Lines Matching defs:of

6  * under the terms of the GNU General Public License version 2 only, as
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
17 * You should have received a copy of the GNU General Public License version
123 // However, they are not removed before the end of the main() method.
206 KEYPASSWD("Changes.the.key.password.of.an.entry",
214 PRINTCERT("Prints.the.content.of.a.certificate",
216 PRINTCERTREQ("Prints.the.content.of.a.certificate.request",
218 PRINTCRL("Prints.the.content.of.a.CRL.file",
220 STOREPASSWD("Changes.the.store.password.of.a.keystore",
256 ALIAS("alias", "<alias>", "alias.name.of.the.entry.to.process"),
268 ID("id", "<id:reason>", "Serial.ID.of.cert.to.revoke"),
298 VALIDITY("validity", "<valDays>", "validity.number.of.days");
514 Pair.of(providerClass, providerArg));
880 // or verify the integrity of an input stream-based keystore
1041 "Alias.alias.references.an.entry.type.that.is.not.a.private.key.entry.The.keyclone.command.only.supports.cloning.of.private.key"));
1395 * @param orig the original entry of doing a dup, null if generate new
1563 ("Generating.keysize.bit.keyAlgName.key.pair.and.self.signed.certificate.sigAlgName.with.a.validity.of.validality.days.for"));
1736 // Print the digest of the user cert only
1844 (".The.integrity.of.the.information.stored.in.the.srckeystore."));
1870 * Information display rule of -importkeystore
1874 * 4. at the final of all, shows summary
2091 * Extension. Only those containing a general name of type URI are read.
2396 // HTTPS instead of raw SSL, so that -Dhttps.proxyHost and
2542 * <p>Builds a certificate chain on top of the certificate reply,
2546 * at the end of the chain.
2602 * Imports a certificate and adds it to the list of trusted certificates.
2756 * @param prompt the {0} of "Enter {0} alias name: " in prompt line
2980 ("What.is.the.name.of.your.organizational.unit."),
2983 rb.getString("What.is.the.name.of.your.organization."),
2986 rb.getString("What.is.the.name.of.your.City.or.Locality."),
2989 rb.getString("What.is.the.name.of.your.State.or.Province."),
3074 * @return an array of objects, where the 1st element in the array is the
3118 return Pair.of(key, keyPass);
3124 * @return an array of objects, where the 1st element in the array is the
3193 return Pair.of(entry, pkey);
3196 * Gets the requested finger print of the certificate.
3215 (".The.integrity.of.the.information.stored.in.your.keystore."));
3223 * elements of the chain (with user certificate first, and root
3227 * @param userCert the user certificate of the alias
3236 // we know that all certs in the reply are of type X.509, because
3318 * @param userCert the user certificate of the alias
3326 // Make sure that the public key of the certificate reply matches
3343 // Build a hash table of all certificates in the keystore.
3381 * Recursively tries to establish chain from pool of trusted certs.
3385 * @param certs the pool of trusted certs
3407 // whose public key verifies the signature of the certificate
3489 * Stores the (leaf) certificates of a keystore in a hashtable.
3519 * @param s the value of -startdate option
3606 * @return the position of a single match, or -1 if none matched
3665 * @param t one of 5 known types
3735 throw new Exception("One of request and original should be null.");
3746 // First check existence of "all"
4052 "Odd.number.of.hex.digits.found.") + extstr);
4083 * Prints the usage of this tool.
4095 // Left and right sides of the options list
4102 // Length of left side of options list
4132 "Use.keytool.command.name.help.for.usage.of.command.name"));
4241 public static <A,B> Pair<A,B> of(A a, B b) {