OLD | NEW |
| (Empty) |
1 /* | |
2 * libjingle | |
3 * Copyright 2004 Google Inc. | |
4 * | |
5 * Redistribution and use in source and binary forms, with or without | |
6 * modification, are permitted provided that the following conditions are met: | |
7 * | |
8 * 1. Redistributions of source code must retain the above copyright notice, | |
9 * this list of conditions and the following disclaimer. | |
10 * 2. Redistributions in binary form must reproduce the above copyright notice, | |
11 * this list of conditions and the following disclaimer in the documentation | |
12 * and/or other materials provided with the distribution. | |
13 * 3. The name of the author may not be used to endorse or promote products | |
14 * derived from this software without specific prior written permission. | |
15 * | |
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED | |
17 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | |
18 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO | |
19 * EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
20 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, | |
21 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; | |
22 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, | |
23 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR | |
24 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF | |
25 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
26 */ | |
27 | |
28 #include "talk/media/base/fakertp.h" | |
29 #include "talk/media/base/rtputils.h" | |
30 #include "webrtc/base/asyncpacketsocket.h" | |
31 #include "webrtc/base/gunit.h" | |
32 | |
33 namespace cricket { | |
34 | |
35 static const uint8_t kRtpPacketWithMarker[] = { | |
36 0x80, 0x80, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 | |
37 }; | |
38 // 3 CSRCs (0x01020304, 0x12345678, 0xAABBCCDD) | |
39 // Extension (0xBEDE, 0x1122334455667788) | |
40 static const uint8_t kRtpPacketWithMarkerAndCsrcAndExtension[] = { | |
41 0x93, 0x80, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, | |
42 0x01, 0x02, 0x03, 0x04, 0x12, 0x34, 0x56, 0x78, 0xAA, 0xBB, 0xCC, 0xDD, | |
43 0xBE, 0xDE, 0x00, 0x02, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88 | |
44 }; | |
45 static const uint8_t kInvalidPacket[] = { 0x80, 0x00 }; | |
46 static const uint8_t kInvalidPacketWithCsrc[] = { | |
47 0x83, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, | |
48 0x01, 0x02, 0x03, 0x04, 0x12, 0x34, 0x56, 0x78, 0xAA, 0xBB, 0xCC | |
49 }; | |
50 static const uint8_t kInvalidPacketWithCsrcAndExtension1[] = { | |
51 0x93, 0x80, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, | |
52 0x01, 0x02, 0x03, 0x04, 0x12, 0x34, 0x56, 0x78, 0xAA, 0xBB, 0xCC, 0xDD, | |
53 0xBE, 0xDE, 0x00 | |
54 }; | |
55 static const uint8_t kInvalidPacketWithCsrcAndExtension2[] = { | |
56 0x93, 0x80, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, | |
57 0x01, 0x02, 0x03, 0x04, 0x12, 0x34, 0x56, 0x78, 0xAA, 0xBB, 0xCC, 0xDD, | |
58 0xBE, 0xDE, 0x00, 0x02, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 | |
59 }; | |
60 | |
61 // PT = 206, FMT = 1, Sender SSRC = 0x1111, Media SSRC = 0x1111 | |
62 // No FCI information is needed for PLI. | |
63 static const uint8_t kNonCompoundRtcpPliFeedbackPacket[] = { | |
64 0x81, 0xCE, 0x00, 0x0C, 0x00, 0x00, 0x11, 0x11, 0x00, 0x00, 0x11, 0x11 | |
65 }; | |
66 | |
67 // Packet has only mandatory fixed RTCP header | |
68 // PT = 204, SSRC = 0x1111 | |
69 static const uint8_t kNonCompoundRtcpAppPacket[] = { | |
70 0x81, 0xCC, 0x00, 0x0C, 0x00, 0x00, 0x11, 0x11 | |
71 }; | |
72 | |
73 // PT = 202, Source count = 0 | |
74 static const uint8_t kNonCompoundRtcpSDESPacket[] = { | |
75 0x80, 0xCA, 0x00, 0x00 | |
76 }; | |
77 | |
78 static uint8_t kFakeTag[4] = { 0xba, 0xdd, 0xba, 0xdd }; | |
79 static uint8_t kTestKey[] = "12345678901234567890"; | |
80 static uint8_t kTestAstValue[3] = { 0xaa, 0xbb, 0xcc }; | |
81 | |
82 // Valid rtp Message with 2 byte header extension. | |
83 static uint8_t kRtpMsgWith2ByteExtnHeader[] = { | |
84 0x90, 0x00, 0x00, 0x00, | |
85 0x00, 0x00, 0x00, 0x00, | |
86 0xAA, 0xBB, 0xCC, 0XDD, // SSRC | |
87 0x10, 0x00, 0x00, 0x01, // 2 Byte header extension | |
88 0x01, 0x00, 0x00, 0x00 | |
89 }; | |
90 | |
91 // RTP packet with single byte extension header of length 4 bytes. | |
92 // Extension id = 3 and length = 3 | |
93 static uint8_t kRtpMsgWithAbsSendTimeExtension[] = { | |
94 0x90, 0x00, 0x00, 0x00, | |
95 0x00, 0x00, 0x00, 0x00, | |
96 0x00, 0x00, 0x00, 0x00, | |
97 0xBE, 0xDE, 0x00, 0x02, | |
98 0x22, 0x00, 0x02, 0x1c, | |
99 0x32, 0xaa, 0xbb, 0xcc, | |
100 }; | |
101 | |
102 // Index of AbsSendTimeExtn data in message |kRtpMsgWithAbsSendTimeExtension|. | |
103 static const int kAstIndexInRtpMsg = 21; | |
104 | |
105 TEST(RtpUtilsTest, GetRtp) { | |
106 EXPECT_TRUE(IsRtpPacket(kPcmuFrame, sizeof(kPcmuFrame))); | |
107 | |
108 int pt; | |
109 EXPECT_TRUE(GetRtpPayloadType(kPcmuFrame, sizeof(kPcmuFrame), &pt)); | |
110 EXPECT_EQ(0, pt); | |
111 EXPECT_TRUE(GetRtpPayloadType(kRtpPacketWithMarker, | |
112 sizeof(kRtpPacketWithMarker), &pt)); | |
113 EXPECT_EQ(0, pt); | |
114 | |
115 int seq_num; | |
116 EXPECT_TRUE(GetRtpSeqNum(kPcmuFrame, sizeof(kPcmuFrame), &seq_num)); | |
117 EXPECT_EQ(1, seq_num); | |
118 | |
119 uint32_t ts; | |
120 EXPECT_TRUE(GetRtpTimestamp(kPcmuFrame, sizeof(kPcmuFrame), &ts)); | |
121 EXPECT_EQ(0u, ts); | |
122 | |
123 uint32_t ssrc; | |
124 EXPECT_TRUE(GetRtpSsrc(kPcmuFrame, sizeof(kPcmuFrame), &ssrc)); | |
125 EXPECT_EQ(1u, ssrc); | |
126 | |
127 RtpHeader header; | |
128 EXPECT_TRUE(GetRtpHeader(kPcmuFrame, sizeof(kPcmuFrame), &header)); | |
129 EXPECT_EQ(0, header.payload_type); | |
130 EXPECT_EQ(1, header.seq_num); | |
131 EXPECT_EQ(0u, header.timestamp); | |
132 EXPECT_EQ(1u, header.ssrc); | |
133 | |
134 EXPECT_FALSE(GetRtpPayloadType(kInvalidPacket, sizeof(kInvalidPacket), &pt)); | |
135 EXPECT_FALSE(GetRtpSeqNum(kInvalidPacket, sizeof(kInvalidPacket), &seq_num)); | |
136 EXPECT_FALSE(GetRtpTimestamp(kInvalidPacket, sizeof(kInvalidPacket), &ts)); | |
137 EXPECT_FALSE(GetRtpSsrc(kInvalidPacket, sizeof(kInvalidPacket), &ssrc)); | |
138 } | |
139 | |
140 TEST(RtpUtilsTest, SetRtpHeader) { | |
141 uint8_t packet[] = { | |
142 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 | |
143 }; | |
144 | |
145 RtpHeader header = { 9, 1111, 2222u, 3333u }; | |
146 EXPECT_TRUE(SetRtpHeader(packet, sizeof(packet), header)); | |
147 | |
148 // Bits: 10 0 0 0000 | |
149 EXPECT_EQ(128u, packet[0]); | |
150 size_t len; | |
151 EXPECT_TRUE(GetRtpHeaderLen(packet, sizeof(packet), &len)); | |
152 EXPECT_EQ(12U, len); | |
153 EXPECT_TRUE(GetRtpHeader(packet, sizeof(packet), &header)); | |
154 EXPECT_EQ(9, header.payload_type); | |
155 EXPECT_EQ(1111, header.seq_num); | |
156 EXPECT_EQ(2222u, header.timestamp); | |
157 EXPECT_EQ(3333u, header.ssrc); | |
158 } | |
159 | |
160 TEST(RtpUtilsTest, GetRtpHeaderLen) { | |
161 size_t len; | |
162 EXPECT_TRUE(GetRtpHeaderLen(kPcmuFrame, sizeof(kPcmuFrame), &len)); | |
163 EXPECT_EQ(12U, len); | |
164 | |
165 EXPECT_TRUE(GetRtpHeaderLen(kRtpPacketWithMarkerAndCsrcAndExtension, | |
166 sizeof(kRtpPacketWithMarkerAndCsrcAndExtension), | |
167 &len)); | |
168 EXPECT_EQ(sizeof(kRtpPacketWithMarkerAndCsrcAndExtension), len); | |
169 | |
170 EXPECT_FALSE(GetRtpHeaderLen(kInvalidPacket, sizeof(kInvalidPacket), &len)); | |
171 EXPECT_FALSE(GetRtpHeaderLen(kInvalidPacketWithCsrc, | |
172 sizeof(kInvalidPacketWithCsrc), &len)); | |
173 EXPECT_FALSE(GetRtpHeaderLen(kInvalidPacketWithCsrcAndExtension1, | |
174 sizeof(kInvalidPacketWithCsrcAndExtension1), | |
175 &len)); | |
176 EXPECT_FALSE(GetRtpHeaderLen(kInvalidPacketWithCsrcAndExtension2, | |
177 sizeof(kInvalidPacketWithCsrcAndExtension2), | |
178 &len)); | |
179 } | |
180 | |
181 TEST(RtpUtilsTest, GetRtcp) { | |
182 int pt; | |
183 EXPECT_TRUE(GetRtcpType(kRtcpReport, sizeof(kRtcpReport), &pt)); | |
184 EXPECT_EQ(0xc9, pt); | |
185 | |
186 EXPECT_FALSE(GetRtcpType(kInvalidPacket, sizeof(kInvalidPacket), &pt)); | |
187 | |
188 uint32_t ssrc; | |
189 EXPECT_TRUE(GetRtcpSsrc(kNonCompoundRtcpPliFeedbackPacket, | |
190 sizeof(kNonCompoundRtcpPliFeedbackPacket), | |
191 &ssrc)); | |
192 EXPECT_TRUE(GetRtcpSsrc(kNonCompoundRtcpAppPacket, | |
193 sizeof(kNonCompoundRtcpAppPacket), | |
194 &ssrc)); | |
195 EXPECT_FALSE(GetRtcpSsrc(kNonCompoundRtcpSDESPacket, | |
196 sizeof(kNonCompoundRtcpSDESPacket), | |
197 &ssrc)); | |
198 } | |
199 | |
200 // Invalid RTP packets. | |
201 TEST(RtpUtilsTest, InvalidRtpHeader) { | |
202 // Rtp message with invalid length. | |
203 const uint8_t kRtpMsgWithInvalidLength[] = { | |
204 0x94, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |
205 0xAA, 0xBB, 0xCC, 0XDD, // SSRC | |
206 0xDD, 0xCC, 0xBB, 0xAA, // Only 1 CSRC, but CC count is 4. | |
207 }; | |
208 EXPECT_FALSE(ValidateRtpHeader(kRtpMsgWithInvalidLength, | |
209 sizeof(kRtpMsgWithInvalidLength), nullptr)); | |
210 | |
211 // Rtp message with single byte header extension, invalid extension length. | |
212 const uint8_t kRtpMsgWithInvalidExtnLength[] = { | |
213 0x90, 0x00, 0x00, 0x00, | |
214 0x00, 0x00, 0x00, 0x00, | |
215 0x00, 0x00, 0x00, 0x00, | |
216 0xBE, 0xDE, 0x0A, 0x00, // Extn length - 0x0A00 | |
217 }; | |
218 EXPECT_FALSE(ValidateRtpHeader(kRtpMsgWithInvalidExtnLength, | |
219 sizeof(kRtpMsgWithInvalidExtnLength), | |
220 nullptr)); | |
221 } | |
222 | |
223 // Valid RTP packet with a 2byte header extension. | |
224 TEST(RtpUtilsTest, Valid2ByteExtnHdrRtpMessage) { | |
225 EXPECT_TRUE(ValidateRtpHeader(kRtpMsgWith2ByteExtnHeader, | |
226 sizeof(kRtpMsgWith2ByteExtnHeader), nullptr)); | |
227 } | |
228 | |
229 // Valid RTP packet which has 1 byte header AbsSendTime extension in it. | |
230 TEST(RtpUtilsTest, ValidRtpPacketWithAbsSendTimeExtension) { | |
231 EXPECT_TRUE(ValidateRtpHeader(kRtpMsgWithAbsSendTimeExtension, | |
232 sizeof(kRtpMsgWithAbsSendTimeExtension), | |
233 nullptr)); | |
234 } | |
235 | |
236 // Verify handling of a 2 byte extension header RTP messsage. Currently these | |
237 // messages are not supported. | |
238 TEST(RtpUtilsTest, UpdateAbsSendTimeExtensionIn2ByteHeaderExtn) { | |
239 std::vector<uint8_t> data( | |
240 kRtpMsgWith2ByteExtnHeader, | |
241 kRtpMsgWith2ByteExtnHeader + sizeof(kRtpMsgWith2ByteExtnHeader)); | |
242 EXPECT_FALSE(UpdateRtpAbsSendTimeExtension(&data[0], data.size(), 3, 0)); | |
243 } | |
244 | |
245 // Verify finding an extension ID in the TURN send indication message. | |
246 TEST(RtpUtilsTest, UpdateAbsSendTimeExtensionInTurnSendIndication) { | |
247 // A valid STUN indication message with a valid RTP header in data attribute | |
248 // payload field and no extension bit set. | |
249 uint8_t message_without_extension[] = { | |
250 0x00, 0x16, 0x00, 0x18, // length of | |
251 0x21, 0x12, 0xA4, 0x42, // magic cookie | |
252 '0', '1', '2', '3', // transaction id | |
253 '4', '5', '6', '7', | |
254 '8', '9', 'a', 'b', | |
255 0x00, 0x20, 0x00, 0x04, // Mapped address. | |
256 0x00, 0x00, 0x00, 0x00, | |
257 0x00, 0x13, 0x00, 0x0C, // Data attribute. | |
258 0x80, 0x00, 0x00, 0x00, // RTP packet. | |
259 0x00, 0x00, 0x00, 0x00, | |
260 0x00, 0x00, 0x00, 0x00, | |
261 }; | |
262 EXPECT_TRUE(UpdateRtpAbsSendTimeExtension( | |
263 message_without_extension, sizeof(message_without_extension), 3, 0)); | |
264 | |
265 // A valid STUN indication message with a valid RTP header and a extension | |
266 // header. | |
267 uint8_t message[] = { | |
268 0x00, 0x16, 0x00, 0x24, // length of | |
269 0x21, 0x12, 0xA4, 0x42, // magic cookie | |
270 '0', '1', '2', '3', // transaction id | |
271 '4', '5', '6', '7', | |
272 '8', '9', 'a', 'b', | |
273 0x00, 0x20, 0x00, 0x04, // Mapped address. | |
274 0x00, 0x00, 0x00, 0x00, | |
275 0x00, 0x13, 0x00, 0x18, // Data attribute. | |
276 0x90, 0x00, 0x00, 0x00, // RTP packet. | |
277 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xBE, 0xDE, | |
278 0x00, 0x02, 0x22, 0xaa, 0xbb, 0xcc, 0x32, 0xaa, 0xbb, 0xcc, | |
279 }; | |
280 EXPECT_TRUE(UpdateRtpAbsSendTimeExtension(message, sizeof(message), 3, 0)); | |
281 } | |
282 | |
283 // Test without any packet options variables set. This method should return | |
284 // without HMAC value in the packet. | |
285 TEST(RtpUtilsTest, ApplyPacketOptionsWithDefaultValues) { | |
286 rtc::PacketTimeUpdateParams packet_time_params; | |
287 std::vector<uint8_t> rtp_packet(kRtpMsgWithAbsSendTimeExtension, | |
288 kRtpMsgWithAbsSendTimeExtension + | |
289 sizeof(kRtpMsgWithAbsSendTimeExtension)); | |
290 rtp_packet.insert(rtp_packet.end(), kFakeTag, kFakeTag + sizeof(kFakeTag)); | |
291 EXPECT_TRUE(ApplyPacketOptions(&rtp_packet[0], rtp_packet.size(), | |
292 packet_time_params, 0)); | |
293 | |
294 // Making sure HMAC wasn't updated.. | |
295 EXPECT_EQ(0, memcmp(&rtp_packet[sizeof(kRtpMsgWithAbsSendTimeExtension)], | |
296 kFakeTag, 4)); | |
297 | |
298 // Verify AbsouluteSendTime extension field wasn't modified. | |
299 EXPECT_EQ(0, memcmp(&rtp_packet[kAstIndexInRtpMsg], kTestAstValue, | |
300 sizeof(kTestAstValue))); | |
301 } | |
302 | |
303 // Veirfy HMAC is updated when packet option parameters are set. | |
304 TEST(RtpUtilsTest, ApplyPacketOptionsWithAuthParams) { | |
305 rtc::PacketTimeUpdateParams packet_time_params; | |
306 packet_time_params.srtp_auth_key.assign(kTestKey, | |
307 kTestKey + sizeof(kTestKey)); | |
308 packet_time_params.srtp_auth_tag_len = 4; | |
309 | |
310 std::vector<uint8_t> rtp_packet(kRtpMsgWithAbsSendTimeExtension, | |
311 kRtpMsgWithAbsSendTimeExtension + | |
312 sizeof(kRtpMsgWithAbsSendTimeExtension)); | |
313 rtp_packet.insert(rtp_packet.end(), kFakeTag, kFakeTag + sizeof(kFakeTag)); | |
314 EXPECT_TRUE(ApplyPacketOptions(&rtp_packet[0], rtp_packet.size(), | |
315 packet_time_params, 0)); | |
316 | |
317 uint8_t kExpectedTag[] = {0xc1, 0x7a, 0x8c, 0xa0}; | |
318 EXPECT_EQ(0, memcmp(&rtp_packet[sizeof(kRtpMsgWithAbsSendTimeExtension)], | |
319 kExpectedTag, sizeof(kExpectedTag))); | |
320 | |
321 // Verify AbsouluteSendTime extension field is not modified. | |
322 EXPECT_EQ(0, memcmp(&rtp_packet[kAstIndexInRtpMsg], kTestAstValue, | |
323 sizeof(kTestAstValue))); | |
324 } | |
325 | |
326 // Verify finding an extension ID in a raw rtp message. | |
327 TEST(RtpUtilsTest, UpdateAbsSendTimeExtensionInRtpPacket) { | |
328 std::vector<uint8_t> rtp_packet(kRtpMsgWithAbsSendTimeExtension, | |
329 kRtpMsgWithAbsSendTimeExtension + | |
330 sizeof(kRtpMsgWithAbsSendTimeExtension)); | |
331 | |
332 EXPECT_TRUE(UpdateRtpAbsSendTimeExtension(&rtp_packet[0], rtp_packet.size(), | |
333 3, 51183266)); | |
334 | |
335 // Verify that the timestamp was updated. | |
336 const uint8_t kExpectedTimestamp[3] = {0xcc, 0xbb, 0xaa}; | |
337 EXPECT_EQ(0, memcmp(&rtp_packet[kAstIndexInRtpMsg], kExpectedTimestamp, | |
338 sizeof(kExpectedTimestamp))); | |
339 } | |
340 | |
341 // Verify we update both AbsSendTime extension header and HMAC. | |
342 TEST(RtpUtilsTest, ApplyPacketOptionsWithAuthParamsAndAbsSendTime) { | |
343 rtc::PacketTimeUpdateParams packet_time_params; | |
344 packet_time_params.srtp_auth_key.assign(kTestKey, | |
345 kTestKey + sizeof(kTestKey)); | |
346 packet_time_params.srtp_auth_tag_len = 4; | |
347 packet_time_params.rtp_sendtime_extension_id = 3; | |
348 // 3 is also present in the test message. | |
349 | |
350 std::vector<uint8_t> rtp_packet(kRtpMsgWithAbsSendTimeExtension, | |
351 kRtpMsgWithAbsSendTimeExtension + | |
352 sizeof(kRtpMsgWithAbsSendTimeExtension)); | |
353 rtp_packet.insert(rtp_packet.end(), kFakeTag, kFakeTag + sizeof(kFakeTag)); | |
354 EXPECT_TRUE(ApplyPacketOptions(&rtp_packet[0], rtp_packet.size(), | |
355 packet_time_params, 51183266)); | |
356 | |
357 const uint8_t kExpectedTag[] = {0x81, 0xd1, 0x2c, 0x0e}; | |
358 EXPECT_EQ(0, memcmp(&rtp_packet[sizeof(kRtpMsgWithAbsSendTimeExtension)], | |
359 kExpectedTag, sizeof(kExpectedTag))); | |
360 | |
361 // Verify that the timestamp was updated. | |
362 const uint8_t kExpectedTimestamp[3] = {0xcc, 0xbb, 0xaa}; | |
363 EXPECT_EQ(0, memcmp(&rtp_packet[kAstIndexInRtpMsg], kExpectedTimestamp, | |
364 sizeof(kExpectedTimestamp))); | |
365 } | |
366 | |
367 | |
368 } // namespace cricket | |
OLD | NEW |