11/*
2- * Copyright (c) 2015, 2023 , Oracle and/or its affiliates. All rights reserved.
2+ * Copyright (c) 2015, 2024 , Oracle and/or its affiliates. All rights reserved.
33 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44 *
55 * This code is free software; you can redistribute it and/or modify it
@@ -386,7 +386,7 @@ private void onCertificate(ServerHandshakeContext shc,
386386 ClientAuthType .CLIENT_AUTH_REQUESTED ) {
387387 // unexpected or require client authentication
388388 throw shc .conContext .fatal (Alert .BAD_CERTIFICATE ,
389- "Empty server certificate chain" );
389+ "Empty client certificate chain" );
390390 } else {
391391 return ;
392392 }
@@ -403,7 +403,7 @@ private void onCertificate(ServerHandshakeContext shc,
403403 }
404404 } catch (CertificateException ce ) {
405405 throw shc .conContext .fatal (Alert .BAD_CERTIFICATE ,
406- "Failed to parse server certificates" , ce );
406+ "Failed to parse client certificates" , ce );
407407 }
408408
409409 checkClientCerts (shc , x509Certs );
@@ -1224,7 +1224,7 @@ private static X509Certificate[] checkClientCerts(
12241224 }
12251225 } catch (CertificateException ce ) {
12261226 throw shc .conContext .fatal (Alert .BAD_CERTIFICATE ,
1227- "Failed to parse server certificates" , ce );
1227+ "Failed to parse client certificates" , ce );
12281228 }
12291229
12301230 // find out the types of client authentication used
0 commit comments