The implementation for a SRTP cryptographic context. More...
#include <CryptoContext.h>
The implementation for a SRTP cryptographic context.
This class holds data and provides functions that implement a cryptographic context for SRTP, Refer to RFC 3711, chapter 3.2 for some more detailed information about the SRTP cryptographic context.
Each SRTP cryptographic context maintains a RTP source identified by its SSRC. Thus you can independently protect each source inside a RTP session.
Key management mechanisms negotiate the parameters for the SRTP cryptographic context, such as master key, key length, authentication length and so on. The key management mechanisms are not part of SRTP. Refer to MIKEY (RFC 3880) or to Phil Zimmermann's ZRTP protocol (draft-zimmermann-avt-zrtp-01). After key management negotiated the data the application can setup the SRTP cryptographic context and enable SRTP processing.
Currently this implementation supports RTP only, not RTCP.
Definition at line 76 of file CryptoContext.h.
Constructor for empty SRTP cryptographic context.
This constructor creates an empty SRTP cryptographic context were all algorithms are set to the null algorithm, that is no SRTP processing is performed.
Constructor for an active SRTP cryptographic context.
This constructor creates an active SRTP cryptographic context were algorithms are enabled, keys are computed and so on. This SRTP cryptographic context can protect a RTP SSRC stream.
SrtpEncryptionNull, SrtpEncryptionAESCM, SrtpEncryptionAESF8
. See chapter 4.1.1 for AESCM (Counter mode) and 4.1.2 for AES F8 mode. SrtpEncryptionNull, SrtpAuthenticationSha1Hmac
. The only active algorithm here is SHA1 HMAC, a SHA1 based hashed message authentication code as defined in RFC 2104.masterKeyLength
bytes. Refer to chapter 3.2.1 of the RFC about the role of the master key.Destructor.
Cleans the SRTP cryptographic context.
Check for packet replay.
The method check if a received packet is either to old or was already received.
The method supports a 64 packet history relative the the given sequence number.
true
if no replay, false
if packet is too old ar was already received. Perform key derivation according to SRTP specification.
This method computes the session key, session authentication key and the session salt key. This method must be called at least once after the SRTP Cryptograhic context was set up.
guessIndex
method. Get the length of the MKI in bytes.
Definition at line 314 of file CryptoContext.h.
Get the Roll-Over-Counter.
Ths method get the upper 32 bit of the 48 bit SRTP packet index (the roll-over-part)
Definition at line 204 of file CryptoContext.h.
Get the SSRC of this SRTP Cryptograhic context.
Definition at line 323 of file CryptoContext.h.
Get the length of the SRTP authentication tag in bytes.
Definition at line 304 of file CryptoContext.h.
Compute (guess) the new SRTP index based on the sequence number of a received RTP packet.
The method uses the algorithm show in RFC3711, Appendix A, to compute the new index.
Derive a new Crypto Context for use with a new SSRC.
This method returns a new Crypto Context initialized with the data of this crypto context. Replacing the SSRC, Roll-over-Counter, and the key derivation rate the application cab use this Crypto Context to encrypt / decrypt a new stream (Synchronization source) inside one RTP session.
Before the application can use this crypto context it must call the deriveSrtpKeys
method.
Set the Roll-Over-Counter.
Ths method sets the upper 32 bit of the 48 bit SRTP packet index (the roll-over-part)
Definition at line 192 of file CryptoContext.h.
Compute the authentication tag.
Compute the authentication tag according the the paramters in the SRTP Cryptograhic context.
tagLength
bytes. Perform SRTP encryption.
This method encrypts and decrypts SRTP payload data. Plain data gets encrypted, encrypted data get decrypted.
guessIndex
method.Update the SRTP packet index.
Call this method after all checks were successful. See chapter 3.3.1 in the RFC when to update the ROC and ROC processing.
Definition at line 381 of file CryptoContext.h.
Definition at line 392 of file CryptoContext.h.
Definition at line 383 of file CryptoContext.h.
Definition at line 380 of file CryptoContext.h.
Definition at line 382 of file CryptoContext.h.
Definition at line 393 of file CryptoContext.h.
Definition at line 358 of file CryptoContext.h.
Definition at line 376 of file CryptoContext.h.
Definition at line 374 of file CryptoContext.h.
Definition at line 378 of file CryptoContext.h.
Definition at line 360 of file CryptoContext.h.
Definition at line 365 of file CryptoContext.h.
Definition at line 366 of file CryptoContext.h.
Definition at line 368 of file CryptoContext.h.
Definition at line 367 of file CryptoContext.h.
Definition at line 369 of file CryptoContext.h.
Definition at line 370 of file CryptoContext.h.
Definition at line 355 of file CryptoContext.h.
Definition at line 354 of file CryptoContext.h.
Definition at line 375 of file CryptoContext.h.
Definition at line 373 of file CryptoContext.h.
Definition at line 377 of file CryptoContext.h.
Definition at line 363 of file CryptoContext.h.
Definition at line 357 of file CryptoContext.h.
Definition at line 359 of file CryptoContext.h.
Definition at line 386 of file CryptoContext.h.
Definition at line 384 of file CryptoContext.h.
Definition at line 352 of file CryptoContext.h.
Definition at line 385 of file CryptoContext.h.
Definition at line 353 of file CryptoContext.h.