blob: 2acb5ea37ae2f19500d52adbce32a5fe45a70fbb [file] [log] [blame]
vlmfa67ddc2004-06-03 03:38:44 +00001/*
2 * Don't look into this file. First, because it's a mess, and second, because
3 * it's a brain of the compiler, and you don't wanna mess with brains do you? ;)
4 */
5#include "asn1c_internal.h"
6#include "asn1c_C.h"
vlm1d036692004-08-19 13:29:46 +00007#include "asn1c_constraint.h"
vlmb2839012004-08-20 13:37:01 +00008#include "asn1c_out.h"
9#include "asn1c_misc.h"
vlm337167e2005-11-26 11:25:14 +000010#include <asn1fix_crange.h> /* constraint groker from libasn1fix */
11#include <asn1fix_export.h> /* other exportables from libasn1fix */
vlmfa67ddc2004-06-03 03:38:44 +000012
vlm4e03ce22004-06-06 07:20:17 +000013typedef struct tag2el_s {
14 struct asn1p_type_tag_s el_tag;
15 int el_no;
vlmc8aeab42004-06-14 13:09:45 +000016 int toff_first;
17 int toff_last;
vlm4e03ce22004-06-06 07:20:17 +000018 asn1p_expr_t *from_expr;
19} tag2el_t;
20
vlm940bc6b2004-10-03 09:13:30 +000021typedef enum fte {
22 FTE_ALLTAGS,
23 FTE_CANONICAL_XER,
24} fte_e;
25static int _fill_tag2el_map(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags);
26static int _add_tag2el_member(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags);
vlm4e03ce22004-06-06 07:20:17 +000027
vlm2e774282005-08-14 15:03:31 +000028enum onc_flags {
29 ONC_noflags = 0x00,
30 ONC_avoid_keywords = 0x01,
31 ONC_force_compound_name = 0x02,
32};
33static int out_name_chain(arg_t *arg, enum onc_flags);
vlmfa67ddc2004-06-03 03:38:44 +000034static int asn1c_lang_C_type_SEQUENCE_def(arg_t *arg);
35static int asn1c_lang_C_type_SET_def(arg_t *arg);
36static int asn1c_lang_C_type_CHOICE_def(arg_t *arg);
37static int asn1c_lang_C_type_SEx_OF_def(arg_t *arg, int seq_of);
vlma8a86cc2004-09-10 06:07:18 +000038static int _print_tag(arg_t *arg, struct asn1p_type_tag_s *tag_p);
vlm337167e2005-11-26 11:25:14 +000039static int compute_extensions_start(asn1p_expr_t *expr);
vlm5a6fc652005-08-16 17:00:21 +000040static int expr_break_recursion(arg_t *arg, asn1p_expr_t *expr);
vlm39ba4c42004-09-22 16:06:28 +000041static int expr_as_xmlvaluelist(arg_t *arg, asn1p_expr_t *expr);
vlm4e554992004-08-25 02:03:12 +000042static int expr_elements_count(arg_t *arg, asn1p_expr_t *expr);
vlm337167e2005-11-26 11:25:14 +000043static int emit_single_member_PER_constraint(arg_t *arg, asn1cnst_range_t *range, char *type);
44static int emit_single_member_PER_constraints(arg_t *arg, asn1p_expr_t *expr);
45static int emit_members_PER_constraints(arg_t *arg);
vlm4e554992004-08-25 02:03:12 +000046static int emit_member_table(arg_t *arg, asn1p_expr_t *expr);
vlm940bc6b2004-10-03 09:13:30 +000047static int emit_tag2member_map(arg_t *arg, tag2el_t *tag2el, int tag2el_count, const char *opt_modifier);
vlm0b567bf2005-03-04 22:18:20 +000048static int emit_include_dependencies(arg_t *arg);
vlm6c4a8502005-08-18 13:38:19 +000049static asn1p_expr_t *terminal_structable(arg_t *arg, asn1p_expr_t *expr);
50static int expr_defined_recursively(arg_t *arg, asn1p_expr_t *expr);
51static int asn1c_recurse(arg_t *arg, asn1p_expr_t *expr, int (*callback)(arg_t *arg, void *key), void *key);
vlm337167e2005-11-26 11:25:14 +000052static asn1p_expr_type_e expr_get_type(arg_t *arg, asn1p_expr_t *expr);
53static int try_inline_default(arg_t *arg, asn1p_expr_t *expr, int out);
54static int *compute_canonical_members_order(arg_t *arg, int el_count);
vlmfa67ddc2004-06-03 03:38:44 +000055
vlm72425de2004-09-13 08:31:01 +000056enum tvm_compat {
57 _TVM_SAME = 0, /* tags and all_tags are same */
58 _TVM_SUBSET = 1, /* tags are subset of all_tags */
59 _TVM_DIFFERENT = 2, /* tags and all_tags are different */
60};
61static enum tvm_compat emit_tags_vectors(arg_t *arg, asn1p_expr_t *expr, int *tc, int *atc);
62
vlm4e554992004-08-25 02:03:12 +000063enum etd_spec {
64 ETD_NO_SPECIFICS,
65 ETD_HAS_SPECIFICS
66};
vlm86f5ed22004-09-26 13:11:31 +000067static int emit_type_DEF(arg_t *arg, asn1p_expr_t *expr, enum tvm_compat tv_mode, int tags_count, int all_tags_count, int elements_count, enum etd_spec);
vlm4e554992004-08-25 02:03:12 +000068
vlmb2839012004-08-20 13:37:01 +000069#define C99_MODE (!(arg->flags & A1C_NO_C99))
vlmfa67ddc2004-06-03 03:38:44 +000070#define UNNAMED_UNIONS (arg->flags & A1C_UNNAMED_UNIONS)
vlm12c8f692004-09-06 08:07:29 +000071#define HIDE_INNER_DEFS (arg->embed && !(arg->flags & A1C_ALL_DEFS_GLOBAL))
vlmfa67ddc2004-06-03 03:38:44 +000072
73#define PCTX_DEF INDENTED( \
74 OUT("\n"); \
75 OUT("/* Context for parsing across buffer boundaries */\n"); \
vlma5dcb912004-09-29 13:16:40 +000076 OUT("asn_struct_ctx_t _asn_ctx;\n"));
vlmfa67ddc2004-06-03 03:38:44 +000077
vlm0b567bf2005-03-04 22:18:20 +000078
vlm33a4ff12004-08-11 05:21:32 +000079#define DEPENDENCIES do { \
vlm0b567bf2005-03-04 22:18:20 +000080 emit_include_dependencies(arg); \
vlm33a4ff12004-08-11 05:21:32 +000081 if(expr->expr_type == ASN_CONSTR_SET_OF) \
vlmea226772006-09-13 02:51:20 +000082 GEN_INCLUDE_STD("asn_SET_OF"); \
vlm33a4ff12004-08-11 05:21:32 +000083 if(expr->expr_type == ASN_CONSTR_SEQUENCE_OF) \
vlmea226772006-09-13 02:51:20 +000084 GEN_INCLUDE_STD("asn_SEQUENCE_OF"); \
vlm33a4ff12004-08-11 05:21:32 +000085} while(0)
vlmfa67ddc2004-06-03 03:38:44 +000086
vlm1f7df782005-03-04 23:48:19 +000087/* MKID_safe() without checking for reserved keywords */
vlm0c6d3812006-03-21 03:40:38 +000088#define MKID(expr) (asn1c_make_identifier(0, expr, 0))
89#define MKID_safe(expr) (asn1c_make_identifier(AMI_CHECK_RESERVED, expr, 0))
vlmfa67ddc2004-06-03 03:38:44 +000090
91int
vlmf9d178d2004-09-14 12:47:45 +000092asn1c_lang_C_type_REAL(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +000093 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
94}
95
vlm80a48592005-02-25 12:10:27 +000096struct value2enum {
97 asn1c_integer_t value;
98 const char *name;
99 int idx;
100};
101static int compar_enumMap_byName(const void *ap, const void *bp) {
102 const struct value2enum *a = (const struct value2enum *)ap;
103 const struct value2enum *b = (const struct value2enum *)bp;
104 return strcmp(a->name, b->name);
105}
106static int compar_enumMap_byValue(const void *ap, const void *bp) {
107 const struct value2enum *a = (const struct value2enum *)ap;
108 const struct value2enum *b = (const struct value2enum *)bp;
109 if(a->value < b->value)
110 return -1;
111 else if(a->value == b->value)
112 return 0;
113 return 1;
114}
115
vlmfa67ddc2004-06-03 03:38:44 +0000116int
vlmf9d178d2004-09-14 12:47:45 +0000117asn1c_lang_C_type_common_INTEGER(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +0000118 asn1p_expr_t *expr = arg->expr;
119 asn1p_expr_t *v;
vlm80a48592005-02-25 12:10:27 +0000120 int el_count = expr_elements_count(arg, expr);
121 struct value2enum *v2e;
vlm337167e2005-11-26 11:25:14 +0000122 int map_extensions = (expr->expr_type == ASN_BASIC_INTEGER);
vlm4573af02005-08-13 23:30:24 +0000123 int eidx;
vlmfa67ddc2004-06-03 03:38:44 +0000124
vlm80a48592005-02-25 12:10:27 +0000125 v2e = alloca((el_count + 1) * sizeof(*v2e));
vlmfa67ddc2004-06-03 03:38:44 +0000126
vlm80a48592005-02-25 12:10:27 +0000127 /*
vlm4573af02005-08-13 23:30:24 +0000128 * For all ENUMERATED types and for those INTEGER types which
129 * have identifiers, print out an enumeration table.
vlm80a48592005-02-25 12:10:27 +0000130 */
vlm4573af02005-08-13 23:30:24 +0000131 if(expr->expr_type == ASN_BASIC_ENUMERATED || el_count) {
132 eidx = 0;
vlm80a48592005-02-25 12:10:27 +0000133 REDIR(OT_DEPS);
vlm766cf1e2005-03-04 08:48:53 +0000134 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000135 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000136 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000137 TQ_FOR(v, &(expr->members), next) {
138 switch(v->expr_type) {
139 case A1TC_UNIVERVAL:
vlm766cf1e2005-03-04 08:48:53 +0000140 OUT("\t");
vlm2e774282005-08-14 15:03:31 +0000141 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000142 OUT("_%s", MKID(v));
vlm766cf1e2005-03-04 08:48:53 +0000143 OUT("\t= %" PRIdASN "%s\n",
vlm80a48592005-02-25 12:10:27 +0000144 v->value->value.v_integer,
vlm766cf1e2005-03-04 08:48:53 +0000145 (eidx+1 < el_count) ? "," : "");
vlm80a48592005-02-25 12:10:27 +0000146 v2e[eidx].name = v->Identifier;
147 v2e[eidx].value = v->value->value.v_integer;
148 eidx++;
vlmfa67ddc2004-06-03 03:38:44 +0000149 break;
vlmf9d178d2004-09-14 12:47:45 +0000150 case A1TC_EXTENSIBLE:
151 OUT("\t/*\n");
152 OUT("\t * Enumeration is extensible\n");
153 OUT("\t */\n");
vlm337167e2005-11-26 11:25:14 +0000154 if(!map_extensions)
155 map_extensions = eidx + 1;
vlmf9d178d2004-09-14 12:47:45 +0000156 break;
vlmfa67ddc2004-06-03 03:38:44 +0000157 default:
158 return -1;
159 }
160 }
vlm7c8aa5e2006-03-21 07:25:18 +0000161 OUT("} e_");
vlm2e774282005-08-14 15:03:31 +0000162 out_name_chain(arg, ONC_noflags);
vlm7c8aa5e2006-03-21 07:25:18 +0000163 OUT(";\n");
vlm80a48592005-02-25 12:10:27 +0000164 assert(eidx == el_count);
vlm4573af02005-08-13 23:30:24 +0000165 }
166
167 /*
168 * For all ENUMERATED types print out a mapping table
169 * between identifiers and associated values.
170 * This is prohibited for INTEGER types by by X.693:8.3.4.
171 */
172 if(expr->expr_type == ASN_BASIC_ENUMERATED) {
vlm80a48592005-02-25 12:10:27 +0000173
174 /*
175 * Generate a enumerationName<->value map for XER codec.
176 */
177 REDIR(OT_STAT_DEFS);
178
vlm337167e2005-11-26 11:25:14 +0000179 OUT("static asn_INTEGER_enum_map_t asn_MAP_%s_value2enum_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000180 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000181 qsort(v2e, el_count, sizeof(v2e[0]), compar_enumMap_byValue);
182 for(eidx = 0; eidx < el_count; eidx++) {
183 v2e[eidx].idx = eidx;
184 OUT("\t{ %" PRIdASN ",\t%ld,\t\"%s\" }%s\n",
185 v2e[eidx].value,
186 (long)strlen(v2e[eidx].name), v2e[eidx].name,
187 (eidx + 1 < el_count) ? "," : "");
188 }
vlm337167e2005-11-26 11:25:14 +0000189 if(map_extensions)
vlm80a48592005-02-25 12:10:27 +0000190 OUT("\t/* This list is extensible */\n");
191 OUT("};\n");
192
vlm337167e2005-11-26 11:25:14 +0000193 OUT("static unsigned int asn_MAP_%s_enum2value_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000194 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000195 qsort(v2e, el_count, sizeof(v2e[0]), compar_enumMap_byName);
196 for(eidx = 0; eidx < el_count; eidx++) {
197 OUT("\t%d%s\t/* %s(%" PRIdASN ") */\n",
198 v2e[eidx].idx,
199 (eidx + 1 < el_count) ? "," : "",
200 v2e[eidx].name, v2e[eidx].value);
201 }
vlm337167e2005-11-26 11:25:14 +0000202 if(map_extensions)
vlm80a48592005-02-25 12:10:27 +0000203 OUT("\t/* This list is extensible */\n");
204 OUT("};\n");
205
vlm337167e2005-11-26 11:25:14 +0000206 OUT("static asn_INTEGER_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000207 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000208 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +0000209 OUT("asn_MAP_%s_value2enum_%d,\t"
vlm80a48592005-02-25 12:10:27 +0000210 "/* \"tag\" => N; sorted by tag */\n",
vlm0c6d3812006-03-21 03:40:38 +0000211 MKID(expr),
vlm766cf1e2005-03-04 08:48:53 +0000212 expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000213 OUT("asn_MAP_%s_enum2value_%d,\t"
vlm80a48592005-02-25 12:10:27 +0000214 "/* N => \"tag\"; sorted by N */\n",
vlm0c6d3812006-03-21 03:40:38 +0000215 MKID(expr),
vlm766cf1e2005-03-04 08:48:53 +0000216 expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000217 OUT("%d,\t/* Number of elements in the maps */\n",
218 el_count);
vlm337167e2005-11-26 11:25:14 +0000219 if(map_extensions) {
220 OUT("%d,\t/* Extensions before this member */\n",
221 map_extensions);
222 } else {
223 OUT("0,\t/* Enumeration is not extensible */\n");
224 }
vlm80a48592005-02-25 12:10:27 +0000225 if(expr->expr_type == ASN_BASIC_ENUMERATED)
226 OUT("1\t/* Strict enumeration */\n");
227 else
228 OUT("0\n");
229 INDENT(-1);
230 OUT("};\n");
vlmfa67ddc2004-06-03 03:38:44 +0000231 }
232
233 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
234}
235
236int
vlm96853d82005-08-13 23:51:47 +0000237asn1c_lang_C_type_BIT_STRING(arg_t *arg) {
238 asn1p_expr_t *expr = arg->expr;
239 asn1p_expr_t *v;
240 int el_count = expr_elements_count(arg, expr);
vlm96853d82005-08-13 23:51:47 +0000241
242 if(el_count) {
vlm75b3a532005-08-14 02:18:27 +0000243 int eidx = 0;
vlm96853d82005-08-13 23:51:47 +0000244 REDIR(OT_DEPS);
245 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000246 out_name_chain(arg, ONC_avoid_keywords);
vlm96853d82005-08-13 23:51:47 +0000247 OUT(" {\n");
248 TQ_FOR(v, &(expr->members), next) {
vlm75b3a532005-08-14 02:18:27 +0000249 if(v->expr_type != A1TC_UNIVERVAL) {
vlm96853d82005-08-13 23:51:47 +0000250 OUT("/* Unexpected BIT STRING element: %s */\n",
251 v->Identifier);
vlm75b3a532005-08-14 02:18:27 +0000252 continue;
vlm96853d82005-08-13 23:51:47 +0000253 }
vlm24238062006-08-26 03:29:15 +0000254 eidx++;
vlm75b3a532005-08-14 02:18:27 +0000255 OUT("\t");
vlm2e774282005-08-14 15:03:31 +0000256 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000257 OUT("_%s", MKID(v));
vlm75b3a532005-08-14 02:18:27 +0000258 OUT("\t= %" PRIdASN "%s\n",
259 v->value->value.v_integer,
260 (eidx < el_count) ? "," : "");
vlm96853d82005-08-13 23:51:47 +0000261 }
vlm7c8aa5e2006-03-21 07:25:18 +0000262 OUT("} e_");
vlm2e774282005-08-14 15:03:31 +0000263 out_name_chain(arg, ONC_noflags);
vlm7c8aa5e2006-03-21 07:25:18 +0000264 OUT(";\n");
vlm96853d82005-08-13 23:51:47 +0000265 assert(eidx == el_count);
266 }
267
268 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
269}
270
271int
vlmfa67ddc2004-06-03 03:38:44 +0000272asn1c_lang_C_type_SEQUENCE(arg_t *arg) {
273 asn1p_expr_t *expr = arg->expr;
274 asn1p_expr_t *v;
275 int comp_mode = 0; /* {root,ext=1,root,root,...} */
276
277 DEPENDENCIES;
278
279 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000280 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000281 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000282 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000283 } else {
284 OUT("typedef struct %s {\n",
vlm0c6d3812006-03-21 03:40:38 +0000285 MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000286 }
287
288 TQ_FOR(v, &(expr->members), next) {
vlm5a6fc652005-08-16 17:00:21 +0000289 if(v->expr_type == A1TC_EXTENSIBLE)
vlmfa67ddc2004-06-03 03:38:44 +0000290 if(comp_mode < 3) comp_mode++;
vlm5a6fc652005-08-16 17:00:21 +0000291 if(comp_mode == 1)
vlm337167e2005-11-26 11:25:14 +0000292 v->marker.flags |= EM_OMITABLE | EM_INDIRECT;
293 try_inline_default(arg, v, 1);
vlmfa67ddc2004-06-03 03:38:44 +0000294 EMBED(v);
295 }
296
297 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000298 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm1f7df782005-03-04 23:48:19 +0000299 expr->_anonymous_type ? "" :
300 arg->embed
vlm0c6d3812006-03-21 03:40:38 +0000301 ? MKID_safe(expr)
302 : MKID(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000303 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000304
305 return asn1c_lang_C_type_SEQUENCE_def(arg);
306}
307
308static int
309asn1c_lang_C_type_SEQUENCE_def(arg_t *arg) {
310 asn1p_expr_t *expr = arg->expr;
311 asn1p_expr_t *v;
312 int elements; /* Number of elements */
vlmfa67ddc2004-06-03 03:38:44 +0000313 int ext_start = -1;
314 int ext_stop = -1;
vlm4e03ce22004-06-06 07:20:17 +0000315 tag2el_t *tag2el = NULL;
316 int tag2el_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000317 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000318 int all_tags_count;
319 enum tvm_compat tv_mode;
vlm337167e2005-11-26 11:25:14 +0000320 int roms_count; /* Root optional members */
321 int aoms_count; /* Additions optional members */
vlmfa67ddc2004-06-03 03:38:44 +0000322
vlm4e03ce22004-06-06 07:20:17 +0000323 /*
324 * Fetch every inner tag from the tag to elements map.
325 */
vlm940bc6b2004-10-03 09:13:30 +0000326 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlm4e03ce22004-06-06 07:20:17 +0000327 if(tag2el) free(tag2el);
328 return -1;
329 }
330
vlmea226772006-09-13 02:51:20 +0000331 GEN_INCLUDE_STD("constr_SEQUENCE");
vlm33a4ff12004-08-11 05:21:32 +0000332 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000333 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000334
vlm33a4ff12004-08-11 05:21:32 +0000335 REDIR(OT_STAT_DEFS);
vlmfa67ddc2004-06-03 03:38:44 +0000336
337 /*
vlm337167e2005-11-26 11:25:14 +0000338 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000339 */
vlm39ba4c42004-09-22 16:06:28 +0000340 if(expr_elements_count(arg, expr)) {
341 int comp_mode = 0; /* {root,ext=1,root,root,...} */
vlmfa67ddc2004-06-03 03:38:44 +0000342
vlm337167e2005-11-26 11:25:14 +0000343 if(emit_members_PER_constraints(arg))
344 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000345 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000346 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000347
348 elements = 0;
vlm337167e2005-11-26 11:25:14 +0000349 roms_count = 0;
350 aoms_count = 0;
vlm39ba4c42004-09-22 16:06:28 +0000351 INDENTED(TQ_FOR(v, &(expr->members), next) {
352 if(v->expr_type == A1TC_EXTENSIBLE) {
353 if((++comp_mode) == 1)
354 ext_start = elements - 1;
355 else
356 ext_stop = elements - 1;
357 continue;
358 }
vlm337167e2005-11-26 11:25:14 +0000359 if(v->marker.flags & EM_OMITABLE)
360 comp_mode == 1 ? ++aoms_count : ++roms_count;
vlm39ba4c42004-09-22 16:06:28 +0000361 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000362 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000363 });
364 OUT("};\n");
vlm337167e2005-11-26 11:25:14 +0000365
366 if((roms_count + aoms_count) && (arg->flags & A1C_GEN_PER)) {
367 int elm = 0;
368 int comma = 0;
369 comp_mode = 0;
370 OUT("static int asn_MAP_%s_oms_%d[] = {",
vlm0c6d3812006-03-21 03:40:38 +0000371 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000372 expr->_type_unique_index);
373 TQ_FOR(v, &(expr->members), next) {
374 if(v->expr_type == A1TC_EXTENSIBLE) {
375 ++comp_mode;
376 continue;
377 }
378 if((v->marker.flags & EM_OMITABLE)
379 && comp_mode != 1) {
380 if(!comma) comma++;
381 else OUT(",");
382 OUT(" %d", elm);
383 }
384 ++elm;
385 }
386 elm = 0;
387 comp_mode = 0;
388 TQ_FOR(v, &(expr->members), next) {
389 if(v->expr_type == A1TC_EXTENSIBLE) {
390 ++comp_mode;
391 continue;
392 }
393 if((v->marker.flags & EM_OMITABLE)
394 && comp_mode == 1) {
395 if(!comma) comma++;
396 else OUT(",");
397 OUT(" %d", elm);
398 }
399 ++elm;
400 }
401 OUT(" };\n");
402 if(roms_count > 65536)
403 FATAL("Too many optional elements in %s "
404 "at line %d!",
405 arg->expr->Identifier,
406 arg->expr->_lineno);
407 } else {
408 roms_count = 0;
409 aoms_count = 0;
410 }
vlm39ba4c42004-09-22 16:06:28 +0000411 } else {
412 elements = 0;
vlm337167e2005-11-26 11:25:14 +0000413 roms_count = 0;
414 aoms_count = 0;
vlm39ba4c42004-09-22 16:06:28 +0000415 }
vlmfa67ddc2004-06-03 03:38:44 +0000416
vlm4a3f5822004-06-28 21:13:46 +0000417 /*
vlma5dcb912004-09-29 13:16:40 +0000418 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000419 */
vlm72425de2004-09-13 08:31:01 +0000420 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000421
vlm4e03ce22004-06-06 07:20:17 +0000422 /*
423 * Tags to elements map.
424 */
vlm940bc6b2004-10-03 09:13:30 +0000425 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
vlm4e03ce22004-06-06 07:20:17 +0000426
vlm337167e2005-11-26 11:25:14 +0000427 OUT("static asn_SEQUENCE_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000428 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000429 INDENT(+1);
430 OUT("sizeof(struct ");
431 out_name_chain(arg, ONC_avoid_keywords); OUT("),\n");
432 OUT("offsetof(struct ");
433 out_name_chain(arg, ONC_avoid_keywords); OUT(", _asn_ctx),\n");
vlm766cf1e2005-03-04 08:48:53 +0000434
vlm337167e2005-11-26 11:25:14 +0000435 if(tag2el_count) {
436 OUT("asn_MAP_%s_tag2el_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +0000437 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000438 expr->_type_unique_index);
439 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
440 } else {
441 OUT("0,\t/* No top level tags */\n");
442 OUT("0,\t/* No tags in the map */\n");
443 }
444 if(roms_count + aoms_count) {
445 OUT("asn_MAP_%s_oms_%d,\t/* Optional members */\n",
vlm0c6d3812006-03-21 03:40:38 +0000446 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000447 OUT("%d, %d,\t/* Root/Additions */\n", roms_count, aoms_count);
448 } else {
449 OUT("0, 0, 0,\t/* Optional elements (not needed) */\n");
450 }
451 OUT("%d,\t/* Start extensions */\n",
vlmfa67ddc2004-06-03 03:38:44 +0000452 ext_start);
vlm337167e2005-11-26 11:25:14 +0000453 OUT("%d\t/* Stop extensions */\n",
vlmfa67ddc2004-06-03 03:38:44 +0000454 (ext_stop<ext_start)?elements+1:ext_stop, ext_stop);
vlm337167e2005-11-26 11:25:14 +0000455 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000456 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000457
458 /*
vlma5dcb912004-09-29 13:16:40 +0000459 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000460 */
vlm72425de2004-09-13 08:31:01 +0000461 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +0000462 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000463
vlmfa67ddc2004-06-03 03:38:44 +0000464 REDIR(OT_TYPE_DECLS);
465
466 return 0;
vlmedf203f2005-01-17 11:57:48 +0000467} /* _SEQUENCE_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000468
469int
vlmfa67ddc2004-06-03 03:38:44 +0000470asn1c_lang_C_type_SET(arg_t *arg) {
471 asn1p_expr_t *expr = arg->expr;
472 asn1p_expr_t *v;
473 long mcount;
474 char *id;
475 int comp_mode = 0; /* {root,ext=1,root,root,...} */
476
477 DEPENDENCIES;
478
479 REDIR(OT_DEPS);
480
481 OUT("\n");
482 OUT("/*\n");
483 OUT(" * Method of determining the components presence\n");
484 OUT(" */\n");
485 mcount = 0;
vlm766cf1e2005-03-04 08:48:53 +0000486 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000487 out_name_chain(arg, ONC_noflags);
vlm766cf1e2005-03-04 08:48:53 +0000488 OUT("_PR {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000489 TQ_FOR(v, &(expr->members), next) {
490 if(v->expr_type == A1TC_EXTENSIBLE) continue;
491 INDENTED(
vlm2e774282005-08-14 15:03:31 +0000492 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000493 OUT("_PR_");
vlm0c6d3812006-03-21 03:40:38 +0000494 id = MKID(v);
vlmfa67ddc2004-06-03 03:38:44 +0000495 OUT("%s,\t/* Member %s is present */\n",
496 id, id)
497 );
498 mcount++;
499 }
vlm2e774282005-08-14 15:03:31 +0000500 OUT("} "); out_name_chain(arg, ONC_noflags); OUT("_PR;\n");
vlmfa67ddc2004-06-03 03:38:44 +0000501
502 REDIR(OT_TYPE_DECLS);
503
504 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000505 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000506 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000507 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000508 } else {
vlm337167e2005-11-26 11:25:14 +0000509 OUT("typedef struct %s {\n",
vlm0c6d3812006-03-21 03:40:38 +0000510 MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000511 }
512
513 TQ_FOR(v, &(expr->members), next) {
vlm337167e2005-11-26 11:25:14 +0000514 if(v->expr_type == A1TC_EXTENSIBLE)
vlmfa67ddc2004-06-03 03:38:44 +0000515 if(comp_mode < 3) comp_mode++;
vlm5a6fc652005-08-16 17:00:21 +0000516 if(comp_mode == 1)
vlm337167e2005-11-26 11:25:14 +0000517 v->marker.flags |= EM_OMITABLE | EM_INDIRECT;
518 try_inline_default(arg, v, 1);
vlmfa67ddc2004-06-03 03:38:44 +0000519 EMBED(v);
520 }
521
522 INDENTED(
vlm0c6d3812006-03-21 03:40:38 +0000523 id = MKID(expr);
vlmfa67ddc2004-06-03 03:38:44 +0000524 OUT("\n");
525 OUT("/* Presence bitmask: ASN_SET_ISPRESENT(p%s, %s_PR_x) */\n",
526 id, id);
527 OUT("unsigned int _presence_map\n");
528 OUT("\t[((%ld+(8*sizeof(unsigned int))-1)/(8*sizeof(unsigned int)))];\n", mcount);
529 );
530
531 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000532 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm0c6d3812006-03-21 03:40:38 +0000533 expr->_anonymous_type ? "" : MKID_safe(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000534 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000535
536 return asn1c_lang_C_type_SET_def(arg);
537}
538
vlmfa67ddc2004-06-03 03:38:44 +0000539static int
540asn1c_lang_C_type_SET_def(arg_t *arg) {
541 asn1p_expr_t *expr = arg->expr;
542 asn1p_expr_t *v;
543 int elements;
vlmfa67ddc2004-06-03 03:38:44 +0000544 tag2el_t *tag2el = NULL;
545 int tag2el_count = 0;
vlm940bc6b2004-10-03 09:13:30 +0000546 tag2el_t *tag2el_cxer = NULL;
547 int tag2el_cxer_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000548 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000549 int all_tags_count;
550 enum tvm_compat tv_mode;
vlmfa67ddc2004-06-03 03:38:44 +0000551 char *p;
552
553 /*
554 * Fetch every inner tag from the tag to elements map.
555 */
vlm940bc6b2004-10-03 09:13:30 +0000556 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlmfa67ddc2004-06-03 03:38:44 +0000557 if(tag2el) free(tag2el);
558 return -1;
vlmfa67ddc2004-06-03 03:38:44 +0000559 }
vlm940bc6b2004-10-03 09:13:30 +0000560 if(_fill_tag2el_map(arg, &tag2el_cxer, &tag2el_cxer_count, -1, FTE_CANONICAL_XER)) {
561 if(tag2el) free(tag2el);
562 if(tag2el_cxer) free(tag2el_cxer);
563 return -1;
564 }
565 if(tag2el_cxer_count == tag2el_count
566 && memcmp(tag2el, tag2el_cxer, tag2el_count) == 0) {
567 free(tag2el_cxer);
568 tag2el_cxer = 0;
569 }
vlmfa67ddc2004-06-03 03:38:44 +0000570
vlmea226772006-09-13 02:51:20 +0000571 GEN_INCLUDE_STD("constr_SET");
vlm33a4ff12004-08-11 05:21:32 +0000572 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000573 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000574
575 REDIR(OT_STAT_DEFS);
576
vlmfa67ddc2004-06-03 03:38:44 +0000577 /*
vlm337167e2005-11-26 11:25:14 +0000578 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000579 */
vlm39ba4c42004-09-22 16:06:28 +0000580 if(expr_elements_count(arg, expr)) {
581 int comp_mode = 0; /* {root,ext=1,root,root,...} */
vlmfa67ddc2004-06-03 03:38:44 +0000582
vlm337167e2005-11-26 11:25:14 +0000583 if(emit_members_PER_constraints(arg))
584 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000585 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000586 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000587
588 elements = 0;
589 INDENTED(TQ_FOR(v, &(expr->members), next) {
590 if(v->expr_type == A1TC_EXTENSIBLE) {
591 if(comp_mode < 3) comp_mode++;
592 } else {
vlm39ba4c42004-09-22 16:06:28 +0000593 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000594 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000595 }
596 });
597 OUT("};\n");
598 } else {
599 elements = 0;
600 }
vlmfa67ddc2004-06-03 03:38:44 +0000601
vlm4a3f5822004-06-28 21:13:46 +0000602 /*
vlma5dcb912004-09-29 13:16:40 +0000603 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000604 */
vlm72425de2004-09-13 08:31:01 +0000605 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000606
607 /*
608 * Tags to elements map.
609 */
vlm940bc6b2004-10-03 09:13:30 +0000610 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
611 if(tag2el_cxer)
612 emit_tag2member_map(arg, tag2el_cxer, tag2el_cxer_count, "_cxer");
vlmfa67ddc2004-06-03 03:38:44 +0000613
614 /*
615 * Emit a map of mandatory elements.
616 */
vlm337167e2005-11-26 11:25:14 +0000617 OUT("static uint8_t asn_MAP_%s_mmap_%d",
vlm0c6d3812006-03-21 03:40:38 +0000618 MKID(expr), expr->_type_unique_index);
619 p = MKID_safe(expr);
vlmfa67ddc2004-06-03 03:38:44 +0000620 OUT("[(%d + (8 * sizeof(unsigned int)) - 1) / 8]", elements);
vlm766cf1e2005-03-04 08:48:53 +0000621 OUT(" = {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000622 INDENTED(
623 if(elements) {
vlmfa67ddc2004-06-03 03:38:44 +0000624 int el = 0;
625 TQ_FOR(v, &(expr->members), next) {
626 if(v->expr_type == A1TC_EXTENSIBLE) continue;
vlme2873192005-10-05 08:59:03 +0000627 if(el) {
628 if((el % 8) == 0)
629 OUT(",\n");
630 else
631 OUT(" | ");
vlmfa67ddc2004-06-03 03:38:44 +0000632 }
vlmddd5a7d2004-09-10 09:18:20 +0000633 OUT("(%d << %d)",
vlm6c4a8502005-08-18 13:38:19 +0000634 (v->marker.flags & EM_OMITABLE) != EM_OMITABLE,
vlmddd5a7d2004-09-10 09:18:20 +0000635 7 - (el % 8));
vlmfa67ddc2004-06-03 03:38:44 +0000636 el++;
637 }
638 } else {
639 OUT("0");
640 }
641 );
642 OUT("\n");
643 OUT("};\n");
644
vlm337167e2005-11-26 11:25:14 +0000645 OUT("static asn_SET_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000646 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000647 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000648 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000649 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000650 OUT("),\n");
651 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000652 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000653 OUT(", _asn_ctx),\n");
654 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000655 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000656 OUT(", _presence_map),\n");
vlm0c6d3812006-03-21 03:40:38 +0000657 p = MKID(expr);
vlm337167e2005-11-26 11:25:14 +0000658 OUT("asn_MAP_%s_tag2el_%d,\n", p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000659 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
vlm940bc6b2004-10-03 09:13:30 +0000660 if(tag2el_cxer)
vlm337167e2005-11-26 11:25:14 +0000661 OUT("asn_MAP_%s_tag2el_cxer_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +0000662 p, expr->_type_unique_index);
vlm940bc6b2004-10-03 09:13:30 +0000663 else
vlm337167e2005-11-26 11:25:14 +0000664 OUT("asn_MAP_%s_tag2el_%d,\t/* Same as above */\n",
vlm766cf1e2005-03-04 08:48:53 +0000665 p, expr->_type_unique_index);
666 OUT("%d,\t/* Count of tags in the CXER map */\n",
667 tag2el_cxer_count);
vlm79b08d52004-07-01 00:52:50 +0000668 OUT("%d,\t/* Whether extensible */\n",
vlm337167e2005-11-26 11:25:14 +0000669 compute_extensions_start(expr) == -1 ? 0 : 1);
670 OUT("(unsigned int *)asn_MAP_%s_mmap_%d\t/* Mandatory elements map */\n",
vlm766cf1e2005-03-04 08:48:53 +0000671 p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000672 );
673 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000674
675 /*
vlma5dcb912004-09-29 13:16:40 +0000676 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000677 */
vlm72425de2004-09-13 08:31:01 +0000678 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +0000679 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000680
vlmfa67ddc2004-06-03 03:38:44 +0000681 REDIR(OT_TYPE_DECLS);
682
683 return 0;
vlmedf203f2005-01-17 11:57:48 +0000684} /* _SET_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000685
686int
vlmdae7f9d2004-08-22 03:25:24 +0000687asn1c_lang_C_type_SEx_OF(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +0000688 asn1p_expr_t *expr = arg->expr;
vlm0b567bf2005-03-04 22:18:20 +0000689 asn1p_expr_t *memb = TQ_FIRST(&expr->members);
vlmfa67ddc2004-06-03 03:38:44 +0000690
691 DEPENDENCIES;
692
693 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000694 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000695 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000696 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000697 } else {
vlm0c6d3812006-03-21 03:40:38 +0000698 OUT("typedef struct %s {\n", MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000699 }
700
vlmdae7f9d2004-08-22 03:25:24 +0000701 INDENT(+1);
702 OUT("A_%s_OF(",
703 (arg->expr->expr_type == ASN_CONSTR_SET_OF)
704 ? "SET" : "SEQUENCE");
vlm5a6fc652005-08-16 17:00:21 +0000705
706 /*
707 * README README
708 * The implementation of the A_SET_OF() macro is already indirect.
709 */
710 memb->marker.flags |= EM_INDIRECT;
711
vlm80a48592005-02-25 12:10:27 +0000712 if(memb->expr_type & ASN_CONSTR_MASK
713 || ((memb->expr_type == ASN_BASIC_ENUMERATED
vlmc89422d2005-03-03 21:28:12 +0000714 || (0 /* -- prohibited by X.693:8.3.4 */
715 && memb->expr_type == ASN_BASIC_INTEGER))
716 && expr_elements_count(arg, memb))) {
vlmdae7f9d2004-08-22 03:25:24 +0000717 arg_t tmp;
718 asn1p_expr_t tmp_memb;
719 arg->embed++;
720 tmp = *arg;
721 tmp.expr = &tmp_memb;
722 tmp_memb = *memb;
vlm5a6fc652005-08-16 17:00:21 +0000723 tmp_memb.marker.flags &= ~EM_INDIRECT;
vlmdae7f9d2004-08-22 03:25:24 +0000724 tmp_memb._anonymous_type = 1;
vlm39ba4c42004-09-22 16:06:28 +0000725 if(tmp_memb.Identifier == 0) {
vlm766cf1e2005-03-04 08:48:53 +0000726 tmp_memb.Identifier = "Member";
727 if(0)
vlm39ba4c42004-09-22 16:06:28 +0000728 tmp_memb.Identifier = strdup(
729 asn1c_make_identifier(0,
vlm0c6d3812006-03-21 03:40:38 +0000730 expr, "Member", 0));
vlm39ba4c42004-09-22 16:06:28 +0000731 assert(tmp_memb.Identifier);
732 }
vlmdae7f9d2004-08-22 03:25:24 +0000733 tmp.default_cb(&tmp);
vlm39ba4c42004-09-22 16:06:28 +0000734 if(tmp_memb.Identifier != memb->Identifier)
vlm766cf1e2005-03-04 08:48:53 +0000735 if(0) free(tmp_memb.Identifier);
vlmdae7f9d2004-08-22 03:25:24 +0000736 arg->embed--;
737 assert(arg->target->target == OT_TYPE_DECLS);
738 } else {
vlm6c5d5e52005-03-04 22:38:22 +0000739 OUT("%s", asn1c_type_name(arg, memb,
740 (memb->marker.flags & EM_UNRECURSE)
741 ? TNF_RSAFE : TNF_CTYPE));
vlmfa67ddc2004-06-03 03:38:44 +0000742 }
vlm5a6fc652005-08-16 17:00:21 +0000743 /* README README (above) */
744 if(0 && (memb->marker.flags & EM_INDIRECT))
745 OUT(" *");
vlmdae7f9d2004-08-22 03:25:24 +0000746 OUT(") list;\n");
747 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000748
749 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000750 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm0c6d3812006-03-21 03:40:38 +0000751 expr->_anonymous_type ? "" : MKID_safe(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000752 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000753
754 /*
vlmdae7f9d2004-08-22 03:25:24 +0000755 * SET OF/SEQUENCE OF definition
vlmfa67ddc2004-06-03 03:38:44 +0000756 */
vlmdae7f9d2004-08-22 03:25:24 +0000757 return asn1c_lang_C_type_SEx_OF_def(arg,
758 (arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF));
vlmfa67ddc2004-06-03 03:38:44 +0000759}
760
761static int
762asn1c_lang_C_type_SEx_OF_def(arg_t *arg, int seq_of) {
763 asn1p_expr_t *expr = arg->expr;
764 asn1p_expr_t *v;
vlm6e73a042004-08-11 07:17:22 +0000765 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000766 int all_tags_count;
767 enum tvm_compat tv_mode;
vlmfa67ddc2004-06-03 03:38:44 +0000768
vlm33a4ff12004-08-11 05:21:32 +0000769 /*
vlm337167e2005-11-26 11:25:14 +0000770 * Print out the table according to which parsing is performed.
vlm33a4ff12004-08-11 05:21:32 +0000771 */
vlmfa67ddc2004-06-03 03:38:44 +0000772 if(seq_of) {
vlmea226772006-09-13 02:51:20 +0000773 GEN_INCLUDE_STD("constr_SEQUENCE_OF");
vlmfa67ddc2004-06-03 03:38:44 +0000774 } else {
vlmea226772006-09-13 02:51:20 +0000775 GEN_INCLUDE_STD("constr_SET_OF");
vlmfa67ddc2004-06-03 03:38:44 +0000776 }
vlm33a4ff12004-08-11 05:21:32 +0000777 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000778 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000779
780 REDIR(OT_STAT_DEFS);
781
782 /*
vlm337167e2005-11-26 11:25:14 +0000783 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000784 */
vlm337167e2005-11-26 11:25:14 +0000785 if(emit_members_PER_constraints(arg))
786 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000787 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000788 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000789 INDENT(+1);
vlmfa67ddc2004-06-03 03:38:44 +0000790 v = TQ_FIRST(&(expr->members));
vlm39ba4c42004-09-22 16:06:28 +0000791 if(!v->Identifier) {
vlmbf3c5112005-02-14 20:41:29 +0000792 v->Identifier = strdup("Member");
vlm39ba4c42004-09-22 16:06:28 +0000793 assert(v->Identifier);
794 }
795 v->_anonymous_type = 1;
796 arg->embed++;
vlm4e554992004-08-25 02:03:12 +0000797 emit_member_table(arg, v);
vlm39ba4c42004-09-22 16:06:28 +0000798 arg->embed--;
799 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000800 OUT("};\n");
801
vlm4a3f5822004-06-28 21:13:46 +0000802 /*
vlma5dcb912004-09-29 13:16:40 +0000803 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000804 */
vlm72425de2004-09-13 08:31:01 +0000805 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000806
vlm337167e2005-11-26 11:25:14 +0000807 OUT("static asn_SET_OF_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000808 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000809 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000810 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000811 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000812 OUT("),\n");
813 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000814 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000815 OUT(", _asn_ctx),\n");
vlm6d44a542005-11-08 03:06:16 +0000816 {
817 int as_xvl = expr_as_xmlvaluelist(arg, v);
818 OUT("%d,\t/* XER encoding is %s */\n",
819 as_xvl,
820 as_xvl ? "XMLValueList" : "XMLDelimitedItemList");
821 }
vlmfa67ddc2004-06-03 03:38:44 +0000822 );
823 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000824
825 /*
vlma5dcb912004-09-29 13:16:40 +0000826 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000827 */
vlm72425de2004-09-13 08:31:01 +0000828 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, 1,
vlm86f5ed22004-09-26 13:11:31 +0000829 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000830
vlmfa67ddc2004-06-03 03:38:44 +0000831 REDIR(OT_TYPE_DECLS);
832
833 return 0;
vlmedf203f2005-01-17 11:57:48 +0000834} /* _SEx_OF_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000835
836int
837asn1c_lang_C_type_CHOICE(arg_t *arg) {
838 asn1p_expr_t *expr = arg->expr;
839 asn1p_expr_t *v;
vlmdae7f9d2004-08-22 03:25:24 +0000840 char *id;
vlmfa67ddc2004-06-03 03:38:44 +0000841
842 DEPENDENCIES;
843
vlm33a4ff12004-08-11 05:21:32 +0000844 REDIR(OT_DEPS);
845
vlm766cf1e2005-03-04 08:48:53 +0000846 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000847 out_name_chain(arg, ONC_noflags);
vlm766cf1e2005-03-04 08:48:53 +0000848 OUT("_PR {\n");
vlm33a4ff12004-08-11 05:21:32 +0000849 INDENTED(
vlm6aa50982006-08-18 01:38:40 +0000850 int skipComma = 1;
vlm2e774282005-08-14 15:03:31 +0000851 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000852 OUT("_PR_NOTHING,\t/* No components present */\n");
vlm33a4ff12004-08-11 05:21:32 +0000853 TQ_FOR(v, &(expr->members), next) {
vlm6aa50982006-08-18 01:38:40 +0000854 if(skipComma) skipComma = 0;
vlm9ea7d412006-08-18 01:32:26 +0000855 else OUT(",\n");
vlm33a4ff12004-08-11 05:21:32 +0000856 if(v->expr_type == A1TC_EXTENSIBLE) {
857 OUT("/* Extensions may appear below */\n");
vlm6aa50982006-08-18 01:38:40 +0000858 skipComma = 1;
vlm33a4ff12004-08-11 05:21:32 +0000859 continue;
860 }
vlm2e774282005-08-14 15:03:31 +0000861 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000862 id = MKID(v);
vlm9ea7d412006-08-18 01:32:26 +0000863 OUT("_PR_%s", id);
vlm33a4ff12004-08-11 05:21:32 +0000864 }
vlm9ea7d412006-08-18 01:32:26 +0000865 OUT("\n");
vlm33a4ff12004-08-11 05:21:32 +0000866 );
vlm2e774282005-08-14 15:03:31 +0000867 OUT("} "); out_name_chain(arg, ONC_noflags); OUT("_PR;\n");
vlm33a4ff12004-08-11 05:21:32 +0000868
869 REDIR(OT_TYPE_DECLS);
vlmfa67ddc2004-06-03 03:38:44 +0000870
871 if(arg->embed) {
vlm2e774282005-08-14 15:03:31 +0000872 OUT("struct "); out_name_chain(arg, ONC_avoid_keywords); OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000873 } else {
vlm0c6d3812006-03-21 03:40:38 +0000874 OUT("typedef struct %s {\n", MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000875 }
876
877 INDENTED(
vlm2e774282005-08-14 15:03:31 +0000878 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000879 OUT("_PR present;\n");
vlm2e774282005-08-14 15:03:31 +0000880 OUT("union ");
881 if(UNNAMED_UNIONS == 0) {
882 out_name_chain(arg, ONC_force_compound_name);
883 OUT("_u ");
884 }
885 OUT("{\n");
vlmfa67ddc2004-06-03 03:38:44 +0000886 TQ_FOR(v, &(expr->members), next) {
887 EMBED(v);
888 }
889 if(UNNAMED_UNIONS) OUT("};\n");
890 else OUT("} choice;\n");
891 );
892
893 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000894 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm1f7df782005-03-04 23:48:19 +0000895 expr->_anonymous_type ? "" :
896 arg->embed
vlm0c6d3812006-03-21 03:40:38 +0000897 ? MKID_safe(expr)
898 : MKID(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000899 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000900
901 return asn1c_lang_C_type_CHOICE_def(arg);
902}
903
904static int
905asn1c_lang_C_type_CHOICE_def(arg_t *arg) {
906 asn1p_expr_t *expr = arg->expr;
907 asn1p_expr_t *v;
908 int elements; /* Number of elements */
vlmfa67ddc2004-06-03 03:38:44 +0000909 tag2el_t *tag2el = NULL;
910 int tag2el_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000911 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000912 int all_tags_count;
913 enum tvm_compat tv_mode;
vlm337167e2005-11-26 11:25:14 +0000914 int *cmap = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000915
916 /*
917 * Fetch every inner tag from the tag to elements map.
918 */
vlm940bc6b2004-10-03 09:13:30 +0000919 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlmfa67ddc2004-06-03 03:38:44 +0000920 if(tag2el) free(tag2el);
921 return -1;
vlmfa67ddc2004-06-03 03:38:44 +0000922 }
923
vlmea226772006-09-13 02:51:20 +0000924 GEN_INCLUDE_STD("constr_CHOICE");
vlm33a4ff12004-08-11 05:21:32 +0000925 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000926 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000927
vlm33a4ff12004-08-11 05:21:32 +0000928 REDIR(OT_STAT_DEFS);
vlmfa67ddc2004-06-03 03:38:44 +0000929
930 /*
vlm337167e2005-11-26 11:25:14 +0000931 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000932 */
vlm39ba4c42004-09-22 16:06:28 +0000933 if(expr_elements_count(arg, expr)) {
vlmfa67ddc2004-06-03 03:38:44 +0000934
vlm337167e2005-11-26 11:25:14 +0000935 if(emit_members_PER_constraints(arg))
936 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000937 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000938 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000939
940 elements = 0;
941 INDENTED(TQ_FOR(v, &(expr->members), next) {
vlm34dcd572005-01-17 11:40:49 +0000942 if(v->expr_type == A1TC_EXTENSIBLE)
943 continue;
vlm34dcd572005-01-17 11:40:49 +0000944 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000945 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000946 });
947 OUT("};\n");
948 } else {
949 elements = 0;
950 }
vlmfa67ddc2004-06-03 03:38:44 +0000951
vlm337167e2005-11-26 11:25:14 +0000952 /* Create a canonical elements map */
953 if(elements && (arg->flags & A1C_GEN_PER)) {
954 int i;
955 cmap = compute_canonical_members_order(arg, elements);
956 if(cmap) {
957 OUT("static int asn_MAP_%s_cmap_%d[] = {",
vlm0c6d3812006-03-21 03:40:38 +0000958 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000959 expr->_type_unique_index);
960 for(i = 0; i < elements; i++) {
961 if(i) OUT(",");
962 OUT(" %d", cmap[i]);
963 }
964 OUT(" };\n");
965 free(cmap);
966 }
967 }
vlm6e73a042004-08-11 07:17:22 +0000968
vlmfa67ddc2004-06-03 03:38:44 +0000969 if(arg->embed) {
970 /*
971 * Our parent structure has already taken this into account.
972 */
vlm72425de2004-09-13 08:31:01 +0000973 tv_mode = _TVM_SAME;
974 tags_count = all_tags_count = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000975 } else {
vlm72425de2004-09-13 08:31:01 +0000976 tv_mode = emit_tags_vectors(arg, expr,
977 &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000978 }
vlmfa67ddc2004-06-03 03:38:44 +0000979
980 /*
981 * Tags to elements map.
982 */
vlm940bc6b2004-10-03 09:13:30 +0000983 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000984
vlm337167e2005-11-26 11:25:14 +0000985 OUT("static asn_CHOICE_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000986 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000987 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000988 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000989 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000990 OUT("),\n");
991 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000992 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000993 OUT(", _asn_ctx),\n");
994 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000995 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000996 OUT(", present),\n");
997 OUT("sizeof(((struct ");
vlm2e774282005-08-14 15:03:31 +0000998 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000999 OUT(" *)0)->present),\n");
vlm337167e2005-11-26 11:25:14 +00001000 OUT("asn_MAP_%s_tag2el_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +00001001 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001002 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
vlm337167e2005-11-26 11:25:14 +00001003 if(C99_MODE) OUT(".canonical_order = ");
1004 if(cmap) OUT("asn_MAP_%s_cmap_%d,\t/* Canonically sorted */\n",
vlm0c6d3812006-03-21 03:40:38 +00001005 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00001006 else OUT("0,\n");
1007 if(C99_MODE) OUT(".ext_start = ");
1008 OUT("%d\t/* Extensions start */\n",
1009 compute_extensions_start(expr));
vlmfa67ddc2004-06-03 03:38:44 +00001010 );
1011 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +00001012
1013 /*
vlma5dcb912004-09-29 13:16:40 +00001014 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +00001015 */
vlm72425de2004-09-13 08:31:01 +00001016 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +00001017 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +00001018
vlmfa67ddc2004-06-03 03:38:44 +00001019 REDIR(OT_TYPE_DECLS);
1020
1021 return 0;
vlmedf203f2005-01-17 11:57:48 +00001022} /* _CHOICE_def() */
vlmfa67ddc2004-06-03 03:38:44 +00001023
1024int
1025asn1c_lang_C_type_REFERENCE(arg_t *arg) {
1026 asn1p_ref_t *ref;
1027
1028 ref = arg->expr->reference;
1029 if(ref->components[ref->comp_count-1].name[0] == '&') {
vlmfa67ddc2004-06-03 03:38:44 +00001030 asn1p_expr_t *extract;
1031 arg_t tmp;
1032 int ret;
1033
vlm39ba4c42004-09-22 16:06:28 +00001034 extract = asn1f_class_access_ex(arg->asn, arg->expr->module,
vlm0c6d3812006-03-21 03:40:38 +00001035 arg->expr, arg->expr->rhs_pspecs, ref);
vlmfa67ddc2004-06-03 03:38:44 +00001036 if(extract == NULL)
1037 return -1;
1038
vlmdae7f9d2004-08-22 03:25:24 +00001039 extract = asn1p_expr_clone(extract, 0);
vlmfa67ddc2004-06-03 03:38:44 +00001040 if(extract) {
1041 if(extract->Identifier)
1042 free(extract->Identifier);
1043 extract->Identifier = strdup(arg->expr->Identifier);
1044 if(extract->Identifier == NULL) {
1045 asn1p_expr_free(extract);
1046 return -1;
1047 }
1048 } else {
1049 return -1;
1050 }
1051
1052 tmp = *arg;
1053 tmp.asn = arg->asn;
vlmfa67ddc2004-06-03 03:38:44 +00001054 tmp.expr = extract;
1055
1056 ret = arg->default_cb(&tmp);
1057
1058 asn1p_expr_free(extract);
1059
1060 return ret;
1061 }
1062
1063
1064 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
1065}
1066
1067int
1068asn1c_lang_C_type_SIMPLE_TYPE(arg_t *arg) {
1069 asn1p_expr_t *expr = arg->expr;
vlm6e73a042004-08-11 07:17:22 +00001070 int tags_count;
vlm72425de2004-09-13 08:31:01 +00001071 int all_tags_count;
1072 enum tvm_compat tv_mode;
vlm80a48592005-02-25 12:10:27 +00001073 enum etd_spec etd_spec;
vlmfa67ddc2004-06-03 03:38:44 +00001074 char *p;
1075
1076 if(arg->embed) {
vlma5dcb912004-09-29 13:16:40 +00001077 enum tnfmt tnfmt = TNF_CTYPE;
1078
1079 /*
1080 * If this is an optional compound type,
1081 * refer it using "struct X" convention,
1082 * as it may recursively include the current structure.
1083 */
vlm0b567bf2005-03-04 22:18:20 +00001084 if(expr->marker.flags & (EM_INDIRECT | EM_UNRECURSE)) {
vlm6c4a8502005-08-18 13:38:19 +00001085 if(terminal_structable(arg, expr)) {
vlm0b567bf2005-03-04 22:18:20 +00001086 tnfmt = TNF_RSAFE;
1087 REDIR(OT_FWD_DECLS);
vlm5feb7522005-03-04 23:50:56 +00001088 OUT("%s;\n",
vlm0b567bf2005-03-04 22:18:20 +00001089 asn1c_type_name(arg, arg->expr, tnfmt));
vlma5dcb912004-09-29 13:16:40 +00001090 }
1091 }
1092
vlmfa67ddc2004-06-03 03:38:44 +00001093 REDIR(OT_TYPE_DECLS);
1094
vlm0b567bf2005-03-04 22:18:20 +00001095 OUT("%s", asn1c_type_name(arg, arg->expr, tnfmt));
vlm80a48592005-02-25 12:10:27 +00001096 if(!expr->_anonymous_type) {
vlm0b567bf2005-03-04 22:18:20 +00001097 OUT("%s", (expr->marker.flags&EM_INDIRECT)?"\t*":"\t ");
vlm0c6d3812006-03-21 03:40:38 +00001098 OUT("%s", MKID_safe(expr));
vlm337167e2005-11-26 11:25:14 +00001099 if((expr->marker.flags & (EM_DEFAULT & ~EM_INDIRECT))
1100 == (EM_DEFAULT & ~EM_INDIRECT))
vlm80a48592005-02-25 12:10:27 +00001101 OUT("\t/* DEFAULT %s */",
1102 asn1f_printable_value(
1103 expr->marker.default_value));
vlm337167e2005-11-26 11:25:14 +00001104 else if((expr->marker.flags & EM_OPTIONAL)
1105 == EM_OPTIONAL)
vlm80a48592005-02-25 12:10:27 +00001106 OUT("\t/* OPTIONAL */");
1107 }
1108
1109 } else {
1110 GEN_INCLUDE(asn1c_type_name(arg, expr, TNF_INCLUDE));
vlmb2839012004-08-20 13:37:01 +00001111
1112 REDIR(OT_TYPE_DECLS);
vlm80a48592005-02-25 12:10:27 +00001113
1114 OUT("typedef %s\t",
vlm0b567bf2005-03-04 22:18:20 +00001115 asn1c_type_name(arg, arg->expr, TNF_CTYPE));
vlm80a48592005-02-25 12:10:27 +00001116 OUT("%s%s_t",
vlm0b567bf2005-03-04 22:18:20 +00001117 (expr->marker.flags & EM_INDIRECT)?"*":" ",
vlm0c6d3812006-03-21 03:40:38 +00001118 MKID(expr));
vlmfa67ddc2004-06-03 03:38:44 +00001119 }
1120
vlm80a48592005-02-25 12:10:27 +00001121 if((expr->expr_type == ASN_BASIC_ENUMERATED)
vlmc89422d2005-03-03 21:28:12 +00001122 || (0 /* -- prohibited by X.693:8.3.4 */
1123 && expr->expr_type == ASN_BASIC_INTEGER
vlm80a48592005-02-25 12:10:27 +00001124 && expr_elements_count(arg, expr)))
1125 etd_spec = ETD_HAS_SPECIFICS;
1126 else
1127 etd_spec = ETD_NO_SPECIFICS;
vlmfa67ddc2004-06-03 03:38:44 +00001128
vlm86f5ed22004-09-26 13:11:31 +00001129 /*
1130 * If this type just blindly refers the other type, alias it.
1131 * Type1 ::= Type2
1132 */
vlm80a48592005-02-25 12:10:27 +00001133 if(arg->embed && etd_spec == ETD_NO_SPECIFICS) {
1134 REDIR(OT_TYPE_DECLS);
1135 return 0;
1136 }
vlm86f5ed22004-09-26 13:11:31 +00001137 if((!expr->constraints || (arg->flags & A1C_NO_CONSTRAINTS))
vlm80a48592005-02-25 12:10:27 +00001138 && (arg->embed || expr->tag.tag_class == TC_NOCLASS)
vlm6f74b0f2005-03-04 23:23:50 +00001139 && etd_spec == ETD_NO_SPECIFICS
1140 && 0 /* This shortcut is incompatible with XER */
1141 ) {
vlm86f5ed22004-09-26 13:11:31 +00001142 char *type_name;
1143 REDIR(OT_FUNC_DECLS);
1144 type_name = asn1c_type_name(arg, expr, TNF_SAFE);
1145 OUT("/* This type is equivalent to %s */\n", type_name);
vlm86f5ed22004-09-26 13:11:31 +00001146 if(HIDE_INNER_DEFS) OUT("/* ");
vlm0c6d3812006-03-21 03:40:38 +00001147 OUT("#define\tasn_DEF_%s\t", MKID(expr));
vlm86f5ed22004-09-26 13:11:31 +00001148 type_name = asn1c_type_name(arg, expr, TNF_SAFE);
vlm80a48592005-02-25 12:10:27 +00001149 OUT("asn_DEF_%s", type_name);
vlm86f5ed22004-09-26 13:11:31 +00001150 if(HIDE_INNER_DEFS)
vlm80a48592005-02-25 12:10:27 +00001151 OUT("\t// (Use -fall-defs-global to expose) */");
1152 OUT("\n");
vlm86f5ed22004-09-26 13:11:31 +00001153 REDIR(OT_CODE);
1154 OUT("/* This type is equivalent to %s */\n", type_name);
1155 OUT("\n");
1156 REDIR(OT_TYPE_DECLS);
1157 return 0;
1158 }
1159
vlmfa67ddc2004-06-03 03:38:44 +00001160 REDIR(OT_STAT_DEFS);
1161
vlm4a3f5822004-06-28 21:13:46 +00001162 /*
vlma5dcb912004-09-29 13:16:40 +00001163 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +00001164 */
vlm72425de2004-09-13 08:31:01 +00001165 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +00001166
vlm80a48592005-02-25 12:10:27 +00001167 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count,
1168 0, etd_spec);
vlmfa67ddc2004-06-03 03:38:44 +00001169
vlmb2839012004-08-20 13:37:01 +00001170 REDIR(OT_CODE);
1171
vlmfa67ddc2004-06-03 03:38:44 +00001172 /*
1173 * Constraint checking.
1174 */
vlm86f5ed22004-09-26 13:11:31 +00001175 if(!(arg->flags & A1C_NO_CONSTRAINTS)) {
vlm0c6d3812006-03-21 03:40:38 +00001176 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001177 if(HIDE_INNER_DEFS) OUT("static ");
vlm86f5ed22004-09-26 13:11:31 +00001178 OUT("int\n");
vlm766cf1e2005-03-04 08:48:53 +00001179 OUT("%s", p);
1180 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1181 OUT("_constraint(asn_TYPE_descriptor_t *td, const void *sptr,\n");
vlm86f5ed22004-09-26 13:11:31 +00001182 INDENT(+1);
vlmaf68ef52006-07-13 11:19:01 +00001183 OUT("\t\tasn_app_constraint_failed_f *ctfailcb, void *app_key) {");
vlm86f5ed22004-09-26 13:11:31 +00001184 OUT("\n");
1185 if(asn1c_emit_constraint_checking_code(arg) == 1) {
1186 OUT("/* Replace with underlying type checker */\n");
1187 OUT("td->check_constraints "
vlma5dcb912004-09-29 13:16:40 +00001188 "= asn_DEF_%s.check_constraints;\n",
vlm86f5ed22004-09-26 13:11:31 +00001189 asn1c_type_name(arg, expr, TNF_SAFE));
1190 OUT("return td->check_constraints"
vlmaf68ef52006-07-13 11:19:01 +00001191 "(td, sptr, ctfailcb, app_key);\n");
vlm1d036692004-08-19 13:29:46 +00001192 }
vlm86f5ed22004-09-26 13:11:31 +00001193 INDENT(-1);
1194 OUT("}\n");
1195 OUT("\n");
vlmfa67ddc2004-06-03 03:38:44 +00001196 }
vlmfa67ddc2004-06-03 03:38:44 +00001197
1198 /*
1199 * Emit suicidal functions.
1200 */
1201
vlmfa67ddc2004-06-03 03:38:44 +00001202 /*
1203 * This function replaces certain fields from the definition
1204 * of a type with the corresponding fields from the basic type
1205 * (from which the current type is inherited).
1206 */
vlmfa67ddc2004-06-03 03:38:44 +00001207 OUT("/*\n");
vlmb2839012004-08-20 13:37:01 +00001208 OUT(" * This type is implemented using %s,\n",
1209 asn1c_type_name(arg, expr, TNF_SAFE));
vlmdcd32fe2004-09-23 22:20:47 +00001210 OUT(" * so here we adjust the DEF accordingly.\n");
vlmfa67ddc2004-06-03 03:38:44 +00001211 OUT(" */\n");
1212 OUT("static void\n");
vlm766cf1e2005-03-04 08:48:53 +00001213 OUT("%s_%d_inherit_TYPE_descriptor(asn_TYPE_descriptor_t *td) {\n",
vlm0c6d3812006-03-21 03:40:38 +00001214 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001215 INDENT(+1);
vlm80a48592005-02-25 12:10:27 +00001216 {
vlm39ba4c42004-09-22 16:06:28 +00001217 asn1p_expr_t *terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
vlmb2839012004-08-20 13:37:01 +00001218 char *type_name = asn1c_type_name(arg, expr, TNF_SAFE);
vlma5dcb912004-09-29 13:16:40 +00001219 OUT("td->free_struct = asn_DEF_%s.free_struct;\n", type_name);
1220 OUT("td->print_struct = asn_DEF_%s.print_struct;\n", type_name);
1221 OUT("td->ber_decoder = asn_DEF_%s.ber_decoder;\n", type_name);
1222 OUT("td->der_encoder = asn_DEF_%s.der_encoder;\n", type_name);
1223 OUT("td->xer_decoder = asn_DEF_%s.xer_decoder;\n", type_name);
1224 OUT("td->xer_encoder = asn_DEF_%s.xer_encoder;\n", type_name);
vlm337167e2005-11-26 11:25:14 +00001225 OUT("td->uper_decoder = asn_DEF_%s.uper_decoder;\n", type_name);
vlm9ea7d412006-08-18 01:32:26 +00001226 OUT("td->uper_encoder = asn_DEF_%s.uper_encoder;\n", type_name);
vlm1308d2b2004-09-10 15:49:15 +00001227 if(!terminal && !tags_count) {
vlm72425de2004-09-13 08:31:01 +00001228 OUT("/* The next four lines are here because of -fknown-extern-type */\n");
vlma5dcb912004-09-29 13:16:40 +00001229 OUT("td->tags = asn_DEF_%s.tags;\n", type_name);
1230 OUT("td->tags_count = asn_DEF_%s.tags_count;\n", type_name);
1231 OUT("td->all_tags = asn_DEF_%s.all_tags;\n", type_name);
1232 OUT("td->all_tags_count = asn_DEF_%s.all_tags_count;\n",type_name);
vlm1308d2b2004-09-10 15:49:15 +00001233 OUT("/* End of these lines */\n");
1234 }
vlm337167e2005-11-26 11:25:14 +00001235 OUT("if(!td->per_constraints)\n");
1236 OUT("\ttd->per_constraints = asn_DEF_%s.per_constraints;\n",
1237 type_name);
vlma5dcb912004-09-29 13:16:40 +00001238 OUT("td->elements = asn_DEF_%s.elements;\n", type_name);
1239 OUT("td->elements_count = asn_DEF_%s.elements_count;\n", type_name);
vlm80a48592005-02-25 12:10:27 +00001240 if(etd_spec != ETD_NO_SPECIFICS) {
1241 INDENT(-1);
vlmc86870c2005-03-29 19:04:24 +00001242 OUT(" /* ");
vlmb2839012004-08-20 13:37:01 +00001243 }
vlm80a48592005-02-25 12:10:27 +00001244 OUT("td->specifics = asn_DEF_%s.specifics;", type_name);
1245 if(etd_spec == ETD_NO_SPECIFICS) {
1246 INDENT(-1);
1247 OUT("\n");
1248 } else {
1249 OUT("\t// Defined explicitly */\n");
1250 }
1251 }
vlmfa67ddc2004-06-03 03:38:44 +00001252 OUT("}\n");
1253 OUT("\n");
vlmfa67ddc2004-06-03 03:38:44 +00001254
vlm0c6d3812006-03-21 03:40:38 +00001255 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001256 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001257 OUT("void\n");
vlm766cf1e2005-03-04 08:48:53 +00001258 OUT("%s", p);
1259 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1260 OUT("_free(asn_TYPE_descriptor_t *td,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001261 INDENTED(
vlm39ba4c42004-09-22 16:06:28 +00001262 OUT("\tvoid *struct_ptr, int contents_only) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001263 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1264 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001265 OUT("td->free_struct(td, struct_ptr, contents_only);\n");
vlmfa67ddc2004-06-03 03:38:44 +00001266 );
1267 OUT("}\n");
1268 OUT("\n");
1269
vlm0c6d3812006-03-21 03:40:38 +00001270 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001271 if(HIDE_INNER_DEFS) OUT("static ");
vlmfa67ddc2004-06-03 03:38:44 +00001272 OUT("int\n");
vlm766cf1e2005-03-04 08:48:53 +00001273 OUT("%s", p);
1274 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1275 OUT("_print(asn_TYPE_descriptor_t *td, const void *struct_ptr,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001276 INDENTED(
1277 OUT("\tint ilevel, asn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001278 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1279 p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001280 OUT("return td->print_struct(td, struct_ptr, ilevel, cb, app_key);\n");
1281 );
1282 OUT("}\n");
1283 OUT("\n");
1284
vlm0c6d3812006-03-21 03:40:38 +00001285 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001286 if(HIDE_INNER_DEFS) OUT("static ");
vlm9de248e2004-10-20 15:50:55 +00001287 OUT("asn_dec_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001288 OUT("%s", p);
1289 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1290 OUT("_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001291 INDENTED(
vlmfcc4cbc2005-03-17 21:56:00 +00001292 OUT("\tvoid **structure, const void *bufptr, size_t size, int tag_mode) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001293 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1294 p, expr->_type_unique_index);
vlma5dcb912004-09-29 13:16:40 +00001295 OUT("return td->ber_decoder(opt_codec_ctx, td, structure, bufptr, size, tag_mode);\n");
vlm39ba4c42004-09-22 16:06:28 +00001296 );
1297 OUT("}\n");
1298 OUT("\n");
1299
vlm0c6d3812006-03-21 03:40:38 +00001300 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001301 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001302 OUT("asn_enc_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001303 OUT("%s", p);
1304 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1305 OUT("_encode_der(asn_TYPE_descriptor_t *td,\n");
vlm39ba4c42004-09-22 16:06:28 +00001306 INDENTED(
1307 OUT("\tvoid *structure, int tag_mode, ber_tlv_tag_t tag,\n");
1308 OUT("\tasn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001309 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1310 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001311 OUT("return td->der_encoder(td, structure, tag_mode, tag, cb, app_key);\n");
1312 );
1313 OUT("}\n");
1314 OUT("\n");
1315
vlm0c6d3812006-03-21 03:40:38 +00001316 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001317 if(HIDE_INNER_DEFS) OUT("static ");
vlme03646b2004-10-23 13:34:00 +00001318 OUT("asn_dec_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001319 OUT("%s", p);
1320 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1321 OUT("_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
vlme03646b2004-10-23 13:34:00 +00001322 INDENTED(
vlmfcc4cbc2005-03-17 21:56:00 +00001323 OUT("\tvoid **structure, const char *opt_mname, const void *bufptr, size_t size) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001324 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1325 p, expr->_type_unique_index);
vlme03646b2004-10-23 13:34:00 +00001326 OUT("return td->xer_decoder(opt_codec_ctx, td, structure, opt_mname, bufptr, size);\n");
1327 );
1328 OUT("}\n");
1329 OUT("\n");
1330
vlm0c6d3812006-03-21 03:40:38 +00001331 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001332 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001333 OUT("asn_enc_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001334 OUT("%s", p);
1335 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1336 OUT("_encode_xer(asn_TYPE_descriptor_t *td, void *structure,\n");
vlm39ba4c42004-09-22 16:06:28 +00001337 INDENTED(
1338 OUT("\tint ilevel, enum xer_encoder_flags_e flags,\n");
1339 OUT("\tasn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001340 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1341 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001342 OUT("return td->xer_encoder(td, structure, ilevel, flags, cb, app_key);\n");
vlmfa67ddc2004-06-03 03:38:44 +00001343 );
1344 OUT("}\n");
1345 OUT("\n");
1346
vlm337167e2005-11-26 11:25:14 +00001347 if(arg->flags & A1C_GEN_PER) {
vlm0c6d3812006-03-21 03:40:38 +00001348 p = MKID(expr);
vlm9ea7d412006-08-18 01:32:26 +00001349
vlm337167e2005-11-26 11:25:14 +00001350 if(HIDE_INNER_DEFS) OUT("static ");
1351 OUT("asn_dec_rval_t\n");
1352 OUT("%s", p);
1353 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1354 OUT("_decode_uper(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
1355 INDENTED(
1356 OUT("\tasn_per_constraints_t *constraints, void **structure, asn_per_data_t *per_data) {\n");
1357 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1358 p, expr->_type_unique_index);
1359 OUT("return td->uper_decoder(opt_codec_ctx, td, constraints, structure, per_data);\n");
1360 );
1361 OUT("}\n");
1362 OUT("\n");
vlm9ea7d412006-08-18 01:32:26 +00001363
1364 p = MKID(expr);
1365 if(HIDE_INNER_DEFS) OUT("static ");
1366 OUT("asn_enc_rval_t\n");
1367 OUT("%s", p);
1368 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1369 OUT("_encode_uper(asn_TYPE_descriptor_t *td,\n");
1370 INDENTED(
1371 OUT("\tasn_per_constraints_t *constraints,\n");
1372 OUT("\tvoid *structure, asn_per_outp_t *per_out) {\n");
1373 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1374 p, expr->_type_unique_index);
1375 OUT("return td->uper_encoder(td, constraints, structure, per_out);\n");
1376 );
1377 OUT("}\n");
1378 OUT("\n");
vlm337167e2005-11-26 11:25:14 +00001379 }
1380
vlmfa67ddc2004-06-03 03:38:44 +00001381 REDIR(OT_FUNC_DECLS);
1382
vlm0c6d3812006-03-21 03:40:38 +00001383 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001384 if(HIDE_INNER_DEFS) {
vlm766cf1e2005-03-04 08:48:53 +00001385 OUT("/* extern asn_TYPE_descriptor_t asn_DEF_%s_%d;"
1386 "\t// (Use -fall-defs-global to expose) */\n",
1387 p, expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +00001388 } else {
1389 OUT("extern asn_TYPE_descriptor_t asn_DEF_%s;\n", p);
1390 OUT("asn_struct_free_f %s_free;\n", p);
1391 OUT("asn_struct_print_f %s_print;\n", p);
1392 OUT("asn_constr_check_f %s_constraint;\n", p);
1393 OUT("ber_type_decoder_f %s_decode_ber;\n", p);
1394 OUT("der_type_encoder_f %s_encode_der;\n", p);
1395 OUT("xer_type_decoder_f %s_decode_xer;\n", p);
1396 OUT("xer_type_encoder_f %s_encode_xer;\n", p);
vlm9ea7d412006-08-18 01:32:26 +00001397 if(arg->flags & A1C_GEN_PER) {
vlm337167e2005-11-26 11:25:14 +00001398 OUT("per_type_decoder_f %s_decode_uper;\n", p);
vlm9ea7d412006-08-18 01:32:26 +00001399 OUT("per_type_encoder_f %s_encode_uper;\n", p);
1400 }
vlm80a48592005-02-25 12:10:27 +00001401 }
vlmfa67ddc2004-06-03 03:38:44 +00001402
vlm33a4ff12004-08-11 05:21:32 +00001403 REDIR(OT_TYPE_DECLS);
1404
vlmfa67ddc2004-06-03 03:38:44 +00001405 return 0;
1406}
1407
1408int
1409asn1c_lang_C_type_EXTENSIBLE(arg_t *arg) {
1410
1411 OUT("/*\n");
1412 OUT(" * This type is extensible,\n");
1413 OUT(" * possible extensions are below.\n");
1414 OUT(" */\n");
1415
1416 return 0;
1417}
1418
vlm337167e2005-11-26 11:25:14 +00001419static int
1420compute_extensions_start(asn1p_expr_t *expr) {
vlm79b08d52004-07-01 00:52:50 +00001421 asn1p_expr_t *v;
vlm337167e2005-11-26 11:25:14 +00001422 int eidx = 0;
vlm79b08d52004-07-01 00:52:50 +00001423 TQ_FOR(v, &(expr->members), next) {
vlm337167e2005-11-26 11:25:14 +00001424 if(v->expr_type == A1TC_EXTENSIBLE)
1425 return eidx;
1426 eidx++;
vlm79b08d52004-07-01 00:52:50 +00001427 }
vlm337167e2005-11-26 11:25:14 +00001428 return -1;
vlm79b08d52004-07-01 00:52:50 +00001429}
1430
vlmfa67ddc2004-06-03 03:38:44 +00001431static int
vlma8a86cc2004-09-10 06:07:18 +00001432_print_tag(arg_t *arg, struct asn1p_type_tag_s *tag) {
vlmfa67ddc2004-06-03 03:38:44 +00001433
1434 OUT("(");
vlma8a86cc2004-09-10 06:07:18 +00001435 switch(tag->tag_class) {
vlmfa67ddc2004-06-03 03:38:44 +00001436 case TC_UNIVERSAL: OUT("ASN_TAG_CLASS_UNIVERSAL"); break;
1437 case TC_APPLICATION: OUT("ASN_TAG_CLASS_APPLICATION"); break;
1438 case TC_CONTEXT_SPECIFIC: OUT("ASN_TAG_CLASS_CONTEXT"); break;
1439 case TC_PRIVATE: OUT("ASN_TAG_CLASS_PRIVATE"); break;
1440 case TC_NOCLASS:
1441 break;
1442 }
vlm47ae1582004-09-24 21:01:43 +00001443 OUT(" | (%" PRIdASN " << 2))", tag->tag_value);
vlmfa67ddc2004-06-03 03:38:44 +00001444
1445 return 0;
1446}
1447
vlm4e03ce22004-06-06 07:20:17 +00001448
1449static int
1450_tag2el_cmp(const void *ap, const void *bp) {
1451 const tag2el_t *a = ap;
1452 const tag2el_t *b = bp;
1453 const struct asn1p_type_tag_s *ta = &a->el_tag;
1454 const struct asn1p_type_tag_s *tb = &b->el_tag;
1455
1456 if(ta->tag_class == tb->tag_class) {
1457 if(ta->tag_value == tb->tag_value) {
1458 /*
1459 * Sort by their respective positions.
1460 */
1461 if(a->el_no < b->el_no)
1462 return -1;
1463 else if(a->el_no > b->el_no)
1464 return 1;
1465 return 0;
1466 } else if(ta->tag_value < tb->tag_value)
1467 return -1;
1468 else
1469 return 1;
1470 } else if(ta->tag_class < tb->tag_class) {
1471 return -1;
1472 } else {
1473 return 1;
1474 }
1475}
1476
vlmfa67ddc2004-06-03 03:38:44 +00001477/*
1478 * For constructed types, number of external tags may be greater than
1479 * number of elements in the type because of CHOICE type.
1480 * T ::= SET { -- Three possible tags:
1481 * a INTEGER, -- One tag is here...
1482 * b Choice1 -- ... and two more tags are there.
1483 * }
1484 * Choice1 ::= CHOICE {
1485 * s1 IA5String,
1486 * s2 ObjectDescriptor
1487 * }
1488 */
1489static int
vlm940bc6b2004-10-03 09:13:30 +00001490_fill_tag2el_map(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags) {
vlmfa67ddc2004-06-03 03:38:44 +00001491 asn1p_expr_t *expr = arg->expr;
1492 arg_t tmparg = *arg;
1493 asn1p_expr_t *v;
1494 int element = 0;
vlm940bc6b2004-10-03 09:13:30 +00001495 int original_count = *count;
1496 int sort_until = -1;
vlmfa67ddc2004-06-03 03:38:44 +00001497
1498 TQ_FOR(v, &(expr->members), next) {
vlm940bc6b2004-10-03 09:13:30 +00001499 if(v->expr_type == A1TC_EXTENSIBLE) {
1500 /*
vlm80a48592005-02-25 12:10:27 +00001501 * CXER mandates sorting
vlm940bc6b2004-10-03 09:13:30 +00001502 * only for the root part.
1503 */
1504 if(flags == FTE_CANONICAL_XER
1505 && sort_until == -1)
1506 sort_until = *count;
vlmfa67ddc2004-06-03 03:38:44 +00001507 continue;
vlm940bc6b2004-10-03 09:13:30 +00001508 }
vlmfa67ddc2004-06-03 03:38:44 +00001509
1510 tmparg.expr = v;
1511
1512 if(_add_tag2el_member(&tmparg, tag2el, count,
vlm940bc6b2004-10-03 09:13:30 +00001513 (el_no==-1)?element:el_no, flags)) {
vlmfa67ddc2004-06-03 03:38:44 +00001514 return -1;
1515 }
1516
1517 element++;
1518 }
1519
vlm940bc6b2004-10-03 09:13:30 +00001520
1521 if(flags == FTE_CANONICAL_XER) {
1522 if(sort_until == -1) sort_until = *count;
1523 qsort((*tag2el) + original_count,
1524 sort_until - original_count,
1525 sizeof(**tag2el), _tag2el_cmp);
1526 if(arg->expr->expr_type == ASN_CONSTR_CHOICE
1527 && (sort_until - original_count) >= 1) {
1528 /* Only take in account the root component */
1529 *count = original_count + 1;
1530 }
1531 } else {
1532 /*
1533 * Sort the map according to canonical order of their
1534 * tags and element numbers.
1535 */
1536 qsort(*tag2el, *count, sizeof(**tag2el), _tag2el_cmp);
1537 }
vlm4e03ce22004-06-06 07:20:17 +00001538
vlmc8aeab42004-06-14 13:09:45 +00001539 /*
1540 * Initialize .toff_{first|last} members.
1541 */
1542 if(*count) {
1543 struct asn1p_type_tag_s *cur_tag = 0;
1544 tag2el_t *cur = *tag2el;
1545 tag2el_t *end = cur + *count;
1546 int occur, i;
1547 for(occur = 0; cur < end; cur++) {
1548 if(cur_tag == 0
1549 || cur_tag->tag_value != cur->el_tag.tag_value
1550 || cur_tag->tag_class != cur->el_tag.tag_class) {
1551 cur_tag = &cur->el_tag;
1552 occur = 0;
1553 } else {
1554 occur++;
1555 }
1556 cur->toff_first = -occur;
1557 for(i = 0; i >= -occur; i--)
1558 cur[i].toff_last = -i;
1559 }
1560 }
1561
vlmfa67ddc2004-06-03 03:38:44 +00001562 return 0;
1563}
1564
1565static int
vlm940bc6b2004-10-03 09:13:30 +00001566_add_tag2el_member(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags) {
vlmfa67ddc2004-06-03 03:38:44 +00001567 struct asn1p_type_tag_s tag;
1568 int ret;
1569
1570 assert(el_no >= 0);
1571
vlm39ba4c42004-09-22 16:06:28 +00001572 ret = asn1f_fetch_outmost_tag(arg->asn, arg->expr->module,
vlm337167e2005-11-26 11:25:14 +00001573 arg->expr, &tag, AFT_IMAGINARY_ANY);
vlmfa67ddc2004-06-03 03:38:44 +00001574 if(ret == 0) {
vlme2070ea2004-09-04 04:42:29 +00001575 tag2el_t *te;
1576 int new_count = (*count) + 1;
vlmfa67ddc2004-06-03 03:38:44 +00001577 void *p;
vlme2070ea2004-09-04 04:42:29 +00001578
vlm2de0e792004-09-05 10:42:33 +00001579 if(tag.tag_value == -1) {
1580 /*
1581 * This is an untagged ANY type,
1582 * proceed without adding a tag
1583 */
1584 return 0;
1585 }
1586
vlme2070ea2004-09-04 04:42:29 +00001587 p = realloc(*tag2el, new_count * sizeof(tag2el_t));
vlmfa67ddc2004-06-03 03:38:44 +00001588 if(p) *tag2el = p;
1589 else return -1;
1590
1591 DEBUG("Found tag for %s: %ld",
1592 arg->expr->Identifier,
1593 (long)tag.tag_value);
1594
vlme2070ea2004-09-04 04:42:29 +00001595 te = &((*tag2el)[*count]);
1596 te->el_tag = tag;
1597 te->el_no = el_no;
1598 te->from_expr = arg->expr;
1599 *count = new_count;
vlmfa67ddc2004-06-03 03:38:44 +00001600 return 0;
1601 }
1602
1603 DEBUG("Searching tag in complex expression %s:%x at line %d",
1604 arg->expr->Identifier,
1605 arg->expr->expr_type,
1606 arg->expr->_lineno);
1607
1608 /*
1609 * Iterate over members of CHOICE type.
1610 */
1611 if(arg->expr->expr_type == ASN_CONSTR_CHOICE) {
vlm940bc6b2004-10-03 09:13:30 +00001612 return _fill_tag2el_map(arg, tag2el, count, el_no, flags);
vlmfa67ddc2004-06-03 03:38:44 +00001613 }
1614
1615 if(arg->expr->expr_type == A1TC_REFERENCE) {
1616 arg_t tmp = *arg;
1617 asn1p_expr_t *expr;
vlm6c4a8502005-08-18 13:38:19 +00001618 expr = asn1f_lookup_symbol_ex(tmp.asn, tmp.expr,
vlmfa67ddc2004-06-03 03:38:44 +00001619 arg->expr->reference);
1620 if(expr) {
1621 tmp.expr = expr;
vlm940bc6b2004-10-03 09:13:30 +00001622 return _add_tag2el_member(&tmp, tag2el, count, el_no, flags);
vlmfa67ddc2004-06-03 03:38:44 +00001623 } else {
1624 FATAL("Cannot dereference %s at line %d",
1625 arg->expr->Identifier,
1626 arg->expr->_lineno);
1627 return -1;
1628 }
1629 }
1630
1631 DEBUG("No tag for %s at line %d",
1632 arg->expr->Identifier,
1633 arg->expr->_lineno);
1634
1635 return -1;
1636}
1637
1638static int
vlm940bc6b2004-10-03 09:13:30 +00001639emit_tag2member_map(arg_t *arg, tag2el_t *tag2el, int tag2el_count, const char *opt_modifier) {
vlm4e03ce22004-06-06 07:20:17 +00001640 asn1p_expr_t *expr = arg->expr;
vlmfbd6d9e2005-06-02 05:21:37 +00001641 int i;
1642
1643 if(!tag2el_count) return 0; /* No top level tags */
vlm4e03ce22004-06-06 07:20:17 +00001644
vlm337167e2005-11-26 11:25:14 +00001645 OUT("static asn_TYPE_tag2member_t asn_MAP_%s_tag2el%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +00001646 MKID(expr), opt_modifier?opt_modifier:"",
vlm337167e2005-11-26 11:25:14 +00001647 expr->_type_unique_index);
vlmfbd6d9e2005-06-02 05:21:37 +00001648 for(i = 0; i < tag2el_count; i++) {
1649 OUT(" { ");
1650 _print_tag(arg, &tag2el[i].el_tag);
1651 OUT(", ");
1652 OUT("%d, ", tag2el[i].el_no);
1653 OUT("%d, ", tag2el[i].toff_first);
1654 OUT("%d ", tag2el[i].toff_last);
1655 OUT("}%s /* %s at %d */\n",
1656 (i + 1 < tag2el_count) ? "," : "",
1657 tag2el[i].from_expr->Identifier,
1658 tag2el[i].from_expr->_lineno
1659 );
vlm4e03ce22004-06-06 07:20:17 +00001660 }
1661 OUT("};\n");
1662
vlmfbd6d9e2005-06-02 05:21:37 +00001663 return 0;
vlm4e03ce22004-06-06 07:20:17 +00001664}
1665
vlm72425de2004-09-13 08:31:01 +00001666static enum tvm_compat
1667emit_tags_vectors(arg_t *arg, asn1p_expr_t *expr, int *tags_count_r, int *all_tags_count_r) {
1668 struct asn1p_type_tag_s *tags = 0; /* Effective tags */
1669 struct asn1p_type_tag_s *all_tags = 0; /* The full array */
vlm6e73a042004-08-11 07:17:22 +00001670 int tags_count = 0;
vlm72425de2004-09-13 08:31:01 +00001671 int all_tags_count = 0;
1672 enum tvm_compat tv_mode = _TVM_SAME;
vlm1308d2b2004-09-10 15:49:15 +00001673 int i;
vlm4a3f5822004-06-28 21:13:46 +00001674
vlmc6de2c42004-09-14 14:10:10 +00001675 /* Cleanup before proceeding. */
1676 *tags_count_r = 0;
1677 *all_tags_count_r = 0;
1678
vlm1308d2b2004-09-10 15:49:15 +00001679 /* Fetch a chain of tags */
vlm39ba4c42004-09-22 16:06:28 +00001680 tags_count = asn1f_fetch_tags(arg->asn, expr->module, expr, &tags, 0);
vlmc6de2c42004-09-14 14:10:10 +00001681 if(tags_count < 0)
1682 return -1;
vlm6e73a042004-08-11 07:17:22 +00001683
vlm72425de2004-09-13 08:31:01 +00001684 /* Fetch a chain of tags */
vlm39ba4c42004-09-22 16:06:28 +00001685 all_tags_count = asn1f_fetch_tags(arg->asn, expr->module, expr,
vlm72425de2004-09-13 08:31:01 +00001686 &all_tags, AFT_FULL_COLLECT);
1687 if(all_tags_count < 0) {
1688 if(tags) free(tags);
1689 return -1;
vlmfb41dbb2004-09-08 00:28:57 +00001690 }
vlm1308d2b2004-09-10 15:49:15 +00001691
vlm72425de2004-09-13 08:31:01 +00001692 assert(tags_count <= all_tags_count);
1693 assert((tags_count?0:1) == (all_tags_count?0:1));
vlm4a3f5822004-06-28 21:13:46 +00001694
vlm72425de2004-09-13 08:31:01 +00001695 if(tags_count <= all_tags_count) {
1696 for(i = 0; i < tags_count; i++) {
1697 if(tags[i].tag_value != all_tags[i].tag_value
1698 || tags[i].tag_class != all_tags[i].tag_class) {
1699 tv_mode = _TVM_DIFFERENT;
1700 break;
1701 }
1702 }
1703 if(i == tags_count && tags_count < all_tags_count)
1704 tv_mode = _TVM_SUBSET;
1705 } else {
1706 tv_mode = _TVM_DIFFERENT;
1707 }
1708
1709#define EMIT_TAGS_TABLE(name, tags, tags_count) do { \
vlm337167e2005-11-26 11:25:14 +00001710 OUT("static ber_tlv_tag_t asn_DEF_%s%s_tags_%d[] = {\n",\
vlm0c6d3812006-03-21 03:40:38 +00001711 MKID(expr), name, \
vlm337167e2005-11-26 11:25:14 +00001712 expr->_type_unique_index); \
vlm72425de2004-09-13 08:31:01 +00001713 INDENT(+1); \
1714 /* Print the array of collected tags */ \
1715 for(i = 0; i < tags_count; i++) { \
1716 if(i) OUT(",\n"); \
1717 _print_tag(arg, &tags[i]); \
1718 } \
1719 OUT("\n"); \
1720 INDENT(-1); \
1721 OUT("};\n"); \
1722 } while(0)
1723
1724 if(tags_count) {
1725 if(tv_mode == _TVM_SUBSET)
1726 EMIT_TAGS_TABLE("", all_tags, all_tags_count);
1727 else
1728 EMIT_TAGS_TABLE("", tags, tags_count);
1729 }
1730
1731 if(all_tags_count) {
1732 if(tv_mode == _TVM_DIFFERENT)
1733 EMIT_TAGS_TABLE("_all", all_tags, all_tags_count);
1734 }
1735
1736 if(tags) free(tags);
1737 if(all_tags) free(all_tags);
1738
1739 *tags_count_r = tags_count;
1740 *all_tags_count_r = all_tags_count;
1741
1742 return tv_mode;
vlm4a3f5822004-06-28 21:13:46 +00001743}
vlmb2839012004-08-20 13:37:01 +00001744
1745static int
vlm4e554992004-08-25 02:03:12 +00001746expr_elements_count(arg_t *arg, asn1p_expr_t *expr) {
vlmb2839012004-08-20 13:37:01 +00001747 asn1p_expr_t *topmost_parent;
1748 asn1p_expr_t *v;
1749 int elements = 0;
1750
vlm39ba4c42004-09-22 16:06:28 +00001751 topmost_parent = asn1f_find_terminal_type_ex(arg->asn, expr);
vlmb2839012004-08-20 13:37:01 +00001752 if(!topmost_parent) return 0;
1753
vlm80a48592005-02-25 12:10:27 +00001754 if(!(topmost_parent->expr_type & ASN_CONSTR_MASK)
1755 && !topmost_parent->expr_type == ASN_BASIC_INTEGER
1756 && !topmost_parent->expr_type == ASN_BASIC_ENUMERATED)
vlmb2839012004-08-20 13:37:01 +00001757 return 0;
1758
1759 TQ_FOR(v, &(topmost_parent->members), next) {
1760 if(v->expr_type != A1TC_EXTENSIBLE)
1761 elements++;
1762 }
1763
1764 return elements;
1765}
1766
vlm337167e2005-11-26 11:25:14 +00001767static asn1p_expr_type_e
1768expr_get_type(arg_t *arg, asn1p_expr_t *expr) {
1769 asn1p_expr_t *terminal;
1770 terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
1771 if(terminal) return terminal->expr_type;
1772 return A1TC_INVALID;
1773}
1774
1775static int
1776emit_single_member_PER_constraint(arg_t *arg, asn1cnst_range_t *range, char *type) {
1777 if(!range || range->incompatible || range->not_PER_visible) {
1778 OUT("{ APC_UNCONSTRAINED,\t-1, -1, 0, 0 }");
1779 return 0;
1780 }
1781
1782 if(range->left.type == ARE_VALUE) {
1783 if(range->right.type == ARE_VALUE) {
1784 asn1c_integer_t cover = 1;
1785 asn1c_integer_t r = 1 + range->right.value
1786 - range->left.value;
vlm1fcf7592006-08-18 02:27:55 +00001787 size_t rbits; /* Value range bits */
1788 ssize_t ebits; /* Value effective range bits */
vlm337167e2005-11-26 11:25:14 +00001789
1790 if(range->empty_constraint)
1791 r = 0;
1792
1793 /* Compute real constraint */
1794 for(rbits = 0; rbits < (8 * sizeof(r)); rbits++) {
1795 if(r <= cover)
1796 break;
1797 cover *= 2; /* Can't do shifting */
1798 if(cover < 0) {
1799 FATAL("Constraint at line %d too wide "
1800 "for %d-bits integer type",
1801 arg->expr->_lineno,
1802 sizeof(r) * 8);
1803 rbits = sizeof(r);
1804 break;
1805 }
1806 }
1807
1808 if(1) {
1809 /* X.691, #10.9.4.1 */
1810 for(ebits = 0; ebits <= 16; ebits++)
1811 if(r <= 1 << ebits) break;
1812 if(ebits == 17
1813 || range->right.value >= 65536)
1814 ebits = -1;
1815 } else {
1816 /* X.691, #10.5.7.1 */
1817 for(ebits = 0; ebits <= 8; ebits++)
1818 if(r <= 1 << ebits) break;
1819 if(ebits == 9) {
1820 if(r <= 65536)
1821 ebits = 16;
1822 else
1823 ebits = -1;
1824 }
1825 }
1826 OUT("{ APC_CONSTRAINED%s,%s% d, % d, ",
1827 range->extensible
1828 ? " | APC_EXTENSIBLE" : "",
1829 range->extensible ? " " : "\t", rbits, ebits);
1830 } else {
1831 if(range->extensible) {
1832 OUT("{ APC_SEMI_CONSTRAINED | APC_EXTENSIBLE, "
1833 "-1, ");
1834 } else {
1835 OUT("{ APC_SEMI_CONSTRAINED,\t-1, -1, ");
1836 }
1837 }
1838 OUT("% " PRIdASN ", % " PRIdASN " }",
1839 range->left.value, range->right.value);
1840 } else {
1841 OUT("{ APC_UNCONSTRAINED,\t-1, -1, 0, 0 }");
1842 }
1843
1844 /*
1845 * Print some courtesy debug information.
1846 */
1847 if(range->left.type == ARE_VALUE
1848 || range->right.type == ARE_VALUE) {
1849 OUT("\t/* ");
1850 if(type) OUT("(%s", type);
1851 OUT("(");
1852 if(range->left.type == ARE_VALUE)
1853 OUT("%" PRIdASN, range->left.value);
1854 else
1855 OUT("MIN");
1856 OUT("..");
1857 if(range->right.type == ARE_VALUE)
1858 OUT("%" PRIdASN, range->right.value);
1859 else
1860 OUT("MAX");
1861 if(range->extensible) OUT(",...");
1862 if(type) OUT(")");
1863 OUT(") */");
1864 }
1865
1866 return 0;
1867}
1868
1869static int
1870emit_single_member_PER_constraints(arg_t *arg, asn1p_expr_t *expr) {
1871 asn1cnst_range_t *range;
1872 asn1p_expr_type_e etype;
1873
1874 etype = expr_get_type(arg, expr);
1875
1876 INDENT(+1);
1877
1878 /*
1879 * ENUMERATED and CHOICE are special.
1880 */
1881 if(etype == ASN_BASIC_ENUMERATED
1882 || etype == ASN_CONSTR_CHOICE) {
1883 asn1cnst_range_t tmprng;
1884 asn1p_expr_t *v;
1885 int extensible = 0;
1886 int eidx = -1;
1887
1888 expr = asn1f_find_terminal_type_ex(arg->asn, expr);
1889 assert(expr);
1890
1891 TQ_FOR(v, &(expr->members), next) {
1892 if(v->expr_type == A1TC_EXTENSIBLE) {
1893 extensible++;
1894 break;
1895 }
1896 eidx++;
1897 }
1898
1899 memset(&tmprng, 0, sizeof (tmprng));
1900 tmprng.extensible = extensible;
1901 if(eidx < 0) tmprng.empty_constraint = 1;
1902 tmprng.left.type = ARE_VALUE;
1903 tmprng.left.value = 0;
1904 tmprng.right.type = ARE_VALUE;
1905 tmprng.right.value = eidx < 0 ? 0 : eidx;
1906 if(emit_single_member_PER_constraint(arg, &tmprng, 0))
1907 return -1;
vlme54d16a2006-09-21 01:50:13 +00001908 } else if(etype & ASN_STRING_KM_MASK) {
1909 range = asn1constraint_compute_PER_range(etype,
1910 expr->combined_constraints, ACT_CT_FROM,
1911 0, 0, 0);
1912 if(emit_single_member_PER_constraint(arg, range, 0))
1913 return -1;
1914 asn1constraint_range_free(range);
vlm337167e2005-11-26 11:25:14 +00001915 } else {
1916 range = asn1constraint_compute_PER_range(etype,
1917 expr->combined_constraints, ACT_EL_RANGE,
1918 0, 0, 0);
1919 if(emit_single_member_PER_constraint(arg, range, 0))
1920 return -1;
1921 asn1constraint_range_free(range);
1922 }
1923 OUT(",\n");
1924
1925 range = asn1constraint_compute_PER_range(etype,
1926 expr->combined_constraints, ACT_CT_SIZE, 0, 0, 0);
1927 if(emit_single_member_PER_constraint(arg, range, "SIZE"))
1928 return -1;
1929 asn1constraint_range_free(range);
1930 OUT("\n");
1931
1932 INDENT(-1);
1933
1934 return 0;
1935}
1936
1937static int
1938emit_members_PER_constraints(arg_t *arg) {
1939 asn1p_expr_t *expr = arg->expr;
1940 asn1p_expr_t *v;
1941
1942 if(!(arg->flags & A1C_GEN_PER))
1943 return 0;
1944
1945 TQ_FOR(v, &(expr->members), next) {
1946 if(v->constraints
1947 || v->expr_type == ASN_BASIC_ENUMERATED
1948 || v->expr_type == ASN_CONSTR_CHOICE) {
1949 OUT("static asn_per_constraints_t "
1950 "asn_PER_memb_%s_constr_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +00001951 MKID(v), v->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00001952 if(emit_single_member_PER_constraints(arg, v))
1953 return -1;
1954 OUT("};\n");
1955 }
1956 }
1957
1958 return 0;
1959}
1960
1961static int
1962try_inline_default(arg_t *arg, asn1p_expr_t *expr, int out) {
1963 int save_target = arg->target->target;
1964 asn1p_expr_type_e etype = expr_get_type(arg, expr);
1965 int fits_long = 0;
1966
1967 switch(etype) {
1968 case ASN_BASIC_BOOLEAN:
1969 fits_long = 1;
1970 case ASN_BASIC_INTEGER:
1971 case ASN_BASIC_ENUMERATED:
1972 if(expr->marker.default_value == NULL
1973 || expr->marker.default_value->type != ATV_INTEGER)
1974 break;
1975 if(!fits_long)
1976 fits_long = asn1c_type_fits_long(arg, expr)!=FL_NOTFIT;
1977 if(fits_long && !expr->marker.default_value->value.v_integer)
1978 expr->marker.flags &= ~EM_INDIRECT;
1979 if(!out) return 1;
1980 REDIR(OT_STAT_DEFS);
vlm9ea7d412006-08-18 01:32:26 +00001981 OUT("static int asn_DFL_%d_set_%" PRIdASN "(int set_value, void **sptr) {\n",
vlm337167e2005-11-26 11:25:14 +00001982 expr->_type_unique_index,
1983 expr->marker.default_value->value.v_integer);
1984 INDENT(+1);
1985 OUT("%s *st = *sptr;\n", asn1c_type_name(arg, expr, TNF_CTYPE));
1986 OUT("\n");
1987 OUT("if(!st) {\n");
vlm9ea7d412006-08-18 01:32:26 +00001988 OUT("\tif(!set_value) return -1;\t/* Not a default value */\n");
vlm337167e2005-11-26 11:25:14 +00001989 OUT("\tst = (*sptr = CALLOC(1, sizeof(*st)));\n");
1990 OUT("\tif(!st) return -1;\n");
1991 OUT("}\n");
1992 OUT("\n");
vlm9ea7d412006-08-18 01:32:26 +00001993 OUT("if(set_value) {\n");
1994 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +00001995 OUT("/* Install default value %" PRIdASN " */\n",
1996 expr->marker.default_value->value.v_integer);
1997 if(fits_long) {
1998 OUT("*st = %" PRIdASN ";\n",
1999 expr->marker.default_value->value.v_integer);
2000 OUT("return 0;\n");
2001 } else {
2002 OUT("return asn_long2INTEGER(st, %" PRIdASN ");\n",
2003 expr->marker.default_value->value.v_integer);
2004 }
2005 INDENT(-1);
vlm9ea7d412006-08-18 01:32:26 +00002006 OUT("} else {\n");
2007 INDENT(+1);
2008 OUT("/* Test default value %" PRIdASN " */\n",
2009 expr->marker.default_value->value.v_integer);
2010 if(fits_long) {
2011 OUT("return (*st == %" PRIdASN ");\n",
2012 expr->marker.default_value->value.v_integer);
2013 } else {
2014 OUT("long value;\n");
2015 OUT("if(asn_INTEGER2long(st, &value))\n");
2016 OUT("\treturn -1;\n");
2017 OUT("return (value == %" PRIdASN ");\n",
2018 expr->marker.default_value->value.v_integer);
2019 }
2020 INDENT(-1);
2021 OUT("}\n");
2022 INDENT(-1);
vlm337167e2005-11-26 11:25:14 +00002023 OUT("}\n");
2024 REDIR(save_target);
2025 return 1;
2026 case ASN_BASIC_NULL:
2027 //expr->marker.flags &= ~EM_INDIRECT;
2028 return 0;
2029 default:
2030 break;
2031 }
2032 return 0;
2033}
2034
vlmb2839012004-08-20 13:37:01 +00002035static int
vlm4e554992004-08-25 02:03:12 +00002036emit_member_table(arg_t *arg, asn1p_expr_t *expr) {
vlmb2839012004-08-20 13:37:01 +00002037 int save_target;
2038 arg_t tmp_arg;
vlm060fe2a2004-09-10 09:37:12 +00002039 struct asn1p_type_tag_s outmost_tag_s;
2040 struct asn1p_type_tag_s *outmost_tag;
vlm80a48592005-02-25 12:10:27 +00002041 int complex_contents;
vlmb2839012004-08-20 13:37:01 +00002042 char *p;
2043
vlm060fe2a2004-09-10 09:37:12 +00002044 if(asn1f_fetch_outmost_tag(arg->asn,
vlm337167e2005-11-26 11:25:14 +00002045 expr->module, expr, &outmost_tag_s,
2046 AFT_IMAGINARY_ANY)) {
vlm060fe2a2004-09-10 09:37:12 +00002047 outmost_tag = 0;
2048 } else {
2049 outmost_tag = &outmost_tag_s;
2050 }
2051
vlmb2839012004-08-20 13:37:01 +00002052 OUT("{ ");
vlm060fe2a2004-09-10 09:37:12 +00002053
2054 if(outmost_tag && outmost_tag->tag_value == -1)
2055 OUT("ATF_OPEN_TYPE | ");
vlm0b567bf2005-03-04 22:18:20 +00002056 OUT("%s, ",
2057 (expr->marker.flags & EM_INDIRECT)?"ATF_POINTER":"ATF_NOFLAGS");
vlm6c4a8502005-08-18 13:38:19 +00002058 if((expr->marker.flags & EM_OMITABLE) == EM_OMITABLE) {
vlmb2839012004-08-20 13:37:01 +00002059 asn1p_expr_t *tv;
2060 int opts = 0;
vlm6c4a8502005-08-18 13:38:19 +00002061 for(tv = expr;
2062 tv && (tv->marker.flags & EM_OMITABLE) == EM_OMITABLE;
vlmb2839012004-08-20 13:37:01 +00002063 tv = TQ_NEXT(tv, next), opts++) {
2064 if(tv->expr_type == A1TC_EXTENSIBLE)
2065 opts--;
2066 }
2067 OUT("%d, ", opts);
2068 } else {
2069 OUT("0, ");
2070 }
vlm39ba4c42004-09-22 16:06:28 +00002071 if(expr->_anonymous_type) {
2072 assert(arg->expr->expr_type == ASN_CONSTR_SET_OF
2073 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF);
2074 OUT("0,\n");
2075 } else {
vlm766cf1e2005-03-04 08:48:53 +00002076 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +00002077 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +00002078 OUT(", ");
vlmb2839012004-08-20 13:37:01 +00002079 if(arg->expr->expr_type == ASN_CONSTR_CHOICE
2080 && (!UNNAMED_UNIONS)) OUT("choice.");
vlm0c6d3812006-03-21 03:40:38 +00002081 OUT("%s),\n", MKID_safe(expr));
vlmb2839012004-08-20 13:37:01 +00002082 }
2083 INDENT(+1);
2084 if(C99_MODE) OUT(".tag = ");
vlm060fe2a2004-09-10 09:37:12 +00002085 if(outmost_tag) {
2086 if(outmost_tag->tag_value == -1)
2087 OUT("-1 /* Ambiguous tag (ANY?) */");
2088 else
2089 _print_tag(arg, outmost_tag);
vlma8a86cc2004-09-10 06:07:18 +00002090 } else {
vlm060fe2a2004-09-10 09:37:12 +00002091 OUT("-1 /* Ambiguous tag (CHOICE?) */");
vlma8a86cc2004-09-10 06:07:18 +00002092 }
vlm060fe2a2004-09-10 09:37:12 +00002093
vlmb2839012004-08-20 13:37:01 +00002094 OUT(",\n");
2095 if(C99_MODE) OUT(".tag_mode = ");
2096 if(expr->tag.tag_class) {
2097 if(expr->tag.tag_mode == TM_IMPLICIT)
2098 OUT("-1,\t/* IMPLICIT tag at current level */\n");
2099 else
2100 OUT("+1,\t/* EXPLICIT tag at current level */\n");
2101 } else {
2102 OUT("0,\n");
2103 }
vlm80a48592005-02-25 12:10:27 +00002104
2105 complex_contents =
2106 (expr->expr_type & ASN_CONSTR_MASK)
2107 || expr->expr_type == ASN_BASIC_ENUMERATED
vlmc89422d2005-03-03 21:28:12 +00002108 || (0 /* -- prohibited by X.693:8.3.4 */
2109 && expr->expr_type == ASN_BASIC_INTEGER
vlm80a48592005-02-25 12:10:27 +00002110 && expr_elements_count(arg, expr));
vlmb2839012004-08-20 13:37:01 +00002111 if(C99_MODE) OUT(".type = ");
vlme0fea712005-08-29 10:31:14 +00002112 OUT("&asn_DEF_");
vlm766cf1e2005-03-04 08:48:53 +00002113 if(complex_contents) {
vlm0c6d3812006-03-21 03:40:38 +00002114 OUT("%s", MKID(expr));
vlm766cf1e2005-03-04 08:48:53 +00002115 if(!(arg->flags & A1C_ALL_DEFS_GLOBAL))
2116 OUT("_%d", expr->_type_unique_index);
vlmdae7f9d2004-08-22 03:25:24 +00002117 } else {
vlm766cf1e2005-03-04 08:48:53 +00002118 OUT("%s", asn1c_type_name(arg, expr, TNF_SAFE));
vlmdae7f9d2004-08-22 03:25:24 +00002119 }
vlm766cf1e2005-03-04 08:48:53 +00002120 OUT(",\n");
vlmb2839012004-08-20 13:37:01 +00002121 if(C99_MODE) OUT(".memb_constraints = ");
2122 if(expr->constraints) {
vlm86f5ed22004-09-26 13:11:31 +00002123 if(arg->flags & A1C_NO_CONSTRAINTS) {
2124 OUT("0,\t/* No check because of -fno-constraints */\n");
2125 } else {
vlm0c6d3812006-03-21 03:40:38 +00002126 char *id = MKID(expr);
vlm86f5ed22004-09-26 13:11:31 +00002127 if(expr->_anonymous_type
vlmbf3c5112005-02-14 20:41:29 +00002128 && !strcmp(expr->Identifier, "Member"))
vlm86f5ed22004-09-26 13:11:31 +00002129 id = asn1c_type_name(arg, expr, TNF_SAFE);
vlm337167e2005-11-26 11:25:14 +00002130 OUT("memb_%s_constraint_%d,\n", id,
vlm766cf1e2005-03-04 08:48:53 +00002131 arg->expr->_type_unique_index);
vlm86f5ed22004-09-26 13:11:31 +00002132 }
vlmb2839012004-08-20 13:37:01 +00002133 } else {
vlm95a476e2005-01-17 12:16:58 +00002134 OUT("0,\t/* Defer constraints checking to the member type */\n");
vlmb2839012004-08-20 13:37:01 +00002135 }
vlm337167e2005-11-26 11:25:14 +00002136 if(C99_MODE) OUT(".per_constraints = ");
2137 if(arg->flags & A1C_GEN_PER) {
2138 if(expr->constraints
2139 || expr->expr_type == ASN_BASIC_ENUMERATED
2140 || expr->expr_type == ASN_CONSTR_CHOICE) {
2141 OUT("&asn_PER_memb_%s_constr_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +00002142 MKID(expr),
vlm337167e2005-11-26 11:25:14 +00002143 expr->_type_unique_index);
2144 } else {
2145 OUT("0,\t/* No PER visible constraints */\n");
2146 }
vlmbf3c5112005-02-14 20:41:29 +00002147 } else {
vlm337167e2005-11-26 11:25:14 +00002148 OUT("0,\t/* PER is not compiled, use -gen-PER */\n");
2149 }
2150 if(C99_MODE) OUT(".default_value = ");
2151 if(try_inline_default(arg, expr, 0)) {
2152 OUT("asn_DFL_%d_set_%" PRIdASN
2153 ",\t/* DEFAULT %" PRIdASN " */\n",
2154 expr->_type_unique_index,
2155 expr->marker.default_value->value.v_integer,
2156 expr->marker.default_value->value.v_integer);
2157 } else {
2158 OUT("0,\n");
2159 }
2160 if(C99_MODE) OUT(".name = ");
2161 if(expr->_anonymous_type && !strcmp(expr->Identifier, "Member")) {
2162 OUT("\"\"\n");
2163 } else {
2164 OUT("\"%s\"\n", expr->Identifier);
vlmbf3c5112005-02-14 20:41:29 +00002165 }
vlmb2839012004-08-20 13:37:01 +00002166 OUT("},\n");
2167 INDENT(-1);
2168
vlm86f5ed22004-09-26 13:11:31 +00002169 if(!expr->constraints || (arg->flags & A1C_NO_CONSTRAINTS))
vlmb2839012004-08-20 13:37:01 +00002170 return 0;
2171
2172 save_target = arg->target->target;
2173 REDIR(OT_CODE);
2174
vlmbf3c5112005-02-14 20:41:29 +00002175 if(expr->_anonymous_type && !strcmp(expr->Identifier, "Member"))
vlmb2839012004-08-20 13:37:01 +00002176 p = asn1c_type_name(arg, expr, TNF_SAFE);
vlm39ba4c42004-09-22 16:06:28 +00002177 else
vlm0c6d3812006-03-21 03:40:38 +00002178 p = MKID(expr);
vlmb2839012004-08-20 13:37:01 +00002179 OUT("static int\n");
vlm337167e2005-11-26 11:25:14 +00002180 OUT("memb_%s_constraint_%d(asn_TYPE_descriptor_t *td, const void *sptr,\n", p, arg->expr->_type_unique_index);
vlmb2839012004-08-20 13:37:01 +00002181 INDENT(+1);
vlmaf68ef52006-07-13 11:19:01 +00002182 OUT("\t\tasn_app_constraint_failed_f *ctfailcb, void *app_key) {\n");
vlmb2839012004-08-20 13:37:01 +00002183 tmp_arg = *arg;
2184 tmp_arg.expr = expr;
2185 if(asn1c_emit_constraint_checking_code(&tmp_arg) == 1) {
vlm86f5ed22004-09-26 13:11:31 +00002186 OUT("return td->check_constraints"
vlmaf68ef52006-07-13 11:19:01 +00002187 "(td, sptr, ctfailcb, app_key);\n");
vlmb2839012004-08-20 13:37:01 +00002188 }
2189 INDENT(-1);
2190 OUT("}\n");
2191 OUT("\n");
2192
2193 REDIR(save_target);
2194
2195 return 0;
2196}
vlm4e554992004-08-25 02:03:12 +00002197
vlm9de248e2004-10-20 15:50:55 +00002198/*
2199 * Generate "asn_DEF_XXX" type definition.
2200 */
vlm4e554992004-08-25 02:03:12 +00002201static int
vlm86f5ed22004-09-26 13:11:31 +00002202emit_type_DEF(arg_t *arg, asn1p_expr_t *expr, enum tvm_compat tv_mode, int tags_count, int all_tags_count, int elements_count, enum etd_spec spec) {
vlmfbceb502006-09-17 06:31:08 +00002203 asn1p_expr_t *terminal;
vlm766cf1e2005-03-04 08:48:53 +00002204 int using_type_name = 0;
vlm0c6d3812006-03-21 03:40:38 +00002205 char *p = MKID(expr);
vlm337167e2005-11-26 11:25:14 +00002206
vlmfbceb502006-09-17 06:31:08 +00002207 terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
2208
vlm337167e2005-11-26 11:25:14 +00002209 if((arg->flags & A1C_GEN_PER)
2210 && (expr->constraints
2211 || expr->expr_type == ASN_BASIC_ENUMERATED
2212 || expr->expr_type == ASN_CONSTR_CHOICE)
2213 ) {
2214 OUT("static asn_per_constraints_t asn_PER_%s_constr_%d = {\n",
2215 p, expr->_type_unique_index);
2216 if(emit_single_member_PER_constraints(arg, expr))
2217 return -1;
2218 OUT("};\n");
2219 }
vlm4e554992004-08-25 02:03:12 +00002220
vlm12c8f692004-09-06 08:07:29 +00002221 if(HIDE_INNER_DEFS)
2222 OUT("static /* Use -fall-defs-global to expose */\n");
vlm337167e2005-11-26 11:25:14 +00002223 OUT("asn_TYPE_descriptor_t asn_DEF_%s", p);
vlm766cf1e2005-03-04 08:48:53 +00002224 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
2225 OUT(" = {\n");
vlm72425de2004-09-13 08:31:01 +00002226 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +00002227
2228 if(expr->_anonymous_type) {
2229 p = ASN_EXPR_TYPE2STR(expr->expr_type);
2230 OUT("\"%s\",\n", p?p:"");
vlm0c6d3812006-03-21 03:40:38 +00002231 OUT("\"%s\",\n",
2232 p ? asn1c_make_identifier(AMI_CHECK_RESERVED,
2233 0, p, 0) : "");
vlm337167e2005-11-26 11:25:14 +00002234 } else {
2235 OUT("\"%s\",\n", expr->Identifier);
2236 OUT("\"%s\",\n", expr->Identifier);
2237 }
vlm4e554992004-08-25 02:03:12 +00002238
2239 if(expr->expr_type & ASN_CONSTR_MASK) {
vlm766cf1e2005-03-04 08:48:53 +00002240 using_type_name = 1;
vlm4e554992004-08-25 02:03:12 +00002241 p = asn1c_type_name(arg, arg->expr, TNF_SAFE);
vlm337167e2005-11-26 11:25:14 +00002242 } else {
vlm0c6d3812006-03-21 03:40:38 +00002243 p = MKID(expr);
vlm4e554992004-08-25 02:03:12 +00002244 }
2245
vlm766cf1e2005-03-04 08:48:53 +00002246#define FUNCREF(foo) do { \
2247 OUT("%s", p); \
2248 if(HIDE_INNER_DEFS && !using_type_name) \
2249 OUT("_%d", expr->_type_unique_index); \
2250 OUT("_" #foo ",\n"); \
2251} while(0)
2252
2253 FUNCREF(free);
2254 FUNCREF(print);
2255 FUNCREF(constraint);
2256 FUNCREF(decode_ber);
2257 FUNCREF(encode_der);
2258 FUNCREF(decode_xer);
2259 FUNCREF(encode_xer);
vlm9ea7d412006-08-18 01:32:26 +00002260 if(arg->flags & A1C_GEN_PER) {
vlm337167e2005-11-26 11:25:14 +00002261 FUNCREF(decode_uper);
vlm9ea7d412006-08-18 01:32:26 +00002262 FUNCREF(encode_uper);
2263 } else {
2264 OUT("0, 0,\t/* No PER support, "
2265 "use \"-gen-PER\" to enable */\n");
2266 }
vlm4e554992004-08-25 02:03:12 +00002267
vlmfbceb502006-09-17 06:31:08 +00002268 if(!terminal || terminal->expr_type == ASN_CONSTR_CHOICE) {
2269 //if(expr->expr_type == ASN_CONSTR_CHOICE) {
vlm4e554992004-08-25 02:03:12 +00002270 OUT("CHOICE_outmost_tag,\n");
2271 } else {
2272 OUT("0,\t/* Use generic outmost tag fetcher */\n");
2273 }
2274
vlm0c6d3812006-03-21 03:40:38 +00002275 p = MKID(expr);
vlm4e554992004-08-25 02:03:12 +00002276 if(tags_count) {
vlm337167e2005-11-26 11:25:14 +00002277 OUT("asn_DEF_%s_tags_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +00002278 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002279 OUT("sizeof(asn_DEF_%s_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002280 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002281 OUT("\t/sizeof(asn_DEF_%s_tags_%d[0])",
vlm766cf1e2005-03-04 08:48:53 +00002282 p, expr->_type_unique_index);
vlm72425de2004-09-13 08:31:01 +00002283 if(tv_mode == _TVM_SUBSET
2284 && tags_count != all_tags_count)
2285 OUT(" - %d", all_tags_count - tags_count);
2286 OUT(", /* %d */\n", tags_count);
vlm4e554992004-08-25 02:03:12 +00002287 } else {
vlm72425de2004-09-13 08:31:01 +00002288 OUT("0,\t/* No effective tags (pointer) */\n");
2289 OUT("0,\t/* No effective tags (count) */\n");
2290 }
2291
2292 if(all_tags_count && tv_mode == _TVM_DIFFERENT) {
vlm337167e2005-11-26 11:25:14 +00002293 OUT("asn_DEF_%s_all_tags_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +00002294 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002295 OUT("sizeof(asn_DEF_%s_all_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002296 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002297 OUT("\t/sizeof(asn_DEF_%s_all_tags_%d[0]), /* %d */\n",
vlm766cf1e2005-03-04 08:48:53 +00002298 p, expr->_type_unique_index, all_tags_count);
vlm72425de2004-09-13 08:31:01 +00002299 } else if(all_tags_count) {
vlm337167e2005-11-26 11:25:14 +00002300 OUT("asn_DEF_%s_tags_%d,\t/* Same as above */\n",
vlm766cf1e2005-03-04 08:48:53 +00002301 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002302 OUT("sizeof(asn_DEF_%s_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002303 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002304 OUT("\t/sizeof(asn_DEF_%s_tags_%d[0]), /* %d */\n",
vlm766cf1e2005-03-04 08:48:53 +00002305 p, expr->_type_unique_index, all_tags_count);
vlm72425de2004-09-13 08:31:01 +00002306 } else {
2307 OUT("0,\t/* No tags (pointer) */\n");
2308 OUT("0,\t/* No tags (count) */\n");
vlm4e554992004-08-25 02:03:12 +00002309 }
2310
vlm337167e2005-11-26 11:25:14 +00002311 if(arg->flags & A1C_GEN_PER) {
2312 if(expr->constraints
2313 || expr->expr_type == ASN_BASIC_ENUMERATED
2314 || expr->expr_type == ASN_CONSTR_CHOICE) {
2315 OUT("&asn_PER_%s_constr_%d,\n",
2316 p, expr->_type_unique_index);
2317 } else {
2318 OUT("0,\t/* No PER visible constraints */\n");
2319 }
2320 } else {
2321 OUT("0,\t/* No PER visible constraints */\n");
2322 }
2323
vlm4e554992004-08-25 02:03:12 +00002324 if(elements_count) {
vlm766cf1e2005-03-04 08:48:53 +00002325 OUT("asn_MBR_%s_%d,\n", p, expr->_type_unique_index);
vlm4e554992004-08-25 02:03:12 +00002326 if(expr->expr_type == ASN_CONSTR_SEQUENCE_OF
2327 || expr->expr_type == ASN_CONSTR_SET_OF) {
2328 OUT("%d,\t/* Single element */\n",
2329 elements_count);
2330 assert(elements_count == 1);
2331 } else {
2332 OUT("%d,\t/* Elements count */\n",
2333 elements_count);
2334 }
2335 } else {
vlm4e554992004-08-25 02:03:12 +00002336 if(expr_elements_count(arg, expr))
2337 OUT("0, 0,\t/* Defined elsewhere */\n");
2338 else
2339 OUT("0, 0,\t/* No members */\n");
2340 }
2341
2342 switch(spec) {
2343 case ETD_NO_SPECIFICS:
2344 OUT("0\t/* No specifics */\n");
2345 break;
2346 case ETD_HAS_SPECIFICS:
vlm337167e2005-11-26 11:25:14 +00002347 OUT("&asn_SPC_%s_specs_%d\t/* Additional specs */\n",
vlm766cf1e2005-03-04 08:48:53 +00002348 p, expr->_type_unique_index);
vlm4e554992004-08-25 02:03:12 +00002349 }
vlm72425de2004-09-13 08:31:01 +00002350 INDENT(-1);
vlm4e554992004-08-25 02:03:12 +00002351 OUT("};\n");
2352 OUT("\n");
vlme2bb4432004-08-26 06:20:34 +00002353
2354 return 0;
vlm4e554992004-08-25 02:03:12 +00002355}
vlmddd5a7d2004-09-10 09:18:20 +00002356
vlm39ba4c42004-09-22 16:06:28 +00002357static int
2358expr_as_xmlvaluelist(arg_t *arg, asn1p_expr_t *expr) {
vlm6d44a542005-11-08 03:06:16 +00002359 /*
2360 * X.680, 25.5, Table 5
2361 */
vlm337167e2005-11-26 11:25:14 +00002362 switch(expr_get_type(arg, expr)) {
vlm39ba4c42004-09-22 16:06:28 +00002363 case ASN_BASIC_BOOLEAN:
2364 case ASN_BASIC_ENUMERATED:
2365 case ASN_BASIC_NULL:
2366 return 1;
vlm6d44a542005-11-08 03:06:16 +00002367 case ASN_CONSTR_CHOICE:
2368 return 2;
vlm39ba4c42004-09-22 16:06:28 +00002369 default:
2370 return 0;
2371 }
2372}
vlmaf841972005-01-28 12:18:50 +00002373
2374static int
vlm2e774282005-08-14 15:03:31 +00002375out_name_chain(arg_t *arg, enum onc_flags onc_flags) {
vlmaf841972005-01-28 12:18:50 +00002376 asn1p_expr_t *expr = arg->expr;
2377 char *id;
2378
2379 assert(expr->Identifier);
2380
vlm2e774282005-08-14 15:03:31 +00002381 if((arg->flags & A1C_COMPOUND_NAMES
2382 || onc_flags & ONC_force_compound_name)
vlm766cf1e2005-03-04 08:48:53 +00002383 && ((expr->expr_type & ASN_CONSTR_MASK)
2384 || expr->expr_type == ASN_BASIC_ENUMERATED
vlm96853d82005-08-13 23:51:47 +00002385 || ((expr->expr_type == ASN_BASIC_INTEGER
2386 || expr->expr_type == ASN_BASIC_BIT_STRING)
vlm766cf1e2005-03-04 08:48:53 +00002387 && expr_elements_count(arg, expr))
2388 )
vlmaf841972005-01-28 12:18:50 +00002389 && expr->parent_expr
2390 && expr->parent_expr->Identifier) {
2391 arg_t tmparg = *arg;
2392
2393 tmparg.expr = expr->parent_expr;
vlm766cf1e2005-03-04 08:48:53 +00002394 if(0) tmparg.flags &= ~A1C_COMPOUND_NAMES;
2395
vlm2e774282005-08-14 15:03:31 +00002396 out_name_chain(&tmparg, onc_flags);
vlmaf841972005-01-28 12:18:50 +00002397
vlm92d3cad2005-03-05 00:08:41 +00002398 OUT("__"); /* a separator between id components */
vlm766cf1e2005-03-04 08:48:53 +00002399
vlmaf841972005-01-28 12:18:50 +00002400 /* Fall through */
2401 }
2402
vlm2e774282005-08-14 15:03:31 +00002403 if(onc_flags & ONC_avoid_keywords)
vlm0c6d3812006-03-21 03:40:38 +00002404 id = MKID_safe(expr);
vlmaf841972005-01-28 12:18:50 +00002405 else
vlm0c6d3812006-03-21 03:40:38 +00002406 id = MKID(expr);
vlmaf841972005-01-28 12:18:50 +00002407 OUT("%s", id);
2408
2409 return 0;
2410}
vlm6c4a8502005-08-18 13:38:19 +00002411
2412static int
2413emit_include_dependencies(arg_t *arg) {
2414 asn1p_expr_t *expr = arg->expr;
2415 asn1p_expr_t *memb;
2416
2417 /* Avoid recursive definitions. */
2418 TQ_FOR(memb, &(expr->members), next) {
2419 expr_break_recursion(arg, memb);
2420 }
2421
2422 TQ_FOR(memb, &(expr->members), next) {
2423
2424 if(memb->marker.flags & (EM_INDIRECT | EM_UNRECURSE)) {
2425 if(terminal_structable(arg, memb)) {
2426 int saved_target = arg->target->target;
2427 REDIR(OT_FWD_DECLS);
2428 OUT("%s;\n",
2429 asn1c_type_name(arg, memb, TNF_RSAFE));
2430 REDIR(saved_target);
2431 }
2432 }
2433
2434 if((!(memb->expr_type & ASN_CONSTR_MASK)
2435 && memb->expr_type > ASN_CONSTR_MASK)
2436 || memb->meta_type == AMT_TYPEREF) {
2437 if(memb->marker.flags & EM_UNRECURSE) {
2438 GEN_POSTINCLUDE(asn1c_type_name(arg,
2439 memb, TNF_INCLUDE));
2440 } else {
2441 GEN_INCLUDE(asn1c_type_name(arg,
2442 memb, TNF_INCLUDE));
2443 }
2444 }
2445 }
2446
2447 return 0;
2448}
2449
2450/*
2451 * Check if it is better to make this type indirectly accessed via
2452 * a pointer.
2453 * This may be the case for the following recursive definition:
2454 * Type ::= CHOICE { member Type };
2455 */
2456static int
2457expr_break_recursion(arg_t *arg, asn1p_expr_t *expr) {
vlm6c4a8502005-08-18 13:38:19 +00002458 int ret;
2459
2460 if(expr->marker.flags & EM_UNRECURSE)
2461 return 1; /* Already broken */
2462
vlm6c4a8502005-08-18 13:38:19 +00002463 /* -findirect-choice compiles members of CHOICE as indirect pointers */
2464 if((arg->flags & A1C_INDIRECT_CHOICE)
2465 && arg->expr->expr_type == ASN_CONSTR_CHOICE
vlm337167e2005-11-26 11:25:14 +00002466 && (expr_get_type(arg, expr) & ASN_CONSTR_MASK)
vlm6c4a8502005-08-18 13:38:19 +00002467 ) {
2468 /* Break cross-reference */
2469 expr->marker.flags |= EM_INDIRECT | EM_UNRECURSE;
2470 return 1;
2471 }
2472
2473 if((expr->marker.flags & EM_INDIRECT)
2474 || arg->expr->expr_type == ASN_CONSTR_SET_OF
2475 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF) {
2476 if(terminal_structable(arg, expr)) {
2477 expr->marker.flags |= EM_UNRECURSE;
2478
2479 if(arg->expr->expr_type == ASN_CONSTR_SET_OF
2480 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF) {
2481 /* Don't put EM_INDIRECT even if recursion */
2482 return 1;
2483 }
2484
2485 /* Fall through */
2486 }
2487 }
2488
2489 /* Look for recursive back-references */
2490 ret = expr_defined_recursively(arg, expr);
2491 switch(ret) {
2492 case 2: /* Explicitly break the recursion */
2493 case 1: /* Use safer typing */
2494 expr->marker.flags |= EM_INDIRECT;
2495 expr->marker.flags |= EM_UNRECURSE;
2496 break;
2497 }
2498
2499 return 0;
2500}
2501
2502/*
2503 * Check if the type can be represented using simple `struct TYPE`.
2504 */
2505static asn1p_expr_t *
2506terminal_structable(arg_t *arg, asn1p_expr_t *expr) {
2507 asn1p_expr_t *terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
2508 if(terminal
2509 && !terminal->parent_expr
2510 && (terminal->expr_type & ASN_CONSTR_MASK)) {
2511 return terminal;
2512 }
2513 return 0;
2514}
2515
2516static int
2517asn1c_recurse(arg_t *arg, asn1p_expr_t *expr, int (*callback)(arg_t *arg, void *key), void *key) {
2518 arg_t tmp = *arg;
2519 int maxret = 0;
2520 int ret;
2521
2522 if(expr->_mark) return 0;
2523 expr->_mark |= TM_RECURSION;
2524
2525 /* Invoke callback for every type going into recursion */
2526 tmp.expr = expr;
2527 maxret = callback(&tmp, key);
2528 if(maxret <= 1) {
2529 /*
2530 * Recursively invoke myself and the callbacks.
2531 */
2532 TQ_FOR(tmp.expr, &(expr->members), next) {
2533 ret = asn1c_recurse(&tmp, tmp.expr, callback, key);
2534 if(ret > maxret)
2535 maxret = ret;
2536 if(maxret > 1) break;
2537 }
2538 }
2539
2540 expr->_mark &= ~TM_RECURSION;
2541 return maxret;
2542}
2543
2544static int
2545check_is_refer_to(arg_t *arg, void *key) {
2546 asn1p_expr_t *terminal = terminal_structable(arg, arg->expr);
2547 if(terminal == key) {
2548 if(arg->expr->marker.flags & EM_INDIRECT)
2549 return 1; /* This is almost safe indirection */
2550 return 2;
2551 } else if(terminal) {
2552 /* This might be N-step circular loop. Dive into it. */
2553 return asn1c_recurse(arg, terminal, check_is_refer_to, key);
2554 }
2555 return 0;
2556}
2557
2558/*
2559 * Check if the possibly inner expression defined recursively.
2560 */
2561static int
2562expr_defined_recursively(arg_t *arg, asn1p_expr_t *expr) {
2563 asn1p_expr_t *terminal;
2564 asn1p_expr_t *topmost;
2565
2566 /* If expression is top-level, there's no way it can be recursive. */
2567 if(expr->parent_expr == 0) return 0;
2568 if(expr->expr_type != A1TC_REFERENCE)
2569 return 0; /* Basic types are never recursive */
2570
2571 terminal = terminal_structable(arg, expr);
2572 if(!terminal) return 0; /* Terminal cannot be indirected */
2573
2574 /* Search for the parent container for the given expression */
2575 topmost = expr;
2576 while(topmost->parent_expr)
2577 topmost = topmost->parent_expr;
2578
2579 /* Look inside the terminal type if it mentions the parent expression */
2580 return asn1c_recurse(arg, terminal, check_is_refer_to, topmost);
2581}
vlm337167e2005-11-26 11:25:14 +00002582
2583struct canonical_map_element {
2584 int eidx;
2585 asn1p_expr_t *expr;
2586};
2587static int compar_cameo(const void *ap, const void *bp);
2588static arg_t *cameo_arg;
2589static int *
2590compute_canonical_members_order(arg_t *arg, int el_count) {
2591 struct canonical_map_element *cmap;
2592 int *rmap;
2593 asn1p_expr_t *v;
2594 int eidx = 0;
2595 int ext_start = -1;
2596 int nextmax = -1;
2597 int already_sorted = 1;
2598
2599 cmap = calloc(el_count, sizeof *cmap);
2600 assert(cmap);
2601
2602 TQ_FOR(v, &(arg->expr->members), next) {
2603 if(v->expr_type != A1TC_EXTENSIBLE) {
2604 cmap[eidx].eidx = eidx;
2605 cmap[eidx].expr = v;
2606 eidx++;
2607 } else if(ext_start == -1)
2608 ext_start = eidx;
2609 }
2610
2611 cameo_arg = arg;
2612 if(ext_start == -1) {
2613 /* Sort the whole thing */
2614 qsort(cmap, el_count, sizeof(*cmap), compar_cameo);
2615 } else {
2616 /* Sort root and extensions independently */
2617 qsort(cmap, ext_start, sizeof(*cmap), compar_cameo);
2618 qsort(cmap + ext_start, el_count - ext_start,
2619 sizeof(*cmap), compar_cameo);
2620 }
2621
2622 /* move data back to a simpler map */
2623 rmap = calloc(el_count, sizeof *rmap);
2624 assert(rmap);
2625 for(eidx = 0; eidx < el_count; eidx++) {
2626 rmap[eidx] = cmap[eidx].eidx;
2627 if(rmap[eidx] <= nextmax)
2628 already_sorted = 0;
2629 else
2630 nextmax = rmap[eidx];
2631 }
2632 free(cmap);
2633
2634 if(already_sorted) { free(rmap); rmap = 0; }
2635 return rmap;
2636}
2637static int compar_cameo(const void *ap, const void *bp) {
2638 const struct canonical_map_element *a = (const void *)ap;
2639 const struct canonical_map_element *b = (const void *)bp;
2640 struct asn1p_type_tag_s atag, btag;
2641 arg_t *arg = cameo_arg;
2642
2643 if(asn1f_fetch_outmost_tag(arg->asn, a->expr->module, a->expr,
2644 &atag, AFT_IMAGINARY_ANY | AFT_CANON_CHOICE))
2645 return 1;
2646
2647 if(asn1f_fetch_outmost_tag(arg->asn, b->expr->module, b->expr,
2648 &btag, AFT_IMAGINARY_ANY | AFT_CANON_CHOICE))
2649 return -1;
2650
2651 if(atag.tag_class < btag.tag_class)
2652 return -1;
2653 if(atag.tag_class > btag.tag_class)
2654 return 1;
2655 if(atag.tag_value < btag.tag_value)
2656 return -1;
2657 if(atag.tag_value > btag.tag_value)
2658 return 1;
2659 return 0;
2660
2661}