What rtp_decoder program is this? It’s not from Wireshark, so we’re most likely not familiar with it.
> On 7 May 2025, at 08:23, Chandramouli P <mouli...@gmail.com> wrote: > > Hello, > > Any help would be appreciated. Thank you. > > Best Regards, > Chandramouli. > > > On Tue, May 6, 2025 at 5:35 PM Chandramouli P <mouli...@gmail.com > <mailto:mouli...@gmail.com>> wrote: >> Hello, >> >> I am trying to decrypt SRTP traffic of a WebRTC call. I captured keys using >> SSLKEYLOG and opened .pcap file in Wireshark and copied the fingerprint keys >> from SDP as below: >> >> a=setup:active >> a=fingerprint:sha-256 >> 38:B7:95:45:AE:A4:FA:3F:9E:05:42:29:46:03:6E:53:BD:66:8F:D3:12:FF:12:F8:60:5C:11:98:31:19:08:A6 >> Hex stream= >> 7368612d3235362033383a42373a39353a34353a41453a41343a46413a33463a39453a30353a34323a32393a34363a30333a36453a35333a42443a36363a38463a44333a31323a46463a31323a46383a36303a35433a31313a39383a33313a31393a30383a4136 >> Base64= >> c2hhLTI1NiA3Rjo4MzpCMjpDNTpDNDoyMjo5RDpFMTo3RToxNDoxQjo5QzowRjpDMjo0MDo3MDo3ODo3MzoxOTo0NzoxNjo4MzowRDo1RTpDRjo2QTpFMDpGNDo5MzozRjpBQzpFRA== >> >> a=setup:actpass >> a=fingerprint:sha-256 >> 7F:83:B2:C5:C4:22:9D:E1:7E:14:1B:9C:0F:C2:40:70:78:73:19:47:16:83:0D:5E:CF:6A:E0:F4:93:3F:AC:ED >> Hex stream= >> 7368612d3235362037463a38333a42323a43353a43343a32323a39443a45313a37453a31343a31423a39433a30463a43323a34303a37303a37383a37333a31393a34373a31363a38333a30443a35453a43463a36413a45303a46343a39333a33463a41433a4544 >> Base64= >> c2hhLTI1NiAzODpCNzo5NTo0NTpBRTpBNDpGQTozRjo5RTowNTo0MjoyOTo0NjowMzo2RTo1MzpCRDo2Njo4RjpEMzoxMjpGRjoxMjpGODo2MDo1QzoxMTo5ODozMToxOTowODpBNg== >> >> Now, after executing the below commands with both Hex stream (-k) and Base64 >> (-b), I am getting the below error: >> >> error: too many digits in key/salt (should be 92 hexadecimal digits, found >> 140) >> >> I am executing the command like below: >> >> ./rtp_decoder -a -t 10 -e 256 -k >> 7368612d3235362037463a38333a42323a43353a43343a32323a39443a45313a37453a31343a31423a39433a30463a43323a34303a37303a37383a37333a31393a34373a31363a38333a30443a35453a43463a36413a45303a46343a39333a33463a41433a4544 >> < pcap-original.pcap > output.txt >> >> ./rtp_decoder -a -t 10 -e 256 -b >> c2hhLTI1NiAzODpCNzo5NTo0NTpBRTpBNDpGQTozRjo5RTowNTo0MjoyOTo0NjowMzo2RTo1MzpCRDo2Njo4RjpEMzoxMjpGRjoxMjpGODo2MDo1QzoxMTo5ODozMToxOTowODpBNg== >> < pcap-original.pcap > output.txt >> >> Can anyone help to resolve this issue? Thanks in advance. >> >> Best Regards, >> Chandramouli. > _______________________________________________ > Wireshark-users mailing list -- wireshark-users@wireshark.org > To unsubscribe send an email to wireshark-users-le...@wireshark.org
_______________________________________________ Wireshark-users mailing list -- wireshark-users@wireshark.org To unsubscribe send an email to wireshark-users-le...@wireshark.org