001: /*
002: * @(#)Resources.java 1.19 06/10/10
003: *
004: * Copyright 1990-2006 Sun Microsystems, Inc. All Rights Reserved.
005: * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER
006: *
007: * This program is free software; you can redistribute it and/or
008: * modify it under the terms of the GNU General Public License version
009: * 2 only, as published by the Free Software Foundation.
010: *
011: * This program is distributed in the hope that it will be useful, but
012: * WITHOUT ANY WARRANTY; without even the implied warranty of
013: * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
014: * General Public License version 2 for more details (a copy is
015: * included at /legal/license.txt).
016: *
017: * You should have received a copy of the GNU General Public License
018: * version 2 along with this work; if not, write to the Free Software
019: * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
020: * 02110-1301 USA
021: *
022: * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
023: * Clara, CA 95054 or visit www.sun.com if you need additional
024: * information or have any questions.
025: */
026:
027: package sun.security.util;
028:
029: /**
030: * <p> This class represents the <code>ResourceBundle</code>
031: * for javax.security.auth and sun.security.
032: *
033: * @version 1.19, 10/10/06
034: */
035: public class Resources extends java.util.ListResourceBundle {
036:
037: private static final Object[][] contents = {
038:
039: // shared (from jarsigner)
040: { " ", " " },
041: { " ", " " },
042: { " ", " " },
043: { ", ", ", " },
044: // shared (from keytool)
045: { "\n", "\n" },
046: { "*******************************************",
047: "*******************************************" },
048: { "*******************************************\n\n",
049: "*******************************************\n\n" },
050:
051: // keytool
052: { "keytool error: ", "keytool error: " },
053: { "Illegal option: ", "Illegal option: " },
054: { "Validity must be greater than zero",
055: "Validity must be greater than zero" },
056: { "provName not a provider", "{0} not a provider" },
057: { "Must not specify both -v and -rfc with 'list' command",
058: "Must not specify both -v and -rfc with 'list' command" },
059: { "Key password must be at least 6 characters",
060: "Key password must be at least 6 characters" },
061: { "New password must be at least 6 characters",
062: "New password must be at least 6 characters" },
063: { "Keystore file exists, but is empty: ",
064: "Keystore file exists, but is empty: " },
065: { "Keystore file does not exist: ",
066: "Keystore file does not exist: " },
067: { "Must specify destination alias",
068: "Must specify destination alias" },
069: { "Must specify alias", "Must specify alias" },
070: { "Keystore password must be at least 6 characters",
071: "Keystore password must be at least 6 characters" },
072: { "Enter keystore password: ",
073: "Enter keystore password: " },
074: {
075: "Keystore password is too short - must be at least 6 characters",
076: "Keystore password is too short - must be at least 6 characters" },
077: { "Too many failures - try later",
078: "Too many failures - try later" },
079: { "Certification request stored in file <filename>",
080: "Certification request stored in file <{0}>" },
081: { "Submit this to your CA", "Submit this to your CA" },
082: { "Certificate stored in file <filename>",
083: "Certificate stored in file <{0}>" },
084: { "Certificate reply was installed in keystore",
085: "Certificate reply was installed in keystore" },
086: { "Certificate reply was not installed in keystore",
087: "Certificate reply was not installed in keystore" },
088: { "Certificate was added to keystore",
089: "Certificate was added to keystore" },
090: { "Certificate was not added to keystore",
091: "Certificate was not added to keystore" },
092: { "[Saving ksfname]", "[Saving {0}]" },
093: { "alias has no public key (certificate)",
094: "{0} has no public key (certificate)" },
095: { "Cannot derive signature algorithm",
096: "Cannot derive signature algorithm" },
097: { "Alias <alias> does not exist",
098: "Alias <{0}> does not exist" },
099: { "Alias <alias> has no certificate",
100: "Alias <{0}> has no certificate" },
101: { "Key pair not generated, alias <alias> already exists",
102: "Key pair not generated, alias <{0}> already exists" },
103: { "Cannot derive signature algorithm",
104: "Cannot derive signature algorithm" },
105: {
106: "Generating keysize bit keyAlgName key pair and self-signed certificate (sigAlgName)\n\tfor: x500Name",
107: "Generating {0} bit {1} key pair and self-signed certificate ({2})\n\tfor: {3}" },
108: { "Enter key password for <alias>",
109: "Enter key password for <{0}>" },
110: { "\t(RETURN if same as keystore password): ",
111: "\t(RETURN if same as keystore password): " },
112: {
113: "Key password is too short - must be at least 6 characters",
114: "Key password is too short - must be at least 6 characters" },
115: { "Too many failures - key not added to keystore",
116: "Too many failures - key not added to keystore" },
117: { "Destination alias <dest> already exists",
118: "Destination alias <{0}> already exists" },
119: { "Password is too short - must be at least 6 characters",
120: "Password is too short - must be at least 6 characters" },
121: { "Too many failures. Key entry not cloned",
122: "Too many failures. Key entry not cloned" },
123: { "key password for <alias>", "key password for <{0}>" },
124: { "Keystore entry for <id.getName()> already exists",
125: "Keystore entry for <{0}> already exists" },
126: { "Creating keystore entry for <id.getName()> ...",
127: "Creating keystore entry for <{0}> ..." },
128: { "No entries from identity database added",
129: "No entries from identity database added" },
130: { "Alias name: alias", "Alias name: {0}" },
131: { "Creation date: keyStore.getCreationDate(alias)",
132: "Creation date: {0,date}" },
133: { "alias, keyStore.getCreationDate(alias), ",
134: "{0}, {1,date}, " },
135: { "Entry type: keyEntry", "Entry type: keyEntry" },
136: { "keyEntry,", "keyEntry," },
137: { "Certificate chain length: ",
138: "Certificate chain length: " },
139: { "Certificate[(i + 1)]:",
140: "Certificate[{0,number,integer}]:" },
141: { "Certificate fingerprint (MD5): ",
142: "Certificate fingerprint (MD5): " },
143: { "Entry type: trustedCertEntry\n",
144: "Entry type: trustedCertEntry\n" },
145: { "trustedCertEntry,", "trustedCertEntry," },
146: { "Keystore type: ", "Keystore type: " },
147: { "Keystore provider: ", "Keystore provider: " },
148: { "Your keystore contains keyStore.size() entry",
149: "Your keystore contains {0,number,integer} entry" },
150: { "Your keystore contains keyStore.size() entries",
151: "Your keystore contains {0,number,integer} entries" },
152: { "Failed to parse input", "Failed to parse input" },
153: { "Empty input", "Empty input" },
154: { "Not X.509 certificate", "Not X.509 certificate" },
155: { "Cannot derive signature algorithm",
156: "Cannot derive signature algorithm" },
157: { "alias has no public key", "{0} has no public key" },
158: { "alias has no X.509 certificate",
159: "{0} has no X.509 certificate" },
160: { "New certificate (self-signed):",
161: "New certificate (self-signed):" },
162: { "Reply has no certificates", "Reply has no certificates" },
163: { "Certificate not imported, alias <alias> already exists",
164: "Certificate not imported, alias <{0}> already exists" },
165: { "Input not an X.509 certificate",
166: "Input not an X.509 certificate" },
167: {
168: "Certificate already exists in keystore under alias <trustalias>",
169: "Certificate already exists in keystore under alias <{0}>" },
170: { "Do you still want to add it? [no]: ",
171: "Do you still want to add it? [no]: " },
172: {
173: "Certificate already exists in system-wide CA keystore under alias <trustalias>",
174: "Certificate already exists in system-wide CA keystore under alias <{0}>" },
175: {
176: "Do you still want to add it to your own keystore? [no]: ",
177: "Do you still want to add it to your own keystore? [no]: " },
178: { "Trust this certificate? [no]: ",
179: "Trust this certificate? [no]: " },
180: { "YES", "YES" },
181: { "New prompt: ", "New {0}: " },
182: { "Passwords must differ", "Passwords must differ" },
183: { "Re-enter new prompt: ", "Re-enter new {0}: " },
184: { "They don't match; try again",
185: "They don't match; try again" },
186: { "Enter prompt alias name: ", "Enter {0} alias name: " },
187: { "Enter alias name: ", "Enter alias name: " },
188: { "\t(RETURN if same as for <otherAlias>)",
189: "\t(RETURN if same as for <{0}>)" },
190: {
191: "*PATTERN* printX509Cert",
192: "Owner: {0}\nIssuer: {1}\nSerial number: {2}\nValid from: {3} until: {4}\nCertificate fingerprints:\n\t MD5: {5}\n\t SHA1: {6}" },
193: { "What is your first and last name?",
194: "What is your first and last name?" },
195: { "What is the name of your organizational unit?",
196: "What is the name of your organizational unit?" },
197: { "What is the name of your organization?",
198: "What is the name of your organization?" },
199: { "What is the name of your City or Locality?",
200: "What is the name of your City or Locality?" },
201: { "What is the name of your State or Province?",
202: "What is the name of your State or Province?" },
203: { "What is the two-letter country code for this unit?",
204: "What is the two-letter country code for this unit?" },
205: { "Is <name> correct?", "Is {0} correct?" },
206: { "no", "no" },
207: { "yes", "yes" },
208: { "y", "y" },
209: { " [defaultValue]: ", " [{0}]: " },
210: { "Alias <alias> has no (private) key",
211: "Alias <{0}> has no (private) key" },
212: { "Recovered key is not a private key",
213: "Recovered key is not a private key" },
214: {
215: "***************** WARNING WARNING WARNING *****************",
216: "***************** WARNING WARNING WARNING *****************" },
217: {
218: "* The integrity of the information stored in your keystore *",
219: "* The integrity of the information stored in your keystore *" },
220: {
221: "* has NOT been verified! In order to verify its integrity, *",
222: "* has NOT been verified! In order to verify its integrity, *" },
223: {
224: "* you must provide your keystore password. *",
225: "* you must provide your keystore password. *" },
226: {
227: "Certificate reply does not contain public key for <alias>",
228: "Certificate reply does not contain public key for <{0}>" },
229: { "Incomplete certificate chain in reply",
230: "Incomplete certificate chain in reply" },
231: { "Certificate chain in reply does not verify: ",
232: "Certificate chain in reply does not verify: " },
233: { "Top-level certificate in reply:\n",
234: "Top-level certificate in reply:\n" },
235: { "... is not trusted. ", "... is not trusted. " },
236: { "Install reply anyway? [no]: ",
237: "Install reply anyway? [no]: " },
238: { "NO", "NO" },
239: { "Public keys in reply and keystore don't match",
240: "Public keys in reply and keystore don't match" },
241: {
242: "Certificate reply and certificate in keystore are identical",
243: "Certificate reply and certificate in keystore are identical" },
244: { "Failed to establish chain from reply",
245: "Failed to establish chain from reply" },
246: { "n", "n" },
247: { "Wrong answer, try again", "Wrong answer, try again" },
248: { "keytool usage:\n", "keytool usage:\n" },
249: { "-certreq [-v] [-alias <alias>] [-sigalg <sigalg>]",
250: "-certreq [-v] [-alias <alias>] [-sigalg <sigalg>]" },
251: { "\t [-file <csr_file>] [-keypass <keypass>]",
252: "\t [-file <csr_file>] [-keypass <keypass>]" },
253: { "\t [-keystore <keystore>] [-storepass <storepass>]",
254: "\t [-keystore <keystore>] [-storepass <storepass>]" },
255: {
256: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
257: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
258: { "-delete [-v] -alias <alias>",
259: "-delete [-v] -alias <alias>" },
260: { "\t [-keystore <keystore>] [-storepass <storepass>]",
261: "\t [-keystore <keystore>] [-storepass <storepass>]" },
262: {
263: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
264: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
265: {
266: "-export [-v] [-rfc] [-alias <alias>] [-file <cert_file>]",
267: "-export [-v] [-rfc] [-alias <alias>] [-file <cert_file>]" },
268: { "\t [-keystore <keystore>] [-storepass <storepass>]",
269: "\t [-keystore <keystore>] [-storepass <storepass>]" },
270: {
271: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
272: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
273: { "-genkey [-v] [-alias <alias>] [-keyalg <keyalg>]",
274: "-genkey [-v] [-alias <alias>] [-keyalg <keyalg>]" },
275: { "\t [-keysize <keysize>] [-sigalg <sigalg>]",
276: "\t [-keysize <keysize>] [-sigalg <sigalg>]" },
277: { "\t [-dname <dname>] [-validity <valDays>]",
278: "\t [-dname <dname>] [-validity <valDays>]" },
279: { "\t [-keypass <keypass>] [-keystore <keystore>]",
280: "\t [-keypass <keypass>] [-keystore <keystore>]" },
281: {
282: "\t [-storepass <storepass>] [-storetype <storetype>]",
283: "\t [-storepass <storepass>] [-storetype <storetype>]" },
284: { "\t [-provider <provider_class_name>] ...",
285: "\t [-provider <provider_class_name>] ..." },
286: { "-help", "-help" },
287: {
288: "-identitydb [-v] [-file <idb_file>] [-keystore <keystore>]",
289: "-identitydb [-v] [-file <idb_file>] [-keystore <keystore>]" },
290: {
291: "\t [-storepass <storepass>] [-storetype <storetype>]",
292: "\t [-storepass <storepass>] [-storetype <storetype>]" },
293: { "\t [-provider <provider_class_name>] ...",
294: "\t [-provider <provider_class_name>] ..." },
295: {
296: "-import [-v] [-noprompt] [-trustcacerts] [-alias <alias>]",
297: "-import [-v] [-noprompt] [-trustcacerts] [-alias <alias>]" },
298: { "\t [-file <cert_file>] [-keypass <keypass>]",
299: "\t [-file <cert_file>] [-keypass <keypass>]" },
300: { "\t [-keystore <keystore>] [-storepass <storepass>]",
301: "\t [-keystore <keystore>] [-storepass <storepass>]" },
302: {
303: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
304: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
305: { "-keyclone [-v] [-alias <alias>] -dest <dest_alias>",
306: "-keyclone [-v] [-alias <alias>] -dest <dest_alias>" },
307: { "\t [-keypass <keypass>] [-new <new_keypass>]",
308: "\t [-keypass <keypass>] [-new <new_keypass>]" },
309: { "\t [-keystore <keystore>] [-storepass <storepass>]",
310: "\t [-keystore <keystore>] [-storepass <storepass>]" },
311: {
312: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
313: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
314: { "-keypasswd [-v] [-alias <alias>]",
315: "-keypasswd [-v] [-alias <alias>]" },
316: { "\t [-keypass <old_keypass>] [-new <new_keypass>]",
317: "\t [-keypass <old_keypass>] [-new <new_keypass>]" },
318: { "\t [-keystore <keystore>] [-storepass <storepass>]",
319: "\t [-keystore <keystore>] [-storepass <storepass>]" },
320: {
321: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
322: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
323: { "-list [-v | -rfc] [-alias <alias>]",
324: "-list [-v | -rfc] [-alias <alias>]" },
325: { "\t [-keystore <keystore>] [-storepass <storepass>]",
326: "\t [-keystore <keystore>] [-storepass <storepass>]" },
327: {
328: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
329: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
330: { "-printcert [-v] [-file <cert_file>]",
331: "-printcert [-v] [-file <cert_file>]" },
332: { "-selfcert [-v] [-alias <alias>] [-sigalg <sigalg>]",
333: "-selfcert [-v] [-alias <alias>] [-sigalg <sigalg>]" },
334: { "\t [-dname <dname>] [-validity <valDays>]",
335: "\t [-dname <dname>] [-validity <valDays>]" },
336: { "\t [-keypass <keypass>] [-keystore <keystore>]",
337: "\t [-keypass <keypass>] [-keystore <keystore>]" },
338: {
339: "\t [-storepass <storepass>] [-storetype <storetype>]",
340: "\t [-storepass <storepass>] [-storetype <storetype>]" },
341: { "\t [-provider <provider_class_name>] ...",
342: "\t [-provider <provider_class_name>] ..." },
343: { "-storepasswd [-v] [-new <new_storepass>]",
344: "-storepasswd [-v] [-new <new_storepass>]" },
345: { "\t [-keystore <keystore>] [-storepass <storepass>]",
346: "\t [-keystore <keystore>] [-storepass <storepass>]" },
347: {
348: "\t [-storetype <storetype>] [-provider <provider_class_name>] ...",
349: "\t [-storetype <storetype>] [-provider <provider_class_name>] ..." },
350:
351: // policytool
352: {
353: "Warning: A public key for alias 'signers[i]' does not exist.",
354: "Warning: A public key for alias {0} does not exist." },
355: { "Warning: Class not found: ",
356: "Warning: Class not found: " },
357: { "Policy File opened successfully",
358: "Policy File opened successfully" },
359: { "null Keystore name", "null Keystore name" },
360: { "Warning: Unable to open Keystore: ",
361: "Warning: Unable to open Keystore: " },
362: { "Illegal option: ", "Illegal option: " },
363: { "Usage: policytool [options]",
364: "Usage: policytool [options]" },
365: { " [-file <file>] policy file location",
366: " [-file <file>] policy file location" },
367: { "New", "New" },
368: { "Open", "Open" },
369: { "Save", "Save" },
370: { "Save As", "Save As" },
371: { "View Warning Log", "View Warning Log" },
372: { "Exit", "Exit" },
373: { "Add Policy Entry", "Add Policy Entry" },
374: { "Edit Policy Entry", "Edit Policy Entry" },
375: { "Remove Policy Entry", "Remove Policy Entry" },
376: { "Change KeyStore", "Change KeyStore" },
377: { "Add Public Key Alias", "Add Public Key Alias" },
378: { "Remove Public Key Alias", "Remove Public Key Alias" },
379: { "File", "File" },
380: { "Edit", "Edit" },
381: { "Policy File:", "Policy File:" },
382: { "Keystore:", "Keystore:" },
383: {
384: "Error parsing policy file policyFile: pppe.getMessage()",
385: "Error parsing policy file {0}: {1}" },
386: { "Could not find Policy File: ",
387: "Could not find Policy File: " },
388: { "Policy Tool", "Policy Tool" },
389: {
390: "Errors have occurred while opening the policy configuration. View the Warning Log for more information.",
391: "Errors have occurred while opening the policy configuration. View the Warning Log for more information." },
392: { "Error", "Error" },
393: { "OK", "OK" },
394: { "Status", "Status" },
395: { "Warning", "Warning" },
396: {
397: "Permission: ",
398: "Permission: " },
399: {
400: "Target Name: ",
401: "Target Name: " },
402: { "library name", "library name" },
403: { "package name", "package name" },
404: { "property name", "property name" },
405: { "provider name", "provider name" },
406: {
407: "Actions: ",
408: "Actions: " },
409: { "OK to overwrite existing file filename?",
410: "OK to overwrite existing file {0}?" },
411: { "Cancel", "Cancel" },
412: { "CodeBase:", "CodeBase:" },
413: { "SignedBy:", "SignedBy:" },
414: { " Add Permission", " Add Permission" },
415: { " Edit Permission", " Edit Permission" },
416: { "Remove Permission", "Remove Permission" },
417: { "Done", "Done" },
418: { "New KeyStore URL:", "New KeyStore URL:" },
419: { "New KeyStore Type:", "New KeyStore Type:" },
420: { "Permissions", "Permissions" },
421: { " Edit Permission:", " Edit Permission:" },
422: { " Add New Permission:", " Add New Permission:" },
423: { "Signed By:", "Signed By:" },
424: { "Permission and Target Name must have a value",
425: "Permission and Target Name must have a value" },
426: { "Remove this Policy Entry?", "Remove this Policy Entry?" },
427: { "Overwrite File", "Overwrite File" },
428: { "Policy successfully written to filename",
429: "Policy successfully written to {0}" },
430: { "null filename", "null filename" },
431: { "filename not found", "{0} not found" },
432: { " Save changes?", " Save changes?" },
433: { "Yes", "Yes" },
434: { "No", "No" },
435: {
436: "Error: Could not open policy file, filename, because of parsing error: pppe.getMessage()",
437: "Error: Could not open policy file, {0}, because of parsing error: {1}" },
438: { "Permission could not be mapped to an appropriate class",
439: "Permission could not be mapped to an appropriate class" },
440: { "Policy Entry", "Policy Entry" },
441: { "Save Changes", "Save Changes" },
442: { "No Policy Entry selected", "No Policy Entry selected" },
443: { "Keystore", "Keystore" },
444: { "KeyStore URL must have a valid value",
445: "KeyStore URL must have a valid value" },
446: { "Invalid value for Actions", "Invalid value for Actions" },
447: { "No permission selected", "No permission selected" },
448: { "Warning: Invalid argument(s) for constructor: ",
449: "Warning: Invalid argument(s) for constructor: " },
450: { "Add Principal", "Add Principal" },
451: { "Edit Principal", "Edit Principal" },
452: { "Remove Principal", "Remove Principal" },
453: { "Principal Type:", "Principal Type:" },
454: { "Principal Name:", "Principal Name:" },
455: { "Illegal Principal Type", "Illegal Principal Type" },
456: { "No principal selected", "No principal selected" },
457: { "Principals:", "Principals:" },
458: { "Principals", "Principals" },
459: { " Add New Principal:", " Add New Principal:" },
460: { " Edit Principal:", " Edit Principal:" },
461: { "name", "name" },
462: {
463: "Cannot Specify Principal with a Wildcard Class without a Wildcard Name",
464: "Cannot Specify Principal with a Wildcard Class without a Wildcard Name" },
465: { "Cannot Specify Principal without a Class",
466: "Cannot Specify Principal without a Class" },
467:
468: { "Cannot Specify Principal without a Name",
469: "Cannot Specify Principal without a Name" },
470:
471: // javax.security.auth.PrivateCredentialPermission
472: { "invalid null input(s)", "invalid null input(s)" },
473: { "actions can only be 'read'",
474: "actions can only be 'read'" },
475: { "permission name [name] syntax invalid: ",
476: "permission name [{0}] syntax invalid: " },
477: {
478: "Credential Class not followed by a Principal Class and Name",
479: "Credential Class not followed by a Principal Class and Name" },
480: { "Principal Class not followed by a Principal Name",
481: "Principal Class not followed by a Principal Name" },
482: { "Principal Name must be surrounded by quotes",
483: "Principal Name must be surrounded by quotes" },
484: { "Principal Name missing end quote",
485: "Principal Name missing end quote" },
486: {
487: "PrivateCredentialPermission Principal Class can not be a wildcard (*) value if Principal Name is not a wildcard (*) value",
488: "PrivateCredentialPermission Principal Class can not be a wildcard (*) value if Principal Name is not a wildcard (*) value" },
489: {
490: "CredOwner:\n\tPrincipal Class = class\n\tPrincipal Name = name",
491: "CredOwner:\n\tPrincipal Class = {0}\n\tPrincipal Name = {1}" },
492:
493: // javax.security.auth.x500
494: { "provided null name", "provided null name" },
495:
496: // javax.security.auth.Subject
497: { "invalid null AccessControlContext provided",
498: "invalid null AccessControlContext provided" },
499: { "invalid null action provided",
500: "invalid null action provided" },
501: { "invalid null Class provided",
502: "invalid null Class provided" },
503: { "Subject:\n", "Subject:\n" },
504: { "\tPrincipal: ", "\tPrincipal: " },
505: { "\tPublic Credential: ", "\tPublic Credential: " },
506: { "\tPrivate Credentials inaccessible\n",
507: "\tPrivate Credentials inaccessible\n" },
508: { "\tPrivate Credential: ", "\tPrivate Credential: " },
509: { "\tPrivate Credential inaccessible\n",
510: "\tPrivate Credential inaccessible\n" },
511: { "Subject is read-only", "Subject is read-only" },
512: {
513: "attempting to add an object which is not an instance of java.security.Principal to a Subject's Principal Set",
514: "attempting to add an object which is not an instance of java.security.Principal to a Subject's Principal Set" },
515: {
516: "attempting to add an object which is not an instance of class",
517: "attempting to add an object which is not an instance of {0}" },
518:
519: // javax.security.auth.login.AppConfigurationEntry
520: { "LoginModuleControlFlag: ", "LoginModuleControlFlag: " },
521:
522: // javax.security.auth.login.LoginContext
523: { "Invalid null input: name", "Invalid null input: name" },
524: { "No LoginModules configured for name",
525: "No LoginModules configured for {0}" },
526: { "invalid null Subject provided",
527: "invalid null Subject provided" },
528: { "invalid null CallbackHandler provided",
529: "invalid null CallbackHandler provided" },
530: { "null subject - logout called before login",
531: "null subject - logout called before login" },
532: {
533: "unable to instantiate LoginModule, module, because it does not provide a no-argument constructor",
534: "unable to instantiate LoginModule, {0}, because it does not provide a no-argument constructor" },
535: { "unable to instantiate LoginModule",
536: "unable to instantiate LoginModule" },
537: { "unable to find LoginModule class: ",
538: "unable to find LoginModule class: " },
539: { "unable to access LoginModule: ",
540: "unable to access LoginModule: " },
541: { "Login Failure: all modules ignored",
542: "Login Failure: all modules ignored" },
543:
544: // sun.security.provider.PolicyFile
545:
546: { "java.security.policy: error parsing policy:\n\tmessage",
547: "java.security.policy: error parsing {0}:\n\t{1}" },
548: {
549: "java.security.policy: error adding Permission, perm:\n\tmessage",
550: "java.security.policy: error adding Permission, {0}:\n\t{1}" },
551: { "java.security.policy: error adding Entry:\n\tmessage",
552: "java.security.policy: error adding Entry:\n\t{0}" },
553: { "alias name not provided (pe.name)",
554: "alias name not provided ({0})" },
555: { "unable to perform substitution on alias, suffix",
556: "unable to perform substitution on alias, {0}" },
557: { "substitution value, prefix, unsupported",
558: "substitution value, {0}, unsupported" },
559: { "(", "(" },
560: { ")", ")" },
561: { "type can't be null", "type can't be null" },
562:
563: // sun.security.provider.PolicyParser
564: { "expected keystore type", "expected keystore type" },
565: { "multiple Codebase expressions",
566: "multiple Codebase expressions" },
567: { "multiple SignedBy expressions",
568: "multiple SignedBy expressions" },
569: { "SignedBy has empty alias", "SignedBy has empty alias" },
570: {
571: "can not specify Principal with a wildcard class without a wildcard name",
572: "can not specify Principal with a wildcard class without a wildcard name" },
573: { "expected codeBase or SignedBy or Principal",
574: "expected codeBase or SignedBy or Principal" },
575: { "expected permission entry", "expected permission entry" },
576: { "number ", "number " },
577: { "expected [expect], read [end of file]",
578: "expected [{0}], read [end of file]" },
579: { "expected [;], read [end of file]",
580: "expected [;], read [end of file]" },
581: { "line number: msg", "line {0}: {1}" },
582: { "line number: expected [expect], found [actual]",
583: "line {0}: expected [{1}], found [{2}]" },
584: { "null principalClass or principalName",
585: "null principalClass or principalName" },
586:
587: /* --- DEPRECATED --- */
588: // javax.security.auth.Policy
589: { "unable to instantiate Subject-based policy",
590: "unable to instantiate Subject-based policy" } };
591:
592: /**
593: * Returns the contents of this <code>ResourceBundle</code>.
594: *
595: * <p>
596: *
597: * @return the contents of this <code>ResourceBundle</code>.
598: */
599: public Object[][] getContents() {
600: return contents;
601: }
602: }
|