| OLD | NEW |
| (Empty) |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "media/cast/rtcp/rtcp_utility.h" | |
| 6 | |
| 7 #include "base/big_endian.h" | |
| 8 #include "base/logging.h" | |
| 9 #include "media/cast/transport/cast_transport_defines.h" | |
| 10 | |
| 11 namespace media { | |
| 12 namespace cast { | |
| 13 | |
| 14 RtcpParser::RtcpParser(const uint8* rtcpData, size_t rtcpDataLength) | |
| 15 : rtcp_data_begin_(rtcpData), | |
| 16 rtcp_data_end_(rtcpData + rtcpDataLength), | |
| 17 valid_packet_(false), | |
| 18 rtcp_data_(rtcpData), | |
| 19 rtcp_block_end_(NULL), | |
| 20 state_(kStateTopLevel), | |
| 21 number_of_blocks_(0), | |
| 22 field_type_(kRtcpNotValidCode) { | |
| 23 memset(&field_, 0, sizeof(field_)); | |
| 24 Validate(); | |
| 25 } | |
| 26 | |
| 27 RtcpParser::~RtcpParser() {} | |
| 28 | |
| 29 RtcpFieldTypes RtcpParser::FieldType() const { return field_type_; } | |
| 30 | |
| 31 const RtcpField& RtcpParser::Field() const { return field_; } | |
| 32 | |
| 33 RtcpFieldTypes RtcpParser::Begin() { | |
| 34 rtcp_data_ = rtcp_data_begin_; | |
| 35 return Iterate(); | |
| 36 } | |
| 37 | |
| 38 RtcpFieldTypes RtcpParser::Iterate() { | |
| 39 // Reset packet type | |
| 40 field_type_ = kRtcpNotValidCode; | |
| 41 | |
| 42 if (!IsValid()) | |
| 43 return kRtcpNotValidCode; | |
| 44 | |
| 45 switch (state_) { | |
| 46 case kStateTopLevel: | |
| 47 IterateTopLevel(); | |
| 48 break; | |
| 49 case kStateReportBlock: | |
| 50 IterateReportBlockItem(); | |
| 51 break; | |
| 52 case kStateSdes: | |
| 53 IterateSdesItem(); | |
| 54 break; | |
| 55 case kStateBye: | |
| 56 IterateByeItem(); | |
| 57 break; | |
| 58 case kStateApplicationSpecificCastReceiverFrameLog: | |
| 59 IterateCastReceiverLogFrame(); | |
| 60 break; | |
| 61 case kStateApplicationSpecificCastReceiverEventLog: | |
| 62 IterateCastReceiverLogEvent(); | |
| 63 break; | |
| 64 case kStateExtendedReportBlock: | |
| 65 IterateExtendedReportItem(); | |
| 66 break; | |
| 67 case kStateExtendedReportDelaySinceLastReceiverReport: | |
| 68 IterateExtendedReportDelaySinceLastReceiverReportItem(); | |
| 69 break; | |
| 70 case kStateGenericRtpFeedbackNack: | |
| 71 IterateNackItem(); | |
| 72 break; | |
| 73 case kStatePayloadSpecificRpsi: | |
| 74 IterateRpsiItem(); | |
| 75 break; | |
| 76 case kStatePayloadSpecificFir: | |
| 77 IterateFirItem(); | |
| 78 break; | |
| 79 case kStatePayloadSpecificApplication: | |
| 80 IteratePayloadSpecificAppItem(); | |
| 81 break; | |
| 82 case kStatePayloadSpecificRemb: | |
| 83 IteratePayloadSpecificRembItem(); | |
| 84 break; | |
| 85 case kStatePayloadSpecificCast: | |
| 86 IteratePayloadSpecificCastItem(); | |
| 87 break; | |
| 88 case kStatePayloadSpecificCastNack: | |
| 89 IteratePayloadSpecificCastNackItem(); | |
| 90 break; | |
| 91 } | |
| 92 return field_type_; | |
| 93 } | |
| 94 | |
| 95 void RtcpParser::IterateTopLevel() { | |
| 96 for (;;) { | |
| 97 RtcpCommonHeader header; | |
| 98 | |
| 99 bool success = RtcpParseCommonHeader(rtcp_data_, rtcp_data_end_, &header); | |
| 100 if (!success) | |
| 101 return; | |
| 102 | |
| 103 rtcp_block_end_ = rtcp_data_ + header.length_in_octets; | |
| 104 | |
| 105 if (rtcp_block_end_ > rtcp_data_end_) | |
| 106 return; // Bad block! | |
| 107 | |
| 108 switch (header.PT) { | |
| 109 case transport::kPacketTypeSenderReport: | |
| 110 // number of Report blocks | |
| 111 number_of_blocks_ = header.IC; | |
| 112 ParseSR(); | |
| 113 return; | |
| 114 case transport::kPacketTypeReceiverReport: | |
| 115 // number of Report blocks | |
| 116 number_of_blocks_ = header.IC; | |
| 117 ParseRR(); | |
| 118 return; | |
| 119 case transport::kPacketTypeSdes: | |
| 120 // number of Sdes blocks | |
| 121 number_of_blocks_ = header.IC; | |
| 122 if (!ParseSdes()) { | |
| 123 break; // Nothing supported found, continue to next block! | |
| 124 } | |
| 125 return; | |
| 126 case transport::kPacketTypeBye: | |
| 127 number_of_blocks_ = header.IC; | |
| 128 if (!ParseBye()) { | |
| 129 // Nothing supported found, continue to next block! | |
| 130 break; | |
| 131 } | |
| 132 return; | |
| 133 case transport::kPacketTypeApplicationDefined: | |
| 134 if (!ParseApplicationDefined(header.IC)) { | |
| 135 // Nothing supported found, continue to next block! | |
| 136 break; | |
| 137 } | |
| 138 return; | |
| 139 case transport::kPacketTypeGenericRtpFeedback: // Fall through! | |
| 140 case transport::kPacketTypePayloadSpecific: | |
| 141 if (!ParseFeedBackCommon(header)) { | |
| 142 // Nothing supported found, continue to next block! | |
| 143 break; | |
| 144 } | |
| 145 return; | |
| 146 case transport::kPacketTypeXr: | |
| 147 if (!ParseExtendedReport()) { | |
| 148 break; // Nothing supported found, continue to next block! | |
| 149 } | |
| 150 return; | |
| 151 default: | |
| 152 // Not supported! Skip! | |
| 153 EndCurrentBlock(); | |
| 154 break; | |
| 155 } | |
| 156 } | |
| 157 } | |
| 158 | |
| 159 void RtcpParser::IterateReportBlockItem() { | |
| 160 bool success = ParseReportBlockItem(); | |
| 161 if (!success) | |
| 162 Iterate(); | |
| 163 } | |
| 164 | |
| 165 void RtcpParser::IterateSdesItem() { | |
| 166 bool success = ParseSdesItem(); | |
| 167 if (!success) | |
| 168 Iterate(); | |
| 169 } | |
| 170 | |
| 171 void RtcpParser::IterateByeItem() { | |
| 172 bool success = ParseByeItem(); | |
| 173 if (!success) | |
| 174 Iterate(); | |
| 175 } | |
| 176 | |
| 177 void RtcpParser::IterateExtendedReportItem() { | |
| 178 bool success = ParseExtendedReportItem(); | |
| 179 if (!success) | |
| 180 Iterate(); | |
| 181 } | |
| 182 | |
| 183 void RtcpParser::IterateExtendedReportDelaySinceLastReceiverReportItem() { | |
| 184 bool success = ParseExtendedReportDelaySinceLastReceiverReport(); | |
| 185 if (!success) | |
| 186 Iterate(); | |
| 187 } | |
| 188 | |
| 189 void RtcpParser::IterateNackItem() { | |
| 190 bool success = ParseNackItem(); | |
| 191 if (!success) | |
| 192 Iterate(); | |
| 193 } | |
| 194 | |
| 195 void RtcpParser::IterateRpsiItem() { | |
| 196 bool success = ParseRpsiItem(); | |
| 197 if (!success) | |
| 198 Iterate(); | |
| 199 } | |
| 200 | |
| 201 void RtcpParser::IterateFirItem() { | |
| 202 bool success = ParseFirItem(); | |
| 203 if (!success) | |
| 204 Iterate(); | |
| 205 } | |
| 206 | |
| 207 void RtcpParser::IteratePayloadSpecificAppItem() { | |
| 208 bool success = ParsePayloadSpecificAppItem(); | |
| 209 if (!success) | |
| 210 Iterate(); | |
| 211 } | |
| 212 | |
| 213 void RtcpParser::IteratePayloadSpecificRembItem() { | |
| 214 bool success = ParsePayloadSpecificRembItem(); | |
| 215 if (!success) | |
| 216 Iterate(); | |
| 217 } | |
| 218 | |
| 219 void RtcpParser::IteratePayloadSpecificCastItem() { | |
| 220 bool success = ParsePayloadSpecificCastItem(); | |
| 221 if (!success) | |
| 222 Iterate(); | |
| 223 } | |
| 224 | |
| 225 void RtcpParser::IteratePayloadSpecificCastNackItem() { | |
| 226 bool success = ParsePayloadSpecificCastNackItem(); | |
| 227 if (!success) | |
| 228 Iterate(); | |
| 229 } | |
| 230 | |
| 231 void RtcpParser::IterateCastReceiverLogFrame() { | |
| 232 bool success = ParseCastReceiverLogFrameItem(); | |
| 233 if (!success) | |
| 234 Iterate(); | |
| 235 } | |
| 236 | |
| 237 void RtcpParser::IterateCastReceiverLogEvent() { | |
| 238 bool success = ParseCastReceiverLogEventItem(); | |
| 239 if (!success) | |
| 240 Iterate(); | |
| 241 } | |
| 242 | |
| 243 void RtcpParser::Validate() { | |
| 244 if (rtcp_data_ == NULL) | |
| 245 return; // NOT VALID | |
| 246 | |
| 247 RtcpCommonHeader header; | |
| 248 bool success = | |
| 249 RtcpParseCommonHeader(rtcp_data_begin_, rtcp_data_end_, &header); | |
| 250 | |
| 251 if (!success) | |
| 252 return; // NOT VALID! | |
| 253 | |
| 254 valid_packet_ = true; | |
| 255 } | |
| 256 | |
| 257 bool RtcpParser::IsValid() const { return valid_packet_; } | |
| 258 | |
| 259 void RtcpParser::EndCurrentBlock() { rtcp_data_ = rtcp_block_end_; } | |
| 260 | |
| 261 bool RtcpParser::RtcpParseCommonHeader(const uint8* data_begin, | |
| 262 const uint8* data_end, | |
| 263 RtcpCommonHeader* parsed_header) const { | |
| 264 if (!data_begin || !data_end) | |
| 265 return false; | |
| 266 | |
| 267 // 0 1 2 3 | |
| 268 // 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |
| 269 // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| 270 // |V=2|P| IC | PT | length | | |
| 271 // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| 272 // | |
| 273 // Common header for all Rtcp packets, 4 octets. | |
| 274 | |
| 275 if ((data_end - data_begin) < 4) | |
| 276 return false; | |
| 277 | |
| 278 parsed_header->V = data_begin[0] >> 6; | |
| 279 parsed_header->P = ((data_begin[0] & 0x20) == 0) ? false : true; | |
| 280 parsed_header->IC = data_begin[0] & 0x1f; | |
| 281 parsed_header->PT = data_begin[1]; | |
| 282 | |
| 283 parsed_header->length_in_octets = | |
| 284 ((data_begin[2] << 8) + data_begin[3] + 1) * 4; | |
| 285 | |
| 286 if (parsed_header->length_in_octets == 0) | |
| 287 return false; | |
| 288 | |
| 289 // Check if RTP version field == 2. | |
| 290 if (parsed_header->V != 2) | |
| 291 return false; | |
| 292 | |
| 293 return true; | |
| 294 } | |
| 295 | |
| 296 bool RtcpParser::ParseRR() { | |
| 297 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 298 if (length < 8) | |
| 299 return false; | |
| 300 | |
| 301 field_type_ = kRtcpRrCode; | |
| 302 | |
| 303 base::BigEndianReader big_endian_reader( | |
| 304 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 305 big_endian_reader.Skip(4); // Skip header | |
| 306 big_endian_reader.ReadU32(&field_.receiver_report.sender_ssrc); | |
| 307 field_.receiver_report.number_of_report_blocks = number_of_blocks_; | |
| 308 rtcp_data_ += 8; | |
| 309 | |
| 310 // State transition | |
| 311 state_ = kStateReportBlock; | |
| 312 return true; | |
| 313 } | |
| 314 | |
| 315 bool RtcpParser::ParseSR() { | |
| 316 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 317 if (length < 28) { | |
| 318 EndCurrentBlock(); | |
| 319 return false; | |
| 320 } | |
| 321 field_type_ = kRtcpSrCode; | |
| 322 | |
| 323 base::BigEndianReader big_endian_reader( | |
| 324 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 325 big_endian_reader.Skip(4); // Skip header | |
| 326 big_endian_reader.ReadU32(&field_.sender_report.sender_ssrc); | |
| 327 big_endian_reader.ReadU32(&field_.sender_report.ntp_most_significant); | |
| 328 big_endian_reader.ReadU32(&field_.sender_report.ntp_least_significant); | |
| 329 big_endian_reader.ReadU32(&field_.sender_report.rtp_timestamp); | |
| 330 big_endian_reader.ReadU32(&field_.sender_report.sender_packet_count); | |
| 331 big_endian_reader.ReadU32(&field_.sender_report.sender_octet_count); | |
| 332 field_.sender_report.number_of_report_blocks = number_of_blocks_; | |
| 333 rtcp_data_ += 28; | |
| 334 | |
| 335 if (number_of_blocks_ != 0) { | |
| 336 // State transition. | |
| 337 state_ = kStateReportBlock; | |
| 338 } else { | |
| 339 // Don't go to state report block item if 0 report blocks. | |
| 340 state_ = kStateTopLevel; | |
| 341 EndCurrentBlock(); | |
| 342 } | |
| 343 return true; | |
| 344 } | |
| 345 | |
| 346 bool RtcpParser::ParseReportBlockItem() { | |
| 347 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 348 if (length < 24 || number_of_blocks_ <= 0) { | |
| 349 state_ = kStateTopLevel; | |
| 350 EndCurrentBlock(); | |
| 351 return false; | |
| 352 } | |
| 353 | |
| 354 base::BigEndianReader big_endian_reader( | |
| 355 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 356 big_endian_reader.ReadU32(&field_.report_block_item.ssrc); | |
| 357 big_endian_reader.ReadU8(&field_.report_block_item.fraction_lost); | |
| 358 | |
| 359 uint8 temp_number_of_packets_lost; | |
| 360 big_endian_reader.ReadU8(&temp_number_of_packets_lost); | |
| 361 field_.report_block_item.cumulative_number_of_packets_lost = | |
| 362 temp_number_of_packets_lost << 16; | |
| 363 big_endian_reader.ReadU8(&temp_number_of_packets_lost); | |
| 364 field_.report_block_item.cumulative_number_of_packets_lost += | |
| 365 temp_number_of_packets_lost << 8; | |
| 366 big_endian_reader.ReadU8(&temp_number_of_packets_lost); | |
| 367 field_.report_block_item.cumulative_number_of_packets_lost += | |
| 368 temp_number_of_packets_lost; | |
| 369 | |
| 370 big_endian_reader.ReadU32( | |
| 371 &field_.report_block_item.extended_highest_sequence_number); | |
| 372 big_endian_reader.ReadU32(&field_.report_block_item.jitter); | |
| 373 big_endian_reader.ReadU32(&field_.report_block_item.last_sender_report); | |
| 374 big_endian_reader.ReadU32(&field_.report_block_item.delay_last_sender_report); | |
| 375 rtcp_data_ += 24; | |
| 376 | |
| 377 number_of_blocks_--; | |
| 378 field_type_ = kRtcpReportBlockItemCode; | |
| 379 return true; | |
| 380 } | |
| 381 | |
| 382 bool RtcpParser::ParseSdes() { | |
| 383 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 384 | |
| 385 if (length < 8) { | |
| 386 state_ = kStateTopLevel; | |
| 387 EndCurrentBlock(); | |
| 388 return false; | |
| 389 } | |
| 390 rtcp_data_ += 4; // Skip header | |
| 391 | |
| 392 state_ = kStateSdes; | |
| 393 field_type_ = kRtcpSdesCode; | |
| 394 return true; | |
| 395 } | |
| 396 | |
| 397 bool RtcpParser::ParseSdesItem() { | |
| 398 if (number_of_blocks_ <= 0) { | |
| 399 state_ = kStateTopLevel; | |
| 400 EndCurrentBlock(); | |
| 401 return false; | |
| 402 } | |
| 403 number_of_blocks_--; | |
| 404 | |
| 405 // Find c_name item in a Sdes chunk. | |
| 406 while (rtcp_data_ < rtcp_block_end_) { | |
| 407 ptrdiff_t data_length = rtcp_block_end_ - rtcp_data_; | |
| 408 if (data_length < 4) { | |
| 409 state_ = kStateTopLevel; | |
| 410 EndCurrentBlock(); | |
| 411 return false; | |
| 412 } | |
| 413 | |
| 414 uint32 ssrc; | |
| 415 base::BigEndianReader big_endian_reader( | |
| 416 reinterpret_cast<const char*>(rtcp_data_), data_length); | |
| 417 big_endian_reader.ReadU32(&ssrc); | |
| 418 rtcp_data_ += 4; | |
| 419 | |
| 420 bool found_c_name = ParseSdesTypes(); | |
| 421 if (found_c_name) { | |
| 422 field_.c_name.sender_ssrc = ssrc; | |
| 423 return true; | |
| 424 } | |
| 425 } | |
| 426 state_ = kStateTopLevel; | |
| 427 EndCurrentBlock(); | |
| 428 return false; | |
| 429 } | |
| 430 | |
| 431 bool RtcpParser::ParseSdesTypes() { | |
| 432 // Only the c_name item is mandatory. RFC 3550 page 46. | |
| 433 bool found_c_name = false; | |
| 434 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 435 base::BigEndianReader big_endian_reader( | |
| 436 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 437 | |
| 438 while (big_endian_reader.remaining() > 0) { | |
| 439 uint8 tag; | |
| 440 big_endian_reader.ReadU8(&tag); | |
| 441 | |
| 442 if (tag == 0) { | |
| 443 // End tag! 4 octet aligned. | |
| 444 rtcp_data_ = rtcp_block_end_; | |
| 445 return found_c_name; | |
| 446 } | |
| 447 | |
| 448 if (big_endian_reader.remaining() > 0) { | |
| 449 uint8 len; | |
| 450 big_endian_reader.ReadU8(&len); | |
| 451 | |
| 452 if (tag == 1) { // c_name. | |
| 453 // Sanity check. | |
| 454 if (big_endian_reader.remaining() < len) { | |
| 455 state_ = kStateTopLevel; | |
| 456 EndCurrentBlock(); | |
| 457 return false; | |
| 458 } | |
| 459 int i = 0; | |
| 460 for (; i < len; ++i) { | |
| 461 uint8 c; | |
| 462 big_endian_reader.ReadU8(&c); | |
| 463 if ((c < ' ') || (c > '{') || (c == '%') || (c == '\\')) { | |
| 464 // Illegal char. | |
| 465 state_ = kStateTopLevel; | |
| 466 EndCurrentBlock(); | |
| 467 return false; | |
| 468 } | |
| 469 field_.c_name.name[i] = c; | |
| 470 } | |
| 471 // Make sure we are null terminated. | |
| 472 field_.c_name.name[i] = 0; | |
| 473 field_type_ = kRtcpSdesChunkCode; | |
| 474 found_c_name = true; | |
| 475 } else { | |
| 476 big_endian_reader.Skip(len); | |
| 477 } | |
| 478 } | |
| 479 } | |
| 480 // No end tag found! | |
| 481 state_ = kStateTopLevel; | |
| 482 EndCurrentBlock(); | |
| 483 return false; | |
| 484 } | |
| 485 | |
| 486 bool RtcpParser::ParseBye() { | |
| 487 rtcp_data_ += 4; // Skip header. | |
| 488 state_ = kStateBye; | |
| 489 return ParseByeItem(); | |
| 490 } | |
| 491 | |
| 492 bool RtcpParser::ParseByeItem() { | |
| 493 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 494 if (length < 4 || number_of_blocks_ == 0) { | |
| 495 state_ = kStateTopLevel; | |
| 496 EndCurrentBlock(); | |
| 497 return false; | |
| 498 } | |
| 499 | |
| 500 field_type_ = kRtcpByeCode; | |
| 501 | |
| 502 base::BigEndianReader big_endian_reader( | |
| 503 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 504 big_endian_reader.ReadU32(&field_.bye.sender_ssrc); | |
| 505 rtcp_data_ += 4; | |
| 506 | |
| 507 // We can have several CSRCs attached. | |
| 508 if (length >= 4 * number_of_blocks_) { | |
| 509 rtcp_data_ += (number_of_blocks_ - 1) * 4; | |
| 510 } | |
| 511 number_of_blocks_ = 0; | |
| 512 return true; | |
| 513 } | |
| 514 | |
| 515 bool RtcpParser::ParseApplicationDefined(uint8 subtype) { | |
| 516 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 517 if (length < 16 || subtype != kReceiverLogSubtype) { | |
| 518 state_ = kStateTopLevel; | |
| 519 EndCurrentBlock(); | |
| 520 return false; | |
| 521 } | |
| 522 | |
| 523 uint32 sender_ssrc; | |
| 524 uint32 name; | |
| 525 | |
| 526 base::BigEndianReader big_endian_reader( | |
| 527 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 528 big_endian_reader.Skip(4); // Skip header. | |
| 529 big_endian_reader.ReadU32(&sender_ssrc); | |
| 530 big_endian_reader.ReadU32(&name); | |
| 531 | |
| 532 if (name != kCast) { | |
| 533 state_ = kStateTopLevel; | |
| 534 EndCurrentBlock(); | |
| 535 return false; | |
| 536 } | |
| 537 rtcp_data_ += 12; | |
| 538 switch (subtype) { | |
| 539 case kReceiverLogSubtype: | |
| 540 state_ = kStateApplicationSpecificCastReceiverFrameLog; | |
| 541 field_type_ = kRtcpApplicationSpecificCastReceiverLogCode; | |
| 542 field_.cast_receiver_log.sender_ssrc = sender_ssrc; | |
| 543 break; | |
| 544 default: | |
| 545 NOTREACHED(); | |
| 546 } | |
| 547 return true; | |
| 548 } | |
| 549 | |
| 550 bool RtcpParser::ParseCastReceiverLogFrameItem() { | |
| 551 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 552 if (length < 12) { | |
| 553 state_ = kStateTopLevel; | |
| 554 EndCurrentBlock(); | |
| 555 return false; | |
| 556 } | |
| 557 uint32 rtp_timestamp; | |
| 558 uint32 data; | |
| 559 base::BigEndianReader big_endian_reader( | |
| 560 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 561 big_endian_reader.ReadU32(&rtp_timestamp); | |
| 562 big_endian_reader.ReadU32(&data); | |
| 563 | |
| 564 rtcp_data_ += 8; | |
| 565 | |
| 566 field_.cast_receiver_log.rtp_timestamp = rtp_timestamp; | |
| 567 // We have 24 LSB of the event timestamp base on the wire. | |
| 568 field_.cast_receiver_log.event_timestamp_base = data & 0xffffff; | |
| 569 | |
| 570 number_of_blocks_ = 1 + static_cast<uint8>(data >> 24); | |
| 571 state_ = kStateApplicationSpecificCastReceiverEventLog; | |
| 572 field_type_ = kRtcpApplicationSpecificCastReceiverLogFrameCode; | |
| 573 return true; | |
| 574 } | |
| 575 | |
| 576 bool RtcpParser::ParseCastReceiverLogEventItem() { | |
| 577 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 578 if (length < 4) { | |
| 579 state_ = kStateTopLevel; | |
| 580 EndCurrentBlock(); | |
| 581 return false; | |
| 582 } | |
| 583 if (number_of_blocks_ == 0) { | |
| 584 // Continue parsing the next receiver frame event. | |
| 585 state_ = kStateApplicationSpecificCastReceiverFrameLog; | |
| 586 return false; | |
| 587 } | |
| 588 number_of_blocks_--; | |
| 589 | |
| 590 uint16 delay_delta_or_packet_id; | |
| 591 uint16 event_type_and_timestamp_delta; | |
| 592 base::BigEndianReader big_endian_reader( | |
| 593 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 594 big_endian_reader.ReadU16(&delay_delta_or_packet_id); | |
| 595 big_endian_reader.ReadU16(&event_type_and_timestamp_delta); | |
| 596 | |
| 597 rtcp_data_ += 4; | |
| 598 | |
| 599 field_.cast_receiver_log.event = | |
| 600 static_cast<uint8>(event_type_and_timestamp_delta >> 12); | |
| 601 // delay_delta is in union'ed with packet_id. | |
| 602 field_.cast_receiver_log.delay_delta_or_packet_id.packet_id = | |
| 603 delay_delta_or_packet_id; | |
| 604 field_.cast_receiver_log.event_timestamp_delta = | |
| 605 event_type_and_timestamp_delta & 0xfff; | |
| 606 | |
| 607 field_type_ = kRtcpApplicationSpecificCastReceiverLogEventCode; | |
| 608 return true; | |
| 609 } | |
| 610 | |
| 611 bool RtcpParser::ParseFeedBackCommon(const RtcpCommonHeader& header) { | |
| 612 DCHECK((header.PT == transport::kPacketTypeGenericRtpFeedback) || | |
| 613 (header.PT == transport::kPacketTypePayloadSpecific)) | |
| 614 << "Invalid state"; | |
| 615 | |
| 616 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 617 | |
| 618 if (length < 12) { // 4 * 3, RFC4585 section 6.1 | |
| 619 EndCurrentBlock(); | |
| 620 return false; | |
| 621 } | |
| 622 | |
| 623 uint32 sender_ssrc; | |
| 624 uint32 media_ssrc; | |
| 625 base::BigEndianReader big_endian_reader( | |
| 626 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 627 big_endian_reader.Skip(4); // Skip header. | |
| 628 big_endian_reader.ReadU32(&sender_ssrc); | |
| 629 big_endian_reader.ReadU32(&media_ssrc); | |
| 630 | |
| 631 rtcp_data_ += 12; | |
| 632 | |
| 633 if (header.PT == transport::kPacketTypeGenericRtpFeedback) { | |
| 634 // Transport layer feedback | |
| 635 switch (header.IC) { | |
| 636 case 1: | |
| 637 // Nack | |
| 638 field_type_ = kRtcpGenericRtpFeedbackNackCode; | |
| 639 field_.nack.sender_ssrc = sender_ssrc; | |
| 640 field_.nack.media_ssrc = media_ssrc; | |
| 641 state_ = kStateGenericRtpFeedbackNack; | |
| 642 return true; | |
| 643 case 2: | |
| 644 // Used to be ACK is this code point, which is removed conficts with | |
| 645 // http://tools.ietf.org/html/draft-levin-avt-rtcp-burst-00 | |
| 646 break; | |
| 647 case 3: | |
| 648 // Tmmbr | |
| 649 break; | |
| 650 case 4: | |
| 651 // Tmmbn | |
| 652 break; | |
| 653 case 5: | |
| 654 // RFC 6051 RTCP-sender_report-REQ Rapid Synchronisation of RTP Flows | |
| 655 // Trigger a new Rtcp sender_report | |
| 656 field_type_ = kRtcpGenericRtpFeedbackSrReqCode; | |
| 657 | |
| 658 // Note: No state transition, sender report REQ is empty! | |
| 659 return true; | |
| 660 default: | |
| 661 break; | |
| 662 } | |
| 663 EndCurrentBlock(); | |
| 664 return false; | |
| 665 | |
| 666 } else if (header.PT == transport::kPacketTypePayloadSpecific) { | |
| 667 // Payload specific feedback | |
| 668 switch (header.IC) { | |
| 669 case 1: | |
| 670 // PLI | |
| 671 field_type_ = kRtcpPayloadSpecificPliCode; | |
| 672 field_.pli.sender_ssrc = sender_ssrc; | |
| 673 field_.pli.media_ssrc = media_ssrc; | |
| 674 | |
| 675 // Note: No state transition, PLI FCI is empty! | |
| 676 return true; | |
| 677 case 2: | |
| 678 // Sli | |
| 679 break; | |
| 680 case 3: | |
| 681 field_type_ = kRtcpPayloadSpecificRpsiCode; | |
| 682 field_.rpsi.sender_ssrc = sender_ssrc; | |
| 683 field_.rpsi.media_ssrc = media_ssrc; | |
| 684 state_ = kStatePayloadSpecificRpsi; | |
| 685 return true; | |
| 686 case 4: | |
| 687 // fir | |
| 688 break; | |
| 689 case 15: | |
| 690 field_type_ = kRtcpPayloadSpecificAppCode; | |
| 691 field_.application_specific.sender_ssrc = sender_ssrc; | |
| 692 field_.application_specific.media_ssrc = media_ssrc; | |
| 693 state_ = kStatePayloadSpecificApplication; | |
| 694 return true; | |
| 695 default: | |
| 696 break; | |
| 697 } | |
| 698 | |
| 699 EndCurrentBlock(); | |
| 700 return false; | |
| 701 } else { | |
| 702 DCHECK(false) << "Invalid state"; | |
| 703 EndCurrentBlock(); | |
| 704 return false; | |
| 705 } | |
| 706 } | |
| 707 | |
| 708 bool RtcpParser::ParseRpsiItem() { | |
| 709 // RFC 4585 6.3.3. Reference Picture Selection Indication (rpsi) | |
| 710 /* | |
| 711 0 1 2 3 | |
| 712 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |
| 713 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| 714 | PB |0| Payload Type| Native rpsi bit string | | |
| 715 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| 716 | defined per codec ... | Padding (0) | | |
| 717 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| 718 */ | |
| 719 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 720 | |
| 721 if (length < 4) { | |
| 722 state_ = kStateTopLevel; | |
| 723 EndCurrentBlock(); | |
| 724 return false; | |
| 725 } | |
| 726 if (length > 2 + kRtcpRpsiDataSize) { | |
| 727 state_ = kStateTopLevel; | |
| 728 EndCurrentBlock(); | |
| 729 return false; | |
| 730 } | |
| 731 | |
| 732 field_type_ = kRtcpPayloadSpecificRpsiCode; | |
| 733 | |
| 734 uint8 padding_bits; | |
| 735 base::BigEndianReader big_endian_reader( | |
| 736 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 737 big_endian_reader.ReadU8(&padding_bits); | |
| 738 big_endian_reader.ReadU8(&field_.rpsi.payload_type); | |
| 739 big_endian_reader.ReadBytes(&field_.rpsi.native_bit_string, length - 2); | |
| 740 field_.rpsi.number_of_valid_bits = | |
| 741 static_cast<uint16>(length - 2) * 8 - padding_bits; | |
| 742 | |
| 743 rtcp_data_ += length; | |
| 744 return true; | |
| 745 } | |
| 746 | |
| 747 bool RtcpParser::ParseNackItem() { | |
| 748 // RFC 4585 6.2.1. Generic Nack | |
| 749 | |
| 750 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 751 if (length < 4) { | |
| 752 state_ = kStateTopLevel; | |
| 753 EndCurrentBlock(); | |
| 754 return false; | |
| 755 } | |
| 756 | |
| 757 field_type_ = kRtcpGenericRtpFeedbackNackItemCode; | |
| 758 | |
| 759 base::BigEndianReader big_endian_reader( | |
| 760 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 761 big_endian_reader.ReadU16(&field_.nack_item.packet_id); | |
| 762 big_endian_reader.ReadU16(&field_.nack_item.bitmask); | |
| 763 rtcp_data_ += 4; | |
| 764 return true; | |
| 765 } | |
| 766 | |
| 767 bool RtcpParser::ParsePayloadSpecificAppItem() { | |
| 768 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 769 | |
| 770 if (length < 4) { | |
| 771 state_ = kStateTopLevel; | |
| 772 EndCurrentBlock(); | |
| 773 return false; | |
| 774 } | |
| 775 uint32 name; | |
| 776 base::BigEndianReader big_endian_reader( | |
| 777 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 778 big_endian_reader.ReadU32(&name); | |
| 779 rtcp_data_ += 4; | |
| 780 | |
| 781 if (name == kRemb) { | |
| 782 field_type_ = kRtcpPayloadSpecificRembCode; | |
| 783 state_ = kStatePayloadSpecificRemb; | |
| 784 return true; | |
| 785 } else if (name == kCast) { | |
| 786 field_type_ = kRtcpPayloadSpecificCastCode; | |
| 787 state_ = kStatePayloadSpecificCast; | |
| 788 return true; | |
| 789 } | |
| 790 state_ = kStateTopLevel; | |
| 791 EndCurrentBlock(); | |
| 792 return false; | |
| 793 } | |
| 794 | |
| 795 bool RtcpParser::ParsePayloadSpecificRembItem() { | |
| 796 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 797 | |
| 798 if (length < 4) { | |
| 799 state_ = kStateTopLevel; | |
| 800 EndCurrentBlock(); | |
| 801 return false; | |
| 802 } | |
| 803 | |
| 804 base::BigEndianReader big_endian_reader( | |
| 805 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 806 big_endian_reader.ReadU8(&field_.remb_item.number_of_ssrcs); | |
| 807 | |
| 808 uint8 byte_1; | |
| 809 uint8 byte_2; | |
| 810 uint8 byte_3; | |
| 811 big_endian_reader.ReadU8(&byte_1); | |
| 812 big_endian_reader.ReadU8(&byte_2); | |
| 813 big_endian_reader.ReadU8(&byte_3); | |
| 814 rtcp_data_ += 4; | |
| 815 | |
| 816 uint8 br_exp = (byte_1 >> 2) & 0x3F; | |
| 817 uint32 br_mantissa = ((byte_1 & 0x03) << 16) + (byte_2 << 8) + byte_3; | |
| 818 field_.remb_item.bitrate = (br_mantissa << br_exp); | |
| 819 | |
| 820 ptrdiff_t length_ssrcs = rtcp_block_end_ - rtcp_data_; | |
| 821 if (length_ssrcs < 4 * field_.remb_item.number_of_ssrcs) { | |
| 822 state_ = kStateTopLevel; | |
| 823 EndCurrentBlock(); | |
| 824 return false; | |
| 825 } | |
| 826 | |
| 827 field_type_ = kRtcpPayloadSpecificRembItemCode; | |
| 828 | |
| 829 for (int i = 0; i < field_.remb_item.number_of_ssrcs; i++) { | |
| 830 big_endian_reader.ReadU32(&field_.remb_item.ssrcs[i]); | |
| 831 } | |
| 832 return true; | |
| 833 } | |
| 834 | |
| 835 bool RtcpParser::ParsePayloadSpecificCastItem() { | |
| 836 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 837 if (length < 4) { | |
| 838 state_ = kStateTopLevel; | |
| 839 EndCurrentBlock(); | |
| 840 return false; | |
| 841 } | |
| 842 field_type_ = kRtcpPayloadSpecificCastCode; | |
| 843 | |
| 844 base::BigEndianReader big_endian_reader( | |
| 845 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 846 big_endian_reader.ReadU8(&field_.cast_item.last_frame_id); | |
| 847 big_endian_reader.ReadU8(&field_.cast_item.number_of_lost_fields); | |
| 848 big_endian_reader.ReadU16(&field_.cast_item.target_delay_ms); | |
| 849 | |
| 850 rtcp_data_ += 4; | |
| 851 | |
| 852 if (field_.cast_item.number_of_lost_fields != 0) { | |
| 853 // State transition | |
| 854 state_ = kStatePayloadSpecificCastNack; | |
| 855 } else { | |
| 856 // Don't go to state cast nack item if got 0 fields. | |
| 857 state_ = kStateTopLevel; | |
| 858 EndCurrentBlock(); | |
| 859 } | |
| 860 return true; | |
| 861 } | |
| 862 | |
| 863 bool RtcpParser::ParsePayloadSpecificCastNackItem() { | |
| 864 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 865 if (length < 4) { | |
| 866 state_ = kStateTopLevel; | |
| 867 EndCurrentBlock(); | |
| 868 return false; | |
| 869 } | |
| 870 field_type_ = kRtcpPayloadSpecificCastNackItemCode; | |
| 871 | |
| 872 base::BigEndianReader big_endian_reader( | |
| 873 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 874 big_endian_reader.ReadU8(&field_.cast_nack_item.frame_id); | |
| 875 big_endian_reader.ReadU16(&field_.cast_nack_item.packet_id); | |
| 876 big_endian_reader.ReadU8(&field_.cast_nack_item.bitmask); | |
| 877 | |
| 878 rtcp_data_ += 4; | |
| 879 return true; | |
| 880 } | |
| 881 | |
| 882 bool RtcpParser::ParseFirItem() { | |
| 883 // RFC 5104 4.3.1. Full Intra Request (fir) | |
| 884 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 885 | |
| 886 if (length < 8) { | |
| 887 state_ = kStateTopLevel; | |
| 888 EndCurrentBlock(); | |
| 889 return false; | |
| 890 } | |
| 891 field_type_ = kRtcpPayloadSpecificFirItemCode; | |
| 892 | |
| 893 base::BigEndianReader big_endian_reader( | |
| 894 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 895 big_endian_reader.ReadU32(&field_.fir_item.ssrc); | |
| 896 big_endian_reader.ReadU8(&field_.fir_item.command_sequence_number); | |
| 897 | |
| 898 rtcp_data_ += 8; | |
| 899 return true; | |
| 900 } | |
| 901 | |
| 902 bool RtcpParser::ParseExtendedReport() { | |
| 903 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 904 if (length < 8) | |
| 905 return false; | |
| 906 | |
| 907 field_type_ = kRtcpXrCode; | |
| 908 | |
| 909 base::BigEndianReader big_endian_reader( | |
| 910 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 911 big_endian_reader.Skip(4); // Skip header. | |
| 912 big_endian_reader.ReadU32(&field_.extended_report.sender_ssrc); | |
| 913 | |
| 914 rtcp_data_ += 8; | |
| 915 | |
| 916 state_ = kStateExtendedReportBlock; | |
| 917 return true; | |
| 918 } | |
| 919 | |
| 920 bool RtcpParser::ParseExtendedReportItem() { | |
| 921 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 922 if (length < 4) { | |
| 923 state_ = kStateTopLevel; | |
| 924 EndCurrentBlock(); | |
| 925 return false; | |
| 926 } | |
| 927 | |
| 928 uint8 block_type; | |
| 929 uint16 block_length; | |
| 930 base::BigEndianReader big_endian_reader( | |
| 931 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 932 big_endian_reader.ReadU8(&block_type); | |
| 933 big_endian_reader.Skip(1); // Ignore reserved. | |
| 934 big_endian_reader.ReadU16(&block_length); | |
| 935 | |
| 936 rtcp_data_ += 4; | |
| 937 | |
| 938 switch (block_type) { | |
| 939 case 4: | |
| 940 if (block_length != 2) { | |
| 941 // Invalid block length. | |
| 942 state_ = kStateTopLevel; | |
| 943 EndCurrentBlock(); | |
| 944 return false; | |
| 945 } | |
| 946 return ParseExtendedReportReceiverReferenceTimeReport(); | |
| 947 case 5: | |
| 948 if (block_length % 3 != 0) { | |
| 949 // Invalid block length. | |
| 950 state_ = kStateTopLevel; | |
| 951 EndCurrentBlock(); | |
| 952 return false; | |
| 953 } | |
| 954 if (block_length >= 3) { | |
| 955 number_of_blocks_ = block_length / 3; | |
| 956 state_ = kStateExtendedReportDelaySinceLastReceiverReport; | |
| 957 return ParseExtendedReportDelaySinceLastReceiverReport(); | |
| 958 } | |
| 959 return true; | |
| 960 default: | |
| 961 if (length < block_length * 4) { | |
| 962 state_ = kStateTopLevel; | |
| 963 EndCurrentBlock(); | |
| 964 return false; | |
| 965 } | |
| 966 field_type_ = kRtcpXrUnknownItemCode; | |
| 967 rtcp_data_ += block_length * 4; | |
| 968 return true; | |
| 969 } | |
| 970 } | |
| 971 | |
| 972 bool RtcpParser::ParseExtendedReportReceiverReferenceTimeReport() { | |
| 973 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 974 if (length < 8) { | |
| 975 state_ = kStateTopLevel; | |
| 976 EndCurrentBlock(); | |
| 977 return false; | |
| 978 } | |
| 979 | |
| 980 base::BigEndianReader big_endian_reader( | |
| 981 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 982 big_endian_reader.ReadU32(&field_.rrtr.ntp_most_significant); | |
| 983 big_endian_reader.ReadU32(&field_.rrtr.ntp_least_significant); | |
| 984 | |
| 985 rtcp_data_ += 8; | |
| 986 | |
| 987 field_type_ = kRtcpXrRrtrCode; | |
| 988 return true; | |
| 989 } | |
| 990 | |
| 991 bool RtcpParser::ParseExtendedReportDelaySinceLastReceiverReport() { | |
| 992 ptrdiff_t length = rtcp_block_end_ - rtcp_data_; | |
| 993 if (length < 12) { | |
| 994 state_ = kStateTopLevel; | |
| 995 EndCurrentBlock(); | |
| 996 return false; | |
| 997 } | |
| 998 if (number_of_blocks_ == 0) { | |
| 999 // Continue parsing the extended report block. | |
| 1000 state_ = kStateExtendedReportBlock; | |
| 1001 return false; | |
| 1002 } | |
| 1003 | |
| 1004 base::BigEndianReader big_endian_reader( | |
| 1005 reinterpret_cast<const char*>(rtcp_data_), length); | |
| 1006 big_endian_reader.ReadU32(&field_.dlrr.receivers_ssrc); | |
| 1007 big_endian_reader.ReadU32(&field_.dlrr.last_receiver_report); | |
| 1008 big_endian_reader.ReadU32(&field_.dlrr.delay_last_receiver_report); | |
| 1009 | |
| 1010 rtcp_data_ += 12; | |
| 1011 | |
| 1012 number_of_blocks_--; | |
| 1013 field_type_ = kRtcpXrDlrrCode; | |
| 1014 return true; | |
| 1015 } | |
| 1016 | |
| 1017 // Converts a log event type to an integer value. | |
| 1018 // NOTE: We have only allocated 4 bits to represent the type of event over the | |
| 1019 // wire. Therefore, this function can only return values from 0 to 15. | |
| 1020 uint8 ConvertEventTypeToWireFormat(CastLoggingEvent event) { | |
| 1021 switch (event) { | |
| 1022 case FRAME_ACK_SENT: | |
| 1023 return 11; | |
| 1024 case FRAME_PLAYOUT: | |
| 1025 return 12; | |
| 1026 case FRAME_DECODED: | |
| 1027 return 13; | |
| 1028 case PACKET_RECEIVED: | |
| 1029 return 14; | |
| 1030 default: | |
| 1031 return 0; // Not an interesting event. | |
| 1032 } | |
| 1033 } | |
| 1034 | |
| 1035 CastLoggingEvent TranslateToLogEventFromWireFormat(uint8 event) { | |
| 1036 // TODO(imcheng): Remove the old mappings once they are no longer used. | |
| 1037 switch (event) { | |
| 1038 case 1: // AudioAckSent | |
| 1039 case 5: // VideoAckSent | |
| 1040 case 11: // Unified | |
| 1041 return FRAME_ACK_SENT; | |
| 1042 case 2: // AudioPlayoutDelay | |
| 1043 case 7: // VideoRenderDelay | |
| 1044 case 12: // Unified | |
| 1045 return FRAME_PLAYOUT; | |
| 1046 case 3: // AudioFrameDecoded | |
| 1047 case 6: // VideoFrameDecoded | |
| 1048 case 13: // Unified | |
| 1049 return FRAME_DECODED; | |
| 1050 case 4: // AudioPacketReceived | |
| 1051 case 8: // VideoPacketReceived | |
| 1052 case 14: // Unified | |
| 1053 return PACKET_RECEIVED; | |
| 1054 case 9: // DuplicateAudioPacketReceived | |
| 1055 case 10: // DuplicateVideoPacketReceived | |
| 1056 default: | |
| 1057 // If the sender adds new log messages we will end up here until we add | |
| 1058 // the new messages in the receiver. | |
| 1059 VLOG(1) << "Unexpected log message received: " << static_cast<int>(event); | |
| 1060 NOTREACHED(); | |
| 1061 return UNKNOWN; | |
| 1062 } | |
| 1063 } | |
| 1064 | |
| 1065 } // namespace cast | |
| 1066 } // namespace media | |
| OLD | NEW |