Hi, I am facing a core dump in AES_cbc_encrypt() while decrypting the data with OpenSSL 1.0.1e library. I made sure, the encrypted data length is multiple of AES_BLOCK_SIZE (16bytes) and also there is sufficient amount of buffer available for decryption. The encrypted buffer pointer is also valid. Still there is a corruption and entire stack gets overwritten by junk.
I tried retrieving the keys those are used in decryption (the values set in AES_KEY structure) and it looks like: AES_KEY = { rd_key = {0x3c246444, 0x80cb090a, 0x70689420, ..., ..., }, rounds = 0xd464b404 }, The rounds value appears to be bigger. Could someone please advise if the rounds value could be this big or this is again something junk? I am still trying to understand the AES algo. Any quick help will be appreciated. -- Thanks, Nilesh ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org