> The patch works but I'm not sure we should permit this. If you copy an AES GCM
> context you end up reusing the key and IV which has security implications.


Well, I believe that security implications due to key/IV reuse happen with all 
ciphers not just AES in gcm mode, right? There must have been some very good 
reasons to introduce EVP_CIPHER_CTX_copy in the first place. 

Concerning my own use case, I was using EVP_CIPHER_CTX handle as a "cipher 
template" - i.e. select a cipher and set a key; foreach data block clone the 
context, set IV and decrypt.

Maybe I was doing it wrong anyway 
:)______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to