blob: 9b6012ff3995697638c43e6065707096fce3ad96 [file] [log] [blame]
Harald Welte92c45f32010-06-12 18:59:38 +02001/*-
2 * Copyright (c) 2003, 2004, 2005, 2006 Lev Walkin <vlm@lionet.info>.
3 * All rights reserved.
4 * Redistribution and modifications are permitted subject to BSD license.
5 */
6#include <asn_internal.h>
7#include <constr_SET.h>
8
9#ifndef WIN32
10#include <netinet/in.h> /* for ntohl() */
11#else
12#include <winsock2.h> /* for ntohl() */
13#endif
14
15/* Check that all the mandatory members are present */
16static int _SET_is_populated(asn_TYPE_descriptor_t *td, void *st);
17
18/*
19 * Number of bytes left for this structure.
20 * (ctx->left) indicates the number of bytes _transferred_ for the structure.
21 * (size) contains the number of bytes in the buffer passed.
22 */
23#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
24
25/*
26 * If the subprocessor function returns with an indication that it wants
27 * more data, it may well be a fatal decoding problem, because the
28 * size is constrained by the <TLV>'s L, even if the buffer size allows
29 * reading more data.
30 * For example, consider the buffer containing the following TLVs:
31 * <T:5><L:1><V> <T:6>...
32 * The TLV length clearly indicates that one byte is expected in V, but
33 * if the V processor returns with "want more data" even if the buffer
34 * contains way more data than the V processor have seen.
35 */
36#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
37
38/*
39 * This macro "eats" the part of the buffer which is definitely "consumed",
40 * i.e. was correctly converted into local representation or rightfully skipped.
41 */
42#undef ADVANCE
43#define ADVANCE(num_bytes) do { \
44 size_t num = num_bytes; \
45 ptr = ((const char *)ptr) + num;\
46 size -= num; \
47 if(ctx->left >= 0) \
48 ctx->left -= num; \
49 consumed_myself += num; \
50 } while(0)
51
52/*
53 * Switch to the next phase of parsing.
54 */
55#undef NEXT_PHASE
56#define NEXT_PHASE(ctx) do { \
57 ctx->phase++; \
58 ctx->step = 0; \
59 } while(0)
60
61/*
62 * Return a standardized complex structure.
63 */
64#undef RETURN
65#define RETURN(_code) do { \
66 rval.code = _code; \
67 rval.consumed = consumed_myself;\
68 return rval; \
69 } while(0)
70
71/*
72 * Tags are canonically sorted in the tag2element map.
73 */
74static int
75_t2e_cmp(const void *ap, const void *bp) {
76 const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap;
77 const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp;
78
79 int a_class = BER_TAG_CLASS(a->el_tag);
80 int b_class = BER_TAG_CLASS(b->el_tag);
81
82 if(a_class == b_class) {
83 ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag);
84 ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag);
85
86 if(a_value == b_value)
87 return 0;
88 else if(a_value < b_value)
89 return -1;
90 else
91 return 1;
92 } else if(a_class < b_class) {
93 return -1;
94 } else {
95 return 1;
96 }
97}
98
99/*
100 * The decoder of the SET type.
101 */
102asn_dec_rval_t
103SET_decode_ber(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
104 void **struct_ptr, const void *ptr, size_t size, int tag_mode) {
105 /*
106 * Bring closer parts of structure description.
107 */
108 asn_SET_specifics_t *specs = (asn_SET_specifics_t *)td->specifics;
109 asn_TYPE_member_t *elements = td->elements;
110
111 /*
112 * Parts of the structure being constructed.
113 */
114 void *st = *struct_ptr; /* Target structure. */
115 asn_struct_ctx_t *ctx; /* Decoder context */
116
117 ber_tlv_tag_t tlv_tag; /* T from TLV */
118 asn_dec_rval_t rval; /* Return code from subparsers */
119
120 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
121 int edx; /* SET element's index */
122
123 ASN_DEBUG("Decoding %s as SET", td->name);
124
125 if(_ASN_STACK_OVERFLOW_CHECK(opt_codec_ctx))
126 _ASN_DECODE_FAILED;
127
128 /*
129 * Create the target structure if it is not present already.
130 */
131 if(st == 0) {
132 st = *struct_ptr = CALLOC(1, specs->struct_size);
133 if(st == 0) {
134 RETURN(RC_FAIL);
135 }
136 }
137
138 /*
139 * Restore parsing context.
140 */
141 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
142
143 /*
144 * Start to parse where left previously
145 */
146 switch(ctx->phase) {
147 case 0:
148 /*
149 * PHASE 0.
150 * Check that the set of tags associated with given structure
151 * perfectly fits our expectations.
152 */
153
154 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
155 tag_mode, 1, &ctx->left, 0);
156 if(rval.code != RC_OK) {
157 ASN_DEBUG("%s tagging check failed: %d",
158 td->name, rval.code);
159 return rval;
160 }
161
162 if(ctx->left >= 0)
163 ctx->left += rval.consumed; /* ?Substracted below! */
164 ADVANCE(rval.consumed);
165
166 NEXT_PHASE(ctx);
167
168 ASN_DEBUG("Structure advertised %ld bytes, "
169 "buffer contains %ld", (long)ctx->left, (long)size);
170
171 /* Fall through */
172 case 1:
173 /*
174 * PHASE 1.
175 * From the place where we've left it previously,
176 * try to decode the next member from the list of
177 * this structure's elements.
178 * Note that elements in BER may arrive out of
179 * order, yet DER mandates that they shall arive in the
180 * canonical order of their tags. So, there is a room
181 * for optimization.
182 */
183 for(;; ctx->step = 0) {
184 asn_TYPE_tag2member_t *t2m;
185 asn_TYPE_tag2member_t key;
186 void *memb_ptr; /* Pointer to the member */
187 void **memb_ptr2; /* Pointer to that pointer */
188 ssize_t tag_len; /* Length of TLV's T */
189
190 if(ctx->step & 1) {
191 edx = ctx->step >> 1;
192 goto microphase2;
193 }
194
195 /*
196 * MICROPHASE 1: Synchronize decoding.
197 */
198
199 if(ctx->left == 0)
200 /*
201 * No more things to decode.
202 * Exit out of here and check whether all mandatory
203 * elements have been received (in the next phase).
204 */
205 break;
206
207 /*
208 * Fetch the T from TLV.
209 */
210 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
211 switch(tag_len) {
212 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
213 /* Fall through */
214 case -1: RETURN(RC_FAIL);
215 }
216
217 if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) {
218 if(LEFT < 2) {
219 if(SIZE_VIOLATION)
220 RETURN(RC_FAIL);
221 else
222 RETURN(RC_WMORE);
223 } else if(((const uint8_t *)ptr)[1] == 0) {
224 /*
225 * Found the terminator of the
226 * indefinite length structure.
227 * Invoke the generic finalization function.
228 */
229 goto phase3;
230 }
231 }
232
233 key.el_tag = tlv_tag;
234 t2m = (asn_TYPE_tag2member_t *)bsearch(&key,
235 specs->tag2el, specs->tag2el_count,
236 sizeof(specs->tag2el[0]), _t2e_cmp);
237 if(t2m) {
238 /*
239 * Found the element corresponding to the tag.
240 */
241 edx = t2m->el_no;
242 ctx->step = (edx << 1) + 1;
243 ASN_DEBUG("Got tag %s (%s), edx %d",
244 ber_tlv_tag_string(tlv_tag), td->name, edx);
245 } else if(specs->extensible == 0) {
246 ASN_DEBUG("Unexpected tag %s "
247 "in non-extensible SET %s",
248 ber_tlv_tag_string(tlv_tag), td->name);
249 RETURN(RC_FAIL);
250 } else {
251 /* Skip this tag */
252 ssize_t skip;
253
254 ASN_DEBUG("Skipping unknown tag %s",
255 ber_tlv_tag_string(tlv_tag));
256
257 skip = ber_skip_length(opt_codec_ctx,
258 BER_TLV_CONSTRUCTED(ptr),
259 (const char *)ptr + tag_len, LEFT - tag_len);
260
261 switch(skip) {
262 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
263 /* Fall through */
264 case -1: RETURN(RC_FAIL);
265 }
266
267 ADVANCE(skip + tag_len);
268 continue; /* Try again with the next tag */
269 }
270
271 /*
272 * MICROPHASE 2: Invoke the member-specific decoder.
273 */
274 microphase2:
275
276 /*
277 * Check for duplications: must not overwrite
278 * already decoded elements.
279 */
280 if(ASN_SET_ISPRESENT2((char *)st + specs->pres_offset, edx)) {
281 ASN_DEBUG("SET %s: Duplicate element %s (%d)",
282 td->name, elements[edx].name, edx);
283 RETURN(RC_FAIL);
284 }
285
286 /*
287 * Compute the position of the member inside a structure,
288 * and also a type of containment (it may be contained
289 * as pointer or using inline inclusion).
290 */
291 if(elements[edx].flags & ATF_POINTER) {
292 /* Member is a pointer to another structure */
293 memb_ptr2 = (void **)((char *)st + elements[edx].memb_offset);
294 } else {
295 /*
296 * A pointer to a pointer
297 * holding the start of the structure
298 */
299 memb_ptr = (char *)st + elements[edx].memb_offset;
300 memb_ptr2 = &memb_ptr;
301 }
302 /*
303 * Invoke the member fetch routine according to member's type
304 */
305 rval = elements[edx].type->ber_decoder(opt_codec_ctx,
306 elements[edx].type,
307 memb_ptr2, ptr, LEFT,
308 elements[edx].tag_mode);
309 switch(rval.code) {
310 case RC_OK:
311 ASN_SET_MKPRESENT((char *)st + specs->pres_offset, edx);
312 break;
313 case RC_WMORE: /* More data expected */
314 if(!SIZE_VIOLATION) {
315 ADVANCE(rval.consumed);
316 RETURN(RC_WMORE);
317 }
318 /* Fail through */
319 case RC_FAIL: /* Fatal error */
320 RETURN(RC_FAIL);
321 } /* switch(rval) */
322
323 ADVANCE(rval.consumed);
324 } /* for(all structure members) */
325
326 phase3:
327 ctx->phase = 3;
328 /* Fall through */
329 case 3:
330 case 4: /* Only 00 is expected */
331 ASN_DEBUG("SET %s Leftover: %ld, size = %ld",
332 td->name, (long)ctx->left, (long)size);
333
334 /*
335 * Skip everything until the end of the SET.
336 */
337 while(ctx->left) {
338 ssize_t tl, ll;
339
340 tl = ber_fetch_tag(ptr, LEFT, &tlv_tag);
341 switch(tl) {
342 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
343 /* Fall through */
344 case -1: RETURN(RC_FAIL);
345 }
346
347 /*
348 * If expected <0><0>...
349 */
350 if(ctx->left < 0
351 && ((const uint8_t *)ptr)[0] == 0) {
352 if(LEFT < 2) {
353 if(SIZE_VIOLATION)
354 RETURN(RC_FAIL);
355 else
356 RETURN(RC_WMORE);
357 } else if(((const uint8_t *)ptr)[1] == 0) {
358 /*
359 * Correctly finished with <0><0>.
360 */
361 ADVANCE(2);
362 ctx->left++;
363 ctx->phase = 4;
364 continue;
365 }
366 }
367
368 if(specs->extensible == 0 || ctx->phase == 4) {
369 ASN_DEBUG("Unexpected continuation "
370 "of a non-extensible type %s "
371 "(ptr=%02x)",
372 td->name, *(const uint8_t *)ptr);
373 RETURN(RC_FAIL);
374 }
375
376 ll = ber_skip_length(opt_codec_ctx,
377 BER_TLV_CONSTRUCTED(ptr),
378 (const char *)ptr + tl, LEFT - tl);
379 switch(ll) {
380 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
381 /* Fall through */
382 case -1: RETURN(RC_FAIL);
383 }
384
385 ADVANCE(tl + ll);
386 }
387
388 ctx->phase = 5;
389 case 5:
390 /* Check that all mandatory elements are present. */
391 if(!_SET_is_populated(td, st))
392 RETURN(RC_FAIL);
393
394 NEXT_PHASE(ctx);
395 }
396
397 RETURN(RC_OK);
398}
399
400static int
401_SET_is_populated(asn_TYPE_descriptor_t *td, void *st) {
402 asn_SET_specifics_t *specs = (asn_SET_specifics_t *)td->specifics;
403 int edx;
404
405 /*
406 * Check that all mandatory elements are present.
407 */
408 for(edx = 0; edx < td->elements_count;
409 edx += (8 * sizeof(specs->_mandatory_elements[0]))) {
410 unsigned int midx, pres, must;
411
412 midx = edx/(8 * sizeof(specs->_mandatory_elements[0]));
413 pres = ((unsigned int *)((char *)st+specs->pres_offset))[midx];
414 must = ntohl(specs->_mandatory_elements[midx]);
415
416 if((pres & must) == must) {
417 /*
418 * Yes, everything seems to be in place.
419 */
420 } else {
421 ASN_DEBUG("One or more mandatory elements "
422 "of a SET %s %d (%08x.%08x)=%08x "
423 "are not present",
424 td->name,
425 midx,
426 pres,
427 must,
428 (~(pres & must) & must)
429 );
430 return 0;
431 }
432 }
433
434 return 1;
435}
436
437/*
438 * The DER encoder of the SET type.
439 */
440asn_enc_rval_t
441SET_encode_der(asn_TYPE_descriptor_t *td,
442 void *sptr, int tag_mode, ber_tlv_tag_t tag,
443 asn_app_consume_bytes_f *cb, void *app_key) {
444 asn_SET_specifics_t *specs = (asn_SET_specifics_t *)td->specifics;
445 size_t computed_size = 0;
446 asn_enc_rval_t er;
447 int t2m_build_own = (specs->tag2el_count != td->elements_count);
448 asn_TYPE_tag2member_t *t2m;
449 int t2m_count;
450 ssize_t ret;
451 int edx;
452
453 /*
454 * Use existing, or build our own tags map.
455 */
456 if(t2m_build_own) {
457 t2m = (asn_TYPE_tag2member_t *)alloca(
458 td->elements_count * sizeof(t2m[0]));
459 if(!t2m) _ASN_ENCODE_FAILED; /* There are such platforms */
460 t2m_count = 0;
461 } else {
462 /*
463 * There is no untagged CHOICE in this SET.
464 * Employ existing table.
465 */
466 t2m = specs->tag2el;
467 t2m_count = specs->tag2el_count;
468 }
469
470 /*
471 * Gather the length of the underlying members sequence.
472 */
473 for(edx = 0; edx < td->elements_count; edx++) {
474 asn_TYPE_member_t *elm = &td->elements[edx];
475 asn_enc_rval_t tmper;
476 void *memb_ptr;
477
478 /*
479 * Compute the length of the encoding of this member.
480 */
481 if(elm->flags & ATF_POINTER) {
482 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
483 if(!memb_ptr) {
484 if(!elm->optional)
485 /* Mandatory elements missing */
486 _ASN_ENCODE_FAILED;
487 if(t2m_build_own) {
488 t2m[t2m_count].el_no = edx;
489 t2m[t2m_count].el_tag = 0;
490 t2m_count++;
491 }
492 continue;
493 }
494 } else {
495 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
496 }
497 tmper = elm->type->der_encoder(elm->type, memb_ptr,
498 elm->tag_mode, elm->tag,
499 0, 0);
500 if(tmper.encoded == -1)
501 return tmper;
502 computed_size += tmper.encoded;
503
504 /*
505 * Remember the outmost tag of this member.
506 */
507 if(t2m_build_own) {
508 t2m[t2m_count].el_no = edx;
509 t2m[t2m_count].el_tag = asn_TYPE_outmost_tag(
510 elm->type, memb_ptr, elm->tag_mode, elm->tag);
511 t2m_count++;
512 } else {
513 /*
514 * No dynamic sorting is necessary.
515 */
516 }
517 }
518
519 /*
520 * Finalize order of the components.
521 */
522 assert(t2m_count == td->elements_count);
523 if(t2m_build_own) {
524 /*
525 * Sort the underlying members according to their
526 * canonical tags order. DER encoding mandates it.
527 */
528 qsort(t2m, t2m_count, sizeof(specs->tag2el[0]), _t2e_cmp);
529 } else {
530 /*
531 * Tags are already sorted by the compiler.
532 */
533 }
534
535 /*
536 * Encode the TLV for the sequence itself.
537 */
538 ret = der_write_tags(td, computed_size, tag_mode, 1, tag, cb, app_key);
539 if(ret == -1) _ASN_ENCODE_FAILED;
540 er.encoded = computed_size + ret;
541
542 if(!cb) _ASN_ENCODED_OK(er);
543
544 /*
545 * Encode all members.
546 */
547 for(edx = 0; edx < td->elements_count; edx++) {
548 asn_TYPE_member_t *elm;
549 asn_enc_rval_t tmper;
550 void *memb_ptr;
551
552 /* Encode according to the tag order */
553 elm = &td->elements[t2m[edx].el_no];
554
555 if(elm->flags & ATF_POINTER) {
556 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
557 if(!memb_ptr) continue;
558 } else {
559 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
560 }
561 tmper = elm->type->der_encoder(elm->type, memb_ptr,
562 elm->tag_mode, elm->tag,
563 cb, app_key);
564 if(tmper.encoded == -1)
565 return tmper;
566 computed_size -= tmper.encoded;
567 }
568
569 if(computed_size != 0) {
570 /*
571 * Encoded size is not equal to the computed size.
572 */
573 _ASN_ENCODE_FAILED;
574 }
575
576 _ASN_ENCODED_OK(er);
577}
578
579#undef XER_ADVANCE
580#define XER_ADVANCE(num_bytes) do { \
581 size_t num = num_bytes; \
582 buf_ptr = ((const char *)buf_ptr) + num;\
583 size -= num; \
584 consumed_myself += num; \
585 } while(0)
586
587/*
588 * Decode the XER (XML) data.
589 */
590asn_dec_rval_t
591SET_decode_xer(asn_codec_ctx_t *opt_codec_ctx, asn_TYPE_descriptor_t *td,
592 void **struct_ptr, const char *opt_mname,
593 const void *buf_ptr, size_t size) {
594 /*
595 * Bring closer parts of structure description.
596 */
597 asn_SET_specifics_t *specs = (asn_SET_specifics_t *)td->specifics;
598 asn_TYPE_member_t *elements = td->elements;
599 const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
600
601 /*
602 * ... and parts of the structure being constructed.
603 */
604 void *st = *struct_ptr; /* Target structure. */
605 asn_struct_ctx_t *ctx; /* Decoder context */
606
607 asn_dec_rval_t rval; /* Return value from a decoder */
608 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
609 int edx; /* Element index */
610
611 /*
612 * Create the target structure if it is not present already.
613 */
614 if(st == 0) {
615 st = *struct_ptr = CALLOC(1, specs->struct_size);
616 if(st == 0) RETURN(RC_FAIL);
617 }
618
619 /*
620 * Restore parsing context.
621 */
622 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
623
624 /*
625 * Phases of XER/XML processing:
626 * Phase 0: Check that the opening tag matches our expectations.
627 * Phase 1: Processing body and reacting on closing tag.
628 * Phase 2: Processing inner type.
629 * Phase 3: Skipping unknown extensions.
630 * Phase 4: PHASED OUT
631 */
632 for(edx = ctx->step; ctx->phase <= 3;) {
633 pxer_chunk_type_e ch_type; /* XER chunk type */
634 ssize_t ch_size; /* Chunk size */
635 xer_check_tag_e tcv; /* Tag check value */
636 asn_TYPE_member_t *elm;
637
638 /*
639 * Go inside the inner member of a set.
640 */
641 if(ctx->phase == 2) {
642 asn_dec_rval_t tmprval;
643 void *memb_ptr; /* Pointer to the member */
644 void **memb_ptr2; /* Pointer to that pointer */
645
646 if(ASN_SET_ISPRESENT2((char *)st + specs->pres_offset,
647 edx)) {
648 ASN_DEBUG("SET %s: Duplicate element %s (%d)",
649 td->name, elements[edx].name, edx);
650 RETURN(RC_FAIL);
651 }
652
653 elm = &elements[edx];
654
655 if(elm->flags & ATF_POINTER) {
656 /* Member is a pointer to another structure */
657 memb_ptr2 = (void **)((char *)st
658 + elm->memb_offset);
659 } else {
660 memb_ptr = (char *)st + elm->memb_offset;
661 memb_ptr2 = &memb_ptr;
662 }
663
664 /* Invoke the inner type decoder, m.b. multiple times */
665 tmprval = elm->type->xer_decoder(opt_codec_ctx,
666 elm->type, memb_ptr2, elm->name,
667 buf_ptr, size);
668 XER_ADVANCE(tmprval.consumed);
669 if(tmprval.code != RC_OK)
670 RETURN(tmprval.code);
671 ctx->phase = 1; /* Back to body processing */
672 ASN_SET_MKPRESENT((char *)st + specs->pres_offset, edx);
673 ASN_DEBUG("XER/SET phase => %d", ctx->phase);
674 /* Fall through */
675 }
676
677 /*
678 * Get the next part of the XML stream.
679 */
680 ch_size = xer_next_token(&ctx->context,
681 buf_ptr, size, &ch_type);
682 switch(ch_size) {
683 case -1: RETURN(RC_FAIL);
684 case 0: RETURN(RC_WMORE);
685 default:
686 switch(ch_type) {
687 case PXER_COMMENT: /* Got XML comment */
688 case PXER_TEXT: /* Ignore free-standing text */
689 XER_ADVANCE(ch_size); /* Skip silently */
690 continue;
691 case PXER_TAG:
692 break; /* Check the rest down there */
693 }
694 }
695
696 tcv = xer_check_tag(buf_ptr, ch_size, xml_tag);
697 ASN_DEBUG("XER/SET: tcv = %d, ph=%d", tcv, ctx->phase);
698
699 /* Skip the extensions section */
700 if(ctx->phase == 3) {
701 switch(xer_skip_unknown(tcv, &ctx->left)) {
702 case -1:
703 ctx->phase = 4;
704 RETURN(RC_FAIL);
705 case 1:
706 ctx->phase = 1;
707 /* Fall through */
708 case 0:
709 XER_ADVANCE(ch_size);
710 continue;
711 case 2:
712 ctx->phase = 1;
713 break;
714 }
715 }
716
717 switch(tcv) {
718 case XCT_CLOSING:
719 if(ctx->phase == 0) break;
720 ctx->phase = 0;
721 /* Fall through */
722 case XCT_BOTH:
723 if(ctx->phase == 0) {
724 if(_SET_is_populated(td, st)) {
725 XER_ADVANCE(ch_size);
726 ctx->phase = 4; /* Phase out */
727 RETURN(RC_OK);
728 } else {
729 ASN_DEBUG("Premature end of XER SET");
730 RETURN(RC_FAIL);
731 }
732 }
733 /* Fall through */
734 case XCT_OPENING:
735 if(ctx->phase == 0) {
736 XER_ADVANCE(ch_size);
737 ctx->phase = 1; /* Processing body phase */
738 continue;
739 }
740 /* Fall through */
741 case XCT_UNKNOWN_OP:
742 case XCT_UNKNOWN_BO:
743
744 ASN_DEBUG("XER/SET: tcv=%d, ph=%d", tcv, ctx->phase);
745 if(ctx->phase != 1)
746 break; /* Really unexpected */
747
748 /*
749 * Search which member corresponds to this tag.
750 */
751 for(edx = 0; edx < td->elements_count; edx++) {
752 switch(xer_check_tag(buf_ptr, ch_size,
753 elements[edx].name)) {
754 case XCT_BOTH:
755 case XCT_OPENING:
756 /*
757 * Process this member.
758 */
759 ctx->step = edx;
760 ctx->phase = 2;
761 break;
762 case XCT_UNKNOWN_OP:
763 case XCT_UNKNOWN_BO:
764 continue;
765 default:
766 edx = td->elements_count;
767 break; /* Phase out */
768 }
769 break;
770 }
771 if(edx != td->elements_count)
772 continue;
773
774 /* It is expected extension */
775 if(specs->extensible) {
776 ASN_DEBUG("Got anticipated extension");
777 /*
778 * Check for (XCT_BOTH or XCT_UNKNOWN_BO)
779 * By using a mask. Only record a pure
780 * <opening> tags.
781 */
782 if(tcv & XCT_CLOSING) {
783 /* Found </extension> without body */
784 } else {
785 ctx->left = 1;
786 ctx->phase = 3; /* Skip ...'s */
787 }
788 XER_ADVANCE(ch_size);
789 continue;
790 }
791
792 /* Fall through */
793 default:
794 break;
795 }
796
797 ASN_DEBUG("Unexpected XML tag in SET, expected \"%s\"",
798 xml_tag);
799 break;
800 }
801
802 ctx->phase = 4; /* "Phase out" on hard failure */
803 RETURN(RC_FAIL);
804}
805
806asn_enc_rval_t
807SET_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
808 int ilevel, enum xer_encoder_flags_e flags,
809 asn_app_consume_bytes_f *cb, void *app_key) {
810 asn_SET_specifics_t *specs = (asn_SET_specifics_t *)td->specifics;
811 asn_enc_rval_t er;
812 int xcan = (flags & XER_F_CANONICAL);
813 asn_TYPE_tag2member_t *t2m = specs->tag2el_cxer;
814 int t2m_count = specs->tag2el_cxer_count;
815 int edx;
816
817 if(!sptr)
818 _ASN_ENCODE_FAILED;
819
820 assert(t2m_count == td->elements_count);
821
822 er.encoded = 0;
823
824 for(edx = 0; edx < t2m_count; edx++) {
825 asn_enc_rval_t tmper;
826 asn_TYPE_member_t *elm;
827 void *memb_ptr;
828 const char *mname;
829 unsigned int mlen;
830
831 elm = &td->elements[t2m[edx].el_no];
832 mname = elm->name;
833 mlen = strlen(elm->name);
834
835 if(elm->flags & ATF_POINTER) {
836 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
837 if(!memb_ptr) {
838 if(elm->optional)
839 continue;
840 /* Mandatory element missing */
841 _ASN_ENCODE_FAILED;
842 }
843 } else {
844 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
845 }
846
847 if(!xcan)
848 _i_ASN_TEXT_INDENT(1, ilevel);
849 _ASN_CALLBACK3("<", 1, mname, mlen, ">", 1);
850
851 /* Print the member itself */
852 tmper = elm->type->xer_encoder(elm->type, memb_ptr,
853 ilevel + 1, flags, cb, app_key);
854 if(tmper.encoded == -1) return tmper;
855
856 _ASN_CALLBACK3("</", 2, mname, mlen, ">", 1);
857
858 er.encoded += 5 + (2 * mlen) + tmper.encoded;
859 }
860
861 if(!xcan) _i_ASN_TEXT_INDENT(1, ilevel - 1);
862
863 _ASN_ENCODED_OK(er);
864cb_failed:
865 _ASN_ENCODE_FAILED;
866}
867
868int
869SET_print(asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
870 asn_app_consume_bytes_f *cb, void *app_key) {
871 int edx;
872 int ret;
873
874 if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
875
876 /* Dump preamble */
877 if(cb(td->name, strlen(td->name), app_key) < 0
878 || cb(" ::= {", 6, app_key) < 0)
879 return -1;
880
881 for(edx = 0; edx < td->elements_count; edx++) {
882 asn_TYPE_member_t *elm = &td->elements[edx];
883 const void *memb_ptr;
884
885 if(elm->flags & ATF_POINTER) {
886 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
887 if(!memb_ptr) {
888 if(elm->optional) continue;
889 /* Print <absent> line */
890 /* Fall through */
891 }
892 } else {
893 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
894 }
895
896 _i_INDENT(1);
897
898 /* Print the member's name and stuff */
899 if(cb(elm->name, strlen(elm->name), app_key) < 0
900 || cb(": ", 2, app_key) < 0)
901 return -1;
902
903 /* Print the member itself */
904 ret = elm->type->print_struct(elm->type, memb_ptr, ilevel + 1,
905 cb, app_key);
906 if(ret) return ret;
907 }
908
909 ilevel--;
910 _i_INDENT(1);
911
912 return (cb("}", 1, app_key) < 0) ? -1 : 0;
913}
914
915void
916SET_free(asn_TYPE_descriptor_t *td, void *ptr, int contents_only) {
917 int edx;
918
919 if(!td || !ptr)
920 return;
921
922 ASN_DEBUG("Freeing %s as SET", td->name);
923
924 for(edx = 0; edx < td->elements_count; edx++) {
925 asn_TYPE_member_t *elm = &td->elements[edx];
926 void *memb_ptr;
927 if(elm->flags & ATF_POINTER) {
928 memb_ptr = *(void **)((char *)ptr + elm->memb_offset);
929 if(memb_ptr)
930 ASN_STRUCT_FREE(*elm->type, memb_ptr);
931 } else {
932 memb_ptr = (void *)((char *)ptr + elm->memb_offset);
933 ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr);
934 }
935 }
936
937 if(!contents_only) {
938 FREEMEM(ptr);
939 }
940}
941
942int
943SET_constraint(asn_TYPE_descriptor_t *td, const void *sptr,
944 asn_app_constraint_failed_f *ctfailcb, void *app_key) {
945 int edx;
946
947 if(!sptr) {
948 _ASN_CTFAIL(app_key, td,
949 "%s: value not given (%s:%d)",
950 td->name, __FILE__, __LINE__);
951 return -1;
952 }
953
954 /*
955 * Iterate over structure members and check their validity.
956 */
957 for(edx = 0; edx < td->elements_count; edx++) {
958 asn_TYPE_member_t *elm = &td->elements[edx];
959 const void *memb_ptr;
960
961 if(elm->flags & ATF_POINTER) {
962 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
963 if(!memb_ptr) {
964 if(elm->optional)
965 continue;
966 _ASN_CTFAIL(app_key, td,
967 "%s: mandatory element %s absent (%s:%d)",
968 td->name, elm->name, __FILE__, __LINE__);
969 return -1;
970 }
971 } else {
972 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
973 }
974
975 if(elm->memb_constraints) {
976 int ret = elm->memb_constraints(elm->type, memb_ptr,
977 ctfailcb, app_key);
978 if(ret) return ret;
979 } else {
980 int ret = elm->type->check_constraints(elm->type,
981 memb_ptr, ctfailcb, app_key);
982 if(ret) return ret;
983 /*
984 * Cannot inherit it earlier:
985 * need to make sure we get the updated version.
986 */
987 elm->memb_constraints = elm->type->check_constraints;
988 }
989 }
990
991 return 0;
992}