If you are streaming media your best bet would be to use CTR mode. CTR mode works more like a stream cipher because the cipher text is the same size as the plain text. It also does not rely on a specific block size and can handle dropped packets if you are going UDP.
The best solution client side is to implement a circular buffer. Pick a packet size the works for you and process packets of that size as that amount of data becomes available. With CTR it shouldn't matter what size blocks the server encrypts in as compared to what size blocks you decrypt in. Thomas Leavy IT and Networking Consultant On Sep 24, 2012, at 12:20 AM, dhaval bc <dhava...@gmail.com> wrote: > hi all, > > I am testing decryption of aes-cbc-128 without padding mode using openssl EVP > API's, > On the server side Encryption of media stream is with WideWine Crypto > solution. > Problem which I am facing is that only the packets with size equal to > multiple of block size are > getting decrypted, while the one's which are not are only partially decrypted > and the remaining un-decrypted packet is placed in a partial > buffer(Decryption Fails). Is there any way by which I can achieve decryption > of this un-decrypted partial buffer??. > > BR, > Dhaval ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org