Hello Harald,
Good morning and thank you for your reply. I have gone through RFC5764 and finally, I believe that I have extracted the keys by adding some code into code base. But, I am facing two issues while decrypting the .pcap using these keys using rtp_decoder (libsrtp). Please find the below data:
Extracted Keys:
Server SRTP Master Key: 031bc5fed658271e4f612240074c3aee6b2b9073fa1c77e0c28169524e425287
Server SRTP Master Salt: efdf044df29da031490b4ee9
Client SRTP Master Key: 30fe74f23edcd7816e6609cc5f81400f146ce6b557657fcc6383aeeb17510de4
Client SRTP Master Salt: 55950d4e9b809416b9e681a4
libsrtp/test$ ./rtp_decoder -a -t 10 -e 256 -k "031bc5fed658271e4f612240074c3aee6b2b9073fa1c77e0c28169524e425287efdf044df29da031490b4ee9" < dev2.pcap > dev.txt
Using libsrtp3 3.0.0-pre [0x3000000]
security services: confidentiality message authentication
setting tag len 10
error: too few digits in key/salt (should be 92 digits, found 88)
./rtp_decoder -a -t 10 -e 256 -b "30fe74f23edcd7816e6609cc5f81400f146ce6b557657fcc6383aeeb17510de455950d4e9b809416b9e681a4" < dev2.pcap > dev.txt
Using libsrtp3 3.0.0-pre [0x3000000]
security services: confidentiality message authentication
setting tag len 10
set master key/salt to df47deef87f6dde75c77bf35e9eebad3d71ce5ff35e34d1fd78e9c7ba6f9e7be/b9edf71ceb7f3769e79bd7be75d1
Starting decoder
*** buffer overflow detected ***: terminated