6987827: security/util/Resources.java needs improvement
authorweijun
Thu, 11 Nov 2010 15:51:12 +0800
changeset 7179 4afb81e50183
parent 7178 03d19396adb9
child 7181 0f32e3c203b8
6987827: security/util/Resources.java needs improvement Reviewed-by: valeriep
jdk/src/share/classes/com/sun/security/auth/NTDomainPrincipal.java
jdk/src/share/classes/com/sun/security/auth/NTNumericCredential.java
jdk/src/share/classes/com/sun/security/auth/NTSid.java
jdk/src/share/classes/com/sun/security/auth/NTSidDomainPrincipal.java
jdk/src/share/classes/com/sun/security/auth/NTSidGroupPrincipal.java
jdk/src/share/classes/com/sun/security/auth/NTSidPrimaryGroupPrincipal.java
jdk/src/share/classes/com/sun/security/auth/NTSidUserPrincipal.java
jdk/src/share/classes/com/sun/security/auth/NTUserPrincipal.java
jdk/src/share/classes/com/sun/security/auth/PolicyFile.java
jdk/src/share/classes/com/sun/security/auth/PolicyParser.java
jdk/src/share/classes/com/sun/security/auth/SolarisNumericGroupPrincipal.java
jdk/src/share/classes/com/sun/security/auth/SolarisNumericUserPrincipal.java
jdk/src/share/classes/com/sun/security/auth/SolarisPrincipal.java
jdk/src/share/classes/com/sun/security/auth/SubjectCodeSource.java
jdk/src/share/classes/com/sun/security/auth/UnixNumericGroupPrincipal.java
jdk/src/share/classes/com/sun/security/auth/UnixNumericUserPrincipal.java
jdk/src/share/classes/com/sun/security/auth/UnixPrincipal.java
jdk/src/share/classes/com/sun/security/auth/X500Principal.java
jdk/src/share/classes/com/sun/security/auth/login/ConfigFile.java
jdk/src/share/classes/com/sun/security/auth/module/JndiLoginModule.java
jdk/src/share/classes/com/sun/security/auth/module/KeyStoreLoginModule.java
jdk/src/share/classes/com/sun/security/auth/module/Krb5LoginModule.java
jdk/src/share/classes/com/sun/security/auth/module/LdapLoginModule.java
jdk/src/share/classes/javax/security/auth/Policy.java
jdk/src/share/classes/javax/security/auth/PrivateCredentialPermission.java
jdk/src/share/classes/javax/security/auth/Subject.java
jdk/src/share/classes/javax/security/auth/login/AppConfigurationEntry.java
jdk/src/share/classes/javax/security/auth/login/LoginContext.java
jdk/src/share/classes/javax/security/auth/x500/X500Principal.java
jdk/src/share/classes/sun/security/pkcs11/SunPKCS11.java
jdk/src/share/classes/sun/security/provider/PolicyFile.java
jdk/src/share/classes/sun/security/provider/PolicyParser.java
jdk/src/share/classes/sun/security/tools/JarSigner.java
jdk/src/share/classes/sun/security/tools/JarSignerResources.java
jdk/src/share/classes/sun/security/tools/KeyTool.java
jdk/src/share/classes/sun/security/tools/policytool/PolicyTool.java
jdk/src/share/classes/sun/security/util/AuthResources.java
jdk/src/share/classes/sun/security/util/Resources.java
jdk/test/sun/security/util/Resources/NewNamesFormat.java
jdk/test/sun/security/util/Resources/NewResourcesNames.java
--- a/jdk/src/share/classes/com/sun/security/auth/NTDomainPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTDomainPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2001, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -68,7 +68,7 @@
         if (name == null) {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("invalid null input: value",
+                        ("invalid.null.input.value",
                         "sun.security.util.AuthResources"));
             Object[] source = {"name"};
             throw new NullPointerException(form.format(source));
@@ -99,7 +99,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTDomainPrincipal: name",
+                        ("NTDomainPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {name};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/NTNumericCredential.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTNumericCredential.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2002, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -70,7 +70,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTNumericCredential: name",
+                        ("NTNumericCredential.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {Long.toString(impersonationToken)};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/NTSid.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTSid.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -73,7 +73,7 @@
         if (stringSid == null) {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("invalid null input: value",
+                        ("invalid.null.input.value",
                         "sun.security.util.AuthResources"));
             Object[] source = {"stringSid"};
             throw new NullPointerException(form.format(source));
@@ -81,7 +81,7 @@
         if (stringSid.length() == 0) {
             throw new IllegalArgumentException
                 (sun.security.util.ResourcesMgr.getString
-                        ("Invalid NTSid value",
+                        ("Invalid.NTSid.value",
                         "sun.security.util.AuthResources"));
         }
         sid = new String(stringSid);
@@ -108,7 +108,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTSid: name",
+                        ("NTSid.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {sid};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/NTSidDomainPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTSidDomainPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -73,7 +73,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTSidDomainPrincipal: name",
+                        ("NTSidDomainPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {getName()};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/NTSidGroupPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTSidGroupPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -68,7 +68,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTSidGroupPrincipal: name",
+                        ("NTSidGroupPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {getName()};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/NTSidPrimaryGroupPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTSidPrimaryGroupPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -70,7 +70,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTSidPrimaryGroupPrincipal: name",
+                        ("NTSidPrimaryGroupPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {getName()};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/NTSidUserPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTSidUserPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -67,7 +67,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTSidUserPrincipal: name",
+                        ("NTSidUserPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {getName()};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/NTUserPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/NTUserPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2001, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -64,7 +64,7 @@
         if (name == null) {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("invalid null input: value",
+                        ("invalid.null.input.value",
                         "sun.security.util.AuthResources"));
             Object[] source = {"name"};
             throw new NullPointerException(form.format(source));
@@ -93,7 +93,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("NTUserPrincipal: name",
+                        ("NTUserPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {name};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/PolicyFile.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/PolicyFile.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -490,9 +490,9 @@
             }
         } catch (PolicyParser.ParsingException pe) {
             System.err.println(AUTH_POLICY +
-                                rb.getString(": error parsing ") + policy);
+                                rb.getString(".error.parsing.") + policy);
             System.err.println(AUTH_POLICY +
-                                rb.getString(": ") +
+                                rb.getString("COLON") +
                                 pe.getMessage());
             if (debug != null)
                 pe.printStackTrace();
@@ -635,16 +635,16 @@
                 } catch (java.lang.reflect.InvocationTargetException ite) {
                     System.err.println
                         (AUTH_POLICY +
-                        rb.getString(": error adding Permission ") +
+                        rb.getString(".error.adding.Permission.") +
                         pe.permission +
-                        rb.getString(" ") +
+                        rb.getString("SPACE") +
                         ite.getTargetException());
                 } catch (Exception e) {
                     System.err.println
                         (AUTH_POLICY +
-                        rb.getString(": error adding Permission ") +
+                        rb.getString(".error.adding.Permission.") +
                         pe.permission +
-                        rb.getString(" ") +
+                        rb.getString("SPACE") +
                         e);
                 }
             }
@@ -652,9 +652,9 @@
         } catch (Exception e) {
             System.err.println
                 (AUTH_POLICY +
-                rb.getString(": error adding Entry ") +
+                rb.getString(".error.adding.Entry.") +
                 ge +
-                rb.getString(" ") +
+                rb.getString("SPACE") +
                 e);
         }
 
@@ -1373,18 +1373,18 @@
 
         public String toString(){
             StringBuffer sb = new StringBuffer();
-            sb.append(rb.getString("("));
+            sb.append(rb.getString("LPARAM"));
             sb.append(getCodeSource());
             sb.append("\n");
             for (int j = 0; j < permissions.size(); j++) {
                 Permission p = permissions.elementAt(j);
-                sb.append(rb.getString(" "));
-                sb.append(rb.getString(" "));
+                sb.append(rb.getString("SPACE"));
+                sb.append(rb.getString("SPACE"));
                 sb.append(p);
-                sb.append(rb.getString("\n"));
+                sb.append(rb.getString("NEWLINE"));
             }
-            sb.append(rb.getString(")"));
-            sb.append(rb.getString("\n"));
+            sb.append(rb.getString("RPARAM"));
+            sb.append(rb.getString("NEWLINE"));
             return sb.toString();
         }
 
@@ -1415,7 +1415,7 @@
         if (isReadOnly())
             throw new SecurityException
             (PolicyFile.rb.getString
-            ("attempt to add a Permission to a readonly PermissionCollection"));
+            ("attempt.to.add.a.Permission.to.a.readonly.PermissionCollection"));
 
         if (perms == null) {
             if (additionalPerms == null)
--- a/jdk/src/share/classes/com/sun/security/auth/PolicyParser.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/PolicyParser.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1998, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1998, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -300,7 +300,7 @@
             keyStoreType = match("quoted string");
         } else {
             throw new ParsingException(st.lineno(),
-                        rb.getString("expected keystore type"));
+                        rb.getString("expected.keystore.type"));
         }
     }
 
@@ -368,8 +368,8 @@
                                 "WILDCARD class but no WILDCARD name");
                     throw new ParsingException
                         (st.lineno(),
-                        rb.getString("can not specify Principal with a ") +
-                        rb.getString("wildcard class without a wildcard name"));
+                        rb.getString("can.not.specify.Principal.with.a.") +
+                        rb.getString("wildcard.class.without.a.wildcard.name"));
                 }
 
                 try {
@@ -389,7 +389,7 @@
             } else {
                 throw new
                  ParsingException(st.lineno(),
-                        rb.getString("expected codeBase or SignedBy"));
+                        rb.getString("expected.codeBase.or.SignedBy"));
             }
         }
 
@@ -397,7 +397,7 @@
         if (principals == null) {
             throw new ParsingException
                 (st.lineno(),
-                rb.getString("only Principal-based grant entries permitted"));
+                rb.getString("only.Principal.based.grant.entries.permitted"));
         }
 
         e.principals = principals;
@@ -416,7 +416,7 @@
             } else {
                 throw new
                     ParsingException(st.lineno(),
-                    rb.getString("expected permission entry"));
+                    rb.getString("expected.permission.entry"));
             }
         }
         match("}");
@@ -522,12 +522,12 @@
         switch (lookahead) {
         case StreamTokenizer.TT_NUMBER:
             throw new ParsingException(st.lineno(), expect,
-                                        rb.getString("number ") +
+                                        rb.getString("number.") +
                                         String.valueOf(st.nval));
         case StreamTokenizer.TT_EOF:
            throw new ParsingException
-                (rb.getString("expected ") + expect +
-                rb.getString(", read end of file"));
+                (rb.getString("expected.") + expect +
+                rb.getString(".read.end.of.file"));
         case StreamTokenizer.TT_WORD:
             if (expect.equalsIgnoreCase(st.sval)) {
                 lookahead = st.nextToken();
@@ -603,11 +603,11 @@
         switch (lookahead) {
         case StreamTokenizer.TT_NUMBER:
             throw new ParsingException(st.lineno(), ";",
-                                       rb.getString("number ") +
+                                       rb.getString("number.") +
                                         String.valueOf(st.nval));
         case StreamTokenizer.TT_EOF:
           throw new ParsingException
-                (rb.getString("expected ';', read end of file"));
+                (rb.getString("expected.read.end.of.file"));
         default:
           lookahead = st.nextToken();
         }
@@ -942,13 +942,13 @@
         }
 
         public ParsingException(int line, String msg) {
-            super(rb.getString("line ") + line + rb.getString(": ") + msg);
+            super(rb.getString("line.") + line + rb.getString("COLON") + msg);
         }
 
         public ParsingException(int line, String expect, String actual) {
-            super(rb.getString("line ") + line + rb.getString(": expected '") +
-                expect + rb.getString("', found '") + actual +
-                rb.getString("'"));
+            super(rb.getString("line.") + line + rb.getString(".expected.") +
+                expect + rb.getString(".found.") + actual +
+                rb.getString("QUOTE"));
         }
     }
 
--- a/jdk/src/share/classes/com/sun/security/auth/SolarisNumericGroupPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/SolarisNumericGroupPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -89,7 +89,7 @@
      */
     public SolarisNumericGroupPrincipal(String name, boolean primaryGroup) {
         if (name == null)
-            throw new NullPointerException(rb.getString("provided null name"));
+            throw new NullPointerException(rb.getString("provided.null.name"));
 
         this.name = name;
         this.primaryGroup = primaryGroup;
@@ -165,9 +165,9 @@
     public String toString() {
         return((primaryGroup ?
             rb.getString
-            ("SolarisNumericGroupPrincipal [Primary Group]: ") + name :
+            ("SolarisNumericGroupPrincipal.Primary.Group.") + name :
             rb.getString
-            ("SolarisNumericGroupPrincipal [Supplementary Group]: ") + name));
+            ("SolarisNumericGroupPrincipal.Supplementary.Group.") + name));
     }
 
     /**
--- a/jdk/src/share/classes/com/sun/security/auth/SolarisNumericUserPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/SolarisNumericUserPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -80,7 +80,7 @@
      */
     public SolarisNumericUserPrincipal(String name) {
         if (name == null)
-            throw new NullPointerException(rb.getString("provided null name"));
+            throw new NullPointerException(rb.getString("provided.null.name"));
 
         this.name = name;
     }
@@ -134,7 +134,7 @@
      *          <code>SolarisNumericUserPrincipal</code>.
      */
     public String toString() {
-        return(rb.getString("SolarisNumericUserPrincipal: ") + name);
+        return(rb.getString("SolarisNumericUserPrincipal.") + name);
     }
 
     /**
--- a/jdk/src/share/classes/com/sun/security/auth/SolarisPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/SolarisPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -76,7 +76,7 @@
      */
     public SolarisPrincipal(String name) {
         if (name == null)
-            throw new NullPointerException(rb.getString("provided null name"));
+            throw new NullPointerException(rb.getString("provided.null.name"));
 
         this.name = name;
     }
@@ -100,7 +100,7 @@
      * @return a string representation of this <code>SolarisPrincipal</code>.
      */
     public String toString() {
-        return(rb.getString("SolarisPrincipal: ") + name);
+        return(rb.getString("SolarisPrincipal.") + name);
     }
 
     /**
--- a/jdk/src/share/classes/com/sun/security/auth/SubjectCodeSource.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/SubjectCodeSource.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -395,7 +395,7 @@
                                         principals.listIterator();
             while (li.hasNext()) {
                 PolicyParser.PrincipalEntry pppe = li.next();
-                returnMe = returnMe + rb.getString("\n") +
+                returnMe = returnMe + rb.getString("NEWLINE") +
                         pppe.principalClass + " " +
                         pppe.principalName;
             }
--- a/jdk/src/share/classes/com/sun/security/auth/UnixNumericGroupPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/UnixNumericGroupPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -77,7 +77,7 @@
         if (name == null) {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("invalid null input: value",
+                        ("invalid.null.input.value",
                         "sun.security.util.AuthResources"));
             Object[] source = {"name"};
             throw new NullPointerException(form.format(source));
@@ -159,14 +159,14 @@
         if (primaryGroup) {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("UnixNumericGroupPrincipal [Primary Group]: name",
+                        ("UnixNumericGroupPrincipal.Primary.Group.name",
                         "sun.security.util.AuthResources"));
             Object[] source = {name};
             return form.format(source);
         } else {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                    ("UnixNumericGroupPrincipal [Supplementary Group]: name",
+                    ("UnixNumericGroupPrincipal.Supplementary.Group.name",
                     "sun.security.util.AuthResources"));
             Object[] source = {name};
             return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/UnixNumericUserPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/UnixNumericUserPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -67,7 +67,7 @@
         if (name == null) {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("invalid null input: value",
+                        ("invalid.null.input.value",
                         "sun.security.util.AuthResources"));
             Object[] source = {"name"};
             throw new NullPointerException(form.format(source));
@@ -127,7 +127,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("UnixNumericUserPrincipal: name",
+                        ("UnixNumericUserPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {name};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/UnixPrincipal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/UnixPrincipal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2003, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -64,7 +64,7 @@
         if (name == null) {
             java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("invalid null input: value",
+                        ("invalid.null.input.value",
                         "sun.security.util.AuthResources"));
             Object[] source = {"name"};
             throw new NullPointerException(form.format(source));
@@ -94,7 +94,7 @@
     public String toString() {
         java.text.MessageFormat form = new java.text.MessageFormat
                 (sun.security.util.ResourcesMgr.getString
-                        ("UnixPrincipal: name",
+                        ("UnixPrincipal.name",
                         "sun.security.util.AuthResources"));
         Object[] source = {name};
         return form.format(source);
--- a/jdk/src/share/classes/com/sun/security/auth/X500Principal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/X500Principal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -87,7 +87,7 @@
      */
     public X500Principal(String name) {
         if (name == null)
-            throw new NullPointerException(rb.getString("provided null name"));
+            throw new NullPointerException(rb.getString("provided.null.name"));
 
         try {
             thisX500Name = new X500Name(name);
--- a/jdk/src/share/classes/com/sun/security/auth/login/ConfigFile.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/login/ConfigFile.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2008, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -190,7 +190,7 @@
                 } catch (PropertyExpander.ExpandException peee) {
                     MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
-                                ("Unable to properly expand config",
+                                ("Unable.to.properly.expand.config",
                                 "sun.security.util.AuthResources"));
                     Object[] source = {extra_config};
                     throw new IOException(form.format(source));
@@ -206,7 +206,7 @@
                     } else {
                         MessageFormat form = new MessageFormat
                             (ResourcesMgr.getString
-                                ("extra_config (No such file or directory)",
+                                ("extra.config.No.such.file.or.directory.",
                                 "sun.security.util.AuthResources"));
                         Object[] source = {extra_config};
                         throw new IOException(form.format(source));
@@ -243,7 +243,7 @@
             } catch (PropertyExpander.ExpandException peee) {
                 MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
-                                ("Unable to properly expand config",
+                                ("Unable.to.properly.expand.config",
                                 "sun.security.util.AuthResources"));
                 Object[] source = {config_url};
                 throw new IOException(form.format(source));
@@ -286,7 +286,7 @@
                 debugConfig.println(fnfe.toString());
             }
             throw new IOException(ResourcesMgr.getString
-                    ("Configuration Error:\n\tNo such file or directory",
+                    ("Configuration.Error.No.such.file.or.directory",
                     "sun.security.util.AuthResources"));
         } finally {
             if (isr != null) {
@@ -426,7 +426,7 @@
                         AppConfigurationEntry.LoginModuleControlFlag.OPTIONAL;
             else {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tInvalid control flag, flag",
+                        ("Configuration.Error.Invalid.control.flag.flag",
                         "sun.security.util.AuthResources"));
                 Object[] source = {sflag};
                 throw new IOException(form.format(source));
@@ -474,8 +474,7 @@
         // add this configuration entry
         if (newConfig.containsKey(appName)) {
             MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                ("Configuration Error:\n\t" +
-                        "Can not specify multiple entries for appName",
+                ("Configuration.Error.Can.not.specify.multiple.entries.for.appName",
                 "sun.security.util.AuthResources"));
             Object[] source = {appName};
             throw new IOException(form.format(source));
@@ -491,8 +490,7 @@
         case StreamTokenizer.TT_EOF:
 
             MessageFormat form1 = new MessageFormat(ResourcesMgr.getString
-                ("Configuration Error:\n\texpected [expect], " +
-                        "read [end of file]",
+                ("Configuration.Error.expected.expect.read.end.of.file.",
                 "sun.security.util.AuthResources"));
             Object[] source1 = {expect};
             throw new IOException(form1.format(source1));
@@ -508,8 +506,7 @@
                 lookahead = nextToken();
             } else {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tLine line: " +
-                                "expected [expect], found [value]",
+                        ("Configuration.Error.Line.line.expected.expect.found.value.",
                         "sun.security.util.AuthResources"));
                 Object[] source = {new Integer(linenum), expect, st.sval};
                 throw new IOException(form.format(source));
@@ -522,7 +519,7 @@
                 lookahead = nextToken();
             } else {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tLine line: expected [expect]",
+                        ("Configuration.Error.Line.line.expected.expect.",
                         "sun.security.util.AuthResources"));
                 Object[] source = {new Integer(linenum), expect, st.sval};
                 throw new IOException(form.format(source));
@@ -535,7 +532,7 @@
                 lookahead = nextToken();
             } else {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tLine line: expected [expect]",
+                        ("Configuration.Error.Line.line.expected.expect.",
                         "sun.security.util.AuthResources"));
                 Object[] source = {new Integer(linenum), expect, st.sval};
                 throw new IOException(form.format(source));
@@ -548,7 +545,7 @@
                 lookahead = nextToken();
             } else {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tLine line: expected [expect]",
+                        ("Configuration.Error.Line.line.expected.expect.",
                         "sun.security.util.AuthResources"));
                 Object[] source = {new Integer(linenum), expect, st.sval};
                 throw new IOException(form.format(source));
@@ -561,7 +558,7 @@
                 lookahead = nextToken();
             } else {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tLine line: expected [expect]",
+                        ("Configuration.Error.Line.line.expected.expect.",
                         "sun.security.util.AuthResources"));
                 Object[] source = {new Integer(linenum), expect, st.sval};
                 throw new IOException(form.format(source));
@@ -570,8 +567,7 @@
 
         default:
             MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tLine line: " +
-                                "expected [expect], found [value]",
+                        ("Configuration.Error.Line.line.expected.expect.found.value.",
                         "sun.security.util.AuthResources"));
             Object[] source = {new Integer(linenum), expect, st.sval};
             throw new IOException(form.format(source));
@@ -667,8 +663,7 @@
 
             if (s == null || s.length() == 0) {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("Configuration Error:\n\tLine line: " +
-                        "system property [value] expanded to empty value",
+                        ("Configuration.Error.Line.line.system.property.value.expanded.to.empty.value",
                         "sun.security.util.AuthResources"));
                 Object[] source = {new Integer(linenum), value};
                 throw new IOException(form.format(source));
--- a/jdk/src/share/classes/com/sun/security/auth/module/JndiLoginModule.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/module/JndiLoginModule.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -686,9 +686,9 @@
 
         Callback[] callbacks = new Callback[2];
         callbacks[0] = new NameCallback(protocol + " "
-                                            + rb.getString("username: "));
+                                            + rb.getString("username."));
         callbacks[1] = new PasswordCallback(protocol + " " +
-                                                rb.getString("password: "),
+                                                rb.getString("password."),
                                             false);
 
         try {
--- a/jdk/src/share/classes/com/sun/security/auth/module/KeyStoreLoginModule.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/module/KeyStoreLoginModule.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -150,7 +150,7 @@
     private static final TextOutputCallback bannerCallback =
                 new TextOutputCallback
                         (TextOutputCallback.INFORMATION,
-                        rb.getString("Please enter keystore information"));
+                        rb.getString("Please.enter.keystore.information"));
     private final ConfirmationCallback confirmationCallback =
                 new ConfirmationCallback
                         (ConfirmationCallback.INFORMATION,
@@ -364,10 +364,10 @@
             NameCallback aliasCallback;
             if (keyStoreAlias == null || keyStoreAlias.length() == 0) {
                 aliasCallback = new NameCallback(
-                                        rb.getString("Keystore alias: "));
+                                        rb.getString("Keystore.alias."));
             } else {
                 aliasCallback =
-                    new NameCallback(rb.getString("Keystore alias: "),
+                    new NameCallback(rb.getString("Keystore.alias."),
                                      keyStoreAlias);
             }
 
@@ -379,11 +379,11 @@
                 break;
             case NORMAL:
                 keyPassCallback = new PasswordCallback
-                    (rb.getString("Private key password (optional): "), false);
+                    (rb.getString("Private.key.password.optional."), false);
                 // fall thru
             case TOKEN:
                 storePassCallback = new PasswordCallback
-                    (rb.getString("Keystore password: "), false);
+                    (rb.getString("Keystore.password."), false);
                 break;
             }
             prompt(aliasCallback, storePassCallback, keyPassCallback);
--- a/jdk/src/share/classes/com/sun/security/auth/module/Krb5LoginModule.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/module/Krb5LoginModule.java	Thu Nov 11 15:51:12 2010 +0800
@@ -780,7 +780,7 @@
                 Callback[] callbacks = new Callback[1];
                 MessageFormat form = new MessageFormat(
                                        rb.getString(
-                                       "Kerberos username [[defUsername]]: "));
+                                       "Kerberos.username.defUsername."));
                 Object[] source =  {defUsername};
                 callbacks[0] = new NameCallback(form.format(source));
                 callbackHandler.handle(callbacks);
@@ -835,7 +835,7 @@
                 String userName = krb5PrincName.toString();
                 MessageFormat form = new MessageFormat(
                                          rb.getString(
-                                         "Kerberos password for [username]: "));
+                                         "Kerberos.password.for.username."));
                 Object[] source = {userName};
                 callbacks[0] = new PasswordCallback(
                                                     form.format(source),
--- a/jdk/src/share/classes/com/sun/security/auth/module/LdapLoginModule.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/com/sun/security/auth/module/LdapLoginModule.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2005, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -969,8 +969,8 @@
                 "to acquire authentication information from the user");
 
         Callback[] callbacks = new Callback[2];
-        callbacks[0] = new NameCallback(rb.getString("username: "));
-        callbacks[1] = new PasswordCallback(rb.getString("password: "), false);
+        callbacks[0] = new NameCallback(rb.getString("username."));
+        callbacks[1] = new PasswordCallback(rb.getString("password."), false);
 
         try {
             callbackHandler.handle(callbacks);
--- a/jdk/src/share/classes/javax/security/auth/Policy.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/javax/security/auth/Policy.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1998, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1998, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -237,7 +237,7 @@
                     } catch (Exception e) {
                         throw new SecurityException
                                 (sun.security.util.ResourcesMgr.getString
-                                ("unable to instantiate Subject-based policy"));
+                                ("unable.to.instantiate.Subject.based.policy"));
                     }
                 }
             }
--- a/jdk/src/share/classes/javax/security/auth/PrivateCredentialPermission.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/javax/security/auth/PrivateCredentialPermission.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1999, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -172,7 +172,7 @@
 
         if (!"read".equalsIgnoreCase(actions))
             throw new IllegalArgumentException
-                (ResourcesMgr.getString("actions can only be 'read'"));
+                (ResourcesMgr.getString("actions.can.only.be.read."));
         init(name);
     }
 
@@ -344,12 +344,11 @@
 
         if (tokenizer.hasMoreTokens() == false) {
             MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                ("permission name [name] syntax invalid: "));
+                ("permission.name.name.syntax.invalid."));
             Object[] source = {name};
             throw new IllegalArgumentException
                 (form.format(source) + ResourcesMgr.getString
-                        ("Credential Class not followed by a " +
-                        "Principal Class and Name"));
+                        ("Credential.Class.not.followed.by.a.Principal.Class.and.Name"));
         }
 
         while (tokenizer.hasMoreTokens()) {
@@ -364,11 +363,11 @@
 
             if (tokenizer.hasMoreTokens() == false) {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("permission name [name] syntax invalid: "));
+                        ("permission.name.name.syntax.invalid."));
                 Object[] source = {name};
                 throw new IllegalArgumentException
                         (form.format(source) + ResourcesMgr.getString
-                        ("Principal Class not followed by a Principal Name"));
+                        ("Principal.Class.not.followed.by.a.Principal.Name"));
             }
 
             // skip delimiter
@@ -379,11 +378,11 @@
 
             if (!principalName.startsWith("\"")) {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("permission name [name] syntax invalid: "));
+                        ("permission.name.name.syntax.invalid."));
                 Object[] source = {name};
                 throw new IllegalArgumentException
                         (form.format(source) + ResourcesMgr.getString
-                        ("Principal Name must be surrounded by quotes"));
+                        ("Principal.Name.must.be.surrounded.by.quotes"));
             }
 
             if (!principalName.endsWith("\"")) {
@@ -401,11 +400,11 @@
                 if (!principalName.endsWith("\"")) {
                     MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
-                        ("permission name [name] syntax invalid: "));
+                        ("permission.name.name.syntax.invalid."));
                     Object[] source = {name};
                     throw new IllegalArgumentException
                         (form.format(source) + ResourcesMgr.getString
-                                ("Principal Name missing end quote"));
+                                ("Principal.Name.missing.end.quote"));
                 }
             }
 
@@ -418,9 +417,7 @@
             if (principalClass.equals("*") &&
                 !principalName.equals("*")) {
                     throw new IllegalArgumentException(ResourcesMgr.getString
-                        ("PrivateCredentialPermission Principal Class " +
-                        "can not be a wildcard (*) value if Principal Name " +
-                        "is not a wildcard (*) value"));
+                        ("PrivateCredentialPermission.Principal.Class.can.not.be.a.wildcard.value.if.Principal.Name.is.not.a.wildcard.value"));
             }
 
             if (testing)
@@ -556,8 +553,7 @@
 
         public String toString() {
             MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                ("CredOwner:\n\tPrincipal Class = class\n\t" +
-                        "Principal Name = name"));
+                ("CredOwner.Principal.Class.class.Principal.Name.name"));
             Object[] source = {principalClass, principalName};
             return (form.format(source));
         }
--- a/jdk/src/share/classes/javax/security/auth/Subject.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/javax/security/auth/Subject.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1998, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1998, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -204,7 +204,7 @@
             pubCredentials == null ||
             privCredentials == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null input(s)"));
+                (ResourcesMgr.getString("invalid.null.input.s."));
 
         this.principals = Collections.synchronizedSet(new SecureSet<Principal>
                                 (this, PRINCIPAL_SET, principals));
@@ -289,7 +289,7 @@
 
         if (acc == null) {
             throw new NullPointerException(ResourcesMgr.getString
-                ("invalid null AccessControlContext provided"));
+                ("invalid.null.AccessControlContext.provided"));
         }
 
         // return the Subject from the DomainCombiner of the provided context
@@ -346,7 +346,7 @@
         }
         if (action == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null action provided"));
+                (ResourcesMgr.getString("invalid.null.action.provided"));
 
         // set up the new Subject-based AccessControlContext
         // for doPrivileged
@@ -406,7 +406,7 @@
 
         if (action == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null action provided"));
+                (ResourcesMgr.getString("invalid.null.action.provided"));
 
         // set up the new Subject-based AccessControlContext for doPrivileged
         final AccessControlContext currentAcc = AccessController.getContext();
@@ -460,7 +460,7 @@
 
         if (action == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null action provided"));
+                (ResourcesMgr.getString("invalid.null.action.provided"));
 
         // set up the new Subject-based AccessControlContext
         // for doPrivileged
@@ -524,7 +524,7 @@
 
         if (action == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null action provided"));
+                (ResourcesMgr.getString("invalid.null.action.provided"));
 
         // set up the new Subject-based AccessControlContext for doPrivileged
         final AccessControlContext callerAcc =
@@ -603,7 +603,7 @@
 
         if (c == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null Class provided"));
+                (ResourcesMgr.getString("invalid.null.Class.provided"));
 
         // always return an empty Set instead of null
         // so LoginModules can add to the Set if necessary
@@ -697,7 +697,7 @@
 
         if (c == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null Class provided"));
+                (ResourcesMgr.getString("invalid.null.Class.provided"));
 
         // always return an empty Set instead of null
         // so LoginModules can add to the Set if necessary
@@ -742,7 +742,7 @@
 
         if (c == null)
             throw new NullPointerException
-                (ResourcesMgr.getString("invalid null Class provided"));
+                (ResourcesMgr.getString("invalid.null.Class.provided"));
 
         // always return an empty Set instead of null
         // so LoginModules can add to the Set if necessary
@@ -832,15 +832,15 @@
      */
     String toString(boolean includePrivateCredentials) {
 
-        String s = ResourcesMgr.getString("Subject:\n");
+        String s = ResourcesMgr.getString("Subject.");
         String suffix = "";
 
         synchronized(principals) {
             Iterator<Principal> pI = principals.iterator();
             while (pI.hasNext()) {
                 Principal p = pI.next();
-                suffix = suffix + ResourcesMgr.getString("\tPrincipal: ") +
-                        p.toString() + ResourcesMgr.getString("\n");
+                suffix = suffix + ResourcesMgr.getString(".Principal.") +
+                        p.toString() + ResourcesMgr.getString("NEWLINE");
             }
         }
 
@@ -849,8 +849,8 @@
             while (pI.hasNext()) {
                 Object o = pI.next();
                 suffix = suffix +
-                        ResourcesMgr.getString("\tPublic Credential: ") +
-                        o.toString() + ResourcesMgr.getString("\n");
+                        ResourcesMgr.getString(".Public.Credential.") +
+                        o.toString() + ResourcesMgr.getString("NEWLINE");
             }
         }
 
@@ -861,12 +861,12 @@
                     try {
                         Object o = pI.next();
                         suffix += ResourcesMgr.getString
-                                        ("\tPrivate Credential: ") +
+                                        (".Private.Credential.") +
                                         o.toString() +
-                                        ResourcesMgr.getString("\n");
+                                        ResourcesMgr.getString("NEWLINE");
                     } catch (SecurityException se) {
                         suffix += ResourcesMgr.getString
-                                ("\tPrivate Credential inaccessible\n");
+                                (".Private.Credential.inaccessible.");
                         break;
                     }
                 }
@@ -1036,7 +1036,7 @@
 
                     if (subject.isReadOnly()) {
                         throw new IllegalStateException(ResourcesMgr.getString
-                                ("Subject is read-only"));
+                                ("Subject.is.read.only"));
                     }
 
                     java.lang.SecurityManager sm = System.getSecurityManager();
@@ -1062,7 +1062,7 @@
 
             if (subject.isReadOnly()) {
                 throw new IllegalStateException
-                        (ResourcesMgr.getString("Subject is read-only"));
+                        (ResourcesMgr.getString("Subject.is.read.only"));
             }
 
             java.lang.SecurityManager sm = System.getSecurityManager();
@@ -1084,9 +1084,7 @@
             case Subject.PRINCIPAL_SET:
                 if (!(o instanceof Principal)) {
                     throw new SecurityException(ResourcesMgr.getString
-                        ("attempting to add an object which is not an " +
-                        "instance of java.security.Principal to a " +
-                        "Subject's Principal Set"));
+                        ("attempting.to.add.an.object.which.is.not.an.instance.of.java.security.Principal.to.a.Subject.s.Principal.Set"));
                 }
                 break;
             default:
@@ -1389,8 +1387,7 @@
 
             if (!o.getClass().isAssignableFrom(c)) {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("attempting to add an object which is not an " +
-                        "instance of class"));
+                        ("attempting.to.add.an.object.which.is.not.an.instance.of.class"));
                 Object[] source = {c.toString()};
                 throw new SecurityException(form.format(source));
             }
--- a/jdk/src/share/classes/javax/security/auth/login/AppConfigurationEntry.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/javax/security/auth/login/AppConfigurationEntry.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1998, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1998, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -167,7 +167,7 @@
          */
         public String toString() {
             return (sun.security.util.ResourcesMgr.getString
-                ("LoginModuleControlFlag: ") + controlFlag);
+                ("LoginModuleControlFlag.") + controlFlag);
         }
     }
 }
--- a/jdk/src/share/classes/javax/security/auth/login/LoginContext.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/javax/security/auth/login/LoginContext.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1998, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1998, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -244,7 +244,7 @@
 
         if (name == null)
             throw new LoginException
-                (ResourcesMgr.getString("Invalid null input: name"));
+                (ResourcesMgr.getString("Invalid.null.input.name"));
 
         // get the Configuration
         if (config == null) {
@@ -268,7 +268,7 @@
             entries = config.getAppConfigurationEntry(OTHER);
             if (entries == null) {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("No LoginModules configured for name"));
+                        ("No.LoginModules.configured.for.name"));
                 Object[] source = {name};
                 throw new LoginException(form.format(source));
             }
@@ -382,7 +382,7 @@
         init(name);
         if (subject == null)
             throw new LoginException
-                (ResourcesMgr.getString("invalid null Subject provided"));
+                (ResourcesMgr.getString("invalid.null.Subject.provided"));
         this.subject = subject;
         subjectProvided = true;
         loadDefaultCallbackHandler();
@@ -418,7 +418,7 @@
         init(name);
         if (callbackHandler == null)
             throw new LoginException(ResourcesMgr.getString
-                                ("invalid null CallbackHandler provided"));
+                                ("invalid.null.CallbackHandler.provided"));
         this.callbackHandler = new SecureCallbackHandler
                                 (java.security.AccessController.getContext(),
                                 callbackHandler);
@@ -459,7 +459,7 @@
         this(name, subject);
         if (callbackHandler == null)
             throw new LoginException(ResourcesMgr.getString
-                                ("invalid null CallbackHandler provided"));
+                                ("invalid.null.CallbackHandler.provided"));
         this.callbackHandler = new SecureCallbackHandler
                                 (java.security.AccessController.getContext(),
                                 callbackHandler);
@@ -633,7 +633,7 @@
     public void logout() throws LoginException {
         if (subject == null) {
             throw new LoginException(ResourcesMgr.getString
-                ("null subject - logout called before login"));
+                ("null.subject.logout.called.before.login"));
         }
 
         if (configProvided) {
@@ -811,21 +811,20 @@
 
             } catch (NoSuchMethodException nsme) {
                 MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                        ("unable to instantiate LoginModule, module, because " +
-                        "it does not provide a no-argument constructor"));
+                        ("unable.to.instantiate.LoginModule.module.because.it.does.not.provide.a.no.argument.constructor"));
                 Object[] source = {moduleStack[i].entry.getLoginModuleName()};
                 throwException(null, new LoginException(form.format(source)));
             } catch (InstantiationException ie) {
                 throwException(null, new LoginException(ResourcesMgr.getString
-                        ("unable to instantiate LoginModule: ") +
+                        ("unable.to.instantiate.LoginModule.") +
                         ie.getMessage()));
             } catch (ClassNotFoundException cnfe) {
                 throwException(null, new LoginException(ResourcesMgr.getString
-                        ("unable to find LoginModule class: ") +
+                        ("unable.to.find.LoginModule.class.") +
                         cnfe.getMessage()));
             } catch (IllegalAccessException iae) {
                 throwException(null, new LoginException(ResourcesMgr.getString
-                        ("unable to access LoginModule: ") +
+                        ("unable.to.access.LoginModule.") +
                         iae.getMessage()));
             } catch (InvocationTargetException ite) {
 
@@ -934,7 +933,7 @@
         } else if (success == false) {
             // no module succeeded -- all modules were IGNORED
             throwException(new LoginException
-                (ResourcesMgr.getString("Login Failure: all modules ignored")),
+                (ResourcesMgr.getString("Login.Failure.all.modules.ignored")),
                 null);
         } else {
             // success
--- a/jdk/src/share/classes/javax/security/auth/x500/X500Principal.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/javax/security/auth/x500/X500Principal.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -155,12 +155,12 @@
         if (name == null) {
             throw new NullPointerException
                 (sun.security.util.ResourcesMgr.getString
-                ("provided null name"));
+                ("provided.null.name"));
         }
         if (keywordMap == null) {
             throw new NullPointerException
                 (sun.security.util.ResourcesMgr.getString
-                ("provided null keyword map"));
+                ("provided.null.keyword.map"));
         }
 
         try {
@@ -391,7 +391,7 @@
         if (oidMap == null) {
             throw new NullPointerException
                 (sun.security.util.ResourcesMgr.getString
-                ("provided null OID map"));
+                ("provided.null.OID.map"));
         }
         if (format != null) {
             if (format.equalsIgnoreCase(RFC1779)) {
--- a/jdk/src/share/classes/sun/security/pkcs11/SunPKCS11.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/pkcs11/SunPKCS11.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1123,7 +1123,7 @@
 
             java.text.MessageFormat form = new java.text.MessageFormat
                         (ResourcesMgr.getString
-                        ("PKCS11 Token [providerName] Password: "));
+                        ("PKCS11.Token.providerName.Password."));
             Object[] source = { getName() };
 
             PasswordCallback pcall = new PasswordCallback(form.format(source),
--- a/jdk/src/share/classes/sun/security/provider/PolicyFile.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/provider/PolicyFile.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1997, 2009, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1997, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -653,7 +653,7 @@
             }
         } catch (PolicyParser.ParsingException pe) {
             MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                (POLICY + ": error parsing policy:\n\tmessage"));
+                (POLICY + ".error.parsing.policy.message"));
             Object[] source = {policy, pe.getLocalizedMessage()};
             System.err.println(form.format(source));
             if (debug != null)
@@ -895,7 +895,7 @@
                     MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
                          (POLICY +
-                          ": error adding Permission, perm:\n\tmessage"));
+                          ".error.adding.Permission.perm.message"));
                     Object[] source = {pe.permission,
                                        ite.getTargetException().toString()};
                     System.err.println(form.format(source));
@@ -903,7 +903,7 @@
                     MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
                          (POLICY +
-                          ": error adding Permission, perm:\n\tmessage"));
+                          ".error.adding.Permission.perm.message"));
                     Object[] source = {pe.permission,
                                        e.toString()};
                     System.err.println(form.format(source));
@@ -915,7 +915,7 @@
         } catch (Exception e) {
             MessageFormat form = new MessageFormat(ResourcesMgr.getString
                                          (POLICY
-                                         + ": error adding Entry:\n\tmessage"));
+                                         + ".error.adding.Entry.message"));
             Object[] source = {e.toString()};
             System.err.println(form.format(source));
         }
@@ -1950,7 +1950,7 @@
                 if (colonIndex == -1) {
                     MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
-                        ("alias name not provided (pe.name)"));
+                        ("alias.name.not.provided.pe.name."));
                     Object[] source = {pe.name};
                     throw new Exception(form.format(source));
                 }
@@ -1958,7 +1958,7 @@
                 if ((suffix = getDN(suffix, keystore)) == null) {
                     MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
-                        ("unable to perform substitution on alias, suffix"));
+                        ("unable.to.perform.substitution.on.alias.suffix"));
                     Object[] source = {value.substring(colonIndex+1)};
                     throw new Exception(form.format(source));
                 }
@@ -1968,7 +1968,7 @@
             } else {
                 MessageFormat form = new MessageFormat
                         (ResourcesMgr.getString
-                        ("substitution value, prefix, unsupported"));
+                        ("substitution.value.prefix.unsupported"));
                 Object[] source = {prefix};
                 throw new Exception(form.format(source));
             }
@@ -2127,18 +2127,18 @@
 
         @Override public String toString(){
             StringBuilder sb = new StringBuilder();
-            sb.append(ResourcesMgr.getString("("));
+            sb.append(ResourcesMgr.getString("LPARAM"));
             sb.append(getCodeSource());
             sb.append("\n");
             for (int j = 0; j < permissions.size(); j++) {
                 Permission p = permissions.get(j);
-                sb.append(ResourcesMgr.getString(" "));
-                sb.append(ResourcesMgr.getString(" "));
+                sb.append(ResourcesMgr.getString("SPACE"));
+                sb.append(ResourcesMgr.getString("SPACE"));
                 sb.append(p);
-                sb.append(ResourcesMgr.getString("\n"));
+                sb.append(ResourcesMgr.getString("NEWLINE"));
             }
-            sb.append(ResourcesMgr.getString(")"));
-            sb.append(ResourcesMgr.getString("\n"));
+            sb.append(ResourcesMgr.getString("RPARAM"));
+            sb.append(ResourcesMgr.getString("NEWLINE"));
             return sb.toString();
         }
     }
@@ -2195,7 +2195,7 @@
             super(type);
             if (type == null) {
                 throw new NullPointerException
-                    (ResourcesMgr.getString("type can't be null"));
+                    (ResourcesMgr.getString("type.can.t.be.null"));
             }
             this.type = type;
             this.name = name;
--- a/jdk/src/share/classes/sun/security/provider/PolicyParser.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/provider/PolicyParser.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1997, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1997, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -219,8 +219,7 @@
 
         if (keyStoreUrlString == null && storePassURL != null) {
             throw new ParsingException(ResourcesMgr.getString
-                ("keystorePasswordURL can not be specified without also " +
-                "specifying keystore"));
+                ("keystorePasswordURL.can.not.be.specified.without.also.specifying.keystore"));
         }
     }
 
@@ -357,7 +356,7 @@
             keyStoreType = match("quoted string");
         } else {
             throw new ParsingException(st.lineno(),
-                        ResourcesMgr.getString("expected keystore type"));
+                        ResourcesMgr.getString("expected.keystore.type"));
         }
 
         // parse keystore provider
@@ -370,7 +369,7 @@
             keyStoreProvider = match("quoted string");
         } else {
             throw new ParsingException(st.lineno(),
-                        ResourcesMgr.getString("expected keystore provider"));
+                        ResourcesMgr.getString("expected.keystore.provider"));
         }
     }
 
@@ -421,7 +420,7 @@
                     throw new ParsingException(
                             st.lineno(),
                             ResourcesMgr.getString
-                                ("multiple Codebase expressions"));
+                                ("multiple.Codebase.expressions"));
                 e.codeBase = match("quoted string");
                 peekAndMatch(",");
             } else if (peekAndMatch("SignedBy")) {
@@ -429,7 +428,7 @@
                     throw new ParsingException(
                             st.lineno(),
                             ResourcesMgr.getString(
-                                "multiple SignedBy expressions"));
+                                "multiple.SignedBy.expressions"));
                 e.signedBy = match("quoted string");
 
                 // verify syntax of the aliases
@@ -448,7 +447,7 @@
                     throw new ParsingException(
                             st.lineno(),
                             ResourcesMgr.getString(
-                                "SignedBy has empty alias"));
+                                "SignedBy.has.empty.alias"));
 
                 peekAndMatch(",");
             } else if (peekAndMatch("Principal")) {
@@ -491,8 +490,7 @@
                         throw new ParsingException
                                 (st.lineno(),
                                  ResourcesMgr.getString
-                                    ("can not specify Principal with a " +
-                                     "wildcard class without a wildcard name"));
+                                    ("can.not.specify.Principal.with.a.wildcard.class.without.a.wildcard.name"));
                     }
                 }
 
@@ -529,8 +527,7 @@
             } else {
                 throw new ParsingException(st.lineno(),
                                   ResourcesMgr.getString(
-                                      "expected codeBase or SignedBy or " +
-                                      "Principal"));
+                                      "expected.codeBase.or.SignedBy.or.Principal"));
             }
         }
 
@@ -554,7 +551,7 @@
                 throw new
                     ParsingException(st.lineno(),
                                      ResourcesMgr.getString(
-                                        "expected permission entry"));
+                                        "expected.permission.entry"));
             }
         }
         match("}");
@@ -727,12 +724,12 @@
         switch (lookahead) {
         case StreamTokenizer.TT_NUMBER:
             throw new ParsingException(st.lineno(), expect,
-                                       ResourcesMgr.getString("number ") +
+                                       ResourcesMgr.getString("number.") +
                                        String.valueOf(st.nval));
         case StreamTokenizer.TT_EOF:
             MessageFormat form = new MessageFormat(
                     ResourcesMgr.getString
-                            ("expected [expect], read [end of file]"));
+                            ("expected.expect.read.end.of.file."));
             Object[] source = {expect};
             throw new ParsingException(form.format(source));
         case StreamTokenizer.TT_WORD:
@@ -809,11 +806,11 @@
             switch (lookahead) {
             case StreamTokenizer.TT_NUMBER:
                 throw new ParsingException(st.lineno(), ";",
-                                          ResourcesMgr.getString("number ") +
+                                          ResourcesMgr.getString("number.") +
                                           String.valueOf(st.nval));
             case StreamTokenizer.TT_EOF:
                 throw new ParsingException(ResourcesMgr.getString
-                        ("expected [;], read [end of file]"));
+                        ("expected.read.end.of.file."));
             default:
                 lookahead = st.nextToken();
             }
@@ -973,7 +970,7 @@
         public PrincipalEntry(String principalClass, String principalName) {
             if (principalClass == null || principalName == null)
                 throw new NullPointerException(ResourcesMgr.getString(
-                                  "null principalClass or principalName"));
+                                  "null.principalClass.or.principalName"));
             this.principalClass = principalClass;
             this.principalName = principalName;
         }
@@ -1199,7 +1196,7 @@
         public ParsingException(int line, String msg) {
             super("line " + line + ": " + msg);
             MessageFormat form = new MessageFormat
-                (ResourcesMgr.getString("line number: msg"));
+                (ResourcesMgr.getString("line.number.msg"));
             Object[] source = {new Integer(line), msg};
             i18nMessage = form.format(source);
         }
@@ -1208,7 +1205,7 @@
             super("line " + line + ": expected [" + expect +
                 "], found [" + actual + "]");
             MessageFormat form = new MessageFormat(ResourcesMgr.getString
-                ("line number: expected [expect], found [actual]"));
+                ("line.number.expected.expect.found.actual."));
             Object[] source = {new Integer(line), expect, actual};
             i18nMessage = form.format(source);
         }
--- a/jdk/src/share/classes/sun/security/tools/JarSigner.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/tools/JarSigner.java	Thu Nov 11 15:51:12 2010 +0800
@@ -205,7 +205,7 @@
 
                     if (!(obj instanceof Provider)) {
                         MessageFormat form = new MessageFormat(rb.getString
-                            ("provName not a provider"));
+                            ("provName.not.a.provider"));
                         Object[] source = {provName};
                         throw new Exception(form.format(source));
                     }
@@ -218,7 +218,7 @@
                     loadKeyStore(keystore, false);
                 } catch (Exception e) {
                     if ((keystore != null) || (storepass != null)) {
-                        System.out.println(rb.getString("jarsigner error: ") +
+                        System.out.println(rb.getString("jarsigner.error.") +
                                         e.getMessage());
                         System.exit(1);
                     }
@@ -264,7 +264,7 @@
                 signJar(jarfile, alias, args);
             }
         } catch (Exception e) {
-            System.out.println(rb.getString("jarsigner error: ") + e);
+            System.out.println(rb.getString("jarsigner.error.") + e);
             if (debug) {
                 e.printStackTrace();
             }
@@ -420,7 +420,7 @@
                     }
                 } else {
                     System.err.println(
-                            rb.getString("Illegal option: ") + flags);
+                            rb.getString("Illegal.option.") + flags);
                     usage();
                 }
             }
@@ -430,15 +430,15 @@
         if (verbose == null) showcerts = false;
 
         if (jarfile == null) {
-            System.err.println(rb.getString("Please specify jarfile name"));
+            System.err.println(rb.getString("Please.specify.jarfile.name"));
             usage();
         }
         if (!verify && alias == null) {
-            System.err.println(rb.getString("Please specify alias name"));
+            System.err.println(rb.getString("Please.specify.alias.name"));
             usage();
         }
         if (!verify && ckaliases.size() > 1) {
-            System.err.println(rb.getString("Only one alias can be specified"));
+            System.err.println(rb.getString("Only.one.alias.can.be.specified"));
             usage();
         }
 
@@ -471,30 +471,27 @@
 
         if (token && !nullStream) {
             System.err.println(MessageFormat.format(rb.getString
-                ("-keystore must be NONE if -storetype is {0}"), storetype));
+                (".keystore.must.be.NONE.if.storetype.is.{0}"), storetype));
             usage();
         }
 
         if (token && keypass != null) {
             System.err.println(MessageFormat.format(rb.getString
-                ("-keypass can not be specified " +
-                "if -storetype is {0}"), storetype));
+                (".keypass.can.not.be.specified.if.storetype.is.{0}"), storetype));
             usage();
         }
 
         if (protectedPath) {
             if (storepass != null || keypass != null) {
                 System.err.println(rb.getString
-                        ("If -protected is specified, " +
-                        "then -storepass and -keypass must not be specified"));
+                        ("If.protected.is.specified.then.storepass.and.keypass.must.not.be.specified"));
                 usage();
             }
         }
         if (KeyStoreUtil.isWindowsKeyStore(storetype)) {
             if (storepass != null || keypass != null) {
                 System.err.println(rb.getString
-                        ("If keystore is not password protected, " +
-                        "then -storepass and -keypass must not be specified"));
+                        ("If.keystore.is.not.password.protected.then.storepass.and.keypass.must.not.be.specified"));
                 usage();
             }
         }
@@ -508,94 +505,94 @@
     }
 
     static void usageNoArg() {
-        System.out.println(rb.getString("Option lacks argument"));
+        System.out.println(rb.getString("Option.lacks.argument"));
         usage();
     }
 
     static void usage() {
         System.out.println();
-        System.out.println(rb.getString("Please type jarsigner -help for usage"));
+        System.out.println(rb.getString("Please.type.jarsigner.help.for.usage"));
         System.exit(1);
     }
 
     static void fullusage() {
         System.out.println(rb.getString
-                ("Usage: jarsigner [options] jar-file alias"));
+                ("Usage.jarsigner.options.jar.file.alias"));
         System.out.println(rb.getString
-                ("       jarsigner -verify [options] jar-file [alias...]"));
+                (".jarsigner.verify.options.jar.file.alias."));
         System.out.println();
         System.out.println(rb.getString
-                ("[-keystore <url>]           keystore location"));
+                (".keystore.url.keystore.location"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-storepass <password>]     password for keystore integrity"));
+                (".storepass.password.password.for.keystore.integrity"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-storetype <type>]         keystore type"));
+                (".storetype.type.keystore.type"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-keypass <password>]       password for private key (if different)"));
+                (".keypass.password.password.for.private.key.if.different."));
         System.out.println();
         System.out.println(rb.getString
-                ("[-certchain <file>]         name of alternative certchain file"));
+                (".certchain.file.name.of.alternative.certchain.file"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-sigfile <file>]           name of .SF/.DSA file"));
+                (".sigfile.file.name.of.SF.DSA.file"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-signedjar <file>]         name of signed JAR file"));
+                (".signedjar.file.name.of.signed.JAR.file"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-digestalg <algorithm>]    name of digest algorithm"));
+                (".digestalg.algorithm.name.of.digest.algorithm"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-sigalg <algorithm>]       name of signature algorithm"));
+                (".sigalg.algorithm.name.of.signature.algorithm"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-crl[:auto| <file>]        include CRL in signed jar"));
+                (".crl.auto.file.include.CRL.in.signed.jar"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-verify]                   verify a signed JAR file"));
+                (".verify.verify.a.signed.JAR.file"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-verbose[:suboptions]]     verbose output when signing/verifying."));
+                (".verbose.suboptions.verbose.output.when.signing.verifying."));
         System.out.println(rb.getString
-                ("                            suboptions can be all, grouped or summary"));
+                (".suboptions.can.be.all.grouped.or.summary"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-certs]                    display certificates when verbose and verifying"));
+                (".certs.display.certificates.when.verbose.and.verifying"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-tsa <url>]                location of the Timestamping Authority"));
+                (".tsa.url.location.of.the.Timestamping.Authority"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-tsacert <alias>]          public key certificate for Timestamping Authority"));
+                (".tsacert.alias.public.key.certificate.for.Timestamping.Authority"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-altsigner <class>]        class name of an alternative signing mechanism"));
+                (".altsigner.class.class.name.of.an.alternative.signing.mechanism"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-altsignerpath <pathlist>] location of an alternative signing mechanism"));
+                (".altsignerpath.pathlist.location.of.an.alternative.signing.mechanism"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-internalsf]               include the .SF file inside the signature block"));
+                (".internalsf.include.the.SF.file.inside.the.signature.block"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-sectionsonly]             don't compute hash of entire manifest"));
+                (".sectionsonly.don.t.compute.hash.of.entire.manifest"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-protected]                keystore has protected authentication path"));
+                (".protected.keystore.has.protected.authentication.path"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-providerName <name>]      provider name"));
+                (".providerName.name.provider.name"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-providerClass <class>     name of cryptographic service provider's"));
+                (".providerClass.class.name.of.cryptographic.service.provider.s"));
         System.out.println(rb.getString
-                ("  [-providerArg <arg>]] ... master class file and constructor argument"));
+                (".providerArg.arg.master.class.file.and.constructor.argument"));
         System.out.println();
         System.out.println(rb.getString
-                ("[-strict]                   treat warnings as errors"));
+                (".strict.treat.warnings.as.errors"));
         System.out.println();
 
         System.exit(0);
@@ -644,7 +641,7 @@
                 Enumeration<JarEntry> e = entriesVec.elements();
 
                 long now = System.currentTimeMillis();
-                String tab = rb.getString("      ");
+                String tab = rb.getString("6SPACE");
 
                 while (e.hasMoreElements()) {
                     JarEntry je = e.nextElement();
@@ -672,12 +669,12 @@
                              (man.getAttributes("./"+name) != null) ||
                              (man.getAttributes("/"+name) != null));
                         sb.append(
-                          (isSigned ? rb.getString("s") : rb.getString(" ")) +
-                          (inManifest ? rb.getString("m") : rb.getString(" ")) +
-                          (inStore ? rb.getString("k") : rb.getString(" ")) +
-                          (inScope ? rb.getString("i") : rb.getString(" ")) +
+                          (isSigned ? rb.getString("s") : rb.getString("SPACE")) +
+                          (inManifest ? rb.getString("m") : rb.getString("SPACE")) +
+                          (inStore ? rb.getString("k") : rb.getString("SPACE")) +
+                          (inScope ? rb.getString("i") : rb.getString("SPACE")) +
                           ((inStoreOrScope & NOT_ALIAS) != 0 ?"X":" ") +
-                          rb.getString(" "));
+                          rb.getString("SPACE"));
                         sb.append("|");
                     }
 
@@ -701,7 +698,7 @@
                                         if (crl instanceof X509CRLImpl) {
                                             sb.append(tab).append("[");
                                             sb.append(String.format(
-                                                    rb.getString("with a CRL including %d entries"),
+                                                    rb.getString("with.a.CRL.including.d.entries"),
                                                     ((X509CRLImpl)crl).getRevokedCertificates().size()))
                                                 .append("]\n");
                                         }
@@ -714,10 +711,10 @@
                         // to be consistent with old behavior.
                         if (signatureRelated(name)) {
                             sb.append("\n" + tab + rb.getString(
-                                    "(Signature related entries)") + "\n\n");
+                                    ".Signature.related.entries.") + "\n\n");
                         } else {
                             sb.append("\n" + tab + rb.getString(
-                                    "(Unsigned entries)") + "\n\n");
+                                    ".Unsigned.entries.") + "\n\n");
                         }
                     }
 
@@ -773,7 +770,7 @@
                             if (files.size() > 1) {
                                 System.out.println(files.get(0) + " " +
                                         String.format(rb.getString(
-                                        "(and %d more)"), files.size()-1));
+                                        ".and.d.more."), files.size()-1));
                             } else {
                                 System.out.println(files.get(0));
                             }
@@ -783,89 +780,89 @@
                 }
                 System.out.println();
                 System.out.println(rb.getString(
-                    "  s = signature was verified "));
+                    ".s.signature.was.verified."));
                 System.out.println(rb.getString(
-                    "  m = entry is listed in manifest"));
+                    ".m.entry.is.listed.in.manifest"));
                 System.out.println(rb.getString(
-                    "  k = at least one certificate was found in keystore"));
+                    ".k.at.least.one.certificate.was.found.in.keystore"));
                 System.out.println(rb.getString(
-                    "  i = at least one certificate was found in identity scope"));
+                    ".i.at.least.one.certificate.was.found.in.identity.scope"));
                 if (ckaliases.size() > 0) {
-                    System.out.println((
-                        "  X = not signed by specified alias(es)"));
+                    System.out.println(rb.getString(
+                        ".X.not.signed.by.specified.alias.es."));
                 }
                 System.out.println();
             }
             if (man == null)
-                System.out.println(rb.getString("no manifest."));
+                System.out.println(rb.getString("no.manifest."));
 
             if (!anySigned) {
                 System.out.println(rb.getString(
-                      "jar is unsigned. (signatures missing or not parsable)"));
+                      "jar.is.unsigned.signatures.missing.or.not.parsable."));
             } else {
-                System.out.println(rb.getString("jar verified."));
+                System.out.println(rb.getString("jar.verified."));
                 if (hasUnsignedEntry || hasExpiredCert || hasExpiringCert ||
                     badKeyUsage || badExtendedKeyUsage || badNetscapeCertType ||
                     notYetValidCert || chainNotValidated ||
                     aliasNotInStore || notSignedByAlias) {
 
                     System.out.println();
-                    System.out.println(rb.getString("Warning: "));
+                    System.out.println(rb.getString("Warning."));
                     if (badKeyUsage) {
                         System.out.println(
-                            rb.getString("This jar contains entries whose signer certificate's KeyUsage extension doesn't allow code signing."));
+                            rb.getString("This.jar.contains.entries.whose.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing."));
                     }
 
                     if (badExtendedKeyUsage) {
                         System.out.println(
-                            rb.getString("This jar contains entries whose signer certificate's ExtendedKeyUsage extension doesn't allow code signing."));
+                            rb.getString("This.jar.contains.entries.whose.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing."));
                     }
 
                     if (badNetscapeCertType) {
                         System.out.println(
-                            rb.getString("This jar contains entries whose signer certificate's NetscapeCertType extension doesn't allow code signing."));
+                            rb.getString("This.jar.contains.entries.whose.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing."));
                     }
 
                     if (hasUnsignedEntry) {
                         System.out.println(rb.getString(
-                            "This jar contains unsigned entries which have not been integrity-checked. "));
+                            "This.jar.contains.unsigned.entries.which.have.not.been.integrity.checked."));
                     }
                     if (hasExpiredCert) {
                         System.out.println(rb.getString(
-                            "This jar contains entries whose signer certificate has expired. "));
+                            "This.jar.contains.entries.whose.signer.certificate.has.expired."));
                     }
                     if (hasExpiringCert) {
                         System.out.println(rb.getString(
-                            "This jar contains entries whose signer certificate will expire within six months. "));
+                            "This.jar.contains.entries.whose.signer.certificate.will.expire.within.six.months."));
                     }
                     if (notYetValidCert) {
                         System.out.println(rb.getString(
-                            "This jar contains entries whose signer certificate is not yet valid. "));
+                            "This.jar.contains.entries.whose.signer.certificate.is.not.yet.valid."));
                     }
 
                     if (chainNotValidated) {
                         System.out.println(
-                                rb.getString("This jar contains entries whose certificate chain is not validated."));
+                                rb.getString("This.jar.contains.entries.whose.certificate.chain.is.not.validated."));
                     }
 
                     if (notSignedByAlias) {
                         System.out.println(
-                                rb.getString("This jar contains signed entries which is not signed by the specified alias(es)."));
+                                rb.getString("This.jar.contains.signed.entries.which.is.not.signed.by.the.specified.alias.es."));
                     }
 
                     if (aliasNotInStore) {
-                        System.out.println(rb.getString("This jar contains signed entries that's not signed by alias in this keystore."));
+                        System.out.println(rb.getString("This.jar.contains.signed.entries.that.s.not.signed.by.alias.in.this.keystore."));
                     }
                     if (! (verbose != null && showcerts)) {
                         System.out.println();
                         System.out.println(rb.getString(
-                            "Re-run with the -verbose and -certs options for more details."));
+                            "Re.run.with.the.verbose.and.certs.options.for.more.details."));
                     }
                 }
             }
             return;
         } catch (Exception e) {
-            System.out.println(rb.getString("jarsigner: ") + e);
+            System.out.println(rb.getString("jarsigner.") + e);
             if (debug) {
                 e.printStackTrace();
             }
@@ -895,13 +892,13 @@
         long now) {
 
         StringBuilder certStr = new StringBuilder();
-        String space = rb.getString(" ");
+        String space = rb.getString("SPACE");
         X509Certificate x509Cert = null;
 
         if (c instanceof X509Certificate) {
             x509Cert = (X509Certificate) c;
             certStr.append(tab).append(x509Cert.getType())
-                .append(rb.getString(", "))
+                .append(rb.getString("COMMA"))
                 .append(x509Cert.getSubjectDN().getName());
         } else {
             certStr.append(tab).append(c.getType());
@@ -927,7 +924,7 @@
 
                     if (expiringTimeForm == null) {
                         expiringTimeForm = new MessageFormat(
-                            rb.getString("certificate will expire on"));
+                            rb.getString("certificate.will.expire.on"));
                     }
                     Object[] source = { notAfter };
                     certStr.append(expiringTimeForm.format(source));
@@ -935,7 +932,7 @@
                 } else {
                     if (validityTimeForm == null) {
                         validityTimeForm = new MessageFormat(
-                            rb.getString("certificate is valid from"));
+                            rb.getString("certificate.is.valid.from"));
                     }
                     Object[] source = { x509Cert.getNotBefore(), notAfter };
                     certStr.append(validityTimeForm.format(source));
@@ -945,7 +942,7 @@
 
                 if (expiredTimeForm == null) {
                     expiredTimeForm = new MessageFormat(
-                        rb.getString("certificate expired on"));
+                        rb.getString("certificate.expired.on"));
                 }
                 Object[] source = { notAfter };
                 certStr.append(expiredTimeForm.format(source));
@@ -955,7 +952,7 @@
 
                 if (notYetTimeForm == null) {
                     notYetTimeForm = new MessageFormat(
-                        rb.getString("certificate is not valid until"));
+                        rb.getString("certificate.is.not.valid.until"));
                 }
                 Object[] source = { x509Cert.getNotBefore() };
                 certStr.append(notYetTimeForm.format(source));
@@ -979,7 +976,7 @@
                 }
                 certStr.append("\n").append(tab)
                         .append(MessageFormat.format(rb.getString(
-                        "[{0} extension does not support code signing]"), x));
+                        ".{0}.extension.does.not.support.code.signing."), x));
             }
         }
         return certStr.toString();
@@ -991,7 +988,7 @@
 
         if (signTimeForm == null) {
             signTimeForm =
-                new MessageFormat(rb.getString("entry was signed on"));
+                new MessageFormat(rb.getString("entry.was.signed.on"));
         }
         Object[] source = { timestamp.getTimestamp() };
 
@@ -1093,7 +1090,7 @@
                 } else {
                  throw new
                    RuntimeException(rb.getString
-                        ("signature filename must consist of the following characters: A-Z, 0-9, _ or -"));
+                        ("signature.filename.must.consist.of.the.following.characters.A.Z.0.9.or."));
                 }
             }
             tmpSigFile.append(c);
@@ -1112,14 +1109,14 @@
         try {
             zipFile = new ZipFile(jarName);
         } catch (IOException ioe) {
-            error(rb.getString("unable to open jar file: ")+jarName, ioe);
+            error(rb.getString("unable.to.open.jar.file.")+jarName, ioe);
         }
 
         FileOutputStream fos = null;
         try {
             fos = new FileOutputStream(signedJarFile);
         } catch (IOException ioe) {
-            error(rb.getString("unable to create: ")+tmpJarName, ioe);
+            error(rb.getString("unable.to.create.")+tmpJarName, ioe);
         }
 
         PrintStream ps = new PrintStream(fos);
@@ -1263,10 +1260,10 @@
             }
             if (verbose != null) {
                 if (mfCreated) {
-                    System.out.println(rb.getString("   adding: ") +
+                    System.out.println(rb.getString(".adding.") +
                                         mfFile.getName());
                 } else if (mfModified) {
-                    System.out.println(rb.getString(" updating: ") +
+                    System.out.println(rb.getString(".updating.") +
                                         mfFile.getName());
                 }
             }
@@ -1291,10 +1288,10 @@
                         zipFile);
             } catch (SocketTimeoutException e) {
                 // Provide a helpful message when TSA is beyond a firewall
-                error(rb.getString("unable to sign jar: ") +
-                rb.getString("no response from the Timestamping Authority. ") +
-                rb.getString("When connecting from behind a firewall then an HTTP proxy may need to be specified. ") +
-                rb.getString("Supply the following options to jarsigner: ") +
+                error(rb.getString("unable.to.sign.jar.") +
+                rb.getString("no.response.from.the.Timestamping.Authority.") +
+                rb.getString("When.connecting.from.behind.a.firewall.then.an.HTTP.proxy.may.need.to.be.specified.") +
+                rb.getString("Supply.the.following.options.to.jarsigner.") +
                 "\n  -J-Dhttp.proxyHost=<hostname> " +
                 "\n  -J-Dhttp.proxyPort=<portnumber> ", e);
             }
@@ -1314,10 +1311,10 @@
             sf.write(zos);
             if (verbose != null) {
                 if (zipFile.getEntry(sfFilename) != null) {
-                    System.out.println(rb.getString(" updating: ") +
+                    System.out.println(rb.getString(".updating.") +
                                 sfFilename);
                 } else {
-                    System.out.println(rb.getString("   adding: ") +
+                    System.out.println(rb.getString(".adding.") +
                                 sfFilename);
                 }
             }
@@ -1325,24 +1322,24 @@
             if (verbose != null) {
                 if (tsaUrl != null || tsaCert != null) {
                     System.out.println(
-                        rb.getString("requesting a signature timestamp"));
+                        rb.getString("requesting.a.signature.timestamp"));
                 }
                 if (tsaUrl != null) {
-                    System.out.println(rb.getString("TSA location: ") + tsaUrl);
+                    System.out.println(rb.getString("TSA.location.") + tsaUrl);
                 }
                 if (tsaCert != null) {
                     String certUrl =
                         TimestampedSigner.getTimestampingUrl(tsaCert);
                     if (certUrl != null) {
-                        System.out.println(rb.getString("TSA location: ") +
+                        System.out.println(rb.getString("TSA.location.") +
                             certUrl);
                     }
-                    System.out.println(rb.getString("TSA certificate: ") +
+                    System.out.println(rb.getString("TSA.certificate.") +
                         printCert("", tsaCert, false, 0));
                 }
                 if (signingMechanism != null) {
                     System.out.println(
-                        rb.getString("using an alternative signing mechanism"));
+                        rb.getString("using.an.alternative.signing.mechanism"));
                 }
             }
 
@@ -1351,10 +1348,10 @@
             block.write(zos);
             if (verbose != null) {
                 if (zipFile.getEntry(bkFilename) != null) {
-                    System.out.println(rb.getString(" updating: ") +
+                    System.out.println(rb.getString(".updating.") +
                         bkFilename);
                 } else {
-                    System.out.println(rb.getString("   adding: ") +
+                    System.out.println(rb.getString(".adding.") +
                         bkFilename);
                 }
             }
@@ -1378,17 +1375,17 @@
                 if (!ze.getName().startsWith(META_INF)) {
                     if (verbose != null) {
                         if (manifest.getAttributes(ze.getName()) != null)
-                          System.out.println(rb.getString("  signing: ") +
+                          System.out.println(rb.getString(".signing.") +
                                 ze.getName());
                         else
-                          System.out.println(rb.getString("   adding: ") +
+                          System.out.println(rb.getString(".adding.") +
                                 ze.getName());
                     }
                     writeEntry(zipFile, zos, ze);
                 }
             }
         } catch(IOException ioe) {
-            error(rb.getString("unable to sign jar: ")+ioe, ioe);
+            error(rb.getString("unable.to.sign.jar.")+ioe, ioe);
         } finally {
             // close the resouces
             if (zipFile != null) {
@@ -1416,13 +1413,13 @@
                             origJar.delete();
                         } else {
                             MessageFormat form = new MessageFormat(rb.getString
-                        ("attempt to rename signedJarFile to jarFile failed"));
+                        ("attempt.to.rename.signedJarFile.to.jarFile.failed"));
                             Object[] source = {signedJarFile, jarFile};
                             error(form.format(source));
                         }
                     } else {
                         MessageFormat form = new MessageFormat(rb.getString
-                            ("attempt to rename jarFile to origJar failed"));
+                            ("attempt.to.rename.jarFile.to.origJar.failed"));
                         Object[] source = {jarFile, origJar};
                         error(form.format(source));
                     }
@@ -1434,43 +1431,43 @@
                     || badNetscapeCertType || chainNotValidated) {
                 System.out.println();
 
-                System.out.println(rb.getString("Warning: "));
+                System.out.println(rb.getString("Warning."));
                 if (badKeyUsage) {
                     System.out.println(
-                        rb.getString("The signer certificate's KeyUsage extension doesn't allow code signing."));
+                        rb.getString("The.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing."));
                 }
 
                 if (badExtendedKeyUsage) {
                     System.out.println(
-                        rb.getString("The signer certificate's ExtendedKeyUsage extension doesn't allow code signing."));
+                        rb.getString("The.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing."));
                 }
 
                 if (badNetscapeCertType) {
                     System.out.println(
-                        rb.getString("The signer certificate's NetscapeCertType extension doesn't allow code signing."));
+                        rb.getString("The.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing."));
                 }
 
                 if (hasExpiredCert) {
                     System.out.println(
-                        rb.getString("The signer certificate has expired."));
+                        rb.getString("The.signer.certificate.has.expired."));
                 } else if (hasExpiringCert) {
                     System.out.println(
-                        rb.getString("The signer certificate will expire within six months."));
+                        rb.getString("The.signer.certificate.will.expire.within.six.months."));
                 } else if (notYetValidCert) {
                     System.out.println(
-                        rb.getString("The signer certificate is not yet valid."));
+                        rb.getString("The.signer.certificate.is.not.yet.valid."));
                 }
 
                 if (chainNotValidated) {
                     System.out.println(
-                            rb.getString("The signer's certificate chain is not validated."));
+                            rb.getString("The.signer.s.certificate.chain.is.not.validated."));
                 }
             }
 
         // no IOException thrown in the above try clause, so disable
         // the catch clause.
         // } catch(IOException ioe) {
-        //     error(rb.getString("unable to sign jar: ")+ioe, ioe);
+        //     error(rb.getString("unable.to.sign.jar.")+ioe, ioe);
         // }
     }
 
@@ -1557,7 +1554,7 @@
             validator.validate(cp, pkixParameters);
         } catch (Exception e) {
             chainNotValidated = true;
-            s.append(tab + rb.getString("[CertPath not validated: ") +
+            s.append(tab + rb.getString(".CertPath.not.validated.") +
                     e.getLocalizedMessage() + "]\n");   // TODO
         }
         String result = s.toString();
@@ -1624,10 +1621,10 @@
             if (token && storepass == null && !protectedPath
                     && !KeyStoreUtil.isWindowsKeyStore(storetype)) {
                 storepass = getPass
-                        (rb.getString("Enter Passphrase for keystore: "));
+                        (rb.getString("Enter.Passphrase.for.keystore."));
             } else if (!token && storepass == null && prompt) {
                 storepass = getPass
-                        (rb.getString("Enter Passphrase for keystore: "));
+                        (rb.getString("Enter.Passphrase.for.keystore."));
             }
 
             if (nullStream) {
@@ -1694,20 +1691,20 @@
                 // Only if tas is empty
             }
         } catch (IOException ioe) {
-            throw new RuntimeException(rb.getString("keystore load: ") +
+            throw new RuntimeException(rb.getString("keystore.load.") +
                                         ioe.getMessage());
         } catch (java.security.cert.CertificateException ce) {
-            throw new RuntimeException(rb.getString("certificate exception: ") +
+            throw new RuntimeException(rb.getString("certificate.exception.") +
                                         ce.getMessage());
         } catch (NoSuchProviderException pe) {
-            throw new RuntimeException(rb.getString("keystore load: ") +
+            throw new RuntimeException(rb.getString("keystore.load.") +
                                         pe.getMessage());
         } catch (NoSuchAlgorithmException nsae) {
-            throw new RuntimeException(rb.getString("keystore load: ") +
+            throw new RuntimeException(rb.getString("keystore.load.") +
                                         nsae.getMessage());
         } catch (KeyStoreException kse) {
             throw new RuntimeException
-                (rb.getString("unable to instantiate keystore class: ") +
+                (rb.getString("unable.to.instantiate.keystore.class.") +
                 kse.getMessage());
         }
     }
@@ -1723,7 +1720,7 @@
         }
         if (cs == null || (!(cs instanceof X509Certificate))) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("Certificate not found for: alias.  alias must reference a valid KeyStore entry containing an X.509 public key certificate for the Timestamping Authority."));
+                ("Certificate.not.found.for.alias.alias.must.reference.a.valid.KeyStore.entry.containing.an.X.509.public.key.certificate.for.the"));
             Object[] source = {alias, alias};
             error(form.format(source));
         }
@@ -1816,9 +1813,9 @@
                             generateCertificates(new FileInputStream(altCertChain)).
                             toArray(new Certificate[0]);
                 } catch (CertificateException ex) {
-                    error(rb.getString("Cannot restore certchain from file specified"));
+                    error(rb.getString("Cannot.restore.certchain.from.file.specified"));
                 } catch (FileNotFoundException ex) {
-                    error(rb.getString("File specified by -certchain does not exist"));
+                    error(rb.getString("File.specified.by.certchain.does.not.exist"));
                 }
             } else {
                 try {
@@ -1830,12 +1827,10 @@
             if (cs == null || cs.length == 0) {
                 if (altCertChain != null) {
                     error(rb.getString
-                            ("Certificate chain not found in the file specified."));
+                            ("Certificate.chain.not.found.in.the.file.specified."));
                 } else {
                     MessageFormat form = new MessageFormat(rb.getString
-                        ("Certificate chain not found for: alias.  alias must" +
-                        " reference a valid KeyStore key entry containing a" +
-                        " private key and corresponding public key certificate chain."));
+                        ("Certificate.chain.not.found.for.alias.alias.must.reference.a.valid.KeyStore.key.entry.containing.a.private.key.and"));
                     Object[] source = {alias, alias};
                     error(form.format(source));
                 }
@@ -1845,7 +1840,7 @@
             for (int i=0; i<cs.length; i++) {
                 if (!(cs[i] instanceof X509Certificate)) {
                     error(rb.getString
-                        ("found non-X.509 certificate in signer's chain"));
+                        ("found.non.X.509.certificate.in.signer.s.chain"));
                 }
                 certChain[i] = (X509Certificate)cs[i];
             }
@@ -1872,7 +1867,7 @@
                 } else if (keypass == null) {
                     // Did not work out, so prompt user for key password
                     MessageFormat form = new MessageFormat(rb.getString
-                        ("Enter key password for alias: "));
+                        ("Enter.key.password.for.alias."));
                     Object[] source = {alias};
                     keypass = getPass(form.format(source));
                     key = store.getKey(alias, keypass);
@@ -1881,14 +1876,14 @@
         } catch (NoSuchAlgorithmException e) {
             error(e.getMessage());
         } catch (UnrecoverableKeyException e) {
-            error(rb.getString("unable to recover key from keystore"));
+            error(rb.getString("unable.to.recover.key.from.keystore"));
         } catch (KeyStoreException kse) {
             // this never happens, because keystore has been loaded
         }
 
         if (!(key instanceof PrivateKey)) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("key associated with alias not a private key"));
+                ("key.associated.with.alias.not.a.private.key"));
             Object[] source = {alias};
             error(form.format(source));
         } else {
@@ -1898,14 +1893,14 @@
 
     void error(String message)
     {
-        System.out.println(rb.getString("jarsigner: ")+message);
+        System.out.println(rb.getString("jarsigner.")+message);
         System.exit(1);
     }
 
 
     void error(String message, Exception e)
     {
-        System.out.println(rb.getString("jarsigner: ")+message);
+        System.out.println(rb.getString("jarsigner.")+message);
         if (debug) {
             e.printStackTrace();
         }
@@ -1920,12 +1915,12 @@
             char[] pass = Password.readPassword(System.in);
 
             if (pass == null) {
-                error(rb.getString("you must enter key password"));
+                error(rb.getString("you.must.enter.key.password"));
             } else {
                 return pass;
             }
         } catch (IOException ioe) {
-            error(rb.getString("unable to read password: ")+ioe.getMessage());
+            error(rb.getString("unable.to.read.password.")+ioe.getMessage());
         }
         // this shouldn't happen
         return null;
@@ -2113,7 +2108,7 @@
         Object signer = signerClass.newInstance();
         if (!(signer instanceof ContentSigner)) {
             MessageFormat form = new MessageFormat(
-                rb.getString("signerClass is not a signing mechanism"));
+                rb.getString("signerClass.is.not.a.signing.mechanism"));
             Object[] source = {signerClass.getName()};
             throw new IllegalArgumentException(form.format(source));
         }
--- a/jdk/src/share/classes/sun/security/tools/JarSignerResources.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/tools/JarSignerResources.java	Thu Nov 11 15:51:12 2010 +0800
@@ -35,201 +35,201 @@
     private static final Object[][] contents = {
 
         // shared (from jarsigner)
-        {" ", " "},
-        {"  ", "  "},
-        {"      ", "      "},
-        {", ", ", "},
+        {"SPACE", " "},
+        {"2SPACE", "  "},
+        {"6SPACE", "      "},
+        {"COMMA", ", "},
 
-        {"provName not a provider", "{0} not a provider"},
-        {"signerClass is not a signing mechanism", "{0} is not a signing mechanism"},
-        {"jarsigner error: ", "jarsigner error: "},
-        {"Illegal option: ", "Illegal option: "},
-        {"-keystore must be NONE if -storetype is {0}",
+        {"provName.not.a.provider", "{0} not a provider"},
+        {"signerClass.is.not.a.signing.mechanism", "{0} is not a signing mechanism"},
+        {"jarsigner.error.", "jarsigner error: "},
+        {"Illegal.option.", "Illegal option: "},
+        {".keystore.must.be.NONE.if.storetype.is.{0}",
                 "-keystore must be NONE if -storetype is {0}"},
-        {"-keypass can not be specified if -storetype is {0}",
+        {".keypass.can.not.be.specified.if.storetype.is.{0}",
                 "-keypass can not be specified if -storetype is {0}"},
-        {"If -protected is specified, then -storepass and -keypass must not be specified",
+        {"If.protected.is.specified.then.storepass.and.keypass.must.not.be.specified",
                 "If -protected is specified, then -storepass and -keypass must not be specified"},
-        {"If keystore is not password protected, then -storepass and -keypass must not be specified",
+        {"If.keystore.is.not.password.protected.then.storepass.and.keypass.must.not.be.specified",
                  "If keystore is not password protected, then -storepass and -keypass must not be specified"},
-        {"Usage: jarsigner [options] jar-file alias",
+        {"Usage.jarsigner.options.jar.file.alias",
                 "Usage: jarsigner [options] jar-file alias"},
-        {"       jarsigner -verify [options] jar-file [alias...]",
+        {".jarsigner.verify.options.jar.file.alias.",
                 "       jarsigner -verify [options] jar-file [alias...]"},
-        {"[-keystore <url>]           keystore location",
+        {".keystore.url.keystore.location",
                 "[-keystore <url>]           keystore location"},
-        {"[-storepass <password>]     password for keystore integrity",
+        {".storepass.password.password.for.keystore.integrity",
             "[-storepass <password>]     password for keystore integrity"},
-        {"[-storetype <type>]         keystore type",
+        {".storetype.type.keystore.type",
                 "[-storetype <type>]         keystore type"},
-        {"[-keypass <password>]       password for private key (if different)",
+        {".keypass.password.password.for.private.key.if.different.",
                 "[-keypass <password>]       password for private key (if different)"},
-        {"[-certchain <file>]         name of alternative certchain file",
+        {".certchain.file.name.of.alternative.certchain.file",
                 "[-certchain <file>]         name of alternative certchain file"},
-        {"[-sigfile <file>]           name of .SF/.DSA file",
+        {".sigfile.file.name.of.SF.DSA.file",
                 "[-sigfile <file>]           name of .SF/.DSA file"},
-        {"[-signedjar <file>]         name of signed JAR file",
+        {".signedjar.file.name.of.signed.JAR.file",
                 "[-signedjar <file>]         name of signed JAR file"},
-        {"[-digestalg <algorithm>]    name of digest algorithm",
+        {".digestalg.algorithm.name.of.digest.algorithm",
                 "[-digestalg <algorithm>]    name of digest algorithm"},
-        {"[-sigalg <algorithm>]       name of signature algorithm",
+        {".sigalg.algorithm.name.of.signature.algorithm",
                 "[-sigalg <algorithm>]       name of signature algorithm"},
-        {"[-crl[:auto| <file>]        include CRL in signed jar",
+        {".crl.auto.file.include.CRL.in.signed.jar",
                 "[-crl[:auto| <file>]        include CRL in signed jar"},
-        {"[-verify]                   verify a signed JAR file",
+        {".verify.verify.a.signed.JAR.file",
                 "[-verify]                   verify a signed JAR file"},
-        {"[-verbose[:suboptions]]     verbose output when signing/verifying.",
+        {".verbose.suboptions.verbose.output.when.signing.verifying.",
                 "[-verbose[:suboptions]]     verbose output when signing/verifying."},
-        {"                            suboptions can be all, grouped or summary",
+        {".suboptions.can.be.all.grouped.or.summary",
                 "                            suboptions can be all, grouped or summary"},
-        {"[-certs]                    display certificates when verbose and verifying",
+        {".certs.display.certificates.when.verbose.and.verifying",
                 "[-certs]                    display certificates when verbose and verifying"},
-        {"[-tsa <url>]                location of the Timestamping Authority",
+        {".tsa.url.location.of.the.Timestamping.Authority",
                 "[-tsa <url>]                location of the Timestamping Authority"},
-        {"[-tsacert <alias>]          public key certificate for Timestamping Authority",
+        {".tsacert.alias.public.key.certificate.for.Timestamping.Authority",
                 "[-tsacert <alias>]          public key certificate for Timestamping Authority"},
-        {"[-altsigner <class>]        class name of an alternative signing mechanism",
+        {".altsigner.class.class.name.of.an.alternative.signing.mechanism",
                 "[-altsigner <class>]        class name of an alternative signing mechanism"},
-        {"[-altsignerpath <pathlist>] location of an alternative signing mechanism",
+        {".altsignerpath.pathlist.location.of.an.alternative.signing.mechanism",
                 "[-altsignerpath <pathlist>] location of an alternative signing mechanism"},
-        {"[-internalsf]               include the .SF file inside the signature block",
+        {".internalsf.include.the.SF.file.inside.the.signature.block",
                 "[-internalsf]               include the .SF file inside the signature block"},
-        {"[-sectionsonly]             don't compute hash of entire manifest",
+        {".sectionsonly.don.t.compute.hash.of.entire.manifest",
                 "[-sectionsonly]             don't compute hash of entire manifest"},
-        {"[-protected]                keystore has protected authentication path",
+        {".protected.keystore.has.protected.authentication.path",
                 "[-protected]                keystore has protected authentication path"},
-        {"[-providerName <name>]      provider name",
+        {".providerName.name.provider.name",
                 "[-providerName <name>]      provider name"},
-        {"[-providerClass <class>     name of cryptographic service provider's",
+        {".providerClass.class.name.of.cryptographic.service.provider.s",
                 "[-providerClass <class>     name of cryptographic service provider's"},
-        {"  [-providerArg <arg>]] ... master class file and constructor argument",
+        {".providerArg.arg.master.class.file.and.constructor.argument",
                 "  [-providerArg <arg>]] ... master class file and constructor argument"},
-        {"[-strict]                   treat warnings as errors",
+        {".strict.treat.warnings.as.errors",
                 "[-strict]                   treat warnings as errors"},
-        {"Option lacks argument", "Option lacks argument"},
-        {"Please type jarsigner -help for usage", "Please type jarsigner -help for usage"},
-        {"Please specify jarfile name", "Please specify jarfile name"},
-        {"Please specify alias name", "Please specify alias name"},
-        {"Only one alias can be specified", "Only one alias can be specified"},
-        {"This jar contains signed entries which is not signed by the specified alias(es).",
+        {"Option.lacks.argument", "Option lacks argument"},
+        {"Please.type.jarsigner.help.for.usage", "Please type jarsigner -help for usage"},
+        {"Please.specify.jarfile.name", "Please specify jarfile name"},
+        {"Please.specify.alias.name", "Please specify alias name"},
+        {"Only.one.alias.can.be.specified", "Only one alias can be specified"},
+        {"This.jar.contains.signed.entries.which.is.not.signed.by.the.specified.alias.es.",
                  "This jar contains signed entries which is not signed by the specified alias(es)."},
-        {"This jar contains signed entries that's not signed by alias in this keystore.",
+        {"This.jar.contains.signed.entries.that.s.not.signed.by.alias.in.this.keystore.",
                   "This jar contains signed entries that's not signed by alias in this keystore."},
         {"s", "s"},
         {"m", "m"},
         {"k", "k"},
         {"i", "i"},
-        {"(and %d more)", "(and %d more)"},
-        {"  s = signature was verified ",
+        {".and.d.more.", "(and %d more)"},
+        {".s.signature.was.verified.",
                 "  s = signature was verified "},
-        {"  m = entry is listed in manifest",
+        {".m.entry.is.listed.in.manifest",
                 "  m = entry is listed in manifest"},
-        {"  k = at least one certificate was found in keystore",
+        {".k.at.least.one.certificate.was.found.in.keystore",
                 "  k = at least one certificate was found in keystore"},
-        {"  i = at least one certificate was found in identity scope",
+        {".i.at.least.one.certificate.was.found.in.identity.scope",
                 "  i = at least one certificate was found in identity scope"},
-        {"  X = not signed by specified alias(es)",
+        {".X.not.signed.by.specified.alias.es.",
                 "  X = not signed by specified alias(es)"},
-        {"no manifest.", "no manifest."},
-        {"(Signature related entries)","(Signature related entries)"},
-        {"(Unsigned entries)", "(Unsigned entries)"},
-        {"jar is unsigned. (signatures missing or not parsable)",
+        {"no.manifest.", "no manifest."},
+        {".Signature.related.entries.","(Signature related entries)"},
+        {".Unsigned.entries.", "(Unsigned entries)"},
+        {"jar.is.unsigned.signatures.missing.or.not.parsable.",
                 "jar is unsigned. (signatures missing or not parsable)"},
-        {"jar verified.", "jar verified."},
-        {"jarsigner: ", "jarsigner: "},
-        {"signature filename must consist of the following characters: A-Z, 0-9, _ or -",
+        {"jar.verified.", "jar verified."},
+        {"jarsigner.", "jarsigner: "},
+        {"signature.filename.must.consist.of.the.following.characters.A.Z.0.9.or.",
                 "signature filename must consist of the following characters: A-Z, 0-9, _ or -"},
-        {"unable to open jar file: ", "unable to open jar file: "},
-        {"unable to create: ", "unable to create: "},
-        {"   adding: ", "   adding: "},
-        {" updating: ", " updating: "},
-        {"  signing: ", "  signing: "},
-        {"attempt to rename signedJarFile to jarFile failed",
+        {"unable.to.open.jar.file.", "unable to open jar file: "},
+        {"unable.to.create.", "unable to create: "},
+        {".adding.", "   adding: "},
+        {".updating.", " updating: "},
+        {".signing.", "  signing: "},
+        {"attempt.to.rename.signedJarFile.to.jarFile.failed",
                 "attempt to rename {0} to {1} failed"},
-        {"attempt to rename jarFile to origJar failed",
+        {"attempt.to.rename.jarFile.to.origJar.failed",
                 "attempt to rename {0} to {1} failed"},
-        {"unable to sign jar: ", "unable to sign jar: "},
-        {"Enter Passphrase for keystore: ", "Enter Passphrase for keystore: "},
-        {"keystore load: ", "keystore load: "},
-        {"certificate exception: ", "certificate exception: "},
-        {"unable to instantiate keystore class: ",
+        {"unable.to.sign.jar.", "unable to sign jar: "},
+        {"Enter.Passphrase.for.keystore.", "Enter Passphrase for keystore: "},
+        {"keystore.load.", "keystore load: "},
+        {"certificate.exception.", "certificate exception: "},
+        {"unable.to.instantiate.keystore.class.",
                 "unable to instantiate keystore class: "},
-        {"Certificate chain not found for: alias.  alias must reference a valid KeyStore key entry containing a private key and corresponding public key certificate chain.",
+        {"Certificate.chain.not.found.for.alias.alias.must.reference.a.valid.KeyStore.key.entry.containing.a.private.key.and",
                 "Certificate chain not found for: {0}.  {1} must reference a valid KeyStore key entry containing a private key and corresponding public key certificate chain."},
-        {"File specified by -certchain does not exist",
+        {"File.specified.by.certchain.does.not.exist",
                 "File specified by -certchain does not exist"},
-        {"Cannot restore certchain from file specified",
+        {"Cannot.restore.certchain.from.file.specified",
                 "Cannot restore certchain from file specified"},
-        {"Certificate chain not found in the file specified.",
+        {"Certificate.chain.not.found.in.the.file.specified.",
                 "Certificate chain not found in the file specified."},
-        {"found non-X.509 certificate in signer's chain",
+        {"found.non.X.509.certificate.in.signer.s.chain",
                 "found non-X.509 certificate in signer's chain"},
-        {"incomplete certificate chain", "incomplete certificate chain"},
-        {"Enter key password for alias: ", "Enter key password for {0}: "},
-        {"unable to recover key from keystore",
+        {"incomplete.certificate.chain", "incomplete certificate chain"},
+        {"Enter.key.password.for.alias.", "Enter key password for {0}: "},
+        {"unable.to.recover.key.from.keystore",
                 "unable to recover key from keystore"},
-        {"key associated with alias not a private key",
+        {"key.associated.with.alias.not.a.private.key",
                 "key associated with {0} not a private key"},
-        {"you must enter key password", "you must enter key password"},
-        {"unable to read password: ", "unable to read password: "},
-        {"certificate is valid from", "certificate is valid from {0} to {1}"},
-        {"certificate expired on", "certificate expired on {0}"},
-        {"certificate is not valid until",
+        {"you.must.enter.key.password", "you must enter key password"},
+        {"unable.to.read.password.", "unable to read password: "},
+        {"certificate.is.valid.from", "certificate is valid from {0} to {1}"},
+        {"certificate.expired.on", "certificate expired on {0}"},
+        {"certificate.is.not.valid.until",
                 "certificate is not valid until {0}"},
-        {"certificate will expire on", "certificate will expire on {0}"},
-        {"[CertPath not validated: ", "[CertPath not validated: "},
-        {"requesting a signature timestamp",
+        {"certificate.will.expire.on", "certificate will expire on {0}"},
+        {".CertPath.not.validated.", "[CertPath not validated: "},
+        {"requesting.a.signature.timestamp",
                 "requesting a signature timestamp"},
-        {"TSA location: ", "TSA location: "},
-        {"TSA certificate: ", "TSA certificate: "},
-        {"no response from the Timestamping Authority. ",
+        {"TSA.location.", "TSA location: "},
+        {"TSA.certificate.", "TSA certificate: "},
+        {"no.response.from.the.Timestamping.Authority.",
                 "no response from the Timestamping Authority. "},
-        {"When connecting from behind a firewall then an HTTP proxy may need to be specified. ",
+        {"When.connecting.from.behind.a.firewall.then.an.HTTP.proxy.may.need.to.be.specified.",
                 "When connecting from behind a firewall then an HTTP proxy may need to be specified. "},
-        {"Supply the following options to jarsigner: ",
+        {"Supply.the.following.options.to.jarsigner.",
                 "Supply the following options to jarsigner: "},
-        {"Certificate not found for: alias.  alias must reference a valid KeyStore entry containing an X.509 public key certificate for the Timestamping Authority.",
+        {"Certificate.not.found.for.alias.alias.must.reference.a.valid.KeyStore.entry.containing.an.X.509.public.key.certificate.for.the",
                 "Certificate not found for: {0}.  {1} must reference a valid KeyStore entry containing an X.509 public key certificate for the Timestamping Authority."},
-        {"using an alternative signing mechanism",
+        {"using.an.alternative.signing.mechanism",
                 "using an alternative signing mechanism"},
-        {"entry was signed on", "entry was signed on {0}"},
-        {"with a CRL including %d entries", "with a CRL including %d entries"},
-        {"Warning: ", "Warning: "},
-        {"This jar contains unsigned entries which have not been integrity-checked. ",
+        {"entry.was.signed.on", "entry was signed on {0}"},
+        {"with.a.CRL.including.d.entries", "with a CRL including %d entries"},
+        {"Warning.", "Warning: "},
+        {"This.jar.contains.unsigned.entries.which.have.not.been.integrity.checked.",
                 "This jar contains unsigned entries which have not been integrity-checked. "},
-        {"This jar contains entries whose signer certificate has expired. ",
+        {"This.jar.contains.entries.whose.signer.certificate.has.expired.",
                 "This jar contains entries whose signer certificate has expired. "},
-        {"This jar contains entries whose signer certificate will expire within six months. ",
+        {"This.jar.contains.entries.whose.signer.certificate.will.expire.within.six.months.",
                 "This jar contains entries whose signer certificate will expire within six months. "},
-        {"This jar contains entries whose signer certificate is not yet valid. ",
+        {"This.jar.contains.entries.whose.signer.certificate.is.not.yet.valid.",
                 "This jar contains entries whose signer certificate is not yet valid. "},
-        {"Re-run with the -verbose option for more details.",
+        {"Re.run.with.the.verbose.option.for.more.details.",
                 "Re-run with the -verbose option for more details."},
-        {"Re-run with the -verbose and -certs options for more details.",
+        {"Re.run.with.the.verbose.and.certs.options.for.more.details.",
                 "Re-run with the -verbose and -certs options for more details."},
-        {"The signer certificate has expired.",
+        {"The.signer.certificate.has.expired.",
                 "The signer certificate has expired."},
-        {"The signer certificate will expire within six months.",
+        {"The.signer.certificate.will.expire.within.six.months.",
                 "The signer certificate will expire within six months."},
-        {"The signer certificate is not yet valid.",
+        {"The.signer.certificate.is.not.yet.valid.",
                 "The signer certificate is not yet valid."},
-        {"The signer certificate's KeyUsage extension doesn't allow code signing.",
+        {"The.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing.",
                  "The signer certificate's KeyUsage extension doesn't allow code signing."},
-        {"The signer certificate's ExtendedKeyUsage extension doesn't allow code signing.",
+        {"The.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing.",
                  "The signer certificate's ExtendedKeyUsage extension doesn't allow code signing."},
-        {"The signer certificate's NetscapeCertType extension doesn't allow code signing.",
+        {"The.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing.",
                  "The signer certificate's NetscapeCertType extension doesn't allow code signing."},
-        {"This jar contains entries whose signer certificate's KeyUsage extension doesn't allow code signing.",
+        {"This.jar.contains.entries.whose.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing.",
                  "This jar contains entries whose signer certificate's KeyUsage extension doesn't allow code signing."},
-        {"This jar contains entries whose signer certificate's ExtendedKeyUsage extension doesn't allow code signing.",
+        {"This.jar.contains.entries.whose.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing.",
                  "This jar contains entries whose signer certificate's ExtendedKeyUsage extension doesn't allow code signing."},
-        {"This jar contains entries whose signer certificate's NetscapeCertType extension doesn't allow code signing.",
+        {"This.jar.contains.entries.whose.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing.",
                  "This jar contains entries whose signer certificate's NetscapeCertType extension doesn't allow code signing."},
-        {"[{0} extension does not support code signing]",
+        {".{0}.extension.does.not.support.code.signing.",
                  "[{0} extension does not support code signing]"},
-        {"The signer's certificate chain is not validated.",
+        {"The.signer.s.certificate.chain.is.not.validated.",
                 "The signer's certificate chain is not validated."},
-        {"This jar contains entries whose certificate chain is not validated.",
+        {"This.jar.contains.entries.whose.certificate.chain.is.not.validated.",
                  "This jar contains entries whose certificate chain is not validated."},
     };
 
--- a/jdk/src/share/classes/sun/security/tools/KeyTool.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/tools/KeyTool.java	Thu Nov 11 15:51:12 2010 +0800
@@ -160,82 +160,82 @@
     private List <String> v3ext = new ArrayList <String> ();
 
     enum Command {
-        CERTREQ("Generates a certificate request",
+        CERTREQ("Generates.a.certificate.request",
             ALIAS, SIGALG, FILEOUT, KEYPASS, KEYSTORE, DNAME,
             STOREPASS, STORETYPE, PROVIDERNAME, PROVIDERCLASS,
             PROVIDERARG, PROVIDERPATH, V, PROTECTED),
-        CHANGEALIAS("Changes an entry's alias",
+        CHANGEALIAS("Changes.an.entry.s.alias",
             ALIAS, DESTALIAS, KEYPASS, KEYSTORE, STOREPASS,
             STORETYPE, PROVIDERNAME, PROVIDERCLASS, PROVIDERARG,
             PROVIDERPATH, V, PROTECTED),
-        DELETE("Deletes an entry",
+        DELETE("Deletes.an.entry",
             ALIAS, KEYSTORE, STOREPASS, STORETYPE,
             PROVIDERNAME, PROVIDERCLASS, PROVIDERARG,
             PROVIDERPATH, V, PROTECTED),
-        EXPORTCERT("Exports certificate",
+        EXPORTCERT("Exports.certificate",
             RFC, ALIAS, FILEOUT, KEYSTORE, STOREPASS,
             STORETYPE, PROVIDERNAME, PROVIDERCLASS, PROVIDERARG,
             PROVIDERPATH, V, PROTECTED),
-        GENKEYPAIR("Generates a key pair",
+        GENKEYPAIR("Generates.a.key.pair",
             ALIAS, KEYALG, KEYSIZE, SIGALG, DESTALIAS, DNAME,
             STARTDATE, EXT, VALIDITY, KEYPASS, KEYSTORE,
             STOREPASS, STORETYPE, PROVIDERNAME, PROVIDERCLASS,
             PROVIDERARG, PROVIDERPATH, V, PROTECTED),
-        GENSECKEY("Generates a secret key",
+        GENSECKEY("Generates.a.secret.key",
             ALIAS, KEYPASS, KEYALG, KEYSIZE, KEYSTORE,
             STOREPASS, STORETYPE, PROVIDERNAME, PROVIDERCLASS,
             PROVIDERARG, PROVIDERPATH, V, PROTECTED),
-        GENCERT("Generates certificate from a certificate request",
+        GENCERT("Generates.certificate.from.a.certificate.request",
             RFC, INFILE, OUTFILE, ALIAS, SIGALG, DNAME,
             STARTDATE, EXT, VALIDITY, KEYPASS, KEYSTORE,
             STOREPASS, STORETYPE, PROVIDERNAME, PROVIDERCLASS,
             PROVIDERARG, PROVIDERPATH, V, PROTECTED),
-        IMPORTCERT("Imports a certificate or a certificate chain",
+        IMPORTCERT("Imports.a.certificate.or.a.certificate.chain",
             NOPROMPT, TRUSTCACERTS, PROTECTED, ALIAS, FILEIN,
             KEYPASS, KEYSTORE, STOREPASS, STORETYPE,
             PROVIDERNAME, PROVIDERCLASS, PROVIDERARG,
             PROVIDERPATH, V),
-        IMPORTKEYSTORE("Imports one or all entries from another keystore",
+        IMPORTKEYSTORE("Imports.one.or.all.entries.from.another.keystore",
             SRCKEYSTORE, DESTKEYSTORE, SRCSTORETYPE,
             DESTSTORETYPE, SRCSTOREPASS, DESTSTOREPASS,
             SRCPROTECTED, SRCPROVIDERNAME, DESTPROVIDERNAME,
             SRCALIAS, DESTALIAS, SRCKEYPASS, DESTKEYPASS,
             NOPROMPT, PROVIDERCLASS, PROVIDERARG, PROVIDERPATH,
             V),
-        KEYPASSWD("Changes the key password of an entry",
+        KEYPASSWD("Changes.the.key.password.of.an.entry",
             ALIAS, KEYPASS, NEW, KEYSTORE, STOREPASS,
             STORETYPE, PROVIDERNAME, PROVIDERCLASS, PROVIDERARG,
             PROVIDERPATH, V),
-        LIST("Lists entries in a keystore",
+        LIST("Lists.entries.in.a.keystore",
             RFC, ALIAS, KEYSTORE, STOREPASS, STORETYPE,
             PROVIDERNAME, PROVIDERCLASS, PROVIDERARG,
             PROVIDERPATH, V, PROTECTED),
-        PRINTCERT("Prints the content of a certificate",
+        PRINTCERT("Prints.the.content.of.a.certificate",
             RFC, FILEIN, SSLSERVER, JARFILE, V),
-        PRINTCERTREQ("Prints the content of a certificate request",
+        PRINTCERTREQ("Prints.the.content.of.a.certificate.request",
             FILEIN, V),
-        PRINTCRL("Prints the content of a CRL file",
+        PRINTCRL("Prints.the.content.of.a.CRL.file",
             FILEIN, V),
-        STOREPASSWD("Changes the store password of a keystore",
+        STOREPASSWD("Changes.the.store.password.of.a.keystore",
             NEW, KEYSTORE, STOREPASS, STORETYPE, PROVIDERNAME,
             PROVIDERCLASS, PROVIDERARG, PROVIDERPATH, V),
 
         // Undocumented start here, KEYCLONE is used a marker in -help;
 
-        KEYCLONE("Clones a key entry",
+        KEYCLONE("Clones.a.key.entry",
             ALIAS, DESTALIAS, KEYPASS, NEW, STORETYPE,
             KEYSTORE, STOREPASS, PROVIDERNAME, PROVIDERCLASS,
             PROVIDERARG, PROVIDERPATH, V),
-        SELFCERT("Generates a self-signed certificate",
+        SELFCERT("Generates.a.self.signed.certificate",
             ALIAS, SIGALG, DNAME, STARTDATE, VALIDITY, KEYPASS,
             STORETYPE, KEYSTORE, STOREPASS, PROVIDERNAME,
             PROVIDERCLASS, PROVIDERARG, PROVIDERPATH, V),
-        GENCRL("Generates CRL",
+        GENCRL("Generates.CRL",
             RFC, FILEOUT, ID,
             ALIAS, SIGALG, EXT, KEYPASS, KEYSTORE,
             STOREPASS, STORETYPE, PROVIDERNAME, PROVIDERCLASS,
             PROVIDERARG, PROVIDERPATH, V, PROTECTED),
-        IDENTITYDB("Imports entries from a JDK 1.1.x-style identity database",
+        IDENTITYDB("Imports.entries.from.a.JDK.1.1.x.style.identity.database",
             FILEIN, STORETYPE, KEYSTORE, STOREPASS, PROVIDERNAME,
             PROVIDERCLASS, PROVIDERARG, PROVIDERPATH, V);
 
@@ -252,49 +252,49 @@
     };
 
     enum Option {
-        ALIAS("alias", "<alias>", "alias name of the entry to process"),
-        DESTALIAS("destalias", "<destalias>", "destination alias"),
-        DESTKEYPASS("destkeypass", "<arg>", "destination key password"),
-        DESTKEYSTORE("destkeystore", "<destkeystore>", "destination keystore name"),
-        DESTPROTECTED("destprotected", null, "destination keystore password protected"),
-        DESTPROVIDERNAME("destprovidername", "<destprovidername>", "destination keystore provider name"),
-        DESTSTOREPASS("deststorepass", "<arg>", "destination keystore password"),
-        DESTSTORETYPE("deststoretype", "<deststoretype>", "destination keystore type"),
-        DNAME("dname", "<dname>", "distinguished name"),
-        EXT("ext", "<value>", "X.509 extension"),
-        FILEOUT("file", "<filename>", "output file name"),
-        FILEIN("file", "<filename>", "input file name"),
-        ID("id", "<id:reason>", "Serial ID of cert to revoke"),
-        INFILE("infile", "<filename>", "input file name"),
-        KEYALG("keyalg", "<keyalg>", "key algorithm name"),
-        KEYPASS("keypass", "<arg>", "key password"),
-        KEYSIZE("keysize", "<keysize>", "key bit size"),
-        KEYSTORE("keystore", "<keystore>", "keystore name"),
-        NEW("new", "<arg>", "new password"),
-        NOPROMPT("noprompt", null, "do not prompt"),
-        OUTFILE("outfile", "<filename>", "output file name"),
-        PROTECTED("protected", null, "password through protected mechanism"),
-        PROVIDERARG("providerarg", "<arg>", "provider argument"),
-        PROVIDERCLASS("providerclass", "<providerclass>", "provider class name"),
-        PROVIDERNAME("providername", "<providername>", "provider name"),
-        PROVIDERPATH("providerpath", "<pathlist>", "provider classpath"),
-        RFC("rfc", null, "output in RFC style"),
-        SIGALG("sigalg", "<sigalg>", "signature algorithm name"),
-        SRCALIAS("srcalias", "<srcalias>", "source alias"),
-        SRCKEYPASS("srckeypass", "<arg>", "source key password"),
-        SRCKEYSTORE("srckeystore", "<srckeystore>", "source keystore name"),
-        SRCPROTECTED("srcprotected", null, "source keystore password protected"),
-        SRCPROVIDERNAME("srcprovidername", "<srcprovidername>", "source keystore provider name"),
-        SRCSTOREPASS("srcstorepass", "<arg>", "source keystore password"),
-        SRCSTORETYPE("srcstoretype", "<srcstoretype>", "source keystore type"),
-        SSLSERVER("sslserver", "<server[:port]>", "SSL server host and port"),
-        JARFILE("jarfile", "<filename>", "signed jar file"),
-        STARTDATE("startdate", "<startdate>", "certificate validity start date/time"),
-        STOREPASS("storepass", "<arg>", "keystore password"),
-        STORETYPE("storetype", "<storetype>", "keystore type"),
-        TRUSTCACERTS("trustcacerts", null, "trust certificates from cacerts"),
-        V("v", null, "verbose output"),
-        VALIDITY("validity", "<valDays>", "validity number of days");
+        ALIAS("alias", "<alias>", "alias.name.of.the.entry.to.process"),
+        DESTALIAS("destalias", "<destalias>", "destination.alias"),
+        DESTKEYPASS("destkeypass", "<arg>", "destination.key.password"),
+        DESTKEYSTORE("destkeystore", "<destkeystore>", "destination.keystore.name"),
+        DESTPROTECTED("destprotected", null, "destination.keystore.password.protected"),
+        DESTPROVIDERNAME("destprovidername", "<destprovidername>", "destination.keystore.provider.name"),
+        DESTSTOREPASS("deststorepass", "<arg>", "destination.keystore.password"),
+        DESTSTORETYPE("deststoretype", "<deststoretype>", "destination.keystore.type"),
+        DNAME("dname", "<dname>", "distinguished.name"),
+        EXT("ext", "<value>", "X.509.extension"),
+        FILEOUT("file", "<filename>", "output.file.name"),
+        FILEIN("file", "<filename>", "input.file.name"),
+        ID("id", "<id:reason>", "Serial.ID.of.cert.to.revoke"),
+        INFILE("infile", "<filename>", "input.file.name"),
+        KEYALG("keyalg", "<keyalg>", "key.algorithm.name"),
+        KEYPASS("keypass", "<arg>", "key.password"),
+        KEYSIZE("keysize", "<keysize>", "key.bit.size"),
+        KEYSTORE("keystore", "<keystore>", "keystore.name"),
+        NEW("new", "<arg>", "new.password"),
+        NOPROMPT("noprompt", null, "do.not.prompt"),
+        OUTFILE("outfile", "<filename>", "output.file.name"),
+        PROTECTED("protected", null, "password.through.protected.mechanism"),
+        PROVIDERARG("providerarg", "<arg>", "provider.argument"),
+        PROVIDERCLASS("providerclass", "<providerclass>", "provider.class.name"),
+        PROVIDERNAME("providername", "<providername>", "provider.name"),
+        PROVIDERPATH("providerpath", "<pathlist>", "provider.classpath"),
+        RFC("rfc", null, "output.in.RFC.style"),
+        SIGALG("sigalg", "<sigalg>", "signature.algorithm.name"),
+        SRCALIAS("srcalias", "<srcalias>", "source.alias"),
+        SRCKEYPASS("srckeypass", "<arg>", "source.key.password"),
+        SRCKEYSTORE("srckeystore", "<srckeystore>", "source.keystore.name"),
+        SRCPROTECTED("srcprotected", null, "source.keystore.password.protected"),
+        SRCPROVIDERNAME("srcprovidername", "<srcprovidername>", "source.keystore.provider.name"),
+        SRCSTOREPASS("srcstorepass", "<arg>", "source.keystore.password"),
+        SRCSTORETYPE("srcstoretype", "<srcstoretype>", "source.keystore.type"),
+        SSLSERVER("sslserver", "<server[:port]>", "SSL.server.host.and.port"),
+        JARFILE("jarfile", "<filename>", "signed.jar.file"),
+        STARTDATE("startdate", "<startdate>", "certificate.validity.start.date.time"),
+        STOREPASS("storepass", "<arg>", "keystore.password"),
+        STORETYPE("storetype", "<storetype>", "keystore.type"),
+        TRUSTCACERTS("trustcacerts", null, "trust.certificates.from.cacerts"),
+        V("v", null, "verbose.output"),
+        VALIDITY("validity", "<valDays>", "validity.number.of.days");
 
         final String name, arg, description;
         Option(String name, String arg, String description) {
@@ -339,7 +339,7 @@
                 doCommands(out);
             }
         } catch (Exception e) {
-            System.out.println(rb.getString("keytool error: ") + e);
+            System.out.println(rb.getString("keytool.error.") + e);
             if (verbose) {
                 e.printStackTrace(System.out);
             }
@@ -532,13 +532,13 @@
             } else if (collator.compare(flags, "-srcprotected") == 0) {
                 srcprotectedPath = true;
             } else  {
-                System.err.println(rb.getString("Illegal option:  ") + flags);
+                System.err.println(rb.getString("Illegal.option.") + flags);
                 tinyHelp();
             }
         }
 
         if (i<args.length) {
-            System.err.println(rb.getString("Illegal option:  ") + args[i]);
+            System.err.println(rb.getString("Illegal.option.") + args[i]);
             tinyHelp();
         }
 
@@ -546,7 +546,7 @@
             if (help) {
                 usage();
             } else {
-                System.err.println(rb.getString("Usage error: no command provided"));
+                System.err.println(rb.getString("Usage.error.no.command.provided"));
                 tinyHelp();
             }
         } else if (help) {
@@ -587,7 +587,7 @@
 
         if (token && !nullStream) {
             System.err.println(MessageFormat.format(rb.getString
-                ("-keystore must be NONE if -storetype is {0}"), storetype));
+                (".keystore.must.be.NONE.if.storetype.is.{0}"), storetype));
             System.err.println();
             tinyHelp();
         }
@@ -595,38 +595,31 @@
         if (token &&
             (command == KEYPASSWD || command == STOREPASSWD)) {
             throw new UnsupportedOperationException(MessageFormat.format(rb.getString
-                        ("-storepasswd and -keypasswd commands not supported " +
-                        "if -storetype is {0}"), storetype));
+                        (".storepasswd.and.keypasswd.commands.not.supported.if.storetype.is.{0}"), storetype));
         }
 
         if (P12KEYSTORE.equalsIgnoreCase(storetype) && command == KEYPASSWD) {
             throw new UnsupportedOperationException(rb.getString
-                        ("-keypasswd commands not supported " +
-                        "if -storetype is PKCS12"));
+                        (".keypasswd.commands.not.supported.if.storetype.is.PKCS12"));
         }
 
         if (token && (keyPass != null || newPass != null || destKeyPass != null)) {
             throw new IllegalArgumentException(MessageFormat.format(rb.getString
-                ("-keypass and -new " +
-                "can not be specified if -storetype is {0}"), storetype));
+                (".keypass.and.new.can.not.be.specified.if.storetype.is.{0}"), storetype));
         }
 
         if (protectedPath) {
             if (storePass != null || keyPass != null ||
                     newPass != null || destKeyPass != null) {
                 throw new IllegalArgumentException(rb.getString
-                        ("if -protected is specified, " +
-                        "then -storepass, -keypass, and -new " +
-                        "must not be specified"));
+                        ("if.protected.is.specified.then.storepass.keypass.and.new.must.not.be.specified"));
             }
         }
 
         if (srcprotectedPath) {
             if (srcstorePass != null || srckeyPass != null) {
                 throw new IllegalArgumentException(rb.getString
-                        ("if -srcprotected is specified, " +
-                        "then -srcstorepass and -srckeypass " +
-                        "must not be specified"));
+                        ("if.srcprotected.is.specified.then.srcstorepass.and.srckeypass.must.not.be.specified"));
             }
         }
 
@@ -634,24 +627,20 @@
             if (storePass != null || keyPass != null ||
                     newPass != null || destKeyPass != null) {
                 throw new IllegalArgumentException(rb.getString
-                        ("if keystore is not password protected, " +
-                        "then -storepass, -keypass, and -new " +
-                        "must not be specified"));
+                        ("if.keystore.is.not.password.protected.then.storepass.keypass.and.new.must.not.be.specified"));
             }
         }
 
         if (KeyStoreUtil.isWindowsKeyStore(srcstoretype)) {
             if (srcstorePass != null || srckeyPass != null) {
                 throw new IllegalArgumentException(rb.getString
-                        ("if source keystore is not password protected, " +
-                        "then -srcstorepass and -srckeypass " +
-                        "must not be specified"));
+                        ("if.source.keystore.is.not.password.protected.then.srcstorepass.and.srckeypass.must.not.be.specified"));
             }
         }
 
         if (validity <= (long)0) {
             throw new Exception
-                (rb.getString("Validity must be greater than zero"));
+                (rb.getString("Validity.must.be.greater.than.zero"));
         }
 
         // Try to load and install specified provider
@@ -690,7 +679,7 @@
                 }
                 if (!(obj instanceof Provider)) {
                     MessageFormat form = new MessageFormat
-                        (rb.getString("provName not a provider"));
+                        (rb.getString("provName.not.a.provider"));
                     Object[] source = {provName};
                     throw new Exception(form.format(source));
                 }
@@ -700,22 +689,22 @@
 
         if (command == LIST && verbose && rfc) {
             System.err.println(rb.getString
-                ("Must not specify both -v and -rfc with 'list' command"));
+                ("Must.not.specify.both.v.and.rfc.with.list.command"));
             tinyHelp();
         }
 
         // Make sure provided passwords are at least 6 characters long
         if (command == GENKEYPAIR && keyPass!=null && keyPass.length < 6) {
             throw new Exception(rb.getString
-                ("Key password must be at least 6 characters"));
+                ("Key.password.must.be.at.least.6.characters"));
         }
         if (newPass != null && newPass.length < 6) {
             throw new Exception(rb.getString
-                ("New password must be at least 6 characters"));
+                ("New.password.must.be.at.least.6.characters"));
         }
         if (destKeyPass != null && destKeyPass.length < 6) {
             throw new Exception(rb.getString
-                ("New password must be at least 6 characters"));
+                ("New.password.must.be.at.least.6.characters"));
         }
 
         // Check if keystore exists.
@@ -735,7 +724,7 @@
                     // Check if keystore file is empty
                     if (ksfile.exists() && ksfile.length() == 0) {
                         throw new Exception(rb.getString
-                        ("Keystore file exists, but is empty: ") + ksfname);
+                        ("Keystore.file.exists.but.is.empty.") + ksfname);
                     }
                     ksStream = new FileInputStream(ksfile);
                 } catch (FileNotFoundException e) {
@@ -746,7 +735,7 @@
                         command != IMPORTKEYSTORE &&
                         command != PRINTCRL) {
                         throw new Exception(rb.getString
-                                ("Keystore file does not exist: ") + ksfname);
+                                ("Keystore.file.does.not.exist.") + ksfname);
                     }
                 }
             }
@@ -757,14 +746,14 @@
             dest = getAlias("destination");
             if ("".equals(dest)) {
                 throw new Exception(rb.getString
-                        ("Must specify destination alias"));
+                        ("Must.specify.destination.alias"));
             }
         }
 
         if (command == DELETE && alias == null) {
             alias = getAlias(null);
             if ("".equals(alias)) {
-                throw new Exception(rb.getString("Must specify alias"));
+                throw new Exception(rb.getString("Must.specify.alias"));
             }
         }
 
@@ -812,7 +801,7 @@
             // insist that the password be at least 6 characters
             if (ksStream == null && storePass.length < 6) {
                 throw new Exception(rb.getString
-                        ("Keystore password must be at least 6 characters"));
+                        ("Keystore.password.must.be.at.least.6.characters"));
             }
         } else if (storePass == null) {
 
@@ -835,10 +824,10 @@
                 do {
                     if (command == IMPORTKEYSTORE) {
                         System.err.print
-                                (rb.getString("Enter destination keystore password:  "));
+                                (rb.getString("Enter.destination.keystore.password."));
                     } else {
                         System.err.print
-                                (rb.getString("Enter keystore password:  "));
+                                (rb.getString("Enter.keystore.password."));
                     }
                     System.err.flush();
                     storePass = Password.readPassword(System.in);
@@ -848,20 +837,19 @@
                     // insist that the password be at least 6 characters
                     if (!nullStream && (storePass == null || storePass.length < 6)) {
                         System.err.println(rb.getString
-                                ("Keystore password is too short - " +
-                                "must be at least 6 characters"));
+                                ("Keystore.password.is.too.short.must.be.at.least.6.characters"));
                         storePass = null;
                     }
 
                     // If the keystore file does not exist and needs to be
                     // created, the storepass should be prompted twice.
                     if (storePass != null && !nullStream && ksStream == null) {
-                        System.err.print(rb.getString("Re-enter new password: "));
+                        System.err.print(rb.getString("Re.enter.new.password."));
                         char[] storePassAgain = Password.readPassword(System.in);
                         passwords.add(storePassAgain);
                         if (!Arrays.equals(storePass, storePassAgain)) {
                             System.err.println
-                                (rb.getString("They don't match. Try again"));
+                                (rb.getString("They.don.t.match.Try.again"));
                             storePass = null;
                         }
                     }
@@ -872,7 +860,7 @@
 
                 if (storePass == null) {
                     System.err.println
-                        (rb.getString("Too many failures - try later"));
+                        (rb.getString("Too.many.failures.try.later"));
                     return;
                 }
             } else if (!protectedPath
@@ -880,7 +868,7 @@
                     && isKeyStoreRelated(command)) {
                 // here we have EXPORTCERT and LIST (info valid until STOREPASSWD)
                 if (command != PRINTCRL) {
-                    System.err.print(rb.getString("Enter keystore password:  "));
+                    System.err.print(rb.getString("Enter.keystore.password."));
                     System.err.flush();
                     storePass = Password.readPassword(System.in);
                     passwords.add(storePass);
@@ -900,8 +888,7 @@
 
         if (storePass != null && P12KEYSTORE.equalsIgnoreCase(storetype)) {
             MessageFormat form = new MessageFormat(rb.getString(
-                "Warning:  Different store and key passwords not supported " +
-                "for PKCS12 KeyStores. Ignoring user-specified <command> value."));
+                "Warning.Different.store.and.key.passwords.not.supported.for.PKCS12.KeyStores.Ignoring.user.specified.command.value."));
             if (keyPass != null && !Arrays.equals(storePass, keyPass)) {
                 Object[] source = {"-keypass"};
                 System.err.println(form.format(source));
@@ -946,10 +933,10 @@
             }
             if (verbose && filename != null) {
                 MessageFormat form = new MessageFormat(rb.getString
-                        ("Certification request stored in file <filename>"));
+                        ("Certification.request.stored.in.file.filename."));
                 Object[] source = {filename};
                 System.err.println(form.format(source));
-                System.err.println(rb.getString("Submit this to your CA"));
+                System.err.println(rb.getString("Submit.this.to.your.CA"));
             }
         } else if (command == DELETE) {
             doDeleteEntry(alias);
@@ -970,7 +957,7 @@
             }
             if (filename != null) {
                 MessageFormat form = new MessageFormat(rb.getString
-                        ("Certificate stored in file <filename>"));
+                        ("Certificate.stored.in.file.filename."));
                 Object[] source = {filename};
                 System.err.println(form.format(source));
             }
@@ -1010,10 +997,10 @@
                     kssave = installReply(importAlias, inStream);
                     if (kssave) {
                         System.err.println(rb.getString
-                            ("Certificate reply was installed in keystore"));
+                            ("Certificate.reply.was.installed.in.keystore"));
                     } else {
                         System.err.println(rb.getString
-                            ("Certificate reply was not installed in keystore"));
+                            ("Certificate.reply.was.not.installed.in.keystore"));
                     }
                 } else if (!keyStore.containsAlias(importAlias) ||
                         keyStore.entryInstanceOf(importAlias,
@@ -1021,10 +1008,10 @@
                     kssave = addTrustedCert(importAlias, inStream);
                     if (kssave) {
                         System.err.println(rb.getString
-                            ("Certificate was added to keystore"));
+                            ("Certificate.was.added.to.keystore"));
                     } else {
                         System.err.println(rb.getString
-                            ("Certificate was not added to keystore"));
+                            ("Certificate.was.not.added.to.keystore"));
                     }
                 }
             } finally {
@@ -1044,14 +1031,13 @@
             }
             if (keyStore.containsAlias(alias) == false) {
                 MessageFormat form = new MessageFormat
-                    (rb.getString("Alias <alias> does not exist"));
+                    (rb.getString("Alias.alias.does.not.exist"));
                 Object[] source = {alias};
                 throw new Exception(form.format(source));
             }
             if (!keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class)) {
                 MessageFormat form = new MessageFormat(rb.getString(
-                        "Alias <alias> references an entry type that is not a private key entry.  " +
-                        "The -keyclone command only supports cloning of private key entries"));
+                        "Alias.alias.references.an.entry.type.that.is.not.a.private.key.entry.The.keyclone.command.only.supports.cloning.of.private.key"));
                 Object[] source = {alias};
                 throw new Exception(form.format(source));
             }
@@ -1148,7 +1134,7 @@
         if (kssave) {
             if (verbose) {
                 MessageFormat form = new MessageFormat
-                        (rb.getString("[Storing ksfname]"));
+                        (rb.getString(".Storing.ksfname."));
                 Object[] source = {nullStream ? "keystore" : ksfname};
                 System.err.println(form.format(source));
             }
@@ -1336,7 +1322,7 @@
         Certificate cert = keyStore.getCertificate(alias);
         if (cert == null) {
             MessageFormat form = new MessageFormat
-                (rb.getString("alias has no public key (certificate)"));
+                (rb.getString("alias.has.no.public.key.certificate."));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -1368,7 +1354,7 @@
     private void doDeleteEntry(String alias) throws Exception {
         if (keyStore.containsAlias(alias) == false) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias <alias> does not exist"));
+                (rb.getString("Alias.alias.does.not.exist"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -1390,7 +1376,7 @@
         }
         if (keyStore.containsAlias(alias) == false) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias <alias> does not exist"));
+                (rb.getString("Alias.alias.does.not.exist"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -1398,7 +1384,7 @@
         X509Certificate cert = (X509Certificate)keyStore.getCertificate(alias);
         if (cert == null) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias <alias> has no certificate"));
+                (rb.getString("Alias.alias.has.no.certificate"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -1419,15 +1405,15 @@
             int count;
             for (count = 0; count < 3; count++) {
                 MessageFormat form = new MessageFormat(rb.getString
-                        ("Enter key password for <alias>"));
+                        ("Enter.key.password.for.alias."));
                 Object[] source = {alias};
                 System.err.println(form.format(source));
                 if (orig == null) {
                     System.err.print(rb.getString
-                            ("\t(RETURN if same as keystore password):  "));
+                            (".RETURN.if.same.as.keystore.password."));
                 } else {
                     form = new MessageFormat(rb.getString
-                            ("\t(RETURN if same as for <otherAlias>)"));
+                            (".RETURN.if.same.as.for.otherAlias."));
                     Object[] src = {orig};
                     System.err.print(form.format(src));
                 }
@@ -1437,27 +1423,27 @@
                 if (entered == null) {
                     return origPass;
                 } else if (entered.length >= 6) {
-                    System.err.print(rb.getString("Re-enter new password: "));
+                    System.err.print(rb.getString("Re.enter.new.password."));
                     char[] passAgain = Password.readPassword(System.in);
                     passwords.add(passAgain);
                     if (!Arrays.equals(entered, passAgain)) {
                         System.err.println
-                            (rb.getString("They don't match. Try again"));
+                            (rb.getString("They.don.t.match.Try.again"));
                         continue;
                     }
                     return entered;
                 } else {
                     System.err.println(rb.getString
-                        ("Key password is too short - must be at least 6 characters"));
+                        ("Key.password.is.too.short.must.be.at.least.6.characters"));
                 }
             }
             if (count == 3) {
                 if (command == KEYCLONE) {
                     throw new Exception(rb.getString
-                        ("Too many failures. Key entry not cloned"));
+                        ("Too.many.failures.Key.entry.not.cloned"));
                 } else {
                     throw new Exception(rb.getString
-                            ("Too many failures - key not added to keystore"));
+                            ("Too.many.failures.key.not.added.to.keystore"));
                 }
             }
         }
@@ -1475,7 +1461,7 @@
         }
         if (keyStore.containsAlias(alias)) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("Secret key not generated, alias <alias> already exists"));
+                ("Secret.key.not.generated.alias.alias.already.exists"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -1490,7 +1476,7 @@
             keygen.init(168);
         } else {
             throw new Exception(rb.getString
-                ("Please provide -keysize for secret key generation"));
+                ("Please.provide.keysize.for.secret.key.generation"));
         }
 
         secKey = keygen.generateKey();
@@ -1514,7 +1500,7 @@
             return "SHA256withECDSA";
         } else {
             throw new Exception(rb.getString
-                    ("Cannot derive signature algorithm"));
+                    ("Cannot.derive.signature.algorithm"));
         }
     }
     /**
@@ -1540,7 +1526,7 @@
 
         if (keyStore.containsAlias(alias)) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("Key pair not generated, alias <alias> already exists"));
+                ("Key.pair.not.generated.alias.alias.already.exists"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -1569,8 +1555,7 @@
 
         if (verbose) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("Generating keysize bit keyAlgName key pair and self-signed certificate " +
-                    "(sigAlgName) with a validity of validality days\n\tfor: x500Name"));
+                ("Generating.keysize.bit.keyAlgName.key.pair.and.self.signed.certificate.sigAlgName.with.a.validity.of.validality.days.for"));
             Object[] source = {new Integer(keysize),
                                 privKey.getAlgorithm(),
                                 chain[0].getSigAlgName(),
@@ -1603,7 +1588,7 @@
 
         if (keyStore.containsAlias(dest)) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Destination alias <dest> already exists"));
+                (rb.getString("Destination.alias.dest.already.exists"));
             Object[] source = {dest};
             throw new Exception(form.format(source));
         }
@@ -1644,7 +1629,7 @@
 
         if (keyPassNew == null) {
             MessageFormat form = new MessageFormat
-                (rb.getString("key password for <alias>"));
+                (rb.getString("key.password.for.alias."));
             Object[] source = {alias};
             keyPassNew = getNewPasswd(form.format(source), keyPass);
         }
@@ -1661,7 +1646,7 @@
         throws Exception
     {
         System.err.println(rb.getString
-            ("No entries from identity database added"));
+            ("No.entries.from.identity.database.added"));
     }
 
     /**
@@ -1678,32 +1663,32 @@
 
         if (keyStore.containsAlias(alias) == false) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias <alias> does not exist"));
+                (rb.getString("Alias.alias.does.not.exist"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
 
         if (verbose || rfc || debug) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias name: alias"));
+                (rb.getString("Alias.name.alias"));
             Object[] source = {alias};
             out.println(form.format(source));
 
             if (!token) {
                 form = new MessageFormat(rb.getString
-                    ("Creation date: keyStore.getCreationDate(alias)"));
+                    ("Creation.date.keyStore.getCreationDate.alias."));
                 Object[] src = {keyStore.getCreationDate(alias)};
                 out.println(form.format(src));
             }
         } else {
             if (!token) {
                 MessageFormat form = new MessageFormat
-                    (rb.getString("alias, keyStore.getCreationDate(alias), "));
+                    (rb.getString("alias.keyStore.getCreationDate.alias."));
                 Object[] source = {alias, keyStore.getCreationDate(alias)};
                 out.print(form.format(source));
             } else {
                 MessageFormat form = new MessageFormat
-                    (rb.getString("alias, "));
+                    (rb.getString("alias."));
                 Object[] source = {alias};
                 out.print(form.format(source));
             }
@@ -1713,7 +1698,7 @@
             if (verbose || rfc || debug) {
                 Object[] source = {"SecretKeyEntry"};
                 out.println(new MessageFormat(
-                        rb.getString("Entry type: <type>")).format(source));
+                        rb.getString("Entry.type.type.")).format(source));
             } else {
                 out.println("SecretKeyEntry, ");
             }
@@ -1721,7 +1706,7 @@
             if (verbose || rfc || debug) {
                 Object[] source = {"PrivateKeyEntry"};
                 out.println(new MessageFormat(
-                        rb.getString("Entry type: <type>")).format(source));
+                        rb.getString("Entry.type.type.")).format(source));
             } else {
                 out.println("PrivateKeyEntry, ");
             }
@@ -1731,10 +1716,10 @@
             if (chain != null) {
                 if (verbose || rfc || debug) {
                     out.println(rb.getString
-                        ("Certificate chain length: ") + chain.length);
+                        ("Certificate.chain.length.") + chain.length);
                     for (int i = 0; i < chain.length; i ++) {
                         MessageFormat form = new MessageFormat
-                                (rb.getString("Certificate[(i + 1)]:"));
+                                (rb.getString("Certificate.i.1."));
                         Object[] source = {new Integer((i + 1))};
                         out.println(form.format(source));
                         if (verbose && (chain[i] instanceof X509Certificate)) {
@@ -1748,7 +1733,7 @@
                 } else {
                     // Print the digest of the user cert only
                     out.println
-                        (rb.getString("Certificate fingerprint (SHA1): ") +
+                        (rb.getString("Certificate.fingerprint.SHA1.") +
                         getCertFingerPrint("SHA1", chain[0]));
                 }
             }
@@ -1757,20 +1742,20 @@
             // We have a trusted certificate entry
             Certificate cert = keyStore.getCertificate(alias);
             if (verbose && (cert instanceof X509Certificate)) {
-                out.println(rb.getString("Entry type: trustedCertEntry\n"));
+                out.println(rb.getString("Entry.type.trustedCertEntry."));
                 printX509Cert((X509Certificate)cert, out);
             } else if (rfc) {
-                out.println(rb.getString("Entry type: trustedCertEntry\n"));
+                out.println(rb.getString("Entry.type.trustedCertEntry."));
                 dumpCert(cert, out);
             } else if (debug) {
                 out.println(cert.toString());
             } else {
-                out.println(rb.getString("trustedCertEntry,"));
-                out.println(rb.getString("Certificate fingerprint (SHA1): ")
+                out.println(rb.getString("trustedCertEntry."));
+                out.println(rb.getString("Certificate.fingerprint.SHA1.")
                             + getCertFingerPrint("SHA1", cert));
             }
         } else {
-            out.println(rb.getString("Unknown Entry Type"));
+            out.println(rb.getString("Unknown.Entry.Type"));
         }
     }
 
@@ -1787,7 +1772,7 @@
                 KeyStoreUtil.isWindowsKeyStore(srcstoretype)) {
             if (!NONE.equals(srcksfname)) {
                 System.err.println(MessageFormat.format(rb.getString
-                    ("-keystore must be NONE if -storetype is {0}"), srcstoretype));
+                    (".keystore.must.be.NONE.if.storetype.is.{0}"), srcstoretype));
                 System.err.println();
                 tinyHelp();
             }
@@ -1797,13 +1782,13 @@
                 File srcksfile = new File(srcksfname);
                     if (srcksfile.exists() && srcksfile.length() == 0) {
                         throw new Exception(rb.getString
-                                ("Source keystore file exists, but is empty: ") +
+                                ("Source.keystore.file.exists.but.is.empty.") +
                                 srcksfname);
                 }
                 is = new FileInputStream(srcksfile);
             } else {
                 throw new Exception(rb.getString
-                        ("Please specify -srckeystore"));
+                        ("Please.specify.srckeystore"));
             }
         }
 
@@ -1818,7 +1803,7 @@
             if (srcstorePass == null
                     && !srcprotectedPath
                     && !KeyStoreUtil.isWindowsKeyStore(srcstoretype)) {
-                System.err.print(rb.getString("Enter source keystore password:  "));
+                System.err.print(rb.getString("Enter.source.keystore.password."));
                 System.err.flush();
                 srcstorePass = Password.readPassword(System.in);
                 passwords.add(srcstorePass);
@@ -1829,8 +1814,7 @@
                 if (srckeyPass != null && srcstorePass != null &&
                         !Arrays.equals(srcstorePass, srckeyPass)) {
                     MessageFormat form = new MessageFormat(rb.getString(
-                        "Warning:  Different store and key passwords not supported " +
-                        "for PKCS12 KeyStores. Ignoring user-specified <command> value."));
+                        "Warning.Different.store.and.key.passwords.not.supported.for.PKCS12.KeyStores.Ignoring.user.specified.command.value."));
                     Object[] source = {"-srckeypass"};
                     System.err.println(form.format(source));
                     srckeyPass = srcstorePass;
@@ -1850,15 +1834,15 @@
             // but change 2 lines
             System.err.println();
             System.err.println(rb.getString
-                ("*****************  WARNING WARNING WARNING  *****************"));
+                (".WARNING.WARNING.WARNING."));
             System.err.println(rb.getString
-                ("* The integrity of the information stored in the srckeystore*"));
+                (".The.integrity.of.the.information.stored.in.the.srckeystore."));
             System.err.println(rb.getString
-                ("* has NOT been verified!  In order to verify its integrity, *"));
+                (".has.NOT.been.verified.In.order.to.verify.its.integrity."));
             System.err.println(rb.getString
-                ("* you must provide the srckeystore password.                *"));
+                (".you.must.provide.the.srckeystore.password."));
             System.err.println(rb.getString
-                ("*****************  WARNING WARNING WARNING  *****************"));
+                (".WARNING.WARNING.WARNING."));
             System.err.println();
         }
 
@@ -1877,8 +1861,7 @@
         } else {
             if (dest != null || srckeyPass != null || destKeyPass != null) {
                 throw new Exception(rb.getString(
-                        "if alias not specified, destalias, srckeypass, " +
-                        "and destkeypass must not be specified"));
+                        "if.alias.not.specified.destalias.srckeypass.and.destkeypass.must.not.be.specified"));
             }
             doImportKeyStoreAll(loadSourceKeyStore());
         }
@@ -1906,16 +1889,16 @@
             Object[] source = {alias};
             if (noprompt) {
                 System.err.println(new MessageFormat(rb.getString(
-                        "Warning: Overwriting existing alias <alias> in destination keystore")).format(source));
+                        "Warning.Overwriting.existing.alias.alias.in.destination.keystore")).format(source));
             } else {
                 String reply = getYesNoReply(new MessageFormat(rb.getString(
-                        "Existing entry alias <alias> exists, overwrite? [no]:  ")).format(source));
+                        "Existing.entry.alias.alias.exists.overwrite.no.")).format(source));
                 if ("NO".equals(reply)) {
                     newAlias = inputStringFromStdin(rb.getString
-                            ("Enter new alias name\t(RETURN to cancel import for this entry):  "));
+                            ("Enter.new.alias.name.RETURN.to.cancel.import.for.this.entry."));
                     if ("".equals(newAlias)) {
                         System.err.println(new MessageFormat(rb.getString(
-                                "Entry for alias <alias> not imported.")).format(
+                                "Entry.for.alias.alias.not.imported.")).format(
                                 source));
                         return 0;
                     }
@@ -1944,7 +1927,7 @@
         } catch (KeyStoreException kse) {
             Object[] source2 = {alias, kse.toString()};
             MessageFormat form = new MessageFormat(rb.getString(
-                    "Problem importing entry for alias <alias>: <exception>.\nEntry for alias <alias> not imported."));
+                    "Problem.importing.entry.for.alias.alias.exception.Entry.for.alias.alias.not.imported."));
             System.err.println(form.format(source2));
             return 2;
         }
@@ -1961,7 +1944,7 @@
             if (result == 1) {
                 ok++;
                 Object[] source = {alias};
-                MessageFormat form = new MessageFormat(rb.getString("Entry for alias <alias> successfully imported."));
+                MessageFormat form = new MessageFormat(rb.getString("Entry.for.alias.alias.successfully.imported."));
                 System.err.println(form.format(source));
             } else if (result == 2) {
                 if (!noprompt) {
@@ -1974,7 +1957,7 @@
         }
         Object[] source = {ok, count-ok};
         MessageFormat form = new MessageFormat(rb.getString(
-                "Import command completed:  <ok> entries successfully imported, <fail> entries failed or cancelled"));
+                "Import.command.completed.ok.entries.successfully.imported.fail.entries.failed.or.cancelled"));
         System.err.println(form.format(source));
     }
 
@@ -1991,17 +1974,17 @@
             out.println();
         }
 
-        out.println(rb.getString("Keystore type: ") + keyStore.getType());
-        out.println(rb.getString("Keystore provider: ") +
+        out.println(rb.getString("Keystore.type.") + keyStore.getType());
+        out.println(rb.getString("Keystore.provider.") +
                 keyStore.getProvider().getName());
         out.println();
 
         MessageFormat form;
         form = (keyStore.size() == 1) ?
                 new MessageFormat(rb.getString
-                        ("Your keystore contains keyStore.size() entry")) :
+                        ("Your.keystore.contains.keyStore.size.entry")) :
                 new MessageFormat(rb.getString
-                        ("Your keystore contains keyStore.size() entries"));
+                        ("Your.keystore.contains.keyStore.size.entries"));
         Object[] source = {new Integer(keyStore.size())};
         out.println(form.format(source));
         out.println();
@@ -2011,11 +1994,11 @@
             String alias = e.nextElement();
             doPrintEntry(alias, out, false);
             if (verbose || rfc) {
-                out.println(rb.getString("\n"));
+                out.println(rb.getString("NEWLINE"));
                 out.println(rb.getString
-                        ("*******************************************"));
+                        ("STAR"));
                 out.println(rb.getString
-                        ("*******************************************\n\n"));
+                        ("STARNN"));
             }
         }
     }
@@ -2171,10 +2154,10 @@
             }
             if (issuer == null) {
                 out.println(rb.getString
-                        ("*******************************************"));
+                        ("STAR"));
                 out.println("WARNING: not verified. Make sure -keystore and -alias are correct.");
                 out.println(rb.getString
-                        ("*******************************************\n\n"));
+                        ("STARNN"));
             }
         }
     }
@@ -2214,15 +2197,14 @@
         PKCS10 req = new PKCS10(new BASE64Decoder().decodeBuffer(new String(sb)));
 
         PublicKey pkey = req.getSubjectPublicKeyInfo();
-        out.printf(rb.getString("PKCS #10 Certificate Request (Version 1.0)\n" +
-                "Subject: %s\nPublic Key: %s format %s key\n"),
+        out.printf(rb.getString("PKCS.10.Certificate.Request.Version.1.0.Subject.s.Public.Key.s.format.s.key."),
                 req.getSubjectName(), pkey.getFormat(), pkey.getAlgorithm());
         for (PKCS10Attribute attr: req.getAttributes().getAttributes()) {
             ObjectIdentifier oid = attr.getAttributeId();
             if (oid.equals(PKCS9Attribute.EXTENSION_REQUEST_OID)) {
                 CertificateExtensions exts = (CertificateExtensions)attr.getAttributeValue();
                 if (exts != null) {
-                    printExtensions(rb.getString("Extension Request:"), exts, out);
+                    printExtensions(rb.getString("Extension.Request."), exts, out);
                 }
             } else {
                 out.println(attr.getAttributeId());
@@ -2245,10 +2227,10 @@
         try {
             c = cf.generateCertificates(in);
         } catch (CertificateException ce) {
-            throw new Exception(rb.getString("Failed to parse input"), ce);
+            throw new Exception(rb.getString("Failed.to.parse.input"), ce);
         }
         if (c.isEmpty()) {
-            throw new Exception(rb.getString("Empty input"));
+            throw new Exception(rb.getString("Empty.input"));
         }
         Certificate[] certs = c.toArray(new Certificate[c.size()]);
         for (int i=0; i<certs.length; i++) {
@@ -2256,11 +2238,11 @@
             try {
                 x509Cert = (X509Certificate)certs[i];
             } catch (ClassCastException cce) {
-                throw new Exception(rb.getString("Not X.509 certificate"));
+                throw new Exception(rb.getString("Not.X.509.certificate"));
             }
             if (certs.length > 1) {
                 MessageFormat form = new MessageFormat
-                        (rb.getString("Certificate[(i + 1)]:"));
+                        (rb.getString("Certificate.i.1."));
                 Object[] source = {new Integer(i + 1)};
                 out.println(form.format(source));
             }
@@ -2299,15 +2281,15 @@
                     for (CodeSigner signer: signers) {
                         if (!ss.contains(signer)) {
                             ss.add(signer);
-                            out.printf(rb.getString("Signer #%d:"), ++pos);
+                            out.printf(rb.getString("Signer.d."), ++pos);
                             out.println();
                             out.println();
-                            out.println(rb.getString("Signature:"));
+                            out.println(rb.getString("Signature."));
                             out.println();
                             for (Certificate cert: signer.getSignerCertPath().getCertificates()) {
                                 X509Certificate x = (X509Certificate)cert;
                                 if (rfc) {
-                                    out.println(rb.getString("Certificate owner: ") + x.getSubjectDN() + "\n");
+                                    out.println(rb.getString("Certificate.owner.") + x.getSubjectDN() + "\n");
                                     dumpCert(x, out);
                                 } else {
                                     printX509Cert(x, out);
@@ -2316,12 +2298,12 @@
                             }
                             Timestamp ts = signer.getTimestamp();
                             if (ts != null) {
-                                out.println(rb.getString("Timestamp:"));
+                                out.println(rb.getString("Timestamp."));
                                 out.println();
                                 for (Certificate cert: ts.getSignerCertPath().getCertificates()) {
                                     X509Certificate x = (X509Certificate)cert;
                                     if (rfc) {
-                                        out.println(rb.getString("Certificate owner: ") + x.getSubjectDN() + "\n");
+                                        out.println(rb.getString("Certificate.owner.") + x.getSubjectDN() + "\n");
                                         dumpCert(x, out);
                                     } else {
                                         printX509Cert(x, out);
@@ -2333,7 +2315,7 @@
                                     .getJavaSecurityCodeSignerAccess()
                                     .getCRLs(signer);
                             if (crls != null) {
-                                out.println(rb.getString("CRLs:"));
+                                out.println(rb.getString("CRLs."));
                                 out.println();
                                 for (CRL crl: crls) {
                                     printCRL(crl, out);
@@ -2345,7 +2327,7 @@
             }
             jf.close();
             if (ss.size() == 0) {
-                out.println(rb.getString("Not a signed jar file"));
+                out.println(rb.getString("Not.a.signed.jar.file"));
             }
         } else if (sslserver != null) {
             SSLContext sc = SSLContext.getInstance("SSL");
@@ -2410,7 +2392,7 @@
             // if the URL connection is successful.
             if (!certPrinted[0]) {
                 Exception e = new Exception(
-                        rb.getString("No certificate from the SSL server"));
+                        rb.getString("No.certificate.from.the.SSL.server"));
                 if (ex != null) {
                     e.initCause(ex);
                 }
@@ -2455,13 +2437,13 @@
         Certificate oldCert = keyStore.getCertificate(alias);
         if (oldCert == null) {
             MessageFormat form = new MessageFormat
-                (rb.getString("alias has no public key"));
+                (rb.getString("alias.has.no.public.key"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
         if (!(oldCert instanceof X509Certificate)) {
             MessageFormat form = new MessageFormat
-                (rb.getString("alias has no X.509 certificate"));
+                (rb.getString("alias.has.no.X.509.certificate"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -2532,7 +2514,7 @@
                              new Certificate[] { newCert } );
 
         if (verbose) {
-            System.err.println(rb.getString("New certificate (self-signed):"));
+            System.err.println(rb.getString("New.certificate.self.signed."));
             System.err.print(newCert.toString());
             System.err.println();
         }
@@ -2568,7 +2550,7 @@
         Certificate userCert = keyStore.getCertificate(alias);
         if (userCert == null) {
             MessageFormat form = new MessageFormat
-                (rb.getString("alias has no public key (certificate)"));
+                (rb.getString("alias.has.no.public.key.certificate."));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -2576,7 +2558,7 @@
         // Read the certificates in the reply
         Collection<? extends Certificate> c = cf.generateCertificates(in);
         if (c.isEmpty()) {
-            throw new Exception(rb.getString("Reply has no certificates"));
+            throw new Exception(rb.getString("Reply.has.no.certificates"));
         }
         Certificate[] replyCerts = c.toArray(new Certificate[c.size()]);
         Certificate[] newChain;
@@ -2609,11 +2591,11 @@
         throws Exception
     {
         if (alias == null) {
-            throw new Exception(rb.getString("Must specify alias"));
+            throw new Exception(rb.getString("Must.specify.alias"));
         }
         if (keyStore.containsAlias(alias)) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("Certificate not imported, alias <alias> already exists"));
+                ("Certificate.not.imported.alias.alias.already.exists"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -2623,9 +2605,9 @@
         try {
             cert = (X509Certificate)cf.generateCertificate(in);
         } catch (ClassCastException cce) {
-            throw new Exception(rb.getString("Input not an X.509 certificate"));
+            throw new Exception(rb.getString("Input.not.an.X.509.certificate"));
         } catch (CertificateException ce) {
-            throw new Exception(rb.getString("Input not an X.509 certificate"));
+            throw new Exception(rb.getString("Input.not.an.X.509.certificate"));
         }
 
         // if certificate is self-signed, make sure it verifies
@@ -2645,27 +2627,27 @@
         String trustalias = keyStore.getCertificateAlias(cert);
         if (trustalias != null) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("Certificate already exists in keystore under alias <trustalias>"));
+                ("Certificate.already.exists.in.keystore.under.alias.trustalias."));
             Object[] source = {trustalias};
             System.err.println(form.format(source));
             reply = getYesNoReply
-                (rb.getString("Do you still want to add it? [no]:  "));
+                (rb.getString("Do.you.still.want.to.add.it.no."));
         } else if (selfSigned) {
             if (trustcacerts && (caks != null) &&
                     ((trustalias=caks.getCertificateAlias(cert)) != null)) {
                 MessageFormat form = new MessageFormat(rb.getString
-                        ("Certificate already exists in system-wide CA keystore under alias <trustalias>"));
+                        ("Certificate.already.exists.in.system.wide.CA.keystore.under.alias.trustalias."));
                 Object[] source = {trustalias};
                 System.err.println(form.format(source));
                 reply = getYesNoReply
-                        (rb.getString("Do you still want to add it to your own keystore? [no]:  "));
+                        (rb.getString("Do.you.still.want.to.add.it.to.your.own.keystore.no."));
             }
             if (trustalias == null) {
                 // Print the cert and ask user if they really want to add
                 // it to their keystore
                 printX509Cert(cert, System.out);
                 reply = getYesNoReply
-                        (rb.getString("Trust this certificate? [no]:  "));
+                        (rb.getString("Trust.this.certificate.no."));
             }
         }
         if (reply != null) {
@@ -2689,7 +2671,7 @@
             // their keystore
             printX509Cert(cert, System.out);
             reply = getYesNoReply
-                (rb.getString("Trust this certificate? [no]:  "));
+                (rb.getString("Trust.this.certificate.no."));
             if ("YES".equals(reply)) {
                 keyStore.setCertificateEntry(alias, cert);
                 return true;
@@ -2716,26 +2698,26 @@
 
         for (int count = 0; count < 3; count++) {
             MessageFormat form = new MessageFormat
-                (rb.getString("New prompt: "));
+                (rb.getString("New.prompt."));
             Object[] source = {prompt};
             System.err.print(form.format(source));
             entered = Password.readPassword(System.in);
             passwords.add(entered);
             if (entered == null || entered.length < 6) {
                 System.err.println(rb.getString
-                    ("Password is too short - must be at least 6 characters"));
+                    ("Password.is.too.short.must.be.at.least.6.characters"));
             } else if (Arrays.equals(entered, oldPasswd)) {
-                System.err.println(rb.getString("Passwords must differ"));
+                System.err.println(rb.getString("Passwords.must.differ"));
             } else {
                 form = new MessageFormat
-                        (rb.getString("Re-enter new prompt: "));
+                        (rb.getString("Re.enter.new.prompt."));
                 Object[] src = {prompt};
                 System.err.print(form.format(src));
                 reentered = Password.readPassword(System.in);
                 passwords.add(reentered);
                 if (!Arrays.equals(entered, reentered)) {
                     System.err.println
-                        (rb.getString("They don't match. Try again"));
+                        (rb.getString("They.don.t.match.Try.again"));
                 } else {
                     Arrays.fill(reentered, ' ');
                     return entered;
@@ -2750,7 +2732,7 @@
                 reentered = null;
             }
         }
-        throw new Exception(rb.getString("Too many failures - try later"));
+        throw new Exception(rb.getString("Too.many.failures.try.later"));
     }
 
     /**
@@ -2761,11 +2743,11 @@
     private String getAlias(String prompt) throws Exception {
         if (prompt != null) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Enter prompt alias name:  "));
+                (rb.getString("Enter.prompt.alias.name."));
             Object[] source = {prompt};
             System.err.print(form.format(source));
         } else {
-            System.err.print(rb.getString("Enter alias name:  "));
+            System.err.print(rb.getString("Enter.alias.name."));
         }
         return (new BufferedReader(new InputStreamReader(
                                         System.in))).readLine();
@@ -2796,17 +2778,17 @@
         do {
             if (otherKeyPass != null) {
                 MessageFormat form = new MessageFormat(rb.getString
-                        ("Enter key password for <alias>"));
+                        ("Enter.key.password.for.alias."));
                 Object[] source = {alias};
                 System.err.println(form.format(source));
 
                 form = new MessageFormat(rb.getString
-                        ("\t(RETURN if same as for <otherAlias>)"));
+                        (".RETURN.if.same.as.for.otherAlias."));
                 Object[] src = {otherAlias};
                 System.err.print(form.format(src));
             } else {
                 MessageFormat form = new MessageFormat(rb.getString
-                        ("Enter key password for <alias>"));
+                        ("Enter.key.password.for.alias."));
                 Object[] source = {alias};
                 System.err.print(form.format(source));
             }
@@ -2820,7 +2802,7 @@
         } while ((keyPass == null) && count < 3);
 
         if (keyPass == null) {
-            throw new Exception(rb.getString("Too many failures - try later"));
+            throw new Exception(rb.getString("Too.many.failures.try.later"));
         }
 
         return keyPass;
@@ -2851,7 +2833,7 @@
         */
 
         MessageFormat form = new MessageFormat
-                (rb.getString("*PATTERN* printX509Cert"));
+                (rb.getString(".PATTERN.printX509Cert"));
         Object[] source = {cert.getSubjectDN().toString(),
                         cert.getIssuerDN().toString(),
                         cert.getSerialNumber().toString(16),
@@ -2873,7 +2855,7 @@
             CertificateExtensions exts = (CertificateExtensions)
                     certInfo.get(X509CertInfo.EXTENSIONS);
             if (exts != null) {
-                printExtensions(rb.getString("Extensions: "), exts, out);
+                printExtensions(rb.getString("Extensions."), exts, out);
             }
         }
     }
@@ -2894,7 +2876,7 @@
             if (ext.getClass() == Extension.class) {
                 byte[] v = ext.getExtensionValue();
                 if (v.length == 0) {
-                    out.println(rb.getString("(Empty value)"));
+                    out.println(rb.getString(".Empty.value."));
                 } else {
                     new sun.misc.HexDumpEncoder().encodeBuffer(ext.getExtensionValue(), out);
                     out.println();
@@ -2972,32 +2954,32 @@
         do {
             if (maxRetry-- < 0) {
                 throw new RuntimeException(rb.getString(
-                        "Too many retries, program terminated"));
+                        "Too.many.retries.program.terminated"));
             }
             commonName = inputString(in,
-                    rb.getString("What is your first and last name?"),
+                    rb.getString("What.is.your.first.and.last.name."),
                     commonName);
             organizationalUnit = inputString(in,
                     rb.getString
-                        ("What is the name of your organizational unit?"),
+                        ("What.is.the.name.of.your.organizational.unit."),
                     organizationalUnit);
             organization = inputString(in,
-                    rb.getString("What is the name of your organization?"),
+                    rb.getString("What.is.the.name.of.your.organization."),
                     organization);
             city = inputString(in,
-                    rb.getString("What is the name of your City or Locality?"),
+                    rb.getString("What.is.the.name.of.your.City.or.Locality."),
                     city);
             state = inputString(in,
-                    rb.getString("What is the name of your State or Province?"),
+                    rb.getString("What.is.the.name.of.your.State.or.Province."),
                     state);
             country = inputString(in,
                     rb.getString
-                        ("What is the two-letter country code for this unit?"),
+                        ("What.is.the.two.letter.country.code.for.this.unit."),
                     country);
             name = new X500Name(commonName, organizationalUnit, organization,
                                 city, state, country);
             MessageFormat form = new MessageFormat
-                (rb.getString("Is <name> correct?"));
+                (rb.getString("Is.name.correct."));
             Object[] source = {name};
             userInput = inputString
                 (in, form.format(source), rb.getString("no"));
@@ -3014,7 +2996,7 @@
     {
         System.err.println(prompt);
         MessageFormat form = new MessageFormat
-                (rb.getString("  [defaultValue]:  "));
+                (rb.getString(".defaultValue."));
         Object[] source = {defaultValue};
         System.err.print(form.format(source));
         System.err.flush();
@@ -3085,14 +3067,14 @@
 
         if (keyStore.containsAlias(alias) == false) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias <alias> does not exist"));
+                (rb.getString("Alias.alias.does.not.exist"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
         if (!keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class) &&
                 !keyStore.entryInstanceOf(alias, KeyStore.SecretKeyEntry.class)) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias <alias> has no key"));
+                (rb.getString("Alias.alias.has.no.key"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -3134,7 +3116,7 @@
 
         if (ks.containsAlias(alias) == false) {
             MessageFormat form = new MessageFormat
-                (rb.getString("Alias <alias> does not exist"));
+                (rb.getString("Alias.alias.does.not.exist"));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -3212,15 +3194,15 @@
     private void printWarning() {
         System.err.println();
         System.err.println(rb.getString
-            ("*****************  WARNING WARNING WARNING  *****************"));
+            (".WARNING.WARNING.WARNING."));
         System.err.println(rb.getString
-            ("* The integrity of the information stored in your keystore  *"));
+            (".The.integrity.of.the.information.stored.in.your.keystore."));
         System.err.println(rb.getString
-            ("* has NOT been verified!  In order to verify its integrity, *"));
+            (".has.NOT.been.verified.In.order.to.verify.its.integrity."));
         System.err.println(rb.getString
-            ("* you must provide your keystore password.                  *"));
+            (".you.must.provide.your.keystore.password."));
         System.err.println(rb.getString
-            ("*****************  WARNING WARNING WARNING  *****************"));
+            (".WARNING.WARNING.WARNING."));
         System.err.println();
     }
 
@@ -3250,7 +3232,7 @@
         }
         if (i == replyCerts.length) {
             MessageFormat form = new MessageFormat(rb.getString
-                ("Certificate reply does not contain public key for <alias>"));
+                ("Certificate.reply.does.not.contain.public.key.for.alias."));
             Object[] source = {alias};
             throw new Exception(form.format(source));
         }
@@ -3275,7 +3257,7 @@
             }
             if (j == replyCerts.length) {
                 throw new Exception
-                    (rb.getString("Incomplete certificate chain in reply"));
+                    (rb.getString("Incomplete.certificate.chain.in.reply"));
             }
         }
 
@@ -3292,12 +3274,12 @@
         if (root == null) {
             System.err.println();
             System.err.println
-                    (rb.getString("Top-level certificate in reply:\n"));
+                    (rb.getString("Top.level.certificate.in.reply."));
             printX509Cert((X509Certificate)topCert, System.out);
             System.err.println();
-            System.err.print(rb.getString("... is not trusted. "));
+            System.err.print(rb.getString(".is.not.trusted."));
             String reply = getYesNoReply
-                    (rb.getString("Install reply anyway? [no]:  "));
+                    (rb.getString("Install.reply.anyway.no."));
             if ("NO".equals(reply)) {
                 return null;
             }
@@ -3335,14 +3317,14 @@
             PublicKey replyPubKey = certToVerify.getPublicKey();
             if (!origPubKey.equals(replyPubKey)) {
                 throw new Exception(rb.getString
-                        ("Public keys in reply and keystore don't match"));
+                        ("Public.keys.in.reply.and.keystore.don.t.match"));
             }
 
             // If the two certs are identical, we're done: no need to import
             // anything
             if (certToVerify.equals(userCert)) {
                 throw new Exception(rb.getString
-                        ("Certificate reply and certificate in keystore are identical"));
+                        ("Certificate.reply.and.certificate.in.keystore.are.identical"));
             }
         }
 
@@ -3379,7 +3361,7 @@
             return newChain;
         } else {
             throw new Exception
-                (rb.getString("Failed to establish chain from reply"));
+                (rb.getString("Failed.to.establish.chain.from.reply"));
         }
     }
 
@@ -3443,7 +3425,7 @@
         do {
             if (maxRetry-- < 0) {
                 throw new RuntimeException(rb.getString(
-                        "Too many retries, program terminated"));
+                        "Too.many.retries.program.terminated"));
             }
             System.err.print(prompt);
             System.err.flush();
@@ -3457,7 +3439,7 @@
                        collator.compare(reply, rb.getString("yes")) == 0) {
                 reply = "YES";
             } else {
-                System.err.println(rb.getString("Wrong answer, try again"));
+                System.err.println(rb.getString("Wrong.answer.try.again"));
                 reply = null;
             }
         } while (reply == null);
@@ -3528,7 +3510,7 @@
         Calendar c = new GregorianCalendar();
         if (s != null) {
             IOException ioe = new IOException(
-                    rb.getString("Illegal startdate value"));
+                    rb.getString("Illegal.startdate.value"));
             int len = s.length();
             if (len == 0) {
                 throw ioe;
@@ -3654,7 +3636,7 @@
             }
             StringBuffer sb = new StringBuffer();
             MessageFormat form = new MessageFormat(rb.getString
-                ("command {0} is ambiguous:"));
+                ("command.{0}.is.ambiguous."));
             Object[] source = {s};
             sb.append(form.format(source));
             sb.append("\n    ");
@@ -3678,7 +3660,7 @@
         int p = oneOf(t, "EMAIL", "URI", "DNS", "IP", "OID");
         if (p < 0) {
             throw new Exception(rb.getString(
-                    "Unrecognized GeneralName type: ") + t);
+                    "Unrecognized.GeneralName.type.") + t);
         }
         switch (p) {
             case 0: gn = new RFC822Name(v); break;
@@ -3773,7 +3755,7 @@
                                             "critical", "non-critical");
                                     if (action == -1) {
                                         throw new Exception(rb.getString
-                                            ("Illegal value: ") + item);
+                                            ("Illegal.value.") + item);
                                     }
                                 }
                             }
@@ -3837,7 +3819,7 @@
                                     String[] nv = part.split(":");
                                     if (nv.length != 2) {
                                         throw new Exception(rb.getString
-                                                ("Illegal value: ") + extstr);
+                                                ("Illegal.value.") + extstr);
                                     } else {
                                         if (nv[0].equalsIgnoreCase("ca")) {
                                             isCA = Boolean.parseBoolean(nv[1]);
@@ -3845,7 +3827,7 @@
                                             pathLen = Integer.parseInt(nv[1]);
                                         } else {
                                             throw new Exception(rb.getString
-                                                ("Illegal value: ") + extstr);
+                                                ("Illegal.value.") + extstr);
                                         }
                                     }
                                 }
@@ -3872,7 +3854,7 @@
                                        "contentCommitment"  // also (1)
                                        );
                                 if (p < 0) {
-                                    throw new Exception(rb.getString("Unknown keyUsage type: ") + s);
+                                    throw new Exception(rb.getString("Unknown.keyUsage.type.") + s);
                                 }
                                 if (p == 9) p = 1;
                                 ok[p] = true;
@@ -3886,7 +3868,7 @@
                                     kue.getExtensionValue()));
                         } else {
                             throw new Exception(rb.getString
-                                    ("Illegal value: ") + extstr);
+                                    ("Illegal.value.") + extstr);
                         }
                         break;
                     case 2:     // EKU
@@ -3911,7 +3893,7 @@
                                         v.add(new ObjectIdentifier(s));
                                     } catch (Exception e) {
                                         throw new Exception(rb.getString(
-                                                "Unknown extendedkeyUsage type: ") + s);
+                                                "Unknown.extendedkeyUsage.type.") + s);
                                     }
                                 } else if (p == 0) {
                                     v.add(new ObjectIdentifier("2.5.29.37.0"));
@@ -3923,7 +3905,7 @@
                                     new ExtendedKeyUsageExtension(isCritical, v));
                         } else {
                             throw new Exception(rb.getString
-                                    ("Illegal value: ") + extstr);
+                                    ("Illegal.value.") + extstr);
                         }
                         break;
                     case 3:     // SAN
@@ -3951,14 +3933,14 @@
                             }
                         } else {
                             throw new Exception(rb.getString
-                                    ("Illegal value: ") + extstr);
+                                    ("Illegal.value.") + extstr);
                         }
                         break;
                     case 5:     // SIA, always non-critical
                     case 6:     // AIA, always non-critical
                         if (isCritical) {
                             throw new Exception(rb.getString(
-                                    "This extension cannot be marked as critical. ") + extstr);
+                                    "This.extension.cannot.be.marked.as.critical.") + extstr);
                         }
                         if(value != null) {
                             List<AccessDescription> accessDescriptions =
@@ -3969,7 +3951,7 @@
                                 int colonpos2 = item.indexOf(':', colonpos+1);
                                 if (colonpos < 0 || colonpos2 < 0) {
                                     throw new Exception(rb.getString
-                                            ("Illegal value: ") + extstr);
+                                            ("Illegal.value.") + extstr);
                                 }
                                 String m = item.substring(0, colonpos);
                                 String t = item.substring(colonpos+1, colonpos2);
@@ -3988,7 +3970,7 @@
                                         oid = new ObjectIdentifier(m);
                                     } catch (Exception e) {
                                         throw new Exception(rb.getString(
-                                                "Unknown AccessDescription type: ") + m);
+                                                "Unknown.AccessDescription.type.") + m);
                                     }
                                 } else {
                                     oid = new ObjectIdentifier("1.3.6.1.5.5.7.48." + p);
@@ -4005,7 +3987,7 @@
                             }
                         } else {
                             throw new Exception(rb.getString
-                                    ("Illegal value: ") + extstr);
+                                    ("Illegal.value.") + extstr);
                         }
                         break;
                     case 8: // CRL, experimental, only support 1 distributionpoint
@@ -4027,7 +4009,7 @@
                                         new DistributionPoint(gnames, null, null))));
                         } else {
                             throw new Exception(rb.getString
-                                    ("Illegal value: ") + extstr);
+                                    ("Illegal.value.") + extstr);
                         }
                         break;
                     case -1:
@@ -4056,7 +4038,7 @@
                             }
                             if (pos % 2 != 0) {
                                 throw new Exception(rb.getString(
-                                        "Odd number of hex digits found: ") + extstr);
+                                        "Odd.number.of.hex.digits.found.") + extstr);
                             }
                             data = Arrays.copyOf(data, pos/2);
                         } else {
@@ -4068,7 +4050,7 @@
                         break;
                     default:
                         throw new Exception(rb.getString(
-                                "Unknown extension type: ") + extstr);
+                                "Unknown.extension.type.") + extstr);
                 }
             }
             // always non-critical
@@ -4092,11 +4074,11 @@
     private void usage() {
         if (command != null) {
             System.err.println("keytool " + command +
-                    rb.getString(" [OPTION]..."));
+                    rb.getString(".OPTION."));
             System.err.println();
             System.err.println(rb.getString(command.description));
             System.err.println();
-            System.err.println(rb.getString("Options:"));
+            System.err.println(rb.getString("Options."));
             System.err.println();
 
             // Left and right sides of the options list
@@ -4123,12 +4105,12 @@
             }
             System.err.println();
             System.err.println(rb.getString(
-                    "Use \"keytool -help\" for all available commands"));
+                    "Use.keytool.help.for.all.available.commands"));
         } else {
             System.err.println(rb.getString(
-                    "Key and Certificate Management Tool"));
+                    "Key.and.Certificate.Management.Tool"));
             System.err.println();
-            System.err.println(rb.getString("Commands:"));
+            System.err.println(rb.getString("Commands."));
             System.err.println();
             for (Command c: Command.values()) {
                 if (c == KEYCLONE) break;
@@ -4136,7 +4118,7 @@
             }
             System.err.println();
             System.err.println(rb.getString(
-                    "Use \"keytool -command_name -help\" for usage of command_name"));
+                    "Use.keytool.command.name.help.for.usage.of.command.name"));
         }
     }
 
@@ -4152,7 +4134,7 @@
     private void errorNeedArgument(String flag) {
         Object[] source = {flag};
         System.err.println(new MessageFormat(
-                rb.getString("Command option <flag> needs an argument.")).format(source));
+                rb.getString("Command.option.flag.needs.an.argument.")).format(source));
         tinyHelp();
     }
 
@@ -4171,7 +4153,7 @@
             String value = System.getenv(arg);
             if (value == null) {
                 System.err.println(rb.getString(
-                        "Cannot find environment variable: ") + arg);
+                        "Cannot.find.environment.variable.") + arg);
                 return null;
             } else {
                 return value.toCharArray();
@@ -4187,7 +4169,7 @@
                         url = f.toURI().toURL();
                     } else {
                         System.err.println(rb.getString(
-                                "Cannot find file: ") + arg);
+                                "Cannot.find.file.") + arg);
                         return null;
                     }
                 }
@@ -4205,7 +4187,7 @@
                 return null;
             }
         } else {
-            System.err.println(rb.getString("Unknown password type: ") +
+            System.err.println(rb.getString("Unknown.password.type.") +
                     modifier);
             return null;
         }
--- a/jdk/src/share/classes/sun/security/tools/policytool/PolicyTool.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/tools/policytool/PolicyTool.java	Thu Nov 11 15:51:12 2010 +0800
@@ -228,9 +228,7 @@
                     if (pubKey == null) {
                         newWarning = true;
                         MessageFormat form = new MessageFormat(rb.getString
-                            ("Warning: A public key for alias " +
-                            "'signers[i]' does not exist.  " +
-                            "Make sure a KeyStore is properly configured."));
+                            ("Warning.A.public.key.for.alias.signers.i.does.not.exist.Make.sure.a.KeyStore.is.properly.configured."));
                         Object[] source = {signers[i]};
                         warnings.addElement(form.format(source));
                     }
@@ -248,7 +246,7 @@
                 } catch (ClassNotFoundException fnfe) {
                     newWarning = true;
                     MessageFormat form = new MessageFormat(rb.getString
-                                ("Warning: Class not found: class"));
+                                ("Warning.Class.not.found.class"));
                     Object[] source = {pe.getPrincipalClass()};
                     warnings.addElement(form.format(source));
                 }
@@ -264,13 +262,13 @@
                 } catch (ClassNotFoundException fnfe) {
                     newWarning = true;
                     MessageFormat form = new MessageFormat(rb.getString
-                                ("Warning: Class not found: class"));
+                                ("Warning.Class.not.found.class"));
                     Object[] source = {pe.permission};
                     warnings.addElement(form.format(source));
                 } catch (InvocationTargetException ite) {
                     newWarning = true;
                     MessageFormat form = new MessageFormat(rb.getString
-                        ("Warning: Invalid argument(s) for constructor: arg"));
+                        ("Warning.Invalid.argument.s.for.constructor.arg"));
                     Object[] source = {pe.permission};
                     warnings.addElement(form.format(source));
                 }
@@ -285,9 +283,7 @@
                         if (pubKey == null) {
                             newWarning = true;
                             MessageFormat form = new MessageFormat(rb.getString
-                                ("Warning: A public key for alias " +
-                                "'signers[i]' does not exist.  " +
-                               "Make sure a KeyStore is properly configured."));
+                                ("Warning.A.public.key.for.alias.signers.i.does.not.exist.Make.sure.a.KeyStore.is.properly.configured."));
                             Object[] source = {signers[i]};
                             warnings.addElement(form.format(source));
                         }
@@ -615,7 +611,7 @@
                 Thread.currentThread().getContextClassLoader());
         if (!PRIN.isAssignableFrom(pc)) {
             MessageFormat form = new MessageFormat(rb.getString
-                        ("Illegal Principal Type: type"));
+                        ("Illegal.Principal.Type.type"));
             Object[] source = {type};
             throw new InstantiationException(form.format(source));
         }
@@ -691,7 +687,7 @@
                 policyFileName = args[n];
             } else {
                 MessageFormat form = new MessageFormat(rb.getString
-                                ("Illegal option: option"));
+                                ("Illegal.option.option"));
                 Object[] source = { flags };
                 System.err.println(form.format(source));
                 usage();
@@ -700,10 +696,10 @@
     }
 
     static void usage() {
-        System.out.println(rb.getString("Usage: policytool [options]"));
+        System.out.println(rb.getString("Usage.policytool.options."));
         System.out.println();
         System.out.println(rb.getString
-                ("  [-file <file>]    policy file location"));
+                (".file.file.policy.file.location"));
         System.out.println();
 
         System.exit(1);
@@ -903,23 +899,23 @@
     public static final String SAVE_POLICY_FILE         =
                         PolicyTool.rb.getString("Save");
     public static final String SAVE_AS_POLICY_FILE      =
-                        PolicyTool.rb.getString("Save As");
+                        PolicyTool.rb.getString("Save.As");
     public static final String VIEW_WARNINGS            =
-                        PolicyTool.rb.getString("View Warning Log");
+                        PolicyTool.rb.getString("View.Warning.Log");
     public static final String QUIT                     =
                         PolicyTool.rb.getString("Exit");
     public static final String ADD_POLICY_ENTRY         =
-                        PolicyTool.rb.getString("Add Policy Entry");
+                        PolicyTool.rb.getString("Add.Policy.Entry");
     public static final String EDIT_POLICY_ENTRY        =
-                        PolicyTool.rb.getString("Edit Policy Entry");
+                        PolicyTool.rb.getString("Edit.Policy.Entry");
     public static final String REMOVE_POLICY_ENTRY      =
-                        PolicyTool.rb.getString("Remove Policy Entry");
+                        PolicyTool.rb.getString("Remove.Policy.Entry");
     public static final String EDIT_KEYSTORE            =
                         PolicyTool.rb.getString("Edit");
     public static final String ADD_PUBKEY_ALIAS         =
-                        PolicyTool.rb.getString("Add Public Key Alias");
+                        PolicyTool.rb.getString("Add.Public.Key.Alias");
     public static final String REMOVE_PUBKEY_ALIAS      =
-                        PolicyTool.rb.getString("Remove Public Key Alias");
+                        PolicyTool.rb.getString("Remove.Public.Key.Alias");
 
     /* gridbag index for components in the main window (MW) */
     public static final int MW_FILENAME_LABEL           = 0;
@@ -968,13 +964,13 @@
 
 
         // policy entry listing
-        Label label = new Label(PolicyTool.rb.getString("Policy File:"));
+        Label label = new Label(PolicyTool.rb.getString("Policy.File."));
         addNewComponent(this, label, MW_FILENAME_LABEL,
                         0, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                         TOP_BOTTOM_PADDING);
         TextField tf = new TextField(50);
         tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("Policy File:"));
+                PolicyTool.rb.getString("Policy.File."));
         tf.setEditable(false);
         addNewComponent(this, tf, MW_FILENAME_TEXTFIELD,
                         1, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
@@ -1056,7 +1052,7 @@
 
             // display the error
             MessageFormat form = new MessageFormat(PolicyTool.rb.getString
-                ("Could not open policy file: policyFile: e.toString()"));
+                ("Could.not.open.policy.file.policyFile.e.toString."));
             Object[] source = {policyFile, e.toString()};
             displayErrorDialog(null, form.format(source));
         }
@@ -1133,7 +1129,7 @@
      */
     void displayToolWindow(String args[]) {
 
-        setTitle(PolicyTool.rb.getString("Policy Tool"));
+        setTitle(PolicyTool.rb.getString("Policy.Tool"));
         setResizable(true);
         addWindowListener(new ToolWindowListener(this));
         setBounds(135, 80, 500, 500);
@@ -1146,9 +1142,7 @@
 
         if (tool.newWarning == true) {
             displayStatusDialog(this, PolicyTool.rb.getString
-                ("Errors have occurred while opening the " +
-                "policy configuration.  View the Warning Log " +
-                "for more information."));
+                ("Errors.have.occurred.while.opening.the.policy.configuration.View.the.Warning.Log.for.more.information."));
         }
     }
 
@@ -1231,7 +1225,7 @@
         ta.setEditable(false);
         for (int i = 0; i < tool.warnings.size(); i++) {
             ta.append(tool.warnings.elementAt(i));
-            ta.append(PolicyTool.rb.getString("\n"));
+            ta.append(PolicyTool.rb.getString("NEWLINE"));
         }
         addNewComponent(wd, ta, 0,
                         0, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
@@ -1332,22 +1326,22 @@
     /* popup menus */
     public static final String PERM             =
         PolicyTool.rb.getString
-        ("Permission:                                                       ");
+        ("Permission.");
 
     public static final String PRIN_TYPE        =
-        PolicyTool.rb.getString("Principal Type:");
+        PolicyTool.rb.getString("Principal.Type.");
     public static final String PRIN_NAME        =
-        PolicyTool.rb.getString("Principal Name:");
+        PolicyTool.rb.getString("Principal.Name.");
 
     /* more popu menus */
     public static final String PERM_NAME        =
         PolicyTool.rb.getString
-        ("Target Name:                                                    ");
+        ("Target.Name.");
 
     /* and more popup menus */
     public static final String PERM_ACTIONS             =
       PolicyTool.rb.getString
-      ("Actions:                                                             ");
+      ("Actions.");
 
     /* gridbag index for display OverWriteFile (OW) components */
     public static final int OW_LABEL                    = 0;
@@ -1540,7 +1534,7 @@
 
         // ask the user if they want to over write the existing file
         MessageFormat form = new MessageFormat(PolicyTool.rb.getString
-                ("OK to overwrite existing file filename?"));
+                ("OK.to.overwrite.existing.file.filename."));
         Object[] source = {filename};
         Label label = new Label(form.format(source));
         tw.addNewComponent(this, label, OW_LABEL,
@@ -1584,12 +1578,12 @@
         PolicyEntry entries[] = null;
         TaggedList prinList = new TaggedList(3, false);
         prinList.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("Principal List"));
+                PolicyTool.rb.getString("Principal.List"));
         prinList.addActionListener
                 (new EditPrinButtonListener(tool, tw, this, edit));
         TaggedList permList = new TaggedList(10, false);
         permList.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("Permission List"));
+                PolicyTool.rb.getString("Permission.List"));
         permList.addActionListener
                 (new EditPermButtonListener(tool, tw, this, edit));
 
@@ -1627,7 +1621,7 @@
         }
 
         // codebase label and textfield
-        Label label = new Label(PolicyTool.rb.getString("CodeBase:"));
+        Label label = new Label(PolicyTool.rb.getString("CodeBase."));
         tw.addNewComponent(this, label, PE_CODEBASE_LABEL,
                 0, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH);
         TextField tf;
@@ -1635,19 +1629,19 @@
                 new TextField(entries[listIndex].getGrantEntry().codeBase, 60) :
                 new TextField(60));
         tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("Code Base"));
+                PolicyTool.rb.getString("Code.Base"));
         tw.addNewComponent(this, tf, PE_CODEBASE_TEXTFIELD,
                 1, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH);
 
         // signedby label and textfield
-        label = new Label(PolicyTool.rb.getString("SignedBy:"));
+        label = new Label(PolicyTool.rb.getString("SignedBy."));
         tw.addNewComponent(this, label, PE_SIGNEDBY_LABEL,
                            0, 1, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH);
         tf = (edit ?
                 new TextField(entries[listIndex].getGrantEntry().signedBy, 60) :
                 new TextField(60));
         tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("Signed By:"));
+                PolicyTool.rb.getString("Signed.By."));
         tw.addNewComponent(this, tf, PE_SIGNEDBY_TEXTFIELD,
                            1, 1, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH);
 
@@ -1655,19 +1649,19 @@
         Panel panel = new Panel();
         panel.setLayout(new GridBagLayout());
 
-        Button button = new Button(PolicyTool.rb.getString("Add Principal"));
+        Button button = new Button(PolicyTool.rb.getString("Add.Principal"));
         button.addActionListener
                 (new AddPrinButtonListener(tool, tw, this, edit));
         tw.addNewComponent(panel, button, PE_ADD_PRIN_BUTTON,
                 0, 0, 1, 1, 100.0, 0.0, GridBagConstraints.HORIZONTAL);
 
-        button = new Button(PolicyTool.rb.getString("Edit Principal"));
+        button = new Button(PolicyTool.rb.getString("Edit.Principal"));
         button.addActionListener(new EditPrinButtonListener
                                                 (tool, tw, this, edit));
         tw.addNewComponent(panel, button, PE_EDIT_PRIN_BUTTON,
                 1, 0, 1, 1, 100.0, 0.0, GridBagConstraints.HORIZONTAL);
 
-        button = new Button(PolicyTool.rb.getString("Remove Principal"));
+        button = new Button(PolicyTool.rb.getString("Remove.Principal"));
         button.addActionListener(new RemovePrinButtonListener
                                         (tool, tw, this, edit));
         tw.addNewComponent(panel, button, PE_REMOVE_PRIN_BUTTON,
@@ -1677,7 +1671,7 @@
                 1, 2, 1, 1, 0.0, 0.0, GridBagConstraints.HORIZONTAL);
 
         // principal label and list
-        label = new Label(PolicyTool.rb.getString("Principals:"));
+        label = new Label(PolicyTool.rb.getString("Principals."));
         tw.addNewComponent(this, label, PE_PRIN_LABEL,
                            0, 3, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                            tw.BOTTOM_PADDING);
@@ -1689,20 +1683,20 @@
         panel = new Panel();
         panel.setLayout(new GridBagLayout());
 
-        button = new Button(PolicyTool.rb.getString("  Add Permission"));
+        button = new Button(PolicyTool.rb.getString(".Add.Permission"));
         button.addActionListener(new AddPermButtonListener
                                                 (tool, tw, this, edit));
         tw.addNewComponent(panel, button, PE_ADD_PERM_BUTTON,
                 0, 0, 1, 1, 100.0, 0.0, GridBagConstraints.HORIZONTAL);
 
-        button = new Button(PolicyTool.rb.getString("  Edit Permission"));
+        button = new Button(PolicyTool.rb.getString(".Edit.Permission"));
         button.addActionListener(new EditPermButtonListener
                                                 (tool, tw, this, edit));
         tw.addNewComponent(panel, button, PE_EDIT_PERM_BUTTON,
                 1, 0, 1, 1, 100.0, 0.0, GridBagConstraints.HORIZONTAL);
 
 
-        button = new Button(PolicyTool.rb.getString("Remove Permission"));
+        button = new Button(PolicyTool.rb.getString("Remove.Permission"));
         button.addActionListener(new RemovePermButtonListener
                                         (tool, tw, this, edit));
         tw.addNewComponent(panel, button, PE_REMOVE_PERM_BUTTON,
@@ -1808,7 +1802,7 @@
 
             // KeyStore label and textfield
             Label label = new Label
-                        (PolicyTool.rb.getString("KeyStore URL:"));
+                        (PolicyTool.rb.getString("KeyStore.URL."));
             tw.addNewComponent(this, label, KSD_NAME_LABEL,
                                0, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
@@ -1816,45 +1810,45 @@
 
             // URL to U R L, so that accessibility reader will pronounce well
             tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("KeyStore U R L:"));
+                PolicyTool.rb.getString("KeyStore.U.R.L."));
             tw.addNewComponent(this, tf, KSD_NAME_TEXTFIELD,
                                1, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
 
             // KeyStore type and textfield
-            label = new Label(PolicyTool.rb.getString("KeyStore Type:"));
+            label = new Label(PolicyTool.rb.getString("KeyStore.Type."));
             tw.addNewComponent(this, label, KSD_TYPE_LABEL,
                                0, 1, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
             tf = new TextField(tool.getKeyStoreType(), 30);
             tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("KeyStore Type:"));
+                PolicyTool.rb.getString("KeyStore.Type."));
             tw.addNewComponent(this, tf, KSD_TYPE_TEXTFIELD,
                                1, 1, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
 
             // KeyStore provider and textfield
             label = new Label(PolicyTool.rb.getString
-                                ("KeyStore Provider:"));
+                                ("KeyStore.Provider."));
             tw.addNewComponent(this, label, KSD_PROVIDER_LABEL,
                                0, 2, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
             tf = new TextField(tool.getKeyStoreProvider(), 30);
             tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("KeyStore Provider:"));
+                PolicyTool.rb.getString("KeyStore.Provider."));
             tw.addNewComponent(this, tf, KSD_PROVIDER_TEXTFIELD,
                                1, 2, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
 
             // KeyStore password URL and textfield
             label = new Label(PolicyTool.rb.getString
-                                ("KeyStore Password URL:"));
+                                ("KeyStore.Password.URL."));
             tw.addNewComponent(this, label, KSD_PWD_URL_LABEL,
                                0, 3, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
             tf = new TextField(tool.getKeyStorePwdURL(), 30);
             tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("KeyStore Password U R L:"));
+                PolicyTool.rb.getString("KeyStore.Password.U.R.L."));
             tw.addNewComponent(this, tf, KSD_PWD_URL_TEXTFIELD,
                                1, 3, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.BOTTOM_PADDING);
@@ -1909,8 +1903,8 @@
 
         // description label
         Label label = (edit ?
-                new Label(PolicyTool.rb.getString("  Edit Principal:")) :
-                new Label(PolicyTool.rb.getString("  Add New Principal:")));
+                new Label(PolicyTool.rb.getString(".Edit.Principal.")) :
+                new Label(PolicyTool.rb.getString(".Add.New.Principal.")));
         tw.addNewComponent(newTD, label, PRD_DESC_LABEL,
                            0, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                            tw.TOP_BOTTOM_PADDING);
@@ -2016,8 +2010,8 @@
 
         // description label
         Label label = (edit ?
-                new Label(PolicyTool.rb.getString("  Edit Permission:")) :
-                new Label(PolicyTool.rb.getString("  Add New Permission:")));
+                new Label(PolicyTool.rb.getString(".Edit.Permission.")) :
+                new Label(PolicyTool.rb.getString(".Add.New.Permission.")));
         tw.addNewComponent(newTD, label, PD_DESC_LABEL,
                            0, 0, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                            tw.TOP_BOTTOM_PADDING);
@@ -2084,13 +2078,13 @@
                            tw.LR_PADDING);
 
         // signedby label and textfield
-        label = new Label(PolicyTool.rb.getString("Signed By:"));
+        label = new Label(PolicyTool.rb.getString("Signed.By."));
         tw.addNewComponent(newTD, label, PD_SIGNEDBY_LABEL,
                            0, 4, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                            tw.LR_PADDING);
         tf = (edit ? new TextField(editMe.signedBy, 40) : new TextField(40));
         tf.getAccessibleContext().setAccessibleName(
-                PolicyTool.rb.getString("Signed By:"));
+                PolicyTool.rb.getString("Signed.By."));
         tw.addNewComponent(newTD, tf, PD_SIGNEDBY_TEXTFIELD,
                            1, 4, 1, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                            tw.LR_PADDING);
@@ -2135,12 +2129,10 @@
         if ((pclass.equals(PolicyParser.PrincipalEntry.WILDCARD_CLASS)) &&
             (!pname.equals(PolicyParser.PrincipalEntry.WILDCARD_NAME))) {
             throw new Exception
-                        (PolicyTool.rb.getString("Cannot Specify Principal " +
-                        "with a Wildcard Class without a Wildcard Name"));
+                        (PolicyTool.rb.getString("Cannot.Specify.Principal.with.a.Wildcard.Class.without.a.Wildcard.Name"));
         } else if (pname.equals("")) {
             throw new Exception
-                        (PolicyTool.rb.getString("Cannot Specify Principal " +
-                        "without a Name"));
+                        (PolicyTool.rb.getString("Cannot.Specify.Principal.without.a.Name"));
         } else if (pclass.equals("")) {
             // make this consistent with what PolicyParser does
             // when it sees an empty principal class
@@ -2188,7 +2180,7 @@
         if (permission.equals("") ||
             (!permission.equals(ALL_PERM_CLASS) && name == null)) {
             throw new InvalidParameterException(PolicyTool.rb.getString
-                ("Permission and Target Name must have a value"));
+                ("Permission.and.Target.Name.must.have.a.value"));
         }
 
         // When the permission is FilePermission, we need to check the name
@@ -2205,12 +2197,7 @@
             char result = tw.displayYesNoDialog(this,
                     PolicyTool.rb.getString("Warning"),
                     PolicyTool.rb.getString(
-                        "Warning: File name may include escaped backslash characters. " +
-                        "It is not necessary to escape backslash characters " +
-                        "(the tool escapes characters as necessary when writing " +
-                        "the policy contents to the persistent store).\n\n" +
-                        "Click on Retain to retain the entered name, or click on " +
-                        "Edit to edit the name."),
+                        "Warning.File.name.may.include.escaped.backslash.characters.It.is.not.necessary.to.escape.backslash.characters.the.tool.escapes"),
                     PolicyTool.rb.getString("Retain"),
                     PolicyTool.rb.getString("Edit")
                     );
@@ -2244,9 +2231,7 @@
                     if (pubKey == null) {
                         MessageFormat form = new MessageFormat
                             (PolicyTool.rb.getString
-                            ("Warning: A public key for alias " +
-                            "'signers[i]' does not exist.  " +
-                            "Make sure a KeyStore is properly configured."));
+                            ("Warning.A.public.key.for.alias.signers.i.does.not.exist.Make.sure.a.KeyStore.is.properly.configured."));
                         Object[] source = {signers[i]};
                         tool.warnings.addElement(form.format(source));
                         tw.displayStatusDialog(this, form.format(source));
@@ -2276,7 +2261,7 @@
 
         // ask the user do they really want to do this?
         Label label = new Label
-                (PolicyTool.rb.getString("Remove this Policy Entry?"));
+                (PolicyTool.rb.getString("Remove.this.Policy.Entry."));
         tw.addNewComponent(this, label, CRPE_LABEL1,
                            0, 0, 2, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                            tw.BOTTOM_PADDING);
@@ -2340,7 +2325,7 @@
 
         // pop up a dialog box for the user to enter a filename.
         FileDialog fd = new FileDialog
-                (tw, PolicyTool.rb.getString("Save As"), FileDialog.SAVE);
+                (tw, PolicyTool.rb.getString("Save.As"), FileDialog.SAVE);
         fd.addWindowListener(new WindowAdapter() {
             public void windowClosing(WindowEvent e) {
                 e.getWindow().setVisible(false);
@@ -2362,7 +2347,7 @@
         if (saveAsFile.exists()) {
             // display a dialog box for the user to enter policy info
             ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Overwrite File"), tool, tw, true);
+                (PolicyTool.rb.getString("Overwrite.File"), tool, tw, true);
             td.displayOverWriteFileDialog(filename, nextEvent);
         } else {
             try {
@@ -2371,7 +2356,7 @@
 
                 // display status
                 MessageFormat form = new MessageFormat(PolicyTool.rb.getString
-                        ("Policy successfully written to filename"));
+                        ("Policy.successfully.written.to.filename"));
                 Object[] source = {filename};
                 tw.displayStatusDialog(null, form.format(source));
 
@@ -2388,7 +2373,7 @@
             } catch (FileNotFoundException fnfe) {
                 if (filename == null || filename.equals("")) {
                     tw.displayErrorDialog(null, new FileNotFoundException
-                                (PolicyTool.rb.getString("null filename")));
+                                (PolicyTool.rb.getString("null.filename")));
                 } else {
                     tw.displayErrorDialog(null, fnfe);
                 }
@@ -2411,7 +2396,7 @@
             setLayout(new GridBagLayout());
 
             Label label = new Label
-                (PolicyTool.rb.getString("Save changes?"));
+                (PolicyTool.rb.getString("Save.changes."));
             tw.addNewComponent(this, label, USC_LABEL,
                                0, 0, 3, 1, 0.0, 0.0, GridBagConstraints.BOTH,
                                tw.L_TOP_BOTTOM_PADDING);
@@ -2535,9 +2520,7 @@
                 // inform user of warnings
                 if (tool.newWarning == true) {
                     tw.displayStatusDialog(null, PolicyTool.rb.getString
-                        ("Errors have occurred while opening the " +
-                        "policy configuration.  View the Warning Log " +
-                        "for more information."));
+                        ("Errors.have.occurred.while.opening.the.policy.configuration.View.the.Warning.Log.for.more.information."));
                 }
 
             } catch (Exception e) {
@@ -2556,7 +2539,7 @@
 
                 // display the error
                 MessageFormat form = new MessageFormat(PolicyTool.rb.getString
-                    ("Could not open policy file: policyFile: e.toString()"));
+                    ("Could.not.open.policy.file.policyFile.e.toString."));
                 Object[] source = {policyFile, e.toString()};
                 tw.displayErrorDialog(null, form.format(source));
             }
@@ -2708,7 +2691,7 @@
 
         // display the permission list for a policy entry
         ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Policy Entry"), tool, tw, true);
+                (PolicyTool.rb.getString("Policy.Entry"), tool, tw, true);
         td.displayPolicyEntryDialog(true);
     }
 }
@@ -2732,7 +2715,7 @@
 
             // ask user if they want to save changes
             ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Save Changes"), tool, tw, true);
+                (PolicyTool.rb.getString("Save.Changes"), tool, tw, true);
             td.displayUserSave(td.QUIT);
 
             // the above method will perform the QUIT as long as the
@@ -2743,7 +2726,7 @@
 
             // ask user if they want to save changes
             ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Save Changes"), tool, tw, true);
+                (PolicyTool.rb.getString("Save.Changes"), tool, tw, true);
             td.displayUserSave(td.NEW);
 
             // the above method will perform the NEW as long as the
@@ -2754,7 +2737,7 @@
 
             // ask user if they want to save changes
             ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Save Changes"), tool, tw, true);
+                (PolicyTool.rb.getString("Save.Changes"), tool, tw, true);
             td.displayUserSave(td.OPEN);
 
             // the above method will perform the OPEN as long as the
@@ -2771,7 +2754,7 @@
             if (filename == null || filename.length() == 0) {
                 // user wants to SAVE AS
                 ToolDialog td = new ToolDialog
-                        (PolicyTool.rb.getString("Save As"), tool, tw, true);
+                        (PolicyTool.rb.getString("Save.As"), tool, tw, true);
                 td.displaySaveAsDialog(td.NOACTION);
             } else {
                 try {
@@ -2781,13 +2764,13 @@
                     // display status
                     MessageFormat form = new MessageFormat
                         (PolicyTool.rb.getString
-                        ("Policy successfully written to filename"));
+                        ("Policy.successfully.written.to.filename"));
                     Object[] source = {filename};
                     tw.displayStatusDialog(null, form.format(source));
                 } catch (FileNotFoundException fnfe) {
                     if (filename == null || filename.equals("")) {
                         tw.displayErrorDialog(null, new FileNotFoundException
-                                (PolicyTool.rb.getString("null filename")));
+                                (PolicyTool.rb.getString("null.filename")));
                     } else {
                         tw.displayErrorDialog(null, fnfe);
                     }
@@ -2800,7 +2783,7 @@
 
             // user wants to SAVE AS
             ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Save As"), tool, tw, true);
+                (PolicyTool.rb.getString("Save.As"), tool, tw, true);
             td.displaySaveAsDialog(td.NOACTION);
 
         } else if (PolicyTool.collator.compare(e.getActionCommand(),
@@ -2830,7 +2813,7 @@
 
             // display a dialog box for the user to enter policy info
             ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Policy Entry"), tool, tw, true);
+                (PolicyTool.rb.getString("Policy.Entry"), tool, tw, true);
             td.displayPolicyEntryDialog(false);
 
         } else if (PolicyTool.collator.compare(e.getActionCommand(),
@@ -2841,13 +2824,13 @@
             int index = list.getSelectedIndex();
             if (index < 0) {
                 tw.displayErrorDialog(null, new Exception
-                        (PolicyTool.rb.getString("No Policy Entry selected")));
+                        (PolicyTool.rb.getString("No.Policy.Entry.selected")));
                 return;
             }
 
             // ask the user if they really want to remove the policy entry
             ToolDialog td = new ToolDialog(PolicyTool.rb.getString
-                ("Remove Policy Entry"), tool, tw, true);
+                ("Remove.Policy.Entry"), tool, tw, true);
             td.displayConfirmRemovePolicyEntry();
 
         } else if (PolicyTool.collator.compare(e.getActionCommand(),
@@ -2858,13 +2841,13 @@
             int index = list.getSelectedIndex();
             if (index < 0) {
                 tw.displayErrorDialog(null, new Exception
-                        (PolicyTool.rb.getString("No Policy Entry selected")));
+                        (PolicyTool.rb.getString("No.Policy.Entry.selected")));
                 return;
             }
 
             // display the permission list for a policy entry
             ToolDialog td = new ToolDialog
-                (PolicyTool.rb.getString("Policy Entry"), tool, tw, true);
+                (PolicyTool.rb.getString("Policy.Entry"), tool, tw, true);
             td.displayPolicyEntryDialog(true);
 
         } else if (PolicyTool.collator.compare(e.getActionCommand(),
@@ -2906,7 +2889,7 @@
             // display status
             MessageFormat form = new MessageFormat
                 (PolicyTool.rb.getString
-                ("Policy successfully written to filename"));
+                ("Policy.successfully.written.to.filename"));
             Object[] source = {filename};
             tw.displayStatusDialog(null, form.format(source));
 
@@ -2925,7 +2908,7 @@
         } catch (FileNotFoundException fnfe) {
             if (filename == null || filename.equals("")) {
                 tw.displayErrorDialog(null, new FileNotFoundException
-                                (PolicyTool.rb.getString("null filename")));
+                                (PolicyTool.rb.getString("null.filename")));
             } else {
                 tw.displayErrorDialog(null, fnfe);
             }
@@ -2977,9 +2960,7 @@
                     if (pubKey == null) {
                         MessageFormat form = new MessageFormat
                             (PolicyTool.rb.getString
-                            ("Warning: A public key for alias " +
-                            "'signers[i]' does not exist.  " +
-                            "Make sure a KeyStore is properly configured."));
+                            ("Warning.A.public.key.for.alias.signers.i.does.not.exist.Make.sure.a.KeyStore.is.properly.configured."));
                         Object[] source = {signers[i]};
                         tool.warnings.addElement(form.format(source));
                         tw.displayStatusDialog(td, form.format(source));
@@ -3047,7 +3028,7 @@
             tool.modified = true;
         } catch (Exception ex) {
             MessageFormat form = new MessageFormat(PolicyTool.rb.getString
-                ("Unable to open KeyStore: ex.toString()"));
+                ("Unable.to.open.KeyStore.ex.toString."));
             Object[] source = {ex.toString()};
             tw.displayErrorDialog(td, form.format(source));
             return;
@@ -3143,7 +3124,7 @@
                 } catch (ClassNotFoundException cnfe) {
                     MessageFormat form = new MessageFormat
                                 (PolicyTool.rb.getString
-                                ("Warning: Class not found: class"));
+                                ("Warning.Class.not.found.class"));
                     Object[] source = {pppe.getPrincipalClass()};
                     tool.warnings.addElement(form.format(source));
                     tw.displayStatusDialog(infoDialog, form.format(source));
@@ -3204,7 +3185,7 @@
                 tool.verifyPermission(pppe.permission, pppe.name, pppe.action);
             } catch (ClassNotFoundException cnfe) {
                 MessageFormat form = new MessageFormat(PolicyTool.rb.getString
-                                ("Warning: Class not found: class"));
+                                ("Warning.Class.not.found.class"));
                 Object[] source = {pppe.permission};
                 tool.warnings.addElement(form.format(source));
                 tw.displayStatusDialog(infoDialog, form.format(source));
@@ -3259,7 +3240,7 @@
 
         if (prinIndex < 0) {
             tw.displayErrorDialog(td, new Exception
-                (PolicyTool.rb.getString("No principal selected")));
+                (PolicyTool.rb.getString("No.principal.selected")));
             return;
         }
         // remove the principal from the display
@@ -3293,7 +3274,7 @@
 
         if (permIndex < 0) {
             tw.displayErrorDialog(td, new Exception
-                (PolicyTool.rb.getString("No permission selected")));
+                (PolicyTool.rb.getString("No.permission.selected")));
             return;
         }
         // remove the permission from the display
@@ -3334,7 +3315,7 @@
 
         if (prinIndex < 0) {
             tw.displayErrorDialog(td, new Exception
-                (PolicyTool.rb.getString("No principal selected")));
+                (PolicyTool.rb.getString("No.principal.selected")));
             return;
         }
         td.displayPrincipalDialog(editPolicyEntry, true);
@@ -3373,7 +3354,7 @@
 
         if (permIndex < 0) {
             tw.displayErrorDialog(td, new Exception
-                (PolicyTool.rb.getString("No permission selected")));
+                (PolicyTool.rb.getString("No.permission.selected")));
             return;
         }
         td.displayPermissionDialog(editPolicyEntry, true);
@@ -3668,7 +3649,7 @@
                 // display status
                 MessageFormat form = new MessageFormat
                         (PolicyTool.rb.getString
-                        ("Policy successfully written to filename"));
+                        ("Policy.successfully.written.to.filename"));
                 Object[] source = {filename};
                 tw.displayStatusDialog(null, form.format(source));
 
@@ -3900,7 +3881,7 @@
                 "getLoginConfiguration",
                 "setLoginConfiguration",
                 "createLoginConfiguration.<" +
-                        PolicyTool.rb.getString("configuration type") + ">",
+                        PolicyTool.rb.getString("configuration.type") + ">",
                 "refreshLoginConfiguration"
                 },
         null);
@@ -4117,7 +4098,7 @@
                 "setSecurityManager",
                 "createSecurityManager",
                 "getenv.<" +
-                    PolicyTool.rb.getString("environment variable name") + ">",
+                    PolicyTool.rb.getString("environment.variable.name") + ">",
                 "exitVM",
                 "shutdownHooks",
                 "setFactory",
@@ -4129,11 +4110,11 @@
                 "readFileDescriptor",
                 "writeFileDescriptor",
                 "loadLibrary.<" +
-                    PolicyTool.rb.getString("library name") + ">",
+                    PolicyTool.rb.getString("library.name") + ">",
                 "accessClassInPackage.<" +
-                    PolicyTool.rb.getString("package name")+">",
+                    PolicyTool.rb.getString("package.name")+">",
                 "defineClassInPackage.<" +
-                    PolicyTool.rb.getString("package name")+">",
+                    PolicyTool.rb.getString("package.name")+">",
                 "accessDeclaredMembers",
                 "queuePrintJob",
                 "getStackTrace",
@@ -4156,15 +4137,15 @@
                 "getPolicy",
                 "setPolicy",
                 "createPolicy.<" +
-                    PolicyTool.rb.getString("policy type") + ">",
+                    PolicyTool.rb.getString("policy.type") + ">",
                 "getProperty.<" +
-                    PolicyTool.rb.getString("property name") + ">",
+                    PolicyTool.rb.getString("property.name") + ">",
                 "setProperty.<" +
-                    PolicyTool.rb.getString("property name") + ">",
+                    PolicyTool.rb.getString("property.name") + ">",
                 "insertProvider.<" +
-                    PolicyTool.rb.getString("provider name") + ">",
+                    PolicyTool.rb.getString("provider.name") + ">",
                 "removeProvider.<" +
-                    PolicyTool.rb.getString("provider name") + ">",
+                    PolicyTool.rb.getString("provider.name") + ">",
                 //"setSystemScope",
                 //"setIdentityPublicKey",
                 //"setIdentityInfo",
@@ -4172,11 +4153,11 @@
                 //"removeIdentityCertificate",
                 //"printIdentity",
                 "clearProviderProperties.<" +
-                    PolicyTool.rb.getString("provider name") + ">",
+                    PolicyTool.rb.getString("provider.name") + ">",
                 "putProviderProperty.<" +
-                    PolicyTool.rb.getString("provider name") + ">",
+                    PolicyTool.rb.getString("provider.name") + ">",
                 "removeProviderProperty.<" +
-                    PolicyTool.rb.getString("provider name") + ">",
+                    PolicyTool.rb.getString("provider.name") + ">",
                 //"getSignerPrivateKey",
                 //"setSignerKeyPair"
                 },
--- a/jdk/src/share/classes/sun/security/util/AuthResources.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/util/AuthResources.java	Thu Nov 11 15:51:12 2010 +0800
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -40,103 +40,103 @@
     private static final Object[][] contents = {
 
         // NT principals
-        {"invalid null input: value", "invalid null input: {0}"},
-        {"NTDomainPrincipal: name", "NTDomainPrincipal: {0}"},
-        {"NTNumericCredential: name", "NTNumericCredential: {0}"},
-        {"Invalid NTSid value", "Invalid NTSid value"},
-        {"NTSid: name", "NTSid: {0}"},
-        {"NTSidDomainPrincipal: name", "NTSidDomainPrincipal: {0}"},
-        {"NTSidGroupPrincipal: name", "NTSidGroupPrincipal: {0}"},
-        {"NTSidPrimaryGroupPrincipal: name", "NTSidPrimaryGroupPrincipal: {0}"},
-        {"NTSidUserPrincipal: name", "NTSidUserPrincipal: {0}"},
-        {"NTUserPrincipal: name", "NTUserPrincipal: {0}"},
+        {"invalid.null.input.value", "invalid null input: {0}"},
+        {"NTDomainPrincipal.name", "NTDomainPrincipal: {0}"},
+        {"NTNumericCredential.name", "NTNumericCredential: {0}"},
+        {"Invalid.NTSid.value", "Invalid NTSid value"},
+        {"NTSid.name", "NTSid: {0}"},
+        {"NTSidDomainPrincipal.name", "NTSidDomainPrincipal: {0}"},
+        {"NTSidGroupPrincipal.name", "NTSidGroupPrincipal: {0}"},
+        {"NTSidPrimaryGroupPrincipal.name", "NTSidPrimaryGroupPrincipal: {0}"},
+        {"NTSidUserPrincipal.name", "NTSidUserPrincipal: {0}"},
+        {"NTUserPrincipal.name", "NTUserPrincipal: {0}"},
 
         // UnixPrincipals
-        {"UnixNumericGroupPrincipal [Primary Group]: name",
+        {"UnixNumericGroupPrincipal.Primary.Group.name",
                 "UnixNumericGroupPrincipal [Primary Group]: {0}"},
-        {"UnixNumericGroupPrincipal [Supplementary Group]: name",
+        {"UnixNumericGroupPrincipal.Supplementary.Group.name",
                 "UnixNumericGroupPrincipal [Supplementary Group]: {0}"},
-        {"UnixNumericUserPrincipal: name", "UnixNumericUserPrincipal: {0}"},
-        {"UnixPrincipal: name", "UnixPrincipal: {0}"},
+        {"UnixNumericUserPrincipal.name", "UnixNumericUserPrincipal: {0}"},
+        {"UnixPrincipal.name", "UnixPrincipal: {0}"},
 
         // com.sun.security.auth.login.ConfigFile
-        {"Unable to properly expand config", "Unable to properly expand {0}"},
-        {"extra_config (No such file or directory)",
+        {"Unable.to.properly.expand.config", "Unable to properly expand {0}"},
+        {"extra.config.No.such.file.or.directory.",
                 "{0} (No such file or directory)"},
-        {"Configuration Error:\n\tNo such file or directory",
+        {"Configuration.Error.No.such.file.or.directory",
                 "Configuration Error:\n\tNo such file or directory"},
-        {"Configuration Error:\n\tInvalid control flag, flag",
+        {"Configuration.Error.Invalid.control.flag.flag",
                 "Configuration Error:\n\tInvalid control flag, {0}"},
-        {"Configuration Error:\n\tCan not specify multiple entries for appName",
+        {"Configuration.Error.Can.not.specify.multiple.entries.for.appName",
             "Configuration Error:\n\tCan not specify multiple entries for {0}"},
-        {"Configuration Error:\n\texpected [expect], read [end of file]",
+        {"Configuration.Error.expected.expect.read.end.of.file.",
                 "Configuration Error:\n\texpected [{0}], read [end of file]"},
-        {"Configuration Error:\n\tLine line: expected [expect], found [value]",
+        {"Configuration.Error.Line.line.expected.expect.found.value.",
             "Configuration Error:\n\tLine {0}: expected [{1}], found [{2}]"},
-        {"Configuration Error:\n\tLine line: expected [expect]",
+        {"Configuration.Error.Line.line.expected.expect.",
             "Configuration Error:\n\tLine {0}: expected [{1}]"},
-        {"Configuration Error:\n\tLine line: system property [value] expanded to empty value",
+        {"Configuration.Error.Line.line.system.property.value.expanded.to.empty.value",
             "Configuration Error:\n\tLine {0}: system property [{1}] expanded to empty value"},
 
         // com.sun.security.auth.module.JndiLoginModule
-        {"username: ","username: "},
-        {"password: ","password: "},
+        {"username.","username: "},
+        {"password.","password: "},
 
         // com.sun.security.auth.module.KeyStoreLoginModule
-        {"Please enter keystore information",
+        {"Please.enter.keystore.information",
                 "Please enter keystore information"},
-        {"Keystore alias: ","Keystore alias: "},
-        {"Keystore password: ","Keystore password: "},
-        {"Private key password (optional): ",
+        {"Keystore.alias.","Keystore alias: "},
+        {"Keystore.password.","Keystore password: "},
+        {"Private.key.password.optional.",
             "Private key password (optional): "},
 
         // com.sun.security.auth.module.Krb5LoginModule
-        {"Kerberos username [[defUsername]]: ",
+        {"Kerberos.username.defUsername.",
                 "Kerberos username [{0}]: "},
-        {"Kerberos password for [username]: ",
+        {"Kerberos.password.for.username.",
                 "Kerberos password for {0}: "},
 
         /***    EVERYTHING BELOW IS DEPRECATED  ***/
 
         // com.sun.security.auth.PolicyFile
-        {": error parsing ", ": error parsing "},
-        {": ", ": "},
-        {": error adding Permission ", ": error adding Permission "},
-        {" ", " "},
-        {": error adding Entry ", ": error adding Entry "},
-        {"(", "("},
-        {")", ")"},
-        {"attempt to add a Permission to a readonly PermissionCollection",
+        {".error.parsing.", ": error parsing "},
+        {"COLON", ": "},
+        {".error.adding.Permission.", ": error adding Permission "},
+        {"SPACE", " "},
+        {".error.adding.Entry.", ": error adding Entry "},
+        {"LPARAM", "("},
+        {"RPARAM", ")"},
+        {"attempt.to.add.a.Permission.to.a.readonly.PermissionCollection",
             "attempt to add a Permission to a readonly PermissionCollection"},
 
         // com.sun.security.auth.PolicyParser
-        {"expected keystore type", "expected keystore type"},
-        {"can not specify Principal with a ",
+        {"expected.keystore.type", "expected keystore type"},
+        {"can.not.specify.Principal.with.a.",
                 "can not specify Principal with a "},
-        {"wildcard class without a wildcard name",
+        {"wildcard.class.without.a.wildcard.name",
                 "wildcard class without a wildcard name"},
-        {"expected codeBase or SignedBy", "expected codeBase or SignedBy"},
-        {"only Principal-based grant entries permitted",
+        {"expected.codeBase.or.SignedBy", "expected codeBase or SignedBy"},
+        {"only.Principal.based.grant.entries.permitted",
                 "only Principal-based grant entries permitted"},
-        {"expected permission entry", "expected permission entry"},
-        {"number ", "number "},
-        {"expected ", "expected "},
-        {", read end of file", ", read end of file"},
-        {"expected ';', read end of file", "expected ';', read end of file"},
-        {"line ", "line "},
-        {": expected '", ": expected '"},
-        {"', found '", "', found '"},
-        {"'", "'"},
+        {"expected.permission.entry", "expected permission entry"},
+        {"number.", "number "},
+        {"expected.", "expected "},
+        {".read.end.of.file", ", read end of file"},
+        {"expected.read.end.of.file", "expected ';', read end of file"},
+        {"line.", "line "},
+        {".expected.", ": expected '"},
+        {".found.", "', found '"},
+        {"QUOTE", "'"},
 
         // SolarisPrincipals
-        {"SolarisNumericGroupPrincipal [Primary Group]: ",
+        {"SolarisNumericGroupPrincipal.Primary.Group.",
                 "SolarisNumericGroupPrincipal [Primary Group]: "},
-        {"SolarisNumericGroupPrincipal [Supplementary Group]: ",
+        {"SolarisNumericGroupPrincipal.Supplementary.Group.",
                 "SolarisNumericGroupPrincipal [Supplementary Group]: "},
-        {"SolarisNumericUserPrincipal: ",
+        {"SolarisNumericUserPrincipal.",
                 "SolarisNumericUserPrincipal: "},
-        {"SolarisPrincipal: ", "SolarisPrincipal: "},
-        {"provided null name", "provided null name"}
+        {"SolarisPrincipal.", "SolarisPrincipal: "},
+        {"provided.null.name", "provided null name"}
 
     };
 
--- a/jdk/src/share/classes/sun/security/util/Resources.java	Tue Nov 09 18:57:12 2010 +0000
+++ b/jdk/src/share/classes/sun/security/util/Resources.java	Thu Nov 11 15:51:12 2010 +0800
@@ -35,434 +35,428 @@
     private static final Object[][] contents = {
 
         // shared (from jarsigner)
-        {" ", " "},
-        {"  ", "  "},
-        {"      ", "      "},
-        {", ", ", "},
+        {"SPACE", " "},
+        {"2SPACE", "  "},
+        {"6SPACE", "      "},
+        {"COMMA", ", "},
         // shared (from keytool)
-        {"\n", "\n"},
-        {"*******************************************",
+        {"NEWLINE", "\n"},
+        {"STAR",
                 "*******************************************"},
-        {"*******************************************\n\n",
+        {"STARNN",
                 "*******************************************\n\n"},
 
         // keytool: Help part
-        {" [OPTION]...", " [OPTION]..."},
-        {"Options:", "Options:"},
-        {"Use \"keytool -help\" for all available commands",
+        {".OPTION.", " [OPTION]..."},
+        {"Options.", "Options:"},
+        {"Use.keytool.help.for.all.available.commands",
                  "Use \"keytool -help\" for all available commands"},
-        {"Key and Certificate Management Tool",
+        {"Key.and.Certificate.Management.Tool",
                  "Key and Certificate Management Tool"},
-        {"Commands:", "Commands:"},
-        {"Use \"keytool -command_name -help\" for usage of command_name",
+        {"Commands.", "Commands:"},
+        {"Use.keytool.command.name.help.for.usage.of.command.name",
                 "Use \"keytool -command_name -help\" for usage of command_name"},
         // keytool: help: commands
-        {"Generates a certificate request",
+        {"Generates.a.certificate.request",
                 "Generates a certificate request"}, //-certreq
-        {"Changes an entry's alias",
+        {"Changes.an.entry.s.alias",
                 "Changes an entry's alias"}, //-changealias
-        {"Deletes an entry",
+        {"Deletes.an.entry",
                 "Deletes an entry"}, //-delete
-        {"Exports certificate",
+        {"Exports.certificate",
                 "Exports certificate"}, //-exportcert
-        {"Generates a key pair",
+        {"Generates.a.key.pair",
                 "Generates a key pair"}, //-genkeypair
-        {"Generates a secret key",
+        {"Generates.a.secret.key",
                 "Generates a secret key"}, //-genseckey
-        {"Generates certificate from a certificate request",
+        {"Generates.certificate.from.a.certificate.request",
                 "Generates certificate from a certificate request"}, //-gencert
-        {"Generates CRL", "Generates CRL"}, //-gencrl
-        {"Imports entries from a JDK 1.1.x-style identity database",
+        {"Generates.CRL", "Generates CRL"}, //-gencrl
+        {"Imports.entries.from.a.JDK.1.1.x.style.identity.database",
                 "Imports entries from a JDK 1.1.x-style identity database"}, //-identitydb
-        {"Imports a certificate or a certificate chain",
+        {"Imports.a.certificate.or.a.certificate.chain",
                 "Imports a certificate or a certificate chain"}, //-importcert
-        {"Imports one or all entries from another keystore",
+        {"Imports.one.or.all.entries.from.another.keystore",
                 "Imports one or all entries from another keystore"}, //-importkeystore
-        {"Clones a key entry",
+        {"Clones.a.key.entry",
                 "Clones a key entry"}, //-keyclone
-        {"Changes the key password of an entry",
+        {"Changes.the.key.password.of.an.entry",
                 "Changes the key password of an entry"}, //-keypasswd
-        {"Lists entries in a keystore",
+        {"Lists.entries.in.a.keystore",
                 "Lists entries in a keystore"}, //-list
-        {"Prints the content of a certificate",
+        {"Prints.the.content.of.a.certificate",
                 "Prints the content of a certificate"}, //-printcert
-        {"Prints the content of a certificate request",
+        {"Prints.the.content.of.a.certificate.request",
                 "Prints the content of a certificate request"}, //-printcertreq
-        {"Prints the content of a CRL file",
+        {"Prints.the.content.of.a.CRL.file",
                 "Prints the content of a CRL file"}, //-printcrl
-        {"Generates a self-signed certificate",
+        {"Generates.a.self.signed.certificate",
                 "Generates a self-signed certificate"}, //-selfcert
-        {"Changes the store password of a keystore",
+        {"Changes.the.store.password.of.a.keystore",
                 "Changes the store password of a keystore"}, //-storepasswd
         // keytool: help: options
-        {"alias name of the entry to process",
+        {"alias.name.of.the.entry.to.process",
                 "alias name of the entry to process"}, //-alias
-        {"destination alias",
+        {"destination.alias",
                 "destination alias"}, //-destalias
-        {"destination key password",
+        {"destination.key.password",
                 "destination key password"}, //-destkeypass
-        {"destination keystore name",
+        {"destination.keystore.name",
                 "destination keystore name"}, //-destkeystore
-        {"destination keystore password protected",
+        {"destination.keystore.password.protected",
                 "destination keystore password protected"}, //-destprotected
-        {"destination keystore provider name",
+        {"destination.keystore.provider.name",
                 "destination keystore provider name"}, //-destprovidername
-        {"destination keystore password",
+        {"destination.keystore.password",
                 "destination keystore password"}, //-deststorepass
-        {"destination keystore type",
+        {"destination.keystore.type",
                 "destination keystore type"}, //-deststoretype
-        {"distinguished name",
+        {"distinguished.name",
                 "distinguished name"}, //-dname
-        {"X.509 extension",
+        {"X.509.extension",
                 "X.509 extension"}, //-ext
-        {"output file name",
+        {"output.file.name",
                 "output file name"}, //-file and -outfile
-        {"input file name",
+        {"input.file.name",
                 "input file name"}, //-file and -infile
-        {"key algorithm name",
+        {"key.algorithm.name",
                 "key algorithm name"}, //-keyalg
-        {"key password",
+        {"key.password",
                 "key password"}, //-keypass
-        {"key bit size",
+        {"key.bit.size",
                 "key bit size"}, //-keysize
-        {"keystore name",
+        {"keystore.name",
                 "keystore name"}, //-keystore
-        {"new password",
+        {"new.password",
                 "new password"}, //-new
-        {"do not prompt",
+        {"do.not.prompt",
                 "do not prompt"}, //-noprompt
-        {"password through protected mechanism",
+        {"password.through.protected.mechanism",
                 "password through protected mechanism"}, //-protected
-        {"provider argument",
+        {"provider.argument",
                 "provider argument"}, //-providerarg
-        {"provider class name",
+        {"provider.class.name",
                 "provider class name"}, //-providerclass
-        {"provider name",
+        {"provider.name",
                 "provider name"}, //-providername
-        {"provider classpath",
+        {"provider.classpath",
                 "provider classpath"}, //-providerpath
-        {"output in RFC style",
+        {"output.in.RFC.style",
                 "output in RFC style"}, //-rfc
-        {"signature algorithm name",
+        {"signature.algorithm.name",
                 "signature algorithm name"}, //-sigalg
-        {"source alias",
+        {"source.alias",
                 "source alias"}, //-srcalias
-        {"source key password",
+        {"source.key.password",
                 "source key password"}, //-srckeypass
-        {"source keystore name",
+        {"source.keystore.name",
                 "source keystore name"}, //-srckeystore
-        {"source keystore password protected",
+        {"source.keystore.password.protected",
                 "source keystore password protected"}, //-srcprotected
-        {"source keystore provider name",
+        {"source.keystore.provider.name",
                 "source keystore provider name"}, //-srcprovidername
-        {"source keystore password",
+        {"source.keystore.password",
                 "source keystore password"}, //-srcstorepass
-        {"source keystore type",
+        {"source.keystore.type",
                 "source keystore type"}, //-srcstoretype
-        {"SSL server host and port",
+        {"SSL.server.host.and.port",
                 "SSL server host and port"}, //-sslserver
-        {"signed jar file",
+        {"signed.jar.file",
                 "signed jar file"}, //=jarfile
-        {"certificate validity start date/time",
+        {"certificate.validity.start.date.time",
                 "certificate validity start date/time"}, //-startdate
-        {"keystore password",
+        {"keystore.password",
                 "keystore password"}, //-storepass
-        {"keystore type",
+        {"keystore.type",
                 "keystore type"}, //-storetype
-        {"trust certificates from cacerts",
+        {"trust.certificates.from.cacerts",
                 "trust certificates from cacerts"}, //-trustcacerts
-        {"verbose output",
+        {"verbose.output",
                 "verbose output"}, //-v
-        {"validity number of days",
+        {"validity.number.of.days",
                 "validity number of days"}, //-validity
-        {"Serial ID of cert to revoke",
+        {"Serial.ID.of.cert.to.revoke",
                  "Serial ID of cert to revoke"}, //-id
         // keytool: Running part
-        {"keytool error: ", "keytool error: "},
-        {"Illegal option:  ", "Illegal option:  "},
-        {"Illegal value: ", "Illegal value: "},
-        {"Unknown password type: ", "Unknown password type: "},
-        {"Cannot find environment variable: ",
+        {"keytool.error.", "keytool error: "},
+        {"Illegal.option.", "Illegal option:  "},
+        {"Illegal.value.", "Illegal value: "},
+        {"Unknown.password.type.", "Unknown password type: "},
+        {"Cannot.find.environment.variable.",
                 "Cannot find environment variable: "},
-        {"Cannot find file: ", "Cannot find file: "},
-        {"Command option <flag> needs an argument.", "Command option {0} needs an argument."},
-        {"Warning:  Different store and key passwords not supported for PKCS12 KeyStores. Ignoring user-specified <command> value.",
+        {"Cannot.find.file.", "Cannot find file: "},
+        {"Command.option.flag.needs.an.argument.", "Command option {0} needs an argument."},
+        {"Warning.Different.store.and.key.passwords.not.supported.for.PKCS12.KeyStores.Ignoring.user.specified.command.value.",
                 "Warning:  Different store and key passwords not supported for PKCS12 KeyStores. Ignoring user-specified {0} value."},
-        {"-keystore must be NONE if -storetype is {0}",
+        {".keystore.must.be.NONE.if.storetype.is.{0}",
                 "-keystore must be NONE if -storetype is {0}"},
-        {"Too many retries, program terminated",
+        {"Too.many.retries.program.terminated",
                  "Too many retries, program terminated"},
-        {"-storepasswd and -keypasswd commands not supported if -storetype is {0}",
+        {".storepasswd.and.keypasswd.commands.not.supported.if.storetype.is.{0}",
                 "-storepasswd and -keypasswd commands not supported if -storetype is {0}"},
-        {"-keypasswd commands not supported if -storetype is PKCS12",
+        {".keypasswd.commands.not.supported.if.storetype.is.PKCS12",
                 "-keypasswd commands not supported if -storetype is PKCS12"},
-        {"-keypass and -new can not be specified if -storetype is {0}",
+        {".keypass.and.new.can.not.be.specified.if.storetype.is.{0}",
                 "-keypass and -new can not be specified if -storetype is {0}"},
-        {"if -protected is specified, then -storepass, -keypass, and -new must not be specified",
+        {"if.protected.is.specified.then.storepass.keypass.and.new.must.not.be.specified",
                 "if -protected is specified, then -storepass, -keypass, and -new must not be specified"},
-        {"if -srcprotected is specified, then -srcstorepass and -srckeypass must not be specified",
+        {"if.srcprotected.is.specified.then.srcstorepass.and.srckeypass.must.not.be.specified",
                 "if -srcprotected is specified, then -srcstorepass and -srckeypass must not be specified"},
-        {"if keystore is not password protected, then -storepass, -keypass, and -new must not be specified",
+        {"if.keystore.is.not.password.protected.then.storepass.keypass.and.new.must.not.be.specified",
                 "if keystore is not password protected, then -storepass, -keypass, and -new must not be specified"},
-        {"if source keystore is not password protected, then -srcstorepass and -srckeypass must not be specified",
+        {"if.source.keystore.is.not.password.protected.then.srcstorepass.and.srckeypass.must.not.be.specified",
                 "if source keystore is not password protected, then -srcstorepass and -srckeypass must not be specified"},
-        {"Illegal startdate value", "Illegal startdate value"},
-        {"Validity must be greater than zero",
+        {"Illegal.startdate.value", "Illegal startdate value"},
+        {"Validity.must.be.greater.than.zero",
                 "Validity must be greater than zero"},
-        {"provName not a provider", "{0} not a provider"},
-        {"Usage error: no command provided", "Usage error: no command provided"},
-        {"Source keystore file exists, but is empty: ", "Source keystore file exists, but is empty: "},
-        {"Please specify -srckeystore", "Please specify -srckeystore"},
-        {"Must not specify both -v and -rfc with 'list' command",
+        {"provName.not.a.provider", "{0} not a provider"},
+        {"Usage.error.no.command.provided", "Usage error: no command provided"},
+        {"Source.keystore.file.exists.but.is.empty.", "Source keystore file exists, but is empty: "},
+        {"Please.specify.srckeystore", "Please specify -srckeystore"},
+        {"Must.not.specify.both.v.and.rfc.with.list.command",
                 "Must not specify both -v and -rfc with 'list' command"},
-        {"Key password must be at least 6 characters",
+        {"Key.password.must.be.at.least.6.characters",
                 "Key password must be at least 6 characters"},
-        {"New password must be at least 6 characters",
+        {"New.password.must.be.at.least.6.characters",
                 "New password must be at least 6 characters"},
-        {"Keystore file exists, but is empty: ",
+        {"Keystore.file.exists.but.is.empty.",
                 "Keystore file exists, but is empty: "},
-        {"Keystore file does not exist: ",
+        {"Keystore.file.does.not.exist.",
                 "Keystore file does not exist: "},
-        {"Must specify destination alias", "Must specify destination alias"},
-        {"Must specify alias", "Must specify alias"},
-        {"Keystore password must be at least 6 characters",
+        {"Must.specify.destination.alias", "Must specify destination alias"},
+        {"Must.specify.alias", "Must specify alias"},
+        {"Keystore.password.must.be.at.least.6.characters",
                 "Keystore password must be at least 6 characters"},
-        {"Enter keystore password:  ", "Enter keystore password:  "},
-        {"Enter source keystore password:  ", "Enter source keystore password:  "},
-        {"Enter destination keystore password:  ", "Enter destination keystore password:  "},
-        {"Keystore password is too short - must be at least 6 characters",
+        {"Enter.keystore.password.", "Enter keystore password:  "},
+        {"Enter.source.keystore.password.", "Enter source keystore password:  "},
+        {"Enter.destination.keystore.password.", "Enter destination keystore password:  "},
+        {"Keystore.password.is.too.short.must.be.at.least.6.characters",
          "Keystore password is too short - must be at least 6 characters"},
-        {"Unknown Entry Type", "Unknown Entry Type"},
-        {"Too many failures. Alias not changed", "Too many failures. Alias not changed"},
-        {"Entry for alias <alias> successfully imported.",
+        {"Unknown.Entry.Type", "Unknown Entry Type"},
+        {"Too.many.failures.Alias.not.changed", "Too many failures. Alias not changed"},
+        {"Entry.for.alias.alias.successfully.imported.",
                  "Entry for alias {0} successfully imported."},
-        {"Entry for alias <alias> not imported.", "Entry for alias {0} not imported."},
-        {"Problem importing entry for alias <alias>: <exception>.\nEntry for alias <alias> not imported.",
+        {"Entry.for.alias.alias.not.imported.", "Entry for alias {0} not imported."},
+        {"Problem.importing.entry.for.alias.alias.exception.Entry.for.alias.alias.not.imported.",
                  "Problem importing entry for alias {0}: {1}.\nEntry for alias {0} not imported."},
-        {"Import command completed:  <ok> entries successfully imported, <fail> entries failed or cancelled",
+        {"Import.command.completed.ok.entries.successfully.imported.fail.entries.failed.or.cancelled",
                  "Import command completed:  {0} entries successfully imported, {1} entries failed or cancelled"},
-        {"Warning: Overwriting existing alias <alias> in destination keystore",
+        {"Warning.Overwriting.existing.alias.alias.in.destination.keystore",
                  "Warning: Overwriting existing alias {0} in destination keystore"},
-        {"Existing entry alias <alias> exists, overwrite? [no]:  ",
+        {"Existing.entry.alias.alias.exists.overwrite.no.",
                  "Existing entry alias {0} exists, overwrite? [no]:  "},
-        {"Too many failures - try later", "Too many failures - try later"},
-        {"Certification request stored in file <filename>",
+        {"Too.many.failures.try.later", "Too many failures - try later"},
+        {"Certification.request.stored.in.file.filename.",
                 "Certification request stored in file <{0}>"},
-        {"Submit this to your CA", "Submit this to your CA"},
-        {"if alias not specified, destalias, srckeypass, and destkeypass must not be specified",
+        {"Submit.this.to.your.CA", "Submit this to your CA"},
+        {"if.alias.not.specified.destalias.srckeypass.and.destkeypass.must.not.be.specified",
             "if alias not specified, destalias, srckeypass, and destkeypass must not be specified"},
-        {"Certificate stored in file <filename>",
+        {"Certificate.stored.in.file.filename.",
                 "Certificate stored in file <{0}>"},
-        {"Certificate reply was installed in keystore",
+        {"Certificate.reply.was.installed.in.keystore",
                 "Certificate reply was installed in keystore"},
-        {"Certificate reply was not installed in keystore",
+        {"Certificate.reply.was.not.installed.in.keystore",
                 "Certificate reply was not installed in keystore"},
-        {"Certificate was added to keystore",
+        {"Certificate.was.added.to.keystore",
                 "Certificate was added to keystore"},
-        {"Certificate was not added to keystore",
+        {"Certificate.was.not.added.to.keystore",
                 "Certificate was not added to keystore"},
-        {"[Storing ksfname]", "[Storing {0}]"},
-        {"alias has no public key (certificate)",
+        {".Storing.ksfname.", "[Storing {0}]"},
+        {"alias.has.no.public.key.certificate.",
                 "{0} has no public key (certificate)"},
-        {"Cannot derive signature algorithm",
+        {"Cannot.derive.signature.algorithm",
                 "Cannot derive signature algorithm"},
-        {"Alias <alias> does not exist",
+        {"Alias.alias.does.not.exist",
                 "Alias <{0}> does not exist"},
-        {"Alias <alias> has no certificate",
+        {"Alias.alias.has.no.certificate",
                 "Alias <{0}> has no certificate"},
-        {"Key pair not generated, alias <alias> already exists",
+        {"Key.pair.not.generated.alias.alias.already.exists",
                 "Key pair not generated, alias <{0}> already exists"},
-        {"Generating keysize bit keyAlgName key pair and self-signed certificate (sigAlgName) with a validity of validality days\n\tfor: x500Name",
+        {"Generating.keysize.bit.keyAlgName.key.pair.and.self.signed.certificate.sigAlgName.with.a.validity.of.validality.days.for",
                 "Generating {0} bit {1} key pair and self-signed certificate ({2}) with a validity of {3} days\n\tfor: {4}"},
-        {"Enter key password for <alias>", "Enter key password for <{0}>"},
-        {"\t(RETURN if same as keystore password):  ",
+        {"Enter.key.password.for.alias.", "Enter key password for <{0}>"},
+        {".RETURN.if.same.as.keystore.password.",
                 "\t(RETURN if same as keystore password):  "},
-        {"Key password is too short - must be at least 6 characters",
+        {"Key.password.is.too.short.must.be.at.least.6.characters",
                 "Key password is too short - must be at least 6 characters"},
-        {"Too many failures - key not added to keystore",
+        {"Too.many.failures.key.not.added.to.keystore",
                 "Too many failures - key not added to keystore"},
-        {"Destination alias <dest> already exists",
+        {"Destination.alias.dest.already.exists",
                 "Destination alias <{0}> already exists"},
-        {"Password is too short - must be at least 6 characters",
+        {"Password.is.too.short.must.be.at.least.6.characters",
                 "Password is too short - must be at least 6 characters"},
-        {"Too many failures. Key entry not cloned",
+        {"Too.many.failures.Key.entry.not.cloned",
                 "Too many failures. Key entry not cloned"},
-        {"key password for <alias>", "key password for <{0}>"},
-        {"Keystore entry for <id.getName()> already exists",
+        {"key.password.for.alias.", "key password for <{0}>"},
+        {"Keystore.entry.for.id.getName.already.exists",
                 "Keystore entry for <{0}> already exists"},
-        {"Creating keystore entry for <id.getName()> ...",
+        {"Creating.keystore.entry.for.id.getName.",
                 "Creating keystore entry for <{0}> ..."},
-        {"No entries from identity database added",
+        {"No.entries.from.identity.database.added",
                 "No entries from identity database added"},
-        {"Alias name: alias", "Alias name: {0}"},
-        {"Creation date: keyStore.getCreationDate(alias)",
+        {"Alias.name.alias", "Alias name: {0}"},
+        {"Creation.date.keyStore.getCreationDate.alias.",
                 "Creation date: {0,date}"},
-        {"alias, keyStore.getCreationDate(alias), ",
+        {"alias.keyStore.getCreationDate.alias.",
                 "{0}, {1,date}, "},
-        {"alias, ", "{0}, "},
-        {"Entry type: <type>", "Entry type: {0}"},
-        {"Certificate chain length: ", "Certificate chain length: "},
-        {"Certificate[(i + 1)]:", "Certificate[{0,number,integer}]:"},
-        {"Certificate fingerprint (SHA1): ", "Certificate fingerprint (SHA1): "},
-        {"Entry type: trustedCertEntry\n", "Entry type: trustedCertEntry\n"},
-        {"trustedCertEntry,", "trustedCertEntry,"},
-        {"Keystore type: ", "Keystore type: "},
-        {"Keystore provider: ", "Keystore provider: "},
-        {"Your keystore contains keyStore.size() entry",
+        {"alias.", "{0}, "},
+        {"Entry.type.type.", "Entry type: {0}"},
+        {"Certificate.chain.length.", "Certificate chain length: "},
+        {"Certificate.i.1.", "Certificate[{0,number,integer}]:"},
+        {"Certificate.fingerprint.SHA1.", "Certificate fingerprint (SHA1): "},
+        {"Entry.type.trustedCertEntry.", "Entry type: trustedCertEntry\n"},
+        {"trustedCertEntry.", "trustedCertEntry,"},
+        {"Keystore.type.", "Keystore type: "},
+        {"Keystore.provider.", "Keystore provider: "},
+        {"Your.keystore.contains.keyStore.size.entry",
                 "Your keystore contains {0,number,integer} entry"},
-        {"Your keystore contains keyStore.size() entries",
+        {"Your.keystore.contains.keyStore.size.entries",
                 "Your keystore contains {0,number,integer} entries"},
-        {"Failed to parse input", "Failed to parse input"},
-        {"Empty input", "Empty input"},
-        {"Not X.509 certificate", "Not X.509 certificate"},
-        {"alias has no public key", "{0} has no public key"},
-        {"alias has no X.509 certificate", "{0} has no X.509 certificate"},
-        {"New certificate (self-signed):", "New certificate (self-signed):"},
-        {"Reply has no certificates", "Reply has no certificates"},
-        {"Certificate not imported, alias <alias> already exists",
+        {"Failed.to.parse.input", "Failed to parse input"},
+        {"Empty.input", "Empty input"},
+        {"Not.X.509.certificate", "Not X.509 certificate"},
+        {"alias.has.no.public.key", "{0} has no public key"},
+        {"alias.has.no.X.509.certificate", "{0} has no X.509 certificate"},
+        {"New.certificate.self.signed.", "New certificate (self-signed):"},
+        {"Reply.has.no.certificates", "Reply has no certificates"},
+        {"Certificate.not.imported.alias.alias.already.exists",
                 "Certificate not imported, alias <{0}> already exists"},
-        {"Input not an X.509 certificate", "Input not an X.509 certificate"},
-        {"Certificate already exists in keystore under alias <trustalias>",
+        {"Input.not.an.X.509.certificate", "Input not an X.509 certificate"},
+        {"Certificate.already.exists.in.keystore.under.alias.trustalias.",
                 "Certificate already exists in keystore under alias <{0}>"},
-        {"Do you still want to add it? [no]:  ",
+        {"Do.you.still.want.to.add.it.no.",
                 "Do you still want to add it? [no]:  "},
-        {"Certificate already exists in system-wide CA keystore under alias <trustalias>",
+        {"Certificate.already.exists.in.system.wide.CA.keystore.under.alias.trustalias.",
                 "Certificate already exists in system-wide CA keystore under alias <{0}>"},
-        {"Do you still want to add it to your own keystore? [no]:  ",
+        {"Do.you.still.want.to.add.it.to.your.own.keystore.no.",
                 "Do you still want to add it to your own keystore? [no]:  "},
-        {"Trust this certificate? [no]:  ", "Trust this certificate? [no]:  "},
+        {"Trust.this.certificate.no.", "Trust this certificate? [no]:  "},
         {"YES", "YES"},
-        {"New prompt: ", "New {0}: "},
-        {"Passwords must differ", "Passwords must differ"},
-        {"Re-enter new prompt: ", "Re-enter new {0}: "},
-        {"Re-enter new password: ", "Re-enter new password: "},
-        {"They don't match. Try again", "They don't match. Try again"},
-        {"Enter prompt alias name:  ", "Enter {0} alias name:  "},
-        {"Enter new alias name\t(RETURN to cancel import for this entry):  ",
+        {"New.prompt.", "New {0}: "},
+        {"Passwords.must.differ", "Passwords must differ"},
+        {"Re.enter.new.prompt.", "Re-enter new {0}: "},
+        {"Re.enter.new.password.", "Re-enter new password: "},
+        {"They.don.t.match.Try.again", "They don't match. Try again"},
+        {"Enter.prompt.alias.name.", "Enter {0} alias name:  "},
+        {"Enter.new.alias.name.RETURN.to.cancel.import.for.this.entry.",
                  "Enter new alias name\t(RETURN to cancel import for this entry):  "},
-        {"Enter alias name:  ", "Enter alias name:  "},
-        {"\t(RETURN if same as for <otherAlias>)",
+        {"Enter.alias.name.", "Enter alias name:  "},
+        {".RETURN.if.same.as.for.otherAlias.",
                 "\t(RETURN if same as for <{0}>)"},
-        {"*PATTERN* printX509Cert",
+        {".PATTERN.printX509Cert",
                 "Owner: {0}\nIssuer: {1}\nSerial number: {2}\nValid from: {3} until: {4}\nCertificate fingerprints:\n\t MD5:  {5}\n\t SHA1: {6}\n\t SHA256: {7}\n\t Signature algorithm name: {8}\n\t Version: {9}"},
-        {"What is your first and last name?",
+        {"What.is.your.first.and.last.name.",
                 "What is your first and last name?"},
-        {"What is the name of your organizational unit?",
+        {"What.is.the.name.of.your.organizational.unit.",
                 "What is the name of your organizational unit?"},
-        {"What is the name of your organization?",
+        {"What.is.the.name.of.your.organization.",
                 "What is the name of your organization?"},
-        {"What is the name of your City or Locality?",
+        {"What.is.the.name.of.your.City.or.Locality.",
                 "What is the name of your City or Locality?"},
-        {"What is the name of your State or Province?",
+        {"What.is.the.name.of.your.State.or.Province.",
                 "What is the name of your State or Province?"},
-        {"What is the two-letter country code for this unit?",
+        {"What.is.the.two.letter.country.code.for.this.unit.",
                 "What is the two-letter country code for this unit?"},
-        {"Is <name> correct?", "Is {0} correct?"},
+        {"Is.name.correct.", "Is {0} correct?"},
         {"no", "no"},
         {"yes", "yes"},
         {"y", "y"},
-        {"  [defaultValue]:  ", "  [{0}]:  "},
-        {"Alias <alias> has no key",
+        {".defaultValue.", "  [{0}]:  "},
+        {"Alias.alias.has.no.key",
                 "Alias <{0}> has no key"},
-        {"Alias <alias> references an entry type that is not a private key entry.  The -keyclone command only supports cloning of private key entries",
+        {"Alias.alias.references.an.entry.type.that.is.not.a.private.key.entry.The.keyclone.command.only.supports.cloning.of.private.key",
                  "Alias <{0}> references an entry type that is not a private key entry.  The -keyclone command only supports cloning of private key entries"},
 
-        {"*****************  WARNING WARNING WARNING  *****************",
+        {".WARNING.WARNING.WARNING.",
             "*****************  WARNING WARNING WARNING  *****************"},
-        {"Signer #%d:", "Signer #%d:"},
-        {"Timestamp:", "Timestamp:"},
-        {"Signature:", "Signature:"},
-        {"CRLs:", "CRLs:"},
-        {"Certificate owner: ", "Certificate owner: "},
-        {"Not a signed jar file", "Not a signed jar file"},
-        {"No certificate from the SSL server",
+        {"Signer.d.", "Signer #%d:"},
+        {"Timestamp.", "Timestamp:"},
+        {"Signature.", "Signature:"},
+        {"CRLs.", "CRLs:"},
+        {"Certificate.owner.", "Certificate owner: "},
+        {"Not.a.signed.jar.file", "Not a signed jar file"},
+        {"No.certificate.from.the.SSL.server",
                 "No certificate from the SSL server"},
 
         // Translators of the following 5 pairs, ATTENTION:
         // the next 5 string pairs are meant to be combined into 2 paragraphs,
         // 1+3+4 and 2+3+5. make sure your translation also does.
-        {"* The integrity of the information stored in your keystore  *",
+        {".The.integrity.of.the.information.stored.in.your.keystore.",
             "* The integrity of the information stored in your keystore  *"},
-        {"* The integrity of the information stored in the srckeystore*",
+        {".The.integrity.of.the.information.stored.in.the.srckeystore.",
             "* The integrity of the information stored in the srckeystore*"},
-        {"* has NOT been verified!  In order to verify its integrity, *",
+        {".has.NOT.been.verified.In.order.to.verify.its.integrity.",
             "* has NOT been verified!  In order to verify its integrity, *"},
-        {"* you must provide your keystore password.                  *",
+        {".you.must.provide.your.keystore.password.",
             "* you must provide your keystore password.                  *"},
-        {"* you must provide the srckeystore password.                *",
+        {".you.must.provide.the.srckeystore.password.",
             "* you must provide the srckeystore password.                *"},
 
 
-        {"Certificate reply does not contain public key for <alias>",
+        {"Certificate.reply.does.not.contain.public.key.for.alias.",
                 "Certificate reply does not contain public key for <{0}>"},
-        {"Incomplete certificate chain in reply",
+        {"Incomplete.certificate.chain.in.reply",
                 "Incomplete certificate chain in reply"},
-        {"Certificate chain in reply does not verify: ",
+        {"Certificate.chain.in.reply.does.not.verify.",
                 "Certificate chain in reply does not verify: "},
-        {"Top-level certificate in reply:\n",
+        {"Top.level.certificate.in.reply.",
                 "Top-level certificate in reply:\n"},
-        {"... is not trusted. ", "... is not trusted. "},
-        {"Install reply anyway? [no]:  ", "Install reply anyway? [no]:  "},
+        {".is.not.trusted.", "... is not trusted. "},
+        {"Install.reply.anyway.no.", "Install reply anyway? [no]:  "},
         {"NO", "NO"},
-        {"Public keys in reply and keystore don't match",
+        {"Public.keys.in.reply.and.keystore.don.t.match",
                 "Public keys in reply and keystore don't match"},
-        {"Certificate reply and certificate in keystore are identical",
+        {"Certificate.reply.and.certificate.in.keystore.are.identical",
                 "Certificate reply and certificate in keystore are identical"},
-        {"Failed to establish chain from reply",
+        {"Failed.to.establish.chain.from.reply",
                 "Failed to establish chain from reply"},
         {"n", "n"},
-        {"Wrong answer, try again", "Wrong answer, try again"},
-        {"Secret key not generated, alias <alias> already exists",
+        {"Wrong.answer.try.again", "Wrong answer, try again"},
+        {"Secret.key.not.generated.alias.alias.already.exists",
                 "Secret Key not generated, alias <{0}> already exists"},
-        {"Please provide -keysize for secret key generation",
+        {"Please.provide.keysize.for.secret.key.generation",
                 "Please provide -keysize for secret key generation"},
 
-        {"Extensions: ", "Extensions: "},
-        {"(Empty value)", "(Empty value)"},
-        {"Extension Request:", "Extension Request:"},
-        {"PKCS #10 Certificate Request (Version 1.0)\n" +
-                "Subject: %s\nPublic Key: %s format %s key\n",
+        {"Extensions.", "Extensions: "},
+        {".Empty.value.", "(Empty value)"},
+        {"Extension.Request.", "Extension Request:"},
+        {"PKCS.10.Certificate.Request.Version.1.0.Subject.s.Public.Key.s.format.s.key.",
                 "PKCS #10 Certificate Request (Version 1.0)\n" +
                 "Subject: %s\nPublic Key: %s format %s key\n"},
-        {"Unknown keyUsage type: ", "Unknown keyUsage type: "},
-        {"Unknown extendedkeyUsage type: ", "Unknown extendedkeyUsage type: "},
-        {"Unknown AccessDescription type: ", "Unknown AccessDescription type: "},
-        {"Unrecognized GeneralName type: ", "Unrecognized GeneralName type: "},
-        {"This extension cannot be marked as critical. ",
+        {"Unknown.keyUsage.type.", "Unknown keyUsage type: "},
+        {"Unknown.extendedkeyUsage.type.", "Unknown extendedkeyUsage type: "},
+        {"Unknown.AccessDescription.type.", "Unknown AccessDescription type: "},
+        {"Unrecognized.GeneralName.type.", "Unrecognized GeneralName type: "},
+        {"This.extension.cannot.be.marked.as.critical.",
                  "This extension cannot be marked as critical. "},
-        {"Odd number of hex digits found: ", "Odd number of hex digits found: "},
-        {"Unknown extension type: ", "Unknown extension type: "},
-        {"command {0} is ambiguous:", "command {0} is ambiguous:"},
+        {"Odd.number.of.hex.digits.found.", "Odd number of hex digits found: "},
+        {"Unknown.extension.type.", "Unknown extension type: "},
+        {"command.{0}.is.ambiguous.", "command {0} is ambiguous:"},
 
         // policytool
-        {"Warning: A public key for alias 'signers[i]' does not exist.  Make sure a KeyStore is properly configured.",
+        {"Warning.A.public.key.for.alias.signers.i.does.not.exist.Make.sure.a.KeyStore.is.properly.configured.",
                 "Warning: A public key for alias {0} does not exist.  Make sure a KeyStore is properly configured."},
-        {"Warning: Class not found: class", "Warning: Class not found: {0}"},
-        {"Warning: Invalid argument(s) for constructor: arg",
+        {"Warning.Class.not.found.class", "Warning: Class not found: {0}"},
+        {"Warning.Invalid.argument.s.for.constructor.arg",
                 "Warning: Invalid argument(s) for constructor: {0}"},
-        {"Illegal Principal Type: type", "Illegal Principal Type: {0}"},
-        {"Illegal option: option", "Illegal option: {0}"},
-        {"Usage: policytool [options]", "Usage: policytool [options]"},
-        {"  [-file <file>]    policy file location",
+        {"Illegal.Principal.Type.type", "Illegal Principal Type: {0}"},
+        {"Illegal.option.option", "Illegal option: {0}"},
+        {"Usage.policytool.options.", "Usage: policytool [options]"},
+        {".file.file.policy.file.location",
                 "  [-file <file>]    policy file location"},
         {"New", "New"},
         {"Open", "Open"},
         {"Save", "Save"},
-        {"Save As", "Save As"},
-        {"View Warning Log", "View Warning Log"},
+        {"Save.As", "Save As"},
+        {"View.Warning.Log", "View Warning Log"},
         {"Exit", "Exit"},
-        {"Add Policy Entry", "Add Policy Entry"},
-        {"Edit Policy Entry", "Edit Policy Entry"},
-        {"Remove Policy Entry", "Remove Policy Entry"},
+        {"Add.Policy.Entry", "Add Policy Entry"},
+        {"Edit.Policy.Entry", "Edit Policy Entry"},
+        {"Remove.Policy.Entry", "Remove Policy Entry"},
         {"Edit", "Edit"},
         {"Retain", "Retain"},
 
-        {"Warning: File name may include escaped backslash characters. " +
-                        "It is not necessary to escape backslash characters " +
-                        "(the tool escapes characters as necessary when writing " +
-                        "the policy contents to the persistent store).\n\n" +
-                        "Click on Retain to retain the entered name, or click on " +
-                        "Edit to edit the name.",
+        {"Warning.File.name.may.include.escaped.backslash.characters.It.is.not.necessary.to.escape.backslash.characters.the.tool.escapes",
             "Warning: File name may include escaped backslash characters. " +
                         "It is not necessary to escape backslash characters " +
                         "(the tool escapes characters as necessary when writing " +
@@ -470,203 +464,203 @@
                         "Click on Retain to retain the entered name, or click on " +
                         "Edit to edit the name."},
 
-        {"Add Public Key Alias", "Add Public Key Alias"},
-        {"Remove Public Key Alias", "Remove Public Key Alias"},
+        {"Add.Public.Key.Alias", "Add Public Key Alias"},
+        {"Remove.Public.Key.Alias", "Remove Public Key Alias"},
         {"File", "File"},
         {"KeyStore", "KeyStore"},
-        {"Policy File:", "Policy File:"},
-        {"Could not open policy file: policyFile: e.toString()",
+        {"Policy.File.", "Policy File:"},
+        {"Could.not.open.policy.file.policyFile.e.toString.",
                 "Could not open policy file: {0}: {1}"},
-        {"Policy Tool", "Policy Tool"},
-        {"Errors have occurred while opening the policy configuration.  View the Warning Log for more information.",
+        {"Policy.Tool", "Policy Tool"},
+        {"Errors.have.occurred.while.opening.the.policy.configuration.View.the.Warning.Log.for.more.information.",
                 "Errors have occurred while opening the policy configuration.  View the Warning Log for more information."},
         {"Error", "Error"},
         {"OK", "OK"},
         {"Status", "Status"},
         {"Warning", "Warning"},
-        {"Permission:                                                       ",
+        {"Permission.",
                 "Permission:                                                       "},
-        {"Principal Type:", "Principal Type:"},
-        {"Principal Name:", "Principal Name:"},
-        {"Target Name:                                                    ",
+        {"Principal.Type.", "Principal Type:"},
+        {"Principal.Name.", "Principal Name:"},
+        {"Target.Name.",
                 "Target Name:                                                    "},
-        {"Actions:                                                             ",
+        {"Actions.",
                 "Actions:                                                             "},
-        {"OK to overwrite existing file filename?",
+        {"OK.to.overwrite.existing.file.filename.",
                 "OK to overwrite existing file {0}?"},
         {"Cancel", "Cancel"},
-        {"CodeBase:", "CodeBase:"},
-        {"SignedBy:", "SignedBy:"},
-        {"Add Principal", "Add Principal"},
-        {"Edit Principal", "Edit Principal"},
-        {"Remove Principal", "Remove Principal"},
-        {"Principals:", "Principals:"},
-        {"  Add Permission", "  Add Permission"},
-        {"  Edit Permission", "  Edit Permission"},
-        {"Remove Permission", "Remove Permission"},
+        {"CodeBase.", "CodeBase:"},
+        {"SignedBy.", "SignedBy:"},
+        {"Add.Principal", "Add Principal"},
+        {"Edit.Principal", "Edit Principal"},
+        {"Remove.Principal", "Remove Principal"},
+        {"Principals.", "Principals:"},
+        {".Add.Permission", "  Add Permission"},
+        {".Edit.Permission", "  Edit Permission"},
+        {"Remove.Permission", "Remove Permission"},
         {"Done", "Done"},
-        {"KeyStore URL:", "KeyStore URL:"},
-        {"KeyStore Type:", "KeyStore Type:"},
-        {"KeyStore Provider:", "KeyStore Provider:"},
-        {"KeyStore Password URL:", "KeyStore Password URL:"},
+        {"KeyStore.URL.", "KeyStore URL:"},
+        {"KeyStore.Type.", "KeyStore Type:"},
+        {"KeyStore.Provider.", "KeyStore Provider:"},
+        {"KeyStore.Password.URL.", "KeyStore Password URL:"},
         {"Principals", "Principals"},
-        {"  Edit Principal:", "  Edit Principal:"},
-        {"  Add New Principal:", "  Add New Principal:"},
+        {".Edit.Principal.", "  Edit Principal:"},
+        {".Add.New.Principal.", "  Add New Principal:"},
         {"Permissions", "Permissions"},
-        {"  Edit Permission:", "  Edit Permission:"},
-        {"  Add New Permission:", "  Add New Permission:"},
-        {"Signed By:", "Signed By:"},
-        {"Cannot Specify Principal with a Wildcard Class without a Wildcard Name",
+        {".Edit.Permission.", "  Edit Permission:"},
+        {".Add.New.Permission.", "  Add New Permission:"},
+        {"Signed.By.", "Signed By:"},
+        {"Cannot.Specify.Principal.with.a.Wildcard.Class.without.a.Wildcard.Name",
             "Cannot Specify Principal with a Wildcard Class without a Wildcard Name"},
-        {"Cannot Specify Principal without a Name",
+        {"Cannot.Specify.Principal.without.a.Name",
             "Cannot Specify Principal without a Name"},
-        {"Permission and Target Name must have a value",
+        {"Permission.and.Target.Name.must.have.a.value",
                 "Permission and Target Name must have a value"},
-        {"Remove this Policy Entry?", "Remove this Policy Entry?"},
-        {"Overwrite File", "Overwrite File"},
-        {"Policy successfully written to filename",
+        {"Remove.this.Policy.Entry.", "Remove this Policy Entry?"},
+        {"Overwrite.File", "Overwrite File"},
+        {"Policy.successfully.written.to.filename",
                 "Policy successfully written to {0}"},
-        {"null filename", "null filename"},
-        {"Save changes?", "Save changes?"},
+        {"null.filename", "null filename"},
+        {"Save.changes.", "Save changes?"},
         {"Yes", "Yes"},
         {"No", "No"},
-        {"Policy Entry", "Policy Entry"},
-        {"Save Changes", "Save Changes"},
-        {"No Policy Entry selected", "No Policy Entry selected"},
-        {"Unable to open KeyStore: ex.toString()",
+        {"Policy.Entry", "Policy Entry"},
+        {"Save.Changes", "Save Changes"},
+        {"No.Policy.Entry.selected", "No Policy Entry selected"},
+        {"Unable.to.open.KeyStore.ex.toString.",
                 "Unable to open KeyStore: {0}"},
-        {"No principal selected", "No principal selected"},
-        {"No permission selected", "No permission selected"},
+        {"No.principal.selected", "No principal selected"},
+        {"No.permission.selected", "No permission selected"},
         {"name", "name"},
-        {"configuration type", "configuration type"},
-        {"environment variable name", "environment variable name"},
-        {"library name", "library name"},
-        {"package name", "package name"},
-        {"policy type", "policy type"},
-        {"property name", "property name"},
-        {"Principal List", "Principal List"},
-        {"Permission List", "Permission List"},
-        {"Code Base", "Code Base"},
-        {"KeyStore U R L:", "KeyStore U R L:"},
-        {"KeyStore Password U R L:", "KeyStore Password U R L:"},
+        {"configuration.type", "configuration type"},
+        {"environment.variable.name", "environment variable name"},
+        {"library.name", "library name"},
+        {"package.name", "package name"},
+        {"policy.type", "policy type"},
+        {"property.name", "property name"},
+        {"Principal.List", "Principal List"},
+        {"Permission.List", "Permission List"},
+        {"Code.Base", "Code Base"},
+        {"KeyStore.U.R.L.", "KeyStore U R L:"},
+        {"KeyStore.Password.U.R.L.", "KeyStore Password U R L:"},
 
 
         // javax.security.auth.PrivateCredentialPermission
-        {"invalid null input(s)", "invalid null input(s)"},
-        {"actions can only be 'read'", "actions can only be 'read'"},
-        {"permission name [name] syntax invalid: ",
+        {"invalid.null.input.s.", "invalid null input(s)"},
+        {"actions.can.only.be.read.", "actions can only be 'read'"},
+        {"permission.name.name.syntax.invalid.",
                 "permission name [{0}] syntax invalid: "},
-        {"Credential Class not followed by a Principal Class and Name",
+        {"Credential.Class.not.followed.by.a.Principal.Class.and.Name",
                 "Credential Class not followed by a Principal Class and Name"},
-        {"Principal Class not followed by a Principal Name",
+        {"Principal.Class.not.followed.by.a.Principal.Name",
                 "Principal Class not followed by a Principal Name"},
-        {"Principal Name must be surrounded by quotes",
+        {"Principal.Name.must.be.surrounded.by.quotes",
                 "Principal Name must be surrounded by quotes"},
-        {"Principal Name missing end quote",
+        {"Principal.Name.missing.end.quote",
                 "Principal Name missing end quote"},
-        {"PrivateCredentialPermission Principal Class can not be a wildcard (*) value if Principal Name is not a wildcard (*) value",
+        {"PrivateCredentialPermission.Principal.Class.can.not.be.a.wildcard.value.if.Principal.Name.is.not.a.wildcard.value",
                 "PrivateCredentialPermission Principal Class can not be a wildcard (*) value if Principal Name is not a wildcard (*) value"},
-        {"CredOwner:\n\tPrincipal Class = class\n\tPrincipal Name = name",
+        {"CredOwner.Principal.Class.class.Principal.Name.name",
                 "CredOwner:\n\tPrincipal Class = {0}\n\tPrincipal Name = {1}"},
 
         // javax.security.auth.x500
-        {"provided null name", "provided null name"},
-        {"provided null keyword map", "provided null keyword map"},
-        {"provided null OID map", "provided null OID map"},
+        {"provided.null.name", "provided null name"},
+        {"provided.null.keyword.map", "provided null keyword map"},
+        {"provided.null.OID.map", "provided null OID map"},
 
         // javax.security.auth.Subject
-        {"invalid null AccessControlContext provided",
+        {"invalid.null.AccessControlContext.provided",
                 "invalid null AccessControlContext provided"},
-        {"invalid null action provided", "invalid null action provided"},
-        {"invalid null Class provided", "invalid null Class provided"},
-        {"Subject:\n", "Subject:\n"},
-        {"\tPrincipal: ", "\tPrincipal: "},
-        {"\tPublic Credential: ", "\tPublic Credential: "},
-        {"\tPrivate Credentials inaccessible\n",
+        {"invalid.null.action.provided", "invalid null action provided"},
+        {"invalid.null.Class.provided", "invalid null Class provided"},
+        {"Subject.", "Subject:\n"},
+        {".Principal.", "\tPrincipal: "},
+        {".Public.Credential.", "\tPublic Credential: "},
+        {".Private.Credentials.inaccessible.",
                 "\tPrivate Credentials inaccessible\n"},
-        {"\tPrivate Credential: ", "\tPrivate Credential: "},
-        {"\tPrivate Credential inaccessible\n",
+        {".Private.Credential.", "\tPrivate Credential: "},
+        {".Private.Credential.inaccessible.",
                 "\tPrivate Credential inaccessible\n"},
-        {"Subject is read-only", "Subject is read-only"},
-        {"attempting to add an object which is not an instance of java.security.Principal to a Subject's Principal Set",
+        {"Subject.is.read.only", "Subject is read-only"},
+        {"attempting.to.add.an.object.which.is.not.an.instance.of.java.security.Principal.to.a.Subject.s.Principal.Set",
                 "attempting to add an object which is not an instance of java.security.Principal to a Subject's Principal Set"},
-        {"attempting to add an object which is not an instance of class",
+        {"attempting.to.add.an.object.which.is.not.an.instance.of.class",
                 "attempting to add an object which is not an instance of {0}"},
 
         // javax.security.auth.login.AppConfigurationEntry
-        {"LoginModuleControlFlag: ", "LoginModuleControlFlag: "},
+        {"LoginModuleControlFlag.", "LoginModuleControlFlag: "},
 
         // javax.security.auth.login.LoginContext
-        {"Invalid null input: name", "Invalid null input: name"},
-        {"No LoginModules configured for name",
+        {"Invalid.null.input.name", "Invalid null input: name"},
+        {"No.LoginModules.configured.for.name",
          "No LoginModules configured for {0}"},
-        {"invalid null Subject provided", "invalid null Subject provided"},
-        {"invalid null CallbackHandler provided",
+        {"invalid.null.Subject.provided", "invalid null Subject provided"},
+        {"invalid.null.CallbackHandler.provided",
                 "invalid null CallbackHandler provided"},
-        {"null subject - logout called before login",
+        {"null.subject.logout.called.before.login",
                 "null subject - logout called before login"},
-        {"unable to instantiate LoginModule, module, because it does not provide a no-argument constructor",
+        {"unable.to.instantiate.LoginModule.module.because.it.does.not.provide.a.no.argument.constructor",
                 "unable to instantiate LoginModule, {0}, because it does not provide a no-argument constructor"},
-        {"unable to instantiate LoginModule",
+        {"unable.to.instantiate.LoginModule",
                 "unable to instantiate LoginModule"},
-        {"unable to instantiate LoginModule: ",
+        {"unable.to.instantiate.LoginModule.",
                 "unable to instantiate LoginModule: "},
-        {"unable to find LoginModule class: ",
+        {"unable.to.find.LoginModule.class.",
                 "unable to find LoginModule class: "},
-        {"unable to access LoginModule: ",
+        {"unable.to.access.LoginModule.",
                 "unable to access LoginModule: "},
-        {"Login Failure: all modules ignored",
+        {"Login.Failure.all.modules.ignored",
                 "Login Failure: all modules ignored"},
 
         // sun.security.provider.PolicyFile
 
-        {"java.security.policy: error parsing policy:\n\tmessage",
+        {"java.security.policy.error.parsing.policy.message",
                 "java.security.policy: error parsing {0}:\n\t{1}"},
-        {"java.security.policy: error adding Permission, perm:\n\tmessage",
+        {"java.security.policy.error.adding.Permission.perm.message",
                 "java.security.policy: error adding Permission, {0}:\n\t{1}"},
-        {"java.security.policy: error adding Entry:\n\tmessage",
+        {"java.security.policy.error.adding.Entry.message",
                 "java.security.policy: error adding Entry:\n\t{0}"},
-        {"alias name not provided (pe.name)", "alias name not provided ({0})"},
-        {"unable to perform substitution on alias, suffix",
+        {"alias.name.not.provided.pe.name.", "alias name not provided ({0})"},
+        {"unable.to.perform.substitution.on.alias.suffix",
                 "unable to perform substitution on alias, {0}"},
-        {"substitution value, prefix, unsupported",
+        {"substitution.value.prefix.unsupported",
                 "substitution value, {0}, unsupported"},
-        {"(", "("},
-        {")", ")"},
-        {"type can't be null","type can't be null"},
+        {"LPARAM", "("},
+        {"RPARAM", ")"},
+        {"type.can.t.be.null","type can't be null"},
 
         // sun.security.provider.PolicyParser
-        {"keystorePasswordURL can not be specified without also specifying keystore",
+        {"keystorePasswordURL.can.not.be.specified.without.also.specifying.keystore",
                 "keystorePasswordURL can not be specified without also specifying keystore"},
-        {"expected keystore type", "expected keystore type"},
-        {"expected keystore provider", "expected keystore provider"},
-        {"multiple Codebase expressions",
+        {"expected.keystore.type", "expected keystore type"},
+        {"expected.keystore.provider", "expected keystore provider"},
+        {"multiple.Codebase.expressions",
                 "multiple Codebase expressions"},
-        {"multiple SignedBy expressions","multiple SignedBy expressions"},
-        {"SignedBy has empty alias","SignedBy has empty alias"},
-        {"can not specify Principal with a wildcard class without a wildcard name",
+        {"multiple.SignedBy.expressions","multiple SignedBy expressions"},
+        {"SignedBy.has.empty.alias","SignedBy has empty alias"},
+        {"can.not.specify.Principal.with.a.wildcard.class.without.a.wildcard.name",
                 "can not specify Principal with a wildcard class without a wildcard name"},
-        {"expected codeBase or SignedBy or Principal",
+        {"expected.codeBase.or.SignedBy.or.Principal",
                 "expected codeBase or SignedBy or Principal"},
-        {"expected permission entry", "expected permission entry"},
-        {"number ", "number "},
-        {"expected [expect], read [end of file]",
+        {"expected.permission.entry", "expected permission entry"},
+        {"number.", "number "},
+        {"expected.expect.read.end.of.file.",
                 "expected [{0}], read [end of file]"},
-        {"expected [;], read [end of file]",
+        {"expected.read.end.of.file.",
                 "expected [;], read [end of file]"},
-        {"line number: msg", "line {0}: {1}"},
-        {"line number: expected [expect], found [actual]",
+        {"line.number.msg", "line {0}: {1}"},
+        {"line.number.expected.expect.found.actual.",
                 "line {0}: expected [{1}], found [{2}]"},
-        {"null principalClass or principalName",
+        {"null.principalClass.or.principalName",
                 "null principalClass or principalName"},
 
         // sun.security.pkcs11.SunPKCS11
-        {"PKCS11 Token [providerName] Password: ",
+        {"PKCS11.Token.providerName.Password.",
                 "PKCS11 Token [{0}] Password: "},
 
         /* --- DEPRECATED --- */
         // javax.security.auth.Policy
-        {"unable to instantiate Subject-based policy",
+        {"unable.to.instantiate.Subject.based.policy",
                 "unable to instantiate Subject-based policy"}
     };
 
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/jdk/test/sun/security/util/Resources/NewNamesFormat.java	Thu Nov 11 15:51:12 2010 +0800
@@ -0,0 +1,74 @@
+/*
+ * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+ * or visit www.oracle.com if you need additional information or have any
+ * questions.
+ */
+
+/*
+ * @test
+ * @bug 6987827
+ * @summary security/util/Resources.java needs improvement
+ */
+
+
+import java.lang.reflect.Method;
+import java.util.HashSet;
+import java.util.Set;
+
+/**
+ * This test makes sure that the keys in resources files are using the new
+ * format and there is no duplication.
+ */
+public class NewNamesFormat {
+    public static void main(String[] args) throws Exception {
+        checkRes("sun.security.util.Resources");
+        checkRes("sun.security.util.AuthResources");
+        checkRes("sun.security.tools.JarSignerResources");
+    }
+
+    private static void checkRes(String resName) throws Exception {
+        System.out.println("Checking " + resName + "...");
+        Class clazz = Class.forName(resName);
+        Method m = clazz.getMethod("getContents");
+        Object[][] contents = (Object[][])m.invoke(clazz.newInstance());
+        Set<String> keys = new HashSet<String>();
+        for (Object[] pair: contents) {
+            String key = (String)pair[0];
+            if (keys.contains(key)) {
+                System.out.println("Found dup: " + key);
+                throw new Exception();
+            }
+            checkKey(key);
+            keys.add(key);
+        }
+    }
+
+    private static void checkKey(String key) throws Exception {
+        for (char c: key.toCharArray()) {
+            if (Character.isLetter(c) || Character.isDigit(c) ||
+                    c == '{' || c == '}' || c == '.') {
+                // OK
+            } else {
+                System.out.println("Illegal char [" + c + "] in key: " + key);
+                throw new Exception();
+            }
+        }
+    }
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/jdk/test/sun/security/util/Resources/NewResourcesNames.java	Thu Nov 11 15:51:12 2010 +0800
@@ -0,0 +1,439 @@
+/*
+ * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+ * or visit www.oracle.com if you need additional information or have any
+ * questions.
+ */
+
+import java.io.BufferedReader;
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.FileOutputStream;
+import java.io.InputStreamReader;
+import java.io.PrintWriter;
+import java.util.HashMap;
+import java.util.HashSet;
+import java.util.ListResourceBundle;
+import java.util.Map;
+import java.util.Set;
+
+/**
+ * Prepares new key names for Resources.java.
+ * 6987827: security/util/Resources.java needs improvement
+ *
+ * Run inside jdk/src/share/classes:
+ *
+ *      java NewResourcesNames $(
+ *          for a in $(find com/sun/security sun/security javax/security -type f); do
+ *              egrep -q '(ResourcesMgr.getString|rb.getString)' $a && echo $a
+ *          done)
+ *
+ * Before running this tool, run the following two commands to make sure there
+ * are only these 2 types of calls into the resources:
+ *      for a in `find com/sun/security sun/security javax/security -type f`; do
+ *          cat $a | perl -ne 'print if /\bResourcesMgr\b/'; done |
+ *          grep -v ResourcesMgr.getString
+ *      for a in `find com/sun/security sun/security -type f`; do
+ *          cat $a | perl -ne 'print if /\brb\b/'; done |
+ *          grep -v rb.getString
+ */
+class NewResourcesNames {
+
+    // Max length of normalized names
+    static int MAXLEN = 127;
+
+    static String[] resources = {
+        "sun/security/tools/JarSignerResources.java",
+        "sun/security/util/Resources.java",
+        "sun/security/util/AuthResources.java",
+    };
+
+    public static void main(String[] args) throws Exception {
+
+        // Load all names inside resources files
+        Map<String,String> allnames = loadResources();
+
+        // Modify the callers. There are two patterns:
+        // 1. ResourcesMgr.getString("
+        //    used by most JAAS codes
+        // 2. rb.getString("
+        //    used by tools
+        Set<String> allfound = new HashSet<String>();
+        for (String arg: args) {
+            allfound.addAll(rewriteFile(arg, "ResourcesMgr.getString(\""));
+            allfound.addAll(rewriteFile(arg, "rb.getString(\""));
+        }
+
+        // Special case 1: KeyTool's enum definition of commands and options
+        allfound.addAll(keyToolEnums());
+
+        // Special case 2: PolicyFile called this 4 times
+        allfound.addAll(rewriteFile("sun/security/provider/PolicyFile.java",
+                "ResourcesMgr.getString(POLICY+\""));
+
+        // During the calls above, you can read sth like:
+        //
+        //      Working on com/sun/security/auth/PolicyParser.java
+        //          GOOD  match is 17
+        //
+        // This means a " exists right after getString(. Sometimes you see
+        //
+        //      Working on sun/security/tools/KeyTool.java
+        //          BAD!! pmatch != match: 212 != 209
+        //      Working on sun/security/provider/PolicyFile.java
+        //          BAD!! pmatch != match: 14 != 10
+        //
+        // which is mismatch. There are only two such special cases list above.
+        // For KeyTool, there are 3 calls for showing help. For PolicyTool, 3
+        // for name prefixed with POLICY. They are covered in the two special
+        // cases above.
+
+        // Names used but not defined. This is mostly error, except for
+        // special case 2 above. So it's OK to see 3 entries red here
+        if (!allnames.keySet().containsAll(allfound)) {
+            err("FATAL: Undefined names");
+            for (String name: allfound) {
+                if (!allnames.keySet().contains(name)) {
+                    err("   " + name);
+                }
+            }
+        }
+
+        // Names defined but not used. Mostly this is old entries not removed.
+        // When soemone remove a line of code, he dares not remove the entry
+        // in case it's also used somewhere else.
+        if (!allfound.containsAll(allnames.keySet())) {
+            System.err.println("WARNING: Unused names");
+            for (String name: allnames.keySet()) {
+                if (!allfound.contains(name)) {
+                    System.err.println(allnames.get(name));
+                    System.err.println("  " + normalize(name));
+                    System.err.println("  [" + name + "]");
+                }
+            }
+        }
+    }
+
+
+    /**
+     * Loads the three resources files. Saves names into a Map.
+     */
+    private static Map<String,String> loadResources() throws Exception {
+
+        // Name vs Resource
+        Map<String,String> allnames = new HashMap<String,String>();
+
+        for (String f: resources) {
+            String clazz =
+                    f.replace('/', '.').substring(0, f.length()-5);
+
+            Set<String> expected = loadClass(clazz);
+            Set<String> found = rewriteFile(f, "{\"");
+
+            // This is to check that word parsing is identical to Java thinks
+            if (!expected.equals(found)) {
+                throw new Exception("Expected and found do not match");
+            }
+
+            for (String name: found) {
+                allnames.put(name, f);
+            }
+        }
+        return allnames;
+    }
+
+    /**
+     * Special case treat for enums description in KeyTool
+     */
+    private static Set<String> keyToolEnums() throws Exception {
+
+        Set<String> names = new HashSet<String>();
+
+        String file = "sun/security/tools/KeyTool.java";
+        System.err.println("Working on " + file);
+        File origFile = new File(file);
+        File tmpFile = new File(file + ".tmp");
+        origFile.renameTo(tmpFile);
+        tmpFile.deleteOnExit();
+
+        BufferedReader br = new BufferedReader(
+                new InputStreamReader(new FileInputStream(tmpFile)));
+        PrintWriter out = new PrintWriter(new FileOutputStream(origFile));
+
+        int stage = 0;  // 1. commands, 2. options, 3. finished
+        int match = 0;
+
+        while (true) {
+            String s = br.readLine();
+            if (s == null) {
+                break;
+            }
+            if (s.indexOf("enum Command") >= 0) stage = 1;
+            else if (s.indexOf("enum Option") >= 0) stage = 2;
+            else if (s.indexOf("private static final String JKS") >= 0) stage = 3;
+
+            if (stage == 1 || stage == 2) {
+                if (s.indexOf("(\"") >= 0) {
+                    match++;
+                    int p1, p2;
+                    if (stage == 1) {
+                        p1 = s.indexOf("\"");
+                        p2 = s.indexOf("\"", p1+1);
+                    } else {
+                        p2 = s.lastIndexOf("\"");
+                        p1 = s.lastIndexOf("\"", p2-1);
+                    }
+                    String name = s.substring(p1+1, p2);
+                    names.add(name);
+                    out.println(s.substring(0, p1+1) +
+                            normalize(name) +
+                            s.substring(p2));
+                } else {
+                    out.println(s);
+                }
+            } else {
+                out.println(s);
+            }
+        }
+        br.close();
+        out.close();
+        System.err.println("    GOOD  match is " + match);
+        return names;
+    }
+
+    /**
+     * Loads a resources using JRE and returns the names
+     */
+    private static Set<String> loadClass(String clazz) throws Exception {
+        ListResourceBundle lrb =
+                (ListResourceBundle)Class.forName(clazz).newInstance();
+        Set<String> keys = lrb.keySet();
+        Map<String,String> newold = new HashMap<String,String>();
+        boolean dup = false;
+        // Check if normalize() creates dup entries. This is crucial.
+        for (String k: keys) {
+            String key = normalize(k);
+            if (newold.containsKey(key)) {
+                err("Dup found for " + key + ":");
+                err("["+newold.get(key)+"]");
+                err("["+k+"]");
+                dup = true;
+            }
+            newold.put(key, k);
+        }
+        if (dup) throw new Exception();
+        return keys;
+    }
+
+    /**
+     * Rewrites a file using a pattern. The name string should be right after
+     * the pattern. Note: pattern ignores whitespaces. Returns names found.
+     */
+    private static Set<String> rewriteFile(String file, String pattern)
+            throws Exception {
+
+        System.err.println("Working on " + file);
+        Set<String> names = new HashSet<String>();
+
+        int plen = pattern.length();
+        int match = 0;
+
+        // The bare XXX.getString is also matched. Sometimes getString is
+        // called but does not use literal strings. This is harder to solve.
+
+        int pmatch = 0;
+        int pheadlen = plen - 2;
+        String phead = pattern.substring(0, plen-2);
+
+        // The non-whitespace chars read since, used to check for pattern
+        StringBuilder history = new StringBuilder();
+        int hlen = 0;
+
+        File origFile = new File(file);
+        File tmpFile = new File(file + ".tmp");
+        origFile.renameTo(tmpFile);
+        tmpFile.deleteOnExit();
+
+        FileInputStream fis = new FileInputStream(tmpFile);
+        FileOutputStream fos = new FileOutputStream(origFile);
+
+        while (true) {
+            int ch = fis.read();
+            if (ch < 0) break;
+            if (!Character.isWhitespace(ch)) {
+                history.append((char)ch);
+                hlen++;
+                if (pheadlen > 0 && hlen >= pheadlen &&
+                        history.substring(hlen-pheadlen, hlen).equals(phead)) {
+                    pmatch++;
+                }
+            }
+
+            if (hlen >= plen &&
+                    history.substring(hlen-plen, hlen).equals(pattern)) {
+                match++;
+                history = new StringBuilder();
+                hlen = 0;
+
+                fos.write(ch);
+
+                // Save a name
+                StringBuilder sb = new StringBuilder();
+                // Save things after the second ". Maybe it's an end, maybe
+                // it's just literal string concatenation.
+                StringBuilder tail = new StringBuilder();
+
+                boolean in = true;  // inside name string
+                while (true) {
+                    int n = fis.read();
+                    if (in) {
+                        if (n == '\\') {
+                            int second = fis.read();
+                            switch (second) {
+                                case 'n': sb.append('\n'); break;
+                                case 'r': sb.append('\r'); break;
+                                case 't': sb.append('\t'); break;
+                                case '"': sb.append('"'); break;
+                                default: throw new Exception(String.format(
+                                        "I don't know this escape: %s%c",
+                                        sb.toString(), second));
+                            }
+                        } else if (n == '"') {
+                            in = false;
+                            // Maybe string concat? say bytes until clear
+                            tail = new StringBuilder();
+                            tail.append('"');
+                        } else {
+                            sb.append((char)n);
+                        }
+                    } else {
+                        tail.append((char)n);
+                        if (n == '"') { // string concat, in again
+                            in = true;
+                        } else if (n == ',' || n == ')') {  // real end
+                            break;
+                        } else if (Character.isWhitespace(n) || n == '+') {
+                            // string concat
+                        } else {
+                            throw new Exception("Not a correct concat");
+                        }
+                    }
+                }
+                String s = sb.toString();
+                names.add(s);
+                fos.write(normalize(s).getBytes());
+                fos.write(tail.toString().getBytes());
+            } else {
+                fos.write(ch);
+            }
+        }
+
+        // Check pheadlen > 0. Don't want to mess with rewrite for resources
+        if (pheadlen > 0 && pmatch != match) {
+            err("    BAD!! pmatch != match: " + pmatch + " != " + match);
+        } else {
+            System.err.println("    GOOD  match is " + match);
+        }
+
+        fis.close();
+        fos.close();
+        return names;
+    }
+
+    /**
+     * Normalize a string. Rules:
+     *
+     * 1. If all spacebar return "nSPACE", n is count
+     * 2. If consisting at least one alphanumeric:
+     *   a. All alphanumeric remain
+     *   b. All others in a row goes to a single ".", even if at head or tail
+     * 3. Otherwise:
+     *   a. "****\n\n" to "STARNN", special case
+     *   b. the English name if first char in *,.\n():'"
+     *
+     * Current observations show there's no dup, Hurray! Otherwise, add more
+     * special cases.
+     */
+    private static String normalize(String s) throws Exception {
+        boolean needDot = false;
+
+        // All spacebar case
+        int n = 0;
+        for (char c: s.toCharArray()) {
+            if (c == ' ') n++;
+            else n = -10000;
+        }
+        if (n == 1) return "SPACE";
+        else if (n > 1) return "" + n + "SPACE";
+
+        StringBuilder sb = new StringBuilder();
+        int dotpos = -1;
+        for (int i=0; i<s.length(); i++) {
+            char c = s.charAt(i);
+            if (Character.isLetter(c) || Character.isDigit(c) ||
+                    c == '{' || c == '}') {
+                if (needDot) {
+                    // Rememeber the last dot, we want shorter form nice
+                    if (sb.length() <= MAXLEN) dotpos = sb.length();
+                    // "." only added when an alphanumeric is seen. This makes
+                    // sure sb is empty when there's no alphanumerics at all
+                    sb.append(".");
+                }
+                sb.append(c);
+                needDot = false;
+            } else {
+                needDot = true;
+            }
+        }
+
+        // No alphanemeric?
+        if (sb.length() == 0) {
+            if (s.contains("*") && s.contains("\n")) {
+                return "STARNN";
+            }
+            for (char c: s.toCharArray()) {
+                switch (c) {
+                    case '*': return "STAR";
+                    case ',': return "COMMA";
+                    case '.': return "PERIOD";
+                    case '\n': return "NEWLINE";
+                    case '(': return "LPARAM";
+                    case ')': return "RPARAM";
+                    case ':': return "COLON";
+                    case '\'': case '"': return "QUOTE";
+                }
+            }
+            throw new Exception("Unnamed char: [" + s + "]");
+        }
+
+        // tail "." only added when there are alphanumerics
+        if (needDot) sb.append('.');
+        String res = sb.toString();
+        if (res.length() > MAXLEN) {
+            if (dotpos < 0) throw new Exception("No dot all over? " + s);
+            return res.substring(0, dotpos);
+        } else {
+            return res;
+        }
+    }
+
+    private static void err(String string) {
+        System.out.println("\u001b[1;37;41m" + string + "\u001b[m");
+    }
+}