blob: 21497930418b2b3410aa8895b78376222dbdff43 [file] [log] [blame]
vlmfa67ddc2004-06-03 03:38:44 +00001/*
2 * Don't look into this file. First, because it's a mess, and second, because
3 * it's a brain of the compiler, and you don't wanna mess with brains do you? ;)
4 */
5#include "asn1c_internal.h"
6#include "asn1c_C.h"
vlm1d036692004-08-19 13:29:46 +00007#include "asn1c_constraint.h"
vlmb2839012004-08-20 13:37:01 +00008#include "asn1c_out.h"
9#include "asn1c_misc.h"
vlm337167e2005-11-26 11:25:14 +000010#include <asn1fix_crange.h> /* constraint groker from libasn1fix */
11#include <asn1fix_export.h> /* other exportables from libasn1fix */
vlmfa67ddc2004-06-03 03:38:44 +000012
vlm4e03ce22004-06-06 07:20:17 +000013typedef struct tag2el_s {
14 struct asn1p_type_tag_s el_tag;
15 int el_no;
vlmc8aeab42004-06-14 13:09:45 +000016 int toff_first;
17 int toff_last;
vlm4e03ce22004-06-06 07:20:17 +000018 asn1p_expr_t *from_expr;
19} tag2el_t;
20
vlm940bc6b2004-10-03 09:13:30 +000021typedef enum fte {
22 FTE_ALLTAGS,
23 FTE_CANONICAL_XER,
24} fte_e;
25static int _fill_tag2el_map(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags);
26static int _add_tag2el_member(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags);
vlm4e03ce22004-06-06 07:20:17 +000027
vlm2e774282005-08-14 15:03:31 +000028enum onc_flags {
29 ONC_noflags = 0x00,
30 ONC_avoid_keywords = 0x01,
31 ONC_force_compound_name = 0x02,
32};
33static int out_name_chain(arg_t *arg, enum onc_flags);
vlmfa67ddc2004-06-03 03:38:44 +000034static int asn1c_lang_C_type_SEQUENCE_def(arg_t *arg);
35static int asn1c_lang_C_type_SET_def(arg_t *arg);
36static int asn1c_lang_C_type_CHOICE_def(arg_t *arg);
37static int asn1c_lang_C_type_SEx_OF_def(arg_t *arg, int seq_of);
vlma8a86cc2004-09-10 06:07:18 +000038static int _print_tag(arg_t *arg, struct asn1p_type_tag_s *tag_p);
vlm337167e2005-11-26 11:25:14 +000039static int compute_extensions_start(asn1p_expr_t *expr);
vlm5a6fc652005-08-16 17:00:21 +000040static int expr_break_recursion(arg_t *arg, asn1p_expr_t *expr);
vlm39ba4c42004-09-22 16:06:28 +000041static int expr_as_xmlvaluelist(arg_t *arg, asn1p_expr_t *expr);
vlm4e554992004-08-25 02:03:12 +000042static int expr_elements_count(arg_t *arg, asn1p_expr_t *expr);
vlm337167e2005-11-26 11:25:14 +000043static int emit_single_member_PER_constraint(arg_t *arg, asn1cnst_range_t *range, char *type);
44static int emit_single_member_PER_constraints(arg_t *arg, asn1p_expr_t *expr);
45static int emit_members_PER_constraints(arg_t *arg);
vlm4e554992004-08-25 02:03:12 +000046static int emit_member_table(arg_t *arg, asn1p_expr_t *expr);
vlm940bc6b2004-10-03 09:13:30 +000047static int emit_tag2member_map(arg_t *arg, tag2el_t *tag2el, int tag2el_count, const char *opt_modifier);
vlm0b567bf2005-03-04 22:18:20 +000048static int emit_include_dependencies(arg_t *arg);
vlm6c4a8502005-08-18 13:38:19 +000049static asn1p_expr_t *terminal_structable(arg_t *arg, asn1p_expr_t *expr);
50static int expr_defined_recursively(arg_t *arg, asn1p_expr_t *expr);
51static int asn1c_recurse(arg_t *arg, asn1p_expr_t *expr, int (*callback)(arg_t *arg, void *key), void *key);
vlm337167e2005-11-26 11:25:14 +000052static asn1p_expr_type_e expr_get_type(arg_t *arg, asn1p_expr_t *expr);
53static int try_inline_default(arg_t *arg, asn1p_expr_t *expr, int out);
54static int *compute_canonical_members_order(arg_t *arg, int el_count);
vlmfa67ddc2004-06-03 03:38:44 +000055
vlm72425de2004-09-13 08:31:01 +000056enum tvm_compat {
57 _TVM_SAME = 0, /* tags and all_tags are same */
58 _TVM_SUBSET = 1, /* tags are subset of all_tags */
59 _TVM_DIFFERENT = 2, /* tags and all_tags are different */
60};
61static enum tvm_compat emit_tags_vectors(arg_t *arg, asn1p_expr_t *expr, int *tc, int *atc);
62
vlm4e554992004-08-25 02:03:12 +000063enum etd_spec {
64 ETD_NO_SPECIFICS,
65 ETD_HAS_SPECIFICS
66};
vlm86f5ed22004-09-26 13:11:31 +000067static int emit_type_DEF(arg_t *arg, asn1p_expr_t *expr, enum tvm_compat tv_mode, int tags_count, int all_tags_count, int elements_count, enum etd_spec);
vlm4e554992004-08-25 02:03:12 +000068
vlmb2839012004-08-20 13:37:01 +000069#define C99_MODE (!(arg->flags & A1C_NO_C99))
vlmfa67ddc2004-06-03 03:38:44 +000070#define UNNAMED_UNIONS (arg->flags & A1C_UNNAMED_UNIONS)
vlm12c8f692004-09-06 08:07:29 +000071#define HIDE_INNER_DEFS (arg->embed && !(arg->flags & A1C_ALL_DEFS_GLOBAL))
vlmfa67ddc2004-06-03 03:38:44 +000072
73#define PCTX_DEF INDENTED( \
74 OUT("\n"); \
75 OUT("/* Context for parsing across buffer boundaries */\n"); \
vlma5dcb912004-09-29 13:16:40 +000076 OUT("asn_struct_ctx_t _asn_ctx;\n"));
vlmfa67ddc2004-06-03 03:38:44 +000077
vlm0b567bf2005-03-04 22:18:20 +000078
vlm33a4ff12004-08-11 05:21:32 +000079#define DEPENDENCIES do { \
vlm0b567bf2005-03-04 22:18:20 +000080 emit_include_dependencies(arg); \
vlm33a4ff12004-08-11 05:21:32 +000081 if(expr->expr_type == ASN_CONSTR_SET_OF) \
82 GEN_INCLUDE("asn_SET_OF"); \
83 if(expr->expr_type == ASN_CONSTR_SEQUENCE_OF) \
84 GEN_INCLUDE("asn_SEQUENCE_OF"); \
85} while(0)
vlmfa67ddc2004-06-03 03:38:44 +000086
vlm1f7df782005-03-04 23:48:19 +000087/* MKID_safe() without checking for reserved keywords */
vlm0c6d3812006-03-21 03:40:38 +000088#define MKID(expr) (asn1c_make_identifier(0, expr, 0))
89#define MKID_safe(expr) (asn1c_make_identifier(AMI_CHECK_RESERVED, expr, 0))
vlmfa67ddc2004-06-03 03:38:44 +000090
91int
vlmf9d178d2004-09-14 12:47:45 +000092asn1c_lang_C_type_REAL(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +000093 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
94}
95
vlm80a48592005-02-25 12:10:27 +000096struct value2enum {
97 asn1c_integer_t value;
98 const char *name;
99 int idx;
100};
101static int compar_enumMap_byName(const void *ap, const void *bp) {
102 const struct value2enum *a = (const struct value2enum *)ap;
103 const struct value2enum *b = (const struct value2enum *)bp;
104 return strcmp(a->name, b->name);
105}
106static int compar_enumMap_byValue(const void *ap, const void *bp) {
107 const struct value2enum *a = (const struct value2enum *)ap;
108 const struct value2enum *b = (const struct value2enum *)bp;
109 if(a->value < b->value)
110 return -1;
111 else if(a->value == b->value)
112 return 0;
113 return 1;
114}
115
vlmfa67ddc2004-06-03 03:38:44 +0000116int
vlmf9d178d2004-09-14 12:47:45 +0000117asn1c_lang_C_type_common_INTEGER(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +0000118 asn1p_expr_t *expr = arg->expr;
119 asn1p_expr_t *v;
vlm80a48592005-02-25 12:10:27 +0000120 int el_count = expr_elements_count(arg, expr);
121 struct value2enum *v2e;
vlm337167e2005-11-26 11:25:14 +0000122 int map_extensions = (expr->expr_type == ASN_BASIC_INTEGER);
vlm4573af02005-08-13 23:30:24 +0000123 int eidx;
vlmfa67ddc2004-06-03 03:38:44 +0000124
vlm80a48592005-02-25 12:10:27 +0000125 v2e = alloca((el_count + 1) * sizeof(*v2e));
vlmfa67ddc2004-06-03 03:38:44 +0000126
vlm80a48592005-02-25 12:10:27 +0000127 /*
vlm4573af02005-08-13 23:30:24 +0000128 * For all ENUMERATED types and for those INTEGER types which
129 * have identifiers, print out an enumeration table.
vlm80a48592005-02-25 12:10:27 +0000130 */
vlm4573af02005-08-13 23:30:24 +0000131 if(expr->expr_type == ASN_BASIC_ENUMERATED || el_count) {
132 eidx = 0;
vlm80a48592005-02-25 12:10:27 +0000133 REDIR(OT_DEPS);
vlm766cf1e2005-03-04 08:48:53 +0000134 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000135 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000136 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000137 TQ_FOR(v, &(expr->members), next) {
138 switch(v->expr_type) {
139 case A1TC_UNIVERVAL:
vlm766cf1e2005-03-04 08:48:53 +0000140 OUT("\t");
vlm2e774282005-08-14 15:03:31 +0000141 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000142 OUT("_%s", MKID(v));
vlm766cf1e2005-03-04 08:48:53 +0000143 OUT("\t= %" PRIdASN "%s\n",
vlm80a48592005-02-25 12:10:27 +0000144 v->value->value.v_integer,
vlm766cf1e2005-03-04 08:48:53 +0000145 (eidx+1 < el_count) ? "," : "");
vlm80a48592005-02-25 12:10:27 +0000146 v2e[eidx].name = v->Identifier;
147 v2e[eidx].value = v->value->value.v_integer;
148 eidx++;
vlmfa67ddc2004-06-03 03:38:44 +0000149 break;
vlmf9d178d2004-09-14 12:47:45 +0000150 case A1TC_EXTENSIBLE:
151 OUT("\t/*\n");
152 OUT("\t * Enumeration is extensible\n");
153 OUT("\t */\n");
vlm337167e2005-11-26 11:25:14 +0000154 if(!map_extensions)
155 map_extensions = eidx + 1;
vlmf9d178d2004-09-14 12:47:45 +0000156 break;
vlmfa67ddc2004-06-03 03:38:44 +0000157 default:
158 return -1;
159 }
160 }
vlm7c8aa5e2006-03-21 07:25:18 +0000161 OUT("} e_");
vlm2e774282005-08-14 15:03:31 +0000162 out_name_chain(arg, ONC_noflags);
vlm7c8aa5e2006-03-21 07:25:18 +0000163 OUT(";\n");
vlm80a48592005-02-25 12:10:27 +0000164 assert(eidx == el_count);
vlm4573af02005-08-13 23:30:24 +0000165 }
166
167 /*
168 * For all ENUMERATED types print out a mapping table
169 * between identifiers and associated values.
170 * This is prohibited for INTEGER types by by X.693:8.3.4.
171 */
172 if(expr->expr_type == ASN_BASIC_ENUMERATED) {
vlm80a48592005-02-25 12:10:27 +0000173
174 /*
175 * Generate a enumerationName<->value map for XER codec.
176 */
177 REDIR(OT_STAT_DEFS);
178
vlm337167e2005-11-26 11:25:14 +0000179 OUT("static asn_INTEGER_enum_map_t asn_MAP_%s_value2enum_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000180 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000181 qsort(v2e, el_count, sizeof(v2e[0]), compar_enumMap_byValue);
182 for(eidx = 0; eidx < el_count; eidx++) {
183 v2e[eidx].idx = eidx;
184 OUT("\t{ %" PRIdASN ",\t%ld,\t\"%s\" }%s\n",
185 v2e[eidx].value,
186 (long)strlen(v2e[eidx].name), v2e[eidx].name,
187 (eidx + 1 < el_count) ? "," : "");
188 }
vlm337167e2005-11-26 11:25:14 +0000189 if(map_extensions)
vlm80a48592005-02-25 12:10:27 +0000190 OUT("\t/* This list is extensible */\n");
191 OUT("};\n");
192
vlm337167e2005-11-26 11:25:14 +0000193 OUT("static unsigned int asn_MAP_%s_enum2value_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000194 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000195 qsort(v2e, el_count, sizeof(v2e[0]), compar_enumMap_byName);
196 for(eidx = 0; eidx < el_count; eidx++) {
197 OUT("\t%d%s\t/* %s(%" PRIdASN ") */\n",
198 v2e[eidx].idx,
199 (eidx + 1 < el_count) ? "," : "",
200 v2e[eidx].name, v2e[eidx].value);
201 }
vlm337167e2005-11-26 11:25:14 +0000202 if(map_extensions)
vlm80a48592005-02-25 12:10:27 +0000203 OUT("\t/* This list is extensible */\n");
204 OUT("};\n");
205
vlm337167e2005-11-26 11:25:14 +0000206 OUT("static asn_INTEGER_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000207 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000208 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +0000209 OUT("asn_MAP_%s_value2enum_%d,\t"
vlm80a48592005-02-25 12:10:27 +0000210 "/* \"tag\" => N; sorted by tag */\n",
vlm0c6d3812006-03-21 03:40:38 +0000211 MKID(expr),
vlm766cf1e2005-03-04 08:48:53 +0000212 expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000213 OUT("asn_MAP_%s_enum2value_%d,\t"
vlm80a48592005-02-25 12:10:27 +0000214 "/* N => \"tag\"; sorted by N */\n",
vlm0c6d3812006-03-21 03:40:38 +0000215 MKID(expr),
vlm766cf1e2005-03-04 08:48:53 +0000216 expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000217 OUT("%d,\t/* Number of elements in the maps */\n",
218 el_count);
vlm337167e2005-11-26 11:25:14 +0000219 if(map_extensions) {
220 OUT("%d,\t/* Extensions before this member */\n",
221 map_extensions);
222 } else {
223 OUT("0,\t/* Enumeration is not extensible */\n");
224 }
vlm80a48592005-02-25 12:10:27 +0000225 if(expr->expr_type == ASN_BASIC_ENUMERATED)
226 OUT("1\t/* Strict enumeration */\n");
227 else
228 OUT("0\n");
229 INDENT(-1);
230 OUT("};\n");
vlmfa67ddc2004-06-03 03:38:44 +0000231 }
232
233 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
234}
235
236int
vlm96853d82005-08-13 23:51:47 +0000237asn1c_lang_C_type_BIT_STRING(arg_t *arg) {
238 asn1p_expr_t *expr = arg->expr;
239 asn1p_expr_t *v;
240 int el_count = expr_elements_count(arg, expr);
vlm96853d82005-08-13 23:51:47 +0000241
242 if(el_count) {
vlm75b3a532005-08-14 02:18:27 +0000243 int eidx = 0;
vlm96853d82005-08-13 23:51:47 +0000244 REDIR(OT_DEPS);
245 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000246 out_name_chain(arg, ONC_avoid_keywords);
vlm96853d82005-08-13 23:51:47 +0000247 OUT(" {\n");
248 TQ_FOR(v, &(expr->members), next) {
vlm75b3a532005-08-14 02:18:27 +0000249 eidx++;
250 if(v->expr_type != A1TC_UNIVERVAL) {
vlm96853d82005-08-13 23:51:47 +0000251 OUT("/* Unexpected BIT STRING element: %s */\n",
252 v->Identifier);
vlm75b3a532005-08-14 02:18:27 +0000253 continue;
vlm96853d82005-08-13 23:51:47 +0000254 }
vlm75b3a532005-08-14 02:18:27 +0000255 OUT("\t");
vlm2e774282005-08-14 15:03:31 +0000256 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000257 OUT("_%s", MKID(v));
vlm75b3a532005-08-14 02:18:27 +0000258 OUT("\t= %" PRIdASN "%s\n",
259 v->value->value.v_integer,
260 (eidx < el_count) ? "," : "");
vlm96853d82005-08-13 23:51:47 +0000261 }
vlm7c8aa5e2006-03-21 07:25:18 +0000262 OUT("} e_");
vlm2e774282005-08-14 15:03:31 +0000263 out_name_chain(arg, ONC_noflags);
vlm7c8aa5e2006-03-21 07:25:18 +0000264 OUT(";\n");
vlm96853d82005-08-13 23:51:47 +0000265 assert(eidx == el_count);
266 }
267
268 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
269}
270
271int
vlmfa67ddc2004-06-03 03:38:44 +0000272asn1c_lang_C_type_SEQUENCE(arg_t *arg) {
273 asn1p_expr_t *expr = arg->expr;
274 asn1p_expr_t *v;
275 int comp_mode = 0; /* {root,ext=1,root,root,...} */
276
277 DEPENDENCIES;
278
279 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000280 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000281 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000282 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000283 } else {
284 OUT("typedef struct %s {\n",
vlm0c6d3812006-03-21 03:40:38 +0000285 MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000286 }
287
288 TQ_FOR(v, &(expr->members), next) {
vlm5a6fc652005-08-16 17:00:21 +0000289 if(v->expr_type == A1TC_EXTENSIBLE)
vlmfa67ddc2004-06-03 03:38:44 +0000290 if(comp_mode < 3) comp_mode++;
vlm5a6fc652005-08-16 17:00:21 +0000291 if(comp_mode == 1)
vlm337167e2005-11-26 11:25:14 +0000292 v->marker.flags |= EM_OMITABLE | EM_INDIRECT;
293 try_inline_default(arg, v, 1);
vlmfa67ddc2004-06-03 03:38:44 +0000294 EMBED(v);
295 }
296
297 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000298 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm1f7df782005-03-04 23:48:19 +0000299 expr->_anonymous_type ? "" :
300 arg->embed
vlm0c6d3812006-03-21 03:40:38 +0000301 ? MKID_safe(expr)
302 : MKID(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000303 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000304
305 return asn1c_lang_C_type_SEQUENCE_def(arg);
306}
307
308static int
309asn1c_lang_C_type_SEQUENCE_def(arg_t *arg) {
310 asn1p_expr_t *expr = arg->expr;
311 asn1p_expr_t *v;
312 int elements; /* Number of elements */
vlmfa67ddc2004-06-03 03:38:44 +0000313 int ext_start = -1;
314 int ext_stop = -1;
vlm4e03ce22004-06-06 07:20:17 +0000315 tag2el_t *tag2el = NULL;
316 int tag2el_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000317 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000318 int all_tags_count;
319 enum tvm_compat tv_mode;
vlm337167e2005-11-26 11:25:14 +0000320 int roms_count; /* Root optional members */
321 int aoms_count; /* Additions optional members */
vlmfa67ddc2004-06-03 03:38:44 +0000322
vlm4e03ce22004-06-06 07:20:17 +0000323 /*
324 * Fetch every inner tag from the tag to elements map.
325 */
vlm940bc6b2004-10-03 09:13:30 +0000326 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlm4e03ce22004-06-06 07:20:17 +0000327 if(tag2el) free(tag2el);
328 return -1;
329 }
330
vlm33a4ff12004-08-11 05:21:32 +0000331 GEN_INCLUDE("constr_SEQUENCE");
332 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000333 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000334
vlm33a4ff12004-08-11 05:21:32 +0000335 REDIR(OT_STAT_DEFS);
vlmfa67ddc2004-06-03 03:38:44 +0000336
337 /*
vlm337167e2005-11-26 11:25:14 +0000338 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000339 */
vlm39ba4c42004-09-22 16:06:28 +0000340 if(expr_elements_count(arg, expr)) {
341 int comp_mode = 0; /* {root,ext=1,root,root,...} */
vlmfa67ddc2004-06-03 03:38:44 +0000342
vlm337167e2005-11-26 11:25:14 +0000343 if(emit_members_PER_constraints(arg))
344 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000345 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000346 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000347
348 elements = 0;
vlm337167e2005-11-26 11:25:14 +0000349 roms_count = 0;
350 aoms_count = 0;
vlm39ba4c42004-09-22 16:06:28 +0000351 INDENTED(TQ_FOR(v, &(expr->members), next) {
352 if(v->expr_type == A1TC_EXTENSIBLE) {
353 if((++comp_mode) == 1)
354 ext_start = elements - 1;
355 else
356 ext_stop = elements - 1;
357 continue;
358 }
vlm337167e2005-11-26 11:25:14 +0000359 if(v->marker.flags & EM_OMITABLE)
360 comp_mode == 1 ? ++aoms_count : ++roms_count;
vlm39ba4c42004-09-22 16:06:28 +0000361 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000362 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000363 });
364 OUT("};\n");
vlm337167e2005-11-26 11:25:14 +0000365
366 if((roms_count + aoms_count) && (arg->flags & A1C_GEN_PER)) {
367 int elm = 0;
368 int comma = 0;
369 comp_mode = 0;
370 OUT("static int asn_MAP_%s_oms_%d[] = {",
vlm0c6d3812006-03-21 03:40:38 +0000371 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000372 expr->_type_unique_index);
373 TQ_FOR(v, &(expr->members), next) {
374 if(v->expr_type == A1TC_EXTENSIBLE) {
375 ++comp_mode;
376 continue;
377 }
378 if((v->marker.flags & EM_OMITABLE)
379 && comp_mode != 1) {
380 if(!comma) comma++;
381 else OUT(",");
382 OUT(" %d", elm);
383 }
384 ++elm;
385 }
386 elm = 0;
387 comp_mode = 0;
388 TQ_FOR(v, &(expr->members), next) {
389 if(v->expr_type == A1TC_EXTENSIBLE) {
390 ++comp_mode;
391 continue;
392 }
393 if((v->marker.flags & EM_OMITABLE)
394 && comp_mode == 1) {
395 if(!comma) comma++;
396 else OUT(",");
397 OUT(" %d", elm);
398 }
399 ++elm;
400 }
401 OUT(" };\n");
402 if(roms_count > 65536)
403 FATAL("Too many optional elements in %s "
404 "at line %d!",
405 arg->expr->Identifier,
406 arg->expr->_lineno);
407 } else {
408 roms_count = 0;
409 aoms_count = 0;
410 }
vlm39ba4c42004-09-22 16:06:28 +0000411 } else {
412 elements = 0;
vlm337167e2005-11-26 11:25:14 +0000413 roms_count = 0;
414 aoms_count = 0;
vlm39ba4c42004-09-22 16:06:28 +0000415 }
vlmfa67ddc2004-06-03 03:38:44 +0000416
vlm4a3f5822004-06-28 21:13:46 +0000417 /*
vlma5dcb912004-09-29 13:16:40 +0000418 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000419 */
vlm72425de2004-09-13 08:31:01 +0000420 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000421
vlm4e03ce22004-06-06 07:20:17 +0000422 /*
423 * Tags to elements map.
424 */
vlm940bc6b2004-10-03 09:13:30 +0000425 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
vlm4e03ce22004-06-06 07:20:17 +0000426
vlm337167e2005-11-26 11:25:14 +0000427 OUT("static asn_SEQUENCE_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000428 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000429 INDENT(+1);
430 OUT("sizeof(struct ");
431 out_name_chain(arg, ONC_avoid_keywords); OUT("),\n");
432 OUT("offsetof(struct ");
433 out_name_chain(arg, ONC_avoid_keywords); OUT(", _asn_ctx),\n");
vlm766cf1e2005-03-04 08:48:53 +0000434
vlm337167e2005-11-26 11:25:14 +0000435 if(tag2el_count) {
436 OUT("asn_MAP_%s_tag2el_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +0000437 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000438 expr->_type_unique_index);
439 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
440 } else {
441 OUT("0,\t/* No top level tags */\n");
442 OUT("0,\t/* No tags in the map */\n");
443 }
444 if(roms_count + aoms_count) {
445 OUT("asn_MAP_%s_oms_%d,\t/* Optional members */\n",
vlm0c6d3812006-03-21 03:40:38 +0000446 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000447 OUT("%d, %d,\t/* Root/Additions */\n", roms_count, aoms_count);
448 } else {
449 OUT("0, 0, 0,\t/* Optional elements (not needed) */\n");
450 }
451 OUT("%d,\t/* Start extensions */\n",
vlmfa67ddc2004-06-03 03:38:44 +0000452 ext_start);
vlm337167e2005-11-26 11:25:14 +0000453 OUT("%d\t/* Stop extensions */\n",
vlmfa67ddc2004-06-03 03:38:44 +0000454 (ext_stop<ext_start)?elements+1:ext_stop, ext_stop);
vlm337167e2005-11-26 11:25:14 +0000455 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000456 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000457
458 /*
vlma5dcb912004-09-29 13:16:40 +0000459 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000460 */
vlm72425de2004-09-13 08:31:01 +0000461 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +0000462 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000463
vlmfa67ddc2004-06-03 03:38:44 +0000464 REDIR(OT_TYPE_DECLS);
465
466 return 0;
vlmedf203f2005-01-17 11:57:48 +0000467} /* _SEQUENCE_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000468
469int
vlmfa67ddc2004-06-03 03:38:44 +0000470asn1c_lang_C_type_SET(arg_t *arg) {
471 asn1p_expr_t *expr = arg->expr;
472 asn1p_expr_t *v;
473 long mcount;
474 char *id;
475 int comp_mode = 0; /* {root,ext=1,root,root,...} */
476
477 DEPENDENCIES;
478
479 REDIR(OT_DEPS);
480
481 OUT("\n");
482 OUT("/*\n");
483 OUT(" * Method of determining the components presence\n");
484 OUT(" */\n");
485 mcount = 0;
vlm766cf1e2005-03-04 08:48:53 +0000486 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000487 out_name_chain(arg, ONC_noflags);
vlm766cf1e2005-03-04 08:48:53 +0000488 OUT("_PR {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000489 TQ_FOR(v, &(expr->members), next) {
490 if(v->expr_type == A1TC_EXTENSIBLE) continue;
491 INDENTED(
vlm2e774282005-08-14 15:03:31 +0000492 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000493 OUT("_PR_");
vlm0c6d3812006-03-21 03:40:38 +0000494 id = MKID(v);
vlmfa67ddc2004-06-03 03:38:44 +0000495 OUT("%s,\t/* Member %s is present */\n",
496 id, id)
497 );
498 mcount++;
499 }
vlm2e774282005-08-14 15:03:31 +0000500 OUT("} "); out_name_chain(arg, ONC_noflags); OUT("_PR;\n");
vlmfa67ddc2004-06-03 03:38:44 +0000501
502 REDIR(OT_TYPE_DECLS);
503
504 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000505 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000506 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000507 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000508 } else {
vlm337167e2005-11-26 11:25:14 +0000509 OUT("typedef struct %s {\n",
vlm0c6d3812006-03-21 03:40:38 +0000510 MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000511 }
512
513 TQ_FOR(v, &(expr->members), next) {
vlm337167e2005-11-26 11:25:14 +0000514 if(v->expr_type == A1TC_EXTENSIBLE)
vlmfa67ddc2004-06-03 03:38:44 +0000515 if(comp_mode < 3) comp_mode++;
vlm5a6fc652005-08-16 17:00:21 +0000516 if(comp_mode == 1)
vlm337167e2005-11-26 11:25:14 +0000517 v->marker.flags |= EM_OMITABLE | EM_INDIRECT;
518 try_inline_default(arg, v, 1);
vlmfa67ddc2004-06-03 03:38:44 +0000519 EMBED(v);
520 }
521
522 INDENTED(
vlm0c6d3812006-03-21 03:40:38 +0000523 id = MKID(expr);
vlmfa67ddc2004-06-03 03:38:44 +0000524 OUT("\n");
525 OUT("/* Presence bitmask: ASN_SET_ISPRESENT(p%s, %s_PR_x) */\n",
526 id, id);
527 OUT("unsigned int _presence_map\n");
528 OUT("\t[((%ld+(8*sizeof(unsigned int))-1)/(8*sizeof(unsigned int)))];\n", mcount);
529 );
530
531 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000532 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm0c6d3812006-03-21 03:40:38 +0000533 expr->_anonymous_type ? "" : MKID_safe(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000534 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000535
536 return asn1c_lang_C_type_SET_def(arg);
537}
538
vlmfa67ddc2004-06-03 03:38:44 +0000539static int
540asn1c_lang_C_type_SET_def(arg_t *arg) {
541 asn1p_expr_t *expr = arg->expr;
542 asn1p_expr_t *v;
543 int elements;
vlmfa67ddc2004-06-03 03:38:44 +0000544 tag2el_t *tag2el = NULL;
545 int tag2el_count = 0;
vlm940bc6b2004-10-03 09:13:30 +0000546 tag2el_t *tag2el_cxer = NULL;
547 int tag2el_cxer_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000548 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000549 int all_tags_count;
550 enum tvm_compat tv_mode;
vlmfa67ddc2004-06-03 03:38:44 +0000551 char *p;
552
553 /*
554 * Fetch every inner tag from the tag to elements map.
555 */
vlm940bc6b2004-10-03 09:13:30 +0000556 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlmfa67ddc2004-06-03 03:38:44 +0000557 if(tag2el) free(tag2el);
558 return -1;
vlmfa67ddc2004-06-03 03:38:44 +0000559 }
vlm940bc6b2004-10-03 09:13:30 +0000560 if(_fill_tag2el_map(arg, &tag2el_cxer, &tag2el_cxer_count, -1, FTE_CANONICAL_XER)) {
561 if(tag2el) free(tag2el);
562 if(tag2el_cxer) free(tag2el_cxer);
563 return -1;
564 }
565 if(tag2el_cxer_count == tag2el_count
566 && memcmp(tag2el, tag2el_cxer, tag2el_count) == 0) {
567 free(tag2el_cxer);
568 tag2el_cxer = 0;
569 }
vlmfa67ddc2004-06-03 03:38:44 +0000570
vlm33a4ff12004-08-11 05:21:32 +0000571 GEN_INCLUDE("constr_SET");
572 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000573 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000574
575 REDIR(OT_STAT_DEFS);
576
vlmfa67ddc2004-06-03 03:38:44 +0000577 /*
vlm337167e2005-11-26 11:25:14 +0000578 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000579 */
vlm39ba4c42004-09-22 16:06:28 +0000580 if(expr_elements_count(arg, expr)) {
581 int comp_mode = 0; /* {root,ext=1,root,root,...} */
vlmfa67ddc2004-06-03 03:38:44 +0000582
vlm337167e2005-11-26 11:25:14 +0000583 if(emit_members_PER_constraints(arg))
584 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000585 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000586 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000587
588 elements = 0;
589 INDENTED(TQ_FOR(v, &(expr->members), next) {
590 if(v->expr_type == A1TC_EXTENSIBLE) {
591 if(comp_mode < 3) comp_mode++;
592 } else {
vlm39ba4c42004-09-22 16:06:28 +0000593 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000594 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000595 }
596 });
597 OUT("};\n");
598 } else {
599 elements = 0;
600 }
vlmfa67ddc2004-06-03 03:38:44 +0000601
vlm4a3f5822004-06-28 21:13:46 +0000602 /*
vlma5dcb912004-09-29 13:16:40 +0000603 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000604 */
vlm72425de2004-09-13 08:31:01 +0000605 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000606
607 /*
608 * Tags to elements map.
609 */
vlm940bc6b2004-10-03 09:13:30 +0000610 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
611 if(tag2el_cxer)
612 emit_tag2member_map(arg, tag2el_cxer, tag2el_cxer_count, "_cxer");
vlmfa67ddc2004-06-03 03:38:44 +0000613
614 /*
615 * Emit a map of mandatory elements.
616 */
vlm337167e2005-11-26 11:25:14 +0000617 OUT("static uint8_t asn_MAP_%s_mmap_%d",
vlm0c6d3812006-03-21 03:40:38 +0000618 MKID(expr), expr->_type_unique_index);
619 p = MKID_safe(expr);
vlmfa67ddc2004-06-03 03:38:44 +0000620 OUT("[(%d + (8 * sizeof(unsigned int)) - 1) / 8]", elements);
vlm766cf1e2005-03-04 08:48:53 +0000621 OUT(" = {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000622 INDENTED(
623 if(elements) {
vlmfa67ddc2004-06-03 03:38:44 +0000624 int el = 0;
625 TQ_FOR(v, &(expr->members), next) {
626 if(v->expr_type == A1TC_EXTENSIBLE) continue;
vlme2873192005-10-05 08:59:03 +0000627 if(el) {
628 if((el % 8) == 0)
629 OUT(",\n");
630 else
631 OUT(" | ");
vlmfa67ddc2004-06-03 03:38:44 +0000632 }
vlmddd5a7d2004-09-10 09:18:20 +0000633 OUT("(%d << %d)",
vlm6c4a8502005-08-18 13:38:19 +0000634 (v->marker.flags & EM_OMITABLE) != EM_OMITABLE,
vlmddd5a7d2004-09-10 09:18:20 +0000635 7 - (el % 8));
vlmfa67ddc2004-06-03 03:38:44 +0000636 el++;
637 }
638 } else {
639 OUT("0");
640 }
641 );
642 OUT("\n");
643 OUT("};\n");
644
vlm337167e2005-11-26 11:25:14 +0000645 OUT("static asn_SET_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000646 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000647 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000648 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000649 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000650 OUT("),\n");
651 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000652 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000653 OUT(", _asn_ctx),\n");
654 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000655 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000656 OUT(", _presence_map),\n");
vlm0c6d3812006-03-21 03:40:38 +0000657 p = MKID(expr);
vlm337167e2005-11-26 11:25:14 +0000658 OUT("asn_MAP_%s_tag2el_%d,\n", p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000659 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
vlm940bc6b2004-10-03 09:13:30 +0000660 if(tag2el_cxer)
vlm337167e2005-11-26 11:25:14 +0000661 OUT("asn_MAP_%s_tag2el_cxer_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +0000662 p, expr->_type_unique_index);
vlm940bc6b2004-10-03 09:13:30 +0000663 else
vlm337167e2005-11-26 11:25:14 +0000664 OUT("asn_MAP_%s_tag2el_%d,\t/* Same as above */\n",
vlm766cf1e2005-03-04 08:48:53 +0000665 p, expr->_type_unique_index);
666 OUT("%d,\t/* Count of tags in the CXER map */\n",
667 tag2el_cxer_count);
vlm79b08d52004-07-01 00:52:50 +0000668 OUT("%d,\t/* Whether extensible */\n",
vlm337167e2005-11-26 11:25:14 +0000669 compute_extensions_start(expr) == -1 ? 0 : 1);
670 OUT("(unsigned int *)asn_MAP_%s_mmap_%d\t/* Mandatory elements map */\n",
vlm766cf1e2005-03-04 08:48:53 +0000671 p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000672 );
673 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000674
675 /*
vlma5dcb912004-09-29 13:16:40 +0000676 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000677 */
vlm72425de2004-09-13 08:31:01 +0000678 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +0000679 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000680
vlmfa67ddc2004-06-03 03:38:44 +0000681 REDIR(OT_TYPE_DECLS);
682
683 return 0;
vlmedf203f2005-01-17 11:57:48 +0000684} /* _SET_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000685
686int
vlmdae7f9d2004-08-22 03:25:24 +0000687asn1c_lang_C_type_SEx_OF(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +0000688 asn1p_expr_t *expr = arg->expr;
vlm0b567bf2005-03-04 22:18:20 +0000689 asn1p_expr_t *memb = TQ_FIRST(&expr->members);
vlmfa67ddc2004-06-03 03:38:44 +0000690
691 DEPENDENCIES;
692
693 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000694 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000695 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000696 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000697 } else {
vlm0c6d3812006-03-21 03:40:38 +0000698 OUT("typedef struct %s {\n", MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000699 }
700
vlmdae7f9d2004-08-22 03:25:24 +0000701 INDENT(+1);
702 OUT("A_%s_OF(",
703 (arg->expr->expr_type == ASN_CONSTR_SET_OF)
704 ? "SET" : "SEQUENCE");
vlm5a6fc652005-08-16 17:00:21 +0000705
706 /*
707 * README README
708 * The implementation of the A_SET_OF() macro is already indirect.
709 */
710 memb->marker.flags |= EM_INDIRECT;
711
vlm80a48592005-02-25 12:10:27 +0000712 if(memb->expr_type & ASN_CONSTR_MASK
713 || ((memb->expr_type == ASN_BASIC_ENUMERATED
vlmc89422d2005-03-03 21:28:12 +0000714 || (0 /* -- prohibited by X.693:8.3.4 */
715 && memb->expr_type == ASN_BASIC_INTEGER))
716 && expr_elements_count(arg, memb))) {
vlmdae7f9d2004-08-22 03:25:24 +0000717 arg_t tmp;
718 asn1p_expr_t tmp_memb;
719 arg->embed++;
720 tmp = *arg;
721 tmp.expr = &tmp_memb;
722 tmp_memb = *memb;
vlm5a6fc652005-08-16 17:00:21 +0000723 tmp_memb.marker.flags &= ~EM_INDIRECT;
vlmdae7f9d2004-08-22 03:25:24 +0000724 tmp_memb._anonymous_type = 1;
vlm39ba4c42004-09-22 16:06:28 +0000725 if(tmp_memb.Identifier == 0) {
vlm766cf1e2005-03-04 08:48:53 +0000726 tmp_memb.Identifier = "Member";
727 if(0)
vlm39ba4c42004-09-22 16:06:28 +0000728 tmp_memb.Identifier = strdup(
729 asn1c_make_identifier(0,
vlm0c6d3812006-03-21 03:40:38 +0000730 expr, "Member", 0));
vlm39ba4c42004-09-22 16:06:28 +0000731 assert(tmp_memb.Identifier);
732 }
vlmdae7f9d2004-08-22 03:25:24 +0000733 tmp.default_cb(&tmp);
vlm39ba4c42004-09-22 16:06:28 +0000734 if(tmp_memb.Identifier != memb->Identifier)
vlm766cf1e2005-03-04 08:48:53 +0000735 if(0) free(tmp_memb.Identifier);
vlmdae7f9d2004-08-22 03:25:24 +0000736 arg->embed--;
737 assert(arg->target->target == OT_TYPE_DECLS);
738 } else {
vlm6c5d5e52005-03-04 22:38:22 +0000739 OUT("%s", asn1c_type_name(arg, memb,
740 (memb->marker.flags & EM_UNRECURSE)
741 ? TNF_RSAFE : TNF_CTYPE));
vlmfa67ddc2004-06-03 03:38:44 +0000742 }
vlm5a6fc652005-08-16 17:00:21 +0000743 /* README README (above) */
744 if(0 && (memb->marker.flags & EM_INDIRECT))
745 OUT(" *");
vlmdae7f9d2004-08-22 03:25:24 +0000746 OUT(") list;\n");
747 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000748
749 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000750 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm0c6d3812006-03-21 03:40:38 +0000751 expr->_anonymous_type ? "" : MKID_safe(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000752 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000753
754 /*
vlmdae7f9d2004-08-22 03:25:24 +0000755 * SET OF/SEQUENCE OF definition
vlmfa67ddc2004-06-03 03:38:44 +0000756 */
vlmdae7f9d2004-08-22 03:25:24 +0000757 return asn1c_lang_C_type_SEx_OF_def(arg,
758 (arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF));
vlmfa67ddc2004-06-03 03:38:44 +0000759}
760
761static int
762asn1c_lang_C_type_SEx_OF_def(arg_t *arg, int seq_of) {
763 asn1p_expr_t *expr = arg->expr;
764 asn1p_expr_t *v;
vlm6e73a042004-08-11 07:17:22 +0000765 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000766 int all_tags_count;
767 enum tvm_compat tv_mode;
vlmfa67ddc2004-06-03 03:38:44 +0000768
vlm33a4ff12004-08-11 05:21:32 +0000769 /*
vlm337167e2005-11-26 11:25:14 +0000770 * Print out the table according to which parsing is performed.
vlm33a4ff12004-08-11 05:21:32 +0000771 */
vlmfa67ddc2004-06-03 03:38:44 +0000772 if(seq_of) {
vlm33a4ff12004-08-11 05:21:32 +0000773 GEN_INCLUDE("constr_SEQUENCE_OF");
vlmfa67ddc2004-06-03 03:38:44 +0000774 } else {
vlm33a4ff12004-08-11 05:21:32 +0000775 GEN_INCLUDE("constr_SET_OF");
vlmfa67ddc2004-06-03 03:38:44 +0000776 }
vlm33a4ff12004-08-11 05:21:32 +0000777 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000778 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000779
780 REDIR(OT_STAT_DEFS);
781
782 /*
vlm337167e2005-11-26 11:25:14 +0000783 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000784 */
vlm337167e2005-11-26 11:25:14 +0000785 if(emit_members_PER_constraints(arg))
786 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000787 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000788 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000789 INDENT(+1);
vlmfa67ddc2004-06-03 03:38:44 +0000790 v = TQ_FIRST(&(expr->members));
vlm39ba4c42004-09-22 16:06:28 +0000791 if(!v->Identifier) {
vlmbf3c5112005-02-14 20:41:29 +0000792 v->Identifier = strdup("Member");
vlm39ba4c42004-09-22 16:06:28 +0000793 assert(v->Identifier);
794 }
795 v->_anonymous_type = 1;
796 arg->embed++;
vlm4e554992004-08-25 02:03:12 +0000797 emit_member_table(arg, v);
vlm39ba4c42004-09-22 16:06:28 +0000798 arg->embed--;
799 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000800 OUT("};\n");
801
vlm4a3f5822004-06-28 21:13:46 +0000802 /*
vlma5dcb912004-09-29 13:16:40 +0000803 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000804 */
vlm72425de2004-09-13 08:31:01 +0000805 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000806
vlm337167e2005-11-26 11:25:14 +0000807 OUT("static asn_SET_OF_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000808 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000809 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000810 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000811 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000812 OUT("),\n");
813 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000814 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000815 OUT(", _asn_ctx),\n");
vlm6d44a542005-11-08 03:06:16 +0000816 {
817 int as_xvl = expr_as_xmlvaluelist(arg, v);
818 OUT("%d,\t/* XER encoding is %s */\n",
819 as_xvl,
820 as_xvl ? "XMLValueList" : "XMLDelimitedItemList");
821 }
vlmfa67ddc2004-06-03 03:38:44 +0000822 );
823 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000824
825 /*
vlma5dcb912004-09-29 13:16:40 +0000826 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000827 */
vlm72425de2004-09-13 08:31:01 +0000828 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, 1,
vlm86f5ed22004-09-26 13:11:31 +0000829 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000830
vlmfa67ddc2004-06-03 03:38:44 +0000831 REDIR(OT_TYPE_DECLS);
832
833 return 0;
vlmedf203f2005-01-17 11:57:48 +0000834} /* _SEx_OF_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000835
836int
837asn1c_lang_C_type_CHOICE(arg_t *arg) {
838 asn1p_expr_t *expr = arg->expr;
839 asn1p_expr_t *v;
vlmdae7f9d2004-08-22 03:25:24 +0000840 char *id;
vlmfa67ddc2004-06-03 03:38:44 +0000841
842 DEPENDENCIES;
843
vlm33a4ff12004-08-11 05:21:32 +0000844 REDIR(OT_DEPS);
845
vlm766cf1e2005-03-04 08:48:53 +0000846 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000847 out_name_chain(arg, ONC_noflags);
vlm766cf1e2005-03-04 08:48:53 +0000848 OUT("_PR {\n");
vlm33a4ff12004-08-11 05:21:32 +0000849 INDENTED(
vlm2e774282005-08-14 15:03:31 +0000850 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000851 OUT("_PR_NOTHING,\t/* No components present */\n");
vlm33a4ff12004-08-11 05:21:32 +0000852 TQ_FOR(v, &(expr->members), next) {
853 if(v->expr_type == A1TC_EXTENSIBLE) {
854 OUT("/* Extensions may appear below */\n");
855 continue;
856 }
vlm2e774282005-08-14 15:03:31 +0000857 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000858 OUT("_PR_");
vlm0c6d3812006-03-21 03:40:38 +0000859 id = MKID(v);
vlmdae7f9d2004-08-22 03:25:24 +0000860 OUT("%s,\n", id, id);
vlm33a4ff12004-08-11 05:21:32 +0000861 }
862 );
vlm2e774282005-08-14 15:03:31 +0000863 OUT("} "); out_name_chain(arg, ONC_noflags); OUT("_PR;\n");
vlm33a4ff12004-08-11 05:21:32 +0000864
865 REDIR(OT_TYPE_DECLS);
vlmfa67ddc2004-06-03 03:38:44 +0000866
867 if(arg->embed) {
vlm2e774282005-08-14 15:03:31 +0000868 OUT("struct "); out_name_chain(arg, ONC_avoid_keywords); OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000869 } else {
vlm0c6d3812006-03-21 03:40:38 +0000870 OUT("typedef struct %s {\n", MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000871 }
872
873 INDENTED(
vlm2e774282005-08-14 15:03:31 +0000874 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000875 OUT("_PR present;\n");
vlm2e774282005-08-14 15:03:31 +0000876 OUT("union ");
877 if(UNNAMED_UNIONS == 0) {
878 out_name_chain(arg, ONC_force_compound_name);
879 OUT("_u ");
880 }
881 OUT("{\n");
vlmfa67ddc2004-06-03 03:38:44 +0000882 TQ_FOR(v, &(expr->members), next) {
883 EMBED(v);
884 }
885 if(UNNAMED_UNIONS) OUT("};\n");
886 else OUT("} choice;\n");
887 );
888
889 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000890 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm1f7df782005-03-04 23:48:19 +0000891 expr->_anonymous_type ? "" :
892 arg->embed
vlm0c6d3812006-03-21 03:40:38 +0000893 ? MKID_safe(expr)
894 : MKID(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000895 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000896
897 return asn1c_lang_C_type_CHOICE_def(arg);
898}
899
900static int
901asn1c_lang_C_type_CHOICE_def(arg_t *arg) {
902 asn1p_expr_t *expr = arg->expr;
903 asn1p_expr_t *v;
904 int elements; /* Number of elements */
vlmfa67ddc2004-06-03 03:38:44 +0000905 tag2el_t *tag2el = NULL;
906 int tag2el_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000907 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000908 int all_tags_count;
909 enum tvm_compat tv_mode;
vlm337167e2005-11-26 11:25:14 +0000910 int *cmap = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000911
912 /*
913 * Fetch every inner tag from the tag to elements map.
914 */
vlm940bc6b2004-10-03 09:13:30 +0000915 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlmfa67ddc2004-06-03 03:38:44 +0000916 if(tag2el) free(tag2el);
917 return -1;
vlmfa67ddc2004-06-03 03:38:44 +0000918 }
919
vlm33a4ff12004-08-11 05:21:32 +0000920 GEN_INCLUDE("constr_CHOICE");
921 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000922 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000923
vlm33a4ff12004-08-11 05:21:32 +0000924 REDIR(OT_STAT_DEFS);
vlmfa67ddc2004-06-03 03:38:44 +0000925
926 /*
vlm337167e2005-11-26 11:25:14 +0000927 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000928 */
vlm39ba4c42004-09-22 16:06:28 +0000929 if(expr_elements_count(arg, expr)) {
vlmfa67ddc2004-06-03 03:38:44 +0000930
vlm337167e2005-11-26 11:25:14 +0000931 if(emit_members_PER_constraints(arg))
932 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000933 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000934 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000935
936 elements = 0;
937 INDENTED(TQ_FOR(v, &(expr->members), next) {
vlm34dcd572005-01-17 11:40:49 +0000938 if(v->expr_type == A1TC_EXTENSIBLE)
939 continue;
vlm34dcd572005-01-17 11:40:49 +0000940 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000941 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000942 });
943 OUT("};\n");
944 } else {
945 elements = 0;
946 }
vlmfa67ddc2004-06-03 03:38:44 +0000947
vlm337167e2005-11-26 11:25:14 +0000948 /* Create a canonical elements map */
949 if(elements && (arg->flags & A1C_GEN_PER)) {
950 int i;
951 cmap = compute_canonical_members_order(arg, elements);
952 if(cmap) {
953 OUT("static int asn_MAP_%s_cmap_%d[] = {",
vlm0c6d3812006-03-21 03:40:38 +0000954 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000955 expr->_type_unique_index);
956 for(i = 0; i < elements; i++) {
957 if(i) OUT(",");
958 OUT(" %d", cmap[i]);
959 }
960 OUT(" };\n");
961 free(cmap);
962 }
963 }
vlm6e73a042004-08-11 07:17:22 +0000964
vlmfa67ddc2004-06-03 03:38:44 +0000965 if(arg->embed) {
966 /*
967 * Our parent structure has already taken this into account.
968 */
vlm72425de2004-09-13 08:31:01 +0000969 tv_mode = _TVM_SAME;
970 tags_count = all_tags_count = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000971 } else {
vlm72425de2004-09-13 08:31:01 +0000972 tv_mode = emit_tags_vectors(arg, expr,
973 &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000974 }
vlmfa67ddc2004-06-03 03:38:44 +0000975
976 /*
977 * Tags to elements map.
978 */
vlm940bc6b2004-10-03 09:13:30 +0000979 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000980
vlm337167e2005-11-26 11:25:14 +0000981 OUT("static asn_CHOICE_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000982 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000983 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000984 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000985 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000986 OUT("),\n");
987 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000988 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000989 OUT(", _asn_ctx),\n");
990 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000991 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000992 OUT(", present),\n");
993 OUT("sizeof(((struct ");
vlm2e774282005-08-14 15:03:31 +0000994 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000995 OUT(" *)0)->present),\n");
vlm337167e2005-11-26 11:25:14 +0000996 OUT("asn_MAP_%s_tag2el_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +0000997 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000998 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
vlm337167e2005-11-26 11:25:14 +0000999 if(C99_MODE) OUT(".canonical_order = ");
1000 if(cmap) OUT("asn_MAP_%s_cmap_%d,\t/* Canonically sorted */\n",
vlm0c6d3812006-03-21 03:40:38 +00001001 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00001002 else OUT("0,\n");
1003 if(C99_MODE) OUT(".ext_start = ");
1004 OUT("%d\t/* Extensions start */\n",
1005 compute_extensions_start(expr));
vlmfa67ddc2004-06-03 03:38:44 +00001006 );
1007 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +00001008
1009 /*
vlma5dcb912004-09-29 13:16:40 +00001010 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +00001011 */
vlm72425de2004-09-13 08:31:01 +00001012 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +00001013 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +00001014
vlmfa67ddc2004-06-03 03:38:44 +00001015 REDIR(OT_TYPE_DECLS);
1016
1017 return 0;
vlmedf203f2005-01-17 11:57:48 +00001018} /* _CHOICE_def() */
vlmfa67ddc2004-06-03 03:38:44 +00001019
1020int
1021asn1c_lang_C_type_REFERENCE(arg_t *arg) {
1022 asn1p_ref_t *ref;
1023
1024 ref = arg->expr->reference;
1025 if(ref->components[ref->comp_count-1].name[0] == '&') {
vlmfa67ddc2004-06-03 03:38:44 +00001026 asn1p_expr_t *extract;
1027 arg_t tmp;
1028 int ret;
1029
vlm39ba4c42004-09-22 16:06:28 +00001030 extract = asn1f_class_access_ex(arg->asn, arg->expr->module,
vlm0c6d3812006-03-21 03:40:38 +00001031 arg->expr, arg->expr->rhs_pspecs, ref);
vlmfa67ddc2004-06-03 03:38:44 +00001032 if(extract == NULL)
1033 return -1;
1034
vlmdae7f9d2004-08-22 03:25:24 +00001035 extract = asn1p_expr_clone(extract, 0);
vlmfa67ddc2004-06-03 03:38:44 +00001036 if(extract) {
1037 if(extract->Identifier)
1038 free(extract->Identifier);
1039 extract->Identifier = strdup(arg->expr->Identifier);
1040 if(extract->Identifier == NULL) {
1041 asn1p_expr_free(extract);
1042 return -1;
1043 }
1044 } else {
1045 return -1;
1046 }
1047
1048 tmp = *arg;
1049 tmp.asn = arg->asn;
vlmfa67ddc2004-06-03 03:38:44 +00001050 tmp.expr = extract;
1051
1052 ret = arg->default_cb(&tmp);
1053
1054 asn1p_expr_free(extract);
1055
1056 return ret;
1057 }
1058
1059
1060 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
1061}
1062
1063int
1064asn1c_lang_C_type_SIMPLE_TYPE(arg_t *arg) {
1065 asn1p_expr_t *expr = arg->expr;
vlm6e73a042004-08-11 07:17:22 +00001066 int tags_count;
vlm72425de2004-09-13 08:31:01 +00001067 int all_tags_count;
1068 enum tvm_compat tv_mode;
vlm80a48592005-02-25 12:10:27 +00001069 enum etd_spec etd_spec;
vlmfa67ddc2004-06-03 03:38:44 +00001070 char *p;
1071
1072 if(arg->embed) {
vlma5dcb912004-09-29 13:16:40 +00001073 enum tnfmt tnfmt = TNF_CTYPE;
1074
1075 /*
1076 * If this is an optional compound type,
1077 * refer it using "struct X" convention,
1078 * as it may recursively include the current structure.
1079 */
vlm0b567bf2005-03-04 22:18:20 +00001080 if(expr->marker.flags & (EM_INDIRECT | EM_UNRECURSE)) {
vlm6c4a8502005-08-18 13:38:19 +00001081 if(terminal_structable(arg, expr)) {
vlm0b567bf2005-03-04 22:18:20 +00001082 tnfmt = TNF_RSAFE;
1083 REDIR(OT_FWD_DECLS);
vlm5feb7522005-03-04 23:50:56 +00001084 OUT("%s;\n",
vlm0b567bf2005-03-04 22:18:20 +00001085 asn1c_type_name(arg, arg->expr, tnfmt));
vlma5dcb912004-09-29 13:16:40 +00001086 }
1087 }
1088
vlmfa67ddc2004-06-03 03:38:44 +00001089 REDIR(OT_TYPE_DECLS);
1090
vlm0b567bf2005-03-04 22:18:20 +00001091 OUT("%s", asn1c_type_name(arg, arg->expr, tnfmt));
vlm80a48592005-02-25 12:10:27 +00001092 if(!expr->_anonymous_type) {
vlm0b567bf2005-03-04 22:18:20 +00001093 OUT("%s", (expr->marker.flags&EM_INDIRECT)?"\t*":"\t ");
vlm0c6d3812006-03-21 03:40:38 +00001094 OUT("%s", MKID_safe(expr));
vlm337167e2005-11-26 11:25:14 +00001095 if((expr->marker.flags & (EM_DEFAULT & ~EM_INDIRECT))
1096 == (EM_DEFAULT & ~EM_INDIRECT))
vlm80a48592005-02-25 12:10:27 +00001097 OUT("\t/* DEFAULT %s */",
1098 asn1f_printable_value(
1099 expr->marker.default_value));
vlm337167e2005-11-26 11:25:14 +00001100 else if((expr->marker.flags & EM_OPTIONAL)
1101 == EM_OPTIONAL)
vlm80a48592005-02-25 12:10:27 +00001102 OUT("\t/* OPTIONAL */");
1103 }
1104
1105 } else {
1106 GEN_INCLUDE(asn1c_type_name(arg, expr, TNF_INCLUDE));
vlmb2839012004-08-20 13:37:01 +00001107
1108 REDIR(OT_TYPE_DECLS);
vlm80a48592005-02-25 12:10:27 +00001109
1110 OUT("typedef %s\t",
vlm0b567bf2005-03-04 22:18:20 +00001111 asn1c_type_name(arg, arg->expr, TNF_CTYPE));
vlm80a48592005-02-25 12:10:27 +00001112 OUT("%s%s_t",
vlm0b567bf2005-03-04 22:18:20 +00001113 (expr->marker.flags & EM_INDIRECT)?"*":" ",
vlm0c6d3812006-03-21 03:40:38 +00001114 MKID(expr));
vlmfa67ddc2004-06-03 03:38:44 +00001115 }
1116
vlm80a48592005-02-25 12:10:27 +00001117 if((expr->expr_type == ASN_BASIC_ENUMERATED)
vlmc89422d2005-03-03 21:28:12 +00001118 || (0 /* -- prohibited by X.693:8.3.4 */
1119 && expr->expr_type == ASN_BASIC_INTEGER
vlm80a48592005-02-25 12:10:27 +00001120 && expr_elements_count(arg, expr)))
1121 etd_spec = ETD_HAS_SPECIFICS;
1122 else
1123 etd_spec = ETD_NO_SPECIFICS;
vlmfa67ddc2004-06-03 03:38:44 +00001124
vlm86f5ed22004-09-26 13:11:31 +00001125 /*
1126 * If this type just blindly refers the other type, alias it.
1127 * Type1 ::= Type2
1128 */
vlm80a48592005-02-25 12:10:27 +00001129 if(arg->embed && etd_spec == ETD_NO_SPECIFICS) {
1130 REDIR(OT_TYPE_DECLS);
1131 return 0;
1132 }
vlm86f5ed22004-09-26 13:11:31 +00001133 if((!expr->constraints || (arg->flags & A1C_NO_CONSTRAINTS))
vlm80a48592005-02-25 12:10:27 +00001134 && (arg->embed || expr->tag.tag_class == TC_NOCLASS)
vlm6f74b0f2005-03-04 23:23:50 +00001135 && etd_spec == ETD_NO_SPECIFICS
1136 && 0 /* This shortcut is incompatible with XER */
1137 ) {
vlm86f5ed22004-09-26 13:11:31 +00001138 char *type_name;
1139 REDIR(OT_FUNC_DECLS);
1140 type_name = asn1c_type_name(arg, expr, TNF_SAFE);
1141 OUT("/* This type is equivalent to %s */\n", type_name);
vlm86f5ed22004-09-26 13:11:31 +00001142 if(HIDE_INNER_DEFS) OUT("/* ");
vlm0c6d3812006-03-21 03:40:38 +00001143 OUT("#define\tasn_DEF_%s\t", MKID(expr));
vlm86f5ed22004-09-26 13:11:31 +00001144 type_name = asn1c_type_name(arg, expr, TNF_SAFE);
vlm80a48592005-02-25 12:10:27 +00001145 OUT("asn_DEF_%s", type_name);
vlm86f5ed22004-09-26 13:11:31 +00001146 if(HIDE_INNER_DEFS)
vlm80a48592005-02-25 12:10:27 +00001147 OUT("\t// (Use -fall-defs-global to expose) */");
1148 OUT("\n");
vlm86f5ed22004-09-26 13:11:31 +00001149 REDIR(OT_CODE);
1150 OUT("/* This type is equivalent to %s */\n", type_name);
1151 OUT("\n");
1152 REDIR(OT_TYPE_DECLS);
1153 return 0;
1154 }
1155
vlmfa67ddc2004-06-03 03:38:44 +00001156 REDIR(OT_STAT_DEFS);
1157
vlm4a3f5822004-06-28 21:13:46 +00001158 /*
vlma5dcb912004-09-29 13:16:40 +00001159 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +00001160 */
vlm72425de2004-09-13 08:31:01 +00001161 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +00001162
vlm80a48592005-02-25 12:10:27 +00001163 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count,
1164 0, etd_spec);
vlmfa67ddc2004-06-03 03:38:44 +00001165
vlmb2839012004-08-20 13:37:01 +00001166 REDIR(OT_CODE);
1167
vlmfa67ddc2004-06-03 03:38:44 +00001168 /*
1169 * Constraint checking.
1170 */
vlm86f5ed22004-09-26 13:11:31 +00001171 if(!(arg->flags & A1C_NO_CONSTRAINTS)) {
vlm0c6d3812006-03-21 03:40:38 +00001172 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001173 if(HIDE_INNER_DEFS) OUT("static ");
vlm86f5ed22004-09-26 13:11:31 +00001174 OUT("int\n");
vlm766cf1e2005-03-04 08:48:53 +00001175 OUT("%s", p);
1176 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1177 OUT("_constraint(asn_TYPE_descriptor_t *td, const void *sptr,\n");
vlm86f5ed22004-09-26 13:11:31 +00001178 INDENT(+1);
1179 OUT("\t\tasn_app_consume_bytes_f *app_errlog, void *app_key) {");
1180 OUT("\n");
1181 if(asn1c_emit_constraint_checking_code(arg) == 1) {
1182 OUT("/* Replace with underlying type checker */\n");
1183 OUT("td->check_constraints "
vlma5dcb912004-09-29 13:16:40 +00001184 "= asn_DEF_%s.check_constraints;\n",
vlm86f5ed22004-09-26 13:11:31 +00001185 asn1c_type_name(arg, expr, TNF_SAFE));
1186 OUT("return td->check_constraints"
1187 "(td, sptr, app_errlog, app_key);\n");
vlm1d036692004-08-19 13:29:46 +00001188 }
vlm86f5ed22004-09-26 13:11:31 +00001189 INDENT(-1);
1190 OUT("}\n");
1191 OUT("\n");
vlmfa67ddc2004-06-03 03:38:44 +00001192 }
vlmfa67ddc2004-06-03 03:38:44 +00001193
1194 /*
1195 * Emit suicidal functions.
1196 */
1197
vlmfa67ddc2004-06-03 03:38:44 +00001198 /*
1199 * This function replaces certain fields from the definition
1200 * of a type with the corresponding fields from the basic type
1201 * (from which the current type is inherited).
1202 */
vlmfa67ddc2004-06-03 03:38:44 +00001203 OUT("/*\n");
vlmb2839012004-08-20 13:37:01 +00001204 OUT(" * This type is implemented using %s,\n",
1205 asn1c_type_name(arg, expr, TNF_SAFE));
vlmdcd32fe2004-09-23 22:20:47 +00001206 OUT(" * so here we adjust the DEF accordingly.\n");
vlmfa67ddc2004-06-03 03:38:44 +00001207 OUT(" */\n");
1208 OUT("static void\n");
vlm766cf1e2005-03-04 08:48:53 +00001209 OUT("%s_%d_inherit_TYPE_descriptor(asn_TYPE_descriptor_t *td) {\n",
vlm0c6d3812006-03-21 03:40:38 +00001210 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001211 INDENT(+1);
vlm80a48592005-02-25 12:10:27 +00001212 {
vlm39ba4c42004-09-22 16:06:28 +00001213 asn1p_expr_t *terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
vlmb2839012004-08-20 13:37:01 +00001214 char *type_name = asn1c_type_name(arg, expr, TNF_SAFE);
vlma5dcb912004-09-29 13:16:40 +00001215 OUT("td->free_struct = asn_DEF_%s.free_struct;\n", type_name);
1216 OUT("td->print_struct = asn_DEF_%s.print_struct;\n", type_name);
1217 OUT("td->ber_decoder = asn_DEF_%s.ber_decoder;\n", type_name);
1218 OUT("td->der_encoder = asn_DEF_%s.der_encoder;\n", type_name);
1219 OUT("td->xer_decoder = asn_DEF_%s.xer_decoder;\n", type_name);
1220 OUT("td->xer_encoder = asn_DEF_%s.xer_encoder;\n", type_name);
vlm337167e2005-11-26 11:25:14 +00001221 OUT("td->uper_decoder = asn_DEF_%s.uper_decoder;\n", type_name);
vlm1308d2b2004-09-10 15:49:15 +00001222 if(!terminal && !tags_count) {
vlm72425de2004-09-13 08:31:01 +00001223 OUT("/* The next four lines are here because of -fknown-extern-type */\n");
vlma5dcb912004-09-29 13:16:40 +00001224 OUT("td->tags = asn_DEF_%s.tags;\n", type_name);
1225 OUT("td->tags_count = asn_DEF_%s.tags_count;\n", type_name);
1226 OUT("td->all_tags = asn_DEF_%s.all_tags;\n", type_name);
1227 OUT("td->all_tags_count = asn_DEF_%s.all_tags_count;\n",type_name);
vlm1308d2b2004-09-10 15:49:15 +00001228 OUT("/* End of these lines */\n");
1229 }
vlm337167e2005-11-26 11:25:14 +00001230 OUT("if(!td->per_constraints)\n");
1231 OUT("\ttd->per_constraints = asn_DEF_%s.per_constraints;\n",
1232 type_name);
vlma5dcb912004-09-29 13:16:40 +00001233 OUT("td->elements = asn_DEF_%s.elements;\n", type_name);
1234 OUT("td->elements_count = asn_DEF_%s.elements_count;\n", type_name);
vlm80a48592005-02-25 12:10:27 +00001235 if(etd_spec != ETD_NO_SPECIFICS) {
1236 INDENT(-1);
vlmc86870c2005-03-29 19:04:24 +00001237 OUT(" /* ");
vlmb2839012004-08-20 13:37:01 +00001238 }
vlm80a48592005-02-25 12:10:27 +00001239 OUT("td->specifics = asn_DEF_%s.specifics;", type_name);
1240 if(etd_spec == ETD_NO_SPECIFICS) {
1241 INDENT(-1);
1242 OUT("\n");
1243 } else {
1244 OUT("\t// Defined explicitly */\n");
1245 }
1246 }
vlmfa67ddc2004-06-03 03:38:44 +00001247 OUT("}\n");
1248 OUT("\n");
vlmfa67ddc2004-06-03 03:38:44 +00001249
vlm0c6d3812006-03-21 03:40:38 +00001250 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001251 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001252 OUT("void\n");
vlm766cf1e2005-03-04 08:48:53 +00001253 OUT("%s", p);
1254 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1255 OUT("_free(asn_TYPE_descriptor_t *td,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001256 INDENTED(
vlm39ba4c42004-09-22 16:06:28 +00001257 OUT("\tvoid *struct_ptr, int contents_only) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001258 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1259 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001260 OUT("td->free_struct(td, struct_ptr, contents_only);\n");
vlmfa67ddc2004-06-03 03:38:44 +00001261 );
1262 OUT("}\n");
1263 OUT("\n");
1264
vlm0c6d3812006-03-21 03:40:38 +00001265 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001266 if(HIDE_INNER_DEFS) OUT("static ");
vlmfa67ddc2004-06-03 03:38:44 +00001267 OUT("int\n");
vlm766cf1e2005-03-04 08:48:53 +00001268 OUT("%s", p);
1269 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1270 OUT("_print(asn_TYPE_descriptor_t *td, const void *struct_ptr,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001271 INDENTED(
1272 OUT("\tint ilevel, asn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001273 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1274 p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001275 OUT("return td->print_struct(td, struct_ptr, ilevel, cb, app_key);\n");
1276 );
1277 OUT("}\n");
1278 OUT("\n");
1279
vlm0c6d3812006-03-21 03:40:38 +00001280 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001281 if(HIDE_INNER_DEFS) OUT("static ");
vlm9de248e2004-10-20 15:50:55 +00001282 OUT("asn_dec_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001283 OUT("%s", p);
1284 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1285 OUT("_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001286 INDENTED(
vlmfcc4cbc2005-03-17 21:56:00 +00001287 OUT("\tvoid **structure, const void *bufptr, size_t size, int tag_mode) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001288 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1289 p, expr->_type_unique_index);
vlma5dcb912004-09-29 13:16:40 +00001290 OUT("return td->ber_decoder(opt_codec_ctx, td, structure, bufptr, size, tag_mode);\n");
vlm39ba4c42004-09-22 16:06:28 +00001291 );
1292 OUT("}\n");
1293 OUT("\n");
1294
vlm0c6d3812006-03-21 03:40:38 +00001295 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001296 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001297 OUT("asn_enc_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001298 OUT("%s", p);
1299 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1300 OUT("_encode_der(asn_TYPE_descriptor_t *td,\n");
vlm39ba4c42004-09-22 16:06:28 +00001301 INDENTED(
1302 OUT("\tvoid *structure, int tag_mode, ber_tlv_tag_t tag,\n");
1303 OUT("\tasn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001304 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1305 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001306 OUT("return td->der_encoder(td, structure, tag_mode, tag, cb, app_key);\n");
1307 );
1308 OUT("}\n");
1309 OUT("\n");
1310
vlm0c6d3812006-03-21 03:40:38 +00001311 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001312 if(HIDE_INNER_DEFS) OUT("static ");
vlme03646b2004-10-23 13:34:00 +00001313 OUT("asn_dec_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001314 OUT("%s", p);
1315 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1316 OUT("_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
vlme03646b2004-10-23 13:34:00 +00001317 INDENTED(
vlmfcc4cbc2005-03-17 21:56:00 +00001318 OUT("\tvoid **structure, const char *opt_mname, const void *bufptr, size_t size) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001319 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1320 p, expr->_type_unique_index);
vlme03646b2004-10-23 13:34:00 +00001321 OUT("return td->xer_decoder(opt_codec_ctx, td, structure, opt_mname, bufptr, size);\n");
1322 );
1323 OUT("}\n");
1324 OUT("\n");
1325
vlm0c6d3812006-03-21 03:40:38 +00001326 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001327 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001328 OUT("asn_enc_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001329 OUT("%s", p);
1330 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1331 OUT("_encode_xer(asn_TYPE_descriptor_t *td, void *structure,\n");
vlm39ba4c42004-09-22 16:06:28 +00001332 INDENTED(
1333 OUT("\tint ilevel, enum xer_encoder_flags_e flags,\n");
1334 OUT("\tasn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001335 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1336 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001337 OUT("return td->xer_encoder(td, structure, ilevel, flags, cb, app_key);\n");
vlmfa67ddc2004-06-03 03:38:44 +00001338 );
1339 OUT("}\n");
1340 OUT("\n");
1341
vlm337167e2005-11-26 11:25:14 +00001342 if(arg->flags & A1C_GEN_PER) {
vlm0c6d3812006-03-21 03:40:38 +00001343 p = MKID(expr);
vlm337167e2005-11-26 11:25:14 +00001344 if(HIDE_INNER_DEFS) OUT("static ");
1345 OUT("asn_dec_rval_t\n");
1346 OUT("%s", p);
1347 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1348 OUT("_decode_uper(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
1349 INDENTED(
1350 OUT("\tasn_per_constraints_t *constraints, void **structure, asn_per_data_t *per_data) {\n");
1351 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1352 p, expr->_type_unique_index);
1353 OUT("return td->uper_decoder(opt_codec_ctx, td, constraints, structure, per_data);\n");
1354 );
1355 OUT("}\n");
1356 OUT("\n");
1357 }
1358
vlmfa67ddc2004-06-03 03:38:44 +00001359 REDIR(OT_FUNC_DECLS);
1360
vlm0c6d3812006-03-21 03:40:38 +00001361 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001362 if(HIDE_INNER_DEFS) {
vlm766cf1e2005-03-04 08:48:53 +00001363 OUT("/* extern asn_TYPE_descriptor_t asn_DEF_%s_%d;"
1364 "\t// (Use -fall-defs-global to expose) */\n",
1365 p, expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +00001366 } else {
1367 OUT("extern asn_TYPE_descriptor_t asn_DEF_%s;\n", p);
1368 OUT("asn_struct_free_f %s_free;\n", p);
1369 OUT("asn_struct_print_f %s_print;\n", p);
1370 OUT("asn_constr_check_f %s_constraint;\n", p);
1371 OUT("ber_type_decoder_f %s_decode_ber;\n", p);
1372 OUT("der_type_encoder_f %s_encode_der;\n", p);
1373 OUT("xer_type_decoder_f %s_decode_xer;\n", p);
1374 OUT("xer_type_encoder_f %s_encode_xer;\n", p);
vlm337167e2005-11-26 11:25:14 +00001375 if(arg->flags & A1C_GEN_PER)
1376 OUT("per_type_decoder_f %s_decode_uper;\n", p);
vlm80a48592005-02-25 12:10:27 +00001377 }
vlmfa67ddc2004-06-03 03:38:44 +00001378
vlm33a4ff12004-08-11 05:21:32 +00001379 REDIR(OT_TYPE_DECLS);
1380
vlmfa67ddc2004-06-03 03:38:44 +00001381 return 0;
1382}
1383
1384int
1385asn1c_lang_C_type_EXTENSIBLE(arg_t *arg) {
1386
1387 OUT("/*\n");
1388 OUT(" * This type is extensible,\n");
1389 OUT(" * possible extensions are below.\n");
1390 OUT(" */\n");
1391
1392 return 0;
1393}
1394
vlm337167e2005-11-26 11:25:14 +00001395static int
1396compute_extensions_start(asn1p_expr_t *expr) {
vlm79b08d52004-07-01 00:52:50 +00001397 asn1p_expr_t *v;
vlm337167e2005-11-26 11:25:14 +00001398 int eidx = 0;
vlm79b08d52004-07-01 00:52:50 +00001399 TQ_FOR(v, &(expr->members), next) {
vlm337167e2005-11-26 11:25:14 +00001400 if(v->expr_type == A1TC_EXTENSIBLE)
1401 return eidx;
1402 eidx++;
vlm79b08d52004-07-01 00:52:50 +00001403 }
vlm337167e2005-11-26 11:25:14 +00001404 return -1;
vlm79b08d52004-07-01 00:52:50 +00001405}
1406
vlmfa67ddc2004-06-03 03:38:44 +00001407static int
vlma8a86cc2004-09-10 06:07:18 +00001408_print_tag(arg_t *arg, struct asn1p_type_tag_s *tag) {
vlmfa67ddc2004-06-03 03:38:44 +00001409
1410 OUT("(");
vlma8a86cc2004-09-10 06:07:18 +00001411 switch(tag->tag_class) {
vlmfa67ddc2004-06-03 03:38:44 +00001412 case TC_UNIVERSAL: OUT("ASN_TAG_CLASS_UNIVERSAL"); break;
1413 case TC_APPLICATION: OUT("ASN_TAG_CLASS_APPLICATION"); break;
1414 case TC_CONTEXT_SPECIFIC: OUT("ASN_TAG_CLASS_CONTEXT"); break;
1415 case TC_PRIVATE: OUT("ASN_TAG_CLASS_PRIVATE"); break;
1416 case TC_NOCLASS:
1417 break;
1418 }
vlm47ae1582004-09-24 21:01:43 +00001419 OUT(" | (%" PRIdASN " << 2))", tag->tag_value);
vlmfa67ddc2004-06-03 03:38:44 +00001420
1421 return 0;
1422}
1423
vlm4e03ce22004-06-06 07:20:17 +00001424
1425static int
1426_tag2el_cmp(const void *ap, const void *bp) {
1427 const tag2el_t *a = ap;
1428 const tag2el_t *b = bp;
1429 const struct asn1p_type_tag_s *ta = &a->el_tag;
1430 const struct asn1p_type_tag_s *tb = &b->el_tag;
1431
1432 if(ta->tag_class == tb->tag_class) {
1433 if(ta->tag_value == tb->tag_value) {
1434 /*
1435 * Sort by their respective positions.
1436 */
1437 if(a->el_no < b->el_no)
1438 return -1;
1439 else if(a->el_no > b->el_no)
1440 return 1;
1441 return 0;
1442 } else if(ta->tag_value < tb->tag_value)
1443 return -1;
1444 else
1445 return 1;
1446 } else if(ta->tag_class < tb->tag_class) {
1447 return -1;
1448 } else {
1449 return 1;
1450 }
1451}
1452
vlmfa67ddc2004-06-03 03:38:44 +00001453/*
1454 * For constructed types, number of external tags may be greater than
1455 * number of elements in the type because of CHOICE type.
1456 * T ::= SET { -- Three possible tags:
1457 * a INTEGER, -- One tag is here...
1458 * b Choice1 -- ... and two more tags are there.
1459 * }
1460 * Choice1 ::= CHOICE {
1461 * s1 IA5String,
1462 * s2 ObjectDescriptor
1463 * }
1464 */
1465static int
vlm940bc6b2004-10-03 09:13:30 +00001466_fill_tag2el_map(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags) {
vlmfa67ddc2004-06-03 03:38:44 +00001467 asn1p_expr_t *expr = arg->expr;
1468 arg_t tmparg = *arg;
1469 asn1p_expr_t *v;
1470 int element = 0;
vlm940bc6b2004-10-03 09:13:30 +00001471 int original_count = *count;
1472 int sort_until = -1;
vlmfa67ddc2004-06-03 03:38:44 +00001473
1474 TQ_FOR(v, &(expr->members), next) {
vlm940bc6b2004-10-03 09:13:30 +00001475 if(v->expr_type == A1TC_EXTENSIBLE) {
1476 /*
vlm80a48592005-02-25 12:10:27 +00001477 * CXER mandates sorting
vlm940bc6b2004-10-03 09:13:30 +00001478 * only for the root part.
1479 */
1480 if(flags == FTE_CANONICAL_XER
1481 && sort_until == -1)
1482 sort_until = *count;
vlmfa67ddc2004-06-03 03:38:44 +00001483 continue;
vlm940bc6b2004-10-03 09:13:30 +00001484 }
vlmfa67ddc2004-06-03 03:38:44 +00001485
1486 tmparg.expr = v;
1487
1488 if(_add_tag2el_member(&tmparg, tag2el, count,
vlm940bc6b2004-10-03 09:13:30 +00001489 (el_no==-1)?element:el_no, flags)) {
vlmfa67ddc2004-06-03 03:38:44 +00001490 return -1;
1491 }
1492
1493 element++;
1494 }
1495
vlm940bc6b2004-10-03 09:13:30 +00001496
1497 if(flags == FTE_CANONICAL_XER) {
1498 if(sort_until == -1) sort_until = *count;
1499 qsort((*tag2el) + original_count,
1500 sort_until - original_count,
1501 sizeof(**tag2el), _tag2el_cmp);
1502 if(arg->expr->expr_type == ASN_CONSTR_CHOICE
1503 && (sort_until - original_count) >= 1) {
1504 /* Only take in account the root component */
1505 *count = original_count + 1;
1506 }
1507 } else {
1508 /*
1509 * Sort the map according to canonical order of their
1510 * tags and element numbers.
1511 */
1512 qsort(*tag2el, *count, sizeof(**tag2el), _tag2el_cmp);
1513 }
vlm4e03ce22004-06-06 07:20:17 +00001514
vlmc8aeab42004-06-14 13:09:45 +00001515 /*
1516 * Initialize .toff_{first|last} members.
1517 */
1518 if(*count) {
1519 struct asn1p_type_tag_s *cur_tag = 0;
1520 tag2el_t *cur = *tag2el;
1521 tag2el_t *end = cur + *count;
1522 int occur, i;
1523 for(occur = 0; cur < end; cur++) {
1524 if(cur_tag == 0
1525 || cur_tag->tag_value != cur->el_tag.tag_value
1526 || cur_tag->tag_class != cur->el_tag.tag_class) {
1527 cur_tag = &cur->el_tag;
1528 occur = 0;
1529 } else {
1530 occur++;
1531 }
1532 cur->toff_first = -occur;
1533 for(i = 0; i >= -occur; i--)
1534 cur[i].toff_last = -i;
1535 }
1536 }
1537
vlmfa67ddc2004-06-03 03:38:44 +00001538 return 0;
1539}
1540
1541static int
vlm940bc6b2004-10-03 09:13:30 +00001542_add_tag2el_member(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags) {
vlmfa67ddc2004-06-03 03:38:44 +00001543 struct asn1p_type_tag_s tag;
1544 int ret;
1545
1546 assert(el_no >= 0);
1547
vlm39ba4c42004-09-22 16:06:28 +00001548 ret = asn1f_fetch_outmost_tag(arg->asn, arg->expr->module,
vlm337167e2005-11-26 11:25:14 +00001549 arg->expr, &tag, AFT_IMAGINARY_ANY);
vlmfa67ddc2004-06-03 03:38:44 +00001550 if(ret == 0) {
vlme2070ea2004-09-04 04:42:29 +00001551 tag2el_t *te;
1552 int new_count = (*count) + 1;
vlmfa67ddc2004-06-03 03:38:44 +00001553 void *p;
vlme2070ea2004-09-04 04:42:29 +00001554
vlm2de0e792004-09-05 10:42:33 +00001555 if(tag.tag_value == -1) {
1556 /*
1557 * This is an untagged ANY type,
1558 * proceed without adding a tag
1559 */
1560 return 0;
1561 }
1562
vlme2070ea2004-09-04 04:42:29 +00001563 p = realloc(*tag2el, new_count * sizeof(tag2el_t));
vlmfa67ddc2004-06-03 03:38:44 +00001564 if(p) *tag2el = p;
1565 else return -1;
1566
1567 DEBUG("Found tag for %s: %ld",
1568 arg->expr->Identifier,
1569 (long)tag.tag_value);
1570
vlme2070ea2004-09-04 04:42:29 +00001571 te = &((*tag2el)[*count]);
1572 te->el_tag = tag;
1573 te->el_no = el_no;
1574 te->from_expr = arg->expr;
1575 *count = new_count;
vlmfa67ddc2004-06-03 03:38:44 +00001576 return 0;
1577 }
1578
1579 DEBUG("Searching tag in complex expression %s:%x at line %d",
1580 arg->expr->Identifier,
1581 arg->expr->expr_type,
1582 arg->expr->_lineno);
1583
1584 /*
1585 * Iterate over members of CHOICE type.
1586 */
1587 if(arg->expr->expr_type == ASN_CONSTR_CHOICE) {
vlm940bc6b2004-10-03 09:13:30 +00001588 return _fill_tag2el_map(arg, tag2el, count, el_no, flags);
vlmfa67ddc2004-06-03 03:38:44 +00001589 }
1590
1591 if(arg->expr->expr_type == A1TC_REFERENCE) {
1592 arg_t tmp = *arg;
1593 asn1p_expr_t *expr;
vlm6c4a8502005-08-18 13:38:19 +00001594 expr = asn1f_lookup_symbol_ex(tmp.asn, tmp.expr,
vlmfa67ddc2004-06-03 03:38:44 +00001595 arg->expr->reference);
1596 if(expr) {
1597 tmp.expr = expr;
vlm940bc6b2004-10-03 09:13:30 +00001598 return _add_tag2el_member(&tmp, tag2el, count, el_no, flags);
vlmfa67ddc2004-06-03 03:38:44 +00001599 } else {
1600 FATAL("Cannot dereference %s at line %d",
1601 arg->expr->Identifier,
1602 arg->expr->_lineno);
1603 return -1;
1604 }
1605 }
1606
1607 DEBUG("No tag for %s at line %d",
1608 arg->expr->Identifier,
1609 arg->expr->_lineno);
1610
1611 return -1;
1612}
1613
1614static int
vlm940bc6b2004-10-03 09:13:30 +00001615emit_tag2member_map(arg_t *arg, tag2el_t *tag2el, int tag2el_count, const char *opt_modifier) {
vlm4e03ce22004-06-06 07:20:17 +00001616 asn1p_expr_t *expr = arg->expr;
vlmfbd6d9e2005-06-02 05:21:37 +00001617 int i;
1618
1619 if(!tag2el_count) return 0; /* No top level tags */
vlm4e03ce22004-06-06 07:20:17 +00001620
vlm337167e2005-11-26 11:25:14 +00001621 OUT("static asn_TYPE_tag2member_t asn_MAP_%s_tag2el%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +00001622 MKID(expr), opt_modifier?opt_modifier:"",
vlm337167e2005-11-26 11:25:14 +00001623 expr->_type_unique_index);
vlmfbd6d9e2005-06-02 05:21:37 +00001624 for(i = 0; i < tag2el_count; i++) {
1625 OUT(" { ");
1626 _print_tag(arg, &tag2el[i].el_tag);
1627 OUT(", ");
1628 OUT("%d, ", tag2el[i].el_no);
1629 OUT("%d, ", tag2el[i].toff_first);
1630 OUT("%d ", tag2el[i].toff_last);
1631 OUT("}%s /* %s at %d */\n",
1632 (i + 1 < tag2el_count) ? "," : "",
1633 tag2el[i].from_expr->Identifier,
1634 tag2el[i].from_expr->_lineno
1635 );
vlm4e03ce22004-06-06 07:20:17 +00001636 }
1637 OUT("};\n");
1638
vlmfbd6d9e2005-06-02 05:21:37 +00001639 return 0;
vlm4e03ce22004-06-06 07:20:17 +00001640}
1641
vlm72425de2004-09-13 08:31:01 +00001642static enum tvm_compat
1643emit_tags_vectors(arg_t *arg, asn1p_expr_t *expr, int *tags_count_r, int *all_tags_count_r) {
1644 struct asn1p_type_tag_s *tags = 0; /* Effective tags */
1645 struct asn1p_type_tag_s *all_tags = 0; /* The full array */
vlm6e73a042004-08-11 07:17:22 +00001646 int tags_count = 0;
vlm72425de2004-09-13 08:31:01 +00001647 int all_tags_count = 0;
1648 enum tvm_compat tv_mode = _TVM_SAME;
vlm1308d2b2004-09-10 15:49:15 +00001649 int i;
vlm4a3f5822004-06-28 21:13:46 +00001650
vlmc6de2c42004-09-14 14:10:10 +00001651 /* Cleanup before proceeding. */
1652 *tags_count_r = 0;
1653 *all_tags_count_r = 0;
1654
vlm1308d2b2004-09-10 15:49:15 +00001655 /* Fetch a chain of tags */
vlm39ba4c42004-09-22 16:06:28 +00001656 tags_count = asn1f_fetch_tags(arg->asn, expr->module, expr, &tags, 0);
vlmc6de2c42004-09-14 14:10:10 +00001657 if(tags_count < 0)
1658 return -1;
vlm6e73a042004-08-11 07:17:22 +00001659
vlm72425de2004-09-13 08:31:01 +00001660 /* Fetch a chain of tags */
vlm39ba4c42004-09-22 16:06:28 +00001661 all_tags_count = asn1f_fetch_tags(arg->asn, expr->module, expr,
vlm72425de2004-09-13 08:31:01 +00001662 &all_tags, AFT_FULL_COLLECT);
1663 if(all_tags_count < 0) {
1664 if(tags) free(tags);
1665 return -1;
vlmfb41dbb2004-09-08 00:28:57 +00001666 }
vlm1308d2b2004-09-10 15:49:15 +00001667
vlm72425de2004-09-13 08:31:01 +00001668 assert(tags_count <= all_tags_count);
1669 assert((tags_count?0:1) == (all_tags_count?0:1));
vlm4a3f5822004-06-28 21:13:46 +00001670
vlm72425de2004-09-13 08:31:01 +00001671 if(tags_count <= all_tags_count) {
1672 for(i = 0; i < tags_count; i++) {
1673 if(tags[i].tag_value != all_tags[i].tag_value
1674 || tags[i].tag_class != all_tags[i].tag_class) {
1675 tv_mode = _TVM_DIFFERENT;
1676 break;
1677 }
1678 }
1679 if(i == tags_count && tags_count < all_tags_count)
1680 tv_mode = _TVM_SUBSET;
1681 } else {
1682 tv_mode = _TVM_DIFFERENT;
1683 }
1684
1685#define EMIT_TAGS_TABLE(name, tags, tags_count) do { \
vlm337167e2005-11-26 11:25:14 +00001686 OUT("static ber_tlv_tag_t asn_DEF_%s%s_tags_%d[] = {\n",\
vlm0c6d3812006-03-21 03:40:38 +00001687 MKID(expr), name, \
vlm337167e2005-11-26 11:25:14 +00001688 expr->_type_unique_index); \
vlm72425de2004-09-13 08:31:01 +00001689 INDENT(+1); \
1690 /* Print the array of collected tags */ \
1691 for(i = 0; i < tags_count; i++) { \
1692 if(i) OUT(",\n"); \
1693 _print_tag(arg, &tags[i]); \
1694 } \
1695 OUT("\n"); \
1696 INDENT(-1); \
1697 OUT("};\n"); \
1698 } while(0)
1699
1700 if(tags_count) {
1701 if(tv_mode == _TVM_SUBSET)
1702 EMIT_TAGS_TABLE("", all_tags, all_tags_count);
1703 else
1704 EMIT_TAGS_TABLE("", tags, tags_count);
1705 }
1706
1707 if(all_tags_count) {
1708 if(tv_mode == _TVM_DIFFERENT)
1709 EMIT_TAGS_TABLE("_all", all_tags, all_tags_count);
1710 }
1711
1712 if(tags) free(tags);
1713 if(all_tags) free(all_tags);
1714
1715 *tags_count_r = tags_count;
1716 *all_tags_count_r = all_tags_count;
1717
1718 return tv_mode;
vlm4a3f5822004-06-28 21:13:46 +00001719}
vlmb2839012004-08-20 13:37:01 +00001720
1721static int
vlm4e554992004-08-25 02:03:12 +00001722expr_elements_count(arg_t *arg, asn1p_expr_t *expr) {
vlmb2839012004-08-20 13:37:01 +00001723 asn1p_expr_t *topmost_parent;
1724 asn1p_expr_t *v;
1725 int elements = 0;
1726
vlm39ba4c42004-09-22 16:06:28 +00001727 topmost_parent = asn1f_find_terminal_type_ex(arg->asn, expr);
vlmb2839012004-08-20 13:37:01 +00001728 if(!topmost_parent) return 0;
1729
vlm80a48592005-02-25 12:10:27 +00001730 if(!(topmost_parent->expr_type & ASN_CONSTR_MASK)
1731 && !topmost_parent->expr_type == ASN_BASIC_INTEGER
1732 && !topmost_parent->expr_type == ASN_BASIC_ENUMERATED)
vlmb2839012004-08-20 13:37:01 +00001733 return 0;
1734
1735 TQ_FOR(v, &(topmost_parent->members), next) {
1736 if(v->expr_type != A1TC_EXTENSIBLE)
1737 elements++;
1738 }
1739
1740 return elements;
1741}
1742
vlm337167e2005-11-26 11:25:14 +00001743static asn1p_expr_type_e
1744expr_get_type(arg_t *arg, asn1p_expr_t *expr) {
1745 asn1p_expr_t *terminal;
1746 terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
1747 if(terminal) return terminal->expr_type;
1748 return A1TC_INVALID;
1749}
1750
1751static int
1752emit_single_member_PER_constraint(arg_t *arg, asn1cnst_range_t *range, char *type) {
1753 if(!range || range->incompatible || range->not_PER_visible) {
1754 OUT("{ APC_UNCONSTRAINED,\t-1, -1, 0, 0 }");
1755 return 0;
1756 }
1757
1758 if(range->left.type == ARE_VALUE) {
1759 if(range->right.type == ARE_VALUE) {
1760 asn1c_integer_t cover = 1;
1761 asn1c_integer_t r = 1 + range->right.value
1762 - range->left.value;
1763 int rbits, ebits;
1764
1765 if(range->empty_constraint)
1766 r = 0;
1767
1768 /* Compute real constraint */
1769 for(rbits = 0; rbits < (8 * sizeof(r)); rbits++) {
1770 if(r <= cover)
1771 break;
1772 cover *= 2; /* Can't do shifting */
1773 if(cover < 0) {
1774 FATAL("Constraint at line %d too wide "
1775 "for %d-bits integer type",
1776 arg->expr->_lineno,
1777 sizeof(r) * 8);
1778 rbits = sizeof(r);
1779 break;
1780 }
1781 }
1782
1783 if(1) {
1784 /* X.691, #10.9.4.1 */
1785 for(ebits = 0; ebits <= 16; ebits++)
1786 if(r <= 1 << ebits) break;
1787 if(ebits == 17
1788 || range->right.value >= 65536)
1789 ebits = -1;
1790 } else {
1791 /* X.691, #10.5.7.1 */
1792 for(ebits = 0; ebits <= 8; ebits++)
1793 if(r <= 1 << ebits) break;
1794 if(ebits == 9) {
1795 if(r <= 65536)
1796 ebits = 16;
1797 else
1798 ebits = -1;
1799 }
1800 }
1801 OUT("{ APC_CONSTRAINED%s,%s% d, % d, ",
1802 range->extensible
1803 ? " | APC_EXTENSIBLE" : "",
1804 range->extensible ? " " : "\t", rbits, ebits);
1805 } else {
1806 if(range->extensible) {
1807 OUT("{ APC_SEMI_CONSTRAINED | APC_EXTENSIBLE, "
1808 "-1, ");
1809 } else {
1810 OUT("{ APC_SEMI_CONSTRAINED,\t-1, -1, ");
1811 }
1812 }
1813 OUT("% " PRIdASN ", % " PRIdASN " }",
1814 range->left.value, range->right.value);
1815 } else {
1816 OUT("{ APC_UNCONSTRAINED,\t-1, -1, 0, 0 }");
1817 }
1818
1819 /*
1820 * Print some courtesy debug information.
1821 */
1822 if(range->left.type == ARE_VALUE
1823 || range->right.type == ARE_VALUE) {
1824 OUT("\t/* ");
1825 if(type) OUT("(%s", type);
1826 OUT("(");
1827 if(range->left.type == ARE_VALUE)
1828 OUT("%" PRIdASN, range->left.value);
1829 else
1830 OUT("MIN");
1831 OUT("..");
1832 if(range->right.type == ARE_VALUE)
1833 OUT("%" PRIdASN, range->right.value);
1834 else
1835 OUT("MAX");
1836 if(range->extensible) OUT(",...");
1837 if(type) OUT(")");
1838 OUT(") */");
1839 }
1840
1841 return 0;
1842}
1843
1844static int
1845emit_single_member_PER_constraints(arg_t *arg, asn1p_expr_t *expr) {
1846 asn1cnst_range_t *range;
1847 asn1p_expr_type_e etype;
1848
1849 etype = expr_get_type(arg, expr);
1850
1851 INDENT(+1);
1852
1853 /*
1854 * ENUMERATED and CHOICE are special.
1855 */
1856 if(etype == ASN_BASIC_ENUMERATED
1857 || etype == ASN_CONSTR_CHOICE) {
1858 asn1cnst_range_t tmprng;
1859 asn1p_expr_t *v;
1860 int extensible = 0;
1861 int eidx = -1;
1862
1863 expr = asn1f_find_terminal_type_ex(arg->asn, expr);
1864 assert(expr);
1865
1866 TQ_FOR(v, &(expr->members), next) {
1867 if(v->expr_type == A1TC_EXTENSIBLE) {
1868 extensible++;
1869 break;
1870 }
1871 eidx++;
1872 }
1873
1874 memset(&tmprng, 0, sizeof (tmprng));
1875 tmprng.extensible = extensible;
1876 if(eidx < 0) tmprng.empty_constraint = 1;
1877 tmprng.left.type = ARE_VALUE;
1878 tmprng.left.value = 0;
1879 tmprng.right.type = ARE_VALUE;
1880 tmprng.right.value = eidx < 0 ? 0 : eidx;
1881 if(emit_single_member_PER_constraint(arg, &tmprng, 0))
1882 return -1;
1883 } else {
1884 range = asn1constraint_compute_PER_range(etype,
1885 expr->combined_constraints, ACT_EL_RANGE,
1886 0, 0, 0);
1887 if(emit_single_member_PER_constraint(arg, range, 0))
1888 return -1;
1889 asn1constraint_range_free(range);
1890 }
1891 OUT(",\n");
1892
1893 range = asn1constraint_compute_PER_range(etype,
1894 expr->combined_constraints, ACT_CT_SIZE, 0, 0, 0);
1895 if(emit_single_member_PER_constraint(arg, range, "SIZE"))
1896 return -1;
1897 asn1constraint_range_free(range);
1898 OUT("\n");
1899
1900 INDENT(-1);
1901
1902 return 0;
1903}
1904
1905static int
1906emit_members_PER_constraints(arg_t *arg) {
1907 asn1p_expr_t *expr = arg->expr;
1908 asn1p_expr_t *v;
1909
1910 if(!(arg->flags & A1C_GEN_PER))
1911 return 0;
1912
1913 TQ_FOR(v, &(expr->members), next) {
1914 if(v->constraints
1915 || v->expr_type == ASN_BASIC_ENUMERATED
1916 || v->expr_type == ASN_CONSTR_CHOICE) {
1917 OUT("static asn_per_constraints_t "
1918 "asn_PER_memb_%s_constr_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +00001919 MKID(v), v->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00001920 if(emit_single_member_PER_constraints(arg, v))
1921 return -1;
1922 OUT("};\n");
1923 }
1924 }
1925
1926 return 0;
1927}
1928
1929static int
1930try_inline_default(arg_t *arg, asn1p_expr_t *expr, int out) {
1931 int save_target = arg->target->target;
1932 asn1p_expr_type_e etype = expr_get_type(arg, expr);
1933 int fits_long = 0;
1934
1935 switch(etype) {
1936 case ASN_BASIC_BOOLEAN:
1937 fits_long = 1;
1938 case ASN_BASIC_INTEGER:
1939 case ASN_BASIC_ENUMERATED:
1940 if(expr->marker.default_value == NULL
1941 || expr->marker.default_value->type != ATV_INTEGER)
1942 break;
1943 if(!fits_long)
1944 fits_long = asn1c_type_fits_long(arg, expr)!=FL_NOTFIT;
1945 if(fits_long && !expr->marker.default_value->value.v_integer)
1946 expr->marker.flags &= ~EM_INDIRECT;
1947 if(!out) return 1;
1948 REDIR(OT_STAT_DEFS);
1949 OUT("static int asn_DFL_%d_set_%" PRIdASN "(void **sptr) {\n",
1950 expr->_type_unique_index,
1951 expr->marker.default_value->value.v_integer);
1952 INDENT(+1);
1953 OUT("%s *st = *sptr;\n", asn1c_type_name(arg, expr, TNF_CTYPE));
1954 OUT("\n");
1955 OUT("if(!st) {\n");
1956 OUT("\tst = (*sptr = CALLOC(1, sizeof(*st)));\n");
1957 OUT("\tif(!st) return -1;\n");
1958 OUT("}\n");
1959 OUT("\n");
1960 OUT("/* Install default value %" PRIdASN " */\n",
1961 expr->marker.default_value->value.v_integer);
1962 if(fits_long) {
1963 OUT("*st = %" PRIdASN ";\n",
1964 expr->marker.default_value->value.v_integer);
1965 OUT("return 0;\n");
1966 } else {
1967 OUT("return asn_long2INTEGER(st, %" PRIdASN ");\n",
1968 expr->marker.default_value->value.v_integer);
1969 }
1970 INDENT(-1);
1971 OUT("}\n");
1972 REDIR(save_target);
1973 return 1;
1974 case ASN_BASIC_NULL:
1975 //expr->marker.flags &= ~EM_INDIRECT;
1976 return 0;
1977 default:
1978 break;
1979 }
1980 return 0;
1981}
1982
vlmb2839012004-08-20 13:37:01 +00001983static int
vlm4e554992004-08-25 02:03:12 +00001984emit_member_table(arg_t *arg, asn1p_expr_t *expr) {
vlmb2839012004-08-20 13:37:01 +00001985 int save_target;
1986 arg_t tmp_arg;
vlm060fe2a2004-09-10 09:37:12 +00001987 struct asn1p_type_tag_s outmost_tag_s;
1988 struct asn1p_type_tag_s *outmost_tag;
vlm80a48592005-02-25 12:10:27 +00001989 int complex_contents;
vlmb2839012004-08-20 13:37:01 +00001990 char *p;
1991
vlm060fe2a2004-09-10 09:37:12 +00001992 if(asn1f_fetch_outmost_tag(arg->asn,
vlm337167e2005-11-26 11:25:14 +00001993 expr->module, expr, &outmost_tag_s,
1994 AFT_IMAGINARY_ANY)) {
vlm060fe2a2004-09-10 09:37:12 +00001995 outmost_tag = 0;
1996 } else {
1997 outmost_tag = &outmost_tag_s;
1998 }
1999
vlmb2839012004-08-20 13:37:01 +00002000 OUT("{ ");
vlm060fe2a2004-09-10 09:37:12 +00002001
2002 if(outmost_tag && outmost_tag->tag_value == -1)
2003 OUT("ATF_OPEN_TYPE | ");
vlm0b567bf2005-03-04 22:18:20 +00002004 OUT("%s, ",
2005 (expr->marker.flags & EM_INDIRECT)?"ATF_POINTER":"ATF_NOFLAGS");
vlm6c4a8502005-08-18 13:38:19 +00002006 if((expr->marker.flags & EM_OMITABLE) == EM_OMITABLE) {
vlmb2839012004-08-20 13:37:01 +00002007 asn1p_expr_t *tv;
2008 int opts = 0;
vlm6c4a8502005-08-18 13:38:19 +00002009 for(tv = expr;
2010 tv && (tv->marker.flags & EM_OMITABLE) == EM_OMITABLE;
vlmb2839012004-08-20 13:37:01 +00002011 tv = TQ_NEXT(tv, next), opts++) {
2012 if(tv->expr_type == A1TC_EXTENSIBLE)
2013 opts--;
2014 }
2015 OUT("%d, ", opts);
2016 } else {
2017 OUT("0, ");
2018 }
vlm39ba4c42004-09-22 16:06:28 +00002019 if(expr->_anonymous_type) {
2020 assert(arg->expr->expr_type == ASN_CONSTR_SET_OF
2021 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF);
2022 OUT("0,\n");
2023 } else {
vlm766cf1e2005-03-04 08:48:53 +00002024 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +00002025 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +00002026 OUT(", ");
vlmb2839012004-08-20 13:37:01 +00002027 if(arg->expr->expr_type == ASN_CONSTR_CHOICE
2028 && (!UNNAMED_UNIONS)) OUT("choice.");
vlm0c6d3812006-03-21 03:40:38 +00002029 OUT("%s),\n", MKID_safe(expr));
vlmb2839012004-08-20 13:37:01 +00002030 }
2031 INDENT(+1);
2032 if(C99_MODE) OUT(".tag = ");
vlm060fe2a2004-09-10 09:37:12 +00002033 if(outmost_tag) {
2034 if(outmost_tag->tag_value == -1)
2035 OUT("-1 /* Ambiguous tag (ANY?) */");
2036 else
2037 _print_tag(arg, outmost_tag);
vlma8a86cc2004-09-10 06:07:18 +00002038 } else {
vlm060fe2a2004-09-10 09:37:12 +00002039 OUT("-1 /* Ambiguous tag (CHOICE?) */");
vlma8a86cc2004-09-10 06:07:18 +00002040 }
vlm060fe2a2004-09-10 09:37:12 +00002041
vlmb2839012004-08-20 13:37:01 +00002042 OUT(",\n");
2043 if(C99_MODE) OUT(".tag_mode = ");
2044 if(expr->tag.tag_class) {
2045 if(expr->tag.tag_mode == TM_IMPLICIT)
2046 OUT("-1,\t/* IMPLICIT tag at current level */\n");
2047 else
2048 OUT("+1,\t/* EXPLICIT tag at current level */\n");
2049 } else {
2050 OUT("0,\n");
2051 }
vlm80a48592005-02-25 12:10:27 +00002052
2053 complex_contents =
2054 (expr->expr_type & ASN_CONSTR_MASK)
2055 || expr->expr_type == ASN_BASIC_ENUMERATED
vlmc89422d2005-03-03 21:28:12 +00002056 || (0 /* -- prohibited by X.693:8.3.4 */
2057 && expr->expr_type == ASN_BASIC_INTEGER
vlm80a48592005-02-25 12:10:27 +00002058 && expr_elements_count(arg, expr));
vlmb2839012004-08-20 13:37:01 +00002059 if(C99_MODE) OUT(".type = ");
vlme0fea712005-08-29 10:31:14 +00002060 OUT("&asn_DEF_");
vlm766cf1e2005-03-04 08:48:53 +00002061 if(complex_contents) {
vlm0c6d3812006-03-21 03:40:38 +00002062 OUT("%s", MKID(expr));
vlm766cf1e2005-03-04 08:48:53 +00002063 if(!(arg->flags & A1C_ALL_DEFS_GLOBAL))
2064 OUT("_%d", expr->_type_unique_index);
vlmdae7f9d2004-08-22 03:25:24 +00002065 } else {
vlm766cf1e2005-03-04 08:48:53 +00002066 OUT("%s", asn1c_type_name(arg, expr, TNF_SAFE));
vlmdae7f9d2004-08-22 03:25:24 +00002067 }
vlm766cf1e2005-03-04 08:48:53 +00002068 OUT(",\n");
vlmb2839012004-08-20 13:37:01 +00002069 if(C99_MODE) OUT(".memb_constraints = ");
2070 if(expr->constraints) {
vlm86f5ed22004-09-26 13:11:31 +00002071 if(arg->flags & A1C_NO_CONSTRAINTS) {
2072 OUT("0,\t/* No check because of -fno-constraints */\n");
2073 } else {
vlm0c6d3812006-03-21 03:40:38 +00002074 char *id = MKID(expr);
vlm86f5ed22004-09-26 13:11:31 +00002075 if(expr->_anonymous_type
vlmbf3c5112005-02-14 20:41:29 +00002076 && !strcmp(expr->Identifier, "Member"))
vlm86f5ed22004-09-26 13:11:31 +00002077 id = asn1c_type_name(arg, expr, TNF_SAFE);
vlm337167e2005-11-26 11:25:14 +00002078 OUT("memb_%s_constraint_%d,\n", id,
vlm766cf1e2005-03-04 08:48:53 +00002079 arg->expr->_type_unique_index);
vlm86f5ed22004-09-26 13:11:31 +00002080 }
vlmb2839012004-08-20 13:37:01 +00002081 } else {
vlm95a476e2005-01-17 12:16:58 +00002082 OUT("0,\t/* Defer constraints checking to the member type */\n");
vlmb2839012004-08-20 13:37:01 +00002083 }
vlm337167e2005-11-26 11:25:14 +00002084 if(C99_MODE) OUT(".per_constraints = ");
2085 if(arg->flags & A1C_GEN_PER) {
2086 if(expr->constraints
2087 || expr->expr_type == ASN_BASIC_ENUMERATED
2088 || expr->expr_type == ASN_CONSTR_CHOICE) {
2089 OUT("&asn_PER_memb_%s_constr_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +00002090 MKID(expr),
vlm337167e2005-11-26 11:25:14 +00002091 expr->_type_unique_index);
2092 } else {
2093 OUT("0,\t/* No PER visible constraints */\n");
2094 }
vlmbf3c5112005-02-14 20:41:29 +00002095 } else {
vlm337167e2005-11-26 11:25:14 +00002096 OUT("0,\t/* PER is not compiled, use -gen-PER */\n");
2097 }
2098 if(C99_MODE) OUT(".default_value = ");
2099 if(try_inline_default(arg, expr, 0)) {
2100 OUT("asn_DFL_%d_set_%" PRIdASN
2101 ",\t/* DEFAULT %" PRIdASN " */\n",
2102 expr->_type_unique_index,
2103 expr->marker.default_value->value.v_integer,
2104 expr->marker.default_value->value.v_integer);
2105 } else {
2106 OUT("0,\n");
2107 }
2108 if(C99_MODE) OUT(".name = ");
2109 if(expr->_anonymous_type && !strcmp(expr->Identifier, "Member")) {
2110 OUT("\"\"\n");
2111 } else {
2112 OUT("\"%s\"\n", expr->Identifier);
vlmbf3c5112005-02-14 20:41:29 +00002113 }
vlmb2839012004-08-20 13:37:01 +00002114 OUT("},\n");
2115 INDENT(-1);
2116
vlm86f5ed22004-09-26 13:11:31 +00002117 if(!expr->constraints || (arg->flags & A1C_NO_CONSTRAINTS))
vlmb2839012004-08-20 13:37:01 +00002118 return 0;
2119
2120 save_target = arg->target->target;
2121 REDIR(OT_CODE);
2122
vlmbf3c5112005-02-14 20:41:29 +00002123 if(expr->_anonymous_type && !strcmp(expr->Identifier, "Member"))
vlmb2839012004-08-20 13:37:01 +00002124 p = asn1c_type_name(arg, expr, TNF_SAFE);
vlm39ba4c42004-09-22 16:06:28 +00002125 else
vlm0c6d3812006-03-21 03:40:38 +00002126 p = MKID(expr);
vlmb2839012004-08-20 13:37:01 +00002127 OUT("static int\n");
vlm337167e2005-11-26 11:25:14 +00002128 OUT("memb_%s_constraint_%d(asn_TYPE_descriptor_t *td, const void *sptr,\n", p, arg->expr->_type_unique_index);
vlmb2839012004-08-20 13:37:01 +00002129 INDENT(+1);
2130 OUT("\t\tasn_app_consume_bytes_f *app_errlog, void *app_key) {\n");
2131 tmp_arg = *arg;
2132 tmp_arg.expr = expr;
2133 if(asn1c_emit_constraint_checking_code(&tmp_arg) == 1) {
vlm86f5ed22004-09-26 13:11:31 +00002134 OUT("return td->check_constraints"
2135 "(td, sptr, app_errlog, app_key);\n");
vlmb2839012004-08-20 13:37:01 +00002136 }
2137 INDENT(-1);
2138 OUT("}\n");
2139 OUT("\n");
2140
2141 REDIR(save_target);
2142
2143 return 0;
2144}
vlm4e554992004-08-25 02:03:12 +00002145
vlm9de248e2004-10-20 15:50:55 +00002146/*
2147 * Generate "asn_DEF_XXX" type definition.
2148 */
vlm4e554992004-08-25 02:03:12 +00002149static int
vlm86f5ed22004-09-26 13:11:31 +00002150emit_type_DEF(arg_t *arg, asn1p_expr_t *expr, enum tvm_compat tv_mode, int tags_count, int all_tags_count, int elements_count, enum etd_spec spec) {
vlm766cf1e2005-03-04 08:48:53 +00002151 int using_type_name = 0;
vlm0c6d3812006-03-21 03:40:38 +00002152 char *p = MKID(expr);
vlm337167e2005-11-26 11:25:14 +00002153
2154 if((arg->flags & A1C_GEN_PER)
2155 && (expr->constraints
2156 || expr->expr_type == ASN_BASIC_ENUMERATED
2157 || expr->expr_type == ASN_CONSTR_CHOICE)
2158 ) {
2159 OUT("static asn_per_constraints_t asn_PER_%s_constr_%d = {\n",
2160 p, expr->_type_unique_index);
2161 if(emit_single_member_PER_constraints(arg, expr))
2162 return -1;
2163 OUT("};\n");
2164 }
vlm4e554992004-08-25 02:03:12 +00002165
vlm12c8f692004-09-06 08:07:29 +00002166 if(HIDE_INNER_DEFS)
2167 OUT("static /* Use -fall-defs-global to expose */\n");
vlm337167e2005-11-26 11:25:14 +00002168 OUT("asn_TYPE_descriptor_t asn_DEF_%s", p);
vlm766cf1e2005-03-04 08:48:53 +00002169 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
2170 OUT(" = {\n");
vlm72425de2004-09-13 08:31:01 +00002171 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +00002172
2173 if(expr->_anonymous_type) {
2174 p = ASN_EXPR_TYPE2STR(expr->expr_type);
2175 OUT("\"%s\",\n", p?p:"");
vlm0c6d3812006-03-21 03:40:38 +00002176 OUT("\"%s\",\n",
2177 p ? asn1c_make_identifier(AMI_CHECK_RESERVED,
2178 0, p, 0) : "");
vlm337167e2005-11-26 11:25:14 +00002179 } else {
2180 OUT("\"%s\",\n", expr->Identifier);
2181 OUT("\"%s\",\n", expr->Identifier);
2182 }
vlm4e554992004-08-25 02:03:12 +00002183
2184 if(expr->expr_type & ASN_CONSTR_MASK) {
vlm766cf1e2005-03-04 08:48:53 +00002185 using_type_name = 1;
vlm4e554992004-08-25 02:03:12 +00002186 p = asn1c_type_name(arg, arg->expr, TNF_SAFE);
vlm337167e2005-11-26 11:25:14 +00002187 } else {
vlm0c6d3812006-03-21 03:40:38 +00002188 p = MKID(expr);
vlm4e554992004-08-25 02:03:12 +00002189 }
2190
vlm766cf1e2005-03-04 08:48:53 +00002191#define FUNCREF(foo) do { \
2192 OUT("%s", p); \
2193 if(HIDE_INNER_DEFS && !using_type_name) \
2194 OUT("_%d", expr->_type_unique_index); \
2195 OUT("_" #foo ",\n"); \
2196} while(0)
2197
2198 FUNCREF(free);
2199 FUNCREF(print);
2200 FUNCREF(constraint);
2201 FUNCREF(decode_ber);
2202 FUNCREF(encode_der);
2203 FUNCREF(decode_xer);
2204 FUNCREF(encode_xer);
vlm337167e2005-11-26 11:25:14 +00002205 if(arg->flags & A1C_GEN_PER)
2206 FUNCREF(decode_uper);
2207 else
2208 OUT("0,\t/* No PER decoder, -gen-PER to enable */\n");
vlm4e554992004-08-25 02:03:12 +00002209
vlm4e554992004-08-25 02:03:12 +00002210 if(expr->expr_type == ASN_CONSTR_CHOICE) {
2211 OUT("CHOICE_outmost_tag,\n");
2212 } else {
2213 OUT("0,\t/* Use generic outmost tag fetcher */\n");
2214 }
2215
vlm0c6d3812006-03-21 03:40:38 +00002216 p = MKID(expr);
vlm4e554992004-08-25 02:03:12 +00002217 if(tags_count) {
vlm337167e2005-11-26 11:25:14 +00002218 OUT("asn_DEF_%s_tags_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +00002219 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002220 OUT("sizeof(asn_DEF_%s_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002221 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002222 OUT("\t/sizeof(asn_DEF_%s_tags_%d[0])",
vlm766cf1e2005-03-04 08:48:53 +00002223 p, expr->_type_unique_index);
vlm72425de2004-09-13 08:31:01 +00002224 if(tv_mode == _TVM_SUBSET
2225 && tags_count != all_tags_count)
2226 OUT(" - %d", all_tags_count - tags_count);
2227 OUT(", /* %d */\n", tags_count);
vlm4e554992004-08-25 02:03:12 +00002228 } else {
vlm72425de2004-09-13 08:31:01 +00002229 OUT("0,\t/* No effective tags (pointer) */\n");
2230 OUT("0,\t/* No effective tags (count) */\n");
2231 }
2232
2233 if(all_tags_count && tv_mode == _TVM_DIFFERENT) {
vlm337167e2005-11-26 11:25:14 +00002234 OUT("asn_DEF_%s_all_tags_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +00002235 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002236 OUT("sizeof(asn_DEF_%s_all_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002237 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002238 OUT("\t/sizeof(asn_DEF_%s_all_tags_%d[0]), /* %d */\n",
vlm766cf1e2005-03-04 08:48:53 +00002239 p, expr->_type_unique_index, all_tags_count);
vlm72425de2004-09-13 08:31:01 +00002240 } else if(all_tags_count) {
vlm337167e2005-11-26 11:25:14 +00002241 OUT("asn_DEF_%s_tags_%d,\t/* Same as above */\n",
vlm766cf1e2005-03-04 08:48:53 +00002242 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002243 OUT("sizeof(asn_DEF_%s_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002244 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002245 OUT("\t/sizeof(asn_DEF_%s_tags_%d[0]), /* %d */\n",
vlm766cf1e2005-03-04 08:48:53 +00002246 p, expr->_type_unique_index, all_tags_count);
vlm72425de2004-09-13 08:31:01 +00002247 } else {
2248 OUT("0,\t/* No tags (pointer) */\n");
2249 OUT("0,\t/* No tags (count) */\n");
vlm4e554992004-08-25 02:03:12 +00002250 }
2251
vlm337167e2005-11-26 11:25:14 +00002252 if(arg->flags & A1C_GEN_PER) {
2253 if(expr->constraints
2254 || expr->expr_type == ASN_BASIC_ENUMERATED
2255 || expr->expr_type == ASN_CONSTR_CHOICE) {
2256 OUT("&asn_PER_%s_constr_%d,\n",
2257 p, expr->_type_unique_index);
2258 } else {
2259 OUT("0,\t/* No PER visible constraints */\n");
2260 }
2261 } else {
2262 OUT("0,\t/* No PER visible constraints */\n");
2263 }
2264
vlm4e554992004-08-25 02:03:12 +00002265 if(elements_count) {
vlm766cf1e2005-03-04 08:48:53 +00002266 OUT("asn_MBR_%s_%d,\n", p, expr->_type_unique_index);
vlm4e554992004-08-25 02:03:12 +00002267 if(expr->expr_type == ASN_CONSTR_SEQUENCE_OF
2268 || expr->expr_type == ASN_CONSTR_SET_OF) {
2269 OUT("%d,\t/* Single element */\n",
2270 elements_count);
2271 assert(elements_count == 1);
2272 } else {
2273 OUT("%d,\t/* Elements count */\n",
2274 elements_count);
2275 }
2276 } else {
vlm4e554992004-08-25 02:03:12 +00002277 if(expr_elements_count(arg, expr))
2278 OUT("0, 0,\t/* Defined elsewhere */\n");
2279 else
2280 OUT("0, 0,\t/* No members */\n");
2281 }
2282
2283 switch(spec) {
2284 case ETD_NO_SPECIFICS:
2285 OUT("0\t/* No specifics */\n");
2286 break;
2287 case ETD_HAS_SPECIFICS:
vlm337167e2005-11-26 11:25:14 +00002288 OUT("&asn_SPC_%s_specs_%d\t/* Additional specs */\n",
vlm766cf1e2005-03-04 08:48:53 +00002289 p, expr->_type_unique_index);
vlm4e554992004-08-25 02:03:12 +00002290 }
vlm72425de2004-09-13 08:31:01 +00002291 INDENT(-1);
vlm4e554992004-08-25 02:03:12 +00002292 OUT("};\n");
2293 OUT("\n");
vlme2bb4432004-08-26 06:20:34 +00002294
2295 return 0;
vlm4e554992004-08-25 02:03:12 +00002296}
vlmddd5a7d2004-09-10 09:18:20 +00002297
vlm39ba4c42004-09-22 16:06:28 +00002298static int
2299expr_as_xmlvaluelist(arg_t *arg, asn1p_expr_t *expr) {
vlm6d44a542005-11-08 03:06:16 +00002300 /*
2301 * X.680, 25.5, Table 5
2302 */
vlm337167e2005-11-26 11:25:14 +00002303 switch(expr_get_type(arg, expr)) {
vlm39ba4c42004-09-22 16:06:28 +00002304 case ASN_BASIC_BOOLEAN:
2305 case ASN_BASIC_ENUMERATED:
2306 case ASN_BASIC_NULL:
2307 return 1;
vlm6d44a542005-11-08 03:06:16 +00002308 case ASN_CONSTR_CHOICE:
2309 return 2;
vlm39ba4c42004-09-22 16:06:28 +00002310 default:
2311 return 0;
2312 }
2313}
vlmaf841972005-01-28 12:18:50 +00002314
2315static int
vlm2e774282005-08-14 15:03:31 +00002316out_name_chain(arg_t *arg, enum onc_flags onc_flags) {
vlmaf841972005-01-28 12:18:50 +00002317 asn1p_expr_t *expr = arg->expr;
2318 char *id;
2319
2320 assert(expr->Identifier);
2321
vlm2e774282005-08-14 15:03:31 +00002322 if((arg->flags & A1C_COMPOUND_NAMES
2323 || onc_flags & ONC_force_compound_name)
vlm766cf1e2005-03-04 08:48:53 +00002324 && ((expr->expr_type & ASN_CONSTR_MASK)
2325 || expr->expr_type == ASN_BASIC_ENUMERATED
vlm96853d82005-08-13 23:51:47 +00002326 || ((expr->expr_type == ASN_BASIC_INTEGER
2327 || expr->expr_type == ASN_BASIC_BIT_STRING)
vlm766cf1e2005-03-04 08:48:53 +00002328 && expr_elements_count(arg, expr))
2329 )
vlmaf841972005-01-28 12:18:50 +00002330 && expr->parent_expr
2331 && expr->parent_expr->Identifier) {
2332 arg_t tmparg = *arg;
2333
2334 tmparg.expr = expr->parent_expr;
vlm766cf1e2005-03-04 08:48:53 +00002335 if(0) tmparg.flags &= ~A1C_COMPOUND_NAMES;
2336
vlm2e774282005-08-14 15:03:31 +00002337 out_name_chain(&tmparg, onc_flags);
vlmaf841972005-01-28 12:18:50 +00002338
vlm92d3cad2005-03-05 00:08:41 +00002339 OUT("__"); /* a separator between id components */
vlm766cf1e2005-03-04 08:48:53 +00002340
vlmaf841972005-01-28 12:18:50 +00002341 /* Fall through */
2342 }
2343
vlm2e774282005-08-14 15:03:31 +00002344 if(onc_flags & ONC_avoid_keywords)
vlm0c6d3812006-03-21 03:40:38 +00002345 id = MKID_safe(expr);
vlmaf841972005-01-28 12:18:50 +00002346 else
vlm0c6d3812006-03-21 03:40:38 +00002347 id = MKID(expr);
vlmaf841972005-01-28 12:18:50 +00002348 OUT("%s", id);
2349
2350 return 0;
2351}
vlm6c4a8502005-08-18 13:38:19 +00002352
2353static int
2354emit_include_dependencies(arg_t *arg) {
2355 asn1p_expr_t *expr = arg->expr;
2356 asn1p_expr_t *memb;
2357
2358 /* Avoid recursive definitions. */
2359 TQ_FOR(memb, &(expr->members), next) {
2360 expr_break_recursion(arg, memb);
2361 }
2362
2363 TQ_FOR(memb, &(expr->members), next) {
2364
2365 if(memb->marker.flags & (EM_INDIRECT | EM_UNRECURSE)) {
2366 if(terminal_structable(arg, memb)) {
2367 int saved_target = arg->target->target;
2368 REDIR(OT_FWD_DECLS);
2369 OUT("%s;\n",
2370 asn1c_type_name(arg, memb, TNF_RSAFE));
2371 REDIR(saved_target);
2372 }
2373 }
2374
2375 if((!(memb->expr_type & ASN_CONSTR_MASK)
2376 && memb->expr_type > ASN_CONSTR_MASK)
2377 || memb->meta_type == AMT_TYPEREF) {
2378 if(memb->marker.flags & EM_UNRECURSE) {
2379 GEN_POSTINCLUDE(asn1c_type_name(arg,
2380 memb, TNF_INCLUDE));
2381 } else {
2382 GEN_INCLUDE(asn1c_type_name(arg,
2383 memb, TNF_INCLUDE));
2384 }
2385 }
2386 }
2387
2388 return 0;
2389}
2390
2391/*
2392 * Check if it is better to make this type indirectly accessed via
2393 * a pointer.
2394 * This may be the case for the following recursive definition:
2395 * Type ::= CHOICE { member Type };
2396 */
2397static int
2398expr_break_recursion(arg_t *arg, asn1p_expr_t *expr) {
vlm6c4a8502005-08-18 13:38:19 +00002399 int ret;
2400
2401 if(expr->marker.flags & EM_UNRECURSE)
2402 return 1; /* Already broken */
2403
vlm6c4a8502005-08-18 13:38:19 +00002404 /* -findirect-choice compiles members of CHOICE as indirect pointers */
2405 if((arg->flags & A1C_INDIRECT_CHOICE)
2406 && arg->expr->expr_type == ASN_CONSTR_CHOICE
vlm337167e2005-11-26 11:25:14 +00002407 && (expr_get_type(arg, expr) & ASN_CONSTR_MASK)
vlm6c4a8502005-08-18 13:38:19 +00002408 ) {
2409 /* Break cross-reference */
2410 expr->marker.flags |= EM_INDIRECT | EM_UNRECURSE;
2411 return 1;
2412 }
2413
2414 if((expr->marker.flags & EM_INDIRECT)
2415 || arg->expr->expr_type == ASN_CONSTR_SET_OF
2416 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF) {
2417 if(terminal_structable(arg, expr)) {
2418 expr->marker.flags |= EM_UNRECURSE;
2419
2420 if(arg->expr->expr_type == ASN_CONSTR_SET_OF
2421 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF) {
2422 /* Don't put EM_INDIRECT even if recursion */
2423 return 1;
2424 }
2425
2426 /* Fall through */
2427 }
2428 }
2429
2430 /* Look for recursive back-references */
2431 ret = expr_defined_recursively(arg, expr);
2432 switch(ret) {
2433 case 2: /* Explicitly break the recursion */
2434 case 1: /* Use safer typing */
2435 expr->marker.flags |= EM_INDIRECT;
2436 expr->marker.flags |= EM_UNRECURSE;
2437 break;
2438 }
2439
2440 return 0;
2441}
2442
2443/*
2444 * Check if the type can be represented using simple `struct TYPE`.
2445 */
2446static asn1p_expr_t *
2447terminal_structable(arg_t *arg, asn1p_expr_t *expr) {
2448 asn1p_expr_t *terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
2449 if(terminal
2450 && !terminal->parent_expr
2451 && (terminal->expr_type & ASN_CONSTR_MASK)) {
2452 return terminal;
2453 }
2454 return 0;
2455}
2456
2457static int
2458asn1c_recurse(arg_t *arg, asn1p_expr_t *expr, int (*callback)(arg_t *arg, void *key), void *key) {
2459 arg_t tmp = *arg;
2460 int maxret = 0;
2461 int ret;
2462
2463 if(expr->_mark) return 0;
2464 expr->_mark |= TM_RECURSION;
2465
2466 /* Invoke callback for every type going into recursion */
2467 tmp.expr = expr;
2468 maxret = callback(&tmp, key);
2469 if(maxret <= 1) {
2470 /*
2471 * Recursively invoke myself and the callbacks.
2472 */
2473 TQ_FOR(tmp.expr, &(expr->members), next) {
2474 ret = asn1c_recurse(&tmp, tmp.expr, callback, key);
2475 if(ret > maxret)
2476 maxret = ret;
2477 if(maxret > 1) break;
2478 }
2479 }
2480
2481 expr->_mark &= ~TM_RECURSION;
2482 return maxret;
2483}
2484
2485static int
2486check_is_refer_to(arg_t *arg, void *key) {
2487 asn1p_expr_t *terminal = terminal_structable(arg, arg->expr);
2488 if(terminal == key) {
2489 if(arg->expr->marker.flags & EM_INDIRECT)
2490 return 1; /* This is almost safe indirection */
2491 return 2;
2492 } else if(terminal) {
2493 /* This might be N-step circular loop. Dive into it. */
2494 return asn1c_recurse(arg, terminal, check_is_refer_to, key);
2495 }
2496 return 0;
2497}
2498
2499/*
2500 * Check if the possibly inner expression defined recursively.
2501 */
2502static int
2503expr_defined_recursively(arg_t *arg, asn1p_expr_t *expr) {
2504 asn1p_expr_t *terminal;
2505 asn1p_expr_t *topmost;
2506
2507 /* If expression is top-level, there's no way it can be recursive. */
2508 if(expr->parent_expr == 0) return 0;
2509 if(expr->expr_type != A1TC_REFERENCE)
2510 return 0; /* Basic types are never recursive */
2511
2512 terminal = terminal_structable(arg, expr);
2513 if(!terminal) return 0; /* Terminal cannot be indirected */
2514
2515 /* Search for the parent container for the given expression */
2516 topmost = expr;
2517 while(topmost->parent_expr)
2518 topmost = topmost->parent_expr;
2519
2520 /* Look inside the terminal type if it mentions the parent expression */
2521 return asn1c_recurse(arg, terminal, check_is_refer_to, topmost);
2522}
vlm337167e2005-11-26 11:25:14 +00002523
2524struct canonical_map_element {
2525 int eidx;
2526 asn1p_expr_t *expr;
2527};
2528static int compar_cameo(const void *ap, const void *bp);
2529static arg_t *cameo_arg;
2530static int *
2531compute_canonical_members_order(arg_t *arg, int el_count) {
2532 struct canonical_map_element *cmap;
2533 int *rmap;
2534 asn1p_expr_t *v;
2535 int eidx = 0;
2536 int ext_start = -1;
2537 int nextmax = -1;
2538 int already_sorted = 1;
2539
2540 cmap = calloc(el_count, sizeof *cmap);
2541 assert(cmap);
2542
2543 TQ_FOR(v, &(arg->expr->members), next) {
2544 if(v->expr_type != A1TC_EXTENSIBLE) {
2545 cmap[eidx].eidx = eidx;
2546 cmap[eidx].expr = v;
2547 eidx++;
2548 } else if(ext_start == -1)
2549 ext_start = eidx;
2550 }
2551
2552 cameo_arg = arg;
2553 if(ext_start == -1) {
2554 /* Sort the whole thing */
2555 qsort(cmap, el_count, sizeof(*cmap), compar_cameo);
2556 } else {
2557 /* Sort root and extensions independently */
2558 qsort(cmap, ext_start, sizeof(*cmap), compar_cameo);
2559 qsort(cmap + ext_start, el_count - ext_start,
2560 sizeof(*cmap), compar_cameo);
2561 }
2562
2563 /* move data back to a simpler map */
2564 rmap = calloc(el_count, sizeof *rmap);
2565 assert(rmap);
2566 for(eidx = 0; eidx < el_count; eidx++) {
2567 rmap[eidx] = cmap[eidx].eidx;
2568 if(rmap[eidx] <= nextmax)
2569 already_sorted = 0;
2570 else
2571 nextmax = rmap[eidx];
2572 }
2573 free(cmap);
2574
2575 if(already_sorted) { free(rmap); rmap = 0; }
2576 return rmap;
2577}
2578static int compar_cameo(const void *ap, const void *bp) {
2579 const struct canonical_map_element *a = (const void *)ap;
2580 const struct canonical_map_element *b = (const void *)bp;
2581 struct asn1p_type_tag_s atag, btag;
2582 arg_t *arg = cameo_arg;
2583
2584 if(asn1f_fetch_outmost_tag(arg->asn, a->expr->module, a->expr,
2585 &atag, AFT_IMAGINARY_ANY | AFT_CANON_CHOICE))
2586 return 1;
2587
2588 if(asn1f_fetch_outmost_tag(arg->asn, b->expr->module, b->expr,
2589 &btag, AFT_IMAGINARY_ANY | AFT_CANON_CHOICE))
2590 return -1;
2591
2592 if(atag.tag_class < btag.tag_class)
2593 return -1;
2594 if(atag.tag_class > btag.tag_class)
2595 return 1;
2596 if(atag.tag_value < btag.tag_value)
2597 return -1;
2598 if(atag.tag_value > btag.tag_value)
2599 return 1;
2600 return 0;
2601
2602}