
that of the property "keystore.type" in the security properties file.
455
ExportCmd.25=STORE_TYPE
456
ExportCmd.26=Location of the key store to use.  The default value is a \
457
file-based scheme whose path is the file named ".keystore" in your home \
458
directory.\n\
459
If URL is malformed, the tool will use URL as a file-name of a key store; \
460
i.e. as if the protocol was "file:".
461
ExportCmd.27=URL
462
ExportCmd.28=Password to unlock the key store.  If omitted, you will be \
463
prompted for one.
464
ExportCmd.29=PASSWORD
465
ExportCmd.30=Fully qualified class name of a Security Provider to add to the \
466
JVM in-use.
467
ExportCmd.31=PROVIDER_CLASS_NAME
468
ExportCmd.32=Use RFC-1421 specifications when encoding the output.
469
ExportCmd.33=Output the certificate in binary DER encoding, which is the \
470
default format.  If -rfc is also present, this option is ignored.
471
 
472
IdentityDBCmd.7=Usage:  keytool -identitydb [OPTION]...\n\
473
NOT IMPLEMENTED YET.  Import a JDK 1.1 style Identity Database.
474
IdentityDBCmd.8=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
475
IdentityDBCmd.9=Command options
476
IdentityDBCmd.10=Location of the Identity Database to import.  If omitted, \
477
STDIN is used.
478
IdentityDBCmd.11=FILE
479
IdentityDBCmd.12=Type of the key store to use.  If omitted, the default value is \
480
that of the property "keystore.type" in the security properties file.
481
IdentityDBCmd.13=STORE_TYPE
482
IdentityDBCmd.14=Location of the key store to use.  The default value is a \
483
file-based scheme whose path is the file named ".keystore" in your home \
484
directory.\n\
485
If URL is malformed, the tool will use URL as a file-name of a key store; \
486
i.e. as if the protocol was "file:".
487
IdentityDBCmd.15=URL
488
IdentityDBCmd.16=Password to unlock the key store.  If omitted, you will be \
489
prompted for one.
490
IdentityDBCmd.17=PASSWORD
491
IdentityDBCmd.18=Fully qualified class name of a Security Provider to add to the \
492
JVM in-use.
493
IdentityDBCmd.19=PROVIDER_CLASS_NAME
494
IdentityDBCmd.20=Emit more verbose messages.
495
 
496
PrintCertCmd.5=Usage:  keytool -printcert [OPTION]...\n\
497
Read a certificate from FILE and print it to STDOUT in a human-readable form.
498
PrintCertCmd.6=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
499
PrintCertCmd.7=Command options
500
PrintCertCmd.8=Location of the certificate to print.  If omitted, STDIN is used.
501
PrintCertCmd.9=FILE
502
PrintCertCmd.10=Emit more verbose messages.
503
 
504
SelfCertCmd.14=Usage:  keytool -selfcert [OPTION]...\n\
505
Generate a self-signed X.509 version 1 certificate.\n\n\
506
The newly generated certificate will form a chain of one element which will \
507
replace the previous chain associated with ALIAS.
508
SelfCertCmd.15=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
509
SelfCertCmd.16=Command options
510
SelfCertCmd.17=Alias of the Key Entry to select.  The value "mykey" (all lower \
511
case, without the enclosing quotes) is used when this option is omitted.
512
SelfCertCmd.18=ALIAS
513
SelfCertCmd.19=Name of the digital signature algorithm to use for signing the \
514
certificate.  If omitted, a default value is chosen based on the type of the \
515
private key associated with ALIAS.  If the key is a "DSA" one, the value for \
516
signature algorithm will be "SHA1withDSA".  If on the other hand the key is \
517
an "RSA" one, then "MD5withRSA" will be the signature algorithm.
518
SelfCertCmd.20=ALGORITHM
519
SelfCertCmd.21=The X.500 Distinguished Name of the Subject of the generated \
520
certificate.  If omitted the Distinguished Name of the base certificate in \
521
the chain associated with ALIAS is used instead.
522
SelfCertCmd.22=NAME
523
SelfCertCmd.23=Password to unlock the Key Entry associated with ALIAS.  If \
524
omitted, the tool will attempt to unlock the Key Entry using the same password \
525
protecting the key store.  If this fails, you will be prompted for a password.
526
SelfCertCmd.24=PASSWORD
527
SelfCertCmd.25=Number of days the generated certificate is valid for.  If \
528
omitted, 90 is used.
529
SelfCertCmd.26=DAY_COUNT
530
SelfCertCmd.27=Type of the key store to use.  If omitted, the default value is \
531
that of the property "keystore.type" in the security properties file.
532
SelfCertCmd.28=STORE_TYPE
533
SelfCertCmd.29=Location of the key store to use.  The default value is a \
534
file-based scheme whose path is the file named ".keystore" in your home \
535
directory.\n\
536
If URL is malformed, the tool will use URL as a file-name of a key store; \
537
i.e. as if the protocol was "file:".
538
SelfCertCmd.30=URL
539
SelfCertCmd.31=Password to unlock the key store.  If omitted, you will be \
540
prompted for one.
541
SelfCertCmd.32=PASSWORD
542
SelfCertCmd.33=Fully qualified class name of a Security Provider to add to the \
543
JVM in-use.
544
SelfCertCmd.34=PROVIDER_CLASS_NAME
545
SelfCertCmd.35=Emit more verbose messages.
546
 
547
CACertCmd.0=Alias [{0}] is already present in key store
548
CACertCmd.1=Certificate in file "{0}" was added to the key store under the alias "{1}"
549
CACertCmd.2=Usage:  keytool -cacert [OPTION]...\n\
550
Import a trusted CA certificate.
551
CACertCmd.3=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
552
CACertCmd.4=Command options
553
CACertCmd.5=Location of the trusted CA certificate to import.
554
CACertCmd.6=FILE
555
CACertCmd.7=Type of the key store to use.  If omitted, the default value is \
556
that of the property "keystore.type" in the security properties file.
557
CACertCmd.8=STORE_TYPE
558
CACertCmd.9=Location of the key store to use.  The default value is a \
559
file-based scheme whose path is the file named ".keystore" in your home \
560
directory.\n\
561
If URL is malformed, the tool will use URL as a file-name of a key store; \
562
i.e. as if the protocol was "file:".
563
CACertCmd.10=URL
564
CACertCmd.11=Password to unlock the key store.  If omitted, you will be \
565
prompted for one.
566
CACertCmd.12=PASSWORD
567
CACertCmd.13=Fully qualified class name of a Security Provider to add to the \
568
JVM in-use.
569
CACertCmd.14=PROVIDER_CLASS_NAME
570
CACertCmd.15=Emit more verbose messages.

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.