On 11 December 2013 16:14, Yanchuan Nian via RT <r...@openssl.org> wrote: > hi guys, > There is a bug in the implementation of AES_cbc_encrypt() on x86 architecture. > If the length of plaintext is not multiple of 16 bytes (must greater than 16), > the decoded message is different from the original.
If you are going to use the low level AES routines rather than the high level EVP interface then you must also handle all padding issues yourself. It is undefined behaviour to call AES_cbc_encrypt when the input is not a multiple of the block size. This has been previously discussed here: https://rt.openssl.org/Ticket/Display.html?id=3182&user=guest&pass=guest Unless there's a really good reason to use the low level routines I would suggest EVP is what you should be using. Matt ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org