Sent via CanvasHD
-------- Original Message --------
Subject: AES_cbc_encrypt - core dump in decryption.
From: "Tayade, Nilesh" <[email protected]>
To: [email protected]
CC:
Hi,
I am facing a core dump in AES_cbc_encrypt() while decrypting the data with
OpenSSL 1.0.1e library.
I made sure, the encrypted data length is multiple of AES_BLOCK_SIZE (16bytes)
and also there is sufficient amount of buffer available for decryption.
The encrypted buffer pointer is also valid. Still there is a corruption and
entire stack gets overwritten by junk.
I tried retrieving the keys those are used in decryption (the values set in
AES_KEY structure) and it looks like:
AES_KEY = {
rd_key = {0x3c246444, 0x80cb090a, 0x70689420, ..., ..., },
rounds = 0xd464b404
},
The rounds value appears to be bigger. Could someone please advise if the
rounds value could be this big or this is again something junk?
I am still trying to understand the AES algo. Any quick help will be
appreciated.
--
Thanks,
Nilesh
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [email protected]
Automated List Manager [email protected]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [email protected]
Automated List Manager [email protected]