1 # messages.properties -- English language messages and message formats
2 # Copyright (C) 2006 Free Software Foundation, Inc.
4 # This file is part of GNU Classpath.
6 # GNU Classpath is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2, or (at your option)
11 # GNU Classpath is distributed in the hope that it will be useful, but
12 # WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 # General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with GNU Classpath; see the file COPYING. If not, write to the
18 # Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
21 # Linking this library statically or dynamically with other modules is
22 # making a combined work based on this library. Thus, the terms and
23 # conditions of the GNU General Public License cover the whole
26 # As a special exception, the copyright holders of this library give you
27 # permission to link this library with independent modules to produce an
28 # executable, regardless of the license terms of these independent
29 # modules, and to copy and distribute the resulting executable under
30 # terms of your choice, provided that you also meet, for each linked
31 # independent module, the terms and conditions of the license of that
32 # module. An independent module is a module which is not derived from
33 # or based on this library. If you modify this library, you may extend
34 # this exception to your version of the library, but you are not
35 # obligated to do so. If you do not wish to do so, delete this
36 # exception statement from your version.
38 # for gnu.classpath.tools.keytool package
42 Main.8=keytool error: {0}
43 Main.18=Unrecognized command: {0}
44 Main.19=Usage: keytool [COMMAND] [-- COMMAND]...\n\
45 Manage private keys and public certificates.
46 Main.20=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
47 Main.21=Available commands
48 Main.22=Generate a Key Entry, eventually creating a key store.\n\
49 [-alias ALIAS] [-keyalg ALGORITHM] [-keysize KEY_SIZE]\n\
50 [-sigalg ALGORITHM] [-dname NAME] [-keypass PASSWORD]\n\
51 [-validity DAY_COUNT] [-storetype STORE_TYPE]\n\
52 [-keystore URL] [-storepass PASSWORD]\n\
53 [-provider PROVIDER_CLASS_NAME] [-v].
54 Main.23=Add Key Entries and Trusted Certificates.\n\
55 [-alias ALIAS] [-file FILE] [-keypass PASSWORD]\n\
56 [-noprompt] [-trustcacerts] [-storetype STORE_TYPE]\n\
57 [-keystore URL] [-storepass PASSWORD]\n\
58 [-provider PROVIDER_CLASS_NAME] [-v].
59 Main.24=Generate a self-signed Trusted Certificate.\n\
60 [-alias ALIAS] [-sigalg ALGORITHM] [-dname NAME]\n\
61 [-validity DAY_COUNT] [-keypass PASSWORD]\n\
62 [-storetype STORE_TYPE] [-keystore URL]\n\
63 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
64 Main.25=NOT IMPLEMENTED YET. Import JDK1.1 Identity Database.\n\
65 [-file FILE] [-storetype STORE_TYPE] [-keystore URL]\n\
66 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
67 Main.26=Issue a Certificate Signing Request (CSR).\n\
68 [-alias ALIAS] [-sigalg ALGORITHM] [-file FILE]\n\
69 [-keypass PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
70 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v]\n\
72 Main.27=Export a Certificate from a key store.\n\
73 [-alias ALIAS] [-file FILE] [-storetype STORE_TYPE]\n\
74 [-keystore URL] [-storepass PASSWORD]\n\
75 [-provider PROVIDER_CLASS_NAME] [-rfc] [-v].
76 Main.28=Print one or all Certificates in a key store to STDOUT.\n\
77 [-alias ALIAS] [-storetype STORE_TYPE] [-keystore URL]\n\
78 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-rfc] [-v].
79 Main.29=Print a human-readable form of a Certificate in a FILE.\n\
81 Main.30=Clone a Key Entry in a key store.\n\
82 [-alias ALIAS] [-dest ALIAS] [-keypass PASSWORD]\n\
83 [-new PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
84 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
85 Main.31=Change the password protecting a key store.\n\
86 [-new PASSWORD] [-storetype STORE_TYPE] [-keystore URL]\n\
87 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
88 Main.32=Change the password protecting a Key Entry in a key store.\n\
89 [-alias ALIAS] [-keypass PASSWORD] [-new PASSWORD]\n\
90 [-storetype STORE_TYPE] [-keystore URL]\n\
91 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
92 Main.33=Delete a Key Entry or a Trusted Certificate from a key store.\n\
93 [-alias ALIAS] [-storetype STORE_TYPE] [-keystore URL]\n\
94 [-storepass PASSWORD] [-provider PROVIDER_CLASS_NAME] [-v].
96 Command.19=Failed creating new file at {0}
97 Command.20=Unable to find a suitable signature algorithm named {0}, although we found a key-pair generation algorithm named {1}
98 Command.21=Enter key password for <{0}>:
99 Command.23=A correct key password MUST be provided
100 Command.24=Enter key store password:
101 #Command.36=Option '-keystore' is undefined, or is an empty string, and 'user.home' is unknown
102 Command.36=Unable to locate a valid key store
103 Command.40=Provider fully qualified class name:
104 Command.42=File object [{0}] exists but is NOT a file
105 Command.44=File [{0}] exists but is NOT writable
106 Command.46=File object [{0}] MUST be an existing readable file
107 Command.48=Signature algorithm is missing and private key is of unknown or unsupported type
108 Command.51=Validity period MUST be greater than zero
109 Command.52=Unable to get signature algorithm name
110 Command.60=Unknown or unsupported signature algorithm: {0}
111 Command.63=Saving key store at {0}
112 Command.66=Owner: {0}
113 Command.67=Issuer: {0}
114 Command.68=Serial number: {0,number}
115 Command.69=Valid from: {0,date,full} - {0,time,full}
116 Command.70=\ \ \ \ \ until: {0,date,full} - {0,time,full}
117 Command.71=Certificate fingerprints
118 Command.72=\ \ \ \ \ \ MD5: {0}
119 Command.73=\ \ SHA-160: {0}
120 Command.75=Alias [{0}] MUST be knwon to the key store
121 Command.77=Alias [{0}] MUST be associated with a Key Entry
123 CertReqCmd.27=Certification request stored in {0}
124 CertReqCmd.28=Submit this to your CA
125 CertReqCmd.25=Usage: keytool -certreq [OPTION]...\n\
126 Generate a PKCS#10 Certificate Signing Request (CSR) and write it to a \
127 designated output destination.\n\n\
128 IMPORTANT: Some documentation claims that the Attributes field, in the CSR is \
129 OPTIONAL while RFC-2986 implies the opposite. This implementation considers \
130 this field, by default, as OPTIONAL, unless option -attributes is specified.
131 CertReqCmd.24=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
132 CertReqCmd.23=Command options
133 CertReqCmd.22=Alias of an entry in the key store on whose behalf the CSR is \
134 generated. The value "mykey" (all lower case, without the enclosing quotes) \
135 is used when this option is omitted.
137 CertReqCmd.20=Name of the digital signature algorithm to use for signing the \
138 certificate. If omitted, a default value is chosen based on the type of the \
139 private key associated with ALIAS. If the key is a "DSA" one, the value for \
140 signature algorithm will be "SHA1withDSA". If on the other hand the key is \
141 an "RSA" one, then "MD5withRSA" will be the signature algorithm.
142 CertReqCmd.19=ALGORITHM
143 CertReqCmd.18=Destination of the generated CSR. STDOUT is used if this \
146 CertReqCmd.16=Password to unlock the Key Entry associated with ALIAS. If \
147 omitted, the tool will attempt to unlock the Key Entry using the same password \
148 protecting the key store. If this fails, you will be prompted for a password.
149 CertReqCmd.14=Type of the key store to use. If omitted, the default value is \
150 that of the property "keystore.type" in the security properties file.
151 CertReqCmd.13=STORE_TYPE
152 CertReqCmd.12=Location of the key store to use. The default value is a \
153 file-based scheme whose path is the file named ".keystore" in your home \
155 If URL is malformed, the tool will use URL as a file-name of a key store; \
156 i.e. as if the protocol was "file:".
158 CertReqCmd.10=Password to unlock the key store. If omitted, you will be \
160 CertReqCmd.9=PASSWORD
161 CertReqCmd.8=Fully qualified class name of a Security Provider to add to the \
163 CertReqCmd.7=PROVIDER_CLASS_NAME
164 CertReqCmd.6=Emit more verbose messages.
165 CertReqCmd.5=Force the tool to encode a NULL DER value in the CSR as the value \
166 of the Attributes field.
168 DeleteCmd.19=Enter the Alias to delete:
169 DeleteCmd.18=Usage: keytool -delete [OPTION]...\n\
170 Delete a designated key store entry.
171 DeleteCmd.17=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
172 DeleteCmd.16=Command options
173 DeleteCmd.15=Alias of an entry to delete. The value "mykey" (all lower case, \
174 without the enclosing quotes) is used when this option is omitted.
176 DeleteCmd.13=Type of the key store to use. If omitted, the default value is \
177 that of the property "keystore.type" in the security properties file.
178 DeleteCmd.12=STORE_TYPE
179 DeleteCmd.11=Location of the key store to use. The default value is a \
180 file-based scheme whose path is the file named ".keystore" in your home \
182 If URL is malformed, the tool will use URL as a file-name of a key store; \
183 i.e. as if the protocol was "file:".
185 DeleteCmd.20=Alias MUST NOT be null or an empty string
186 DeleteCmd.9=Password to unlock the key store. If omitted, you will be \
189 DeleteCmd.7=Fully qualified class name of a Security Provider to add to the \
191 DeleteCmd.6=PROVIDER_CLASS_NAME
192 DeleteCmd.5=Emit more verbose messages.
194 GenKeyCmd.0=\nYou are about to enter information that will be incorporated into\n\
195 your certificate request. This information is what is called a\n\
196 Distinguished Name or DN. There are quite a few fields but you\n\
197 can use supplied default values, displayed between brackets, by just\n\
198 hitting <Enter>, or blank the field by entering the <.> character\n\
199 before hitting <Enter>.\n\n
200 GenKeyCmd.6=The Sample Company
204 GenKeyCmd.10=Common Name (hostname, IP, or your name):
205 GenKeyCmd.11=Organization Name (company) [{0}]:
206 GenKeyCmd.13=Organizational Unit Name (department, division):
207 GenKeyCmd.14=Locality Name (city, district) [{0}]:
208 GenKeyCmd.16=State or Province Name (full name) [{0}]:
209 GenKeyCmd.18=Country Name (2 letter code) [{0}]:
210 GenKeyCmd.54=Key size MUST be greater than zero
211 GenKeyCmd.57=Usage: keytool -genkey [OPTION]...\n\
212 Generate a new key-pair and save these credentials in the key store as a Key \
213 Entry, associated with a designated Alias.
214 GenKeyCmd.58=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
215 GenKeyCmd.59=Command options
216 GenKeyCmd.60=Alias of the Key Entry to generate. The value "mykey" (all lower \
217 case, without the enclosing quotes) is used when this option is omitted.
219 GenKeyCmd.62=Name of the key-pair generation algorithm. The default value is \
220 "DSS" (a synonym for the Digital Signature Algorithm also known as DSA).
221 GenKeyCmd.63=ALGORITHM
222 GenKeyCmd.64=Number of bits of the shared modulus, for both the public and \
223 private keys, to use for the new keys. If omitted, 1024 is used.
225 GenKeyCmd.66=Name of the digital signature algorithm to use for signing the \
226 certificate. If omitted, a default value is chosen based on the type of the \
227 private key associated with ALIAS. If the key is a "DSA" one, the value for \
228 signature algorithm will be "SHA1withDSA". If on the other hand the key is \
229 an "RSA" one, then "MD5withRSA" will be the signature algorithm.
230 GenKeyCmd.68=The X.500 Distinguished Name of the Subject of the generated \
231 certificate. If omitted you will be prompted for one.
233 GenKeyCmd.70=Password to protect the newly created Key Entry. If omitted, \
234 you will be prompted to provide a password.
235 GenKeyCmd.71=PASSWORD
236 GenKeyCmd.72=Number of days the generated certificate is valid for. If \
238 GenKeyCmd.73=DAY_COUNT
239 GenKeyCmd.74=Type of the key store to use. If omitted, the default value is \
240 that of the property "keystore.type" in the security properties file.
241 GenKeyCmd.75=STORE_TYPE
242 GenKeyCmd.76=Location of the key store to use. The default value is a \
243 file-based scheme whose path is the file named ".keystore" in your home \
245 If URL is malformed, the tool will use URL as a file-name of a key store; \
246 i.e. as if the protocol was "file:".
248 GenKeyCmd.78=Password to unlock the key store. If omitted, you will be \
250 GenKeyCmd.80=Fully qualified class name of a Security Provider to add to the \
252 GenKeyCmd.81=PROVIDER_CLASS_NAME
253 GenKeyCmd.82=Emit more verbose messages.
255 StorePasswdCmd.19=Too many failed attempts
256 StorePasswdCmd.18=Usage: keytool -storepasswd [OPTION]...\n\
257 Change the password protecting a key store.
258 StorePasswdCmd.17=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
259 StorePasswdCmd.16=Command options
260 StorePasswdCmd.15=The new, and different, password to protect the key store. \
261 If omitted, you will be prompted for one.
262 StorePasswdCmd.13=Type of the key store to use. If omitted, the default value is \
263 that of the property "keystore.type" in the security properties file.
264 StorePasswdCmd.12=STORE_TYPE
265 StorePasswdCmd.11=Location of the key store to use. The default value is a \
266 file-based scheme whose path is the file named ".keystore" in your home \
268 If URL is malformed, the tool will use URL as a file-name of a key store; \
269 i.e. as if the protocol was "file:".
270 StorePasswdCmd.10=URL
271 StorePasswdCmd.20=Enter new key store password:
272 StorePasswdCmd.21=Password MUST be at least 6 characters.
273 StorePasswdCmd.22=New password MUST be different than the old one.
274 StorePasswdCmd.23=Re-enter new key store password:
275 StorePasswdCmd.24=Passwords MUST be the same in both attempts.
276 StorePasswdCmd.9=Password to unlock the key store. If omitted, you will be \
278 StorePasswdCmd.8=PASSWORD
279 StorePasswdCmd.7=Fully qualified class name of a Security Provider to add to the \
281 StorePasswdCmd.6=PROVIDER_CLASS_NAME
282 StorePasswdCmd.5=Emit more verbose messages.
284 KeyPasswdCmd.24=Enter new key password for <{0}>:
285 KeyPasswdCmd.28=Re-enter new key password for <{0}>:
286 KeyPasswdCmd.23=Usage: keytool -keypasswd [OPTION]...\n\
287 Change the password protecting a Key Entry.
288 KeyPasswdCmd.22=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
289 KeyPasswdCmd.21=Command options
290 KeyPasswdCmd.20=The Alias which password is to be changed.
291 KeyPasswdCmd.19=ALIAS
292 KeyPasswdCmd.18=Password to unlock ALIAS. If omitted, the tool will attempt \
293 to unlock the Key Entry using the same password protecting the key store. If \
294 this fails, you will be prompted for a password.
295 KeyPasswdCmd.16=The new, and different, password to protect ALIAS.
296 KeyPasswdCmd.14=Type of the key store to use. If omitted, the default value is \
297 that of the property "keystore.type" in the security properties file.
298 KeyPasswdCmd.13=STORE_TYPE
299 KeyPasswdCmd.12=Location of the key store to use. The default value is a \
300 file-based scheme whose path is the file named ".keystore" in your home \
302 If URL is malformed, the tool will use URL as a file-name of a key store; \
303 i.e. as if the protocol was "file:".
305 KeyPasswdCmd.10=Password to unlock the key store. If omitted, you will be \
307 KeyPasswdCmd.9=PASSWORD
308 KeyPasswdCmd.8=Fully qualified class name of a Security Provider to add to the \
310 KeyPasswdCmd.7=PROVIDER_CLASS_NAME
311 KeyPasswdCmd.6=Emit more verbose messages.
313 KeyCloneCmd.23=Destination Alias MUST NOT exist in key store
314 KeyCloneCmd.26=Enter destination alias:
315 KeyCloneCmd.27=Destination alias MUST NOT be null nor empty
316 KeyCloneCmd.28=Enter new key password for <{0}> [{1}]:
317 KeyCloneCmd.22=Usage: keytool -keyclone [OPTION]...\n\
318 Clone an existing Key Entry and store it under a new (different) Alias \
319 protecting its private key material with possibly a new password.
320 KeyCloneCmd.21=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
321 KeyCloneCmd.20=Command options
322 KeyCloneCmd.19=Alias of an entry to clone. The value "mykey" (all lower case, \
323 without the enclosing quotes) is used when this option is omitted.
324 KeyCloneCmd.17=Alias to identify the cloned copy of the Key Entry.
326 KeyCloneCmd.15=Password to unlock the Key Entry associated with the Alias to \
327 clone. If omitted, the tool will attempt to unlock the Key Entry using the \
328 same password protecting the key store. If this fails, you will be prompted \
330 KeyCloneCmd.13=Password to protect the cloned copy of the Key Entry. If \
331 omitted, you will be prompted to provide one.
332 KeyCloneCmd.11=Type of the key store to use. If omitted, the default value is \
333 that of the property "keystore.type" in the security properties file.
334 KeyCloneCmd.10=STORE_TYPE
335 KeyCloneCmd.9=Location of the key store to use. The default value is a \
336 file-based scheme whose path is the file named ".keystore" in your home \
338 If URL is malformed, the tool will use URL as a file-name of a key store; \
339 i.e. as if the protocol was "file:".
341 KeyCloneCmd.7=Password to unlock the key store. If omitted, you will be \
343 KeyCloneCmd.6=PASSWORD
344 KeyCloneCmd.5=Fully qualified class name of a Security Provider to add to the \
346 KeyCloneCmd.4=PROVIDER_CLASS_NAME
347 KeyCloneCmd.3=Emit more verbose messages.
349 ListCmd.21=Key store type: {0}
350 ListCmd.22=Key store provider: {0}
351 ListCmd.24=Key store contains {0,number} entry(ies)
352 ListCmd.20=Usage: keytool -list [OPTION]...\n\
353 Print one or all of the key store entries to STDOUT. Usually this command \
354 will only print a fingerprint of the certificate, unless either -rfc or -v \
356 ListCmd.30=Alias name: {0}
357 ListCmd.31=Creation timestamp: {0,date,full} - {0,time,full}
358 ListCmd.32=Entry type: trusted-certificate
359 ListCmd.33=Entry type: key-entry
360 ListCmd.34=Alias [{0}] is unknown to the key store
361 ListCmd.38=Certificate chain length: {0,number}
362 ListCmd.39=Certificate[1]:
363 ListCmd.40=Certificate[{0,number}]:
364 ListCmd.42=*******************************************
365 ListCmd.43=-----BEGIN CERTIFICATE-----
366 ListCmd.44=-----END CERTIFICATE-----
367 ListCmd.45=Certificate fingerprint (MD5): {0}
368 ListCmd.19=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
369 ListCmd.18=Command options
370 ListCmd.17=Alias of an entry to list. If omitted, all entries are listed.
372 ListCmd.15=Type of the key store to use. If omitted, the default value is \
373 that of the property "keystore.type" in the security properties file.
374 ListCmd.14=STORE_TYPE
375 ListCmd.13=Location of the key store to use. The default value is a \
376 file-based scheme whose path is the file named ".keystore" in your home \
378 If URL is malformed, the tool will use URL as a file-name of a key store; \
379 i.e. as if the protocol was "file:".
381 ListCmd.11=Password to unlock the key store. If omitted, you will be \
384 ListCmd.9=Fully qualified class name of a Security Provider to add to the \
386 ListCmd.8=PROVIDER_CLASS_NAME
387 ListCmd.7=Output the certificate in human-readable format, even if -rfc is \
389 ListCmd.6=Use RFC-1421 specifications when encoding the output.
391 ImportCmd.34=Failed to establish chain-of-trust from reply
392 ImportCmd.37=Unable to find anchor certificate for {0}
393 ImportCmd.38=Public keys, in key store and certificate, MUST be of the same type
394 ImportCmd.32=Can this certificate be trusted?
395 ImportCmd.40=Key entry associated with {0} has an unknown or unsupported public key type {1}
396 ImportCmd.41=Public keys, in key store and certificate, MUST be the same
397 ImportCmd.29=Certificate was added to the key store
398 ImportCmd.28=Certificate was not added to the key store
399 ImportCmd.27=Usage: keytool -import [OPTION]...\n\
400 Read an X.509 certificate, or a PKCS#7 Certificate Reply from a designated \
401 input source and incorporate the certificates into the key store.
402 ImportCmd.26=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
403 ImportCmd.25=Command options
404 ImportCmd.24=If ALIAS does not already exist in the key store, the tool treats \
405 the certificate in FILE as a new Trusted Certificate.\n\
406 If ALIAS exists in the key store, the tool will treat the certificate(s) in \
407 FILE as a Certificate Reply (which can be a chain of certificates).
409 ImportCmd.22=Location of the Certificate or Certificate Reply to import.
411 ImportCmd.20=Password to protect the Key Entry associated with ALIAS. If \
412 this option is omitted, and the chain-of-trust for the Certificate Reply has \
413 been established, the tool will first attempt to unlock the Key Entry using \
414 the same password protecting the key store. If this fails, you will be \
415 prompted to provide a password.
416 ImportCmd.19=PASSWORD
417 ImportCmd.18=Prevent the tool from prompting the user.
418 ImportCmd.17=Additionally use a key store, of type "JKS", named "cacerts", \
419 and located in lib/security in an installed Java Runtime Environment, when \
420 trying to establish chains-of-trust.
421 ImportCmd.16=Type of the key store to use. If omitted, the default value is \
422 that of the property "keystore.type" in the security properties file.
423 ImportCmd.15=STORE_TYPE
424 ImportCmd.14=Location of the key store to use. The default value is a \
425 file-based scheme whose path is the file named ".keystore" in your home \
427 If URL is malformed, the tool will use URL as a file-name of a key store; \
428 i.e. as if the protocol was "file:".
430 ImportCmd.12=Password to unlock the key store. If omitted, you will be \
432 ImportCmd.11=PASSWORD
433 ImportCmd.10=Fully qualified class name of a Security Provider to add to the \
435 ImportCmd.9=PROVIDER_CLASS_NAME
436 ImportCmd.8=Emit more verbose messages.
437 ImportCmd.7=Was unable to build a certificate-chain. Only {0,number} out of {1,number} certificates were processed
439 ExportCmd.17=Usage: keytool -export [OPTION]...\n\
440 Export a certificate stored in the key store to a designated output \
441 destination, either in binary format or in RFC-1421 compliant encoding.
442 ExportCmd.18=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
443 ExportCmd.19=Command options
444 ExportCmd.20=Alias of an entry to export. The value "mykey" (all lower case, \
445 without the enclosing quotes) is used when this option is omitted.
447 ExportCmd.22=Destination of the exported certificate. STDOUT is used if this \
450 ExportCmd.24=Type of the key store to use. If omitted, the default value is \
451 that of the property "keystore.type" in the security properties file.
452 ExportCmd.25=STORE_TYPE
453 ExportCmd.26=Location of the key store to use. The default value is a \
454 file-based scheme whose path is the file named ".keystore" in your home \
456 If URL is malformed, the tool will use URL as a file-name of a key store; \
457 i.e. as if the protocol was "file:".
459 ExportCmd.28=Password to unlock the key store. If omitted, you will be \
461 ExportCmd.29=PASSWORD
462 ExportCmd.30=Fully qualified class name of a Security Provider to add to the \
464 ExportCmd.31=PROVIDER_CLASS_NAME
465 ExportCmd.32=Use RFC-1421 specifications when encoding the output.
466 ExportCmd.33=Output the certificate in binary DER encoding, which is the \
467 default format. If -rfc is also present, this option is ignored.
469 IdentityDBCmd.7=Usage: keytool -identitydb [OPTION]...\n\
470 NOT IMPLEMENTED YET. Import a JDK 1.1 style Identity Database.
471 IdentityDBCmd.8=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
472 IdentityDBCmd.9=Command options
473 IdentityDBCmd.10=Location of the Identity Database to import. If omitted, \
475 IdentityDBCmd.11=FILE
476 IdentityDBCmd.12=Type of the key store to use. If omitted, the default value is \
477 that of the property "keystore.type" in the security properties file.
478 IdentityDBCmd.13=STORE_TYPE
479 IdentityDBCmd.14=Location of the key store to use. The default value is a \
480 file-based scheme whose path is the file named ".keystore" in your home \
482 If URL is malformed, the tool will use URL as a file-name of a key store; \
483 i.e. as if the protocol was "file:".
485 IdentityDBCmd.16=Password to unlock the key store. If omitted, you will be \
487 IdentityDBCmd.17=PASSWORD
488 IdentityDBCmd.18=Fully qualified class name of a Security Provider to add to the \
490 IdentityDBCmd.19=PROVIDER_CLASS_NAME
491 IdentityDBCmd.20=Emit more verbose messages.
493 PrintCertCmd.5=Usage: keytool -printcert [OPTION]...\n\
494 Read a certificate from FILE and print it to STDOUT in a human-readable form.
495 PrintCertCmd.6=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
496 PrintCertCmd.7=Command options
497 PrintCertCmd.8=Location of the certificate to print. If omitted, STDIN is used.
499 PrintCertCmd.10=Emit more verbose messages.
501 SelfCertCmd.14=Usage: keytool -selfcert [OPTION]...\n\
502 Generate a self-signed X.509 version 1 certificate.\n\n\
503 The newly generated certificate will form a chain of one element which will \
504 replace the previous chain associated with ALIAS.
505 SelfCertCmd.15=Please report bugs at http://www.gnu.org/software/classpath/bugs.html
506 SelfCertCmd.16=Command options
507 SelfCertCmd.17=Alias of the Key Entry to select. The value "mykey" (all lower \
508 case, without the enclosing quotes) is used when this option is omitted.
510 SelfCertCmd.19=Name of the digital signature algorithm to use for signing the \
511 certificate. If omitted, a default value is chosen based on the type of the \
512 private key associated with ALIAS. If the key is a "DSA" one, the value for \
513 signature algorithm will be "SHA1withDSA". If on the other hand the key is \
514 an "RSA" one, then "MD5withRSA" will be the signature algorithm.
515 SelfCertCmd.20=ALGORITHM
516 SelfCertCmd.21=The X.500 Distinguished Name of the Subject of the generated \
517 certificate. If omitted the Distinguished Name of the base certificate in \
518 the chain associated with ALIAS is used instead.
520 SelfCertCmd.23=Password to unlock the Key Entry associated with ALIAS. If \
521 omitted, the tool will attempt to unlock the Key Entry using the same password \
522 protecting the key store. If this fails, you will be prompted for a password.
523 SelfCertCmd.24=PASSWORD
524 SelfCertCmd.25=Number of days the generated certificate is valid for. If \
526 SelfCertCmd.26=DAY_COUNT
527 SelfCertCmd.27=Type of the key store to use. If omitted, the default value is \
528 that of the property "keystore.type" in the security properties file.
529 SelfCertCmd.28=STORE_TYPE
530 SelfCertCmd.29=Location of the key store to use. The default value is a \
531 file-based scheme whose path is the file named ".keystore" in your home \
533 If URL is malformed, the tool will use URL as a file-name of a key store; \
534 i.e. as if the protocol was "file:".
536 SelfCertCmd.31=Password to unlock the key store. If omitted, you will be \
538 SelfCertCmd.32=PASSWORD
539 SelfCertCmd.33=Fully qualified class name of a Security Provider to add to the \
541 SelfCertCmd.34=PROVIDER_CLASS_NAME
542 SelfCertCmd.35=Emit more verbose messages.