srtpdec
gstrtpdec acts as a decoder that removes security from SRTP and SRTCP packets (encryption and authentication) and out RTP and RTCP. It receives packet of type 'application/x-srtp' or 'application/x-srtcp' on its sink pad, and outs packets of type 'application/x-rtp' or 'application/x-rtcp' on its source pad.
For each packet received, it checks if the internal SSRC is in the list of streams already in use. If this is not the case, it sends a signal to the user to get the needed parameters to create a new stream : master key, encryption and authentication mechanisms for both RTP and RTCP. If the user can't provide those parameters, the buffer is dropped and a warning is emitted.
This element uses libsrtp library. The encryption and authentication mechanisms available are :
Encryption
- AES_ICM 256 bits (maximum security)
- AES_ICM 128 bits (default)
- NULL
Authentication
- HMAC_SHA1 80 bits (default, maximum protection)
- HMAC_SHA1 32 bits
- NULL
Note that for SRTP protection, authentication is mandatory (non-null) if encryption is used (non-null).
Each packet received is first analysed (checked for valid SSRC) then its buffer is unprotected with libsrtp, then pushed on the source pad. If protection failed or the stream could not be created, the buffer is dropped and a warning is emitted.
When the maximum usage of the master key is reached, a soft-limit signal is sent to the user, and new parameters (master key) are needed in return. If the hard limit is reached, a flag is set and every subsequent packet is dropped, until a new key is set and the stream has been updated.
If a stream is to be shared between multiple clients the SRTP rollover counter for a given SSRC must be set in the caps "roc" field when the request-key signal is emitted by the decoder. The rollover counters should have been transmitted by a signaling protocol by some other means. If no rollover counter is provided by the user, 0 is used by default.
It is possible to receive a stream protected by multiple master keys, each buffer then contains a Master Key Identifier (MKI) to identify which key was used for this buffer. If multiple keys are needed, the first key can be specified in the caps as "srtp-key=(buffer)key1data, mki=(buffer)mki1data", then the second one can be given in the same caps as "srtp-key2=(buffer)key2data, mki2=(buffer)mki2data", and more can be added up to 15.
Example pipelines
gst-launch-1.0 udpsrc port=5004 caps='application/x-srtp, payload=(int)8, ssrc=(uint)1356955624, srtp-key=(buffer)012345678901234567890123456789012345678901234567890123456789, srtp-cipher=(string)aes-128-icm, srtp-auth=(string)hmac-sha1-80, srtcp-cipher=(string)aes-128-icm, srtcp-auth=(string)hmac-sha1-80' ! srtpdec ! rtppcmadepay ! alawdec ! pulsesink
Receive PCMA SRTP packets through UDP using caps to specify master key and protection.
gst-launch-1.0 audiotestsrc ! alawenc ! rtppcmapay ! 'application/x-rtp, payload=(int)8, ssrc=(uint)1356955624' ! srtpenc key="012345678901234567890123456789012345678901234567890123456789" ! udpsink port=5004
Send PCMA SRTP packets through UDP, nothing how the SSRC is forced so that the receiver will recognize it.
Hierarchy
GObject ╰──GInitiallyUnowned ╰──GstObject ╰──GstElement ╰──srtpdec
Factory details
Authors: – Gabriel Millaire
Classification: – Filter/Network/SRTP
Rank – none
Plugin – srtp
Package – GStreamer Bad Plug-ins
Pad Templates
Signals
hard-limit
GstCaps * hard_limit_callback (GstElement * gstsrtpdec, guint ssrc, gpointer udata)
def hard_limit_callback (gstsrtpdec, ssrc, udata):
#python callback for the 'hard-limit' signal
function hard_limit_callback(gstsrtpdec: GstElement * gstsrtpdec, ssrc: guint ssrc, udata: gpointer udata): {
// javascript callback for the 'hard-limit' signal
}
Signal emitted when the stream with ssrc has reached the hard limit of utilisation of it's master encryption key. User should provide a new key and new RTP and RTCP encryption ciphers and authentication, and return them wrapped in a GstCaps. If user could not provide those parameters or signal is not answered, the buffers of this stream will be dropped.
Parameters:
gstsrtpdec
–
the element on which the signal is emitted
ssrc
–
The unique SSRC of the stream
udata
–
Flags: Run Last
request-key
GstCaps * request_key_callback (GstElement * gstsrtpdec, guint ssrc, gpointer udata)
def request_key_callback (gstsrtpdec, ssrc, udata):
#python callback for the 'request-key' signal
function request_key_callback(gstsrtpdec: GstElement * gstsrtpdec, ssrc: guint ssrc, udata: gpointer udata): {
// javascript callback for the 'request-key' signal
}
Signal emitted to get the parameters relevant to stream with ssrc. User should provide the key and the RTP and RTCP encryption ciphers and authentication, and return them wrapped in a GstCaps.
Parameters:
gstsrtpdec
–
the element on which the signal is emitted
ssrc
–
The unique SSRC of the stream
udata
–
Flags: Run Last
soft-limit
GstCaps * soft_limit_callback (GstElement * gstsrtpdec, guint ssrc, gpointer udata)
def soft_limit_callback (gstsrtpdec, ssrc, udata):
#python callback for the 'soft-limit' signal
function soft_limit_callback(gstsrtpdec: GstElement * gstsrtpdec, ssrc: guint ssrc, udata: gpointer udata): {
// javascript callback for the 'soft-limit' signal
}
Signal emitted when the stream with ssrc has reached the soft limit of utilisation of it's master encryption key. User should provide a new key and new RTP and RTCP encryption ciphers and authentication, and return them wrapped in a GstCaps.
Parameters:
gstsrtpdec
–
the element on which the signal is emitted
ssrc
–
The unique SSRC of the stream
udata
–
Flags: Run Last
Action Signals
clear-keys
g_signal_emit_by_name (gstsrtpdec, "clear-keys");
ret = gstsrtpdec.emit ("clear-keys")
let ret = gstsrtpdec.emit ("clear-keys");
Clear the internal list of streams
Parameters:
the element on which the signal is emitted
remove-key
g_signal_emit_by_name (gstsrtpdec, "remove-key", ssrc);
ret = gstsrtpdec.emit ("remove-key", ssrc)
let ret = gstsrtpdec.emit ("remove-key", ssrc);
Removes keys for a specific SSRC
Parameters:
the element on which the signal is emitted
The SSRC for which to remove the key.
Properties
replay-window-size
“replay-window-size” guint
Size of the replay protection window
Flags : Read / Write
Default value : 128
stats
“stats” GstStructure *
Various statistics
Flags : Read
Default value :
application/x-srtp-decoder-stats, streams=(int)< >, recv-count=(uint)0, recv-drop-count=(uint)0;
The results of the search are