Skip to content
Permalink
Browse files
8263137: Typos in sun.security.ssl.RenegoInfoExtension
Reviewed-by: xuelei
  • Loading branch information
John Jiang committed Mar 7, 2021
1 parent 18fc350 commit 22a3117d229cba10c690a4e66baf9c754a09e57c
Showing 1 changed file with 3 additions and 3 deletions.
@@ -1,5 +1,5 @@
/*
* Copyright (c) 2015, 2020, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2015, 2021, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -280,7 +280,7 @@ public void absent(ConnectionContext context,
CipherSuite.TLS_EMPTY_RENEGOTIATION_INFO_SCSV.id) {
if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
SSLLogger.finest(
"Safe renegotiation, using the SCSV signgling");
"Safe renegotiation, using the SCSV signaling");
}
shc.conContext.secureRenegotiation = true;
return;
@@ -341,7 +341,7 @@ public byte[] produce(ConnectionContext context,
RenegotiationInfoSpec requestedSpec = (RenegotiationInfoSpec)
shc.handshakeExtensions.get(CH_RENEGOTIATION_INFO);
if (requestedSpec == null && !shc.conContext.secureRenegotiation) {
// Ignore, no renegotiation_info extension or SCSV signgling
// Ignore, no renegotiation_info extension or SCSV signaling
// requested.
if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
SSLLogger.finest(

0 comments on commit 22a3117

Please sign in to comment.