blob: 47469511f13e31ae50cdc6b1f31c823ab0347a84 [file] [log] [blame]
vlm1d036692004-08-19 13:29:46 +00001#include "asn1c_internal.h"
2#include "asn1c_constraint.h"
vlmb2839012004-08-20 13:37:01 +00003#include "asn1c_misc.h"
4#include "asn1c_out.h"
vlm1d036692004-08-19 13:29:46 +00005
6#include <asn1fix_crange.h> /* constraint groker from libasn1fix */
7#include <asn1fix_export.h> /* other exportable stuff from libasn1fix */
8
vlmb2839012004-08-20 13:37:01 +00009static int asn1c_emit_constraint_tables(arg_t *arg, int got_size);
vlm1d036692004-08-19 13:29:46 +000010static int emit_alphabet_check_loop(arg_t *arg, asn1cnst_range_t *range);
vlma447dea2004-09-07 06:31:15 +000011static int emit_value_determination_code(arg_t *arg, asn1p_expr_type_e etype, asn1cnst_range_t *r_value);
vlm1d036692004-08-19 13:29:46 +000012static int emit_size_determination_code(arg_t *arg, asn1p_expr_type_e etype);
13static asn1p_expr_type_e _find_terminal_type(arg_t *arg);
vlma5dcb912004-09-29 13:16:40 +000014static int emit_range_comparison_code(arg_t *arg, asn1cnst_range_t *range, const char *varname, asn1c_integer_t natural_start, asn1c_integer_t natural_stop);
vlm1d036692004-08-19 13:29:46 +000015
16#define MKID(id) asn1c_make_identifier(0, (id), 0)
17
18static int global_compile_mark;
19
20int
21asn1c_emit_constraint_checking_code(arg_t *arg) {
22 asn1cnst_range_t *r_size;
23 asn1cnst_range_t *r_value;
24 asn1p_expr_t *expr = arg->expr;
25 asn1p_expr_type_e etype;
26 asn1p_constraint_t *ct;
27 int got_something = 0;
vlmb2839012004-08-20 13:37:01 +000028 int produce_st = 0;
vlm1d036692004-08-19 13:29:46 +000029
30 ct = expr->combined_constraints;
31 if(ct == NULL)
32 return 1; /* No additional constraints defined */
33
34 etype = _find_terminal_type(arg);
35
vlm5d6d4b82004-08-25 02:03:59 +000036 r_value=asn1constraint_compute_PER_range(etype, ct, ACT_EL_RANGE,0,0,0);
37 r_size = asn1constraint_compute_PER_range(etype, ct, ACT_CT_SIZE,0,0,0);
vlm1d036692004-08-19 13:29:46 +000038 if(r_value) {
vlm5d6d4b82004-08-25 02:03:59 +000039 if(r_value->incompatible
vlm1d036692004-08-19 13:29:46 +000040 || r_value->empty_constraint
41 || (r_value->left.type == ARE_MIN
42 && r_value->right.type == ARE_MAX)
43 || (etype == ASN_BASIC_BOOLEAN
44 && r_value->left.value == 0
45 && r_value->right.value == 1)
46 ) {
47 asn1constraint_range_free(r_value);
48 r_value = 0;
49 }
50 }
51 if(r_size) {
vlm5d6d4b82004-08-25 02:03:59 +000052 if(r_size->incompatible
vlm1d036692004-08-19 13:29:46 +000053 || r_size->empty_constraint
54 || (r_size->left.value == 0 /* or .type == MIN */
55 && r_size->right.type == ARE_MAX)
56 ) {
57 asn1constraint_range_free(r_size);
58 r_size = 0;
59 }
60 }
61
vlmb2839012004-08-20 13:37:01 +000062 /*
63 * Do we really need an "*st = sptr" pointer?
64 */
65 switch(etype) {
66 case ASN_BASIC_INTEGER:
67 case ASN_BASIC_ENUMERATED:
vlmf9d178d2004-09-14 12:47:45 +000068 case ASN_BASIC_REAL:
69 if(!(arg->flags & A1C_USE_NATIVE_TYPES))
vlmb2839012004-08-20 13:37:01 +000070 produce_st = 1;
71 break;
vlmffa21d22004-08-21 07:34:58 +000072 case ASN_BASIC_BIT_STRING:
vlmb2839012004-08-20 13:37:01 +000073 case ASN_BASIC_OCTET_STRING:
74 produce_st = 1;
75 break;
76 default:
77 if(etype & ASN_STRING_MASK)
78 produce_st = 1;
79 break;
80 }
81 if(produce_st)
vlmffa21d22004-08-21 07:34:58 +000082 OUT("const %s_t *st = sptr;\n",
83 asn1c_type_name(arg, arg->expr, TNF_SAFE));
vlm1d036692004-08-19 13:29:46 +000084
85 if(r_size || r_value) {
86 if(r_size) {
87 OUT("size_t size;\n");
88 }
89 if(r_value)
90 switch(etype) {
91 case ASN_BASIC_INTEGER:
92 case ASN_BASIC_ENUMERATED:
93 OUT("long value;\n");
94 break;
vlmf9d178d2004-09-14 12:47:45 +000095 case ASN_BASIC_REAL:
96 OUT("double value;\n");
97 break;
vlm1d036692004-08-19 13:29:46 +000098 case ASN_BASIC_BOOLEAN:
99 OUT("int value;\n");
100 break;
101 default:
102 break;
103 }
104 }
105
106 OUT("\n");
107
108 /*
109 * Protection against null input.
110 */
111 OUT("if(!sptr) {\n");
112 INDENT(+1);
113 OUT("_ASN_ERRLOG(app_errlog, app_key,\n");
vlm758530a2004-08-22 13:47:59 +0000114 OUT("\t\"%%s: value not given (%%s:%%d)\",\n");
115 OUT("\ttd->name, __FILE__, __LINE__);\n");
vlm1d036692004-08-19 13:29:46 +0000116 OUT("return -1;\n");
117 INDENT(-1);
118 OUT("}\n");
119 OUT("\n");
120
121 if(r_value)
vlma447dea2004-09-07 06:31:15 +0000122 emit_value_determination_code(arg, etype, r_value);
vlm1d036692004-08-19 13:29:46 +0000123 if(r_size)
124 emit_size_determination_code(arg, etype);
125
vlmb2839012004-08-20 13:37:01 +0000126 INDENT(-1);
127 REDIR(OT_CTABLES);
128 /* Emit FROM() tables */
129 asn1c_emit_constraint_tables(arg, r_size?1:0);
130 REDIR(OT_CODE);
131 INDENT(+1);
132
vlm1d036692004-08-19 13:29:46 +0000133 /*
134 * Here is an if() {} else {} constaint checking code.
135 */
136 OUT("\n");
137 OUT("if(");
138 INDENT(+1);
139 if(r_size) {
140 if(got_something++) { OUT("\n"); OUT(" && "); }
141 OUT("(");
142 emit_range_comparison_code(arg, r_size, "size", 0, -1);
143 OUT(")");
144 }
145 if(r_value) {
146 if(got_something++) { OUT("\n"); OUT(" && "); }
147 OUT("(");
148 if(etype == ASN_BASIC_BOOLEAN)
149 emit_range_comparison_code(arg, r_value,
150 "value", 0, 1);
151 else
152 emit_range_comparison_code(arg, r_value,
153 "value", -1, -1);
154 OUT(")");
155 }
156 if(ct->_compile_mark) {
157 if(got_something++) { OUT("\n"); OUT(" && "); }
vlm7e20dfc2004-08-22 13:11:40 +0000158 OUT("!check_permitted_alphabet_%d(sptr)",
vlm1d036692004-08-19 13:29:46 +0000159 ct->_compile_mark);
160 }
161 if(!got_something) {
162 OUT("1 /* No applicable constraints whatsoever */");
vlmb2839012004-08-20 13:37:01 +0000163 OUT(") {\n");
164 INDENT(-1);
165 INDENTED(OUT("/* Nothing is here. See below */\n"));
166 OUT("}\n");
167 OUT("\n");
168 return 1;
vlm1d036692004-08-19 13:29:46 +0000169 }
170 INDENT(-1);
171 OUT(") {\n");
172 INDENT(+1);
173 OUT("/* Constraint check succeeded */\n");
vlm22b03112004-08-22 12:37:35 +0000174 OUT("return 0;\n");
vlm1d036692004-08-19 13:29:46 +0000175 INDENT(-1);
176 OUT("} else {\n");
177 INDENT(+1);
178 OUT("_ASN_ERRLOG(app_errlog, app_key,\n");
vlm758530a2004-08-22 13:47:59 +0000179 OUT("\t\"%%s: constraint failed (%%s:%%d)\",\n");
180 OUT("\ttd->name, __FILE__, __LINE__);\n");
vlm1d036692004-08-19 13:29:46 +0000181 OUT("return -1;\n");
182 INDENT(-1);
183 OUT("}\n");
184
185 return 0;
186}
187
vlmb2839012004-08-20 13:37:01 +0000188static int
189asn1c_emit_constraint_tables(arg_t *arg, int got_size) {
vlma5dcb912004-09-29 13:16:40 +0000190 asn1c_integer_t range_start;
191 asn1c_integer_t range_stop;
vlm1d036692004-08-19 13:29:46 +0000192 asn1p_expr_type_e etype;
193 asn1cnst_range_t *range;
vlmb2839012004-08-20 13:37:01 +0000194 asn1p_constraint_t *ct;
195 int utf8_full_alphabet_check = 0;
196 int max_table_size = 256;
vlm1d036692004-08-19 13:29:46 +0000197 int table[256];
198 int use_table;
199
vlmb2839012004-08-20 13:37:01 +0000200 ct = arg->expr->combined_constraints;
vlm1d036692004-08-19 13:29:46 +0000201 if(!ct) return 0;
202
203 etype = _find_terminal_type(arg);
204
vlm5d6d4b82004-08-25 02:03:59 +0000205 range = asn1constraint_compute_PER_range(etype, ct, ACT_CT_FROM, 0,0,0);
vlm1d036692004-08-19 13:29:46 +0000206 if(!range) return 0;
207
vlm5d6d4b82004-08-25 02:03:59 +0000208 if(range->incompatible
vlm1d036692004-08-19 13:29:46 +0000209 || range->empty_constraint) {
210 asn1constraint_range_free(range);
211 return 0;
212 }
213
vlm465f3c02004-09-06 08:07:19 +0000214
215 if(range->left.type == ARE_MIN
216 && range->right.type == ARE_MAX) {
217 /*
218 * The permitted alphabet constraint checker code guarantees
219 * that either both bounds (left/right) are present, or
220 * they're absent simultaneously. Thus, this assertion
221 * legitimately holds true.
222 */
223 assert(range->el_count == 0);
224 /* The full range is specified. Ignore it. */
225 return 0;
226 }
227
vlm1d036692004-08-19 13:29:46 +0000228 range_start = range->left.value;
229 range_stop = range->right.value;
230 assert(range->left.type == ARE_VALUE);
231 assert(range->right.type == ARE_VALUE);
232 assert(range_start <= range_stop);
233
234 range_start = 0; /* Force old behavior */
235
236 /*
237 * Check if we need a test table to check the alphabet.
238 */
239 use_table = 1;
vlmb2839012004-08-20 13:37:01 +0000240 if(range->el_count == 0) {
241 /*
242 * It's better to have a short if() check
243 * than waste 4k of table space
244 */
245 use_table = 0;
246 }
vlm1d036692004-08-19 13:29:46 +0000247 if((range_stop - range_start) > 255)
248 use_table = 0;
vlmb2839012004-08-20 13:37:01 +0000249 if(etype == ASN_STRING_UTF8String) {
250 if(range_stop >= 0x80)
251 use_table = 0;
252 else
253 max_table_size = 128;
254 }
vlm1d036692004-08-19 13:29:46 +0000255
256 if(!ct->_compile_mark)
257 ct->_compile_mark = ++global_compile_mark;
258
259 if(use_table) {
260 int i, n = 0;
261 int untl;
262 memset(table, 0, sizeof(table));
263 for(i = -1; i < range->el_count; i++) {
264 asn1cnst_range_t *r;
vlma5dcb912004-09-29 13:16:40 +0000265 asn1c_integer_t v;
vlm1d036692004-08-19 13:29:46 +0000266 if(i == -1) {
267 if(range->el_count) continue;
268 r = range;
269 } else {
270 r = range->elements[i];
271 }
272 for(v = r->left.value; v <= r->right.value; v++) {
273 assert((v - range_start) >= 0);
vlmb2839012004-08-20 13:37:01 +0000274 assert((v - range_start) < max_table_size);
vlm1d036692004-08-19 13:29:46 +0000275 table[v - range_start] = ++n;
276 }
277 }
278
vlm1d036692004-08-19 13:29:46 +0000279 untl = (range_stop - range_start) + 1;
280 untl += (untl % 16)?16 - (untl % 16):0;
vlmb2839012004-08-20 13:37:01 +0000281 OUT("static int permitted_alphabet_table_%d[%d] = {\n",
282 ct->_compile_mark, max_table_size);
vlm1d036692004-08-19 13:29:46 +0000283 for(n = 0; n < untl; n++) {
284 OUT("%d,", table[n]?1:0);
285 if(!((n+1) % 16)) {
286 int c;
287 if(!n) {
288 OUT("\n");
289 continue;
290 }
291 OUT("\t/* ");
292 for(c = n - 15; c <= n; c++) {
293 if(table[c]) {
294 int a = c + range_start;
295 if(a > 0x20 && a < 0x80)
296 OUT("%c", a);
297 else
298 OUT(".");
299 } else {
300 OUT(" ");
301 }
302 }
303 OUT(" */");
304 OUT("\n");
305 }
306 }
307 OUT("};\n");
308 OUT("\n");
vlmb2839012004-08-20 13:37:01 +0000309 } else if(etype == ASN_STRING_UTF8String) {
310 /*
311 * UTF8String type is a special case in many respects.
312 */
vlmb2839012004-08-20 13:37:01 +0000313 if(got_size) {
314 /*
315 * Size has been already determined.
316 * The UTF8String length checker also checks
317 * for the syntax validity, so we don't have
318 * to repeat this process twice.
319 */
320 ct->_compile_mark = 0; /* Don't generate code */
321 asn1constraint_range_free(range);
322 return 0;
323 } else {
324 utf8_full_alphabet_check = 1;
325 }
326 } else {
327 /*
328 * This permitted alphabet check will be
329 * expressed using conditional statements
330 * instead of table lookups. Table would be
331 * to large or otherwise inappropriate (too sparse?).
332 */
vlm1d036692004-08-19 13:29:46 +0000333 }
334
335 OUT("static int check_permitted_alphabet_%d(const void *sptr) {\n",
336 ct->_compile_mark);
vlmb2839012004-08-20 13:37:01 +0000337 INDENT(+1);
338 if(utf8_full_alphabet_check) {
vlm26016752004-10-02 16:44:55 +0000339 OUT("if(UTF8String_length((const UTF8String_t *)sptr) < 0)\n");
340 OUT("\treturn -1; /* Alphabet (sic!) test failed. */\n");
vlmb2839012004-08-20 13:37:01 +0000341 OUT("\n");
342 } else {
vlm1d036692004-08-19 13:29:46 +0000343 if(use_table) {
344 OUT("int *table = permitted_alphabet_table_%d;\n",
345 ct->_compile_mark);
346 emit_alphabet_check_loop(arg, 0);
347 } else {
348 emit_alphabet_check_loop(arg, range);
349 }
vlmb2839012004-08-20 13:37:01 +0000350 }
vlmcdf661b2004-08-22 12:47:03 +0000351 OUT("return 0;\n");
vlmb2839012004-08-20 13:37:01 +0000352 INDENT(-1);
vlm1d036692004-08-19 13:29:46 +0000353 OUT("}\n");
354 OUT("\n");
355
356 asn1constraint_range_free(range);
357
358 return 0;
359}
360
361static int
362emit_alphabet_check_loop(arg_t *arg, asn1cnst_range_t *range) {
vlma5dcb912004-09-29 13:16:40 +0000363 asn1c_integer_t natural_stop;
vlmb08de152004-08-22 03:30:05 +0000364 asn1p_expr_t *terminal;
vlm1d036692004-08-19 13:29:46 +0000365
vlmcbebb812004-09-22 16:05:13 +0000366 terminal = asn1f_find_terminal_type_ex(arg->asn, arg->expr);
vlmb08de152004-08-22 03:30:05 +0000367 if(terminal) {
368 OUT("/* The underlying type is %s */\n",
369 ASN_EXPR_TYPE2STR(terminal->expr_type));
370 } else {
371 terminal = arg->expr;
372 }
vlmffa21d22004-08-21 07:34:58 +0000373 OUT("const %s_t *st = sptr;\n",
vlmb08de152004-08-22 03:30:05 +0000374 asn1c_type_name(arg, terminal, TNF_SAFE));
vlm1d036692004-08-19 13:29:46 +0000375
vlmb08de152004-08-22 03:30:05 +0000376 switch(terminal->expr_type) {
vlm1d036692004-08-19 13:29:46 +0000377 case ASN_STRING_UTF8String:
vlmffa21d22004-08-21 07:34:58 +0000378 OUT("const uint8_t *ch = st->buf;\n");
379 OUT("const uint8_t *end = ch + st->size;\n");
vlm1d036692004-08-19 13:29:46 +0000380 OUT("\n");
381 OUT("for(; ch < end; ch++) {\n");
382 INDENT(+1);
383 OUT("uint8_t cv = *ch;\n");
vlmcdf661b2004-08-22 12:47:03 +0000384 if(!range) OUT("if(cv >= 0x80) return -1;\n");
vlm1d036692004-08-19 13:29:46 +0000385 natural_stop = 0xffffffffUL;
386 break;
387 case ASN_STRING_UniversalString:
vlm465f3c02004-09-06 08:07:19 +0000388 OUT("const uint8_t *ch = st->buf;\n");
389 OUT("const uint8_t *end = ch + st->size;\n");
vlm1d036692004-08-19 13:29:46 +0000390 OUT("\n");
vlm465f3c02004-09-06 08:07:19 +0000391 OUT("if(st->size %% 4) return -1; /* (size%%4)! */\n");
392 OUT("for(; ch < end; ch += 4) {\n");
vlm1d036692004-08-19 13:29:46 +0000393 INDENT(+1);
vlm465f3c02004-09-06 08:07:19 +0000394 OUT("uint32_t cv = (ch[0] << 24)\n");
395 OUT("\t\t| (ch[1] << 16)\n");
396 OUT("\t\t| (ch[2] << 8)\n");
397 OUT("\t\t| ch[3];\n");
vlmcdf661b2004-08-22 12:47:03 +0000398 if(!range) OUT("if(cv > 255) return -1;\n");
vlm1d036692004-08-19 13:29:46 +0000399 natural_stop = 0xffffffffUL;
400 break;
401 case ASN_STRING_BMPString:
vlm465f3c02004-09-06 08:07:19 +0000402 OUT("const uint8_t *ch = st->buf;\n");
403 OUT("const uint8_t *end = ch + st->size;\n");
vlm1d036692004-08-19 13:29:46 +0000404 OUT("\n");
vlm465f3c02004-09-06 08:07:19 +0000405 OUT("if(st->size %% 2) return -1; /* (size%%2)! */\n");
406 OUT("for(; ch < end; ch += 2) {\n");
vlm1d036692004-08-19 13:29:46 +0000407 INDENT(+1);
vlm465f3c02004-09-06 08:07:19 +0000408 OUT("uint16_t cv = (ch[0] << 8)\n");
409 OUT("\t\t| ch[1];\n");
vlmcdf661b2004-08-22 12:47:03 +0000410 if(!range) OUT("if(cv > 255) return -1;\n");
vlm1d036692004-08-19 13:29:46 +0000411 natural_stop = 0xffff;
412 break;
413 case ASN_BASIC_OCTET_STRING:
414 default:
vlmffa21d22004-08-21 07:34:58 +0000415 OUT("const uint8_t *ch = st->buf;\n");
416 OUT("const uint8_t *end = ch + st->size;\n");
vlm1d036692004-08-19 13:29:46 +0000417 OUT("\n");
418 OUT("for(; ch < end; ch++) {\n");
419 INDENT(+1);
420 OUT("uint8_t cv = *ch;\n");
421 natural_stop = 0xff;
422 break;
423 }
424
425 if(range) {
426 OUT("if(!(");
427 emit_range_comparison_code(arg, range, "cv", 0, natural_stop);
vlmcdf661b2004-08-22 12:47:03 +0000428 OUT(")) return -1;\n");
vlm1d036692004-08-19 13:29:46 +0000429 } else {
vlmcdf661b2004-08-22 12:47:03 +0000430 OUT("if(!table[cv]) return -1;\n");
vlm1d036692004-08-19 13:29:46 +0000431 }
432
433 INDENT(-1);
434 OUT("}\n");
435
436 return 0;
437}
438
439static int
vlma5dcb912004-09-29 13:16:40 +0000440emit_range_comparison_code(arg_t *arg, asn1cnst_range_t *range, const char *varname, asn1c_integer_t natural_start, asn1c_integer_t natural_stop) {
vlm1d036692004-08-19 13:29:46 +0000441 int ignore_left;
442 int ignore_right;
vlmb2839012004-08-20 13:37:01 +0000443 int generated_something = 0;
vlm1d036692004-08-19 13:29:46 +0000444 int i;
445
446 for(i = -1; i < range->el_count; i++) {
447 asn1cnst_range_t *r;
448 if(i == -1) {
449 if(range->el_count) continue;
450 r = range;
451 } else {
452 if(i) OUT(" || ");
453 r = range->elements[i];
454 }
455
456 if(r != range) OUT("(");
457
458 ignore_left = (r->left.type == ARE_MIN)
459 || (natural_start != -1
460 && r->left.value <= natural_start);
461 ignore_right = (r->right.type == ARE_MAX)
462 || (natural_stop != -1
463 && r->right.value >= natural_stop);
464 if(ignore_left && ignore_right) {
465 OUT("1 /* Constraint matches natural range of %s */",
466 varname);
467 continue;
468 }
469
470 if(ignore_left) {
vlm47ae1582004-09-24 21:01:43 +0000471 OUT("%s <= %" PRIdASN, varname,
472 r->right.value);
vlm1d036692004-08-19 13:29:46 +0000473 } else if(ignore_right) {
vlm47ae1582004-09-24 21:01:43 +0000474 OUT("%s >= %" PRIdASN, varname,
475 r->left.value);
vlm1d036692004-08-19 13:29:46 +0000476 } else if(r->left.value == r->right.value) {
vlm47ae1582004-09-24 21:01:43 +0000477 OUT("%s == %" PRIdASN, varname,
478 r->right.value);
vlm1d036692004-08-19 13:29:46 +0000479 } else {
vlm47ae1582004-09-24 21:01:43 +0000480 OUT("%s >= %" PRIdASN " && %s <= %" PRIdASN,
vlm1d036692004-08-19 13:29:46 +0000481 varname,
vlm47ae1582004-09-24 21:01:43 +0000482 r->left.value,
vlm1d036692004-08-19 13:29:46 +0000483 varname,
vlm47ae1582004-09-24 21:01:43 +0000484 r->right.value);
vlm1d036692004-08-19 13:29:46 +0000485 }
486 if(r != range) OUT(")");
vlmb2839012004-08-20 13:37:01 +0000487 generated_something = 1;
vlm1d036692004-08-19 13:29:46 +0000488 }
489
vlmb2839012004-08-20 13:37:01 +0000490 return generated_something;
vlm1d036692004-08-19 13:29:46 +0000491}
492
493static int
494emit_size_determination_code(arg_t *arg, asn1p_expr_type_e etype) {
495
496 switch(etype) {
497 case ASN_BASIC_BIT_STRING:
498 OUT("if(st->size > 0) {\n");
499 OUT("\t/* Size in bits */\n");
vlm17dc9eb2004-09-05 10:42:19 +0000500 OUT("\tsize = 8 * (st->size - 1) - (st->buf[0] & 0x7);\n");
vlm1d036692004-08-19 13:29:46 +0000501 OUT("} else {\n");
502 OUT("\tsize = 0;\n");
503 OUT("}\n");
504 break;
505 case ASN_STRING_UniversalString:
506 OUT("size = st->size >> 2;\t/* 4 byte per character */\n");
507 break;
508 case ASN_STRING_BMPString:
509 OUT("size = st->size >> 1;\t/* 2 byte per character */\n");
510 break;
511 case ASN_STRING_UTF8String:
vlm26016752004-10-02 16:44:55 +0000512 OUT("size = UTF8String_length(st);\n");
513 OUT("if((ssize_t)size < 0) {\n");
514 OUT("\t_ASN_ERRLOG(app_errlog, app_key,\n");
515 OUT("\t\t\"%%s: UTF-8: broken encoding (%%s:%%d)\",\n");
516 OUT("\t\ttd->name, __FILE__, __LINE__);\n");
517 OUT("\treturn -1;\n");
518 OUT("}\n");
vlm1d036692004-08-19 13:29:46 +0000519 break;
520 case ASN_CONSTR_SET_OF:
521 case ASN_CONSTR_SEQUENCE_OF:
522 OUT("{ /* Determine the number of elements */\n");
523 INDENT(+1);
vlmb2839012004-08-20 13:37:01 +0000524 OUT("const A_%s_OF(void) *list;\n",
vlm1d036692004-08-19 13:29:46 +0000525 etype==ASN_CONSTR_SET_OF?"SET":"SEQUENCE");
vlmb2839012004-08-20 13:37:01 +0000526 OUT("(const void *)list = sptr;\n");
vlm1d036692004-08-19 13:29:46 +0000527 OUT("size = list->count;\n");
528 INDENT(-1);
529 OUT("}\n");
530 break;
vlmb2839012004-08-20 13:37:01 +0000531 case ASN_BASIC_OCTET_STRING:
532 OUT("size = st->size;\n");
533 break;
vlm1d036692004-08-19 13:29:46 +0000534 default:
vlmb2839012004-08-20 13:37:01 +0000535 if(etype & ASN_STRING_MASK) {
vlm1d036692004-08-19 13:29:46 +0000536 OUT("size = st->size;\n");
537 break;
538 } else {
539 const char *type_name = ASN_EXPR_TYPE2STR(etype);
540 if(!type_name) type_name = arg->expr->Identifier;
541 WARNING("SizeConstraint is not defined for %s",
542 type_name);
543 OUT_NOINDENT("#warning SizeConstraint "
544 "is not defined for %s!\n", type_name);
545 OUT("size = st->size;\n");
546 }
547 return -1;
548 }
549
550 return 0;
551}
552
553static int
vlma447dea2004-09-07 06:31:15 +0000554emit_value_determination_code(arg_t *arg, asn1p_expr_type_e etype, asn1cnst_range_t *r_value) {
vlm1d036692004-08-19 13:29:46 +0000555
556 switch(etype) {
557 case ASN_BASIC_INTEGER:
558 case ASN_BASIC_ENUMERATED:
vlmf9d178d2004-09-14 12:47:45 +0000559 if(arg->flags & A1C_USE_NATIVE_TYPES) {
vlmffa21d22004-08-21 07:34:58 +0000560 OUT("value = *(const int *)sptr;\n");
vlm1d036692004-08-19 13:29:46 +0000561 } else {
vlma447dea2004-09-07 06:31:15 +0000562 if(r_value->el_count == 0
563 && (
564 /* Speed-up common case: (0..MAX) */
565 (r_value->left.type == ARE_VALUE
566 && r_value->left.value == 0
567 && r_value->right.type == ARE_MAX)
568 ||
569 /* Speed-up common case: (MIN..-1) */
570 (r_value->left.type == ARE_MIN
571 && r_value->right.type == ARE_VALUE
572 && r_value->right.value == -1)
573 )) {
574 OUT("/* Check if the sign bit is present */\n");
575 OUT("value = st->buf ? ((st->buf[0] & 0x80) ? -1 : 1) : 0;\n");
576 break;
577 }
578
vlma5dcb912004-09-29 13:16:40 +0000579 OUT("if(asn_INTEGER2long(st, &value)) {\n");
vlm1d036692004-08-19 13:29:46 +0000580 INDENT(+1);
581 OUT("_ASN_ERRLOG(app_errlog, app_key,\n");
vlm758530a2004-08-22 13:47:59 +0000582 OUT("\t\"%%s: value too large (%%s:%%d)\",\n");
583 OUT("\ttd->name, __FILE__, __LINE__);\n");
vlm1d036692004-08-19 13:29:46 +0000584 OUT("return -1;\n");
585 INDENT(-1);
586 OUT("}\n");
587 }
588 break;
vlmf9d178d2004-09-14 12:47:45 +0000589 case ASN_BASIC_REAL:
590 if(arg->flags & A1C_USE_NATIVE_TYPES) {
591 OUT("value = *(const double *)sptr;\n");
592 } else {
vlma5dcb912004-09-29 13:16:40 +0000593 OUT("if(asn_REAL2double(st, &value)) {\n");
vlmf9d178d2004-09-14 12:47:45 +0000594 INDENT(+1);
595 OUT("_ASN_ERRLOG(app_errlog, app_key,\n");
596 OUT("\t\"%%s: value too large (%%s:%%d)\",\n");
597 OUT("\ttd->name, __FILE__, __LINE__);\n");
598 OUT("return -1;\n");
599 INDENT(-1);
600 OUT("}\n");
601 }
602 break;
vlm1d036692004-08-19 13:29:46 +0000603 case ASN_BASIC_BOOLEAN:
vlmffa21d22004-08-21 07:34:58 +0000604 OUT("value = (*(const int *)sptr) ? 1 : 0;\n");
vlm1d036692004-08-19 13:29:46 +0000605 break;
606 default:
vlmffa21d22004-08-21 07:34:58 +0000607 WARNING("%s:%d: Value cannot be determined "
608 "for constraint check for %s",
609 arg->mod->source_file_name,
610 arg->expr->_lineno,
611 arg->expr->Identifier
612 );
613 OUT_NOINDENT(
614 "#error %s:%d: Value of %s cannot be determined\n",
615 arg->mod->source_file_name,
616 arg->expr->_lineno,
617 arg->expr->Identifier
618 );
vlm1d036692004-08-19 13:29:46 +0000619 break;
620 }
621
622 return 0;
623}
624
625static asn1p_expr_type_e
626_find_terminal_type(arg_t *arg) {
627 asn1p_expr_t *expr;
vlmcbebb812004-09-22 16:05:13 +0000628 expr = asn1f_find_terminal_type_ex(arg->asn, arg->expr);
vlm1d036692004-08-19 13:29:46 +0000629 if(expr) return expr->expr_type;
630 return A1TC_INVALID;
631}
632