Hi Thomas, Thx for the reply, I will give it a try. BR, dhaval On Mon, Sep 24, 2012 at 10:05 AM, Thomas Leavy <[email protected]> wrote:
> If you are streaming media your best bet would be to use CTR mode. CTR > mode works more like a stream cipher because the cipher text is the same > size as the plain text. It also does not rely on a specific block size and > can handle dropped packets if you are going UDP. > > The best solution client side is to implement a circular buffer. Pick a > packet size the works for you and process packets of that size as that > amount of data becomes available. With CTR it shouldn't matter what size > blocks the server encrypts in as compared to what size blocks you decrypt > in. > > Thomas Leavy > IT and Networking Consultant > > On Sep 24, 2012, at 12:20 AM, dhaval bc <[email protected]> wrote: > > > hi all, > > > > I am testing decryption of aes-cbc-128 without padding mode using > openssl EVP API's, > > On the server side Encryption of media stream is with WideWine Crypto > solution. > > Problem which I am facing is that only the packets with size equal to > multiple of block size are > > getting decrypted, while the one's which are not are only partially > decrypted and the remaining un-decrypted packet is placed in a partial > buffer(Decryption Fails). Is there any way by which I can achieve > decryption of this un-decrypted partial buffer??. > > > > BR, > > Dhaval > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List [email protected] > Automated List Manager [email protected] >
