#if HAVE_CRT #define _CRTDBG_MAP_ALLOC #include #include #endif //HAVE_CRT /* * Copyright (C) 2020, University of the Basque Country (UPV/EHU) * Contact for licensing options: * * The original file was part of Open Source Doubango Framework * Copyright (C) 2010-2011 Mamadou Diop. * Copyright (C) 2012 Doubango Telecom * * This file is part of Open Source Doubango Framework. * * DOUBANGO is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * DOUBANGO is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with DOUBANGO. * */ #include "tinyrtp/rtcp/trtp_rtcp_report_sr.h" #include "tinyrtp/rtcp/trtp_rtcp_header.h" #include "tnet_endianness.h" #include "tsk_debug.h" #define TRTP_RTCP_PACKET_SR_MIN_SIZE (TRTP_RTCP_HEADER_SIZE + 4 + 20) static tsk_object_t* trtp_rtcp_report_sr_ctor(tsk_object_t * self, va_list * app) { trtp_rtcp_report_sr_t *sr = self; if(sr){ sr->blocks = tsk_list_create(); sr->packets = tsk_list_create(); } return self; } static tsk_object_t* trtp_rtcp_report_sr_dtor(tsk_object_t * self) { trtp_rtcp_report_sr_t *sr = self; if(sr){ // deinit self TSK_OBJECT_SAFE_FREE(sr->blocks); TSK_OBJECT_SAFE_FREE(sr->packets); // deinit base trtp_rtcp_packet_deinit(TRTP_RTCP_PACKET(sr)); } return self; } static const tsk_object_def_t trtp_rtcp_report_sr_def_s = { sizeof(trtp_rtcp_report_sr_t), trtp_rtcp_report_sr_ctor, trtp_rtcp_report_sr_dtor, tsk_null, }; const tsk_object_def_t *trtp_rtcp_report_sr_def_t = &trtp_rtcp_report_sr_def_s; trtp_rtcp_report_sr_t* trtp_rtcp_report_sr_create_null() { trtp_rtcp_report_sr_t* sr; if((sr = (trtp_rtcp_report_sr_t*)tsk_object_new(trtp_rtcp_report_sr_def_t))){ trtp_rtcp_packet_init(TRTP_RTCP_PACKET(sr), TRTP_RTCP_HEADER_VERSION_DEFAULT, 0, 0, trtp_rtcp_packet_type_sr, (TRTP_RTCP_HEADER_SIZE + 4 + 20)); } return sr; } trtp_rtcp_report_sr_t* trtp_rtcp_report_sr_create(struct trtp_rtcp_header_s* header) { trtp_rtcp_report_sr_t* sr; if((sr = (trtp_rtcp_report_sr_t*)tsk_object_new(trtp_rtcp_report_sr_def_t))){ TRTP_RTCP_PACKET(sr)->header = tsk_object_ref(header); } return sr; } trtp_rtcp_report_sr_t* trtp_rtcp_report_sr_deserialize(const void* data, tsk_size_t _size) { trtp_rtcp_report_sr_t* sr = tsk_null; trtp_rtcp_header_t* header = tsk_null; const uint8_t* pdata = (const uint8_t*)data; int32_t size = (int32_t)_size; if(!data || size < TRTP_RTCP_PACKET_SR_MIN_SIZE){ TSK_DEBUG_ERROR("Invalid parameter"); return tsk_null; } if(!(header = trtp_rtcp_header_deserialize(pdata, size))){ TSK_DEBUG_ERROR("Failed to deserialize the header"); goto bail; } if(header->length_in_bytes < TRTP_RTCP_PACKET_SR_MIN_SIZE){ TSK_DEBUG_ERROR("Too short"); goto bail; } if(!(sr = trtp_rtcp_report_sr_create(header))){ TSK_DEBUG_ERROR("Failed to create object"); goto bail; } sr->ssrc = tnet_ntohl_2(&pdata[4]); pdata += (TRTP_RTCP_HEADER_SIZE + 4); size -= (TRTP_RTCP_HEADER_SIZE + 4); // sender info sr->sender_info.ntp_msw = tnet_ntohl_2(&pdata[0]); sr->sender_info.ntp_lsw = tnet_ntohl_2(&pdata[4]); sr->sender_info.rtp_timestamp = tnet_ntohl_2(&pdata[8]); sr->sender_info.sender_pcount = tnet_ntohl_2(&pdata[12]); sr->sender_info.sender_ocount = tnet_ntohl_2(&pdata[16]); pdata += 20; size -= 20; // Blocks if(header->rc > 0){ tsk_size_t i = 0; trtp_rtcp_rblock_t* rblock; while(i++ < header->rc && size >= TRTP_RTCP_RBLOCK_SIZE){ if((rblock = trtp_rtcp_rblock_deserialize(pdata, size))){ tsk_list_push_back_data(sr->blocks, (void**)&rblock); } pdata += TRTP_RTCP_RBLOCK_SIZE; size -= TRTP_RTCP_RBLOCK_SIZE; } } // Other Packets while(size > TRTP_RTCP_HEADER_SIZE){ trtp_rtcp_packet_t* packet; if((packet = trtp_rtcp_packet_deserialize(pdata, size))){ if((size -= packet->header->length_in_bytes) > 0){ pdata += packet->header->length_in_bytes; } tsk_list_push_back_data(sr->packets, (void**)&packet); continue; } break; } bail: TSK_OBJECT_SAFE_FREE(header); return sr; } int trtp_rtcp_report_sr_serialize_to(const trtp_rtcp_report_sr_t* self, void* data, tsk_size_t size) { int ret; const tsk_list_item_t* item; uint8_t* pdata = (uint8_t*)data; if(!self || !data || size < trtp_rtcp_report_sr_get_size(self)){ TSK_DEBUG_ERROR("Invalid parameter"); return -1; } if((ret = trtp_rtcp_header_serialize_to(TRTP_RTCP_PACKET(self)->header, pdata, size))){ TSK_DEBUG_ERROR("Failed to serialize the header"); return ret; } pdata[TRTP_RTCP_HEADER_SIZE] = self->ssrc >> 24; pdata[TRTP_RTCP_HEADER_SIZE + 1] = (self->ssrc >> 16) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 2] = (self->ssrc >> 8) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 3] = (self->ssrc & 0xFF); pdata[TRTP_RTCP_HEADER_SIZE + 4] = self->sender_info.ntp_msw >> 24; pdata[TRTP_RTCP_HEADER_SIZE + 5] = (self->sender_info.ntp_msw >> 16) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 6] = (self->sender_info.ntp_msw >> 8) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 7] = self->sender_info.ntp_msw & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 8] = self->sender_info.ntp_lsw >> 24; pdata[TRTP_RTCP_HEADER_SIZE + 9] = (self->sender_info.ntp_lsw >> 16) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 10] = (self->sender_info.ntp_lsw >> 8) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 11] = self->sender_info.ntp_lsw & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 12] = self->sender_info.rtp_timestamp >> 24; pdata[TRTP_RTCP_HEADER_SIZE + 13] = (self->sender_info.rtp_timestamp >> 16) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 14] = (self->sender_info.rtp_timestamp >> 8) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 15] = self->sender_info.rtp_timestamp & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 16] = self->sender_info.sender_pcount >> 24; pdata[TRTP_RTCP_HEADER_SIZE + 17] = (self->sender_info.sender_pcount >> 16) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 18] = (self->sender_info.sender_pcount >> 8) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 19] = self->sender_info.sender_pcount & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 20] = self->sender_info.sender_ocount >> 24; pdata[TRTP_RTCP_HEADER_SIZE + 21] = (self->sender_info.sender_ocount >> 16) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 22] = (self->sender_info.sender_ocount >> 8) & 0xFF; pdata[TRTP_RTCP_HEADER_SIZE + 23] = self->sender_info.sender_ocount & 0xFF; pdata += (TRTP_RTCP_HEADER_SIZE + 4 + 20); size -= (TRTP_RTCP_HEADER_SIZE + 4 + 20); if(TRTP_RTCP_PACKET(self)->header->rc > 0){ tsk_list_foreach(item, self->blocks){ if(!item->data){ continue; } if((ret = trtp_rtcp_rblock_serialize_to(TRTP_RTCP_RBLOCK(item->data), pdata, size))){ TSK_DEBUG_ERROR("Failed to serialize the rblock"); goto bail; } pdata += TRTP_RTCP_RBLOCK_SIZE; size -= TRTP_RTCP_RBLOCK_SIZE; } } tsk_list_foreach(item, self->packets){ if(!item->data){ continue; } if((ret = trtp_rtcp_packet_serialize_to(TRTP_RTCP_PACKET(item->data), pdata, size))){ TSK_DEBUG_ERROR("Failed to serialize packet"); goto bail; } pdata += TRTP_RTCP_PACKET(item->data)->header->length_in_bytes; size -= TRTP_RTCP_PACKET(item->data)->header->length_in_bytes; } bail: return ret; } int trtp_rtcp_report_sr_add_block(trtp_rtcp_report_sr_t* self, trtp_rtcp_rblock_t* rblock) { if(!self || !TRTP_RTCP_PACKET(self)->header || !rblock){ TSK_DEBUG_ERROR("Invalid parameter"); return -1; } rblock = tsk_object_ref(rblock); tsk_list_push_back_data(self->blocks, (void**)&rblock); ++TRTP_RTCP_PACKET(self)->header->rc; TRTP_RTCP_PACKET(self)->header->length_in_bytes += TRTP_RTCP_RBLOCK_SIZE; TRTP_RTCP_PACKET(self)->header->length_in_words_minus1 = ((TRTP_RTCP_PACKET(self)->header->length_in_bytes >> 2) - 1) + ((TRTP_RTCP_PACKET(self)->header->length_in_bytes & 0x03) ? 1 : 0); return 0; } tsk_size_t trtp_rtcp_report_sr_get_size(const trtp_rtcp_report_sr_t* self) { tsk_size_t size; const tsk_list_item_t* item; if(!self || !TRTP_RTCP_PACKET(self)->header){ TSK_DEBUG_ERROR("Invalid parameter"); return 0; } size = TRTP_RTCP_PACKET(self)->header->length_in_bytes; //if(TRTP_RTCP_PACKET(self)->header->rc > 0){ // tsk_list_foreach(item, self->blocks){ // if(item->data){ // size += TRTP_RTCP_RBLOCK_SIZE; // } // } //} tsk_list_foreach(item, self->packets){ if(item->data && TRTP_RTCP_PACKET(item->data)->header){ size += TRTP_RTCP_PACKET(item->data)->header->length_in_bytes; } } return size; }