Hi Thomas,
Thx for the reply, I will give it a try.
BR,
dhaval

On Mon, Sep 24, 2012 at 10:05 AM, Thomas Leavy <[email protected]> wrote:

> If you are streaming media your best bet would be to use CTR mode. CTR
> mode works more like a stream cipher because the cipher text is the same
> size as the plain text. It also does not rely on a specific block size and
> can handle dropped packets if you are going UDP.
>
> The best solution client side is to implement a circular buffer. Pick a
> packet size the works for you and process packets of that size as that
> amount of data becomes available. With CTR it shouldn't matter what size
> blocks the server encrypts in as compared to what size blocks you decrypt
> in.
>
> Thomas Leavy
> IT and Networking Consultant
>
> On Sep 24, 2012, at 12:20 AM, dhaval bc <[email protected]> wrote:
>
> > hi all,
> >
> > I am testing decryption of aes-cbc-128 without padding mode using
> openssl EVP API's,
> > On the server side Encryption of media stream is with WideWine Crypto
> solution.
> > Problem which I am facing is that only the packets with size equal to
> multiple of block size are
> > getting decrypted, while the one's which are not are only partially
> decrypted and the remaining un-decrypted packet is placed in a partial
> buffer(Decryption Fails). Is there any way by which I can achieve
> decryption of this un-decrypted partial buffer??.
> >
> > BR,
> > Dhaval
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [email protected]
> Automated List Manager                           [email protected]
>

Reply via email to