s/nginx/NGINX/ Per Piotr, all caps is the proper rendering. Change-Id: I783016a6ed7e29f49369fabbcfa49b66910e4954 Reviewed-on: https://boringssl-review.googlesource.com/10486 Reviewed-by: Piotr Sikora <piotrsikora@google.com> Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/handshake_server.c b/ssl/handshake_server.c index f5c8b3c..f5bf0da 100644 --- a/ssl/handshake_server.c +++ b/ssl/handshake_server.c
@@ -812,7 +812,7 @@ if (!ssl->s3->tmp.cert_request) { /* OpenSSL returns X509_V_OK when no certificates are requested. This is - * classed by them as a bug, but it's assumed by at least nginx. */ + * classed by them as a bug, but it's assumed by at least NGINX. */ ssl->verify_result = X509_V_OK; ssl->s3->new_session->verify_result = X509_V_OK; } @@ -1260,7 +1260,7 @@ } /* OpenSSL returns X509_V_OK when no certificates are received. This is - * classed by them as a bug, but it's assumed by at least nginx. */ + * classed by them as a bug, but it's assumed by at least NGINX. */ ssl->verify_result = X509_V_OK; ssl->s3->new_session->verify_result = X509_V_OK; ssl->s3->tmp.reuse_message = 1; @@ -1311,7 +1311,7 @@ } /* OpenSSL returns X509_V_OK when no certificates are received. This is - * classed by them as a bug, but it's assumed by at least nginx. */ + * classed by them as a bug, but it's assumed by at least NGINX. */ ssl->verify_result = X509_V_OK; } else { /* The hash would have been filled in. */
diff --git a/ssl/tls13_both.c b/ssl/tls13_both.c index 188898c..e18f246 100644 --- a/ssl/tls13_both.c +++ b/ssl/tls13_both.c
@@ -178,7 +178,7 @@ } /* OpenSSL returns X509_V_OK when no certificates are requested. This is - * classed by them as a bug, but it's assumed by at least nginx. */ + * classed by them as a bug, but it's assumed by at least NGINX. */ ssl->verify_result = X509_V_OK; ssl->s3->new_session->verify_result = X509_V_OK;
diff --git a/ssl/tls13_server.c b/ssl/tls13_server.c index c498407..eb11738 100644 --- a/ssl/tls13_server.c +++ b/ssl/tls13_server.c
@@ -491,7 +491,7 @@ SSL_HANDSHAKE *hs) { if (!ssl->s3->tmp.cert_request) { /* OpenSSL returns X509_V_OK when no certificates are requested. This is - * classed by them as a bug, but it's assumed by at least nginx. */ + * classed by them as a bug, but it's assumed by at least NGINX. */ ssl->verify_result = X509_V_OK; ssl->s3->new_session->verify_result = X509_V_OK;