mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-12-23 18:25:35 +00:00
Fix typos in ChangeLog and comments
This commit is contained in:
parent
48ec2c7b5e
commit
6d6018383e
|
@ -12,7 +12,7 @@ Security
|
|||
of close to or larger than 1GB to exploit; on 64 bit machines, would require
|
||||
reading a string of close to or larger than 2^62 bytes.
|
||||
* Fix potential random memory allocation in mbedtls_pem_read_buffer()
|
||||
on crafted PEM input data. Found an fix provided by Guid Vranken.
|
||||
on crafted PEM input data. Found and fix provided by Guido Vranken.
|
||||
Not triggerable remotely in TLS. Triggerable remotely if you accept PEM
|
||||
data from an untrusted source.
|
||||
* Fix potential double-free if ssl_set_psk() is called repeatedly on
|
||||
|
|
|
@ -46,7 +46,7 @@ extern "C" {
|
|||
* *dlen is always updated to reflect the amount
|
||||
* of data that has (or would have) been written.
|
||||
* If that length cannot be represented, then no data is
|
||||
* written to the buffer and *olen is set to SIZE_T_MAX.
|
||||
* written to the buffer and *dlen is set to SIZE_T_MAX.
|
||||
*
|
||||
* \note Call this function with *dlen = 0 to obtain the
|
||||
* required buffer size in *dlen
|
||||
|
|
Loading…
Reference in a new issue