Jeremy,

Thank you for your quick response.  I am definitely interested in
additional details.  If you know who I should contact that would be great.
Do you know whether this only effects simple file encryption or is it
general to the gcm mode, ie. would it effect tcp/ip traffic?

Thanks



On Tue, May 13, 2014 at 12:26 PM, Jeremy Gray <jrg...@gmail.com> wrote:

> I had exactly this issue a few days ago. Turns out  that there's a bug in
> setting up the GCM cipher, so the enc part is not working correctly for
> GCM. More than that, someone else will have to elaborate if you are
> interested.
>
> --Jeremy
>
>
> On Tue, May 13, 2014 at 12:06 PM, Tom stone <stone...@gmail.com> wrote:
>
>>  Using openssl-1.0.1g command line for simple file
>> encryption/decryption, when I issue the commands
>>
>> openssl enc -aes-256-cbc -k secret -in file.txt -out file.ssl
>> openssl enc -d -aes-256-cbc -k secret -in file.ssl
>>
>> The contents of file.txt go to stdout as expected. However, when I issue
>> the commands
>>
>> openssl enc -aes-256-gcm -k secret -in file.txt -out file.ssl
>> openssl enc -d -aes-256-gcm -k secret -in file.ssl
>>
>> The contents of file.txt go to stdout but the string "bad decrypt" goes
>> to stderr.
>>
>> Am I missing something or is there a bug in the openssl gcm
>> implementation?
>>
>> I have tried substituting "-pass pass:secret" for "-k secret" and get the
>> same results.
>>
>> If I had to venture a guess, I would expect that the decrypt option
>> verifies that the input represents a full block of data and throws the
>> error when the gcm encrypted file does not end on a block boundary.
>>
>>
>>
>

Reply via email to