]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Spelling fixes
authorFdaSilvaYY <fdasilvayy@gmail.com>
Fri, 10 Feb 2017 22:17:00 +0000 (23:17 +0100)
committerRich Salz <rsalz@openssl.org>
Tue, 28 Mar 2017 20:16:49 +0000 (16:16 -0400)
Reviewed-by: Andy Polyakov <appro@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3066)

CHANGES

diff --git a/CHANGES b/CHANGES
index 9c6e897b90352ca4f88e83fc98eb25ed94d602f4..d176fa1181667d7395b15c0dbe8b6b3f0d9ed728 100644 (file)
--- a/CHANGES
+++ b/CHANGES
      to service a connection. This could lead to a Denial of Service through
      memory exhaustion. However, the excessive message length check still takes
      place, and this would cause the connection to immediately fail. Assuming
-     that the application calls SSL_free() on the failed conneciton in a timely
+     that the application calls SSL_free() on the failed connection in a timely
      manner then the 21Mb of allocated memory will then be immediately freed
      again. Therefore the excessive memory allocation will be transitory in
      nature. This then means that there is only a security impact if:
      done while fixing the error code for the key-too-small case.
      [Annie Yousar <a.yousar@informatik.hu-berlin.de>]
 
-  *) CA.sh has been removmed; use CA.pl instead.
+  *) CA.sh has been removed; use CA.pl instead.
      [Rich Salz]
 
   *) Removed old DES API.