aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorFdaSilvaYY <fdasilvayy@gmail.com>2017-02-10 23:17:00 +0100
committerRich Salz <rsalz@openssl.org>2017-03-28 16:16:49 -0400
commita8cd439bf58708ffe234a9f707cf6a394d28a1f9 (patch)
tree7561d374aa2f71aeea77b5af5c9834f8fdbc7302
parent1ee4b98e695cd041da931c10fbdaf82f0ee0f268 (diff)
downloadopenssl-a8cd439bf58708ffe234a9f707cf6a394d28a1f9.tar.gz
Spelling fixes
Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3066)
-rw-r--r--CHANGES4
1 files changed, 2 insertions, 2 deletions
diff --git a/CHANGES b/CHANGES
index 9c6e897b90..d176fa1181 100644
--- a/CHANGES
+++ b/CHANGES
@@ -218,7 +218,7 @@
to service a connection. This could lead to a Denial of Service through
memory exhaustion. However, the excessive message length check still takes
place, and this would cause the connection to immediately fail. Assuming
- that the application calls SSL_free() on the failed conneciton in a timely
+ that the application calls SSL_free() on the failed connection in a timely
manner then the 21Mb of allocated memory will then be immediately freed
again. Therefore the excessive memory allocation will be transitory in
nature. This then means that there is only a security impact if:
@@ -971,7 +971,7 @@
done while fixing the error code for the key-too-small case.
[Annie Yousar <a.yousar@informatik.hu-berlin.de>]
- *) CA.sh has been removmed; use CA.pl instead.
+ *) CA.sh has been removed; use CA.pl instead.
[Rich Salz]
*) Removed old DES API.