Skip to content

Commit 93bb18e

Browse files
authored
Remove use of MKI in srtp client. (#1489)
1 parent 347b593 commit 93bb18e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

src/net/DtlsSrtp/DtlsSrtpClient.cs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -123,9 +123,9 @@ public DtlsSrtpClient(TlsCrypto crypto, Certificate certificateChain, Asymmetric
123123
{
124124
SecureRandom random = new SecureRandom();
125125
int[] protectionProfiles = { SrtpProtectionProfile.SRTP_AES128_CM_HMAC_SHA1_80 };
126-
byte[] mki = new byte[(SrtpParameters.SRTP_AES128_CM_HMAC_SHA1_80.GetCipherKeyLength() + SrtpParameters.SRTP_AES128_CM_HMAC_SHA1_80.GetCipherSaltLength()) / 8];
127-
random.NextBytes(mki); // Reusing our secure random for generating the key.
128-
this.clientSrtpData = new UseSrtpData(protectionProfiles, mki);
126+
127+
// Note: the WebRTC spec states Master Key Identifier (MKI) is not used, see https://datatracker.ietf.org/doc/html/rfc8827#name-communications-security.
128+
this.clientSrtpData = new UseSrtpData(protectionProfiles, []);
129129
}
130130
else
131131
{

0 commit comments

Comments
 (0)