| Index: webrtc/media/base/fakertp.cc
|
| diff --git a/webrtc/media/base/fakertp.cc b/webrtc/media/base/fakertp.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..f9c880f98b2577be3667ba24e0666345d05cc15e
|
| --- /dev/null
|
| +++ b/webrtc/media/base/fakertp.cc
|
| @@ -0,0 +1,66 @@
|
| +/*
|
| + * Copyright (c) 2017 The WebRTC project authors. All Rights Reserved.
|
| + *
|
| + * Use of this source code is governed by a BSD-style license
|
| + * that can be found in the LICENSE file in the root of the source
|
| + * tree. An additional intellectual property rights grant can be found
|
| + * in the file PATENTS. All contributing project authors may
|
| + * be found in the AUTHORS file in the root of the source tree.
|
| + */
|
| +
|
| +#include <algorithm>
|
| +
|
| +#include "webrtc/base/gunit.h"
|
| +#include "webrtc/media/base/fakertp.h"
|
| +
|
| +void CompareHeaderExtensions(const char* packet1, size_t packet1_size,
|
| + const char* packet2, size_t packet2_size,
|
| + const std::vector<int> encrypted_headers, bool expect_equal) {
|
| + // Sanity check: packets must be large enough to contain the RTP header and
|
| + // extensions header.
|
| + RTC_CHECK_GE(packet1_size, 12 + 4);
|
| + RTC_CHECK_GE(packet2_size, 12 + 4);
|
| + // RTP extension headers are the same.
|
| + EXPECT_EQ(0, memcmp(packet1 + 12, packet2 + 12, 4));
|
| + // Check for one-byte header extensions.
|
| + EXPECT_EQ('\xBE', packet1[12]);
|
| + EXPECT_EQ('\xDE', packet1[13]);
|
| + // Determine position and size of extension headers.
|
| + size_t extension_words = packet1[14] << 8 | packet1[15];
|
| + const char* extension_data1 = packet1 + 12 + 4;
|
| + const char* extension_end1 = extension_data1 + extension_words * 4;
|
| + const char* extension_data2 = packet2 + 12 + 4;
|
| + // Sanity check: packets must be large enough to contain the RTP header
|
| + // extensions.
|
| + RTC_CHECK_GE(packet1_size, 12 + 4 + extension_words * 4);
|
| + RTC_CHECK_GE(packet2_size, 12 + 4 + extension_words * 4);
|
| + while (extension_data1 < extension_end1) {
|
| + uint8_t id = (*extension_data1 & 0xf0) >> 4;
|
| + uint8_t len = (*extension_data1 & 0x0f) +1;
|
| + extension_data1++;
|
| + extension_data2++;
|
| + EXPECT_LE(extension_data1, extension_end1);
|
| + if (id == 15) {
|
| + // Finished parsing.
|
| + break;
|
| + }
|
| +
|
| + // The header extension doesn't get encrypted if the id is not in the
|
| + // list of header extensions to encrypt.
|
| + if (expect_equal ||
|
| + std::find(encrypted_headers.begin(), encrypted_headers.end(), id)
|
| + == encrypted_headers.end()) {
|
| + EXPECT_EQ(0, memcmp(extension_data1, extension_data2, len));
|
| + } else {
|
| + EXPECT_NE(0, memcmp(extension_data1, extension_data2, len));
|
| + }
|
| +
|
| + extension_data1 += len;
|
| + extension_data2 += len;
|
| + // Skip padding.
|
| + while (extension_data1 < extension_end1 && *extension_data1 == 0) {
|
| + extension_data1++;
|
| + extension_data2++;
|
| + }
|
| + }
|
| +}
|
|
|