blob: e578ccbb299a38791e2be5efb4f1b22f09cf0122 [file] [log] [blame]
vlmfa67ddc2004-06-03 03:38:44 +00001/*-
2 * Copyright (c) 2003, 2004 Lev Walkin <vlm@lionet.info>. All rights reserved.
3 * Redistribution and modifications are permitted subject to BSD license.
4 */
vlm39ba4c42004-09-22 16:06:28 +00005#include <asn_internal.h>
vlmfa67ddc2004-06-03 03:38:44 +00006#include <constr_SET_OF.h>
7#include <asn_SET_OF.h>
8
9/*
10 * Number of bytes left for this structure.
11 * (ctx->left) indicates the number of bytes _transferred_ for the structure.
12 * (size) contains the number of bytes in the buffer passed.
13 */
vlmc5190612004-08-18 04:53:32 +000014#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
vlmfa67ddc2004-06-03 03:38:44 +000015
16/*
17 * If the subprocessor function returns with an indication that it wants
18 * more data, it may well be a fatal decoding problem, because the
19 * size is constrained by the <TLV>'s L, even if the buffer size allows
20 * reading more data.
21 * For example, consider the buffer containing the following TLVs:
22 * <T:5><L:1><V> <T:6>...
23 * The TLV length clearly indicates that one byte is expected in V, but
24 * if the V processor returns with "want more data" even if the buffer
25 * contains way more data than the V processor have seen.
26 */
vlmef1b4c02004-09-23 22:06:26 +000027#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
vlmfa67ddc2004-06-03 03:38:44 +000028
29/*
30 * This macro "eats" the part of the buffer which is definitely "consumed",
31 * i.e. was correctly converted into local representation or rightfully skipped.
32 */
vlmef1b4c02004-09-23 22:06:26 +000033#undef ADVANCE
vlmfa67ddc2004-06-03 03:38:44 +000034#define ADVANCE(num_bytes) do { \
35 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +000036 ptr = ((const char *)ptr) + num;\
vlmfa67ddc2004-06-03 03:38:44 +000037 size -= num; \
38 if(ctx->left >= 0) \
39 ctx->left -= num; \
40 consumed_myself += num; \
41 } while(0)
42
43/*
44 * Switch to the next phase of parsing.
45 */
vlmef1b4c02004-09-23 22:06:26 +000046#undef NEXT_PHASE
47#undef PHASE_OUT
vlmfa67ddc2004-06-03 03:38:44 +000048#define NEXT_PHASE(ctx) do { \
49 ctx->phase++; \
50 ctx->step = 0; \
51 } while(0)
52#define PHASE_OUT(ctx) do { ctx->phase = 10; } while(0)
53
54/*
55 * Return a standardized complex structure.
56 */
vlmef1b4c02004-09-23 22:06:26 +000057#undef RETURN
vlmfa67ddc2004-06-03 03:38:44 +000058#define RETURN(_code) do { \
59 rval.code = _code; \
60 rval.consumed = consumed_myself;\
61 return rval; \
62 } while(0)
63
64/*
65 * The decoder of the SET OF type.
66 */
vlm9de248e2004-10-20 15:50:55 +000067asn_dec_rval_t
vlmef6355b2004-09-29 13:26:15 +000068SET_OF_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
vlmb02dcc62005-03-10 18:52:02 +000069 void **struct_ptr, const void *ptr, size_t size, int tag_mode) {
vlmfa67ddc2004-06-03 03:38:44 +000070 /*
71 * Bring closer parts of structure description.
72 */
vlmef6355b2004-09-29 13:26:15 +000073 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
vlm5a6fc652005-08-16 17:00:21 +000074 asn_TYPE_member_t *elm = td->elements; /* Single one */
vlmfa67ddc2004-06-03 03:38:44 +000075
76 /*
77 * Parts of the structure being constructed.
78 */
79 void *st = *struct_ptr; /* Target structure. */
vlmef6355b2004-09-29 13:26:15 +000080 asn_struct_ctx_t *ctx; /* Decoder context */
vlmfa67ddc2004-06-03 03:38:44 +000081
82 ber_tlv_tag_t tlv_tag; /* T from TLV */
vlm9de248e2004-10-20 15:50:55 +000083 asn_dec_rval_t rval; /* Return code from subparsers */
vlmfa67ddc2004-06-03 03:38:44 +000084
85 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
86
vlme413c122004-08-20 13:23:42 +000087 ASN_DEBUG("Decoding %s as SET OF", td->name);
vlmfa67ddc2004-06-03 03:38:44 +000088
89 /*
90 * Create the target structure if it is not present already.
91 */
92 if(st == 0) {
93 st = *struct_ptr = CALLOC(1, specs->struct_size);
94 if(st == 0) {
95 RETURN(RC_FAIL);
96 }
97 }
98
99 /*
100 * Restore parsing context.
101 */
vlmef6355b2004-09-29 13:26:15 +0000102 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000103
104 /*
105 * Start to parse where left previously
106 */
107 switch(ctx->phase) {
108 case 0:
109 /*
110 * PHASE 0.
111 * Check that the set of tags associated with given structure
112 * perfectly fits our expectations.
113 */
114
vlmef6355b2004-09-29 13:26:15 +0000115 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
vlm6678cb12004-09-26 13:10:40 +0000116 tag_mode, 1, &ctx->left, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000117 if(rval.code != RC_OK) {
118 ASN_DEBUG("%s tagging check failed: %d",
vlme413c122004-08-20 13:23:42 +0000119 td->name, rval.code);
vlm2ebb08c2004-10-05 06:36:44 +0000120 return rval;
vlmfa67ddc2004-06-03 03:38:44 +0000121 }
122
123 if(ctx->left >= 0)
124 ctx->left += rval.consumed; /* ?Substracted below! */
125 ADVANCE(rval.consumed);
126
127 ASN_DEBUG("Structure consumes %ld bytes, "
128 "buffer %ld", (long)ctx->left, (long)size);
129
130 NEXT_PHASE(ctx);
131 /* Fall through */
132 case 1:
133 /*
134 * PHASE 1.
135 * From the place where we've left it previously,
136 * try to decode the next item.
137 */
138 for(;; ctx->step = 0) {
139 ssize_t tag_len; /* Length of TLV's T */
140
141 if(ctx->step & 1)
142 goto microphase2;
143
144 /*
145 * MICROPHASE 1: Synchronize decoding.
146 */
147
148 if(ctx->left == 0) {
vlme413c122004-08-20 13:23:42 +0000149 ASN_DEBUG("End of SET OF %s", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000150 /*
151 * No more things to decode.
152 * Exit out of here.
153 */
154 PHASE_OUT(ctx);
155 RETURN(RC_OK);
156 }
157
158 /*
159 * Fetch the T from TLV.
160 */
161 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
162 switch(tag_len) {
163 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
164 /* Fall through */
165 case -1: RETURN(RC_FAIL);
166 }
167
vlmb02dcc62005-03-10 18:52:02 +0000168 if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000169 if(LEFT < 2) {
170 if(SIZE_VIOLATION)
171 RETURN(RC_FAIL);
172 else
173 RETURN(RC_WMORE);
vlmb02dcc62005-03-10 18:52:02 +0000174 } else if(((const uint8_t *)ptr)[1] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000175 /*
176 * Found the terminator of the
177 * indefinite length structure.
178 */
179 break;
180 }
181 }
182
183 /* Outmost tag may be unknown and cannot be fetched/compared */
vlm5a6fc652005-08-16 17:00:21 +0000184 if(elm->tag != (ber_tlv_tag_t)-1) {
185 if(BER_TAGS_EQUAL(tlv_tag, elm->tag)) {
vlmfa67ddc2004-06-03 03:38:44 +0000186 /*
187 * The new list member of expected type has arrived.
188 */
189 } else {
190 ASN_DEBUG("Unexpected tag %s fixed SET OF %s",
vlme413c122004-08-20 13:23:42 +0000191 ber_tlv_tag_string(tlv_tag), td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000192 ASN_DEBUG("%s SET OF has tag %s",
vlm5a6fc652005-08-16 17:00:21 +0000193 td->name, ber_tlv_tag_string(elm->tag));
vlmfa67ddc2004-06-03 03:38:44 +0000194 RETURN(RC_FAIL);
195 }
196 }
197
198 /*
199 * MICROPHASE 2: Invoke the member-specific decoder.
200 */
201 ctx->step |= 1; /* Confirm entering next microphase */
202 microphase2:
203
204 /*
205 * Invoke the member fetch routine according to member's type
206 */
vlm5a6fc652005-08-16 17:00:21 +0000207 rval = elm->type->ber_decoder(opt_codec_ctx,
208 elm->type, &ctx->ptr, ptr, LEFT, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000209 ASN_DEBUG("In %s SET OF %s code %d consumed %d",
vlm5a6fc652005-08-16 17:00:21 +0000210 td->name, elm->type->name,
vlmfa67ddc2004-06-03 03:38:44 +0000211 rval.code, (int)rval.consumed);
212 switch(rval.code) {
213 case RC_OK:
214 {
vlm41dee122005-07-02 08:19:17 +0000215 asn_anonymous_set_ *list = _A_SET_FROM_VOID(st);
vlmfa67ddc2004-06-03 03:38:44 +0000216 if(ASN_SET_ADD(list, ctx->ptr) != 0)
217 RETURN(RC_FAIL);
218 else
219 ctx->ptr = 0;
220 }
221 break;
222 case RC_WMORE: /* More data expected */
223 if(!SIZE_VIOLATION) {
224 ADVANCE(rval.consumed);
225 RETURN(RC_WMORE);
226 }
227 /* Fall through */
228 case RC_FAIL: /* Fatal error */
229 RETURN(RC_FAIL);
230 } /* switch(rval) */
231
232 ADVANCE(rval.consumed);
233 } /* for(all list members) */
234
235 NEXT_PHASE(ctx);
236 case 2:
237 /*
238 * Read in all "end of content" TLVs.
239 */
240 while(ctx->left < 0) {
241 if(LEFT < 2) {
vlmb02dcc62005-03-10 18:52:02 +0000242 if(LEFT > 0 && ((const char *)ptr)[0] != 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000243 /* Unexpected tag */
244 RETURN(RC_FAIL);
245 } else {
246 RETURN(RC_WMORE);
247 }
248 }
vlmb02dcc62005-03-10 18:52:02 +0000249 if(((const char *)ptr)[0] == 0
250 && ((const char *)ptr)[1] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000251 ADVANCE(2);
252 ctx->left++;
253 } else {
254 RETURN(RC_FAIL);
255 }
256 }
257
258 PHASE_OUT(ctx);
259 }
260
261 RETURN(RC_OK);
262}
263
264/*
265 * Internally visible buffer holding a single encoded element.
266 */
267struct _el_buffer {
268 uint8_t *buf;
269 size_t length;
270 size_t size;
271};
272/* Append bytes to the above structure */
273static int _el_addbytes(const void *buffer, size_t size, void *el_buf_ptr) {
vlmda674682004-08-11 09:07:36 +0000274 struct _el_buffer *el_buf = (struct _el_buffer *)el_buf_ptr;
vlmfa67ddc2004-06-03 03:38:44 +0000275
276 if(el_buf->length + size > el_buf->size)
277 return -1;
278
279 memcpy(el_buf->buf + el_buf->length, buffer, size);
280
281 el_buf->length += size;
282 return 0;
283}
284static int _el_buf_cmp(const void *ap, const void *bp) {
vlmda674682004-08-11 09:07:36 +0000285 const struct _el_buffer *a = (const struct _el_buffer *)ap;
286 const struct _el_buffer *b = (const struct _el_buffer *)bp;
vlmfa67ddc2004-06-03 03:38:44 +0000287 int ret;
288 size_t common_len;
289
290 if(a->length < b->length)
291 common_len = a->length;
292 else
293 common_len = b->length;
294
295 ret = memcmp(a->buf, b->buf, common_len);
296 if(ret == 0) {
297 if(a->length < b->length)
298 ret = -1;
299 else if(a->length > b->length)
300 ret = 1;
301 }
302
303 return ret;
304}
305
306/*
307 * The DER encoder of the SET OF type.
308 */
vlm39ba4c42004-09-22 16:06:28 +0000309asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000310SET_OF_encode_der(asn_TYPE_descriptor_t *td, void *ptr,
vlmfa67ddc2004-06-03 03:38:44 +0000311 int tag_mode, ber_tlv_tag_t tag,
312 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000313 asn_TYPE_member_t *elm = td->elements;
314 asn_TYPE_descriptor_t *elm_type = elm->type;
vlmfa67ddc2004-06-03 03:38:44 +0000315 der_type_encoder_f *der_encoder = elm_type->der_encoder;
vlm41dee122005-07-02 08:19:17 +0000316 asn_anonymous_set_ *list = _A_SET_FROM_VOID(ptr);
vlmfa67ddc2004-06-03 03:38:44 +0000317 size_t computed_size = 0;
318 ssize_t encoding_size = 0;
319 struct _el_buffer *encoded_els;
vlm5a6fc652005-08-16 17:00:21 +0000320 ssize_t eels_count = 0;
vlmfa67ddc2004-06-03 03:38:44 +0000321 size_t max_encoded_len = 1;
vlm39ba4c42004-09-22 16:06:28 +0000322 asn_enc_rval_t erval;
vlmfa67ddc2004-06-03 03:38:44 +0000323 int ret;
324 int edx;
325
vlme413c122004-08-20 13:23:42 +0000326 ASN_DEBUG("Estimating size for SET OF %s", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000327
328 /*
329 * Gather the length of the underlying members sequence.
330 */
331 for(edx = 0; edx < list->count; edx++) {
332 void *memb_ptr = list->array[edx];
vlm5a6fc652005-08-16 17:00:21 +0000333 if(!memb_ptr) continue;
vlmfa67ddc2004-06-03 03:38:44 +0000334 erval = der_encoder(elm_type, memb_ptr, 0, elm->tag, 0, 0);
335 if(erval.encoded == -1)
336 return erval;
337 computed_size += erval.encoded;
338
339 /* Compute maximum encoding's size */
vlmb42843a2004-06-05 08:17:50 +0000340 if(max_encoded_len < (size_t)erval.encoded)
vlmfa67ddc2004-06-03 03:38:44 +0000341 max_encoded_len = erval.encoded;
342 }
343
344 /*
345 * Encode the TLV for the sequence itself.
346 */
vlm6678cb12004-09-26 13:10:40 +0000347 encoding_size = der_write_tags(td, computed_size, tag_mode, 1, tag,
vlmfa67ddc2004-06-03 03:38:44 +0000348 cb, app_key);
349 if(encoding_size == -1) {
350 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000351 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000352 erval.structure_ptr = ptr;
353 return erval;
354 }
355 computed_size += encoding_size;
356
357 if(!cb) {
358 erval.encoded = computed_size;
359 return erval;
360 }
361
362 /*
363 * DER mandates dynamic sorting of the SET OF elements
364 * according to their encodings. Build an array of the
365 * encoded elements.
366 */
vlm6678cb12004-09-26 13:10:40 +0000367 encoded_els = (struct _el_buffer *)MALLOC(
368 list->count * sizeof(encoded_els[0]));
vlmfa67ddc2004-06-03 03:38:44 +0000369 if(encoded_els == NULL) {
370 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000371 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000372 erval.structure_ptr = ptr;
373 return erval;
374 }
375
vlme413c122004-08-20 13:23:42 +0000376 ASN_DEBUG("Encoding members of %s SET OF", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000377
378 /*
379 * Encode all members.
380 */
381 for(edx = 0; edx < list->count; edx++) {
382 void *memb_ptr = list->array[edx];
vlm5a6fc652005-08-16 17:00:21 +0000383 struct _el_buffer *encoded_el = &encoded_els[eels_count];
384
385 if(!memb_ptr) continue;
vlmfa67ddc2004-06-03 03:38:44 +0000386
387 /*
388 * Prepare space for encoding.
389 */
vlmda674682004-08-11 09:07:36 +0000390 encoded_el->buf = (uint8_t *)MALLOC(max_encoded_len);
vlmfa67ddc2004-06-03 03:38:44 +0000391 if(encoded_el->buf) {
392 encoded_el->length = 0;
393 encoded_el->size = max_encoded_len;
394 } else {
395 for(edx--; edx >= 0; edx--)
396 FREEMEM(encoded_els[edx].buf);
397 FREEMEM(encoded_els);
398 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000399 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000400 erval.structure_ptr = ptr;
401 return erval;
402 }
403
404 /*
405 * Encode the member into the prepared space.
406 */
407 erval = der_encoder(elm_type, memb_ptr, 0, elm->tag,
408 _el_addbytes, encoded_el);
409 if(erval.encoded == -1) {
410 for(; edx >= 0; edx--)
411 FREEMEM(encoded_els[edx].buf);
412 FREEMEM(encoded_els);
413 return erval;
414 }
415 encoding_size += erval.encoded;
vlm5a6fc652005-08-16 17:00:21 +0000416 eels_count++;
vlmfa67ddc2004-06-03 03:38:44 +0000417 }
418
419 /*
420 * Sort the encoded elements according to their encoding.
421 */
vlm5a6fc652005-08-16 17:00:21 +0000422 qsort(encoded_els, eels_count, sizeof(encoded_els[0]), _el_buf_cmp);
vlmfa67ddc2004-06-03 03:38:44 +0000423
424 /*
425 * Report encoded elements to the application.
426 * Dispose of temporary sorted members table.
427 */
428 ret = 0;
vlm5a6fc652005-08-16 17:00:21 +0000429 for(edx = 0; edx < eels_count; edx++) {
vlmfa67ddc2004-06-03 03:38:44 +0000430 struct _el_buffer *encoded_el = &encoded_els[edx];
431 /* Report encoded chunks to the application */
432 if(ret == 0
vlm6678cb12004-09-26 13:10:40 +0000433 && cb(encoded_el->buf, encoded_el->length, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000434 ret = -1;
435 FREEMEM(encoded_el->buf);
436 }
437 FREEMEM(encoded_els);
438
vlmb42843a2004-06-05 08:17:50 +0000439 if(ret || computed_size != (size_t)encoding_size) {
vlmfa67ddc2004-06-03 03:38:44 +0000440 /*
441 * Standard callback failed, or
442 * encoded size is not equal to the computed size.
443 */
444 erval.encoded = -1;
vlme413c122004-08-20 13:23:42 +0000445 erval.failed_type = td;
vlmfa67ddc2004-06-03 03:38:44 +0000446 erval.structure_ptr = ptr;
447 } else {
448 erval.encoded = computed_size;
449 }
450
451 return erval;
452}
453
vlm5f4f4a82005-02-14 20:15:40 +0000454#undef XER_ADVANCE
455#define XER_ADVANCE(num_bytes) do { \
456 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +0000457 buf_ptr = ((const char *)buf_ptr) + num;\
vlm5f4f4a82005-02-14 20:15:40 +0000458 size -= num; \
459 consumed_myself += num; \
460 } while(0)
461
462/*
463 * Decode the XER (XML) data.
464 */
465asn_dec_rval_t
466SET_OF_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
467 void **struct_ptr, const char *opt_mname,
vlmb02dcc62005-03-10 18:52:02 +0000468 const void *buf_ptr, size_t size) {
vlm5f4f4a82005-02-14 20:15:40 +0000469 /*
470 * Bring closer parts of structure description.
471 */
472 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
473 asn_TYPE_member_t *element = td->elements;
vlmaa930cb2005-02-24 22:37:07 +0000474 const char *elm_tag = ((*element->name)
475 ? element->name : element->type->xml_tag);
vlm5f4f4a82005-02-14 20:15:40 +0000476 const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
477
478 /*
479 * ... and parts of the structure being constructed.
480 */
481 void *st = *struct_ptr; /* Target structure. */
482 asn_struct_ctx_t *ctx; /* Decoder context */
483
484 asn_dec_rval_t rval; /* Return value from a decoder */
485 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
vlm5f4f4a82005-02-14 20:15:40 +0000486
487 /*
488 * Create the target structure if it is not present already.
489 */
490 if(st == 0) {
491 st = *struct_ptr = CALLOC(1, specs->struct_size);
492 if(st == 0) RETURN(RC_FAIL);
493 }
494
495 /*
496 * Restore parsing context.
497 */
498 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
499
500 /*
501 * Phases of XER/XML processing:
502 * Phase 0: Check that the opening tag matches our expectations.
503 * Phase 1: Processing body and reacting on closing tag.
504 * Phase 2: Processing inner type.
505 */
vlmcb7222f2005-02-18 16:10:40 +0000506 for(; ctx->phase <= 2;) {
vlm5f4f4a82005-02-14 20:15:40 +0000507 pxer_chunk_type_e ch_type; /* XER chunk type */
508 ssize_t ch_size; /* Chunk size */
509 xer_check_tag_e tcv; /* Tag check value */
510
511 /*
512 * Go inside the inner member of a set.
513 */
514 if(ctx->phase == 2) {
515 asn_dec_rval_t tmprval;
516
517 /* Invoke the inner type decoder, m.b. multiple times */
518 tmprval = element->type->xer_decoder(opt_codec_ctx,
519 element->type, &ctx->ptr, elm_tag,
520 buf_ptr, size);
521 if(tmprval.code == RC_OK) {
vlm41dee122005-07-02 08:19:17 +0000522 asn_anonymous_set_ *list = _A_SET_FROM_VOID(st);
vlm5f4f4a82005-02-14 20:15:40 +0000523 if(ASN_SET_ADD(list, ctx->ptr) != 0)
524 RETURN(RC_FAIL);
525 ctx->ptr = 0;
526 XER_ADVANCE(tmprval.consumed);
527 } else {
528 XER_ADVANCE(tmprval.consumed);
529 RETURN(tmprval.code);
530 }
531 ctx->phase = 1; /* Back to body processing */
vlm5f4f4a82005-02-14 20:15:40 +0000532 ASN_DEBUG("XER/SET OF phase => %d", ctx->phase);
533 /* Fall through */
534 }
535
536 /*
537 * Get the next part of the XML stream.
538 */
vlmc70f8f32005-02-18 18:06:36 +0000539 ch_size = xer_next_token(&ctx->context,
540 buf_ptr, size, &ch_type);
vlm5f4f4a82005-02-14 20:15:40 +0000541 switch(ch_size) {
542 case -1: RETURN(RC_FAIL);
vlmcb7222f2005-02-18 16:10:40 +0000543 case 0: RETURN(RC_WMORE);
vlm5f4f4a82005-02-14 20:15:40 +0000544 default:
545 switch(ch_type) {
546 case PXER_COMMENT: /* Got XML comment */
547 case PXER_TEXT: /* Ignore free-standing text */
548 XER_ADVANCE(ch_size); /* Skip silently */
549 continue;
550 case PXER_TAG:
551 break; /* Check the rest down there */
552 }
553 }
554
555 tcv = xer_check_tag(buf_ptr, ch_size, xml_tag);
556 ASN_DEBUG("XER/SET OF: tcv = %d, ph=%d", tcv, ctx->phase);
557 switch(tcv) {
558 case XCT_CLOSING:
559 if(ctx->phase == 0) break;
560 ctx->phase = 0;
561 /* Fall through */
562 case XCT_BOTH:
563 if(ctx->phase == 0) {
564 /* No more things to decode */
565 XER_ADVANCE(ch_size);
566 ctx->phase = 3; /* Phase out */
567 RETURN(RC_OK);
568 }
569 /* Fall through */
570 case XCT_OPENING:
571 if(ctx->phase == 0) {
572 XER_ADVANCE(ch_size);
573 ctx->phase = 1; /* Processing body phase */
574 continue;
575 }
576 /* Fall through */
vlm957da5b2005-02-18 14:23:48 +0000577 case XCT_UNKNOWN_OP:
578 case XCT_UNKNOWN_BO:
vlm5f4f4a82005-02-14 20:15:40 +0000579
580 ASN_DEBUG("XER/SET OF: tcv=%d, ph=%d", tcv, ctx->phase);
vlmaa930cb2005-02-24 22:37:07 +0000581 if(ctx->phase == 1) {
vlm5f4f4a82005-02-14 20:15:40 +0000582 /*
vlmaa930cb2005-02-24 22:37:07 +0000583 * Process a single possible member.
vlm5f4f4a82005-02-14 20:15:40 +0000584 */
585 ctx->phase = 2;
586 continue;
vlm5f4f4a82005-02-14 20:15:40 +0000587 }
588 /* Fall through */
589 default:
590 break;
591 }
592
593 ASN_DEBUG("Unexpected XML tag in SET OF");
594 break;
595 }
596
597 ctx->phase = 3; /* "Phase out" on hard failure */
598 RETURN(RC_FAIL);
599}
600
601
602
vlma3296662004-10-03 09:12:07 +0000603typedef struct xer_tmp_enc_s {
604 void *buffer;
605 size_t offset;
606 size_t size;
607} xer_tmp_enc_t;
608static int
609SET_OF_encode_xer_callback(const void *buffer, size_t size, void *key) {
610 xer_tmp_enc_t *t = (xer_tmp_enc_t *)key;
611 if(t->offset + size >= t->size) {
612 size_t newsize = (t->size << 2) + size;
613 void *p = REALLOC(t->buffer, newsize);
614 if(!p) return -1;
615 t->buffer = p;
616 t->size = newsize;
617 }
618 memcpy((char *)t->buffer + t->offset, buffer, size);
619 t->offset += size;
620 return 0;
621}
622static int
623SET_OF_xer_order(const void *aptr, const void *bptr) {
624 const xer_tmp_enc_t *a = (const xer_tmp_enc_t *)aptr;
625 const xer_tmp_enc_t *b = (const xer_tmp_enc_t *)bptr;
626 size_t minlen = a->offset;
627 int ret;
628 if(b->offset < minlen) minlen = b->offset;
629 /* Well-formed UTF-8 has this nice lexicographical property... */
630 ret = memcmp(a->buffer, b->buffer, minlen);
631 if(ret != 0) return ret;
632 if(a->offset == b->offset)
633 return 0;
634 if(a->offset == minlen)
635 return -1;
636 return 1;
637}
638
639
vlm39ba4c42004-09-22 16:06:28 +0000640asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000641SET_OF_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
vlm39ba4c42004-09-22 16:06:28 +0000642 int ilevel, enum xer_encoder_flags_e flags,
643 asn_app_consume_bytes_f *cb, void *app_key) {
644 asn_enc_rval_t er;
vlm80a48592005-02-25 12:10:27 +0000645 asn_SET_OF_specifics_t *specs = (asn_SET_OF_specifics_t *)td->specifics;
vlm5a6fc652005-08-16 17:00:21 +0000646 asn_TYPE_member_t *elm = td->elements;
vlm41dee122005-07-02 08:19:17 +0000647 asn_anonymous_set_ *list = _A_SET_FROM_VOID(sptr);
vlm39ba4c42004-09-22 16:06:28 +0000648 const char *mname = specs->as_XMLValueList
vlm5a6fc652005-08-16 17:00:21 +0000649 ? 0 : ((*elm->name) ? elm->name : elm->type->xml_tag);
vlm39ba4c42004-09-22 16:06:28 +0000650 size_t mlen = mname ? strlen(mname) : 0;
651 int xcan = (flags & XER_F_CANONICAL);
vlma3296662004-10-03 09:12:07 +0000652 xer_tmp_enc_t *encs = 0;
653 size_t encs_count = 0;
654 void *original_app_key = app_key;
655 asn_app_consume_bytes_f *original_cb = cb;
vlm39ba4c42004-09-22 16:06:28 +0000656 int i;
657
658 if(!sptr) _ASN_ENCODE_FAILED;
659
vlma3296662004-10-03 09:12:07 +0000660 if(xcan) {
661 encs = (xer_tmp_enc_t *)MALLOC(list->count * sizeof(encs[0]));
662 if(!encs) _ASN_ENCODE_FAILED;
663 cb = SET_OF_encode_xer_callback;
664 }
665
vlm39ba4c42004-09-22 16:06:28 +0000666 er.encoded = 0;
667
vlm39ba4c42004-09-22 16:06:28 +0000668 for(i = 0; i < list->count; i++) {
669 asn_enc_rval_t tmper;
670
671 void *memb_ptr = list->array[i];
672 if(!memb_ptr) continue;
673
vlma3296662004-10-03 09:12:07 +0000674 if(encs) {
675 memset(&encs[encs_count], 0, sizeof(encs[0]));
676 app_key = &encs[encs_count];
677 encs_count++;
678 }
679
vlm39ba4c42004-09-22 16:06:28 +0000680 if(mname) {
681 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel);
682 _ASN_CALLBACK3("<", 1, mname, mlen, ">", 1);
683 }
684
vlm80a48592005-02-25 12:10:27 +0000685 if(!xcan && specs->as_XMLValueList)
686 _i_ASN_TEXT_INDENT(1, ilevel + 1);
vlm5a6fc652005-08-16 17:00:21 +0000687 tmper = elm->type->xer_encoder(elm->type, memb_ptr,
vlm39ba4c42004-09-22 16:06:28 +0000688 ilevel + 1, flags, cb, app_key);
vlma3296662004-10-03 09:12:07 +0000689 if(tmper.encoded == -1) {
690 td = tmper.failed_type;
691 sptr = tmper.structure_ptr;
692 goto cb_failed;
693 }
vlmaa930cb2005-02-24 22:37:07 +0000694 if(tmper.encoded == 0 && specs->as_XMLValueList) {
vlm5a6fc652005-08-16 17:00:21 +0000695 const char *name = (*elm->name)
696 ? elm->name : elm->type->xml_tag;
vlmaa930cb2005-02-24 22:37:07 +0000697 size_t len = strlen(name);
vlmaa930cb2005-02-24 22:37:07 +0000698 _ASN_CALLBACK3("<", 1, name, len, "/>", 2);
699 }
vlm39ba4c42004-09-22 16:06:28 +0000700
701 if(mname) {
702 _ASN_CALLBACK3("</", 2, mname, mlen, ">", 1);
703 er.encoded += 5;
704 }
705
706 er.encoded += (2 * mlen) + tmper.encoded;
707 }
708
709 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel - 1);
710
vlma3296662004-10-03 09:12:07 +0000711 if(encs) {
712 xer_tmp_enc_t *enc = encs;
713 xer_tmp_enc_t *end = encs + encs_count;
714 ssize_t control_size = 0;
715
716 cb = original_cb;
717 app_key = original_app_key;
718 qsort(encs, encs_count, sizeof(encs[0]), SET_OF_xer_order);
719
720 for(; enc < end; enc++) {
721 _ASN_CALLBACK(enc->buffer, enc->offset);
722 FREEMEM(enc->buffer);
723 enc->buffer = 0;
724 control_size += enc->offset;
725 }
726 assert(control_size == er.encoded);
727 }
728
729 goto cleanup;
730cb_failed:
731 er.encoded = -1;
732 er.failed_type = td;
733 er.structure_ptr = sptr;
734cleanup:
735 if(encs) {
736 while(encs_count-- > 0) {
737 if(encs[encs_count].buffer)
738 FREEMEM(encs[encs_count].buffer);
739 }
740 free(encs);
741 }
vlm39ba4c42004-09-22 16:06:28 +0000742 return er;
743}
744
vlmfa67ddc2004-06-03 03:38:44 +0000745int
vlmef6355b2004-09-29 13:26:15 +0000746SET_OF_print(asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
vlmfa67ddc2004-06-03 03:38:44 +0000747 asn_app_consume_bytes_f *cb, void *app_key) {
vlm5a6fc652005-08-16 17:00:21 +0000748 asn_TYPE_member_t *elm = td->elements;
vlm41dee122005-07-02 08:19:17 +0000749 const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
vlmfa67ddc2004-06-03 03:38:44 +0000750 int ret;
751 int i;
752
vlm6678cb12004-09-26 13:10:40 +0000753 if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000754
755 /* Dump preamble */
vlm6678cb12004-09-26 13:10:40 +0000756 if(cb(td->name, strlen(td->name), app_key) < 0
757 || cb(" ::= {", 6, app_key) < 0)
vlmfa67ddc2004-06-03 03:38:44 +0000758 return -1;
759
760 for(i = 0; i < list->count; i++) {
761 const void *memb_ptr = list->array[i];
762 if(!memb_ptr) continue;
763
vlm6678cb12004-09-26 13:10:40 +0000764 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000765
vlm5a6fc652005-08-16 17:00:21 +0000766 ret = elm->type->print_struct(elm->type, memb_ptr,
vlm6678cb12004-09-26 13:10:40 +0000767 ilevel + 1, cb, app_key);
vlmfa67ddc2004-06-03 03:38:44 +0000768 if(ret) return ret;
769 }
770
vlm6678cb12004-09-26 13:10:40 +0000771 ilevel--;
772 _i_INDENT(1);
vlmfa67ddc2004-06-03 03:38:44 +0000773
vlm6678cb12004-09-26 13:10:40 +0000774 return (cb("}", 1, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000775}
776
777void
vlmef6355b2004-09-29 13:26:15 +0000778SET_OF_free(asn_TYPE_descriptor_t *td, void *ptr, int contents_only) {
vlmfa67ddc2004-06-03 03:38:44 +0000779 if(td && ptr) {
vlm5a6fc652005-08-16 17:00:21 +0000780 asn_TYPE_member_t *elm = td->elements;
vlm41dee122005-07-02 08:19:17 +0000781 asn_anonymous_set_ *list = _A_SET_FROM_VOID(ptr);
vlmfa67ddc2004-06-03 03:38:44 +0000782 int i;
783
784 /*
785 * Could not use set_of_empty() because of (*free)
786 * incompatibility.
787 */
788 for(i = 0; i < list->count; i++) {
789 void *memb_ptr = list->array[i];
790 if(memb_ptr)
vlm5a6fc652005-08-16 17:00:21 +0000791 elm->type->free_struct(elm->type, memb_ptr, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000792 }
vlm7ebd67c2004-07-15 10:51:26 +0000793 list->count = 0; /* No meaningful elements left */
794
795 asn_set_empty(list); /* Remove (list->array) */
vlmfa67ddc2004-06-03 03:38:44 +0000796
797 if(!contents_only) {
798 FREEMEM(ptr);
799 }
800 }
801}
802
803int
vlmef6355b2004-09-29 13:26:15 +0000804SET_OF_constraint(asn_TYPE_descriptor_t *td, const void *sptr,
vlmfa67ddc2004-06-03 03:38:44 +0000805 asn_app_consume_bytes_f *app_errlog, void *app_key) {
vlm5a6fc652005-08-16 17:00:21 +0000806 asn_TYPE_member_t *elm = td->elements;
vlme413c122004-08-20 13:23:42 +0000807 asn_constr_check_f *constr;
vlm41dee122005-07-02 08:19:17 +0000808 const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
vlmfa67ddc2004-06-03 03:38:44 +0000809 int i;
810
811 if(!sptr) {
vlme3f0f282004-08-11 09:44:13 +0000812 _ASN_ERRLOG(app_errlog, app_key,
vlm758530a2004-08-22 13:47:59 +0000813 "%s: value not given (%s:%d)",
814 td->name, __FILE__, __LINE__);
vlmfa67ddc2004-06-03 03:38:44 +0000815 return -1;
816 }
817
vlm5a6fc652005-08-16 17:00:21 +0000818 constr = elm->memb_constraints;
819 if(!constr) constr = elm->type->check_constraints;
vlme413c122004-08-20 13:23:42 +0000820
821 /*
822 * Iterate over the members of an array.
823 * Validate each in turn, until one fails.
824 */
vlmfa67ddc2004-06-03 03:38:44 +0000825 for(i = 0; i < list->count; i++) {
826 const void *memb_ptr = list->array[i];
vlme413c122004-08-20 13:23:42 +0000827 int ret;
828
vlmfa67ddc2004-06-03 03:38:44 +0000829 if(!memb_ptr) continue;
vlme413c122004-08-20 13:23:42 +0000830
vlm5a6fc652005-08-16 17:00:21 +0000831 ret = constr(elm->type, memb_ptr, app_errlog, app_key);
vlme413c122004-08-20 13:23:42 +0000832 if(ret) return ret;
vlmfa67ddc2004-06-03 03:38:44 +0000833 }
834
vlme413c122004-08-20 13:23:42 +0000835 /*
836 * Cannot inherit it eralier:
837 * need to make sure we get the updated version.
838 */
vlm5a6fc652005-08-16 17:00:21 +0000839 if(!elm->memb_constraints)
840 elm->memb_constraints = elm->type->check_constraints;
vlme413c122004-08-20 13:23:42 +0000841
vlmfa67ddc2004-06-03 03:38:44 +0000842 return 0;
843}