I have a problem when trying to decrypt a presumably valid ESP packet using AES GCM. I have all the values needed but when trying to apply, whireshark does nothing.. It does not even try to attempt to decrypt. I have tried the same using CBC (with different values ofc) and successfully managed to decrypt it. Is there a reason for this? Is AES GCM not fully implemented? Is there an extra option of some kind I need to set? asked 02 Aug '16, 04:59 mathildh |
One Answer:
solved .. the encryption key must be 36 bytes, the first 32 is the key and the last 4 is the salt value answered 02 Aug '16, 05:24 mathildh |