<testcase>

# Informational
# Bang on RTP by
#   1) giving an evil payload (with $)
#   2) Giving evil content (SDP starting with $)
#   3) packing rtp after headers, after content, and at the start
<info>
<keywords>
RTSP
RTP
</keywords>
</info>

# Server-side
<reply>
<data1>
RTSP/1.0 200 OK
Server: RTSPD/libcurl-test
Session: asdf
CSeq: 1

</data1>

<data2>
RTSP/1.0 200 OK
Server: RTSPD/libcurl-test
CSeq: 2
Session: asdf

</data2>

<data3>
RTSP/1.0 200 OK
Server: RTSPD/libcurl-test
Cseq: 3
Content-Length: 4
Content-Type: fake/evil

$99
</data3>

<data4>
RTSP/1.0 200 OK
Server: RTSPD/libcurl-test
Session: asdf
CSeq: 4

</data4>

<servercmd>
rtp: part 2 channel 1 size 10
rtp: part 2 channel 0 size 500
rtp: part 2 channel 0 size 196
rtp: part 2 channel 0 size 124
rtp: part 2 channel 0 size 824
rtp: part 3 channel 1 size 10
rtp: part 3 channel 0 size 50
rtp: part 4 channel 0 size 798
rtp: part 4 channel 0 size 42
rtp: part 4 channel 1 size 30
rtp: part 4 channel 0 size 2048
rtp: part 4 channel 0 size 85
rtp: part 4 channel 1 size 24
</servercmd>
</reply>

# Client-Side
<client>
<server>
rtsp
</server>
<tool>
lib571
</tool>

<name>
RTSP RTP Interleaving Test
</name>
<command>
rtsp://%HOSTIP:%RTSPPORT/571 log/protofile571.txt
</command>
</client>

<verify>
<stdout>
RTP: message size 10, channel 1
RTP: message size 500, channel 0
RTP: message size 196, channel 0
RTP: message size 124, channel 0
RTP: message size 824, channel 0
RTP: message size 10, channel 1
RTP: message size 50, channel 0
RTP: message size 798, channel 0
RTP: message size 42, channel 0
RTP: message size 30, channel 1
RTP: message size 2048, channel 0
RTP: message size 85, channel 0
RTP: message size 24, channel 1
</stdout>

<file name="log/protofile571.txt">
$99
</file>
</verify>

</testcase>