[openssl] OpenSSL_1_1_1-stable update
Richard Levitte
levitte at openssl.org
Wed Dec 9 12:37:37 UTC 2020
The branch OpenSSL_1_1_1-stable has been updated
via 5daa28ad7041a0def79e14a0e845f407e6f04f7e (commit)
from cf3685393faa33496e447326069e83bd6bac6522 (commit)
- Log -----------------------------------------------------------------
commit 5daa28ad7041a0def79e14a0e845f407e6f04f7e
Author: Nan Xiao <nan at chinadtrace.org>
Date: Tue Dec 8 12:35:31 2020 +0800
Fix typo in OPENSSL_malloc.pod
CLA: trivial
Reviewed-by: Tomas Mraz <tmraz at fedoraproject.org>
Reviewed-by: Matt Caswell <matt at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/13632)
(cherry picked from commit 74c8dd1c516c7017477a205fd1f5f975cfa86722)
-----------------------------------------------------------------------
Summary of changes:
doc/man3/OPENSSL_malloc.pod | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/doc/man3/OPENSSL_malloc.pod b/doc/man3/OPENSSL_malloc.pod
index c60e038309..9834a8f131 100644
--- a/doc/man3/OPENSSL_malloc.pod
+++ b/doc/man3/OPENSSL_malloc.pod
@@ -104,7 +104,7 @@ before ultimately calling OPENSSL_free().
OPENSSL_cleanse() fills B<ptr> of size B<len> with a string of 0's.
Use OPENSSL_cleanse() with care if the memory is a mapping of a file.
-If the storage controller uses write compression, then its possible
+If the storage controller uses write compression, then it's possible
that sensitive tail bytes will survive zeroization because the block of
zeros will be compressed. If the storage controller uses wear leveling,
then the old sensitive data will not be overwritten; rather, a block of
More information about the openssl-commits
mailing list