All Downloads are FREE. Search and download functionalities are using the official Maven repository.

rvicemix.bundles.org.apache.servicemix.bundles.dnsjava.3.5.0_1.source-code.messages.properties Maven / Gradle / Ivy

There is a newer version: 3.6.2_1
Show newest version
# SPDX-License-Identifier: BSD-3-Clause
failed.authority.nodata=NODATA response has failed AUTHORITY rrset: {0}
failed.answer.cname_nodata=CNAME_NODATA response has failed ANSWER rrset: {0}
failed.nodata=NODATA response failed to prove NODATA status with NSEC/NSEC3
failed.synthesize.multiple=Synthesized CNAME RRset has multiple records - that doesn't make sense.
failed.synthesize.nomatch=Synthesized CNAME target ({0}) included in answer doesn't match DNAME synthesis rules (expected {1}).
failed.synthesize.toolong=Synthesized name would be too long, thus bogus.
failed.answer.positive=Positive response has failed ANSWER rrset: {0}
failed.authority.positive=Positive response has failed AUTHORITY rrset: {0}
failed.positive.wildcardgeneration=Could not generate NSEC wildcard, resulting name would be too long.
failed.positive.wildcard_too_broad=Positive response was wildcard expansion and did not prove original data did not exist or wasn't generated by the correct wildcard.
failed.nxdomain.cname_nxdomain=CNAME_NAMEERROR response has failed ANSWER rrset: {0}
failed.nxdomain.authority=NameError response has failed AUTHORITY rrset: {0}
failed.nsec3.none=No NSEC3 records
failed.nsec3.not_found=No matching NSEC3 records found
failed.nsec3.type_exists=NSEC3 proofed type exists
failed.nsec3.type_exists_wc=NSEC3 wildcard proofed type exists
failed.nsec3.cname_exists=NSEC3 proofed a CNAME exists
failed.nsec3.cname_exists_wc=NSEC3 wildcard proofed a CNAME exists
failed.nsec3.wc_soa=NSEC3 wildcard proofed a CNAME exists
failed.nsec3.apex_abuse=NSEC3 from apex abused
failed.nsec3.delegation=NSEC3 is a delegation
failed.nsec3.delegation_wc=NSEC3 wildcard is a delegation
failed.nsec3.no_next=No next closer NSEC3
failed.nsec3.not_optout=NSEC3 was not opt-out
failed.nsec3.qname_ce=NSEC3 did not match query name and closest encloser not found
failed.nsec3_ignored=All NSEC3s were validated but ignored due to unknown algorithms or invalid iteration counts.
failed.nxdomain.nsec3_bogus=NSEC3 failed to proof the name error.
failed.nxdomain.nsec3_insecure=NSEC3 proofed that the target domain is under opt-out, response is insecure.
failed.nxdomain.exists=NameError response has failed to prove that {0} does not exist.
failed.nxdomain.haswildcard=NameError response has failed to prove that the covering wildcard does not exist.
dnskey.no_rrset=Missing DNSKEY RRset in response to DNSKEY query for {0}.
dnskey.no_ds_match=Did not match a DS to a DNSKEY.
dnskey.no_key=No key for signature {0}
dnskey.no_sigs=No signatures for key {0}
dnskey.key_offtree=Key {0} for signature {1} is off tree
dnskey.no_match=Key does not match signature
dnskey.expired=Key exired
dnskey.not_yet_valid=Key is not yet valid
dnskey.invalid=Key does not verify signature
failed.ds=DS rrset in DS response did not verify.
failed.ds.cname=CNAME in DS response was not secure.
ds.secure=CNAME validated, proof that DS does not exist.
failed.ds.nsec=NSEC RRset for the referral did not verify, {0}.
failed.ds.nsec.hasdata=NSEC RRset for the referral did not prove no DS.
failed.ds.nonsec=No signed NSEC/NSEC3 records for query to {0}/DS.
failed.ds.nodelegation=NSEC RRset for the referral proved not a delegation point
insecure.ds.nsec=NSEC RRset for the referral proved no DS.
failed.ds.nowildcardproof=NSEC for wildcard does not prove absence of DS.
failed.ds.nsec.ent=NSEC for empty non-terminal did not verify.
insecure.ds.nsec.ent=NSEC for empty non-terminal proved no DS.
failed.ds.nonconclusive=NSEC proof did not conclusively point to DS or no DS.
failed.ds.nsec3=NSEC3s for the referral did not prove no DS.
unknown.ds.nsec3=no DS but also no proof of that
insecure.ds.nsec3=NSEC3s for the referral proved no DS.
failed.ds.unknown=Ran out of validation options, thus bogus.
failed.ds.notype=Encountered an unhandled type ({0}) of DS response, thus bogus.
failed.ds.nodigest=No supported digest ID for DS for {0}.
failed.ds.noalg=No supported algorithm ID on DS for {0}.
validate.insecure_unsigned=Unsigned response was proved to be validly INSECURE
validate.bogus=Could not establish validation of INSECURE status of unsigned response. Reason: {0}
validate.bogus.badkey=Could not establish a chain of trust to keys for [{0}]. Reason: {1}
validate.bogus.missingsig=Could not validate RRset due to missing signature.
validate.insecure=Verified that response is INSECURE
validate.response.unknown=Response subtype is {0} and thus cannot be validated.
insecure.ds.noalgorithms=No supported algorithms in DS RRset for {0}, treating as insecure.
failed.dname.wildcard=Illegal DNAME ({0} is from a wildcard expansion).
failed.wildcard.label_count_mismatch=Label count mismatch on RRSIGs for {0}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy