Hi,

I am facing a core dump in AES_cbc_encrypt() while decrypting the data with 
OpenSSL 1.0.1e library.
I made sure, the encrypted data length is multiple of AES_BLOCK_SIZE (16bytes) 
and also there is sufficient amount of buffer available for decryption.
The encrypted buffer pointer is also valid. Still there is a corruption and 
entire stack gets overwritten by junk.

I tried retrieving the keys those are used in decryption (the values set in 
AES_KEY structure)  and it looks like:

AES_KEY = {
        rd_key = {0x3c246444, 0x80cb090a, 0x70689420, ..., ..., }, 
        rounds = 0xd464b404
      },

The rounds value appears to be bigger. Could someone please advise if the 
rounds value could be this big or this is again something junk? 
I am still trying to understand the AES algo. Any quick help will be 
appreciated.

--
Thanks,
Nilesh
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to