mirror of https://github.com/OpenIdentityPlatform/OpenDJ.git

neil_a_wilson
11.47.2007 5d031236d65aa2cc87bcd74b37707760564424e1
Correct a number of misspelled occurrences of "StartTLS".
4 files modified
16 ■■■■ changed files
opends/src/messages/messages/dsconfig.properties 2 ●●● patch | view | raw | blame | history
opends/src/messages/messages/protocol.properties 6 ●●●● patch | view | raw | blame | history
opends/src/messages/messages/utility.properties 2 ●●● patch | view | raw | blame | history
opends/src/server/org/opends/server/util/cli/LDAPConnectionConsoleInteraction.java 6 ●●●● patch | view | raw | blame | history
opends/src/messages/messages/dsconfig.properties
@@ -398,7 +398,7 @@
INFO_DSCFG_HEADING_CONNECTION_PARAMETERS_1373=>>>> Specify OpenDS LDAP connection parameters
INFO_DSCFG_PROMPT_SECURITY_USE_SECURE_CTX_1374=How do you want to connect?
INFO_DSCFG_PROMPT_SECURITY_USE_SSL_1375=LDAP with SSL
INFO_DSCFG_PROMPT_SECURITY_USE_START_TSL_1376=LDAP with StartTSL
INFO_DSCFG_PROMPT_SECURITY_USE_START_TLS_1376=LDAP with StartTLS
INFO_DSCFG_PROMPT_SECURITY_USE_TRUST_ALL_1377=Do you want to automatically trust the server certificate?
INFO_DSCFG_PROMPT_SECURITY_TRUSTSTORE_PATH_1378=Truststore path:
INFO_DSCFG_PROMPT_SECURITY_TRUSTSTORE_PASSWORD_1379=Password for truststore '%s':
opends/src/messages/messages/protocol.properties
@@ -852,7 +852,7 @@
SEVERE_ERR_LDAP_CONNHANDLER_CANNOT_DETERMINE_SSL_CERT_NICKNAME_248=An \
 unexpected error occurred while processing the ds-cfg-ssl-cert-nickname \
 attribute in configuration entry %s, which is used to specify the nickname of \
 the certificate to use for accepting SSL/TSL connections:  %s
 the certificate to use for accepting SSL/TLS connections:  %s
SEVERE_ERR_LDAP_CONNHANDLER_INVALID_ADDRESS_MASK_249=The string %s defined in \
 attribute %s of configuration entry %s could not be decoded as a valid \
 address mask:  %s
@@ -1171,7 +1171,7 @@
SEVERE_ERR_JMX_CONNHANDLER_CANNOT_DETERMINE_SSL_CERT_NICKNAME_353=An \
 unexpected error occurred while processing the ds-cfg-ssl-cert-nickname \
 attribute in configuration entry %s, which is used to specify the nickname of \
 the certificate to use for accepting SSL/TSL connections:  %s
 the certificate to use for accepting SSL/TLS connections:  %s
SEVERE_ERR_PWPOLICYREQ_CONTROL_HAS_VALUE_354=Cannot decode the provided \
 control as a password policy request control because the provided control had \
 a value but the password policy request control should not have a value
@@ -1297,7 +1297,7 @@
SEVERE_ERR_JMX_CONNHANDLER_CANNOT_DETERMINE_KEYMANAGER_DN_400=An unexpected \
 error occurred while processing the ds-cfg-key-manager-provider-dn attribute \
 in configuration entry %s, which is used to specify the DN of the key manager \
 provider to use for accepting SSL/TSL connections:  %s
 provider to use for accepting SSL/TLS connections:  %s
MILD_ERR_LDAP_CONNHANDLER_CANNOT_SET_SECURITY_PROVIDER_401=An error occurred \
 while attempting to configure the connection security provider for the client \
 connection:  %s
opends/src/messages/messages/utility.properties
@@ -505,7 +505,7 @@
 rejected by a plugin:  %s
INFO_LDAP_CONN_PROMPT_SECURITY_LDAP_226=LDAP
INFO_LDAP_CONN_PROMPT_SECURITY_USE_SSL_227=LDAP with SSL
INFO_LDAP_CONN_PROMPT_SECURITY_USE_START_TSL_228=LDAP with StartTSL
INFO_LDAP_CONN_PROMPT_SECURITY_USE_START_TLS_228=LDAP with StartTLS
INFO_LDAP_CONN_PROMPT_SECURITY_USE_TRUST_ALL_229=Automatically \
  trust
INFO_LDAP_CONN_PROMPT_SECURITY_TRUSTSTORE_PATH_230=Truststore path:
opends/src/server/org/opends/server/util/cli/LDAPConnectionConsoleInteraction.java
@@ -85,8 +85,8 @@
  private enum Protocols
  {
    LDAP(1, INFO_LDAP_CONN_PROMPT_SECURITY_LDAP.get()), SSL(2,
        INFO_LDAP_CONN_PROMPT_SECURITY_USE_SSL.get()), START_TSL(3,
        INFO_LDAP_CONN_PROMPT_SECURITY_USE_START_TSL.get());
        INFO_LDAP_CONN_PROMPT_SECURITY_USE_SSL.get()), START_TLS(3,
        INFO_LDAP_CONN_PROMPT_SECURITY_USE_START_TLS.get());
    private Integer choice;
@@ -383,7 +383,7 @@
            useSSL = true;
          }
          else if (result.getValue()
              .equals(Protocols.START_TSL.getChoice()))
              .equals(Protocols.START_TLS.getChoice()))
          {
            useStartTLS = true;
          }