From a0cdcf9bc8619df97699e4cc34994366d4306c3e Mon Sep 17 00:00:00 2001 From: FdaSilvaYY Date: Fri, 10 Feb 2017 23:17:00 +0100 Subject: [PATCH] Spelling fixes Reviewed-by: Andy Polyakov Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/3066) (cherry picked from commit a8cd439bf58708ffe234a9f707cf6a394d28a1f9) --- CHANGES | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGES b/CHANGES index 6446b9c406..bfa56054ca 100644 --- a/CHANGES +++ b/CHANGES @@ -186,7 +186,7 @@ to service a connection. This could lead to a Denial of Service through memory exhaustion. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming - that the application calls SSL_free() on the failed conneciton in a timely + that the application calls SSL_free() on the failed connection in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if: @@ -939,7 +939,7 @@ done while fixing the error code for the key-too-small case. [Annie Yousar ] - *) CA.sh has been removmed; use CA.pl instead. + *) CA.sh has been removed; use CA.pl instead. [Rich Salz] *) Removed old DES API. -- 2.25.1