I have a problem when trying to decrypt a presumably valid ESP packet using AES GCM. I have all the values needed but when trying to apply, whireshark does nothing.. It does not even try to attempt to decrypt. I have tried the same using CBC (with different values ofc) and successfully managed to decrypt it. Is there a reason for this? Is AES GCM not fully implemented? Is there an extra option of some kind I need to set?
asked 02 Aug '16, 04:59
solved .. the encryption key must be 36 bytes, the first 32 is the key and the last 4 is the salt value
answered 02 Aug '16, 05:24