The Secure Real-Time Transport Protocol (SRTP) stream requires the sender and receiver to maintain the cryptographic context of the packets. SRTP uses two types of keys: master keys and session keys for packet encryption and decryption. Master key is a random bit string. The session keys are derived from the master key. The Session key is used directly in cryptographic transform for encryption or message authentication.
A single master key provides keying material for confidentiality and integrity protection of both SRTP and the corresponding SRTCP stream. For each master key, a count of processed packets is maintained. There is a limit on the number of packets processed by a single master key. SRTCP maintains a separate counter for master key even if the master key is the same as that for SRTP. The counter counts the number of SRTCP packets processed with the key.
The SRTP stack checks for the count of packet processed when the RTP/RTCP packets are encrypted or decrypted. If the number of packets processed is maximum, the master key status is identified as stale. The SRTP notifies the SRTP client of the master key status. This is Notifying the Master Key Expiry.
The SRTP stack can request for a new master key(ReKey) even before the master key status is identified as stale.This is ReKey request.
An SRTP session must be created and initialized before an application requests for a RTP/RTCP packet decryption and encryption.
The two variants of the API SRTPMasterKeyStaleEvent() must be implemented by the application.
SRTP stack notifies the SRTP client of the master key expiry state.
SRTP stack requests for ReKey.
Copyright ©2010 Nokia Corporation and/or its subsidiary(-ies).
All rights
reserved. Unless otherwise stated, these materials are provided under the terms of the Eclipse Public License
v1.0.