From 7b205d6c7d77cb273c6109b29597aa88fa08a59f Mon Sep 17 00:00:00 2001 From: Amos Shi <ashi@openjdk.org> Date: Fri, 16 Aug 2024 17:09:21 +0000 Subject: [PATCH] 8325022: Incorrect error message on client authentication Backport-of: fe78c0f1911c9fdc1d30e23847d102748dfa2063 --- .../share/classes/sun/security/ssl/CertificateMessage.java | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/java.base/share/classes/sun/security/ssl/CertificateMessage.java b/src/java.base/share/classes/sun/security/ssl/CertificateMessage.java index 5921b7cfca5..840c0055b9a 100644 --- a/src/java.base/share/classes/sun/security/ssl/CertificateMessage.java +++ b/src/java.base/share/classes/sun/security/ssl/CertificateMessage.java @@ -388,7 +388,7 @@ final class CertificateMessage { ClientAuthType.CLIENT_AUTH_REQUESTED) { // unexpected or require client authentication throw shc.conContext.fatal(Alert.BAD_CERTIFICATE, - "Empty server certificate chain"); + "Empty client certificate chain"); } else { return; } @@ -405,7 +405,7 @@ final class CertificateMessage { } } catch (CertificateException ce) { throw shc.conContext.fatal(Alert.BAD_CERTIFICATE, - "Failed to parse server certificates", ce); + "Failed to parse client certificates", ce); } checkClientCerts(shc, x509Certs); @@ -1247,7 +1247,7 @@ final class CertificateMessage { } } catch (CertificateException ce) { throw shc.conContext.fatal(Alert.BAD_CERTIFICATE, - "Failed to parse server certificates", ce); + "Failed to parse client certificates", ce); } // find out the types of client authentication used -- GitLab