blob: 1b21acfb8509bbcbdeabc5c61935a3221fa49409 [file] [log] [blame]
Benjamin Wright00765292018-11-30 16:18:26 -08001/*
2 * Copyright (c) 2018 The WebRTC project authors. All Rights Reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#include "video/buffered_frame_decryptor.h"
12
13#include <map>
14#include <memory>
15#include <vector>
16
Benjamin Wright00765292018-11-30 16:18:26 -080017#include "api/test/mock_frame_decryptor.h"
18#include "modules/video_coding/packet_buffer.h"
Steve Anton10542f22019-01-11 09:11:00 -080019#include "rtc_base/ref_counted_object.h"
Benjamin Wright00765292018-11-30 16:18:26 -080020#include "system_wrappers/include/clock.h"
21#include "test/gmock.h"
22#include "test/gtest.h"
23
24using ::testing::Return;
25
26namespace webrtc {
27namespace {
28
Benjamin Wright2af5dcb2019-04-09 20:08:41 +000029FrameDecryptorInterface::Result DecryptSuccess() {
30 return FrameDecryptorInterface::Result(FrameDecryptorInterface::Status::kOk,
31 0);
32}
33
34FrameDecryptorInterface::Result DecryptFail() {
35 return FrameDecryptorInterface::Result(
36 FrameDecryptorInterface::Status::kFailedToDecrypt, 0);
37}
38
Benjamin Wright00765292018-11-30 16:18:26 -080039} // namespace
40
Danil Chapovalovce1ffcd2019-10-22 17:12:42 +020041class BufferedFrameDecryptorTest : public ::testing::Test,
42 public OnDecryptedFrameCallback,
43 public OnDecryptionStatusChangeCallback {
Benjamin Wright00765292018-11-30 16:18:26 -080044 public:
45 // Implements the OnDecryptedFrameCallbackInterface
46 void OnDecryptedFrame(
47 std::unique_ptr<video_coding::RtpFrameObject> frame) override {
48 decrypted_frame_call_count_++;
49 }
50
Benjamin Wright2af5dcb2019-04-09 20:08:41 +000051 void OnDecryptionStatusChange(FrameDecryptorInterface::Status status) {
Benjamin Wright52426ed2019-03-01 11:01:59 -080052 ++decryption_status_change_count_;
53 }
54
Benjamin Wright00765292018-11-30 16:18:26 -080055 // Returns a new fake RtpFrameObject it abstracts the difficult construction
56 // of the RtpFrameObject to simplify testing.
57 std::unique_ptr<video_coding::RtpFrameObject> CreateRtpFrameObject(
58 bool key_frame) {
59 seq_num_++;
60
philipelfc358742019-09-26 16:59:45 +020061 // clang-format off
Danil Chapovalovf7457e52019-09-20 17:57:15 +020062 return std::make_unique<video_coding::RtpFrameObject>(
philipelfc358742019-09-26 16:59:45 +020063 seq_num_,
64 seq_num_,
65 /*markerBit=*/true,
66 /*times_nacked=*/0,
67 /*first_packet_received_time=*/0,
68 /*last_packet_received_time=*/0,
69 /*rtp_timestamp=*/0,
70 /*ntp_time_ms=*/0,
71 VideoSendTiming(),
72 /*payload_type=*/0,
73 kVideoCodecGeneric,
74 kVideoRotation_0,
75 VideoContentType::UNSPECIFIED,
76 RTPVideoHeader(),
77 /*color_space=*/absl::nullopt,
78 RtpGenericFrameDescriptor(),
79 RtpPacketInfos(),
Danil Chapovalovf7457e52019-09-20 17:57:15 +020080 EncodedImageBuffer::Create(/*size=*/0));
philipelfc358742019-09-26 16:59:45 +020081 // clang-format on
Benjamin Wright00765292018-11-30 16:18:26 -080082 }
83
84 protected:
Danil Chapovalovf7457e52019-09-20 17:57:15 +020085 BufferedFrameDecryptorTest() {
Benjamin Wright00765292018-11-30 16:18:26 -080086 fake_packet_data_ = std::vector<uint8_t>(100);
87 decrypted_frame_call_count_ = 0;
Benjamin Wright52426ed2019-03-01 11:01:59 -080088 decryption_status_change_count_ = 0;
Benjamin Wright00765292018-11-30 16:18:26 -080089 seq_num_ = 0;
90 mock_frame_decryptor_ = new rtc::RefCountedObject<MockFrameDecryptor>();
Benjamin Wrighta5564482019-04-03 10:44:18 -070091 buffered_frame_decryptor_ =
Mirko Bonadei317a1f02019-09-17 17:06:18 +020092 std::make_unique<BufferedFrameDecryptor>(this, this);
Benjamin Wrighta5564482019-04-03 10:44:18 -070093 buffered_frame_decryptor_->SetFrameDecryptor(mock_frame_decryptor_.get());
Benjamin Wright00765292018-11-30 16:18:26 -080094 }
95
96 static const size_t kMaxStashedFrames;
97
98 std::vector<uint8_t> fake_packet_data_;
Benjamin Wright00765292018-11-30 16:18:26 -080099 rtc::scoped_refptr<MockFrameDecryptor> mock_frame_decryptor_;
100 std::unique_ptr<BufferedFrameDecryptor> buffered_frame_decryptor_;
101 size_t decrypted_frame_call_count_;
Benjamin Wright52426ed2019-03-01 11:01:59 -0800102 size_t decryption_status_change_count_ = 0;
Benjamin Wright00765292018-11-30 16:18:26 -0800103 uint16_t seq_num_;
104};
105
106const size_t BufferedFrameDecryptorTest::kMaxStashedFrames = 24;
107
108// Callback should always be triggered on a successful decryption.
109TEST_F(BufferedFrameDecryptorTest, CallbackCalledOnSuccessfulDecryption) {
Benjamin Wright2af5dcb2019-04-09 20:08:41 +0000110 EXPECT_CALL(*mock_frame_decryptor_, Decrypt)
111 .Times(1)
112 .WillOnce(Return(DecryptSuccess()));
Benjamin Wright00765292018-11-30 16:18:26 -0800113 EXPECT_CALL(*mock_frame_decryptor_, GetMaxPlaintextByteSize)
114 .Times(1)
115 .WillOnce(Return(0));
116 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
117 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(1));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800118 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(1));
Benjamin Wright00765292018-11-30 16:18:26 -0800119}
120
121// An initial fail to decrypt should not trigger the callback.
122TEST_F(BufferedFrameDecryptorTest, CallbackNotCalledOnFailedDecryption) {
Benjamin Wright2af5dcb2019-04-09 20:08:41 +0000123 EXPECT_CALL(*mock_frame_decryptor_, Decrypt)
124 .Times(1)
125 .WillOnce(Return(DecryptFail()));
Benjamin Wright00765292018-11-30 16:18:26 -0800126 EXPECT_CALL(*mock_frame_decryptor_, GetMaxPlaintextByteSize)
127 .Times(1)
128 .WillOnce(Return(0));
129 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
130 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(0));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800131 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(1));
Benjamin Wright00765292018-11-30 16:18:26 -0800132}
133
134// Initial failures should be stored and retried after the first successful
135// decryption.
136TEST_F(BufferedFrameDecryptorTest, DelayedCallbackOnBufferedFrames) {
137 EXPECT_CALL(*mock_frame_decryptor_, Decrypt)
138 .Times(3)
Benjamin Wright2af5dcb2019-04-09 20:08:41 +0000139 .WillOnce(Return(DecryptFail()))
140 .WillOnce(Return(DecryptSuccess()))
141 .WillOnce(Return(DecryptSuccess()));
Benjamin Wright00765292018-11-30 16:18:26 -0800142 EXPECT_CALL(*mock_frame_decryptor_, GetMaxPlaintextByteSize)
143 .Times(3)
144 .WillRepeatedly(Return(0));
145
146 // The first decrypt will fail stashing the first frame.
147 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
148 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(0));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800149 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(1));
Benjamin Wright00765292018-11-30 16:18:26 -0800150 // The second call will succeed playing back both frames.
151 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(false));
152 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(2));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800153 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(2));
Benjamin Wright00765292018-11-30 16:18:26 -0800154}
155
156// Subsequent failure to decrypts after the first successful decryption should
157// fail to decryptk
158TEST_F(BufferedFrameDecryptorTest, FTDDiscardedAfterFirstSuccess) {
159 EXPECT_CALL(*mock_frame_decryptor_, Decrypt)
160 .Times(4)
Benjamin Wright2af5dcb2019-04-09 20:08:41 +0000161 .WillOnce(Return(DecryptFail()))
162 .WillOnce(Return(DecryptSuccess()))
163 .WillOnce(Return(DecryptSuccess()))
164 .WillOnce(Return(DecryptFail()));
Benjamin Wright00765292018-11-30 16:18:26 -0800165 EXPECT_CALL(*mock_frame_decryptor_, GetMaxPlaintextByteSize)
166 .Times(4)
167 .WillRepeatedly(Return(0));
168
169 // The first decrypt will fail stashing the first frame.
170 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
171 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(0));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800172 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(1));
Benjamin Wright00765292018-11-30 16:18:26 -0800173 // The second call will succeed playing back both frames.
174 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(false));
175 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(2));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800176 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(2));
Benjamin Wright00765292018-11-30 16:18:26 -0800177 // A new failure call will not result in an additional decrypted frame
178 // callback.
179 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
180 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(2));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800181 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(3));
Benjamin Wright00765292018-11-30 16:18:26 -0800182}
183
184// Validate that the maximum number of stashed frames cannot be exceeded even if
185// more than its maximum arrives before the first successful decryption.
186TEST_F(BufferedFrameDecryptorTest, MaximumNumberOfFramesStored) {
187 const size_t failed_to_decrypt_count = kMaxStashedFrames * 2;
188 EXPECT_CALL(*mock_frame_decryptor_, Decrypt)
189 .Times(failed_to_decrypt_count)
Benjamin Wright2af5dcb2019-04-09 20:08:41 +0000190 .WillRepeatedly(Return(DecryptFail()));
Benjamin Wright00765292018-11-30 16:18:26 -0800191 EXPECT_CALL(*mock_frame_decryptor_, GetMaxPlaintextByteSize)
192 .WillRepeatedly(Return(0));
193
194 for (size_t i = 0; i < failed_to_decrypt_count; ++i) {
195 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
196 }
197 EXPECT_EQ(decrypted_frame_call_count_, static_cast<size_t>(0));
Benjamin Wright52426ed2019-03-01 11:01:59 -0800198 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(1));
Benjamin Wright00765292018-11-30 16:18:26 -0800199
200 EXPECT_CALL(*mock_frame_decryptor_, Decrypt)
201 .Times(kMaxStashedFrames + 1)
Benjamin Wright2af5dcb2019-04-09 20:08:41 +0000202 .WillRepeatedly(Return(DecryptSuccess()));
Benjamin Wright00765292018-11-30 16:18:26 -0800203 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
204 EXPECT_EQ(decrypted_frame_call_count_, kMaxStashedFrames + 1);
Benjamin Wright52426ed2019-03-01 11:01:59 -0800205 EXPECT_EQ(decryption_status_change_count_, static_cast<size_t>(2));
Benjamin Wright00765292018-11-30 16:18:26 -0800206}
207
Benjamin Wrighta5564482019-04-03 10:44:18 -0700208// Verifies if a BufferedFrameDecryptor is attached but has no FrameDecryptor
209// attached it will still store frames up to the frame max.
210TEST_F(BufferedFrameDecryptorTest, FramesStoredIfDecryptorNull) {
211 buffered_frame_decryptor_->SetFrameDecryptor(nullptr);
212 for (size_t i = 0; i < (2 * kMaxStashedFrames); ++i) {
213 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
214 }
215
216 EXPECT_CALL(*mock_frame_decryptor_, Decrypt)
217 .Times(kMaxStashedFrames + 1)
Benjamin Wright2af5dcb2019-04-09 20:08:41 +0000218 .WillRepeatedly(Return(DecryptSuccess()));
Benjamin Wrighta5564482019-04-03 10:44:18 -0700219 EXPECT_CALL(*mock_frame_decryptor_, GetMaxPlaintextByteSize)
220 .WillRepeatedly(Return(0));
221
222 // Attach the frame decryptor at a later point after frames have arrived.
223 buffered_frame_decryptor_->SetFrameDecryptor(mock_frame_decryptor_.get());
224
225 // Next frame should trigger kMaxStashedFrame decryptions.
226 buffered_frame_decryptor_->ManageEncryptedFrame(CreateRtpFrameObject(true));
227 EXPECT_EQ(decrypted_frame_call_count_, kMaxStashedFrames + 1);
228}
229
Benjamin Wright00765292018-11-30 16:18:26 -0800230} // namespace webrtc