4   !1245?@ABNOPQRTUVWXYZ[\]_`abghrtvwz|!"(/78:;>?EIKORSTUVWXY\]^_nox (RETURN if same as for <{0}>)) (RETURN if same as keystore password):   [{0}]:  [OPTION]...%1$d-bit %2$s key%1$d-bit %2$s key (weak)%1$s #%2$d of %3$d5%1$s uses a %2$s which is considered a security risk.K%1$s uses the %2$s signature algorithm which is considered a security risk. %s (weak)()V (Empty value)* The integrity of the information stored in the srckeystore* * has NOT been verified! In order to verify its integrity, * * you must provide the srckeystore password. ** The integrity of the information stored in your keystore * * has NOT been verified! In order to verify its integrity, * * you must provide your keystore password. *=***************** WARNING WARNING WARNING *****************+*******************************************-******************************************* ;-keypass and -new can not be specified if -storetype is {0}9-keypasswd commands not supported if -storetype is PKCS12+-keystore must be NONE if -storetype is {0}G-storepasswd and -keypasswd commands not supported if -storetype is {0}... is not trusted.  .Empty.value..OPTION. .PATTERN.printX509Cert.with.weak".RETURN.if.same.as.for.otherAlias.%.RETURN.if.same.as.keystore.password..Storing.ksfname.<.The.integrity.of.the.information.stored.in.the.srckeystore.:.The.integrity.of.the.information.stored.in.your.keystore..WARNING.WARNING.WARNING..defaultValue..is.not.trusted.9.keypass.and.new.can.not.be.specified.if.storetype.is.{0}8.keypasswd.commands.not.supported.if.storetype.is.PKCS12*.keystore.must.be.NONE.if.storetype.is.{0}E.storepasswd.and.keypasswd.commands.not.supported.if.storetype.is.{0}Alias <{0}> does not existAlias <{0}> has no certificateAlias <{0}> has no keyAlias <{0}> references an entry type that is not a private key entry. The -keyclone command only supports cloning of private key entriesAlias name: {0}Alias.alias.does.not.existAlias.alias.has.no.certificateAlias.alias.has.no.key~Alias.alias.references.an.entry.type.that.is.not.a.private.key.entry.The.keyclone.command.only.supports.cloning.of.private.keyAlias.name.aliasCRLs.CRLs:!Cannot derive signature algorithm"Cannot find environment variable: Cannot find file: !Cannot.derive.signature.algorithm!Cannot.find.environment.variable.Cannot.find.file.8Certificate already exists in keystore under alias <{0}>GCertificate already exists in system-wide CA keystore under alias <{0}>,Certificate chain in reply does not verify: Certificate chain length:  Certificate fingerprint (SHA1): 4Certificate not imported, alias <{0}> already existsCertificate owner: ;Certificate reply and certificate in keystore are identical7Certificate reply does not contain public key for <{0}>+Certificate reply was installed in keystore/Certificate reply was not installed in keystore Certificate stored in file <{0}>!Certificate was added to keystore%Certificate was not added to keystore>Certificate.already.exists.in.keystore.under.alias.trustalias.MCertificate.already.exists.in.system.wide.CA.keystore.under.alias.trustalias.+Certificate.chain.in.reply.does.not.verify.Certificate.chain.length.Certificate.fingerprint.SHA1.Certificate.i.1.3Certificate.not.imported.alias.alias.already.existsCertificate.owner.;Certificate.reply.and.certificate.in.keystore.are.identical8Certificate.reply.does.not.contain.public.key.for.alias.+Certificate.reply.was.installed.in.keystore/Certificate.reply.was.not.installed.in.keystore$Certificate.stored.in.file.filename.!Certificate.was.added.to.keystore%Certificate.was.not.added.to.keystore Certificate[{0,number,integer}]:*Certification request stored in file <{0}>.Certification.request.stored.in.file.filename.Changes an entry's alias$Changes the key password of an entry(Changes the store password of a keystoreChanges.an.entry.s.alias$Changes.the.key.password.of.an.entry(Changes.the.store.password.of.a.keystoreClones a key entryClones.a.key.entryCode%Command option {0} needs an argument.&Command.option.flag.needs.an.argument. Commands. Commands:%Creating keystore entry for <{0}> ...'Creating.keystore.entry.for.id.getName.Creation date: {0,date}-Creation.date.keyStore.getCreationDate.alias.Deletes an entryDeletes.an.entry&Destination alias <{0}> already exists%Destination.alias.dest.already.exists9Do you still want to add it to your own keystore? [no]: $Do you still want to add it? [no]: Do.you.still.want.to.add.it.no.4Do.you.still.want.to.add.it.to.your.own.keystore.no. Empty input Empty.inputEnter alias name: &Enter destination keystore password: Enter key password for <{0}>Enter keystore password: @Enter new alias name (RETURN to cancel import for this entry): !Enter source keystore password: "Enter the password to be stored: Enter {0} alias name: Enter.alias.name.$Enter.destination.keystore.password.Enter.key.password.for.alias.Enter.keystore.password.Issuer <%s> in cacerts#Key and Certificate Management Tool2Key pair not generated, alias <{0}> already exists9Key password is too short - must be at least 6 characters*Key password must be at least 6 characters#Key.and.Certificate.Management.Tool1Key.pair.not.generated.alias.alias.already.exists7Key.password.is.too.short.must.be.at.least.6.characters*Key.password.must.be.at.least.6.characters'Keystore entry for <{0}> already existsKeystore file does not exist: $Keystore file exists, but is empty: >Keystore password is too short - must be at least 6 characters/Keystore password must be at least 6 charactersKeystore provider: Keystore type: ,Keystore.entry.for.id.getName.already.existsKeystore.file.does.not.exist."Keystore.file.exists.but.is.empty. already exists3Secret.key.not.generated.alias.alias.already.existsSerial ID of cert to revokeSerial.ID.of.cert.to.revoke Signature. Signature: Signer #%d: Signer.d.+Source keystore file exists, but is empty: )Source.keystore.file.exists.but.is.empty. SourceFileSubmit this to your CASubmit.this.to.your.CAThe %1$s keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore %2$s -destkeystore %2$s -deststoretype pkcs12".The CRLThe TSA certificateThe certificateThe certificate requestnThe destination pkcs12 keystore has different storepass and keypass. Please retry with -destkeypass specified.The generated CRLThe generated certificate!The generated certificate request The input The issuer6The original keystore "%1$s" is backed up as "%3$s"...lThe.destination.pkcs12.keystore.has.different.storepass.and.keypass.Please.retry.with.destkeypass.specified.They don't match. Try againThey.don.t.match.Try.again-This extension cannot be marked as critical. ,This.extension.cannot.be.marked.as.critical. Timestamp. Timestamp:-Too many failures - key not added to keystoreToo many failures - try later$Too many failures. Alias not changed'Too many failures. Key entry not cloned$Too many retries, program terminated#Too.many.failures.Alias.not.changed&Too.many.failures.Key.entry.not.cloned+Too.many.failures.key.not.added.to.keystoreToo.many.failures.try.later#Too.many.retries.program.terminated Top-level certificate in reply: Top.level.certificate.in.reply.Trust this certificate? [no]: Trust.this.certificate.no. Unknown AccessDescription type: Unknown Entry TypeUnknown extendedkeyUsage type: Unknown extension type: Unknown keyUsage type: Unknown password type: Unknown.AccessDescription.type.Unknown.Entry.TypeUnknown.extendedkeyUsage.type.Unknown.extension.type.Unknown.keyUsage.type.Unknown.password.type.Unrecognized GeneralName type: Unrecognized.GeneralName.type. Usage error: no command providedUsage.error.no.command.provided;Use "keytool -command_name -help" for usage of command_name.Use "keytool -help" for all available commands7Use.keytool.command.name.help.for.usage.of.command.name+Use.keytool.help.for.all.available.commands"Validity must be greater than zero"Validity.must.be.greater.than.zero$Verified by %1$s in %2$s with a %3$s6WARNING: not verified. Make sure -keystore is correct.sWarning.Different.store.and.key.passwords.not.supported.for.PKCS12.KeyStores.Ignoring.user.specified.command.value.@Warning.Overwriting.existing.alias.alias.in.destination.keystorerWarning: Different store and key passwords not supported for PKCS12 KeyStores. Ignoring user-specified {0} value.?Warning: Overwriting existing alias {0} in destination keystore*What is the name of your City or Locality?+What is the name of your State or Province?&What is the name of your organization?-What is the name of your organizational unit?2What is the two-letter country code for this unit?!What is your first and last name?*What.is.the.name.of.your.City.or.Locality.+What.is.the.name.of.your.State.or.Province.&What.is.the.name.of.your.organization.-What.is.the.name.of.your.organizational.unit.2What.is.the.two.letter.country.code.for.this.unit.!What.is.your.first.and.last.name.Wrong answer, try againWrong.answer.try.againX.509 extensionX.509.extensionYES1Your keystore contains {0,number,integer} entries/Your keystore contains {0,number,integer} entry,Your.keystore.contains.keyStore.size.entries*Your.keystore.contains.keyStore.size.entry[Ljava/lang/Object; [Storing {0}][[Ljava/lang/Object;"alias name of the entry to processalias.alias.has.no.X.509.certificatealias.has.no.public.key$alias.has.no.public.key.certificate.alias.in.cacertsalias.in.keystore%alias.keyStore.getCreationDate.alias."alias.name.of.the.entry.to.processbackup.keystore.warning$certificate validity start date/time$certificate.validity.start.date.timecommand {0} is ambiguous:command.{0}.is.ambiguous.contentsdestination aliasdestination key passworddestination keystore namedestination keystore password'destination keystore password protected"destination keystore provider namedestination keystore typedestination.aliasdestination.key.passworddestination.keystore.namedestination.keystore.password'destination.keystore.password.protected"destination.keystore.provider.namedestination.keystore.typedistinguished namedistinguished.name do not prompt do.not.prompt getContentsUif -protected is specified, then -storepass, -keypass, and -new must not be specifiedWif -srcprotected is specified, then -srcstorepass and -srckeypass must not be specifiedFif alias not specified, destalias and srckeypass must not be specified`if keystore is not password protected, then -storepass, -keypass, and -new must not be specifiedfif source keystore is not password protected, then -srcstorepass and -srckeypass must not be specifiedEif.alias.not.specified.destalias.and.srckeypass.must.not.be.specifiedZif.keystore.is.not.password.protected.then.storepass.keypass.and.new.must.not.be.specifiedNif.protected.is.specified.then.storepass.keypass.and.new.must.not.be.specifiedcif.source.keystore.is.not.password.protected.then.srcstorepass.and.srckeypass.must.not.be.specifiedSif.srcprotected.is.specified.then.srcstorepass.and.srckeypass.must.not.be.specifiedimporting.keystore.statusinput file nameinput.file.namejava/lang/Objectjava/util/ListResourceBundlejks.storetype.warningkey algorithm name key bit size key passwordkey password for <{0}>key.algorithm.namekey.bit key.bit.size key.bit.weak key.passwordkey.password.for.alias. keystore namekeystore password keystore type keystore.namekeystore.password keystore.typekeytool error: keytool.error.migrate.keystore.warningn new password new.passwordno one.in.manyoutput file nameoutput in RFC styleoutput.file.nameoutput.in.RFC.style$password through protected mechanism$password.through.protected.mechanismprovName.not.a.providerprovider argumentprovider class nameprovider classpath provider nameprovider.argumentprovider.class.nameprovider.classpath provider.namereplysignature algorithm namesignature.algorithm.namesigned jar filesigned.jar.file source aliassource key passwordsource keystore namesource keystore password"source keystore password protectedsource keystore provider namesource keystore type source.aliassource.key.passwordsource.keystore.namesource.keystore.password"source.keystore.password.protectedsource.keystore.provider.namesource.keystore.type$sun/security/tools/keytool/Resourcesthe.certificatethe.certificate.requestthe.crlthe.generated.certificate!the.generated.certificate.requestthe.generated.crl the.input the.issuerthe.tsa.certificatetrust certificates from cacertstrust.certificates.from.cacertsvalidity number of daysvalidity.number.of.daysverbose outputverbose.outputverified.by.s.in.s.weak2warning.not.verified.make.sure.keystore.is.correctwhose.key.riskwhose.sigalg.risk with.weakyyes{0} has no X.509 certificate{0} has no public key#{0} has no public key (certificate){0} not a provider{0}, {0}, {1,date},    $%&'()*+,-./036789:;<=>CDEFGHIJKLMScdefijklmnopqsuxy{}~     #$%&')*+,-.01234569<=@ABCDFGHJLMNPQZ[`abcdefghijklmpqrstvyz{|}~u()[[Ljava/lang/Object; w #  Resources.java!w#^*!^"^tYYoSYSSYYSYSSYYSYSSYY SYSSYYrSYsSSYYSYSSYY]SY[SSYY'SY(SSYYSYSSY YFSY@SSY Y SYSSY Y*SY)SSY Y:SY9SSY YGSYASSYYHSYBSSYYJSYDSSYYESY?SSYY=SY;SSYY>SYYSYSSY?YSY~SSY@YSYSSYAYSYSSYBYSYSSYCYSYSSYDYSYSSYEYSYSSYFYSYSSYGYSYSSYHYSYSSYIYNSYKSSYJYPSYMSSYKYSYSSYLYSYSSYMYSYSSYNY&SY%SSYOYSYSSYPY SYSSYQYSYSSYRY SYSSYSY SYSSYTY SYSSYUYSYSSYVYSYSSYWYSYSSYXYSYSSYYYOSYLSSYZYSYSSY[YSYSSY\YSYSSY]YSYSSY^YuSYtSSY_YlSYiSSY`Y^SY\SSYaYqSYpSSYbYdSY`SSYcYcSY_SSYdYnSYkSSYeYmSYjSSYfYfSYbSSYgY2SY.SSYhY0SY,SSYiY1SY-SSYjY/SY+SSYkYeSYaSSYlYSYSSYmYSYSSYnY6SY4SSYoY5SY3SSYpY}SY|SSYqYRSYQSSYrYSYSSYsY8SY7SSYtYSYSSYuYSYSSYvYSYSSYwYSYSSYxYSYSSYyYSYSSYzYSYSSY{YSYSSY|YSYSSY}YSY0SSY~YSYSSYYSYSSYY&SY%SSYYSYSSYYSYSSYYiSYgSSYY[SYZSSYYMSYISSYYSYSSYYjSYhSSYYSYSSYYASY@SSYYSYSSYYSYSSYYSYSSYYnSYkSSYY=SYSSYYSYSSYYSYSSYYQSYPSSYY4SY*SSYY6SY;SSYY5SY+SSYYpSYmSSYYoSYlSSYYSYSSYYSYSSYYYSYWSSYYGSYFSSYY}SY{SSYYSYSSYYSYSSYYuSYsSSYYSYSSYY7SY,SSYY`SY_SSYY1SY'SSYYDSYCSSYY2SY(SSYYESYBSSYYSYSSYYSYSSYYvSYtSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYOSYKSSYYNSYJSSYYLSYHSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYdSYcSSYYSYSSYYSYSSYYSYSSYYSYSSYY SYSSYY!SYSSYYSY SSYYSYSSYYSYSSYYSYSSYY#SY$SSYY8SY-SSYY~SY|SSYYySYwSSYYSY SSYYSY SSYY:SY/SSYY^SY]SSYY3SY)SSYYSYSSYYSYSSYYbSYaSSYYrSYrSSYYSYSSYY9SY.SSYYXSYVSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYTSYUSSYYSY SSYYSSYRSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYfSSYYSYeSSYYSY SSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYSSYYSYqSSYYSYSSYYSY\SS#