blob: 476767ad577857966f7e87fc852979dc58ba1dfc [file] [log] [blame]
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +00001/*
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +00002 * Copyright (c) 2014 The WebRTC project authors. All Rights Reserved.
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +00003 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +000011#include "webrtc/test/rtp_file_reader.h"
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +000012
pbos@webrtc.org12dc1a32013-08-05 16:22:53 +000013#include <stdio.h>
14
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +000015#include <map>
16#include <string>
17#include <vector>
18
henrik.lundin@webrtc.org38c121c2014-09-30 11:08:44 +000019#include "webrtc/base/checks.h"
kwiberg4485ffb2016-04-26 08:14:39 -070020#include "webrtc/base/constructormagic.h"
pkasting@chromium.orgd3245462015-02-23 21:28:22 +000021#include "webrtc/base/format_macros.h"
kwiberg@webrtc.org00b8f6b2015-02-26 14:34:55 +000022#include "webrtc/base/scoped_ptr.h"
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +000023#include "webrtc/modules/rtp_rtcp/source/rtp_utility.h"
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +000024
25namespace webrtc {
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +000026namespace test {
27
28static const size_t kFirstLineLength = 40;
29static uint16_t kPacketHeaderSize = 8;
30
31#if 1
32# define DEBUG_LOG(text)
33# define DEBUG_LOG1(text, arg)
34#else
35# define DEBUG_LOG(text) (printf(text "\n"))
36# define DEBUG_LOG1(text, arg) (printf(text "\n", arg))
37#endif
38
39#define TRY(expr) \
40 do { \
41 if (!(expr)) { \
42 DEBUG_LOG1("FAIL at " __FILE__ ":%d", __LINE__); \
43 return false; \
44 } \
45 } while (0)
46
stefan@webrtc.org48ac2262015-03-02 16:18:56 +000047bool ReadUint32(uint32_t* out, FILE* file) {
48 *out = 0;
49 for (size_t i = 0; i < 4; ++i) {
50 *out <<= 8;
51 uint8_t tmp;
52 if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
53 return false;
54 *out |= tmp;
55 }
56 return true;
57}
58
59bool ReadUint16(uint16_t* out, FILE* file) {
60 *out = 0;
61 for (size_t i = 0; i < 2; ++i) {
62 *out <<= 8;
63 uint8_t tmp;
64 if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
65 return false;
66 *out |= tmp;
67 }
68 return true;
69}
70
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +000071class RtpFileReaderImpl : public RtpFileReader {
72 public:
stefanb947f282015-07-17 05:27:21 -070073 virtual bool Init(const std::string& filename,
74 const std::set<uint32_t>& ssrc_filter) = 0;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +000075};
76
stefan@webrtc.org48ac2262015-03-02 16:18:56 +000077class InterleavedRtpFileReader : public RtpFileReaderImpl {
78 public:
79 virtual ~InterleavedRtpFileReader() {
80 if (file_ != NULL) {
81 fclose(file_);
82 file_ = NULL;
83 }
84 }
85
stefanb947f282015-07-17 05:27:21 -070086 virtual bool Init(const std::string& filename,
87 const std::set<uint32_t>& ssrc_filter) {
stefan@webrtc.org48ac2262015-03-02 16:18:56 +000088 file_ = fopen(filename.c_str(), "rb");
89 if (file_ == NULL) {
90 printf("ERROR: Can't open file: %s\n", filename.c_str());
91 return false;
92 }
93 return true;
94 }
95 virtual bool NextPacket(RtpPacket* packet) {
96 assert(file_ != NULL);
97 packet->length = RtpPacket::kMaxPacketBufferSize;
98 uint32_t len = 0;
99 TRY(ReadUint32(&len, file_));
100 if (packet->length < len) {
101 FATAL() << "Packet is too large to fit: " << len << " bytes vs "
102 << packet->length
103 << " bytes allocated. Consider increasing the buffer "
104 "size";
105 }
106 if (fread(packet->data, 1, len, file_) != len)
107 return false;
108
109 packet->length = len;
110 packet->original_length = len;
111 packet->time_ms = time_ms_;
112 time_ms_ += 5;
113 return true;
114 }
115
116 private:
117 FILE* file_ = NULL;
118 int64_t time_ms_ = 0;
119};
120
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000121// Read RTP packets from file in rtpdump format, as documented at:
122// http://www.cs.columbia.edu/irt/software/rtptools/
123class RtpDumpReader : public RtpFileReaderImpl {
124 public:
125 RtpDumpReader() : file_(NULL) {}
126 virtual ~RtpDumpReader() {
127 if (file_ != NULL) {
128 fclose(file_);
129 file_ = NULL;
130 }
131 }
132
stefanb947f282015-07-17 05:27:21 -0700133 bool Init(const std::string& filename,
nisseef8b61e2016-04-29 06:09:15 -0700134 const std::set<uint32_t>& ssrc_filter) override {
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000135 file_ = fopen(filename.c_str(), "rb");
136 if (file_ == NULL) {
137 printf("ERROR: Can't open file: %s\n", filename.c_str());
138 return false;
139 }
140
141 char firstline[kFirstLineLength + 1] = {0};
142 if (fgets(firstline, kFirstLineLength, file_) == NULL) {
143 DEBUG_LOG("ERROR: Can't read from file\n");
144 return false;
145 }
146 if (strncmp(firstline, "#!rtpplay", 9) == 0) {
147 if (strncmp(firstline, "#!rtpplay1.0", 12) != 0) {
148 DEBUG_LOG("ERROR: wrong rtpplay version, must be 1.0\n");
149 return false;
150 }
151 } else if (strncmp(firstline, "#!RTPencode", 11) == 0) {
152 if (strncmp(firstline, "#!RTPencode1.0", 14) != 0) {
153 DEBUG_LOG("ERROR: wrong RTPencode version, must be 1.0\n");
154 return false;
155 }
156 } else {
157 DEBUG_LOG("ERROR: wrong file format of input file\n");
158 return false;
159 }
160
161 uint32_t start_sec;
162 uint32_t start_usec;
163 uint32_t source;
164 uint16_t port;
165 uint16_t padding;
stefan@webrtc.org48ac2262015-03-02 16:18:56 +0000166 TRY(ReadUint32(&start_sec, file_));
167 TRY(ReadUint32(&start_usec, file_));
168 TRY(ReadUint32(&source, file_));
169 TRY(ReadUint16(&port, file_));
170 TRY(ReadUint16(&padding, file_));
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000171
172 return true;
173 }
174
kjellander@webrtc.org14665ff2015-03-04 12:58:35 +0000175 bool NextPacket(RtpPacket* packet) override {
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000176 uint8_t* rtp_data = packet->data;
henrik.lundin@webrtc.org91d928e2014-11-26 15:50:30 +0000177 packet->length = RtpPacket::kMaxPacketBufferSize;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000178
179 uint16_t len;
180 uint16_t plen;
181 uint32_t offset;
stefan@webrtc.org48ac2262015-03-02 16:18:56 +0000182 TRY(ReadUint16(&len, file_));
183 TRY(ReadUint16(&plen, file_));
184 TRY(ReadUint32(&offset, file_));
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000185
186 // Use 'len' here because a 'plen' of 0 specifies rtcp.
187 len -= kPacketHeaderSize;
188 if (packet->length < len) {
henrik.lundin@webrtc.org38c121c2014-09-30 11:08:44 +0000189 FATAL() << "Packet is too large to fit: " << len << " bytes vs "
190 << packet->length
191 << " bytes allocated. Consider increasing the buffer "
192 "size";
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000193 }
194 if (fread(rtp_data, 1, len, file_) != len) {
195 return false;
196 }
197
198 packet->length = len;
henrik.lundin@webrtc.org38c121c2014-09-30 11:08:44 +0000199 packet->original_length = plen;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000200 packet->time_ms = offset;
201 return true;
202 }
203
204 private:
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000205 FILE* file_;
206
henrikg3c089d72015-09-16 05:37:44 -0700207 RTC_DISALLOW_COPY_AND_ASSIGN(RtpDumpReader);
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000208};
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000209
210enum {
211 kResultFail = -1,
212 kResultSuccess = 0,
213 kResultSkip = 1,
214
215 kPcapVersionMajor = 2,
216 kPcapVersionMinor = 4,
217 kLinktypeNull = 0,
218 kLinktypeEthernet = 1,
219 kBsdNullLoopback1 = 0x00000002,
220 kBsdNullLoopback2 = 0x02000000,
221 kEthernetIIHeaderMacSkip = 12,
222 kEthertypeIp = 0x0800,
223 kIpVersion4 = 4,
224 kMinIpHeaderLength = 20,
225 kFragmentOffsetClear = 0x0000,
226 kFragmentOffsetDoNotFragment = 0x4000,
227 kProtocolTcp = 0x06,
228 kProtocolUdp = 0x11,
229 kUdpHeaderLength = 8,
230 kMaxReadBufferSize = 4096
231};
232
233const uint32_t kPcapBOMSwapOrder = 0xd4c3b2a1UL;
234const uint32_t kPcapBOMNoSwapOrder = 0xa1b2c3d4UL;
235
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000236#define TRY_PCAP(expr) \
237 do { \
238 int r = (expr); \
239 if (r == kResultFail) { \
240 DEBUG_LOG1("FAIL at " __FILE__ ":%d", __LINE__); \
241 return kResultFail; \
242 } else if (r == kResultSkip) { \
243 return kResultSkip; \
244 } \
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000245 } while (0)
246
247// Read RTP packets from file in tcpdump/libpcap format, as documented at:
248// http://wiki.wireshark.org/Development/LibpcapFileFormat
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000249class PcapReader : public RtpFileReaderImpl {
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000250 public:
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000251 PcapReader()
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000252 : file_(NULL),
253 swap_pcap_byte_order_(false),
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000254#ifdef WEBRTC_ARCH_BIG_ENDIAN
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000255 swap_network_byte_order_(false),
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000256#else
257 swap_network_byte_order_(true),
258#endif
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000259 read_buffer_(),
260 packets_by_ssrc_(),
261 packets_(),
262 next_packet_it_() {
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000263 }
264
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000265 virtual ~PcapReader() {
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000266 if (file_ != NULL) {
267 fclose(file_);
268 file_ = NULL;
269 }
270 }
271
stefanb947f282015-07-17 05:27:21 -0700272 bool Init(const std::string& filename,
273 const std::set<uint32_t>& ssrc_filter) override {
274 return Initialize(filename, ssrc_filter) == kResultSuccess;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000275 }
276
stefanb947f282015-07-17 05:27:21 -0700277 int Initialize(const std::string& filename,
278 const std::set<uint32_t>& ssrc_filter) {
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000279 file_ = fopen(filename.c_str(), "rb");
280 if (file_ == NULL) {
281 printf("ERROR: Can't open file: %s\n", filename.c_str());
282 return kResultFail;
283 }
284
285 if (ReadGlobalHeader() < 0) {
286 return kResultFail;
287 }
288
289 int total_packet_count = 0;
290 uint32_t stream_start_ms = 0;
291 int32_t next_packet_pos = ftell(file_);
292 for (;;) {
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000293 TRY_PCAP(fseek(file_, next_packet_pos, SEEK_SET));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000294 int result = ReadPacket(&next_packet_pos, stream_start_ms,
stefanb947f282015-07-17 05:27:21 -0700295 ++total_packet_count, ssrc_filter);
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000296 if (result == kResultFail) {
297 break;
298 } else if (result == kResultSuccess && packets_.size() == 1) {
299 assert(stream_start_ms == 0);
300 PacketIterator it = packets_.begin();
301 stream_start_ms = it->time_offset_ms;
302 it->time_offset_ms = 0;
303 }
304 }
305
306 if (feof(file_) == 0) {
307 printf("Failed reading file!\n");
308 return kResultFail;
309 }
310
311 printf("Total packets in file: %d\n", total_packet_count);
pkasting@chromium.orgd3245462015-02-23 21:28:22 +0000312 printf("Total RTP/RTCP packets: %" PRIuS "\n", packets_.size());
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000313
314 for (SsrcMapIterator mit = packets_by_ssrc_.begin();
315 mit != packets_by_ssrc_.end(); ++mit) {
316 uint32_t ssrc = mit->first;
stefanb947f282015-07-17 05:27:21 -0700317 const std::vector<uint32_t>& packet_indices = mit->second;
318 uint8_t pt = packets_[packet_indices[0]].rtp_header.payloadType;
pkasting@chromium.orgd3245462015-02-23 21:28:22 +0000319 printf("SSRC: %08x, %" PRIuS " packets, pt=%d\n", ssrc,
stefanb947f282015-07-17 05:27:21 -0700320 packet_indices.size(), pt);
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000321 }
322
323 // TODO(solenberg): Better validation of identified SSRC streams.
324 //
325 // Since we're dealing with raw network data here, we will wrongly identify
326 // some packets as RTP. When these packets are consumed by RtpPlayer, they
327 // are unlikely to cause issues as they will ultimately be filtered out by
328 // the RtpRtcp module. However, we should really do better filtering here,
329 // which we can accomplish in a number of ways, e.g.:
330 //
331 // - Verify that the time stamps and sequence numbers for RTP packets are
332 // both increasing/decreasing. If they move in different directions, the
333 // SSRC is likely bogus and can be dropped. (Normally they should be inc-
334 // reasing but we must allow packet reordering).
335 // - If RTP sequence number is not changing, drop the stream.
336 // - Can also use srcip:port->dstip:port pairs, assuming few SSRC collisions
337 // for up/down streams.
338
339 next_packet_it_ = packets_.begin();
340 return kResultSuccess;
341 }
342
kjellander@webrtc.org14665ff2015-03-04 12:58:35 +0000343 bool NextPacket(RtpPacket* packet) override {
henrik.lundin@webrtc.org91d928e2014-11-26 15:50:30 +0000344 uint32_t length = RtpPacket::kMaxPacketBufferSize;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000345 if (NextPcap(packet->data, &length, &packet->time_ms) != kResultSuccess)
346 return false;
347 packet->length = static_cast<size_t>(length);
henrik.lundin@webrtc.org38c121c2014-09-30 11:08:44 +0000348 packet->original_length = packet->length;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000349 return true;
350 }
351
352 virtual int NextPcap(uint8_t* data, uint32_t* length, uint32_t* time_ms) {
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000353 assert(data);
354 assert(length);
355 assert(time_ms);
356
357 if (next_packet_it_ == packets_.end()) {
358 return -1;
359 }
360 if (*length < next_packet_it_->payload_length) {
361 return -1;
362 }
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000363 TRY_PCAP(fseek(file_, next_packet_it_->pos_in_file, SEEK_SET));
364 TRY_PCAP(Read(data, next_packet_it_->payload_length));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000365 *length = next_packet_it_->payload_length;
366 *time_ms = next_packet_it_->time_offset_ms;
367 next_packet_it_++;
368
369 return 0;
370 }
371
372 private:
373 // A marker of an RTP packet within the file.
374 struct RtpPacketMarker {
solenberg@webrtc.orga5fd2f12013-06-26 08:36:07 +0000375 uint32_t packet_number; // One-based index (like in WireShark)
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000376 uint32_t time_offset_ms;
377 uint32_t source_ip;
378 uint32_t dest_ip;
379 uint16_t source_port;
380 uint16_t dest_port;
stefan@webrtc.orga5cb98c2013-05-29 12:12:51 +0000381 RTPHeader rtp_header;
solenberg@webrtc.orga5fd2f12013-06-26 08:36:07 +0000382 int32_t pos_in_file; // Byte offset of payload from start of file.
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000383 uint32_t payload_length;
384 };
385
386 typedef std::vector<RtpPacketMarker>::iterator PacketIterator;
387 typedef std::map<uint32_t, std::vector<uint32_t> > SsrcMap;
388 typedef std::map<uint32_t, std::vector<uint32_t> >::iterator SsrcMapIterator;
389
390 int ReadGlobalHeader() {
391 uint32_t magic;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000392 TRY_PCAP(Read(&magic, false));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000393 if (magic == kPcapBOMSwapOrder) {
394 swap_pcap_byte_order_ = true;
395 } else if (magic == kPcapBOMNoSwapOrder) {
396 swap_pcap_byte_order_ = false;
397 } else {
398 return kResultFail;
399 }
400
401 uint16_t version_major;
402 uint16_t version_minor;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000403 TRY_PCAP(Read(&version_major, false));
404 TRY_PCAP(Read(&version_minor, false));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000405 if (version_major != kPcapVersionMajor ||
406 version_minor != kPcapVersionMinor) {
407 return kResultFail;
408 }
409
410 int32_t this_zone; // GMT to local correction.
411 uint32_t sigfigs; // Accuracy of timestamps.
412 uint32_t snaplen; // Max length of captured packets, in octets.
413 uint32_t network; // Data link type.
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000414 TRY_PCAP(Read(&this_zone, false));
415 TRY_PCAP(Read(&sigfigs, false));
416 TRY_PCAP(Read(&snaplen, false));
417 TRY_PCAP(Read(&network, false));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000418
419 // Accept only LINKTYPE_NULL and LINKTYPE_ETHERNET.
420 // See: http://www.tcpdump.org/linktypes.html
421 if (network != kLinktypeNull && network != kLinktypeEthernet) {
422 return kResultFail;
423 }
424
425 return kResultSuccess;
426 }
427
stefanb947f282015-07-17 05:27:21 -0700428 int ReadPacket(int32_t* next_packet_pos,
429 uint32_t stream_start_ms,
430 uint32_t number,
431 const std::set<uint32_t>& ssrc_filter) {
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000432 assert(next_packet_pos);
433
434 uint32_t ts_sec; // Timestamp seconds.
435 uint32_t ts_usec; // Timestamp microseconds.
436 uint32_t incl_len; // Number of octets of packet saved in file.
437 uint32_t orig_len; // Actual length of packet.
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000438 TRY_PCAP(Read(&ts_sec, false));
439 TRY_PCAP(Read(&ts_usec, false));
440 TRY_PCAP(Read(&incl_len, false));
441 TRY_PCAP(Read(&orig_len, false));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000442
443 *next_packet_pos = ftell(file_) + incl_len;
444
445 RtpPacketMarker marker = {0};
446 marker.packet_number = number;
447 marker.time_offset_ms = CalcTimeDelta(ts_sec, ts_usec, stream_start_ms);
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000448 TRY_PCAP(ReadPacketHeader(&marker));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000449 marker.pos_in_file = ftell(file_);
450
451 if (marker.payload_length > sizeof(read_buffer_)) {
452 printf("Packet too large!\n");
453 return kResultFail;
454 }
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000455 TRY_PCAP(Read(read_buffer_, marker.payload_length));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000456
pbos@webrtc.org62bafae2014-07-08 12:10:51 +0000457 RtpUtility::RtpHeaderParser rtp_parser(read_buffer_, marker.payload_length);
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000458 if (rtp_parser.RTCP()) {
solenberg@webrtc.orga5fd2f12013-06-26 08:36:07 +0000459 rtp_parser.ParseRtcp(&marker.rtp_header);
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000460 packets_.push_back(marker);
461 } else {
danilchapf6975f42015-12-28 10:18:46 -0800462 if (!rtp_parser.Parse(&marker.rtp_header, nullptr)) {
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000463 DEBUG_LOG("Not recognized as RTP/RTCP");
464 return kResultSkip;
465 }
466
stefan@webrtc.orga5cb98c2013-05-29 12:12:51 +0000467 uint32_t ssrc = marker.rtp_header.ssrc;
stefanb947f282015-07-17 05:27:21 -0700468 if (ssrc_filter.empty() || ssrc_filter.find(ssrc) != ssrc_filter.end()) {
469 packets_by_ssrc_[ssrc].push_back(
470 static_cast<uint32_t>(packets_.size()));
471 packets_.push_back(marker);
472 } else {
473 return kResultSkip;
474 }
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000475 }
476
477 return kResultSuccess;
478 }
479
480 int ReadPacketHeader(RtpPacketMarker* marker) {
481 int32_t file_pos = ftell(file_);
482
483 // Check for BSD null/loopback frame header. The header is just 4 bytes in
484 // native byte order, so we check for both versions as we don't care about
485 // the header as such and will likely fail reading the IP header if this is
486 // something else than null/loopback.
487 uint32_t protocol;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000488 TRY_PCAP(Read(&protocol, true));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000489 if (protocol == kBsdNullLoopback1 || protocol == kBsdNullLoopback2) {
490 int result = ReadXxpIpHeader(marker);
491 DEBUG_LOG("Recognized loopback frame");
492 if (result != kResultSkip) {
493 return result;
494 }
495 }
496
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000497 TRY_PCAP(fseek(file_, file_pos, SEEK_SET));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000498
499 // Check for Ethernet II, IP frame header.
500 uint16_t type;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000501 TRY_PCAP(Skip(kEthernetIIHeaderMacSkip)); // Source+destination MAC.
502 TRY_PCAP(Read(&type, true));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000503 if (type == kEthertypeIp) {
504 int result = ReadXxpIpHeader(marker);
505 DEBUG_LOG("Recognized ethernet 2 frame");
506 if (result != kResultSkip) {
507 return result;
508 }
509 }
510
511 return kResultSkip;
512 }
513
514 uint32_t CalcTimeDelta(uint32_t ts_sec, uint32_t ts_usec, uint32_t start_ms) {
515 // Round to nearest ms.
516 uint64_t t2_ms = ((static_cast<uint64_t>(ts_sec) * 1000000) + ts_usec +
517 500) / 1000;
518 uint64_t t1_ms = static_cast<uint64_t>(start_ms);
519 if (t2_ms < t1_ms) {
520 return 0;
521 } else {
522 return t2_ms - t1_ms;
523 }
524 }
525
526 int ReadXxpIpHeader(RtpPacketMarker* marker) {
527 assert(marker);
528
529 uint16_t version;
530 uint16_t length;
531 uint16_t id;
532 uint16_t fragment;
533 uint16_t protocol;
534 uint16_t checksum;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000535 TRY_PCAP(Read(&version, true));
536 TRY_PCAP(Read(&length, true));
537 TRY_PCAP(Read(&id, true));
538 TRY_PCAP(Read(&fragment, true));
539 TRY_PCAP(Read(&protocol, true));
540 TRY_PCAP(Read(&checksum, true));
541 TRY_PCAP(Read(&marker->source_ip, true));
542 TRY_PCAP(Read(&marker->dest_ip, true));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000543
544 if (((version >> 12) & 0x000f) != kIpVersion4) {
545 DEBUG_LOG("IP header is not IPv4");
546 return kResultSkip;
547 }
548
549 if (fragment != kFragmentOffsetClear &&
550 fragment != kFragmentOffsetDoNotFragment) {
551 DEBUG_LOG("IP fragments cannot be handled");
552 return kResultSkip;
553 }
554
555 // Skip remaining fields of IP header.
556 uint16_t header_length = (version & 0x0f00) >> (8 - 2);
557 assert(header_length >= kMinIpHeaderLength);
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000558 TRY_PCAP(Skip(header_length - kMinIpHeaderLength));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000559
560 protocol = protocol & 0x00ff;
561 if (protocol == kProtocolTcp) {
562 DEBUG_LOG("TCP packets are not handled");
563 return kResultSkip;
564 } else if (protocol == kProtocolUdp) {
565 uint16_t length;
566 uint16_t checksum;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000567 TRY_PCAP(Read(&marker->source_port, true));
568 TRY_PCAP(Read(&marker->dest_port, true));
569 TRY_PCAP(Read(&length, true));
570 TRY_PCAP(Read(&checksum, true));
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000571 marker->payload_length = length - kUdpHeaderLength;
572 } else {
573 DEBUG_LOG("Unknown transport (expected UDP or TCP)");
574 return kResultSkip;
575 }
576
577 return kResultSuccess;
578 }
579
580 int Read(uint32_t* out, bool expect_network_order) {
581 uint32_t tmp = 0;
582 if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
583 return kResultFail;
584 }
585 if ((!expect_network_order && swap_pcap_byte_order_) ||
586 (expect_network_order && swap_network_byte_order_)) {
587 tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
588 ((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
589 }
590 *out = tmp;
591 return kResultSuccess;
592 }
593
594 int Read(uint16_t* out, bool expect_network_order) {
595 uint16_t tmp = 0;
596 if (fread(&tmp, 1, sizeof(uint16_t), file_) != sizeof(uint16_t)) {
597 return kResultFail;
598 }
599 if ((!expect_network_order && swap_pcap_byte_order_) ||
600 (expect_network_order && swap_network_byte_order_)) {
601 tmp = ((tmp >> 8) & 0x00ff) | (tmp << 8);
602 }
603 *out = tmp;
604 return kResultSuccess;
605 }
606
607 int Read(uint8_t* out, uint32_t count) {
608 if (fread(out, 1, count, file_) != count) {
609 return kResultFail;
610 }
611 return kResultSuccess;
612 }
613
614 int Read(int32_t* out, bool expect_network_order) {
615 int32_t tmp = 0;
616 if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
617 return kResultFail;
618 }
619 if ((!expect_network_order && swap_pcap_byte_order_) ||
620 (expect_network_order && swap_network_byte_order_)) {
621 tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
622 ((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
623 }
624 *out = tmp;
625 return kResultSuccess;
626 }
627
628 int Skip(uint32_t length) {
629 if (fseek(file_, length, SEEK_CUR) != 0) {
630 return kResultFail;
631 }
632 return kResultSuccess;
633 }
634
635 FILE* file_;
636 bool swap_pcap_byte_order_;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000637 const bool swap_network_byte_order_;
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000638 uint8_t read_buffer_[kMaxReadBufferSize];
639
640 SsrcMap packets_by_ssrc_;
641 std::vector<RtpPacketMarker> packets_;
642 PacketIterator next_packet_it_;
643
henrikg3c089d72015-09-16 05:37:44 -0700644 RTC_DISALLOW_COPY_AND_ASSIGN(PcapReader);
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000645};
646
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000647RtpFileReader* RtpFileReader::Create(FileFormat format,
stefanb947f282015-07-17 05:27:21 -0700648 const std::string& filename,
649 const std::set<uint32_t>& ssrc_filter) {
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000650 RtpFileReaderImpl* reader = NULL;
651 switch (format) {
652 case kPcap:
653 reader = new PcapReader();
654 break;
655 case kRtpDump:
656 reader = new RtpDumpReader();
657 break;
stefan@webrtc.org48ac2262015-03-02 16:18:56 +0000658 case kLengthPacketInterleaved:
659 reader = new InterleavedRtpFileReader();
660 break;
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000661 }
stefanb947f282015-07-17 05:27:21 -0700662 if (!reader->Init(filename, ssrc_filter)) {
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000663 delete reader;
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000664 return NULL;
665 }
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000666 return reader;
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000667}
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000668
stefanb947f282015-07-17 05:27:21 -0700669RtpFileReader* RtpFileReader::Create(FileFormat format,
670 const std::string& filename) {
671 return RtpFileReader::Create(format, filename, std::set<uint32_t>());
672}
673
pbos@webrtc.org4b5625e2014-08-06 16:26:56 +0000674} // namespace test
solenberg@webrtc.org56b5f772013-04-16 10:31:56 +0000675} // namespace webrtc