diff -r 2b2609379881 -r be5600f6a4da jdk/src/java.base/share/classes/sun/security/tools/keytool/Main.java --- a/jdk/src/java.base/share/classes/sun/security/tools/keytool/Main.java Wed Dec 02 03:37:29 2015 +0000 +++ b/jdk/src/java.base/share/classes/sun/security/tools/keytool/Main.java Wed Dec 02 16:44:54 2015 +0800 @@ -1857,8 +1857,8 @@ } else { // Print the digest of the user cert only out.println - (rb.getString("Certificate.fingerprint.SHA1.") + - getCertFingerPrint("SHA1", chain[0])); + (rb.getString("Certificate.fingerprint.SHA.256.") + + getCertFingerPrint("SHA-256", chain[0])); } } } else if (keyStore.entryInstanceOf(alias, @@ -1878,8 +1878,8 @@ out.println(cert.toString()); } else { out.println("trustedCertEntry, "); - out.println(rb.getString("Certificate.fingerprint.SHA1.") - + getCertFingerPrint("SHA1", cert)); + out.println(rb.getString("Certificate.fingerprint.SHA.256.") + + getCertFingerPrint("SHA-256", cert)); } } else { out.println(rb.getString("Unknown.Entry.Type")); @@ -2907,23 +2907,6 @@ private void printX509Cert(X509Certificate cert, PrintStream out) throws Exception { - /* - out.println("Owner: " - + cert.getSubjectDN().toString() - + "\n" - + "Issuer: " - + cert.getIssuerDN().toString() - + "\n" - + "Serial number: " + cert.getSerialNumber().toString(16) - + "\n" - + "Valid from: " + cert.getNotBefore().toString() - + " until: " + cert.getNotAfter().toString() - + "\n" - + "Certificate fingerprints:\n" - + "\t MD5: " + getCertFingerPrint("MD5", cert) - + "\n" - + "\t SHA1: " + getCertFingerPrint("SHA1", cert)); - */ MessageFormat form = new MessageFormat (rb.getString(".PATTERN.printX509Cert")); @@ -2933,8 +2916,7 @@ cert.getSerialNumber().toString(16), cert.getNotBefore().toString(), cert.getNotAfter().toString(), - getCertFingerPrint("MD5", cert), - getCertFingerPrint("SHA1", cert), + getCertFingerPrint("SHA-1", cert), getCertFingerPrint("SHA-256", cert), cert.getSigAlgName(), pkey.getAlgorithm(),