On 02/28/18 17:25, Viktor Dukhovni wrote:
> 
> 
>> On Feb 28, 2018, at 5:39 AM, Andy Polyakov <ap...@openssl.org> wrote:
>>
>> I'd like to request more opinions on
>> https://github.com/openssl/openssl/pull/5427. Key dispute question is
>> whether or not following fragment should work
>>
>>     unsigned char *inp = buf, *out = buf;
>>
>>     for (i = 0; i < sizeof(buf); i++) {
>>         EVP_EncryptUpdate(ctx, out, &outl, inp++, 1);
>>      out += outl;
>>     }
> 
> This should work.
> 

It does only work, if you know that ctx->buf_len == 0
before the loop is entered.

It does not work with CFB1, CCM, XTS and WRAP modes.

There is no access function to get the internal state of the cipher
context.

I the documentation does not cover this at all, and most of
all I really wonder how the wording could look like.


Bernd.
_______________________________________________
openssl-project mailing list
openssl-project@openssl.org
https://mta.openssl.org/mailman/listinfo/openssl-project

Reply via email to