Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(131)

Side by Side Diff: net/quic/quic_fec_group.cc

Issue 157803007: Land Recent QUIC Changes. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: win_x64 compiler error fix Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/quic/quic_fec_group.h ('k') | net/quic/quic_fec_group_test.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/quic_fec_group.h" 5 #include "net/quic/quic_fec_group.h"
6 6
7 #include <limits> 7 #include <limits>
8 8
9 #include "base/basictypes.h" 9 #include "base/basictypes.h"
10 #include "base/logging.h" 10 #include "base/logging.h"
11 11
12 using base::StringPiece; 12 using base::StringPiece;
13 using std::numeric_limits; 13 using std::numeric_limits;
14 using std::set; 14 using std::set;
15 15
16 namespace net { 16 namespace net {
17 17
18 namespace { 18 namespace {
19 const QuicPacketSequenceNumber kNoSequenceNumber = kuint64max; 19 const QuicPacketSequenceNumber kNoSequenceNumber = kuint64max;
20 } // namespace 20 } // namespace
21 21
22 QuicFecGroup::QuicFecGroup() 22 QuicFecGroup::QuicFecGroup()
23 : min_protected_packet_(kNoSequenceNumber), 23 : min_protected_packet_(kNoSequenceNumber),
24 max_protected_packet_(kNoSequenceNumber), 24 max_protected_packet_(kNoSequenceNumber),
25 payload_parity_len_(0), 25 payload_parity_len_(0) {
26 entropy_parity_(false) {
27 } 26 }
28 27
29 QuicFecGroup::~QuicFecGroup() {} 28 QuicFecGroup::~QuicFecGroup() {}
30 29
31 bool QuicFecGroup::Update(const QuicPacketHeader& header, 30 bool QuicFecGroup::Update(const QuicPacketHeader& header,
32 StringPiece decrypted_payload) { 31 StringPiece decrypted_payload) {
33 if (received_packets_.count(header.packet_sequence_number) != 0) { 32 if (received_packets_.count(header.packet_sequence_number) != 0) {
34 return false; 33 return false;
35 } 34 }
36 if (min_protected_packet_ != kNoSequenceNumber && 35 if (min_protected_packet_ != kNoSequenceNumber &&
37 max_protected_packet_ != kNoSequenceNumber && 36 max_protected_packet_ != kNoSequenceNumber &&
38 (header.packet_sequence_number < min_protected_packet_ || 37 (header.packet_sequence_number < min_protected_packet_ ||
39 header.packet_sequence_number > max_protected_packet_)) { 38 header.packet_sequence_number > max_protected_packet_)) {
40 DLOG(ERROR) << "FEC group does not cover received packet: " 39 DLOG(ERROR) << "FEC group does not cover received packet: "
41 << header.packet_sequence_number; 40 << header.packet_sequence_number;
42 return false; 41 return false;
43 } 42 }
44 if (!UpdateParity(decrypted_payload, header.entropy_flag)) { 43 if (!UpdateParity(decrypted_payload)) {
45 return false; 44 return false;
46 } 45 }
47 received_packets_.insert(header.packet_sequence_number); 46 received_packets_.insert(header.packet_sequence_number);
48 return true; 47 return true;
49 } 48 }
50 49
51 bool QuicFecGroup::UpdateFec( 50 bool QuicFecGroup::UpdateFec(
52 QuicPacketSequenceNumber fec_packet_sequence_number, 51 QuicPacketSequenceNumber fec_packet_sequence_number,
53 bool fec_packet_entropy,
54 const QuicFecData& fec) { 52 const QuicFecData& fec) {
55 if (min_protected_packet_ != kNoSequenceNumber) { 53 if (min_protected_packet_ != kNoSequenceNumber) {
56 return false; 54 return false;
57 } 55 }
58 SequenceNumberSet::const_iterator it = received_packets_.begin(); 56 SequenceNumberSet::const_iterator it = received_packets_.begin();
59 while (it != received_packets_.end()) { 57 while (it != received_packets_.end()) {
60 if ((*it < fec.fec_group) || 58 if ((*it < fec.fec_group) || (*it >= fec_packet_sequence_number)) {
61 (*it >= fec_packet_sequence_number)) {
62 DLOG(ERROR) << "FEC group does not cover received packet: " << *it; 59 DLOG(ERROR) << "FEC group does not cover received packet: " << *it;
63 return false; 60 return false;
64 } 61 }
65 ++it; 62 ++it;
66 } 63 }
67 if (!UpdateParity(fec.redundancy, fec_packet_entropy)) { 64 if (!UpdateParity(fec.redundancy)) {
68 return false; 65 return false;
69 } 66 }
70 min_protected_packet_ = fec.fec_group; 67 min_protected_packet_ = fec.fec_group;
71 max_protected_packet_ = fec_packet_sequence_number - 1; 68 max_protected_packet_ = fec_packet_sequence_number - 1;
72 return true; 69 return true;
73 } 70 }
74 71
75 bool QuicFecGroup::CanRevive() const { 72 bool QuicFecGroup::CanRevive() const {
76 // We can revive if we're missing exactly 1 packet. 73 // We can revive if we're missing exactly 1 packet.
77 return NumMissingPackets() == 1; 74 return NumMissingPackets() == 1;
(...skipping 25 matching lines...) Expand all
103 100
104 DCHECK_LE(payload_parity_len_, decrypted_payload_len); 101 DCHECK_LE(payload_parity_len_, decrypted_payload_len);
105 if (payload_parity_len_ > decrypted_payload_len) { 102 if (payload_parity_len_ > decrypted_payload_len) {
106 return 0; 103 return 0;
107 } 104 }
108 for (size_t i = 0; i < payload_parity_len_; ++i) { 105 for (size_t i = 0; i < payload_parity_len_; ++i) {
109 decrypted_payload[i] = payload_parity_[i]; 106 decrypted_payload[i] = payload_parity_[i];
110 } 107 }
111 108
112 header->packet_sequence_number = missing; 109 header->packet_sequence_number = missing;
113 header->entropy_flag = entropy_parity_; 110 header->entropy_flag = false; // Unknown entropy.
114 111
115 received_packets_.insert(missing); 112 received_packets_.insert(missing);
116 return payload_parity_len_; 113 return payload_parity_len_;
117 } 114 }
118 115
119 bool QuicFecGroup::ProtectsPacketsBefore(QuicPacketSequenceNumber num) const { 116 bool QuicFecGroup::ProtectsPacketsBefore(QuicPacketSequenceNumber num) const {
120 if (max_protected_packet_ != kNoSequenceNumber) { 117 if (max_protected_packet_ != kNoSequenceNumber) {
121 return max_protected_packet_ < num; 118 return max_protected_packet_ < num;
122 } 119 }
123 // Since we might not yet have recevied the FEC packet, we must check 120 // Since we might not yet have recevied the FEC packet, we must check
124 // the packets we have received. 121 // the packets we have received.
125 return *received_packets_.begin() < num; 122 return *received_packets_.begin() < num;
126 } 123 }
127 124
128 bool QuicFecGroup::UpdateParity(StringPiece payload, bool entropy) { 125 bool QuicFecGroup::UpdateParity(StringPiece payload) {
129 DCHECK_LE(payload.size(), kMaxPacketSize); 126 DCHECK_LE(payload.size(), kMaxPacketSize);
130 if (payload.size() > kMaxPacketSize) { 127 if (payload.size() > kMaxPacketSize) {
131 DLOG(ERROR) << "Illegal payload size: " << payload.size(); 128 DLOG(ERROR) << "Illegal payload size: " << payload.size();
132 return false; 129 return false;
133 } 130 }
134 if (payload_parity_len_ < payload.size()) { 131 if (payload_parity_len_ < payload.size()) {
135 payload_parity_len_ = payload.size(); 132 payload_parity_len_ = payload.size();
136 } 133 }
137 DCHECK_LE(payload.size(), kMaxPacketSize); 134 DCHECK_LE(payload.size(), kMaxPacketSize);
138 if (received_packets_.empty() && 135 if (received_packets_.empty() &&
139 min_protected_packet_ == kNoSequenceNumber) { 136 min_protected_packet_ == kNoSequenceNumber) {
140 // Initialize the parity to the value of this payload 137 // Initialize the parity to the value of this payload
141 memcpy(payload_parity_, payload.data(), payload.size()); 138 memcpy(payload_parity_, payload.data(), payload.size());
142 if (payload.size() < kMaxPacketSize) { 139 if (payload.size() < kMaxPacketSize) {
143 // TODO(rch): expand as needed. 140 // TODO(rch): expand as needed.
144 memset(payload_parity_ + payload.size(), 0, 141 memset(payload_parity_ + payload.size(), 0,
145 kMaxPacketSize - payload.size()); 142 kMaxPacketSize - payload.size());
146 } 143 }
147 entropy_parity_ = entropy;
148 return true; 144 return true;
149 } 145 }
150 // Update the parity by XORing in the data (padding with 0s if necessary). 146 // Update the parity by XORing in the data (padding with 0s if necessary).
151 for (size_t i = 0; i < kMaxPacketSize; ++i) { 147 for (size_t i = 0; i < kMaxPacketSize; ++i) {
152 uint8 byte = i < payload.size() ? payload[i] : 0x00; 148 uint8 byte = i < payload.size() ? payload[i] : 0x00;
153 payload_parity_[i] ^= byte; 149 payload_parity_[i] ^= byte;
154 } 150 }
155 // xor of boolean values.
156 entropy_parity_ = (entropy_parity_ != entropy);
157 return true; 151 return true;
158 } 152 }
159 153
160 size_t QuicFecGroup::NumMissingPackets() const { 154 size_t QuicFecGroup::NumMissingPackets() const {
161 if (min_protected_packet_ == kNoSequenceNumber) 155 if (min_protected_packet_ == kNoSequenceNumber)
162 return numeric_limits<size_t>::max(); 156 return numeric_limits<size_t>::max();
163 return (max_protected_packet_ - min_protected_packet_ + 1) - 157 return (max_protected_packet_ - min_protected_packet_ + 1) -
164 received_packets_.size(); 158 received_packets_.size();
165 } 159 }
166 160
167 } // namespace net 161 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/quic_fec_group.h ('k') | net/quic/quic_fec_group_test.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698