2
|
1 |
/*
|
|
2 |
* Copyright 2000-2005 Sun Microsystems, Inc. All Rights Reserved.
|
|
3 |
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
4 |
*
|
|
5 |
* This code is free software; you can redistribute it and/or modify it
|
|
6 |
* under the terms of the GNU General Public License version 2 only, as
|
|
7 |
* published by the Free Software Foundation. Sun designates this
|
|
8 |
* particular file as subject to the "Classpath" exception as provided
|
|
9 |
* by Sun in the LICENSE file that accompanied this code.
|
|
10 |
*
|
|
11 |
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
12 |
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
13 |
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
14 |
* version 2 for more details (a copy is included in the LICENSE file that
|
|
15 |
* accompanied this code).
|
|
16 |
*
|
|
17 |
* You should have received a copy of the GNU General Public License version
|
|
18 |
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
19 |
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
20 |
*
|
|
21 |
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
|
22 |
* CA 95054 USA or visit www.sun.com if you need additional information or
|
|
23 |
* have any questions.
|
|
24 |
*/
|
|
25 |
|
|
26 |
package sun.security.util;
|
|
27 |
|
|
28 |
/**
|
|
29 |
* <p> This class represents the <code>ResourceBundle</code>
|
|
30 |
* for javax.security.auth and sun.security.
|
|
31 |
*
|
|
32 |
*/
|
|
33 |
public class Resources extends java.util.ListResourceBundle {
|
|
34 |
|
|
35 |
private static final Object[][] contents = {
|
|
36 |
|
|
37 |
// shared (from jarsigner)
|
|
38 |
{" ", " "},
|
|
39 |
{" ", " "},
|
|
40 |
{" ", " "},
|
|
41 |
{", ", ", "},
|
|
42 |
// shared (from keytool)
|
|
43 |
{"\n", "\n"},
|
|
44 |
{"*******************************************",
|
|
45 |
"*******************************************"},
|
|
46 |
{"*******************************************\n\n",
|
|
47 |
"*******************************************\n\n"},
|
|
48 |
|
|
49 |
// keytool
|
|
50 |
{"keytool error: ", "keytool error: "},
|
|
51 |
{"Illegal option: ", "Illegal option: "},
|
|
52 |
{"Try keytool -help","Try keytool -help"},
|
|
53 |
{"Command option <flag> needs an argument.", "Command option {0} needs an argument."},
|
|
54 |
{"Warning: Different store and key passwords not supported for PKCS12 KeyStores. Ignoring user-specified <command> value.",
|
|
55 |
"Warning: Different store and key passwords not supported for PKCS12 KeyStores. Ignoring user-specified {0} value."},
|
|
56 |
{"-keystore must be NONE if -storetype is {0}",
|
|
57 |
"-keystore must be NONE if -storetype is {0}"},
|
|
58 |
{"Too may retries, program terminated",
|
|
59 |
"Too may retries, program terminated"},
|
|
60 |
{"-storepasswd and -keypasswd commands not supported if -storetype is {0}",
|
|
61 |
"-storepasswd and -keypasswd commands not supported if -storetype is {0}"},
|
|
62 |
{"-keypasswd commands not supported if -storetype is PKCS12",
|
|
63 |
"-keypasswd commands not supported if -storetype is PKCS12"},
|
|
64 |
{"-keypass and -new can not be specified if -storetype is {0}",
|
|
65 |
"-keypass and -new can not be specified if -storetype is {0}"},
|
|
66 |
{"if -protected is specified, then -storepass, -keypass, and -new must not be specified",
|
|
67 |
"if -protected is specified, then -storepass, -keypass, and -new must not be specified"},
|
|
68 |
{"if -srcprotected is specified, then -srcstorepass and -srckeypass must not be specified",
|
|
69 |
"if -srcprotected is specified, then -srcstorepass and -srckeypass must not be specified"},
|
|
70 |
{"if keystore is not password protected, then -storepass, -keypass, and -new must not be specified",
|
|
71 |
"if keystore is not password protected, then -storepass, -keypass, and -new must not be specified"},
|
|
72 |
{"if source keystore is not password protected, then -srcstorepass and -srckeypass must not be specified",
|
|
73 |
"if source keystore is not password protected, then -srcstorepass and -srckeypass must not be specified"},
|
|
74 |
{"Illegal startdate value", "Illegal startdate value"},
|
|
75 |
{"Validity must be greater than zero",
|
|
76 |
"Validity must be greater than zero"},
|
|
77 |
{"provName not a provider", "{0} not a provider"},
|
|
78 |
{"Usage error: no command provided", "Usage error: no command provided"},
|
|
79 |
{"Usage error, <arg> is not a legal command", "Usage error, {0} is not a legal command"},
|
|
80 |
{"Source keystore file exists, but is empty: ", "Source keystore file exists, but is empty: "},
|
|
81 |
{"Please specify -srckeystore", "Please specify -srckeystore"},
|
|
82 |
{"Must not specify both -v and -rfc with 'list' command",
|
|
83 |
"Must not specify both -v and -rfc with 'list' command"},
|
|
84 |
{"Key password must be at least 6 characters",
|
|
85 |
"Key password must be at least 6 characters"},
|
|
86 |
{"New password must be at least 6 characters",
|
|
87 |
"New password must be at least 6 characters"},
|
|
88 |
{"Keystore file exists, but is empty: ",
|
|
89 |
"Keystore file exists, but is empty: "},
|
|
90 |
{"Keystore file does not exist: ",
|
|
91 |
"Keystore file does not exist: "},
|
|
92 |
{"Must specify destination alias", "Must specify destination alias"},
|
|
93 |
{"Must specify alias", "Must specify alias"},
|
|
94 |
{"Keystore password must be at least 6 characters",
|
|
95 |
"Keystore password must be at least 6 characters"},
|
|
96 |
{"Enter keystore password: ", "Enter keystore password: "},
|
|
97 |
{"Enter source keystore password: ", "Enter source keystore password: "},
|
|
98 |
{"Enter destination keystore password: ", "Enter destination keystore password: "},
|
|
99 |
{"Keystore password is too short - must be at least 6 characters",
|
|
100 |
"Keystore password is too short - must be at least 6 characters"},
|
|
101 |
{"Unknown Entry Type", "Unknown Entry Type"},
|
|
102 |
{"Too many failures. Alias not changed", "Too many failures. Alias not changed"},
|
|
103 |
{"Entry for alias <alias> successfully imported.",
|
|
104 |
"Entry for alias {0} successfully imported."},
|
|
105 |
{"Entry for alias <alias> not imported.", "Entry for alias {0} not imported."},
|
|
106 |
{"Problem importing entry for alias <alias>: <exception>.\nEntry for alias <alias> not imported.",
|
|
107 |
"Problem importing entry for alias {0}: {1}.\nEntry for alias {0} not imported."},
|
|
108 |
{"Import command completed: <ok> entries successfully imported, <fail> entries failed or cancelled",
|
|
109 |
"Import command completed: {0} entries successfully imported, {1} entries failed or cancelled"},
|
|
110 |
{"Warning: Overwriting existing alias <alias> in destination keystore",
|
|
111 |
"Warning: Overwriting existing alias {0} in destination keystore"},
|
|
112 |
{"Existing entry alias <alias> exists, overwrite? [no]: ",
|
|
113 |
"Existing entry alias {0} exists, overwrite? [no]: "},
|
|
114 |
{"Too many failures - try later", "Too many failures - try later"},
|
|
115 |
{"Certification request stored in file <filename>",
|
|
116 |
"Certification request stored in file <{0}>"},
|
|
117 |
{"Submit this to your CA", "Submit this to your CA"},
|
|
118 |
{"if alias not specified, destalias, srckeypass, and destkeypass must not be specified",
|
|
119 |
"if alias not specified, destalias, srckeypass, and destkeypass must not be specified"},
|
|
120 |
{"Certificate stored in file <filename>",
|
|
121 |
"Certificate stored in file <{0}>"},
|
|
122 |
{"Certificate reply was installed in keystore",
|
|
123 |
"Certificate reply was installed in keystore"},
|
|
124 |
{"Certificate reply was not installed in keystore",
|
|
125 |
"Certificate reply was not installed in keystore"},
|
|
126 |
{"Certificate was added to keystore",
|
|
127 |
"Certificate was added to keystore"},
|
|
128 |
{"Certificate was not added to keystore",
|
|
129 |
"Certificate was not added to keystore"},
|
|
130 |
{"[Storing ksfname]", "[Storing {0}]"},
|
|
131 |
{"alias has no public key (certificate)",
|
|
132 |
"{0} has no public key (certificate)"},
|
|
133 |
{"Cannot derive signature algorithm",
|
|
134 |
"Cannot derive signature algorithm"},
|
|
135 |
{"Alias <alias> does not exist",
|
|
136 |
"Alias <{0}> does not exist"},
|
|
137 |
{"Alias <alias> has no certificate",
|
|
138 |
"Alias <{0}> has no certificate"},
|
|
139 |
{"Key pair not generated, alias <alias> already exists",
|
|
140 |
"Key pair not generated, alias <{0}> already exists"},
|
|
141 |
{"Cannot derive signature algorithm",
|
|
142 |
"Cannot derive signature algorithm"},
|
|
143 |
{"Generating keysize bit keyAlgName key pair and self-signed certificate (sigAlgName) with a validity of validality days\n\tfor: x500Name",
|
|
144 |
"Generating {0} bit {1} key pair and self-signed certificate ({2}) with a validity of {3} days\n\tfor: {4}"},
|
|
145 |
{"Enter key password for <alias>", "Enter key password for <{0}>"},
|
|
146 |
{"\t(RETURN if same as keystore password): ",
|
|
147 |
"\t(RETURN if same as keystore password): "},
|
|
148 |
{"Key password is too short - must be at least 6 characters",
|
|
149 |
"Key password is too short - must be at least 6 characters"},
|
|
150 |
{"Too many failures - key not added to keystore",
|
|
151 |
"Too many failures - key not added to keystore"},
|
|
152 |
{"Destination alias <dest> already exists",
|
|
153 |
"Destination alias <{0}> already exists"},
|
|
154 |
{"Password is too short - must be at least 6 characters",
|
|
155 |
"Password is too short - must be at least 6 characters"},
|
|
156 |
{"Too many failures. Key entry not cloned",
|
|
157 |
"Too many failures. Key entry not cloned"},
|
|
158 |
{"key password for <alias>", "key password for <{0}>"},
|
|
159 |
{"Keystore entry for <id.getName()> already exists",
|
|
160 |
"Keystore entry for <{0}> already exists"},
|
|
161 |
{"Creating keystore entry for <id.getName()> ...",
|
|
162 |
"Creating keystore entry for <{0}> ..."},
|
|
163 |
{"No entries from identity database added",
|
|
164 |
"No entries from identity database added"},
|
|
165 |
{"Alias name: alias", "Alias name: {0}"},
|
|
166 |
{"Creation date: keyStore.getCreationDate(alias)",
|
|
167 |
"Creation date: {0,date}"},
|
|
168 |
{"alias, keyStore.getCreationDate(alias), ",
|
|
169 |
"{0}, {1,date}, "},
|
|
170 |
{"alias, ", "{0}, "},
|
|
171 |
{"Entry type: <type>", "Entry type: {0}"},
|
|
172 |
{"Certificate chain length: ", "Certificate chain length: "},
|
|
173 |
{"Certificate[(i + 1)]:", "Certificate[{0,number,integer}]:"},
|
|
174 |
{"Certificate fingerprint (MD5): ", "Certificate fingerprint (MD5): "},
|
|
175 |
{"Entry type: trustedCertEntry\n", "Entry type: trustedCertEntry\n"},
|
|
176 |
{"trustedCertEntry,", "trustedCertEntry,"},
|
|
177 |
{"Keystore type: ", "Keystore type: "},
|
|
178 |
{"Keystore provider: ", "Keystore provider: "},
|
|
179 |
{"Your keystore contains keyStore.size() entry",
|
|
180 |
"Your keystore contains {0,number,integer} entry"},
|
|
181 |
{"Your keystore contains keyStore.size() entries",
|
|
182 |
"Your keystore contains {0,number,integer} entries"},
|
|
183 |
{"Failed to parse input", "Failed to parse input"},
|
|
184 |
{"Empty input", "Empty input"},
|
|
185 |
{"Not X.509 certificate", "Not X.509 certificate"},
|
|
186 |
{"Cannot derive signature algorithm",
|
|
187 |
"Cannot derive signature algorithm"},
|
|
188 |
{"alias has no public key", "{0} has no public key"},
|
|
189 |
{"alias has no X.509 certificate", "{0} has no X.509 certificate"},
|
|
190 |
{"New certificate (self-signed):", "New certificate (self-signed):"},
|
|
191 |
{"Reply has no certificates", "Reply has no certificates"},
|
|
192 |
{"Certificate not imported, alias <alias> already exists",
|
|
193 |
"Certificate not imported, alias <{0}> already exists"},
|
|
194 |
{"Input not an X.509 certificate", "Input not an X.509 certificate"},
|
|
195 |
{"Certificate already exists in keystore under alias <trustalias>",
|
|
196 |
"Certificate already exists in keystore under alias <{0}>"},
|
|
197 |
{"Do you still want to add it? [no]: ",
|
|
198 |
"Do you still want to add it? [no]: "},
|
|
199 |
{"Certificate already exists in system-wide CA keystore under alias <trustalias>",
|
|
200 |
"Certificate already exists in system-wide CA keystore under alias <{0}>"},
|
|
201 |
{"Do you still want to add it to your own keystore? [no]: ",
|
|
202 |
"Do you still want to add it to your own keystore? [no]: "},
|
|
203 |
{"Trust this certificate? [no]: ", "Trust this certificate? [no]: "},
|
|
204 |
{"YES", "YES"},
|
|
205 |
{"New prompt: ", "New {0}: "},
|
|
206 |
{"Passwords must differ", "Passwords must differ"},
|
|
207 |
{"Re-enter new prompt: ", "Re-enter new {0}: "},
|
|
208 |
{"Re-enter new password: ", "Re-enter new password: "},
|
|
209 |
{"They don't match. Try again", "They don't match. Try again"},
|
|
210 |
{"Enter prompt alias name: ", "Enter {0} alias name: "},
|
|
211 |
{"Enter new alias name\t(RETURN to cancel import for this entry): ",
|
|
212 |
"Enter new alias name\t(RETURN to cancel import for this entry): "},
|
|
213 |
{"Enter alias name: ", "Enter alias name: "},
|
|
214 |
{"\t(RETURN if same as for <otherAlias>)",
|
|
215 |
"\t(RETURN if same as for <{0}>)"},
|
|
216 |
{"*PATTERN* printX509Cert",
|
|
217 |
"Owner: {0}\nIssuer: {1}\nSerial number: {2}\nValid from: {3} until: {4}\nCertificate fingerprints:\n\t MD5: {5}\n\t SHA1: {6}\n\t Signature algorithm name: {7}\n\t Version: {8}"},
|
|
218 |
{"What is your first and last name?",
|
|
219 |
"What is your first and last name?"},
|
|
220 |
{"What is the name of your organizational unit?",
|
|
221 |
"What is the name of your organizational unit?"},
|
|
222 |
{"What is the name of your organization?",
|
|
223 |
"What is the name of your organization?"},
|
|
224 |
{"What is the name of your City or Locality?",
|
|
225 |
"What is the name of your City or Locality?"},
|
|
226 |
{"What is the name of your State or Province?",
|
|
227 |
"What is the name of your State or Province?"},
|
|
228 |
{"What is the two-letter country code for this unit?",
|
|
229 |
"What is the two-letter country code for this unit?"},
|
|
230 |
{"Is <name> correct?", "Is {0} correct?"},
|
|
231 |
{"no", "no"},
|
|
232 |
{"yes", "yes"},
|
|
233 |
{"y", "y"},
|
|
234 |
{" [defaultValue]: ", " [{0}]: "},
|
|
235 |
{"Alias <alias> has no key",
|
|
236 |
"Alias <{0}> has no key"},
|
|
237 |
{"Alias <alias> references an entry type that is not a private key entry. The -keyclone command only supports cloning of private key entries",
|
|
238 |
"Alias <{0}> references an entry type that is not a private key entry. The -keyclone command only supports cloning of private key entries"},
|
|
239 |
|
|
240 |
{"***************** WARNING WARNING WARNING *****************",
|
|
241 |
"***************** WARNING WARNING WARNING *****************"},
|
|
242 |
|
|
243 |
// Translators of the following 5 pairs, ATTENTION:
|
|
244 |
// the next 5 string pairs are meant to be combined into 2 paragraphs,
|
|
245 |
// 1+3+4 and 2+3+5. make sure your translation also does.
|
|
246 |
{"* The integrity of the information stored in your keystore *",
|
|
247 |
"* The integrity of the information stored in your keystore *"},
|
|
248 |
{"* The integrity of the information stored in the srckeystore*",
|
|
249 |
"* The integrity of the information stored in the srckeystore*"},
|
|
250 |
{"* has NOT been verified! In order to verify its integrity, *",
|
|
251 |
"* has NOT been verified! In order to verify its integrity, *"},
|
|
252 |
{"* you must provide your keystore password. *",
|
|
253 |
"* you must provide your keystore password. *"},
|
|
254 |
{"* you must provide the srckeystore password. *",
|
|
255 |
"* you must provide the srckeystore password. *"},
|
|
256 |
|
|
257 |
|
|
258 |
{"Certificate reply does not contain public key for <alias>",
|
|
259 |
"Certificate reply does not contain public key for <{0}>"},
|
|
260 |
{"Incomplete certificate chain in reply",
|
|
261 |
"Incomplete certificate chain in reply"},
|
|
262 |
{"Certificate chain in reply does not verify: ",
|
|
263 |
"Certificate chain in reply does not verify: "},
|
|
264 |
{"Top-level certificate in reply:\n",
|
|
265 |
"Top-level certificate in reply:\n"},
|
|
266 |
{"... is not trusted. ", "... is not trusted. "},
|
|
267 |
{"Install reply anyway? [no]: ", "Install reply anyway? [no]: "},
|
|
268 |
{"NO", "NO"},
|
|
269 |
{"Public keys in reply and keystore don't match",
|
|
270 |
"Public keys in reply and keystore don't match"},
|
|
271 |
{"Certificate reply and certificate in keystore are identical",
|
|
272 |
"Certificate reply and certificate in keystore are identical"},
|
|
273 |
{"Failed to establish chain from reply",
|
|
274 |
"Failed to establish chain from reply"},
|
|
275 |
{"n", "n"},
|
|
276 |
{"Wrong answer, try again", "Wrong answer, try again"},
|
|
277 |
{"Secret key not generated, alias <alias> already exists",
|
|
278 |
"Secret Key not generated, alias <{0}> already exists"},
|
|
279 |
{"Please provide -keysize for secret key generation",
|
|
280 |
"Please provide -keysize for secret key generation"},
|
|
281 |
{"keytool usage:\n", "keytool usage:\n"},
|
|
282 |
|
|
283 |
{"Extensions: ", "Extensions: "},
|
|
284 |
|
|
285 |
{"-certreq [-v] [-protected]",
|
|
286 |
"-certreq [-v] [-protected]"},
|
|
287 |
{"\t [-alias <alias>] [-sigalg <sigalg>]",
|
|
288 |
"\t [-alias <alias>] [-sigalg <sigalg>]"},
|
|
289 |
{"\t [-file <csr_file>] [-keypass <keypass>]",
|
|
290 |
"\t [-file <csr_file>] [-keypass <keypass>]"},
|
|
291 |
{"\t [-keystore <keystore>] [-storepass <storepass>]",
|
|
292 |
"\t [-keystore <keystore>] [-storepass <storepass>]"},
|
|
293 |
{"\t [-storetype <storetype>] [-providername <name>]",
|
|
294 |
"\t [-storetype <storetype>] [-providername <name>]"},
|
|
295 |
{"\t [-providerclass <provider_class_name> [-providerarg <arg>]] ...",
|
|
296 |
"\t [-providerclass <provider_class_name> [-providerarg <arg>]] ..."},
|
|
297 |
{"\t [-providerpath <pathlist>]",
|
|
298 |
"\t [-providerpath <pathlist>]"},
|
|
299 |
{"-delete [-v] [-protected] -alias <alias>",
|
|
300 |
"-delete [-v] [-protected] -alias <alias>"},
|
|
301 |
/** rest is same as -certreq starting from -keystore **/
|
|
302 |
|
|
303 |
//{"-export [-v] [-rfc] [-protected]",
|
|
304 |
// "-export [-v] [-rfc] [-protected]"},
|
|
305 |
{"-exportcert [-v] [-rfc] [-protected]",
|
|
306 |
"-exportcert [-v] [-rfc] [-protected]"},
|
|
307 |
{"\t [-alias <alias>] [-file <cert_file>]",
|
|
308 |
"\t [-alias <alias>] [-file <cert_file>]"},
|
|
309 |
/** rest is same as -certreq starting from -keystore **/
|
|
310 |
|
|
311 |
//{"-genkey [-v] [-protected]",
|
|
312 |
// "-genkey [-v] [-protected]"},
|
|
313 |
{"-genkeypair [-v] [-protected]",
|
|
314 |
"-genkeypair [-v] [-protected]"},
|
|
315 |
{"\t [-alias <alias>]", "\t [-alias <alias>]"},
|
|
316 |
{"\t [-keyalg <keyalg>] [-keysize <keysize>]",
|
|
317 |
"\t [-keyalg <keyalg>] [-keysize <keysize>]"},
|
|
318 |
{"\t [-sigalg <sigalg>] [-dname <dname>]",
|
|
319 |
"\t [-sigalg <sigalg>] [-dname <dname>]"},
|
|
320 |
{"\t [-startdate <startdate>]",
|
|
321 |
"\t [-startdate <startdate>]"},
|
|
322 |
{"\t [-validity <valDays>] [-keypass <keypass>]",
|
|
323 |
"\t [-validity <valDays>] [-keypass <keypass>]"},
|
|
324 |
/** rest is same as -certreq starting from -keystore **/
|
|
325 |
|
|
326 |
{"-genseckey [-v] [-protected]",
|
|
327 |
"-genseckey [-v] [-protected]"},
|
|
328 |
/** rest is same as -certreq starting from -keystore **/
|
|
329 |
|
|
330 |
{"-help", "-help"},
|
|
331 |
//{"-identitydb [-v] [-protected]",
|
|
332 |
// "-identitydb [-v] [-protected]"},
|
|
333 |
//{"\t [-file <idb_file>]", "\t [-file <idb_file>]"},
|
|
334 |
/** rest is same as -certreq starting from -keystore **/
|
|
335 |
|
|
336 |
//{"-import [-v] [-noprompt] [-trustcacerts] [-protected]",
|
|
337 |
// "-import [-v] [-noprompt] [-trustcacerts] [-protected]"},
|
|
338 |
{"-importcert [-v] [-noprompt] [-trustcacerts] [-protected]",
|
|
339 |
"-importcert [-v] [-noprompt] [-trustcacerts] [-protected]"},
|
|
340 |
{"\t [-alias <alias>]", "\t [-alias <alias>]"},
|
|
341 |
{"\t [-alias <alias>] [-keypass <keypass>]",
|
|
342 |
"\t [-alias <alias>] [-keypass <keypass>]"},
|
|
343 |
{"\t [-file <cert_file>] [-keypass <keypass>]",
|
|
344 |
"\t [-file <cert_file>] [-keypass <keypass>]"},
|
|
345 |
/** rest is same as -certreq starting from -keystore **/
|
|
346 |
|
|
347 |
{"-importkeystore [-v] ",
|
|
348 |
"-importkeystore [-v] "},
|
|
349 |
{"\t [-srckeystore <srckeystore>] [-destkeystore <destkeystore>]",
|
|
350 |
"\t [-srckeystore <srckeystore>] [-destkeystore <destkeystore>]"},
|
|
351 |
{"\t [-srcstoretype <srcstoretype>] [-deststoretype <deststoretype>]",
|
|
352 |
"\t [-srcstoretype <srcstoretype>] [-deststoretype <deststoretype>]"},
|
|
353 |
{"\t [-srcprotected] [-destprotected]",
|
|
354 |
"\t [-srcprotected] [-destprotected]"},
|
|
355 |
{"\t [-srcstorepass <srcstorepass>] [-deststorepass <deststorepass>]",
|
|
356 |
"\t [-srcstorepass <srcstorepass>] [-deststorepass <deststorepass>]"},
|
|
357 |
{"\t [-srcprovidername <srcprovidername>]\n\t [-destprovidername <destprovidername>]", // line too long, split to 2
|
|
358 |
"\t [-srcprovidername <srcprovidername>]\n\t [-destprovidername <destprovidername>]"},
|
|
359 |
{"\t [-srcalias <srcalias> [-destalias <destalias>]",
|
|
360 |
"\t [-srcalias <srcalias> [-destalias <destalias>]"},
|
|
361 |
{"\t [-srckeypass <srckeypass>] [-destkeypass <destkeypass>]]",
|
|
362 |
"\t [-srckeypass <srckeypass>] [-destkeypass <destkeypass>]]"},
|
|
363 |
{"\t [-noprompt]", "\t [-noprompt]"},
|
|
364 |
/** rest is same as -certreq starting from -keystore **/
|
|
365 |
|
|
366 |
{"-changealias [-v] [-protected] -alias <alias> -destalias <destalias>",
|
|
367 |
"-changealias [-v] [-protected] -alias <alias> -destalias <destalias>"},
|
|
368 |
{"\t [-keypass <keypass>]", "\t [-keypass <keypass>]"},
|
|
369 |
|
|
370 |
//{"-keyclone [-v] [-protected]",
|
|
371 |
// "-keyclone [-v] [-protected]"},
|
|
372 |
//{"\t [-alias <alias>] -dest <dest_alias>",
|
|
373 |
// "\t [-alias <alias>] -dest <dest_alias>"},
|
|
374 |
//{"\t [-keypass <keypass>] [-new <new_keypass>]",
|
|
375 |
// "\t [-keypass <keypass>] [-new <new_keypass>]"},
|
|
376 |
/** rest is same as -certreq starting from -keystore **/
|
|
377 |
|
|
378 |
{"-keypasswd [-v] [-alias <alias>]",
|
|
379 |
"-keypasswd [-v] [-alias <alias>]"},
|
|
380 |
{"\t [-keypass <old_keypass>] [-new <new_keypass>]",
|
|
381 |
"\t [-keypass <old_keypass>] [-new <new_keypass>]"},
|
|
382 |
/** rest is same as -certreq starting from -keystore **/
|
|
383 |
|
|
384 |
{"-list [-v | -rfc] [-protected]",
|
|
385 |
"-list [-v | -rfc] [-protected]"},
|
|
386 |
{"\t [-alias <alias>]", "\t [-alias <alias>]"},
|
|
387 |
/** rest is same as -certreq starting from -keystore **/
|
|
388 |
|
|
389 |
{"-printcert [-v] [-file <cert_file>]",
|
|
390 |
"-printcert [-v] [-file <cert_file>]"},
|
|
391 |
|
|
392 |
//{"-selfcert [-v] [-protected]",
|
|
393 |
// "-selfcert [-v] [-protected]"},
|
|
394 |
{"\t [-alias <alias>]", "\t [-alias <alias>]"},
|
|
395 |
//{"\t [-dname <dname>] [-validity <valDays>]",
|
|
396 |
// "\t [-dname <dname>] [-validity <valDays>]"},
|
|
397 |
//{"\t [-keypass <keypass>] [-sigalg <sigalg>]",
|
|
398 |
// "\t [-keypass <keypass>] [-sigalg <sigalg>]"},
|
|
399 |
/** rest is same as -certreq starting from -keystore **/
|
|
400 |
|
|
401 |
{"-storepasswd [-v] [-new <new_storepass>]",
|
|
402 |
"-storepasswd [-v] [-new <new_storepass>]"},
|
|
403 |
/** rest is same as -certreq starting from -keystore **/
|
|
404 |
|
|
405 |
// policytool
|
|
406 |
{"Warning: A public key for alias 'signers[i]' does not exist. Make sure a KeyStore is properly configured.",
|
|
407 |
"Warning: A public key for alias {0} does not exist. Make sure a KeyStore is properly configured."},
|
|
408 |
{"Warning: Class not found: class", "Warning: Class not found: {0}"},
|
|
409 |
{"Warning: Invalid argument(s) for constructor: arg",
|
|
410 |
"Warning: Invalid argument(s) for constructor: {0}"},
|
|
411 |
{"Illegal Principal Type: type", "Illegal Principal Type: {0}"},
|
|
412 |
{"Illegal option: option", "Illegal option: {0}"},
|
|
413 |
{"Usage: policytool [options]", "Usage: policytool [options]"},
|
|
414 |
{" [-file <file>] policy file location",
|
|
415 |
" [-file <file>] policy file location"},
|
|
416 |
{"New", "New"},
|
|
417 |
{"Open", "Open"},
|
|
418 |
{"Save", "Save"},
|
|
419 |
{"Save As", "Save As"},
|
|
420 |
{"View Warning Log", "View Warning Log"},
|
|
421 |
{"Exit", "Exit"},
|
|
422 |
{"Add Policy Entry", "Add Policy Entry"},
|
|
423 |
{"Edit Policy Entry", "Edit Policy Entry"},
|
|
424 |
{"Remove Policy Entry", "Remove Policy Entry"},
|
|
425 |
{"Edit", "Edit"},
|
|
426 |
{"Retain", "Retain"},
|
|
427 |
|
|
428 |
{"Warning: File name may include escaped backslash characters. " +
|
|
429 |
"It is not necessary to escape backslash characters " +
|
|
430 |
"(the tool escapes characters as necessary when writing " +
|
|
431 |
"the policy contents to the persistent store).\n\n" +
|
|
432 |
"Click on Retain to retain the entered name, or click on " +
|
|
433 |
"Edit to edit the name.",
|
|
434 |
"Warning: File name may include escaped backslash characters. " +
|
|
435 |
"It is not necessary to escape backslash characters " +
|
|
436 |
"(the tool escapes characters as necessary when writing " +
|
|
437 |
"the policy contents to the persistent store).\n\n" +
|
|
438 |
"Click on Retain to retain the entered name, or click on " +
|
|
439 |
"Edit to edit the name."},
|
|
440 |
|
|
441 |
{"Add Public Key Alias", "Add Public Key Alias"},
|
|
442 |
{"Remove Public Key Alias", "Remove Public Key Alias"},
|
|
443 |
{"File", "File"},
|
|
444 |
{"KeyStore", "KeyStore"},
|
|
445 |
{"Policy File:", "Policy File:"},
|
|
446 |
{"Could not open policy file: policyFile: e.toString()",
|
|
447 |
"Could not open policy file: {0}: {1}"},
|
|
448 |
{"Policy Tool", "Policy Tool"},
|
|
449 |
{"Errors have occurred while opening the policy configuration. View the Warning Log for more information.",
|
|
450 |
"Errors have occurred while opening the policy configuration. View the Warning Log for more information."},
|
|
451 |
{"Error", "Error"},
|
|
452 |
{"OK", "OK"},
|
|
453 |
{"Status", "Status"},
|
|
454 |
{"Warning", "Warning"},
|
|
455 |
{"Permission: ",
|
|
456 |
"Permission: "},
|
|
457 |
{"Principal Type:", "Principal Type:"},
|
|
458 |
{"Principal Name:", "Principal Name:"},
|
|
459 |
{"Target Name: ",
|
|
460 |
"Target Name: "},
|
|
461 |
{"Actions: ",
|
|
462 |
"Actions: "},
|
|
463 |
{"OK to overwrite existing file filename?",
|
|
464 |
"OK to overwrite existing file {0}?"},
|
|
465 |
{"Cancel", "Cancel"},
|
|
466 |
{"CodeBase:", "CodeBase:"},
|
|
467 |
{"SignedBy:", "SignedBy:"},
|
|
468 |
{"Add Principal", "Add Principal"},
|
|
469 |
{"Edit Principal", "Edit Principal"},
|
|
470 |
{"Remove Principal", "Remove Principal"},
|
|
471 |
{"Principals:", "Principals:"},
|
|
472 |
{" Add Permission", " Add Permission"},
|
|
473 |
{" Edit Permission", " Edit Permission"},
|
|
474 |
{"Remove Permission", "Remove Permission"},
|
|
475 |
{"Done", "Done"},
|
|
476 |
{"KeyStore URL:", "KeyStore URL:"},
|
|
477 |
{"KeyStore Type:", "KeyStore Type:"},
|
|
478 |
{"KeyStore Provider:", "KeyStore Provider:"},
|
|
479 |
{"KeyStore Password URL:", "KeyStore Password URL:"},
|
|
480 |
{"Principals", "Principals"},
|
|
481 |
{" Edit Principal:", " Edit Principal:"},
|
|
482 |
{" Add New Principal:", " Add New Principal:"},
|
|
483 |
{"Permissions", "Permissions"},
|
|
484 |
{" Edit Permission:", " Edit Permission:"},
|
|
485 |
{" Add New Permission:", " Add New Permission:"},
|
|
486 |
{"Signed By:", "Signed By:"},
|
|
487 |
{"Cannot Specify Principal with a Wildcard Class without a Wildcard Name",
|
|
488 |
"Cannot Specify Principal with a Wildcard Class without a Wildcard Name"},
|
|
489 |
{"Cannot Specify Principal without a Name",
|
|
490 |
"Cannot Specify Principal without a Name"},
|
|
491 |
{"Permission and Target Name must have a value",
|
|
492 |
"Permission and Target Name must have a value"},
|
|
493 |
{"Remove this Policy Entry?", "Remove this Policy Entry?"},
|
|
494 |
{"Overwrite File", "Overwrite File"},
|
|
495 |
{"Policy successfully written to filename",
|
|
496 |
"Policy successfully written to {0}"},
|
|
497 |
{"null filename", "null filename"},
|
|
498 |
{"Save changes?", "Save changes?"},
|
|
499 |
{"Yes", "Yes"},
|
|
500 |
{"No", "No"},
|
|
501 |
{"Policy Entry", "Policy Entry"},
|
|
502 |
{"Save Changes", "Save Changes"},
|
|
503 |
{"No Policy Entry selected", "No Policy Entry selected"},
|
|
504 |
{"Unable to open KeyStore: ex.toString()",
|
|
505 |
"Unable to open KeyStore: {0}"},
|
|
506 |
{"No principal selected", "No principal selected"},
|
|
507 |
{"No permission selected", "No permission selected"},
|
|
508 |
{"name", "name"},
|
|
509 |
{"configuration type", "configuration type"},
|
|
510 |
{"environment variable name", "environment variable name"},
|
|
511 |
{"library name", "library name"},
|
|
512 |
{"package name", "package name"},
|
|
513 |
{"policy type", "policy type"},
|
|
514 |
{"property name", "property name"},
|
|
515 |
{"provider name", "provider name"},
|
|
516 |
{"Principal List", "Principal List"},
|
|
517 |
{"Permission List", "Permission List"},
|
|
518 |
{"Code Base", "Code Base"},
|
|
519 |
{"KeyStore U R L:", "KeyStore U R L:"},
|
|
520 |
{"KeyStore Password U R L:", "KeyStore Password U R L:"},
|
|
521 |
|
|
522 |
|
|
523 |
// javax.security.auth.PrivateCredentialPermission
|
|
524 |
{"invalid null input(s)", "invalid null input(s)"},
|
|
525 |
{"actions can only be 'read'", "actions can only be 'read'"},
|
|
526 |
{"permission name [name] syntax invalid: ",
|
|
527 |
"permission name [{0}] syntax invalid: "},
|
|
528 |
{"Credential Class not followed by a Principal Class and Name",
|
|
529 |
"Credential Class not followed by a Principal Class and Name"},
|
|
530 |
{"Principal Class not followed by a Principal Name",
|
|
531 |
"Principal Class not followed by a Principal Name"},
|
|
532 |
{"Principal Name must be surrounded by quotes",
|
|
533 |
"Principal Name must be surrounded by quotes"},
|
|
534 |
{"Principal Name missing end quote",
|
|
535 |
"Principal Name missing end quote"},
|
|
536 |
{"PrivateCredentialPermission Principal Class can not be a wildcard (*) value if Principal Name is not a wildcard (*) value",
|
|
537 |
"PrivateCredentialPermission Principal Class can not be a wildcard (*) value if Principal Name is not a wildcard (*) value"},
|
|
538 |
{"CredOwner:\n\tPrincipal Class = class\n\tPrincipal Name = name",
|
|
539 |
"CredOwner:\n\tPrincipal Class = {0}\n\tPrincipal Name = {1}"},
|
|
540 |
|
|
541 |
// javax.security.auth.x500
|
|
542 |
{"provided null name", "provided null name"},
|
|
543 |
{"provided null keyword map", "provided null keyword map"},
|
|
544 |
{"provided null OID map", "provided null OID map"},
|
|
545 |
|
|
546 |
// javax.security.auth.Subject
|
|
547 |
{"invalid null AccessControlContext provided",
|
|
548 |
"invalid null AccessControlContext provided"},
|
|
549 |
{"invalid null action provided", "invalid null action provided"},
|
|
550 |
{"invalid null Class provided", "invalid null Class provided"},
|
|
551 |
{"Subject:\n", "Subject:\n"},
|
|
552 |
{"\tPrincipal: ", "\tPrincipal: "},
|
|
553 |
{"\tPublic Credential: ", "\tPublic Credential: "},
|
|
554 |
{"\tPrivate Credentials inaccessible\n",
|
|
555 |
"\tPrivate Credentials inaccessible\n"},
|
|
556 |
{"\tPrivate Credential: ", "\tPrivate Credential: "},
|
|
557 |
{"\tPrivate Credential inaccessible\n",
|
|
558 |
"\tPrivate Credential inaccessible\n"},
|
|
559 |
{"Subject is read-only", "Subject is read-only"},
|
|
560 |
{"attempting to add an object which is not an instance of java.security.Principal to a Subject's Principal Set",
|
|
561 |
"attempting to add an object which is not an instance of java.security.Principal to a Subject's Principal Set"},
|
|
562 |
{"attempting to add an object which is not an instance of class",
|
|
563 |
"attempting to add an object which is not an instance of {0}"},
|
|
564 |
|
|
565 |
// javax.security.auth.login.AppConfigurationEntry
|
|
566 |
{"LoginModuleControlFlag: ", "LoginModuleControlFlag: "},
|
|
567 |
|
|
568 |
// javax.security.auth.login.LoginContext
|
|
569 |
{"Invalid null input: name", "Invalid null input: name"},
|
|
570 |
{"No LoginModules configured for name",
|
|
571 |
"No LoginModules configured for {0}"},
|
|
572 |
{"invalid null Subject provided", "invalid null Subject provided"},
|
|
573 |
{"invalid null CallbackHandler provided",
|
|
574 |
"invalid null CallbackHandler provided"},
|
|
575 |
{"null subject - logout called before login",
|
|
576 |
"null subject - logout called before login"},
|
|
577 |
{"unable to instantiate LoginModule, module, because it does not provide a no-argument constructor",
|
|
578 |
"unable to instantiate LoginModule, {0}, because it does not provide a no-argument constructor"},
|
|
579 |
{"unable to instantiate LoginModule",
|
|
580 |
"unable to instantiate LoginModule"},
|
|
581 |
{"unable to instantiate LoginModule: ",
|
|
582 |
"unable to instantiate LoginModule: "},
|
|
583 |
{"unable to find LoginModule class: ",
|
|
584 |
"unable to find LoginModule class: "},
|
|
585 |
{"unable to access LoginModule: ",
|
|
586 |
"unable to access LoginModule: "},
|
|
587 |
{"Login Failure: all modules ignored",
|
|
588 |
"Login Failure: all modules ignored"},
|
|
589 |
|
|
590 |
// sun.security.provider.PolicyFile
|
|
591 |
|
|
592 |
{"java.security.policy: error parsing policy:\n\tmessage",
|
|
593 |
"java.security.policy: error parsing {0}:\n\t{1}"},
|
|
594 |
{"java.security.policy: error adding Permission, perm:\n\tmessage",
|
|
595 |
"java.security.policy: error adding Permission, {0}:\n\t{1}"},
|
|
596 |
{"java.security.policy: error adding Entry:\n\tmessage",
|
|
597 |
"java.security.policy: error adding Entry:\n\t{0}"},
|
|
598 |
{"alias name not provided (pe.name)", "alias name not provided ({0})"},
|
|
599 |
{"unable to perform substitution on alias, suffix",
|
|
600 |
"unable to perform substitution on alias, {0}"},
|
|
601 |
{"substitution value, prefix, unsupported",
|
|
602 |
"substitution value, {0}, unsupported"},
|
|
603 |
{"(", "("},
|
|
604 |
{")", ")"},
|
|
605 |
{"type can't be null","type can't be null"},
|
|
606 |
|
|
607 |
// sun.security.provider.PolicyParser
|
|
608 |
{"keystorePasswordURL can not be specified without also specifying keystore",
|
|
609 |
"keystorePasswordURL can not be specified without also specifying keystore"},
|
|
610 |
{"expected keystore type", "expected keystore type"},
|
|
611 |
{"expected keystore provider", "expected keystore provider"},
|
|
612 |
{"multiple Codebase expressions",
|
|
613 |
"multiple Codebase expressions"},
|
|
614 |
{"multiple SignedBy expressions","multiple SignedBy expressions"},
|
|
615 |
{"SignedBy has empty alias","SignedBy has empty alias"},
|
|
616 |
{"can not specify Principal with a wildcard class without a wildcard name",
|
|
617 |
"can not specify Principal with a wildcard class without a wildcard name"},
|
|
618 |
{"expected codeBase or SignedBy or Principal",
|
|
619 |
"expected codeBase or SignedBy or Principal"},
|
|
620 |
{"expected permission entry", "expected permission entry"},
|
|
621 |
{"number ", "number "},
|
|
622 |
{"expected [expect], read [end of file]",
|
|
623 |
"expected [{0}], read [end of file]"},
|
|
624 |
{"expected [;], read [end of file]",
|
|
625 |
"expected [;], read [end of file]"},
|
|
626 |
{"line number: msg", "line {0}: {1}"},
|
|
627 |
{"line number: expected [expect], found [actual]",
|
|
628 |
"line {0}: expected [{1}], found [{2}]"},
|
|
629 |
{"null principalClass or principalName",
|
|
630 |
"null principalClass or principalName"},
|
|
631 |
|
|
632 |
// sun.security.pkcs11.SunPKCS11
|
|
633 |
{"PKCS11 Token [providerName] Password: ",
|
|
634 |
"PKCS11 Token [{0}] Password: "},
|
|
635 |
|
|
636 |
/* --- DEPRECATED --- */
|
|
637 |
// javax.security.auth.Policy
|
|
638 |
{"unable to instantiate Subject-based policy",
|
|
639 |
"unable to instantiate Subject-based policy"}
|
|
640 |
};
|
|
641 |
|
|
642 |
|
|
643 |
/**
|
|
644 |
* Returns the contents of this <code>ResourceBundle</code>.
|
|
645 |
*
|
|
646 |
* <p>
|
|
647 |
*
|
|
648 |
* @return the contents of this <code>ResourceBundle</code>.
|
|
649 |
*/
|
|
650 |
public Object[][] getContents() {
|
|
651 |
return contents;
|
|
652 |
}
|
|
653 |
}
|