Sent via CanvasHD

-------- Original Message --------
Subject: AES_cbc_encrypt - core dump in decryption.
From: "Tayade, Nilesh" <nilesh.tay...@netscout.com>
To: openssl-us...@openssl.org
CC:



Hi,

I am facing a core dump in AES_cbc_encrypt() while decrypting the data with 
OpenSSL 1.0.1e library.
I made sure, the encrypted data length is multiple of AES_BLOCK_SIZE (16bytes) 
and also there is sufficient amount of buffer available for decryption.
The encrypted buffer pointer is also valid. Still there is a corruption and 
entire stack gets overwritten by junk.

I tried retrieving the keys those are used in decryption (the values set in 
AES_KEY structure)  and it looks like:

AES_KEY = {
        rd_key = {0x3c246444, 0x80cb090a, 0x70689420, ..., ..., },
        rounds = 0xd464b404
      },

The rounds value appears to be bigger. Could someone please advise if the 
rounds value could be this big or this is again something junk?
I am still trying to understand the AES algo. Any quick help will be 
appreciated.

--
Thanks,
Nilesh
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-us...@openssl.org
Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to