s/nginx/NGINX/
Per Piotr, all caps is the proper rendering.
Change-Id: I783016a6ed7e29f49369fabbcfa49b66910e4954
Reviewed-on: https://boringssl-review.googlesource.com/10486
Reviewed-by: Piotr Sikora <piotrsikora@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/handshake_server.c b/ssl/handshake_server.c
index f5c8b3c..f5bf0da 100644
--- a/ssl/handshake_server.c
+++ b/ssl/handshake_server.c
@@ -812,7 +812,7 @@
if (!ssl->s3->tmp.cert_request) {
/* OpenSSL returns X509_V_OK when no certificates are requested. This is
- * classed by them as a bug, but it's assumed by at least nginx. */
+ * classed by them as a bug, but it's assumed by at least NGINX. */
ssl->verify_result = X509_V_OK;
ssl->s3->new_session->verify_result = X509_V_OK;
}
@@ -1260,7 +1260,7 @@
}
/* OpenSSL returns X509_V_OK when no certificates are received. This is
- * classed by them as a bug, but it's assumed by at least nginx. */
+ * classed by them as a bug, but it's assumed by at least NGINX. */
ssl->verify_result = X509_V_OK;
ssl->s3->new_session->verify_result = X509_V_OK;
ssl->s3->tmp.reuse_message = 1;
@@ -1311,7 +1311,7 @@
}
/* OpenSSL returns X509_V_OK when no certificates are received. This is
- * classed by them as a bug, but it's assumed by at least nginx. */
+ * classed by them as a bug, but it's assumed by at least NGINX. */
ssl->verify_result = X509_V_OK;
} else {
/* The hash would have been filled in. */
diff --git a/ssl/tls13_both.c b/ssl/tls13_both.c
index 188898c..e18f246 100644
--- a/ssl/tls13_both.c
+++ b/ssl/tls13_both.c
@@ -178,7 +178,7 @@
}
/* OpenSSL returns X509_V_OK when no certificates are requested. This is
- * classed by them as a bug, but it's assumed by at least nginx. */
+ * classed by them as a bug, but it's assumed by at least NGINX. */
ssl->verify_result = X509_V_OK;
ssl->s3->new_session->verify_result = X509_V_OK;
diff --git a/ssl/tls13_server.c b/ssl/tls13_server.c
index c498407..eb11738 100644
--- a/ssl/tls13_server.c
+++ b/ssl/tls13_server.c
@@ -491,7 +491,7 @@
SSL_HANDSHAKE *hs) {
if (!ssl->s3->tmp.cert_request) {
/* OpenSSL returns X509_V_OK when no certificates are requested. This is
- * classed by them as a bug, but it's assumed by at least nginx. */
+ * classed by them as a bug, but it's assumed by at least NGINX. */
ssl->verify_result = X509_V_OK;
ssl->s3->new_session->verify_result = X509_V_OK;