Fix typos/cosmetics in Changelog
diff --git a/ChangeLog b/ChangeLog
index 96a09ae..582a9df 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -20,9 +20,9 @@
      (found using Codenomicon Defensics).
 
 Features
-   * Add support for FALLBACK_SCSV (draft-ietf-tls-downgrade-scsv)
-   * Add support for Extended Master Secret (draft-ietf-tls-session-hash)
-   * Add support for Encrypt-then-MAC (RFC 7366)
+   * Add support for FALLBACK_SCSV (draft-ietf-tls-downgrade-scsv).
+   * Add support for Extended Master Secret (draft-ietf-tls-session-hash).
+   * Add support for Encrypt-then-MAC (RFC 7366).
    * Add function pk_check_pair() to test if public and private keys match.
    * Add x509_crl_parse_der().
    * Add compile-time option POLARSSL_X509_MAX_INTERMEDIATE_CA to limit the
@@ -33,7 +33,7 @@
      for pre-1.2 clients when multiple certificates are available.
    * Add support for getrandom() syscall on recent Linux kernels with Glibc or
      a compatible enough libc (eg uClibc).
-   * Add ssl_set_arc4_support() to make it easier to diable RC4 at runtime
+   * Add ssl_set_arc4_support() to make it easier to disable RC4 at runtime
      while using the default ciphersuite list.
 
 Bugfix
@@ -41,8 +41,8 @@
      add_len (found by Jean-Philippe Aumasson) (not triggerable remotely).
    * Possible buffer overflow of length at most POLARSSL_MEMORY_ALIGN_MULTIPLE
      if memory_buffer_alloc_init() was called with buf not aligned and len not
-     a multiple of POLARSSL_MEMORY_ALIGN_MULTIPLE.
-   * User set CFLAGS were ignore by Cmake with gcc (introduced in 1.3.9, found
+     a multiple of POLARSSL_MEMORY_ALIGN_MULTIPLE (not triggerable remotely).
+   * User set CFLAGS were ignored by Cmake with gcc (introduced in 1.3.9, found
      by Julian Ospald).
    * Fix potential undefined behaviour in Camellia.
    * Fix potential failure in ECDSA signatures when POLARSSL_ECP_MAX_BITS is a
@@ -60,7 +60,7 @@
    * A specific error is now returned when there are ciphersuites in common
      but none of them is usable due to external factors such as no certificate
      with a suitable (extended)KeyUsage or curve or no PSK set.
-   * It is now possible to disable neogtiation of truncated HMAC server-side
+   * It is now possible to disable negotiation of truncated HMAC server-side
      at runtime with ssl_set_truncated_hmac().
    * Example programs for SSL client and server now disable SSLv3 by default.
    * Example programs for SSL client and server now disable RC4 by default.