mirror of
https://github.com/oxen-io/session-android.git
synced 2024-11-28 20:45:17 +00:00
d83a3d71bc
Merge in RedPhone // FREEBIE
147 lines
5.3 KiB
C++
147 lines
5.3 KiB
C++
/*
|
|
* Copyright (c) 2012 The WebRTC project authors. All Rights Reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include "testing/gtest/include/gtest/gtest.h"
|
|
#include "webrtc/system_wrappers/interface/rtp_to_ntp.h"
|
|
|
|
namespace webrtc {
|
|
|
|
TEST(WrapAroundTests, NoWrap) {
|
|
EXPECT_EQ(0, CheckForWrapArounds(0xFFFFFFFF, 0xFFFFFFFE));
|
|
EXPECT_EQ(0, CheckForWrapArounds(1, 0));
|
|
EXPECT_EQ(0, CheckForWrapArounds(0x00010000, 0x0000FFFF));
|
|
}
|
|
|
|
TEST(WrapAroundTests, ForwardWrap) {
|
|
EXPECT_EQ(1, CheckForWrapArounds(0, 0xFFFFFFFF));
|
|
EXPECT_EQ(1, CheckForWrapArounds(0, 0xFFFF0000));
|
|
EXPECT_EQ(1, CheckForWrapArounds(0x0000FFFF, 0xFFFFFFFF));
|
|
EXPECT_EQ(1, CheckForWrapArounds(0x0000FFFF, 0xFFFF0000));
|
|
}
|
|
|
|
TEST(WrapAroundTests, BackwardWrap) {
|
|
EXPECT_EQ(-1, CheckForWrapArounds(0xFFFFFFFF, 0));
|
|
EXPECT_EQ(-1, CheckForWrapArounds(0xFFFF0000, 0));
|
|
EXPECT_EQ(-1, CheckForWrapArounds(0xFFFFFFFF, 0x0000FFFF));
|
|
EXPECT_EQ(-1, CheckForWrapArounds(0xFFFF0000, 0x0000FFFF));
|
|
}
|
|
|
|
TEST(WrapAroundTests, OldRtcpWrapped) {
|
|
RtcpList rtcp;
|
|
uint32_t ntp_sec = 0;
|
|
uint32_t ntp_frac = 0;
|
|
uint32_t timestamp = 0;
|
|
const uint32_t kOneMsInNtpFrac = 4294967;
|
|
const uint32_t kTimestampTicksPerMs = 90;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp -= kTimestampTicksPerMs;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp -= kTimestampTicksPerMs;
|
|
int64_t timestamp_in_ms = -1;
|
|
// This expected to fail since it's highly unlikely that the older RTCP
|
|
// has a much smaller RTP timestamp than the newer.
|
|
EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
|
}
|
|
|
|
TEST(WrapAroundTests, NewRtcpWrapped) {
|
|
RtcpList rtcp;
|
|
uint32_t ntp_sec = 0;
|
|
uint32_t ntp_frac = 0;
|
|
uint32_t timestamp = 0xFFFFFFFF;
|
|
const uint32_t kOneMsInNtpFrac = 4294967;
|
|
const uint32_t kTimestampTicksPerMs = 90;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp += kTimestampTicksPerMs;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
int64_t timestamp_in_ms = -1;
|
|
EXPECT_TRUE(RtpToNtpMs(rtcp.back().rtp_timestamp, rtcp, ×tamp_in_ms));
|
|
// Since this RTP packet has the same timestamp as the RTCP packet constructed
|
|
// at time 0 it should be mapped to 0 as well.
|
|
EXPECT_EQ(0, timestamp_in_ms);
|
|
}
|
|
|
|
TEST(WrapAroundTests, RtpWrapped) {
|
|
const uint32_t kOneMsInNtpFrac = 4294967;
|
|
const uint32_t kTimestampTicksPerMs = 90;
|
|
RtcpList rtcp;
|
|
uint32_t ntp_sec = 0;
|
|
uint32_t ntp_frac = 0;
|
|
uint32_t timestamp = 0xFFFFFFFF - 2 * kTimestampTicksPerMs;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp += kTimestampTicksPerMs;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp += kTimestampTicksPerMs;
|
|
int64_t timestamp_in_ms = -1;
|
|
EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
|
// Since this RTP packet has the same timestamp as the RTCP packet constructed
|
|
// at time 0 it should be mapped to 0 as well.
|
|
EXPECT_EQ(2, timestamp_in_ms);
|
|
}
|
|
|
|
TEST(WrapAroundTests, OldRtp_RtcpsWrapped) {
|
|
const uint32_t kOneMsInNtpFrac = 4294967;
|
|
const uint32_t kTimestampTicksPerMs = 90;
|
|
RtcpList rtcp;
|
|
uint32_t ntp_sec = 0;
|
|
uint32_t ntp_frac = 0;
|
|
uint32_t timestamp = 0;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp += kTimestampTicksPerMs;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp -= 2*kTimestampTicksPerMs;
|
|
int64_t timestamp_in_ms = -1;
|
|
EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
|
}
|
|
|
|
TEST(WrapAroundTests, OldRtp_NewRtcpWrapped) {
|
|
const uint32_t kOneMsInNtpFrac = 4294967;
|
|
const uint32_t kTimestampTicksPerMs = 90;
|
|
RtcpList rtcp;
|
|
uint32_t ntp_sec = 0;
|
|
uint32_t ntp_frac = 0;
|
|
uint32_t timestamp = 0xFFFFFFFF;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp += kTimestampTicksPerMs;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp -= kTimestampTicksPerMs;
|
|
int64_t timestamp_in_ms = -1;
|
|
EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
|
// Constructed at the same time as the first RTCP and should therefore be
|
|
// mapped to zero.
|
|
EXPECT_EQ(0, timestamp_in_ms);
|
|
}
|
|
|
|
TEST(WrapAroundTests, OldRtp_OldRtcpWrapped) {
|
|
const uint32_t kOneMsInNtpFrac = 4294967;
|
|
const uint32_t kTimestampTicksPerMs = 90;
|
|
RtcpList rtcp;
|
|
uint32_t ntp_sec = 0;
|
|
uint32_t ntp_frac = 0;
|
|
uint32_t timestamp = 0;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp -= kTimestampTicksPerMs;
|
|
rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp));
|
|
ntp_frac += kOneMsInNtpFrac;
|
|
timestamp += 2*kTimestampTicksPerMs;
|
|
int64_t timestamp_in_ms = -1;
|
|
EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms));
|
|
}
|
|
}; // namespace webrtc
|