1 |
779 |
jeremybenn |
# messages.properties -- English language messages and message formats
|
2 |
|
|
# Copyright (C) 2006 Free Software Foundation, Inc.
|
3 |
|
|
#
|
4 |
|
|
# This file is part of GNU Classpath.
|
5 |
|
|
#
|
6 |
|
|
# GNU Classpath is free software; you can redistribute it and/or modify
|
7 |
|
|
# it under the terms of the GNU General Public License as published by
|
8 |
|
|
# the Free Software Foundation; either version 2, or (at your option)
|
9 |
|
|
# any later version.
|
10 |
|
|
#
|
11 |
|
|
# GNU Classpath is distributed in the hope that it will be useful, but
|
12 |
|
|
# WITHOUT ANY WARRANTY; without even the implied warranty of
|
13 |
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
14 |
|
|
# General Public License for more details.
|
15 |
|
|
#
|
16 |
|
|
# You should have received a copy of the GNU General Public License
|
17 |
|
|
# along with GNU Classpath; see the file COPYING. If not, write to the
|
18 |
|
|
# Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
19 |
|
|
# 02110-1301 USA.
|
20 |
|
|
#
|
21 |
|
|
# Linking this library statically or dynamically with other modules is
|
22 |
|
|
# making a combined work based on this library. Thus, the terms and
|
23 |
|
|
# conditions of the GNU General Public License cover the whole
|
24 |
|
|
# combination.
|
25 |
|
|
#
|
26 |
|
|
# As a special exception, the copyright holders of this library give you
|
27 |
|
|
# permission to link this library with independent modules to produce an
|
28 |
|
|
# executable, regardless of the license terms of these independent
|
29 |
|
|
# modules, and to copy and distribute the resulting executable under
|
30 |
|
|
# terms of your choice, provided that you also meet, for each linked
|
31 |
|
|
# independent module, the terms and conditions of the license of that
|
32 |
|
|
# module. An independent module is a module which is not derived from
|
33 |
|
|
# or based on this library. If you modify this library, you may extend
|
34 |
|
|
# this exception to your version of the library, but you are not
|
35 |
|
|
# obligated to do so. If you do not wish to do so, delete this
|
36 |
|
|
# exception statement from your version.
|
37 |
|
|
#
|
38 |
|
|
# for gnu.classpath.tools.keytool package
|
39 |
|
|
#
|
40 |
|
|
|
41 |
|
|
Main.6=keytool: {0}
|
42 |
|
|
Main.8=keytool error: {0}
|
43 |
|
|
Main.5=Import a CA's Trusted Certificate.\n\
|
44 |
|
|
[-file FILE] [-storetype STORE_TYPE] [-keystore URL]\n\
|
45 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
|
46 |
|
|
Main.18=Unrecognized command: {0}
|
47 |
|
|
Main.19=Usage: keytool [COMMAND] [-- COMMAND]...\n\
|
48 |
|
|
Manage private keys and public certificates.
|
49 |
|
|
Main.20=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
50 |
|
|
Main.21=Available commands
|
51 |
|
|
Main.22=Generate a Key Entry, eventually creating a key store.\n\
|
52 |
|
|
[-alias ALIAS] [-keyalg ALGORITHM] [-keysize KEY_SIZE]\n\
|
53 |
|
|
[-sigalg ALGORITHM] [-dname NAME] [-keypass PASSWORD]\n\
|
54 |
|
|
[-validity DAY_COUNT] [-storetype STORE_TYPE]\n\
|
55 |
|
|
[-keystore URL] [-storepass PASSWORD]\n\
|
56 |
|
|
[-provider PROVIDER_CLASS_NAME] [-v].
|
57 |
|
|
Main.23=Add Key Entries and Trusted Certificates.\n\
|
58 |
|
|
[-alias ALIAS] [-file FILE] [-keypass PASSWORD]\n\
|
59 |
|
|
[-noprompt] [-trustcacerts] [-storetype STORE_TYPE]\n\
|
60 |
|
|
[-keystore URL] [-storepass PASSWORD]\n\
|
61 |
|
|
[-provider PROVIDER_CLASS_NAME] [-v].
|
62 |
|
|
Main.24=Generate a self-signed Trusted Certificate.\n\
|
63 |
|
|
[-alias ALIAS] [-sigalg ALGORITHM] [-dname NAME]\n\
|
64 |
|
|
[-validity DAY_COUNT] [-keypass PASSWORD]\n\
|
65 |
|
|
[-storetype STORE_TYPE] [-keystore URL]\n\
|
66 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
|
67 |
|
|
Main.25=NOT IMPLEMENTED YET. Import JDK1.1 Identity Database.\n\
|
68 |
|
|
[-file FILE] [-storetype STORE_TYPE] [-keystore URL]\n\
|
69 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
|
70 |
|
|
Main.26=Issue a Certificate Signing Request (CSR).\n\
|
71 |
|
|
[-alias ALIAS] [-sigalg ALGORITHM] [-file FILE]\n\
|
72 |
|
|
[-keypass PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
|
73 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v]\n\
|
74 |
|
|
[-attributes].
|
75 |
|
|
Main.27=Export a Certificate from a key store.\n\
|
76 |
|
|
[-alias ALIAS] [-file FILE] [-storetype STORE_TYPE]\n\
|
77 |
|
|
[-keystore URL] [-storepass PASSWORD]\n\
|
78 |
|
|
[-provider PROVIDER_CLASS_NAME] [-rfc] [-v].
|
79 |
|
|
Main.28=Print one or all Certificates in a key store to STDOUT.\n\
|
80 |
|
|
[-alias ALIAS] [-storetype STORE_TYPE] [-keystore URL]\n\
|
81 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-rfc] [-v].
|
82 |
|
|
Main.29=Print a human-readable form of a Certificate in a FILE.\n\
|
83 |
|
|
[-file FILE] [-v].
|
84 |
|
|
Main.30=Clone a Key Entry in a key store.\n\
|
85 |
|
|
[-alias ALIAS] [-dest ALIAS] [-keypass PASSWORD]\n\
|
86 |
|
|
[-new PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
|
87 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
|
88 |
|
|
Main.31=Change the password protecting a key store.\n\
|
89 |
|
|
[-new PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
|
90 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
|
91 |
|
|
Main.32=Change the password protecting a Key Entry in a key store.\n\
|
92 |
|
|
[-alias ALIAS] [-keypass PASSWORD] [-new PASSWORD]\n\
|
93 |
|
|
[-storetype STORE_TYPE] [-keystore URL]\n\
|
94 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
|
95 |
|
|
Main.33=Delete a Key Entry or a Trusted Certificate from a key store.\n\
|
96 |
|
|
[-alias ALIAS] [-storetype STORE_TYPE] [-keystore URL]\n\
|
97 |
|
|
[-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
|
98 |
|
|
|
99 |
|
|
Command.19=Failed creating new file at {0}
|
100 |
|
|
Command.20=Unable to find a suitable signature algorithm named {0}, although we found a key-pair generation algorithm named {1}
|
101 |
|
|
Command.21=Enter key password for <{0}>:
|
102 |
|
|
Command.23=A correct key password MUST be provided
|
103 |
|
|
Command.24=Enter key store password:
|
104 |
|
|
#Command.36=Option '-keystore' is undefined, or is an empty string, and 'user.home' is unknown
|
105 |
|
|
Command.36=Unable to locate a valid key store
|
106 |
|
|
Command.40=Provider fully qualified class name:
|
107 |
|
|
Command.42=File object [{0}] exists but is NOT a file
|
108 |
|
|
Command.44=File [{0}] exists but is NOT writable
|
109 |
|
|
Command.46=File object [{0}] MUST be an existing readable file
|
110 |
|
|
Command.48=Signature algorithm is missing and private key is of unknown or unsupported type
|
111 |
|
|
Command.51=Validity period MUST be greater than zero
|
112 |
|
|
Command.52=Unable to get signature algorithm name
|
113 |
|
|
Command.60=Unknown or unsupported signature algorithm: {0}
|
114 |
|
|
Command.63=Saving key store at {0}
|
115 |
|
|
Command.66=Owner: {0}
|
116 |
|
|
Command.67=Issuer: {0}
|
117 |
|
|
Command.68=Serial number: {0,number}
|
118 |
|
|
Command.69=Valid from: {0,date,full} - {0,time,full}
|
119 |
|
|
Command.70=\ \ \ \ \ until: {0,date,full} - {0,time,full}
|
120 |
|
|
Command.71=Certificate fingerprints
|
121 |
|
|
Command.72=\ \ \ \ \ \ MD5: {0}
|
122 |
|
|
Command.73=\ \ SHA-160: {0}
|
123 |
|
|
Command.75=Alias [{0}] MUST be knwon to the key store
|
124 |
|
|
Command.77=Alias [{0}] MUST be associated with a Key Entry
|
125 |
|
|
|
126 |
|
|
CertReqCmd.27=Certification request stored in {0}
|
127 |
|
|
CertReqCmd.28=Submit this to your CA
|
128 |
|
|
CertReqCmd.25=Usage: keytool -certreq [OPTION]...\n\
|
129 |
|
|
Generate a PKCS#10 Certificate Signing Request (CSR) and write it to a \
|
130 |
|
|
designated output destination.\n\n\
|
131 |
|
|
IMPORTANT: Some documentation claims that the Attributes field, in the CSR is \
|
132 |
|
|
OPTIONAL while RFC-2986 implies the opposite. This implementation considers \
|
133 |
|
|
this field, by default, as OPTIONAL, unless option -attributes is specified.
|
134 |
|
|
CertReqCmd.24=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
135 |
|
|
CertReqCmd.23=Command options
|
136 |
|
|
CertReqCmd.22=Alias of an entry in the key store on whose behalf the CSR is \
|
137 |
|
|
generated. The value "mykey" (all lower case, without the enclosing quotes) \
|
138 |
|
|
is used when this option is omitted.
|
139 |
|
|
CertReqCmd.21=ALIAS
|
140 |
|
|
CertReqCmd.20=Name of the digital signature algorithm to use for signing the \
|
141 |
|
|
certificate. If omitted, a default value is chosen based on the type of the \
|
142 |
|
|
private key associated with ALIAS. If the key is a "DSA" one, the value for \
|
143 |
|
|
signature algorithm will be "SHA1withDSA". If on the other hand the key is \
|
144 |
|
|
an "RSA" one, then "MD5withRSA" will be the signature algorithm.
|
145 |
|
|
CertReqCmd.19=ALGORITHM
|
146 |
|
|
CertReqCmd.18=Destination of the generated CSR. STDOUT is used if this \
|
147 |
|
|
option is omitted.
|
148 |
|
|
CertReqCmd.17=FILE
|
149 |
|
|
CertReqCmd.16=Password to unlock the Key Entry associated with ALIAS. If \
|
150 |
|
|
omitted, the tool will attempt to unlock the Key Entry using the same password \
|
151 |
|
|
protecting the key store. If this fails, you will be prompted for a password.
|
152 |
|
|
CertReqCmd.14=Type of the key store to use. If omitted, the default value is \
|
153 |
|
|
that of the property "keystore.type" in the security properties file.
|
154 |
|
|
CertReqCmd.13=STORE_TYPE
|
155 |
|
|
CertReqCmd.12=Location of the key store to use. The default value is a \
|
156 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
157 |
|
|
directory.\n\
|
158 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
159 |
|
|
i.e. as if the protocol was "file:".
|
160 |
|
|
CertReqCmd.11=URL
|
161 |
|
|
CertReqCmd.10=Password to unlock the key store. If omitted, you will be \
|
162 |
|
|
prompted for one.
|
163 |
|
|
CertReqCmd.9=PASSWORD
|
164 |
|
|
CertReqCmd.8=Fully qualified class name of a Security Provider to add to the \
|
165 |
|
|
JVM in-use.
|
166 |
|
|
CertReqCmd.7=PROVIDER_CLASS_NAME
|
167 |
|
|
CertReqCmd.6=Emit more verbose messages.
|
168 |
|
|
CertReqCmd.5=Force the tool to encode a NULL DER value in the CSR as the value \
|
169 |
|
|
of the Attributes field.
|
170 |
|
|
|
171 |
|
|
DeleteCmd.19=Enter the Alias to delete:
|
172 |
|
|
DeleteCmd.18=Usage: keytool -delete [OPTION]...\n\
|
173 |
|
|
Delete a designated key store entry.
|
174 |
|
|
DeleteCmd.17=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
175 |
|
|
DeleteCmd.16=Command options
|
176 |
|
|
DeleteCmd.15=Alias of an entry to delete. The value "mykey" (all lower case, \
|
177 |
|
|
without the enclosing quotes) is used when this option is omitted.
|
178 |
|
|
DeleteCmd.14=ALIAS
|
179 |
|
|
DeleteCmd.13=Type of the key store to use. If omitted, the default value is \
|
180 |
|
|
that of the property "keystore.type" in the security properties file.
|
181 |
|
|
DeleteCmd.12=STORE_TYPE
|
182 |
|
|
DeleteCmd.11=Location of the key store to use. The default value is a \
|
183 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
184 |
|
|
directory.\n\
|
185 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
186 |
|
|
i.e. as if the protocol was "file:".
|
187 |
|
|
DeleteCmd.10=URL
|
188 |
|
|
DeleteCmd.20=Alias MUST NOT be null or an empty string
|
189 |
|
|
DeleteCmd.9=Password to unlock the key store. If omitted, you will be \
|
190 |
|
|
prompted for one.
|
191 |
|
|
DeleteCmd.8=PASSWORD
|
192 |
|
|
DeleteCmd.7=Fully qualified class name of a Security Provider to add to the \
|
193 |
|
|
JVM in-use.
|
194 |
|
|
DeleteCmd.6=PROVIDER_CLASS_NAME
|
195 |
|
|
DeleteCmd.5=Emit more verbose messages.
|
196 |
|
|
|
197 |
|
|
GenKeyCmd.0=\nYou are about to enter information that will be incorporated into\n\
|
198 |
|
|
your certificate request. This information is what is called a\n\
|
199 |
|
|
Distinguished Name or DN. There are quite a few fields but you\n\
|
200 |
|
|
can use supplied default values, displayed between brackets, by just\n\
|
201 |
|
|
hitting , or blank the field by entering the <.> character\n\
|
202 |
|
|
before hitting .\n\n
|
203 |
|
|
GenKeyCmd.6=The Sample Company
|
204 |
|
|
GenKeyCmd.7=Sydney
|
205 |
|
|
GenKeyCmd.8=NSW
|
206 |
|
|
GenKeyCmd.9=AU
|
207 |
|
|
GenKeyCmd.10=Common Name (hostname, IP, or your name):
|
208 |
|
|
GenKeyCmd.11=Organization Name (company) [{0}]:
|
209 |
|
|
GenKeyCmd.13=Organizational Unit Name (department, division):
|
210 |
|
|
GenKeyCmd.14=Locality Name (city, district) [{0}]:
|
211 |
|
|
GenKeyCmd.16=State or Province Name (full name) [{0}]:
|
212 |
|
|
GenKeyCmd.18=Country Name (2 letter code) [{0}]:
|
213 |
|
|
GenKeyCmd.54=Key size MUST be greater than zero
|
214 |
|
|
GenKeyCmd.57=Usage: keytool -genkey [OPTION]...\n\
|
215 |
|
|
Generate a new key-pair and save these credentials in the key store as a Key \
|
216 |
|
|
Entry, associated with a designated Alias.
|
217 |
|
|
GenKeyCmd.58=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
218 |
|
|
GenKeyCmd.59=Command options
|
219 |
|
|
GenKeyCmd.60=Alias of the Key Entry to generate. The value "mykey" (all lower \
|
220 |
|
|
case, without the enclosing quotes) is used when this option is omitted.
|
221 |
|
|
GenKeyCmd.61=ALIAS
|
222 |
|
|
GenKeyCmd.62=Name of the key-pair generation algorithm. The default value is \
|
223 |
|
|
"DSS" (a synonym for the Digital Signature Algorithm also known as DSA).
|
224 |
|
|
GenKeyCmd.63=ALGORITHM
|
225 |
|
|
GenKeyCmd.64=Number of bits of the shared modulus, for both the public and \
|
226 |
|
|
private keys, to use for the new keys. If omitted, 1024 is used.
|
227 |
|
|
GenKeyCmd.65=SIZE
|
228 |
|
|
GenKeyCmd.66=Name of the digital signature algorithm to use for signing the \
|
229 |
|
|
certificate. If omitted, a default value is chosen based on the type of the \
|
230 |
|
|
private key associated with ALIAS. If the key is a "DSA" one, the value for \
|
231 |
|
|
signature algorithm will be "SHA1withDSA". If on the other hand the key is \
|
232 |
|
|
an "RSA" one, then "MD5withRSA" will be the signature algorithm.
|
233 |
|
|
GenKeyCmd.68=The X.500 Distinguished Name of the Subject of the generated \
|
234 |
|
|
certificate. If omitted you will be prompted for one.
|
235 |
|
|
GenKeyCmd.69=NAME
|
236 |
|
|
GenKeyCmd.70=Password to protect the newly created Key Entry. If omitted, \
|
237 |
|
|
you will be prompted to provide a password.
|
238 |
|
|
GenKeyCmd.71=PASSWORD
|
239 |
|
|
GenKeyCmd.72=Number of days the generated certificate is valid for. If \
|
240 |
|
|
omitted, 90 is used.
|
241 |
|
|
GenKeyCmd.73=DAY_COUNT
|
242 |
|
|
GenKeyCmd.74=Type of the key store to use. If omitted, the default value is \
|
243 |
|
|
that of the property "keystore.type" in the security properties file.
|
244 |
|
|
GenKeyCmd.75=STORE_TYPE
|
245 |
|
|
GenKeyCmd.76=Location of the key store to use. The default value is a \
|
246 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
247 |
|
|
directory.\n\
|
248 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
249 |
|
|
i.e. as if the protocol was "file:".
|
250 |
|
|
GenKeyCmd.77=URL
|
251 |
|
|
GenKeyCmd.78=Password to unlock the key store. If omitted, you will be \
|
252 |
|
|
prompted for one.
|
253 |
|
|
GenKeyCmd.80=Fully qualified class name of a Security Provider to add to the \
|
254 |
|
|
JVM in-use.
|
255 |
|
|
GenKeyCmd.81=PROVIDER_CLASS_NAME
|
256 |
|
|
GenKeyCmd.82=Emit more verbose messages.
|
257 |
|
|
|
258 |
|
|
StorePasswdCmd.19=Too many failed attempts
|
259 |
|
|
StorePasswdCmd.18=Usage: keytool -storepasswd [OPTION]...\n\
|
260 |
|
|
Change the password protecting a key store.
|
261 |
|
|
StorePasswdCmd.17=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
262 |
|
|
StorePasswdCmd.16=Command options
|
263 |
|
|
StorePasswdCmd.15=The new, and different, password to protect the key store. \
|
264 |
|
|
If omitted, you will be prompted for one.
|
265 |
|
|
StorePasswdCmd.13=Type of the key store to use. If omitted, the default value is \
|
266 |
|
|
that of the property "keystore.type" in the security properties file.
|
267 |
|
|
StorePasswdCmd.12=STORE_TYPE
|
268 |
|
|
StorePasswdCmd.11=Location of the key store to use. The default value is a \
|
269 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
270 |
|
|
directory.\n\
|
271 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
272 |
|
|
i.e. as if the protocol was "file:".
|
273 |
|
|
StorePasswdCmd.10=URL
|
274 |
|
|
StorePasswdCmd.20=Enter new key store password:
|
275 |
|
|
StorePasswdCmd.21=Password MUST be at least 6 characters.
|
276 |
|
|
StorePasswdCmd.22=New password MUST be different than the old one.
|
277 |
|
|
StorePasswdCmd.23=Re-enter new key store password:
|
278 |
|
|
StorePasswdCmd.24=Passwords MUST be the same in both attempts.
|
279 |
|
|
StorePasswdCmd.9=Password to unlock the key store. If omitted, you will be \
|
280 |
|
|
prompted for one.
|
281 |
|
|
StorePasswdCmd.8=PASSWORD
|
282 |
|
|
StorePasswdCmd.7=Fully qualified class name of a Security Provider to add to the \
|
283 |
|
|
JVM in-use.
|
284 |
|
|
StorePasswdCmd.6=PROVIDER_CLASS_NAME
|
285 |
|
|
StorePasswdCmd.5=Emit more verbose messages.
|
286 |
|
|
|
287 |
|
|
KeyPasswdCmd.24=Enter new key password for <{0}>:
|
288 |
|
|
KeyPasswdCmd.28=Re-enter new key password for <{0}>:
|
289 |
|
|
KeyPasswdCmd.23=Usage: keytool -keypasswd [OPTION]...\n\
|
290 |
|
|
Change the password protecting a Key Entry.
|
291 |
|
|
KeyPasswdCmd.22=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
292 |
|
|
KeyPasswdCmd.21=Command options
|
293 |
|
|
KeyPasswdCmd.20=The Alias which password is to be changed.
|
294 |
|
|
KeyPasswdCmd.19=ALIAS
|
295 |
|
|
KeyPasswdCmd.18=Password to unlock ALIAS. If omitted, the tool will attempt \
|
296 |
|
|
to unlock the Key Entry using the same password protecting the key store. If \
|
297 |
|
|
this fails, you will be prompted for a password.
|
298 |
|
|
KeyPasswdCmd.16=The new, and different, password to protect ALIAS.
|
299 |
|
|
KeyPasswdCmd.14=Type of the key store to use. If omitted, the default value is \
|
300 |
|
|
that of the property "keystore.type" in the security properties file.
|
301 |
|
|
KeyPasswdCmd.13=STORE_TYPE
|
302 |
|
|
KeyPasswdCmd.12=Location of the key store to use. The default value is a \
|
303 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
304 |
|
|
directory.\n\
|
305 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
306 |
|
|
i.e. as if the protocol was "file:".
|
307 |
|
|
KeyPasswdCmd.11=URL
|
308 |
|
|
KeyPasswdCmd.10=Password to unlock the key store. If omitted, you will be \
|
309 |
|
|
prompted for one.
|
310 |
|
|
KeyPasswdCmd.9=PASSWORD
|
311 |
|
|
KeyPasswdCmd.8=Fully qualified class name of a Security Provider to add to the \
|
312 |
|
|
JVM in-use.
|
313 |
|
|
KeyPasswdCmd.7=PROVIDER_CLASS_NAME
|
314 |
|
|
KeyPasswdCmd.6=Emit more verbose messages.
|
315 |
|
|
|
316 |
|
|
KeyCloneCmd.23=Destination Alias MUST NOT exist in key store
|
317 |
|
|
KeyCloneCmd.26=Enter destination alias:
|
318 |
|
|
KeyCloneCmd.27=Destination alias MUST NOT be null nor empty
|
319 |
|
|
KeyCloneCmd.28=Enter new key password for <{0}> [{1}]:
|
320 |
|
|
KeyCloneCmd.22=Usage: keytool -keyclone [OPTION]...\n\
|
321 |
|
|
Clone an existing Key Entry and store it under a new (different) Alias \
|
322 |
|
|
protecting its private key material with possibly a new password.
|
323 |
|
|
KeyCloneCmd.21=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
324 |
|
|
KeyCloneCmd.20=Command options
|
325 |
|
|
KeyCloneCmd.19=Alias of an entry to clone. The value "mykey" (all lower case, \
|
326 |
|
|
without the enclosing quotes) is used when this option is omitted.
|
327 |
|
|
KeyCloneCmd.17=Alias to identify the cloned copy of the Key Entry.
|
328 |
|
|
KeyCloneCmd.16=ALIAS
|
329 |
|
|
KeyCloneCmd.15=Password to unlock the Key Entry associated with the Alias to \
|
330 |
|
|
clone. If omitted, the tool will attempt to unlock the Key Entry using the \
|
331 |
|
|
same password protecting the key store. If this fails, you will be prompted \
|
332 |
|
|
for a password.
|
333 |
|
|
KeyCloneCmd.13=Password to protect the cloned copy of the Key Entry. If \
|
334 |
|
|
omitted, you will be prompted to provide one.
|
335 |
|
|
KeyCloneCmd.11=Type of the key store to use. If omitted, the default value is \
|
336 |
|
|
that of the property "keystore.type" in the security properties file.
|
337 |
|
|
KeyCloneCmd.10=STORE_TYPE
|
338 |
|
|
KeyCloneCmd.9=Location of the key store to use. The default value is a \
|
339 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
340 |
|
|
directory.\n\
|
341 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
342 |
|
|
i.e. as if the protocol was "file:".
|
343 |
|
|
KeyCloneCmd.8=URL
|
344 |
|
|
KeyCloneCmd.7=Password to unlock the key store. If omitted, you will be \
|
345 |
|
|
prompted for one.
|
346 |
|
|
KeyCloneCmd.6=PASSWORD
|
347 |
|
|
KeyCloneCmd.5=Fully qualified class name of a Security Provider to add to the \
|
348 |
|
|
JVM in-use.
|
349 |
|
|
KeyCloneCmd.4=PROVIDER_CLASS_NAME
|
350 |
|
|
KeyCloneCmd.3=Emit more verbose messages.
|
351 |
|
|
|
352 |
|
|
ListCmd.21=Key store type: {0}
|
353 |
|
|
ListCmd.22=Key store provider: {0}
|
354 |
|
|
ListCmd.24=Key store contains {0,number} entry(ies)
|
355 |
|
|
ListCmd.20=Usage: keytool -list [OPTION]...\n\
|
356 |
|
|
Print one or all of the key store entries to STDOUT. Usually this command \
|
357 |
|
|
will only print a fingerprint of the certificate, unless either -rfc or -v \
|
358 |
|
|
is specified.
|
359 |
|
|
ListCmd.30=Alias name: {0}
|
360 |
|
|
ListCmd.31=Creation timestamp: {0,date,full} - {0,time,full}
|
361 |
|
|
ListCmd.32=Entry type: trusted-certificate
|
362 |
|
|
ListCmd.33=Entry type: key-entry
|
363 |
|
|
ListCmd.34=Alias [{0}] is unknown to the key store
|
364 |
|
|
ListCmd.38=Certificate chain length: {0,number}
|
365 |
|
|
ListCmd.39=Certificate[1]:
|
366 |
|
|
ListCmd.40=Certificate[{0,number}]:
|
367 |
|
|
ListCmd.42=*******************************************
|
368 |
|
|
ListCmd.43=-----BEGIN CERTIFICATE-----
|
369 |
|
|
ListCmd.44=-----END CERTIFICATE-----
|
370 |
|
|
ListCmd.45=Certificate fingerprint (MD5): {0}
|
371 |
|
|
ListCmd.19=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
372 |
|
|
ListCmd.18=Command options
|
373 |
|
|
ListCmd.17=Alias of an entry to list. If omitted, all entries are listed.
|
374 |
|
|
ListCmd.16=ALIAS
|
375 |
|
|
ListCmd.15=Type of the key store to use. If omitted, the default value is \
|
376 |
|
|
that of the property "keystore.type" in the security properties file.
|
377 |
|
|
ListCmd.14=STORE_TYPE
|
378 |
|
|
ListCmd.13=Location of the key store to use. The default value is a \
|
379 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
380 |
|
|
directory.\n\
|
381 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
382 |
|
|
i.e. as if the protocol was "file:".
|
383 |
|
|
ListCmd.12=URL
|
384 |
|
|
ListCmd.11=Password to unlock the key store. If omitted, you will be \
|
385 |
|
|
prompted for one.
|
386 |
|
|
ListCmd.10=PASSWORD
|
387 |
|
|
ListCmd.9=Fully qualified class name of a Security Provider to add to the \
|
388 |
|
|
JVM in-use.
|
389 |
|
|
ListCmd.8=PROVIDER_CLASS_NAME
|
390 |
|
|
ListCmd.7=Output the certificate in human-readable format, even if -rfc is \
|
391 |
|
|
also specified.
|
392 |
|
|
ListCmd.6=Use RFC-1421 specifications when encoding the output.
|
393 |
|
|
|
394 |
|
|
ImportCmd.34=Failed to establish chain-of-trust from reply
|
395 |
|
|
ImportCmd.37=Unable to find anchor certificate for {0}
|
396 |
|
|
ImportCmd.38=Public keys, in key store and certificate, MUST be of the same type
|
397 |
|
|
ImportCmd.32=Can this certificate be trusted?
|
398 |
|
|
ImportCmd.40=Key entry associated with {0} has an unknown or unsupported public key type {1}
|
399 |
|
|
ImportCmd.41=Public keys, in key store and certificate, MUST be the same
|
400 |
|
|
ImportCmd.29=Certificate was added to the key store
|
401 |
|
|
ImportCmd.28=Certificate was not added to the key store
|
402 |
|
|
ImportCmd.27=Usage: keytool -import [OPTION]...\n\
|
403 |
|
|
Read an X.509 certificate, or a PKCS#7 Certificate Reply from a designated \
|
404 |
|
|
input source and incorporate the certificates into the key store.
|
405 |
|
|
ImportCmd.26=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
406 |
|
|
ImportCmd.25=Command options
|
407 |
|
|
ImportCmd.24=If ALIAS does not already exist in the key store, the tool treats \
|
408 |
|
|
the certificate in FILE as a new Trusted Certificate.\n\
|
409 |
|
|
If ALIAS exists in the key store, the tool will treat the certificate(s) in \
|
410 |
|
|
FILE as a Certificate Reply (which can be a chain of certificates).
|
411 |
|
|
ImportCmd.23=ALIAS
|
412 |
|
|
ImportCmd.22=Location of the Certificate or Certificate Reply to import.
|
413 |
|
|
ImportCmd.21=FILE
|
414 |
|
|
ImportCmd.20=Password to protect the Key Entry associated with ALIAS. If \
|
415 |
|
|
this option is omitted, and the chain-of-trust for the Certificate Reply has \
|
416 |
|
|
been established, the tool will first attempt to unlock the Key Entry using \
|
417 |
|
|
the same password protecting the key store. If this fails, you will be \
|
418 |
|
|
prompted to provide a password.
|
419 |
|
|
ImportCmd.19=PASSWORD
|
420 |
|
|
ImportCmd.18=Prevent the tool from prompting the user.
|
421 |
|
|
ImportCmd.17=Additionally use a key store, of type "JKS", named "cacerts", \
|
422 |
|
|
and located in lib/security in an installed Java Runtime Environment, when \
|
423 |
|
|
trying to establish chains-of-trust.
|
424 |
|
|
ImportCmd.16=Type of the key store to use. If omitted, the default value is \
|
425 |
|
|
that of the property "keystore.type" in the security properties file.
|
426 |
|
|
ImportCmd.15=STORE_TYPE
|
427 |
|
|
ImportCmd.14=Location of the key store to use. The default value is a \
|
428 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
429 |
|
|
directory.\n\
|
430 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
431 |
|
|
i.e. as if the protocol was "file:".
|
432 |
|
|
ImportCmd.13=URL
|
433 |
|
|
ImportCmd.12=Password to unlock the key store. If omitted, you will be \
|
434 |
|
|
prompted for one.
|
435 |
|
|
ImportCmd.11=PASSWORD
|
436 |
|
|
ImportCmd.10=Fully qualified class name of a Security Provider to add to the \
|
437 |
|
|
JVM in-use.
|
438 |
|
|
ImportCmd.9=PROVIDER_CLASS_NAME
|
439 |
|
|
ImportCmd.8=Emit more verbose messages.
|
440 |
|
|
ImportCmd.7=Was unable to build a certificate-chain. Only {0,number} out of {1,number} certificates were processed
|
441 |
|
|
|
442 |
|
|
ExportCmd.17=Usage: keytool -export [OPTION]...\n\
|
443 |
|
|
Export a certificate stored in the key store to a designated output \
|
444 |
|
|
destination, either in binary format or in RFC-1421 compliant encoding.
|
445 |
|
|
ExportCmd.18=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
446 |
|
|
ExportCmd.19=Command options
|
447 |
|
|
ExportCmd.20=Alias of an entry to export. The value "mykey" (all lower case, \
|
448 |
|
|
without the enclosing quotes) is used when this option is omitted.
|
449 |
|
|
ExportCmd.21=ALIAS
|
450 |
|
|
ExportCmd.22=Destination of the exported certificate. STDOUT is used if this \
|
451 |
|
|
option is omitted.
|
452 |
|
|
ExportCmd.23=FILE
|
453 |
|
|
ExportCmd.24=Type of the key store to use. If omitted, the default value is \
|
454 |
|
|
that of the property "keystore.type" in the security properties file.
|
455 |
|
|
ExportCmd.25=STORE_TYPE
|
456 |
|
|
ExportCmd.26=Location of the key store to use. The default value is a \
|
457 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
458 |
|
|
directory.\n\
|
459 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
460 |
|
|
i.e. as if the protocol was "file:".
|
461 |
|
|
ExportCmd.27=URL
|
462 |
|
|
ExportCmd.28=Password to unlock the key store. If omitted, you will be \
|
463 |
|
|
prompted for one.
|
464 |
|
|
ExportCmd.29=PASSWORD
|
465 |
|
|
ExportCmd.30=Fully qualified class name of a Security Provider to add to the \
|
466 |
|
|
JVM in-use.
|
467 |
|
|
ExportCmd.31=PROVIDER_CLASS_NAME
|
468 |
|
|
ExportCmd.32=Use RFC-1421 specifications when encoding the output.
|
469 |
|
|
ExportCmd.33=Output the certificate in binary DER encoding, which is the \
|
470 |
|
|
default format. If -rfc is also present, this option is ignored.
|
471 |
|
|
|
472 |
|
|
IdentityDBCmd.7=Usage: keytool -identitydb [OPTION]...\n\
|
473 |
|
|
NOT IMPLEMENTED YET. Import a JDK 1.1 style Identity Database.
|
474 |
|
|
IdentityDBCmd.8=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
475 |
|
|
IdentityDBCmd.9=Command options
|
476 |
|
|
IdentityDBCmd.10=Location of the Identity Database to import. If omitted, \
|
477 |
|
|
STDIN is used.
|
478 |
|
|
IdentityDBCmd.11=FILE
|
479 |
|
|
IdentityDBCmd.12=Type of the key store to use. If omitted, the default value is \
|
480 |
|
|
that of the property "keystore.type" in the security properties file.
|
481 |
|
|
IdentityDBCmd.13=STORE_TYPE
|
482 |
|
|
IdentityDBCmd.14=Location of the key store to use. The default value is a \
|
483 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
484 |
|
|
directory.\n\
|
485 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
486 |
|
|
i.e. as if the protocol was "file:".
|
487 |
|
|
IdentityDBCmd.15=URL
|
488 |
|
|
IdentityDBCmd.16=Password to unlock the key store. If omitted, you will be \
|
489 |
|
|
prompted for one.
|
490 |
|
|
IdentityDBCmd.17=PASSWORD
|
491 |
|
|
IdentityDBCmd.18=Fully qualified class name of a Security Provider to add to the \
|
492 |
|
|
JVM in-use.
|
493 |
|
|
IdentityDBCmd.19=PROVIDER_CLASS_NAME
|
494 |
|
|
IdentityDBCmd.20=Emit more verbose messages.
|
495 |
|
|
|
496 |
|
|
PrintCertCmd.5=Usage: keytool -printcert [OPTION]...\n\
|
497 |
|
|
Read a certificate from FILE and print it to STDOUT in a human-readable form.
|
498 |
|
|
PrintCertCmd.6=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
499 |
|
|
PrintCertCmd.7=Command options
|
500 |
|
|
PrintCertCmd.8=Location of the certificate to print. If omitted, STDIN is used.
|
501 |
|
|
PrintCertCmd.9=FILE
|
502 |
|
|
PrintCertCmd.10=Emit more verbose messages.
|
503 |
|
|
|
504 |
|
|
SelfCertCmd.14=Usage: keytool -selfcert [OPTION]...\n\
|
505 |
|
|
Generate a self-signed X.509 version 1 certificate.\n\n\
|
506 |
|
|
The newly generated certificate will form a chain of one element which will \
|
507 |
|
|
replace the previous chain associated with ALIAS.
|
508 |
|
|
SelfCertCmd.15=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
509 |
|
|
SelfCertCmd.16=Command options
|
510 |
|
|
SelfCertCmd.17=Alias of the Key Entry to select. The value "mykey" (all lower \
|
511 |
|
|
case, without the enclosing quotes) is used when this option is omitted.
|
512 |
|
|
SelfCertCmd.18=ALIAS
|
513 |
|
|
SelfCertCmd.19=Name of the digital signature algorithm to use for signing the \
|
514 |
|
|
certificate. If omitted, a default value is chosen based on the type of the \
|
515 |
|
|
private key associated with ALIAS. If the key is a "DSA" one, the value for \
|
516 |
|
|
signature algorithm will be "SHA1withDSA". If on the other hand the key is \
|
517 |
|
|
an "RSA" one, then "MD5withRSA" will be the signature algorithm.
|
518 |
|
|
SelfCertCmd.20=ALGORITHM
|
519 |
|
|
SelfCertCmd.21=The X.500 Distinguished Name of the Subject of the generated \
|
520 |
|
|
certificate. If omitted the Distinguished Name of the base certificate in \
|
521 |
|
|
the chain associated with ALIAS is used instead.
|
522 |
|
|
SelfCertCmd.22=NAME
|
523 |
|
|
SelfCertCmd.23=Password to unlock the Key Entry associated with ALIAS. If \
|
524 |
|
|
omitted, the tool will attempt to unlock the Key Entry using the same password \
|
525 |
|
|
protecting the key store. If this fails, you will be prompted for a password.
|
526 |
|
|
SelfCertCmd.24=PASSWORD
|
527 |
|
|
SelfCertCmd.25=Number of days the generated certificate is valid for. If \
|
528 |
|
|
omitted, 90 is used.
|
529 |
|
|
SelfCertCmd.26=DAY_COUNT
|
530 |
|
|
SelfCertCmd.27=Type of the key store to use. If omitted, the default value is \
|
531 |
|
|
that of the property "keystore.type" in the security properties file.
|
532 |
|
|
SelfCertCmd.28=STORE_TYPE
|
533 |
|
|
SelfCertCmd.29=Location of the key store to use. The default value is a \
|
534 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
535 |
|
|
directory.\n\
|
536 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
537 |
|
|
i.e. as if the protocol was "file:".
|
538 |
|
|
SelfCertCmd.30=URL
|
539 |
|
|
SelfCertCmd.31=Password to unlock the key store. If omitted, you will be \
|
540 |
|
|
prompted for one.
|
541 |
|
|
SelfCertCmd.32=PASSWORD
|
542 |
|
|
SelfCertCmd.33=Fully qualified class name of a Security Provider to add to the \
|
543 |
|
|
JVM in-use.
|
544 |
|
|
SelfCertCmd.34=PROVIDER_CLASS_NAME
|
545 |
|
|
SelfCertCmd.35=Emit more verbose messages.
|
546 |
|
|
|
547 |
|
|
CACertCmd.0=Alias [{0}] is already present in key store
|
548 |
|
|
CACertCmd.1=Certificate in file "{0}" was added to the key store under the alias "{1}"
|
549 |
|
|
CACertCmd.2=Usage: keytool -cacert [OPTION]...\n\
|
550 |
|
|
Import a trusted CA certificate.
|
551 |
|
|
CACertCmd.3=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
|
552 |
|
|
CACertCmd.4=Command options
|
553 |
|
|
CACertCmd.5=Location of the trusted CA certificate to import.
|
554 |
|
|
CACertCmd.6=FILE
|
555 |
|
|
CACertCmd.7=Type of the key store to use. If omitted, the default value is \
|
556 |
|
|
that of the property "keystore.type" in the security properties file.
|
557 |
|
|
CACertCmd.8=STORE_TYPE
|
558 |
|
|
CACertCmd.9=Location of the key store to use. The default value is a \
|
559 |
|
|
file-based scheme whose path is the file named ".keystore" in your home \
|
560 |
|
|
directory.\n\
|
561 |
|
|
If URL is malformed, the tool will use URL as a file-name of a key store; \
|
562 |
|
|
i.e. as if the protocol was "file:".
|
563 |
|
|
CACertCmd.10=URL
|
564 |
|
|
CACertCmd.11=Password to unlock the key store. If omitted, you will be \
|
565 |
|
|
prompted for one.
|
566 |
|
|
CACertCmd.12=PASSWORD
|
567 |
|
|
CACertCmd.13=Fully qualified class name of a Security Provider to add to the \
|
568 |
|
|
JVM in-use.
|
569 |
|
|
CACertCmd.14=PROVIDER_CLASS_NAME
|
570 |
|
|
CACertCmd.15=Emit more verbose messages.
|