blob: 4f0d9922521d8087bc1d60fc119bddba5189473a [file] [log] [blame]
vlm18dd82c2006-08-18 01:34:18 +00001/*
vlm2fca3ee2007-06-26 10:14:11 +00002 * Copyright (c) 2003, 2004, 2005, 2006, 2007 Lev Walkin <vlm@lionet.info>.
vlm390a9022005-02-14 17:21:22 +00003 * All rights reserved.
vlmfa67ddc2004-06-03 03:38:44 +00004 * Redistribution and modifications are permitted subject to BSD license.
5 */
vlm39ba4c42004-09-22 16:06:28 +00006#include <asn_internal.h>
vlmfa67ddc2004-06-03 03:38:44 +00007#include <constr_CHOICE.h>
vlm0de7baa2007-06-29 01:45:03 +00008#include <per_opentype.h>
vlmfa67ddc2004-06-03 03:38:44 +00009
10/*
11 * Number of bytes left for this structure.
12 * (ctx->left) indicates the number of bytes _transferred_ for the structure.
13 * (size) contains the number of bytes in the buffer passed.
14 */
vlmc5190612004-08-18 04:53:32 +000015#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
vlmfa67ddc2004-06-03 03:38:44 +000016
17/*
18 * If the subprocessor function returns with an indication that it wants
19 * more data, it may well be a fatal decoding problem, because the
20 * size is constrained by the <TLV>'s L, even if the buffer size allows
21 * reading more data.
22 * For example, consider the buffer containing the following TLVs:
23 * <T:5><L:1><V> <T:6>...
24 * The TLV length clearly indicates that one byte is expected in V, but
25 * if the V processor returns with "want more data" even if the buffer
26 * contains way more data than the V processor have seen.
27 */
vlmb42843a2004-06-05 08:17:50 +000028#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
vlmfa67ddc2004-06-03 03:38:44 +000029
30/*
31 * This macro "eats" the part of the buffer which is definitely "consumed",
32 * i.e. was correctly converted into local representation or rightfully skipped.
33 */
vlmef1b4c02004-09-23 22:06:26 +000034#undef ADVANCE
vlmfa67ddc2004-06-03 03:38:44 +000035#define ADVANCE(num_bytes) do { \
36 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +000037 ptr = ((const char *)ptr) + num;\
vlmfa67ddc2004-06-03 03:38:44 +000038 size -= num; \
39 if(ctx->left >= 0) \
40 ctx->left -= num; \
41 consumed_myself += num; \
42 } while(0)
43
44/*
45 * Switch to the next phase of parsing.
46 */
vlmef1b4c02004-09-23 22:06:26 +000047#undef NEXT_PHASE
vlmfa67ddc2004-06-03 03:38:44 +000048#define NEXT_PHASE(ctx) do { \
49 ctx->phase++; \
50 ctx->step = 0; \
51 } while(0)
52
53/*
54 * Return a standardized complex structure.
55 */
vlmef1b4c02004-09-23 22:06:26 +000056#undef RETURN
vlmfa67ddc2004-06-03 03:38:44 +000057#define RETURN(_code) do { \
58 rval.code = _code; \
59 rval.consumed = consumed_myself;\
60 return rval; \
61 } while(0)
62
63/*
64 * See the definitions.
65 */
vlme55716a2004-08-11 09:10:59 +000066static int _fetch_present_idx(const void *struct_ptr, int off, int size);
67static void _set_present_idx(void *sptr, int offset, int size, int pres);
vlmfa67ddc2004-06-03 03:38:44 +000068
69/*
70 * Tags are canonically sorted in the tag to member table.
71 */
72static int
73_search4tag(const void *ap, const void *bp) {
vlmef6355b2004-09-29 13:26:15 +000074 const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap;
75 const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp;
vlmda674682004-08-11 09:07:36 +000076
vlmfa67ddc2004-06-03 03:38:44 +000077 int a_class = BER_TAG_CLASS(a->el_tag);
78 int b_class = BER_TAG_CLASS(b->el_tag);
79
80 if(a_class == b_class) {
81 ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag);
82 ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag);
83
84 if(a_value == b_value)
85 return 0;
86 else if(a_value < b_value)
87 return -1;
88 else
89 return 1;
90 } else if(a_class < b_class) {
91 return -1;
92 } else {
93 return 1;
94 }
95}
96
97/*
98 * The decoder of the CHOICE type.
99 */
vlm9de248e2004-10-20 15:50:55 +0000100asn_dec_rval_t
vlmef6355b2004-09-29 13:26:15 +0000101CHOICE_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
vlmb02dcc62005-03-10 18:52:02 +0000102 void **struct_ptr, const void *ptr, size_t size, int tag_mode) {
vlmfa67ddc2004-06-03 03:38:44 +0000103 /*
104 * Bring closer parts of structure description.
105 */
vlmef6355b2004-09-29 13:26:15 +0000106 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
107 asn_TYPE_member_t *elements = td->elements;
vlmfa67ddc2004-06-03 03:38:44 +0000108
109 /*
110 * Parts of the structure being constructed.
111 */
112 void *st = *struct_ptr; /* Target structure. */
vlmef6355b2004-09-29 13:26:15 +0000113 asn_struct_ctx_t *ctx; /* Decoder context */
vlmfa67ddc2004-06-03 03:38:44 +0000114
115 ber_tlv_tag_t tlv_tag; /* T from TLV */
116 ssize_t tag_len; /* Length of TLV's T */
vlm9de248e2004-10-20 15:50:55 +0000117 asn_dec_rval_t rval; /* Return code from subparsers */
vlmfa67ddc2004-06-03 03:38:44 +0000118
119 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
120
vlme413c122004-08-20 13:23:42 +0000121 ASN_DEBUG("Decoding %s as CHOICE", td->name);
vlm337167e2005-11-26 11:25:14 +0000122
vlmfa67ddc2004-06-03 03:38:44 +0000123 /*
124 * Create the target structure if it is not present already.
125 */
126 if(st == 0) {
127 st = *struct_ptr = CALLOC(1, specs->struct_size);
128 if(st == 0) {
129 RETURN(RC_FAIL);
130 }
131 }
132
133 /*
134 * Restore parsing context.
135 */
vlmef6355b2004-09-29 13:26:15 +0000136 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000137
138 /*
139 * Start to parse where left previously
140 */
141 switch(ctx->phase) {
142 case 0:
143 /*
144 * PHASE 0.
145 * Check that the set of tags associated with given structure
146 * perfectly fits our expectations.
147 */
148
vlme413c122004-08-20 13:23:42 +0000149 if(tag_mode || td->tags_count) {
vlmef6355b2004-09-29 13:26:15 +0000150 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
vlm6678cb12004-09-26 13:10:40 +0000151 tag_mode, -1, &ctx->left, 0);
vlmfa67ddc2004-06-03 03:38:44 +0000152 if(rval.code != RC_OK) {
153 ASN_DEBUG("%s tagging check failed: %d",
vlme413c122004-08-20 13:23:42 +0000154 td->name, rval.code);
vlme1ecb062004-10-05 06:36:02 +0000155 return rval;
vlmfa67ddc2004-06-03 03:38:44 +0000156 }
157
158 if(ctx->left >= 0) {
159 /* ?Substracted below! */
160 ctx->left += rval.consumed;
161 }
162 ADVANCE(rval.consumed);
163 } else {
164 ctx->left = -1;
165 }
166
167 NEXT_PHASE(ctx);
168
169 ASN_DEBUG("Structure consumes %ld bytes, buffer %ld",
170 (long)ctx->left, (long)size);
171
172 /* Fall through */
173 case 1:
174 /*
175 * Fetch the T from TLV.
176 */
177 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
vlme413c122004-08-20 13:23:42 +0000178 ASN_DEBUG("In %s CHOICE tag length %d", td->name, (int)tag_len);
vlmfa67ddc2004-06-03 03:38:44 +0000179 switch(tag_len) {
180 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
181 /* Fall through */
182 case -1: RETURN(RC_FAIL);
183 }
184
185 do {
vlmef6355b2004-09-29 13:26:15 +0000186 asn_TYPE_tag2member_t *t2m;
187 asn_TYPE_tag2member_t key;
vlmfa67ddc2004-06-03 03:38:44 +0000188
189 key.el_tag = tlv_tag;
vlma8f4a4c2005-01-17 14:32:45 +0000190 t2m = (asn_TYPE_tag2member_t *)bsearch(&key,
vlmda674682004-08-11 09:07:36 +0000191 specs->tag2el, specs->tag2el_count,
vlmfa67ddc2004-06-03 03:38:44 +0000192 sizeof(specs->tag2el[0]), _search4tag);
193 if(t2m) {
194 /*
195 * Found the element corresponding to the tag.
196 */
197 NEXT_PHASE(ctx);
198 ctx->step = t2m->el_no;
199 break;
vlm337167e2005-11-26 11:25:14 +0000200 } else if(specs->ext_start == -1) {
vlmfa67ddc2004-06-03 03:38:44 +0000201 ASN_DEBUG("Unexpected tag %s "
202 "in non-extensible CHOICE %s",
vlme413c122004-08-20 13:23:42 +0000203 ber_tlv_tag_string(tlv_tag), td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000204 RETURN(RC_FAIL);
205 } else {
206 /* Skip this tag */
207 ssize_t skip;
208
209 ASN_DEBUG("Skipping unknown tag %s",
210 ber_tlv_tag_string(tlv_tag));
211
vlm6130a2f2004-09-29 14:19:14 +0000212 skip = ber_skip_length(opt_codec_ctx,
vlmfa67ddc2004-06-03 03:38:44 +0000213 BER_TLV_CONSTRUCTED(ptr),
vlmb02dcc62005-03-10 18:52:02 +0000214 (const char *)ptr + tag_len,
215 LEFT - tag_len);
vlmfa67ddc2004-06-03 03:38:44 +0000216
217 switch(skip) {
218 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
219 /* Fall through */
220 case -1: RETURN(RC_FAIL);
221 }
222
223 ADVANCE(skip + tag_len);
224 RETURN(RC_OK);
225 }
226 } while(0);
227
228 case 2:
229 /*
230 * PHASE 2.
231 * Read in the element.
232 */
233 do {
vlmef6355b2004-09-29 13:26:15 +0000234 asn_TYPE_member_t *elm;/* CHOICE's element */
vlmfa67ddc2004-06-03 03:38:44 +0000235 void *memb_ptr; /* Pointer to the member */
vlmda674682004-08-11 09:07:36 +0000236 void **memb_ptr2; /* Pointer to that pointer */
vlmfa67ddc2004-06-03 03:38:44 +0000237
238 elm = &elements[ctx->step];
239
240 /*
241 * Compute the position of the member inside a structure,
242 * and also a type of containment (it may be contained
243 * as pointer or using inline inclusion).
244 */
vlmddd5a7d2004-09-10 09:18:20 +0000245 if(elm->flags & ATF_POINTER) {
246 /* Member is a pointer to another structure */
vlmda674682004-08-11 09:07:36 +0000247 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000248 } else {
249 /*
250 * A pointer to a pointer
251 * holding the start of the structure
252 */
253 memb_ptr = (char *)st + elm->memb_offset;
254 memb_ptr2 = &memb_ptr;
255 }
vlm337167e2005-11-26 11:25:14 +0000256 /* Set presence to be able to free it properly at any time */
257 _set_present_idx(st, specs->pres_offset,
258 specs->pres_size, ctx->step + 1);
vlmfa67ddc2004-06-03 03:38:44 +0000259 /*
260 * Invoke the member fetch routine according to member's type
261 */
vlmef6355b2004-09-29 13:26:15 +0000262 rval = elm->type->ber_decoder(opt_codec_ctx, elm->type,
vlm337167e2005-11-26 11:25:14 +0000263 memb_ptr2, ptr, LEFT, elm->tag_mode);
vlmfa67ddc2004-06-03 03:38:44 +0000264 switch(rval.code) {
265 case RC_OK:
vlmfa67ddc2004-06-03 03:38:44 +0000266 break;
267 case RC_WMORE: /* More data expected */
268 if(!SIZE_VIOLATION) {
269 ADVANCE(rval.consumed);
270 RETURN(RC_WMORE);
271 }
272 RETURN(RC_FAIL);
273 case RC_FAIL: /* Fatal error */
274 RETURN(rval.code);
275 } /* switch(rval) */
276
277 ADVANCE(rval.consumed);
278 } while(0);
279
280 NEXT_PHASE(ctx);
281
282 /* Fall through */
283 case 3:
284 ASN_DEBUG("CHOICE %s Leftover: %ld, size = %ld, tm=%d, tc=%d",
vlme413c122004-08-20 13:23:42 +0000285 td->name, (long)ctx->left, (long)size,
286 tag_mode, td->tags_count);
vlmfa67ddc2004-06-03 03:38:44 +0000287
288 if(ctx->left > 0) {
289 /*
290 * The type must be fully decoded
291 * by the CHOICE member-specific decoder.
292 */
293 RETURN(RC_FAIL);
294 }
295
296 if(ctx->left == -1
vlme413c122004-08-20 13:23:42 +0000297 && !(tag_mode || td->tags_count)) {
vlmfa67ddc2004-06-03 03:38:44 +0000298 /*
299 * This is an untagged CHOICE.
300 * It doesn't contain nothing
301 * except for the member itself, including all its tags.
302 * The decoding is completed.
303 */
304 NEXT_PHASE(ctx);
305 break;
306 }
307
308 /*
309 * Read in the "end of data chunks"'s.
310 */
311 while(ctx->left < 0) {
312 ssize_t tl;
313
314 tl = ber_fetch_tag(ptr, LEFT, &tlv_tag);
315 switch(tl) {
316 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
317 /* Fall through */
318 case -1: RETURN(RC_FAIL);
319 }
320
321 /*
322 * Expected <0><0>...
323 */
vlmb02dcc62005-03-10 18:52:02 +0000324 if(((const uint8_t *)ptr)[0] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000325 if(LEFT < 2) {
326 if(SIZE_VIOLATION)
327 RETURN(RC_FAIL);
328 else
329 RETURN(RC_WMORE);
vlmb02dcc62005-03-10 18:52:02 +0000330 } else if(((const uint8_t *)ptr)[1] == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000331 /*
332 * Correctly finished with <0><0>.
333 */
vlme1ecb062004-10-05 06:36:02 +0000334 ADVANCE(2);
335 ctx->left++;
vlmfa67ddc2004-06-03 03:38:44 +0000336 continue;
337 }
338 } else {
339 ASN_DEBUG("Unexpected continuation in %s",
vlme413c122004-08-20 13:23:42 +0000340 td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000341 RETURN(RC_FAIL);
342 }
343
vlme1ecb062004-10-05 06:36:02 +0000344 /* UNREACHABLE */
vlmfa67ddc2004-06-03 03:38:44 +0000345 }
346
347 NEXT_PHASE(ctx);
348 case 4:
349 /* No meaningful work here */
350 break;
351 }
352
353 RETURN(RC_OK);
354}
355
vlm39ba4c42004-09-22 16:06:28 +0000356asn_enc_rval_t
vlm31f7a1c2005-08-22 14:19:28 +0000357CHOICE_encode_der(asn_TYPE_descriptor_t *td, void *sptr,
vlmfa67ddc2004-06-03 03:38:44 +0000358 int tag_mode, ber_tlv_tag_t tag,
359 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000360 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
361 asn_TYPE_member_t *elm; /* CHOICE element */
vlm39ba4c42004-09-22 16:06:28 +0000362 asn_enc_rval_t erval;
vlmfa67ddc2004-06-03 03:38:44 +0000363 void *memb_ptr;
364 size_t computed_size = 0;
365 int present;
366
vlm18dd82c2006-08-18 01:34:18 +0000367 if(!sptr) _ASN_ENCODE_FAILED;
368
vlmfa67ddc2004-06-03 03:38:44 +0000369 ASN_DEBUG("%s %s as CHOICE",
vlme413c122004-08-20 13:23:42 +0000370 cb?"Encoding":"Estimating", td->name);
vlmfa67ddc2004-06-03 03:38:44 +0000371
vlm31f7a1c2005-08-22 14:19:28 +0000372 present = _fetch_present_idx(sptr,
vlmfa67ddc2004-06-03 03:38:44 +0000373 specs->pres_offset, specs->pres_size);
374
375 /*
376 * If the structure was not initialized, it cannot be encoded:
377 * can't deduce what to encode in the choice type.
378 */
vlme413c122004-08-20 13:23:42 +0000379 if(present <= 0 || present > td->elements_count) {
380 if(present == 0 && td->elements_count == 0) {
vlmfa67ddc2004-06-03 03:38:44 +0000381 /* The CHOICE is empty?! */
382 erval.encoded = 0;
vlm337167e2005-11-26 11:25:14 +0000383 _ASN_ENCODED_OK(erval);
vlmfa67ddc2004-06-03 03:38:44 +0000384 }
vlm31f7a1c2005-08-22 14:19:28 +0000385 _ASN_ENCODE_FAILED;
vlmfa67ddc2004-06-03 03:38:44 +0000386 }
387
388 /*
389 * Seek over the present member of the structure.
390 */
vlme413c122004-08-20 13:23:42 +0000391 elm = &td->elements[present-1];
vlmddd5a7d2004-09-10 09:18:20 +0000392 if(elm->flags & ATF_POINTER) {
vlm31f7a1c2005-08-22 14:19:28 +0000393 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000394 if(memb_ptr == 0) {
vlmddd5a7d2004-09-10 09:18:20 +0000395 if(elm->optional) {
396 erval.encoded = 0;
vlm337167e2005-11-26 11:25:14 +0000397 _ASN_ENCODED_OK(erval);
vlmddd5a7d2004-09-10 09:18:20 +0000398 }
vlm31f7a1c2005-08-22 14:19:28 +0000399 /* Mandatory element absent */
400 _ASN_ENCODE_FAILED;
vlmfa67ddc2004-06-03 03:38:44 +0000401 }
402 } else {
vlm31f7a1c2005-08-22 14:19:28 +0000403 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000404 }
405
406 /*
407 * If the CHOICE itself is tagged EXPLICIT:
408 * T ::= [2] EXPLICIT CHOICE { ... }
409 * Then emit the appropriate tags.
410 */
vlme413c122004-08-20 13:23:42 +0000411 if(tag_mode == 1 || td->tags_count) {
vlmfa67ddc2004-06-03 03:38:44 +0000412 /*
413 * For this, we need to pre-compute the member.
414 */
415 ssize_t ret;
416
417 /* Encode member with its tag */
418 erval = elm->type->der_encoder(elm->type, memb_ptr,
419 elm->tag_mode, elm->tag, 0, 0);
420 if(erval.encoded == -1)
421 return erval;
422
423 /* Encode CHOICE with parent or my own tag */
vlm6678cb12004-09-26 13:10:40 +0000424 ret = der_write_tags(td, erval.encoded, tag_mode, 1, tag,
vlmfa67ddc2004-06-03 03:38:44 +0000425 cb, app_key);
vlm31f7a1c2005-08-22 14:19:28 +0000426 if(ret == -1)
427 _ASN_ENCODE_FAILED;
vlmfa67ddc2004-06-03 03:38:44 +0000428 computed_size += ret;
429 }
430
431 /*
432 * Encode the single underlying member.
433 */
434 erval = elm->type->der_encoder(elm->type, memb_ptr,
435 elm->tag_mode, elm->tag, cb, app_key);
436 if(erval.encoded == -1)
437 return erval;
438
439 ASN_DEBUG("Encoded CHOICE member in %ld bytes (+%ld)",
440 (long)erval.encoded, (long)computed_size);
441
442 erval.encoded += computed_size;
443
444 return erval;
445}
446
447ber_tlv_tag_t
vlmef6355b2004-09-29 13:26:15 +0000448CHOICE_outmost_tag(asn_TYPE_descriptor_t *td, const void *ptr, int tag_mode, ber_tlv_tag_t tag) {
449 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
vlmfa67ddc2004-06-03 03:38:44 +0000450 int present;
451
vlma72bbf12005-11-13 09:12:23 +0000452 assert(tag_mode == 0); (void)tag_mode;
453 assert(tag == 0); (void)tag;
vlmfa67ddc2004-06-03 03:38:44 +0000454
455 /*
456 * Figure out which CHOICE element is encoded.
457 */
458 present = _fetch_present_idx(ptr, specs->pres_offset, specs->pres_size);
459
vlme413c122004-08-20 13:23:42 +0000460 if(present > 0 || present <= td->elements_count) {
vlmef6355b2004-09-29 13:26:15 +0000461 asn_TYPE_member_t *elm = &td->elements[present-1];
vlm4d951ef2004-06-05 01:45:48 +0000462 const void *memb_ptr;
vlmfa67ddc2004-06-03 03:38:44 +0000463
vlmddd5a7d2004-09-10 09:18:20 +0000464 if(elm->flags & ATF_POINTER) {
vlm4d951ef2004-06-05 01:45:48 +0000465 memb_ptr = *(const void * const *)
466 ((const char *)ptr + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000467 } else {
vlm4d951ef2004-06-05 01:45:48 +0000468 memb_ptr = (const void *)
469 ((const char *)ptr + elm->memb_offset);
vlmfa67ddc2004-06-03 03:38:44 +0000470 }
471
vlmef6355b2004-09-29 13:26:15 +0000472 return asn_TYPE_outmost_tag(elm->type, memb_ptr,
vlmfa67ddc2004-06-03 03:38:44 +0000473 elm->tag_mode, elm->tag);
474 } else {
vlm1ff928d2004-08-11 08:10:13 +0000475 return (ber_tlv_tag_t)-1;
vlmfa67ddc2004-06-03 03:38:44 +0000476 }
477}
478
479int
vlmef6355b2004-09-29 13:26:15 +0000480CHOICE_constraint(asn_TYPE_descriptor_t *td, const void *sptr,
vlmaf68ef52006-07-13 11:19:01 +0000481 asn_app_constraint_failed_f *ctfailcb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000482 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
vlmfa67ddc2004-06-03 03:38:44 +0000483 int present;
484
485 if(!sptr) {
vlm18269b62006-10-16 12:18:41 +0000486 _ASN_CTFAIL(app_key, td, sptr,
vlm758530a2004-08-22 13:47:59 +0000487 "%s: value not given (%s:%d)",
488 td->name, __FILE__, __LINE__);
vlmfa67ddc2004-06-03 03:38:44 +0000489 return -1;
490 }
491
492 /*
493 * Figure out which CHOICE element is encoded.
494 */
495 present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size);
vlme413c122004-08-20 13:23:42 +0000496 if(present > 0 && present <= td->elements_count) {
vlmef6355b2004-09-29 13:26:15 +0000497 asn_TYPE_member_t *elm = &td->elements[present-1];
vlmfa67ddc2004-06-03 03:38:44 +0000498 const void *memb_ptr;
499
vlmddd5a7d2004-09-10 09:18:20 +0000500 if(elm->flags & ATF_POINTER) {
vlmfa67ddc2004-06-03 03:38:44 +0000501 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
vlmddd5a7d2004-09-10 09:18:20 +0000502 if(!memb_ptr) {
503 if(elm->optional)
504 return 0;
vlm18269b62006-10-16 12:18:41 +0000505 _ASN_CTFAIL(app_key, td, sptr,
vlmddd5a7d2004-09-10 09:18:20 +0000506 "%s: mandatory CHOICE element %s absent (%s:%d)",
507 td->name, elm->name, __FILE__, __LINE__);
508 return -1;
509 }
vlmfa67ddc2004-06-03 03:38:44 +0000510 } else {
511 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
512 }
513
vlme413c122004-08-20 13:23:42 +0000514 if(elm->memb_constraints) {
515 return elm->memb_constraints(elm->type, memb_ptr,
vlmaf68ef52006-07-13 11:19:01 +0000516 ctfailcb, app_key);
vlme413c122004-08-20 13:23:42 +0000517 } else {
518 int ret = elm->type->check_constraints(elm->type,
vlmaf68ef52006-07-13 11:19:01 +0000519 memb_ptr, ctfailcb, app_key);
vlme413c122004-08-20 13:23:42 +0000520 /*
521 * Cannot inherit it eralier:
522 * need to make sure we get the updated version.
523 */
524 elm->memb_constraints = elm->type->check_constraints;
525 return ret;
526 }
vlmfa67ddc2004-06-03 03:38:44 +0000527 } else {
vlm18269b62006-10-16 12:18:41 +0000528 _ASN_CTFAIL(app_key, td, sptr,
vlm63a2ec92004-08-22 13:55:49 +0000529 "%s: no CHOICE element given (%s:%d)",
vlm758530a2004-08-22 13:47:59 +0000530 td->name, __FILE__, __LINE__);
vlmfa67ddc2004-06-03 03:38:44 +0000531 return -1;
532 }
533}
534
vlm6fbdf972004-10-23 14:57:50 +0000535#undef XER_ADVANCE
536#define XER_ADVANCE(num_bytes) do { \
537 size_t num = num_bytes; \
vlmb02dcc62005-03-10 18:52:02 +0000538 buf_ptr = ((const char *)buf_ptr) + num;\
vlm6fbdf972004-10-23 14:57:50 +0000539 size -= num; \
540 consumed_myself += num; \
541 } while(0)
542
vlm390a9022005-02-14 17:21:22 +0000543/*
544 * Decode the XER (XML) data.
545 */
vlm6fbdf972004-10-23 14:57:50 +0000546asn_dec_rval_t
547CHOICE_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
548 void **struct_ptr, const char *opt_mname,
vlmb02dcc62005-03-10 18:52:02 +0000549 const void *buf_ptr, size_t size) {
vlm6fbdf972004-10-23 14:57:50 +0000550 /*
551 * Bring closer parts of structure description.
552 */
553 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
554 const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
555
556 /*
557 * Parts of the structure being constructed.
558 */
559 void *st = *struct_ptr; /* Target structure. */
560 asn_struct_ctx_t *ctx; /* Decoder context */
561
vlm390a9022005-02-14 17:21:22 +0000562 asn_dec_rval_t rval; /* Return value of a decoder */
vlm6fbdf972004-10-23 14:57:50 +0000563 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
vlm6fbdf972004-10-23 14:57:50 +0000564 int edx; /* Element index */
565
566 /*
567 * Create the target structure if it is not present already.
568 */
569 if(st == 0) {
570 st = *struct_ptr = CALLOC(1, specs->struct_size);
571 if(st == 0) RETURN(RC_FAIL);
572 }
573
574 /*
575 * Restore parsing context.
576 */
577 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
vlm6d44a542005-11-08 03:06:16 +0000578 if(ctx->phase == 0 && !*xml_tag)
579 ctx->phase = 1; /* Skip the outer tag checking phase */
vlm6fbdf972004-10-23 14:57:50 +0000580
581 /*
582 * Phases of XER/XML processing:
583 * Phase 0: Check that the opening tag matches our expectations.
584 * Phase 1: Processing body and reacting on closing tag.
585 * Phase 2: Processing inner type.
vlmeb0faf72005-02-18 16:23:48 +0000586 * Phase 3: Only waiting for closing tag.
587 * Phase 4: Skipping unknown extensions.
588 * Phase 5: PHASED OUT
vlm6fbdf972004-10-23 14:57:50 +0000589 */
vlmeb0faf72005-02-18 16:23:48 +0000590 for(edx = ctx->step; ctx->phase <= 4;) {
vlm6fbdf972004-10-23 14:57:50 +0000591 pxer_chunk_type_e ch_type; /* XER chunk type */
592 ssize_t ch_size; /* Chunk size */
593 xer_check_tag_e tcv; /* Tag check value */
594 asn_TYPE_member_t *elm;
595
596 /*
597 * Go inside the member.
598 */
599 if(ctx->phase == 2) {
600 asn_dec_rval_t tmprval;
vlm6fbdf972004-10-23 14:57:50 +0000601 void *memb_ptr; /* Pointer to the member */
602 void **memb_ptr2; /* Pointer to that pointer */
603
vlma351c2b2004-10-26 10:12:14 +0000604 elm = &td->elements[edx];
605
vlm6fbdf972004-10-23 14:57:50 +0000606 if(elm->flags & ATF_POINTER) {
607 /* Member is a pointer to another structure */
608 memb_ptr2 = (void **)((char *)st
609 + elm->memb_offset);
610 } else {
611 memb_ptr = (char *)st + elm->memb_offset;
612 memb_ptr2 = &memb_ptr;
613 }
614
vlm390a9022005-02-14 17:21:22 +0000615 /* Start/Continue decoding the inner member */
vlm6fbdf972004-10-23 14:57:50 +0000616 tmprval = elm->type->xer_decoder(opt_codec_ctx,
617 elm->type, memb_ptr2, elm->name,
618 buf_ptr, size);
619 XER_ADVANCE(tmprval.consumed);
vlm1223d982006-09-17 08:23:35 +0000620 ASN_DEBUG("XER/CHOICE: itdf: [%s] code=%d",
621 elm->type->name, tmprval.code);
vlm6fbdf972004-10-23 14:57:50 +0000622 if(tmprval.code != RC_OK)
623 RETURN(tmprval.code);
vlm390a9022005-02-14 17:21:22 +0000624 assert(_fetch_present_idx(st,
625 specs->pres_offset, specs->pres_size) == 0);
626 /* Record what we've got */
627 _set_present_idx(st,
628 specs->pres_offset, specs->pres_size, edx + 1);
vlm6fbdf972004-10-23 14:57:50 +0000629 ctx->phase = 3;
630 /* Fall through */
631 }
632
vlm6d44a542005-11-08 03:06:16 +0000633 /* No need to wait for closing tag; special mode. */
634 if(ctx->phase == 3 && !*xml_tag) {
635 ctx->phase = 5; /* Phase out */
636 RETURN(RC_OK);
637 }
638
vlm6fbdf972004-10-23 14:57:50 +0000639 /*
640 * Get the next part of the XML stream.
641 */
vlmc70f8f32005-02-18 18:06:36 +0000642 ch_size = xer_next_token(&ctx->context, buf_ptr, size, &ch_type);
vlm6fbdf972004-10-23 14:57:50 +0000643 switch(ch_size) {
644 case -1: RETURN(RC_FAIL);
vlmcb7222f2005-02-18 16:10:40 +0000645 case 0: RETURN(RC_WMORE);
vlm6fbdf972004-10-23 14:57:50 +0000646 default:
647 switch(ch_type) {
648 case PXER_COMMENT: /* Got XML comment */
649 case PXER_TEXT: /* Ignore free-standing text */
650 XER_ADVANCE(ch_size); /* Skip silently */
651 continue;
652 case PXER_TAG:
653 break; /* Check the rest down there */
654 }
655 }
656
vlm390a9022005-02-14 17:21:22 +0000657 tcv = xer_check_tag(buf_ptr, ch_size, xml_tag);
vlm6d44a542005-11-08 03:06:16 +0000658 ASN_DEBUG("XER/CHOICE checked [%c%c%c%c] vs [%s], tcv=%d",
vlma72bbf12005-11-13 09:12:23 +0000659 ch_size>0?((const uint8_t *)buf_ptr)[0]:'?',
660 ch_size>1?((const uint8_t *)buf_ptr)[1]:'?',
661 ch_size>2?((const uint8_t *)buf_ptr)[2]:'?',
662 ch_size>3?((const uint8_t *)buf_ptr)[3]:'?',
vlm6d44a542005-11-08 03:06:16 +0000663 xml_tag, tcv);
vlmeb0faf72005-02-18 16:23:48 +0000664
665 /* Skip the extensions section */
666 if(ctx->phase == 4) {
667 ASN_DEBUG("skip_unknown(%d, %ld)",
668 tcv, (long)ctx->left);
669 switch(xer_skip_unknown(tcv, &ctx->left)) {
670 case -1:
671 ctx->phase = 5;
672 RETURN(RC_FAIL);
673 continue;
674 case 1:
675 ctx->phase = 3;
vlmc70f8f32005-02-18 18:06:36 +0000676 /* Fall through */
vlmeb0faf72005-02-18 16:23:48 +0000677 case 0:
678 XER_ADVANCE(ch_size);
679 continue;
680 case 2:
681 ctx->phase = 3;
682 break;
683 }
684 }
685
vlm6fbdf972004-10-23 14:57:50 +0000686 switch(tcv) {
687 case XCT_BOTH:
vlm390a9022005-02-14 17:21:22 +0000688 break; /* No CHOICE? */
vlm6fbdf972004-10-23 14:57:50 +0000689 case XCT_CLOSING:
vlm390a9022005-02-14 17:21:22 +0000690 if(ctx->phase != 3)
vlm6fbdf972004-10-23 14:57:50 +0000691 break;
692 XER_ADVANCE(ch_size);
vlmeb0faf72005-02-18 16:23:48 +0000693 ctx->phase = 5; /* Phase out */
vlm6fbdf972004-10-23 14:57:50 +0000694 RETURN(RC_OK);
695 case XCT_OPENING:
696 if(ctx->phase == 0) {
697 XER_ADVANCE(ch_size);
698 ctx->phase = 1; /* Processing body phase */
699 continue;
vlm6fbdf972004-10-23 14:57:50 +0000700 }
701 /* Fall through */
vlm957da5b2005-02-18 14:23:48 +0000702 case XCT_UNKNOWN_OP:
703 case XCT_UNKNOWN_BO:
vlm6fbdf972004-10-23 14:57:50 +0000704
705 if(ctx->phase != 1)
706 break; /* Really unexpected */
707
708 /*
vlm390a9022005-02-14 17:21:22 +0000709 * Search which inner member corresponds to this tag.
vlm6fbdf972004-10-23 14:57:50 +0000710 */
711 for(edx = 0; edx < td->elements_count; edx++) {
712 elm = &td->elements[edx];
vlm390a9022005-02-14 17:21:22 +0000713 tcv = xer_check_tag(buf_ptr,ch_size,elm->name);
vlm6fbdf972004-10-23 14:57:50 +0000714 switch(tcv) {
715 case XCT_BOTH:
716 case XCT_OPENING:
717 /*
718 * Process this member.
719 */
720 ctx->step = edx;
721 ctx->phase = 2;
722 break;
vlm957da5b2005-02-18 14:23:48 +0000723 case XCT_UNKNOWN_OP:
724 case XCT_UNKNOWN_BO:
vlmc14611c2005-02-14 19:03:17 +0000725 continue;
vlm6fbdf972004-10-23 14:57:50 +0000726 default:
727 edx = td->elements_count;
728 break; /* Phase out */
729 }
730 break;
731 }
vlmc14611c2005-02-14 19:03:17 +0000732 if(edx != td->elements_count)
733 continue;
vlm957da5b2005-02-18 14:23:48 +0000734
735 /* It is expected extension */
vlm337167e2005-11-26 11:25:14 +0000736 if(specs->ext_start != -1) {
vlmeb0faf72005-02-18 16:23:48 +0000737 ASN_DEBUG("Got anticipated extension");
vlm957da5b2005-02-18 14:23:48 +0000738 /*
vlmeb0faf72005-02-18 16:23:48 +0000739 * Check for (XCT_BOTH or XCT_UNKNOWN_BO)
740 * By using a mask. Only record a pure
741 * <opening> tags.
vlm957da5b2005-02-18 14:23:48 +0000742 */
vlmeb0faf72005-02-18 16:23:48 +0000743 if(tcv & XCT_CLOSING) {
744 /* Found </extension> without body */
745 ctx->phase = 3; /* Terminating */
746 } else {
747 ctx->left = 1;
748 ctx->phase = 4; /* Skip ...'s */
749 }
750 XER_ADVANCE(ch_size);
751 continue;
vlm957da5b2005-02-18 14:23:48 +0000752 }
753
vlmc14611c2005-02-14 19:03:17 +0000754 /* Fall through */
vlm6fbdf972004-10-23 14:57:50 +0000755 default:
756 break;
757 }
758
vlm1223d982006-09-17 08:23:35 +0000759 ASN_DEBUG("Unexpected XML tag [%c%c%c%c] in CHOICE [%s]"
760 " (ph=%d, tag=%s)",
761 ch_size>0?((const uint8_t *)buf_ptr)[0]:'?',
762 ch_size>1?((const uint8_t *)buf_ptr)[1]:'?',
763 ch_size>2?((const uint8_t *)buf_ptr)[2]:'?',
764 ch_size>3?((const uint8_t *)buf_ptr)[3]:'?',
765 td->name, ctx->phase, xml_tag);
vlm6fbdf972004-10-23 14:57:50 +0000766 break;
767 }
768
vlmeb0faf72005-02-18 16:23:48 +0000769 ctx->phase = 5; /* Phase out, just in case */
vlm6fbdf972004-10-23 14:57:50 +0000770 RETURN(RC_FAIL);
771}
772
773
vlm39ba4c42004-09-22 16:06:28 +0000774asn_enc_rval_t
vlmef6355b2004-09-29 13:26:15 +0000775CHOICE_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
vlm39ba4c42004-09-22 16:06:28 +0000776 int ilevel, enum xer_encoder_flags_e flags,
777 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000778 asn_CHOICE_specifics_t *specs=(asn_CHOICE_specifics_t *)td->specifics;
vlm39ba4c42004-09-22 16:06:28 +0000779 asn_enc_rval_t er;
780 int present;
781
782 if(!sptr)
783 _ASN_ENCODE_FAILED;
784
785 /*
786 * Figure out which CHOICE element is encoded.
787 */
788 present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size);
789
790 if(present <= 0 || present > td->elements_count) {
791 _ASN_ENCODE_FAILED;
792 } else {
793 asn_enc_rval_t tmper;
vlmef6355b2004-09-29 13:26:15 +0000794 asn_TYPE_member_t *elm = &td->elements[present-1];
vlm39ba4c42004-09-22 16:06:28 +0000795 void *memb_ptr;
796 const char *mname = elm->name;
797 unsigned int mlen = strlen(mname);
798
799 if(elm->flags & ATF_POINTER) {
800 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
801 if(!memb_ptr) _ASN_ENCODE_FAILED;
802 } else {
803 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
804 }
805
806 er.encoded = 0;
807
808 if(!(flags & XER_F_CANONICAL)) _i_ASN_TEXT_INDENT(1, ilevel);
809 _ASN_CALLBACK3("<", 1, mname, mlen, ">", 1);
810
811 tmper = elm->type->xer_encoder(elm->type, memb_ptr,
812 ilevel + 1, flags, cb, app_key);
813 if(tmper.encoded == -1) return tmper;
814
815 _ASN_CALLBACK3("</", 2, mname, mlen, ">", 1);
816
817 er.encoded += 5 + (2 * mlen) + tmper.encoded;
818 }
819
820 if(!(flags & XER_F_CANONICAL)) _i_ASN_TEXT_INDENT(1, ilevel - 1);
821
vlm337167e2005-11-26 11:25:14 +0000822 _ASN_ENCODED_OK(er);
vlm84d551b2004-10-03 09:13:02 +0000823cb_failed:
824 _ASN_ENCODE_FAILED;
vlm39ba4c42004-09-22 16:06:28 +0000825}
826
vlm337167e2005-11-26 11:25:14 +0000827asn_dec_rval_t
828CHOICE_decode_uper(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
829 asn_per_constraints_t *constraints, void **sptr, asn_per_data_t *pd) {
830 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
831 asn_dec_rval_t rv;
832 asn_per_constraint_t *ct;
833 asn_TYPE_member_t *elm; /* CHOICE's element */
834 void *memb_ptr;
835 void **memb_ptr2;
836 void *st = *sptr;
837 int value;
838
vlm4d2ca122005-12-07 05:46:03 +0000839 if(_ASN_STACK_OVERFLOW_CHECK(opt_codec_ctx))
840 _ASN_DECODE_FAILED;
841
vlm337167e2005-11-26 11:25:14 +0000842 /*
843 * Create the target structure if it is not present already.
844 */
845 if(!st) {
846 st = *sptr = CALLOC(1, specs->struct_size);
847 if(!st) _ASN_DECODE_FAILED;
848 }
849
850 if(constraints) ct = &constraints->value;
851 else if(td->per_constraints) ct = &td->per_constraints->value;
852 else ct = 0;
853
854 if(ct && ct->flags & APC_EXTENSIBLE) {
855 value = per_get_few_bits(pd, 1);
vlm619448e2006-09-18 20:05:55 +0000856 if(value < 0) _ASN_DECODE_STARVED;
vlm337167e2005-11-26 11:25:14 +0000857 if(value) ct = 0; /* Not restricted */
858 }
859
860 if(ct && ct->range_bits >= 0) {
861 value = per_get_few_bits(pd, ct->range_bits);
vlm619448e2006-09-18 20:05:55 +0000862 if(value < 0) _ASN_DECODE_STARVED;
vlm337167e2005-11-26 11:25:14 +0000863 ASN_DEBUG("CHOICE %s got index %d in range %d",
864 td->name, value, ct->range_bits);
vlm619448e2006-09-18 20:05:55 +0000865 if(value > ct->upper_bound)
866 _ASN_DECODE_FAILED;
vlm337167e2005-11-26 11:25:14 +0000867 } else {
868 if(specs->ext_start == -1)
869 _ASN_DECODE_FAILED;
870 value = uper_get_nsnnwn(pd);
vlm619448e2006-09-18 20:05:55 +0000871 if(value < 0) _ASN_DECODE_STARVED;
vlm337167e2005-11-26 11:25:14 +0000872 value += specs->ext_start;
873 if(value >= td->elements_count)
874 _ASN_DECODE_FAILED;
vlm337167e2005-11-26 11:25:14 +0000875 }
876
877 /* Adjust if canonical order is different from natural order */
878 if(specs->canonical_order)
879 value = specs->canonical_order[value];
880
881 /* Set presence to be able to free it later */
882 _set_present_idx(st, specs->pres_offset, specs->pres_size, value + 1);
883
884 elm = &td->elements[value];
885 if(elm->flags & ATF_POINTER) {
886 /* Member is a pointer to another structure */
887 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
888 } else {
889 memb_ptr = (char *)st + elm->memb_offset;
890 memb_ptr2 = &memb_ptr;
891 }
892 ASN_DEBUG("Discovered CHOICE %s encodes %s", td->name, elm->name);
893
vlm0de7baa2007-06-29 01:45:03 +0000894 if(ct && ct->range_bits >= 0) {
895 rv = elm->type->uper_decoder(opt_codec_ctx, elm->type,
vlm337167e2005-11-26 11:25:14 +0000896 elm->per_constraints, memb_ptr2, pd);
vlm0de7baa2007-06-29 01:45:03 +0000897 } else {
898 rv = uper_open_type_get(opt_codec_ctx, elm->type,
899 elm->per_constraints, memb_ptr2, pd);
900 }
901
vlm337167e2005-11-26 11:25:14 +0000902 if(rv.code != RC_OK)
vlm0de7baa2007-06-29 01:45:03 +0000903 ASN_DEBUG("Failed to decode %s in %s (CHOICE) %d",
904 elm->name, td->name, rv.code);
vlm337167e2005-11-26 11:25:14 +0000905 return rv;
906}
907
vlm18dd82c2006-08-18 01:34:18 +0000908asn_enc_rval_t
909CHOICE_encode_uper(asn_TYPE_descriptor_t *td,
910 asn_per_constraints_t *constraints, void *sptr, asn_per_outp_t *po) {
911 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
912 asn_TYPE_member_t *elm; /* CHOICE's element */
913 asn_per_constraint_t *ct;
914 void *memb_ptr;
915 int present;
916
917 if(!sptr) _ASN_ENCODE_FAILED;
918
919 ASN_DEBUG("Encoding %s as CHOICE", td->name);
920
921 if(constraints) ct = &constraints->value;
922 else if(td->per_constraints) ct = &td->per_constraints->value;
923 else ct = 0;
924
925 present = _fetch_present_idx(sptr,
926 specs->pres_offset, specs->pres_size);
927
928 /*
929 * If the structure was not initialized properly, it cannot be encoded:
930 * can't deduce what to encode in the choice type.
931 */
932 if(present <= 0 || present > td->elements_count)
933 _ASN_ENCODE_FAILED;
934 else
935 present--;
936
937 /* Adjust if canonical order is different from natural order */
938 if(specs->canonical_order)
939 present = specs->canonical_order[present];
940
941 ASN_DEBUG("Encoding %s CHOICE element %d", td->name, present);
942
943 if(ct && ct->range_bits >= 0) {
944 if(present < ct->lower_bound
945 || present > ct->upper_bound) {
946 if(ct->flags & APC_EXTENSIBLE) {
947 if(per_put_few_bits(po, 1, 1))
948 _ASN_ENCODE_FAILED;
949 } else {
950 _ASN_ENCODE_FAILED;
951 }
952 ct = 0;
953 }
954 }
955 if(ct && ct->flags & APC_EXTENSIBLE)
956 if(per_put_few_bits(po, 0, 1))
957 _ASN_ENCODE_FAILED;
958
vlm18dd82c2006-08-18 01:34:18 +0000959 elm = &td->elements[present];
960 if(elm->flags & ATF_POINTER) {
961 /* Member is a pointer to another structure */
962 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
963 if(!memb_ptr) _ASN_ENCODE_FAILED;
964 } else {
965 memb_ptr = (char *)sptr + elm->memb_offset;
966 }
967
vlm0de7baa2007-06-29 01:45:03 +0000968 if(ct && ct->range_bits >= 0) {
969 if(per_put_few_bits(po, present, ct->range_bits))
970 _ASN_ENCODE_FAILED;
971
972 return elm->type->uper_encoder(elm->type, elm->per_constraints,
vlm18dd82c2006-08-18 01:34:18 +0000973 memb_ptr, po);
vlm0de7baa2007-06-29 01:45:03 +0000974 } else {
975 asn_enc_rval_t rval;
976 if(specs->ext_start == -1)
977 _ASN_ENCODE_FAILED;
978 if(uper_put_nsnnwn(po, present - specs->ext_start))
979 _ASN_ENCODE_FAILED;
980 if(uper_open_type_put(elm->type, elm->per_constraints,
981 memb_ptr, po))
982 _ASN_ENCODE_FAILED;
983 rval.encoded = 0;
984 _ASN_ENCODED_OK(rval);
985 }
vlm18dd82c2006-08-18 01:34:18 +0000986}
987
vlm337167e2005-11-26 11:25:14 +0000988
vlmfa67ddc2004-06-03 03:38:44 +0000989int
vlmef6355b2004-09-29 13:26:15 +0000990CHOICE_print(asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
vlmfa67ddc2004-06-03 03:38:44 +0000991 asn_app_consume_bytes_f *cb, void *app_key) {
vlmef6355b2004-09-29 13:26:15 +0000992 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
vlmfa67ddc2004-06-03 03:38:44 +0000993 int present;
994
vlm6678cb12004-09-26 13:10:40 +0000995 if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +0000996
997 /*
998 * Figure out which CHOICE element is encoded.
999 */
1000 present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size);
1001
1002 /*
vlm39ba4c42004-09-22 16:06:28 +00001003 * Print that element.
vlmfa67ddc2004-06-03 03:38:44 +00001004 */
vlme413c122004-08-20 13:23:42 +00001005 if(present > 0 && present <= td->elements_count) {
vlmef6355b2004-09-29 13:26:15 +00001006 asn_TYPE_member_t *elm = &td->elements[present-1];
vlmfa67ddc2004-06-03 03:38:44 +00001007 const void *memb_ptr;
1008
vlmddd5a7d2004-09-10 09:18:20 +00001009 if(elm->flags & ATF_POINTER) {
vlmfa67ddc2004-06-03 03:38:44 +00001010 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
vlm6678cb12004-09-26 13:10:40 +00001011 if(!memb_ptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +00001012 } else {
1013 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1014 }
1015
1016 /* Print member's name and stuff */
Sylvain Munaut13e3e9a2010-06-14 23:33:55 +02001017 if(cb(elm->name, strlen(elm->name), app_key) < 0
1018 || cb(": ", 2, app_key) < 0)
1019 return -1;
vlmfa67ddc2004-06-03 03:38:44 +00001020
1021 return elm->type->print_struct(elm->type, memb_ptr, ilevel,
1022 cb, app_key);
1023 } else {
vlm6678cb12004-09-26 13:10:40 +00001024 return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
vlmfa67ddc2004-06-03 03:38:44 +00001025 }
1026}
1027
1028void
vlmef6355b2004-09-29 13:26:15 +00001029CHOICE_free(asn_TYPE_descriptor_t *td, void *ptr, int contents_only) {
1030 asn_CHOICE_specifics_t *specs = (asn_CHOICE_specifics_t *)td->specifics;
vlmfa67ddc2004-06-03 03:38:44 +00001031 int present;
1032
1033 if(!td || !ptr)
1034 return;
1035
1036 ASN_DEBUG("Freeing %s as CHOICE", td->name);
1037
1038 /*
1039 * Figure out which CHOICE element is encoded.
1040 */
1041 present = _fetch_present_idx(ptr, specs->pres_offset, specs->pres_size);
1042
1043 /*
1044 * Free that element.
1045 */
vlme413c122004-08-20 13:23:42 +00001046 if(present > 0 && present <= td->elements_count) {
vlmef6355b2004-09-29 13:26:15 +00001047 asn_TYPE_member_t *elm = &td->elements[present-1];
vlmfa67ddc2004-06-03 03:38:44 +00001048 void *memb_ptr;
1049
vlmddd5a7d2004-09-10 09:18:20 +00001050 if(elm->flags & ATF_POINTER) {
vlmfa67ddc2004-06-03 03:38:44 +00001051 memb_ptr = *(void **)((char *)ptr + elm->memb_offset);
1052 if(memb_ptr)
vlmbe78c802006-03-17 02:11:12 +00001053 ASN_STRUCT_FREE(*elm->type, memb_ptr);
vlmfa67ddc2004-06-03 03:38:44 +00001054 } else {
1055 memb_ptr = (void *)((char *)ptr + elm->memb_offset);
vlmbe78c802006-03-17 02:11:12 +00001056 ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr);
vlmfa67ddc2004-06-03 03:38:44 +00001057 }
1058 }
1059
1060 if(!contents_only) {
1061 FREEMEM(ptr);
1062 }
1063}
1064
1065
1066/*
1067 * The following functions functions offer protection against -fshort-enums,
1068 * compatible with little- and big-endian machines.
1069 * If assertion is triggered, either disable -fshort-enums, or add an entry
1070 * here with the ->pres_size of your target stracture.
1071 * Unless the target structure is packed, the ".present" member
1072 * is guaranteed to be aligned properly. ASN.1 compiler itself does not
1073 * produce packed code.
1074 */
vlme55716a2004-08-11 09:10:59 +00001075static int
vlmfa67ddc2004-06-03 03:38:44 +00001076_fetch_present_idx(const void *struct_ptr, int pres_offset, int pres_size) {
1077 const void *present_ptr;
1078 int present;
1079
1080 present_ptr = ((const char *)struct_ptr) + pres_offset;
1081
1082 switch(pres_size) {
1083 case sizeof(int): present = *(const int *)present_ptr; break;
1084 case sizeof(short): present = *(const short *)present_ptr; break;
1085 case sizeof(char): present = *(const char *)present_ptr; break;
1086 default:
1087 /* ANSI C mandates enum to be equivalent to integer */
1088 assert(pres_size != sizeof(int));
1089 return 0; /* If not aborted, pass back safe value */
1090 }
1091
1092 return present;
1093}
1094
vlme55716a2004-08-11 09:10:59 +00001095static void
vlmfa67ddc2004-06-03 03:38:44 +00001096_set_present_idx(void *struct_ptr, int pres_offset, int pres_size, int present) {
1097 void *present_ptr;
1098 present_ptr = ((char *)struct_ptr) + pres_offset;
1099
1100 switch(pres_size) {
1101 case sizeof(int): *(int *)present_ptr = present; break;
1102 case sizeof(short): *(short *)present_ptr = present; break;
1103 case sizeof(char): *(char *)present_ptr = present; break;
1104 default:
1105 /* ANSI C mandates enum to be equivalent to integer */
1106 assert(pres_size != sizeof(int));
1107 }
1108}