diff options
Diffstat (limited to 'chromium/third_party/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc')
-rw-r--r-- | chromium/third_party/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc | 146 |
1 files changed, 146 insertions, 0 deletions
diff --git a/chromium/third_party/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc b/chromium/third_party/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc new file mode 100644 index 00000000000..a4d75aed04a --- /dev/null +++ b/chromium/third_party/webrtc/system_wrappers/source/rtp_to_ntp_unittest.cc @@ -0,0 +1,146 @@ +/* + * Copyright (c) 2012 The WebRTC project authors. All Rights Reserved. + * + * Use of this source code is governed by a BSD-style license + * that can be found in the LICENSE file in the root of the source + * tree. An additional intellectual property rights grant can be found + * in the file PATENTS. All contributing project authors may + * be found in the AUTHORS file in the root of the source tree. + */ + +#include "testing/gtest/include/gtest/gtest.h" +#include "webrtc/system_wrappers/interface/rtp_to_ntp.h" + +namespace webrtc { + +TEST(WrapAroundTests, NoWrap) { + EXPECT_EQ(0, CheckForWrapArounds(0xFFFFFFFF, 0xFFFFFFFE)); + EXPECT_EQ(0, CheckForWrapArounds(1, 0)); + EXPECT_EQ(0, CheckForWrapArounds(0x00010000, 0x0000FFFF)); +} + +TEST(WrapAroundTests, ForwardWrap) { + EXPECT_EQ(1, CheckForWrapArounds(0, 0xFFFFFFFF)); + EXPECT_EQ(1, CheckForWrapArounds(0, 0xFFFF0000)); + EXPECT_EQ(1, CheckForWrapArounds(0x0000FFFF, 0xFFFFFFFF)); + EXPECT_EQ(1, CheckForWrapArounds(0x0000FFFF, 0xFFFF0000)); +} + +TEST(WrapAroundTests, BackwardWrap) { + EXPECT_EQ(-1, CheckForWrapArounds(0xFFFFFFFF, 0)); + EXPECT_EQ(-1, CheckForWrapArounds(0xFFFF0000, 0)); + EXPECT_EQ(-1, CheckForWrapArounds(0xFFFFFFFF, 0x0000FFFF)); + EXPECT_EQ(-1, CheckForWrapArounds(0xFFFF0000, 0x0000FFFF)); +} + +TEST(WrapAroundTests, OldRtcpWrapped) { + RtcpList rtcp; + uint32_t ntp_sec = 0; + uint32_t ntp_frac = 0; + uint32_t timestamp = 0; + const uint32_t kOneMsInNtpFrac = 4294967; + const uint32_t kTimestampTicksPerMs = 90; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp -= kTimestampTicksPerMs; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp -= kTimestampTicksPerMs; + int64_t timestamp_in_ms = -1; + // This expected to fail since it's highly unlikely that the older RTCP + // has a much smaller RTP timestamp than the newer. + EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms)); +} + +TEST(WrapAroundTests, NewRtcpWrapped) { + RtcpList rtcp; + uint32_t ntp_sec = 0; + uint32_t ntp_frac = 0; + uint32_t timestamp = 0xFFFFFFFF; + const uint32_t kOneMsInNtpFrac = 4294967; + const uint32_t kTimestampTicksPerMs = 90; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp += kTimestampTicksPerMs; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + int64_t timestamp_in_ms = -1; + EXPECT_TRUE(RtpToNtpMs(rtcp.back().rtp_timestamp, rtcp, ×tamp_in_ms)); + // Since this RTP packet has the same timestamp as the RTCP packet constructed + // at time 0 it should be mapped to 0 as well. + EXPECT_EQ(0, timestamp_in_ms); +} + +TEST(WrapAroundTests, RtpWrapped) { + const uint32_t kOneMsInNtpFrac = 4294967; + const uint32_t kTimestampTicksPerMs = 90; + RtcpList rtcp; + uint32_t ntp_sec = 0; + uint32_t ntp_frac = 0; + uint32_t timestamp = 0xFFFFFFFF - 2 * kTimestampTicksPerMs; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp += kTimestampTicksPerMs; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp += kTimestampTicksPerMs; + int64_t timestamp_in_ms = -1; + EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms)); + // Since this RTP packet has the same timestamp as the RTCP packet constructed + // at time 0 it should be mapped to 0 as well. + EXPECT_EQ(2, timestamp_in_ms); +} + +TEST(WrapAroundTests, OldRtp_RtcpsWrapped) { + const uint32_t kOneMsInNtpFrac = 4294967; + const uint32_t kTimestampTicksPerMs = 90; + RtcpList rtcp; + uint32_t ntp_sec = 0; + uint32_t ntp_frac = 0; + uint32_t timestamp = 0; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp += kTimestampTicksPerMs; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp -= 2*kTimestampTicksPerMs; + int64_t timestamp_in_ms = -1; + EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms)); +} + +TEST(WrapAroundTests, OldRtp_NewRtcpWrapped) { + const uint32_t kOneMsInNtpFrac = 4294967; + const uint32_t kTimestampTicksPerMs = 90; + RtcpList rtcp; + uint32_t ntp_sec = 0; + uint32_t ntp_frac = 0; + uint32_t timestamp = 0xFFFFFFFF; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp += kTimestampTicksPerMs; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp -= kTimestampTicksPerMs; + int64_t timestamp_in_ms = -1; + EXPECT_TRUE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms)); + // Constructed at the same time as the first RTCP and should therefore be + // mapped to zero. + EXPECT_EQ(0, timestamp_in_ms); +} + +TEST(WrapAroundTests, OldRtp_OldRtcpWrapped) { + const uint32_t kOneMsInNtpFrac = 4294967; + const uint32_t kTimestampTicksPerMs = 90; + RtcpList rtcp; + uint32_t ntp_sec = 0; + uint32_t ntp_frac = 0; + uint32_t timestamp = 0; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp -= kTimestampTicksPerMs; + rtcp.push_front(RtcpMeasurement(ntp_sec, ntp_frac, timestamp)); + ntp_frac += kOneMsInNtpFrac; + timestamp += 2*kTimestampTicksPerMs; + int64_t timestamp_in_ms = -1; + EXPECT_FALSE(RtpToNtpMs(timestamp, rtcp, ×tamp_in_ms)); +} +}; // namespace webrtc |