mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 07:14:30 +02:00
8278274: Update nroff pages in JDK 19 before RC
Reviewed-by: jjg
This commit is contained in:
parent
f1001a06b3
commit
618f3a82a4
28 changed files with 500 additions and 85 deletions
|
@ -22,7 +22,7 @@
|
|||
.\"t
|
||||
.\" Automatically generated by Pandoc 2.3.1
|
||||
.\"
|
||||
.TH "JAVA" "1" "2022" "JDK 19\-ea" "JDK Commands"
|
||||
.TH "JAVA" "1" "2022" "JDK 19" "JDK Commands"
|
||||
.hy
|
||||
.SH NAME
|
||||
.PP
|
||||
|
@ -268,7 +268,7 @@ The source file should contain one or more top\-level classes, the first
|
|||
of which is taken as the class to be executed.
|
||||
.IP \[bu] 2
|
||||
The compiler does not enforce the optional restriction defined at the
|
||||
end of JLS ??7.6, that a type in a named package should exist in a file
|
||||
end of JLS 7.6, that a type in a named package should exist in a file
|
||||
whose name is composed from the type name followed by the
|
||||
\f[CB]\&.java\f[R] extension.
|
||||
.IP \[bu] 2
|
||||
|
@ -467,12 +467,12 @@ and file name of the library.
|
|||
.RE
|
||||
.TP
|
||||
.B \f[CB]\-\-class\-path\f[R] \f[I]classpath\f[R], \f[CB]\-classpath\f[R] \f[I]classpath\f[R], or \f[CB]\-cp\f[R] \f[I]classpath\f[R]
|
||||
Specifies a list of directories, JAR archives, and ZIP archives to search
|
||||
Specifies a list of directories, JAR files, and ZIP archives to search
|
||||
for class files.
|
||||
.RS
|
||||
.PP
|
||||
On Windows, semicolons (\f[CB];\f[R]) separate entities in this list;
|
||||
on other platforms it is a colon (\f[CB]:\f[R]).
|
||||
On Windows, semicolons (\f[CB];\f[R]) separate entities in this list; on
|
||||
other platforms it is a colon (\f[CB]:\f[R]).
|
||||
.PP
|
||||
Specifying \f[I]classpath\f[R] overrides any setting of the
|
||||
\f[CB]CLASSPATH\f[R] environment variable.
|
||||
|
@ -802,8 +802,8 @@ Specifies a list of directories, JAR files, and ZIP archives to append
|
|||
to the end of the default bootstrap class path.
|
||||
.RS
|
||||
.PP
|
||||
On Windows, semicolons (\f[CB];\f[R]) separate entities in this list;
|
||||
on other platforms it is a colon (\f[CB]:\f[R]).
|
||||
On Windows, semicolons (\f[CB];\f[R]) separate entities in this list; on
|
||||
other platforms it is a colon (\f[CB]:\f[R]).
|
||||
.RE
|
||||
.TP
|
||||
.B \f[CB]\-Xcheck:jni\f[R]
|
||||
|
@ -1157,8 +1157,8 @@ continues.
|
|||
Sets the thread stack size (in bytes).
|
||||
Append the letter \f[CB]k\f[R] or \f[CB]K\f[R] to indicate KB, \f[CB]m\f[R] or
|
||||
\f[CB]M\f[R] to indicate MB, or \f[CB]g\f[R] or \f[CB]G\f[R] to indicate GB.
|
||||
The actual size may be rounded up to a multiple of the system page size as
|
||||
required by the operating system.
|
||||
The actual size may be rounded up to a multiple of the system page size
|
||||
as required by the operating system.
|
||||
The default value depends on the platform:
|
||||
.RS
|
||||
.IP \[bu] 2
|
||||
|
@ -4663,6 +4663,7 @@ decorations.
|
|||
(\f[CB]l\f[R]), \f[CB]tags\f[R] (\f[CB]tg\f[R]) decorators can also be
|
||||
specified as \f[CB]none\f[R] for no decoration.
|
||||
.PP
|
||||
Logging Messages Decorations
|
||||
.TS
|
||||
tab(@);
|
||||
lw(14.9n) lw(55.1n).
|
||||
|
@ -4736,6 +4737,7 @@ T}
|
|||
.TE
|
||||
.SS Convert GC Logging Flags to Xlog
|
||||
.PP
|
||||
Legacy GC Logging Flags to Xlog Configuration Mapping
|
||||
.TS
|
||||
tab(@);
|
||||
lw(22.4n) lw(16.5n) lw(31.2n).
|
||||
|
@ -4889,6 +4891,7 @@ These legacy flags are no longer recognized and will cause an error if
|
|||
used directly.
|
||||
Use their unified logging equivalent instead.
|
||||
.PP
|
||||
Runtime Logging Flags to Xlog Configuration Mapping
|
||||
.TS
|
||||
tab(@);
|
||||
lw(15.0n) lw(20.2n) lw(34.7n).
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
.\"t
|
||||
.\" Automatically generated by Pandoc 2.3.1
|
||||
.\"
|
||||
.TH "KEYTOOL" "1" "2022" "JDK 19\-ea" "JDK Commands"
|
||||
.TH "KEYTOOL" "1" "2022" "JDK 19" "JDK Commands"
|
||||
.hy
|
||||
.SH NAME
|
||||
.PP
|
||||
|
@ -433,7 +433,7 @@ single\-element certificate chain.
|
|||
When the \f[CB]\-signer\f[R] option is specified, a new certificate is
|
||||
generated and signed by the designated signer and stored as a
|
||||
multiple\-element certificate chain (containing the generated
|
||||
certificate itself, and the signer???s certificate chain).
|
||||
certificate itself, and the signer?s certificate chain).
|
||||
The certificate chain and private key are stored in a new keystore entry
|
||||
that is identified by its alias.
|
||||
.PP
|
||||
|
@ -453,7 +453,7 @@ specified.
|
|||
The \f[CB]\-signer\f[R] value specifies the alias of a
|
||||
\f[CB]PrivateKeyEntry\f[R] for the signer that already exists in the
|
||||
keystore.
|
||||
This option is used to sign the certificate with the signer???s private
|
||||
This option is used to sign the certificate with the signer?s private
|
||||
key.
|
||||
This is especially useful for key agreement algorithms (i.e.
|
||||
the \f[CB]\-keyalg\f[R] value is \f[CB]XDH\f[R], \f[CB]X25519\f[R],
|
||||
|
@ -461,7 +461,7 @@ the \f[CB]\-keyalg\f[R] value is \f[CB]XDH\f[R], \f[CB]X25519\f[R],
|
|||
signatures, and therefore a self\-signed certificate cannot be created.
|
||||
.PP
|
||||
The \f[CB]\-signerkeypass\f[R] value specifies the password of the
|
||||
signer???s private key.
|
||||
signer?s private key.
|
||||
It can be specified if the private key of the signer entry is protected
|
||||
by a password different from the store password.
|
||||
.PP
|
||||
|
@ -1571,8 +1571,9 @@ The following examples show the defaults for various option values:
|
|||
\-alias\ "mykey"
|
||||
|
||||
\-keysize
|
||||
\ \ \ \ 2048\ (when\ using\ \-genkeypair\ and\ \-keyalg\ is\ "RSA",\ "DSA",\ "RSASSA\-PSS",\ or\ "DH")
|
||||
\ \ \ \ 256\ (when\ using\ \-genkeypair\ and\ \-keyalg\ is\ "EC")
|
||||
\ \ \ \ 2048\ (when\ using\ \-genkeypair\ and\ \-keyalg\ is\ "DSA")
|
||||
\ \ \ \ 3072\ (when\ using\ \-genkeypair\ and\ \-keyalg\ is\ "RSA",\ "RSASSA\-PSS",\ or\ "DH")
|
||||
\ \ \ \ 384\ (when\ using\ \-genkeypair\ and\ \-keyalg\ is\ "EC")
|
||||
\ \ \ \ 255\ (when\ using\ \-genkeypair\ and\ \-keyalg\ is\ "EdDSA",\ or\ "XDH)
|
||||
\ \ \ \ 56\ (when\ using\ \-genseckey\ and\ \-keyalg\ is\ "DES")
|
||||
\ \ \ \ 168\ (when\ using\ \-genseckey\ and\ \-keyalg\ is\ "DESede")
|
||||
|
@ -1600,6 +1601,7 @@ signature algorithm (\f[CB]\-sigalg\f[R] option) is derived from the
|
|||
algorithm of the underlying private key to provide an appropriate level
|
||||
of security strength as follows:
|
||||
.PP
|
||||
Default Signature Algorithms
|
||||
.TS
|
||||
tab(@);
|
||||
l l l.
|
||||
|
@ -1621,9 +1623,9 @@ T}
|
|||
T{
|
||||
RSA
|
||||
T}@T{
|
||||
<= 3072
|
||||
< 624
|
||||
T}@T{
|
||||
SHA256withRSA
|
||||
SHA256withRSA (keysize is too small for using SHA\-384)
|
||||
T}
|
||||
T{
|
||||
T}@T{
|
||||
|
@ -1640,28 +1642,27 @@ T}
|
|||
T{
|
||||
EC
|
||||
T}@T{
|
||||
< 384
|
||||
T}@T{
|
||||
SHA256withECDSA
|
||||
T}
|
||||
T{
|
||||
T}@T{
|
||||
< 512
|
||||
T}@T{
|
||||
SHA384withECDSA
|
||||
T}
|
||||
T{
|
||||
T}@T{
|
||||
= 512
|
||||
>= 512
|
||||
T}@T{
|
||||
SHA512withECDSA
|
||||
T}
|
||||
T{
|
||||
RSASSA\-PSS
|
||||
T}@T{
|
||||
<= 3072
|
||||
< 624
|
||||
T}@T{
|
||||
RSASSA\-PSS (with SHA\-256)
|
||||
RSASSA\-PSS (with SHA\-256, keysize is too small for
|
||||
T}
|
||||
T{
|
||||
T}@T{
|
||||
T}@T{
|
||||
using SHA\-384)
|
||||
T}
|
||||
T{
|
||||
T}@T{
|
||||
|
@ -1946,9 +1947,9 @@ distinguished name is \f[CB]myname\f[R], \f[CB]mygroup\f[R],
|
|||
\f[CB]mycompany\f[R], and a two\-letter country code of
|
||||
\f[CB]mycountry\f[R].
|
||||
It uses the RSA key generation algorithm to create the keys; both are
|
||||
2048 bits
|
||||
3072 bits.
|
||||
.PP
|
||||
The command uses the default SHA256withRSA signature algorithm to create
|
||||
The command uses the default SHA384withRSA signature algorithm to create
|
||||
a self\-signed certificate that includes the public key and the
|
||||
distinguished name information.
|
||||
The certificate is valid for 180 days, and is associated with the
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue