| Index: webrtc/modules/rtp_rtcp/source/rtcp_receiver_unittest.cc
|
| diff --git a/webrtc/modules/rtp_rtcp/source/rtcp_receiver_unittest.cc b/webrtc/modules/rtp_rtcp/source/rtcp_receiver_unittest.cc
|
| index 507f835bc3fb118e4a1cd1f8a379dc5fd770b0be..08f109bc297882cd578b16d4945f35249a8c277a 100644
|
| --- a/webrtc/modules/rtp_rtcp/source/rtcp_receiver_unittest.cc
|
| +++ b/webrtc/modules/rtp_rtcp/source/rtcp_receiver_unittest.cc
|
| @@ -29,6 +29,7 @@
|
| #include "webrtc/modules/rtp_rtcp/source/rtcp_packet/pli.h"
|
| #include "webrtc/modules/rtp_rtcp/source/rtcp_packet/receiver_report.h"
|
| #include "webrtc/modules/rtp_rtcp/source/rtcp_packet/remb.h"
|
| +#include "webrtc/modules/rtp_rtcp/source/rtcp_packet/rpsi.h"
|
| #include "webrtc/modules/rtp_rtcp/source/rtcp_packet/sdes.h"
|
| #include "webrtc/modules/rtp_rtcp/source/rtcp_packet/sender_report.h"
|
| #include "webrtc/modules/rtp_rtcp/source/rtcp_packet/sli.h"
|
| @@ -165,6 +166,50 @@ TEST_F(RtcpReceiverTest, InvalidFeedbackPacketIsIgnored) {
|
| EXPECT_EQ(0U, rtcp_packet_info_.rtcpPacketTypeFlags);
|
| }
|
|
|
| +TEST_F(RtcpReceiverTest, RpsiWithFractionalPaddingIsIgnored) {
|
| + // Padding size represent fractional number of bytes.
|
| + const uint8_t kPaddingSizeBits = 0x0b;
|
| + const uint8_t bad_packet[] = {0x83, RTCPUtility::PT_PSFB, 0, 3,
|
| + 0x12, 0x34, 0x56, 0x78,
|
| + 0x98, 0x76, 0x54, 0x32,
|
| + kPaddingSizeBits, 0x00, 0x00, 0x00};
|
| + EXPECT_EQ(0, InjectRtcpPacket(bad_packet, sizeof(bad_packet)));
|
| + EXPECT_EQ(0U, rtcp_packet_info_.rtcpPacketTypeFlags);
|
| +}
|
| +
|
| +TEST_F(RtcpReceiverTest, RpsiWithTooLargePaddingIsIgnored) {
|
| + // Padding size exceeds packet size.
|
| + const uint8_t kPaddingSizeBits = 0xa8;
|
| + const uint8_t bad_packet[] = {0x83, RTCPUtility::PT_PSFB, 0, 3,
|
| + 0x12, 0x34, 0x56, 0x78,
|
| + 0x98, 0x76, 0x54, 0x32,
|
| + kPaddingSizeBits, 0x00, 0x00, 0x00};
|
| + EXPECT_EQ(0, InjectRtcpPacket(bad_packet, sizeof(bad_packet)));
|
| + EXPECT_EQ(0U, rtcp_packet_info_.rtcpPacketTypeFlags);
|
| +}
|
| +
|
| +// With parsing using rtcp classes this test will make no sense.
|
| +// With current stateful parser this test was failing.
|
| +TEST_F(RtcpReceiverTest, TwoHalfValidRpsiAreIgnored) {
|
| + const uint8_t bad_packet[] = {0x83, RTCPUtility::PT_PSFB, 0, 2,
|
| + 0x12, 0x34, 0x56, 0x78,
|
| + 0x98, 0x76, 0x54, 0x32,
|
| + 0x83, RTCPUtility::PT_PSFB, 0, 2,
|
| + 0x12, 0x34, 0x56, 0x78,
|
| + 0x98, 0x76, 0x54, 0x32};
|
| + EXPECT_EQ(0, InjectRtcpPacket(bad_packet, sizeof(bad_packet)));
|
| + EXPECT_EQ(0U, rtcp_packet_info_.rtcpPacketTypeFlags);
|
| +}
|
| +
|
| +TEST_F(RtcpReceiverTest, InjectRpsiPacket) {
|
| + const uint64_t kPictureId = 0x123456789;
|
| + rtcp::Rpsi rpsi;
|
| + rpsi.WithPictureId(kPictureId);
|
| + rtc::Buffer packet = rpsi.Build();
|
| + EXPECT_EQ(0, InjectRtcpPacket(packet.data(), packet.size()));
|
| + EXPECT_EQ(kRtcpRpsi, rtcp_packet_info_.rtcpPacketTypeFlags);
|
| +}
|
| +
|
| TEST_F(RtcpReceiverTest, InjectSrPacket) {
|
| const uint32_t kSenderSsrc = 0x10203;
|
| rtcp::SenderReport sr;
|
|
|