summaryrefslogtreecommitdiffstats
path: root/bugs/SSLv3
diff options
context:
space:
mode:
authorRichard Levitte <levitte@openssl.org>2003-06-12 03:04:05 +0200
committerRichard Levitte <levitte@openssl.org>2003-06-12 03:04:05 +0200
commit5a1fd87ec1080a11ca120f8380b0eb59740a09f2 (patch)
tree3ae916d6ce83addf5640eab56f68cbb925358210 /bugs/SSLv3
parentDo not try to use non-existent gmtime_r() on SunOS4. (diff)
downloadopenssl-5a1fd87ec1080a11ca120f8380b0eb59740a09f2.tar.xz
openssl-5a1fd87ec1080a11ca120f8380b0eb59740a09f2.zip
Typo.
PR: 584
Diffstat (limited to 'bugs/SSLv3')
-rw-r--r--bugs/SSLv32
1 files changed, 1 insertions, 1 deletions
diff --git a/bugs/SSLv3 b/bugs/SSLv3
index db53e1343a..a75a1652d9 100644
--- a/bugs/SSLv3
+++ b/bugs/SSLv3
@@ -29,7 +29,7 @@ RC4-MD5, but a re-connect tries to use DES-CBC-SHA. So netscape, when
doing a re-connect, always takes the first cipher in the cipher list.
If we accept a netscape connection, demand a client cert, have a
-non-self-sighed CA which does not have it's CA in netscape, and the
+non-self-signed CA which does not have it's CA in netscape, and the
browser has a cert, it will crash/hang. Works for 3.x and 4.xbeta
Netscape browsers do not really notice the server sending a