fix typo and test case assert not correct in higher version of JDK (#2089)

diff --git a/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java b/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java
index a505973..0b28c5b 100644
--- a/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java
+++ b/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java
@@ -189,7 +189,7 @@
     return r;
   }
 
-  public static String[] getEnalbedCiphers(String enabledCiphers) {
+  public static String[] getEnabledCiphers(String enabledCiphers) {
     SSLOption option = new SSLOption();
     option.setProtocols("TLSv1.2");
     option.setCiphers(enabledCiphers);
diff --git a/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java b/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java
index d1b1476..3121367 100644
--- a/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java
+++ b/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java
@@ -199,7 +199,8 @@
     };
 
     SSLEngine aSSLEngine = SSLManager.createSSLEngine(option, custom);
-    Assert.assertEquals(false, aSSLEngine.getUseClientMode());
+    // if client mode may not decided at initialization. Different JDK is different, do not check it.
+    // Assert.assertEquals(false, aSSLEngine.getUseClientMode());
     Assert.assertNotNull(aSSLEngine);
   }
 
@@ -222,7 +223,7 @@
     String peerHost = "host1";
     SSLEngine aSSLEngine = SSLManager.createSSLEngine(option, custom, peerHost, port);
     Assert.assertNotNull(aSSLEngine);
-    Assert.assertEquals("host1", aSSLEngine.getPeerHost().toString());
+    Assert.assertEquals("host1", aSSLEngine.getPeerHost());
   }
 
   @Test
@@ -249,8 +250,8 @@
     };
 
     try {
-      SSLContext context = SSLManager.createSSLContext(option, custom);
-      Assert.assertNotNull(context);
+      SSLManager.createSSLContext(option, custom);
+      Assert.assertNotNull(null);
     } catch (Exception e) {
       Assert.assertEquals("java.lang.IllegalArgumentException", e.getClass().getName());
     }
@@ -280,8 +281,8 @@
     };
 
     try {
-      SSLContext context = SSLManager.createSSLContext(option, custom);
-      Assert.assertNotNull(context);
+      SSLManager.createSSLContext(option, custom);
+      Assert.assertNotNull(null);
     } catch (Exception e) {
       Assert.assertEquals("java.lang.IllegalArgumentException", e.getClass().getName());
     }
@@ -311,9 +312,9 @@
     };
 
     try {
-      SSLServerSocket context = SSLManager.createSSLServerSocket(option, custom);
+      SSLManager.createSSLServerSocket(option, custom);
 
-      Assert.assertNotNull(context);
+      Assert.assertNotNull(null);
     } catch (Exception e) {
       Assert.assertEquals("java.lang.IllegalArgumentException", e.getClass().getName());
     }
@@ -343,8 +344,8 @@
     };
 
     try {
-      SSLServerSocket context = SSLManager.createSSLServerSocket(option, custom);
-      Assert.assertNotNull(context);
+      SSLManager.createSSLServerSocket(option, custom);
+      Assert.assertNotNull(null);
     } catch (Exception e) {
       Assert.assertEquals("java.lang.IllegalArgumentException", e.getClass().getName());
     }
@@ -374,8 +375,8 @@
     };
 
     try {
-      SSLSocket context = SSLManager.createSSLSocket(option, custom);
-      Assert.assertNotNull(context);
+      SSLManager.createSSLSocket(option, custom);
+      Assert.assertNotNull(null);
     } catch (Exception e) {
       Assert.assertEquals("java.lang.IllegalArgumentException", e.getClass().getName());
     }
@@ -405,8 +406,8 @@
     };
 
     try {
-      SSLSocket context = SSLManager.createSSLSocket(option, custom);
-      Assert.assertNotNull(context);
+      SSLManager.createSSLSocket(option, custom);
+      Assert.assertNotNull(null);
     } catch (Exception e) {
       Assert.assertEquals("java.lang.IllegalArgumentException", e.getClass().getName());
     }
@@ -431,8 +432,9 @@
     Assert.assertNotNull(aSSLSocketFactory.getDefaultCipherSuites()[0]);
   }
 
+  @Test
   public void testGetSupportedCiphers() {
-    String[] ciphers = SSLManager.getEnalbedCiphers("TLS_RSA_WITH_AES_128_GCM_SHA256");
+    String[] ciphers = SSLManager.getEnabledCiphers("TLS_RSA_WITH_AES_128_GCM_SHA256");
     Assert.assertEquals(ciphers[0], "TLS_RSA_WITH_AES_128_GCM_SHA256");
   }
 }
diff --git a/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java b/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java
index 790c764..5f8434d 100644
--- a/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java
+++ b/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java
@@ -141,7 +141,7 @@
     tcpClientOptions
         .setEnabledSecureTransportProtocols(new HashSet<String>(Arrays.asList(sslOption.getProtocols().split(","))));
 
-    for (String cipher : SSLManager.getEnalbedCiphers(sslOption.getCiphers())) {
+    for (String cipher : SSLManager.getEnabledCiphers(sslOption.getCiphers())) {
       tcpClientOptions.addEnabledCipherSuite(cipher);
     }