From 6bf0a5cb5034a7e684dcc3500e841785237ce2dd Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 19:32:43 +0200 Subject: Adding upstream version 1:115.7.0. Signed-off-by: Daniel Baumann --- dom/media/gtest/TestWebMBuffered.cpp | 234 +++++++++++++++++++++++++++++++++++ 1 file changed, 234 insertions(+) create mode 100644 dom/media/gtest/TestWebMBuffered.cpp (limited to 'dom/media/gtest/TestWebMBuffered.cpp') diff --git a/dom/media/gtest/TestWebMBuffered.cpp b/dom/media/gtest/TestWebMBuffered.cpp new file mode 100644 index 0000000000..35ba00fec7 --- /dev/null +++ b/dom/media/gtest/TestWebMBuffered.cpp @@ -0,0 +1,234 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "gtest/gtest.h" +#include "mozilla/ArrayUtils.h" +#include +#include "nsTArray.h" +#include "WebMBufferedParser.h" + +using namespace mozilla; + +std::ostream& operator<<(std::ostream& aStream, nsresult aResult) { + return aStream << GetStaticErrorName(aResult); +} + +namespace mozilla { +std::ostream& operator<<(std::ostream& aStream, const MediaResult& aResult) { + aStream << aResult.Code(); + if (!aResult.Message().IsEmpty()) { + aStream << " (" << aResult.Message() << ")"; + } + return aStream; +} +} // namespace mozilla + +// "test.webm" contains 8 SimpleBlocks in a single Cluster. The blocks with +// timecodes 100000000 and are 133000000 skipped by WebMBufferedParser +// because they occur after a block with timecode 160000000 and the parser +// expects in-order timecodes per the WebM spec. The remaining 6 +// SimpleBlocks have the following attributes: +static const uint64_t gTimecodes[] = {66000000, 160000000, 166000000, + 200000000, 233000000, 320000000}; +static const int64_t gEndOffsets[] = {466, 737, 1209, 1345, 1508, 1980}; + +TEST(WebMBuffered, BasicTests) +{ + WebMBufferedParser parser(0); + + nsTArray mapping; + EXPECT_EQ(parser.Append(nullptr, 0, mapping), NS_OK); + EXPECT_TRUE(mapping.IsEmpty()); + EXPECT_EQ(parser.mStartOffset, 0); + EXPECT_EQ(parser.mCurrentOffset, 0); + + unsigned char buf[] = {0x1a, 0x45, 0xdf, 0xa3}; + EXPECT_EQ(parser.Append(buf, ArrayLength(buf), mapping), NS_OK); + EXPECT_TRUE(mapping.IsEmpty()); + EXPECT_EQ(parser.mStartOffset, 0); + EXPECT_EQ(parser.mCurrentOffset, 4); +} + +static void ReadFile(const char* aPath, nsTArray& aBuffer) { + FILE* f = fopen(aPath, "rb"); + ASSERT_NE(f, (FILE*)nullptr); + + int r = fseek(f, 0, SEEK_END); + ASSERT_EQ(r, 0); + + long size = ftell(f); + ASSERT_NE(size, -1); + aBuffer.SetLength(size); + + r = fseek(f, 0, SEEK_SET); + ASSERT_EQ(r, 0); + + size_t got = fread(aBuffer.Elements(), 1, size, f); + ASSERT_EQ(got, size_t(size)); + + r = fclose(f); + ASSERT_EQ(r, 0); +} + +TEST(WebMBuffered, RealData) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + ReadFile("test.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_OK); + EXPECT_EQ(mapping.Length(), 6u); + EXPECT_EQ(parser.mStartOffset, 0); + EXPECT_EQ(parser.mCurrentOffset, int64_t(webmData.Length())); + EXPECT_EQ(parser.GetTimecodeScale(), 500000u); + + for (uint32_t i = 0; i < mapping.Length(); ++i) { + EXPECT_EQ(mapping[i].mEndOffset, gEndOffsets[i]); + EXPECT_EQ(mapping[i].mSyncOffset, 326); + EXPECT_EQ(mapping[i].mTimecode, gTimecodes[i]); + } +} + +TEST(WebMBuffered, RealDataAppend) +{ + WebMBufferedParser parser(0); + nsTArray mapping; + + nsTArray webmData; + ReadFile("test.webm", webmData); + + uint32_t arrayEntries = mapping.Length(); + size_t offset = 0; + while (offset < webmData.Length()) { + EXPECT_EQ(parser.Append(webmData.Elements() + offset, 1, mapping), NS_OK); + offset += 1; + EXPECT_EQ(parser.mCurrentOffset, int64_t(offset)); + if (mapping.Length() != arrayEntries) { + arrayEntries = mapping.Length(); + ASSERT_LE(arrayEntries, 6u); + uint32_t i = arrayEntries - 1; + EXPECT_EQ(mapping[i].mEndOffset, gEndOffsets[i]); + EXPECT_EQ(mapping[i].mSyncOffset, 326); + EXPECT_EQ(mapping[i].mTimecode, gTimecodes[i]); + EXPECT_EQ(parser.GetTimecodeScale(), 500000u); + } + } + EXPECT_EQ(mapping.Length(), 6u); + EXPECT_EQ(parser.mStartOffset, 0); + EXPECT_EQ(parser.mCurrentOffset, int64_t(webmData.Length())); + EXPECT_EQ(parser.GetTimecodeScale(), 500000u); + + for (uint32_t i = 0; i < mapping.Length(); ++i) { + EXPECT_EQ(mapping[i].mEndOffset, gEndOffsets[i]); + EXPECT_EQ(mapping[i].mSyncOffset, 326); + EXPECT_EQ(mapping[i].mTimecode, gTimecodes[i]); + } +} + +TEST(WebMBuffered, InvalidEBMLMaxIdLength) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + // This file contains EBMLMaxIdLength=3, but a Segment element (and maybe + // others) whose Id VInt has length 4. + ReadFile("test_InvalidElementId.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_ERROR_FAILURE); +} + +TEST(WebMBuffered, InvalidLargeElementIdLength) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + // This file contains EBMLMaxIdLength=4, but a dummy element whose Id VInt has + // length 5. + ReadFile("test_InvalidLargeElementId.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_ERROR_FAILURE); +} + +TEST(WebMBuffered, InvalidSmallEBMLMaxIdLength) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + // This file contains EBMLMaxIdLength=3. + // Per draft-ietf-cellar-matroska-13 EBMLMaxIdLength MUST be 4. But element + // ids can also be between 1 and 5 octets long. 5 only if EBMLMaxIdLength + // specifies it. At least 3 is too short. + ReadFile("test_InvalidSmallEBMLMaxIdLength.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_ERROR_FAILURE); +} + +TEST(WebMBuffered, ValidLargeEBMLMaxIdLength) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + // This file contains EBMLMaxIdLength=5 and a dummy element with a 5 octet + // long id. Per draft-ietf-cellar-matroska-13 EBMLMaxIdLength MUST be 4. But + // element ids can also be between 1 and 5 octets long. 5 only if + // EBMLMaxIdLength specifies it. We better tolerate this. + ReadFile("test_ValidLargeEBMLMaxIdLength.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_OK); +} + +TEST(WebMBuffered, InvalidLargeEBMLMaxIdLength) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + // This file contains EBMLMaxIdLength=6. + // Per draft-ietf-cellar-matroska-13 EBMLMaxIdLength MUST be 4. But + // element ids can also be between 1 and 5 octets long. 5 only if + // EBMLMaxIdLength specifies it. At least 6 is too long. + ReadFile("test_InvalidLargeEBMLMaxIdLength.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_ERROR_FAILURE); +} + +TEST(WebMBuffered, ValidSmallEBMLMaxSizeLength) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + // This file contains EBMLMaxSizeLength=7 and no element with an element size + // longer than 7 bytes. + ReadFile("test_ValidSmallEBMLMaxSizeLength.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_OK); +} + +TEST(WebMBuffered, InvalidEBMLMaxSizeLength) +{ + WebMBufferedParser parser(0); + + nsTArray webmData; + // This file contains EBMLMaxSizeLength=7, but the Segment element size VInt + // has length 8. + ReadFile("test_InvalidElementSize.webm", webmData); + + nsTArray mapping; + EXPECT_EQ(parser.Append(webmData.Elements(), webmData.Length(), mapping), + NS_ERROR_FAILURE); +} -- cgit v1.2.3