Home | History | Annotate | Download | only in test
      1 /*
      2  *  Copyright (c) 2014 The WebRTC project authors. All Rights Reserved.
      3  *
      4  *  Use of this source code is governed by a BSD-style license
      5  *  that can be found in the LICENSE file in the root of the source
      6  *  tree. An additional intellectual property rights grant can be found
      7  *  in the file PATENTS.  All contributing project authors may
      8  *  be found in the AUTHORS file in the root of the source tree.
      9  */
     10 
     11 #include "webrtc/test/rtp_file_reader.h"
     12 
     13 #include <stdio.h>
     14 
     15 #include <map>
     16 #include <string>
     17 #include <vector>
     18 
     19 #include "webrtc/base/checks.h"
     20 #include "webrtc/base/format_macros.h"
     21 #include "webrtc/base/scoped_ptr.h"
     22 #include "webrtc/modules/rtp_rtcp/source/rtp_utility.h"
     23 
     24 namespace webrtc {
     25 namespace test {
     26 
     27 static const size_t kFirstLineLength = 40;
     28 static uint16_t kPacketHeaderSize = 8;
     29 
     30 #if 1
     31 # define DEBUG_LOG(text)
     32 # define DEBUG_LOG1(text, arg)
     33 #else
     34 # define DEBUG_LOG(text) (printf(text "\n"))
     35 # define DEBUG_LOG1(text, arg) (printf(text "\n", arg))
     36 #endif
     37 
     38 #define TRY(expr)                                      \
     39   do {                                                 \
     40     if (!(expr)) {                                     \
     41       DEBUG_LOG1("FAIL at " __FILE__ ":%d", __LINE__); \
     42       return false;                                    \
     43     }                                                  \
     44   } while (0)
     45 
     46 bool ReadUint32(uint32_t* out, FILE* file) {
     47   *out = 0;
     48   for (size_t i = 0; i < 4; ++i) {
     49     *out <<= 8;
     50     uint8_t tmp;
     51     if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
     52       return false;
     53     *out |= tmp;
     54   }
     55   return true;
     56 }
     57 
     58 bool ReadUint16(uint16_t* out, FILE* file) {
     59   *out = 0;
     60   for (size_t i = 0; i < 2; ++i) {
     61     *out <<= 8;
     62     uint8_t tmp;
     63     if (fread(&tmp, 1, sizeof(uint8_t), file) != sizeof(uint8_t))
     64       return false;
     65     *out |= tmp;
     66   }
     67   return true;
     68 }
     69 
     70 class RtpFileReaderImpl : public RtpFileReader {
     71  public:
     72   virtual bool Init(const std::string& filename,
     73                     const std::set<uint32_t>& ssrc_filter) = 0;
     74 };
     75 
     76 class InterleavedRtpFileReader : public RtpFileReaderImpl {
     77  public:
     78   virtual ~InterleavedRtpFileReader() {
     79     if (file_ != NULL) {
     80       fclose(file_);
     81       file_ = NULL;
     82     }
     83   }
     84 
     85   virtual bool Init(const std::string& filename,
     86                     const std::set<uint32_t>& ssrc_filter) {
     87     file_ = fopen(filename.c_str(), "rb");
     88     if (file_ == NULL) {
     89       printf("ERROR: Can't open file: %s\n", filename.c_str());
     90       return false;
     91     }
     92     return true;
     93   }
     94   virtual bool NextPacket(RtpPacket* packet) {
     95     assert(file_ != NULL);
     96     packet->length = RtpPacket::kMaxPacketBufferSize;
     97     uint32_t len = 0;
     98     TRY(ReadUint32(&len, file_));
     99     if (packet->length < len) {
    100       FATAL() << "Packet is too large to fit: " << len << " bytes vs "
    101               << packet->length
    102               << " bytes allocated. Consider increasing the buffer "
    103                  "size";
    104     }
    105     if (fread(packet->data, 1, len, file_) != len)
    106       return false;
    107 
    108     packet->length = len;
    109     packet->original_length = len;
    110     packet->time_ms = time_ms_;
    111     time_ms_ += 5;
    112     return true;
    113   }
    114 
    115  private:
    116   FILE* file_ = NULL;
    117   int64_t time_ms_ = 0;
    118 };
    119 
    120 // Read RTP packets from file in rtpdump format, as documented at:
    121 // http://www.cs.columbia.edu/irt/software/rtptools/
    122 class RtpDumpReader : public RtpFileReaderImpl {
    123  public:
    124   RtpDumpReader() : file_(NULL) {}
    125   virtual ~RtpDumpReader() {
    126     if (file_ != NULL) {
    127       fclose(file_);
    128       file_ = NULL;
    129     }
    130   }
    131 
    132   bool Init(const std::string& filename,
    133             const std::set<uint32_t>& ssrc_filter) {
    134     file_ = fopen(filename.c_str(), "rb");
    135     if (file_ == NULL) {
    136       printf("ERROR: Can't open file: %s\n", filename.c_str());
    137       return false;
    138     }
    139 
    140     char firstline[kFirstLineLength + 1] = {0};
    141     if (fgets(firstline, kFirstLineLength, file_) == NULL) {
    142       DEBUG_LOG("ERROR: Can't read from file\n");
    143       return false;
    144     }
    145     if (strncmp(firstline, "#!rtpplay", 9) == 0) {
    146       if (strncmp(firstline, "#!rtpplay1.0", 12) != 0) {
    147         DEBUG_LOG("ERROR: wrong rtpplay version, must be 1.0\n");
    148         return false;
    149       }
    150     } else if (strncmp(firstline, "#!RTPencode", 11) == 0) {
    151       if (strncmp(firstline, "#!RTPencode1.0", 14) != 0) {
    152         DEBUG_LOG("ERROR: wrong RTPencode version, must be 1.0\n");
    153         return false;
    154       }
    155     } else {
    156       DEBUG_LOG("ERROR: wrong file format of input file\n");
    157       return false;
    158     }
    159 
    160     uint32_t start_sec;
    161     uint32_t start_usec;
    162     uint32_t source;
    163     uint16_t port;
    164     uint16_t padding;
    165     TRY(ReadUint32(&start_sec, file_));
    166     TRY(ReadUint32(&start_usec, file_));
    167     TRY(ReadUint32(&source, file_));
    168     TRY(ReadUint16(&port, file_));
    169     TRY(ReadUint16(&padding, file_));
    170 
    171     return true;
    172   }
    173 
    174   bool NextPacket(RtpPacket* packet) override {
    175     uint8_t* rtp_data = packet->data;
    176     packet->length = RtpPacket::kMaxPacketBufferSize;
    177 
    178     uint16_t len;
    179     uint16_t plen;
    180     uint32_t offset;
    181     TRY(ReadUint16(&len, file_));
    182     TRY(ReadUint16(&plen, file_));
    183     TRY(ReadUint32(&offset, file_));
    184 
    185     // Use 'len' here because a 'plen' of 0 specifies rtcp.
    186     len -= kPacketHeaderSize;
    187     if (packet->length < len) {
    188       FATAL() << "Packet is too large to fit: " << len << " bytes vs "
    189               << packet->length
    190               << " bytes allocated. Consider increasing the buffer "
    191                  "size";
    192     }
    193     if (fread(rtp_data, 1, len, file_) != len) {
    194       return false;
    195     }
    196 
    197     packet->length = len;
    198     packet->original_length = plen;
    199     packet->time_ms = offset;
    200     return true;
    201   }
    202 
    203  private:
    204   FILE* file_;
    205 
    206   RTC_DISALLOW_COPY_AND_ASSIGN(RtpDumpReader);
    207 };
    208 
    209 enum {
    210   kResultFail = -1,
    211   kResultSuccess = 0,
    212   kResultSkip = 1,
    213 
    214   kPcapVersionMajor = 2,
    215   kPcapVersionMinor = 4,
    216   kLinktypeNull = 0,
    217   kLinktypeEthernet = 1,
    218   kBsdNullLoopback1 = 0x00000002,
    219   kBsdNullLoopback2 = 0x02000000,
    220   kEthernetIIHeaderMacSkip = 12,
    221   kEthertypeIp = 0x0800,
    222   kIpVersion4 = 4,
    223   kMinIpHeaderLength = 20,
    224   kFragmentOffsetClear = 0x0000,
    225   kFragmentOffsetDoNotFragment = 0x4000,
    226   kProtocolTcp = 0x06,
    227   kProtocolUdp = 0x11,
    228   kUdpHeaderLength = 8,
    229   kMaxReadBufferSize = 4096
    230 };
    231 
    232 const uint32_t kPcapBOMSwapOrder = 0xd4c3b2a1UL;
    233 const uint32_t kPcapBOMNoSwapOrder = 0xa1b2c3d4UL;
    234 
    235 #define TRY_PCAP(expr)                                 \
    236   do {                                                 \
    237     int r = (expr);                                    \
    238     if (r == kResultFail) {                            \
    239       DEBUG_LOG1("FAIL at " __FILE__ ":%d", __LINE__); \
    240       return kResultFail;                              \
    241     } else if (r == kResultSkip) {                     \
    242       return kResultSkip;                              \
    243     }                                                  \
    244   } while (0)
    245 
    246 // Read RTP packets from file in tcpdump/libpcap format, as documented at:
    247 // http://wiki.wireshark.org/Development/LibpcapFileFormat
    248 class PcapReader : public RtpFileReaderImpl {
    249  public:
    250   PcapReader()
    251     : file_(NULL),
    252       swap_pcap_byte_order_(false),
    253 #ifdef WEBRTC_ARCH_BIG_ENDIAN
    254       swap_network_byte_order_(false),
    255 #else
    256       swap_network_byte_order_(true),
    257 #endif
    258       read_buffer_(),
    259       packets_by_ssrc_(),
    260       packets_(),
    261       next_packet_it_() {
    262   }
    263 
    264   virtual ~PcapReader() {
    265     if (file_ != NULL) {
    266       fclose(file_);
    267       file_ = NULL;
    268     }
    269   }
    270 
    271   bool Init(const std::string& filename,
    272             const std::set<uint32_t>& ssrc_filter) override {
    273     return Initialize(filename, ssrc_filter) == kResultSuccess;
    274   }
    275 
    276   int Initialize(const std::string& filename,
    277                  const std::set<uint32_t>& ssrc_filter) {
    278     file_ = fopen(filename.c_str(), "rb");
    279     if (file_ == NULL) {
    280       printf("ERROR: Can't open file: %s\n", filename.c_str());
    281       return kResultFail;
    282     }
    283 
    284     if (ReadGlobalHeader() < 0) {
    285       return kResultFail;
    286     }
    287 
    288     int total_packet_count = 0;
    289     uint32_t stream_start_ms = 0;
    290     int32_t next_packet_pos = ftell(file_);
    291     for (;;) {
    292       TRY_PCAP(fseek(file_, next_packet_pos, SEEK_SET));
    293       int result = ReadPacket(&next_packet_pos, stream_start_ms,
    294                               ++total_packet_count, ssrc_filter);
    295       if (result == kResultFail) {
    296         break;
    297       } else if (result == kResultSuccess && packets_.size() == 1) {
    298         assert(stream_start_ms == 0);
    299         PacketIterator it = packets_.begin();
    300         stream_start_ms = it->time_offset_ms;
    301         it->time_offset_ms = 0;
    302       }
    303     }
    304 
    305     if (feof(file_) == 0) {
    306       printf("Failed reading file!\n");
    307       return kResultFail;
    308     }
    309 
    310     printf("Total packets in file: %d\n", total_packet_count);
    311     printf("Total RTP/RTCP packets: %" PRIuS "\n", packets_.size());
    312 
    313     for (SsrcMapIterator mit = packets_by_ssrc_.begin();
    314         mit != packets_by_ssrc_.end(); ++mit) {
    315       uint32_t ssrc = mit->first;
    316       const std::vector<uint32_t>& packet_indices = mit->second;
    317       uint8_t pt = packets_[packet_indices[0]].rtp_header.payloadType;
    318       printf("SSRC: %08x, %" PRIuS " packets, pt=%d\n", ssrc,
    319              packet_indices.size(), pt);
    320     }
    321 
    322     // TODO(solenberg): Better validation of identified SSRC streams.
    323     //
    324     // Since we're dealing with raw network data here, we will wrongly identify
    325     // some packets as RTP. When these packets are consumed by RtpPlayer, they
    326     // are unlikely to cause issues as they will ultimately be filtered out by
    327     // the RtpRtcp module. However, we should really do better filtering here,
    328     // which we can accomplish in a number of ways, e.g.:
    329     //
    330     // - Verify that the time stamps and sequence numbers for RTP packets are
    331     //   both increasing/decreasing. If they move in different directions, the
    332     //   SSRC is likely bogus and can be dropped. (Normally they should be inc-
    333     //   reasing but we must allow packet reordering).
    334     // - If RTP sequence number is not changing, drop the stream.
    335     // - Can also use srcip:port->dstip:port pairs, assuming few SSRC collisions
    336     //   for up/down streams.
    337 
    338     next_packet_it_ = packets_.begin();
    339     return kResultSuccess;
    340   }
    341 
    342   bool NextPacket(RtpPacket* packet) override {
    343     uint32_t length = RtpPacket::kMaxPacketBufferSize;
    344     if (NextPcap(packet->data, &length, &packet->time_ms) != kResultSuccess)
    345       return false;
    346     packet->length = static_cast<size_t>(length);
    347     packet->original_length = packet->length;
    348     return true;
    349   }
    350 
    351   virtual int NextPcap(uint8_t* data, uint32_t* length, uint32_t* time_ms) {
    352     assert(data);
    353     assert(length);
    354     assert(time_ms);
    355 
    356     if (next_packet_it_ == packets_.end()) {
    357       return -1;
    358     }
    359     if (*length < next_packet_it_->payload_length) {
    360       return -1;
    361     }
    362     TRY_PCAP(fseek(file_, next_packet_it_->pos_in_file, SEEK_SET));
    363     TRY_PCAP(Read(data, next_packet_it_->payload_length));
    364     *length = next_packet_it_->payload_length;
    365     *time_ms = next_packet_it_->time_offset_ms;
    366     next_packet_it_++;
    367 
    368     return 0;
    369   }
    370 
    371  private:
    372   // A marker of an RTP packet within the file.
    373   struct RtpPacketMarker {
    374     uint32_t packet_number;   // One-based index (like in WireShark)
    375     uint32_t time_offset_ms;
    376     uint32_t source_ip;
    377     uint32_t dest_ip;
    378     uint16_t source_port;
    379     uint16_t dest_port;
    380     RTPHeader rtp_header;
    381     int32_t pos_in_file;      // Byte offset of payload from start of file.
    382     uint32_t payload_length;
    383   };
    384 
    385   typedef std::vector<RtpPacketMarker>::iterator PacketIterator;
    386   typedef std::map<uint32_t, std::vector<uint32_t> > SsrcMap;
    387   typedef std::map<uint32_t, std::vector<uint32_t> >::iterator SsrcMapIterator;
    388 
    389   int ReadGlobalHeader() {
    390     uint32_t magic;
    391     TRY_PCAP(Read(&magic, false));
    392     if (magic == kPcapBOMSwapOrder) {
    393       swap_pcap_byte_order_ = true;
    394     } else if (magic == kPcapBOMNoSwapOrder) {
    395       swap_pcap_byte_order_ = false;
    396     } else {
    397       return kResultFail;
    398     }
    399 
    400     uint16_t version_major;
    401     uint16_t version_minor;
    402     TRY_PCAP(Read(&version_major, false));
    403     TRY_PCAP(Read(&version_minor, false));
    404     if (version_major != kPcapVersionMajor ||
    405         version_minor != kPcapVersionMinor) {
    406       return kResultFail;
    407     }
    408 
    409     int32_t this_zone;  // GMT to local correction.
    410     uint32_t sigfigs;   // Accuracy of timestamps.
    411     uint32_t snaplen;   // Max length of captured packets, in octets.
    412     uint32_t network;   // Data link type.
    413     TRY_PCAP(Read(&this_zone, false));
    414     TRY_PCAP(Read(&sigfigs, false));
    415     TRY_PCAP(Read(&snaplen, false));
    416     TRY_PCAP(Read(&network, false));
    417 
    418     // Accept only LINKTYPE_NULL and LINKTYPE_ETHERNET.
    419     // See: http://www.tcpdump.org/linktypes.html
    420     if (network != kLinktypeNull && network != kLinktypeEthernet) {
    421       return kResultFail;
    422     }
    423 
    424     return kResultSuccess;
    425   }
    426 
    427   int ReadPacket(int32_t* next_packet_pos,
    428                  uint32_t stream_start_ms,
    429                  uint32_t number,
    430                  const std::set<uint32_t>& ssrc_filter) {
    431     assert(next_packet_pos);
    432 
    433     uint32_t ts_sec;    // Timestamp seconds.
    434     uint32_t ts_usec;   // Timestamp microseconds.
    435     uint32_t incl_len;  // Number of octets of packet saved in file.
    436     uint32_t orig_len;  // Actual length of packet.
    437     TRY_PCAP(Read(&ts_sec, false));
    438     TRY_PCAP(Read(&ts_usec, false));
    439     TRY_PCAP(Read(&incl_len, false));
    440     TRY_PCAP(Read(&orig_len, false));
    441 
    442     *next_packet_pos = ftell(file_) + incl_len;
    443 
    444     RtpPacketMarker marker = {0};
    445     marker.packet_number = number;
    446     marker.time_offset_ms = CalcTimeDelta(ts_sec, ts_usec, stream_start_ms);
    447     TRY_PCAP(ReadPacketHeader(&marker));
    448     marker.pos_in_file = ftell(file_);
    449 
    450     if (marker.payload_length > sizeof(read_buffer_)) {
    451       printf("Packet too large!\n");
    452       return kResultFail;
    453     }
    454     TRY_PCAP(Read(read_buffer_, marker.payload_length));
    455 
    456     RtpUtility::RtpHeaderParser rtp_parser(read_buffer_, marker.payload_length);
    457     if (rtp_parser.RTCP()) {
    458       rtp_parser.ParseRtcp(&marker.rtp_header);
    459       packets_.push_back(marker);
    460     } else {
    461       if (!rtp_parser.Parse(&marker.rtp_header, nullptr)) {
    462         DEBUG_LOG("Not recognized as RTP/RTCP");
    463         return kResultSkip;
    464       }
    465 
    466       uint32_t ssrc = marker.rtp_header.ssrc;
    467       if (ssrc_filter.empty() || ssrc_filter.find(ssrc) != ssrc_filter.end()) {
    468         packets_by_ssrc_[ssrc].push_back(
    469             static_cast<uint32_t>(packets_.size()));
    470         packets_.push_back(marker);
    471       } else {
    472         return kResultSkip;
    473       }
    474     }
    475 
    476     return kResultSuccess;
    477   }
    478 
    479   int ReadPacketHeader(RtpPacketMarker* marker) {
    480     int32_t file_pos = ftell(file_);
    481 
    482     // Check for BSD null/loopback frame header. The header is just 4 bytes in
    483     // native byte order, so we check for both versions as we don't care about
    484     // the header as such and will likely fail reading the IP header if this is
    485     // something else than null/loopback.
    486     uint32_t protocol;
    487     TRY_PCAP(Read(&protocol, true));
    488     if (protocol == kBsdNullLoopback1 || protocol == kBsdNullLoopback2) {
    489       int result = ReadXxpIpHeader(marker);
    490       DEBUG_LOG("Recognized loopback frame");
    491       if (result != kResultSkip) {
    492         return result;
    493       }
    494     }
    495 
    496     TRY_PCAP(fseek(file_, file_pos, SEEK_SET));
    497 
    498     // Check for Ethernet II, IP frame header.
    499     uint16_t type;
    500     TRY_PCAP(Skip(kEthernetIIHeaderMacSkip));  // Source+destination MAC.
    501     TRY_PCAP(Read(&type, true));
    502     if (type == kEthertypeIp) {
    503       int result = ReadXxpIpHeader(marker);
    504       DEBUG_LOG("Recognized ethernet 2 frame");
    505       if (result != kResultSkip) {
    506         return result;
    507       }
    508     }
    509 
    510     return kResultSkip;
    511   }
    512 
    513   uint32_t CalcTimeDelta(uint32_t ts_sec, uint32_t ts_usec, uint32_t start_ms) {
    514     // Round to nearest ms.
    515     uint64_t t2_ms = ((static_cast<uint64_t>(ts_sec) * 1000000) + ts_usec +
    516         500) / 1000;
    517     uint64_t t1_ms = static_cast<uint64_t>(start_ms);
    518     if (t2_ms < t1_ms) {
    519       return 0;
    520     } else {
    521       return t2_ms - t1_ms;
    522     }
    523   }
    524 
    525   int ReadXxpIpHeader(RtpPacketMarker* marker) {
    526     assert(marker);
    527 
    528     uint16_t version;
    529     uint16_t length;
    530     uint16_t id;
    531     uint16_t fragment;
    532     uint16_t protocol;
    533     uint16_t checksum;
    534     TRY_PCAP(Read(&version, true));
    535     TRY_PCAP(Read(&length, true));
    536     TRY_PCAP(Read(&id, true));
    537     TRY_PCAP(Read(&fragment, true));
    538     TRY_PCAP(Read(&protocol, true));
    539     TRY_PCAP(Read(&checksum, true));
    540     TRY_PCAP(Read(&marker->source_ip, true));
    541     TRY_PCAP(Read(&marker->dest_ip, true));
    542 
    543     if (((version >> 12) & 0x000f) != kIpVersion4) {
    544       DEBUG_LOG("IP header is not IPv4");
    545       return kResultSkip;
    546     }
    547 
    548     if (fragment != kFragmentOffsetClear &&
    549         fragment != kFragmentOffsetDoNotFragment) {
    550       DEBUG_LOG("IP fragments cannot be handled");
    551       return kResultSkip;
    552     }
    553 
    554     // Skip remaining fields of IP header.
    555     uint16_t header_length = (version & 0x0f00) >> (8 - 2);
    556     assert(header_length >= kMinIpHeaderLength);
    557     TRY_PCAP(Skip(header_length - kMinIpHeaderLength));
    558 
    559     protocol = protocol & 0x00ff;
    560     if (protocol == kProtocolTcp) {
    561       DEBUG_LOG("TCP packets are not handled");
    562       return kResultSkip;
    563     } else if (protocol == kProtocolUdp) {
    564       uint16_t length;
    565       uint16_t checksum;
    566       TRY_PCAP(Read(&marker->source_port, true));
    567       TRY_PCAP(Read(&marker->dest_port, true));
    568       TRY_PCAP(Read(&length, true));
    569       TRY_PCAP(Read(&checksum, true));
    570       marker->payload_length = length - kUdpHeaderLength;
    571     } else {
    572       DEBUG_LOG("Unknown transport (expected UDP or TCP)");
    573       return kResultSkip;
    574     }
    575 
    576     return kResultSuccess;
    577   }
    578 
    579   int Read(uint32_t* out, bool expect_network_order) {
    580     uint32_t tmp = 0;
    581     if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
    582       return kResultFail;
    583     }
    584     if ((!expect_network_order && swap_pcap_byte_order_) ||
    585         (expect_network_order && swap_network_byte_order_)) {
    586       tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
    587           ((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
    588     }
    589     *out = tmp;
    590     return kResultSuccess;
    591   }
    592 
    593   int Read(uint16_t* out, bool expect_network_order) {
    594     uint16_t tmp = 0;
    595     if (fread(&tmp, 1, sizeof(uint16_t), file_) != sizeof(uint16_t)) {
    596       return kResultFail;
    597     }
    598     if ((!expect_network_order && swap_pcap_byte_order_) ||
    599         (expect_network_order && swap_network_byte_order_)) {
    600       tmp = ((tmp >> 8) & 0x00ff) | (tmp << 8);
    601     }
    602     *out = tmp;
    603     return kResultSuccess;
    604   }
    605 
    606   int Read(uint8_t* out, uint32_t count) {
    607     if (fread(out, 1, count, file_) != count) {
    608       return kResultFail;
    609     }
    610     return kResultSuccess;
    611   }
    612 
    613   int Read(int32_t* out, bool expect_network_order) {
    614     int32_t tmp = 0;
    615     if (fread(&tmp, 1, sizeof(uint32_t), file_) != sizeof(uint32_t)) {
    616       return kResultFail;
    617     }
    618     if ((!expect_network_order && swap_pcap_byte_order_) ||
    619         (expect_network_order && swap_network_byte_order_)) {
    620       tmp = ((tmp >> 24) & 0x000000ff) | (tmp << 24) |
    621           ((tmp >> 8) & 0x0000ff00) | ((tmp << 8) & 0x00ff0000);
    622     }
    623     *out = tmp;
    624     return kResultSuccess;
    625   }
    626 
    627   int Skip(uint32_t length) {
    628     if (fseek(file_, length, SEEK_CUR) != 0) {
    629       return kResultFail;
    630     }
    631     return kResultSuccess;
    632   }
    633 
    634   FILE* file_;
    635   bool swap_pcap_byte_order_;
    636   const bool swap_network_byte_order_;
    637   uint8_t read_buffer_[kMaxReadBufferSize];
    638 
    639   SsrcMap packets_by_ssrc_;
    640   std::vector<RtpPacketMarker> packets_;
    641   PacketIterator next_packet_it_;
    642 
    643   RTC_DISALLOW_COPY_AND_ASSIGN(PcapReader);
    644 };
    645 
    646 RtpFileReader* RtpFileReader::Create(FileFormat format,
    647                                      const std::string& filename,
    648                                      const std::set<uint32_t>& ssrc_filter) {
    649   RtpFileReaderImpl* reader = NULL;
    650   switch (format) {
    651     case kPcap:
    652       reader = new PcapReader();
    653       break;
    654     case kRtpDump:
    655       reader = new RtpDumpReader();
    656       break;
    657     case kLengthPacketInterleaved:
    658       reader = new InterleavedRtpFileReader();
    659       break;
    660   }
    661   if (!reader->Init(filename, ssrc_filter)) {
    662     delete reader;
    663     return NULL;
    664   }
    665   return reader;
    666 }
    667 
    668 RtpFileReader* RtpFileReader::Create(FileFormat format,
    669                                      const std::string& filename) {
    670   return RtpFileReader::Create(format, filename, std::set<uint32_t>());
    671 }
    672 
    673 }  // namespace test
    674 }  // namespace webrtc
    675