diff options
author | Geir Istad <gistad@cisco.com> | 2017-03-20 19:05:52 +0100 |
---|---|---|
committer | Geir Istad <gistad@cisco.com> | 2017-03-21 06:12:35 +0100 |
commit | 8c54918fc53e99472f51fd1743480e7efbef63ce (patch) | |
tree | 7308ba9db3b962aee6bb59c0b7c425754daf0870 /srtp | |
parent | a81bf0b88d71e1abbfc92f2175aad0dafd7226b1 (diff) | |
download | libsrtp2-8c54918fc53e99472f51fd1743480e7efbef63ce.tar.gz |
srtp.c: Update draft reference to corresponding section in RFC7714
"For the AEAD_AES_128_GCM algorithm, this keystream MUST be generated in
the manner defined in [RFC6904], using the AES Counter Mode (AES-CM)
transform. For the AEAD_AES_256_GCM algorithm, the keystream MUST be
generated in the manner defined for the AES_256_CM transform. The
originator must perform any required header extension encryption before
the AEAD algorithm is invoked."
Diffstat (limited to 'srtp')
-rw-r--r-- | srtp/srtp.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/srtp/srtp.c b/srtp/srtp.c index 0530941..ba500a6 100644 --- a/srtp/srtp.c +++ b/srtp/srtp.c @@ -1000,7 +1000,7 @@ srtp_stream_init_keys(srtp_stream_ctx_t *srtp, srtp_master_key_t *master_key, if (session_keys->rtp_xtn_hdr_cipher->type != session_keys->rtp_cipher->type) { /* With GCM ciphers, the header extensions are still encrypted using the corresponding ICM cipher. */ - /* See https://tools.ietf.org/html/draft-ietf-avtcore-srtp-aes-gcm-17#section-8.3 */ + /* See https://tools.ietf.org/html/rfc7714#section-8.3 */ uint8_t tmp_xtn_hdr_key[MAX_SRTP_KEY_LEN]; rtp_xtn_hdr_keylen = srtp_cipher_get_key_length(session_keys->rtp_xtn_hdr_cipher); rtp_xtn_hdr_base_key_len = base_key_length(session_keys->rtp_xtn_hdr_cipher->type, |