• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  *  Copyright (c) 2014 The WebRTC project authors. All Rights Reserved.
3  *
4  *  Use of this source code is governed by a BSD-style license
5  *  that can be found in the LICENSE file in the root of the source
6  *  tree. An additional intellectual property rights grant can be found
7  *  in the file PATENTS.  All contributing project authors may
8  *  be found in the AUTHORS file in the root of the source tree.
9  */
10 
11 #include "webrtc/test/rtp_file_reader.h"
12 
13 #include <stdio.h>
14 
15 #include <map>
16 #include <string>
17 #include <vector>
18 
19 #include "webrtc/base/checks.h"
20 #include "webrtc/base/format_macros.h"
21 #include "webrtc/base/scoped_ptr.h"
22 #include "webrtc/modules/rtp_rtcp/source/rtp_utility.h"
23 
24 namespace webrtc {
25 namespace test {
26 
27 static const size_t kFirstLineLength = 40;
28 static uint16_t kPacketHeaderSize = 8;
29 
30 #if 1
31 # define DEBUG_LOG(text)
32 # define DEBUG_LOG1(text, arg)
33 #else
34 # define DEBUG_LOG(text) (printf(text "\n"))
35 # define DEBUG_LOG1(text, arg) (printf(text "\n", arg))
36 #endif
37 
38 #define TRY(expr)                                      \
39   do {                                                 \
40     if (!(expr)) {                                     \
41       DEBUG_LOG1("FAIL at " __FILE__ ":%d", __LINE__); \
42       return false;                                    \
43     }                                                  \
44   } while (0)
45 
ReadUint32(uint32_t * out,FILE * file)46 bool ReadUint32(uint32_t* out, FILE* file) {
47   *out = 0;
48   for (size_t i = 0; i < 4; ++i) {
49     *out <<= 8;
50     uint8_t tmp;
51     if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
52       return false;
53     *out |= tmp;
54   }
55   return true;
56 }
57 
ReadUint16(uint16_t * out,FILE * file)58 bool ReadUint16(uint16_t* out, FILE* file) {
59   *out = 0;
60   for (size_t i = 0; i < 2; ++i) {
61     *out <<= 8;
62     uint8_t tmp;
63     if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
64       return false;
65     *out |= tmp;
66   }
67   return true;
68 }
69 
70 class RtpFileReaderImpl : public RtpFileReader {
71  public:
72   virtual bool Init(const std::string& filename,
73                     const std::set<uint32_t>& ssrc_filter) = 0;
74 };
75 
76 class InterleavedRtpFileReader : public RtpFileReaderImpl {
77  public:
~InterleavedRtpFileReader()78   virtual ~InterleavedRtpFileReader() {
79     if (file_ != NULL) {
80       fclose(file_);
81       file_ = NULL;
82     }
83   }
84 
Init(const std::string & filename,const std::set<uint32_t> & ssrc_filter)85   virtual bool Init(const std::string& filename,
86                     const std::set<uint32_t>& ssrc_filter) {
87     file_ = fopen(filename.c_str(), "rb");
88     if (file_ == NULL) {
89       printf("ERROR: Can't open file: %s\n", filename.c_str());
90       return false;
91     }
92     return true;
93   }
NextPacket(RtpPacket * packet)94   virtual bool NextPacket(RtpPacket* packet) {
95     assert(file_ != NULL);
96     packet->length = RtpPacket::kMaxPacketBufferSize;
97     uint32_t len = 0;
98     TRY(ReadUint32(&len, file_));
99     if (packet->length < len) {
100       FATAL() << "Packet is too large to fit: " << len << " bytes vs "
101               << packet->length
102               << " bytes allocated. Consider increasing the buffer "
103                  "size";
104     }
105     if (fread(packet->data, 1, len, file_) != len)
106       return false;
107 
108     packet->length = len;
109     packet->original_length = len;
110     packet->time_ms = time_ms_;
111     time_ms_ += 5;
112     return true;
113   }
114 
115  private:
116   FILE* file_ = NULL;
117   int64_t time_ms_ = 0;
118 };
119 
120 // Read RTP packets from file in rtpdump format, as documented at:
121 // http://www.cs.columbia.edu/irt/software/rtptools/
122 class RtpDumpReader : public RtpFileReaderImpl {
123  public:
RtpDumpReader()124   RtpDumpReader() : file_(NULL) {}
~RtpDumpReader()125   virtual ~RtpDumpReader() {
126     if (file_ != NULL) {
127       fclose(file_);
128       file_ = NULL;
129     }
130   }
131 
Init(const std::string & filename,const std::set<uint32_t> & ssrc_filter)132   bool Init(const std::string& filename,
133             const std::set<uint32_t>& ssrc_filter) {
134     file_ = fopen(filename.c_str(), "rb");
135     if (file_ == NULL) {
136       printf("ERROR: Can't open file: %s\n", filename.c_str());
137       return false;
138     }
139 
140     char firstline[kFirstLineLength + 1] = {0};
141     if (fgets(firstline, kFirstLineLength, file_) == NULL) {
142       DEBUG_LOG("ERROR: Can't read from file\n");
143       return false;
144     }
145     if (strncmp(firstline, "#!rtpplay", 9) == 0) {
146       if (strncmp(firstline, "#!rtpplay1.0", 12) != 0) {
147         DEBUG_LOG("ERROR: wrong rtpplay version, must be 1.0\n");
148         return false;
149       }
150     } else if (strncmp(firstline, "#!RTPencode", 11) == 0) {
151       if (strncmp(firstline, "#!RTPencode1.0", 14) != 0) {
152         DEBUG_LOG("ERROR: wrong RTPencode version, must be 1.0\n");
153         return false;
154       }
155     } else {
156       DEBUG_LOG("ERROR: wrong file format of input file\n");
157       return false;
158     }
159 
160     uint32_t start_sec;
161     uint32_t start_usec;
162     uint32_t source;
163     uint16_t port;
164     uint16_t padding;
165     TRY(ReadUint32(&start_sec, file_));
166     TRY(ReadUint32(&start_usec, file_));
167     TRY(ReadUint32(&source, file_));
168     TRY(ReadUint16(&port, file_));
169     TRY(ReadUint16(&padding, file_));
170 
171     return true;
172   }
173 
NextPacket(RtpPacket * packet)174   bool NextPacket(RtpPacket* packet) override {
175     uint8_t* rtp_data = packet->data;
176     packet->length = RtpPacket::kMaxPacketBufferSize;
177 
178     uint16_t len;
179     uint16_t plen;
180     uint32_t offset;
181     TRY(ReadUint16(&len, file_));
182     TRY(ReadUint16(&plen, file_));
183     TRY(ReadUint32(&offset, file_));
184 
185     // Use 'len' here because a 'plen' of 0 specifies rtcp.
186     len -= kPacketHeaderSize;
187     if (packet->length < len) {
188       FATAL() << "Packet is too large to fit: " << len << " bytes vs "
189               << packet->length
190               << " bytes allocated. Consider increasing the buffer "
191                  "size";
192     }
193     if (fread(rtp_data, 1, len, file_) != len) {
194       return false;
195     }
196 
197     packet->length = len;
198     packet->original_length = plen;
199     packet->time_ms = offset;
200     return true;
201   }
202 
203  private:
204   FILE* file_;
205 
206   RTC_DISALLOW_COPY_AND_ASSIGN(RtpDumpReader);
207 };
208 
209 enum {
210   kResultFail = -1,
211   kResultSuccess = 0,
212   kResultSkip = 1,
213 
214   kPcapVersionMajor = 2,
215   kPcapVersionMinor = 4,
216   kLinktypeNull = 0,
217   kLinktypeEthernet = 1,
218   kBsdNullLoopback1 = 0x00000002,
219   kBsdNullLoopback2 = 0x02000000,
220   kEthernetIIHeaderMacSkip = 12,
221   kEthertypeIp = 0x0800,
222   kIpVersion4 = 4,
223   kMinIpHeaderLength = 20,
224   kFragmentOffsetClear = 0x0000,
225   kFragmentOffsetDoNotFragment = 0x4000,
226   kProtocolTcp = 0x06,
227   kProtocolUdp = 0x11,
228   kUdpHeaderLength = 8,
229   kMaxReadBufferSize = 4096
230 };
231 
232 const uint32_t kPcapBOMSwapOrder = 0xd4c3b2a1UL;
233 const uint32_t kPcapBOMNoSwapOrder = 0xa1b2c3d4UL;
234 
235 #define TRY_PCAP(expr)                                 \
236   do {                                                 \
237     int r = (expr);                                    \
238     if (r == kResultFail) {                            \
239       DEBUG_LOG1("FAIL at " __FILE__ ":%d", __LINE__); \
240       return kResultFail;                              \
241     } else if (r == kResultSkip) {                     \
242       return kResultSkip;                              \
243     }                                                  \
244   } while (0)
245 
246 // Read RTP packets from file in tcpdump/libpcap format, as documented at:
247 // http://wiki.wireshark.org/Development/LibpcapFileFormat
248 class PcapReader : public RtpFileReaderImpl {
249  public:
PcapReader()250   PcapReader()
251     : file_(NULL),
252       swap_pcap_byte_order_(false),
253 #ifdef WEBRTC_ARCH_BIG_ENDIAN
254       swap_network_byte_order_(false),
255 #else
256       swap_network_byte_order_(true),
257 #endif
258       read_buffer_(),
259       packets_by_ssrc_(),
260       packets_(),
261       next_packet_it_() {
262   }
263 
~PcapReader()264   virtual ~PcapReader() {
265     if (file_ != NULL) {
266       fclose(file_);
267       file_ = NULL;
268     }
269   }
270 
Init(const std::string & filename,const std::set<uint32_t> & ssrc_filter)271   bool Init(const std::string& filename,
272             const std::set<uint32_t>& ssrc_filter) override {
273     return Initialize(filename, ssrc_filter) == kResultSuccess;
274   }
275 
Initialize(const std::string & filename,const std::set<uint32_t> & ssrc_filter)276   int Initialize(const std::string& filename,
277                  const std::set<uint32_t>& ssrc_filter) {
278     file_ = fopen(filename.c_str(), "rb");
279     if (file_ == NULL) {
280       printf("ERROR: Can't open file: %s\n", filename.c_str());
281       return kResultFail;
282     }
283 
284     if (ReadGlobalHeader() < 0) {
285       return kResultFail;
286     }
287 
288     int total_packet_count = 0;
289     uint32_t stream_start_ms = 0;
290     int32_t next_packet_pos = ftell(file_);
291     for (;;) {
292       TRY_PCAP(fseek(file_, next_packet_pos, SEEK_SET));
293       int result = ReadPacket(&next_packet_pos, stream_start_ms,
294                               ++total_packet_count, ssrc_filter);
295       if (result == kResultFail) {
296         break;
297       } else if (result == kResultSuccess && packets_.size() == 1) {
298         assert(stream_start_ms == 0);
299         PacketIterator it = packets_.begin();
300         stream_start_ms = it->time_offset_ms;
301         it->time_offset_ms = 0;
302       }
303     }
304 
305     if (feof(file_) == 0) {
306       printf("Failed reading file!\n");
307       return kResultFail;
308     }
309 
310     printf("Total packets in file: %d\n", total_packet_count);
311     printf("Total RTP/RTCP packets: %" PRIuS "\n", packets_.size());
312 
313     for (SsrcMapIterator mit = packets_by_ssrc_.begin();
314         mit != packets_by_ssrc_.end(); ++mit) {
315       uint32_t ssrc = mit->first;
316       const std::vector<uint32_t>& packet_indices = mit->second;
317       uint8_t pt = packets_[packet_indices[0]].rtp_header.payloadType;
318       printf("SSRC: %08x, %" PRIuS " packets, pt=%d\n", ssrc,
319              packet_indices.size(), pt);
320     }
321 
322     // TODO(solenberg): Better validation of identified SSRC streams.
323     //
324     // Since we're dealing with raw network data here, we will wrongly identify
325     // some packets as RTP. When these packets are consumed by RtpPlayer, they
326     // are unlikely to cause issues as they will ultimately be filtered out by
327     // the RtpRtcp module. However, we should really do better filtering here,
328     // which we can accomplish in a number of ways, e.g.:
329     //
330     // - Verify that the time stamps and sequence numbers for RTP packets are
331     //   both increasing/decreasing. If they move in different directions, the
332     //   SSRC is likely bogus and can be dropped. (Normally they should be inc-
333     //   reasing but we must allow packet reordering).
334     // - If RTP sequence number is not changing, drop the stream.
335     // - Can also use srcip:port->dstip:port pairs, assuming few SSRC collisions
336     //   for up/down streams.
337 
338     next_packet_it_ = packets_.begin();
339     return kResultSuccess;
340   }
341 
NextPacket(RtpPacket * packet)342   bool NextPacket(RtpPacket* packet) override {
343     uint32_t length = RtpPacket::kMaxPacketBufferSize;
344     if (NextPcap(packet->data, &length, &packet->time_ms) != kResultSuccess)
345       return false;
346     packet->length = static_cast<size_t>(length);
347     packet->original_length = packet->length;
348     return true;
349   }
350 
NextPcap(uint8_t * data,uint32_t * length,uint32_t * time_ms)351   virtual int NextPcap(uint8_t* data, uint32_t* length, uint32_t* time_ms) {
352     assert(data);
353     assert(length);
354     assert(time_ms);
355 
356     if (next_packet_it_ == packets_.end()) {
357       return -1;
358     }
359     if (*length < next_packet_it_->payload_length) {
360       return -1;
361     }
362     TRY_PCAP(fseek(file_, next_packet_it_->pos_in_file, SEEK_SET));
363     TRY_PCAP(Read(data, next_packet_it_->payload_length));
364     *length = next_packet_it_->payload_length;
365     *time_ms = next_packet_it_->time_offset_ms;
366     next_packet_it_++;
367 
368     return 0;
369   }
370 
371  private:
372   // A marker of an RTP packet within the file.
373   struct RtpPacketMarker {
374     uint32_t packet_number;   // One-based index (like in WireShark)
375     uint32_t time_offset_ms;
376     uint32_t source_ip;
377     uint32_t dest_ip;
378     uint16_t source_port;
379     uint16_t dest_port;
380     RTPHeader rtp_header;
381     int32_t pos_in_file;      // Byte offset of payload from start of file.
382     uint32_t payload_length;
383   };
384 
385   typedef std::vector<RtpPacketMarker>::iterator PacketIterator;
386   typedef std::map<uint32_t, std::vector<uint32_t> > SsrcMap;
387   typedef std::map<uint32_t, std::vector<uint32_t> >::iterator SsrcMapIterator;
388 
ReadGlobalHeader()389   int ReadGlobalHeader() {
390     uint32_t magic;
391     TRY_PCAP(Read(&magic, false));
392     if (magic == kPcapBOMSwapOrder) {
393       swap_pcap_byte_order_ = true;
394     } else if (magic == kPcapBOMNoSwapOrder) {
395       swap_pcap_byte_order_ = false;
396     } else {
397       return kResultFail;
398     }
399 
400     uint16_t version_major;
401     uint16_t version_minor;
402     TRY_PCAP(Read(&version_major, false));
403     TRY_PCAP(Read(&version_minor, false));
404     if (version_major != kPcapVersionMajor ||
405         version_minor != kPcapVersionMinor) {
406       return kResultFail;
407     }
408 
409     int32_t this_zone;  // GMT to local correction.
410     uint32_t sigfigs;   // Accuracy of timestamps.
411     uint32_t snaplen;   // Max length of captured packets, in octets.
412     uint32_t network;   // Data link type.
413     TRY_PCAP(Read(&this_zone, false));
414     TRY_PCAP(Read(&sigfigs, false));
415     TRY_PCAP(Read(&snaplen, false));
416     TRY_PCAP(Read(&network, false));
417 
418     // Accept only LINKTYPE_NULL and LINKTYPE_ETHERNET.
419     // See: http://www.tcpdump.org/linktypes.html
420     if (network != kLinktypeNull && network != kLinktypeEthernet) {
421       return kResultFail;
422     }
423 
424     return kResultSuccess;
425   }
426 
ReadPacket(int32_t * next_packet_pos,uint32_t stream_start_ms,uint32_t number,const std::set<uint32_t> & ssrc_filter)427   int ReadPacket(int32_t* next_packet_pos,
428                  uint32_t stream_start_ms,
429                  uint32_t number,
430                  const std::set<uint32_t>& ssrc_filter) {
431     assert(next_packet_pos);
432 
433     uint32_t ts_sec;    // Timestamp seconds.
434     uint32_t ts_usec;   // Timestamp microseconds.
435     uint32_t incl_len;  // Number of octets of packet saved in file.
436     uint32_t orig_len;  // Actual length of packet.
437     TRY_PCAP(Read(&ts_sec, false));
438     TRY_PCAP(Read(&ts_usec, false));
439     TRY_PCAP(Read(&incl_len, false));
440     TRY_PCAP(Read(&orig_len, false));
441 
442     *next_packet_pos = ftell(file_) + incl_len;
443 
444     RtpPacketMarker marker = {0};
445     marker.packet_number = number;
446     marker.time_offset_ms = CalcTimeDelta(ts_sec, ts_usec, stream_start_ms);
447     TRY_PCAP(ReadPacketHeader(&marker));
448     marker.pos_in_file = ftell(file_);
449 
450     if (marker.payload_length > sizeof(read_buffer_)) {
451       printf("Packet too large!\n");
452       return kResultFail;
453     }
454     TRY_PCAP(Read(read_buffer_, marker.payload_length));
455 
456     RtpUtility::RtpHeaderParser rtp_parser(read_buffer_, marker.payload_length);
457     if (rtp_parser.RTCP()) {
458       rtp_parser.ParseRtcp(&marker.rtp_header);
459       packets_.push_back(marker);
460     } else {
461       if (!rtp_parser.Parse(&marker.rtp_header, nullptr)) {
462         DEBUG_LOG("Not recognized as RTP/RTCP");
463         return kResultSkip;
464       }
465 
466       uint32_t ssrc = marker.rtp_header.ssrc;
467       if (ssrc_filter.empty() || ssrc_filter.find(ssrc) != ssrc_filter.end()) {
468         packets_by_ssrc_[ssrc].push_back(
469             static_cast<uint32_t>(packets_.size()));
470         packets_.push_back(marker);
471       } else {
472         return kResultSkip;
473       }
474     }
475 
476     return kResultSuccess;
477   }
478 
ReadPacketHeader(RtpPacketMarker * marker)479   int ReadPacketHeader(RtpPacketMarker* marker) {
480     int32_t file_pos = ftell(file_);
481 
482     // Check for BSD null/loopback frame header. The header is just 4 bytes in
483     // native byte order, so we check for both versions as we don't care about
484     // the header as such and will likely fail reading the IP header if this is
485     // something else than null/loopback.
486     uint32_t protocol;
487     TRY_PCAP(Read(&protocol, true));
488     if (protocol == kBsdNullLoopback1 || protocol == kBsdNullLoopback2) {
489       int result = ReadXxpIpHeader(marker);
490       DEBUG_LOG("Recognized loopback frame");
491       if (result != kResultSkip) {
492         return result;
493       }
494     }
495 
496     TRY_PCAP(fseek(file_, file_pos, SEEK_SET));
497 
498     // Check for Ethernet II, IP frame header.
499     uint16_t type;
500     TRY_PCAP(Skip(kEthernetIIHeaderMacSkip));  // Source+destination MAC.
501     TRY_PCAP(Read(&type, true));
502     if (type == kEthertypeIp) {
503       int result = ReadXxpIpHeader(marker);
504       DEBUG_LOG("Recognized ethernet 2 frame");
505       if (result != kResultSkip) {
506         return result;
507       }
508     }
509 
510     return kResultSkip;
511   }
512 
CalcTimeDelta(uint32_t ts_sec,uint32_t ts_usec,uint32_t start_ms)513   uint32_t CalcTimeDelta(uint32_t ts_sec, uint32_t ts_usec, uint32_t start_ms) {
514     // Round to nearest ms.
515     uint64_t t2_ms = ((static_cast<uint64_t>(ts_sec) * 1000000) + ts_usec +
516         500) / 1000;
517     uint64_t t1_ms = static_cast<uint64_t>(start_ms);
518     if (t2_ms < t1_ms) {
519       return 0;
520     } else {
521       return t2_ms - t1_ms;
522     }
523   }
524 
ReadXxpIpHeader(RtpPacketMarker * marker)525   int ReadXxpIpHeader(RtpPacketMarker* marker) {
526     assert(marker);
527 
528     uint16_t version;
529     uint16_t length;
530     uint16_t id;
531     uint16_t fragment;
532     uint16_t protocol;
533     uint16_t checksum;
534     TRY_PCAP(Read(&version, true));
535     TRY_PCAP(Read(&length, true));
536     TRY_PCAP(Read(&id, true));
537     TRY_PCAP(Read(&fragment, true));
538     TRY_PCAP(Read(&protocol, true));
539     TRY_PCAP(Read(&checksum, true));
540     TRY_PCAP(Read(&marker->source_ip, true));
541     TRY_PCAP(Read(&marker->dest_ip, true));
542 
543     if (((version >> 12) & 0x000f) != kIpVersion4) {
544       DEBUG_LOG("IP header is not IPv4");
545       return kResultSkip;
546     }
547 
548     if (fragment != kFragmentOffsetClear &&
549         fragment != kFragmentOffsetDoNotFragment) {
550       DEBUG_LOG("IP fragments cannot be handled");
551       return kResultSkip;
552     }
553 
554     // Skip remaining fields of IP header.
555     uint16_t header_length = (version & 0x0f00) >> (8 - 2);
556     assert(header_length >= kMinIpHeaderLength);
557     TRY_PCAP(Skip(header_length - kMinIpHeaderLength));
558 
559     protocol = protocol & 0x00ff;
560     if (protocol == kProtocolTcp) {
561       DEBUG_LOG("TCP packets are not handled");
562       return kResultSkip;
563     } else if (protocol == kProtocolUdp) {
564       uint16_t length;
565       uint16_t checksum;
566       TRY_PCAP(Read(&marker->source_port, true));
567       TRY_PCAP(Read(&marker->dest_port, true));
568       TRY_PCAP(Read(&length, true));
569       TRY_PCAP(Read(&checksum, true));
570       marker->payload_length = length - kUdpHeaderLength;
571     } else {
572       DEBUG_LOG("Unknown transport (expected UDP or TCP)");
573       return kResultSkip;
574     }
575 
576     return kResultSuccess;
577   }
578 
Read(uint32_t * out,bool expect_network_order)579   int Read(uint32_t* out, bool expect_network_order) {
580     uint32_t tmp = 0;
581     if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
582       return kResultFail;
583     }
584     if ((!expect_network_order && swap_pcap_byte_order_) ||
585         (expect_network_order && swap_network_byte_order_)) {
586       tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
587           ((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
588     }
589     *out = tmp;
590     return kResultSuccess;
591   }
592 
Read(uint16_t * out,bool expect_network_order)593   int Read(uint16_t* out, bool expect_network_order) {
594     uint16_t tmp = 0;
595     if (fread(&tmp, 1, sizeof(uint16_t), file_) != sizeof(uint16_t)) {
596       return kResultFail;
597     }
598     if ((!expect_network_order && swap_pcap_byte_order_) ||
599         (expect_network_order && swap_network_byte_order_)) {
600       tmp = ((tmp >> 8) & 0x00ff) | (tmp << 8);
601     }
602     *out = tmp;
603     return kResultSuccess;
604   }
605 
Read(uint8_t * out,uint32_t count)606   int Read(uint8_t* out, uint32_t count) {
607     if (fread(out, 1, count, file_) != count) {
608       return kResultFail;
609     }
610     return kResultSuccess;
611   }
612 
Read(int32_t * out,bool expect_network_order)613   int Read(int32_t* out, bool expect_network_order) {
614     int32_t tmp = 0;
615     if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
616       return kResultFail;
617     }
618     if ((!expect_network_order && swap_pcap_byte_order_) ||
619         (expect_network_order && swap_network_byte_order_)) {
620       tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
621           ((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
622     }
623     *out = tmp;
624     return kResultSuccess;
625   }
626 
Skip(uint32_t length)627   int Skip(uint32_t length) {
628     if (fseek(file_, length, SEEK_CUR) != 0) {
629       return kResultFail;
630     }
631     return kResultSuccess;
632   }
633 
634   FILE* file_;
635   bool swap_pcap_byte_order_;
636   const bool swap_network_byte_order_;
637   uint8_t read_buffer_[kMaxReadBufferSize];
638 
639   SsrcMap packets_by_ssrc_;
640   std::vector<RtpPacketMarker> packets_;
641   PacketIterator next_packet_it_;
642 
643   RTC_DISALLOW_COPY_AND_ASSIGN(PcapReader);
644 };
645 
Create(FileFormat format,const std::string & filename,const std::set<uint32_t> & ssrc_filter)646 RtpFileReader* RtpFileReader::Create(FileFormat format,
647                                      const std::string& filename,
648                                      const std::set<uint32_t>& ssrc_filter) {
649   RtpFileReaderImpl* reader = NULL;
650   switch (format) {
651     case kPcap:
652       reader = new PcapReader();
653       break;
654     case kRtpDump:
655       reader = new RtpDumpReader();
656       break;
657     case kLengthPacketInterleaved:
658       reader = new InterleavedRtpFileReader();
659       break;
660   }
661   if (!reader->Init(filename, ssrc_filter)) {
662     delete reader;
663     return NULL;
664   }
665   return reader;
666 }
667 
Create(FileFormat format,const std::string & filename)668 RtpFileReader* RtpFileReader::Create(FileFormat format,
669                                      const std::string& filename) {
670   return RtpFileReader::Create(format, filename, std::set<uint32_t>());
671 }
672 
673 }  // namespace test
674 }  // namespace webrtc
675