DTCP Volume 1 Supplement G Mapping DTCP to WirelessHD (Informational Version)

Similar documents
DTCP Volume 1 Supplement E Mapping DTCP to IP (Informational Version)

Content Protection for Recordable Media Specification. SD Memory Card Book SD-SD (Separate Delivery) Audio Profile Part

Content Protection for Recordable Media Specification. SD Memory Card Book SD-Audio Part

Digital Transmission Content Protection 2 (DTCP2) Specification Volume 1 (Informational Version)

Digital Transmission Content Protection 2 (DTCP2) Specification Volume 1 (Informational Version)

Advanced Access Content System (AACS)

Advanced Access Content System (AACS) Signed CSS Book

Advanced Access Content System (AACS) Blu-ray Disc Pre-recorded Book

Advanced Access Content System (AACS) Blu-ray Disc Pre-recorded Book

Advanced Access Content System (AACS) Blu-ray Disc Prepared Video Book

ECMA-409. NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM. 2 nd Edition / June Reference number ECMA-123:2009

Bluetooth PC Card Transport Layer

TA Document SMPTE Time Code and Sample Count Transmission Protocol Ver.1.0

Advanced Access Content System (AACS)

Key Management Interoperability Protocol Crypto Profile Version 1.0

TA Document Specification of high-speed transmission of

RUNNING SPEED AND CADENCE SERVICE

Enhanced Serial Peripheral Interface (espi) ECN

EMV Contactless Specifications for Payment Systems

MF1ICS General description. Functional specification. 1.1 Key applications. 1.2 Anticollision. Energy. MIFARE card contacts La, Lb.

USB Feature Specification: Shared Endpoints

Intel Server Board S2600CW2S

TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2

Enhanced Serial Peripheral Interface (espi)

Intel Server Board S1200BTS

TA Document IEEE1394 Interface Implementation Test Specification DV Device 1.0

USB2 Debug Device A Functional Device Specification

OpenFlow Switch Errata

ARM CoreLink DPE-400 Data Parity Extension for NIC-400

Intel Server Board S2400SC

TA Document IEEE1394 Interface Implementation Guideline STB Device for Japanese Terrestrial Digital Broadcasting System 1.

HDMI Compliance Testing Policies and Procedures

TCG. TCG Storage Interface Interactions Specification. Specification Version 1.0. January 27, Contacts:

HAI Network Communication Protocol Description

TECHNICAL SPECIFICATION

PCI Express Label Specification and Usage Guidelines Revision 1.0

Test System Validation Guideline

Intel Server Board S5520HC

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

TA Document IEEE1394 Interface Implementation Test Specification STB Device for Japanese BS/CS Digital Broadcasting System 1.

TA Document Transmission of Rec. ITU-R BO.1294 System B Transport 1.0

Intel IXP400 Software Version 1.5

ECMA-385. NFC-SEC: NFCIP-1 Security Services and Protocol. 4 th Edition / June Reference number ECMA-123:2009

TCG. TCG Storage Core Spec Addendum: Secure Messaging. Specification Version 1.00 Revision August 5, 2015

Specification for TRAN Layer Services

Security Guide Release 4.0

TA Document Editorial Corrections to the Asynchronous Serial Bus Connections, Version 1.0

Oracle Hospitality OPERA Exchange Interface Cloud Authentication. October 2017

AV/C Disc Media Type Specification CD-DA

HUAWEI MU509-b HSDPA LGA Module V100R003. SSL Application Guide. Issue 01. Date

TA Document Test specification of self-test for AV Devices 1.0 (Point-to-Point Test and Network Test)

Exhibit A COMPLIANCE RULES FOR DVD+RW/+R RECORDERS. 1.1 No playback of CSS encrypted content from a DVD+RW/+R Disc

University of New Hampshire InterOperability Laboratory Ethernet in the First Mile Consortium

Intel Server Board S2600STB

Universal Serial Bus Content Security Method 4 Elliptic Curve Content Protection Protocols

Device Wire Adapter (DWA) Test Specification. Designed using the Certified Wireless USB Base Specification, Revision 1.0

Advanced Access Content System (AACS)

Intel IXP400 Digital Signal Processing (DSP) Software: Priority Setting for 10 ms Real Time Task

PMBus Power System Management Protocol Specification Part I General Requirements, Transport And Electrical Interface

EMV Contactless Specifications for Payment Systems

ITU-T J.288. Encapsulation of type length value (TLV) packet for cable transmission systems

LED Manager for Intel NUC

NICC ND 1411 V1.3.1 ( )

Manufacturing Instruction

Formats Professional Audio Ethernet AVB Functional and Interoperability Specification

GENERIC OBJECT EXCHANGE PROFILE

Requirements for WiMAX Peer-to-Peer (P2P) Services

TA Document IEEE1394 Interface Implementation Guideline TV Device for Japanese BS/CS Digital Broadcasting System 1.0

TA Document AV/C Bulletin Board Subunit General Specification Version 1.0

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients

NEXT DST CHANGE SERVICE

AACS RED LASER ADDENDUM FOR CPRM-COMPATIBLE OPTICAL DISC MEDIA TO THE AACS FINAL ADOPTER AGREEMENT

FOR TCG ACPI Specification

NXDN. NXDN Technical Specifications. Part 1: Air Interface. Sub-part B: Basic Operation. NXDN TS 1-B Version 1.3. November 2011.

Intel Server Board S1200V3RPO Intel Server System R1208RPOSHORSPP

Enterprise and Datacenter. SSD Form Factor. 1U Long Specification

DKAN0001A. Programmable Logic Controller for Character LCD Modules. Introduction. Application. State Machine. 23 July 2008

Advanced Access Content System (AACS) Blu-ray Disc Recordable Book. Advanced Access Content System: Blu-ray Disc Recordable Book

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

Presentation of the Interoperability specification for ICCs and Personal Computer Systems, Revision 2.0

AV/C Disc Media Type Specification MD audio

Network Working Group Request for Comments: Category: Standards Track August 2008

Intel Server Board S1200V3RPO Intel Server System R1208RPOSHORSPP

Using SRP for TLS Authentication

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Modes of operation for an n-bit block cipher

Intel Platform Innovation Framework for EFI SMBus Host Controller Protocol Specification. Version 0.9 April 1, 2004

ATAES132A Firmware Development Library. Introduction. Features. Atmel CryptoAuthentication USER GUIDE

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E

TCG Storage Work Group. Storage Certification Program. Program Version 1.0 Document Revision 1.22 March 16, Contact: Doug Gemmill, TCG CPM T C G

[MS-RTPRADEX]: RTP Payload for Redundant Audio Data Extensions. Intellectual Property Rights Notice for Open Specifications Documentation

Request for Comments: 3566 Category: Standards Track Intel September The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

RapidIO Interconnect Specification Part 3: Common Transport Specification

ESP-NOW User Guide Version 1.0 Copyright 2016

Interoperability Specification for ICCs and Personal Computer Systems

TA Document AV/C Disc Media Type Specification - SACD 1.2

PCI-X Protocol Addendum to the PCI Local Bus Specification Revision 2.0a

Intel Cache Acceleration Software for Windows* Workstation

Nokia Fax:

PRODUCT REQUIREMENTS

Architecture Specification

Transcription:

DTCP Volume 1 Supplement G Mapping DTCP to WirelessHD (Informational Version) Hitachi, Ltd. Intel Corporation Matsushita Electric Industrial Co., Ltd. Sony Corporation Toshiba Corporation Revision 1.0 July 11, 2008 2008-07-11 (Informational Version) Page 1

Preface Notice THIS DOCUMENT IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Hitachi, Intel, MEI, Sony, and Toshiba (collectively, the 5C ) disclaim all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Some portions of this document, identified as "Draft" are in an intermediate draft form and are subject to change without notice. Adopters and other users of this Specification are cautioned these portions are preliminary, and that products based on it may not be interoperable with the final version or subsequent versions thereof. Copyright 2008 by Hitachi, Ltd., Intel Corporation, Matsushita Electric Industrial Co., Ltd., Sony Corporation, and Toshiba Corporation (collectively, the 5C ). Third-party brands and names are the property of their respective owners. Intellectual Property Implementation of this specification requires a license from the Digital Transmission Licensing Administrator. Contact Information Feedback on this specification should be addressed to dtla-comment@dtcp.com. The Digital Transmission Licensing Administrator can be contacted at dtla-manager@dtcp.com. The URL for the Digital Transmission Licensing Administrator web site is: http://www.dtcp.com. Page 2 (Informational Version) 2008-07-11

Table of Contents PREFACE 2 Notice 2 Intellectual Property 2 Contact Information 2 VOLUME 1 SUPPLEMENT G DTCP MAPPING TO WIRELESSHD 5 V1SG.1 Introduction 5 V1SG.1.1 Related Documents 5 V1SG.1.2 Terms and Abbreviations 5 V1SG.2 Modifications to 4.2.3.2 Extended Format Fields (Optional Components of the Device Certificate) 6 V1SG.3 Modifications to Chapter 5 Restricted Authentication 6 V1SG.4 Modifications to Chapter 6 Content Channel Management Protection 6 V1SG.4.1 Modifications to 6.2.1 Exchange Keys 6 V1SG.4.2 Modifications to 6.2.2.2 K C for AES-128 6 V1SG.4.3 Exchange Key Expiration 7 V1SG.4.4 Detached status of WirelessHD devices 7 V1SG.4.5 N c Update Process 7 V1SG.4.6 Modification to 6.3.3 Odd/Even Bit 7 V1SG.4.7 Modification to 6.4.2 Encryption Mode Indicator(EMI) 7 V1SG.4.8 Modifications to 6.6.1 Baseline Cipher 7 V1SG.4.9 Modification to 6.6.3 Content Encryption Formats 8 V1SG.4.10 Embedded CCI 8 V1SG.4.10.1 Embedded CCI for Audio stream 8 V1SG.5 Modifications to Chapter 8 (AV/C Digital Interface Command Set Extensions) 9 V1SG.5.1 Modifications to 8.1 Introduction 9 V1SG.5.2 Modifications to 8.3.1 AKE Control Command 9 V1SG.5.3 Modification to 8.3.2 AKE Status Command 10 V1SG.5.3.1 Modifications to AKE status command status field 10 V1SG.5.4 ctype/response values(informative) 11 V1SG.5.5 Modifications to 8.3.3 11 V1SG.5.5.1 AKE_ID dependent field 11 V1SG.5.5.2 Modifications to Authentication selection 12 V1SG.5.5.3 Modification to Exchange_key values 12 V1SG.5.6 Modifications to AKE Subfunctions 12 V1SG.5.7 Modifications to 8.4 Bus Reset Behavior 12 V1SG.6 Additional Localization via RTT 13 V1SG.6.1 Purpose and Scope 13 V1SG.6.2 Protected RTT Protocol 13 2008-07-11 (Informational Version) Page 3

V1SG.6.2.1 Protocol 13 V1SG.6.2.2 RTT-AKE 15 V1SG.7 Additional Commands and Sequences 17 V1SG.8 WirelessHD DTCP Protocols 17 Figures Figure 1 DTCP specified field Format... 7 Figure 2 WirelessHD DTCP Control Packet Format... 9 Figure 3 WirelessHD DTCP Status Packet Format... 10 Figure 4 RTT Protocol Diagram... 14 Figure 5 RTT-AKE Informative Flow Diagrams... 16 Tables Table1 EMI Mode and EMI description... 6 Table 2 AKE Status Command Status Field... 10 Table 3 ctype/response values(informative)... 11 Table 4 AKE_procedure values... 11 Table 5 Authentication selection... 12 Table 6 Exchange_key values... 12 Page 4 (Informational Version) 2008-07-11

Volume 1 Supplement G DTCP Mapping to WirelessHD V1SG.1 Introduction This supplement maps DTCP onto WirelessHD. All aspects of IEEE 1394 DTCP functionally except those described in Appendix D are preserved and this supplement only details WirelessHD DTCP specific changes or additions. V1SG.1.1 Related Documents This specification shall be used in conjunction with the following publications. When the publications are superseded by an approved revision, the revision shall apply. Digital Transmission Content Protection Specification Volume 1 and Volume 2 WirelessHD Specification V1SG.1.2 Terms and Abbreviations CTB DTCP-WirelessHD RTT STID WVAN Channel Time Block DTCP volume 1 Supplement G Round Trip Time STation IDentifier Wireless Video Area Network 2008-07-11 (Informational Version) Page 5

V1SG.2 Modifications to 4.2.3.2 Extended Format Fields (Optional Components of the Device Certificate) For WirelessHD, the optional content channel cipher for AES-128 is not used. V1SG.3 Modifications to Chapter 5 Restricted Authentication Restricted authentication is not permitted for DTCP-WirelessHD transports. V1SG.4 Modifications to Chapter 6 Content Channel Management Protection V1SG.4.1 Modifications to 6.2.1 Exchange Keys DTCP-WirelessHD requires only a single exchange key for all defined EMI Modes. V1SG.4.2 Modifications to 6.2.2.2 K C for AES-128 The Content Key (K C ) is used as the key for the content encryption engine. K C is computed from the three values shown below: Exchange Key K X where only a single exchange key is used for all defined EMI Modes to protect the content. Seed for content channel N C generated by the source device which is sent in plain text to all sink devices. Constant value C a, C b, C c which corresponds to EMI Mode. The Content Key is generated as follows: K C = J-AES(K X, ƒ[ext EMI ], N C ) Where: ƒ[ext EMI] { ƒ[ext EMI]=C a when (Ext = 0 2 EMI = 11 2 )= Mode A ƒ[ext EMI]=C b when (Ext = 0 2 EMI = 10 2 )= Mode B ƒ[ext EMI]=C c when (Ext = 0 2 EMI = 01 2 )= Mode C } EMI Mode Ext bit Value EMI bits Value Description Mode A 0 2 11 2 Copy-never (CN) Mode B 0 2 10 2 Copy-one-generation (COG) Mode C 0 2 01 2 No-more-copies (NMC) N.A. 0 2 00 2 Copy-free (CF) Reserved Mode1 1 2 11 2 Reserved Reserved Mode2 1 2 10 2 Reserved Reserved Mode3 1 2 01 2 Reserved Reserved Mode4 1 2 00 2 Reserved Table1 EMI Mode and EMI description C a, C b, and C c are universal secret constants assigned by the DTLA. The values for these constants are specified in Volume 2 Chapter 10. Additional rules for AES-128 Cipher are described in the DTCP Specification available under license from the DTLA. 2008-07-11 (Informational Version) Page 6

V1SG.4.3 Exchange Key Expiration Both source and sink devices shall expire their Exchange Keys when they are detached from the WVAN. For avoidance of doubt, this means that a source device shall expire its Exchange Keys when it is detached from the WVAN, and a sink device shall expire its Exchange Keys when it is detached from the WVAN. V1SG.4.4 Detached status of WirelessHD devices A Station shall regard it is detached when it becomes disassociated status with a Coordinator. A Coordinator shall regard it is detached when it detects all Stations in the WVAN become disassociated status with it. V1SG.4.5 N c Update Process WirelessHD provides isochronous data transfer services. For isochronous data transfer, there is no change to the description in Section 6.3.2 of update procedure and timing for N c. V1SG.4.6 Modification to 6.3.3 Odd/Even Bit The Odd/Even bit transferred over WirelessHD is set to the DTCP specified field in CP header defined in WirelessHD specification as follows; msb lsb Ext EMI Odd/Even Figure 1 DTCP specified field Format V1SG.4.7 Modification to 6.4.2 Encryption Mode Indicator(EMI) The Ext bit and EMI bits that encode EMI Mode transferred over WirelessHD are set to the DTCP specified field. The locations of the Ext bit and EMI bits are shown by Figure 1 DTCP specified field Format. The encoding used for the Ext bit and EMI bits is shown by Table1 in V1SG.4.2. V1SG.4.8 Modifications to 6.6.1 Baseline Cipher For WirelessHD, the baseline cipher is AES-128 using the Counter mode (CTR). AES-128 is described in FIPS 197 dated November 26, 2001 and the CTR mode is described in NIST SP 800-38A 2001 Edition. Additional rules for AES-128 Cipher are described in the DTCP Specification available under license from DTLA. 2008-07-11 (Informational Version) Page 7

V1SG.4.9 Modification to 6.6.3 Content Encryption Formats DTCP protected content is transferred via sub-packet defined in WirelessHD specification. The subpacket has a CP sub-packet Header which is 16 bits unencrypted field used for carrying Embedded CCI. Encrypted content in sub-packet is an encrypted frame and it can range from 0 to 2 20 bytes in length. The format of sub-packet is defined in WirelessHD specification. V1SG.4.10 Embedded CCI The Embedded CCI (Section 6.4.1 or Section 6.4.5.1) is carried in CP sub-packet Header. The format of CP sub-packet header is defined in WirelessHD specification. V1SG.4.10.1 Embedded CCI for Audio stream There are four types of Audio stream defined in WirelessHD specification and Embedded CCI is defined for each type of Audio stream. The audio type for Audio component of audiovisual stream is referred as General Audio. Three audio types defined in DTCP specification are also defined. Type 1 audio is referred as IEC 60958 Identified Audio, Types 2 audio is referred as DVD Audio and Type 3 audio is referred as Super Audio CD. 2008-07-11 (Informational Version) Page 8

V1SG.5 Modifications to Chapter 8 (AV/C Digital Interface Command Set Extensions) V1SG.5.1 Modifications to 8.1 Introduction DTCP-WirelessHD uses AV/C message packet to send/receive DTCP control packets, status command packets, and response packets, which is defined in WirelessHD AV/C specification. Devices shall wait at least one second for a response to a command except SRM subfunction and shall wait at least ten seconds for a response to a command with SRM subfunction before timing out. V1SG.5.2 Modifications to 8.3.1 AKE Control Command This section maps the AKE control command specified in Section 8.3.1 to the WirelessHD DTCP Control Packet Format. The AKE control command subfields used with WirelessHD have the same values and functions as detailed in Chapter 8. msb Byte [0] reserved (zero) ctype/response Byte [1] category = 0000 2 (AKE) AKE_ID Byte [2] Byte [3] AKE_ID dependent field Byte [4] Byte [5] Byte [6] AKE_label Byte [7] number(option) status Byte [8] - AKE_Info - Byte [7+m] Figure 2 WirelessHD DTCP Control Packet Format ctype/response has the same values as referenced in chapter 8 of DTCP Volume 1 specification and specified by the AV/C Digital Interface Command Set. The possible values for DTCP-WirelessHD are specified in V1SG.5.4. The Reserved bits are reserved for future definition and are currently defined to have a value of zero. Byte[1]..Byte[7] are identical to Operand[0]..Operand[6] as specified in section 8.3.1. The AKE_Info field is identical to the data field specified in section 8.3.1. The AKE_label and source STID of each control command should be checked to ensure that it is from the appropriate controller. Unless otherwise noted in the description of each subfunction, if a given command frame includes an AKE_Info field, the corresponding response frame does not have an AKE_Info field. For WirelessHD DTCP Control packet, fragmentation is not defined. The data length of WirelessHD DTCP Control Packet is exchanged via a Length field defined in WirelessHD specification. lsb 2008-07-11 (Informational Version) Page 9

V1SG.5.3 Modification to 8.3.2 AKE Status Command This section maps the AKE status command specified in Section 8.3.2 to the WirelessHD DTCP Status Packet Format. The AKE status command subfields used with WirelessHD have the same values and functions as detailed in Chapter 8. msb lsb Byte [0] reserved (zero) ctype/response Byte [1] category = 0000 2 (AKE) AKE_ID = 0000 2 Byte [2] Byte [3] AKE_ID dependent field Byte [4] Byte [5] Byte [6] AKE_label=FF 16 Byte [7] F 16 status Figure 3 WirelessHD DTCP Status Packet Format ctype/response has the same values as referenced in chapter 8 of DTCP Volume 1specification and specified by the AV/C Digital Interface Command Set. The possible values for DTCP-WirelessHD are specified in V1SG.5.4. The Reserved bits are reserved for future definition and are currently defined to have a value of zero. Byte[1]..Byte[7] are identical to Operand[0]..Operand[6] as specified in Section 8.3.2. V1SG.5.3.1 Modifications to AKE status command status field Value Status Response code 0000 2 No error STABLE 0001 2 Support for no more authentication procedures is currently available STABLE 0111 2 Any other error STABLE 1111 2 No information 1 REJECTED Table 2 AKE Status Command Status Field 1 It is recommended that implementers not use the No information response. 2008-07-11 (Informational Version) Page 10

V1SG.5.4 ctype/response values(informative) Value 0 16 CONTROL 1 16 STATUS Command type/ Response type 2 16 SPECIFIC INQUIRY 3 16 Not used 4 16 Not used 5 16 7 16 Reserved for future extension 8 16 NOT IMPLEMENTED 9 16 ACCEPTED A 16 REJECTED B 16 Not used C 16 IMPLEMENTED/STABLE D 16 Not used E 16 Reserved for future extension F 16 Not used Table 3 ctype/response values(informative) V1SG.5.5 Modifications to 8.3.3 V1SG.5.5.1 AKE_ID dependent field DTCP-WirelessHD implementations only require a single exchange key, specifically Bit 4 of exchange_key field will be used for transporting all DTCP Protected content over WirelessHD for all defined EMI. For DTCP-WirelessHD, both Source and Sink shall support only Full Authentication. Therefore Restricted Authentication procedure (rest_auth) and Enhanced Restricted Authentication procedure (en_rest_auth) are prohibited. Extended Full Authentication procedure (ex_full_auth) is optional 2 and not used to handle Bit 4 of Exchange_key field. Bit AKE_procedure 0 (lsb) Prohibited 1 Prohibited 2 Full Authentication procedure (full_auth) 3 Extended Full Authentication procedure 3 (ex_full_auth, optional) 4 4 7 (msb) Reserved for future extension and shall be zero Table 4 AKE_procedure values 2 Features of this specification that are labeled as optional describe capabilities whose usage has not yet been established by DTLA. 3 Devices that support extended device certificates use the Extended Full Authentication procedure described in this chapter. 4 Features of this specification that are labeled as optional describe capabilities whose usage has not yet been established by DTLA. 2008-07-11 (Informational Version) Page 11

V1SG.5.5.2 Modifications to Authentication selection Source supported authentication Procedures Sink supported authentication procedures Full_auth Full_auth and Ex_full_auth Full_auth Full Authentication Full Authentication Full_auth and Ex_full_auth Full Authentication Extended Full Authentication Table 5 Authentication selection V1SG.5.5.3 Modification to Exchange_key values DTCP-WirelessHD uses a single exchange key defined in the following table. Bit Exchange_key 0 (lsb) Prohibited 1 Prohibited 2 Prohibited 3 Prohibited 4 Exchange Key for AES-128 CTR mode 5 7 (msb) Reserved for future extension and shall be zero Table 6 Exchange_key values V1SG.5.6 Modifications to AKE Subfunctions Subfunction modified for DTCP-WirelessHD are described in the DTCP specification available under license from the DTLA. V1SG.5.7 Modifications to 8.4 Bus Reset Behavior Source device and sink device shall immediately stop authentication procedure between the devices if each device detects either device is detached from the WVAN during authentication procedure. 2008-07-11 (Informational Version) Page 12

V1SG.6 Additional Localization via RTT This section specifies Additional Localization for the WirelessHD. V1SG.6.1 Purpose and Scope Source devices and Sink devices must implement Additional Localization (AL) as specified in this section. Source devices with AL when conducting an AKE with a Sink device with AL, the source devices must perform a RTT test if the sink device's Device ID is not on the source device's RTT registry. Source devices will add a Sink device s Device ID to the Source device s RTT registry, will set the content transmission counter for the sink device to 40 hours, and will provide an exchange key only if the source device measures a RTT value of 1 millisecond or less during RTT test. Source devices when transmitting content will update content transmission counters of all RTT registered sink devices and are required to remove the Device ID of a sink device from the RTT registry after counting 40 hours of content transmission. Background RTT testing is not supported for WirelessHD because the method of measuring RTT in WirelessHD Specification is specified only for RTT-AKE case. When RESPONSE2 subfunction is received, ID U shall be used instead of Device ID in above processes. V1SG.6.2 Protected RTT Protocol V1SG.6.2.1 Protocol Protected RTT protocol is described in Figure 4 and is used in RTT-AKE procedure. The RTT protocol is executed after the Challenge-Response portion of the AKE is completed. SHA-1 is used to construct following messages that are exchanged during RTT testing protocol to ensure that source and sink which completed Challenge-Response portion of AKE are only ones involved in RTT testing. MAC1A = MAC1B = [SHA-1(MK+N)] msb80 MAC2A = MAC2B = [SHA-1(MK+N)] lsb80 OKMSG = [SHA-1(MK+N+1)] msb80 Where MK is 160 bits and equal to SHA-1(Kauth Kauth), N is 16 bit number that ranges from 0 to 1023, and + used in RTT Protocol means mod 2 160 addition. 2008-07-11 (Informational Version) Page 13

Figure 4 RTT Protocol Diagram The RTT_READY command is used to indicate that authentication computation is complete and that source and sink devices are ready to execute the RTT test procedure. The RTT procedure begins by first establishing value of N using the RTT_SETUP command. N is initially set to zero and can range from 0 to 1023 as maximum permitted RTT trials per AKE is 1024. After preparation of MAC values corresponding to N, source device will then measure RTT which is the time interval starting after source transmits RTT_TEST command and terminates upon reception of RTT_TEST accepted response. If the RTT is greater than 1 millisecond and the value of N is less than 1023 the source will repeat RTT procedure by incrementing N by 1 and reissue RTT_SETUP and RTT_TEST commands. If the measured RTT is less than or equal to 1 millisecond: Page 14 (Informational Version) 2008-07-11

The source device compares most recently computed MAC2A to most recently received MAC2B and if not equal the source device aborts RTT procedure else if equal it sends RTT_VERIFY command to sink device. The sink device will after receipt of RTT_VERIFY command compare the most recently received MAC1A and most recently computed MAC1B and if not equal aborts RTT procedure else if equal it will send OKMSG in RTT_VERIFY accepted response. The source device will verify OKMSG and if it is not correct the source device aborts RTT procedure else it will add sink device s Device ID to RTT registry and set content transmission counter to 40 hours. When RESPONSE2 subfunction is received, ID U shall be used instead of Device ID in above process. If RTT procedure is aborted the source shall not provide an exchange key. V1SG.6.2.2 RTT-AKE The RTT-AKE procedure starts exactly the same as normal AKE but a source device that has DTCP certificate with AL flag set to one must check AL flag value of a sink device and if the AL flag value is also set to one then: The sink device after completing Challenge-Response portion of AKE will wait and the sink device will abort if it receives any other command than the RTT_READY command, EXCHANGE_KEY command, or AKE_CANCEL command. The source device then examines the RTT registry and if the sink device s Device ID is on its RTT registry, the source device proceeds to exchange key portion of AKE otherwise the source device initiates a RTT test procedure and if during test it obtains a RTT measurement of 1 millisecond or less it will add the sink device s Device ID to its RTT registry, set content transmission counter to 40 hours, and then proceed to exchange key portion of AKE. When RESPONSE2 subfunction is received, ID U shall be used instead of Device ID in above process. 2008-07-11 (Informational Version) Page 15

Figure 5 RTT-AKE Informative Flow Diagrams Page 16 (Informational Version) 2008-07-11

V1SG.7 Additional Commands and Sequences Commands for Additional Localization are described in the DTCP specification available under license from the DTLA. V1SG.8 WirelessHD DTCP Protocols This section describes the exchange of DTCP AKE commands, responses, and status frames by WirelessHD DTCP Function. WirelessHD support for RTT is defined in Round Trip Time Verification section of the WirelessHD specification. Additional rules for WirelessHD DTCP Protocols are described in the DTCP Specification available under license from the DTLA. 2008-07-11 (Informational Version) Page 17