diff options
author | Dimitri Papadopoulos <3234522+DimitriPapadopoulos@users.noreply.github.com> | 2023-07-16 08:25:55 +0200 |
---|---|---|
committer | Pauli <pauli@openssl.org> | 2023-07-18 10:54:45 +0200 |
commit | a024ab984e540bff65d25407496c34b3567b55a7 (patch) | |
tree | 926b3165cd52ea6abe176682d13fadb59cc0f224 /CHANGES.md | |
parent | Fix int_ctx_new() error when use 1.1.1n sm2 key and ec method engine (diff) | |
download | openssl-a024ab984e540bff65d25407496c34b3567b55a7.tar.xz openssl-a024ab984e540bff65d25407496c34b3567b55a7.zip |
Fix typos found by codespell
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21467)
Diffstat (limited to 'CHANGES.md')
-rw-r--r-- | CHANGES.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md index 9320b7bb46..6cfba54e72 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -1896,7 +1896,7 @@ breaking changes, and mappings for the large list of deprecated functions. 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would - have to re-use the DH512 private key, which is not recommended anyway. + have to reuse the DH512 private key, which is not recommended anyway. Also applications directly using the low-level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. ([CVE-2019-1551]) |