[openssl-users] In-place encryption/decryption via the EVP_* APIs

Richard Levitte levitte at openssl.org
Wed Nov 7 07:12:27 UTC 2018


In message <CANYoXOMfZymGSAC7C058Hb+JisH9xWcpzeZgLwfbvms1qA-Z6w at mail.gmail.com> on Tue, 6 Nov 2018 14:46:52 -0800, Terry Chong <terry.y.t.chong at gmail.com> said:

> Hi, I am planning on using EVP_* APIs to encrypt/decrypt my data. One thing I am wondering
> about is whether I can do in-place encryption, meaning I don't have to pay the price of an extra
> memory buffer to store my cipher text and a potential memcpy back to the source buffer.
> 
> I tried that with the EVP_* APIs by essentially passing in the same buffer to the plaintext and cipher
> text input pointers, and it seems to work. I am using AES XTS mode, and I understand that that
> may not work if I were to use a different mode.
> 
> I am wondering if this behavior for AES XTS that allows in-place encryption/decryption is going to
> stay?

test/evp_test.c does a number of tests on all ciphers we have test
vectors for, including overlapping buffers (i.e. input and output
buffer are the same).  So that is to say that if that behaviour ever
stopped working, we would certainly notice.

Does that help?

Cheers,
Richard

-- 
Richard Levitte         levitte at openssl.org
OpenSSL Project         http://www.openssl.org/~levitte/


More information about the openssl-users mailing list