From bade67dd08df3d4bba377c2a4548eac82df05325 Mon Sep 17 00:00:00 2001 From: Tomas Mraz Date: Fri, 5 Apr 2024 16:31:05 +0200 Subject: Document that private and pairwise checks are not bounded by key size Reviewed-by: Neil Horman Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/24049) (cherry picked from commit 27005cecc75ec7a22a673d57fc35a11dea30ac0a) --- doc/man3/EVP_PKEY_check.pod | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/doc/man3/EVP_PKEY_check.pod b/doc/man3/EVP_PKEY_check.pod index 485d350529..47c57e7971 100644 --- a/doc/man3/EVP_PKEY_check.pod +++ b/doc/man3/EVP_PKEY_check.pod @@ -61,6 +61,11 @@ It is not necessary to call these functions after locally calling an approved ke generation method, but may be required for assurance purposes when receiving keys from a third party. +The EVP_PKEY_pairwise_check() and EVP_PKEY_private_check() might not be bounded +by any key size limits as private keys are not expected to be supplied by +attackers. For that reason they might take an unbounded time if run on +arbitrarily large keys. + =head1 RETURN VALUES All functions return 1 for success or others for failure. -- cgit v1.2.3