On 11 December 2013 16:14, Yanchuan Nian via RT <r...@openssl.org> wrote:
> hi guys,
> There is a bug in the implementation of AES_cbc_encrypt() on x86 architecture.
> If the length of plaintext is not multiple of 16 bytes (must greater than 16),
> the decoded message is different from the original.

If you are going to use the low level AES routines rather than the
high level EVP interface then you must also handle all padding issues
yourself. It is undefined behaviour to call AES_cbc_encrypt when the
input is not a multiple of the block size.

This has been previously discussed here:
https://rt.openssl.org/Ticket/Display.html?id=3182&user=guest&pass=guest

Unless there's a really good reason to use the low level routines I
would suggest EVP is what you should be using.

Matt
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to