blob: 3ebd4179675c80e19546cd2ec32b72be1efd808e [file] [log] [blame]
vlmfa67ddc2004-06-03 03:38:44 +00001/*
2 * Don't look into this file. First, because it's a mess, and second, because
3 * it's a brain of the compiler, and you don't wanna mess with brains do you? ;)
4 */
5#include "asn1c_internal.h"
6#include "asn1c_C.h"
vlm1d036692004-08-19 13:29:46 +00007#include "asn1c_constraint.h"
vlmb2839012004-08-20 13:37:01 +00008#include "asn1c_out.h"
9#include "asn1c_misc.h"
vlm337167e2005-11-26 11:25:14 +000010#include <asn1fix_crange.h> /* constraint groker from libasn1fix */
11#include <asn1fix_export.h> /* other exportables from libasn1fix */
vlmfa67ddc2004-06-03 03:38:44 +000012
vlm4e03ce22004-06-06 07:20:17 +000013typedef struct tag2el_s {
14 struct asn1p_type_tag_s el_tag;
15 int el_no;
vlmc8aeab42004-06-14 13:09:45 +000016 int toff_first;
17 int toff_last;
vlm4e03ce22004-06-06 07:20:17 +000018 asn1p_expr_t *from_expr;
19} tag2el_t;
20
vlm940bc6b2004-10-03 09:13:30 +000021typedef enum fte {
22 FTE_ALLTAGS,
23 FTE_CANONICAL_XER,
24} fte_e;
25static int _fill_tag2el_map(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags);
26static int _add_tag2el_member(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags);
vlm4e03ce22004-06-06 07:20:17 +000027
vlm2e774282005-08-14 15:03:31 +000028enum onc_flags {
29 ONC_noflags = 0x00,
30 ONC_avoid_keywords = 0x01,
31 ONC_force_compound_name = 0x02,
32};
33static int out_name_chain(arg_t *arg, enum onc_flags);
vlmfa67ddc2004-06-03 03:38:44 +000034static int asn1c_lang_C_type_SEQUENCE_def(arg_t *arg);
35static int asn1c_lang_C_type_SET_def(arg_t *arg);
36static int asn1c_lang_C_type_CHOICE_def(arg_t *arg);
37static int asn1c_lang_C_type_SEx_OF_def(arg_t *arg, int seq_of);
vlma8a86cc2004-09-10 06:07:18 +000038static int _print_tag(arg_t *arg, struct asn1p_type_tag_s *tag_p);
vlm337167e2005-11-26 11:25:14 +000039static int compute_extensions_start(asn1p_expr_t *expr);
vlm5a6fc652005-08-16 17:00:21 +000040static int expr_break_recursion(arg_t *arg, asn1p_expr_t *expr);
vlm39ba4c42004-09-22 16:06:28 +000041static int expr_as_xmlvaluelist(arg_t *arg, asn1p_expr_t *expr);
vlm4e554992004-08-25 02:03:12 +000042static int expr_elements_count(arg_t *arg, asn1p_expr_t *expr);
vlm337167e2005-11-26 11:25:14 +000043static int emit_single_member_PER_constraint(arg_t *arg, asn1cnst_range_t *range, char *type);
44static int emit_single_member_PER_constraints(arg_t *arg, asn1p_expr_t *expr);
45static int emit_members_PER_constraints(arg_t *arg);
vlm4e554992004-08-25 02:03:12 +000046static int emit_member_table(arg_t *arg, asn1p_expr_t *expr);
vlm940bc6b2004-10-03 09:13:30 +000047static int emit_tag2member_map(arg_t *arg, tag2el_t *tag2el, int tag2el_count, const char *opt_modifier);
vlm0b567bf2005-03-04 22:18:20 +000048static int emit_include_dependencies(arg_t *arg);
vlm6c4a8502005-08-18 13:38:19 +000049static asn1p_expr_t *terminal_structable(arg_t *arg, asn1p_expr_t *expr);
50static int expr_defined_recursively(arg_t *arg, asn1p_expr_t *expr);
51static int asn1c_recurse(arg_t *arg, asn1p_expr_t *expr, int (*callback)(arg_t *arg, void *key), void *key);
vlm337167e2005-11-26 11:25:14 +000052static asn1p_expr_type_e expr_get_type(arg_t *arg, asn1p_expr_t *expr);
53static int try_inline_default(arg_t *arg, asn1p_expr_t *expr, int out);
54static int *compute_canonical_members_order(arg_t *arg, int el_count);
vlmfa67ddc2004-06-03 03:38:44 +000055
vlm72425de2004-09-13 08:31:01 +000056enum tvm_compat {
57 _TVM_SAME = 0, /* tags and all_tags are same */
58 _TVM_SUBSET = 1, /* tags are subset of all_tags */
59 _TVM_DIFFERENT = 2, /* tags and all_tags are different */
60};
61static enum tvm_compat emit_tags_vectors(arg_t *arg, asn1p_expr_t *expr, int *tc, int *atc);
62
vlm4e554992004-08-25 02:03:12 +000063enum etd_spec {
64 ETD_NO_SPECIFICS,
65 ETD_HAS_SPECIFICS
66};
vlm86f5ed22004-09-26 13:11:31 +000067static int emit_type_DEF(arg_t *arg, asn1p_expr_t *expr, enum tvm_compat tv_mode, int tags_count, int all_tags_count, int elements_count, enum etd_spec);
vlm4e554992004-08-25 02:03:12 +000068
vlmb2839012004-08-20 13:37:01 +000069#define C99_MODE (!(arg->flags & A1C_NO_C99))
vlmfa67ddc2004-06-03 03:38:44 +000070#define UNNAMED_UNIONS (arg->flags & A1C_UNNAMED_UNIONS)
vlm12c8f692004-09-06 08:07:29 +000071#define HIDE_INNER_DEFS (arg->embed && !(arg->flags & A1C_ALL_DEFS_GLOBAL))
vlmfa67ddc2004-06-03 03:38:44 +000072
73#define PCTX_DEF INDENTED( \
74 OUT("\n"); \
75 OUT("/* Context for parsing across buffer boundaries */\n"); \
vlma5dcb912004-09-29 13:16:40 +000076 OUT("asn_struct_ctx_t _asn_ctx;\n"));
vlmfa67ddc2004-06-03 03:38:44 +000077
vlm0b567bf2005-03-04 22:18:20 +000078
vlm33a4ff12004-08-11 05:21:32 +000079#define DEPENDENCIES do { \
vlm0b567bf2005-03-04 22:18:20 +000080 emit_include_dependencies(arg); \
vlm33a4ff12004-08-11 05:21:32 +000081 if(expr->expr_type == ASN_CONSTR_SET_OF) \
vlmea226772006-09-13 02:51:20 +000082 GEN_INCLUDE_STD("asn_SET_OF"); \
vlm33a4ff12004-08-11 05:21:32 +000083 if(expr->expr_type == ASN_CONSTR_SEQUENCE_OF) \
vlmea226772006-09-13 02:51:20 +000084 GEN_INCLUDE_STD("asn_SEQUENCE_OF"); \
vlm33a4ff12004-08-11 05:21:32 +000085} while(0)
vlmfa67ddc2004-06-03 03:38:44 +000086
vlm1f7df782005-03-04 23:48:19 +000087/* MKID_safe() without checking for reserved keywords */
vlm0c6d3812006-03-21 03:40:38 +000088#define MKID(expr) (asn1c_make_identifier(0, expr, 0))
89#define MKID_safe(expr) (asn1c_make_identifier(AMI_CHECK_RESERVED, expr, 0))
vlmfa67ddc2004-06-03 03:38:44 +000090
91int
vlmf9d178d2004-09-14 12:47:45 +000092asn1c_lang_C_type_REAL(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +000093 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
94}
95
vlm80a48592005-02-25 12:10:27 +000096struct value2enum {
97 asn1c_integer_t value;
98 const char *name;
99 int idx;
100};
101static int compar_enumMap_byName(const void *ap, const void *bp) {
102 const struct value2enum *a = (const struct value2enum *)ap;
103 const struct value2enum *b = (const struct value2enum *)bp;
104 return strcmp(a->name, b->name);
105}
106static int compar_enumMap_byValue(const void *ap, const void *bp) {
107 const struct value2enum *a = (const struct value2enum *)ap;
108 const struct value2enum *b = (const struct value2enum *)bp;
109 if(a->value < b->value)
110 return -1;
111 else if(a->value == b->value)
112 return 0;
113 return 1;
114}
115
vlmfa67ddc2004-06-03 03:38:44 +0000116int
vlmf9d178d2004-09-14 12:47:45 +0000117asn1c_lang_C_type_common_INTEGER(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +0000118 asn1p_expr_t *expr = arg->expr;
119 asn1p_expr_t *v;
vlm80a48592005-02-25 12:10:27 +0000120 int el_count = expr_elements_count(arg, expr);
121 struct value2enum *v2e;
vlm337167e2005-11-26 11:25:14 +0000122 int map_extensions = (expr->expr_type == ASN_BASIC_INTEGER);
vlm4573af02005-08-13 23:30:24 +0000123 int eidx;
vlmfa67ddc2004-06-03 03:38:44 +0000124
vlm80a48592005-02-25 12:10:27 +0000125 v2e = alloca((el_count + 1) * sizeof(*v2e));
vlmfa67ddc2004-06-03 03:38:44 +0000126
vlm80a48592005-02-25 12:10:27 +0000127 /*
vlm4573af02005-08-13 23:30:24 +0000128 * For all ENUMERATED types and for those INTEGER types which
129 * have identifiers, print out an enumeration table.
vlm80a48592005-02-25 12:10:27 +0000130 */
vlm4573af02005-08-13 23:30:24 +0000131 if(expr->expr_type == ASN_BASIC_ENUMERATED || el_count) {
132 eidx = 0;
vlm80a48592005-02-25 12:10:27 +0000133 REDIR(OT_DEPS);
vlm766cf1e2005-03-04 08:48:53 +0000134 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000135 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000136 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000137 TQ_FOR(v, &(expr->members), next) {
138 switch(v->expr_type) {
139 case A1TC_UNIVERVAL:
vlm766cf1e2005-03-04 08:48:53 +0000140 OUT("\t");
vlm2e774282005-08-14 15:03:31 +0000141 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000142 OUT("_%s", MKID(v));
vlm766cf1e2005-03-04 08:48:53 +0000143 OUT("\t= %" PRIdASN "%s\n",
vlm80a48592005-02-25 12:10:27 +0000144 v->value->value.v_integer,
vlm766cf1e2005-03-04 08:48:53 +0000145 (eidx+1 < el_count) ? "," : "");
vlm80a48592005-02-25 12:10:27 +0000146 v2e[eidx].name = v->Identifier;
147 v2e[eidx].value = v->value->value.v_integer;
148 eidx++;
vlmfa67ddc2004-06-03 03:38:44 +0000149 break;
vlmf9d178d2004-09-14 12:47:45 +0000150 case A1TC_EXTENSIBLE:
151 OUT("\t/*\n");
152 OUT("\t * Enumeration is extensible\n");
153 OUT("\t */\n");
vlm337167e2005-11-26 11:25:14 +0000154 if(!map_extensions)
155 map_extensions = eidx + 1;
vlmf9d178d2004-09-14 12:47:45 +0000156 break;
vlmfa67ddc2004-06-03 03:38:44 +0000157 default:
158 return -1;
159 }
160 }
vlm7c8aa5e2006-03-21 07:25:18 +0000161 OUT("} e_");
vlm2e774282005-08-14 15:03:31 +0000162 out_name_chain(arg, ONC_noflags);
vlm7c8aa5e2006-03-21 07:25:18 +0000163 OUT(";\n");
vlm80a48592005-02-25 12:10:27 +0000164 assert(eidx == el_count);
vlm4573af02005-08-13 23:30:24 +0000165 }
166
167 /*
168 * For all ENUMERATED types print out a mapping table
169 * between identifiers and associated values.
170 * This is prohibited for INTEGER types by by X.693:8.3.4.
171 */
172 if(expr->expr_type == ASN_BASIC_ENUMERATED) {
vlm80a48592005-02-25 12:10:27 +0000173
174 /*
175 * Generate a enumerationName<->value map for XER codec.
176 */
177 REDIR(OT_STAT_DEFS);
178
vlm337167e2005-11-26 11:25:14 +0000179 OUT("static asn_INTEGER_enum_map_t asn_MAP_%s_value2enum_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000180 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000181 qsort(v2e, el_count, sizeof(v2e[0]), compar_enumMap_byValue);
182 for(eidx = 0; eidx < el_count; eidx++) {
183 v2e[eidx].idx = eidx;
184 OUT("\t{ %" PRIdASN ",\t%ld,\t\"%s\" }%s\n",
185 v2e[eidx].value,
186 (long)strlen(v2e[eidx].name), v2e[eidx].name,
187 (eidx + 1 < el_count) ? "," : "");
188 }
vlm337167e2005-11-26 11:25:14 +0000189 if(map_extensions)
vlm80a48592005-02-25 12:10:27 +0000190 OUT("\t/* This list is extensible */\n");
191 OUT("};\n");
192
vlm337167e2005-11-26 11:25:14 +0000193 OUT("static unsigned int asn_MAP_%s_enum2value_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000194 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000195 qsort(v2e, el_count, sizeof(v2e[0]), compar_enumMap_byName);
196 for(eidx = 0; eidx < el_count; eidx++) {
197 OUT("\t%d%s\t/* %s(%" PRIdASN ") */\n",
198 v2e[eidx].idx,
199 (eidx + 1 < el_count) ? "," : "",
200 v2e[eidx].name, v2e[eidx].value);
201 }
vlm337167e2005-11-26 11:25:14 +0000202 if(map_extensions)
vlm80a48592005-02-25 12:10:27 +0000203 OUT("\t/* This list is extensible */\n");
204 OUT("};\n");
205
vlm337167e2005-11-26 11:25:14 +0000206 OUT("static asn_INTEGER_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000207 MKID(expr), expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000208 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +0000209 OUT("asn_MAP_%s_value2enum_%d,\t"
vlm80a48592005-02-25 12:10:27 +0000210 "/* \"tag\" => N; sorted by tag */\n",
vlm0c6d3812006-03-21 03:40:38 +0000211 MKID(expr),
vlm766cf1e2005-03-04 08:48:53 +0000212 expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000213 OUT("asn_MAP_%s_enum2value_%d,\t"
vlm80a48592005-02-25 12:10:27 +0000214 "/* N => \"tag\"; sorted by N */\n",
vlm0c6d3812006-03-21 03:40:38 +0000215 MKID(expr),
vlm766cf1e2005-03-04 08:48:53 +0000216 expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +0000217 OUT("%d,\t/* Number of elements in the maps */\n",
218 el_count);
vlm337167e2005-11-26 11:25:14 +0000219 if(map_extensions) {
220 OUT("%d,\t/* Extensions before this member */\n",
221 map_extensions);
222 } else {
223 OUT("0,\t/* Enumeration is not extensible */\n");
224 }
vlm80a48592005-02-25 12:10:27 +0000225 if(expr->expr_type == ASN_BASIC_ENUMERATED)
226 OUT("1\t/* Strict enumeration */\n");
227 else
228 OUT("0\n");
229 INDENT(-1);
230 OUT("};\n");
vlmfa67ddc2004-06-03 03:38:44 +0000231 }
232
233 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
234}
235
236int
vlm96853d82005-08-13 23:51:47 +0000237asn1c_lang_C_type_BIT_STRING(arg_t *arg) {
238 asn1p_expr_t *expr = arg->expr;
239 asn1p_expr_t *v;
240 int el_count = expr_elements_count(arg, expr);
vlm96853d82005-08-13 23:51:47 +0000241
242 if(el_count) {
vlm75b3a532005-08-14 02:18:27 +0000243 int eidx = 0;
vlm96853d82005-08-13 23:51:47 +0000244 REDIR(OT_DEPS);
245 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000246 out_name_chain(arg, ONC_avoid_keywords);
vlm96853d82005-08-13 23:51:47 +0000247 OUT(" {\n");
248 TQ_FOR(v, &(expr->members), next) {
vlm75b3a532005-08-14 02:18:27 +0000249 if(v->expr_type != A1TC_UNIVERVAL) {
vlm96853d82005-08-13 23:51:47 +0000250 OUT("/* Unexpected BIT STRING element: %s */\n",
251 v->Identifier);
vlm75b3a532005-08-14 02:18:27 +0000252 continue;
vlm96853d82005-08-13 23:51:47 +0000253 }
vlm24238062006-08-26 03:29:15 +0000254 eidx++;
vlm75b3a532005-08-14 02:18:27 +0000255 OUT("\t");
vlm2e774282005-08-14 15:03:31 +0000256 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000257 OUT("_%s", MKID(v));
vlm75b3a532005-08-14 02:18:27 +0000258 OUT("\t= %" PRIdASN "%s\n",
259 v->value->value.v_integer,
260 (eidx < el_count) ? "," : "");
vlm96853d82005-08-13 23:51:47 +0000261 }
vlm7c8aa5e2006-03-21 07:25:18 +0000262 OUT("} e_");
vlm2e774282005-08-14 15:03:31 +0000263 out_name_chain(arg, ONC_noflags);
vlm7c8aa5e2006-03-21 07:25:18 +0000264 OUT(";\n");
vlm96853d82005-08-13 23:51:47 +0000265 assert(eidx == el_count);
266 }
267
268 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
269}
270
271int
vlmfa67ddc2004-06-03 03:38:44 +0000272asn1c_lang_C_type_SEQUENCE(arg_t *arg) {
273 asn1p_expr_t *expr = arg->expr;
274 asn1p_expr_t *v;
275 int comp_mode = 0; /* {root,ext=1,root,root,...} */
276
277 DEPENDENCIES;
278
279 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000280 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000281 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000282 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000283 } else {
284 OUT("typedef struct %s {\n",
vlm0c6d3812006-03-21 03:40:38 +0000285 MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000286 }
287
288 TQ_FOR(v, &(expr->members), next) {
vlm5a6fc652005-08-16 17:00:21 +0000289 if(v->expr_type == A1TC_EXTENSIBLE)
vlmfa67ddc2004-06-03 03:38:44 +0000290 if(comp_mode < 3) comp_mode++;
vlm5a6fc652005-08-16 17:00:21 +0000291 if(comp_mode == 1)
vlm337167e2005-11-26 11:25:14 +0000292 v->marker.flags |= EM_OMITABLE | EM_INDIRECT;
293 try_inline_default(arg, v, 1);
vlmfa67ddc2004-06-03 03:38:44 +0000294 EMBED(v);
295 }
296
297 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000298 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm1f7df782005-03-04 23:48:19 +0000299 expr->_anonymous_type ? "" :
300 arg->embed
vlm0c6d3812006-03-21 03:40:38 +0000301 ? MKID_safe(expr)
302 : MKID(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000303 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000304
305 return asn1c_lang_C_type_SEQUENCE_def(arg);
306}
307
308static int
309asn1c_lang_C_type_SEQUENCE_def(arg_t *arg) {
310 asn1p_expr_t *expr = arg->expr;
311 asn1p_expr_t *v;
312 int elements; /* Number of elements */
vlmfa67ddc2004-06-03 03:38:44 +0000313 int ext_start = -1;
314 int ext_stop = -1;
vlm4e03ce22004-06-06 07:20:17 +0000315 tag2el_t *tag2el = NULL;
316 int tag2el_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000317 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000318 int all_tags_count;
319 enum tvm_compat tv_mode;
vlm337167e2005-11-26 11:25:14 +0000320 int roms_count; /* Root optional members */
321 int aoms_count; /* Additions optional members */
vlmfa67ddc2004-06-03 03:38:44 +0000322
vlm4e03ce22004-06-06 07:20:17 +0000323 /*
324 * Fetch every inner tag from the tag to elements map.
325 */
vlm940bc6b2004-10-03 09:13:30 +0000326 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlm4e03ce22004-06-06 07:20:17 +0000327 if(tag2el) free(tag2el);
328 return -1;
329 }
330
vlmea226772006-09-13 02:51:20 +0000331 GEN_INCLUDE_STD("constr_SEQUENCE");
vlm33a4ff12004-08-11 05:21:32 +0000332 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000333 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000334
vlm33a4ff12004-08-11 05:21:32 +0000335 REDIR(OT_STAT_DEFS);
vlmfa67ddc2004-06-03 03:38:44 +0000336
337 /*
vlm337167e2005-11-26 11:25:14 +0000338 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000339 */
vlm39ba4c42004-09-22 16:06:28 +0000340 if(expr_elements_count(arg, expr)) {
341 int comp_mode = 0; /* {root,ext=1,root,root,...} */
vlmfa67ddc2004-06-03 03:38:44 +0000342
vlm337167e2005-11-26 11:25:14 +0000343 if(emit_members_PER_constraints(arg))
344 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000345 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000346 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000347
348 elements = 0;
vlm337167e2005-11-26 11:25:14 +0000349 roms_count = 0;
350 aoms_count = 0;
vlm39ba4c42004-09-22 16:06:28 +0000351 INDENTED(TQ_FOR(v, &(expr->members), next) {
352 if(v->expr_type == A1TC_EXTENSIBLE) {
353 if((++comp_mode) == 1)
354 ext_start = elements - 1;
355 else
356 ext_stop = elements - 1;
357 continue;
358 }
vlm337167e2005-11-26 11:25:14 +0000359 if(v->marker.flags & EM_OMITABLE)
360 comp_mode == 1 ? ++aoms_count : ++roms_count;
vlm39ba4c42004-09-22 16:06:28 +0000361 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000362 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000363 });
364 OUT("};\n");
vlm337167e2005-11-26 11:25:14 +0000365
366 if((roms_count + aoms_count) && (arg->flags & A1C_GEN_PER)) {
367 int elm = 0;
368 int comma = 0;
369 comp_mode = 0;
370 OUT("static int asn_MAP_%s_oms_%d[] = {",
vlm0c6d3812006-03-21 03:40:38 +0000371 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000372 expr->_type_unique_index);
373 TQ_FOR(v, &(expr->members), next) {
374 if(v->expr_type == A1TC_EXTENSIBLE) {
375 ++comp_mode;
376 continue;
377 }
378 if((v->marker.flags & EM_OMITABLE)
379 && comp_mode != 1) {
380 if(!comma) comma++;
381 else OUT(",");
382 OUT(" %d", elm);
383 }
384 ++elm;
385 }
386 elm = 0;
387 comp_mode = 0;
388 TQ_FOR(v, &(expr->members), next) {
389 if(v->expr_type == A1TC_EXTENSIBLE) {
390 ++comp_mode;
391 continue;
392 }
393 if((v->marker.flags & EM_OMITABLE)
394 && comp_mode == 1) {
395 if(!comma) comma++;
396 else OUT(",");
397 OUT(" %d", elm);
398 }
399 ++elm;
400 }
401 OUT(" };\n");
402 if(roms_count > 65536)
403 FATAL("Too many optional elements in %s "
404 "at line %d!",
405 arg->expr->Identifier,
406 arg->expr->_lineno);
407 } else {
408 roms_count = 0;
409 aoms_count = 0;
410 }
vlm39ba4c42004-09-22 16:06:28 +0000411 } else {
412 elements = 0;
vlm337167e2005-11-26 11:25:14 +0000413 roms_count = 0;
414 aoms_count = 0;
vlm39ba4c42004-09-22 16:06:28 +0000415 }
vlmfa67ddc2004-06-03 03:38:44 +0000416
vlm4a3f5822004-06-28 21:13:46 +0000417 /*
vlma5dcb912004-09-29 13:16:40 +0000418 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000419 */
vlm72425de2004-09-13 08:31:01 +0000420 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000421
vlm4e03ce22004-06-06 07:20:17 +0000422 /*
423 * Tags to elements map.
424 */
vlm940bc6b2004-10-03 09:13:30 +0000425 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
vlm4e03ce22004-06-06 07:20:17 +0000426
vlm337167e2005-11-26 11:25:14 +0000427 OUT("static asn_SEQUENCE_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000428 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000429 INDENT(+1);
430 OUT("sizeof(struct ");
431 out_name_chain(arg, ONC_avoid_keywords); OUT("),\n");
432 OUT("offsetof(struct ");
433 out_name_chain(arg, ONC_avoid_keywords); OUT(", _asn_ctx),\n");
vlm766cf1e2005-03-04 08:48:53 +0000434
vlm337167e2005-11-26 11:25:14 +0000435 if(tag2el_count) {
436 OUT("asn_MAP_%s_tag2el_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +0000437 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000438 expr->_type_unique_index);
439 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
440 } else {
441 OUT("0,\t/* No top level tags */\n");
442 OUT("0,\t/* No tags in the map */\n");
443 }
444 if(roms_count + aoms_count) {
445 OUT("asn_MAP_%s_oms_%d,\t/* Optional members */\n",
vlm0c6d3812006-03-21 03:40:38 +0000446 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +0000447 OUT("%d, %d,\t/* Root/Additions */\n", roms_count, aoms_count);
448 } else {
449 OUT("0, 0, 0,\t/* Optional elements (not needed) */\n");
450 }
451 OUT("%d,\t/* Start extensions */\n",
vlmfa67ddc2004-06-03 03:38:44 +0000452 ext_start);
vlm337167e2005-11-26 11:25:14 +0000453 OUT("%d\t/* Stop extensions */\n",
vlmfa67ddc2004-06-03 03:38:44 +0000454 (ext_stop<ext_start)?elements+1:ext_stop, ext_stop);
vlm337167e2005-11-26 11:25:14 +0000455 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000456 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000457
458 /*
vlma5dcb912004-09-29 13:16:40 +0000459 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000460 */
vlm72425de2004-09-13 08:31:01 +0000461 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +0000462 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000463
vlmfa67ddc2004-06-03 03:38:44 +0000464 REDIR(OT_TYPE_DECLS);
465
466 return 0;
vlmedf203f2005-01-17 11:57:48 +0000467} /* _SEQUENCE_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000468
469int
vlmfa67ddc2004-06-03 03:38:44 +0000470asn1c_lang_C_type_SET(arg_t *arg) {
471 asn1p_expr_t *expr = arg->expr;
472 asn1p_expr_t *v;
473 long mcount;
474 char *id;
475 int comp_mode = 0; /* {root,ext=1,root,root,...} */
476
477 DEPENDENCIES;
478
479 REDIR(OT_DEPS);
480
481 OUT("\n");
482 OUT("/*\n");
483 OUT(" * Method of determining the components presence\n");
484 OUT(" */\n");
485 mcount = 0;
vlm766cf1e2005-03-04 08:48:53 +0000486 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000487 out_name_chain(arg, ONC_noflags);
vlm766cf1e2005-03-04 08:48:53 +0000488 OUT("_PR {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000489 TQ_FOR(v, &(expr->members), next) {
490 if(v->expr_type == A1TC_EXTENSIBLE) continue;
491 INDENTED(
vlm2e774282005-08-14 15:03:31 +0000492 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000493 OUT("_PR_");
vlm0c6d3812006-03-21 03:40:38 +0000494 id = MKID(v);
vlmfa67ddc2004-06-03 03:38:44 +0000495 OUT("%s,\t/* Member %s is present */\n",
496 id, id)
497 );
498 mcount++;
499 }
vlm2e774282005-08-14 15:03:31 +0000500 OUT("} "); out_name_chain(arg, ONC_noflags); OUT("_PR;\n");
vlmfa67ddc2004-06-03 03:38:44 +0000501
502 REDIR(OT_TYPE_DECLS);
503
504 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000505 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000506 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000507 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000508 } else {
vlm337167e2005-11-26 11:25:14 +0000509 OUT("typedef struct %s {\n",
vlm0c6d3812006-03-21 03:40:38 +0000510 MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000511 }
512
513 TQ_FOR(v, &(expr->members), next) {
vlm337167e2005-11-26 11:25:14 +0000514 if(v->expr_type == A1TC_EXTENSIBLE)
vlmfa67ddc2004-06-03 03:38:44 +0000515 if(comp_mode < 3) comp_mode++;
vlm5a6fc652005-08-16 17:00:21 +0000516 if(comp_mode == 1)
vlm337167e2005-11-26 11:25:14 +0000517 v->marker.flags |= EM_OMITABLE | EM_INDIRECT;
518 try_inline_default(arg, v, 1);
vlmfa67ddc2004-06-03 03:38:44 +0000519 EMBED(v);
520 }
521
522 INDENTED(
vlm0c6d3812006-03-21 03:40:38 +0000523 id = MKID(expr);
vlmfa67ddc2004-06-03 03:38:44 +0000524 OUT("\n");
525 OUT("/* Presence bitmask: ASN_SET_ISPRESENT(p%s, %s_PR_x) */\n",
526 id, id);
527 OUT("unsigned int _presence_map\n");
528 OUT("\t[((%ld+(8*sizeof(unsigned int))-1)/(8*sizeof(unsigned int)))];\n", mcount);
529 );
530
531 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000532 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm0c6d3812006-03-21 03:40:38 +0000533 expr->_anonymous_type ? "" : MKID_safe(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000534 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000535
536 return asn1c_lang_C_type_SET_def(arg);
537}
538
vlmfa67ddc2004-06-03 03:38:44 +0000539static int
540asn1c_lang_C_type_SET_def(arg_t *arg) {
541 asn1p_expr_t *expr = arg->expr;
542 asn1p_expr_t *v;
543 int elements;
vlmfa67ddc2004-06-03 03:38:44 +0000544 tag2el_t *tag2el = NULL;
545 int tag2el_count = 0;
vlm940bc6b2004-10-03 09:13:30 +0000546 tag2el_t *tag2el_cxer = NULL;
547 int tag2el_cxer_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000548 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000549 int all_tags_count;
550 enum tvm_compat tv_mode;
vlmfa67ddc2004-06-03 03:38:44 +0000551 char *p;
552
553 /*
554 * Fetch every inner tag from the tag to elements map.
555 */
vlm940bc6b2004-10-03 09:13:30 +0000556 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlmfa67ddc2004-06-03 03:38:44 +0000557 if(tag2el) free(tag2el);
558 return -1;
vlmfa67ddc2004-06-03 03:38:44 +0000559 }
vlm940bc6b2004-10-03 09:13:30 +0000560 if(_fill_tag2el_map(arg, &tag2el_cxer, &tag2el_cxer_count, -1, FTE_CANONICAL_XER)) {
561 if(tag2el) free(tag2el);
562 if(tag2el_cxer) free(tag2el_cxer);
563 return -1;
564 }
565 if(tag2el_cxer_count == tag2el_count
566 && memcmp(tag2el, tag2el_cxer, tag2el_count) == 0) {
567 free(tag2el_cxer);
568 tag2el_cxer = 0;
569 }
vlmfa67ddc2004-06-03 03:38:44 +0000570
vlmea226772006-09-13 02:51:20 +0000571 GEN_INCLUDE_STD("constr_SET");
vlm33a4ff12004-08-11 05:21:32 +0000572 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000573 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000574
575 REDIR(OT_STAT_DEFS);
576
vlmfa67ddc2004-06-03 03:38:44 +0000577 /*
vlm337167e2005-11-26 11:25:14 +0000578 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000579 */
vlm39ba4c42004-09-22 16:06:28 +0000580 if(expr_elements_count(arg, expr)) {
581 int comp_mode = 0; /* {root,ext=1,root,root,...} */
vlmfa67ddc2004-06-03 03:38:44 +0000582
vlm337167e2005-11-26 11:25:14 +0000583 if(emit_members_PER_constraints(arg))
584 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000585 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000586 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000587
588 elements = 0;
589 INDENTED(TQ_FOR(v, &(expr->members), next) {
590 if(v->expr_type == A1TC_EXTENSIBLE) {
591 if(comp_mode < 3) comp_mode++;
592 } else {
vlm39ba4c42004-09-22 16:06:28 +0000593 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000594 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000595 }
596 });
597 OUT("};\n");
598 } else {
599 elements = 0;
600 }
vlmfa67ddc2004-06-03 03:38:44 +0000601
vlm4a3f5822004-06-28 21:13:46 +0000602 /*
vlma5dcb912004-09-29 13:16:40 +0000603 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000604 */
vlm72425de2004-09-13 08:31:01 +0000605 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000606
607 /*
608 * Tags to elements map.
609 */
vlm940bc6b2004-10-03 09:13:30 +0000610 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
611 if(tag2el_cxer)
612 emit_tag2member_map(arg, tag2el_cxer, tag2el_cxer_count, "_cxer");
vlmfa67ddc2004-06-03 03:38:44 +0000613
614 /*
615 * Emit a map of mandatory elements.
616 */
vlm337167e2005-11-26 11:25:14 +0000617 OUT("static uint8_t asn_MAP_%s_mmap_%d",
vlm0c6d3812006-03-21 03:40:38 +0000618 MKID(expr), expr->_type_unique_index);
619 p = MKID_safe(expr);
vlmfa67ddc2004-06-03 03:38:44 +0000620 OUT("[(%d + (8 * sizeof(unsigned int)) - 1) / 8]", elements);
vlm766cf1e2005-03-04 08:48:53 +0000621 OUT(" = {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000622 INDENTED(
623 if(elements) {
vlmfa67ddc2004-06-03 03:38:44 +0000624 int el = 0;
625 TQ_FOR(v, &(expr->members), next) {
626 if(v->expr_type == A1TC_EXTENSIBLE) continue;
vlme2873192005-10-05 08:59:03 +0000627 if(el) {
628 if((el % 8) == 0)
629 OUT(",\n");
630 else
631 OUT(" | ");
vlmfa67ddc2004-06-03 03:38:44 +0000632 }
vlmddd5a7d2004-09-10 09:18:20 +0000633 OUT("(%d << %d)",
vlm6c4a8502005-08-18 13:38:19 +0000634 (v->marker.flags & EM_OMITABLE) != EM_OMITABLE,
vlmddd5a7d2004-09-10 09:18:20 +0000635 7 - (el % 8));
vlmfa67ddc2004-06-03 03:38:44 +0000636 el++;
637 }
638 } else {
639 OUT("0");
640 }
641 );
642 OUT("\n");
643 OUT("};\n");
644
vlm337167e2005-11-26 11:25:14 +0000645 OUT("static asn_SET_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000646 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000647 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000648 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000649 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000650 OUT("),\n");
651 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000652 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000653 OUT(", _asn_ctx),\n");
654 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000655 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000656 OUT(", _presence_map),\n");
vlm0c6d3812006-03-21 03:40:38 +0000657 p = MKID(expr);
vlm337167e2005-11-26 11:25:14 +0000658 OUT("asn_MAP_%s_tag2el_%d,\n", p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000659 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
vlm940bc6b2004-10-03 09:13:30 +0000660 if(tag2el_cxer)
vlm337167e2005-11-26 11:25:14 +0000661 OUT("asn_MAP_%s_tag2el_cxer_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +0000662 p, expr->_type_unique_index);
vlm940bc6b2004-10-03 09:13:30 +0000663 else
vlm337167e2005-11-26 11:25:14 +0000664 OUT("asn_MAP_%s_tag2el_%d,\t/* Same as above */\n",
vlm766cf1e2005-03-04 08:48:53 +0000665 p, expr->_type_unique_index);
666 OUT("%d,\t/* Count of tags in the CXER map */\n",
667 tag2el_cxer_count);
vlm79b08d52004-07-01 00:52:50 +0000668 OUT("%d,\t/* Whether extensible */\n",
vlm337167e2005-11-26 11:25:14 +0000669 compute_extensions_start(expr) == -1 ? 0 : 1);
670 OUT("(unsigned int *)asn_MAP_%s_mmap_%d\t/* Mandatory elements map */\n",
vlm766cf1e2005-03-04 08:48:53 +0000671 p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000672 );
673 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000674
675 /*
vlma5dcb912004-09-29 13:16:40 +0000676 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000677 */
vlm72425de2004-09-13 08:31:01 +0000678 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +0000679 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000680
vlmfa67ddc2004-06-03 03:38:44 +0000681 REDIR(OT_TYPE_DECLS);
682
683 return 0;
vlmedf203f2005-01-17 11:57:48 +0000684} /* _SET_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000685
686int
vlmdae7f9d2004-08-22 03:25:24 +0000687asn1c_lang_C_type_SEx_OF(arg_t *arg) {
vlmfa67ddc2004-06-03 03:38:44 +0000688 asn1p_expr_t *expr = arg->expr;
vlm0b567bf2005-03-04 22:18:20 +0000689 asn1p_expr_t *memb = TQ_FIRST(&expr->members);
vlmfa67ddc2004-06-03 03:38:44 +0000690
691 DEPENDENCIES;
692
693 if(arg->embed) {
vlm766cf1e2005-03-04 08:48:53 +0000694 OUT("struct ");
vlm2e774282005-08-14 15:03:31 +0000695 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000696 OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000697 } else {
vlm0c6d3812006-03-21 03:40:38 +0000698 OUT("typedef struct %s {\n", MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000699 }
700
vlmdae7f9d2004-08-22 03:25:24 +0000701 INDENT(+1);
702 OUT("A_%s_OF(",
703 (arg->expr->expr_type == ASN_CONSTR_SET_OF)
704 ? "SET" : "SEQUENCE");
vlm5a6fc652005-08-16 17:00:21 +0000705
706 /*
707 * README README
708 * The implementation of the A_SET_OF() macro is already indirect.
709 */
710 memb->marker.flags |= EM_INDIRECT;
711
vlm80a48592005-02-25 12:10:27 +0000712 if(memb->expr_type & ASN_CONSTR_MASK
713 || ((memb->expr_type == ASN_BASIC_ENUMERATED
vlmc89422d2005-03-03 21:28:12 +0000714 || (0 /* -- prohibited by X.693:8.3.4 */
715 && memb->expr_type == ASN_BASIC_INTEGER))
716 && expr_elements_count(arg, memb))) {
vlmdae7f9d2004-08-22 03:25:24 +0000717 arg_t tmp;
718 asn1p_expr_t tmp_memb;
719 arg->embed++;
720 tmp = *arg;
721 tmp.expr = &tmp_memb;
722 tmp_memb = *memb;
vlm5a6fc652005-08-16 17:00:21 +0000723 tmp_memb.marker.flags &= ~EM_INDIRECT;
vlmdae7f9d2004-08-22 03:25:24 +0000724 tmp_memb._anonymous_type = 1;
vlm39ba4c42004-09-22 16:06:28 +0000725 if(tmp_memb.Identifier == 0) {
vlm766cf1e2005-03-04 08:48:53 +0000726 tmp_memb.Identifier = "Member";
727 if(0)
vlm39ba4c42004-09-22 16:06:28 +0000728 tmp_memb.Identifier = strdup(
729 asn1c_make_identifier(0,
vlm0c6d3812006-03-21 03:40:38 +0000730 expr, "Member", 0));
vlm39ba4c42004-09-22 16:06:28 +0000731 assert(tmp_memb.Identifier);
732 }
vlmdae7f9d2004-08-22 03:25:24 +0000733 tmp.default_cb(&tmp);
vlm39ba4c42004-09-22 16:06:28 +0000734 if(tmp_memb.Identifier != memb->Identifier)
vlm766cf1e2005-03-04 08:48:53 +0000735 if(0) free(tmp_memb.Identifier);
vlmdae7f9d2004-08-22 03:25:24 +0000736 arg->embed--;
737 assert(arg->target->target == OT_TYPE_DECLS);
738 } else {
vlm6c5d5e52005-03-04 22:38:22 +0000739 OUT("%s", asn1c_type_name(arg, memb,
740 (memb->marker.flags & EM_UNRECURSE)
741 ? TNF_RSAFE : TNF_CTYPE));
vlmfa67ddc2004-06-03 03:38:44 +0000742 }
vlm5a6fc652005-08-16 17:00:21 +0000743 /* README README (above) */
744 if(0 && (memb->marker.flags & EM_INDIRECT))
745 OUT(" *");
vlmdae7f9d2004-08-22 03:25:24 +0000746 OUT(") list;\n");
747 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000748
749 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000750 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm0c6d3812006-03-21 03:40:38 +0000751 expr->_anonymous_type ? "" : MKID_safe(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000752 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000753
754 /*
vlmdae7f9d2004-08-22 03:25:24 +0000755 * SET OF/SEQUENCE OF definition
vlmfa67ddc2004-06-03 03:38:44 +0000756 */
vlmdae7f9d2004-08-22 03:25:24 +0000757 return asn1c_lang_C_type_SEx_OF_def(arg,
758 (arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF));
vlmfa67ddc2004-06-03 03:38:44 +0000759}
760
761static int
762asn1c_lang_C_type_SEx_OF_def(arg_t *arg, int seq_of) {
763 asn1p_expr_t *expr = arg->expr;
764 asn1p_expr_t *v;
vlm6e73a042004-08-11 07:17:22 +0000765 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000766 int all_tags_count;
767 enum tvm_compat tv_mode;
vlmfa67ddc2004-06-03 03:38:44 +0000768
vlm33a4ff12004-08-11 05:21:32 +0000769 /*
vlm337167e2005-11-26 11:25:14 +0000770 * Print out the table according to which parsing is performed.
vlm33a4ff12004-08-11 05:21:32 +0000771 */
vlmfa67ddc2004-06-03 03:38:44 +0000772 if(seq_of) {
vlmea226772006-09-13 02:51:20 +0000773 GEN_INCLUDE_STD("constr_SEQUENCE_OF");
vlmfa67ddc2004-06-03 03:38:44 +0000774 } else {
vlmea226772006-09-13 02:51:20 +0000775 GEN_INCLUDE_STD("constr_SET_OF");
vlmfa67ddc2004-06-03 03:38:44 +0000776 }
vlm33a4ff12004-08-11 05:21:32 +0000777 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000778 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000779
780 REDIR(OT_STAT_DEFS);
781
782 /*
vlm337167e2005-11-26 11:25:14 +0000783 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000784 */
vlm337167e2005-11-26 11:25:14 +0000785 if(emit_members_PER_constraints(arg))
786 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000787 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000788 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000789 INDENT(+1);
vlmfa67ddc2004-06-03 03:38:44 +0000790 v = TQ_FIRST(&(expr->members));
vlm39ba4c42004-09-22 16:06:28 +0000791 if(!v->Identifier) {
vlmbf3c5112005-02-14 20:41:29 +0000792 v->Identifier = strdup("Member");
vlm39ba4c42004-09-22 16:06:28 +0000793 assert(v->Identifier);
794 }
795 v->_anonymous_type = 1;
796 arg->embed++;
vlm4e554992004-08-25 02:03:12 +0000797 emit_member_table(arg, v);
vlm39ba4c42004-09-22 16:06:28 +0000798 arg->embed--;
799 INDENT(-1);
vlmfa67ddc2004-06-03 03:38:44 +0000800 OUT("};\n");
801
vlm4a3f5822004-06-28 21:13:46 +0000802 /*
vlma5dcb912004-09-29 13:16:40 +0000803 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +0000804 */
vlm72425de2004-09-13 08:31:01 +0000805 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000806
vlm337167e2005-11-26 11:25:14 +0000807 OUT("static asn_SET_OF_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000808 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000809 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000810 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000811 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000812 OUT("),\n");
813 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000814 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000815 OUT(", _asn_ctx),\n");
vlm6d44a542005-11-08 03:06:16 +0000816 {
817 int as_xvl = expr_as_xmlvaluelist(arg, v);
818 OUT("%d,\t/* XER encoding is %s */\n",
819 as_xvl,
820 as_xvl ? "XMLValueList" : "XMLDelimitedItemList");
821 }
vlmfa67ddc2004-06-03 03:38:44 +0000822 );
823 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +0000824
825 /*
vlma5dcb912004-09-29 13:16:40 +0000826 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +0000827 */
vlm72425de2004-09-13 08:31:01 +0000828 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, 1,
vlm86f5ed22004-09-26 13:11:31 +0000829 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +0000830
vlmfa67ddc2004-06-03 03:38:44 +0000831 REDIR(OT_TYPE_DECLS);
832
833 return 0;
vlmedf203f2005-01-17 11:57:48 +0000834} /* _SEx_OF_def() */
vlmfa67ddc2004-06-03 03:38:44 +0000835
836int
837asn1c_lang_C_type_CHOICE(arg_t *arg) {
838 asn1p_expr_t *expr = arg->expr;
839 asn1p_expr_t *v;
vlmdae7f9d2004-08-22 03:25:24 +0000840 char *id;
vlmfa67ddc2004-06-03 03:38:44 +0000841
842 DEPENDENCIES;
843
vlm33a4ff12004-08-11 05:21:32 +0000844 REDIR(OT_DEPS);
845
vlm766cf1e2005-03-04 08:48:53 +0000846 OUT("typedef enum ");
vlm2e774282005-08-14 15:03:31 +0000847 out_name_chain(arg, ONC_noflags);
vlm766cf1e2005-03-04 08:48:53 +0000848 OUT("_PR {\n");
vlm33a4ff12004-08-11 05:21:32 +0000849 INDENTED(
vlm6aa50982006-08-18 01:38:40 +0000850 int skipComma = 1;
vlm2e774282005-08-14 15:03:31 +0000851 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000852 OUT("_PR_NOTHING,\t/* No components present */\n");
vlm33a4ff12004-08-11 05:21:32 +0000853 TQ_FOR(v, &(expr->members), next) {
vlm6aa50982006-08-18 01:38:40 +0000854 if(skipComma) skipComma = 0;
vlm9ea7d412006-08-18 01:32:26 +0000855 else OUT(",\n");
vlm33a4ff12004-08-11 05:21:32 +0000856 if(v->expr_type == A1TC_EXTENSIBLE) {
857 OUT("/* Extensions may appear below */\n");
vlm6aa50982006-08-18 01:38:40 +0000858 skipComma = 1;
vlm33a4ff12004-08-11 05:21:32 +0000859 continue;
860 }
vlm2e774282005-08-14 15:03:31 +0000861 out_name_chain(arg, ONC_noflags);
vlm0c6d3812006-03-21 03:40:38 +0000862 id = MKID(v);
vlm9ea7d412006-08-18 01:32:26 +0000863 OUT("_PR_%s", id);
vlm33a4ff12004-08-11 05:21:32 +0000864 }
vlm9ea7d412006-08-18 01:32:26 +0000865 OUT("\n");
vlm33a4ff12004-08-11 05:21:32 +0000866 );
vlm2e774282005-08-14 15:03:31 +0000867 OUT("} "); out_name_chain(arg, ONC_noflags); OUT("_PR;\n");
vlm33a4ff12004-08-11 05:21:32 +0000868
869 REDIR(OT_TYPE_DECLS);
vlmfa67ddc2004-06-03 03:38:44 +0000870
871 if(arg->embed) {
vlm2e774282005-08-14 15:03:31 +0000872 OUT("struct "); out_name_chain(arg, ONC_avoid_keywords); OUT(" {\n");
vlmfa67ddc2004-06-03 03:38:44 +0000873 } else {
vlm0c6d3812006-03-21 03:40:38 +0000874 OUT("typedef struct %s {\n", MKID_safe(expr));
vlmfa67ddc2004-06-03 03:38:44 +0000875 }
876
877 INDENTED(
vlm2e774282005-08-14 15:03:31 +0000878 out_name_chain(arg, ONC_noflags);
vlmaf841972005-01-28 12:18:50 +0000879 OUT("_PR present;\n");
vlm2e774282005-08-14 15:03:31 +0000880 OUT("union ");
881 if(UNNAMED_UNIONS == 0) {
882 out_name_chain(arg, ONC_force_compound_name);
883 OUT("_u ");
884 }
885 OUT("{\n");
vlmfa67ddc2004-06-03 03:38:44 +0000886 TQ_FOR(v, &(expr->members), next) {
887 EMBED(v);
888 }
889 if(UNNAMED_UNIONS) OUT("};\n");
890 else OUT("} choice;\n");
891 );
892
893 PCTX_DEF;
vlm0b567bf2005-03-04 22:18:20 +0000894 OUT("} %s%s%s", (expr->marker.flags & EM_INDIRECT)?"*":"",
vlm1f7df782005-03-04 23:48:19 +0000895 expr->_anonymous_type ? "" :
896 arg->embed
vlm0c6d3812006-03-21 03:40:38 +0000897 ? MKID_safe(expr)
898 : MKID(expr),
vlmdae7f9d2004-08-22 03:25:24 +0000899 arg->embed ? "" : "_t");
vlmfa67ddc2004-06-03 03:38:44 +0000900
901 return asn1c_lang_C_type_CHOICE_def(arg);
902}
903
904static int
905asn1c_lang_C_type_CHOICE_def(arg_t *arg) {
906 asn1p_expr_t *expr = arg->expr;
907 asn1p_expr_t *v;
908 int elements; /* Number of elements */
vlmfa67ddc2004-06-03 03:38:44 +0000909 tag2el_t *tag2el = NULL;
910 int tag2el_count = 0;
vlm6e73a042004-08-11 07:17:22 +0000911 int tags_count;
vlm72425de2004-09-13 08:31:01 +0000912 int all_tags_count;
913 enum tvm_compat tv_mode;
vlm337167e2005-11-26 11:25:14 +0000914 int *cmap = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000915
916 /*
917 * Fetch every inner tag from the tag to elements map.
918 */
vlm940bc6b2004-10-03 09:13:30 +0000919 if(_fill_tag2el_map(arg, &tag2el, &tag2el_count, -1, FTE_ALLTAGS)) {
vlmfa67ddc2004-06-03 03:38:44 +0000920 if(tag2el) free(tag2el);
921 return -1;
vlmfa67ddc2004-06-03 03:38:44 +0000922 }
923
vlmea226772006-09-13 02:51:20 +0000924 GEN_INCLUDE_STD("constr_CHOICE");
vlm33a4ff12004-08-11 05:21:32 +0000925 if(!arg->embed)
vlma5dcb912004-09-29 13:16:40 +0000926 GEN_DECLARE(expr); /* asn_DEF_xxx */
vlmfa67ddc2004-06-03 03:38:44 +0000927
vlm33a4ff12004-08-11 05:21:32 +0000928 REDIR(OT_STAT_DEFS);
vlmfa67ddc2004-06-03 03:38:44 +0000929
930 /*
vlm337167e2005-11-26 11:25:14 +0000931 * Print out the table according to which parsing is performed.
vlmfa67ddc2004-06-03 03:38:44 +0000932 */
vlm39ba4c42004-09-22 16:06:28 +0000933 if(expr_elements_count(arg, expr)) {
vlmfa67ddc2004-06-03 03:38:44 +0000934
vlm337167e2005-11-26 11:25:14 +0000935 if(emit_members_PER_constraints(arg))
936 return -1;
vlm766cf1e2005-03-04 08:48:53 +0000937 OUT("static asn_TYPE_member_t asn_MBR_%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000938 MKID(expr), expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +0000939
940 elements = 0;
941 INDENTED(TQ_FOR(v, &(expr->members), next) {
vlm34dcd572005-01-17 11:40:49 +0000942 if(v->expr_type == A1TC_EXTENSIBLE)
943 continue;
vlm34dcd572005-01-17 11:40:49 +0000944 emit_member_table(arg, v);
vlm5a6fc652005-08-16 17:00:21 +0000945 elements++;
vlm39ba4c42004-09-22 16:06:28 +0000946 });
947 OUT("};\n");
948 } else {
949 elements = 0;
950 }
vlmfa67ddc2004-06-03 03:38:44 +0000951
vlm337167e2005-11-26 11:25:14 +0000952 /* Create a canonical elements map */
953 if(elements && (arg->flags & A1C_GEN_PER)) {
954 int i;
955 cmap = compute_canonical_members_order(arg, elements);
956 if(cmap) {
957 OUT("static int asn_MAP_%s_cmap_%d[] = {",
vlm0c6d3812006-03-21 03:40:38 +0000958 MKID(expr),
vlm337167e2005-11-26 11:25:14 +0000959 expr->_type_unique_index);
960 for(i = 0; i < elements; i++) {
961 if(i) OUT(",");
962 OUT(" %d", cmap[i]);
963 }
964 OUT(" };\n");
965 free(cmap);
966 }
967 }
vlm6e73a042004-08-11 07:17:22 +0000968
vlmfa67ddc2004-06-03 03:38:44 +0000969 if(arg->embed) {
970 /*
971 * Our parent structure has already taken this into account.
972 */
vlm72425de2004-09-13 08:31:01 +0000973 tv_mode = _TVM_SAME;
974 tags_count = all_tags_count = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000975 } else {
vlm72425de2004-09-13 08:31:01 +0000976 tv_mode = emit_tags_vectors(arg, expr,
977 &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000978 }
vlmfa67ddc2004-06-03 03:38:44 +0000979
980 /*
981 * Tags to elements map.
982 */
vlm940bc6b2004-10-03 09:13:30 +0000983 emit_tag2member_map(arg, tag2el, tag2el_count, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000984
vlm337167e2005-11-26 11:25:14 +0000985 OUT("static asn_CHOICE_specifics_t asn_SPC_%s_specs_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +0000986 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +0000987 INDENTED(
vlm766cf1e2005-03-04 08:48:53 +0000988 OUT("sizeof(struct ");
vlm2e774282005-08-14 15:03:31 +0000989 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000990 OUT("),\n");
991 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000992 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000993 OUT(", _asn_ctx),\n");
994 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +0000995 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000996 OUT(", present),\n");
997 OUT("sizeof(((struct ");
vlm2e774282005-08-14 15:03:31 +0000998 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +0000999 OUT(" *)0)->present),\n");
vlm337167e2005-11-26 11:25:14 +00001000 OUT("asn_MAP_%s_tag2el_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +00001001 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001002 OUT("%d,\t/* Count of tags in the map */\n", tag2el_count);
vlm337167e2005-11-26 11:25:14 +00001003 if(C99_MODE) OUT(".canonical_order = ");
1004 if(cmap) OUT("asn_MAP_%s_cmap_%d,\t/* Canonically sorted */\n",
vlm0c6d3812006-03-21 03:40:38 +00001005 MKID(expr), expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00001006 else OUT("0,\n");
1007 if(C99_MODE) OUT(".ext_start = ");
1008 OUT("%d\t/* Extensions start */\n",
1009 compute_extensions_start(expr));
vlmfa67ddc2004-06-03 03:38:44 +00001010 );
1011 OUT("};\n");
vlm4e554992004-08-25 02:03:12 +00001012
1013 /*
vlma5dcb912004-09-29 13:16:40 +00001014 * Emit asn_DEF_xxx table.
vlm4e554992004-08-25 02:03:12 +00001015 */
vlm72425de2004-09-13 08:31:01 +00001016 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count, elements,
vlm86f5ed22004-09-26 13:11:31 +00001017 ETD_HAS_SPECIFICS);
vlmfa67ddc2004-06-03 03:38:44 +00001018
vlmfa67ddc2004-06-03 03:38:44 +00001019 REDIR(OT_TYPE_DECLS);
1020
1021 return 0;
vlmedf203f2005-01-17 11:57:48 +00001022} /* _CHOICE_def() */
vlmfa67ddc2004-06-03 03:38:44 +00001023
1024int
1025asn1c_lang_C_type_REFERENCE(arg_t *arg) {
1026 asn1p_ref_t *ref;
1027
1028 ref = arg->expr->reference;
1029 if(ref->components[ref->comp_count-1].name[0] == '&') {
vlmfa67ddc2004-06-03 03:38:44 +00001030 asn1p_expr_t *extract;
1031 arg_t tmp;
1032 int ret;
1033
vlm39ba4c42004-09-22 16:06:28 +00001034 extract = asn1f_class_access_ex(arg->asn, arg->expr->module,
vlm0c6d3812006-03-21 03:40:38 +00001035 arg->expr, arg->expr->rhs_pspecs, ref);
vlmfa67ddc2004-06-03 03:38:44 +00001036 if(extract == NULL)
1037 return -1;
1038
vlmdae7f9d2004-08-22 03:25:24 +00001039 extract = asn1p_expr_clone(extract, 0);
vlmfa67ddc2004-06-03 03:38:44 +00001040 if(extract) {
1041 if(extract->Identifier)
1042 free(extract->Identifier);
1043 extract->Identifier = strdup(arg->expr->Identifier);
1044 if(extract->Identifier == NULL) {
1045 asn1p_expr_free(extract);
1046 return -1;
1047 }
1048 } else {
1049 return -1;
1050 }
1051
1052 tmp = *arg;
1053 tmp.asn = arg->asn;
vlmfa67ddc2004-06-03 03:38:44 +00001054 tmp.expr = extract;
1055
1056 ret = arg->default_cb(&tmp);
1057
1058 asn1p_expr_free(extract);
1059
1060 return ret;
1061 }
1062
1063
1064 return asn1c_lang_C_type_SIMPLE_TYPE(arg);
1065}
1066
1067int
1068asn1c_lang_C_type_SIMPLE_TYPE(arg_t *arg) {
1069 asn1p_expr_t *expr = arg->expr;
vlm6e73a042004-08-11 07:17:22 +00001070 int tags_count;
vlm72425de2004-09-13 08:31:01 +00001071 int all_tags_count;
1072 enum tvm_compat tv_mode;
vlm80a48592005-02-25 12:10:27 +00001073 enum etd_spec etd_spec;
vlmfa67ddc2004-06-03 03:38:44 +00001074 char *p;
1075
1076 if(arg->embed) {
vlma5dcb912004-09-29 13:16:40 +00001077 enum tnfmt tnfmt = TNF_CTYPE;
1078
1079 /*
1080 * If this is an optional compound type,
1081 * refer it using "struct X" convention,
1082 * as it may recursively include the current structure.
1083 */
vlm0b567bf2005-03-04 22:18:20 +00001084 if(expr->marker.flags & (EM_INDIRECT | EM_UNRECURSE)) {
vlm6c4a8502005-08-18 13:38:19 +00001085 if(terminal_structable(arg, expr)) {
vlm0b567bf2005-03-04 22:18:20 +00001086 tnfmt = TNF_RSAFE;
1087 REDIR(OT_FWD_DECLS);
vlm5feb7522005-03-04 23:50:56 +00001088 OUT("%s;\n",
vlm0b567bf2005-03-04 22:18:20 +00001089 asn1c_type_name(arg, arg->expr, tnfmt));
vlma5dcb912004-09-29 13:16:40 +00001090 }
1091 }
1092
vlmfa67ddc2004-06-03 03:38:44 +00001093 REDIR(OT_TYPE_DECLS);
1094
vlm0b567bf2005-03-04 22:18:20 +00001095 OUT("%s", asn1c_type_name(arg, arg->expr, tnfmt));
vlm80a48592005-02-25 12:10:27 +00001096 if(!expr->_anonymous_type) {
vlm0b567bf2005-03-04 22:18:20 +00001097 OUT("%s", (expr->marker.flags&EM_INDIRECT)?"\t*":"\t ");
vlm0c6d3812006-03-21 03:40:38 +00001098 OUT("%s", MKID_safe(expr));
vlm337167e2005-11-26 11:25:14 +00001099 if((expr->marker.flags & (EM_DEFAULT & ~EM_INDIRECT))
1100 == (EM_DEFAULT & ~EM_INDIRECT))
vlm80a48592005-02-25 12:10:27 +00001101 OUT("\t/* DEFAULT %s */",
1102 asn1f_printable_value(
1103 expr->marker.default_value));
vlm337167e2005-11-26 11:25:14 +00001104 else if((expr->marker.flags & EM_OPTIONAL)
1105 == EM_OPTIONAL)
vlm80a48592005-02-25 12:10:27 +00001106 OUT("\t/* OPTIONAL */");
1107 }
1108
1109 } else {
1110 GEN_INCLUDE(asn1c_type_name(arg, expr, TNF_INCLUDE));
vlmb2839012004-08-20 13:37:01 +00001111
1112 REDIR(OT_TYPE_DECLS);
vlm80a48592005-02-25 12:10:27 +00001113
1114 OUT("typedef %s\t",
vlm0b567bf2005-03-04 22:18:20 +00001115 asn1c_type_name(arg, arg->expr, TNF_CTYPE));
vlm80a48592005-02-25 12:10:27 +00001116 OUT("%s%s_t",
vlm0b567bf2005-03-04 22:18:20 +00001117 (expr->marker.flags & EM_INDIRECT)?"*":" ",
vlm0c6d3812006-03-21 03:40:38 +00001118 MKID(expr));
vlmfa67ddc2004-06-03 03:38:44 +00001119 }
1120
vlm80a48592005-02-25 12:10:27 +00001121 if((expr->expr_type == ASN_BASIC_ENUMERATED)
vlmc89422d2005-03-03 21:28:12 +00001122 || (0 /* -- prohibited by X.693:8.3.4 */
1123 && expr->expr_type == ASN_BASIC_INTEGER
vlm80a48592005-02-25 12:10:27 +00001124 && expr_elements_count(arg, expr)))
1125 etd_spec = ETD_HAS_SPECIFICS;
1126 else
1127 etd_spec = ETD_NO_SPECIFICS;
vlmfa67ddc2004-06-03 03:38:44 +00001128
vlm86f5ed22004-09-26 13:11:31 +00001129 /*
1130 * If this type just blindly refers the other type, alias it.
1131 * Type1 ::= Type2
1132 */
vlm80a48592005-02-25 12:10:27 +00001133 if(arg->embed && etd_spec == ETD_NO_SPECIFICS) {
1134 REDIR(OT_TYPE_DECLS);
1135 return 0;
1136 }
vlm86f5ed22004-09-26 13:11:31 +00001137 if((!expr->constraints || (arg->flags & A1C_NO_CONSTRAINTS))
vlm80a48592005-02-25 12:10:27 +00001138 && (arg->embed || expr->tag.tag_class == TC_NOCLASS)
vlm6f74b0f2005-03-04 23:23:50 +00001139 && etd_spec == ETD_NO_SPECIFICS
1140 && 0 /* This shortcut is incompatible with XER */
1141 ) {
vlm86f5ed22004-09-26 13:11:31 +00001142 char *type_name;
1143 REDIR(OT_FUNC_DECLS);
1144 type_name = asn1c_type_name(arg, expr, TNF_SAFE);
1145 OUT("/* This type is equivalent to %s */\n", type_name);
vlm86f5ed22004-09-26 13:11:31 +00001146 if(HIDE_INNER_DEFS) OUT("/* ");
vlm0c6d3812006-03-21 03:40:38 +00001147 OUT("#define\tasn_DEF_%s\t", MKID(expr));
vlm86f5ed22004-09-26 13:11:31 +00001148 type_name = asn1c_type_name(arg, expr, TNF_SAFE);
vlm80a48592005-02-25 12:10:27 +00001149 OUT("asn_DEF_%s", type_name);
vlm86f5ed22004-09-26 13:11:31 +00001150 if(HIDE_INNER_DEFS)
vlm80a48592005-02-25 12:10:27 +00001151 OUT("\t// (Use -fall-defs-global to expose) */");
1152 OUT("\n");
vlm86f5ed22004-09-26 13:11:31 +00001153 REDIR(OT_CODE);
1154 OUT("/* This type is equivalent to %s */\n", type_name);
1155 OUT("\n");
1156 REDIR(OT_TYPE_DECLS);
1157 return 0;
1158 }
1159
vlmfa67ddc2004-06-03 03:38:44 +00001160 REDIR(OT_STAT_DEFS);
1161
vlm4a3f5822004-06-28 21:13:46 +00001162 /*
vlma5dcb912004-09-29 13:16:40 +00001163 * Print out asn_DEF_<type>_[all_]tags[] vectors.
vlm4a3f5822004-06-28 21:13:46 +00001164 */
vlm72425de2004-09-13 08:31:01 +00001165 tv_mode = emit_tags_vectors(arg, expr, &tags_count, &all_tags_count);
vlmfa67ddc2004-06-03 03:38:44 +00001166
vlm80a48592005-02-25 12:10:27 +00001167 emit_type_DEF(arg, expr, tv_mode, tags_count, all_tags_count,
1168 0, etd_spec);
vlmfa67ddc2004-06-03 03:38:44 +00001169
vlmb2839012004-08-20 13:37:01 +00001170 REDIR(OT_CODE);
1171
vlmfa67ddc2004-06-03 03:38:44 +00001172 /*
1173 * Constraint checking.
1174 */
vlm86f5ed22004-09-26 13:11:31 +00001175 if(!(arg->flags & A1C_NO_CONSTRAINTS)) {
vlm0c6d3812006-03-21 03:40:38 +00001176 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001177 if(HIDE_INNER_DEFS) OUT("static ");
vlm86f5ed22004-09-26 13:11:31 +00001178 OUT("int\n");
vlm766cf1e2005-03-04 08:48:53 +00001179 OUT("%s", p);
1180 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1181 OUT("_constraint(asn_TYPE_descriptor_t *td, const void *sptr,\n");
vlm86f5ed22004-09-26 13:11:31 +00001182 INDENT(+1);
vlmaf68ef52006-07-13 11:19:01 +00001183 OUT("\t\tasn_app_constraint_failed_f *ctfailcb, void *app_key) {");
vlm86f5ed22004-09-26 13:11:31 +00001184 OUT("\n");
1185 if(asn1c_emit_constraint_checking_code(arg) == 1) {
1186 OUT("/* Replace with underlying type checker */\n");
1187 OUT("td->check_constraints "
vlma5dcb912004-09-29 13:16:40 +00001188 "= asn_DEF_%s.check_constraints;\n",
vlm86f5ed22004-09-26 13:11:31 +00001189 asn1c_type_name(arg, expr, TNF_SAFE));
1190 OUT("return td->check_constraints"
vlmaf68ef52006-07-13 11:19:01 +00001191 "(td, sptr, ctfailcb, app_key);\n");
vlm1d036692004-08-19 13:29:46 +00001192 }
vlm86f5ed22004-09-26 13:11:31 +00001193 INDENT(-1);
1194 OUT("}\n");
1195 OUT("\n");
vlmfa67ddc2004-06-03 03:38:44 +00001196 }
vlmfa67ddc2004-06-03 03:38:44 +00001197
1198 /*
1199 * Emit suicidal functions.
1200 */
1201
vlmfa67ddc2004-06-03 03:38:44 +00001202 /*
1203 * This function replaces certain fields from the definition
1204 * of a type with the corresponding fields from the basic type
1205 * (from which the current type is inherited).
1206 */
vlmfa67ddc2004-06-03 03:38:44 +00001207 OUT("/*\n");
vlmb2839012004-08-20 13:37:01 +00001208 OUT(" * This type is implemented using %s,\n",
1209 asn1c_type_name(arg, expr, TNF_SAFE));
vlmdcd32fe2004-09-23 22:20:47 +00001210 OUT(" * so here we adjust the DEF accordingly.\n");
vlmfa67ddc2004-06-03 03:38:44 +00001211 OUT(" */\n");
1212 OUT("static void\n");
vlm766cf1e2005-03-04 08:48:53 +00001213 OUT("%s_%d_inherit_TYPE_descriptor(asn_TYPE_descriptor_t *td) {\n",
vlm0c6d3812006-03-21 03:40:38 +00001214 MKID(expr), expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001215 INDENT(+1);
vlm80a48592005-02-25 12:10:27 +00001216 {
vlm39ba4c42004-09-22 16:06:28 +00001217 asn1p_expr_t *terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
vlmb2839012004-08-20 13:37:01 +00001218 char *type_name = asn1c_type_name(arg, expr, TNF_SAFE);
vlma5dcb912004-09-29 13:16:40 +00001219 OUT("td->free_struct = asn_DEF_%s.free_struct;\n", type_name);
1220 OUT("td->print_struct = asn_DEF_%s.print_struct;\n", type_name);
1221 OUT("td->ber_decoder = asn_DEF_%s.ber_decoder;\n", type_name);
1222 OUT("td->der_encoder = asn_DEF_%s.der_encoder;\n", type_name);
1223 OUT("td->xer_decoder = asn_DEF_%s.xer_decoder;\n", type_name);
1224 OUT("td->xer_encoder = asn_DEF_%s.xer_encoder;\n", type_name);
vlm337167e2005-11-26 11:25:14 +00001225 OUT("td->uper_decoder = asn_DEF_%s.uper_decoder;\n", type_name);
vlm9ea7d412006-08-18 01:32:26 +00001226 OUT("td->uper_encoder = asn_DEF_%s.uper_encoder;\n", type_name);
vlm1308d2b2004-09-10 15:49:15 +00001227 if(!terminal && !tags_count) {
vlm72425de2004-09-13 08:31:01 +00001228 OUT("/* The next four lines are here because of -fknown-extern-type */\n");
vlma5dcb912004-09-29 13:16:40 +00001229 OUT("td->tags = asn_DEF_%s.tags;\n", type_name);
1230 OUT("td->tags_count = asn_DEF_%s.tags_count;\n", type_name);
1231 OUT("td->all_tags = asn_DEF_%s.all_tags;\n", type_name);
1232 OUT("td->all_tags_count = asn_DEF_%s.all_tags_count;\n",type_name);
vlm1308d2b2004-09-10 15:49:15 +00001233 OUT("/* End of these lines */\n");
1234 }
vlm337167e2005-11-26 11:25:14 +00001235 OUT("if(!td->per_constraints)\n");
1236 OUT("\ttd->per_constraints = asn_DEF_%s.per_constraints;\n",
1237 type_name);
vlma5dcb912004-09-29 13:16:40 +00001238 OUT("td->elements = asn_DEF_%s.elements;\n", type_name);
1239 OUT("td->elements_count = asn_DEF_%s.elements_count;\n", type_name);
vlm80a48592005-02-25 12:10:27 +00001240 if(etd_spec != ETD_NO_SPECIFICS) {
1241 INDENT(-1);
vlmc86870c2005-03-29 19:04:24 +00001242 OUT(" /* ");
vlmb2839012004-08-20 13:37:01 +00001243 }
vlm80a48592005-02-25 12:10:27 +00001244 OUT("td->specifics = asn_DEF_%s.specifics;", type_name);
1245 if(etd_spec == ETD_NO_SPECIFICS) {
1246 INDENT(-1);
1247 OUT("\n");
1248 } else {
1249 OUT("\t// Defined explicitly */\n");
1250 }
1251 }
vlmfa67ddc2004-06-03 03:38:44 +00001252 OUT("}\n");
1253 OUT("\n");
vlmfa67ddc2004-06-03 03:38:44 +00001254
vlm0c6d3812006-03-21 03:40:38 +00001255 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001256 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001257 OUT("void\n");
vlm766cf1e2005-03-04 08:48:53 +00001258 OUT("%s", p);
1259 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1260 OUT("_free(asn_TYPE_descriptor_t *td,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001261 INDENTED(
vlm39ba4c42004-09-22 16:06:28 +00001262 OUT("\tvoid *struct_ptr, int contents_only) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001263 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1264 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001265 OUT("td->free_struct(td, struct_ptr, contents_only);\n");
vlmfa67ddc2004-06-03 03:38:44 +00001266 );
1267 OUT("}\n");
1268 OUT("\n");
1269
vlm0c6d3812006-03-21 03:40:38 +00001270 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001271 if(HIDE_INNER_DEFS) OUT("static ");
vlmfa67ddc2004-06-03 03:38:44 +00001272 OUT("int\n");
vlm766cf1e2005-03-04 08:48:53 +00001273 OUT("%s", p);
1274 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1275 OUT("_print(asn_TYPE_descriptor_t *td, const void *struct_ptr,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001276 INDENTED(
1277 OUT("\tint ilevel, asn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001278 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1279 p, expr->_type_unique_index);
vlmfa67ddc2004-06-03 03:38:44 +00001280 OUT("return td->print_struct(td, struct_ptr, ilevel, cb, app_key);\n");
1281 );
1282 OUT("}\n");
1283 OUT("\n");
1284
vlm0c6d3812006-03-21 03:40:38 +00001285 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001286 if(HIDE_INNER_DEFS) OUT("static ");
vlm9de248e2004-10-20 15:50:55 +00001287 OUT("asn_dec_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001288 OUT("%s", p);
1289 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1290 OUT("_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
vlmfa67ddc2004-06-03 03:38:44 +00001291 INDENTED(
vlmfcc4cbc2005-03-17 21:56:00 +00001292 OUT("\tvoid **structure, const void *bufptr, size_t size, int tag_mode) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001293 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1294 p, expr->_type_unique_index);
vlma5dcb912004-09-29 13:16:40 +00001295 OUT("return td->ber_decoder(opt_codec_ctx, td, structure, bufptr, size, tag_mode);\n");
vlm39ba4c42004-09-22 16:06:28 +00001296 );
1297 OUT("}\n");
1298 OUT("\n");
1299
vlm0c6d3812006-03-21 03:40:38 +00001300 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001301 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001302 OUT("asn_enc_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001303 OUT("%s", p);
1304 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1305 OUT("_encode_der(asn_TYPE_descriptor_t *td,\n");
vlm39ba4c42004-09-22 16:06:28 +00001306 INDENTED(
1307 OUT("\tvoid *structure, int tag_mode, ber_tlv_tag_t tag,\n");
1308 OUT("\tasn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001309 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1310 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001311 OUT("return td->der_encoder(td, structure, tag_mode, tag, cb, app_key);\n");
1312 );
1313 OUT("}\n");
1314 OUT("\n");
1315
vlm0c6d3812006-03-21 03:40:38 +00001316 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001317 if(HIDE_INNER_DEFS) OUT("static ");
vlme03646b2004-10-23 13:34:00 +00001318 OUT("asn_dec_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001319 OUT("%s", p);
1320 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1321 OUT("_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
vlme03646b2004-10-23 13:34:00 +00001322 INDENTED(
vlmfcc4cbc2005-03-17 21:56:00 +00001323 OUT("\tvoid **structure, const char *opt_mname, const void *bufptr, size_t size) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001324 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1325 p, expr->_type_unique_index);
vlme03646b2004-10-23 13:34:00 +00001326 OUT("return td->xer_decoder(opt_codec_ctx, td, structure, opt_mname, bufptr, size);\n");
1327 );
1328 OUT("}\n");
1329 OUT("\n");
1330
vlm0c6d3812006-03-21 03:40:38 +00001331 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001332 if(HIDE_INNER_DEFS) OUT("static ");
vlm39ba4c42004-09-22 16:06:28 +00001333 OUT("asn_enc_rval_t\n");
vlm766cf1e2005-03-04 08:48:53 +00001334 OUT("%s", p);
1335 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1336 OUT("_encode_xer(asn_TYPE_descriptor_t *td, void *structure,\n");
vlm39ba4c42004-09-22 16:06:28 +00001337 INDENTED(
1338 OUT("\tint ilevel, enum xer_encoder_flags_e flags,\n");
1339 OUT("\tasn_app_consume_bytes_f *cb, void *app_key) {\n");
vlm766cf1e2005-03-04 08:48:53 +00001340 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1341 p, expr->_type_unique_index);
vlm39ba4c42004-09-22 16:06:28 +00001342 OUT("return td->xer_encoder(td, structure, ilevel, flags, cb, app_key);\n");
vlmfa67ddc2004-06-03 03:38:44 +00001343 );
1344 OUT("}\n");
1345 OUT("\n");
1346
vlm337167e2005-11-26 11:25:14 +00001347 if(arg->flags & A1C_GEN_PER) {
vlm0c6d3812006-03-21 03:40:38 +00001348 p = MKID(expr);
vlm9ea7d412006-08-18 01:32:26 +00001349
vlm337167e2005-11-26 11:25:14 +00001350 if(HIDE_INNER_DEFS) OUT("static ");
1351 OUT("asn_dec_rval_t\n");
1352 OUT("%s", p);
1353 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1354 OUT("_decode_uper(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,\n");
1355 INDENTED(
1356 OUT("\tasn_per_constraints_t *constraints, void **structure, asn_per_data_t *per_data) {\n");
1357 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1358 p, expr->_type_unique_index);
1359 OUT("return td->uper_decoder(opt_codec_ctx, td, constraints, structure, per_data);\n");
1360 );
1361 OUT("}\n");
1362 OUT("\n");
vlm9ea7d412006-08-18 01:32:26 +00001363
1364 p = MKID(expr);
1365 if(HIDE_INNER_DEFS) OUT("static ");
1366 OUT("asn_enc_rval_t\n");
1367 OUT("%s", p);
1368 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
1369 OUT("_encode_uper(asn_TYPE_descriptor_t *td,\n");
1370 INDENTED(
1371 OUT("\tasn_per_constraints_t *constraints,\n");
1372 OUT("\tvoid *structure, asn_per_outp_t *per_out) {\n");
1373 OUT("%s_%d_inherit_TYPE_descriptor(td);\n",
1374 p, expr->_type_unique_index);
1375 OUT("return td->uper_encoder(td, constraints, structure, per_out);\n");
1376 );
1377 OUT("}\n");
1378 OUT("\n");
vlm337167e2005-11-26 11:25:14 +00001379 }
1380
vlmfa67ddc2004-06-03 03:38:44 +00001381 REDIR(OT_FUNC_DECLS);
1382
vlm0c6d3812006-03-21 03:40:38 +00001383 p = MKID(expr);
vlm80a48592005-02-25 12:10:27 +00001384 if(HIDE_INNER_DEFS) {
vlm766cf1e2005-03-04 08:48:53 +00001385 OUT("/* extern asn_TYPE_descriptor_t asn_DEF_%s_%d;"
1386 "\t// (Use -fall-defs-global to expose) */\n",
1387 p, expr->_type_unique_index);
vlm80a48592005-02-25 12:10:27 +00001388 } else {
1389 OUT("extern asn_TYPE_descriptor_t asn_DEF_%s;\n", p);
1390 OUT("asn_struct_free_f %s_free;\n", p);
1391 OUT("asn_struct_print_f %s_print;\n", p);
1392 OUT("asn_constr_check_f %s_constraint;\n", p);
1393 OUT("ber_type_decoder_f %s_decode_ber;\n", p);
1394 OUT("der_type_encoder_f %s_encode_der;\n", p);
1395 OUT("xer_type_decoder_f %s_decode_xer;\n", p);
1396 OUT("xer_type_encoder_f %s_encode_xer;\n", p);
vlm9ea7d412006-08-18 01:32:26 +00001397 if(arg->flags & A1C_GEN_PER) {
vlm337167e2005-11-26 11:25:14 +00001398 OUT("per_type_decoder_f %s_decode_uper;\n", p);
vlm9ea7d412006-08-18 01:32:26 +00001399 OUT("per_type_encoder_f %s_encode_uper;\n", p);
1400 }
vlm80a48592005-02-25 12:10:27 +00001401 }
vlmfa67ddc2004-06-03 03:38:44 +00001402
vlm33a4ff12004-08-11 05:21:32 +00001403 REDIR(OT_TYPE_DECLS);
1404
vlmfa67ddc2004-06-03 03:38:44 +00001405 return 0;
1406}
1407
1408int
1409asn1c_lang_C_type_EXTENSIBLE(arg_t *arg) {
1410
1411 OUT("/*\n");
1412 OUT(" * This type is extensible,\n");
1413 OUT(" * possible extensions are below.\n");
1414 OUT(" */\n");
1415
1416 return 0;
1417}
1418
vlm337167e2005-11-26 11:25:14 +00001419static int
1420compute_extensions_start(asn1p_expr_t *expr) {
vlm79b08d52004-07-01 00:52:50 +00001421 asn1p_expr_t *v;
vlm337167e2005-11-26 11:25:14 +00001422 int eidx = 0;
vlm79b08d52004-07-01 00:52:50 +00001423 TQ_FOR(v, &(expr->members), next) {
vlm337167e2005-11-26 11:25:14 +00001424 if(v->expr_type == A1TC_EXTENSIBLE)
1425 return eidx;
1426 eidx++;
vlm79b08d52004-07-01 00:52:50 +00001427 }
vlm337167e2005-11-26 11:25:14 +00001428 return -1;
vlm79b08d52004-07-01 00:52:50 +00001429}
1430
vlmfa67ddc2004-06-03 03:38:44 +00001431static int
vlma8a86cc2004-09-10 06:07:18 +00001432_print_tag(arg_t *arg, struct asn1p_type_tag_s *tag) {
vlmfa67ddc2004-06-03 03:38:44 +00001433
1434 OUT("(");
vlma8a86cc2004-09-10 06:07:18 +00001435 switch(tag->tag_class) {
vlmfa67ddc2004-06-03 03:38:44 +00001436 case TC_UNIVERSAL: OUT("ASN_TAG_CLASS_UNIVERSAL"); break;
1437 case TC_APPLICATION: OUT("ASN_TAG_CLASS_APPLICATION"); break;
1438 case TC_CONTEXT_SPECIFIC: OUT("ASN_TAG_CLASS_CONTEXT"); break;
1439 case TC_PRIVATE: OUT("ASN_TAG_CLASS_PRIVATE"); break;
1440 case TC_NOCLASS:
1441 break;
1442 }
vlm47ae1582004-09-24 21:01:43 +00001443 OUT(" | (%" PRIdASN " << 2))", tag->tag_value);
vlmfa67ddc2004-06-03 03:38:44 +00001444
1445 return 0;
1446}
1447
vlm4e03ce22004-06-06 07:20:17 +00001448
1449static int
1450_tag2el_cmp(const void *ap, const void *bp) {
1451 const tag2el_t *a = ap;
1452 const tag2el_t *b = bp;
1453 const struct asn1p_type_tag_s *ta = &a->el_tag;
1454 const struct asn1p_type_tag_s *tb = &b->el_tag;
1455
1456 if(ta->tag_class == tb->tag_class) {
1457 if(ta->tag_value == tb->tag_value) {
1458 /*
1459 * Sort by their respective positions.
1460 */
1461 if(a->el_no < b->el_no)
1462 return -1;
1463 else if(a->el_no > b->el_no)
1464 return 1;
1465 return 0;
1466 } else if(ta->tag_value < tb->tag_value)
1467 return -1;
1468 else
1469 return 1;
1470 } else if(ta->tag_class < tb->tag_class) {
1471 return -1;
1472 } else {
1473 return 1;
1474 }
1475}
1476
vlmfa67ddc2004-06-03 03:38:44 +00001477/*
1478 * For constructed types, number of external tags may be greater than
1479 * number of elements in the type because of CHOICE type.
1480 * T ::= SET { -- Three possible tags:
1481 * a INTEGER, -- One tag is here...
1482 * b Choice1 -- ... and two more tags are there.
1483 * }
1484 * Choice1 ::= CHOICE {
1485 * s1 IA5String,
1486 * s2 ObjectDescriptor
1487 * }
1488 */
1489static int
vlm940bc6b2004-10-03 09:13:30 +00001490_fill_tag2el_map(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags) {
vlmfa67ddc2004-06-03 03:38:44 +00001491 asn1p_expr_t *expr = arg->expr;
1492 arg_t tmparg = *arg;
1493 asn1p_expr_t *v;
1494 int element = 0;
vlm940bc6b2004-10-03 09:13:30 +00001495 int original_count = *count;
1496 int sort_until = -1;
vlmfa67ddc2004-06-03 03:38:44 +00001497
1498 TQ_FOR(v, &(expr->members), next) {
vlm940bc6b2004-10-03 09:13:30 +00001499 if(v->expr_type == A1TC_EXTENSIBLE) {
1500 /*
vlm80a48592005-02-25 12:10:27 +00001501 * CXER mandates sorting
vlm940bc6b2004-10-03 09:13:30 +00001502 * only for the root part.
1503 */
1504 if(flags == FTE_CANONICAL_XER
1505 && sort_until == -1)
1506 sort_until = *count;
vlmfa67ddc2004-06-03 03:38:44 +00001507 continue;
vlm940bc6b2004-10-03 09:13:30 +00001508 }
vlmfa67ddc2004-06-03 03:38:44 +00001509
1510 tmparg.expr = v;
1511
1512 if(_add_tag2el_member(&tmparg, tag2el, count,
vlm940bc6b2004-10-03 09:13:30 +00001513 (el_no==-1)?element:el_no, flags)) {
vlmfa67ddc2004-06-03 03:38:44 +00001514 return -1;
1515 }
1516
1517 element++;
1518 }
1519
vlm940bc6b2004-10-03 09:13:30 +00001520
1521 if(flags == FTE_CANONICAL_XER) {
1522 if(sort_until == -1) sort_until = *count;
1523 qsort((*tag2el) + original_count,
1524 sort_until - original_count,
1525 sizeof(**tag2el), _tag2el_cmp);
1526 if(arg->expr->expr_type == ASN_CONSTR_CHOICE
1527 && (sort_until - original_count) >= 1) {
1528 /* Only take in account the root component */
1529 *count = original_count + 1;
1530 }
1531 } else {
1532 /*
1533 * Sort the map according to canonical order of their
1534 * tags and element numbers.
1535 */
1536 qsort(*tag2el, *count, sizeof(**tag2el), _tag2el_cmp);
1537 }
vlm4e03ce22004-06-06 07:20:17 +00001538
vlmc8aeab42004-06-14 13:09:45 +00001539 /*
1540 * Initialize .toff_{first|last} members.
1541 */
1542 if(*count) {
1543 struct asn1p_type_tag_s *cur_tag = 0;
1544 tag2el_t *cur = *tag2el;
1545 tag2el_t *end = cur + *count;
1546 int occur, i;
1547 for(occur = 0; cur < end; cur++) {
1548 if(cur_tag == 0
1549 || cur_tag->tag_value != cur->el_tag.tag_value
1550 || cur_tag->tag_class != cur->el_tag.tag_class) {
1551 cur_tag = &cur->el_tag;
1552 occur = 0;
1553 } else {
1554 occur++;
1555 }
1556 cur->toff_first = -occur;
1557 for(i = 0; i >= -occur; i--)
1558 cur[i].toff_last = -i;
1559 }
1560 }
1561
vlmfa67ddc2004-06-03 03:38:44 +00001562 return 0;
1563}
1564
1565static int
vlm940bc6b2004-10-03 09:13:30 +00001566_add_tag2el_member(arg_t *arg, tag2el_t **tag2el, int *count, int el_no, fte_e flags) {
vlmfa67ddc2004-06-03 03:38:44 +00001567 struct asn1p_type_tag_s tag;
1568 int ret;
1569
1570 assert(el_no >= 0);
1571
vlm39ba4c42004-09-22 16:06:28 +00001572 ret = asn1f_fetch_outmost_tag(arg->asn, arg->expr->module,
vlm337167e2005-11-26 11:25:14 +00001573 arg->expr, &tag, AFT_IMAGINARY_ANY);
vlmfa67ddc2004-06-03 03:38:44 +00001574 if(ret == 0) {
vlme2070ea2004-09-04 04:42:29 +00001575 tag2el_t *te;
1576 int new_count = (*count) + 1;
vlmfa67ddc2004-06-03 03:38:44 +00001577 void *p;
vlme2070ea2004-09-04 04:42:29 +00001578
vlm2de0e792004-09-05 10:42:33 +00001579 if(tag.tag_value == -1) {
1580 /*
1581 * This is an untagged ANY type,
1582 * proceed without adding a tag
1583 */
1584 return 0;
1585 }
1586
vlme2070ea2004-09-04 04:42:29 +00001587 p = realloc(*tag2el, new_count * sizeof(tag2el_t));
vlmfa67ddc2004-06-03 03:38:44 +00001588 if(p) *tag2el = p;
1589 else return -1;
1590
1591 DEBUG("Found tag for %s: %ld",
1592 arg->expr->Identifier,
1593 (long)tag.tag_value);
1594
vlme2070ea2004-09-04 04:42:29 +00001595 te = &((*tag2el)[*count]);
1596 te->el_tag = tag;
1597 te->el_no = el_no;
1598 te->from_expr = arg->expr;
1599 *count = new_count;
vlmfa67ddc2004-06-03 03:38:44 +00001600 return 0;
1601 }
1602
1603 DEBUG("Searching tag in complex expression %s:%x at line %d",
1604 arg->expr->Identifier,
1605 arg->expr->expr_type,
1606 arg->expr->_lineno);
1607
1608 /*
1609 * Iterate over members of CHOICE type.
1610 */
1611 if(arg->expr->expr_type == ASN_CONSTR_CHOICE) {
vlm940bc6b2004-10-03 09:13:30 +00001612 return _fill_tag2el_map(arg, tag2el, count, el_no, flags);
vlmfa67ddc2004-06-03 03:38:44 +00001613 }
1614
1615 if(arg->expr->expr_type == A1TC_REFERENCE) {
1616 arg_t tmp = *arg;
1617 asn1p_expr_t *expr;
vlm6c4a8502005-08-18 13:38:19 +00001618 expr = asn1f_lookup_symbol_ex(tmp.asn, tmp.expr,
vlmfa67ddc2004-06-03 03:38:44 +00001619 arg->expr->reference);
1620 if(expr) {
1621 tmp.expr = expr;
vlm940bc6b2004-10-03 09:13:30 +00001622 return _add_tag2el_member(&tmp, tag2el, count, el_no, flags);
vlmfa67ddc2004-06-03 03:38:44 +00001623 } else {
1624 FATAL("Cannot dereference %s at line %d",
1625 arg->expr->Identifier,
1626 arg->expr->_lineno);
1627 return -1;
1628 }
1629 }
1630
1631 DEBUG("No tag for %s at line %d",
1632 arg->expr->Identifier,
1633 arg->expr->_lineno);
1634
1635 return -1;
1636}
1637
1638static int
vlm940bc6b2004-10-03 09:13:30 +00001639emit_tag2member_map(arg_t *arg, tag2el_t *tag2el, int tag2el_count, const char *opt_modifier) {
vlm4e03ce22004-06-06 07:20:17 +00001640 asn1p_expr_t *expr = arg->expr;
vlmfbd6d9e2005-06-02 05:21:37 +00001641 int i;
1642
1643 if(!tag2el_count) return 0; /* No top level tags */
vlm4e03ce22004-06-06 07:20:17 +00001644
vlm337167e2005-11-26 11:25:14 +00001645 OUT("static asn_TYPE_tag2member_t asn_MAP_%s_tag2el%s_%d[] = {\n",
vlm0c6d3812006-03-21 03:40:38 +00001646 MKID(expr), opt_modifier?opt_modifier:"",
vlm337167e2005-11-26 11:25:14 +00001647 expr->_type_unique_index);
vlmfbd6d9e2005-06-02 05:21:37 +00001648 for(i = 0; i < tag2el_count; i++) {
1649 OUT(" { ");
1650 _print_tag(arg, &tag2el[i].el_tag);
1651 OUT(", ");
1652 OUT("%d, ", tag2el[i].el_no);
1653 OUT("%d, ", tag2el[i].toff_first);
1654 OUT("%d ", tag2el[i].toff_last);
1655 OUT("}%s /* %s at %d */\n",
1656 (i + 1 < tag2el_count) ? "," : "",
1657 tag2el[i].from_expr->Identifier,
1658 tag2el[i].from_expr->_lineno
1659 );
vlm4e03ce22004-06-06 07:20:17 +00001660 }
1661 OUT("};\n");
1662
vlmfbd6d9e2005-06-02 05:21:37 +00001663 return 0;
vlm4e03ce22004-06-06 07:20:17 +00001664}
1665
vlm72425de2004-09-13 08:31:01 +00001666static enum tvm_compat
1667emit_tags_vectors(arg_t *arg, asn1p_expr_t *expr, int *tags_count_r, int *all_tags_count_r) {
1668 struct asn1p_type_tag_s *tags = 0; /* Effective tags */
1669 struct asn1p_type_tag_s *all_tags = 0; /* The full array */
vlm6e73a042004-08-11 07:17:22 +00001670 int tags_count = 0;
vlm72425de2004-09-13 08:31:01 +00001671 int all_tags_count = 0;
1672 enum tvm_compat tv_mode = _TVM_SAME;
vlm1308d2b2004-09-10 15:49:15 +00001673 int i;
vlm4a3f5822004-06-28 21:13:46 +00001674
vlmc6de2c42004-09-14 14:10:10 +00001675 /* Cleanup before proceeding. */
1676 *tags_count_r = 0;
1677 *all_tags_count_r = 0;
1678
vlm1308d2b2004-09-10 15:49:15 +00001679 /* Fetch a chain of tags */
vlm39ba4c42004-09-22 16:06:28 +00001680 tags_count = asn1f_fetch_tags(arg->asn, expr->module, expr, &tags, 0);
vlmc6de2c42004-09-14 14:10:10 +00001681 if(tags_count < 0)
1682 return -1;
vlm6e73a042004-08-11 07:17:22 +00001683
vlm72425de2004-09-13 08:31:01 +00001684 /* Fetch a chain of tags */
vlm39ba4c42004-09-22 16:06:28 +00001685 all_tags_count = asn1f_fetch_tags(arg->asn, expr->module, expr,
vlm72425de2004-09-13 08:31:01 +00001686 &all_tags, AFT_FULL_COLLECT);
1687 if(all_tags_count < 0) {
1688 if(tags) free(tags);
1689 return -1;
vlmfb41dbb2004-09-08 00:28:57 +00001690 }
vlm1308d2b2004-09-10 15:49:15 +00001691
vlm72425de2004-09-13 08:31:01 +00001692 assert(tags_count <= all_tags_count);
1693 assert((tags_count?0:1) == (all_tags_count?0:1));
vlm4a3f5822004-06-28 21:13:46 +00001694
vlm72425de2004-09-13 08:31:01 +00001695 if(tags_count <= all_tags_count) {
1696 for(i = 0; i < tags_count; i++) {
1697 if(tags[i].tag_value != all_tags[i].tag_value
1698 || tags[i].tag_class != all_tags[i].tag_class) {
1699 tv_mode = _TVM_DIFFERENT;
1700 break;
1701 }
1702 }
1703 if(i == tags_count && tags_count < all_tags_count)
1704 tv_mode = _TVM_SUBSET;
1705 } else {
1706 tv_mode = _TVM_DIFFERENT;
1707 }
1708
1709#define EMIT_TAGS_TABLE(name, tags, tags_count) do { \
vlm337167e2005-11-26 11:25:14 +00001710 OUT("static ber_tlv_tag_t asn_DEF_%s%s_tags_%d[] = {\n",\
vlm0c6d3812006-03-21 03:40:38 +00001711 MKID(expr), name, \
vlm337167e2005-11-26 11:25:14 +00001712 expr->_type_unique_index); \
vlm72425de2004-09-13 08:31:01 +00001713 INDENT(+1); \
1714 /* Print the array of collected tags */ \
1715 for(i = 0; i < tags_count; i++) { \
1716 if(i) OUT(",\n"); \
1717 _print_tag(arg, &tags[i]); \
1718 } \
1719 OUT("\n"); \
1720 INDENT(-1); \
1721 OUT("};\n"); \
1722 } while(0)
1723
1724 if(tags_count) {
1725 if(tv_mode == _TVM_SUBSET)
1726 EMIT_TAGS_TABLE("", all_tags, all_tags_count);
1727 else
1728 EMIT_TAGS_TABLE("", tags, tags_count);
1729 }
1730
1731 if(all_tags_count) {
1732 if(tv_mode == _TVM_DIFFERENT)
1733 EMIT_TAGS_TABLE("_all", all_tags, all_tags_count);
1734 }
1735
1736 if(tags) free(tags);
1737 if(all_tags) free(all_tags);
1738
1739 *tags_count_r = tags_count;
1740 *all_tags_count_r = all_tags_count;
1741
1742 return tv_mode;
vlm4a3f5822004-06-28 21:13:46 +00001743}
vlmb2839012004-08-20 13:37:01 +00001744
1745static int
vlm4e554992004-08-25 02:03:12 +00001746expr_elements_count(arg_t *arg, asn1p_expr_t *expr) {
vlmb2839012004-08-20 13:37:01 +00001747 asn1p_expr_t *topmost_parent;
1748 asn1p_expr_t *v;
1749 int elements = 0;
1750
vlm39ba4c42004-09-22 16:06:28 +00001751 topmost_parent = asn1f_find_terminal_type_ex(arg->asn, expr);
vlmb2839012004-08-20 13:37:01 +00001752 if(!topmost_parent) return 0;
1753
vlm80a48592005-02-25 12:10:27 +00001754 if(!(topmost_parent->expr_type & ASN_CONSTR_MASK)
1755 && !topmost_parent->expr_type == ASN_BASIC_INTEGER
1756 && !topmost_parent->expr_type == ASN_BASIC_ENUMERATED)
vlmb2839012004-08-20 13:37:01 +00001757 return 0;
1758
1759 TQ_FOR(v, &(topmost_parent->members), next) {
1760 if(v->expr_type != A1TC_EXTENSIBLE)
1761 elements++;
1762 }
1763
1764 return elements;
1765}
1766
vlm337167e2005-11-26 11:25:14 +00001767static asn1p_expr_type_e
1768expr_get_type(arg_t *arg, asn1p_expr_t *expr) {
1769 asn1p_expr_t *terminal;
1770 terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
1771 if(terminal) return terminal->expr_type;
1772 return A1TC_INVALID;
1773}
1774
1775static int
1776emit_single_member_PER_constraint(arg_t *arg, asn1cnst_range_t *range, char *type) {
1777 if(!range || range->incompatible || range->not_PER_visible) {
1778 OUT("{ APC_UNCONSTRAINED,\t-1, -1, 0, 0 }");
1779 return 0;
1780 }
1781
1782 if(range->left.type == ARE_VALUE) {
1783 if(range->right.type == ARE_VALUE) {
1784 asn1c_integer_t cover = 1;
1785 asn1c_integer_t r = 1 + range->right.value
1786 - range->left.value;
vlm1fcf7592006-08-18 02:27:55 +00001787 size_t rbits; /* Value range bits */
1788 ssize_t ebits; /* Value effective range bits */
vlm337167e2005-11-26 11:25:14 +00001789
1790 if(range->empty_constraint)
1791 r = 0;
1792
1793 /* Compute real constraint */
1794 for(rbits = 0; rbits < (8 * sizeof(r)); rbits++) {
1795 if(r <= cover)
1796 break;
1797 cover *= 2; /* Can't do shifting */
1798 if(cover < 0) {
1799 FATAL("Constraint at line %d too wide "
1800 "for %d-bits integer type",
1801 arg->expr->_lineno,
1802 sizeof(r) * 8);
1803 rbits = sizeof(r);
1804 break;
1805 }
1806 }
1807
1808 if(1) {
1809 /* X.691, #10.9.4.1 */
1810 for(ebits = 0; ebits <= 16; ebits++)
1811 if(r <= 1 << ebits) break;
1812 if(ebits == 17
1813 || range->right.value >= 65536)
1814 ebits = -1;
1815 } else {
1816 /* X.691, #10.5.7.1 */
1817 for(ebits = 0; ebits <= 8; ebits++)
1818 if(r <= 1 << ebits) break;
1819 if(ebits == 9) {
1820 if(r <= 65536)
1821 ebits = 16;
1822 else
1823 ebits = -1;
1824 }
1825 }
1826 OUT("{ APC_CONSTRAINED%s,%s% d, % d, ",
1827 range->extensible
1828 ? " | APC_EXTENSIBLE" : "",
1829 range->extensible ? " " : "\t", rbits, ebits);
1830 } else {
1831 if(range->extensible) {
1832 OUT("{ APC_SEMI_CONSTRAINED | APC_EXTENSIBLE, "
1833 "-1, ");
1834 } else {
1835 OUT("{ APC_SEMI_CONSTRAINED,\t-1, -1, ");
1836 }
1837 }
1838 OUT("% " PRIdASN ", % " PRIdASN " }",
1839 range->left.value, range->right.value);
1840 } else {
1841 OUT("{ APC_UNCONSTRAINED,\t-1, -1, 0, 0 }");
1842 }
1843
1844 /*
1845 * Print some courtesy debug information.
1846 */
1847 if(range->left.type == ARE_VALUE
1848 || range->right.type == ARE_VALUE) {
1849 OUT("\t/* ");
1850 if(type) OUT("(%s", type);
1851 OUT("(");
1852 if(range->left.type == ARE_VALUE)
1853 OUT("%" PRIdASN, range->left.value);
1854 else
1855 OUT("MIN");
1856 OUT("..");
1857 if(range->right.type == ARE_VALUE)
1858 OUT("%" PRIdASN, range->right.value);
1859 else
1860 OUT("MAX");
1861 if(range->extensible) OUT(",...");
1862 if(type) OUT(")");
1863 OUT(") */");
1864 }
1865
1866 return 0;
1867}
1868
1869static int
1870emit_single_member_PER_constraints(arg_t *arg, asn1p_expr_t *expr) {
1871 asn1cnst_range_t *range;
1872 asn1p_expr_type_e etype;
1873
1874 etype = expr_get_type(arg, expr);
1875
1876 INDENT(+1);
1877
1878 /*
1879 * ENUMERATED and CHOICE are special.
1880 */
1881 if(etype == ASN_BASIC_ENUMERATED
1882 || etype == ASN_CONSTR_CHOICE) {
1883 asn1cnst_range_t tmprng;
1884 asn1p_expr_t *v;
1885 int extensible = 0;
1886 int eidx = -1;
1887
1888 expr = asn1f_find_terminal_type_ex(arg->asn, expr);
1889 assert(expr);
1890
1891 TQ_FOR(v, &(expr->members), next) {
1892 if(v->expr_type == A1TC_EXTENSIBLE) {
1893 extensible++;
1894 break;
1895 }
1896 eidx++;
1897 }
1898
1899 memset(&tmprng, 0, sizeof (tmprng));
1900 tmprng.extensible = extensible;
1901 if(eidx < 0) tmprng.empty_constraint = 1;
1902 tmprng.left.type = ARE_VALUE;
1903 tmprng.left.value = 0;
1904 tmprng.right.type = ARE_VALUE;
1905 tmprng.right.value = eidx < 0 ? 0 : eidx;
1906 if(emit_single_member_PER_constraint(arg, &tmprng, 0))
1907 return -1;
1908 } else {
1909 range = asn1constraint_compute_PER_range(etype,
1910 expr->combined_constraints, ACT_EL_RANGE,
1911 0, 0, 0);
1912 if(emit_single_member_PER_constraint(arg, range, 0))
1913 return -1;
1914 asn1constraint_range_free(range);
1915 }
1916 OUT(",\n");
1917
1918 range = asn1constraint_compute_PER_range(etype,
1919 expr->combined_constraints, ACT_CT_SIZE, 0, 0, 0);
1920 if(emit_single_member_PER_constraint(arg, range, "SIZE"))
1921 return -1;
1922 asn1constraint_range_free(range);
1923 OUT("\n");
1924
1925 INDENT(-1);
1926
1927 return 0;
1928}
1929
1930static int
1931emit_members_PER_constraints(arg_t *arg) {
1932 asn1p_expr_t *expr = arg->expr;
1933 asn1p_expr_t *v;
1934
1935 if(!(arg->flags & A1C_GEN_PER))
1936 return 0;
1937
1938 TQ_FOR(v, &(expr->members), next) {
1939 if(v->constraints
1940 || v->expr_type == ASN_BASIC_ENUMERATED
1941 || v->expr_type == ASN_CONSTR_CHOICE) {
1942 OUT("static asn_per_constraints_t "
1943 "asn_PER_memb_%s_constr_%d = {\n",
vlm0c6d3812006-03-21 03:40:38 +00001944 MKID(v), v->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00001945 if(emit_single_member_PER_constraints(arg, v))
1946 return -1;
1947 OUT("};\n");
1948 }
1949 }
1950
1951 return 0;
1952}
1953
1954static int
1955try_inline_default(arg_t *arg, asn1p_expr_t *expr, int out) {
1956 int save_target = arg->target->target;
1957 asn1p_expr_type_e etype = expr_get_type(arg, expr);
1958 int fits_long = 0;
1959
1960 switch(etype) {
1961 case ASN_BASIC_BOOLEAN:
1962 fits_long = 1;
1963 case ASN_BASIC_INTEGER:
1964 case ASN_BASIC_ENUMERATED:
1965 if(expr->marker.default_value == NULL
1966 || expr->marker.default_value->type != ATV_INTEGER)
1967 break;
1968 if(!fits_long)
1969 fits_long = asn1c_type_fits_long(arg, expr)!=FL_NOTFIT;
1970 if(fits_long && !expr->marker.default_value->value.v_integer)
1971 expr->marker.flags &= ~EM_INDIRECT;
1972 if(!out) return 1;
1973 REDIR(OT_STAT_DEFS);
vlm9ea7d412006-08-18 01:32:26 +00001974 OUT("static int asn_DFL_%d_set_%" PRIdASN "(int set_value, void **sptr) {\n",
vlm337167e2005-11-26 11:25:14 +00001975 expr->_type_unique_index,
1976 expr->marker.default_value->value.v_integer);
1977 INDENT(+1);
1978 OUT("%s *st = *sptr;\n", asn1c_type_name(arg, expr, TNF_CTYPE));
1979 OUT("\n");
1980 OUT("if(!st) {\n");
vlm9ea7d412006-08-18 01:32:26 +00001981 OUT("\tif(!set_value) return -1;\t/* Not a default value */\n");
vlm337167e2005-11-26 11:25:14 +00001982 OUT("\tst = (*sptr = CALLOC(1, sizeof(*st)));\n");
1983 OUT("\tif(!st) return -1;\n");
1984 OUT("}\n");
1985 OUT("\n");
vlm9ea7d412006-08-18 01:32:26 +00001986 OUT("if(set_value) {\n");
1987 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +00001988 OUT("/* Install default value %" PRIdASN " */\n",
1989 expr->marker.default_value->value.v_integer);
1990 if(fits_long) {
1991 OUT("*st = %" PRIdASN ";\n",
1992 expr->marker.default_value->value.v_integer);
1993 OUT("return 0;\n");
1994 } else {
1995 OUT("return asn_long2INTEGER(st, %" PRIdASN ");\n",
1996 expr->marker.default_value->value.v_integer);
1997 }
1998 INDENT(-1);
vlm9ea7d412006-08-18 01:32:26 +00001999 OUT("} else {\n");
2000 INDENT(+1);
2001 OUT("/* Test default value %" PRIdASN " */\n",
2002 expr->marker.default_value->value.v_integer);
2003 if(fits_long) {
2004 OUT("return (*st == %" PRIdASN ");\n",
2005 expr->marker.default_value->value.v_integer);
2006 } else {
2007 OUT("long value;\n");
2008 OUT("if(asn_INTEGER2long(st, &value))\n");
2009 OUT("\treturn -1;\n");
2010 OUT("return (value == %" PRIdASN ");\n",
2011 expr->marker.default_value->value.v_integer);
2012 }
2013 INDENT(-1);
2014 OUT("}\n");
2015 INDENT(-1);
vlm337167e2005-11-26 11:25:14 +00002016 OUT("}\n");
2017 REDIR(save_target);
2018 return 1;
2019 case ASN_BASIC_NULL:
2020 //expr->marker.flags &= ~EM_INDIRECT;
2021 return 0;
2022 default:
2023 break;
2024 }
2025 return 0;
2026}
2027
vlmb2839012004-08-20 13:37:01 +00002028static int
vlm4e554992004-08-25 02:03:12 +00002029emit_member_table(arg_t *arg, asn1p_expr_t *expr) {
vlmb2839012004-08-20 13:37:01 +00002030 int save_target;
2031 arg_t tmp_arg;
vlm060fe2a2004-09-10 09:37:12 +00002032 struct asn1p_type_tag_s outmost_tag_s;
2033 struct asn1p_type_tag_s *outmost_tag;
vlm80a48592005-02-25 12:10:27 +00002034 int complex_contents;
vlmb2839012004-08-20 13:37:01 +00002035 char *p;
2036
vlm060fe2a2004-09-10 09:37:12 +00002037 if(asn1f_fetch_outmost_tag(arg->asn,
vlm337167e2005-11-26 11:25:14 +00002038 expr->module, expr, &outmost_tag_s,
2039 AFT_IMAGINARY_ANY)) {
vlm060fe2a2004-09-10 09:37:12 +00002040 outmost_tag = 0;
2041 } else {
2042 outmost_tag = &outmost_tag_s;
2043 }
2044
vlmb2839012004-08-20 13:37:01 +00002045 OUT("{ ");
vlm060fe2a2004-09-10 09:37:12 +00002046
2047 if(outmost_tag && outmost_tag->tag_value == -1)
2048 OUT("ATF_OPEN_TYPE | ");
vlm0b567bf2005-03-04 22:18:20 +00002049 OUT("%s, ",
2050 (expr->marker.flags & EM_INDIRECT)?"ATF_POINTER":"ATF_NOFLAGS");
vlm6c4a8502005-08-18 13:38:19 +00002051 if((expr->marker.flags & EM_OMITABLE) == EM_OMITABLE) {
vlmb2839012004-08-20 13:37:01 +00002052 asn1p_expr_t *tv;
2053 int opts = 0;
vlm6c4a8502005-08-18 13:38:19 +00002054 for(tv = expr;
2055 tv && (tv->marker.flags & EM_OMITABLE) == EM_OMITABLE;
vlmb2839012004-08-20 13:37:01 +00002056 tv = TQ_NEXT(tv, next), opts++) {
2057 if(tv->expr_type == A1TC_EXTENSIBLE)
2058 opts--;
2059 }
2060 OUT("%d, ", opts);
2061 } else {
2062 OUT("0, ");
2063 }
vlm39ba4c42004-09-22 16:06:28 +00002064 if(expr->_anonymous_type) {
2065 assert(arg->expr->expr_type == ASN_CONSTR_SET_OF
2066 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF);
2067 OUT("0,\n");
2068 } else {
vlm766cf1e2005-03-04 08:48:53 +00002069 OUT("offsetof(struct ");
vlm2e774282005-08-14 15:03:31 +00002070 out_name_chain(arg, ONC_avoid_keywords);
vlm766cf1e2005-03-04 08:48:53 +00002071 OUT(", ");
vlmb2839012004-08-20 13:37:01 +00002072 if(arg->expr->expr_type == ASN_CONSTR_CHOICE
2073 && (!UNNAMED_UNIONS)) OUT("choice.");
vlm0c6d3812006-03-21 03:40:38 +00002074 OUT("%s),\n", MKID_safe(expr));
vlmb2839012004-08-20 13:37:01 +00002075 }
2076 INDENT(+1);
2077 if(C99_MODE) OUT(".tag = ");
vlm060fe2a2004-09-10 09:37:12 +00002078 if(outmost_tag) {
2079 if(outmost_tag->tag_value == -1)
2080 OUT("-1 /* Ambiguous tag (ANY?) */");
2081 else
2082 _print_tag(arg, outmost_tag);
vlma8a86cc2004-09-10 06:07:18 +00002083 } else {
vlm060fe2a2004-09-10 09:37:12 +00002084 OUT("-1 /* Ambiguous tag (CHOICE?) */");
vlma8a86cc2004-09-10 06:07:18 +00002085 }
vlm060fe2a2004-09-10 09:37:12 +00002086
vlmb2839012004-08-20 13:37:01 +00002087 OUT(",\n");
2088 if(C99_MODE) OUT(".tag_mode = ");
2089 if(expr->tag.tag_class) {
2090 if(expr->tag.tag_mode == TM_IMPLICIT)
2091 OUT("-1,\t/* IMPLICIT tag at current level */\n");
2092 else
2093 OUT("+1,\t/* EXPLICIT tag at current level */\n");
2094 } else {
2095 OUT("0,\n");
2096 }
vlm80a48592005-02-25 12:10:27 +00002097
2098 complex_contents =
2099 (expr->expr_type & ASN_CONSTR_MASK)
2100 || expr->expr_type == ASN_BASIC_ENUMERATED
vlmc89422d2005-03-03 21:28:12 +00002101 || (0 /* -- prohibited by X.693:8.3.4 */
2102 && expr->expr_type == ASN_BASIC_INTEGER
vlm80a48592005-02-25 12:10:27 +00002103 && expr_elements_count(arg, expr));
vlmb2839012004-08-20 13:37:01 +00002104 if(C99_MODE) OUT(".type = ");
vlme0fea712005-08-29 10:31:14 +00002105 OUT("&asn_DEF_");
vlm766cf1e2005-03-04 08:48:53 +00002106 if(complex_contents) {
vlm0c6d3812006-03-21 03:40:38 +00002107 OUT("%s", MKID(expr));
vlm766cf1e2005-03-04 08:48:53 +00002108 if(!(arg->flags & A1C_ALL_DEFS_GLOBAL))
2109 OUT("_%d", expr->_type_unique_index);
vlmdae7f9d2004-08-22 03:25:24 +00002110 } else {
vlm766cf1e2005-03-04 08:48:53 +00002111 OUT("%s", asn1c_type_name(arg, expr, TNF_SAFE));
vlmdae7f9d2004-08-22 03:25:24 +00002112 }
vlm766cf1e2005-03-04 08:48:53 +00002113 OUT(",\n");
vlmb2839012004-08-20 13:37:01 +00002114 if(C99_MODE) OUT(".memb_constraints = ");
2115 if(expr->constraints) {
vlm86f5ed22004-09-26 13:11:31 +00002116 if(arg->flags & A1C_NO_CONSTRAINTS) {
2117 OUT("0,\t/* No check because of -fno-constraints */\n");
2118 } else {
vlm0c6d3812006-03-21 03:40:38 +00002119 char *id = MKID(expr);
vlm86f5ed22004-09-26 13:11:31 +00002120 if(expr->_anonymous_type
vlmbf3c5112005-02-14 20:41:29 +00002121 && !strcmp(expr->Identifier, "Member"))
vlm86f5ed22004-09-26 13:11:31 +00002122 id = asn1c_type_name(arg, expr, TNF_SAFE);
vlm337167e2005-11-26 11:25:14 +00002123 OUT("memb_%s_constraint_%d,\n", id,
vlm766cf1e2005-03-04 08:48:53 +00002124 arg->expr->_type_unique_index);
vlm86f5ed22004-09-26 13:11:31 +00002125 }
vlmb2839012004-08-20 13:37:01 +00002126 } else {
vlm95a476e2005-01-17 12:16:58 +00002127 OUT("0,\t/* Defer constraints checking to the member type */\n");
vlmb2839012004-08-20 13:37:01 +00002128 }
vlm337167e2005-11-26 11:25:14 +00002129 if(C99_MODE) OUT(".per_constraints = ");
2130 if(arg->flags & A1C_GEN_PER) {
2131 if(expr->constraints
2132 || expr->expr_type == ASN_BASIC_ENUMERATED
2133 || expr->expr_type == ASN_CONSTR_CHOICE) {
2134 OUT("&asn_PER_memb_%s_constr_%d,\n",
vlm0c6d3812006-03-21 03:40:38 +00002135 MKID(expr),
vlm337167e2005-11-26 11:25:14 +00002136 expr->_type_unique_index);
2137 } else {
2138 OUT("0,\t/* No PER visible constraints */\n");
2139 }
vlmbf3c5112005-02-14 20:41:29 +00002140 } else {
vlm337167e2005-11-26 11:25:14 +00002141 OUT("0,\t/* PER is not compiled, use -gen-PER */\n");
2142 }
2143 if(C99_MODE) OUT(".default_value = ");
2144 if(try_inline_default(arg, expr, 0)) {
2145 OUT("asn_DFL_%d_set_%" PRIdASN
2146 ",\t/* DEFAULT %" PRIdASN " */\n",
2147 expr->_type_unique_index,
2148 expr->marker.default_value->value.v_integer,
2149 expr->marker.default_value->value.v_integer);
2150 } else {
2151 OUT("0,\n");
2152 }
2153 if(C99_MODE) OUT(".name = ");
2154 if(expr->_anonymous_type && !strcmp(expr->Identifier, "Member")) {
2155 OUT("\"\"\n");
2156 } else {
2157 OUT("\"%s\"\n", expr->Identifier);
vlmbf3c5112005-02-14 20:41:29 +00002158 }
vlmb2839012004-08-20 13:37:01 +00002159 OUT("},\n");
2160 INDENT(-1);
2161
vlm86f5ed22004-09-26 13:11:31 +00002162 if(!expr->constraints || (arg->flags & A1C_NO_CONSTRAINTS))
vlmb2839012004-08-20 13:37:01 +00002163 return 0;
2164
2165 save_target = arg->target->target;
2166 REDIR(OT_CODE);
2167
vlmbf3c5112005-02-14 20:41:29 +00002168 if(expr->_anonymous_type && !strcmp(expr->Identifier, "Member"))
vlmb2839012004-08-20 13:37:01 +00002169 p = asn1c_type_name(arg, expr, TNF_SAFE);
vlm39ba4c42004-09-22 16:06:28 +00002170 else
vlm0c6d3812006-03-21 03:40:38 +00002171 p = MKID(expr);
vlmb2839012004-08-20 13:37:01 +00002172 OUT("static int\n");
vlm337167e2005-11-26 11:25:14 +00002173 OUT("memb_%s_constraint_%d(asn_TYPE_descriptor_t *td, const void *sptr,\n", p, arg->expr->_type_unique_index);
vlmb2839012004-08-20 13:37:01 +00002174 INDENT(+1);
vlmaf68ef52006-07-13 11:19:01 +00002175 OUT("\t\tasn_app_constraint_failed_f *ctfailcb, void *app_key) {\n");
vlmb2839012004-08-20 13:37:01 +00002176 tmp_arg = *arg;
2177 tmp_arg.expr = expr;
2178 if(asn1c_emit_constraint_checking_code(&tmp_arg) == 1) {
vlm86f5ed22004-09-26 13:11:31 +00002179 OUT("return td->check_constraints"
vlmaf68ef52006-07-13 11:19:01 +00002180 "(td, sptr, ctfailcb, app_key);\n");
vlmb2839012004-08-20 13:37:01 +00002181 }
2182 INDENT(-1);
2183 OUT("}\n");
2184 OUT("\n");
2185
2186 REDIR(save_target);
2187
2188 return 0;
2189}
vlm4e554992004-08-25 02:03:12 +00002190
vlm9de248e2004-10-20 15:50:55 +00002191/*
2192 * Generate "asn_DEF_XXX" type definition.
2193 */
vlm4e554992004-08-25 02:03:12 +00002194static int
vlm86f5ed22004-09-26 13:11:31 +00002195emit_type_DEF(arg_t *arg, asn1p_expr_t *expr, enum tvm_compat tv_mode, int tags_count, int all_tags_count, int elements_count, enum etd_spec spec) {
vlm766cf1e2005-03-04 08:48:53 +00002196 int using_type_name = 0;
vlm0c6d3812006-03-21 03:40:38 +00002197 char *p = MKID(expr);
vlm337167e2005-11-26 11:25:14 +00002198
2199 if((arg->flags & A1C_GEN_PER)
2200 && (expr->constraints
2201 || expr->expr_type == ASN_BASIC_ENUMERATED
2202 || expr->expr_type == ASN_CONSTR_CHOICE)
2203 ) {
2204 OUT("static asn_per_constraints_t asn_PER_%s_constr_%d = {\n",
2205 p, expr->_type_unique_index);
2206 if(emit_single_member_PER_constraints(arg, expr))
2207 return -1;
2208 OUT("};\n");
2209 }
vlm4e554992004-08-25 02:03:12 +00002210
vlm12c8f692004-09-06 08:07:29 +00002211 if(HIDE_INNER_DEFS)
2212 OUT("static /* Use -fall-defs-global to expose */\n");
vlm337167e2005-11-26 11:25:14 +00002213 OUT("asn_TYPE_descriptor_t asn_DEF_%s", p);
vlm766cf1e2005-03-04 08:48:53 +00002214 if(HIDE_INNER_DEFS) OUT("_%d", expr->_type_unique_index);
2215 OUT(" = {\n");
vlm72425de2004-09-13 08:31:01 +00002216 INDENT(+1);
vlm337167e2005-11-26 11:25:14 +00002217
2218 if(expr->_anonymous_type) {
2219 p = ASN_EXPR_TYPE2STR(expr->expr_type);
2220 OUT("\"%s\",\n", p?p:"");
vlm0c6d3812006-03-21 03:40:38 +00002221 OUT("\"%s\",\n",
2222 p ? asn1c_make_identifier(AMI_CHECK_RESERVED,
2223 0, p, 0) : "");
vlm337167e2005-11-26 11:25:14 +00002224 } else {
2225 OUT("\"%s\",\n", expr->Identifier);
2226 OUT("\"%s\",\n", expr->Identifier);
2227 }
vlm4e554992004-08-25 02:03:12 +00002228
2229 if(expr->expr_type & ASN_CONSTR_MASK) {
vlm766cf1e2005-03-04 08:48:53 +00002230 using_type_name = 1;
vlm4e554992004-08-25 02:03:12 +00002231 p = asn1c_type_name(arg, arg->expr, TNF_SAFE);
vlm337167e2005-11-26 11:25:14 +00002232 } else {
vlm0c6d3812006-03-21 03:40:38 +00002233 p = MKID(expr);
vlm4e554992004-08-25 02:03:12 +00002234 }
2235
vlm766cf1e2005-03-04 08:48:53 +00002236#define FUNCREF(foo) do { \
2237 OUT("%s", p); \
2238 if(HIDE_INNER_DEFS && !using_type_name) \
2239 OUT("_%d", expr->_type_unique_index); \
2240 OUT("_" #foo ",\n"); \
2241} while(0)
2242
2243 FUNCREF(free);
2244 FUNCREF(print);
2245 FUNCREF(constraint);
2246 FUNCREF(decode_ber);
2247 FUNCREF(encode_der);
2248 FUNCREF(decode_xer);
2249 FUNCREF(encode_xer);
vlm9ea7d412006-08-18 01:32:26 +00002250 if(arg->flags & A1C_GEN_PER) {
vlm337167e2005-11-26 11:25:14 +00002251 FUNCREF(decode_uper);
vlm9ea7d412006-08-18 01:32:26 +00002252 FUNCREF(encode_uper);
2253 } else {
2254 OUT("0, 0,\t/* No PER support, "
2255 "use \"-gen-PER\" to enable */\n");
2256 }
vlm4e554992004-08-25 02:03:12 +00002257
vlm4e554992004-08-25 02:03:12 +00002258 if(expr->expr_type == ASN_CONSTR_CHOICE) {
2259 OUT("CHOICE_outmost_tag,\n");
2260 } else {
2261 OUT("0,\t/* Use generic outmost tag fetcher */\n");
2262 }
2263
vlm0c6d3812006-03-21 03:40:38 +00002264 p = MKID(expr);
vlm4e554992004-08-25 02:03:12 +00002265 if(tags_count) {
vlm337167e2005-11-26 11:25:14 +00002266 OUT("asn_DEF_%s_tags_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +00002267 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002268 OUT("sizeof(asn_DEF_%s_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002269 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002270 OUT("\t/sizeof(asn_DEF_%s_tags_%d[0])",
vlm766cf1e2005-03-04 08:48:53 +00002271 p, expr->_type_unique_index);
vlm72425de2004-09-13 08:31:01 +00002272 if(tv_mode == _TVM_SUBSET
2273 && tags_count != all_tags_count)
2274 OUT(" - %d", all_tags_count - tags_count);
2275 OUT(", /* %d */\n", tags_count);
vlm4e554992004-08-25 02:03:12 +00002276 } else {
vlm72425de2004-09-13 08:31:01 +00002277 OUT("0,\t/* No effective tags (pointer) */\n");
2278 OUT("0,\t/* No effective tags (count) */\n");
2279 }
2280
2281 if(all_tags_count && tv_mode == _TVM_DIFFERENT) {
vlm337167e2005-11-26 11:25:14 +00002282 OUT("asn_DEF_%s_all_tags_%d,\n",
vlm766cf1e2005-03-04 08:48:53 +00002283 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002284 OUT("sizeof(asn_DEF_%s_all_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002285 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002286 OUT("\t/sizeof(asn_DEF_%s_all_tags_%d[0]), /* %d */\n",
vlm766cf1e2005-03-04 08:48:53 +00002287 p, expr->_type_unique_index, all_tags_count);
vlm72425de2004-09-13 08:31:01 +00002288 } else if(all_tags_count) {
vlm337167e2005-11-26 11:25:14 +00002289 OUT("asn_DEF_%s_tags_%d,\t/* Same as above */\n",
vlm766cf1e2005-03-04 08:48:53 +00002290 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002291 OUT("sizeof(asn_DEF_%s_tags_%d)\n",
vlm766cf1e2005-03-04 08:48:53 +00002292 p, expr->_type_unique_index);
vlm337167e2005-11-26 11:25:14 +00002293 OUT("\t/sizeof(asn_DEF_%s_tags_%d[0]), /* %d */\n",
vlm766cf1e2005-03-04 08:48:53 +00002294 p, expr->_type_unique_index, all_tags_count);
vlm72425de2004-09-13 08:31:01 +00002295 } else {
2296 OUT("0,\t/* No tags (pointer) */\n");
2297 OUT("0,\t/* No tags (count) */\n");
vlm4e554992004-08-25 02:03:12 +00002298 }
2299
vlm337167e2005-11-26 11:25:14 +00002300 if(arg->flags & A1C_GEN_PER) {
2301 if(expr->constraints
2302 || expr->expr_type == ASN_BASIC_ENUMERATED
2303 || expr->expr_type == ASN_CONSTR_CHOICE) {
2304 OUT("&asn_PER_%s_constr_%d,\n",
2305 p, expr->_type_unique_index);
2306 } else {
2307 OUT("0,\t/* No PER visible constraints */\n");
2308 }
2309 } else {
2310 OUT("0,\t/* No PER visible constraints */\n");
2311 }
2312
vlm4e554992004-08-25 02:03:12 +00002313 if(elements_count) {
vlm766cf1e2005-03-04 08:48:53 +00002314 OUT("asn_MBR_%s_%d,\n", p, expr->_type_unique_index);
vlm4e554992004-08-25 02:03:12 +00002315 if(expr->expr_type == ASN_CONSTR_SEQUENCE_OF
2316 || expr->expr_type == ASN_CONSTR_SET_OF) {
2317 OUT("%d,\t/* Single element */\n",
2318 elements_count);
2319 assert(elements_count == 1);
2320 } else {
2321 OUT("%d,\t/* Elements count */\n",
2322 elements_count);
2323 }
2324 } else {
vlm4e554992004-08-25 02:03:12 +00002325 if(expr_elements_count(arg, expr))
2326 OUT("0, 0,\t/* Defined elsewhere */\n");
2327 else
2328 OUT("0, 0,\t/* No members */\n");
2329 }
2330
2331 switch(spec) {
2332 case ETD_NO_SPECIFICS:
2333 OUT("0\t/* No specifics */\n");
2334 break;
2335 case ETD_HAS_SPECIFICS:
vlm337167e2005-11-26 11:25:14 +00002336 OUT("&asn_SPC_%s_specs_%d\t/* Additional specs */\n",
vlm766cf1e2005-03-04 08:48:53 +00002337 p, expr->_type_unique_index);
vlm4e554992004-08-25 02:03:12 +00002338 }
vlm72425de2004-09-13 08:31:01 +00002339 INDENT(-1);
vlm4e554992004-08-25 02:03:12 +00002340 OUT("};\n");
2341 OUT("\n");
vlme2bb4432004-08-26 06:20:34 +00002342
2343 return 0;
vlm4e554992004-08-25 02:03:12 +00002344}
vlmddd5a7d2004-09-10 09:18:20 +00002345
vlm39ba4c42004-09-22 16:06:28 +00002346static int
2347expr_as_xmlvaluelist(arg_t *arg, asn1p_expr_t *expr) {
vlm6d44a542005-11-08 03:06:16 +00002348 /*
2349 * X.680, 25.5, Table 5
2350 */
vlm337167e2005-11-26 11:25:14 +00002351 switch(expr_get_type(arg, expr)) {
vlm39ba4c42004-09-22 16:06:28 +00002352 case ASN_BASIC_BOOLEAN:
2353 case ASN_BASIC_ENUMERATED:
2354 case ASN_BASIC_NULL:
2355 return 1;
vlm6d44a542005-11-08 03:06:16 +00002356 case ASN_CONSTR_CHOICE:
2357 return 2;
vlm39ba4c42004-09-22 16:06:28 +00002358 default:
2359 return 0;
2360 }
2361}
vlmaf841972005-01-28 12:18:50 +00002362
2363static int
vlm2e774282005-08-14 15:03:31 +00002364out_name_chain(arg_t *arg, enum onc_flags onc_flags) {
vlmaf841972005-01-28 12:18:50 +00002365 asn1p_expr_t *expr = arg->expr;
2366 char *id;
2367
2368 assert(expr->Identifier);
2369
vlm2e774282005-08-14 15:03:31 +00002370 if((arg->flags & A1C_COMPOUND_NAMES
2371 || onc_flags & ONC_force_compound_name)
vlm766cf1e2005-03-04 08:48:53 +00002372 && ((expr->expr_type & ASN_CONSTR_MASK)
2373 || expr->expr_type == ASN_BASIC_ENUMERATED
vlm96853d82005-08-13 23:51:47 +00002374 || ((expr->expr_type == ASN_BASIC_INTEGER
2375 || expr->expr_type == ASN_BASIC_BIT_STRING)
vlm766cf1e2005-03-04 08:48:53 +00002376 && expr_elements_count(arg, expr))
2377 )
vlmaf841972005-01-28 12:18:50 +00002378 && expr->parent_expr
2379 && expr->parent_expr->Identifier) {
2380 arg_t tmparg = *arg;
2381
2382 tmparg.expr = expr->parent_expr;
vlm766cf1e2005-03-04 08:48:53 +00002383 if(0) tmparg.flags &= ~A1C_COMPOUND_NAMES;
2384
vlm2e774282005-08-14 15:03:31 +00002385 out_name_chain(&tmparg, onc_flags);
vlmaf841972005-01-28 12:18:50 +00002386
vlm92d3cad2005-03-05 00:08:41 +00002387 OUT("__"); /* a separator between id components */
vlm766cf1e2005-03-04 08:48:53 +00002388
vlmaf841972005-01-28 12:18:50 +00002389 /* Fall through */
2390 }
2391
vlm2e774282005-08-14 15:03:31 +00002392 if(onc_flags & ONC_avoid_keywords)
vlm0c6d3812006-03-21 03:40:38 +00002393 id = MKID_safe(expr);
vlmaf841972005-01-28 12:18:50 +00002394 else
vlm0c6d3812006-03-21 03:40:38 +00002395 id = MKID(expr);
vlmaf841972005-01-28 12:18:50 +00002396 OUT("%s", id);
2397
2398 return 0;
2399}
vlm6c4a8502005-08-18 13:38:19 +00002400
2401static int
2402emit_include_dependencies(arg_t *arg) {
2403 asn1p_expr_t *expr = arg->expr;
2404 asn1p_expr_t *memb;
2405
2406 /* Avoid recursive definitions. */
2407 TQ_FOR(memb, &(expr->members), next) {
2408 expr_break_recursion(arg, memb);
2409 }
2410
2411 TQ_FOR(memb, &(expr->members), next) {
2412
2413 if(memb->marker.flags & (EM_INDIRECT | EM_UNRECURSE)) {
2414 if(terminal_structable(arg, memb)) {
2415 int saved_target = arg->target->target;
2416 REDIR(OT_FWD_DECLS);
2417 OUT("%s;\n",
2418 asn1c_type_name(arg, memb, TNF_RSAFE));
2419 REDIR(saved_target);
2420 }
2421 }
2422
2423 if((!(memb->expr_type & ASN_CONSTR_MASK)
2424 && memb->expr_type > ASN_CONSTR_MASK)
2425 || memb->meta_type == AMT_TYPEREF) {
2426 if(memb->marker.flags & EM_UNRECURSE) {
2427 GEN_POSTINCLUDE(asn1c_type_name(arg,
2428 memb, TNF_INCLUDE));
2429 } else {
2430 GEN_INCLUDE(asn1c_type_name(arg,
2431 memb, TNF_INCLUDE));
2432 }
2433 }
2434 }
2435
2436 return 0;
2437}
2438
2439/*
2440 * Check if it is better to make this type indirectly accessed via
2441 * a pointer.
2442 * This may be the case for the following recursive definition:
2443 * Type ::= CHOICE { member Type };
2444 */
2445static int
2446expr_break_recursion(arg_t *arg, asn1p_expr_t *expr) {
vlm6c4a8502005-08-18 13:38:19 +00002447 int ret;
2448
2449 if(expr->marker.flags & EM_UNRECURSE)
2450 return 1; /* Already broken */
2451
vlm6c4a8502005-08-18 13:38:19 +00002452 /* -findirect-choice compiles members of CHOICE as indirect pointers */
2453 if((arg->flags & A1C_INDIRECT_CHOICE)
2454 && arg->expr->expr_type == ASN_CONSTR_CHOICE
vlm337167e2005-11-26 11:25:14 +00002455 && (expr_get_type(arg, expr) & ASN_CONSTR_MASK)
vlm6c4a8502005-08-18 13:38:19 +00002456 ) {
2457 /* Break cross-reference */
2458 expr->marker.flags |= EM_INDIRECT | EM_UNRECURSE;
2459 return 1;
2460 }
2461
2462 if((expr->marker.flags & EM_INDIRECT)
2463 || arg->expr->expr_type == ASN_CONSTR_SET_OF
2464 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF) {
2465 if(terminal_structable(arg, expr)) {
2466 expr->marker.flags |= EM_UNRECURSE;
2467
2468 if(arg->expr->expr_type == ASN_CONSTR_SET_OF
2469 || arg->expr->expr_type == ASN_CONSTR_SEQUENCE_OF) {
2470 /* Don't put EM_INDIRECT even if recursion */
2471 return 1;
2472 }
2473
2474 /* Fall through */
2475 }
2476 }
2477
2478 /* Look for recursive back-references */
2479 ret = expr_defined_recursively(arg, expr);
2480 switch(ret) {
2481 case 2: /* Explicitly break the recursion */
2482 case 1: /* Use safer typing */
2483 expr->marker.flags |= EM_INDIRECT;
2484 expr->marker.flags |= EM_UNRECURSE;
2485 break;
2486 }
2487
2488 return 0;
2489}
2490
2491/*
2492 * Check if the type can be represented using simple `struct TYPE`.
2493 */
2494static asn1p_expr_t *
2495terminal_structable(arg_t *arg, asn1p_expr_t *expr) {
2496 asn1p_expr_t *terminal = asn1f_find_terminal_type_ex(arg->asn, expr);
2497 if(terminal
2498 && !terminal->parent_expr
2499 && (terminal->expr_type & ASN_CONSTR_MASK)) {
2500 return terminal;
2501 }
2502 return 0;
2503}
2504
2505static int
2506asn1c_recurse(arg_t *arg, asn1p_expr_t *expr, int (*callback)(arg_t *arg, void *key), void *key) {
2507 arg_t tmp = *arg;
2508 int maxret = 0;
2509 int ret;
2510
2511 if(expr->_mark) return 0;
2512 expr->_mark |= TM_RECURSION;
2513
2514 /* Invoke callback for every type going into recursion */
2515 tmp.expr = expr;
2516 maxret = callback(&tmp, key);
2517 if(maxret <= 1) {
2518 /*
2519 * Recursively invoke myself and the callbacks.
2520 */
2521 TQ_FOR(tmp.expr, &(expr->members), next) {
2522 ret = asn1c_recurse(&tmp, tmp.expr, callback, key);
2523 if(ret > maxret)
2524 maxret = ret;
2525 if(maxret > 1) break;
2526 }
2527 }
2528
2529 expr->_mark &= ~TM_RECURSION;
2530 return maxret;
2531}
2532
2533static int
2534check_is_refer_to(arg_t *arg, void *key) {
2535 asn1p_expr_t *terminal = terminal_structable(arg, arg->expr);
2536 if(terminal == key) {
2537 if(arg->expr->marker.flags & EM_INDIRECT)
2538 return 1; /* This is almost safe indirection */
2539 return 2;
2540 } else if(terminal) {
2541 /* This might be N-step circular loop. Dive into it. */
2542 return asn1c_recurse(arg, terminal, check_is_refer_to, key);
2543 }
2544 return 0;
2545}
2546
2547/*
2548 * Check if the possibly inner expression defined recursively.
2549 */
2550static int
2551expr_defined_recursively(arg_t *arg, asn1p_expr_t *expr) {
2552 asn1p_expr_t *terminal;
2553 asn1p_expr_t *topmost;
2554
2555 /* If expression is top-level, there's no way it can be recursive. */
2556 if(expr->parent_expr == 0) return 0;
2557 if(expr->expr_type != A1TC_REFERENCE)
2558 return 0; /* Basic types are never recursive */
2559
2560 terminal = terminal_structable(arg, expr);
2561 if(!terminal) return 0; /* Terminal cannot be indirected */
2562
2563 /* Search for the parent container for the given expression */
2564 topmost = expr;
2565 while(topmost->parent_expr)
2566 topmost = topmost->parent_expr;
2567
2568 /* Look inside the terminal type if it mentions the parent expression */
2569 return asn1c_recurse(arg, terminal, check_is_refer_to, topmost);
2570}
vlm337167e2005-11-26 11:25:14 +00002571
2572struct canonical_map_element {
2573 int eidx;
2574 asn1p_expr_t *expr;
2575};
2576static int compar_cameo(const void *ap, const void *bp);
2577static arg_t *cameo_arg;
2578static int *
2579compute_canonical_members_order(arg_t *arg, int el_count) {
2580 struct canonical_map_element *cmap;
2581 int *rmap;
2582 asn1p_expr_t *v;
2583 int eidx = 0;
2584 int ext_start = -1;
2585 int nextmax = -1;
2586 int already_sorted = 1;
2587
2588 cmap = calloc(el_count, sizeof *cmap);
2589 assert(cmap);
2590
2591 TQ_FOR(v, &(arg->expr->members), next) {
2592 if(v->expr_type != A1TC_EXTENSIBLE) {
2593 cmap[eidx].eidx = eidx;
2594 cmap[eidx].expr = v;
2595 eidx++;
2596 } else if(ext_start == -1)
2597 ext_start = eidx;
2598 }
2599
2600 cameo_arg = arg;
2601 if(ext_start == -1) {
2602 /* Sort the whole thing */
2603 qsort(cmap, el_count, sizeof(*cmap), compar_cameo);
2604 } else {
2605 /* Sort root and extensions independently */
2606 qsort(cmap, ext_start, sizeof(*cmap), compar_cameo);
2607 qsort(cmap + ext_start, el_count - ext_start,
2608 sizeof(*cmap), compar_cameo);
2609 }
2610
2611 /* move data back to a simpler map */
2612 rmap = calloc(el_count, sizeof *rmap);
2613 assert(rmap);
2614 for(eidx = 0; eidx < el_count; eidx++) {
2615 rmap[eidx] = cmap[eidx].eidx;
2616 if(rmap[eidx] <= nextmax)
2617 already_sorted = 0;
2618 else
2619 nextmax = rmap[eidx];
2620 }
2621 free(cmap);
2622
2623 if(already_sorted) { free(rmap); rmap = 0; }
2624 return rmap;
2625}
2626static int compar_cameo(const void *ap, const void *bp) {
2627 const struct canonical_map_element *a = (const void *)ap;
2628 const struct canonical_map_element *b = (const void *)bp;
2629 struct asn1p_type_tag_s atag, btag;
2630 arg_t *arg = cameo_arg;
2631
2632 if(asn1f_fetch_outmost_tag(arg->asn, a->expr->module, a->expr,
2633 &atag, AFT_IMAGINARY_ANY | AFT_CANON_CHOICE))
2634 return 1;
2635
2636 if(asn1f_fetch_outmost_tag(arg->asn, b->expr->module, b->expr,
2637 &btag, AFT_IMAGINARY_ANY | AFT_CANON_CHOICE))
2638 return -1;
2639
2640 if(atag.tag_class < btag.tag_class)
2641 return -1;
2642 if(atag.tag_class > btag.tag_class)
2643 return 1;
2644 if(atag.tag_value < btag.tag_value)
2645 return -1;
2646 if(atag.tag_value > btag.tag_value)
2647 return 1;
2648 return 0;
2649
2650}