aboutsummaryrefslogtreecommitdiff
path: root/srtp
diff options
context:
space:
mode:
authorGeir Istad <gistad@cisco.com>2017-03-20 19:05:52 +0100
committerGeir Istad <gistad@cisco.com>2017-03-21 06:12:35 +0100
commit8c54918fc53e99472f51fd1743480e7efbef63ce (patch)
tree7308ba9db3b962aee6bb59c0b7c425754daf0870 /srtp
parenta81bf0b88d71e1abbfc92f2175aad0dafd7226b1 (diff)
downloadlibsrtp2-8c54918fc53e99472f51fd1743480e7efbef63ce.tar.gz
srtp.c: Update draft reference to corresponding section in RFC7714
"For the AEAD_AES_128_GCM algorithm, this keystream MUST be generated in the manner defined in [RFC6904], using the AES Counter Mode (AES-CM) transform. For the AEAD_AES_256_GCM algorithm, the keystream MUST be generated in the manner defined for the AES_256_CM transform. The originator must perform any required header extension encryption before the AEAD algorithm is invoked."
Diffstat (limited to 'srtp')
-rw-r--r--srtp/srtp.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/srtp/srtp.c b/srtp/srtp.c
index 0530941..ba500a6 100644
--- a/srtp/srtp.c
+++ b/srtp/srtp.c
@@ -1000,7 +1000,7 @@ srtp_stream_init_keys(srtp_stream_ctx_t *srtp, srtp_master_key_t *master_key,
if (session_keys->rtp_xtn_hdr_cipher->type != session_keys->rtp_cipher->type) {
/* With GCM ciphers, the header extensions are still encrypted using the corresponding ICM cipher. */
- /* See https://tools.ietf.org/html/draft-ietf-avtcore-srtp-aes-gcm-17#section-8.3 */
+ /* See https://tools.ietf.org/html/rfc7714#section-8.3 */
uint8_t tmp_xtn_hdr_key[MAX_SRTP_KEY_LEN];
rtp_xtn_hdr_keylen = srtp_cipher_get_key_length(session_keys->rtp_xtn_hdr_cipher);
rtp_xtn_hdr_base_key_len = base_key_length(session_keys->rtp_xtn_hdr_cipher->type,