<div dir="ltr">Yes, I parse the RTP header, decrypt the payload and then feed the decrypted data to opus. Besides, opus_decoder_get_nb_samples() on 1st packet returns reasonable number 960, but then opus_decode() fails.<br>
</div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Nov 29, 2013 at 11:39 PM, Jean-Marc Valin <span dir="ltr"><<a href="mailto:jmvalin@jmvalin.ca" target="_blank">jmvalin@jmvalin.ca</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="im">On 29/11/13 01:49 PM, Ilya Basin wrote:<br>
> For example, the RTP payload is decrypted successfully, but<br>
> opus_packet_get_nb_samples() or opus_decode() return<br>
> OPUS_INVALID_PACKET.<br>
<br>
</div>Are you sure you didn't forget to strip the RTP header before decoding it?<br>
<span class="HOEnZb"><font color="#888888"><br>
Jean-Marc<br>
<br>
</font></span></blockquote></div><br></div>