aboutsummaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorDimitri Papadopoulos <3234522+DimitriPapadopoulos@users.noreply.github.com>2023-07-16 08:25:55 +0200
committerPauli <pauli@openssl.org>2023-07-18 18:54:45 +1000
commita024ab984e540bff65d25407496c34b3567b55a7 (patch)
tree926b3165cd52ea6abe176682d13fadb59cc0f224 /CHANGES.md
parent4c4fefa5c78a49b63113aec35a2bc8d6d9432436 (diff)
downloadopenssl-a024ab984e540bff65d25407496c34b3567b55a7.tar.gz
Fix typos found by codespell
Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21467)
Diffstat (limited to 'CHANGES.md')
-rw-r--r--CHANGES.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md
index 9320b7bb46..6cfba54e72 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1896,7 +1896,7 @@ breaking changes, and mappings for the large list of deprecated functions.
3-prime RSA1536, and DSA1024 as a result of this defect would be very
difficult to perform and are not believed likely. Attacks against DH512
are considered just feasible. However, for an attack the target would
- have to re-use the DH512 private key, which is not recommended anyway.
+ have to reuse the DH512 private key, which is not recommended anyway.
Also applications directly using the low-level API BN_mod_exp may be
affected if they use BN_FLG_CONSTTIME.
([CVE-2019-1551])