[openssl-users] In-place encryption/decryption via the EVP_* APIs

Terry Chong terry.y.t.chong at gmail.com
Wed Nov 7 14:44:34 UTC 2018


Yes it does, thank you Richard!

Regards,
Terry

> On Nov 6, 2018, at 11:12 PM, Richard Levitte <levitte at openssl.org> wrote:
> 
> In message <CANYoXOMfZymGSAC7C058Hb+JisH9xWcpzeZgLwfbvms1qA-Z6w at mail.gmail.com> on Tue, 6 Nov 2018 14:46:52 -0800, Terry Chong <terry.y.t.chong at gmail.com> said:
> 
>> Hi, I am planning on using EVP_* APIs to encrypt/decrypt my data. One thing I am wondering
>> about is whether I can do in-place encryption, meaning I don't have to pay the price of an extra
>> memory buffer to store my cipher text and a potential memcpy back to the source buffer.
>> 
>> I tried that with the EVP_* APIs by essentially passing in the same buffer to the plaintext and cipher
>> text input pointers, and it seems to work. I am using AES XTS mode, and I understand that that
>> may not work if I were to use a different mode.
>> 
>> I am wondering if this behavior for AES XTS that allows in-place encryption/decryption is going to
>> stay?
> 
> test/evp_test.c does a number of tests on all ciphers we have test
> vectors for, including overlapping buffers (i.e. input and output
> buffer are the same).  So that is to say that if that behaviour ever
> stopped working, we would certainly notice.
> 
> Does that help?
> 
> Cheers,
> Richard
> 
> -- 
> Richard Levitte         levitte at openssl.org
> OpenSSL Project         http://www.openssl.org/~levitte/
> -- 
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


More information about the openssl-users mailing list