Am facing similar issue with OpenSSL android. Any insight will be useful Sent from my iPhone
> On Mar 17, 2014, at 4:48 AM, "Tayade, Nilesh" <nilesh.tay...@netscout.com> > wrote: > > > Sent via CanvasHD > > -------- Original Message -------- > Subject: AES_cbc_encrypt - core dump in decryption. > From: "Tayade, Nilesh" <nilesh.tay...@netscout.com> > To: openssl-us...@openssl.org > CC: > > > > Hi, > > I am facing a core dump in AES_cbc_encrypt() while decrypting the data with > OpenSSL 1.0.1e library. > I made sure, the encrypted data length is multiple of AES_BLOCK_SIZE > (16bytes) and also there is sufficient amount of buffer available for > decryption. > The encrypted buffer pointer is also valid. Still there is a corruption and > entire stack gets overwritten by junk. > > I tried retrieving the keys those are used in decryption (the values set in > AES_KEY structure) and it looks like: > > AES_KEY = { > rd_key = {0x3c246444, 0x80cb090a, 0x70689420, ..., ..., }, > rounds = 0xd464b404 > }, > > The rounds value appears to be bigger. Could someone please advise if the > rounds value could be this big or this is again something junk? > I am still trying to understand the AES algo. Any quick help will be > appreciated. > > -- > Thanks, > Nilesh > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-us...@openssl.org > Automated List Manager majord...@openssl.org > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > Development Mailing List openssl-dev@openssl.org > Automated List Manager majord...@openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org