Yes it does, thank you Richard! Regards, Terry
> On Nov 6, 2018, at 11:12 PM, Richard Levitte <[email protected]> wrote: > > In message > <canyoxomfzymgsac7c058hb+jish9xwcpzezglwfbvms1qa-...@mail.gmail.com> on Tue, > 6 Nov 2018 14:46:52 -0800, Terry Chong <[email protected]> said: > >> Hi, I am planning on using EVP_* APIs to encrypt/decrypt my data. One thing >> I am wondering >> about is whether I can do in-place encryption, meaning I don't have to pay >> the price of an extra >> memory buffer to store my cipher text and a potential memcpy back to the >> source buffer. >> >> I tried that with the EVP_* APIs by essentially passing in the same buffer >> to the plaintext and cipher >> text input pointers, and it seems to work. I am using AES XTS mode, and I >> understand that that >> may not work if I were to use a different mode. >> >> I am wondering if this behavior for AES XTS that allows in-place >> encryption/decryption is going to >> stay? > > test/evp_test.c does a number of tests on all ciphers we have test > vectors for, including overlapping buffers (i.e. input and output > buffer are the same). So that is to say that if that behaviour ever > stopped working, we would certainly notice. > > Does that help? > > Cheers, > Richard > > -- > Richard Levitte [email protected] > OpenSSL Project http://www.openssl.org/~levitte/ > -- > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
