diff --git a/bindings/java/src/org/sleuthkit/datamodel/CaseDatabaseFactory.java b/bindings/java/src/org/sleuthkit/datamodel/CaseDatabaseFactory.java index fb4900d225ed83d5938d5a47001600040443c161..782c1ffe86ba0bf6fb00ebe5feb0c77eb3094259 100644 --- a/bindings/java/src/org/sleuthkit/datamodel/CaseDatabaseFactory.java +++ b/bindings/java/src/org/sleuthkit/datamodel/CaseDatabaseFactory.java @@ -47,7 +47,7 @@ class CaseDatabaseFactory { final static String SSL_NONVERIFY_URL = "?ssl=true&sslfactory=org.postgresql.ssl.NonValidatingFactory&sslmode=require"; // ssl=true: enables SSL encryption. - // DefaultJavaSSLFactory: uses Java's default truststore to validate server certificate. + // DefaultJavaSSLFactory: uses application's default JRE keystore to validate server certificate. // sslmode=verify-ca: verifies that the server we are connecting to is trusted by CA. final static String SSL_VERIFY_DEFAULT_URL = "?ssl=true&sslfactory=org.postgresql.ssl.DefaultJavaSSLFactory&sslmode=verify-ca"; @@ -57,8 +57,8 @@ class CaseDatabaseFactory { * SSL certificate validation must extend org.postgresql.ssl.WrappedFactory * and generally must follow the same logic. * - * ssl=true: enables SSL encryption. sslmode=verify-ca: verifies that the - * server we are connecting to is trusted by CA. + * ssl=true: enables SSL encryption. + * sslmode=verify-ca: verifies that the server we are connecting to is trusted by CA. * * @param customSslValidationClassName full canonical name of a Java class * that performs custom SSL certificate