shithub: opus-tools

Download patch

ref: 801cf888d679a233a5708df92e0424b78c148859
parent: e24c02237fb131393bd04f0d89ab63895371442c
author: Ralph Giles <[email protected]>
date: Thu Aug 16 13:31:02 EDT 2012

Abstract some of the header parsing on the captured packets.

--- a/src/opusrtp.c
+++ b/src/opusrtp.c
@@ -92,7 +92,7 @@
   le32(data + 8, strlen(vendor));
   memcpy(data + 12, vendor, strlen(vendor));
   le32(data + 12 + strlen(vendor), 0);
-  
+
   op->packet = data;
   op->bytes = size;
   op->b_o_s = 0;
@@ -137,7 +137,7 @@
   if (!params || !params->stream || !params->out) {
     return -1;
   }
-  
+
   while (ogg_stream_pageout(params->stream, &page)) {
     fwrite(page.header, 1, page.header_len, params->out);
     fwrite(page.body, 1, page.body_len, params->out);
@@ -154,7 +154,7 @@
   if (!params || !params->stream || !params->out) {
     return -1;
   }
-  
+
   while (ogg_stream_flush(params->stream, &page)) {
     fwrite(page.header, 1, page.header_len, params->out);
     fwrite(page.body, 1, page.body_len, params->out);
@@ -163,16 +163,45 @@
   return 0;
 }
 
+typedef struct {
+  unsigned char src[6], dst[6]; /* ethernet MACs */
+  int type;
+} eth_header;
+
+typedef struct {
+  int version;
+  int header_size;
+  unsigned char src[4], dst[4]; /* ipv4 addrs */
+  int protocol;
+} ip_header;
+
+typedef struct {
+  int src, dst; /* ports */
+  int size, checksum;
+} udp_header;
+
+typedef struct {
+  int version;
+  int type;
+  int pad, ext, cc, mark;
+  int seq, time;
+  int ssrc;
+  int header_size;
+  int payload_size;
+} rtp_header;
+
 /* pcap 'got_packet' callback */
 void write_packet(u_char *args, const struct pcap_pkthdr *header,
                   const u_char *packet)
 {
   state *params = (state *)args;
-  int ip_header_size;
-  int rtp_header_size;
+  eth_header eth;
+  ip_header ip;
+  udp_header udp;
+  rtp_header rtp;
 
   fprintf(stderr, "Got %d byte packet (%d bytes captured)\n",
-          header->len, header->caplen); 
+          header->len, header->caplen);
 
   /* eth header is always 14 bytes */
   if (header->caplen < 14) {
@@ -179,11 +208,17 @@
     fprintf(stderr, "Packet too short for eth\n");
     return;
   }
+  memcpy(eth.src, packet, 6);
+  memcpy(eth.dst, packet + 6, 6);
+  eth.type = packet[12] << 8 | packet[13];
+
   fprintf(stderr, "  src mac %02x:%02x:%02x:%02x:%02x:%02x\n",
-          packet[0], packet[1], packet[2], packet[3], packet[4], packet[5]);
-  fprintf(stderr, " dest mac %02x:%02x:%02x:%02x:%02x:%02x\n",
-          packet[6], packet[7], packet[8], packet[9], packet[10], packet[11]);
-  fprintf(stderr, "  eth type 0x%04x\n", packet[12] << 8 | packet[13]);
+          eth.src[0], eth.src[1], eth.src[2],
+          eth.src[3], eth.src[4], eth.src[5]);
+  fprintf(stderr, "  dst mac %02x:%02x:%02x:%02x:%02x:%02x\n",
+          eth.dst[0], eth.dst[1], eth.dst[2],
+          eth.dst[3], eth.dst[4], eth.dst[5]);
+  fprintf(stderr, "  eth type 0x%04x\n", eth.type);
 
   /* ipv4 header */
   if (header->caplen < 14 + 20) {
@@ -190,74 +225,104 @@
     fprintf(stderr, "Packet too short for ipv4\n");
     return;
   }
-  fprintf(stderr, " IP version %d\n", (packet[14+0] >> 4) & 0x0f);
-  ip_header_size = (packet[14+0] & 0x0f) * 4;
-  fprintf(stderr, "  header length %d\n", ip_header_size);
+  ip.version = (packet[14+0] >> 4) & 0x0f;
+  ip.header_size = 4 * (packet[14+0] & 0x0f);
+  ip.protocol = packet[14 + 9];
+  memcpy(ip.src, packet + 14 + 12, 4);
+  memcpy(ip.dst, packet + 12 + 16, 4);
+
+  fprintf(stderr, " IP version %d\n", ip.version);
+  fprintf(stderr, "  header length %d\n", ip.header_size);
   fprintf(stderr, "   src addr %d.%d.%d.%d\n",
-          packet[14+12+0], packet[14+12+1], packet[14+12+2], packet[14+12+3]);
-  fprintf(stderr, "  dest addr %d.%d.%d.%d\n",
-          packet[14+16+0], packet[14+16+1], packet[14+16+2], packet[14+16+3]);
-  fprintf(stderr, "  protocol %d\n", packet[14+9]);
-  if (header->caplen < 14 + ip_header_size) {
+          ip.src[0], ip.src[1], ip.src[2], ip.src[3]);
+  fprintf(stderr, "   dst addr %d.%d.%d.%d\n",
+          ip.dst[0], ip.dst[1], ip.dst[2], ip.dst[3]);
+  fprintf(stderr, "  protocol %d\n", ip.protocol);
+  if (header->caplen < 14 + ip.header_size) {
     fprintf(stderr, "Packet too short for ipv4 with options\n");
     return;
   }
 
-  if (header->caplen < 14 + ip_header_size + 8) {
+  if (header->caplen < 14 + ip.header_size + 8) {
     fprintf(stderr, "Packet too short for udp\n");
     return;
   }
-  fprintf(stderr, "   src port %d\n", packet[14+ip_header_size] << 8 |
-                                      packet[14+ip_header_size + 1]);
-  fprintf(stderr, "  dest port %d\n", packet[14+ip_header_size + 2] << 8 |
-                                      packet[14+ip_header_size + 3]);
-  fprintf(stderr, " udp length %d\n", packet[14+ip_header_size + 4] << 8 |
-                                      packet[14+ip_header_size + 5]);
+  udp.src = packet[14+ip.header_size] << 8 |
+            packet[14+ip.header_size + 1];
+  udp.dst = packet[14+ip.header_size + 2] << 8 |
+            packet[14+ip.header_size + 3];
+  udp.size = packet[14+ip.header_size + 4] << 8 |
+             packet[14+ip.header_size + 5];
+  udp.checksum = packet[14+ip.header_size + 6] << 8 |
+                 packet[14+ip.header_size + 7];
 
-  if (header->caplen < 14 + ip_header_size + 8 + 12) {
+  fprintf(stderr, "   src port %d\n", udp.src);
+  fprintf(stderr, "   dst port %d\n", udp.dst);
+  fprintf(stderr, " udp length %d\n", udp.size);
+  fprintf(stderr, "   checksum %d\n", udp.checksum);
+
+  if (header->caplen < 14 + ip.header_size + 8 + 12) {
     fprintf(stderr, "Packet too short for rtp\n");
     return;
   }
-  fprintf(stderr, "  rtp version %d\n",
-                  (packet[14+ip_header_size + 8 + 0] >> 6) & 3);
-  fprintf(stderr, "      padding %d\n",
-                  (packet[14+ip_header_size + 8 + 0] >> 5) & 1);
-  fprintf(stderr, "    extension %d\n",
-                  (packet[14+ip_header_size + 8 + 0] >> 4) & 1);
-  rtp_header_size = 12 + 4*((packet[14+ip_header_size + 8 + 0]) & 7);
-  fprintf(stderr, "   CSRC count %d\n",
-                  (packet[14+ip_header_size + 8 + 0]) & 7);
-  fprintf(stderr, "       marker %d\n",
-                  (packet[14+ip_header_size + 8 + 1] >> 7) & 1);
-  fprintf(stderr, " payload type %d\n",
-                  (packet[14+ip_header_size + 8 + 1]) & 127);
-  int seq = packet[14+ip_header_size + 8 + 2] << 8 |
-            packet[14+ip_header_size + 8 + 3];
-  fprintf(stderr, "  sequence no %d\n", seq);
+  rtp.version = (packet[14+ip.header_size+8 + 0] >> 6) & 3;
+  rtp.pad = (packet[14+ip.header_size+8] >> 5) & 1;
+  rtp.ext = (packet[14+ip.header_size+8] >> 4) & 1;
+  rtp.cc = packet[14+ip.header_size+8] & 7;
+  rtp.header_size = 12 + 4 * rtp.cc;
+  rtp.payload_size = udp.size - rtp.header_size;
 
-  if (header->caplen < 14 + ip_header_size + 8 + rtp_header_size) {
+  rtp.mark = (packet[14+ip.header_size+8 + 1] >> 7) & 1;
+  rtp.type = (packet[14+ip.header_size+8 + 1]) & 127;
+  rtp.seq = packet[14+ip.header_size+8 + 2] << 8 |
+            packet[14+ip.header_size+8 + 3];
+  rtp.time = packet[14+ip.header_size+8 + 4] << 24 |
+             packet[14+ip.header_size+8 + 5] << 16 |
+             packet[14+ip.header_size+8 + 6] << 8 |
+             packet[14+ip.header_size+8 + 7];
+  rtp.ssrc = packet[14+ip.header_size+8 + 8] << 24 |
+             packet[14+ip.header_size+8 + 9] << 16 |
+             packet[14+ip.header_size+8 + 10] << 8 |
+             packet[14+ip.header_size+8 + 11];
+
+  fprintf(stderr, "  rtp version %d\n", rtp.version);
+  fprintf(stderr, " payload type %d\n", rtp.type);
+  fprintf(stderr, "         SSRC 0x%08x\n", rtp.ssrc);
+  fprintf(stderr, "  sequence no %d\n", rtp.seq);
+  fprintf(stderr, "    timestamp %d\n", rtp.time);
+  fprintf(stderr, "      padding %d\n", rtp.pad);
+  fprintf(stderr, "    extension %d\n", rtp.ext);
+  fprintf(stderr, "   CSRC count %d\n", rtp.cc);
+  fprintf(stderr, "       marker %d\n", rtp.mark);
+
+  if (header->caplen < 14 + ip.header_size + 8 + rtp.header_size) {
     fprintf(stderr, "skipping short packet\n");
     return;
   }
 
-  if (seq < params->seq) {
+  if (rtp.seq < params->seq) {
     fprintf(stderr, "skipping out-of-sequence packet\n");
     return;
   }
-  params->seq = seq;
+  params->seq = rtp.seq;
 
+  if (rtp.type != 109) {
+    fprintf(stderr, "skipping non-opus packet\n");
+    return;
+  }
+
   /* write the payload to our opus file */
-  int size = header->caplen - 14 - ip_header_size - 8 - rtp_header_size;
-  unsigned char *data = packet + 14 + ip_header_size + 8 + rtp_header_size;
+  int size = header->caplen - 14 - ip.header_size - 8 - rtp.header_size;
+  unsigned char *data = packet + 14+ip.header_size+8 + rtp.header_size;
   fprintf(stderr, " payload data %d bytes\n",
-                  header->len - 14 - ip_header_size - 8 - rtp_header_size); 
-  if ( (packet[14+ip_header_size + 8 + 1] & 127) != 109) {
+                  header->len - 14 - ip.header_size - 8 - rtp.header_size);
+  if ( (packet[14+ip.header_size + 8 + 1] & 127) != 109) {
     fprintf(stderr, "skipping non-opus packet\n");
     return;
   }
   ogg_packet *op = op_from_pkt(data, size);
-  op->granulepos = 960*seq;
-  ogg_stream_packetin(params->stream, op); 
+  op->granulepos = 960*rtp.seq;
+  ogg_stream_packetin(params->stream, op);
   free(op);
   ogg_write(params);
 }
@@ -270,7 +335,6 @@
   int port = 55555;
   char errbuf[PCAP_ERRBUF_SIZE];
   ogg_packet *op;
-  int i;
 
   /* set up */
   pcap = pcap_open_live(dev, 9600, 0, 1000, errbuf);
@@ -312,13 +376,6 @@
   /* start capture loop */
   fprintf(stderr, "Capturing packets\n");
   pcap_loop(pcap, 300, write_packet, (u_char *)params);
-
-  /* write packets */
-  int num_packets = 0;
-  unsigned char **packets;
-  int *sizes;
-  for (i = 0; i < num_packets; i++) {
-   }
 
   /* write outstanding data */
   ogg_flush(params);