< prev index next >

src/share/classes/sun/security/tools/keytool/Resources.java

Print this page
@  rev 14334 : 8185934: keytool shows "Signature algorithm: SHA1withECDSA, -1-bit key"
|  Reviewed-by: mullan
~
o  rev 14333 : 8172404: Tools should warn if weak algorithms are used before restricting them
:  Reviewed-by: mullan, weijun
:  Contributed-by: Hai-May Chao <hai-may.chao@oracle.com>
o  rev 14329 : 8185934: keytool shows "Signature algorithm: SHA1withECDSA, -1-bit key"
|  Reviewed-by: mullan
~


 428         {"command.{0}.is.ambiguous.", "command {0} is ambiguous:"},
 429 
 430         // 8171319: keytool should print out warnings when reading or
 431         // generating cert/cert req using weak algorithms
 432         {"the.certificate.request", "The certificate request"},
 433         {"the.issuer", "The issuer"},
 434         {"the.generated.certificate", "The generated certificate"},
 435         {"the.generated.crl", "The generated CRL"},
 436         {"the.generated.certificate.request", "The generated certificate request"},
 437         {"the.certificate", "The certificate"},
 438         {"the.crl", "The CRL"},
 439         {"the.tsa.certificate", "The TSA certificate"},
 440         {"the.input", "The input"},
 441         {"reply", "Reply"},
 442         {"one.in.many", "%1$s #%2$d of %3$d"},
 443         {"alias.in.cacerts", "Issuer <%s> in cacerts"},
 444         {"alias.in.keystore", "Issuer <%s>"},
 445         {"with.weak", "%s (weak)"},
 446         {"key.bit", "%1$d-bit %2$s key"},
 447         {"key.bit.weak", "%1$d-bit %2$s key (weak)"},

 448         {".PATTERN.printX509Cert.with.weak",
 449                 "Owner: {0}\nIssuer: {1}\nSerial number: {2}\nValid from: {3} until: {4}\nCertificate fingerprints:\n\t SHA1: {5}\n\t SHA256: {6}\nSignature algorithm name: {7}\nSubject Public Key Algorithm: {8} ({9,number,#})\nVersion: {10}"},
 450         {"PKCS.10.with.weak",
 451                 "PKCS #10 Certificate Request (Version 1.0)\n" +
 452                         "Subject: %1$s\nFormat: %2$s\nPublic Key: %3$s\nSignature algorithm: %4$s\n"},
 453         {"verified.by.s.in.s.weak", "Verified by %1$s in %2$s with a %3$s"},
 454         {"whose.sigalg.risk", "%1$s uses the %2$s signature algorithm which is considered a security risk."},
 455         {"whose.key.risk", "%1$s uses a %2$s which is considered a security risk."},
 456         {"jks.storetype.warning", "The %1$s keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using \"keytool -importkeystore -srckeystore %2$s -destkeystore %2$s -deststoretype pkcs12\"."},
 457         {"migrate.keystore.warning", "Migrated \"%1$s\" to %4$s. The %2$s keystore is backed up as \"%3$s\"."},
 458         {"backup.keystore.warning", "The original keystore \"%1$s\" is backed up as \"%3$s\"..."},
 459         {"importing.keystore.status", "Importing keystore %1$s to %2$s..."},
 460     };
 461 
 462 
 463     /**
 464      * Returns the contents of this <code>ResourceBundle</code>.
 465      *
 466      * <p>
 467      *


 428         {"command.{0}.is.ambiguous.", "command {0} is ambiguous:"},
 429 
 430         // 8171319: keytool should print out warnings when reading or
 431         // generating cert/cert req using weak algorithms
 432         {"the.certificate.request", "The certificate request"},
 433         {"the.issuer", "The issuer"},
 434         {"the.generated.certificate", "The generated certificate"},
 435         {"the.generated.crl", "The generated CRL"},
 436         {"the.generated.certificate.request", "The generated certificate request"},
 437         {"the.certificate", "The certificate"},
 438         {"the.crl", "The CRL"},
 439         {"the.tsa.certificate", "The TSA certificate"},
 440         {"the.input", "The input"},
 441         {"reply", "Reply"},
 442         {"one.in.many", "%1$s #%2$d of %3$d"},
 443         {"alias.in.cacerts", "Issuer <%s> in cacerts"},
 444         {"alias.in.keystore", "Issuer <%s>"},
 445         {"with.weak", "%s (weak)"},
 446         {"key.bit", "%1$d-bit %2$s key"},
 447         {"key.bit.weak", "%1$d-bit %2$s key (weak)"},
 448         {"unknown.size.1", "unknown size %s key"},
 449         {".PATTERN.printX509Cert.with.weak",
 450                 "Owner: {0}\nIssuer: {1}\nSerial number: {2}\nValid from: {3} until: {4}\nCertificate fingerprints:\n\t SHA1: {5}\n\t SHA256: {6}\nSignature algorithm name: {7}\nSubject Public Key Algorithm: {8} ({9,number,#})\nVersion: {10}"},
 451         {"PKCS.10.with.weak",
 452                 "PKCS #10 Certificate Request (Version 1.0)\n" +
 453                         "Subject: %1$s\nFormat: %2$s\nPublic Key: %3$s\nSignature algorithm: %4$s\n"},
 454         {"verified.by.s.in.s.weak", "Verified by %1$s in %2$s with a %3$s"},
 455         {"whose.sigalg.risk", "%1$s uses the %2$s signature algorithm which is considered a security risk."},
 456         {"whose.key.risk", "%1$s uses a %2$s which is considered a security risk."},
 457         {"jks.storetype.warning", "The %1$s keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using \"keytool -importkeystore -srckeystore %2$s -destkeystore %2$s -deststoretype pkcs12\"."},
 458         {"migrate.keystore.warning", "Migrated \"%1$s\" to %4$s. The %2$s keystore is backed up as \"%3$s\"."},
 459         {"backup.keystore.warning", "The original keystore \"%1$s\" is backed up as \"%3$s\"..."},
 460         {"importing.keystore.status", "Importing keystore %1$s to %2$s..."},
 461     };
 462 
 463 
 464     /**
 465      * Returns the contents of this <code>ResourceBundle</code>.
 466      *
 467      * <p>
 468      *
< prev index next >