s/nginx/NGINX/

Per Piotr, all caps is the proper rendering.

Change-Id: I783016a6ed7e29f49369fabbcfa49b66910e4954
Reviewed-on: https://boringssl-review.googlesource.com/10486
Reviewed-by: Piotr Sikora <piotrsikora@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/handshake_server.c b/ssl/handshake_server.c
index f5c8b3c..f5bf0da 100644
--- a/ssl/handshake_server.c
+++ b/ssl/handshake_server.c
@@ -812,7 +812,7 @@
 
     if (!ssl->s3->tmp.cert_request) {
       /* OpenSSL returns X509_V_OK when no certificates are requested. This is
-       * classed by them as a bug, but it's assumed by at least nginx. */
+       * classed by them as a bug, but it's assumed by at least NGINX. */
       ssl->verify_result = X509_V_OK;
       ssl->s3->new_session->verify_result = X509_V_OK;
     }
@@ -1260,7 +1260,7 @@
       }
 
       /* OpenSSL returns X509_V_OK when no certificates are received. This is
-       * classed by them as a bug, but it's assumed by at least nginx. */
+       * classed by them as a bug, but it's assumed by at least NGINX. */
       ssl->verify_result = X509_V_OK;
       ssl->s3->new_session->verify_result = X509_V_OK;
       ssl->s3->tmp.reuse_message = 1;
@@ -1311,7 +1311,7 @@
     }
 
     /* OpenSSL returns X509_V_OK when no certificates are received. This is
-     * classed by them as a bug, but it's assumed by at least nginx. */
+     * classed by them as a bug, but it's assumed by at least NGINX. */
     ssl->verify_result = X509_V_OK;
   } else {
     /* The hash would have been filled in. */
diff --git a/ssl/tls13_both.c b/ssl/tls13_both.c
index 188898c..e18f246 100644
--- a/ssl/tls13_both.c
+++ b/ssl/tls13_both.c
@@ -178,7 +178,7 @@
     }
 
     /* OpenSSL returns X509_V_OK when no certificates are requested. This is
-     * classed by them as a bug, but it's assumed by at least nginx. */
+     * classed by them as a bug, but it's assumed by at least NGINX. */
     ssl->verify_result = X509_V_OK;
     ssl->s3->new_session->verify_result = X509_V_OK;
 
diff --git a/ssl/tls13_server.c b/ssl/tls13_server.c
index c498407..eb11738 100644
--- a/ssl/tls13_server.c
+++ b/ssl/tls13_server.c
@@ -491,7 +491,7 @@
                                                         SSL_HANDSHAKE *hs) {
   if (!ssl->s3->tmp.cert_request) {
     /* OpenSSL returns X509_V_OK when no certificates are requested. This is
-     * classed by them as a bug, but it's assumed by at least nginx. */
+     * classed by them as a bug, but it's assumed by at least NGINX. */
     ssl->verify_result = X509_V_OK;
     ssl->s3->new_session->verify_result = X509_V_OK;