blob: 2d72fca70e1249eb1c2aca9284f98515fc2f6846 [file] [log] [blame]
vlmfa67ddc2004-06-03 03:38:44 +00001/*-
2 * Copyright (c) 2003, 2004 Lev Walkin <vlm@lionet.info>. All rights reserved.
3 * Redistribution and modifications are permitted subject to BSD license.
4 */
vlm39ba4c42004-09-22 16:06:28 +00005#include <asn_internal.h>
vlmfa67ddc2004-06-03 03:38:44 +00006#include <constr_SET_OF.h>
7#include <asn_SET_OF.h>
8
9/*
10 * Number of bytes left for this structure.
11 * (ctx->left) indicates the number of bytes _transferred_ for the structure.
12 * (size) contains the number of bytes in the buffer passed.
13 */
vlmc5190612004-08-18 04:53:32 +000014#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
vlmfa67ddc2004-06-03 03:38:44 +000015
16/*
17 * If the subprocessor function returns with an indication that it wants
18 * more data, it may well be a fatal decoding problem, because the
19 * size is constrained by the <TLV>'s L, even if the buffer size allows
20 * reading more data.
21 * For example, consider the buffer containing the following TLVs:
22 * <T:5><L:1><V> <T:6>...
23 * The TLV length clearly indicates that one byte is expected in V, but
24 * if the V processor returns with "want more data" even if the buffer
25 * contains way more data than the V processor have seen.
26 */
vlmef1b4c02004-09-23 22:06:26 +000027#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
vlmfa67ddc2004-06-03 03:38:44 +000028
29/*
30 * This macro "eats" the part of the buffer which is definitely "consumed",
31 * i.e. was correctly converted into local representation or rightfully skipped.
32 */
vlmef1b4c02004-09-23 22:06:26 +000033#undef ADVANCE
vlmfa67ddc2004-06-03 03:38:44 +000034#define ADVANCE(num_bytes) do { \
35 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +000036 ptr = ((const char *)ptr) + num;\
vlmfa67ddc2004-06-03 03:38:44 +000037 size -= num; \
38 if(ctx->left >= 0) \
39 ctx->left -= num; \
40 consumed_myself += num; \
41 } while(0)
42
43/*
44 * Switch to the next phase of parsing.
45 */
vlmef1b4c02004-09-23 22:06:26 +000046#undef NEXT_PHASE
47#undef PHASE_OUT
vlmfa67ddc2004-06-03 03:38:44 +000048#define NEXT_PHASE(ctx) do { \
49 ctx->phase++; \
50 ctx->step = 0; \
51 } while(0)
52#define PHASE_OUT(ctx) do { ctx->phase = 10; } while(0)
53
54/*
55 * Return a standardized complex structure.
56 */
vlmef1b4c02004-09-23 22:06:26 +000057#undef RETURN
vlmfa67ddc2004-06-03 03:38:44 +000058#define RETURN(_code) do { \
59 rval.code = _code; \
60 rval.consumed = consumed_myself;\
61 return rval; \
62 } while(0)
63
64/*
65 * The decoder of the SET OF type.
66 */
vlm9de248e2004-10-20 15:50:55 +000067asn_dec_rval_t
vlmef6355b2004-09-29 13:26:15 +000068SET_OF_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
vlmb02dcc62005-03-10 18:52:02 +000069 void **struct_ptr, const void *ptr, size_t size, int tag_mode) {
vlmfa67ddc2004-06-03 03:38:44 +000070 /*
71 * Bring closer parts of structure description.
72 */
vlmef6355b2004-09-29 13:26:15 +000073 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
74 asn_TYPE_member_t *element = td->elements; /* Single one */
vlmfa67ddc2004-06-03 03:38:44 +000075
76 /*
77 * Parts of the structure being constructed.
78 */
79 void *st = *struct_ptr; /* Target structure. */
vlmef6355b2004-09-29 13:26:15 +000080 asn_struct_ctx_t *ctx; /* Decoder context */
vlmfa67ddc2004-06-03 03:38:44 +000081
82 ber_tlv_tag_t tlv_tag; /* T from TLV */
vlm9de248e2004-10-20 15:50:55 +000083 asn_dec_rval_t rval; /* Return code from subparsers */
vlmfa67ddc2004-06-03 03:38:44 +000084
85 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
86
vlme413c122004-08-20 13:23:42 +000087 ASN_DEBUG("Decoding %s as SET OF", td->name);
vlmfa67ddc2004-06-03 03:38:44 +000088
89 /*
90 * Create the target structure if it is not present already.
91 */
92 if(st == 0) {
93 st = *struct_ptr = CALLOC(1, specs->struct_size);
94 if(st == 0) {
95 RETURN(RC_FAIL);
96 }
97 }
98
99 /*
100 * Restore parsing context.
101 */
vlmef6355b2004-09-29 13:26:15 +0000102 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000103
104 /*
105 * Start to parse where left previously
106 */
107 switch(ctx->phase) {
108 case 0:
109 /*
110 * PHASE 0.
111 * Check that the set of tags associated with given structure
112 * perfectly fits our expectations.
113 */
114
vlmef6355b2004-09-29 13:26:15 +0000115 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
vlm6678cb12004-09-26 13:10:40 +0000116 tag_mode, 1, &ctx->left, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000117 if(rval.code != RC_OK) {
118 ASN_DEBUG("%s tagging check failed: %d",
vlme413c122004-08-20 13:23:42 +0000119 td->name, rval.code);
vlm2ebb08c2004-10-05 06:36:44 +0000120 return rval;
vlmfa67ddc2004-06-03 03:38:44 +0000121 }
122
123 if(ctx->left >= 0)
124 ctx->left += rval.consumed; /* ?Substracted below! */
125 ADVANCE(rval.consumed);
126
127 ASN_DEBUG("Structure consumes %ld bytes, "
128 "buffer %ld", (long)ctx->left, (long)size);
129
130 NEXT_PHASE(ctx);
131 /* Fall through */
132 case 1:
133 /*
134 * PHASE 1.
135 * From the place where we've left it previously,
136 * try to decode the next item.
137 */
138 for(;; ctx->step = 0) {
139 ssize_t tag_len; /* Length of TLV's T */
140
141 if(ctx->step & 1)
142 goto microphase2;
143
144 /*
145 * MICROPHASE 1: Synchronize decoding.
146 */
147
148 if(ctx->left == 0) {
vlme413c122004-08-20 13:23:42 +0000149 ASN_DEBUG("End of SET OF %s", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000150 /*
151 * No more things to decode.
152 * Exit out of here.
153 */
154 PHASE_OUT(ctx);
155 RETURN(RC_OK);
156 }
157
158 /*
159 * Fetch the T from TLV.
160 */
161 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
162 switch(tag_len) {
163 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
164 /* Fall through */
165 case -1: RETURN(RC_FAIL);
166 }
167
vlmb02dcc62005-03-10 18:52:02 +0000168 if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000169 if(LEFT < 2) {
170 if(SIZE_VIOLATION)
171 RETURN(RC_FAIL);
172 else
173 RETURN(RC_WMORE);
vlmb02dcc62005-03-10 18:52:02 +0000174 } else if(((const uint8_t *)ptr)[1] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000175 /*
176 * Found the terminator of the
177 * indefinite length structure.
178 */
179 break;
180 }
181 }
182
183 /* Outmost tag may be unknown and cannot be fetched/compared */
vlmb42843a2004-06-05 08:17:50 +0000184 if(element->tag != (ber_tlv_tag_t)-1) {
vlmfa67ddc2004-06-03 03:38:44 +0000185 if(BER_TAGS_EQUAL(tlv_tag, element->tag)) {
186 /*
187 * The new list member of expected type has arrived.
188 */
189 } else {
190 ASN_DEBUG("Unexpected tag %s fixed SET OF %s",
vlme413c122004-08-20 13:23:42 +0000191 ber_tlv_tag_string(tlv_tag), td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000192 ASN_DEBUG("%s SET OF has tag %s",
vlme413c122004-08-20 13:23:42 +0000193 td->name, ber_tlv_tag_string(element->tag));
vlmfa67ddc2004-06-03 03:38:44 +0000194 RETURN(RC_FAIL);
195 }
196 }
197
198 /*
199 * MICROPHASE 2: Invoke the member-specific decoder.
200 */
201 ctx->step |= 1; /* Confirm entering next microphase */
202 microphase2:
203
204 /*
205 * Invoke the member fetch routine according to member's type
206 */
vlmef6355b2004-09-29 13:26:15 +0000207 rval = element->type->ber_decoder(opt_codec_ctx,
208 element->type, &ctx->ptr, ptr, LEFT, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000209 ASN_DEBUG("In %s SET OF %s code %d consumed %d",
vlme413c122004-08-20 13:23:42 +0000210 td->name, element->type->name,
vlmfa67ddc2004-06-03 03:38:44 +0000211 rval.code, (int)rval.consumed);
212 switch(rval.code) {
213 case RC_OK:
214 {
vlm41dee122005-07-02 08:19:17 +0000215 asn_anonymous_set_ *list = _A_SET_FROM_VOID(st);
vlmfa67ddc2004-06-03 03:38:44 +0000216 if(ASN_SET_ADD(list, ctx->ptr) != 0)
217 RETURN(RC_FAIL);
218 else
219 ctx->ptr = 0;
220 }
221 break;
222 case RC_WMORE: /* More data expected */
223 if(!SIZE_VIOLATION) {
224 ADVANCE(rval.consumed);
225 RETURN(RC_WMORE);
226 }
227 /* Fall through */
228 case RC_FAIL: /* Fatal error */
229 RETURN(RC_FAIL);
230 } /* switch(rval) */
231
232 ADVANCE(rval.consumed);
233 } /* for(all list members) */
234
235 NEXT_PHASE(ctx);
236 case 2:
237 /*
238 * Read in all "end of content" TLVs.
239 */
240 while(ctx->left < 0) {
241 if(LEFT < 2) {
vlmb02dcc62005-03-10 18:52:02 +0000242 if(LEFT > 0 && ((const char *)ptr)[0] != 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000243 /* Unexpected tag */
244 RETURN(RC_FAIL);
245 } else {
246 RETURN(RC_WMORE);
247 }
248 }
vlmb02dcc62005-03-10 18:52:02 +0000249 if(((const char *)ptr)[0] == 0
250 && ((const char *)ptr)[1] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000251 ADVANCE(2);
252 ctx->left++;
253 } else {
254 RETURN(RC_FAIL);
255 }
256 }
257
258 PHASE_OUT(ctx);
259 }
260
261 RETURN(RC_OK);
262}
263
264/*
265 * Internally visible buffer holding a single encoded element.
266 */
267struct _el_buffer {
268 uint8_t *buf;
269 size_t length;
270 size_t size;
271};
272/* Append bytes to the above structure */
273static int _el_addbytes(const void *buffer, size_t size, void *el_buf_ptr) {
vlmda674682004-08-11 09:07:36 +0000274 struct _el_buffer *el_buf = (struct _el_buffer *)el_buf_ptr;
vlmfa67ddc2004-06-03 03:38:44 +0000275
276 if(el_buf->length + size > el_buf->size)
277 return -1;
278
279 memcpy(el_buf->buf + el_buf->length, buffer, size);
280
281 el_buf->length += size;
282 return 0;
283}
284static int _el_buf_cmp(const void *ap, const void *bp) {
vlmda674682004-08-11 09:07:36 +0000285 const struct _el_buffer *a = (const struct _el_buffer *)ap;
286 const struct _el_buffer *b = (const struct _el_buffer *)bp;
vlmfa67ddc2004-06-03 03:38:44 +0000287 int ret;
288 size_t common_len;
289
290 if(a->length < b->length)
291 common_len = a->length;
292 else
293 common_len = b->length;
294
295 ret = memcmp(a->buf, b->buf, common_len);
296 if(ret == 0) {
297 if(a->length < b->length)
298 ret = -1;
299 else if(a->length > b->length)
300 ret = 1;
301 }
302
303 return ret;
304}
305
306/*
307 * The DER encoder of the SET OF type.
308 */
vlm39ba4c42004-09-22 16:06:28 +0000309asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000310SET_OF_encode_der(asn_TYPE_descriptor_t *td, void *ptr,
vlmfa67ddc2004-06-03 03:38:44 +0000311 int tag_mode, ber_tlv_tag_t tag,
312 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000313 asn_TYPE_member_t *elm = td->elements;
314 asn_TYPE_descriptor_t *elm_type = elm->type;
vlmfa67ddc2004-06-03 03:38:44 +0000315 der_type_encoder_f *der_encoder = elm_type->der_encoder;
vlm41dee122005-07-02 08:19:17 +0000316 asn_anonymous_set_ *list = _A_SET_FROM_VOID(ptr);
vlmfa67ddc2004-06-03 03:38:44 +0000317 size_t computed_size = 0;
318 ssize_t encoding_size = 0;
319 struct _el_buffer *encoded_els;
320 size_t max_encoded_len = 1;
vlm39ba4c42004-09-22 16:06:28 +0000321 asn_enc_rval_t erval;
vlmfa67ddc2004-06-03 03:38:44 +0000322 int ret;
323 int edx;
324
vlme413c122004-08-20 13:23:42 +0000325 ASN_DEBUG("Estimating size for SET OF %s", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000326
327 /*
328 * Gather the length of the underlying members sequence.
329 */
330 for(edx = 0; edx < list->count; edx++) {
331 void *memb_ptr = list->array[edx];
332 erval = der_encoder(elm_type, memb_ptr, 0, elm->tag, 0, 0);
333 if(erval.encoded == -1)
334 return erval;
335 computed_size += erval.encoded;
336
337 /* Compute maximum encoding's size */
vlmb42843a2004-06-05 08:17:50 +0000338 if(max_encoded_len < (size_t)erval.encoded)
vlmfa67ddc2004-06-03 03:38:44 +0000339 max_encoded_len = erval.encoded;
340 }
341
342 /*
343 * Encode the TLV for the sequence itself.
344 */
vlm6678cb12004-09-26 13:10:40 +0000345 encoding_size = der_write_tags(td, computed_size, tag_mode, 1, tag,
vlmfa67ddc2004-06-03 03:38:44 +0000346 cb, app_key);
347 if(encoding_size == -1) {
348 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000349 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000350 erval.structure_ptr = ptr;
351 return erval;
352 }
353 computed_size += encoding_size;
354
355 if(!cb) {
356 erval.encoded = computed_size;
357 return erval;
358 }
359
360 /*
361 * DER mandates dynamic sorting of the SET OF elements
362 * according to their encodings. Build an array of the
363 * encoded elements.
364 */
vlm6678cb12004-09-26 13:10:40 +0000365 encoded_els = (struct _el_buffer *)MALLOC(
366 list->count * sizeof(encoded_els[0]));
vlmfa67ddc2004-06-03 03:38:44 +0000367 if(encoded_els == NULL) {
368 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000369 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000370 erval.structure_ptr = ptr;
371 return erval;
372 }
373
vlme413c122004-08-20 13:23:42 +0000374 ASN_DEBUG("Encoding members of %s SET OF", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000375
376 /*
377 * Encode all members.
378 */
379 for(edx = 0; edx < list->count; edx++) {
380 void *memb_ptr = list->array[edx];
381 struct _el_buffer *encoded_el = &encoded_els[edx];
382
383 /*
384 * Prepare space for encoding.
385 */
vlmda674682004-08-11 09:07:36 +0000386 encoded_el->buf = (uint8_t *)MALLOC(max_encoded_len);
vlmfa67ddc2004-06-03 03:38:44 +0000387 if(encoded_el->buf) {
388 encoded_el->length = 0;
389 encoded_el->size = max_encoded_len;
390 } else {
391 for(edx--; edx >= 0; edx--)
392 FREEMEM(encoded_els[edx].buf);
393 FREEMEM(encoded_els);
394 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000395 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000396 erval.structure_ptr = ptr;
397 return erval;
398 }
399
400 /*
401 * Encode the member into the prepared space.
402 */
403 erval = der_encoder(elm_type, memb_ptr, 0, elm->tag,
404 _el_addbytes, encoded_el);
405 if(erval.encoded == -1) {
406 for(; edx >= 0; edx--)
407 FREEMEM(encoded_els[edx].buf);
408 FREEMEM(encoded_els);
409 return erval;
410 }
411 encoding_size += erval.encoded;
412 }
413
414 /*
415 * Sort the encoded elements according to their encoding.
416 */
417 qsort(encoded_els, list->count, sizeof(encoded_els[0]), _el_buf_cmp);
418
419 /*
420 * Report encoded elements to the application.
421 * Dispose of temporary sorted members table.
422 */
423 ret = 0;
424 for(edx = 0; edx < list->count; edx++) {
425 struct _el_buffer *encoded_el = &encoded_els[edx];
426 /* Report encoded chunks to the application */
427 if(ret == 0
vlm6678cb12004-09-26 13:10:40 +0000428 && cb(encoded_el->buf, encoded_el->length, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000429 ret = -1;
430 FREEMEM(encoded_el->buf);
431 }
432 FREEMEM(encoded_els);
433
vlmb42843a2004-06-05 08:17:50 +0000434 if(ret || computed_size != (size_t)encoding_size) {
vlmfa67ddc2004-06-03 03:38:44 +0000435 /*
436 * Standard callback failed, or
437 * encoded size is not equal to the computed size.
438 */
439 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000440 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000441 erval.structure_ptr = ptr;
442 } else {
443 erval.encoded = computed_size;
444 }
445
446 return erval;
447}
448
vlm5f4f4a82005-02-14 20:15:40 +0000449#undef XER_ADVANCE
450#define XER_ADVANCE(num_bytes) do { \
451 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +0000452 buf_ptr = ((const char *)buf_ptr) + num;\
vlm5f4f4a82005-02-14 20:15:40 +0000453 size -= num; \
454 consumed_myself += num; \
455 } while(0)
456
457/*
458 * Decode the XER (XML) data.
459 */
460asn_dec_rval_t
461SET_OF_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
462 void **struct_ptr, const char *opt_mname,
vlmb02dcc62005-03-10 18:52:02 +0000463 const void *buf_ptr, size_t size) {
vlm5f4f4a82005-02-14 20:15:40 +0000464 /*
465 * Bring closer parts of structure description.
466 */
467 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
468 asn_TYPE_member_t *element = td->elements;
vlmaa930cb2005-02-24 22:37:07 +0000469 const char *elm_tag = ((*element->name)
470 ? element->name : element->type->xml_tag);
vlm5f4f4a82005-02-14 20:15:40 +0000471 const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
472
473 /*
474 * ... and parts of the structure being constructed.
475 */
476 void *st = *struct_ptr; /* Target structure. */
477 asn_struct_ctx_t *ctx; /* Decoder context */
478
479 asn_dec_rval_t rval; /* Return value from a decoder */
480 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
vlm5f4f4a82005-02-14 20:15:40 +0000481
482 /*
483 * Create the target structure if it is not present already.
484 */
485 if(st == 0) {
486 st = *struct_ptr = CALLOC(1, specs->struct_size);
487 if(st == 0) RETURN(RC_FAIL);
488 }
489
490 /*
491 * Restore parsing context.
492 */
493 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
494
495 /*
496 * Phases of XER/XML processing:
497 * Phase 0: Check that the opening tag matches our expectations.
498 * Phase 1: Processing body and reacting on closing tag.
499 * Phase 2: Processing inner type.
500 */
vlmcb7222f2005-02-18 16:10:40 +0000501 for(; ctx->phase <= 2;) {
vlm5f4f4a82005-02-14 20:15:40 +0000502 pxer_chunk_type_e ch_type; /* XER chunk type */
503 ssize_t ch_size; /* Chunk size */
504 xer_check_tag_e tcv; /* Tag check value */
505
506 /*
507 * Go inside the inner member of a set.
508 */
509 if(ctx->phase == 2) {
510 asn_dec_rval_t tmprval;
511
512 /* Invoke the inner type decoder, m.b. multiple times */
513 tmprval = element->type->xer_decoder(opt_codec_ctx,
514 element->type, &ctx->ptr, elm_tag,
515 buf_ptr, size);
516 if(tmprval.code == RC_OK) {
vlm41dee122005-07-02 08:19:17 +0000517 asn_anonymous_set_ *list = _A_SET_FROM_VOID(st);
vlm5f4f4a82005-02-14 20:15:40 +0000518 if(ASN_SET_ADD(list, ctx->ptr) != 0)
519 RETURN(RC_FAIL);
520 ctx->ptr = 0;
521 XER_ADVANCE(tmprval.consumed);
522 } else {
523 XER_ADVANCE(tmprval.consumed);
524 RETURN(tmprval.code);
525 }
526 ctx->phase = 1; /* Back to body processing */
vlm5f4f4a82005-02-14 20:15:40 +0000527 ASN_DEBUG("XER/SET OF phase => %d", ctx->phase);
528 /* Fall through */
529 }
530
531 /*
532 * Get the next part of the XML stream.
533 */
vlmc70f8f32005-02-18 18:06:36 +0000534 ch_size = xer_next_token(&ctx->context,
535 buf_ptr, size, &ch_type);
vlm5f4f4a82005-02-14 20:15:40 +0000536 switch(ch_size) {
537 case -1: RETURN(RC_FAIL);
vlmcb7222f2005-02-18 16:10:40 +0000538 case 0: RETURN(RC_WMORE);
vlm5f4f4a82005-02-14 20:15:40 +0000539 default:
540 switch(ch_type) {
541 case PXER_COMMENT: /* Got XML comment */
542 case PXER_TEXT: /* Ignore free-standing text */
543 XER_ADVANCE(ch_size); /* Skip silently */
544 continue;
545 case PXER_TAG:
546 break; /* Check the rest down there */
547 }
548 }
549
550 tcv = xer_check_tag(buf_ptr, ch_size, xml_tag);
551 ASN_DEBUG("XER/SET OF: tcv = %d, ph=%d", tcv, ctx->phase);
552 switch(tcv) {
553 case XCT_CLOSING:
554 if(ctx->phase == 0) break;
555 ctx->phase = 0;
556 /* Fall through */
557 case XCT_BOTH:
558 if(ctx->phase == 0) {
559 /* No more things to decode */
560 XER_ADVANCE(ch_size);
561 ctx->phase = 3; /* Phase out */
562 RETURN(RC_OK);
563 }
564 /* Fall through */
565 case XCT_OPENING:
566 if(ctx->phase == 0) {
567 XER_ADVANCE(ch_size);
568 ctx->phase = 1; /* Processing body phase */
569 continue;
570 }
571 /* Fall through */
vlm957da5b2005-02-18 14:23:48 +0000572 case XCT_UNKNOWN_OP:
573 case XCT_UNKNOWN_BO:
vlm5f4f4a82005-02-14 20:15:40 +0000574
575 ASN_DEBUG("XER/SET OF: tcv=%d, ph=%d", tcv, ctx->phase);
vlmaa930cb2005-02-24 22:37:07 +0000576 if(ctx->phase == 1) {
vlm5f4f4a82005-02-14 20:15:40 +0000577 /*
vlmaa930cb2005-02-24 22:37:07 +0000578 * Process a single possible member.
vlm5f4f4a82005-02-14 20:15:40 +0000579 */
580 ctx->phase = 2;
581 continue;
vlm5f4f4a82005-02-14 20:15:40 +0000582 }
583 /* Fall through */
584 default:
585 break;
586 }
587
588 ASN_DEBUG("Unexpected XML tag in SET OF");
589 break;
590 }
591
592 ctx->phase = 3; /* "Phase out" on hard failure */
593 RETURN(RC_FAIL);
594}
595
596
597
vlma3296662004-10-03 09:12:07 +0000598typedef struct xer_tmp_enc_s {
599 void *buffer;
600 size_t offset;
601 size_t size;
602} xer_tmp_enc_t;
603static int
604SET_OF_encode_xer_callback(const void *buffer, size_t size, void *key) {
605 xer_tmp_enc_t *t = (xer_tmp_enc_t *)key;
606 if(t->offset + size >= t->size) {
607 size_t newsize = (t->size << 2) + size;
608 void *p = REALLOC(t->buffer, newsize);
609 if(!p) return -1;
610 t->buffer = p;
611 t->size = newsize;
612 }
613 memcpy((char *)t->buffer + t->offset, buffer, size);
614 t->offset += size;
615 return 0;
616}
617static int
618SET_OF_xer_order(const void *aptr, const void *bptr) {
619 const xer_tmp_enc_t *a = (const xer_tmp_enc_t *)aptr;
620 const xer_tmp_enc_t *b = (const xer_tmp_enc_t *)bptr;
621 size_t minlen = a->offset;
622 int ret;
623 if(b->offset < minlen) minlen = b->offset;
624 /* Well-formed UTF-8 has this nice lexicographical property... */
625 ret = memcmp(a->buffer, b->buffer, minlen);
626 if(ret != 0) return ret;
627 if(a->offset == b->offset)
628 return 0;
629 if(a->offset == minlen)
630 return -1;
631 return 1;
632}
633
634
vlm39ba4c42004-09-22 16:06:28 +0000635asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000636SET_OF_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
vlm39ba4c42004-09-22 16:06:28 +0000637 int ilevel, enum xer_encoder_flags_e flags,
638 asn_app_consume_bytes_f *cb, void *app_key) {
639 asn_enc_rval_t er;
vlm80a48592005-02-25 12:10:27 +0000640 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
vlmef6355b2004-09-29 13:26:15 +0000641 asn_TYPE_member_t *element = td->elements;
vlm41dee122005-07-02 08:19:17 +0000642 asn_anonymous_set_ *list = _A_SET_FROM_VOID(sptr);
vlm39ba4c42004-09-22 16:06:28 +0000643 const char *mname = specs->as_XMLValueList
vlm9de248e2004-10-20 15:50:55 +0000644 ? 0 : ((*element->name)
645 ? element->name : element->type->xml_tag);
vlm39ba4c42004-09-22 16:06:28 +0000646 size_t mlen = mname ? strlen(mname) : 0;
647 int xcan = (flags & XER_F_CANONICAL);
vlma3296662004-10-03 09:12:07 +0000648 xer_tmp_enc_t *encs = 0;
649 size_t encs_count = 0;
650 void *original_app_key = app_key;
651 asn_app_consume_bytes_f *original_cb = cb;
vlm39ba4c42004-09-22 16:06:28 +0000652 int i;
653
654 if(!sptr) _ASN_ENCODE_FAILED;
655
vlma3296662004-10-03 09:12:07 +0000656 if(xcan) {
657 encs = (xer_tmp_enc_t *)MALLOC(list->count * sizeof(encs[0]));
658 if(!encs) _ASN_ENCODE_FAILED;
659 cb = SET_OF_encode_xer_callback;
660 }
661
vlm39ba4c42004-09-22 16:06:28 +0000662 er.encoded = 0;
663
vlm39ba4c42004-09-22 16:06:28 +0000664 for(i = 0; i < list->count; i++) {
665 asn_enc_rval_t tmper;
666
667 void *memb_ptr = list->array[i];
668 if(!memb_ptr) continue;
669
vlma3296662004-10-03 09:12:07 +0000670 if(encs) {
671 memset(&encs[encs_count], 0, sizeof(encs[0]));
672 app_key = &encs[encs_count];
673 encs_count++;
674 }
675
vlm39ba4c42004-09-22 16:06:28 +0000676 if(mname) {
677 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel);
678 _ASN_CALLBACK3("<", 1, mname, mlen, ">", 1);
679 }
680
vlm80a48592005-02-25 12:10:27 +0000681 if(!xcan && specs->as_XMLValueList)
682 _i_ASN_TEXT_INDENT(1, ilevel + 1);
vlm39ba4c42004-09-22 16:06:28 +0000683 tmper = element->type->xer_encoder(element->type, memb_ptr,
684 ilevel + 1, flags, cb, app_key);
vlma3296662004-10-03 09:12:07 +0000685 if(tmper.encoded == -1) {
686 td = tmper.failed_type;
687 sptr = tmper.structure_ptr;
688 goto cb_failed;
689 }
vlmaa930cb2005-02-24 22:37:07 +0000690 if(tmper.encoded == 0 && specs->as_XMLValueList) {
691 const char *name = (*element->name)
692 ? element->name : element->type->xml_tag;
693 size_t len = strlen(name);
vlmaa930cb2005-02-24 22:37:07 +0000694 _ASN_CALLBACK3("<", 1, name, len, "/>", 2);
695 }
vlm39ba4c42004-09-22 16:06:28 +0000696
697 if(mname) {
698 _ASN_CALLBACK3("</", 2, mname, mlen, ">", 1);
699 er.encoded += 5;
700 }
701
702 er.encoded += (2 * mlen) + tmper.encoded;
703 }
704
705 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel - 1);
706
vlma3296662004-10-03 09:12:07 +0000707 if(encs) {
708 xer_tmp_enc_t *enc = encs;
709 xer_tmp_enc_t *end = encs + encs_count;
710 ssize_t control_size = 0;
711
712 cb = original_cb;
713 app_key = original_app_key;
714 qsort(encs, encs_count, sizeof(encs[0]), SET_OF_xer_order);
715
716 for(; enc < end; enc++) {
717 _ASN_CALLBACK(enc->buffer, enc->offset);
718 FREEMEM(enc->buffer);
719 enc->buffer = 0;
720 control_size += enc->offset;
721 }
722 assert(control_size == er.encoded);
723 }
724
725 goto cleanup;
726cb_failed:
727 er.encoded = -1;
728 er.failed_type = td;
729 er.structure_ptr = sptr;
730cleanup:
731 if(encs) {
732 while(encs_count-- > 0) {
733 if(encs[encs_count].buffer)
734 FREEMEM(encs[encs_count].buffer);
735 }
736 free(encs);
737 }
vlm39ba4c42004-09-22 16:06:28 +0000738 return er;
739}
740
vlmfa67ddc2004-06-03 03:38:44 +0000741int
vlmef6355b2004-09-29 13:26:15 +0000742SET_OF_print(asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
vlmfa67ddc2004-06-03 03:38:44 +0000743 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000744 asn_TYPE_member_t *element = td->elements;
vlm41dee122005-07-02 08:19:17 +0000745 const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
vlmfa67ddc2004-06-03 03:38:44 +0000746 int ret;
747 int i;
748
vlm6678cb12004-09-26 13:10:40 +0000749 if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000750
751 /* Dump preamble */
vlm6678cb12004-09-26 13:10:40 +0000752 if(cb(td->name, strlen(td->name), app_key) < 0
753 || cb(" ::= {", 6, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000754 return -1;
755
756 for(i = 0; i < list->count; i++) {
757 const void *memb_ptr = list->array[i];
758 if(!memb_ptr) continue;
759
vlm6678cb12004-09-26 13:10:40 +0000760 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000761
762 ret = element->type->print_struct(element->type, memb_ptr,
vlm6678cb12004-09-26 13:10:40 +0000763 ilevel + 1, cb, app_key);
vlmfa67ddc2004-06-03 03:38:44 +0000764 if(ret) return ret;
765 }
766
vlm6678cb12004-09-26 13:10:40 +0000767 ilevel--;
768 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000769
vlm6678cb12004-09-26 13:10:40 +0000770 return (cb("}", 1, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000771}
772
773void
vlmef6355b2004-09-29 13:26:15 +0000774SET_OF_free(asn_TYPE_descriptor_t *td, void *ptr, int contents_only) {
vlmfa67ddc2004-06-03 03:38:44 +0000775 if(td && ptr) {
vlmef6355b2004-09-29 13:26:15 +0000776 asn_TYPE_member_t *element = td->elements;
vlm41dee122005-07-02 08:19:17 +0000777 asn_anonymous_set_ *list = _A_SET_FROM_VOID(ptr);
vlmfa67ddc2004-06-03 03:38:44 +0000778 int i;
779
780 /*
781 * Could not use set_of_empty() because of (*free)
782 * incompatibility.
783 */
784 for(i = 0; i < list->count; i++) {
785 void *memb_ptr = list->array[i];
786 if(memb_ptr)
787 element->type->free_struct(element->type, memb_ptr, 0);
788 }
vlm7ebd67c2004-07-15 10:51:26 +0000789 list->count = 0; /* No meaningful elements left */
790
791 asn_set_empty(list); /* Remove (list->array) */
vlmfa67ddc2004-06-03 03:38:44 +0000792
793 if(!contents_only) {
794 FREEMEM(ptr);
795 }
796 }
797}
798
799int
vlmef6355b2004-09-29 13:26:15 +0000800SET_OF_constraint(asn_TYPE_descriptor_t *td, const void *sptr,
vlmfa67ddc2004-06-03 03:38:44 +0000801 asn_app_consume_bytes_f *app_errlog, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000802 asn_TYPE_member_t *element = td->elements;
vlme413c122004-08-20 13:23:42 +0000803 asn_constr_check_f *constr;
vlm41dee122005-07-02 08:19:17 +0000804 const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
vlmfa67ddc2004-06-03 03:38:44 +0000805 int i;
806
807 if(!sptr) {
vlme3f0f282004-08-11 09:44:13 +0000808 _ASN_ERRLOG(app_errlog, app_key,
vlm758530a2004-08-22 13:47:59 +0000809 "%s: value not given (%s:%d)",
810 td->name, __FILE__, __LINE__);
vlmfa67ddc2004-06-03 03:38:44 +0000811 return -1;
812 }
813
vlme413c122004-08-20 13:23:42 +0000814 constr = element->memb_constraints;
815 if(!constr) constr = element->type->check_constraints;
816
817 /*
818 * Iterate over the members of an array.
819 * Validate each in turn, until one fails.
820 */
vlmfa67ddc2004-06-03 03:38:44 +0000821 for(i = 0; i < list->count; i++) {
822 const void *memb_ptr = list->array[i];
vlme413c122004-08-20 13:23:42 +0000823 int ret;
824
vlmfa67ddc2004-06-03 03:38:44 +0000825 if(!memb_ptr) continue;
vlme413c122004-08-20 13:23:42 +0000826
827 ret = constr(element->type, memb_ptr, app_errlog, app_key);
828 if(ret) return ret;
vlmfa67ddc2004-06-03 03:38:44 +0000829 }
830
vlme413c122004-08-20 13:23:42 +0000831 /*
832 * Cannot inherit it eralier:
833 * need to make sure we get the updated version.
834 */
835 if(!element->memb_constraints)
836 element->memb_constraints = element->type->check_constraints;
837
vlmfa67ddc2004-06-03 03:38:44 +0000838 return 0;
839}