4\     !"#$%&'()*+,-./0123456789:;<=>?@ABCDFGJKLORSTUVWXZ[\]^_`abcdefgjklmnopqrstuvwxz{|}    !"#$%&'()   E suboptions can be all, grouped or summary6 jarsigner -verify [options] jar-file [alias...] adding: ' X = not signed by specified alias(es)F [-providerArg ]] ... master class file and constructor argument: i = at least one certificate was found in identity scope4 k = at least one certificate was found in keystore! m = entry is listed in manifest s = signature was verified  signing:  updating:  %d-bit key%d-bit key (weak) %s (weak)()V(Signature related entries)(Unsigned entries) (and %d more), >- Missing block file for signature-related file META-INF/%s.SF/- Missing signature-related file META-INF/%s.SFQ- Signed by "%1$s" Digest algorithm: %2$s Signature algorithm: %3$s, %4$s- Signed by "%1$s" Digest algorithm: %2$s Signature algorithm: %3$s, %4$s Timestamped by "%6$s" on %5$tc Timestamp digest algorithm: %7$s Timestamp signature algorithm: %8$s, %9$s&- Unparsable signature-related file %s2-keypass can not be specified if -storetype is {0}+-keystore must be NONE if -storetype is {0} ...Signer...TSA.Invalid.TSA.certificate.chain..Invalid.certificate.chain..Signature.related.entries..Unsigned.entries.$.X.not.signed.by.specified.alias.es..adding.?.altsigner.class.class.name.of.an.alternative.signing.mechanismD.altsignerpath.pathlist.location.of.an.alternative.signing.mechanism .and.d.more.2.certchain.file.name.of.alternative.certchain.file6.certs.display.certificates.when.verbose.and.verifying-.digestalg.algorithm.name.of.digest.algorithm7.i.at.least.one.certificate.was.found.in.identity.scope:.internalsf.include.the.SF.file.inside.the.signature.block).jarsigner.verify.options.jar.file.alias.1.k.at.least.one.certificate.was.found.in.keystore1.keypass.can.not.be.specified.if.storetype.is.{0}8.keypass.password.password.for.private.key.if.different.*.keystore.must.be.NONE.if.storetype.is.{0}.keystore.url.keystore.location.m.entry.is.listed.in.manifest5.protected.keystore.has.protected.authentication.path;.providerArg.arg.master.class.file.and.constructor.argument=.providerClass.class.name.of.cryptographic.service.provider.s .providerName.name.provider.name.s.signature.was.verified.3.sectionsonly.don.t.compute.hash.of.entire.manifest-.sigalg.algorithm.name.of.signature.algorithm!.sigfile.file.name.of.SF.DSA.file'.signedjar.file.name.of.signed.JAR.file .signing.3.storepass.password.password.for.keystore.integrity.storetype.type.keystore.type .strict.treat.warnings.as.errors).suboptions.can.be.all.grouped.or.summary/.tsa.url.location.of.the.Timestamping.Authority@.tsacert.alias.public.key.certificate.for.Timestamping.Authority>.tsadigestalg.algorithm.of.digest.data.in.timestamping.request3.tsapolicyid.tsapolicyid.for.Timestamping.Authority .updating.:.verbose.suboptions.verbose.output.when.signing.verifying. .verify.verify.a.signed.JAR.file-.{0}.extension.does.not.support.code.signing.2SPACE6SPACE >>> Signer>>> TSACOMMA"Cannot find environment variable: Cannot find file: ,Cannot restore certchain from file specified!Cannot.find.environment.variable.Cannot.find.file.,Cannot.restore.certchain.from.file.specifiedCertificate chain not found for: {0}. {1} must reference a valid KeyStore key entry containing a private key and corresponding public key certificate chain.2Certificate chain not found in the file specified.Certificate not found for: {0}. {1} must reference a valid KeyStore entry containing an X.509 public key certificate for the Timestamping Authority.rCertificate.chain.not.found.for.alias.alias.must.reference.a.valid.KeyStore.key.entry.containing.a.private.key.and2Certificate.chain.not.found.in.the.file.specified.~Certificate.not.found.for.alias.alias.must.reference.a.valid.KeyStore.entry.containing.an.X.509.public.key.certificate.for.theCodeEnter Passphrase for keystore: Enter key password for {0}: Enter.Passphrase.for.keystore.Enter.key.password.for.alias.Error.Error: +File specified by -certchain does not exist*File.specified.by.certchain.does.not.existNIf -protected is specified, then -storepass and -keypass must not be specifiedYIf keystore is not password protected, then -storepass and -keypass must not be specifiedVIf.keystore.is.not.password.protected.then.storepass.and.keypass.must.not.be.specifiedJIf.protected.is.specified.then.storepass.and.keypass.must.not.be.specifiedIllegal option: Illegal.option.LineNumberTableNo -tsa or -tsacert is provided and this jar is not timestamped. Without a timestamp, users may not be able to validate this jar after the signer certificate's expiration date (%1$tY-%1$tm-%1$td) or after any future revocation date.Only one alias can be specifiedOnly.one.alias.can.be.specifiedOption lacks argumentOption.lacks.argumentPlease specify alias namePlease specify jarfile name%Please type jarsigner -help for usagePlease.specify.alias.namePlease.specify.jarfile.name$Please.type.jarsigner.help.for.usage=Re-run with the -verbose and -certs options for more details.1Re-run with the -verbose option for more details.;Re.run.with.the.verbose.and.certs.options.for.more.details.0Re.run.with.the.verbose.option.for.more.details.SPACE SourceFileTSA certificate: TSA location: TSA.certificate. TSA.location.OThe %1$s algorithm specified for the %2$s option is considered a security risk.0The TSA certificate chain is invalid. Reason: %sThe jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.#The signer certificate has expired.(The signer certificate is not yet valid.5The signer certificate will expire within six months.OThe signer certificate's ExtendedKeyUsage extension doesn't allow code signing.GThe signer certificate's KeyUsage extension doesn't allow code signing.OThe signer certificate's NetscapeCertType extension doesn't allow code signing.5The signer's certificate chain is invalid. Reason: %s(The signer's certificate is self-signed.IThe.1.algorithm.specified.for.the.2.option.is.considered.a.security.risk.#The.signer.certificate.has.expired.(The.signer.certificate.is.not.yet.valid.OThe.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing.GThe.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing.OThe.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing.5The.signer.certificate.will.expire.within.six.months.2The.signer.s.certificate.chain.is.invalid.reason.1(The.signer.s.certificate.is.self.signed.-The.tsa.certificate.chain.is.invalid.reason.1LThis jar contains entries whose TSA certificate chain is invalid. Reason: %sHThis jar contains entries whose certificate chain is invalid. Reason: %s@This jar contains entries whose signer certificate has expired. EThis jar contains entries whose signer certificate is not yet valid. BThis jar contains entries whose signer certificate is self-signed.RThis jar contains entries whose signer certificate will expire within six months. kThis jar contains entries whose signer certificate's ExtendedKeyUsage extension doesn't allow code signing.cThis jar contains entries whose signer certificate's KeyUsage extension doesn't allow code signing.kThis jar contains entries whose signer certificate's NetscapeCertType extension doesn't allow code signing.This jar contains signatures that does not include a timestamp. Without a timestamp, users may not be able to validate this jar after the signer certificate's expiration date (%1$tY-%1$tm-%1$td) or after any future revocation date.This jar contains signatures that include an invalid timestamp. Without a valid timestamp, users may not be able to validate this jar after any of the signer certificates expire (as early as %1$tY-%1$tm-%1$td). Rerun jarsigner with -J-Djava.security.debug=jar for more information.OThis jar contains signed entries that are not signed by alias in this keystore.QThis jar contains signed entries which are not signed by the specified alias(es).JThis jar contains unsigned entries which have not been integrity-checked. EThis.jar.contains.entries.whose.certificate.chain.is.invalid.reason.1?This.jar.contains.entries.whose.signer.certificate.has.expired.DThis.jar.contains.entries.whose.signer.certificate.is.not.yet.valid.BThis.jar.contains.entries.whose.signer.certificate.is.self.signed.kThis.jar.contains.entries.whose.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing.cThis.jar.contains.entries.whose.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing.kThis.jar.contains.entries.whose.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing.QThis.jar.contains.entries.whose.signer.certificate.will.expire.within.six.months.IThis.jar.contains.entries.whose.tsa.certificate.chain.is.invalid.reason.1MThis.jar.contains.signed.entries.that.s.not.signed.by.alias.in.this.keystore.OThis.jar.contains.signed.entries.which.is.not.signed.by.the.specified.alias.es.IThis.jar.contains.unsigned.entries.which.have.not.been.integrity.checked.Unknown password type: Unknown.password.type.&Usage.jarsigner.options.jar.file.alias)Usage: jarsigner [options] jar-file aliasWARNING: Signature is either not parsable or not verifiable, and the jar will be treated as unsigned. For more information, re-run jarsigner with debug enabled (-J-Djava.security.debug=jar).WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:Warning. Warning: J[-altsigner ] class name of an alternative signing mechanismH[-altsignerpath ] location of an alternative signing mechanism>[-certchain ] name of alternative certchain fileK[-certs] display certificates when verbose and verifying4[-digestalg ] name of digest algorithmK[-internalsf] include the .SF file inside the signature blockC[-keypass ] password for private key (if different)-[-keystore ] keystore locationF[-protected] keystore has protected authentication pathD[-providerClass name of cryptographic service provider's)[-providerName ] provider nameA[-sectionsonly] don't compute hash of entire manifest7[-sigalg ] name of signature algorithm1[-sigfile ] name of .SF/.DSA file3[-signedjar ] name of signed JAR file;[-storepass ] password for keystore integrity)[-storetype ] keystore type4[-strict] treat warnings as errorsB[-tsa ] location of the Timestamping AuthorityM[-tsacert ] public key certificate for Timestamping AuthorityL[-tsadigestalg ] algorithm of digest data in timestamping requestB[-tsapolicyid ] TSAPolicyID for Timestamping AuthorityB[-verbose[:suboptions]] verbose output when signing/verifying.4[-verify] verify a signed JAR file [Invalid TSA certificate chain: [Invalid certificate chain: [Ljava/lang/Object;-[{0} extension does not support code signing]#attempt to rename {0} to {1} failed+attempt.to.rename.jarFile.to.origJar.failed1attempt.to.rename.signedJarFile.to.jarFile.failedbad.timestamp.verifyingcertificate exception: certificate expired on {0}"certificate is not valid until {0}$certificate is valid from {0} to {1}certificate will expire on {0}certificate.exception.certificate.expired.oncertificate.is.not.valid.untilcertificate.is.valid.fromcertificate.will.expire.oncontentsentry was signed on {0}entry.was.signed.on-found non-X.509 certificate in signer's chain-found.non.X.509.certificate.in.signer.s.chain getContents history.nobk history.nosfhistory.unparsablehistory.with.tshistory.without.tsiincomplete certificate chainincomplete.certificate.chainjar is unsigned.jar signed, with signer errors. jar signed.!jar verified, with signer errors. jar verified.jar.is.unsigned jar.signed.jar.signed.with.signer.errors.jar.treated.unsignedjar.treated.unsigned.see.weak%jar.treated.unsigned.see.weak.verbose jar.verified. jar.verified.with.signer.errors.jarsigner error:  jarsigner.jarsigner.error. jarsigner: java/lang/Objectjava/util/ListResourceBundlek)key associated with {0} not a private key+key.associated.with.alias.not.a.private.keykey.bit key.bit.weakkeystore load: keystore.load.m no manifest.no response from the Timestamping Authority. When connecting from behind a firewall an HTTP or HTTPS proxy may need to be specified. Supply the following options to jarsigner: no.manifest.,no.response.from.the.Timestamping.Authority.no.timestamp.signingno.timestamp.verifyingorprovName.not.a.provider requesting a signature timestamp requesting.a.signature.timestampsMsignature filename must consist of the following characters: A-Z, 0-9, _ or -Gsignature.filename.must.consist.of.the.following.characters.A.Z.0.9.or.&signerClass.is.not.a.signing.mechanism&sun/security/tools/jarsigner/Resourcesunable to create: &unable to instantiate keystore class: unable to open jar file: unable to read password: #unable to recover key from keystoreunable to sign jar: unable.to.create.%unable.to.instantiate.keystore.class.unable.to.open.jar.file.unable.to.read.password.#unable.to.recover.key.from.keystoreunable.to.sign.jar.&using an alternative signing mechanism&using.an.alternative.signing.mechanism with.weakyou must enter key passwordyou.must.enter.key.password{0} is not a signing mechanism{0} not a providerEMNPQi~  [[Ljava/lang/Object;()[[Ljava/lang/Object; U I TW SXResources.java!TSUI Y*Zh!VYYh!H Y  QYRYrSYSSYRYISYSSYRYJSYSSYRYMSYSSYRYSYSSYRYSYSSYRYSYSSYRYcSYbSSYRY1SYSSY RY/SYSSY RYaSY^SSY RY`SY_SSY RYSYSSY RY-SYSSYRY2SYSSYRY>SYSSYRY?SYSSYRY0SYSSYRY(SYSSYRY;SYSSYRYRYSYwSSY?RYSYSSY@RYSYSSYARYSYSSYBRYSYSSYCRYSYSSYDRYSYSSYERYSYSSYFRYSYSSYGRYSYSSYHRYSYSSYIRYSYSSYJRYSYSSYKRYSYSSYLRYSYSSYMRYSYSSYNRYSYSSYORYSYSSYPRY$SYSSYQRYFSYSSYRRY=SY SSYSRYSYSSYTRYSYSSYURYSYSSYVRYXSYVSSYWRYSYSSYXRYSYSSYYRYSYSSYZRYSSYPSSY[RY]SY\SSY\RYOSYNSSY]RYTSYQSSY^RYSYSSY_RYSYSSY`RYYSYWSSYaRYSYSSYbRYSYSSYcRYSYSSYdRYSYSSYeRYSYSSYfRYSYSSYgRYSYSSYhRYSYSSYiRY SYSSYjRYSYSSYkRYSYSSYlRYvSYtSSYmRYuSYsSSYnRYSYSSYoRYSYSSYpRYUSYRSSYqRYSYSSYrRYSYSSYsRYSYSSYtRYZSY[SSYuRYSYKSSYvRYSYLSSYwRYSYSSYxRYSY}SSYyRYSYSSYzRYSY~SSY{RYSYSSY|RYqSYoSSY}RYpSYnSSY~RYzSYxSSYRY|SYySSYRY{SY2SSYRY:SY4SSYRY9SY3SSYRY;SY5SSYRYHSYBSSYRYGSYASSYRYISYCSSYRY*SYMSSYRYSY1SSYRY=SY7SSYRY8SY0SSYRYFSY@SSYRYJSY?SSYRYOSY/SSYRYPSYDSSYRYNSYESSYRYLSYKSSYRY-SY+SSYRY.SY,SSYh#y[