| Index: webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc
|
| diff --git a/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc b/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc
|
| index 5ba3353f43cb60112ac6d0b6419273a9d41a9e16..f65a3cf82eb6e92930b5b46fecec084b4f6cd346 100644
|
| --- a/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc
|
| +++ b/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc
|
| @@ -37,156 +37,237 @@ TEST(WrapAroundTests, BackwardWrap) {
|
| EXPECT_EQ(-1, CheckForWrapArounds(0xFFFF0000, 0x0000FFFF));
|
| }
|
|
|
| -TEST(WrapAroundTests, OldRtcpWrapped) {
|
| - RtcpList rtcp;
|
| +TEST(WrapAroundTests, OldRtcpWrapped_OldRtpTimestamp) {
|
| + RtcpMeasurements rtcp;
|
| + bool new_sr;
|
| uint32_t ntp_sec = 0;
|
| - uint32_t ntp_frac = 0;
|
| + uint32_t ntp_frac = 1;
|
| uint32_t timestamp = 0;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| - ntp_frac += kOneMsInNtpFrac;
|
| - timestamp -= kTimestampTicksPerMs;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| ntp_frac += kOneMsInNtpFrac;
|
| timestamp -= kTimestampTicksPerMs;
|
| - int64_t timestamp_in_ms = -1;
|
| - // This expected to fail since it's highly unlikely that the older RTCP
|
| - // has a much smaller RTP timestamp than the newer.
|
| - EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
| + // Expected to fail since the older RTCP has a smaller RTP timestamp than the
|
| + // newer (old:0, new:4294967206).
|
| + EXPECT_FALSE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| }
|
|
|
| TEST(WrapAroundTests, NewRtcpWrapped) {
|
| - RtcpList rtcp;
|
| + RtcpMeasurements rtcp;
|
| + bool new_sr;
|
| uint32_t ntp_sec = 0;
|
| - uint32_t ntp_frac = 0;
|
| + uint32_t ntp_frac = 1;
|
| uint32_t timestamp = 0xFFFFFFFF;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| ntp_frac += kOneMsInNtpFrac;
|
| timestamp += kTimestampTicksPerMs;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| - int64_t timestamp_in_ms = -1;
|
| - EXPECT_TRUE(RtpToNtpMs(rtcp.back().rtp_timestamp, rtcp, ×tamp_in_ms));
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + int64_t timestamp_ms = -1;
|
| + EXPECT_TRUE(RtpToNtpMs(rtcp.list.back().rtp_timestamp, rtcp, ×tamp_ms));
|
| // Since this RTP packet has the same timestamp as the RTCP packet constructed
|
| // at time 0 it should be mapped to 0 as well.
|
| - EXPECT_EQ(0, timestamp_in_ms);
|
| + EXPECT_EQ(0, timestamp_ms);
|
| }
|
|
|
| TEST(WrapAroundTests, RtpWrapped) {
|
| - RtcpList rtcp;
|
| + RtcpMeasurements rtcp;
|
| + bool new_sr;
|
| uint32_t ntp_sec = 0;
|
| - uint32_t ntp_frac = 0;
|
| + uint32_t ntp_frac = 1;
|
| uint32_t timestamp = 0xFFFFFFFF - 2 * kTimestampTicksPerMs;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| - ntp_frac += kOneMsInNtpFrac;
|
| - timestamp += kTimestampTicksPerMs;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| ntp_frac += kOneMsInNtpFrac;
|
| timestamp += kTimestampTicksPerMs;
|
| - int64_t timestamp_in_ms = -1;
|
| - EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| +
|
| + int64_t timestamp_ms = -1;
|
| + EXPECT_TRUE(RtpToNtpMs(rtcp.list.back().rtp_timestamp, rtcp, ×tamp_ms));
|
| // Since this RTP packet has the same timestamp as the RTCP packet constructed
|
| // at time 0 it should be mapped to 0 as well.
|
| - EXPECT_EQ(2, timestamp_in_ms);
|
| + EXPECT_EQ(0, timestamp_ms);
|
| + // Two kTimestampTicksPerMs advanced.
|
| + timestamp += kTimestampTicksPerMs;
|
| + EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_ms));
|
| + EXPECT_EQ(2, timestamp_ms);
|
| + // Wrapped rtp.
|
| + timestamp += kTimestampTicksPerMs;
|
| + EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_ms));
|
| + EXPECT_EQ(3, timestamp_ms);
|
| }
|
|
|
| TEST(WrapAroundTests, OldRtp_RtcpsWrapped) {
|
| - RtcpList rtcp;
|
| + RtcpMeasurements rtcp;
|
| + bool new_sr;
|
| uint32_t ntp_sec = 0;
|
| - uint32_t ntp_frac = 0;
|
| + uint32_t ntp_frac = 1;
|
| uint32_t timestamp = 0;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| ntp_frac += kOneMsInNtpFrac;
|
| timestamp += kTimestampTicksPerMs;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| - ntp_frac += kOneMsInNtpFrac;
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| timestamp -= 2*kTimestampTicksPerMs;
|
| - int64_t timestamp_in_ms = -1;
|
| - EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
| + int64_t timestamp_ms = -1;
|
| + EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_ms));
|
| }
|
|
|
| TEST(WrapAroundTests, OldRtp_NewRtcpWrapped) {
|
| - RtcpList rtcp;
|
| + RtcpMeasurements rtcp;
|
| + bool new_sr;
|
| uint32_t ntp_sec = 0;
|
| - uint32_t ntp_frac = 0;
|
| + uint32_t ntp_frac = 1;
|
| uint32_t timestamp = 0xFFFFFFFF;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| ntp_frac += kOneMsInNtpFrac;
|
| timestamp += kTimestampTicksPerMs;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| - ntp_frac += kOneMsInNtpFrac;
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| timestamp -= kTimestampTicksPerMs;
|
| - int64_t timestamp_in_ms = -1;
|
| - EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
| + int64_t timestamp_ms = -1;
|
| + EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_ms));
|
| // Constructed at the same time as the first RTCP and should therefore be
|
| // mapped to zero.
|
| - EXPECT_EQ(0, timestamp_in_ms);
|
| + EXPECT_EQ(0, timestamp_ms);
|
| }
|
|
|
| -TEST(WrapAroundTests, OldRtp_OldRtcpWrapped) {
|
| - RtcpList rtcp;
|
| +TEST(UpdateRtcpListTests, InjectRtcpSr) {
|
| + const uint32_t kNtpSec = 10;
|
| + const uint32_t kNtpFrac = 12345;
|
| + const uint32_t kTs = 0x12345678;
|
| + bool new_sr;
|
| + RtcpMeasurements rtcp;
|
| + EXPECT_TRUE(UpdateRtcpList(kNtpSec, kNtpFrac, kTs, &rtcp, &new_sr));
|
| + EXPECT_TRUE(new_sr);
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| + EXPECT_EQ(kNtpSec, rtcp.list.front().ntp_secs);
|
| + EXPECT_EQ(kNtpFrac, rtcp.list.front().ntp_frac);
|
| + EXPECT_EQ(kTs, rtcp.list.front().rtp_timestamp);
|
| + // Add second report.
|
| + EXPECT_TRUE(UpdateRtcpList(kNtpSec, kNtpFrac + kOneMsInNtpFrac, kTs + 1,
|
| + &rtcp, &new_sr));
|
| + EXPECT_EQ(2u, rtcp.list.size());
|
| + EXPECT_EQ(kTs + 1, rtcp.list.front().rtp_timestamp);
|
| + EXPECT_EQ(kTs + 0, rtcp.list.back().rtp_timestamp);
|
| + // List should contain last two reports.
|
| + EXPECT_TRUE(UpdateRtcpList(kNtpSec, kNtpFrac + 2 * kOneMsInNtpFrac, kTs + 2,
|
| + &rtcp, &new_sr));
|
| + EXPECT_EQ(2u, rtcp.list.size());
|
| + EXPECT_EQ(kTs + 2, rtcp.list.front().rtp_timestamp);
|
| + EXPECT_EQ(kTs + 1, rtcp.list.back().rtp_timestamp);
|
| +}
|
| +
|
| +TEST(UpdateRtcpListTests, FailsForZeroNtp) {
|
| + RtcpMeasurements rtcp;
|
| uint32_t ntp_sec = 0;
|
| uint32_t ntp_frac = 0;
|
| - uint32_t timestamp = 0;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| - ntp_frac += kOneMsInNtpFrac;
|
| - timestamp -= kTimestampTicksPerMs;
|
| - rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
| - ntp_frac += kOneMsInNtpFrac;
|
| - timestamp += 2*kTimestampTicksPerMs;
|
| - int64_t timestamp_in_ms = -1;
|
| - EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
| -}
|
| -
|
| -TEST(RtpToNtpTests, FailsForDecreasingRtpTimestamp) {
|
| - const uint32_t kNtpSec1 = 3683354930;
|
| - const uint32_t kNtpFrac1 = 699925050;
|
| - const uint32_t kTimestamp1 = 2192705742;
|
| - const uint32_t kNtpSec2 = kNtpSec1;
|
| - const uint32_t kNtpFrac2 = kNtpFrac1 + kOneMsInNtpFrac;
|
| - const uint32_t kTimestamp2 = kTimestamp1 - kTimestampTicksPerMs;
|
| - RtcpList rtcp;
|
| - rtcp.push_front(RtcpMeasurement(kNtpSec1, kNtpFrac1, kTimestamp1));
|
| - rtcp.push_front(RtcpMeasurement(kNtpSec2, kNtpFrac2, kTimestamp2));
|
| - int64_t timestamp_in_ms = -1;
|
| - EXPECT_FALSE(RtpToNtpMs(kTimestamp1, rtcp, ×tamp_in_ms));
|
| -}
|
| -
|
| -TEST(UpdateRtcpListTests, InjectRtcpSrWithEqualNtp) {
|
| - RtcpList rtcp;
|
| - uint32_t ntp_sec = 0;
|
| - uint32_t ntp_frac = 2;
|
| uint32_t timestamp = 0x12345678;
|
| + bool new_sr;
|
| + EXPECT_FALSE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_FALSE(new_sr);
|
| + EXPECT_EQ(0u, rtcp.list.size());
|
| +}
|
|
|
| +TEST(UpdateRtcpListTests, FailsForEqualNtp) {
|
| + RtcpMeasurements rtcp;
|
| + uint32_t ntp_sec = 0;
|
| + uint32_t ntp_frac = 699925050;
|
| + uint32_t timestamp = 0x12345678;
|
| bool new_sr;
|
| EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| EXPECT_TRUE(new_sr);
|
| -
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| + // Ntp time already added, list not updated.
|
| ++timestamp;
|
| EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| EXPECT_FALSE(new_sr);
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| }
|
|
|
| -TEST(UpdateRtcpListTests, InjectRtcpSrWithEqualTimestamp) {
|
| - RtcpList rtcp;
|
| +TEST(UpdateRtcpListTests, FailsForOldNtp) {
|
| + RtcpMeasurements rtcp;
|
| + uint32_t ntp_sec = 1;
|
| + uint32_t ntp_frac = 699925050;
|
| + uint32_t timestamp = 0x12345678;
|
| + bool new_sr;
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_TRUE(new_sr);
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| + // Old ntp time, list not updated.
|
| + ntp_frac -= kOneMsInNtpFrac;
|
| + timestamp += kTimestampTicksPerMs;
|
| + EXPECT_FALSE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| +}
|
| +
|
| +TEST(UpdateRtcpListTests, FailsForEqualTimestamp) {
|
| + RtcpMeasurements rtcp;
|
| uint32_t ntp_sec = 0;
|
| uint32_t ntp_frac = 2;
|
| uint32_t timestamp = 0x12345678;
|
| -
|
| bool new_sr;
|
| EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| EXPECT_TRUE(new_sr);
|
| -
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| + // Timestamp already added, list not updated.
|
| ++ntp_frac;
|
| EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| EXPECT_FALSE(new_sr);
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| }
|
|
|
| -TEST(UpdateRtcpListTests, InjectRtcpSrWithZeroNtpFails) {
|
| - RtcpList rtcp;
|
| +TEST(UpdateRtcpListTests, FailsForOldRtpTimestamp) {
|
| + RtcpMeasurements rtcp;
|
| uint32_t ntp_sec = 0;
|
| - uint32_t ntp_frac = 0;
|
| + uint32_t ntp_frac = 2;
|
| uint32_t timestamp = 0x12345678;
|
| -
|
| bool new_sr;
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_TRUE(new_sr);
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| + // Old timestamp, list not updated.
|
| + ntp_frac += kOneMsInNtpFrac;
|
| + timestamp -= kTimestampTicksPerMs;
|
| EXPECT_FALSE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_FALSE(new_sr);
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| +}
|
| +
|
| +TEST(UpdateRtcpListTests, VerifyParameters) {
|
| + RtcpMeasurements rtcp;
|
| + uint32_t ntp_sec = 1;
|
| + uint32_t ntp_frac = 2;
|
| + uint32_t timestamp = 0x12345678;
|
| + bool new_sr;
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_TRUE(new_sr);
|
| + EXPECT_FALSE(rtcp.params.calculated);
|
| + // Add second report, parameters should be calculated.
|
| + ntp_frac += kOneMsInNtpFrac;
|
| + timestamp += kTimestampTicksPerMs;
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_TRUE(rtcp.params.calculated);
|
| + EXPECT_DOUBLE_EQ(90.0, rtcp.params.frequency_khz);
|
| + EXPECT_NE(0.0, rtcp.params.offset_ms);
|
| +}
|
| +
|
| +TEST(RtpToNtpTests, FailsForEmptyList) {
|
| + RtcpMeasurements rtcp;
|
| + rtcp.params.calculated = true;
|
| + // List is empty, conversion of RTP to NTP time should fail.
|
| + EXPECT_EQ(0u, rtcp.list.size());
|
| + int64_t timestamp_ms = -1;
|
| + EXPECT_FALSE(RtpToNtpMs(0, rtcp, ×tamp_ms));
|
| +}
|
| +
|
| +TEST(RtpToNtpTests, FailsForNoParameters) {
|
| + RtcpMeasurements rtcp;
|
| + uint32_t ntp_sec = 1;
|
| + uint32_t ntp_frac = 2;
|
| + uint32_t timestamp = 0x12345678;
|
| + bool new_sr;
|
| + EXPECT_TRUE(UpdateRtcpList(ntp_sec, ntp_frac, timestamp, &rtcp, &new_sr));
|
| + EXPECT_EQ(1u, rtcp.list.size());
|
| + // Parameters are not calculated, conversion of RTP to NTP time should fail.
|
| + EXPECT_FALSE(rtcp.params.calculated);
|
| + int64_t timestamp_ms = -1;
|
| + EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_ms));
|
| }
|
| +
|
| }; // namespace webrtc
|
|
|