Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
# Copyright 2017-2019 Ping Identity Corporation
# All Rights Reserved.
# Copyright (C) 2017-2019 Ping Identity Corporation
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License (GPLv2 only)
# or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
# as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, see .
# The fully-qualified name of the class to create.
class.name=com.unboundid.util.ssl.cert.CertMessages
ERR_CERT_ENCODE_ERROR=An error occurred while attempting to encode X.509 \
certificate {0} using the provided information: {1}
ERR_CERT_ENCODE_NAME_CANNOT_GET_SCHEMA=Unable to encoded DN ''{0}'' for \
inclusion in an encoded X.509 certificate because an error occurred while \
trying to get the default standard schema: {1}
ERR_CERT_ENCODE_NAME_UNKNOWN_ATTR_TYPE=Unable to encode DN ''{0}'' for \
inclusion in an encoded X.509 certificate because it includes attribute \
''{1}'' that is not defined in the default standard schema.
ERR_CERT_ENCODE_NAME_ERROR=Unable to encode DN ''{0}'' for inclusion in an \
encoded X.509 certificate: {1}
ERR_CERT_DECODE_NOT_SEQUENCE=Unable to decode the provided byte array \
as an X.509 certificate because the contents of the array could not be \
parsed as a DER sequence: {0}
ERR_CERT_DECODE_UNEXPECTED_SEQUENCE_ELEMENT_COUNT=Unable to decode the \
provided byte array as an X.509 certificate because the DER sequence \
contained {0,number,0}, which is different from the three elements \
(tbsCertificate, signatureAlgorithm, and signatureValue) that were expected.
ERR_CERT_DECODE_FIRST_ELEMENT_NOT_SEQUENCE=Unable to decode the provided \
byte array as an X.509 certificate because the first element of the DER \
sequence (expected to be the tbsCertificate element) could not itself be \
parsed as a DER sequence: {0}
ERR_CERT_DECODE_CANNOT_PARSE_VERSION=Unable to decode the provided byte \
array as an X.509 certificate because an error was encountered while trying \
to parse the X.509 certificate version as an integer: {0}
ERR_CERT_DECODE_UNSUPPORTED_VERSION=Unable to decode the provided byte array \
as an X.509 certificate because it appears to have a version number of \
{0,number,0}, which not a supported version. Only versions 1, 2, and 3 are \
supported.
ERR_CERT_DECODE_CANNOT_PARSE_SERIAL_NUMBER=Unable to decode the provided byte \
array as an X.509 certificate because an error was encountered while trying \
to parse the serial number as an integer: {0}
ERR_CERT_DECODE_CANNOT_PARSE_SIG_ALG=Unable to decode the provided byte \
array as an X.509 certificate because an error was encountered while trying \
to parse the signature algorithm: {0}
ERR_CERT_DECODE_CANNOT_PARSE_ISSUER_DN=Unable to decode the provided byte \
array as an X.509 certificate because an error was encountered while trying \
to parse the issuer DN: {0}
ERR_CERT_DECODE_NOT_BEFORE_UNEXPECTED_TYPE=Unable to decode the provided byte \
array as an X.509 certificate because the notBefore element had an \
unexpected BER type of {0}, which does not match the universal BER type for \
either a UTC time ({1}) or generalized time ({2}) element.
ERR_CERT_DECODE_NOT_AFTER_UNEXPECTED_TYPE=Unable to decode the provided byte \
array as an X.509 certificate because the notAfter element had an \
unexpected BER type of {0}, which does not match the universal BER type for \
either a UTC time ({1}) or generalized time ({2}) element.
ERR_CERT_DECODE_COULD_NOT_PARSE_VALIDITY=Unable to decode the provided byte \
array as an X.509 certificate because an error occurred while trying to \
parse the validity sequence: {0}
ERR_CERT_DECODE_CANNOT_PARSE_SUBJECT_DN=Unable to decode the provided byte \
array as an X.509 certificate because an error was encountered while trying \
to parse the subject DN: {0}
ERR_CERT_DECODE_CANNOT_PARSE_PUBLIC_KEY_INFO=Unable to decode the provided \
byte array as an X.509 certificate because an error occurred while trying \
to parse the subject public key info element: {0}
ERR_CERT_DECODE_CANNOT_PARSE_ISSUER_UNIQUE_ID=Unable to decode the provided \
byte array as an X.509 certificate because an error occurred while trying \
to parse the issuer unique ID element: {0}
ERR_CERT_DECODE_CANNOT_PARSE_SUBJECT_UNIQUE_ID=Unable to decode the provided \
byte array as an X.509 certificate because an error occurred while trying \
to parse the subject unique ID element: {0}
ERR_CERT_DECODE_CANNOT_PARSE_EXTENSION=Unable to decode the provided byte \
array as an X.509 certificate because an error occurred while trying to \
parse the set of certificate extensions: {0}
ERR_CERT_DECODE_SIG_ALG_MISMATCH=Unable to decode the provided byte array as \
an X.509 certificate because there is a mismatch between the signature \
algorithm contained in the tbsCertificate sequence ({0}) and the signature \
algorithm contained in the outer certificate sequence ({1}). These \
signature algorithms must match.
ERR_CERT_DECODE_CANNOT_PARSE_SIG_VALUE=Unable to decode the provided byte \
array as an X.509 certificate because an error occurred while trying to \
parse the signature value: {0}
ERR_CERT_GEN_SELF_SIGNED_CANNOT_GET_KEY_GENERATOR=Unable to get a key \
generator instance for the ''{0}'' public key algorithm: {1}
ERR_CERT_GEN_SELF_SIGNED_INVALID_KEY_SIZE=Unable to use a key size of \
{0,number,0} bits with the ''{1}'' key algorithm: {2}
ERR_CERT_GEN_SELF_SIGNED_CANNOT_GENERATE_KEY_PAIR=An error occurred while \
attempting to generate the {0,number,0}-bit {1} key pair for the \
certificate: {2}
ERR_CERT_GEN_SELF_SIGNED_CANNOT_PARSE_KEY_PAIR=An error occurred while \
attempting to parse the key pair to get the public key elements and \
construct a subject key identifier: {0}
ERR_CERT_GEN_ISSUER_SIGNED_CANNOT_GENERATE_KEY_ID=An error occurred while \
attempting to generate a subject key identifier for the certificate: {0}
ERR_CERT_GEN_SIGNATURE_CANNOT_GET_SIGNATURE_GENERATOR=Unable to get a \
signature generator for the ''{0}'' signature algorithm: {1}
ERR_CERT_GEN_SIGNATURE_CANNOT_INIT_SIGNATURE_GENERATOR=Unable to initialize \
the ''{0}'' signature generator with the provided private key: {1}
ERR_CERT_GEN_SIGNATURE_CANNOT_COMPUTE=An error occurred while attempting to \
compute the ''{0}'' signature for the certificate: {1}
ERR_CERT_DECODE_NAME_NOT_SEQUENCE=An error occurred while trying to parse the \
name as an RDN sequence: {0}
ERR_CERT_DECODE_CANNOT_PARSE_NAME_SEQUENCE_ELEMENT=An error occurred while \
trying to parse RDN element {0,number,0} in the name sequence: {1}
ERR_CERT_VERIFY_SIGNATURE_ISSUER_CERT_NOT_PROVIDED=ERROR: Unable to verify \
the certificate signature because the certificate is not self-signed and no \
issuer certificate was provided.
ERR_CERT_VERIFY_SIGNATURE_CANNOT_GET_PUBLIC_KEY=ERROR: Unable to verify the \
certificate signature because an error occurred while attempting to get the \
public key from the issuer certificate: {0}
ERR_CERT_VERIFY_SIGNATURE_CANNOT_GET_SIGNATURE_VERIFIER=Unable verify the \
certificate signature because an error occurred while trying to get a \
signature verifier for the ''{0}'' signature algorithm: {1}
ERR_CERT_VERIFY_SIGNATURE_CANNOT_INIT_SIGNATURE_VERIFIER=Unable to initialize \
the ''{0}'' signature verifier with the issuer certificate''s public key: \
{1}
ERR_CERT_VERIFY_SIGNATURE_NOT_VALID=ERROR: Certificate ''{0}'' has an \
invalid signature.
ERR_CERT_VERIFY_SIGNATURE_ERROR=ERROR: An error occurred while attempting to \
verify the signature for certificate ''{0}'': {1}
ERR_CERT_CANNOT_COMPUTE_FINGERPRINT=An error occurred while trying to \
compute a {0} fingerprint of the certificate: {1}
INFO_CERT_IS_ISSUER_FOR_DN_MISMATCH=The certificate with subject DN ''{0}'' \
is not the issuer for certificate with subject DN ''{1}'' because that \
certificate has an issuer DN of ''{2}''.
INFO_CERT_IS_ISSUER_FOR_KEY_ID_MISMATCH=The certificate with subject DN \
''{0}'' is not the issuer for certificate with subject DN ''{1}'' because \
the authority key identifier for certificate ''{1}'' does not match the \
subject key identifier for certificate ''{0}''.
ERR_CSR_DECODE_NOT_SEQUENCE=Unable to decode the provided byte array \
as a PKCS #10 certificate signing request because the contents of the array \
could not be parsed as a DER sequence: {0}
ERR_CSR_DECODE_UNEXPECTED_SEQUENCE_ELEMENT_COUNT=Unable to decode the \
provided byte array as a PKCS #10 certificate signing request because the \
DER sequence contained {0,number,0}, which is different from the three \
elements (CertificationRequestInfo, SignatureAlgorithm, and Signature) that \
were expected.
ERR_CSR_DECODE_FIRST_ELEMENT_NOT_SEQUENCE=Unable to decode the provided \
byte array as a PKCS #10 certificate signing request because the first \
element of the DER sequence (expected to be the CertificationRequestInfo \
element) could not itself be parsed as a DER sequence: {0}
ERR_CSR_DECODE_CANNOT_PARSE_VERSION=Unable to decode the provided byte \
array as a PKCS #10 certificate signing request because an error was \
encountered while trying to parse the version element as an integer: {0}
ERR_CSR_DECODE_UNSUPPORTED_VERSION=Unable to decode the provided byte array \
as a PKCS #10 certificate signing request because it appears to have a \
version number of {0,number,0}, which not a supported version. Only \
versions 1 is supported.
ERR_CSR_DECODE_CANNOT_PARSE_SUBJECT_DN=Unable to decode the provided byte \
array as a PKCS #10 certificate signing request because an error was \
encountered while trying to parse the subject DN: {0}
ERR_CSR_DECODE_CANNOT_PARSE_PUBLIC_KEY_INFO=Unable to decode the provided \
byte array as a PKCS #10 certificate signing request because an error \
occurred while trying to parse the subject public key info element: {0}
ERR_CSR_DECODE_CANNOT_PARSE_ATTRS=Unable to decode the provided \
byte array as a PKCS #10 certificate signing request because an error \
occurred while trying to parse the request attributes: {0}
ERR_CSR_DECODE_CANNOT_PARSE_EXT_ATTR=Unable to decode the provided \
byte array as a PKCS #10 certificate signing request because an error \
occurred while trying to parse a request attribute with OID {0} as an X.509 \
certificate extension: {1}
ERR_CSR_DECODE_CANNOT_PARSE_SIG_ALG=Unable to decode the provided byte \
array as a PKCS #10 certificate signing request because an error was \
encountered while trying to parse the signature algorithm: {0}
ERR_CSR_DECODE_CANNOT_PARSE_SIG_VALUE=Unable to decode the provided byte \
array as a PKCS #10 certificate signing request because an error occurred \
while trying to parse the signature value: {0}
ERR_CSR_ENCODE_ERROR=An error occurred while attempting to encode PKCS #10 \
certificate signing request {0} using the provided information: {1}
ERR_CSR_GEN_CANNOT_PARSE_KEY_PAIR=An error occurred while attempting to parse \
the generated key pair to get the public key elements: {0}
ERR_CSR_GEN_SIGNATURE_CANNOT_GET_SIGNATURE_GENERATOR=Unable to get a \
signature generator for the ''{0}'' signature algorithm: {1}
ERR_CSR_GEN_SIGNATURE_CANNOT_INIT_SIGNATURE_GENERATOR=Unable to initialize \
the ''{0}'' signature generator with the provided private key: {1}
ERR_CSR_GEN_SIGNATURE_CANNOT_COMPUTE=An error occurred while attempting to \
compute the ''{0}'' signature for the certificate signing request: {1}
ERR_CSR_VERIFY_SIGNATURE_CANNOT_GET_PUBLIC_KEY=Unable to verify the \
certificate signing request signature because an error occurred while \
attempting to parse the request''s public key: {0}
ERR_CSR_VERIFY_SIGNATURE_CANNOT_GET_SIGNATURE_VERIFIER=Unable to verify the \
certificate signing request signature because an error occurred while \
attempting to get a signature verifier for the ''{0}'' signature \
algorithm: {1}
ERR_CSR_VERIFY_SIGNATURE_CANNOT_INIT_SIGNATURE_VERIFIER=Unable to verify the \
certificate signing request signature because an error occurred while \
attempting to initialize the ''{0}'' signature verifier with the request''s \
public key: {1}
ERR_CSR_VERIFY_SIGNATURE_NOT_VALID=ERROR: The certificate signing request \
with subject ''{0}'' has an invalid signature.
ERR_CSR_VERIFY_SIGNATURE_ERROR=ERROR: An error occurred while attempting to \
verify the signature for the certificate signing request with subject \
''{0}'': {1}
ERR_PRIVATE_KEY_DECODE_NOT_SEQUENCE=Unable to decode the provided byte array \
as a PKCS #8 private key because the contents of the array could not be \
parsed as a DER sequence: {0}
ERR_PRIVATE_KEY_DECODE_NOT_ENOUGH_ELEMENTS=Unable to decode the provided byte \
array as a PKCS #8 private key because the private key sequence only had \
{0,number,0} elements, while the sequence should have a minimum of three \
elements.
ERR_PRIVATE_KEY_DECODE_CANNOT_PARSE_VERSION=Unable to decode the provided \
byte array as a PKCS #8 private key because an error occurred while trying \
to parse the private key version: {0}
ERR_PRIVATE_KEY_DECODE_UNSUPPORTED_VERSION=Unable to decode the provided byte \
array as a PKCS #8 private key because it appears to have a version number \
of {0,number,0}, which is not a supported version. Only versions 1 and 2 \
are supported.
ERR_PRIVATE_KEY_DECODE_CANNOT_PARSE_ALGORITHM=Unable to decode the provided \
byte array as a PKCS #8 private key because an error occurred while trying \
to parse the private key algorithm: {0}
ERR_PRIVATE_KEY_DECODE_CANNOT_PARSE_PUBLIC_KEY=Unable to decode the provided \
byte array as a PKCS #8 private key because an error occurred while trying \
to parse the public key: {0}
ERR_PRIVATE_KEY_WRAP_RSA_KEY_ERROR=An error occurred while tyring to wrap an \
RSA private key in a PKCS #8 private key envelope: {0}
ERR_PRIVATE_KEY_ENCODE_ERROR=An error occurred while tyring to encode PKCS #8 \
private key {0}: {1}
ERR_EXTENSION_DECODE_ERROR=An error occurred while trying to decode an ASN.1 \
element as an X.509 certificate extension: {0}
ERR_EXTENSION_ENCODE_ERROR=Unable to encode X.509 certificate extension \
{0}: {1}
ERR_AUTHORITY_KEY_ID_EXTENSION_CANNOT_PARSE=Unable to parse the provided \
X.509 certificate extension {0} as an authority key identifier extension: \
{1}
INFO_AUTHORITY_KEY_ID_EXTENSION_NAME=Authority Key Identifier
ERR_KEY_USAGE_EXTENSION_CANNOT_PARSE=Unable to parse the provided X.509 \
certificate extension {0} as key usage extension: {1}
INFO_KEY_USAGE_EXTENSION_NAME=Key Usage
ERR_SUBJECT_KEY_ID_EXTENSION_CANNOT_PARSE=Unable to parse the provided X.509 \
certificate extension {0} as a subject key identifier extension: {1}
INFO_SUBJECT_KEY_IDENTIFIER_EXTENSION_NAME=Subject Key Identifier
ERR_GENERAL_NAMES_CANNOT_PARSE=Unable to parse the provided element as a \
general names element: {0}
ERR_GENERAL_NAMES_CANNOT_ENCODE=An error occurred while trying to encode \
general names element {0}: {1}
ERR_GENERAL_ALT_NAME_EXTENSION_CANNOT_PARSE=Unable to parse the provided \
X.509 certificate extension {0} as an extension of type {1}: {2}
INFO_SUBJECT_ALT_NAME_EXTENSION_NAME=Subject Alternative Name
INFO_ISSUER_ALT_NAME_EXTENSION_NAME=Issuer Alternative Name
ERR_BASIC_CONSTRAINTS_EXTENSION_CANNOT_PARSE=Unable to parse the provided \
X.509 certificate extension {0} as a basic constraints extension: {1}
INFO_BASIC_CONSTRAINTS_EXTENSION_NAME=Basic Constraints
ERR_EXTENDED_KEY_USAGE_EXTENSION_CANNOT_PARSE=Unable to parse the provided \
X.509 certificate extension {0} as an extended key usage extension: {1}
ERR_EXTENDED_KEY_USAGE_EXTENSION_CANNOT_ENCODE=An error occurred while trying \
to encode the value of an extended key usage extension with key usage IDs \
{0}: {1}
INFO_EXTENDED_KEY_USAGE_EXTENSION_NAME=Extended Key Usage
INFO_EXTENDED_KEY_USAGE_ID_TLS_SERVER_AUTHENTICATION=TLS Server Authentication
INFO_EXTENDED_KEY_USAGE_ID_TLS_CLIENT_AUTHENTICATION=TLS Client Authentication
INFO_EXTENDED_KEY_USAGE_ID_CODE_SIGNING=Code Signing
INFO_EXTENDED_KEY_USAGE_ID_EMAIL_PROTECTION=Email Protection
INFO_EXTENDED_KEY_USAGE_ID_TIME_STAMPING=Time Stamping
INFO_EXTENDED_KEY_USAGE_ID_OCSP_SIGNING=OCSP Signing
ERR_CRL_DP_UNRECOGNIZED_NAME_ELEMENT_TYPE=Unable to decode the provided ASN.1 \
element as a CRL distribution point because the distributionPoint element \
had a nested element with an unexpected DER type of {0}.
ERR_CRL_DP_CANNOT_DECODE=Unable to decode the provided ASN.1 element as a CRL \
distribution point: {0}
ERR_CRL_DP_ENCODE_CANNOT_GET_SCHEMA=Unable to encode CRL distribution point \
{0} because an error occurred while trying to get the default standard \
schema for use in encoding nameRelativeToCRLIssuer value ''{1}'': {2}
ERR_CRL_DP_ENCODE_UNKNOWN_ATTR_TYPE=Unable to encode CRL distribution point \
{0} because nameRelativeToCRLIssuer value ''{1}'' includes attribute type \
''{2}'' that is not defined in the default standard schema.
ERR_CRL_DP_ENCODE_ERROR=Unable to encode CRL distribution point {0} because \
an error occurred while trying to encode nameRelativeToCRLIssuer value \
''{1}'': {2}
ERR_CRL_DP_EXTENSION_CANNOT_PARSE=Unable to parse the provided X.509 \
certificate extension {0} as a CRL distribution points extension: {1}
INFO_CRL_DP_EXTENSION_NAME=CRL Distribution Points
ERR_RSA_PUBLIC_KEY_CANNOT_DECODE=Unable to decode the X.509 certificate \
public key as an RSA public key: {0}
ERR_RSA_PRIVATE_KEY_UNSUPPORTED_VERSION=Unable to decode the PKCS #8 private \
key as an RSA private key because it has an unsupported version of \
{0,number,0}. Only versions 0 and 1 are supported.
ERR_RSA_PRIVATE_KEY_CANNOT_DECODE=Unable to decode the PKCS #8 private key \
as an RSA private key: {0}
ERR_EC_PUBLIC_KEY_PARSE_UNEXPECTED_UNCOMPRESSED_FIRST_BYTE=Unable to decode \
the X.509 certificate public key as an elliptic curve public key because \
the public key has a size of 65 bytes, indicating that it uses the \
uncompressed form of the point, but the value of the first byte is {0} \
rather than the expected value of 04.
ERR_EC_PUBLIC_KEY_PARSE_UNEXPECTED_COMPRESSED_FIRST_BYTE=Unable to decode \
the X.509 certificate public key as an elliptic curve public key because \
the public key has a size of 33 bytes, indicating that it uses the \
compressed form of the point, but the value of the first byte is {0} rather \
than the expected value of 02 (to indicate that the y coordinate is even) \
or 0x03 (to indicate that the y coordinate is odd).
ERR_EC_PUBLIC_KEY_PARSE_UNEXPECTED_SIZE=Unable to decode the X.509 \
certificate public key as an elliptic curve public key because the public \
key has a size of {0} bytes, which does not match the expected size for \
either the uncompressed (65 bytes) or compressed (33 bytes) forms.
ERR_EC_PUBLIC_KEY_PARSE_ERROR=Unable to decode the X.509 certificate \
public key as an elliptic curve public key: {0}
ERR_EC_PUBLIC_KEY_ENCODE_X_TOO_LARGE=Unable to encode elliptic curve public \
key {0} because the x coordinate value requires {1,number,0} bytes to \
encode, which is larger than the maximum allowed size of 32 bytes.
ERR_EC_PUBLIC_KEY_ENCODE_Y_TOO_LARGE=Unable to encode elliptic curve public \
key {0} because the y coordinate value requires {1,number,0} bytes to \
encode, which is larger than the maximum allowed size of 32 bytes.
ERR_EC_PRIVATE_KEY_UNSUPPORTED_VERSION=Unable to decode the PKCS #8 private \
key as an elliptic curve private key because it has an unsupported version \
of {0,number,0}. Only version 1 is supported.
ERR_EC_PRIVATE_KEY_CANNOT_DECODE=Unable to decode the PKCS #8 private key \
as an elliptic curve private key: {0}
ERR_EC_PRIVATE_KEY_CANNOT_ENCODE=An error occurred while trying to encode \
elliptic curve private key {0}: {1}
ERR_MANAGE_CERTS_SECURITY_MANAGER_EXIT_NOT_ALLOWED=VM exit is not allowed.
INFO_MANAGE_CERTS_TOOL_DESC=Provides a number of subcommands that can be used \
to manage a set of certificates and private keys in a JKS or PKCS #12 \
keystore.
INFO_MANAGE_CERTS_PLACEHOLDER_ALIAS={alias}
INFO_MANAGE_CERTS_PLACEHOLDER_BITS={bits}
INFO_MANAGE_CERTS_PLACEHOLDER_FORMAT={format}
INFO_MANAGE_CERTS_PLACEHOLDER_HOST={host}
INFO_MANAGE_CERTS_PLACEHOLDER_IP={ipAddress}
INFO_MANAGE_CERTS_PLACEHOLDER_NAME={name}
INFO_MANAGE_CERTS_PLACEHOLDER_OID={oid}
INFO_MANAGE_CERTS_PLACEHOLDER_PASSWORD={password}
INFO_MANAGE_CERTS_PLACEHOLDER_PORT={port}
INFO_MANAGE_CERTS_PLACEHOLDER_TYPE={type}
INFO_MANAGE_CERTS_PLACEHOLDER_TIMESTAMP={YYYYMMDDhhmmss}
INFO_MANAGE_CERTS_PLACEHOLDER_URI={uri}
INFO_MANAGE_CERTS_SC_LIST_CERTS_DESC=Displays a list of some or all of the \
certificates in a keystore.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_KS_DESC=The path to the keystore file \
containing the certificates to list. This is required, and the keystore \
file must exist.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. A \
keystore password is optional for some keystore types, but may be required \
for others.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_KS_PW_FILE_DESC=The path to a file \
containing the password needed to access the contents of the keystore. A \
keystore password is optional for some keystore types, but may be required \
for others. If a keystore password file is supplied, then the file must \
exist, must contain only one line, and that line must consist only of the \
clear-text keystore password.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. A keystore password is optional for some \
keystore types, but may be required for others.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_ALIAS_DESC=The alias (also called a \
nickname) of a certificate to include in the output. This argument may be \
provided multiple times to identify multiple certificates to include. If \
this argument is provided, then only the listed certificates will be \
displayed. If this argument is omitted, then all certificates will be \
listed.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_DISPLAY_PEM_DESC=Include a PEM-encoded \
representation of each certificate in the output.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_VERBOSE_DESC=Display verbose information \
about each of the certificates. If this argument is not provided, then the \
listing will only include basic summary information for each certificate, \
including its subject and issuer DNs, validity start and end times, and \
fingerprints. If this argument is provided, then additional information, \
including the X.509 certificate version, serial number, signature algorithm \
and value, public key algorithm and content, and extensions, will also be \
included.
INFO_MANAGE_CERTS_SC_LIST_CERTS_ARG_DISPLAY_COMMAND_DESC=Display a command \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_LIST_CERTS_EXAMPLE_1=Display basic information about \
all of the certificates in the ''{0}'' keystore file.
INFO_MANAGE_CERTS_SC_LIST_CERTS_EXAMPLE_2=Display verbose information about \
the 'server-cert' certificate in the ''{0}'' keystore file, whose contents \
are protected by a password contained in the ''{1}'' file. It will also \
display a command that can be used to accomplish a similar result using the \
Java keytool utility, along with a PEM-encoded representation of the \
certificate.
INFO_MANAGE_CERTS_SC_LIST_CERTS_EXAMPLE_3=Display basic information about \
all of the certificates in the JVM's default trust store file.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_DESC=Exports a certificate or certificate \
chain from a keystore.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_KS_DESC=The path to the keystore file \
containing the certificates to export. This is required, and the keystore \
file must exist.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. A \
keystore password is optional for some keystore types, but may be required \
for others.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_KS_PW_FILE_DESC=The path to a file \
containing the password needed to access the contents of the keystore. A \
keystore password is optional for some keystore types, but may be required \
for others. If a keystore password file is supplied, then the file must \
exist, must contain only one line, and that line must consist only of the \
clear-text keystore password.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. A keystore password is optional for some \
keystore types, but may be required for others.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_ALIAS_DESC=The alias (also called a \
nickname) of the certificate to export. This is required, and it may only \
be provided once.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_CHAIN_DESC=Indicates that the entire \
certificate chain (the target certificate and all of the certificates in \
its issuer chain) should be exported rather than just the specified target \
certificate.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_FORMAT_DESC=The output format to use for \
the exported certificate. The value may be either 'PEM' (to export the \
certificate in the text-based PEM format), or 'DER' (to export the \
certificate in the binary DER format). If this is not provided, then the \
PEM output format will be used.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_FILE_DESC=The path to the output file \
to which the exported certificate should be written. An output file is \
optional when using the PEM format, but required when using the DER \
format. If no output file is provided, then the exported certificate will \
be written to standard output.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_SEPARATE_FILE_DESC=Indicates that if \
multiple certificates are to be exported, then each certificate should be \
written to a different file rather than concatenating all of them into the \
same file. This can only be used if both the --export-certificate-chain \
and --output-file arguments are also provided.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_ARG_DISPLAY_COMMAND_DESC=Display a command \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_EXAMPLE_1=Export the 'server-cert' \
certificate in PEM format to standard output.
INFO_MANAGE_CERTS_SC_EXPORT_CERT_EXAMPLE_2=Export the 'server-cert' \
certificate, and all of the certificates in its issuer chain, to the \
specified output file in the binary DER format. It will also display a \
command that can be used to accomplish a similar result using the \
Java keytool utility.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_DESC=Exports a private key from a keystore.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_KS_DESC=The path to the keystore file \
containing the private key to export. This is required, and the keystore \
file must exist.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. A \
keystore password is required when exporting a private key, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_KS_PW_FILE_DESC=The path to a file \
containing the password needed to access the contents of the keystore. A \
keystore password is required when exporting a private key, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. If a keystore \
password file is supplied, then the file must exist, must contain only one \
line, and that line must consist only of the clear-text keystore password.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. A keystore password is required when \
exporting a private key, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_PK_PW_DESC=The password (also called a \
passphrase or PIN) used to protect the private key. In many cases, the \
private key password will be the same as the password used to protect the \
keystore itself, and in such instances, the private key password can be \
omitted and the keystore password will be used. However, if a private key \
is protected with a different password than the keystore itself, then one \
of the --private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments must be provided.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_PK_PW_FILE_DESC=The path to a file \
containing the password used to protect the private key. In many cases, \
the private key password will be the same as the password used to protect \
the keystore itself, and in such instances, the private key password can be \
omitted and the keystore password will be used. However, if a private key \
is protected with a different password than the keystore itself, then one \
of the --private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments must be provided. If a private \
key password file is supplied, then the file must exist, must contain only \
one line, and that line must consist only of the clear-text private key \
password.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_PROMPT_FOR_PK_PW_DESC=Interactively \
prompt for the private key password. In many cases, the private key \
password will be the same as the password used to protect the keystore \
itself, and in such instances, the private key password can be omitted and \
the keystore password will be used. However, if a private key is protected \
with a different password than the keystore itself, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments must be provided.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_ALIAS_DESC=The alias (also called a \
nickname) of the private key to export. This is required, and it may only \
be provided once.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_FORMAT_DESC=The output format to use for \
the exported private key. The value may be either 'PEM' (to export the \
private key in the text-based PEM format), or 'DER' (to export the key in \
the binary DER format). If this is not provided, then the PEM output \
format will be used.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_ARG_FILE_DESC=The path to the output file to \
which the exported private key should be written. An output file is \
optional when using the PEM format, but required when using the DER \
format. If no output file is provided, then the exported private key will \
be written to standard output.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_EXAMPLE_1=Export the private key for the \
'server-cert' certificate to standard output in PEM format.
INFO_MANAGE_CERTS_SC_EXPORT_KEY_EXAMPLE_2=Export the private key for the \
'server-cert' certificate to the specified output file in the binary DER \
format.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_DESC=Imports a certificate or certificate \
chain, and optionally a private key, into a keystore.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_KS_DESC=The path to the keystore file \
into which the certificates and key should be imported. This is required, \
but if the file does not exist, then it will be created.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. If the \
keystore does not exist, then it will be created with this password. A \
keystore password is required when importing certificates, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_KS_PW_FILE_DESC=The password (also \
called a passphrase or PIN) needed to access the contents of the keystore. \
If the keystore does not exist, then it will be created with this \
password. A keystore password is required when importing certificates, so \
one of the --keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. If a keystore \
password file is supplied, then the file must exist, must contain only one \
line, and that line must consist only of the clear-text keystore password. \
The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. If the keystore does not exist, then it \
will be created with this password. A keystore password is required when \
importing certificates, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_KS_TYPE_DESC=The keystore type for the \
keystore to create. This argument should only be provided when creating a \
new keystore, and it will be ignored if the keystore already exists. The \
value must be either 'JKS' for the non-standard Java KeyStore format, or \
'PKCS12' for the standard PKCS #12 format. If this is not provided, then a \
default keystore type of 'JKS' will be used for newly-created keystores.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_ALIAS_DESC=The alias (also called a \
nickname) to use for the imported certificate. If multiple certificates \
are to be imported, then the behavior depends on whether a private key will \
also be imported. When importing a certificate chain along with a private \
key, then the alias must not already exist in the keystore, and the private \
key and the entire certificate chain will be stored under this alias. When \
importing a certificate for which the corresponding private key already \
exists in the keystore (for example, if you used the \
generate-certificate-request subcommand to create a certificate signing \
request and are now importing the signed certificate), then you should use \
the same alias that is used for the existing private key, and you should \
provide the complete certificate chain. When importing a certificate \
for which the corresponding private key does not already exist in the \
keystore and for which the private key is not being provided by the \
--private-key-file argument, then the alias must not already exist in the \
keystore, and any provided issuer certificates (which you should provide \
if they do not already exist in the keystore and are not in the JVM's \
default set of trusted issuer certificates) will be imported with aliases \
that are generated from the provided alias. If there is only one issuer \
certificate to be imported, then it will be stored with an alias that is \
the provided alias with '-issuer' appended onto it. If there are multiple \
issuer certificates to be imported, then their aliases will be the provided \
alias with '-issuer-#' appended onto it, where '#' will be '1' for the \
first issuer certificate, '2' for the second, and so on. This is a \
required argument.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_CERT_FILE_DESC=The path to a file \
containing a certificate or certificate chain to import. The certificates \
in the file may be stored either in the text-based PEM or the binary DER \
format, but if the file contains multiple certificates, then they must all \
be in the same format. You may also provide this argument multiple times \
to specify multiple files containing certificates to import. However, if \
multiple certificates are provided, then they must all form a certificate \
chain in which each subsequent certificate is the issuer certificate for \
the previous certificate. When importing a non-self-signed certificate, \
you should ensure that its issuer certificate is also being imported, is \
already in the keystore under a different alias, or is in the JVM's default \
set of trusted certificates. At least one certificate file is required.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_KEY_FILE_DESC=The path to a file \
containing the private key for the end certificate in the chain to be \
imported. It may be stored in either the text-based PEM or the binary \
DER format. This is an optional argument, and at most one private key file \
may be specified, and that file may contain only a single private key.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_PK_PW_DESC=The password (also called a \
passphrase or PIN) to use to protect the private key. This is only needed \
when importing a private key along with a certificate chain, or when \
importing a certificate chain into an alias with an existing private key. \
In many cases, the private key password will be the same as the keystore \
password and in such instances, the private key password can be omitted and \
the the keystore password will be used as the private key password. \
However, if you are importing a private key and wish to protect it with a \
password that does not match the keystore password, or if you are importing \
a new certificate chain for an existing private key that uses a password \
that does not match the keystore password, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be provided.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_PK_PW_FILE_DESC=The path to a file \
containing the password to use to protect the private key. This is only \
needed when importing a private key along with a certificate chain, or when \
importing a certificate chain into an alias with an existing private key. \
In many cases, the private key password will be the same as the keystore \
password and in such instances, the private key password can be omitted and \
the the keystore password will be used as the private key password. \
However, if you are importing a private key and wish to protect it with a \
password that does not match the keystore password, or if you are importing \
a new certificate chain for an existing private key that uses a password \
that does not match the keystore password, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be provided. If a \
private key password file is supplied, then the file must exist, must \
contain only one line, and that line must consist only of the clear-text \
private key password.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_PROMPT_FOR_PK_PW_DESC=Interactively \
prompt for the password to use to protect the private key. This is only \
needed when importing a private key along with a certificate chain, or when \
importing a certificate chain into an alias with an existing private key. \
In many cases, the private key password will be the same as the keystore \
password and in such instances, the private key password can be omitted and \
the the keystore password will be used as the private key password. \
However, if you are importing a private key and wish to protect it with a \
password that does not match the keystore password, or if you are importing \
a new certificate chain for an existing private key that uses a password \
that does not match the keystore password, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be provided.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_NO_PROMPT_DESC=Import the certificates \
without prompting the end user. By default, the certificates will be \
displayed and the user will be interactively prompted about whether to \
import them.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_ARG_DISPLAY_COMMAND_DESC=Display a command \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_EXAMPLE_1=Import the certificates in the \
''{0}'' file into the specified keystore using an alias of 'server-cert'.
INFO_MANAGE_CERTS_SC_IMPORT_CERT_EXAMPLE_2=Import a certificate chain, \
including a private key, from the set of provided files into the specified \
keystore using an alias of 'server-cert'.
INFO_MANAGE_CERTS_SC_DELETE_CERT_DESC=Removes a certificate from a keystore.
INFO_MANAGE_CERTS_SC_DELETE_CERT_ARG_KS_DESC=The path to the keystore file \
containing the certificate to remove. This is required, and the keystore \
file must exist.
INFO_MANAGE_CERTS_SC_DELETE_CERT_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. A \
keystore password is required when importing certificates, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_DELETE_CERT_ARG_KS_PW_FILE_DESC=The path to a file \
containing the password needed to access the contents of the keystore. A \
keystore password is required when importing certificates, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. If a keystore \
password file is supplied, then the file must exist, must contain only one \
line, and that line must consist only of the \
clear-text keystore password.
INFO_MANAGE_CERTS_SC_DELETE_CERT_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. A keystore password is required when \
importing certificates, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided.
INFO_MANAGE_CERTS_SC_DELETE_CERT_ARG_ALIAS_DESC=The alias (also called a \
nickname) of the certificate to delete. This is required, and it may only \
be provided once.
INFO_MANAGE_CERTS_SC_DELETE_CERT_ARG_NO_PROMPT_DESC=Delete the certificate \
without prompting the end user. By default, the target certificate will be \
displayed and the user will be interactively prompted about whether to \
delete it.
INFO_MANAGE_CERTS_SC_DELETE_CERT_ARG_DISPLAY_COMMAND_DESC=Display a command \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_DELETE_CERT_EXAMPLE_1=Remove the 'server-cert' \
certificate from the ''{0}'' keystore.
INFO_MANAGE_CERTS_SC_GEN_CERT_DESC=Generates a self-signed certificate in a \
keystore.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_KS_DESC=The path to the keystore file \
in which the self-signed certificate will be created. This is required, \
but if the file does not exist, then it will be created.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. If the \
keystore does not exist, then it will be created with this password. A \
keystore password is required when generating certificates, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_KS_PW_FILE_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. If the \
keystore does not exist, then it will be created with this password. A \
keystore password is required when generating certificates, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. If a keystore \
password file is supplied, then the file must exist, must contain only one \
line, and that line must consist only of the clear-text keystore password. \
The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. If the keystore does not exist, then it \
will be created with this password. A keystore password is required when \
generating certificates, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_PK_PW_DESC=The password (also called a \
passphrase or PIN) to use to protect the private key. Although in many \
cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_PK_PW_FILE_DESC=The path to a file \
containing the password to use to protect the private key. Although in \
many cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password. If a \
private key password file is supplied, then the file must exist, must \
contain only one line, and that line must consist only of the clear-text \
private key password. The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_PROMPT_FOR_PK_PW_DESC=Interactively prompt \
for the password to use to protect the private key. Although in many \
cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_KS_TYPE_DESC=The keystore type for the \
keystore to create. This argument should only be provided when creating a \
new keystore, and it will be ignored if the keystore already exists. The \
value must be either 'JKS' for the non-standard Java KeyStore format, or \
'PKCS12' for the standard PKCS #12 format. If this is not provided, then a \
default keystore type of 'JKS' will be used for newly-created keystores.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_ALIAS_DESC=The alias (also called a \
nickname) to use for the newly-generated certificate. If the \
--replace-existing-certificate argument is provided, then this must be the \
alias of the private key for which to replace the certificate chain with \
the self-signed certificate. If the --replace-existing-certificate \
argument is not provided, then the alias must not already exist in the \
keystore.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_REPLACE_DESC=Indicates that the new \
self-signed certificate should replace the certificate chain associated \
with an existing private key that is identified by the --alias argument, \
reusing the existing key pair. If this argument is not provided, then a \
new key pair will be generated.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_SUBJECT_DN_DESC=The subject DN for the new \
certificate. This must be provided unless then \
--replace-existing-certificate argument is given. If the \
--replace-existing-certificate argument is provided, then the --subject-dn \
argument may be omitted if you want to reuse the same subject as the \
existing certificate. A subject DN typically includes at least a 'CN' \
attribute (which in a server certificate should be the hostname that \
clients are expected to use when connecting to the server, and in other \
certificates indicates the purpose of that certificate), and may also \
include additional attributes like 'OU' (the associated department name), \
'O' (the company or organization name), 'L' (the city or locality name), \
'ST' (the full name -- NOT the two-letter abbreviation -- of the state or \
province), 'C' (the two-letter country code -- NOT the full country name). \
For example: 'CN=ldap.example.com,OU=Directory Services,O=Example \
Corporation,L=Austin,ST=Texas,C=US'.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_DAYS_VALID_DESC=The number of days that \
the certificate should be considered valid. If this argument is not \
provided, then a default value of 365 days will be used.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_VALIDITY_START_TIME_DESC=The time that the \
certificate''s validity window should start (that is, the ''notBefore'' \
value). If this is not provided, then the current time will be used. If a \
value is given, it should be in the form ''YYYYMMDDhhmmss'' (for example, \
''{0}''). Timestamp values are assumed to be in the local time zone.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_KEY_ALGORITHM_DESC=The name of the key \
algorithm to use to generate the key pair. If present, the value will \
typically be 'RSA' or 'EC' (for elliptic curve). This argument must not be \
provided if the --replace-existing-certificate argument is used. If \
neither this argument nor the --replace-existing-certificate argument is \
provided, then a default key algorithm of 'RSA' will be used.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_KEY_SIZE_BITS_DESC=The size of the key to \
generate, in bits. This argument must not be provided if the \
--replace-existing-certificate argument is used. This argument must be \
provided if the --key-algorithm argument is used to specify an algorithm \
other than 'RSA'. If neither this argument nor the \
--replace-existing-certificate argument is provided, then a default key \
size of 2048 bits will be used.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_SIG_ALG_DESC=The name of the algorithm to \
use to sign the certificate. This argument must not be provided if the \
--replace-existing-certificate argument is used. This argument must be \
provided if the --key-algorithm argument is used to specify an algorithm \
other than 'RSA'. If neither this argument nor the \
--replace-existing-certificate argument is provided, then a default \
signature algorithm of 'SHA256withRSA' will be used.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_INHERIT_EXT_DESC=This argument can only be \
used in conjunction with the --replace-existing-certificate argument, and \
it indicates that the new certificate should inherit all of the same \
extension values as the certificate being replaced (although extensions \
known to apply to the certificate's issuer, like authority key identifier \
and issuer alternative name, may be excluded). If the \
--replace-existing-certificate argument is provided without the \
--inherit-extensions argument, then the new certificate will only have the \
extensions that are explicitly specified using other arguments.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_SAN_DNS_DESC=Indicates that the certificate \
should include a subject alternative name extension with the specified DNS \
hostname. This can be used to help clients trust a server certificate if \
they connect to the server using a different hostname than is included in \
the CN attribute of the certificate subject. This can be provided \
multiple times to specify multiple alternate hostnames, and hostnames can \
have an asterisk as their leftmost component (for example, '*.example.com' \
or '*.east.example.com') to match any value in that component. Each value \
must contain only ASCII characters, so internationalized domain names must \
use the ASCII-Compatible Encoding (ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_SAN_IP_DESC=Indicates that the certificate \
should include a subject alternative name extension with the specified IP \
address. This can be used to help clients trust a server certificate if \
they connect to the server using an IP address rather than the hostname \
that is included in the CN attribute of the certificate subject. This can \
be provided multiple times to specify multiple IP addresses, and each value \
must be a valid IPv4 or IPv6 address. There is no support for wildcards, \
CIDR, other mechanisms for specifying a range of addresses.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_SAN_EMAIL_DESC=Indicates that the \
certificate should include a subject alternative name extension with the \
specified email address (technically, RFC 822 name) value. This can be \
provided multiple times to specify multiple email addresses. Each value \
must contain only ASCII characters, so internationalized email addresses \
must use the ASCII-Compatible Encoding (ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_SAN_URI_DESC=Indicates that the certificate \
should include a subject alternative name extension with the specified URI \
value. This can be provided multiple times to specify multiple URIs. Each \
value must contain only ASCII characters, so internationalized resource \
identifiers must be mapped to URIs as described in RFC 3987.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_SAN_OID_DESC=Indicates that the certificate \
should include a subject alternative name extension with the specified OID \
as a resource identifier. This can be provided multiple times to specify \
multiple OIDs, and each value must be the string representation of a valid \
object identifier.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_BC_IS_CA_DESC=Indicates that the \
certificate should include a basic constraints extension that indicates \
whether the certificate should be considered a certification authority. If \
present, the value must be either 'true' or 'false'.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_BC_PATH_LENGTH_DESC=Indicates that the \
certificate should include a basic constraints extension that specifies \
that there must not be more than the specified number of intermediate \
certificates between that issuer certificate and the subject certificate in \
a certificate chain. This argument can only be provided in conjunction \
with a --basic-constraints-is-ca value of 'true'.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_KU_DESC=Indicates that the certificate \
should include a key usage extension that indicates that the certificate \
can be used for a specified purpose. Allowed values for this argument are \
'digital-signature', 'non-repudiation', 'key-encipherment', \
'data-encipherment', 'key-agreement', 'key-cert-sign', 'crl-sign', \
'encipher-only', and 'decipher-only'. This argument can be provided \
multiple times to specify multiple key usage values.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_EKU_DESC=Indicates that the certificate \
should include an extended key usage extension that indicates that the \
certificate can be used for a specified purpose. Allowed values for this \
argument are 'server-auth', 'client-auth', 'code-signing', \
'email-protection', 'time-stamping', and 'ocsp-signing', or the string \
representation of any valid object identifier. This argument can be \
provided multiple times to specify multiple extended key usage values.
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_EXT_DESC=Indicates that the certificate \
should include an extension with the specified content. The value must be \
in the form oid:criticality:value, where oid is the OID that identifies \
the type of extension, criticality is a value of either 'true' or 'false', \
and value is the hexadecimal representation of the extension value \
(for example, --ext 2.5.29.19:true:30030101ff).
INFO_MANAGE_CERTS_SC_GEN_CERT_ARG_DISPLAY_COMMAND_DESC=Display a command that \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_GEN_CERT_EXAMPLE_1=Generates a self-signed certificate \
with an alias of 'server-cert' and subject DN of \
'CN=ldap.example.com,O=Example Corp,C=US'. The certificate will use a \
2048-bit RSA key, a signature algorithm of SHA256withRSA, and a validity of \
365 days, starting immediately.
INFO_MANAGE_CERTS_SC_GEN_CERT_EXAMPLE_2=Generates a self-signed certificate \
to replace the existing certificate with the 'server-cert' alias. The new \
certificate will include the same subject, key and signature algorithms, \
and set of extensions as the existing certificate, and it will have a \
validity of 365 days, starting immediately.
INFO_MANAGE_CERTS_SC_GEN_CERT_EXAMPLE_3=Generates a self-signed server \
certificate with an alias of 'server-cert', a subject DN of \
'CN=ldap.example.com,O=Example Corp,C=US', a 4096-bit RSA key, \
a signature algorithm of SHA256withRSA, a subject alternate name \
extension with DNS names of 'ldap1.example.com' and 'ldap2.example.com' and \
IP addresses of 1.2.3.4 and 1.2.3.5, and an extended key usage extension \
with the server-auth and client-auth usages. The certificate will have \
a validity of 3650 days, starting at midnight on January 1, 2017 in the \
local time zone.
INFO_MANAGE_CERTS_SC_GEN_CERT_EXAMPLE_4=Generates a self-signed certification \
authority certificate with an alias of 'ca-cert', a subject DN of \
'CN=Example Certification Authority,O=Example Corp,C=US', a 256-bit \
elliptic curve key, a signature algorithm of SHA256withECDSA, a basic \
constraints extension that indicates the certificate is a certification \
authority, and a key usage extension with the key-cert-sign and crl-sign \
values. The certificate will have a validity of 7300 days, starting at \
midnight on January 1, 2017 in the local time zone.
INFO_MANAGE_CERTS_SC_GEN_CSR_DESC=Generates a certificate signing request \
(CSR) for a private key in a keystore, optionally generating the private \
key in the process. The certificate signing request may be either written \
to standard output or to a specified output file.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_FORMAT_DESC=The output format to use for the \
the generated certificate signing request. The value may be either 'PEM' \
(to export the request in the text-based PEM format), or 'DER' (to export \
the request in the binary DER format). If this is not provided, then the \
PEM output format will be used.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_OUTPUT_FILE_DESC=The path to the output \
file to which the certificate signing request should be written. If this \
is not provided, then the certificate signing request will be written to \
standard output.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_KS_DESC=The path to the keystore file that \
contains the key (or in which the key will be generated) to use for the \
certificate signing request. This is required, but if the file does not \
exist, then it will be created.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. If the \
keystore does not exist, then it will be created with this password. A \
keystore password is required when generating certificate signing requests, \
so one of the --keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_KS_PW_FILE_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. If the \
keystore does not exist, then it will be created with this password. A \
keystore password is required when generating certificate signing requests, \
so one of the --keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. If a keystore \
password file is supplied, then the file must exist, must contain only one \
line, and that line must consist only of the clear-text keystore password. \
The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_PROMPT_FOR_KS_PW_DESC=Interactively prompt \
for the keystore password. If the keystore does not exist, then it will be \
created with this password. A keystore password is required when \
generating certificate signing requests, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_PK_PW_DESC=The password (also called a \
passphrase or PIN) to use to protect the private key. Although in many \
cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_PK_PW_FILE_DESC=The path to a file \
containing the password to use to protect the private key. Although in \
many cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password. If a \
private key password file is supplied, then the file must exist, must \
contain only one line, and that line must consist only of the clear-text \
private key password. The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_PROMPT_FOR_PK_PW_DESC=Interactively prompt \
for the password to use to protect the private key. Although in many \
cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_KS_TYPE_DESC=The keystore type for the \
keystore to create. This argument should only be provided when creating a \
new keystore, and it will be ignored if the keystore already exists. The \
value must be either 'JKS' for the non-standard Java KeyStore format, or \
'PKCS12' for the standard PKCS #12 format. If this is not provided, then a \
default keystore type of 'JKS' will be used for newly-created keystores.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_ALIAS_DESC=The alias (also called a \
nickname) of the private key to use to generate the certificate signing \
request. If the --replace-existing-certificate argument is provided, then \
this must be the alias of an existing private key. If the \
--replace-existing-certificate argument is not provided, then the alias \
must not already exist in the keystore, and a corresponding key pair will \
be created in that alias.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_REPLACE_DESC=Indicates that the certificate \
signing request should use an existing key pair in the keystore, identified \
by the specified alias. If this argument is not provided, then a new key \
pair will be generated for the certificate signing request and stored in \
the keystore.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_SUBJECT_DN_DESC=The subject DN for the \
certificate signing request. This must be provided unless then \
--replace-existing-certificate argument is given. If the \
--replace-existing-certificate argument is provided, then the --subject-dn \
argument may be omitted if you want to reuse the same subject as the \
existing certificate. A subject DN typically includes at least a 'CN' \
attribute (which in a server certificate should be the hostname that \
clients are expected to use when connecting to the server, and in other \
certificates indicates the purpose of that certificate), and may also \
include additional attributes like 'OU' (the associated department name), \
'O' (the company or organization name), 'L' (the city or locality name), \
'ST' (the full name -- NOT the two-letter abbreviation -- of the state or \
province), 'C' (the two-letter country code -- NOT the full country name). \
For example: 'CN=ldap.example.com,OU=Directory Services,O=Example \
Corporation,L=Austin,ST=Texas,C=US'.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_KEY_ALGORITHM_DESC=The name of the key \
algorithm to use to generate the key pair. If present, the value will \
typically be 'RSA' or 'EC' (for elliptic curve). This argument must not be \
provided if the --replace-existing-certificate argument is used. If \
neither this argument nor the --replace-existing-certificate argument is \
provided, then a default key algorithm of 'RSA' will be used.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_KEY_SIZE_BITS_DESC=The size of the key to \
generate, in bits. This argument must not be provided if the \
--replace-existing-certificate argument is used. This argument must be \
provided if the --key-algorithm argument is used to specify an algorithm \
other than 'RSA'. If neither this argument nor the \
--replace-existing-certificate argument is provided, then a default key \
size of 2048 bits will be used.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_SIG_ALG_DESC=The name of the algorithm to \
use to sign the certificate. This argument must not be provided if the \
--replace-existing-certificate argument is used. This argument must be \
provided if the --key-algorithm argument is used to specify an algorithm \
other than 'RSA'. If neither this argument nor the \
--replace-existing-certificate argument is provided, then a default \
signature algorithm of 'SHA256withRSA' will be used.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_INHERIT_EXT_DESC=This argument can only be \
used in conjunction with the --replace-existing-certificate argument, and \
it indicates that the requested certificate should inherit all of the same \
extension values as the certificate being replaced (although extensions \
known to apply to the certificate's issuer, like authority key identifier \
and issuer alternative name, may be excluded). If the \
--replace-existing-certificate argument is provided without the \
--inherit-extensions argument, then the new certificate will only have the \
extensions that are explicitly specified using other arguments.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_SAN_DNS_DESC=Indicates that the certificate \
signing request should include a subject alternative name extension with \
the specified DNS hostname. This can be used to help clients trust a \
server certificate if they connect to the server using a different \
hostname than is included in the CN attribute of the certificate subject. \
This can be provided multiple times to specify multiple alternate \
hostnames, and hostnames can have an asterisk as their leftmost component \
(for example, '*.example.com' or '*.east.example.com') to match any value \
in that component. Each value must contain only ASCII characters, so \
internationalized domain names must use the ASCII-Compatible Encoding \
(ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_SAN_IP_DESC=Indicates that the certificate \
signing request should include a subject alternative name extension with \
the specified IP address. This can be used to help clients trust a server \
certificate if they connect to the server using an IP address rather than \
the hostname that is included in the CN attribute of the certificate \
subject. This can be provided multiple times to specify multiple IP \
addresses, and each value must be a valid IPv4 or IPv6 address. There is \
no support for wildcards, CIDR, other mechanisms for specifying a range of \
addresses.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_SAN_EMAIL_DESC=Indicates that the \
certificate signing request should include a subject alternative name \
extension with the specified email address (technically, RFC 822 name) \
value. This can be provided multiple times to specify multiple email \
addresses. Each value must contain only ASCII characters, so \
internationalized email addresses must use the ASCII-Compatible Encoding \
(ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_SAN_URI_DESC=Indicates that the certificate \
signing request should include a subject alternative name extension with \
the specified URI value. This can be provided multiple times to specify \
multiple URIs. Each value must contain only ASCII characters, so \
internationalized resource identifiers must be mapped to URIs as described \
in RFC 3987.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_SAN_OID_DESC=Indicates that the certificate \
signing request should include a subject alternative name extension with \
the specified OID as a resource identifier. This can be provided multiple \
times to specify multiple OIDs, and each value must be the string \
representation of a valid object identifier.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_BC_IS_CA_DESC=Indicates that the certificate \
signing request should include a basic constraints extension that indicates \
whether the certificate should be considered a certification authority. If \
present, the value must be either 'true' or 'false'.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_BC_PATH_LENGTH_DESC=Indicates that the \
certificate signing request should include a basic constraints extension \
that specifies that there must not be more than the specified number of \
intermediate certificates between that certificate and the subject \
certificate in a certificate chain. This argument can only be provided in \
conjunction with a --basic-constraints-is-ca value of 'true'.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_KU_DESC=Indicates that the certificate \
signing request should include a key usage extension that indicates that \
the certificate can be used for a specified purpose. Allowed values for \
this argument are 'digital-signature', 'non-repudiation', \
'key-encipherment', 'data-encipherment', 'key-agreement', 'key-cert-sign', \
'crl-sign', 'encipher-only', and 'decipher-only'. This argument can be \
provided multiple times to specify multiple key usage values.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_EKU_DESC=Indicates that the certificate \
signing request should include an extended key usage extension that \
indicates that the certificate can be used for a specified purpose. \
Allowed values for this argument are 'server-auth', 'client-auth', \
'code-signing', 'email-protection', 'time-stamping', and 'ocsp-signing', or \
the string representation of any valid object identifier. This argument \
can be provided multiple times to specify multiple extended key usage values.
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_EXT_DESC=Indicates that the certificate \
signing request should include an extension with the specified content. \
The value must be in the form oid:criticality:value, where oid is the OID \
that identifies the type of extension, criticality is a value of either \
'true' or 'false', and value is the hexadecimal representation of the \
extension value (for example, --ext 2.5.29.19:true:30030101ff).
INFO_MANAGE_CERTS_SC_GEN_CSR_ARG_DISPLAY_COMMAND_DESC=Display a command that \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_GEN_CSR_EXAMPLE_1=Generates a certificate signing \
request for a certificate with a subject DN of \
'CN=ldap.example.com,O=Example Corp,C=US'. The request will generate a new \
key pair in the 'server-cert' alias with a 2048-bit RSA key and a signature \
algorithm of SHA256withRSA. The generated certificate signing request will \
be sent to standard output.
INFO_MANAGE_CERTS_SC_GEN_CSR_EXAMPLE_2=Generates a certificate signing \
request to replace the existing certificate with the 'server-cert' alias. \
The new certificate will include the same subject, key and signature \
algorithms, and set of extensions as the existing certificate, and the \
request will be written to the server-cert.csr output file.
INFO_MANAGE_CERTS_SC_GEN_CSR_EXAMPLE_3=Generates a certificate signing \
request for a certificate with a subject DN of \
'CN=ldap.example.com,O=Example Corp,C=US', a subject alternate name \
extension with DNS names of 'ldap1.example.com' and 'ldap2.example.com' and \
IP addresses of 1.2.3.4 and 1.2.3.5, and an extended key usage extension \
with the server-auth and client-auth usages. The certificate will use a \
newly-generated key pair with a 256-bit elliptic curve key and a signature \
algorithm of SHA256withECDSA. The request will be written to the \
server-cert.csr output file.
INFO_MANAGE_CERTS_SC_SIGN_CSR_DESC=Signs a certificate signing request (CSR) \
provided in a specified input file using a certificate contained in a \
specified keystore. The signed certificate may be written to either \
standard output or to a specified file.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_INPUT_FILE_DESC=The path to the input file \
containing the certificate signing request to process. This must be \
provided, and the specified file must exist.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_OUTPUT_FILE_DESC=The path to the output \
file to which the signed certificate should be written. If this is not \
provided, then the certificate will be written to standard output.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_FORMAT_DESC=The output format to use for \
the signed certificate. The value may be either 'PEM' (to write the \
certificate in the text-based PEM format), or 'DER' (to write the \
certificate in the binary DER format). If this is not provided, then the \
PEM output format will be used. If an output format of 'DER' is specified, \
then the --certificate-output-file argument must also be provided.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_KS_DESC=The path to the keystore file that \
contains the certificate that will be used to sign the requested \
certificate. This must be provided, and the specified file must exist.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore containing \
the signing certificate. A keystore password is required when signing \
certificate requests, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_KS_PW_FILE_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore containing \
the signing certificate. A keystore password is required when signing \
certificate requests, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. If a keystore password file is supplied, then the file must \
exist, must contain only one line, and that line must consist only of the \
clear-text keystore password.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_PROMPT_FOR_KS_PW_DESC=Interactively prompt \
for the keystore password. A keystore password is required when signing \
certificate requests, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_PK_PW_DESC=The password (also called a \
passphrase or PIN) to use to protect the private key. Although in many \
cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_PK_PW_FILE_DESC=The path to a file \
containing the password to use to protect the private key. Although in \
many cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password. If a \
private key password file is supplied, then the file must exist, must \
contain only one line, and that line must consist only of the clear-text \
private key password.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_PROMPT_FOR_PK_PW_DESC=Interactively prompt \
for the password to use to protect the private key. Although in many \
cases, private keys will be protected with the same password as the \
keystore itself, it is possible to use a different password for the private \
key. If an alternate private key password is needed, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments should be used to provide that \
private key password. If none of these arguments is given, then the \
keystore password will be used as the private key password.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_ALIAS_DESC=The alias (also called a \
nickname) of the certificate to use to sign the request. This alias must \
exist in the keystore, and it must reference a private key with a \
certificate chain.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_SUBJECT_DN_DESC=The subject DN for the \
signed certificate. A subject DN typically includes at least a 'CN' \
attribute (which in a server certificate should be the hostname that \
clients are expected to use when connecting to the server, and in other \
certificates indicates the purpose of that certificate), and may also \
include additional attributes like 'OU' (the associated department name), \
'O' (the company or organization name), 'L' (the city or locality name), \
'ST' (the full name -- NOT the two-letter abbreviation -- of the state or \
province), 'C' (the two-letter country code -- NOT the full country name). \
For example: 'CN=ldap.example.com,OU=Directory Services,O=Example \
Corporation,L=Austin,ST=Texas,C=US'. This argument is optional, and if it \
is not provided, then the subject DN from the certificate signing request \
will be used.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_DAYS_VALID_DESC=The number of days that \
the signed certificate should be considered valid. If this argument is not \
provided, then a default value of 365 days will be used.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_VALIDITY_START_TIME_DESC=The time that the \
signed certificate''s validity window should start (that is, the \
''notBefore'' value). If this is not provided, then the current time will \
be used. If a value is given, it should be in the form ''YYYYMMDDhhmmss'' \
(for example, ''{0}''). Timestamp values are assumed to be in the local \
time zone.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_SIG_ALG_DESC=The name of the algorithm to \
use to sign the certificate. If this is not provided, then the signature \
algorithm from the certificate signing request will be used.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_INCLUDE_EXT_DESC=Indicates that the \
signed certificate should include all of the extensions requested in the \
certificate signing request (although extensions known to apply to the \
certificate's issuer, like authority key identifier and issuer alternative \
name, may be excluded), and the requested extensions will be included in \
addition to any other extensions requested via command-line arguments. If \
this is not provided, then only the extensions requested via command-line \
arguments will be included in the signed certificate.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_SAN_DNS_DESC=Indicates that the signed \
certificate should include a subject alternative name extension with \
the specified DNS hostname. This can be used to help clients trust a \
server certificate if they connect to the server using a different \
hostname than is included in the CN attribute of the certificate subject. \
This can be provided multiple times to specify multiple alternate \
hostnames, and hostnames can have an asterisk as their leftmost component \
(for example, '*.example.com' or '*.east.example.com') to match any value \
in that component. Each value must contain only ASCII characters, so \
internationalized domain names must use the ASCII-Compatible Encoding \
(ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_SAN_IP_DESC=Indicates that the signed \
certificate should include a subject alternative name extension with \
the specified IP address. This can be used to help clients trust a server \
certificate if they connect to the server using an IP address rather than \
the hostname that is included in the CN attribute of the certificate \
subject. This can be provided multiple times to specify multiple IP \
addresses, and each value must be a valid IPv4 or IPv6 address. There is \
no support for wildcards, CIDR, other mechanisms for specifying a range of \
addresses.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_SAN_EMAIL_DESC=Indicates that the signed \
certificate should include a subject alternative name extension with the \
specified email address (technically, RFC 822 name) value. This can be \
provided multiple times to specify multiple email addresses. Each value \
must contain only ASCII characters, so internationalized email addresses \
must use the ASCII-Compatible Encoding (ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_SAN_URI_DESC=Indicates that the signed \
certificate should include a subject alternative name extension with \
the specified URI value. This can be provided multiple times to specify \
multiple URIs. Each value must contain only ASCII characters, so \
internationalized resource identifiers must be mapped to URIs as described \
in RFC 3987.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_SAN_OID_DESC=Indicates that the signed \
certificate should include a subject alternative name extension with the \
specified OID as a resource identifier. This can be provided multiple \
times to specify multiple OIDs, and each value must be the string \
representation of a valid object identifier.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_IAN_DNS_DESC=Indicates that the signed \
certificate should include an issuer alternative name extension with \
the specified DNS hostname. This can be provided multiple times to specify \
multiple alternate hostnames, and hostnames can have an asterisk as their \
leftmost component (for example, '*.example.com' or '*.east.example.com') \
to match any value in that component. Each value must contain only ASCII \
characters, so internationalized domain names must use the ASCII-Compatible \
Encoding (ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_IAN_IP_DESC=Indicates that the signed \
certificate should include an issuer alternative name extension with \
the specified IP address. This can be provided multiple times to specify \
multiple IP addresses, and each value must be a valid IPv4 or IPv6 \
address. There is no support for wildcards, CIDR, other mechanisms for \
specifying a range of addresses.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_IAN_EMAIL_DESC=Indicates that the signed \
certificate should include an issuer alternative name extension with the \
specified email address (technically, RFC 822 name) value. This can be \
provided multiple times to specify multiple email addresses. Each value \
must contain only ASCII characters, so internationalized email addresses \
must use the ASCII-Compatible Encoding (ACE) described in RFC 5890.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_IAN_URI_DESC=Indicates that the signed \
certificate should include an issuer alternative name extension with \
the specified URI value. This can be provided multiple times to specify \
multiple URIs. Each value must contain only ASCII characters, so \
internationalized resource identifiers must be mapped to URIs as described \
in RFC 3987.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_IAN_OID_DESC=Indicates that the signed \
certificate should include an issuer alternative name extension with the \
specified OID as a resource identifier. This can be provided multiple \
times to specify multiple OIDs, and each value must be the string \
representation of a valid object identifier.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_BC_IS_CA_DESC=Indicates that the signed \
certificate should include a basic constraints extension that indicates \
whether the certificate should be considered a certification authority. If \
present, the value must be either 'true' or 'false'.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_BC_PATH_LENGTH_DESC=Indicates that the \
signed certificate should include a basic constraints extension that \
specifies that there must not be more than the specified number of \
intermediate certificates between that issuer certificate and the subject \
certificate in a certificate chain. This argument can only be provided in \
conjunction with a --basic-constraints-is-ca value of 'true'.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_KU_DESC=Indicates that the signed \
certificate should include a key usage extension that indicates that \
the certificate can be used for a specified purpose. Allowed values for \
this argument are 'digital-signature', 'non-repudiation', \
'key-encipherment', 'data-encipherment', 'key-agreement', 'key-cert-sign', \
'crl-sign', 'encipher-only', and 'decipher-only'. This argument can be \
provided multiple times to specify multiple key usage values.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_EKU_DESC=Indicates that the signed \
certificate should include an extended key usage extension that \
indicates that the certificate can be used for a specified purpose. \
Allowed values for this argument are 'server-auth', 'client-auth', \
'code-signing', 'email-protection', 'time-stamping', and 'ocsp-signing', or \
the string representation of any valid object identifier. This argument \
can be provided multiple times to specify multiple extended key usage values.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_EXT_DESC=Indicates that the signed \
certificate should include an extension with the specified content. \
The value must be in the form oid:criticality:value, where oid is the OID \
that identifies the type of extension, criticality is a value of either \
'true' or 'false', and value is the hexadecimal representation of the \
extension value (for example, --ext 2.5.29.19:true:30030101ff).
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_NO_PROMPT_DESC=Sign the request without \
prompting the end user. By default, the certificate signing request will \
be displayed and the user will be interactively prompted about whether to \
sign it.
INFO_MANAGE_CERTS_SC_SIGN_CSR_ARG_DISPLAY_COMMAND_DESC=Display a command that \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_SIGN_CSR_EXAMPLE_1=Signs the certificate signing request \
contained in file 'server-cert.csr' using the 'ca-cert' certificate \
contained in the ''{0}'' keystore. The subject DN, signature algorithm, \
and extensions from the provided certificate signing request will be used \
to generate the corresponding values in the signed certificate, and the \
certificate will be valid for 365 days, starting immediately. The signed \
certificate will be written to standard output in PEM format.
INFO_MANAGE_CERTS_SC_SIGN_CSR_EXAMPLE_2=Signs the certificate signing request \
contained in file 'server-cert.csr' using the 'ca-cert' certificate \
contained in the ''{0}'' keystore. The subject DN, signature algorithm, \
and extensions from the provided certificate signing request will be used \
to generate the corresponding values in the signed certificate, and the \
certificate will also include an issuer alternative name extension with an \
email address of '[email protected]'. The signed certificate will be valid \
for 730 days starting at midnight on January 1, 2017 in the local \
timezone. The signed certificate will be written to the file \
'server-cert.der' file in the binary DER format.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_DESC=Changes the alias of a certificate in \
a keystore.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_KS_DESC=The path to the keystore file \
containing the alias to rename. This is required, and the keystore \
file must exist.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. A \
keystore password is required, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_KS_PW_FILE_DESC=The path to a file \
containing the password needed to access the contents of the keystore. A \
keystore password is required, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. If a keystore password file is supplied, then the file must \
exist, must contain only one line, and that line must consist only of the \
clear-text keystore password.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. A keystore password is required so one \
of the --keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_PK_PW_DESC=The password (also called a \
passphrase or PIN) used to protect the private key. In many cases, the \
private key password will be the same as the password used to protect the \
keystore itself, and in such instances, the private key password can be \
omitted and the keystore password will be used. However, if the target \
alias includes a private key, and that private key is protected with a \
different password than the keystore itself, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_PK_PW_FILE_DESC=The path to a file \
containing the password used to protect the private key. In many cases, \
the private key password will be the same as the password used to protect \
the keystore itself, and in such instances, the private key password can be \
omitted and the keystore password will be used. However, if the target \
alias includes a private key, and that private key is protected with a \
different password than the keystore itself, then one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments must be provided. If a private \
key password file is supplied, then the file must exist, must contain only \
one line, and that line must consist only of the clear-text private key \
password.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_PROMPT_FOR_PK_PW_DESC=Interactively \
prompt for the private key password. In many cases, the private key \
password will be the same as the password used to protect the keystore \
itself, and in such instances, the private key password can be omitted and \
the keystore password will be used. However, if the target alias includes \
a private key, and that private key is protected with a different password \
than the keystore itself, then one of the --private-key-password, \
--private-key-password-file, or --prompt-for-private-key-password arguments \
must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_CURRENT_ALIAS_DESC=The current alias \
for the keystore entry to rename. This is required, and it may only be \
provided once.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_NEW_ALIAS_DESC=The new alias to assign \
to the target entry in the keystore. This is required, and it may only be \
provided once.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_ARG_DISPLAY_COMMAND_DESC=Display a command \
that that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_CHANGE_ALIAS_EXAMPLE_1=Changes the alias of the existing \
'server-cert' certificate to be 'server-certificate'.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_DESC=Changes the password used to protect \
the contents of a keystore.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_KS_DESC=The path to the keystore file \
for which to change the password. This is required, and the keystore \
file must exist.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_CURRENT_PW_DESC=The current password \
for the keystore. The current password is required, so one of the \
--current-keystore-password, --current-keystore-password-file, or \
--prompt-for-current-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_CURRENT_PW_FILE_DESC=The path to a \
file containing the current password for the keystore. The current password \
is required, so one of the --current-keystore-password, \
--current-keystore-password-file, or --prompt-for-current-keystore-password \
arguments must be provided. If a keystore password file is supplied, then \
the file must exist, must contain only one line, and that line must consist \
only of the clear-text keystore password.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_PROMPT_FOR_CURRENT_PW_DESC=Interactively \
prompt for the current keystore password. The current password \
is required, so one of the --current-keystore-password, \
--current-keystore-password-file, or --prompt-for-current-keystore-password \
arguments must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_NEW_PW_DESC=The new password for the \
keystore. The new password is required, so one of the \
--new-keystore-password, --new-keystore-password-file, or \
--prompt-for-new-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_NEW_PW_FILE_DESC=The path to a file \
containing the new password for the keystore. The new password is \
required, so one of the --new-keystore-password, \
--new-keystore-password-file, or --prompt-for-new-keystore-password \
arguments must be provided. If a keystore password file is supplied, then \
the file must exist, must contain only one line, and that line must consist \
only of the clear-text keystore password.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_PROMPT_FOR_NEW_PW_DESC=Interactively \
prompt for the new keystore password. The new password is required, so one \
of the --new-keystore-password, --new-keystore-password-file, or \
--prompt-for-new-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_ARG_DISPLAY_COMMAND_DESC=Display a command \
that that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_CHANGE_KS_PW_EXAMPLE_1=Changes the password for the \
''{0}'' keystore from the current password contained in file ''{1}'' to \
the new password contained in file ''{2}''.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_DESC=Changes the password used to protect \
a specified private key.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_KS_DESC=The path to the keystore file \
containing the private key entry for which to change the password. This is \
required, and the keystore file must exist.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. A \
keystore password is required, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_KS_PW_FILE_DESC=The path to a file \
containing the password needed to access the contents of the keystore. A \
keystore password is required, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. If a keystore password file is supplied, then the file must \
exist, must contain only one line, and that line must consist only of the \
clear-text keystore password.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. A keystore password is required so one \
of the --keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_ALIAS_DESC=The alias (also called a \
nickname) of the private key entry for which to change the password. This \
is required.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_CURRENT_PW_DESC=The current password \
used to encrypt the private key. The current private key password is \
required, so one of the --current-private-key-password, \
--current-private-key-password-file, and \
--prompt-for-current-private-key-password arguments is required.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_CURRENT_PW_FILE_DESC=The path to a file \
containing the current password used to encrypt the private key. The \
current private key password is required, so one of the \
--current-private-key-password, --current-private-key-password-file, and \
--prompt-for-current-private-key-password arguments is required. If a \
private key password file is supplied, then the file must exist, must \
contain only one line, and that line must consist only of the clear-text \
private key password.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_PROMPT_FOR_CURRENT_PW_DESC=Interactively \
prompt for the current private key password. The current private key \
password is required, so one of the --current-private-key-password, \
--current-private-key-password-file, and \
--prompt-for-current-private-key-password arguments is required.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_NEW_PW_DESC=The new password to use to \
encrypt the private key. The new private key password is required, so one \
of the --new-private-key-password, --new-private-key-password-file, and \
--prompt-for-new-private-key-password arguments is required.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_NEW_PW_FILE_DESC=The path to a file \
containing the new password to use to encrypt the private key. The new \
private key password is required, so one of the --new-private-key-password, \
--new-private-key-password-file, and --prompt-for-new-private-key-password \
arguments is required. If a private key password file is supplied, then \
the file must exist, must contain only one line, and that line must consist \
only of the clear-text private key password.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_PROMPT_FOR_NEW_PW_DESC=Interactively \
prompt for the new private key password. The new private key password is \
required, so one of the --new-private-key-password, \
--new-private-key-password-file, and \
--prompt-for-new-private-key-password arguments is required.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_ARG_DISPLAY_COMMAND_DESC=Display a command \
that that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_CHANGE_PK_PW_EXAMPLE_1=Changes the password for the \
'server-cert' private key entry in the ''{0}'' keystore from the current \
password contained in file ''{1}'' to the new password contained in file \
''{2}''.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_DESC=Initiates a secure connection to a \
server to get that server's certificate chain, and then adds those \
certificates to a keystore so that it can be used as a trust store for that \
server.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_HOSTNAME_DESC=The hostname or IP \
address of the server to which the connection should be established. This \
must be provided.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_PORT_DESC=The TCP port number of the \
server to which the connection should be established. Unless the \
--use-ldap-start-tls argument is provided, the port number must be one on \
which the server expects to accept TLS-based connections. If the \
--use-ldap-start-tls argument is provided, then the specified port must be \
one on which an LDAP server is listening for non-secure connections but \
on which clients may use the StartTLS extended operation to transition to \
using secure communication. Standard secure port numbers include 636 for \
LDAPS and 443 for HTTPS, and the standard non-secure port for LDAP is 389. \
This must be provided.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_USE_START_TLS_DESC=Indicates that the \
tool should initially establish a non-secure connection to an LDAP server, \
and then use the StartTLS extended operation to transition to using secure \
communication.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_KS_DESC=The path to the keystore file \
to which the certificates should be added. This is required, but if the \
file does not exist, then it will be created.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_KS_PW_DESC=The password (also called a \
passphrase or PIN) needed to access the contents of the keystore. If the \
keystore does not exist, then it will be created with this password. A \
keystore password is required when importing certificates, so one of the \
--keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. The password \
must contain at least six characters.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_KS_PW_FILE_DESC=The password (also \
called a passphrase or PIN) needed to access the contents of the keystore. \
If the keystore does not exist, then it will be created with this \
password. A keystore password is required when importing certificates, so \
one of the --keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided. If a keystore \
password file is supplied, then the file must exist, must contain only one \
line, and that line must consist only of the clear-text keystore password. \
The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. If the keystore does not exist, then it \
will be created with this password. A keystore password is required when \
importing certificates, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. The password must contain at least six characters.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_KS_TYPE_DESC=The keystore type for the \
keystore to create. This argument should only be provided when creating a \
new keystore, and it will be ignored if the keystore already exists. The \
value must be either 'JKS' for the non-standard Java KeyStore format, or \
'PKCS12' for the standard PKCS #12 format. If this is not provided, then a \
default keystore type of 'JKS' will be used for newly-created keystores.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_ALIAS_DESC=The alias (also called a \
nickname) to use for the first certificate to add to the keystore. This \
alias must not already be in use in the keystore. If multiple certificates \
are to be imported, then the first certificate imported will use this \
alias, and subsequent certificates will have either "-issuer" (if there is \
only one issuer certificate) or "-issuer-#" (if there are multiple issuers, \
where # will be replaced with an incrementing number for each subsequent \
issuer). If this is omitted, then a default alias will be constructed \
from the hostname and port number.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_ISSUERS_ONLY_DESC=Indicates that the \
tool should only update the keystore to include the issuer certificates for \
the target server, but omit the server certificate at the head of the \
chain. This may be useful in environments in which all servers are signed \
by a common issuer and it is sufficient to trust just the issuer \
certificates. This argument will not have any effect for self-signed \
certificates in which a certificate is its own issuer.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_NO_PROMPT_DESC=Trust the server \
certificates without prompting the end user. By default, the server \
certificate chain will be displayed and the user will be interactively \
prompted about whether to trust the certificate.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_ENABLE_SSL_DEBUGGING_DESC=Enable Java's \
low-level support for debugging SSL/TLS communication. This is equivalent \
to setting the "javax.net.debug" property to "all".
INFO_MANAGE_CERTS_SC_TRUST_SERVER_ARG_VERBOSE_DESC=Display verbose \
information about the certificates in the server's certificate chain.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_EXAMPLE_1=Establishes a secure connection \
to the server ds.example.com on port 636 and adds that server''s \
certificate chain to the ''{0}'' keystore with a base alias of \
''ds.example.com:636''. The tool will display verbose information about \
the certificate chain presented by the server, and will interactively \
prompt about whether to trust that chain.
INFO_MANAGE_CERTS_SC_TRUST_SERVER_EXAMPLE_2=Establishes a non-secure \
connection to ds.example.com on port 389, and then uses the LDAP StartTLS \
extended operation to transition to a secure connection. It will then add \
the server''s issuer certificates to the ''{0}'' keystore with a base alias \
of ''ds-start-tls-cert''. The tool will trust the certificate chain \
without any confirmation from the user.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_DESC=Examines a keystore to determine \
how suitable a specified certificate is for use as a server certificate.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_ARG_KS_DESC=The path to the keystore \
file containing the certificate to check. This is required, and the \
keystore file must exist.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_ARG_KS_PW_DESC=The password (also called \
a passphrase or PIN) needed to access the contents of the keystore. A \
keystore password is required, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_ARG_KS_PW_FILE_DESC=The path to a file \
containing the password needed to access the contents of the keystore. A \
keystore password is required, so one of the --keystore-password, \
--keystore-password-file, or --prompt-for-keystore-password arguments must \
be provided. If a keystore password file is supplied, then the file must \
exist, must contain only one line, and that line must consist only of the \
clear-text keystore password.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_ARG_PROMPT_FOR_KS_PW_DESC=Interactively \
prompt for the keystore password. A keystore password is required, so one \
of the --keystore-password, --keystore-password-file, or \
--prompt-for-keystore-password arguments must be provided.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_ARG_ALIAS_DESC=The alias (also called a \
nickname) of the certificate to examine. This is required, and it may only \
be provided once.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_IGNORE_SHA1_WARNING_DESC=Do not fail the \
validation check merely because an issuer certificate contains a signature \
based on the SHA-1 digest algorithm. The SHA-1 algorithm is considered \
weak, and some clients may reject a certificate chain that includes a \
certificate with a SHA-1-based signature, but because some commercial \
authorities still use SHA-1-based root certificates, this argument makes it \
possible to ignore this warning for issuer certificates.
INFO_MANAGE_CERTS_SC_CHECK_USABILITY_EXAMPLE_1=Check the 'server-cert' \
certificate in the ''{0}'' keystore to determine how suitable it is for use \
as a server certificate.
INFO_MANAGE_CERTS_SC_DISPLAY_CERT_DESC=Displays information about all of the \
certificates contained in a file. The certificates may be formatted in \
either the text-based PEM or the binary DER format, and if the file \
multiple certificates, then all certificates must use the same format.
INFO_MANAGE_CERTS_SC_DISPLAY_CERT_ARG_FILE_DESC=The path to a file \
containing the certificates to be printed. The certificates may be \
formatted in either the text-based PEM format or the binary DER format. \
If the certificates are in PEM format, then each certificate must include \
the begin header and end footer, and blank lines and lines that start with \
the octothorpe character (#) will be ignored. If the certificates are in \
DER format, then there must not be any delimiter between the certificates.
INFO_MANAGE_CERTS_SC_DISPLAY_CERT_ARG_VERBOSE_DESC=Display verbose \
information about each of the certificates. If this argument is not \
provided, then the listing will only include basic summary information for \
each certificate, including its subject and issuer DNs, validity start and \
end times, and fingerprints. If this argument is provided, then additional \
information, including the X.509 certificate version, serial number, \
signature algorithm and value, public key algorithm and content, and \
extensions, will also be included.
INFO_MANAGE_CERTS_SC_DISPLAY_CERT_ARG_DISPLAY_COMMAND_DESC=Display a command \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_DISPLAY_CERT_EXAMPLE_1=Display basic information about \
each of the certificates in file ''{0}''.
INFO_MANAGE_CERTS_SC_DISPLAY_CERT_EXAMPLE_2=Display verbose information about \
each of the certificates in file ''{0}''. It will also display a command \
that can be used to accomplish a similar result using the Java keytool \
utility.
INFO_MANAGE_CERTS_SC_DISPLAY_CSR_DESC=Displays information about a \
certificate signing request (CSR) contained in a file. The CSR may be \
formatted in either the text-based PEM or the binary DER format.
INFO_MANAGE_CERTS_SC_DISPLAY_CSR_ARG_FILE_DESC=The path to a file \
containing the certificate signing request (CSR) to be printed. The CSR \
may be formatted in either the text-based PEM format or the binary DER \
format. If the request is in PEM format, it must include the begin header \
and end footer, and blank lines and lines that start with the \
octothorpe character (#) will be ignored. The file must contain only a \
single certificate signing request.
INFO_MANAGE_CERTS_SC_DISPLAY_CSR_ARG_VERBOSE_DESC=Display verbose information \
about the certificate signing request. If this argument is not provided, \
then the listing will only include basic summary information for the \
request, including its subject DN, signature algorithm, and public key \
algorithm. If this argument is provided, then additional information about \
the signature, public key, and extensions will be included.
INFO_MANAGE_CERTS_SC_DISPLAY_CSR_ARG_DISPLAY_COMMAND_DESC=Display a command \
that can be invoked to achieve a similar result with the Java keytool \
utility. Note that this may just be an approximation, since the \
manage-certificates and keytool utilities do not provide exactly the same \
sets of functionality.
INFO_MANAGE_CERTS_SC_DISPLAY_CSR_EXAMPLE_1=Display information about the \
certificate signing request in file ''{0}'', as well as a command that can \
be used to accomplish a similar result using the Java keytool utility.
ERR_MANAGE_CERTS_NO_SUBCOMMAND=ERROR: No subcommand was selected.
ERR_MANAGE_CERTS_UNKNOWN_SUBCOMMAND=ERROR: Unrecognized subcommand ''{0}''.
ERR_MANAGE_CERTS_LIST_CERTS_CANNOT_GET_ALIASES=ERROR: Unable to obtain a \
list of the aliases in keystore ''{0}'':
ERR_MANAGE_CERTS_LIST_CERTS_ERROR_GETTING_CERT=ERROR: An error occurred \
while attempting to retrieve the certificate with alias ''{0}'' from the \
keystore: {1}
INFO_MANAGE_CERTS_LIST_CERTS_LABEL_ALIAS_WITHOUT_CHAIN=Alias: {0}
INFO_MANAGE_CERTS_LIST_CERTS_LABEL_ALIAS_WITH_CHAIN=Alias: {0} (Certificate \
{1,number,0} of {2,number,0} in a chain)
ERR_MANAGE_CERTS_LIST_CERTS_VERIFY_SIGNATURE_NO_ISSUER=WARNING: Unable to \
verify the signature for this certificate because issuer certificate \
''{0}'' could not be located in either the specified keystore or the \
default set of JVM trusted issuers.
INFO_MANAGE_CERTS_LIST_CERTS_SIGNATURE_VALID=The certificate has a valid \
signature.
INFO_MANAGE_CERTS_LIST_CERTS_LABEL_HAS_PK_YES=Private Key Available: Yes
INFO_MANAGE_CERTS_LIST_CERTS_LABEL_HAS_PK_NO=Private Key Available: No
INFO_MANAGE_CERTS_LIST_CERTS_LABEL_PEM=PEM-Encoded Certificate:
WARN_MANAGE_CERTS_LIST_CERTS_ALIAS_NOT_IN_KS=WARNING: Alias ''{0}'' was \
requested for inclusion in the list of certificates, but there is no \
certificate with that alias in keystore ''{1}''.
INFO_MANAGE_CERTS_LIST_CERTS_NO_CERTS_OR_KEYS_WITHOUT_PW=No certificates or \
keys were found in the keystore. This may be because the keystore is \
empty, or it may be that the keystore requires a password in order to \
access its contents. If you believe the keystore may be non-empty, then \
try again with one of the --keystore-password, --keystore-password-file, \
or --prompt-for-keystore-password arguments supply a keystore password.
INFO_MANAGE_CERTS_LIST_CERTS_NO_CERTS_OR_KEYS_WITH_PW=No certificates or \
keys were found in the keystore.
ERR_MANAGE_CERTS_EXPORT_CERT_NO_FILE_WITH_DER=ERROR: An output file must be \
specified when exporting certificates in the binary DER format.
ERR_MANAGE_CERTS_EXPORT_CERT_NO_CERT_WITH_ALIAS=ERROR: There is no \
certificate with alias ''{0}'' in keystore ''{1}''.
ERR_MANAGE_CERTS_EXPORT_CERT_ERROR_GETTING_CERT=ERROR: An error occurred \
while trying to obtain the certificate with alias ''{0}'' from keystore \
''{1}'':
ERR_MANAGE_CERTS_EXPORT_CERT_ERROR_OPENING_OUTPUT=ERROR: An error occurred \
while opening output file ''{0}'' for writing:
ERR_MANAGE_CERTS_EXPORT_CERT_ERROR_WRITING_CERT=ERROR: An error occurred \
while attempting to export the certificate with alias ''{0}'' and subject \
''{1}'':
WARN_MANAGE_CERTS_EXPORT_CERT_MISSING_CERT_IN_CHAIN=WARNING: Unable to \
locate issuer certificate with subject DN ''{0}'' in either keystore \
''{1}'' or in the JVM's default set of trusted certificates. The \
certificate chain is incomplete.
INFO_MANAGE_CERTS_EXPORT_CERT_EXPORT_SUCCESSFUL=Successfully exported the \
following certificate to ''{0}'':
ERR_MANAGE_CERTS_EXPORT_KEY_NO_FILE_WITH_DER=ERROR: An output file must be \
specified when exporting a private key in the binary DER format.
ERR_MANAGE_CERTS_EXPORT_KEY_NO_KEY_WITH_ALIAS=ERROR: There is no private key \
with alias ''{0}'' in keystore ''{1}''.
ERR_MANAGE_CERTS_EXPORT_KEY_WRONG_KEY_PW=ERROR: Unable to retrieve the \
private key with alias ''{0}'' from keystore ''{1}'' because the wrong \
password was used to try to access the key. Please use one of the \
--private-key-password, --private-key-password-file, or \
--prompt-for-private-key-password arguments to supply the correct password \
for the private key.
ERR_MANAGE_CERTS_EXPORT_KEY_ERROR_GETTING_KEY=ERROR: An error occurred \
while trying to obtain the private key with alias ''{0}'' from keystore \
''{1}'':
ERR_MANAGE_CERTS_EXPORT_KEY_ERROR_OPENING_OUTPUT=ERROR: An error occurred \
while opening output file ''{0}'' for writing:
ERR_MANAGE_CERTS_EXPORT_KEY_ERROR_WRITING_KEY=ERROR: An error occurred \
while attempting to export the private with alias ''{0}'':
INFO_MANAGE_CERTS_EXPORT_KEY_EXPORT_SUCCESSFUL=Successfully exported the \
private key.
ERR_MANAGE_CERTS_IMPORT_CERT_NO_CERTS_IN_FILE=ERROR: Certificate file \
''{0}'' does not contain any certificates to import.
ERR_MANAGE_CERTS_IMPORT_CERT_SELF_SIGNED_NOT_LAST=ERROR: There are multiple \
certificates to import, but they do not form a valid certificate chain. \
The certificate with subject DN ''{0}'' is self-signed, but it is not the \
last certificate in the set of certificates to import.
ERR_MANAGE_CERTS_IMPORT_CERT_NEXT_NOT_ISSUER_OF_PREV=ERROR: There are \
multiple certificates to import, but they do not form a valid certificate \
chain. {0}
ERR_MANAGE_CERTS_IMPORT_CERT_CANNOT_GET_ISSUER=ERROR: An error occurred \
while trying to retrieve issuer certificate ''{0}'' from the keystore or \
the JVM's default set of trusted issuers to complete the certificate chain:
WARN_MANAGE_CERTS_IMPORT_CERT_NO_ISSUER_WITH_AKI=WARNING: The certificate \
with subject ''{0}'' and subject key identifier ''{1}'' was not included in \
the set of certificates to import, is not already present in the keystore, \
and is not included in the JVM's default set of trusted issuers. When \
validating a certificate chain, many clients expect to be able to find all \
certificates in the chain. Although the import will continue, you are \
strongly encouraged to find this issuer certificate, and any other \
certificates higher up the issuer chain, and import those certificates as \
well.
WARN_MANAGE_CERTS_IMPORT_CERT_NO_ISSUER_NO_AKI=WARNING: The certificate with \
with subject ''{0}'' was not included in the set of certificates to import, \
is not already present in the keystore, and is not included in the JVM's \
default set of trusted issuers. When validating a certificate chain, many \
clients expect to be able to find all certificates in the chain. Although \
the import will continue, you are strongly encouraged to find this issuer \
certificate, and any other certificates higher up the issuer chain, and \
import those certificates as well.
ERR_MANAGE_CERTS_IMPORT_CERT_NO_ISSUER_WITH_AKI=ERROR: The certificate \
with subject ''{0}'' and subject key identifier ''{1}'' was not included in \
the set of certificates to import, is not already present in the keystore, \
and is not included in the JVM's default set of trusted issuers. When \
importing a private key, or when importing a signed certificate into an \
alias with an existing private key, the entire certificate chain must be \
available. Please locate this issuer certificate, and any other \
certificates higher up the issuer chain, so that the complete chain can be \
imported.
ERR_MANAGE_CERTS_IMPORT_CERT_NO_ISSUER_NO_AKI=ERROR: The certificate with \
with subject ''{0}'' was not included in the set of certificates to import, \
is not already present in the keystore, and is not included in the JVM's \
default set of trusted issuers. When importing a private key, or when \
importing a signed certificate into an alias with an existing private key, \
the entire certificate chain must be available. Please locate this issuer \
certificate, and any other certificates higher up the issuer chain, so that \
the complete chain can be imported.
ERR_MANAGE_CERTS_IMPORT_CERT_WITH_PK_KEY_ALIAS_CONFLICT=ERROR: Unable to \
import the private key and certificate chain into alias ''{0}'' because \
that alias is already associated with another key in the keystore.
ERR_MANAGE_CERTS_IMPORT_CERT_WITH_PK_CERT_ALIAS_CONFLICT=ERROR: Unable to \
import the private key and certificate chain into alias ''{0}'' because \
that alias is already associated with another certificate in the keystore.
ERR_MANAGE_CERTS_IMPORT_CERT_WITH_PK_ALIAS_CONFLICT_ERROR=ERROR: \
An error occurred while trying to check for an existing key or certificate \
with alias ''{0}'' in the keystore:
ERR_MANAGE_CERTS_IMPORT_CERT_ERROR_CONVERTING_KEY=ERROR: Unable to convert \
the PKCS #8 key read from file ''{0}'' into a Java PrivateKey object \
suitable for importing into the keystore:
ERR_MANAGE_CERTS_IMPORT_CERT_ERROR_CONVERTING_CERT=ERROR: Unable to convert \
the X.509 certificate with subject ''{0}'' into a Java certificate object \
suitable for importing into the keystore:
INFO_MANAGE_CERTS_IMPORT_CERT_CONFIRM_IMPORT_CHAIN_NEW_KEY=The following \
certificate chain will be imported into the keystore, along with a private \
key, into alias ''{0}'':
INFO_MANAGE_CERTS_IMPORT_CERT_PROMPT_IMPORT_CHAIN=Do you want to import this \
certificate chain into the keystore?
ERR_MANAGE_CERTS_IMPORT_CERT_CANCELED=The import operation was canceled and \
the keystore was not updated.
ERR_MANAGE_CERTS_IMPORT_CERT_ERROR_UPDATING_KS_WITH_CHAIN=ERROR: An error \
occurred while attempting to set the key entry for alias ''{0}'' with the \
private key and certificate chain:
INFO_MANAGE_CERTS_IMPORT_CERT_CREATED_KEYSTORE=Successfully created a new {0} \
keystore.
INFO_MANAGE_CERTS_IMPORT_CERT_IMPORTED_CHAIN_WITH_PK=Successfully imported \
the certificate chain and its associated private key.
ERR_MANAGE_CERTS_IMPORT_CERT_WITH_CONFLICTING_CERT_ALIAS=ERROR: The keystore \
already has a certificate with alias ''{0}''. Please choose a different \
alias for the certificate to import.
ERR_MANAGE_CERTS_IMPORT_CERT_INTO_KEY_ALIAS_CANNOT_GET_KEY=ERROR: The \
keystore already contains a key with alias ''{0}'', but an error was \
encountered while attempting to retrieve that key and its associated \
certificate chain:
ERR_MANAGE_CERTS_IMPORT_CERT_INTO_KEY_ALIAS_KEY_MISMATCH=ERROR: The keystore \
already contains a key pair and certificate chain with alias ''{0}'', and \
that key pair uses a different public key than the certificate to import. \
A certificate can only be imported into an alias with an existing key pair \
if the certificate uses the same public key.
INFO_MANAGE_CERTS_IMPORT_CERT_CONFIRM_IMPORT_CHAIN_EXISTING_KEY=The following \
certificate chain will be imported into the keystore into alias ''{0}'', \
preserving the existing private key associated with that alias:
INFO_MANAGE_CERTS_IMPORT_CERT_IMPORTED_CHAIN_WITHOUT_PK=Successfully imported \
the certificate chain.
ERR_MANAGE_CERTS_IMPORT_CERT_WITH_CONFLICTING_ISSUER_ALIAS=ERROR: The import \
process would have resulted in issuer certificate ''{0}'' being assigned an \
alias of ''{1}'', which is already in use by another certificate or key in \
the keystore. Please choose a different alias to use as the base of the \
certificate chain, or import the issuer certificates manually with aliases \
that do not conflict.
ERR_MANAGE_CERTS_IMPORT_CERT_ERROR_UPDATING_KS_WITH_CERT=ERROR: An error \
occurred while attempting to add certificate ''{0}'' with alias ''{1}'' to \
the keystore:
INFO_MANAGE_CERTS_IMPORT_CERT_CONFIRM_IMPORT_CHAIN_NO_KEY=The following \
certificate chain will be imported into the keystore:
INFO_MANAGE_CERTS_IMPORT_CERT_LABEL_ALIAS=Alias: {0}
ERR_MANAGE_CERTS_DELETE_CERT_ERROR_GETTING_CERT=ERROR: An error occurred \
while attempting to retrieve the certificate stored in alias ''{0}'':
ERR_MANAGE_CERTS_DELETE_CERT_ERROR_GETTING_CHAIN=ERROR: An error occurred \
while attempting to retrieve the certificate chain associated with the \
private key stored in alias ''{0}'':
ERR_MANAGE_CERTS_DELETE_CERT_ERROR_ALIAS_NOT_CERT_OR_KEY=ERROR: There is \
no certificate or key entry with alias ''{0}'' in the keystore.
INFO_MANAGE_CERTS_DELETE_CERT_CONFIRM_DELETE_CERT=The following certificate \
will be deleted from the keystore:
INFO_MANAGE_CERTS_DELETE_CERT_CONFIRM_DELETE_CHAIN=The following certificate \
chain will be deleted from the keystore, along with its corresponding \
private key:
INFO_MANAGE_CERTS_DELETE_CERT_PROMPT_DELETE=Do you really want to delete this \
entry from the keystore?
ERR_MANAGE_CERTS_DELETE_CERT_CANCELED=The delete operation was canceled and \
the keystore was not updated.
ERR_MANAGE_CERTS_DELETE_CERT_DELETE_ERROR=ERROR: An error occurred when \
trying to delete the ''{0}'' entry from the keystore:
INFO_MANAGE_CERTS_DELETE_CERT_DELETED_CERT=Successfully deleted the \
certificate from the keystore.
INFO_MANAGE_CERTS_DELETE_CERT_DELETED_CHAIN=Successfully deleted the the \
certificate chain and its associated private key from the keystore.
ERR_MANAGE_CERTS_GEN_CERT_NO_FILE_WITH_DER=ERROR: An output file must be \
specified when using the binary DER output format.
ERR_MANAGE_CERTS_GEN_CERT_REPLACE_WITHOUT_KS=ERROR: If the \
--replace-existing-certificate argument is provided, then the keystore file \
must already exist.
ERR_MANAGE_CERTS_GEN_CERT_UNKNOWN_KEY_ALG=ERROR: Unrecognized public key \
algorithm ''{0}''. Suggested key algorithm names include 'RSA' and 'EC'.
ERR_MANAGE_CERTS_GEN_CERT_NO_KEY_SIZE_FOR_NON_RSA_KEY=ERROR: If the \
--key-algorithm argument is used to specify a key algorithm other than \
'RSA', then the --key-size-bits argument must also be provided to specify \
the key size.
ERR_MANAGE_CERTS_GEN_CERT_UNKNOWN_SIG_ALG=ERROR: Unrecognized signature \
algorithm ''{0}''. Suggested signature algorithm names include \
'SHA256withRSA', 'SHA384withRSA', 'SHA512withRSA", 'SHA256withECDSA', \
'SHA384withECDSA', and 'SHA512withECDSA'.
ERR_MANAGE_CERTS_GEN_CERT_UNKNOWN_SIG_ALG_IN_CERT=ERROR: The existing \
certificate uses an unrecognized signature algorithm with OID ''{0}''.
ERR_MANAGE_CERTS_GEN_CERT_UNKNOWN_SIG_ALG_IN_CSR=ERROR: The existing \
certificate signing request uses an unrecognized signature algorithm with \
OID ''{0}''.
ERR_MANAGE_CERTS_GEN_CERT_NO_SIG_ALG_FOR_NON_RSA_KEY=ERROR: If the \
--key-algorithm argument is used to specify a key algorithm other than \
'RSA', then the --signature-algorithm argument must also be provided to \
specify the signature algorithm.
ERR_MANAGE_CERTS_GEN_CERT_BC_PATH_LENGTH_WITHOUT_CA=ERROR: The \
--basic-constraints-path-length argument cannot be used unless the \
--basic-constraints-is-ca argument is also provided with a value of 'true'.
ERR_MANAGE_CERTS_GEN_CERT_INVALID_KEY_USAGE=ERROR: Invalid value ''{0}'' \
provided for the --key-usage argument. Allowed values are: \
'digital-signature', 'non-repudiation', 'key-encipherment', \
'data-encipherment', 'key-agreement', 'key-cert-sign', 'crl-sign', \
'encipher-only', and 'decipher-only'.
ERR_MANAGE_CERTS_GEN_CERT_INVALID_EXTENDED_KEY_USAGE=ERROR: Invalid value \
''{0}'' provided for the --extended-key-usage argument. Allowed values \
are: 'server-auth', 'client-auth', 'code-signing', 'email-protection', \
'time-stamping', and 'ocsp-signing', or the string representation of any \
valid object identifier.
ERR_MANAGE_CERTS_GEN_CERT_EXTENDED_KEY_USAGE_ERROR=ERROR: Unable to create \
an extended key usage extension with the provided values:
ERR_MANAGE_CERTS_GEN_CERT_EXT_MALFORMED_OID=ERROR: Unable to create an \
extension from value ''{0}'' because it has a malformed OID ''{1}'' that is \
not a strictly valid object identifier.
ERR_MANAGE_CERTS_GEN_CERT_EXT_INVALID_CRITICALITY=ERROR: Unable to create an \
extension from value ''{0}'' because the criticality value ''{1}'' could \
not be parsed as a Boolean value. The criticality should be either 'true' \
or 'false' (without the single quotes).
ERR_MANAGE_CERTS_GEN_CERT_EXT_INVALID_VALUE=ERROR: Unable to create an \
extension from value ''{0}'' because the value portion could not be parsed \
as a valid hexadecimal string with an even number of characters.
ERR_MANAGE_CERTS_GEN_CERT_EXT_MALFORMED=ERROR: Unable to create an extension \
from value ''{0}'' because that value could not be parsed in the form \
'oid:criticality:value', where oid is the object identifier for the \
extension, criticality is either 'true' or 'false', and value is the \
hexadecimal representation of the bytes to include in the extension value.
ERR_MANAGE_CERTS_GEN_CERT_REPLACE_ALIAS_IS_CERT=ERROR: Alias ''{0}'' in \
keystore ''{1}'' is associated with a certificate entry that does not \
include a private key. The --replace-existing-certificate argument can \
only be used to replace a certificate that has a corresponding private key.
ERR_MANAGE_CERTS_GEN_CERT_REPLACE_NO_SUCH_ALIAS=ERROR: Alias ''{0}'' does \
not exist in keystore ''{1}''.
ERR_MANAGE_CERTS_GEN_CERT_REPLACE_COULD_NOT_GET_CERT=ERROR: An error \
occurred while attempting to retrieve the certificate and corresponding \
key pair at the head of the chain stored in alias ''{0}'':
ERR_MANAGE_CERTS_GEN_CERT_ERROR_GENERATING_CERT=ERROR: An error occurred \
while trying to generate a self-signed certificate with the provided \
settings:
ERR_MANAGE_CERTS_GEN_CERT_ERROR_UPDATING_KEYSTORE=ERROR: An error occurred \
while attempting to write the updated keystore:
ERR_MANAGE_CERTS_GEN_CERT_ERROR_GENERATING_CSR=ERROR: An error occurred \
while trying to generate a certificate signing request with the provided \
settings:
ERR_MANAGE_CERTS_GEN_CERT_ERROR_WRITING_CSR=ERROR: An error occurred while \
trying to write the generated certificate signing request:
ERR_MANAGE_CERTS_GEN_CERT_NO_SUBJECT_DN_WITHOUT_REPLACE=ERROR: The \
--subject-dn argument must be provided unless the \
--replace-existing-certificate argument is provided.
ERR_MANAGE_CERTS_GEN_CERT_ALIAS_EXISTS_WITHOUT_REPLACE=ERROR: Alias ''{0}'' \
is already in use in the keystore. The specified alias must not exist \
unless the --replace-existing-certificate argument is also provided.
INFO_MANAGE_CERTS_GEN_CERT_CERT_CREATED_KEYSTORE=Successfully created a new \
{0} keystore.
INFO_MANAGE_CERTS_GEN_CERT_SUCCESSFULLY_GENERATED_SELF_CERT=Successfully \
generated the following self-signed certificate:
INFO_MANAGE_CERTS_GEN_CERT_SUCCESSFULLY_GENERATED_CSR=Successfully wrote the \
certificate signing request to file ''{0}''.
INFO_MANAGE_CERTS_GEN_CERT_SUCCESSFULLY_GENERATED_KEYPAIR=Successfully \
generated the key pair to use for the certificate signing request.
ERR_MANAGE_CERTS_GEN_CERT_SIGN_ALIAS_IS_CERT=ERROR: Alias ''{0}'' in \
keystore ''{1}'' is associated with a certificate entry that does not \
include a private key. The signing certificate must have a private key.
ERR_MANAGE_CERTS_GEN_CERT_SIGN_NO_SUCH_ALIAS=ERROR: Alias ''{0}'' does \
not exist in keystore ''{1}''. The signing certificate must exist and must \
have a private key.
ERR_MANAGE_CERTS_GEN_CERT_SIGN_CANNOT_GET_SIGNING_CERT=ERROR: An error \
occurred while attempting to retrieve the signing certificate and its \
corresponding key pair with alias ''{0}'' from the keystore:
INFO_MANAGE_CERTS_GEN_CERT_SIGN_CONFIRM=Read the following certificate \
signing request:
INFO_MANAGE_CERTS_GEN_CERT_PROMPT_SIGN=Do you really want to sign this request?
ERR_MANAGE_CERTS_GEN_CERT_SIGN_CANCELED=The operation was canceled and the \
certificate signing request was not signed.
ERR_MANAGE_CERTS_GEN_CERT_ERROR_SIGNING_CERT=ERROR: An error occurred \
while trying to generate a signed certificate with the provided settings:
ERR_MANAGE_CERTS_GEN_CERT_ERROR_WRITING_SIGNED_CERT=ERROR: An error occurred \
while trying to write the signed certificate:
INFO_MANAGE_CERTS_GEN_CERT_SUCCESSFULLY_SIGNED_CERT=Successfully wrote the \
signed certificate to file ''{0}''.
ERR_MANAGE_CERTS_CHANGE_ALIAS_NO_SUCH_ALIAS=ERROR: The keystore does not \
have an existing entry with alias ''{0}''.
ERR_MANAGE_CERTS_CHANGE_ALIAS_CANNOT_GET_EXISTING_ENTRY=ERROR: An error \
occurred while attempting to retrieve the contents of the existing entry \
with alias ''{0}''
ERR_MANAGE_CERTS_CHANGE_ALIAS_NEW_ALIAS_IN_USE=ERROR: The keystore already \
has an entry with alias ''{0}''.
ERR_MANAGE_CERTS_CHANGE_ALIAS_CANNOT_UPDATE_KEYSTORE=ERROR: An error \
occurred while attempting to update the keystore to set the new alias:
INFO_MANAGE_CERTS_CHANGE_ALIAS_SUCCESSFUL=Successfully changed the alias from \
''{0}'' to ''{1}''.
INFO_MANAGE_CERTS_CHANGE_KS_PW_SUCCESSFUL=Successfully changed the password \
for keystore ''{0}''.
ERR_MANAGE_CERTS_CHANGE_PK_PW_ALIAS_IS_CERT=ERROR: Alias ''{0}'' references \
a certificate entry for which there is no private key. You can only change \
the private key password for entries that have a private key.
ERR_MANAGE_CERTS_CHANGE_PK_PW_NO_SUCH_ALIAS=ERROR: Alias ''{0}'' does not \
exist in the keystore.
ERR_MANAGE_CERTS_CHANGE_PK_PW_WRONG_PK_PW=ERROR: Unable to retrieve the \
private key stored in alias ''{0}''. The most likely reason is that the \
provided current private key password is incorrect.
ERR_MANAGE_CERTS_CHANGE_PK_PW_CANNOT_GET_PK=ERROR: An error occurred while \
attempting to retrieve the private key stored in alias ''{0}'':
ERR_MANAGE_CERTS_CHANGE_PK_PW_CANNOT_UPDATE_KS=ERROR: An error occurred \
while attempting to update the keystore:
INFO_MANAGE_CERTS_CHANGE_PK_PW_SUCCESSFUL=Successfully changed the private \
key password for alias ''{0}''.
ERR_MANAGE_CERTS_TRUST_SERVER_ALIAS_IN_USE=ERROR: Alias ''{0}'' is already \
in use in the keystore.
ERR_MANAGE_CERTS_TRUST_SERVER_NO_CERT_CHAIN_RECEIVED=ERROR: Did not \
receive the certificate chain from {0} after waiting for up to 90 seconds.
INFO_MANAGE_CERTS_TRUST_SERVER_RETRIEVED_CHAIN=Retrieved the following \
certificate chain from {0}:
INFO_MANAGE_CERTS_TRUST_SERVER_NOTE_OMITTED=NOTE: The following certificate \
will not be added to the keystore because the --issuers-only argument was \
provided:
INFO_MANAGE_CERTS_TRUST_SERVER_PROMPT_TRUST=Do you wish to trust this \
certificate chain and add the certificates into the trust store?
ERR_MANAGE_CERTS_TRUST_SERVER_CHAIN_REJECTED=The server certificate chain was \
rejected and the keystore has not been updated.
ERR_MANAGE_CERTS_TRUST_SERVER_INVALID_PROMPT_RESPONSE=ERROR: You must enter \
either 'yes' to trust the certificate chain and add it into the keystore, \
or 'no' to reject it and exit.
ERR_MANAGE_CERTS_TRUST_SERVER_CANNOT_READ_PROMPT_RESPONSE=ERROR: Unable to \
read the response to the prompt:
ERR_MANAGE_CERTS_TRUST_SERVER_ERROR_ADDING_CERT_TO_KS=ERROR: An error \
occurred while trying to add certificate ''{0}'' to the keystore:
INFO_MANAGE_CERTS_TRUST_SERVER_CERT_CREATED_KEYSTORE=Successfully created a \
new {0} keystore.
INFO_MANAGE_CERTS_TRUST_SERVER_ADDED_CERT_TO_KS=Successfully added 1 \
certificate to the keystore.
INFO_MANAGE_CERTS_TRUST_SERVER_ADDED_CERTS_TO_KS=Successfully added \
{0,number,0} certificates to the keystore.
ERR_MANAGE_CERTS_CHECK_USABILITY_CANNOT_GET_CHAIN=ERROR: An error occurred \
while retrieving the certificate chain contained in the key entry with \
alias ''{0}'':
INFO_MANAGE_CERTS_CHECK_USABILITY_GOT_CHAIN=Successfully retrieved the \
certificate chain for alias ''{0}'':
ERR_MANAGE_CERTS_CHECK_USABILITY_NO_PRIVATE_KEY=ERROR: Alias ''{0}'' \
contains only a certificate entry with no corresponding private key. A \
server certificate must have both a private key and a certificate chain.
ERR_MANAGE_CERTS_CHECK_USABILITY_NO_SUCH_ALIAS=ERROR: Alias ''{0}'' does not \
exist in the keystore.
WARN_MANAGE_CERTS_CHECK_USABILITY_CERT_IS_SELF_SIGNED=WARNING: Certificate \
''{0}'' is self-signed. While this is valid and will yield encryption that \
is just as strong as if the certificate had been signed by another \
certificate, self-signed certificates can encourage bad behavior among \
clients because rather than configuring the client with explicit knowledge \
of the server certificate, the client might be configured to blindly trust \
any certificate that is presented to it, which leaves that communication \
vulnerable to man-in-the-middle attacks. It is recommended that server \
certificates be signed by a common issuer so that clients can be configured \
to trust that issuer certificate, and they can automatically trust any \
certificate signed by that issuer.
ERR_MANAGE_CERTS_CHECK_USABILITY_END_OF_CHAIN_NOT_SELF_SIGNED=ERROR: The \
certificate chain stored in alias ''{0}'' is not complete because it does \
not end with a self-signed certificate.
ERR_MANAGE_CERTS_CHECK_USABILITY_CHAIN_ISSUER_MISMATCH=ERROR: The \
certificate chain stored in alias ''{0}'' is not valid because the \
certificates in it do not constitute a single continuous change. The \
certificate with subject ''{1}'' is not the issuer certificate for the \
certificate with subject ''{2}'' that immediately precedes it in the \
chain: {3}
INFO_MANAGE_CERTS_CHECK_USABILITY_CHAIN_COMPLETE=OK: The certificate chain \
is complete. Each subsequent certificate is the issuer for the previous \
certificate in the chain, and the chain ends with a self-signed certificate.
INFO_MANAGE_CERTS_CHECK_USABILITY_CA_TRUSTED_OK=OK: CA certificate ''{0}'' \
was found in the JVM's default set of trusted certificates. Most clients \
will likely trust this issuer.
NOTE_MANAGE_CERTS_CHECK_USABILITY_CA_NOT_IN_JVM_DEFAULT_TS=NOTICE: CA \
certificate ''{0}'' was not found in the JVM's default set of trusted \
certificates. Clients will likely need special configuration to trust this \
certificate chain.
WARN_MANAGE_CERTS_CHECK_USABILITY_CHECK_CA_IN_TS_ERROR=WARNING: An error \
occurred while attempting to determine whether CA certificate ''{0}'' is \
contained in the JVM-default trust store: {1}
INFO_MANAGE_CERTS_CHECK_USABILITY_CERT_SIGNATURE_VALID=OK: Certificate \
''{0}'' has a valid signature.
ERR_MANAGE_CERTS_CHECK_USABILITY_END_CERT_NOT_YET_VALID=ERROR: Certificate \
''{0}'' is not yet valid. It will not be valid until {1}.
ERR_MANAGE_CERTS_CHECK_USABILITY_ISSUER_CERT_NOT_YET_VALID=ERROR: Issuer \
certificate ''{0}'' is not yet valid. It will not be valid until {1}.
ERR_MANAGE_CERTS_CHECK_USABILITY_END_CERT_EXPIRED=ERROR: Certificate \
''{0}'' expired at {1}.
ERR_MANAGE_CERTS_CHECK_USABILITY_ISSUER_CERT_EXPIRED=ERROR: Issuer \
certificate ''{0}'' expired at {1}.
WARN_MANAGE_CERTS_CHECK_USABILITY_END_CERT_NEAR_EXPIRATION=WARNING: \
Certificate ''{0}'' will expire at {1}. To ensure seamless operation, you \
will need to renew the certificate before that time.
WARN_MANAGE_CERTS_CHECK_USABILITY_ISSUER_CERT_NEAR_EXPIRATION=WARNING: \
Issuer certificate ''{0}'' will expire at {1}. Clients will stop trusting \
a certificate once its issuer has expired. To ensure seamless operation, \
you will need to renew the certificate before that time and ensure that the \
new certificate is signed by an issuer that will not expire in the near \
future.
INFO_MANAGE_CERTS_CHECK_USABILITY_END_CERT_VALIDITY_OK=OK: Certificate \
''{0}'' will expire at {1}, which is not in the near future.
INFO_MANAGE_CERTS_CHECK_USABILITY_ISSUER_CERT_VALIDITY_OK=OK: Issuer \
certificate ''{0}'' will expire at {1}, which is not in the near future.
ERR_MANAGE_CERTS_CHECK_USABILITY_END_CERT_BAD_EKU=ERROR: Certificate ''{0}'' \
at the head of the chain includes an extended key usage extension, but \
that extension does not include the 'serverAuth' usage. Clients that check \
this extension will not accept the certificate as a TLS server certificate.
INFO_MANAGE_CERTS_CHECK_USABILITY_END_CERT_GOOD_EKU=OK: Certificate ''{0}'' \
at the head of the chain includes an extended key usage extension, and \
that extension includes the 'serverAuth' usage.
ERR_MANAGE_CERTS_CHECK_USABILITY_ISSUER_CERT_BAD_BC_CA=ERROR: Issuer \
certificate ''{0}'' includes a basic constraints extension that indicates \
the certificate is not permitted to act as a certification authority. \
Clients that check this extension will not accept the certificate chain.
ERR_MANAGE_CERTS_CHECK_USABILITY_ISSUER_CERT_BAD_BC_LENGTH=ERROR: Issuer \
certificate ''{0}'' includes a basic constraints extension with a path \
length value of {1,number,0}, which means that there must not be more than \
than {1,number,0} intermediate certificate(s) between that certificate and \
the subject certificate. However, the number of intermediate certificates \
between subject certificate ''{2}'' and issuer certificate ''{0}'' is \
{3,number,0}. Clients that check this extension will likely not accept the \
certificate chain.
INFO_MANAGE_CERTS_CHECK_USABILITY_ISSUER_CERT_GOOD_BC=OK: Issuer \
certificate ''{0}'' includes a basic constraints extension, and the \
certificate chain satisfies those constraints.
ERR_MANAGE_CERTS_CHECK_USABILITY_ISSUER_NO_CERT_SIGN_KU=ERROR: Issuer \
certificate ''{0}'' includes a key usage extension, but that extension does \
not have the keyCertSign usage flag set to true. Clients that check this \
extension will not trust it to sign other certificates.
INFO_MANAGE_CERTS_CHECK_USABILITY_ISSUER_GOOD_KU=OK: Issuer certificate \
''{0}'' includes a key usage extension with the keyCertSign usage flag set \
to true.
WARN_MANAGE_CERTS_CHECK_USABILITY_NO_EKU=WARNING: Certificate ''{0}'' does \
not have an extended key usage extension. It is generally recommended that \
TLS server certificates have an extended key usage extension with at least \
the serverAuth usage ID.
WARN_MANAGE_CERTS_CHECK_USABILITY_NO_BC=WARNING: Issuer certificate ''{0}'' \
does not have a basic constraints extension. It is generally recommended \
that all issuer certificates have this extension to indicate that they \
are permitted to act as a certification authority.
WARN_MANAGE_CERTS_CHECK_USABILITY_NO_KU=WARNING: Issuer certificate ''{0}'' \
does not have a key usage extension. It is generally recommended that all \
issuer certificates have this extension with at least the keyCertSign \
usage to indicate that they are allowed to sign other certificates.
WARN_MANAGE_CERTS_CHECK_USABILITY_UNKNOWN_SIG_ALG=WARNING: Certificate \
''{0}'' uses a signature algorithm of ''{1}'', which is not a recognized \
algorithm. Unable to determine the strength of the signature algorithm.
ERR_MANAGE_CERTS_CHECK_USABILITY_WEAK_SIG_ALG=ERROR: Certificate ''{0}'' \
uses a signature algorithm of ''{1}'', which is considered weak. Some \
clients may not accept certificates with this signature algorithm.
WARN_MANAGE_CERTS_CHECK_USABILITY_ISSUER_WITH_SHA1_SIG=WARNING: Issuer \
certificate ''{0}'' uses a signature algorithm of ''{1}'', which uses the \
weak SHA-1 message digest. Many clients will not accept server \
certificates with this signature algorithm, and some may not accept issuer \
certificates with this algorithm. However, this is not considered an error \
because the ''{2}'' argument was provided.
INFO_MANAGE_CERTS_CHECK_USABILITY_SIG_ALG_OK=OK: Certificate ''{0}'' uses a \
signature algorithm of ''{1}'', which is is considered strong.
ERR_MANAGE_CERTS_CHECK_USABILITY_WEAK_RSA_MODULUS=ERROR: Certificate ''{0}'' \
has a {1,number,0}-bit RSA public key, which is considered weak. RSA keys \
should have a size of at least 2048 bits.
INFO_MANAGE_CERTS_CHECK_USABILITY_RSA_MODULUS_OK=OK: Certificate ''{0}'' \
has a {1,number,0}-bit RSA public key, which is considered strong.
ERR_MANAGE_CERTS_CHECK_USABILITY_ONE_ERROR=1 usability error was identified \
while validating the certificate chain.
ERR_MANAGE_CERTS_CHECK_USABILITY_MULTIPLE_ERRORS={0,number,0} usability \
errors were identified while validating the certificate chain.
ERR_MANAGE_CERTS_CHECK_USABILITY_ONE_WARNING=No usability errors were \
identified while validating the certificate chain, but 1 usability warning \
was identified.
ERR_MANAGE_CERTS_CHECK_USABILITY_MULTIPLE_WARNINGS=No usability errors were \
identified while validating the certificate chain, but {0,number,0} \
usability warnings were identified.
INFO_MANAGE_CERTS_CHECK_USABILITY_NO_ERRORS_OR_WARNINGS=No usability errors \
or warnings were identified while validating the certificate chain.
INFO_MANAGE_CERTS_DISPLAY_CERT_NO_CERTS=There are no certificates in file \
''{0}''.
INFO_MANAGE_CERTS_APPROXIMATE_KEYTOOL_COMMAND=# Approximately equivalent \
keytool command:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_SUBJECT_DN=Subject DN: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_ISSUER_DN=Issuer DN: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_VALIDITY_START=Validity Start Time: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_VALIDITY_END=Validity End Time: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_VALIDITY_STATE_VALID=Validity State: The \
certificate is currently within the validity window.
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_VALIDITY_STATE_NOT_YET_VALID=Validity \
State: The certificate is not yet valid.
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_VALIDITY_STATE_EXPIRED=Validity State: \
The certificate is expired.
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_FINGERPRINT={0} Fingerprint: {1}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_VERSION=X.509 Certificate Version: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_SERIAL_NUMBER=Serial Number: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_SIG_ALG=Signature Algorithm: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_SIG_VALUE=Signature Value:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_PK_ALG=Public Key Algorithm: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_ENCODED_PK=Encoded Public Key:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_RSA_MODULUS={0,number,0}-bit RSA Modulus:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_RSA_EXPONENT=RSA Public Exponent: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_RSA_KEY_SIZE=RSA Key Size: {0,number,0} \
bits
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EC_CURVE=Elliptic Curve Named Curve: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EC_IS_COMPRESSED=Elliptic Curve Public Key \
Is Compressed: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EC_X=Elliptic Curve X-Coordinate: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EC_Y=Elliptic Curve Y-Coordinate: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EC_Y_IS_EVEN=Elliptic Curve Y-Coordinate \
Is Even: {0}
INFO_MANAGE_CERTS_GET_PK_SUMMARY_RSA_MODULUS_SIZE={0,number,0}-bit
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_SUBJECT_UNIQUE_ID=Subject Unique Identifier:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_ISSUER_UNIQUE_ID=Issuer Unique Identifier:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXTENSIONS=Certificate Extensions:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_OID=OID: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_IS_CRITICAL=Is Critical: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_AUTH_KEY_ID_EXT=Authority Key \
Identifier Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_AUTH_KEY_ID_ID=Key Identifier:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_AUTH_KEY_ID_ISSUER=Authority \
Certificate Issuer:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_AUTH_KEY_ID_SERIAL=Authority \
Certificate Serial Number: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_BASIC_CONST_EXT=Basic Constraints \
Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_BASIC_CONST_IS_CA=Is CA: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_BASIC_CONST_LENGTH=Path Length \
Constraint: {0,number,0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_CRL_DP_EXT=CRL Distribution Points \
Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_CRL_DP_HEADER=CRL Distribution Point:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_CRL_DP_FULL_NAME=Full Name:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_CRL_DP_REL_NAME=Name Relative to CRL \
Issuer: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_CRL_DP_REASON=Potential Revocation \
Reasons:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_CRL_DP_CRL_ISSUER=CRL Issuer:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_EKU_EXT=Extended Key Usage Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_EKU_ID=Key Purpose ID: {0}
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_IAN_EXT=Issuer Alternative Name \
Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_EXT=Key Usage Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_USAGES=Key Usages:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_DS=Digital Signature
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_NR=Non-Repudiation
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_KE=Key Encipherment
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_DE=Data Encipherment
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_KA=Key Agreement
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_KCS=Key Cert Sign
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_CRL_SIGN=CRL Sign
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_EO=Encipher Only
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_KU_DO=Decipher Only
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_SAN_EXT=Subject Alternative Name \
Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_SKI_EXT=Subject Key Identifier \
Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_SKI_ID=Key Identifier:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_GENERIC=Extension:
INFO_MANAGE_CERTS_PRINT_CERT_LABEL_EXT_VALUE=Extension Value:
INFO_MANAGE_CERTS_PRINT_CSR_LABEL_VERSION=PKCS #10 Certificate Signing \
Request Version: {0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_DNS=DNS Name: {0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_IP=IP Address: {0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_RFC_822_NAME=RFC 822 Name (Email \
Address): {0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_DIRECTORY_NAME=Directory Name: {0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_URI=URI: {0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_REGISTERED_ID=Registered ID: {0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_OTHER_NAME_COUNT=Other Name Count: \
{0,number,0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_X400_ADDR_COUNT=X.400 Address Count: \
{0,number,0}
INFO_MANAGE_CERTS_GENERAL_NAMES_LABEL_EDI_PARTY_NAME_COUNT=EDI Party Name \
Count: {0,number,0}
ERR_MANAGE_CERTS_CANNOT_INVOKE_COMMAND=ERROR: An error occurred while trying \
to invoke the ''{0}'' command:
ERR_MANAGE_CERTS_ERROR_WAITING_FOR_COMMAND=ERROR: An error occurred while \
waiting for the ''{0}'' command to complete:
ERR_MANAGE_CERTS_GET_KS_PW_TOO_SHORT=ERROR: The specified keystore password \
is too short. The password must contain at least six characters.
ERR_MANAGE_CERTS_GET_KS_PW_EMPTY_FILE=ERROR: Unable to read the keystore \
password from file ''{0}'' because the file is empty. The file must have \
exactly one line, consisting only of the clear-text keystore password.
ERR_MANAGE_CERTS_GET_KS_PW_MULTI_LINE_FILE=ERROR: Unable to read the \
keystore password from file ''{0}'' because the file has multiple lines. \
The file must have exactly one line, consisting only of the clear-text \
keystore password.
ERR_MANAGE_CERTS_GET_KS_PW_ERROR_READING_FILE=ERROR: An error occurred while \
attempting to read the keystore password from file ''{0}'': {1}
INFO_MANAGE_CERTS_KEY_KS_PW_EXISTING_CURRENT_PROMPT=Please enter the current \
password needed to access keystore ''{0}'':
INFO_MANAGE_CERTS_KEY_KS_PW_EXISTING_NEW_PROMPT=Please enter the new password \
for the keystore:
INFO_MANAGE_CERTS_KEY_KS_PW_EXISTING_PROMPT=Please enter the password needed \
to access keystore ''{0}'':
INFO_MANAGE_CERTS_KEY_KS_PW_NEW_PROMPT_1=Please enter the password to use \
to protect the contents of keystore ''{0}'':
INFO_MANAGE_CERTS_KEY_KS_PW_NEW_PROMPT_2=Confirm the keystore password:
ERR_MANAGE_CERTS_KEY_KS_PW_PROMPT_MISMATCH=ERROR: The provided passwords do \
not match.
ERR_MANAGE_CERTS_PROMPT_FOR_PW_EMPTY_PW=ERROR: The password must not be empty.
ERR_MANAGE_CERTS_PROMPT_FOR_YES_NO_INVALID_RESPONSE=ERROR: Your response \
must be either 'yes' or 'no'.
ERR_MANAGE_CERTS_PROMPT_FOR_YES_NO_READ_ERROR=ERROR: An error occurred while \
trying to read the response from standard input: {0}
ERR_MANAGE_CERTS_GET_PK_PW_TOO_SHORT=ERROR: The specified private key \
password is too short. The password must contain at least six characters.
ERR_MANAGE_CERTS_GET_PK_PW_EMPTY_FILE=ERROR: Unable to read the private key \
password from file ''{0}'' because the file is empty. The file must have \
exactly one line, consisting only of the clear-text private key password.
ERR_MANAGE_CERTS_GET_PK_PW_MULTI_LINE_FILE=ERROR: Unable to read the \
private key password from file ''{0}'' because the file has multiple \
lines. The file must have exactly one line, consisting only of the \
clear-text private key password.
ERR_MANAGE_CERTS_GET_PK_PW_ERROR_READING_FILE=ERROR: An error occurred while \
attempting to read the private key password from file ''{0}'': {1}
INFO_MANAGE_CERTS_GET_PK_PW_CURRENT_PROMPT=Please enter the current private \
key password for alias ''{0}'':
INFO_MANAGE_CERTS_GET_PK_PW_EXISTING_PROMPT=Please enter the password used \
to encrypt the private key for alias ''{0}'':
INFO_MANAGE_CERTS_GET_PK_PW_NEW_PROMPT=Please enter the new private key \
password:
INFO_MANAGE_CERTS_GET_PK_PW_NEW_PROMPT_1=Please enter the password to use \
to protect the private key for alias ''{0}'':
INFO_MANAGE_CERTS_GET_PK_PW_NEW_PROMPT_2=Confirm the new private key password:
ERR_MANAGE_CERTS_GET_PK_PW_PROMPT_MISMATCH=ERROR: The provided passwords do \
not match.
ERR_MANAGE_CERTS_GET_PK_PW_PROMPT_ERROR=ERROR: An error occurred while \
attempting to prompt for the private key password for alias ''{0}'': {1}
ERR_MANAGE_CERTS_INFER_KS_TYPE_EMPTY_FILE=ERROR: Unable to infer the \
keystore type for the keystore held in file ''{0}'' because that file is \
empty and cannot represent either a valid JKS keystore or PKCS #12 file.
ERR_MANAGE_CERTS_INFER_KS_TYPE_UNEXPECTED_FIRST_BYTE=ERROR: Unable to infer \
the keystore type for the keystore held in file ''{0}'' because the file \
had a first byte of {1}, which is not the expected first byte of either a \
JKS keystore or a PKCS #12 file.
ERR_MANAGE_CERTS_INFER_KS_TYPE_ERROR_READING_FILE=ERROR: Unable to infer the \
type for file ''{0}'' because an error occurred while reading from the \
file: {1}
ERR_MANAGE_CERTS_CANNOT_INSTANTIATE_KS_TYPE=ERROR: Unable to instantiate a \
keystore of type ''{0}'': {1}
ERR_MANAGE_CERTS_CANNOT_OPEN_KS_FILE_FOR_READING=ERROR: Unable to open \
keystore file ''{0}'' for reading: {1}
ERR_MANAGE_CERTS_CANNOT_LOAD_KS_WRONG_PW=ERROR: Unable to load the contents \
of keystore file ''{0}'' because the correct keystore password was not \
provided. Please provide the correct keystore password.
ERR_MANAGE_CERTS_ERROR_CANNOT_LOAD_KS=ERROR: An error occurred while trying \
to load the contents of the keystore from file ''{0}'': {1}
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_READ_ERROR=ERROR: An error occurred \
while attempting to read the certificates from file ''{0}'': {1}
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_DER_NOT_VALID_ASN1=ERROR: Unable to \
read an ASN.1 DER element from certificate file ''{0}'': {1}
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_DER_NOT_VALID_CERT=ERROR: Unable to \
decode a DER element read from certificate file ''{0}'' as an X.509 \
certificate: {1}
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_MULTIPLE_BEGIN=ERROR: Unable to read a \
PEM-encoded certificate from file ''{0}'' because the file contains \
multiple 'BEGIN CERTIFICATE' headers without an 'END CERTIFICATE' footer \
between them.
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_END_WITHOUT_BEGIN=ERROR: Unable to \
read a PEM-encoded certificate from file ''{0}'' because the file contains \
an 'END CERTIFICATE' footer without a corresponding 'BEGIN CERTIFICATE' \
header.
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_DATA_WITHOUT_BEGIN=ERROR: Unable to \
read a PEM-encoded certificate from file ''{0}'' because the file contains \
a non-empty, non-comment line that does not appear between a 'BEGIN \
CERTIFICATE' header and an 'END CERTIFICATE' footer.
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_EOF_WITHOUT_END=ERROR: Unable to \
read a PEM-encoded certificate from file ''{0}'' because the end of the \
file was reached before finding an 'END CERTIFICATE' footer to mark the \
end of the current certificate.
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_PEM_CERT_NOT_BASE64=ERROR: Unable to \
read a PEM-encoded certificate from file ''{0}'' because the data read \
between a 'BEGIN CERTIFICATE' header and an 'END CERTIFICATE' footer is not \
valid base64-encoded data: {0}
ERR_MANAGE_CERTS_READ_CERTS_FROM_FILE_PEM_CERT_NOT_CERT=ERROR: Unable to \
read a PEM-encoded certificate from file ''{0}'' because the data read \
between a 'BEGIN CERTIFICATE' header and an 'END CERTIFICATE' footer could \
not be parsed as a valid X.509 certificate: {1}
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_EMPTY_FILE=ERROR: Unable to read a \
private key from file ''{0}'' because the file is empty or does not contain \
a private key.
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_DER_NOT_VALID_ASN1=ERROR: Unable to read \
an ASN.1 DER element from private key file ''{0}'': {1}
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_DER_NOT_VALID_PK=ERROR: Unable to decode \
a DER element read from certificate file ''{0}'' as an PKCS #8 private \
key: {1}
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_MULTIPLE_KEYS=ERROR: Unable to read a \
private key from file ''{0}'' because that file contains multiple keys. \
The private key file is only allowed to have a single private key.
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_MULTIPLE_BEGIN=ERROR: Unable to read a \
PEM-encoded private key from file ''{0}'' because the file contains \
multiple 'BEGIN PRIVATE KEY' headers. A private key file may only contain \
a single private key.
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_END_WITHOUT_BEGIN=ERROR: Unable to read \
a PEM-encoded private key from file ''{0}'' because the file contains an \
'END PRIVATE KEY' footer without a corresponding 'BEGIN PRIVATE KEY' header.
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_DATA_WITHOUT_BEGIN=ERROR: Unable to read \
a PEM-encoded private key from file ''{0}'' because the file contains \
a non-empty, non-comment line that does not appear between a 'BEGIN \
PRIVATE KEY' header and an 'END PRIVATE KEY' footer.
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_EOF_WITHOUT_END=ERROR: Unable to read a \
PEM-encoded private key from file ''{0}'' because the end of the file was \
reached before finding an 'END PRIVATE KEY' footer to mark the end of the \
key.
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_PEM_PK_NOT_BASE64=ERROR: Unable to read a \
PEM-encoded private key from file ''{0}'' because the data read between a \
'BEGIN PRIVATE KEY' header and an 'END PRIVATE KEY' footer is not valid \
base64-encoded data: {0}
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_PEM_PK_NOT_PK=ERROR: Unable to read a \
PEM-encoded private key from file ''{0}'' because the data read between the \
'BEGIN PRIVATE KEY' header and 'END PRIVATE KEY' footer could not be parsed \
as a valid PKCS #8 private key: {1}
ERR_MANAGE_CERTS_READ_PK_FROM_FILE_READ_ERROR=ERROR: An error occurred while \
trying to read a private key from file ''{0}'': {1}
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_EMPTY_FILE=ERROR: Unable to read a \
certificate signing request from file ''{0}'' because the file is empty or \
does not contain a request.
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_DER_NOT_VALID_ASN1=ERROR: Unable to read \
an ASN.1 DER element from certificate signing request file ''{0}'': {1}
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_DER_NOT_VALID_CSR=ERROR: Unable to \
decode a DER element read from certificate signing request file ''{0}'' as a \
PKCS #10 certificate signing request: {1}
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_MULTIPLE_CSRS=ERROR: Unable to read a \
certificate signing request from file ''{0}'' because that file contains \
multiple requests. The certificate signing request file is only allowed to \
have a single request.
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_MULTIPLE_BEGIN=ERROR: Unable to read a \
PEM-encoded certificate signing request from file ''{0}'' because the file \
contains multiple begin headers. A certificate signing request file may \
only contain a single request.
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_END_WITHOUT_BEGIN=ERROR: Unable to read \
a PEM-encoded certificate signing request from file ''{0}'' because the \
file contains an end footer without a corresponding begin header.
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_DATA_WITHOUT_BEGIN=ERROR: Unable to read \
a PEM-encoded certificate signing request from file ''{0}'' because the \
file contains a non-empty, non-comment line that does not appear between a \
begin header and an end footer.
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_EOF_WITHOUT_END=ERROR: Unable to read a \
PEM-encoded certificate signing request from file ''{0}'' because the end \
of the file was reached before finding an end footer to mark the end of the \
request.
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_PEM_CSR_NOT_BASE64=ERROR: Unable to read \
a PEM-encoded certificate signing request from file ''{0}'' because the \
data read between a begin header and an end footer is not valid \
base64-encoded data: {0}
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_PEM_CSR_NOT_CSR=ERROR: Unable to read a \
PEM-encoded certificate signing request from file ''{0}'' because the data \
read between the begin header and end footer could not be parsed as a valid \
PKCS #10 certificate signing request: {1}
ERR_MANAGE_CERTS_READ_CSR_FROM_FILE_READ_ERROR=ERROR: An error occurred \
while trying to read a certificate signing request from file ''{0}'': {1}
INFO_MANAGE_CERTS_FORMAT_DATE_AND_TIME_IN_FUTURE={0} at {1} ({2} from now)
INFO_MANAGE_CERTS_FORMAT_DATE_AND_TIME_IN_PAST={0} at {1} ({2} ago)
ERR_MANAGE_CERTS_GET_CHAIN_ERROR=ERROR: An error occurred while trying to \
retrieve the certificate chain for alias ''{0}'': {1}
ERR_MANAGE_CERTS_GET_ISSUER_ERROR=ERROR: An error occurred while trying to \
retrieve the issuer certificate with subject ''{0}'': {1}
ERR_MANAGE_CERTS_WRITE_KS_ERROR_COPYING_EXISTING_KS=ERROR: Unable to write a \
backup copy of existing keystore ''{0}'' to file ''{1}'': {2}
ERR_MANAGE_CERTS_WRITE_KS_ERROR_WRITING_NEW_KS=ERROR: Unable to write \
keystore file ''{0}'': {1}
ERR_MANAGE_CERTS_WRITE_KS_ERROR_OVERWRITING_KS=ERROR: Unable to write \
updates to keystore file ''{0}'': {1}. A backup copy of the previous \
version of the keystore is available as ''{2}''.
ERR_MANAGE_CERTS_WRITE_KS_ERROR_DELETING_KS_BACKUP=ERROR: Unable to \
delete the temporary backup ''{0}'' of keystore ''{1}'': {2}
INFO_MANAGE_CERTS_EXAMPLE_LIST_1=List verbose information about each of the \
certificates in keystore file ''{0}''. Also, display a command that can be \
used to obtain a similar result with the Java keytool utility.
INFO_MANAGE_CERTS_EXAMPLE_EXPORT_CERT_1=Exports a PEM-formatted \
representation of the certificate contained in the 'server-cert' alias in \
the ''{0}'' keystore and writes it to the ''{1}'' output file. Also, \
display a command that can be used to obtain a similar result with the Java \
keytool utility.
INFO_MANAGE_CERTS_EXAMPLE_EXPORT_KEY_1=Exports a PEM-formatted representation \
of the private key contained in the 'server-cert' alias in the ''{0}'' \
keystore and writes it to the ''{1}'' output file.
INFO_MANAGE_CERTS_EXAMPLE_IMPORT_1=Imports a certificate chain read from file \
''{0}'' and the corresponding private key read from file ''{1}'' into the \
''server-cert'' alias in the ''{2}'' keystore. If the keystore does not \
already exist, then it will be created using the JKS keystore format.
INFO_MANAGE_CERTS_EXAMPLE_DELETE_1=Deletes the certificate stored in the \
'server-cert' alias in the ''{0}'' keystore.
INFO_MANAGE_CERTS_EXAMPLE_GEN_CERT_1=Generates a self-signed certificate with \
alias 'ca-cert' in the ''{0}'' keystore. If the keystore does not already \
exist, then it will be created using the standard PKCS #12 format. The \
certificate will have a subject DN of 'CN=Example Authority,O=Example \
Corporation,C=US', a 4096-bit RSA key, and a signature generated using the \
SHA256withRSA algorithm. The certificate will be valid for 7300 days \
starting at midnight local time on January 1, 2017. It will include a \
basic constraints extension that indicates the certificate can act as a \
certification authority, and a key usage extension that indicates that the \
key can be used for signing certificates and CRLs. Also, display a command \
that can be used to obtain a similar result with the Java keytool utility.
INFO_MANAGE_CERTS_EXAMPLE_GEN_CSR_1=Generates a certificate signing request \
for a new certificate with subject 'CN=ldap.example.com,O=Example \
Corporation,C=US' that will be stored in the 'server-cert' alias in the \
''{0}'' keystore. A new 256-bit elliptic curve key pair will be created, \
the request will be signed with the SHA256withECDSA signature algorithm, \
and the request will include a subject alternative name extension with \
alternate DNS names of 'ldap1.example.com' and 'ldap2.example.com', and an \
extended key usage extension to indicate that the certificate should be \
usable for either TLS server authentication or TLS client authentication. \
The certificate signing request will be written in PEM format to output \
file ''{1}''.
INFO_MANAGE_CERTS_EXAMPLE_GEN_CSR_2=Generates a certificate signing request \
intended to renew the existing certificate stored in alias 'server-cert' in \
the ''{0}'' keystore. The request will use the same subject DN and set of \
extensions as the certificate currently stored in that alias, and it will \
be written to standard output in PEM format.
INFO_MANAGE_CERTS_EXAMPLE_SIGN_CERT_1=Uses the 'ca-cert' certificate in \
keystore ''{0}'' to sign the certificate signing request (CSR) contained in \
file ''{1}'' and writes the signed certificate to PEM-formatted output file \
''{2}''. The signed certificate will use the subject DN and set of \
extensions included in the request, and the resulting certificate will be \
valid for 730 days, starting immediately. Also, display a command that can \
be used to obtain a similar result with the Java keytool utility.
INFO_MANAGE_CERTS_EXAMPLE_CHANGE_ALIAS_1=Updates the ''{0}'' keystore to \
change the alias of the 'server-cert' certificate to be \
'server-certificate'. Also, display a command that can be used to obtain a \
similar result with the Java keytool utility.
INFO_MANAGE_CERTS_EXAMPLE_TRUST_SERVER_1=Connects to the ldap.example.com \
server on port 636 to retrieve the certificate chain that the server \
presents during TLS negotiation. That certificate chain will be added to \
the ''{0}'' keystore with a base alias of 'ldap.example.com:636' after \
interactively confirming that the certificate chain should be trusted.
INFO_MANAGE_CERTS_EXAMPLE_CHECK_USABILITY_1=Examines the 'server-cert' \
certificate in the ''{0}'' keystore to determine whether that certificate \
is suitable for use as a TLS server certificate.
INFO_MANAGE_CERTS_EXAMPLE_DISPLAY_CERT_1=Displays verbose information about \
all of the certificates contained in file ''{0}'', along with a command \
that can be used to obtain a similar result with the Java keytool utility.
INFO_MANAGE_CERTS_EXAMPLE_DISPLAY_CSR_1=Displays information about the \
certificate signing request contained in file ''{0}'', along with a command \
that can be used to obtain a similar result with the Java keytool utility.
INFO_MANAGE_CERTS_EXAMPLE_HELP_SUBCOMMANDS_1=Displays a list of the \
subcommands available for use with this tool.
INFO_MANAGE_CERTS_CERT_COLLECTOR_CONNECTING=Connecting to {0} ...
INFO_MANAGE_CERTS_CERT_COLLECTOR_CONNECTED=Connected successfully.
ERR_MANAGE_CERTS_CERT_COLLECTOR_CONNECT_FAILED=ERROR: Unable to establish a \
connection to {0}.
INFO_MANAGE_CERTS_CERT_COLLECTOR_SENDING_START_TLS=Sending an LDAP StartTLS \
extended request to the server ...
INFO_MANAGE_CERTS_CERT_COLLECTOR_START_TLS_SUCCESSFUL=The server accepted the \
StartTLS request.
ERR_MANAGE_CERTS_CERT_COLLECTOR_START_TLS_FAILED=ERROR: The server rejected \
the StartTLS request.
INFO_MANAGE_CERTS_CERT_COLLECTOR_BEGINNING_TLS_NEGOTIATION=Beginning TLS \
negotiation on the connection ...
ERR_MANAGE_CERTS_CERT_COLLECTOR_ERROR_STARTING_TLS_NEGOTIATION=An error \
occurred while trying to start TLS negotiation.
ERR_MANAGE_CERTS_CERT_COLLECTOR_NO_CERT_CHAIN_RECEIVED=ERROR: Did not \
receive the certificate chain from {0} after waiting for up to 60 seconds.
INFO_MANAGE_CERTS_CERT_COLLECTOR_GOT_CERT_CHAIN=Successfully retrieved the \
server certificate chain.
INFO_MANAGE_CERTS_CERT_COLLECTOR_CONNECTION_DONE=This connection was only \
established for the purpose of obtaining the server's certificate chain. \
That certificate chain has been acquired, so this connection is no longer \
needed and TLS negotiation can be aborted.
ERR_MANAGE_CERTS_CERT_COLLECTOR_ERROR_PARSING_CERT_CHAIN=ERROR: Unable to \
parse the certificate chain received from the server {0} as a set of \
X.509 certificates.