blob: decc56d8036d164de3c3cfb44543a5399f2ca772 [file] [log] [blame]
vlmfa67ddc2004-06-03 03:38:44 +00001/*-
vlm390a9022005-02-14 17:21:22 +00002 * Copyright (c) 2003, 2004, 2005 Lev Walkin <vlm@lionet.info>.
3 * All rights reserved.
vlmfa67ddc2004-06-03 03:38:44 +00004 * Redistribution and modifications are permitted subject to BSD license.
5 */
vlm39ba4c42004-09-22 16:06:28 +00006#include <asn_internal.h>
vlmfa67ddc2004-06-03 03:38:44 +00007#include <constr_SEQUENCE.h>
8
9/*
10 * Number of bytes left for this structure.
11 * (ctx->left) indicates the number of bytes _transferred_ for the structure.
12 * (size) contains the number of bytes in the buffer passed.
13 */
vlmc5190612004-08-18 04:53:32 +000014#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
vlmfa67ddc2004-06-03 03:38:44 +000015
16/*
17 * If the subprocessor function returns with an indication that it wants
18 * more data, it may well be a fatal decoding problem, because the
19 * size is constrained by the <TLV>'s L, even if the buffer size allows
20 * reading more data.
21 * For example, consider the buffer containing the following TLVs:
22 * <T:5><L:1><V> <T:6>...
23 * The TLV length clearly indicates that one byte is expected in V, but
24 * if the V processor returns with "want more data" even if the buffer
25 * contains way more data than the V processor have seen.
26 */
vlmb42843a2004-06-05 08:17:50 +000027#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
vlmfa67ddc2004-06-03 03:38:44 +000028
29/*
30 * This macro "eats" the part of the buffer which is definitely "consumed",
31 * i.e. was correctly converted into local representation or rightfully skipped.
32 */
vlmef1b4c02004-09-23 22:06:26 +000033#undef ADVANCE
vlmfa67ddc2004-06-03 03:38:44 +000034#define ADVANCE(num_bytes) do { \
35 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +000036 ptr = ((const char *)ptr) + num;\
vlmfa67ddc2004-06-03 03:38:44 +000037 size -= num; \
38 if(ctx->left >= 0) \
39 ctx->left -= num; \
40 consumed_myself += num; \
41 } while(0)
42
43/*
44 * Switch to the next phase of parsing.
45 */
vlmef1b4c02004-09-23 22:06:26 +000046#undef NEXT_PHASE
47#undef PHASE_OUT
vlmfa67ddc2004-06-03 03:38:44 +000048#define NEXT_PHASE(ctx) do { \
49 ctx->phase++; \
50 ctx->step = 0; \
51 } while(0)
52#define PHASE_OUT(ctx) do { ctx->phase = 10; } while(0)
53
54/*
55 * Return a standardized complex structure.
56 */
vlmef1b4c02004-09-23 22:06:26 +000057#undef RETURN
vlmfa67ddc2004-06-03 03:38:44 +000058#define RETURN(_code) do { \
59 rval.code = _code; \
60 rval.consumed = consumed_myself;\
61 return rval; \
62 } while(0)
63
64/*
65 * Check whether we are inside the extensions group.
66 */
67#define IN_EXTENSION_GROUP(specs, memb_idx) \
68 ( ((memb_idx) > (specs)->ext_after) \
69 &&((memb_idx) < (specs)->ext_before))
70
vlm31473082004-06-06 07:20:02 +000071
72/*
73 * Tags are canonically sorted in the tag2element map.
74 */
75static int
76_t2e_cmp(const void *ap, const void *bp) {
vlmef6355b2004-09-29 13:26:15 +000077 const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap;
78 const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp;
vlmda674682004-08-11 09:07:36 +000079
vlm31473082004-06-06 07:20:02 +000080 int a_class = BER_TAG_CLASS(a->el_tag);
81 int b_class = BER_TAG_CLASS(b->el_tag);
82
83 if(a_class == b_class) {
84 ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag);
85 ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag);
86
vlm1692da02004-06-14 13:42:23 +000087 if(a_value == b_value) {
vlme4ee6ee2004-06-14 14:11:14 +000088 if(a->el_no > b->el_no)
89 return 1;
vlm1692da02004-06-14 13:42:23 +000090 /*
91 * Important: we do not check
vlme4ee6ee2004-06-14 14:11:14 +000092 * for a->el_no <= b->el_no!
vlm1692da02004-06-14 13:42:23 +000093 */
vlm31473082004-06-06 07:20:02 +000094 return 0;
vlm1692da02004-06-14 13:42:23 +000095 } else if(a_value < b_value)
vlm31473082004-06-06 07:20:02 +000096 return -1;
97 else
98 return 1;
99 } else if(a_class < b_class) {
100 return -1;
101 } else {
102 return 1;
103 }
104}
105
106
vlmfa67ddc2004-06-03 03:38:44 +0000107/*
108 * The decoder of the SEQUENCE type.
109 */
vlm9de248e2004-10-20 15:50:55 +0000110asn_dec_rval_t
vlmef6355b2004-09-29 13:26:15 +0000111SEQUENCE_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
vlmb02dcc62005-03-10 18:52:02 +0000112 void **struct_ptr, const void *ptr, size_t size, int tag_mode) {
vlmfa67ddc2004-06-03 03:38:44 +0000113 /*
114 * Bring closer parts of structure description.
115 */
vlmef6355b2004-09-29 13:26:15 +0000116 asn_SEQUENCE_specifics_t *specs = (asn_SEQUENCE_specifics_t *)td->specifics;
117 asn_TYPE_member_t *elements = td->elements;
vlmfa67ddc2004-06-03 03:38:44 +0000118
119 /*
120 * Parts of the structure being constructed.
121 */
122 void *st = *struct_ptr; /* Target structure. */
vlmef6355b2004-09-29 13:26:15 +0000123 asn_struct_ctx_t *ctx; /* Decoder context */
vlmfa67ddc2004-06-03 03:38:44 +0000124
125 ber_tlv_tag_t tlv_tag; /* T from TLV */
vlm9de248e2004-10-20 15:50:55 +0000126 asn_dec_rval_t rval; /* Return code from subparsers */
vlmfa67ddc2004-06-03 03:38:44 +0000127
128 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
129 int edx; /* SEQUENCE element's index */
130
vlme413c122004-08-20 13:23:42 +0000131 ASN_DEBUG("Decoding %s as SEQUENCE", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000132
133 /*
134 * Create the target structure if it is not present already.
135 */
136 if(st == 0) {
137 st = *struct_ptr = CALLOC(1, specs->struct_size);
138 if(st == 0) {
139 RETURN(RC_FAIL);
140 }
141 }
142
143 /*
144 * Restore parsing context.
145 */
vlmef6355b2004-09-29 13:26:15 +0000146 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000147
148 /*
149 * Start to parse where left previously
150 */
151 switch(ctx->phase) {
152 case 0:
153 /*
154 * PHASE 0.
155 * Check that the set of tags associated with given structure
156 * perfectly fits our expectations.
157 */
158
vlmef6355b2004-09-29 13:26:15 +0000159 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
vlm6678cb12004-09-26 13:10:40 +0000160 tag_mode, 1, &ctx->left, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000161 if(rval.code != RC_OK) {
162 ASN_DEBUG("%s tagging check failed: %d",
vlme413c122004-08-20 13:23:42 +0000163 td->name, rval.code);
vlm1cc0f2e2004-10-05 06:36:57 +0000164 return rval;
vlmfa67ddc2004-06-03 03:38:44 +0000165 }
166
167 if(ctx->left >= 0)
168 ctx->left += rval.consumed; /* ?Substracted below! */
169 ADVANCE(rval.consumed);
170
171 NEXT_PHASE(ctx);
172
173 ASN_DEBUG("Structure consumes %ld bytes, buffer %ld",
174 (long)ctx->left, (long)size);
175
176 /* Fall through */
177 case 1:
178 /*
179 * PHASE 1.
180 * From the place where we've left it previously,
181 * try to decode the next member from the list of
182 * this structure's elements.
183 * (ctx->step) stores the member being processed
184 * between invocations and the microphase {0,1} of parsing
185 * that member:
186 * step = (<member_number> * 2 + <microphase>).
187 */
vlme413c122004-08-20 13:23:42 +0000188 for(edx = (ctx->step >> 1); edx < td->elements_count;
vlmfa67ddc2004-06-03 03:38:44 +0000189 edx++, ctx->step = (ctx->step & ~1) + 2) {
190 void *memb_ptr; /* Pointer to the member */
vlmda674682004-08-11 09:07:36 +0000191 void **memb_ptr2; /* Pointer to that pointer */
vlmfa67ddc2004-06-03 03:38:44 +0000192 ssize_t tag_len; /* Length of TLV's T */
193 int opt_edx_end; /* Next non-optional element */
vlm31473082004-06-06 07:20:02 +0000194 int use_bsearch;
vlmfa67ddc2004-06-03 03:38:44 +0000195 int n;
196
197 if(ctx->step & 1)
198 goto microphase2;
199
200 /*
201 * MICROPHASE 1: Synchronize decoding.
202 */
vlmddd5a7d2004-09-10 09:18:20 +0000203 ASN_DEBUG("In %s SEQUENCE left %d, edx=%d flags=%d"
204 " opt=%d ec=%d",
205 td->name, (int)ctx->left, edx,
206 elements[edx].flags, elements[edx].optional,
207 td->elements_count);
vlmfa67ddc2004-06-03 03:38:44 +0000208
209 if(ctx->left == 0 /* No more stuff is expected */
210 && (
211 /* Explicit OPTIONAL specification reaches the end */
vlmddd5a7d2004-09-10 09:18:20 +0000212 (edx + elements[edx].optional
213 == td->elements_count)
vlmfa67ddc2004-06-03 03:38:44 +0000214 ||
215 /* All extensions are optional */
216 (IN_EXTENSION_GROUP(specs, edx)
vlme413c122004-08-20 13:23:42 +0000217 && specs->ext_before > td->elements_count)
vlmfa67ddc2004-06-03 03:38:44 +0000218 )
219 ) {
vlme413c122004-08-20 13:23:42 +0000220 ASN_DEBUG("End of SEQUENCE %s", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000221 /*
222 * Found the legitimate end of the structure.
223 */
224 PHASE_OUT(ctx);
225 RETURN(RC_OK);
226 }
227
228 /*
229 * Fetch the T from TLV.
230 */
231 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
vlm1308d2b2004-09-10 15:49:15 +0000232 ASN_DEBUG("Current tag in %s SEQUENCE for element %d "
vlmef1b4c02004-09-23 22:06:26 +0000233 "(%s) is %s encoded in %d bytes, of frame %ld",
vlm1308d2b2004-09-10 15:49:15 +0000234 td->name, edx, elements[edx].name,
235 ber_tlv_tag_string(tlv_tag), (int)tag_len, (long)LEFT);
vlmfa67ddc2004-06-03 03:38:44 +0000236 switch(tag_len) {
237 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
238 /* Fall through */
239 case -1: RETURN(RC_FAIL);
240 }
241
vlmb02dcc62005-03-10 18:52:02 +0000242 if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) {
vlm1cc0f2e2004-10-05 06:36:57 +0000243 if(LEFT < 2) {
244 if(SIZE_VIOLATION)
245 RETURN(RC_FAIL);
246 else
247 RETURN(RC_WMORE);
vlmb02dcc62005-03-10 18:52:02 +0000248 } else if(((const uint8_t *)ptr)[1] == 0) {
vlm1cc0f2e2004-10-05 06:36:57 +0000249 ASN_DEBUG("edx = %d, opt = %d, ec=%d",
250 edx, elements[edx].optional,
251 td->elements_count);
252 if((edx + elements[edx].optional
253 == td->elements_count)
254 || (IN_EXTENSION_GROUP(specs, edx)
255 && specs->ext_before
256 > td->elements_count)) {
257 /*
258 * Yeah, baby! Found the terminator
259 * of the indefinite length structure.
260 */
261 /*
262 * Proceed to the canonical
263 * finalization function.
264 * No advancing is necessary.
265 */
266 goto phase3;
267 }
268 }
269 }
270
vlmfa67ddc2004-06-03 03:38:44 +0000271 /*
272 * Find the next available type with this tag.
273 */
vlm31473082004-06-06 07:20:02 +0000274 use_bsearch = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000275 opt_edx_end = edx + elements[edx].optional + 1;
vlme413c122004-08-20 13:23:42 +0000276 if(opt_edx_end > td->elements_count)
277 opt_edx_end = td->elements_count; /* Cap */
vlm5d219bf2004-07-01 00:48:04 +0000278 else if(opt_edx_end - edx > 8) {
vlm1692da02004-06-14 13:42:23 +0000279 /* Limit the scope of linear search... */
vlm5d219bf2004-07-01 00:48:04 +0000280 opt_edx_end = edx + 8;
vlm31473082004-06-06 07:20:02 +0000281 use_bsearch = 1;
vlm1692da02004-06-14 13:42:23 +0000282 /* ... and resort to bsearch() */
vlm31473082004-06-06 07:20:02 +0000283 }
vlmfa67ddc2004-06-03 03:38:44 +0000284 for(n = edx; n < opt_edx_end; n++) {
285 if(BER_TAGS_EQUAL(tlv_tag, elements[n].tag)) {
286 /*
287 * Found element corresponding to the tag
288 * being looked at.
289 * Reposition over the right element.
290 */
291 edx = n;
vlm31473082004-06-06 07:20:02 +0000292 ctx->step = 1 + 2 * edx; /* Remember! */
293 goto microphase2;
vlm060fe2a2004-09-10 09:37:12 +0000294 } else if(elements[n].flags & ATF_OPEN_TYPE) {
295 /*
296 * This is the ANY type, which may bear
297 * any flag whatsoever.
298 */
299 edx = n;
300 ctx->step = 1 + 2 * edx; /* Remember! */
301 goto microphase2;
vlm31473082004-06-06 07:20:02 +0000302 } else if(elements[n].tag == (ber_tlv_tag_t)-1) {
303 use_bsearch = 1;
vlmfa67ddc2004-06-03 03:38:44 +0000304 break;
305 }
306 }
vlm31473082004-06-06 07:20:02 +0000307 if(use_bsearch) {
308 /*
vlm141874a2004-09-04 06:17:35 +0000309 * Resort to a binary search over
vlm31473082004-06-06 07:20:02 +0000310 * sorted array of tags.
311 */
vlmef6355b2004-09-29 13:26:15 +0000312 asn_TYPE_tag2member_t *t2m;
313 asn_TYPE_tag2member_t key;
vlm31473082004-06-06 07:20:02 +0000314 key.el_tag = tlv_tag;
vlm1692da02004-06-14 13:42:23 +0000315 key.el_no = edx;
vlma8f4a4c2005-01-17 14:32:45 +0000316 t2m = (asn_TYPE_tag2member_t *)bsearch(&key,
vlmda674682004-08-11 09:07:36 +0000317 specs->tag2el, specs->tag2el_count,
vlm31473082004-06-06 07:20:02 +0000318 sizeof(specs->tag2el[0]), _t2e_cmp);
vlm1692da02004-06-14 13:42:23 +0000319 if(t2m) {
vlmef6355b2004-09-29 13:26:15 +0000320 asn_TYPE_tag2member_t *best = 0;
321 asn_TYPE_tag2member_t *t2m_f, *t2m_l;
vlm1692da02004-06-14 13:42:23 +0000322 int edx_max = edx + elements[edx].optional;
vlm31473082004-06-06 07:20:02 +0000323 /*
324 * Rewind to the first element with that tag,
325 * `cause bsearch() does not guarantee order.
326 */
vlm1692da02004-06-14 13:42:23 +0000327 t2m_f = t2m + t2m->toff_first;
328 t2m_l = t2m + t2m->toff_last;
329 for(t2m = t2m_f; t2m <= t2m_l; t2m++) {
330 if(t2m->el_no > edx_max) break;
331 if(t2m->el_no < edx) continue;
332 best = t2m;
333 }
334 if(best) {
335 edx = best->el_no;
336 ctx->step = 1 + 2 * edx;
337 goto microphase2;
338 }
vlm31473082004-06-06 07:20:02 +0000339 }
340 n = opt_edx_end;
341 }
vlmfa67ddc2004-06-03 03:38:44 +0000342 if(n == opt_edx_end) {
343 /*
344 * If tag is unknown, it may be either
345 * an unknown (thus, incorrect) tag,
346 * or an extension (...),
347 * or an end of the indefinite-length structure.
348 */
vlmfa67ddc2004-06-03 03:38:44 +0000349 if(!IN_EXTENSION_GROUP(specs, edx)) {
vlm1cc0f2e2004-10-05 06:36:57 +0000350 ASN_DEBUG("Unexpected tag %s (at %d)",
351 ber_tlv_tag_string(tlv_tag), edx);
vlm31473082004-06-06 07:20:02 +0000352 ASN_DEBUG("Expected tag %s (%s)%s",
vlmfa67ddc2004-06-03 03:38:44 +0000353 ber_tlv_tag_string(elements[edx].tag),
vlm31473082004-06-06 07:20:02 +0000354 elements[edx].name,
vlmfa67ddc2004-06-03 03:38:44 +0000355 elements[edx].optional
356 ?" or alternatives":"");
357 RETURN(RC_FAIL);
vlmfa67ddc2004-06-03 03:38:44 +0000358 } else {
359 /* Skip this tag */
360 ssize_t skip;
361
vlm6130a2f2004-09-29 14:19:14 +0000362 skip = ber_skip_length(opt_codec_ctx,
vlmfa67ddc2004-06-03 03:38:44 +0000363 BER_TLV_CONSTRUCTED(ptr),
vlmb02dcc62005-03-10 18:52:02 +0000364 (const char *)ptr + tag_len,
365 LEFT - tag_len);
vlmfa67ddc2004-06-03 03:38:44 +0000366 ASN_DEBUG("Skip length %d in %s",
vlme413c122004-08-20 13:23:42 +0000367 (int)skip, td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000368 switch(skip) {
369 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
370 /* Fall through */
371 case -1: RETURN(RC_FAIL);
372 }
373
374 ADVANCE(skip + tag_len);
375 ctx->step -= 2;
376 edx--;
377 continue; /* Try again with the next tag */
378 }
379 }
380
381 /*
382 * MICROPHASE 2: Invoke the member-specific decoder.
383 */
384 ctx->step |= 1; /* Confirm entering next microphase */
385 microphase2:
vlme413c122004-08-20 13:23:42 +0000386 ASN_DEBUG("Inside SEQUENCE %s MF2", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000387
388 /*
389 * Compute the position of the member inside a structure,
390 * and also a type of containment (it may be contained
391 * as pointer or using inline inclusion).
392 */
vlmddd5a7d2004-09-10 09:18:20 +0000393 if(elements[edx].flags & ATF_POINTER) {
394 /* Member is a pointer to another structure */
vlmda674682004-08-11 09:07:36 +0000395 memb_ptr2 = (void **)((char *)st + elements[edx].memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000396 } else {
397 /*
398 * A pointer to a pointer
399 * holding the start of the structure
400 */
401 memb_ptr = (char *)st + elements[edx].memb_offset;
402 memb_ptr2 = &memb_ptr;
403 }
404 /*
405 * Invoke the member fetch routine according to member's type
406 */
vlmef6355b2004-09-29 13:26:15 +0000407 rval = elements[edx].type->ber_decoder(opt_codec_ctx,
vlmda674682004-08-11 09:07:36 +0000408 elements[edx].type,
vlmfa67ddc2004-06-03 03:38:44 +0000409 memb_ptr2, ptr, LEFT,
410 elements[edx].tag_mode);
vlmef16e8c2004-09-04 04:44:11 +0000411 ASN_DEBUG("In %s SEQUENCE decoded %d %s of %d "
vlmeca9d622004-09-24 20:59:27 +0000412 "in %d bytes rval.code %d, size=%d",
vlme413c122004-08-20 13:23:42 +0000413 td->name, edx, elements[edx].type->name,
vlmeca9d622004-09-24 20:59:27 +0000414 (int)LEFT, (int)rval.consumed, rval.code, (int)size);
vlmfa67ddc2004-06-03 03:38:44 +0000415 switch(rval.code) {
416 case RC_OK:
417 break;
418 case RC_WMORE: /* More data expected */
419 if(!SIZE_VIOLATION) {
420 ADVANCE(rval.consumed);
421 RETURN(RC_WMORE);
422 }
vlmeca9d622004-09-24 20:59:27 +0000423 ASN_DEBUG("Size violation (c->l=%ld <= s=%ld)",
424 (long)ctx->left, (long)size);
vlmfa67ddc2004-06-03 03:38:44 +0000425 /* Fall through */
426 case RC_FAIL: /* Fatal error */
427 RETURN(RC_FAIL);
428 } /* switch(rval) */
429
430 ADVANCE(rval.consumed);
431 } /* for(all structure members) */
432
433 phase3:
434 ctx->phase = 3;
435 case 3: /* 00 and other tags expected */
436 case 4: /* only 00's expected */
437
438 ASN_DEBUG("SEQUENCE %s Leftover: %ld, size = %ld",
vlme413c122004-08-20 13:23:42 +0000439 td->name, (long)ctx->left, (long)size);
vlmfa67ddc2004-06-03 03:38:44 +0000440
441 /*
442 * Skip everything until the end of the SEQUENCE.
443 */
444 while(ctx->left) {
445 ssize_t tl, ll;
446
447 tl = ber_fetch_tag(ptr, LEFT, &tlv_tag);
448 switch(tl) {
449 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
450 /* Fall through */
451 case -1: RETURN(RC_FAIL);
452 }
453
454 /*
455 * If expected <0><0>...
456 */
457 if(ctx->left < 0
vlmb02dcc62005-03-10 18:52:02 +0000458 && ((const uint8_t *)ptr)[0] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000459 if(LEFT < 2) {
460 if(SIZE_VIOLATION)
461 RETURN(RC_FAIL);
462 else
463 RETURN(RC_WMORE);
vlmb02dcc62005-03-10 18:52:02 +0000464 } else if(((const uint8_t *)ptr)[1] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000465 /*
466 * Correctly finished with <0><0>.
467 */
468 ADVANCE(2);
469 ctx->left++;
470 ctx->phase = 4;
471 continue;
472 }
473 }
474
vlme413c122004-08-20 13:23:42 +0000475 if(!IN_EXTENSION_GROUP(specs, td->elements_count)
vlmfa67ddc2004-06-03 03:38:44 +0000476 || ctx->phase == 4) {
477 ASN_DEBUG("Unexpected continuation "
478 "of a non-extensible type "
479 "%s (SEQUENCE): %s",
vlme413c122004-08-20 13:23:42 +0000480 td->name,
vlmfa67ddc2004-06-03 03:38:44 +0000481 ber_tlv_tag_string(tlv_tag));
482 RETURN(RC_FAIL);
483 }
484
vlm6130a2f2004-09-29 14:19:14 +0000485 ll = ber_skip_length(opt_codec_ctx,
vlmfa67ddc2004-06-03 03:38:44 +0000486 BER_TLV_CONSTRUCTED(ptr),
vlmb02dcc62005-03-10 18:52:02 +0000487 (const char *)ptr + tl, LEFT - tl);
vlmfa67ddc2004-06-03 03:38:44 +0000488 switch(ll) {
489 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
490 /* Fall through */
491 case -1: RETURN(RC_FAIL);
492 }
493
494 ADVANCE(tl + ll);
495 }
496
497 PHASE_OUT(ctx);
498 }
499
500 RETURN(RC_OK);
501}
502
vlm31473082004-06-06 07:20:02 +0000503
vlmfa67ddc2004-06-03 03:38:44 +0000504/*
505 * The DER encoder of the SEQUENCE type.
506 */
vlm39ba4c42004-09-22 16:06:28 +0000507asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000508SEQUENCE_encode_der(asn_TYPE_descriptor_t *td,
vlm31f7a1c2005-08-22 14:19:28 +0000509 void *sptr, int tag_mode, ber_tlv_tag_t tag,
vlmfa67ddc2004-06-03 03:38:44 +0000510 asn_app_consume_bytes_f *cb, void *app_key) {
vlmfa67ddc2004-06-03 03:38:44 +0000511 size_t computed_size = 0;
vlm39ba4c42004-09-22 16:06:28 +0000512 asn_enc_rval_t erval;
vlmfa67ddc2004-06-03 03:38:44 +0000513 ssize_t ret;
514 int edx;
515
516 ASN_DEBUG("%s %s as SEQUENCE",
vlme413c122004-08-20 13:23:42 +0000517 cb?"Encoding":"Estimating", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000518
519 /*
520 * Gather the length of the underlying members sequence.
521 */
vlme413c122004-08-20 13:23:42 +0000522 for(edx = 0; edx < td->elements_count; edx++) {
vlmef6355b2004-09-29 13:26:15 +0000523 asn_TYPE_member_t *elm = &td->elements[edx];
vlmfa67ddc2004-06-03 03:38:44 +0000524 void *memb_ptr;
vlmddd5a7d2004-09-10 09:18:20 +0000525 if(elm->flags & ATF_POINTER) {
vlm31f7a1c2005-08-22 14:19:28 +0000526 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
527 if(!memb_ptr) {
528 if(elm->optional) continue;
529 /* Mandatory element is missing */
530 _ASN_ENCODE_FAILED;
531 }
vlmfa67ddc2004-06-03 03:38:44 +0000532 } else {
vlm31f7a1c2005-08-22 14:19:28 +0000533 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000534 }
535 erval = elm->type->der_encoder(elm->type, memb_ptr,
536 elm->tag_mode, elm->tag,
537 0, 0);
538 if(erval.encoded == -1)
539 return erval;
540 computed_size += erval.encoded;
541 ASN_DEBUG("Member %d %s estimated %ld bytes",
542 edx, elm->name, (long)erval.encoded);
543 }
544
545 /*
546 * Encode the TLV for the sequence itself.
547 */
vlm6678cb12004-09-26 13:10:40 +0000548 ret = der_write_tags(td, computed_size, tag_mode, 1, tag, cb, app_key);
vlmfa67ddc2004-06-03 03:38:44 +0000549 ASN_DEBUG("Wrote tags: %ld (+%ld)", (long)ret, (long)computed_size);
vlm31f7a1c2005-08-22 14:19:28 +0000550 if(ret == -1)
551 _ASN_ENCODE_FAILED;
vlmfa67ddc2004-06-03 03:38:44 +0000552 erval.encoded = computed_size + ret;
553
vlm337167e2005-11-26 11:25:14 +0000554 if(!cb) _ASN_ENCODED_OK(erval);
vlmfa67ddc2004-06-03 03:38:44 +0000555
556 /*
557 * Encode all members.
558 */
vlme413c122004-08-20 13:23:42 +0000559 for(edx = 0; edx < td->elements_count; edx++) {
vlmef6355b2004-09-29 13:26:15 +0000560 asn_TYPE_member_t *elm = &td->elements[edx];
vlm39ba4c42004-09-22 16:06:28 +0000561 asn_enc_rval_t tmperval;
vlmfa67ddc2004-06-03 03:38:44 +0000562 void *memb_ptr;
563
vlmddd5a7d2004-09-10 09:18:20 +0000564 if(elm->flags & ATF_POINTER) {
vlm31f7a1c2005-08-22 14:19:28 +0000565 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000566 if(!memb_ptr) continue;
567 } else {
vlm31f7a1c2005-08-22 14:19:28 +0000568 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000569 }
570 tmperval = elm->type->der_encoder(elm->type, memb_ptr,
571 elm->tag_mode, elm->tag,
572 cb, app_key);
573 if(tmperval.encoded == -1)
574 return tmperval;
575 computed_size -= tmperval.encoded;
vlmdc20efc2005-03-02 01:54:28 +0000576 ASN_DEBUG("Member %d %s of SEQUENCE %s encoded in %ld bytes",
577 edx, elm->name, td->name, (long)tmperval.encoded);
vlmfa67ddc2004-06-03 03:38:44 +0000578 }
579
vlm31f7a1c2005-08-22 14:19:28 +0000580 if(computed_size != 0)
vlmfa67ddc2004-06-03 03:38:44 +0000581 /*
582 * Encoded size is not equal to the computed size.
583 */
vlm31f7a1c2005-08-22 14:19:28 +0000584 _ASN_ENCODE_FAILED;
vlmfa67ddc2004-06-03 03:38:44 +0000585
vlm337167e2005-11-26 11:25:14 +0000586 _ASN_ENCODED_OK(erval);
vlmfa67ddc2004-06-03 03:38:44 +0000587}
588
vlm390a9022005-02-14 17:21:22 +0000589
vlme1adad52004-10-23 13:27:30 +0000590#undef XER_ADVANCE
591#define XER_ADVANCE(num_bytes) do { \
592 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +0000593 buf_ptr = ((const char *)buf_ptr) + num;\
vlme1adad52004-10-23 13:27:30 +0000594 size -= num; \
595 consumed_myself += num; \
596 } while(0)
597
vlm390a9022005-02-14 17:21:22 +0000598/*
599 * Decode the XER (XML) data.
600 */
vlme1adad52004-10-23 13:27:30 +0000601asn_dec_rval_t
602SEQUENCE_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
603 void **struct_ptr, const char *opt_mname,
vlmb02dcc62005-03-10 18:52:02 +0000604 const void *buf_ptr, size_t size) {
vlme1adad52004-10-23 13:27:30 +0000605 /*
606 * Bring closer parts of structure description.
607 */
vlm390a9022005-02-14 17:21:22 +0000608 asn_SEQUENCE_specifics_t *specs
609 = (asn_SEQUENCE_specifics_t *)td->specifics;
vlme1adad52004-10-23 13:27:30 +0000610 asn_TYPE_member_t *elements = td->elements;
611 const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
612
613 /*
vlm390a9022005-02-14 17:21:22 +0000614 * ... and parts of the structure being constructed.
vlme1adad52004-10-23 13:27:30 +0000615 */
616 void *st = *struct_ptr; /* Target structure. */
617 asn_struct_ctx_t *ctx; /* Decoder context */
618
vlm390a9022005-02-14 17:21:22 +0000619 asn_dec_rval_t rval; /* Return value from a decoder */
vlme1adad52004-10-23 13:27:30 +0000620 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
vlme1adad52004-10-23 13:27:30 +0000621 int edx; /* Element index */
vlm957da5b2005-02-18 14:23:48 +0000622 int edx_end;
vlme1adad52004-10-23 13:27:30 +0000623
624 /*
625 * Create the target structure if it is not present already.
626 */
627 if(st == 0) {
628 st = *struct_ptr = CALLOC(1, specs->struct_size);
629 if(st == 0) RETURN(RC_FAIL);
630 }
631
632 /*
633 * Restore parsing context.
634 */
635 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
636
637
638 /*
639 * Phases of XER/XML processing:
640 * Phase 0: Check that the opening tag matches our expectations.
641 * Phase 1: Processing body and reacting on closing tag.
642 * Phase 2: Processing inner type.
vlmcb7222f2005-02-18 16:10:40 +0000643 * Phase 3: Skipping unknown extensions.
644 * Phase 4: PHASED OUT
vlme1adad52004-10-23 13:27:30 +0000645 */
vlmcb7222f2005-02-18 16:10:40 +0000646 for(edx = ctx->step; ctx->phase <= 3;) {
vlme1adad52004-10-23 13:27:30 +0000647 pxer_chunk_type_e ch_type; /* XER chunk type */
648 ssize_t ch_size; /* Chunk size */
649 xer_check_tag_e tcv; /* Tag check value */
650 asn_TYPE_member_t *elm;
vlm957da5b2005-02-18 14:23:48 +0000651 int n;
vlme1adad52004-10-23 13:27:30 +0000652
653 /*
vlm390a9022005-02-14 17:21:22 +0000654 * Go inside the inner member of a sequence.
vlme1adad52004-10-23 13:27:30 +0000655 */
656 if(ctx->phase == 2) {
657 asn_dec_rval_t tmprval;
vlme1adad52004-10-23 13:27:30 +0000658 void *memb_ptr; /* Pointer to the member */
659 void **memb_ptr2; /* Pointer to that pointer */
660
vlma351c2b2004-10-26 10:12:14 +0000661 elm = &td->elements[edx];
662
vlme1adad52004-10-23 13:27:30 +0000663 if(elm->flags & ATF_POINTER) {
664 /* Member is a pointer to another structure */
665 memb_ptr2 = (void **)((char *)st
666 + elm->memb_offset);
667 } else {
668 memb_ptr = (char *)st + elm->memb_offset;
669 memb_ptr2 = &memb_ptr;
670 }
671
vlm390a9022005-02-14 17:21:22 +0000672 /* Invoke the inner type decoder, m.b. multiple times */
vlme1adad52004-10-23 13:27:30 +0000673 tmprval = elm->type->xer_decoder(opt_codec_ctx,
674 elm->type, memb_ptr2, elm->name,
675 buf_ptr, size);
676 XER_ADVANCE(tmprval.consumed);
677 if(tmprval.code != RC_OK)
678 RETURN(tmprval.code);
vlm390a9022005-02-14 17:21:22 +0000679 ctx->phase = 1; /* Back to body processing */
vlme1adad52004-10-23 13:27:30 +0000680 ctx->step = ++edx;
vlm390a9022005-02-14 17:21:22 +0000681 ASN_DEBUG("XER/SEQUENCE phase => %d, step => %d",
682 ctx->phase, ctx->step);
vlme1adad52004-10-23 13:27:30 +0000683 /* Fall through */
684 }
685
686 /*
687 * Get the next part of the XML stream.
688 */
vlmc70f8f32005-02-18 18:06:36 +0000689 ch_size = xer_next_token(&ctx->context, buf_ptr, size,
690 &ch_type);
vlme1adad52004-10-23 13:27:30 +0000691 switch(ch_size) {
692 case -1: RETURN(RC_FAIL);
vlmcb7222f2005-02-18 16:10:40 +0000693 case 0: RETURN(RC_WMORE);
vlme1adad52004-10-23 13:27:30 +0000694 default:
695 switch(ch_type) {
696 case PXER_COMMENT: /* Got XML comment */
697 case PXER_TEXT: /* Ignore free-standing text */
698 XER_ADVANCE(ch_size); /* Skip silently */
699 continue;
700 case PXER_TAG:
701 break; /* Check the rest down there */
702 }
703 }
704
vlm390a9022005-02-14 17:21:22 +0000705 tcv = xer_check_tag(buf_ptr, ch_size, xml_tag);
706 ASN_DEBUG("XER/SEQUENCE: tcv = %d, ph=%d", tcv, ctx->phase);
vlmcb7222f2005-02-18 16:10:40 +0000707
708 /* Skip the extensions section */
709 if(ctx->phase == 3) {
710 switch(xer_skip_unknown(tcv, &ctx->left)) {
711 case -1:
712 ctx->phase = 4;
713 RETURN(RC_FAIL);
714 case 0:
715 XER_ADVANCE(ch_size);
716 continue;
717 case 1:
718 XER_ADVANCE(ch_size);
719 ctx->phase = 1;
720 continue;
721 case 2:
722 ctx->phase = 1;
723 break;
724 }
725 }
726
vlme1adad52004-10-23 13:27:30 +0000727 switch(tcv) {
728 case XCT_CLOSING:
729 if(ctx->phase == 0) break;
vlme1adad52004-10-23 13:27:30 +0000730 ctx->phase = 0;
731 /* Fall through */
732 case XCT_BOTH:
733 if(ctx->phase == 0) {
734 if(edx >= td->elements_count
735 ||
736 /* Explicit OPTIONAL specs reaches the end */
737 (edx + elements[edx].optional
738 == td->elements_count)
739 ||
740 /* All extensions are optional */
741 (IN_EXTENSION_GROUP(specs, edx)
742 && specs->ext_before
743 > td->elements_count)
744 ) {
745 XER_ADVANCE(ch_size);
vlmcb7222f2005-02-18 16:10:40 +0000746 ctx->phase = 4; /* Phase out */
vlm390a9022005-02-14 17:21:22 +0000747 RETURN(RC_OK);
vlme1adad52004-10-23 13:27:30 +0000748 } else {
749 ASN_DEBUG("Premature end of XER SEQUENCE");
750 RETURN(RC_FAIL);
751 }
752 }
753 /* Fall through */
754 case XCT_OPENING:
755 if(ctx->phase == 0) {
756 XER_ADVANCE(ch_size);
757 ctx->phase = 1; /* Processing body phase */
758 continue;
759 }
vlm22d3f5d2004-10-23 14:58:15 +0000760 /* Fall through */
vlm957da5b2005-02-18 14:23:48 +0000761 case XCT_UNKNOWN_OP:
762 case XCT_UNKNOWN_BO:
vlme1adad52004-10-23 13:27:30 +0000763
vlmd960a862005-07-03 05:31:02 +0000764 ASN_DEBUG("XER/SEQUENCE: tcv=%d, ph=%d, edx=%d",
765 tcv, ctx->phase, edx);
766 if(ctx->phase != 1) {
vlme1adad52004-10-23 13:27:30 +0000767 break; /* Really unexpected */
vlme1adad52004-10-23 13:27:30 +0000768 }
vlmd960a862005-07-03 05:31:02 +0000769
770 if(edx < td->elements_count) {
771 /*
772 * Search which member corresponds to this tag.
773 */
774 edx_end = edx + elements[edx].optional + 1;
775 if(edx_end > td->elements_count)
776 edx_end = td->elements_count;
777 for(n = edx; n < edx_end; n++) {
778 elm = &td->elements[n];
779 tcv = xer_check_tag(buf_ptr,
780 ch_size, elm->name);
781 switch(tcv) {
782 case XCT_BOTH:
783 case XCT_OPENING:
784 /*
785 * Process this member.
786 */
787 ctx->step = edx = n;
788 ctx->phase = 2;
789 break;
790 case XCT_UNKNOWN_OP:
791 case XCT_UNKNOWN_BO:
792 continue;
793 default:
794 n = edx_end;
795 break; /* Phase out */
796 }
797 break;
798 }
799 if(n != edx_end)
800 continue;
801 } else {
802 ASN_DEBUG("Out of defined members: %d/%d",
803 edx, td->elements_count);
804 }
vlm957da5b2005-02-18 14:23:48 +0000805
806 /* It is expected extension */
807 if(IN_EXTENSION_GROUP(specs,
vlmd960a862005-07-03 05:31:02 +0000808 edx + (edx < td->elements_count
809 ? elements[edx].optional : 0))) {
810 ASN_DEBUG("Got anticipated extension at %d",
811 edx);
vlm957da5b2005-02-18 14:23:48 +0000812 /*
vlmcb7222f2005-02-18 16:10:40 +0000813 * Check for (XCT_BOTH or XCT_UNKNOWN_BO)
814 * By using a mask. Only record a pure
815 * <opening> tags.
vlm957da5b2005-02-18 14:23:48 +0000816 */
vlmcb7222f2005-02-18 16:10:40 +0000817 if(tcv & XCT_CLOSING) {
818 /* Found </extension> without body */
819 } else {
820 ctx->left = 1;
821 ctx->phase = 3; /* Skip ...'s */
822 }
823 XER_ADVANCE(ch_size);
824 continue;
vlm957da5b2005-02-18 14:23:48 +0000825 }
826
827 /* Fall through */
vlme1adad52004-10-23 13:27:30 +0000828 default:
829 break;
830 }
831
832 ASN_DEBUG("Unexpected XML tag in SEQUENCE");
833 break;
834 }
835
vlmcb7222f2005-02-18 16:10:40 +0000836 ctx->phase = 4; /* "Phase out" on hard failure */
vlme1adad52004-10-23 13:27:30 +0000837 RETURN(RC_FAIL);
838}
839
vlm39ba4c42004-09-22 16:06:28 +0000840asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000841SEQUENCE_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
vlm39ba4c42004-09-22 16:06:28 +0000842 int ilevel, enum xer_encoder_flags_e flags,
843 asn_app_consume_bytes_f *cb, void *app_key) {
844 asn_enc_rval_t er;
845 int xcan = (flags & XER_F_CANONICAL);
846 int edx;
847
848 if(!sptr)
849 _ASN_ENCODE_FAILED;
850
851 er.encoded = 0;
852
853 for(edx = 0; edx < td->elements_count; edx++) {
854 asn_enc_rval_t tmper;
vlmef6355b2004-09-29 13:26:15 +0000855 asn_TYPE_member_t *elm = &td->elements[edx];
vlm39ba4c42004-09-22 16:06:28 +0000856 void *memb_ptr;
857 const char *mname = elm->name;
858 unsigned int mlen = strlen(mname);
859
860 if(elm->flags & ATF_POINTER) {
861 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
vlm31f7a1c2005-08-22 14:19:28 +0000862 if(!memb_ptr) {
863 if(elm->optional)
864 continue;
865 /* Mandatory element is missing */
866 _ASN_ENCODE_FAILED;
867 }
vlm39ba4c42004-09-22 16:06:28 +0000868 } else {
869 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
870 }
871
872 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel);
873 _ASN_CALLBACK3("<", 1, mname, mlen, ">", 1);
874
875 /* Print the member itself */
876 tmper = elm->type->xer_encoder(elm->type, memb_ptr,
877 ilevel + 1, flags, cb, app_key);
878 if(tmper.encoded == -1) return tmper;
879
880 _ASN_CALLBACK3("</", 2, mname, mlen, ">", 1);
881 er.encoded += 5 + (2 * mlen) + tmper.encoded;
882 }
883
884 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel - 1);
885
vlm337167e2005-11-26 11:25:14 +0000886 _ASN_ENCODED_OK(er);
vlm84d551b2004-10-03 09:13:02 +0000887cb_failed:
888 _ASN_ENCODE_FAILED;
vlm39ba4c42004-09-22 16:06:28 +0000889}
890
vlmfa67ddc2004-06-03 03:38:44 +0000891int
vlmef6355b2004-09-29 13:26:15 +0000892SEQUENCE_print(asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
vlmfa67ddc2004-06-03 03:38:44 +0000893 asn_app_consume_bytes_f *cb, void *app_key) {
vlmfa67ddc2004-06-03 03:38:44 +0000894 int edx;
895 int ret;
896
vlm6678cb12004-09-26 13:10:40 +0000897 if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000898
899 /* Dump preamble */
vlm6678cb12004-09-26 13:10:40 +0000900 if(cb(td->name, strlen(td->name), app_key) < 0
901 || cb(" ::= {", 6, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000902 return -1;
903
vlme413c122004-08-20 13:23:42 +0000904 for(edx = 0; edx < td->elements_count; edx++) {
vlmef6355b2004-09-29 13:26:15 +0000905 asn_TYPE_member_t *elm = &td->elements[edx];
vlmfa67ddc2004-06-03 03:38:44 +0000906 const void *memb_ptr;
907
vlmddd5a7d2004-09-10 09:18:20 +0000908 if(elm->flags & ATF_POINTER) {
vlmfa67ddc2004-06-03 03:38:44 +0000909 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
vlm31f7a1c2005-08-22 14:19:28 +0000910 if(!memb_ptr) {
911 if(elm->optional) continue;
912 /* Print <absent> line */
913 /* Fall through */
914 }
vlmfa67ddc2004-06-03 03:38:44 +0000915 } else {
916 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
917 }
918
919 /* Indentation */
vlm6678cb12004-09-26 13:10:40 +0000920 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000921
922 /* Print the member's name and stuff */
vlm6678cb12004-09-26 13:10:40 +0000923 if(cb(elm->name, strlen(elm->name), app_key) < 0
924 || cb(": ", 2, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000925 return -1;
926
927 /* Print the member itself */
vlm6678cb12004-09-26 13:10:40 +0000928 ret = elm->type->print_struct(elm->type, memb_ptr, ilevel + 1,
vlmfa67ddc2004-06-03 03:38:44 +0000929 cb, app_key);
930 if(ret) return ret;
vlmfa67ddc2004-06-03 03:38:44 +0000931 }
932
vlm6678cb12004-09-26 13:10:40 +0000933 ilevel--;
934 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000935
vlm6678cb12004-09-26 13:10:40 +0000936 return (cb("}", 1, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000937}
938
939void
vlmef6355b2004-09-29 13:26:15 +0000940SEQUENCE_free(asn_TYPE_descriptor_t *td, void *sptr, int contents_only) {
vlmfa67ddc2004-06-03 03:38:44 +0000941 int edx;
942
943 if(!td || !sptr)
944 return;
945
946 ASN_DEBUG("Freeing %s as SEQUENCE", td->name);
947
vlme413c122004-08-20 13:23:42 +0000948 for(edx = 0; edx < td->elements_count; edx++) {
vlmef6355b2004-09-29 13:26:15 +0000949 asn_TYPE_member_t *elm = &td->elements[edx];
vlmfa67ddc2004-06-03 03:38:44 +0000950 void *memb_ptr;
vlmddd5a7d2004-09-10 09:18:20 +0000951 if(elm->flags & ATF_POINTER) {
vlmfa67ddc2004-06-03 03:38:44 +0000952 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
953 if(memb_ptr)
954 elm->type->free_struct(elm->type, memb_ptr, 0);
955 } else {
956 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
957 elm->type->free_struct(elm->type, memb_ptr, 1);
958 }
959 }
960
961 if(!contents_only) {
962 FREEMEM(sptr);
963 }
964}
965
966int
vlmef6355b2004-09-29 13:26:15 +0000967SEQUENCE_constraint(asn_TYPE_descriptor_t *td, const void *sptr,
vlmfa67ddc2004-06-03 03:38:44 +0000968 asn_app_consume_bytes_f *app_errlog, void *app_key) {
vlmfa67ddc2004-06-03 03:38:44 +0000969 int edx;
970
971 if(!sptr) {
vlme3f0f282004-08-11 09:44:13 +0000972 _ASN_ERRLOG(app_errlog, app_key,
vlm758530a2004-08-22 13:47:59 +0000973 "%s: value not given (%s:%d)",
974 td->name, __FILE__, __LINE__);
vlmfa67ddc2004-06-03 03:38:44 +0000975 return -1;
976 }
977
978 /*
979 * Iterate over structure members and check their validity.
980 */
vlme413c122004-08-20 13:23:42 +0000981 for(edx = 0; edx < td->elements_count; edx++) {
vlmef6355b2004-09-29 13:26:15 +0000982 asn_TYPE_member_t *elm = &td->elements[edx];
vlmfa67ddc2004-06-03 03:38:44 +0000983 const void *memb_ptr;
984
vlmddd5a7d2004-09-10 09:18:20 +0000985 if(elm->flags & ATF_POINTER) {
vlm31473082004-06-06 07:20:02 +0000986 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
vlm31f7a1c2005-08-22 14:19:28 +0000987 if(!memb_ptr) {
988 if(elm->optional)
989 continue;
990 _ASN_ERRLOG(app_errlog, app_key,
991 "%s: mandatory element %s absent (%s:%d)",
992 td->name, elm->name, __FILE__, __LINE__);
993 return -1;
994 }
vlmfa67ddc2004-06-03 03:38:44 +0000995 } else {
996 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
997 }
998
vlme413c122004-08-20 13:23:42 +0000999 if(elm->memb_constraints) {
1000 int ret = elm->memb_constraints(elm->type, memb_ptr,
1001 app_errlog, app_key);
1002 if(ret) return ret;
1003 } else {
1004 int ret = elm->type->check_constraints(elm->type,
1005 memb_ptr, app_errlog, app_key);
1006 if(ret) return ret;
1007 /*
1008 * Cannot inherit it earlier:
1009 * need to make sure we get the updated version.
1010 */
1011 elm->memb_constraints = elm->type->check_constraints;
1012 }
vlmfa67ddc2004-06-03 03:38:44 +00001013 }
1014
1015 return 0;
1016}
vlm337167e2005-11-26 11:25:14 +00001017
1018asn_dec_rval_t
1019SEQUENCE_decode_uper(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
1020 asn_per_constraints_t *constraints, void **sptr, asn_per_data_t *pd) {
1021 asn_SEQUENCE_specifics_t *specs = (asn_SEQUENCE_specifics_t *)td->specifics;
1022 void *st = *sptr; /* Target structure. */
1023 int extpresent = 0; /* Extension additions are present */
1024 uint8_t *opres; /* Presence of optional root members */
1025 asn_per_data_t opmd;
1026 asn_dec_rval_t rv;
1027 int edx;
1028
1029 (void)constraints;
1030
1031 if(!st) {
1032 st = *sptr = CALLOC(1, specs->struct_size);
1033 if(!st) _ASN_DECODE_FAILED;
1034 }
1035
1036 ASN_DEBUG("Decoding %s as SEQUENCE (UPER)", td->name);
1037
1038 /* Handle extensions */
1039 if(specs->ext_before >= 0) {
1040 extpresent = per_get_few_bits(pd, 1);
1041 if(extpresent < 0) _ASN_DECODE_FAILED;
1042 }
1043
1044 /* Prepare a place and read-in the presence bitmap */
1045 if(specs->roms_count) {
1046 opres = (uint8_t *)MALLOC(((specs->roms_count + 7) >> 3) + 1);
1047 if(!opres) _ASN_DECODE_FAILED;
1048 /* Get the presence map */
1049 if(per_get_many_bits(pd, opres, 0, specs->roms_count)) {
1050 FREEMEM(opres);
1051 _ASN_DECODE_FAILED;
1052 }
1053 opmd.buffer = opres;
1054 opmd.nboff = 0;
1055 opmd.nbits = specs->roms_count;
1056 ASN_DEBUG("Read in presence bitmap for %s of %d bits (%x..)",
1057 td->name, specs->roms_count, *opres);
1058 } else {
1059 opres = 0;
1060 memset(&opmd, 0, sizeof opmd);
1061 }
1062
1063 /*
1064 * Get the sequence ROOT elements.
1065 */
1066 for(edx = 0; edx < ((specs->ext_before < 0)
1067 ? td->elements_count : specs->ext_before + 1); edx++) {
1068 asn_TYPE_member_t *elm = &td->elements[edx];
1069 void *memb_ptr; /* Pointer to the member */
1070 void **memb_ptr2; /* Pointer to that pointer */
1071
1072 /* Fetch the pointer to this member */
1073 if(elm->flags & ATF_POINTER) {
1074 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1075 } else {
1076 memb_ptr = (char *)st + elm->memb_offset;
1077 memb_ptr2 = &memb_ptr;
1078 }
1079
1080 /* Deal with optionality */
1081 if(elm->optional) {
1082 int present = per_get_few_bits(&opmd, 1);
1083 ASN_DEBUG("Member %s->%s is optional, p=%d (%d->%d)",
1084 td->name, elm->name, present,
1085 (int)opmd.nboff, (int)opmd.nbits);
1086 if(present == 0) {
1087 /* This element is not present */
1088 if(elm->default_value) {
1089 /* Fill-in DEFAULT */
1090 if(elm->default_value(memb_ptr2)) {
1091 FREEMEM(opres);
1092 _ASN_DECODE_FAILED;
1093 }
1094 }
1095 /* The member is just not present */
1096 continue;
1097 }
1098 /* Fall through */
1099 }
1100
1101 /* Fetch the member from the stream */
1102 ASN_DEBUG("Decoding member %s in %s", elm->name, td->name);
1103 rv = elm->type->uper_decoder(opt_codec_ctx, elm->type,
1104 elm->per_constraints, memb_ptr2, pd);
1105 if(rv.code != RC_OK) {
1106 ASN_DEBUG("Failed decode %s in %s",
1107 elm->name, td->name);
1108 FREEMEM(opres);
1109 return rv;
1110 }
1111 }
1112
1113 /*
1114 * Deal with extensions.
1115 */
1116 if(extpresent) {
1117 ASN_DEBUG("Extensibility for %s: NOT IMPLEMENTED", td->name);
1118 _ASN_DECODE_FAILED;
1119 } else {
1120 for(edx = specs->roms_count; edx < specs->roms_count
1121 + specs->aoms_count; edx++) {
1122 asn_TYPE_member_t *elm = &td->elements[edx];
1123 void *memb_ptr; /* Pointer to the member */
1124 void **memb_ptr2; /* Pointer to that pointer */
1125
1126 if(!elm->default_value) continue;
1127
1128 /* Fetch the pointer to this member */
1129 if(elm->flags & ATF_POINTER) {
1130 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1131 } else {
1132 memb_ptr = (char *)st + elm->memb_offset;
1133 memb_ptr2 = &memb_ptr;
1134 }
1135
1136 /* Set default value */
1137 if(elm->default_value(memb_ptr2)) {
1138 FREEMEM(opres);
1139 _ASN_DECODE_FAILED;
1140 }
1141 }
1142 }
1143
1144 rv.consumed = 0;
1145 rv.code = RC_OK;
vlm229ed3c2005-11-30 14:10:50 +00001146 FREEMEM(opres);
vlm337167e2005-11-26 11:25:14 +00001147 return rv;
1148}
1149