If you are streaming media your best bet would be to use CTR mode. CTR mode 
works more like a stream cipher because the cipher text is the same size as the 
plain text. It also does not rely on a specific block size and can handle 
dropped packets if you are going UDP. 

The best solution client side is to implement a circular buffer. Pick a packet 
size the works for you and process packets of that size as that amount of data 
becomes available. With CTR it shouldn't matter what size blocks the server 
encrypts in as compared to what size blocks you decrypt in. 

Thomas Leavy
IT and Networking Consultant

On Sep 24, 2012, at 12:20 AM, dhaval bc <dhava...@gmail.com> wrote:

> hi all,
> 
> I am testing decryption of aes-cbc-128 without padding mode using openssl EVP 
> API's,
> On the server side Encryption of media stream is with WideWine Crypto 
> solution.
> Problem which I am facing is that only the packets with size equal to 
> multiple of block size are
> getting decrypted, while the one's which are not are only partially decrypted 
> and the remaining un-decrypted packet is placed in a partial 
> buffer(Decryption Fails). Is there any way by which I can achieve decryption 
> of this un-decrypted partial buffer??.
> 
> BR,
> Dhaval
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to