Hopefully someone else on the list can speak to your further questions….

--Jeremy


On Tue, May 13, 2014 at 12:42 PM, Tom stone <stone...@gmail.com> wrote:

> Jeremy,
>
> Thank you for your quick response.  I am definitely interested in
> additional details.  If you know who I should contact that would be great.
> Do you know whether this only effects simple file encryption or is it
> general to the gcm mode, ie. would it effect tcp/ip traffic?
>
> Thanks
>
>
>
> On Tue, May 13, 2014 at 12:26 PM, Jeremy Gray <jrg...@gmail.com> wrote:
>
>> I had exactly this issue a few days ago. Turns out  that there's a bug in
>> setting up the GCM cipher, so the enc part is not working correctly for
>> GCM. More than that, someone else will have to elaborate if you are
>> interested.
>>
>> --Jeremy
>>
>>
>> On Tue, May 13, 2014 at 12:06 PM, Tom stone <stone...@gmail.com> wrote:
>>
>>>  Using openssl-1.0.1g command line for simple file
>>> encryption/decryption, when I issue the commands
>>>
>>> openssl enc -aes-256-cbc -k secret -in file.txt -out file.ssl
>>> openssl enc -d -aes-256-cbc -k secret -in file.ssl
>>>
>>> The contents of file.txt go to stdout as expected. However, when I issue
>>> the commands
>>>
>>> openssl enc -aes-256-gcm -k secret -in file.txt -out file.ssl
>>> openssl enc -d -aes-256-gcm -k secret -in file.ssl
>>>
>>> The contents of file.txt go to stdout but the string "bad decrypt" goes
>>> to stderr.
>>>
>>> Am I missing something or is there a bug in the openssl gcm
>>> implementation?
>>>
>>> I have tried substituting "-pass pass:secret" for "-k secret" and get
>>> the same results.
>>>
>>> If I had to venture a guess, I would expect that the decrypt option
>>> verifies that the input represents a full block of data and throws the
>>> error when the gcm encrypted file does not end on a block boundary.
>>>
>>>
>>>
>>
>

Reply via email to