1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815
|
/*
* Copyright (c) 2014 The WebRTC project authors. All Rights Reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include "test/rtp_file_reader.h"
#include <cstddef>
#include <cstdint>
#include <cstdio>
#include <cstring>
#include <map>
#include <memory>
#include <set>
#include <string>
#include <vector>
#include "absl/strings/string_view.h"
#include "api/array_view.h"
#include "modules/rtp_rtcp/source/rtp_util.h"
#include "rtc_base/checks.h"
#include "rtc_base/logging.h"
#include "rtc_base/time_utils.h"
namespace {
constexpr size_t kRtpDumpFirstLineLength = 80;
constexpr uint16_t kRtpDumpPacketHeaderSize = 8;
enum {
kResultFail = -1,
kResultSuccess = 0,
kResultSkip = 1,
};
enum {
kPcapVersionMajor = 2,
kPcapVersionMinor = 4,
kLinktypeNull = 0,
kLinktypeEthernet = 1,
kBsdNullLoopback1 = 0x00000002,
kBsdNullLoopback2 = 0x02000000,
kEthernetIIHeaderMacSkip = 12,
kEthertypeIp = 0x0800,
kIpVersion4 = 4,
kMinIpHeaderLength = 20,
kFragmentOffsetClear = 0x0000,
kFragmentOffsetDoNotFragment = 0x4000,
kProtocolTcp = 0x06,
kProtocolUdp = 0x11,
kUdpHeaderLength = 8,
};
constexpr size_t kMaxReadBufferSize = 4096;
constexpr uint32_t kPcapBOMSwapOrder = 0xd4c3b2a1UL;
constexpr uint32_t kPcapBOMNoSwapOrder = 0xa1b2c3d4UL;
constexpr uint32_t kPcapNgBOMLittleEndian = 0x4d3c2b1aUL;
constexpr uint32_t kPcapNgSectionHeaderBlock = 0x0a0d0d0aUL;
constexpr uint32_t kPcapNgInterfaceDescriptionBlock = 0x00000001LU;
constexpr uint32_t kPcapNgPacketBlock = 0x00000006LU;
#define TRY(expr) \
do { \
if (!(expr)) { \
RTC_LOG(LS_INFO) << "Failed to read"; \
return false; \
} \
} while (0)
#define TRY_PCAP(expr) \
do { \
int r = (expr); \
if (r == kResultFail) { \
RTC_LOG(LS_INFO) << "FAIL at " << __FILE__ << ":" << __LINE__; \
return kResultFail; \
} else if (r == kResultSkip) { \
return kResultSkip; \
} \
} while (0)
bool ReadUint32(uint32_t* out, FILE* file) {
*out = 0;
for (size_t i = 0; i < 4; ++i) {
*out <<= 8;
uint8_t tmp;
if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
return false;
*out |= tmp;
}
return true;
}
bool ReadUint16(uint16_t* out, FILE* file) {
*out = 0;
for (size_t i = 0; i < 2; ++i) {
*out <<= 8;
uint8_t tmp;
if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
return false;
*out |= tmp;
}
return true;
}
} // namespace
namespace webrtc {
namespace test {
class RtpFileReaderImpl : public RtpFileReader {
public:
virtual bool Init(FILE* file, const std::set<uint32_t>& ssrc_filter) = 0;
};
class InterleavedRtpFileReader : public RtpFileReaderImpl {
public:
~InterleavedRtpFileReader() override {
if (file_ != nullptr) {
fclose(file_);
file_ = nullptr;
}
}
bool Init(FILE* file, const std::set<uint32_t>& ssrc_filter) override {
file_ = file;
return true;
}
bool NextPacket(RtpPacket* packet) override {
RTC_DCHECK(file_);
packet->length = RtpPacket::kMaxPacketBufferSize;
uint32_t len = 0;
TRY(ReadUint32(&len, file_));
if (packet->length < len) {
RTC_FATAL() << "Packet is too large to fit: " << len << " bytes vs "
<< packet->length
<< " bytes allocated. Consider increasing the buffer "
<< "size";
}
if (fread(packet->data, 1, len, file_) != len)
return false;
packet->length = len;
packet->original_length = len;
packet->time_ms = time_ms_;
time_ms_ += 5;
return true;
}
private:
FILE* file_ = nullptr;
int64_t time_ms_ = 0;
};
// Read RTP packets from file in rtpdump format, as documented at:
// http://www.cs.columbia.edu/irt/software/rtptools/
class RtpDumpReader : public RtpFileReaderImpl {
public:
RtpDumpReader() : file_(nullptr) {}
~RtpDumpReader() override {
if (file_ != nullptr) {
fclose(file_);
file_ = nullptr;
}
}
RtpDumpReader(const RtpDumpReader&) = delete;
RtpDumpReader& operator=(const RtpDumpReader&) = delete;
bool Init(FILE* file, const std::set<uint32_t>& ssrc_filter) override {
file_ = file;
char firstline[kRtpDumpFirstLineLength + 1] = {0};
if (fgets(firstline, kRtpDumpFirstLineLength, file_) == nullptr) {
RTC_LOG(LS_INFO) << "Can't read from file";
return false;
}
if (strncmp(firstline, "#!rtpplay", 9) == 0) {
if (strncmp(firstline, "#!rtpplay1.0", 12) != 0) {
RTC_LOG(LS_INFO) << "Wrong rtpplay version, must be 1.0";
return false;
}
} else if (strncmp(firstline, "#!RTPencode", 11) == 0) {
if (strncmp(firstline, "#!RTPencode1.0", 14) != 0) {
RTC_LOG(LS_INFO) << "Wrong RTPencode version, must be 1.0";
return false;
}
} else {
RTC_LOG(LS_INFO)
<< "Input file is neither in rtpplay nor RTPencode format";
return false;
}
uint32_t start_sec;
uint32_t start_usec;
uint32_t source;
uint16_t port;
uint16_t padding;
TRY(ReadUint32(&start_sec, file_));
TRY(ReadUint32(&start_usec, file_));
TRY(ReadUint32(&source, file_));
TRY(ReadUint16(&port, file_));
TRY(ReadUint16(&padding, file_));
return true;
}
bool NextPacket(RtpPacket* packet) override {
uint8_t* rtp_data = packet->data;
packet->length = RtpPacket::kMaxPacketBufferSize;
uint16_t len;
uint16_t plen;
uint32_t offset;
TRY(ReadUint16(&len, file_));
TRY(ReadUint16(&plen, file_));
TRY(ReadUint32(&offset, file_));
// Use 'len' here because a 'plen' of 0 specifies rtcp.
len -= kRtpDumpPacketHeaderSize;
if (packet->length < len) {
RTC_LOG(LS_ERROR) << "Packet is too large to fit: " << len << " bytes vs "
<< packet->length
<< " bytes allocated. Consider increasing the buffer "
"size";
return false;
}
if (fread(rtp_data, 1, len, file_) != len) {
return false;
}
packet->length = len;
packet->original_length = plen;
packet->time_ms = offset;
return true;
}
private:
FILE* file_;
};
// Read RTP packets from file in tcpdump/libpcap format, as documented at:
// http://wiki.wireshark.org/Development/LibpcapFileFormat
// Transparently supports PCAPNG as described at
// https://pcapng.com/
class PcapReader : public RtpFileReaderImpl {
public:
PcapReader()
: file_(nullptr),
swap_pcap_byte_order_(false),
#ifdef WEBRTC_ARCH_BIG_ENDIAN
swap_network_byte_order_(false),
#else
swap_network_byte_order_(true),
#endif
pcapng_(false),
read_buffer_(),
packets_by_ssrc_(),
packets_(),
next_packet_it_() {
}
~PcapReader() override {
if (file_ != nullptr) {
fclose(file_);
file_ = nullptr;
}
}
PcapReader(const PcapReader&) = delete;
PcapReader& operator=(const PcapReader&) = delete;
bool Init(FILE* file, const std::set<uint32_t>& ssrc_filter) override {
return Initialize(file, ssrc_filter) == kResultSuccess;
}
int Initialize(FILE* file, const std::set<uint32_t>& ssrc_filter) {
file_ = file;
size_t total_packet_count = 0;
if (ReadGlobalHeader() < 0) {
return kResultFail;
}
int result;
if (!pcapng_) {
result = ReadPcap(ssrc_filter, total_packet_count);
} else {
result = ReadPcapNg(ssrc_filter, total_packet_count);
}
if (result == kResultFail) {
return kResultFail;
}
RTC_LOG(LS_INFO) << "Total packets in file: " << total_packet_count;
RTC_LOG(LS_INFO) << "Total RTP/RTCP packets: " << packets_.size();
for (SsrcMapIterator mit = packets_by_ssrc_.begin();
mit != packets_by_ssrc_.end(); ++mit) {
uint32_t ssrc = mit->first;
const std::vector<uint32_t>& packet_indices = mit->second;
int pt = packets_[packet_indices[0]].payload_type;
RTC_LOG(LS_INFO) << "SSRC: " << ssrc << ", " << packet_indices.size()
<< " packets, pt=" << pt << ".";
}
// TODO(solenberg): Better validation of identified SSRC streams.
//
// Since we're dealing with raw network data here, we will wrongly identify
// some packets as RTP. When these packets are consumed by RtpPlayer, they
// are unlikely to cause issues as they will ultimately be filtered out by
// the RtpRtcp module. However, we should really do better filtering here,
// which we can accomplish in a number of ways, e.g.:
//
// - Verify that the time stamps and sequence numbers for RTP packets are
// both increasing/decreasing. If they move in different directions, the
// SSRC is likely bogus and can be dropped. (Normally they should be inc-
// reasing but we must allow packet reordering).
// - If RTP sequence number is not changing, drop the stream.
// - Can also use srcip:port->dstip:port pairs, assuming few SSRC collisions
// for up/down streams.
next_packet_it_ = packets_.begin();
return kResultSuccess;
}
int ReadPcap(const std::set<uint32_t>& ssrc_filter,
size_t& total_packet_count) {
uint32_t stream_start_ms = 0;
int32_t next_packet_pos = ftell(file_);
for (;;) {
TRY_PCAP(fseek(file_, next_packet_pos, SEEK_SET));
int result = ReadPacket(&next_packet_pos, stream_start_ms, ssrc_filter);
if (result == kResultFail) {
break;
} else if (result == kResultSuccess && packets_.size() == 1) {
RTC_DCHECK_EQ(stream_start_ms, 0);
PacketIterator it = packets_.begin();
stream_start_ms = it->time_offset_ms;
it->time_offset_ms = 0;
}
total_packet_count++;
}
if (feof(file_) == 0) {
RTC_LOG(LS_ERROR) << "Failed reading file!";
return kResultFail;
}
return kResultSuccess;
}
int ReadPcapNg(const std::set<uint32_t>& ssrc_filter,
size_t& total_packet_count) {
uint32_t stream_start_ms = 0;
int next_packet_pos = 0;
for (;;) {
TRY_PCAP(fseek(file_, next_packet_pos, SEEK_SET));
int result = ReadPacketNg(&next_packet_pos, stream_start_ms, ssrc_filter);
if (result == kResultFail) {
break;
} else if (result == kResultSuccess && packets_.size() == 1) {
RTC_DCHECK_EQ(stream_start_ms, 0);
PacketIterator it = packets_.begin();
stream_start_ms = it->time_offset_ms;
it->time_offset_ms = 0;
}
total_packet_count++;
}
if (feof(file_) == 0) {
RTC_LOG(LS_ERROR) << "Failed reading file!";
return kResultFail;
}
return kResultSuccess;
}
bool NextPacket(RtpPacket* packet) override {
uint32_t length = RtpPacket::kMaxPacketBufferSize;
if (NextPcap(packet->data, &length, &packet->time_ms) != kResultSuccess)
return false;
packet->length = static_cast<size_t>(length);
packet->original_length = packet->length;
return true;
}
virtual int NextPcap(uint8_t* data, uint32_t* length, uint32_t* time_ms) {
RTC_DCHECK(data);
RTC_DCHECK(length);
RTC_DCHECK(time_ms);
if (next_packet_it_ == packets_.end()) {
return -1;
}
if (*length < next_packet_it_->payload_length) {
return -1;
}
TRY_PCAP(fseek(file_, next_packet_it_->pos_in_file, SEEK_SET));
TRY_PCAP(Read(data, next_packet_it_->payload_length));
*length = next_packet_it_->payload_length;
*time_ms = next_packet_it_->time_offset_ms;
next_packet_it_++;
return 0;
}
private:
// A marker of an RTP packet within the file.
struct RtpPacketMarker {
uint32_t time_offset_ms;
uint32_t source_ip;
uint32_t dest_ip;
uint16_t source_port;
uint16_t dest_port;
// Payload type of the RTP packet,
// or RTCP packet type of the first RTCP packet in a compound RTCP packet.
int payload_type;
int32_t pos_in_file; // Byte offset of payload from start of file.
uint32_t payload_length;
};
typedef std::vector<RtpPacketMarker>::iterator PacketIterator;
typedef std::map<uint32_t, std::vector<uint32_t> > SsrcMap;
typedef std::map<uint32_t, std::vector<uint32_t> >::iterator SsrcMapIterator;
int ReadGlobalHeader() {
uint32_t magic;
TRY_PCAP(Read(&magic, false));
if (magic == kPcapBOMSwapOrder) {
swap_pcap_byte_order_ = true;
} else if (magic == kPcapBOMNoSwapOrder) {
swap_pcap_byte_order_ = false;
} else if (magic == kPcapNgSectionHeaderBlock) {
pcapng_ = true;
RTC_LOG(LS_INFO) << "PCAPNG detected, support is experimental";
return kResultSuccess;
} else {
return kResultFail;
}
uint16_t version_major;
uint16_t version_minor;
TRY_PCAP(Read(&version_major, false));
TRY_PCAP(Read(&version_minor, false));
if (version_major != kPcapVersionMajor ||
version_minor != kPcapVersionMinor) {
return kResultFail;
}
int32_t this_zone; // GMT to local correction.
uint32_t sigfigs; // Accuracy of timestamps.
uint32_t snaplen; // Max length of captured packets, in octets.
uint32_t network; // Data link type.
TRY_PCAP(Read(&this_zone, false));
TRY_PCAP(Read(&sigfigs, false));
TRY_PCAP(Read(&snaplen, false));
TRY_PCAP(Read(&network, false));
// Accept only LINKTYPE_NULL and LINKTYPE_ETHERNET.
// See: http://www.tcpdump.org/linktypes.html
if (network != kLinktypeNull && network != kLinktypeEthernet) {
return kResultFail;
}
return kResultSuccess;
}
int ProcessPacket(RtpPacketMarker& marker,
const std::set<uint32_t>& ssrc_filter,
ArrayView<const uint8_t> packet) {
if (IsRtcpPacket(packet)) {
marker.payload_type = packet[1];
packets_.push_back(marker);
} else if (IsRtpPacket(packet)) {
uint32_t ssrc = ParseRtpSsrc(packet);
marker.payload_type = ParseRtpPayloadType(packet);
if (ssrc_filter.empty() || ssrc_filter.find(ssrc) != ssrc_filter.end()) {
packets_by_ssrc_[ssrc].push_back(
static_cast<uint32_t>(packets_.size()));
packets_.push_back(marker);
} else {
return kResultSkip;
}
} else {
RTC_LOG(LS_INFO) << "Not recognized as RTP/RTCP";
return kResultSkip;
}
return kResultSuccess;
}
int ReadPacket(int32_t* next_packet_pos,
uint32_t stream_start_ms,
const std::set<uint32_t>& ssrc_filter) {
RTC_DCHECK(next_packet_pos);
uint32_t ts_sec; // Timestamp seconds.
uint32_t ts_usec; // Timestamp microseconds.
uint32_t incl_len; // Number of octets of packet saved in file.
uint32_t orig_len; // Actual length of packet.
TRY_PCAP(Read(&ts_sec, false));
TRY_PCAP(Read(&ts_usec, false));
TRY_PCAP(Read(&incl_len, false));
TRY_PCAP(Read(&orig_len, false));
*next_packet_pos = ftell(file_) + incl_len;
RtpPacketMarker marker = {0};
marker.time_offset_ms = CalcTimeDelta(ts_sec, ts_usec, stream_start_ms);
TRY_PCAP(ReadPacketHeader(&marker));
marker.pos_in_file = ftell(file_);
if (marker.payload_length > sizeof(read_buffer_)) {
RTC_LOG(LS_ERROR) << "Packet too large!";
return kResultFail;
}
TRY_PCAP(Read(read_buffer_, marker.payload_length));
return ProcessPacket(marker, ssrc_filter,
{read_buffer_, marker.payload_length});
}
int ReadPacketNg(int32_t* next_packet_pos,
uint32_t stream_start_ms,
const std::set<uint32_t>& ssrc_filter) {
uint32_t block_type;
uint32_t block_length;
TRY_PCAP(Read(&block_type, false));
TRY_PCAP(Read(&block_length, false));
if (block_length == 0) {
RTC_LOG(LS_ERROR) << "Empty PCAPNG block";
return kResultFail;
}
*next_packet_pos += block_length;
switch (block_type) {
case kPcapNgSectionHeaderBlock: {
// TODO: https://issues.webrtc.org/issues/351327754 - interpret more of
// this block, in particular the if_tsresol option.
uint32_t byte_order_magic;
TRY_PCAP(Read(&byte_order_magic, false));
swap_pcap_byte_order_ = (byte_order_magic == kPcapNgBOMLittleEndian);
} break;
case kPcapNgInterfaceDescriptionBlock:
break;
case kPcapNgPacketBlock: {
uint32_t interface; // Interface ID. Unused.
uint32_t ts_upper; // Upper 32 bits of timestamp.
uint32_t ts_lower; // Lower 32 bits of timestamp.
uint32_t incl_len; // Number of octets of packet saved in file.
uint32_t orig_len; // Actual length of packet.
TRY_PCAP(Read(&interface, false));
TRY_PCAP(Read(&ts_upper, false));
TRY_PCAP(Read(&ts_lower, false));
TRY_PCAP(Read(&incl_len, false));
TRY_PCAP(Read(&orig_len, false));
RtpPacketMarker marker = {0};
// Note: Wireshark writes nanoseconds most of the time, see comments in
// it's pcapio.c. We are only interesting in the time difference so
// truncating to uint32_t is ok.
uint64_t timestamp_ms =
((static_cast<uint64_t>(ts_upper) << 32) | ts_lower) /
kNumMicrosecsPerSec;
marker.time_offset_ms =
static_cast<uint32_t>(timestamp_ms) - stream_start_ms;
TRY_PCAP(ReadPacketHeader(&marker));
marker.pos_in_file = ftell(file_);
if (marker.payload_length > sizeof(read_buffer_)) {
RTC_LOG(LS_ERROR) << "Packet too large!";
return kResultFail;
}
TRY_PCAP(Read(read_buffer_, marker.payload_length));
if (ProcessPacket(marker, ssrc_filter,
{read_buffer_, marker.payload_length}) !=
kResultSuccess) {
return kResultFail;
}
return kResultSuccess;
}
}
return kResultSkip;
}
int ReadPacketHeader(RtpPacketMarker* marker) {
int32_t file_pos = ftell(file_);
// Check for BSD null/loopback frame header. The header is just 4 bytes in
// native byte order, so we check for both versions as we don't care about
// the header as such and will likely fail reading the IP header if this is
// something else than null/loopback.
uint32_t protocol;
TRY_PCAP(Read(&protocol, true));
if (protocol == kBsdNullLoopback1 || protocol == kBsdNullLoopback2) {
int result = ReadXxpIpHeader(marker);
if (result != kResultSkip) {
return result;
}
}
TRY_PCAP(fseek(file_, file_pos, SEEK_SET));
// Check for Ethernet II, IP frame header.
uint16_t type;
TRY_PCAP(Skip(kEthernetIIHeaderMacSkip)); // Source+destination MAC.
TRY_PCAP(Read(&type, true));
if (type == kEthertypeIp) {
int result = ReadXxpIpHeader(marker);
if (result != kResultSkip) {
return result;
}
}
return kResultSkip;
}
uint32_t CalcTimeDelta(uint32_t ts_sec, uint32_t ts_usec, uint32_t start_ms) {
// Round to nearest ms.
uint64_t t2_ms =
((static_cast<uint64_t>(ts_sec) * 1000000) + ts_usec + 500) / 1000;
uint64_t t1_ms = static_cast<uint64_t>(start_ms);
if (t2_ms < t1_ms) {
return 0;
} else {
return t2_ms - t1_ms;
}
}
int ReadXxpIpHeader(RtpPacketMarker* marker) {
RTC_DCHECK(marker);
uint16_t version;
uint16_t length;
uint16_t id;
uint16_t fragment;
uint16_t protocol;
uint16_t checksum;
TRY_PCAP(Read(&version, true));
TRY_PCAP(Read(&length, true));
TRY_PCAP(Read(&id, true));
TRY_PCAP(Read(&fragment, true));
TRY_PCAP(Read(&protocol, true));
TRY_PCAP(Read(&checksum, true));
TRY_PCAP(Read(&marker->source_ip, true));
TRY_PCAP(Read(&marker->dest_ip, true));
if (((version >> 12) & 0x000f) != kIpVersion4) {
RTC_LOG(LS_INFO) << "IP header is not IPv4";
return kResultSkip;
}
if (fragment != kFragmentOffsetClear &&
fragment != kFragmentOffsetDoNotFragment) {
RTC_LOG(LS_INFO) << "IP fragments cannot be handled";
return kResultSkip;
}
// Skip remaining fields of IP header.
uint16_t header_length = (version & 0x0f00) >> (8 - 2);
RTC_DCHECK_GE(header_length, kMinIpHeaderLength);
TRY_PCAP(Skip(header_length - kMinIpHeaderLength));
protocol = protocol & 0x00ff;
if (protocol == kProtocolTcp) {
RTC_LOG(LS_INFO) << "TCP packets are not handled";
return kResultSkip;
} else if (protocol == kProtocolUdp) {
uint16_t payload_length;
uint16_t payload_checksum;
TRY_PCAP(Read(&marker->source_port, true));
TRY_PCAP(Read(&marker->dest_port, true));
TRY_PCAP(Read(&payload_length, true));
TRY_PCAP(Read(&payload_checksum, true));
marker->payload_length = payload_length - kUdpHeaderLength;
} else {
RTC_LOG(LS_INFO) << "Unknown transport (expected UDP or TCP)";
return kResultSkip;
}
return kResultSuccess;
}
int Read(uint32_t* out, bool expect_network_order) {
uint32_t tmp = 0;
if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
return kResultFail;
}
if ((!expect_network_order && swap_pcap_byte_order_) ||
(expect_network_order && swap_network_byte_order_)) {
tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
}
*out = tmp;
return kResultSuccess;
}
int Read(uint16_t* out, bool expect_network_order) {
uint16_t tmp = 0;
if (fread(&tmp, 1, sizeof(uint16_t), file_) != sizeof(uint16_t)) {
return kResultFail;
}
if ((!expect_network_order && swap_pcap_byte_order_) ||
(expect_network_order && swap_network_byte_order_)) {
tmp = ((tmp >> 8) & 0x00ff) | (tmp << 8);
}
*out = tmp;
return kResultSuccess;
}
int Read(uint8_t* out, uint32_t count) {
if (fread(out, 1, count, file_) != count) {
return kResultFail;
}
return kResultSuccess;
}
int Read(int32_t* out, bool expect_network_order) {
int32_t tmp = 0;
if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
return kResultFail;
}
if ((!expect_network_order && swap_pcap_byte_order_) ||
(expect_network_order && swap_network_byte_order_)) {
tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
}
*out = tmp;
return kResultSuccess;
}
int Skip(uint32_t length) {
if (fseek(file_, length, SEEK_CUR) != 0) {
return kResultFail;
}
return kResultSuccess;
}
FILE* file_;
bool swap_pcap_byte_order_;
const bool swap_network_byte_order_;
bool pcapng_;
uint8_t read_buffer_[kMaxReadBufferSize];
SsrcMap packets_by_ssrc_;
std::vector<RtpPacketMarker> packets_;
PacketIterator next_packet_it_;
};
RtpFileReaderImpl* CreateReaderForFormat(RtpFileReader::FileFormat format) {
RtpFileReaderImpl* reader = nullptr;
switch (format) {
case RtpFileReader::kPcap:
reader = new PcapReader();
break;
case RtpFileReader::kRtpDump:
reader = new RtpDumpReader();
break;
case RtpFileReader::kLengthPacketInterleaved:
reader = new InterleavedRtpFileReader();
break;
}
return reader;
}
RtpFileReader* RtpFileReader::Create(FileFormat format,
const uint8_t* data,
size_t size,
const std::set<uint32_t>& ssrc_filter) {
std::unique_ptr<RtpFileReaderImpl> reader(CreateReaderForFormat(format));
FILE* file = tmpfile();
if (file == nullptr) {
RTC_LOG(LS_ERROR) << "ERROR: Can't open file from memory buffer.";
return nullptr;
}
if (fwrite(reinterpret_cast<const void*>(data), sizeof(uint8_t), size,
file) != size) {
return nullptr;
}
rewind(file);
if (!reader->Init(file, ssrc_filter)) {
return nullptr;
}
return reader.release();
}
RtpFileReader* RtpFileReader::Create(FileFormat format,
absl::string_view filename,
const std::set<uint32_t>& ssrc_filter) {
RtpFileReaderImpl* reader = CreateReaderForFormat(format);
std::string filename_str = std::string(filename);
FILE* file = fopen(filename_str.c_str(), "rb");
if (file == nullptr) {
RTC_LOG(LS_ERROR) << "ERROR: Can't open file: '" << filename_str << "'.";
return nullptr;
}
if (!reader->Init(file, ssrc_filter)) {
delete reader;
return nullptr;
}
return reader;
}
RtpFileReader* RtpFileReader::Create(FileFormat format,
absl::string_view filename) {
return RtpFileReader::Create(format, filename, std::set<uint32_t>());
}
} // namespace test
} // namespace webrtc
|