blob: 01328b4fa661c15e7ae15e920a172dd7c6ad3f9a [file] [log] [blame]
vlmfa67ddc2004-06-03 03:38:44 +00001/*-
2 * Copyright (c) 2003, 2004 Lev Walkin <vlm@lionet.info>. All rights reserved.
3 * Redistribution and modifications are permitted subject to BSD license.
4 */
vlm39ba4c42004-09-22 16:06:28 +00005#include <asn_internal.h>
vlmfa67ddc2004-06-03 03:38:44 +00006#include <constr_SET_OF.h>
7#include <asn_SET_OF.h>
vlma3296662004-10-03 09:12:07 +00008#include <assert.h>
vlmfa67ddc2004-06-03 03:38:44 +00009
10/*
11 * Number of bytes left for this structure.
12 * (ctx->left) indicates the number of bytes _transferred_ for the structure.
13 * (size) contains the number of bytes in the buffer passed.
14 */
vlmc5190612004-08-18 04:53:32 +000015#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
vlmfa67ddc2004-06-03 03:38:44 +000016
17/*
18 * If the subprocessor function returns with an indication that it wants
19 * more data, it may well be a fatal decoding problem, because the
20 * size is constrained by the <TLV>'s L, even if the buffer size allows
21 * reading more data.
22 * For example, consider the buffer containing the following TLVs:
23 * <T:5><L:1><V> <T:6>...
24 * The TLV length clearly indicates that one byte is expected in V, but
25 * if the V processor returns with "want more data" even if the buffer
26 * contains way more data than the V processor have seen.
27 */
vlmef1b4c02004-09-23 22:06:26 +000028#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
vlmfa67ddc2004-06-03 03:38:44 +000029
30/*
31 * This macro "eats" the part of the buffer which is definitely "consumed",
32 * i.e. was correctly converted into local representation or rightfully skipped.
33 */
vlmef1b4c02004-09-23 22:06:26 +000034#undef ADVANCE
vlmfa67ddc2004-06-03 03:38:44 +000035#define ADVANCE(num_bytes) do { \
36 size_t num = num_bytes; \
vlmd86c9252004-08-25 01:34:11 +000037 ptr = ((char *)ptr) + num; \
vlmfa67ddc2004-06-03 03:38:44 +000038 size -= num; \
39 if(ctx->left >= 0) \
40 ctx->left -= num; \
41 consumed_myself += num; \
42 } while(0)
43
44/*
45 * Switch to the next phase of parsing.
46 */
vlmef1b4c02004-09-23 22:06:26 +000047#undef NEXT_PHASE
48#undef PHASE_OUT
vlmfa67ddc2004-06-03 03:38:44 +000049#define NEXT_PHASE(ctx) do { \
50 ctx->phase++; \
51 ctx->step = 0; \
52 } while(0)
53#define PHASE_OUT(ctx) do { ctx->phase = 10; } while(0)
54
55/*
56 * Return a standardized complex structure.
57 */
vlmef1b4c02004-09-23 22:06:26 +000058#undef RETURN
vlmfa67ddc2004-06-03 03:38:44 +000059#define RETURN(_code) do { \
60 rval.code = _code; \
61 rval.consumed = consumed_myself;\
62 return rval; \
63 } while(0)
64
65/*
66 * The decoder of the SET OF type.
67 */
vlm9de248e2004-10-20 15:50:55 +000068asn_dec_rval_t
vlmef6355b2004-09-29 13:26:15 +000069SET_OF_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
vlmfa67ddc2004-06-03 03:38:44 +000070 void **struct_ptr, void *ptr, size_t size, int tag_mode) {
71 /*
72 * Bring closer parts of structure description.
73 */
vlmef6355b2004-09-29 13:26:15 +000074 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
75 asn_TYPE_member_t *element = td->elements; /* Single one */
vlmfa67ddc2004-06-03 03:38:44 +000076
77 /*
78 * Parts of the structure being constructed.
79 */
80 void *st = *struct_ptr; /* Target structure. */
vlmef6355b2004-09-29 13:26:15 +000081 asn_struct_ctx_t *ctx; /* Decoder context */
vlmfa67ddc2004-06-03 03:38:44 +000082
83 ber_tlv_tag_t tlv_tag; /* T from TLV */
vlm9de248e2004-10-20 15:50:55 +000084 asn_dec_rval_t rval; /* Return code from subparsers */
vlmfa67ddc2004-06-03 03:38:44 +000085
86 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
87
vlme413c122004-08-20 13:23:42 +000088 ASN_DEBUG("Decoding %s as SET OF", td->name);
vlmfa67ddc2004-06-03 03:38:44 +000089
90 /*
91 * Create the target structure if it is not present already.
92 */
93 if(st == 0) {
94 st = *struct_ptr = CALLOC(1, specs->struct_size);
95 if(st == 0) {
96 RETURN(RC_FAIL);
97 }
98 }
99
100 /*
101 * Restore parsing context.
102 */
vlmef6355b2004-09-29 13:26:15 +0000103 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000104
105 /*
106 * Start to parse where left previously
107 */
108 switch(ctx->phase) {
109 case 0:
110 /*
111 * PHASE 0.
112 * Check that the set of tags associated with given structure
113 * perfectly fits our expectations.
114 */
115
vlmef6355b2004-09-29 13:26:15 +0000116 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
vlm6678cb12004-09-26 13:10:40 +0000117 tag_mode, 1, &ctx->left, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000118 if(rval.code != RC_OK) {
119 ASN_DEBUG("%s tagging check failed: %d",
vlme413c122004-08-20 13:23:42 +0000120 td->name, rval.code);
vlm2ebb08c2004-10-05 06:36:44 +0000121 return rval;
vlmfa67ddc2004-06-03 03:38:44 +0000122 }
123
124 if(ctx->left >= 0)
125 ctx->left += rval.consumed; /* ?Substracted below! */
126 ADVANCE(rval.consumed);
127
128 ASN_DEBUG("Structure consumes %ld bytes, "
129 "buffer %ld", (long)ctx->left, (long)size);
130
131 NEXT_PHASE(ctx);
132 /* Fall through */
133 case 1:
134 /*
135 * PHASE 1.
136 * From the place where we've left it previously,
137 * try to decode the next item.
138 */
139 for(;; ctx->step = 0) {
140 ssize_t tag_len; /* Length of TLV's T */
141
142 if(ctx->step & 1)
143 goto microphase2;
144
145 /*
146 * MICROPHASE 1: Synchronize decoding.
147 */
148
149 if(ctx->left == 0) {
vlme413c122004-08-20 13:23:42 +0000150 ASN_DEBUG("End of SET OF %s", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000151 /*
152 * No more things to decode.
153 * Exit out of here.
154 */
155 PHASE_OUT(ctx);
156 RETURN(RC_OK);
157 }
158
159 /*
160 * Fetch the T from TLV.
161 */
162 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
163 switch(tag_len) {
164 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
165 /* Fall through */
166 case -1: RETURN(RC_FAIL);
167 }
168
169 if(ctx->left < 0 && ((uint8_t *)ptr)[0] == 0) {
170 if(LEFT < 2) {
171 if(SIZE_VIOLATION)
172 RETURN(RC_FAIL);
173 else
174 RETURN(RC_WMORE);
175 } else if(((uint8_t *)ptr)[1] == 0) {
176 /*
177 * Found the terminator of the
178 * indefinite length structure.
179 */
180 break;
181 }
182 }
183
184 /* Outmost tag may be unknown and cannot be fetched/compared */
vlmb42843a2004-06-05 08:17:50 +0000185 if(element->tag != (ber_tlv_tag_t)-1) {
vlmfa67ddc2004-06-03 03:38:44 +0000186 if(BER_TAGS_EQUAL(tlv_tag, element->tag)) {
187 /*
188 * The new list member of expected type has arrived.
189 */
190 } else {
191 ASN_DEBUG("Unexpected tag %s fixed SET OF %s",
vlme413c122004-08-20 13:23:42 +0000192 ber_tlv_tag_string(tlv_tag), td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000193 ASN_DEBUG("%s SET OF has tag %s",
vlme413c122004-08-20 13:23:42 +0000194 td->name, ber_tlv_tag_string(element->tag));
vlmfa67ddc2004-06-03 03:38:44 +0000195 RETURN(RC_FAIL);
196 }
197 }
198
199 /*
200 * MICROPHASE 2: Invoke the member-specific decoder.
201 */
202 ctx->step |= 1; /* Confirm entering next microphase */
203 microphase2:
204
205 /*
206 * Invoke the member fetch routine according to member's type
207 */
vlmef6355b2004-09-29 13:26:15 +0000208 rval = element->type->ber_decoder(opt_codec_ctx,
209 element->type, &ctx->ptr, ptr, LEFT, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000210 ASN_DEBUG("In %s SET OF %s code %d consumed %d",
vlme413c122004-08-20 13:23:42 +0000211 td->name, element->type->name,
vlmfa67ddc2004-06-03 03:38:44 +0000212 rval.code, (int)rval.consumed);
213 switch(rval.code) {
214 case RC_OK:
215 {
vlmda674682004-08-11 09:07:36 +0000216 A_SET_OF(void) *list;
vlmb2d58292005-01-27 17:55:42 +0000217 (void *)list = (void *)st;
vlmfa67ddc2004-06-03 03:38:44 +0000218 if(ASN_SET_ADD(list, ctx->ptr) != 0)
219 RETURN(RC_FAIL);
220 else
221 ctx->ptr = 0;
222 }
223 break;
224 case RC_WMORE: /* More data expected */
225 if(!SIZE_VIOLATION) {
226 ADVANCE(rval.consumed);
227 RETURN(RC_WMORE);
228 }
229 /* Fall through */
230 case RC_FAIL: /* Fatal error */
231 RETURN(RC_FAIL);
232 } /* switch(rval) */
233
234 ADVANCE(rval.consumed);
235 } /* for(all list members) */
236
237 NEXT_PHASE(ctx);
238 case 2:
239 /*
240 * Read in all "end of content" TLVs.
241 */
242 while(ctx->left < 0) {
243 if(LEFT < 2) {
244 if(LEFT > 0 && ((char *)ptr)[0] != 0) {
245 /* Unexpected tag */
246 RETURN(RC_FAIL);
247 } else {
248 RETURN(RC_WMORE);
249 }
250 }
251 if(((char *)ptr)[0] == 0
252 && ((char *)ptr)[1] == 0) {
253 ADVANCE(2);
254 ctx->left++;
255 } else {
256 RETURN(RC_FAIL);
257 }
258 }
259
260 PHASE_OUT(ctx);
261 }
262
263 RETURN(RC_OK);
264}
265
266/*
267 * Internally visible buffer holding a single encoded element.
268 */
269struct _el_buffer {
270 uint8_t *buf;
271 size_t length;
272 size_t size;
273};
274/* Append bytes to the above structure */
275static int _el_addbytes(const void *buffer, size_t size, void *el_buf_ptr) {
vlmda674682004-08-11 09:07:36 +0000276 struct _el_buffer *el_buf = (struct _el_buffer *)el_buf_ptr;
vlmfa67ddc2004-06-03 03:38:44 +0000277
278 if(el_buf->length + size > el_buf->size)
279 return -1;
280
281 memcpy(el_buf->buf + el_buf->length, buffer, size);
282
283 el_buf->length += size;
284 return 0;
285}
286static int _el_buf_cmp(const void *ap, const void *bp) {
vlmda674682004-08-11 09:07:36 +0000287 const struct _el_buffer *a = (const struct _el_buffer *)ap;
288 const struct _el_buffer *b = (const struct _el_buffer *)bp;
vlmfa67ddc2004-06-03 03:38:44 +0000289 int ret;
290 size_t common_len;
291
292 if(a->length < b->length)
293 common_len = a->length;
294 else
295 common_len = b->length;
296
297 ret = memcmp(a->buf, b->buf, common_len);
298 if(ret == 0) {
299 if(a->length < b->length)
300 ret = -1;
301 else if(a->length > b->length)
302 ret = 1;
303 }
304
305 return ret;
306}
307
308/*
309 * The DER encoder of the SET OF type.
310 */
vlm39ba4c42004-09-22 16:06:28 +0000311asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000312SET_OF_encode_der(asn_TYPE_descriptor_t *td, void *ptr,
vlmfa67ddc2004-06-03 03:38:44 +0000313 int tag_mode, ber_tlv_tag_t tag,
314 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000315 asn_TYPE_member_t *elm = td->elements;
316 asn_TYPE_descriptor_t *elm_type = elm->type;
vlmfa67ddc2004-06-03 03:38:44 +0000317 der_type_encoder_f *der_encoder = elm_type->der_encoder;
vlmda674682004-08-11 09:07:36 +0000318 A_SET_OF(void) *list;
vlmfa67ddc2004-06-03 03:38:44 +0000319 size_t computed_size = 0;
320 ssize_t encoding_size = 0;
321 struct _el_buffer *encoded_els;
322 size_t max_encoded_len = 1;
vlm39ba4c42004-09-22 16:06:28 +0000323 asn_enc_rval_t erval;
vlmfa67ddc2004-06-03 03:38:44 +0000324 int ret;
325 int edx;
326
vlme413c122004-08-20 13:23:42 +0000327 ASN_DEBUG("Estimating size for SET OF %s", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000328
329 /*
330 * Gather the length of the underlying members sequence.
331 */
vlmb2d58292005-01-27 17:55:42 +0000332 (void *)list = ptr;
vlmfa67ddc2004-06-03 03:38:44 +0000333 for(edx = 0; edx < list->count; edx++) {
334 void *memb_ptr = list->array[edx];
335 erval = der_encoder(elm_type, memb_ptr, 0, elm->tag, 0, 0);
336 if(erval.encoded == -1)
337 return erval;
338 computed_size += erval.encoded;
339
340 /* Compute maximum encoding's size */
vlmb42843a2004-06-05 08:17:50 +0000341 if(max_encoded_len < (size_t)erval.encoded)
vlmfa67ddc2004-06-03 03:38:44 +0000342 max_encoded_len = erval.encoded;
343 }
344
345 /*
346 * Encode the TLV for the sequence itself.
347 */
vlm6678cb12004-09-26 13:10:40 +0000348 encoding_size = der_write_tags(td, computed_size, tag_mode, 1, tag,
vlmfa67ddc2004-06-03 03:38:44 +0000349 cb, app_key);
350 if(encoding_size == -1) {
351 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000352 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000353 erval.structure_ptr = ptr;
354 return erval;
355 }
356 computed_size += encoding_size;
357
358 if(!cb) {
359 erval.encoded = computed_size;
360 return erval;
361 }
362
363 /*
364 * DER mandates dynamic sorting of the SET OF elements
365 * according to their encodings. Build an array of the
366 * encoded elements.
367 */
vlm6678cb12004-09-26 13:10:40 +0000368 encoded_els = (struct _el_buffer *)MALLOC(
369 list->count * sizeof(encoded_els[0]));
vlmfa67ddc2004-06-03 03:38:44 +0000370 if(encoded_els == NULL) {
371 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000372 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000373 erval.structure_ptr = ptr;
374 return erval;
375 }
376
vlme413c122004-08-20 13:23:42 +0000377 ASN_DEBUG("Encoding members of %s SET OF", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000378
379 /*
380 * Encode all members.
381 */
382 for(edx = 0; edx < list->count; edx++) {
383 void *memb_ptr = list->array[edx];
384 struct _el_buffer *encoded_el = &encoded_els[edx];
385
386 /*
387 * Prepare space for encoding.
388 */
vlmda674682004-08-11 09:07:36 +0000389 encoded_el->buf = (uint8_t *)MALLOC(max_encoded_len);
vlmfa67ddc2004-06-03 03:38:44 +0000390 if(encoded_el->buf) {
391 encoded_el->length = 0;
392 encoded_el->size = max_encoded_len;
393 } else {
394 for(edx--; edx >= 0; edx--)
395 FREEMEM(encoded_els[edx].buf);
396 FREEMEM(encoded_els);
397 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000398 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000399 erval.structure_ptr = ptr;
400 return erval;
401 }
402
403 /*
404 * Encode the member into the prepared space.
405 */
406 erval = der_encoder(elm_type, memb_ptr, 0, elm->tag,
407 _el_addbytes, encoded_el);
408 if(erval.encoded == -1) {
409 for(; edx >= 0; edx--)
410 FREEMEM(encoded_els[edx].buf);
411 FREEMEM(encoded_els);
412 return erval;
413 }
414 encoding_size += erval.encoded;
415 }
416
417 /*
418 * Sort the encoded elements according to their encoding.
419 */
420 qsort(encoded_els, list->count, sizeof(encoded_els[0]), _el_buf_cmp);
421
422 /*
423 * Report encoded elements to the application.
424 * Dispose of temporary sorted members table.
425 */
426 ret = 0;
427 for(edx = 0; edx < list->count; edx++) {
428 struct _el_buffer *encoded_el = &encoded_els[edx];
429 /* Report encoded chunks to the application */
430 if(ret == 0
vlm6678cb12004-09-26 13:10:40 +0000431 && cb(encoded_el->buf, encoded_el->length, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000432 ret = -1;
433 FREEMEM(encoded_el->buf);
434 }
435 FREEMEM(encoded_els);
436
vlmb42843a2004-06-05 08:17:50 +0000437 if(ret || computed_size != (size_t)encoding_size) {
vlmfa67ddc2004-06-03 03:38:44 +0000438 /*
439 * Standard callback failed, or
440 * encoded size is not equal to the computed size.
441 */
442 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000443 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000444 erval.structure_ptr = ptr;
445 } else {
446 erval.encoded = computed_size;
447 }
448
449 return erval;
450}
451
vlm5f4f4a82005-02-14 20:15:40 +0000452#undef XER_ADVANCE
453#define XER_ADVANCE(num_bytes) do { \
454 size_t num = num_bytes; \
455 buf_ptr = ((char *)buf_ptr) + num; \
456 size -= num; \
457 consumed_myself += num; \
458 } while(0)
459
460/*
461 * Decode the XER (XML) data.
462 */
463asn_dec_rval_t
464SET_OF_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
465 void **struct_ptr, const char *opt_mname,
466 void *buf_ptr, size_t size) {
467 /*
468 * Bring closer parts of structure description.
469 */
470 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
471 asn_TYPE_member_t *element = td->elements;
472 const char *elm_tag = specs->as_XMLValueList
473 ? 0 : ((*element->name)
474 ? element->name : element->type->xml_tag);
475 const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
476
477 /*
478 * ... and parts of the structure being constructed.
479 */
480 void *st = *struct_ptr; /* Target structure. */
481 asn_struct_ctx_t *ctx; /* Decoder context */
482
483 asn_dec_rval_t rval; /* Return value from a decoder */
484 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
485 int xer_state; /* XER low level parsing context */
486
487 /*
488 * Create the target structure if it is not present already.
489 */
490 if(st == 0) {
491 st = *struct_ptr = CALLOC(1, specs->struct_size);
492 if(st == 0) RETURN(RC_FAIL);
493 }
494
495 /*
496 * Restore parsing context.
497 */
498 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
499
500 /*
501 * Phases of XER/XML processing:
502 * Phase 0: Check that the opening tag matches our expectations.
503 * Phase 1: Processing body and reacting on closing tag.
504 * Phase 2: Processing inner type.
505 */
506 for(xer_state = ctx->left; ctx->phase <= 2;) {
507 pxer_chunk_type_e ch_type; /* XER chunk type */
508 ssize_t ch_size; /* Chunk size */
509 xer_check_tag_e tcv; /* Tag check value */
510
511 /*
512 * Go inside the inner member of a set.
513 */
514 if(ctx->phase == 2) {
515 asn_dec_rval_t tmprval;
516
517 /* Invoke the inner type decoder, m.b. multiple times */
518 tmprval = element->type->xer_decoder(opt_codec_ctx,
519 element->type, &ctx->ptr, elm_tag,
520 buf_ptr, size);
521 if(tmprval.code == RC_OK) {
522 A_SET_OF(void) *list;
523 (void *)list = (void *)st;
524 if(ASN_SET_ADD(list, ctx->ptr) != 0)
525 RETURN(RC_FAIL);
526 ctx->ptr = 0;
527 XER_ADVANCE(tmprval.consumed);
528 } else {
529 XER_ADVANCE(tmprval.consumed);
530 RETURN(tmprval.code);
531 }
532 ctx->phase = 1; /* Back to body processing */
533 ctx->left = xer_state = 0; /* New, clean state */
534 ASN_DEBUG("XER/SET OF phase => %d", ctx->phase);
535 /* Fall through */
536 }
537
538 /*
539 * Get the next part of the XML stream.
540 */
541 ch_size = xer_next_token(&xer_state, buf_ptr, size, &ch_type);
542 switch(ch_size) {
543 case -1: RETURN(RC_FAIL);
544 case 0:
545 ctx->left = xer_state;
546 RETURN(RC_WMORE);
547 default:
548 switch(ch_type) {
549 case PXER_COMMENT: /* Got XML comment */
550 case PXER_TEXT: /* Ignore free-standing text */
551 XER_ADVANCE(ch_size); /* Skip silently */
552 continue;
553 case PXER_TAG:
554 break; /* Check the rest down there */
555 }
556 }
557
558 tcv = xer_check_tag(buf_ptr, ch_size, xml_tag);
559 ASN_DEBUG("XER/SET OF: tcv = %d, ph=%d", tcv, ctx->phase);
560 switch(tcv) {
561 case XCT_CLOSING:
562 if(ctx->phase == 0) break;
563 ctx->phase = 0;
564 /* Fall through */
565 case XCT_BOTH:
566 if(ctx->phase == 0) {
567 /* No more things to decode */
568 XER_ADVANCE(ch_size);
569 ctx->phase = 3; /* Phase out */
570 RETURN(RC_OK);
571 }
572 /* Fall through */
573 case XCT_OPENING:
574 if(ctx->phase == 0) {
575 XER_ADVANCE(ch_size);
576 ctx->phase = 1; /* Processing body phase */
577 continue;
578 }
579 /* Fall through */
580 case XCT_UNEXPECTED:
581
582 ASN_DEBUG("XER/SET OF: tcv=%d, ph=%d", tcv, ctx->phase);
583 if(ctx->phase != 1)
584 break; /* Really unexpected */
585
586 /*
587 * Search which member corresponds to this tag.
588 */
589 tcv = xer_check_tag(buf_ptr, ch_size, elm_tag);
590 switch(tcv) {
591 case XCT_BOTH:
592 case XCT_OPENING:
593 /*
594 * Process this member.
595 */
596 ctx->phase = 2;
597 continue;
598 case XCT_UNEXPECTED:
599 case XCT_CLOSING:
600 default:
601 break; /* Phase out */
602 }
603 /* Fall through */
604 default:
605 break;
606 }
607
608 ASN_DEBUG("Unexpected XML tag in SET OF");
609 break;
610 }
611
612 ctx->phase = 3; /* "Phase out" on hard failure */
613 RETURN(RC_FAIL);
614}
615
616
617
vlma3296662004-10-03 09:12:07 +0000618typedef struct xer_tmp_enc_s {
619 void *buffer;
620 size_t offset;
621 size_t size;
622} xer_tmp_enc_t;
623static int
624SET_OF_encode_xer_callback(const void *buffer, size_t size, void *key) {
625 xer_tmp_enc_t *t = (xer_tmp_enc_t *)key;
626 if(t->offset + size >= t->size) {
627 size_t newsize = (t->size << 2) + size;
628 void *p = REALLOC(t->buffer, newsize);
629 if(!p) return -1;
630 t->buffer = p;
631 t->size = newsize;
632 }
633 memcpy((char *)t->buffer + t->offset, buffer, size);
634 t->offset += size;
635 return 0;
636}
637static int
638SET_OF_xer_order(const void *aptr, const void *bptr) {
639 const xer_tmp_enc_t *a = (const xer_tmp_enc_t *)aptr;
640 const xer_tmp_enc_t *b = (const xer_tmp_enc_t *)bptr;
641 size_t minlen = a->offset;
642 int ret;
643 if(b->offset < minlen) minlen = b->offset;
644 /* Well-formed UTF-8 has this nice lexicographical property... */
645 ret = memcmp(a->buffer, b->buffer, minlen);
646 if(ret != 0) return ret;
647 if(a->offset == b->offset)
648 return 0;
649 if(a->offset == minlen)
650 return -1;
651 return 1;
652}
653
654
vlm39ba4c42004-09-22 16:06:28 +0000655asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000656SET_OF_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
vlm39ba4c42004-09-22 16:06:28 +0000657 int ilevel, enum xer_encoder_flags_e flags,
658 asn_app_consume_bytes_f *cb, void *app_key) {
659 asn_enc_rval_t er;
vlmef6355b2004-09-29 13:26:15 +0000660 asn_SET_OF_specifics_t *specs=(asn_SET_OF_specifics_t *)td->specifics;
661 asn_TYPE_member_t *element = td->elements;
vlm39ba4c42004-09-22 16:06:28 +0000662 A_SET_OF(void) *list;
663 const char *mname = specs->as_XMLValueList
vlm9de248e2004-10-20 15:50:55 +0000664 ? 0 : ((*element->name)
665 ? element->name : element->type->xml_tag);
vlm39ba4c42004-09-22 16:06:28 +0000666 size_t mlen = mname ? strlen(mname) : 0;
667 int xcan = (flags & XER_F_CANONICAL);
vlma3296662004-10-03 09:12:07 +0000668 xer_tmp_enc_t *encs = 0;
669 size_t encs_count = 0;
670 void *original_app_key = app_key;
671 asn_app_consume_bytes_f *original_cb = cb;
vlm39ba4c42004-09-22 16:06:28 +0000672 int i;
673
674 if(!sptr) _ASN_ENCODE_FAILED;
675
vlmb2d58292005-01-27 17:55:42 +0000676 (void *)list = sptr;
vlma3296662004-10-03 09:12:07 +0000677
678 if(xcan) {
679 encs = (xer_tmp_enc_t *)MALLOC(list->count * sizeof(encs[0]));
680 if(!encs) _ASN_ENCODE_FAILED;
681 cb = SET_OF_encode_xer_callback;
682 }
683
vlm39ba4c42004-09-22 16:06:28 +0000684 er.encoded = 0;
685
vlm39ba4c42004-09-22 16:06:28 +0000686 for(i = 0; i < list->count; i++) {
687 asn_enc_rval_t tmper;
688
689 void *memb_ptr = list->array[i];
690 if(!memb_ptr) continue;
691
vlma3296662004-10-03 09:12:07 +0000692 if(encs) {
693 memset(&encs[encs_count], 0, sizeof(encs[0]));
694 app_key = &encs[encs_count];
695 encs_count++;
696 }
697
vlm39ba4c42004-09-22 16:06:28 +0000698 if(mname) {
699 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel);
700 _ASN_CALLBACK3("<", 1, mname, mlen, ">", 1);
701 }
702
703 tmper = element->type->xer_encoder(element->type, memb_ptr,
704 ilevel + 1, flags, cb, app_key);
vlma3296662004-10-03 09:12:07 +0000705 if(tmper.encoded == -1) {
706 td = tmper.failed_type;
707 sptr = tmper.structure_ptr;
708 goto cb_failed;
709 }
vlm39ba4c42004-09-22 16:06:28 +0000710
711 if(mname) {
712 _ASN_CALLBACK3("</", 2, mname, mlen, ">", 1);
713 er.encoded += 5;
714 }
715
716 er.encoded += (2 * mlen) + tmper.encoded;
717 }
718
719 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel - 1);
720
vlma3296662004-10-03 09:12:07 +0000721 if(encs) {
722 xer_tmp_enc_t *enc = encs;
723 xer_tmp_enc_t *end = encs + encs_count;
724 ssize_t control_size = 0;
725
726 cb = original_cb;
727 app_key = original_app_key;
728 qsort(encs, encs_count, sizeof(encs[0]), SET_OF_xer_order);
729
730 for(; enc < end; enc++) {
731 _ASN_CALLBACK(enc->buffer, enc->offset);
732 FREEMEM(enc->buffer);
733 enc->buffer = 0;
734 control_size += enc->offset;
735 }
736 assert(control_size == er.encoded);
737 }
738
739 goto cleanup;
740cb_failed:
741 er.encoded = -1;
742 er.failed_type = td;
743 er.structure_ptr = sptr;
744cleanup:
745 if(encs) {
746 while(encs_count-- > 0) {
747 if(encs[encs_count].buffer)
748 FREEMEM(encs[encs_count].buffer);
749 }
750 free(encs);
751 }
vlm39ba4c42004-09-22 16:06:28 +0000752 return er;
753}
754
vlmfa67ddc2004-06-03 03:38:44 +0000755int
vlmef6355b2004-09-29 13:26:15 +0000756SET_OF_print(asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
vlmfa67ddc2004-06-03 03:38:44 +0000757 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000758 asn_TYPE_member_t *element = td->elements;
vlmda674682004-08-11 09:07:36 +0000759 const A_SET_OF(void) *list;
vlmfa67ddc2004-06-03 03:38:44 +0000760 int ret;
761 int i;
762
vlm6678cb12004-09-26 13:10:40 +0000763 if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000764
765 /* Dump preamble */
vlm6678cb12004-09-26 13:10:40 +0000766 if(cb(td->name, strlen(td->name), app_key) < 0
767 || cb(" ::= {", 6, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000768 return -1;
769
vlmb2d58292005-01-27 17:55:42 +0000770 (const void *)list = sptr;
vlmfa67ddc2004-06-03 03:38:44 +0000771 for(i = 0; i < list->count; i++) {
772 const void *memb_ptr = list->array[i];
773 if(!memb_ptr) continue;
774
vlm6678cb12004-09-26 13:10:40 +0000775 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000776
777 ret = element->type->print_struct(element->type, memb_ptr,
vlm6678cb12004-09-26 13:10:40 +0000778 ilevel + 1, cb, app_key);
vlmfa67ddc2004-06-03 03:38:44 +0000779 if(ret) return ret;
780 }
781
vlm6678cb12004-09-26 13:10:40 +0000782 ilevel--;
783 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000784
vlm6678cb12004-09-26 13:10:40 +0000785 return (cb("}", 1, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000786}
787
788void
vlmef6355b2004-09-29 13:26:15 +0000789SET_OF_free(asn_TYPE_descriptor_t *td, void *ptr, int contents_only) {
vlmfa67ddc2004-06-03 03:38:44 +0000790 if(td && ptr) {
vlmef6355b2004-09-29 13:26:15 +0000791 asn_TYPE_member_t *element = td->elements;
vlmda674682004-08-11 09:07:36 +0000792 A_SET_OF(void) *list;
vlmfa67ddc2004-06-03 03:38:44 +0000793 int i;
794
795 /*
796 * Could not use set_of_empty() because of (*free)
797 * incompatibility.
798 */
vlmb2d58292005-01-27 17:55:42 +0000799 (void *)list = ptr;
vlmfa67ddc2004-06-03 03:38:44 +0000800 for(i = 0; i < list->count; i++) {
801 void *memb_ptr = list->array[i];
802 if(memb_ptr)
803 element->type->free_struct(element->type, memb_ptr, 0);
804 }
vlm7ebd67c2004-07-15 10:51:26 +0000805 list->count = 0; /* No meaningful elements left */
806
807 asn_set_empty(list); /* Remove (list->array) */
vlmfa67ddc2004-06-03 03:38:44 +0000808
809 if(!contents_only) {
810 FREEMEM(ptr);
811 }
812 }
813}
814
815int
vlmef6355b2004-09-29 13:26:15 +0000816SET_OF_constraint(asn_TYPE_descriptor_t *td, const void *sptr,
vlmfa67ddc2004-06-03 03:38:44 +0000817 asn_app_consume_bytes_f *app_errlog, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000818 asn_TYPE_member_t *element = td->elements;
vlme413c122004-08-20 13:23:42 +0000819 asn_constr_check_f *constr;
vlmda674682004-08-11 09:07:36 +0000820 const A_SET_OF(void) *list;
vlmfa67ddc2004-06-03 03:38:44 +0000821 int i;
822
823 if(!sptr) {
vlme3f0f282004-08-11 09:44:13 +0000824 _ASN_ERRLOG(app_errlog, app_key,
vlm758530a2004-08-22 13:47:59 +0000825 "%s: value not given (%s:%d)",
826 td->name, __FILE__, __LINE__);
vlmfa67ddc2004-06-03 03:38:44 +0000827 return -1;
828 }
829
vlmb2d58292005-01-27 17:55:42 +0000830 (const void *)list = sptr;
vlme413c122004-08-20 13:23:42 +0000831
832 constr = element->memb_constraints;
833 if(!constr) constr = element->type->check_constraints;
834
835 /*
836 * Iterate over the members of an array.
837 * Validate each in turn, until one fails.
838 */
vlmfa67ddc2004-06-03 03:38:44 +0000839 for(i = 0; i < list->count; i++) {
840 const void *memb_ptr = list->array[i];
vlme413c122004-08-20 13:23:42 +0000841 int ret;
842
vlmfa67ddc2004-06-03 03:38:44 +0000843 if(!memb_ptr) continue;
vlme413c122004-08-20 13:23:42 +0000844
845 ret = constr(element->type, memb_ptr, app_errlog, app_key);
846 if(ret) return ret;
vlmfa67ddc2004-06-03 03:38:44 +0000847 }
848
vlme413c122004-08-20 13:23:42 +0000849 /*
850 * Cannot inherit it eralier:
851 * need to make sure we get the updated version.
852 */
853 if(!element->memb_constraints)
854 element->memb_constraints = element->type->check_constraints;
855
vlmfa67ddc2004-06-03 03:38:44 +0000856 return 0;
857}