| |
| /* |
| * Copyright (c) 2003-2017 Lev Walkin <vlm@lionet.info>. |
| * All rights reserved. |
| * Redistribution and modifications are permitted subject to BSD license. |
| */ |
| #include <asn_internal.h> |
| #include <constr_SEQUENCE.h> |
| #include <OPEN_TYPE.h> |
| #include <per_opentype.h> |
| |
| /* |
| * Number of bytes left for this structure. |
| * (ctx->left) indicates the number of bytes _transferred_ for the structure. |
| * (size) contains the number of bytes in the buffer passed. |
| */ |
| #define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left) |
| |
| /* |
| * If the subprocessor function returns with an indication that it wants |
| * more data, it may well be a fatal decoding problem, because the |
| * size is constrained by the <TLV>'s L, even if the buffer size allows |
| * reading more data. |
| * For example, consider the buffer containing the following TLVs: |
| * <T:5><L:1><V> <T:6>... |
| * The TLV length clearly indicates that one byte is expected in V, but |
| * if the V processor returns with "want more data" even if the buffer |
| * contains way more data than the V processor have seen. |
| */ |
| #define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size) |
| |
| /* |
| * This macro "eats" the part of the buffer which is definitely "consumed", |
| * i.e. was correctly converted into local representation or rightfully skipped. |
| */ |
| #undef ADVANCE |
| #define ADVANCE(num_bytes) do { \ |
| size_t num = num_bytes; \ |
| ptr = ((const char *)ptr) + num; \ |
| size -= num; \ |
| if(ctx->left >= 0) \ |
| ctx->left -= num; \ |
| consumed_myself += num; \ |
| } while(0) |
| |
| /* |
| * Switch to the next phase of parsing. |
| */ |
| #undef NEXT_PHASE |
| #undef PHASE_OUT |
| #define NEXT_PHASE(ctx) do { \ |
| ctx->phase++; \ |
| ctx->step = 0; \ |
| } while(0) |
| #define PHASE_OUT(ctx) do { ctx->phase = 10; } while(0) |
| |
| /* |
| * Return a standardized complex structure. |
| */ |
| #undef RETURN |
| #define RETURN(_code) do { \ |
| rval.code = _code; \ |
| rval.consumed = consumed_myself;\ |
| return rval; \ |
| } while(0) |
| |
| /* |
| * Check whether we are inside the extensions group. |
| */ |
| #define IN_EXTENSION_GROUP(specs, memb_idx) \ |
| ((specs)->first_extension >= 0 \ |
| && (unsigned)(specs)->first_extension <= (memb_idx)) |
| |
| /* |
| * Tags are canonically sorted in the tag2element map. |
| */ |
| static int |
| _t2e_cmp(const void *ap, const void *bp) { |
| const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap; |
| const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp; |
| |
| int a_class = BER_TAG_CLASS(a->el_tag); |
| int b_class = BER_TAG_CLASS(b->el_tag); |
| |
| if(a_class == b_class) { |
| ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag); |
| ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag); |
| |
| if(a_value == b_value) { |
| if(a->el_no > b->el_no) |
| return 1; |
| /* |
| * Important: we do not check |
| * for a->el_no <= b->el_no! |
| */ |
| return 0; |
| } else if(a_value < b_value) |
| return -1; |
| else |
| return 1; |
| } else if(a_class < b_class) { |
| return -1; |
| } else { |
| return 1; |
| } |
| } |
| |
| |
| /* |
| * The decoder of the SEQUENCE type. |
| */ |
| asn_dec_rval_t |
| SEQUENCE_decode_ber(const asn_codec_ctx_t *opt_codec_ctx, |
| const asn_TYPE_descriptor_t *td, void **struct_ptr, |
| const void *ptr, size_t size, int tag_mode) { |
| /* |
| * Bring closer parts of structure description. |
| */ |
| const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics; |
| const asn_TYPE_member_t *elements = td->elements; |
| |
| /* |
| * Parts of the structure being constructed. |
| */ |
| void *st = *struct_ptr; /* Target structure. */ |
| asn_struct_ctx_t *ctx; /* Decoder context */ |
| |
| ber_tlv_tag_t tlv_tag; /* T from TLV */ |
| asn_dec_rval_t rval; /* Return code from subparsers */ |
| |
| ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ |
| size_t edx; /* SEQUENCE element's index */ |
| |
| ASN_DEBUG("Decoding %s as SEQUENCE", td->name); |
| |
| /* |
| * Create the target structure if it is not present already. |
| */ |
| if(st == 0) { |
| st = *struct_ptr = CALLOC(1, specs->struct_size); |
| if(st == 0) { |
| RETURN(RC_FAIL); |
| } |
| } |
| |
| /* |
| * Restore parsing context. |
| */ |
| ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); |
| |
| /* |
| * Start to parse where left previously |
| */ |
| switch(ctx->phase) { |
| case 0: |
| /* |
| * PHASE 0. |
| * Check that the set of tags associated with given structure |
| * perfectly fits our expectations. |
| */ |
| |
| rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size, |
| tag_mode, 1, &ctx->left, 0); |
| if(rval.code != RC_OK) { |
| ASN_DEBUG("%s tagging check failed: %d", |
| td->name, rval.code); |
| return rval; |
| } |
| |
| if(ctx->left >= 0) |
| ctx->left += rval.consumed; /* ?Substracted below! */ |
| ADVANCE(rval.consumed); |
| |
| NEXT_PHASE(ctx); |
| |
| ASN_DEBUG("Structure consumes %ld bytes, buffer %ld", |
| (long)ctx->left, (long)size); |
| |
| /* Fall through */ |
| case 1: |
| /* |
| * PHASE 1. |
| * From the place where we've left it previously, |
| * try to decode the next member from the list of |
| * this structure's elements. |
| * (ctx->step) stores the member being processed |
| * between invocations and the microphase {0,1} of parsing |
| * that member: |
| * step = (<member_number> * 2 + <microphase>). |
| */ |
| for(edx = ((size_t)ctx->step >> 1); edx < td->elements_count; |
| edx++, ctx->step = (ctx->step & ~1) + 2) { |
| void *memb_ptr; /* Pointer to the member */ |
| void **memb_ptr2; /* Pointer to that pointer */ |
| ssize_t tag_len; /* Length of TLV's T */ |
| size_t opt_edx_end; /* Next non-optional element */ |
| size_t n; |
| int use_bsearch; |
| |
| if(ctx->step & 1) |
| goto microphase2; |
| |
| /* |
| * MICROPHASE 1: Synchronize decoding. |
| */ |
| ASN_DEBUG("In %s SEQUENCE left %d, edx=%" ASN_PRI_SIZE " flags=%d" |
| " opt=%d ec=%d", |
| td->name, (int)ctx->left, edx, |
| elements[edx].flags, elements[edx].optional, |
| td->elements_count); |
| |
| if(ctx->left == 0 /* No more stuff is expected */ |
| && ( |
| /* Explicit OPTIONAL specification reaches the end */ |
| (edx + elements[edx].optional == td->elements_count) || |
| /* All extensions are optional */ |
| IN_EXTENSION_GROUP(specs, edx))) { |
| ASN_DEBUG("End of SEQUENCE %s", td->name); |
| /* |
| * Found the legitimate end of the structure. |
| */ |
| PHASE_OUT(ctx); |
| RETURN(RC_OK); |
| } |
| |
| /* |
| * Fetch the T from TLV. |
| */ |
| tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag); |
| ASN_DEBUG("Current tag in %s SEQUENCE for element %" ASN_PRI_SIZE " " |
| "(%s) is %s encoded in %d bytes, of frame %ld", |
| td->name, edx, elements[edx].name, |
| ber_tlv_tag_string(tlv_tag), (int)tag_len, (long)LEFT); |
| switch(tag_len) { |
| case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE); |
| /* Fall through */ |
| case -1: RETURN(RC_FAIL); |
| } |
| |
| if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) { |
| if(LEFT < 2) { |
| if(SIZE_VIOLATION) { |
| RETURN(RC_FAIL); |
| } else { |
| RETURN(RC_WMORE); |
| } |
| } else if(((const uint8_t *)ptr)[1] == 0) { |
| ASN_DEBUG("edx = %" ASN_PRI_SIZE ", opt = %d, ec=%d", edx, |
| elements[edx].optional, td->elements_count); |
| if((edx + elements[edx].optional == td->elements_count) |
| || IN_EXTENSION_GROUP(specs, edx)) { |
| /* |
| * Yeah, baby! Found the terminator |
| * of the indefinite length structure. |
| */ |
| /* |
| * Proceed to the canonical |
| * finalization function. |
| * No advancing is necessary. |
| */ |
| goto phase3; |
| } |
| } |
| } |
| |
| /* |
| * Find the next available type with this tag. |
| */ |
| use_bsearch = 0; |
| opt_edx_end = edx + elements[edx].optional + 1; |
| if(opt_edx_end > td->elements_count) |
| opt_edx_end = td->elements_count; /* Cap */ |
| else if(opt_edx_end - edx > 8) { |
| /* Limit the scope of linear search... */ |
| opt_edx_end = edx + 8; |
| use_bsearch = 1; |
| /* ... and resort to bsearch() */ |
| } |
| for(n = edx; n < opt_edx_end; n++) { |
| if(BER_TAGS_EQUAL(tlv_tag, elements[n].tag)) { |
| /* |
| * Found element corresponding to the tag |
| * being looked at. |
| * Reposition over the right element. |
| */ |
| edx = n; |
| ctx->step = 1 + 2 * edx; /* Remember! */ |
| goto microphase2; |
| } else if(elements[n].flags & ATF_ANY_TYPE) { |
| /* |
| * This is the ANY type, which may bear |
| * any flag whatsoever. |
| */ |
| edx = n; |
| ctx->step = 1 + 2 * edx; /* Remember! */ |
| goto microphase2; |
| } else if(elements[n].tag == (ber_tlv_tag_t)-1) { |
| use_bsearch = 1; |
| break; |
| } |
| } |
| if(use_bsearch) { |
| /* |
| * Resort to a binary search over |
| * sorted array of tags. |
| */ |
| const asn_TYPE_tag2member_t *t2m; |
| asn_TYPE_tag2member_t key = {0, 0, 0, 0}; |
| key.el_tag = tlv_tag; |
| key.el_no = edx; |
| t2m = (const asn_TYPE_tag2member_t *)bsearch(&key, |
| specs->tag2el, specs->tag2el_count, |
| sizeof(specs->tag2el[0]), _t2e_cmp); |
| if(t2m) { |
| const asn_TYPE_tag2member_t *best = 0; |
| const asn_TYPE_tag2member_t *t2m_f, *t2m_l; |
| size_t edx_max = edx + elements[edx].optional; |
| /* |
| * Rewind to the first element with that tag, |
| * `cause bsearch() does not guarantee order. |
| */ |
| t2m_f = t2m + t2m->toff_first; |
| t2m_l = t2m + t2m->toff_last; |
| for(t2m = t2m_f; t2m <= t2m_l; t2m++) { |
| if(t2m->el_no > edx_max) break; |
| if(t2m->el_no < edx) continue; |
| best = t2m; |
| } |
| if(best) { |
| edx = best->el_no; |
| ctx->step = 1 + 2 * edx; |
| goto microphase2; |
| } |
| } |
| n = opt_edx_end; |
| } |
| if(n == opt_edx_end) { |
| /* |
| * If tag is unknown, it may be either |
| * an unknown (thus, incorrect) tag, |
| * or an extension (...), |
| * or an end of the indefinite-length structure. |
| */ |
| if(!IN_EXTENSION_GROUP(specs, |
| edx + elements[edx].optional)) { |
| ASN_DEBUG("Unexpected tag %s (at %" ASN_PRI_SIZE ")", |
| ber_tlv_tag_string(tlv_tag), edx); |
| ASN_DEBUG("Expected tag %s (%s)%s", |
| ber_tlv_tag_string(elements[edx].tag), |
| elements[edx].name, |
| elements[edx].optional |
| ?" or alternatives":""); |
| RETURN(RC_FAIL); |
| } else { |
| /* Skip this tag */ |
| ssize_t skip; |
| edx += elements[edx].optional; |
| |
| ASN_DEBUG("Skipping unexpected %s (at %" ASN_PRI_SIZE ")", |
| ber_tlv_tag_string(tlv_tag), edx); |
| skip = ber_skip_length(opt_codec_ctx, |
| BER_TLV_CONSTRUCTED(ptr), |
| (const char *)ptr + tag_len, |
| LEFT - tag_len); |
| ASN_DEBUG("Skip length %d in %s", |
| (int)skip, td->name); |
| switch(skip) { |
| case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE); |
| /* Fall through */ |
| case -1: RETURN(RC_FAIL); |
| } |
| |
| ADVANCE(skip + tag_len); |
| ctx->step -= 2; |
| edx--; |
| continue; /* Try again with the next tag */ |
| } |
| } |
| |
| /* |
| * MICROPHASE 2: Invoke the member-specific decoder. |
| */ |
| ctx->step |= 1; /* Confirm entering next microphase */ |
| microphase2: |
| ASN_DEBUG("Inside SEQUENCE %s MF2", td->name); |
| |
| /* |
| * Compute the position of the member inside a structure, |
| * and also a type of containment (it may be contained |
| * as pointer or using inline inclusion). |
| */ |
| if(elements[edx].flags & ATF_POINTER) { |
| /* Member is a pointer to another structure */ |
| memb_ptr2 = (void **)((char *)st + elements[edx].memb_offset); |
| } else { |
| /* |
| * A pointer to a pointer |
| * holding the start of the structure |
| */ |
| memb_ptr = (char *)st + elements[edx].memb_offset; |
| memb_ptr2 = &memb_ptr; |
| } |
| /* |
| * Invoke the member fetch routine according to member's type |
| */ |
| if(elements[edx].flags & ATF_OPEN_TYPE) { |
| rval = OPEN_TYPE_ber_get(opt_codec_ctx, td, st, &elements[edx], ptr, LEFT); |
| } else { |
| rval = elements[edx].type->op->ber_decoder(opt_codec_ctx, |
| elements[edx].type, |
| memb_ptr2, ptr, LEFT, |
| elements[edx].tag_mode); |
| } |
| ASN_DEBUG("In %s SEQUENCE decoded %" ASN_PRI_SIZE " %s of %d " |
| "in %d bytes rval.code %d, size=%d", |
| td->name, edx, elements[edx].type->name, |
| (int)LEFT, (int)rval.consumed, rval.code, (int)size); |
| switch(rval.code) { |
| case RC_OK: |
| break; |
| case RC_WMORE: /* More data expected */ |
| if(!SIZE_VIOLATION) { |
| ADVANCE(rval.consumed); |
| RETURN(RC_WMORE); |
| } |
| ASN_DEBUG("Size violation (c->l=%ld <= s=%ld)", |
| (long)ctx->left, (long)size); |
| /* Fall through */ |
| case RC_FAIL: /* Fatal error */ |
| RETURN(RC_FAIL); |
| } /* switch(rval) */ |
| |
| ADVANCE(rval.consumed); |
| } /* for(all structure members) */ |
| |
| phase3: |
| ctx->phase = 3; |
| /* Fall through */ |
| case 3: /* 00 and other tags expected */ |
| case 4: /* only 00's expected */ |
| |
| ASN_DEBUG("SEQUENCE %s Leftover: %ld, size = %ld", |
| td->name, (long)ctx->left, (long)size); |
| |
| /* |
| * Skip everything until the end of the SEQUENCE. |
| */ |
| while(ctx->left) { |
| ssize_t tl, ll; |
| |
| tl = ber_fetch_tag(ptr, LEFT, &tlv_tag); |
| switch(tl) { |
| case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE); |
| /* Fall through */ |
| case -1: RETURN(RC_FAIL); |
| } |
| |
| /* |
| * If expected <0><0>... |
| */ |
| if(ctx->left < 0 |
| && ((const uint8_t *)ptr)[0] == 0) { |
| if(LEFT < 2) { |
| if(SIZE_VIOLATION) |
| RETURN(RC_FAIL); |
| else |
| RETURN(RC_WMORE); |
| } else if(((const uint8_t *)ptr)[1] == 0) { |
| /* |
| * Correctly finished with <0><0>. |
| */ |
| ADVANCE(2); |
| ctx->left++; |
| ctx->phase = 4; |
| continue; |
| } |
| } |
| |
| if(!IN_EXTENSION_GROUP(specs, td->elements_count) |
| || ctx->phase == 4) { |
| ASN_DEBUG("Unexpected continuation " |
| "of a non-extensible type " |
| "%s (SEQUENCE): %s", |
| td->name, |
| ber_tlv_tag_string(tlv_tag)); |
| RETURN(RC_FAIL); |
| } |
| |
| ll = ber_skip_length(opt_codec_ctx, |
| BER_TLV_CONSTRUCTED(ptr), |
| (const char *)ptr + tl, LEFT - tl); |
| switch(ll) { |
| case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE); |
| /* Fall through */ |
| case -1: RETURN(RC_FAIL); |
| } |
| |
| ADVANCE(tl + ll); |
| } |
| |
| PHASE_OUT(ctx); |
| } |
| |
| RETURN(RC_OK); |
| } |
| |
| |
| /* |
| * The DER encoder of the SEQUENCE type. |
| */ |
| asn_enc_rval_t |
| SEQUENCE_encode_der(const asn_TYPE_descriptor_t *td, const void *sptr, |
| int tag_mode, ber_tlv_tag_t tag, |
| asn_app_consume_bytes_f *cb, void *app_key) { |
| size_t computed_size = 0; |
| asn_enc_rval_t erval = {0,0,0}; |
| ssize_t ret; |
| size_t edx; |
| |
| ASN_DEBUG("%s %s as SEQUENCE", |
| cb?"Encoding":"Estimating", td->name); |
| |
| /* |
| * Gather the length of the underlying members sequence. |
| */ |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| |
| const void *memb_ptr; /* Pointer to the member */ |
| const void *const *memb_ptr2; /* Pointer to that pointer */ |
| |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = |
| (const void *const *)((const char *)sptr + elm->memb_offset); |
| if(!*memb_ptr2) { |
| ASN_DEBUG("Element %s %" ASN_PRI_SIZE " not present", |
| elm->name, edx); |
| if(elm->optional) |
| continue; |
| /* Mandatory element is missing */ |
| ASN__ENCODE_FAILED; |
| } |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| /* Eliminate default values */ |
| if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0) |
| continue; |
| |
| erval = elm->type->op->der_encoder(elm->type, *memb_ptr2, |
| elm->tag_mode, elm->tag, |
| 0, 0); |
| if(erval.encoded == -1) |
| return erval; |
| computed_size += erval.encoded; |
| ASN_DEBUG("Member %" ASN_PRI_SIZE " %s estimated %ld bytes", |
| edx, elm->name, (long)erval.encoded); |
| } |
| |
| /* |
| * Encode the TLV for the sequence itself. |
| */ |
| ret = der_write_tags(td, computed_size, tag_mode, 1, tag, cb, app_key); |
| ASN_DEBUG("Wrote tags: %ld (+%ld)", (long)ret, (long)computed_size); |
| if(ret == -1) |
| ASN__ENCODE_FAILED; |
| erval.encoded = computed_size + ret; |
| |
| if(!cb) ASN__ENCODED_OK(erval); |
| |
| /* |
| * Encode all members. |
| */ |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| asn_enc_rval_t tmperval = {0,0,0}; |
| const void *memb_ptr; /* Pointer to the member */ |
| const void *const *memb_ptr2; /* Pointer to that pointer */ |
| |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = |
| (const void *const *)((const char *)sptr + elm->memb_offset); |
| if(!*memb_ptr2) continue; |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| /* Eliminate default values */ |
| if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0) |
| continue; |
| |
| tmperval = elm->type->op->der_encoder(elm->type, *memb_ptr2, |
| elm->tag_mode, elm->tag, cb, app_key); |
| if(tmperval.encoded == -1) |
| return tmperval; |
| computed_size -= tmperval.encoded; |
| ASN_DEBUG("Member %" ASN_PRI_SIZE " %s of SEQUENCE %s encoded in %ld bytes", |
| edx, elm->name, td->name, (long)tmperval.encoded); |
| } |
| |
| if(computed_size != 0) |
| /* |
| * Encoded size is not equal to the computed size. |
| */ |
| ASN__ENCODE_FAILED; |
| |
| ASN__ENCODED_OK(erval); |
| } |
| |
| |
| #undef XER_ADVANCE |
| #define XER_ADVANCE(num_bytes) \ |
| do { \ |
| size_t num = (num_bytes); \ |
| ptr = ((const char *)ptr) + num; \ |
| size -= num; \ |
| consumed_myself += num; \ |
| } while(0) |
| |
| /* |
| * Decode the XER (XML) data. |
| */ |
| asn_dec_rval_t |
| SEQUENCE_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, |
| const asn_TYPE_descriptor_t *td, void **struct_ptr, |
| const char *opt_mname, const void *ptr, size_t size) { |
| /* |
| * Bring closer parts of structure description. |
| */ |
| const asn_SEQUENCE_specifics_t *specs |
| = (const asn_SEQUENCE_specifics_t *)td->specifics; |
| asn_TYPE_member_t *elements = td->elements; |
| const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; |
| |
| /* |
| * ... and parts of the structure being constructed. |
| */ |
| void *st = *struct_ptr; /* Target structure. */ |
| asn_struct_ctx_t *ctx; /* Decoder context */ |
| |
| asn_dec_rval_t rval; /* Return value from a decoder */ |
| ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ |
| size_t edx; /* Element index */ |
| |
| /* |
| * Create the target structure if it is not present already. |
| */ |
| if(st == 0) { |
| st = *struct_ptr = CALLOC(1, specs->struct_size); |
| if(st == 0) RETURN(RC_FAIL); |
| } |
| |
| /* |
| * Restore parsing context. |
| */ |
| ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); |
| |
| |
| /* |
| * Phases of XER/XML processing: |
| * Phase 0: Check that the opening tag matches our expectations. |
| * Phase 1: Processing body and reacting on closing tag. |
| * Phase 2: Processing inner type. |
| * Phase 3: Skipping unknown extensions. |
| * Phase 4: PHASED OUT |
| */ |
| for(edx = ctx->step; ctx->phase <= 3;) { |
| pxer_chunk_type_e ch_type; /* XER chunk type */ |
| ssize_t ch_size; /* Chunk size */ |
| xer_check_tag_e tcv; /* Tag check value */ |
| asn_TYPE_member_t *elm; |
| |
| /* |
| * Go inside the inner member of a sequence. |
| */ |
| if(ctx->phase == 2) { |
| asn_dec_rval_t tmprval; |
| void *memb_ptr_dontuse; /* Pointer to the member */ |
| void **memb_ptr2; /* Pointer to that pointer */ |
| |
| elm = &td->elements[edx]; |
| |
| if(elm->flags & ATF_POINTER) { |
| /* Member is a pointer to another structure */ |
| memb_ptr2 = (void **)((char *)st + elm->memb_offset); |
| } else { |
| memb_ptr_dontuse = (char *)st + elm->memb_offset; |
| memb_ptr2 = &memb_ptr_dontuse; /* Only use of memb_ptr_dontuse */ |
| } |
| |
| if(elm->flags & ATF_OPEN_TYPE) { |
| tmprval = OPEN_TYPE_xer_get(opt_codec_ctx, td, st, elm, ptr, size); |
| } else { |
| /* Invoke the inner type decoder, m.b. multiple times */ |
| tmprval = elm->type->op->xer_decoder(opt_codec_ctx, |
| elm->type, memb_ptr2, elm->name, |
| ptr, size); |
| } |
| XER_ADVANCE(tmprval.consumed); |
| if(tmprval.code != RC_OK) |
| RETURN(tmprval.code); |
| ctx->phase = 1; /* Back to body processing */ |
| ctx->step = ++edx; |
| ASN_DEBUG("XER/SEQUENCE phase => %d, step => %d", |
| ctx->phase, ctx->step); |
| /* Fall through */ |
| } |
| |
| /* |
| * Get the next part of the XML stream. |
| */ |
| ch_size = xer_next_token(&ctx->context, ptr, size, |
| &ch_type); |
| if(ch_size == -1) { |
| RETURN(RC_FAIL); |
| } else { |
| switch(ch_type) { |
| case PXER_WMORE: |
| RETURN(RC_WMORE); |
| case PXER_COMMENT: /* Got XML comment */ |
| case PXER_TEXT: /* Ignore free-standing text */ |
| XER_ADVANCE(ch_size); /* Skip silently */ |
| continue; |
| case PXER_TAG: |
| break; /* Check the rest down there */ |
| } |
| } |
| |
| tcv = xer_check_tag(ptr, ch_size, xml_tag); |
| ASN_DEBUG("XER/SEQUENCE: tcv = %d, ph=%d [%s]", |
| tcv, ctx->phase, xml_tag); |
| |
| /* Skip the extensions section */ |
| if(ctx->phase == 3) { |
| switch(xer_skip_unknown(tcv, &ctx->left)) { |
| case -1: |
| ctx->phase = 4; |
| RETURN(RC_FAIL); |
| case 0: |
| XER_ADVANCE(ch_size); |
| continue; |
| case 1: |
| XER_ADVANCE(ch_size); |
| ctx->phase = 1; |
| continue; |
| case 2: |
| ctx->phase = 1; |
| break; |
| } |
| } |
| |
| switch(tcv) { |
| case XCT_CLOSING: |
| if(ctx->phase == 0) break; |
| ctx->phase = 0; |
| /* Fall through */ |
| case XCT_BOTH: |
| if(ctx->phase == 0) { |
| if(edx >= td->elements_count || |
| /* Explicit OPTIONAL specs reaches the end */ |
| (edx + elements[edx].optional == td->elements_count) || |
| /* All extensions are optional */ |
| IN_EXTENSION_GROUP(specs, edx)) { |
| XER_ADVANCE(ch_size); |
| ctx->phase = 4; /* Phase out */ |
| RETURN(RC_OK); |
| } else { |
| ASN_DEBUG("Premature end of XER SEQUENCE"); |
| RETURN(RC_FAIL); |
| } |
| } |
| /* Fall through */ |
| case XCT_OPENING: |
| if(ctx->phase == 0) { |
| XER_ADVANCE(ch_size); |
| ctx->phase = 1; /* Processing body phase */ |
| continue; |
| } |
| /* Fall through */ |
| case XCT_UNKNOWN_OP: |
| case XCT_UNKNOWN_BO: |
| |
| ASN_DEBUG("XER/SEQUENCE: tcv=%d, ph=%d, edx=%" ASN_PRI_SIZE "", |
| tcv, ctx->phase, edx); |
| if(ctx->phase != 1) { |
| break; /* Really unexpected */ |
| } |
| |
| if(edx < td->elements_count) { |
| /* |
| * Search which member corresponds to this tag. |
| */ |
| size_t n; |
| size_t edx_end = edx + elements[edx].optional + 1; |
| if(edx_end > td->elements_count) |
| edx_end = td->elements_count; |
| for(n = edx; n < edx_end; n++) { |
| elm = &td->elements[n]; |
| tcv = xer_check_tag(ptr, ch_size, elm->name); |
| switch(tcv) { |
| case XCT_BOTH: |
| case XCT_OPENING: |
| /* |
| * Process this member. |
| */ |
| ctx->step = edx = n; |
| ctx->phase = 2; |
| break; |
| case XCT_UNKNOWN_OP: |
| case XCT_UNKNOWN_BO: |
| continue; |
| default: |
| n = edx_end; |
| break; /* Phase out */ |
| } |
| break; |
| } |
| if(n != edx_end) |
| continue; |
| } else { |
| ASN_DEBUG("Out of defined members: %" ASN_PRI_SIZE "/%u", |
| edx, td->elements_count); |
| } |
| |
| /* It is expected extension */ |
| if(IN_EXTENSION_GROUP(specs, |
| edx + (edx < td->elements_count |
| ? elements[edx].optional : 0))) { |
| ASN_DEBUG("Got anticipated extension at %" ASN_PRI_SIZE "", |
| edx); |
| /* |
| * Check for (XCT_BOTH or XCT_UNKNOWN_BO) |
| * By using a mask. Only record a pure |
| * <opening> tags. |
| */ |
| if(tcv & XCT_CLOSING) { |
| /* Found </extension> without body */ |
| } else { |
| ctx->left = 1; |
| ctx->phase = 3; /* Skip ...'s */ |
| } |
| XER_ADVANCE(ch_size); |
| continue; |
| } |
| |
| /* Fall through */ |
| default: |
| break; |
| } |
| |
| ASN_DEBUG("Unexpected XML tag in SEQUENCE [%c%c%c%c%c%c]", |
| size>0?((const char *)ptr)[0]:'.', |
| size>1?((const char *)ptr)[1]:'.', |
| size>2?((const char *)ptr)[2]:'.', |
| size>3?((const char *)ptr)[3]:'.', |
| size>4?((const char *)ptr)[4]:'.', |
| size>5?((const char *)ptr)[5]:'.'); |
| break; |
| } |
| |
| ctx->phase = 4; /* "Phase out" on hard failure */ |
| RETURN(RC_FAIL); |
| } |
| |
| asn_enc_rval_t |
| SEQUENCE_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, |
| int ilevel, enum xer_encoder_flags_e flags, |
| asn_app_consume_bytes_f *cb, void *app_key) { |
| asn_enc_rval_t er = {0,0,0}; |
| int xcan = (flags & XER_F_CANONICAL); |
| asn_TYPE_descriptor_t *tmp_def_val_td = 0; |
| void *tmp_def_val = 0; |
| size_t edx; |
| |
| if(!sptr) ASN__ENCODE_FAILED; |
| |
| er.encoded = 0; |
| |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_enc_rval_t tmper = {0,0,0}; |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *memb_ptr; |
| const char *mname = elm->name; |
| unsigned int mlen = strlen(mname); |
| |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr = |
| *(const void *const *)((const char *)sptr + elm->memb_offset); |
| if(!memb_ptr) { |
| assert(tmp_def_val == 0); |
| if(elm->default_value_set) { |
| if(elm->default_value_set(&tmp_def_val)) { |
| ASN__ENCODE_FAILED; |
| } else { |
| memb_ptr = tmp_def_val; |
| tmp_def_val_td = elm->type; |
| } |
| } else if(elm->optional) { |
| continue; |
| } else { |
| /* Mandatory element is missing */ |
| ASN__ENCODE_FAILED; |
| } |
| } |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| } |
| |
| if(!xcan) ASN__TEXT_INDENT(1, ilevel); |
| ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); |
| |
| /* Print the member itself */ |
| tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, ilevel + 1, |
| flags, cb, app_key); |
| if(tmp_def_val) { |
| ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val); |
| tmp_def_val = 0; |
| } |
| if(tmper.encoded == -1) return tmper; |
| er.encoded += tmper.encoded; |
| |
| ASN__CALLBACK3("</", 2, mname, mlen, ">", 1); |
| } |
| |
| if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); |
| |
| ASN__ENCODED_OK(er); |
| cb_failed: |
| if(tmp_def_val) ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val); |
| ASN__ENCODE_FAILED; |
| } |
| |
| int |
| SEQUENCE_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, |
| asn_app_consume_bytes_f *cb, void *app_key) { |
| size_t edx; |
| int ret; |
| |
| if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0; |
| |
| /* Dump preamble */ |
| if(cb(td->name, strlen(td->name), app_key) < 0 |
| || cb(" ::= {", 6, app_key) < 0) |
| return -1; |
| |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *memb_ptr; |
| |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); |
| if(!memb_ptr) { |
| if(elm->optional) continue; |
| /* Print <absent> line */ |
| /* Fall through */ |
| } |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| } |
| |
| /* Indentation */ |
| _i_INDENT(1); |
| |
| /* Print the member's name and stuff */ |
| if(cb(elm->name, strlen(elm->name), app_key) < 0 |
| || cb(": ", 2, app_key) < 0) |
| return -1; |
| |
| /* Print the member itself */ |
| ret = elm->type->op->print_struct(elm->type, memb_ptr, ilevel + 1, |
| cb, app_key); |
| if(ret) return ret; |
| } |
| |
| ilevel--; |
| _i_INDENT(1); |
| |
| return (cb("}", 1, app_key) < 0) ? -1 : 0; |
| } |
| |
| void |
| SEQUENCE_free(const asn_TYPE_descriptor_t *td, void *sptr, |
| enum asn_struct_free_method method) { |
| size_t edx; |
| const asn_SEQUENCE_specifics_t *specs = |
| (const asn_SEQUENCE_specifics_t *)td->specifics; |
| asn_struct_ctx_t *ctx; /* Decoder context */ |
| |
| if(!td || !sptr) |
| return; |
| |
| ASN_DEBUG("Freeing %s as SEQUENCE", td->name); |
| |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| void *memb_ptr; |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr = *(void **)((char *)sptr + elm->memb_offset); |
| if(memb_ptr) |
| ASN_STRUCT_FREE(*elm->type, memb_ptr); |
| } else { |
| memb_ptr = (void *)((char *)sptr + elm->memb_offset); |
| ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr); |
| } |
| } |
| |
| /* Clean parsing context */ |
| ctx = (asn_struct_ctx_t *)((char *)sptr + specs->ctx_offset); |
| FREEMEM(ctx->ptr); |
| |
| switch(method) { |
| case ASFM_FREE_EVERYTHING: |
| FREEMEM(sptr); |
| break; |
| case ASFM_FREE_UNDERLYING: |
| break; |
| case ASFM_FREE_UNDERLYING_AND_RESET: |
| memset( |
| sptr, 0, |
| ((const asn_SEQUENCE_specifics_t *)(td->specifics))->struct_size); |
| break; |
| } |
| } |
| |
| int |
| SEQUENCE_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, |
| asn_app_constraint_failed_f *ctfailcb, void *app_key) { |
| size_t edx; |
| |
| if(!sptr) { |
| ASN__CTFAIL(app_key, td, sptr, |
| "%s: value not given (%s:%d)", |
| td->name, __FILE__, __LINE__); |
| return -1; |
| } |
| |
| /* |
| * Iterate over structure members and check their validity. |
| */ |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *memb_ptr; |
| |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); |
| if(!memb_ptr) { |
| if(elm->optional) |
| continue; |
| ASN__CTFAIL(app_key, td, sptr, |
| "%s: mandatory element %s absent (%s:%d)", |
| td->name, elm->name, __FILE__, __LINE__); |
| return -1; |
| } |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| } |
| |
| if(elm->encoding_constraints.general_constraints) { |
| int ret = elm->encoding_constraints.general_constraints(elm->type, memb_ptr, |
| ctfailcb, app_key); |
| if(ret) return ret; |
| } else { |
| return elm->type->encoding_constraints.general_constraints(elm->type, |
| memb_ptr, ctfailcb, app_key); |
| } |
| } |
| |
| return 0; |
| } |
| |
| #ifndef ASN_DISABLE_PER_SUPPORT |
| |
| asn_dec_rval_t |
| SEQUENCE_decode_uper(const asn_codec_ctx_t *opt_codec_ctx, |
| const asn_TYPE_descriptor_t *td, |
| const asn_per_constraints_t *constraints, void **sptr, |
| asn_per_data_t *pd) { |
| const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics; |
| void *st = *sptr; /* Target structure. */ |
| int extpresent; /* Extension additions are present */ |
| uint8_t *opres; /* Presence of optional root members */ |
| asn_per_data_t opmd; |
| asn_dec_rval_t rv; |
| size_t edx; |
| |
| (void)constraints; |
| |
| if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) |
| ASN__DECODE_FAILED; |
| |
| if(!st) { |
| st = *sptr = CALLOC(1, specs->struct_size); |
| if(!st) ASN__DECODE_FAILED; |
| } |
| |
| ASN_DEBUG("Decoding %s as SEQUENCE (UPER)", td->name); |
| |
| /* Handle extensions */ |
| if(specs->first_extension < 0) { |
| extpresent = 0; |
| } else { |
| extpresent = per_get_few_bits(pd, 1); |
| if(extpresent < 0) ASN__DECODE_STARVED; |
| } |
| |
| /* Prepare a place and read-in the presence bitmap */ |
| memset(&opmd, 0, sizeof(opmd)); |
| if(specs->roms_count) { |
| opres = (uint8_t *)MALLOC(((specs->roms_count + 7) >> 3) + 1); |
| if(!opres) ASN__DECODE_FAILED; |
| /* Get the presence map */ |
| if(per_get_many_bits(pd, opres, 0, specs->roms_count)) { |
| FREEMEM(opres); |
| ASN__DECODE_STARVED; |
| } |
| opmd.buffer = opres; |
| opmd.nbits = specs->roms_count; |
| ASN_DEBUG("Read in presence bitmap for %s of %d bits (%x..)", |
| td->name, specs->roms_count, *opres); |
| } else { |
| opres = 0; |
| } |
| |
| /* |
| * Get the sequence ROOT elements. |
| */ |
| for(edx = 0; |
| edx < (specs->first_extension < 0 ? td->elements_count |
| : (size_t)specs->first_extension); |
| edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| void *memb_ptr; /* Pointer to the member */ |
| void **memb_ptr2; /* Pointer to that pointer */ |
| |
| assert(!IN_EXTENSION_GROUP(specs, edx)); |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (void **)((char *)st + elm->memb_offset); |
| } else { |
| memb_ptr = (char *)st + elm->memb_offset; |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| /* Deal with optionality */ |
| if(elm->optional) { |
| int present = per_get_few_bits(&opmd, 1); |
| ASN_DEBUG("Member %s->%s is optional, p=%d (%d->%d)", |
| td->name, elm->name, present, |
| (int)opmd.nboff, (int)opmd.nbits); |
| if(present == 0) { |
| /* This element is not present */ |
| if(elm->default_value_set) { |
| /* Fill-in DEFAULT */ |
| if(elm->default_value_set(memb_ptr2)) { |
| FREEMEM(opres); |
| ASN__DECODE_FAILED; |
| } |
| ASN_DEBUG("Filled-in default"); |
| } |
| /* The member is just not present */ |
| continue; |
| } |
| /* Fall through */ |
| } |
| |
| /* Fetch the member from the stream */ |
| ASN_DEBUG("Decoding member \"%s\" in %s", elm->name, td->name); |
| |
| if(elm->flags & ATF_OPEN_TYPE) { |
| rv = OPEN_TYPE_uper_get(opt_codec_ctx, td, st, elm, pd); |
| } else { |
| rv = elm->type->op->uper_decoder(opt_codec_ctx, elm->type, |
| elm->encoding_constraints.per_constraints, memb_ptr2, pd); |
| } |
| if(rv.code != RC_OK) { |
| ASN_DEBUG("Failed decode %s in %s", |
| elm->name, td->name); |
| FREEMEM(opres); |
| return rv; |
| } |
| } |
| |
| /* Optionality map is not needed anymore */ |
| FREEMEM(opres); |
| |
| /* |
| * Deal with extensions. |
| */ |
| if(extpresent) { |
| ssize_t bmlength; |
| uint8_t *epres; /* Presence of extension members */ |
| asn_per_data_t epmd; |
| |
| bmlength = uper_get_nslength(pd); |
| if(bmlength < 0) ASN__DECODE_STARVED; |
| |
| ASN_DEBUG("Extensions %" ASN_PRI_SSIZE " present in %s", bmlength, td->name); |
| |
| epres = (uint8_t *)MALLOC((bmlength + 15) >> 3); |
| if(!epres) ASN__DECODE_STARVED; |
| |
| /* Get the extensions map */ |
| if(per_get_many_bits(pd, epres, 0, bmlength)) { |
| FREEMEM(epres); |
| ASN__DECODE_STARVED; |
| } |
| |
| memset(&epmd, 0, sizeof(epmd)); |
| epmd.buffer = epres; |
| epmd.nbits = bmlength; |
| ASN_DEBUG("Read in extensions bitmap for %s of %ld bits (%x..)", |
| td->name, (long)bmlength, *epres); |
| |
| /* Go over extensions and read them in */ |
| for(edx = specs->first_extension; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| void *memb_ptr; /* Pointer to the member */ |
| void **memb_ptr2; /* Pointer to that pointer */ |
| int present; |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (void **)((char *)st + elm->memb_offset); |
| } else { |
| memb_ptr = (void *)((char *)st + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| present = per_get_few_bits(&epmd, 1); |
| if(present <= 0) { |
| if(present < 0) break; /* No more extensions */ |
| continue; |
| } |
| |
| ASN_DEBUG("Decoding member %s in %s %p", elm->name, td->name, |
| *memb_ptr2); |
| rv = uper_open_type_get(opt_codec_ctx, elm->type, |
| elm->encoding_constraints.per_constraints, |
| memb_ptr2, pd); |
| if(rv.code != RC_OK) { |
| FREEMEM(epres); |
| return rv; |
| } |
| } |
| |
| /* Skip over overflow extensions which aren't present |
| * in this system's version of the protocol */ |
| for(;;) { |
| ASN_DEBUG("Getting overflow extensions"); |
| switch(per_get_few_bits(&epmd, 1)) { |
| case -1: break; |
| case 0: continue; |
| default: |
| if(uper_open_type_skip(opt_codec_ctx, pd)) { |
| FREEMEM(epres); |
| ASN__DECODE_STARVED; |
| } |
| ASN_DEBUG("Skipped overflow extension"); |
| continue; |
| } |
| break; |
| } |
| |
| FREEMEM(epres); |
| } |
| |
| if(specs->first_extension >= 0) { |
| unsigned i; |
| /* Fill DEFAULT members in extensions */ |
| for(i = specs->roms_count; i < specs->roms_count + specs->aoms_count; |
| i++) { |
| asn_TYPE_member_t *elm; |
| void **memb_ptr2; /* Pointer to member pointer */ |
| |
| edx = specs->oms[i]; |
| elm = &td->elements[edx]; |
| |
| if(!elm->default_value_set) continue; |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (void **)((char *)st + elm->memb_offset); |
| if(*memb_ptr2) continue; |
| } else { |
| continue; /* Extensions are all optionals */ |
| } |
| |
| /* Set default value */ |
| if(elm->default_value_set(memb_ptr2)) { |
| ASN__DECODE_FAILED; |
| } |
| } |
| } |
| |
| rv.consumed = 0; |
| rv.code = RC_OK; |
| return rv; |
| } |
| |
| static int |
| SEQUENCE__handle_extensions(const asn_TYPE_descriptor_t *td, const void *sptr, |
| asn_per_outp_t *po1, asn_per_outp_t *po2) { |
| const asn_SEQUENCE_specifics_t *specs = |
| (const asn_SEQUENCE_specifics_t *)td->specifics; |
| int exts_present = 0; |
| int exts_count = 0; |
| size_t edx; |
| |
| if(specs->first_extension < 0) { |
| return 0; |
| } |
| |
| /* Find out which extensions are present */ |
| for(edx = specs->first_extension; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *memb_ptr; /* Pointer to the member */ |
| const void *const *memb_ptr2; /* Pointer to that pointer */ |
| int present; |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = |
| (const void *const *)((const char *)sptr + elm->memb_offset); |
| present = (*memb_ptr2 != 0); |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| present = 1; |
| } |
| |
| ASN_DEBUG("checking %s:%s (@%" ASN_PRI_SIZE ") present => %d", elm->name, |
| elm->type->name, edx, present); |
| exts_count++; |
| exts_present += present; |
| |
| /* Encode as presence marker */ |
| if(po1 && per_put_few_bits(po1, present, 1)) { |
| return -1; |
| } |
| /* Encode as open type field */ |
| if(po2 && present |
| && uper_open_type_put(elm->type, |
| elm->encoding_constraints.per_constraints, |
| *memb_ptr2, po2)) |
| return -1; |
| } |
| |
| return exts_present ? exts_count : 0; |
| } |
| |
| asn_enc_rval_t |
| SEQUENCE_encode_uper(const asn_TYPE_descriptor_t *td, |
| const asn_per_constraints_t *constraints, const void *sptr, |
| asn_per_outp_t *po) { |
| const asn_SEQUENCE_specifics_t *specs |
| = (const asn_SEQUENCE_specifics_t *)td->specifics; |
| asn_enc_rval_t er = {0,0,0}; |
| int n_extensions; |
| size_t edx; |
| size_t i; |
| |
| (void)constraints; |
| |
| if(!sptr) |
| ASN__ENCODE_FAILED; |
| |
| er.encoded = 0; |
| |
| ASN_DEBUG("Encoding %s as SEQUENCE (UPER)", td->name); |
| |
| /* |
| * X.691#18.1 Whether structure is extensible |
| * and whether to encode extensions |
| */ |
| if(specs->first_extension < 0) { |
| n_extensions = 0; /* There are no extensions to encode */ |
| } else { |
| n_extensions = SEQUENCE__handle_extensions(td, sptr, 0, 0); |
| if(n_extensions < 0) ASN__ENCODE_FAILED; |
| if(per_put_few_bits(po, n_extensions ? 1 : 0, 1)) { |
| ASN__ENCODE_FAILED; |
| } |
| } |
| |
| /* Encode a presence bitmap */ |
| for(i = 0; i < specs->roms_count; i++) { |
| asn_TYPE_member_t *elm; |
| const void *memb_ptr; /* Pointer to the member */ |
| const void *const *memb_ptr2; /* Pointer to that pointer */ |
| int present; |
| |
| edx = specs->oms[i]; |
| elm = &td->elements[edx]; |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = |
| (const void *const *)((const char *)sptr + elm->memb_offset); |
| present = (*memb_ptr2 != 0); |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| present = 1; |
| } |
| |
| /* Eliminate default values */ |
| if(present && elm->default_value_cmp |
| && elm->default_value_cmp(*memb_ptr2) == 0) |
| present = 0; |
| |
| ASN_DEBUG("Element %s %s %s->%s is %s", |
| elm->flags & ATF_POINTER ? "ptr" : "inline", |
| elm->default_value_cmp ? "def" : "wtv", |
| td->name, elm->name, present ? "present" : "absent"); |
| if(per_put_few_bits(po, present, 1)) |
| ASN__ENCODE_FAILED; |
| } |
| |
| /* |
| * Encode the sequence ROOT elements. |
| */ |
| ASN_DEBUG("first_extension = %d, elements = %d", specs->first_extension, |
| td->elements_count); |
| for(edx = 0; |
| edx < ((specs->first_extension < 0) ? td->elements_count |
| : (size_t)specs->first_extension); |
| edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *memb_ptr; /* Pointer to the member */ |
| const void *const *memb_ptr2; /* Pointer to that pointer */ |
| |
| ASN_DEBUG("About to encode %s", elm->type->name); |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = |
| (const void *const *)((const char *)sptr + elm->memb_offset); |
| if(!*memb_ptr2) { |
| ASN_DEBUG("Element %s %" ASN_PRI_SIZE " not present", |
| elm->name, edx); |
| if(elm->optional) |
| continue; |
| /* Mandatory element is missing */ |
| ASN__ENCODE_FAILED; |
| } |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| /* Eliminate default values */ |
| if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0) |
| continue; |
| |
| ASN_DEBUG("Encoding %s->%s:%s", td->name, elm->name, elm->type->name); |
| er = elm->type->op->uper_encoder( |
| elm->type, elm->encoding_constraints.per_constraints, *memb_ptr2, |
| po); |
| if(er.encoded == -1) return er; |
| } |
| |
| /* No extensions to encode */ |
| if(!n_extensions) ASN__ENCODED_OK(er); |
| |
| ASN_DEBUG("Length of extensions %d bit-map", n_extensions); |
| /* #18.8. Write down the presence bit-map length. */ |
| if(uper_put_nslength(po, n_extensions)) |
| ASN__ENCODE_FAILED; |
| |
| ASN_DEBUG("Bit-map of %d elements", n_extensions); |
| /* #18.7. Encoding the extensions presence bit-map. */ |
| /* TODO: act upon NOTE in #18.7 for canonical PER */ |
| if(SEQUENCE__handle_extensions(td, sptr, po, 0) != n_extensions) |
| ASN__ENCODE_FAILED; |
| |
| ASN_DEBUG("Writing %d extensions", n_extensions); |
| /* #18.9. Encode extensions as open type fields. */ |
| if(SEQUENCE__handle_extensions(td, sptr, 0, po) != n_extensions) |
| ASN__ENCODE_FAILED; |
| |
| ASN__ENCODED_OK(er); |
| } |
| |
| asn_dec_rval_t |
| SEQUENCE_decode_aper(const asn_codec_ctx_t *opt_codec_ctx, |
| const asn_TYPE_descriptor_t *td, |
| const asn_per_constraints_t *constraints, void **sptr, asn_per_data_t *pd) { |
| const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics; |
| void *st = *sptr; /* Target structure. */ |
| int extpresent; /* Extension additions are present */ |
| uint8_t *opres; /* Presence of optional root members */ |
| asn_per_data_t opmd; |
| asn_dec_rval_t rv; |
| size_t edx; |
| |
| (void)constraints; |
| |
| if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) |
| ASN__DECODE_FAILED; |
| |
| if(!st) { |
| st = *sptr = CALLOC(1, specs->struct_size); |
| if(!st) ASN__DECODE_FAILED; |
| } |
| |
| ASN_DEBUG("Decoding %s as SEQUENCE (APER)", td->name); |
| |
| /* Handle extensions */ |
| if(specs->first_extension < 0) { |
| extpresent = 0; |
| } else { |
| extpresent = per_get_few_bits(pd, 1); |
| if(extpresent < 0) ASN__DECODE_STARVED; |
| } |
| |
| /* Prepare a place and read-in the presence bitmap */ |
| memset(&opmd, 0, sizeof(opmd)); |
| if(specs->roms_count) { |
| opres = (uint8_t *)MALLOC(((specs->roms_count + 7) >> 3) + 1); |
| if(!opres) ASN__DECODE_FAILED; |
| /* Get the presence map */ |
| if(per_get_many_bits(pd, opres, 0, specs->roms_count)) { |
| FREEMEM(opres); |
| ASN__DECODE_STARVED; |
| } |
| opmd.buffer = opres; |
| opmd.nbits = specs->roms_count; |
| ASN_DEBUG("Read in presence bitmap for %s of %d bits (%x..)", |
| td->name, specs->roms_count, *opres); |
| } else { |
| opres = 0; |
| } |
| |
| /* |
| * Get the sequence ROOT elements. |
| */ |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| void *memb_ptr; /* Pointer to the member */ |
| void **memb_ptr2; /* Pointer to that pointer */ |
| #if 0 |
| int padding; |
| #endif |
| |
| if(IN_EXTENSION_GROUP(specs, edx)) |
| continue; |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (void **)((char *)st + elm->memb_offset); |
| } else { |
| memb_ptr = (char *)st + elm->memb_offset; |
| memb_ptr2 = &memb_ptr; |
| } |
| #if 0 |
| /* Get Padding */ |
| padding = (8 - (pd->moved % 8)) % 8; |
| if(padding > 0) |
| ASN_DEBUG("For element %s,offset= %ld Padding bits = %d", td->name, pd->moved, padding); |
| #if 0 /* old way of removing padding */ |
| per_get_few_bits(pd, padding); |
| #else /* Experimental fix proposed by @mhanna123 */ |
| if(edx != (td->elements_count-1)) |
| per_get_few_bits(pd, padding); |
| else { |
| if(specs->roms_count && (padding > 0)) |
| ASN_DEBUG(">>>>> not skipping padding of %d bits for element:%ld out of %d", padding, edx, td->elements_count); |
| else |
| per_get_few_bits(pd, padding); |
| } |
| #endif /* dealing with padding */ |
| #endif |
| /* Deal with optionality */ |
| if(elm->optional) { |
| int present = per_get_few_bits(&opmd, 1); |
| ASN_DEBUG("Member %s->%s is optional, p=%d (%d->%d)", |
| td->name, elm->name, present, |
| (int)opmd.nboff, (int)opmd.nbits); |
| if(present == 0) { |
| /* This element is not present */ |
| if(elm->default_value_set) { |
| /* Fill-in DEFAULT */ |
| if(elm->default_value_set(memb_ptr2)) { |
| FREEMEM(opres); |
| ASN__DECODE_FAILED; |
| } |
| ASN_DEBUG("Filled-in default"); |
| } |
| /* The member is just not present */ |
| continue; |
| } |
| /* Fall through */ |
| } |
| |
| /* Fetch the member from the stream */ |
| ASN_DEBUG("Decoding member \"%s\" in %s", elm->name, td->name); |
| |
| if(elm->flags & ATF_OPEN_TYPE) { |
| rv = OPEN_TYPE_aper_get(opt_codec_ctx, td, st, elm, pd); |
| } else { |
| rv = elm->type->op->aper_decoder(opt_codec_ctx, elm->type, |
| elm->encoding_constraints.per_constraints, memb_ptr2, pd); |
| } |
| if(rv.code != RC_OK) { |
| ASN_DEBUG("Failed decode %s in %s", |
| elm->name, td->name); |
| FREEMEM(opres); |
| return rv; |
| } |
| } |
| |
| /* Optionality map is not needed anymore */ |
| FREEMEM(opres); |
| |
| /* |
| * Deal with extensions. |
| */ |
| if(extpresent) { |
| ssize_t bmlength; |
| uint8_t *epres; /* Presence of extension members */ |
| asn_per_data_t epmd; |
| |
| bmlength = aper_get_nslength(pd); |
| if(bmlength < 0) ASN__DECODE_STARVED; |
| |
| ASN_DEBUG("Extensions %" ASN_PRI_SSIZE " present in %s", bmlength, td->name); |
| |
| epres = (uint8_t *)MALLOC((bmlength + 15) >> 3); |
| if(!epres) ASN__DECODE_STARVED; |
| |
| /* Get the extensions map */ |
| if(per_get_many_bits(pd, epres, 0, bmlength)) |
| ASN__DECODE_STARVED; |
| |
| memset(&epmd, 0, sizeof(epmd)); |
| epmd.buffer = epres; |
| epmd.nbits = bmlength; |
| ASN_DEBUG("Read in extensions bitmap for %s of %ld bits (%x..)", |
| td->name, bmlength, *epres); |
| |
| /* Go over extensions and read them in */ |
| for(edx = specs->first_extension; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| void *memb_ptr; /* Pointer to the member */ |
| void **memb_ptr2; /* Pointer to that pointer */ |
| int present; |
| |
| if(!IN_EXTENSION_GROUP(specs, edx)) { |
| ASN_DEBUG("%ld is not extension", edx); |
| continue; |
| } |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (void **)((char *)st + elm->memb_offset); |
| } else { |
| memb_ptr = (void *)((char *)st + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| present = per_get_few_bits(&epmd, 1); |
| if(present <= 0) { |
| if(present < 0) break; /* No more extensions */ |
| continue; |
| } |
| |
| ASN_DEBUG("Decoding member %s in %s %p", elm->name, td->name, *memb_ptr2); |
| rv = aper_open_type_get(opt_codec_ctx, elm->type, |
| elm->encoding_constraints.per_constraints, memb_ptr2, pd); |
| if(rv.code != RC_OK) { |
| FREEMEM(epres); |
| return rv; |
| } |
| } |
| |
| /* Skip over overflow extensions which aren't present |
| * in this system's version of the protocol */ |
| for(;;) { |
| ASN_DEBUG("Getting overflow extensions"); |
| switch(per_get_few_bits(&epmd, 1)) { |
| case -1: |
| break; |
| case 0: |
| continue; |
| default: |
| if(aper_open_type_skip(opt_codec_ctx, pd)) { |
| FREEMEM(epres); |
| ASN__DECODE_STARVED; |
| } |
| } |
| break; |
| } |
| |
| FREEMEM(epres); |
| } |
| |
| /* Fill DEFAULT members in extensions */ |
| for(edx = specs->roms_count; edx < specs->roms_count |
| + specs->aoms_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| void **memb_ptr2; /* Pointer to member pointer */ |
| |
| if(!elm->default_value_set) continue; |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (void **)((char *)st |
| + elm->memb_offset); |
| if(*memb_ptr2) continue; |
| } else { |
| continue; /* Extensions are all optionals */ |
| } |
| |
| /* Set default value */ |
| if(elm->default_value_set(memb_ptr2)) { |
| ASN__DECODE_FAILED; |
| } |
| } |
| |
| rv.consumed = 0; |
| rv.code = RC_OK; |
| return rv; |
| } |
| |
| static int |
| SEQUENCE_handle_extensions_aper(const asn_TYPE_descriptor_t *td, |
| const void *sptr, |
| asn_per_outp_t *po1, asn_per_outp_t *po2) { |
| const asn_SEQUENCE_specifics_t *specs |
| = (const asn_SEQUENCE_specifics_t *)td->specifics; |
| int exts_present = 0; |
| int exts_count = 0; |
| size_t edx; |
| |
| if(specs->first_extension < 0) { |
| return 0; |
| } |
| |
| /* Find out which extensions are present */ |
| for(edx = specs->first_extension; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *memb_ptr; /* Pointer to the member */ |
| const void * const *memb_ptr2; /* Pointer to that pointer */ |
| int present; |
| |
| if(!IN_EXTENSION_GROUP(specs, edx)) { |
| ASN_DEBUG("%s (@%ld) is not extension", elm->type->name, edx); |
| continue; |
| } |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (const void * const *)((const char *)sptr + elm->memb_offset); |
| present = (*memb_ptr2 != 0); |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| present = 1; |
| } |
| |
| ASN_DEBUG("checking %s (@%ld) present => %d", |
| elm->type->name, edx, present); |
| exts_count++; |
| exts_present += present; |
| |
| /* Encode as presence marker */ |
| if(po1 && per_put_few_bits(po1, present, 1)) |
| return -1; |
| /* Encode as open type field */ |
| if(po2 && present && aper_open_type_put(elm->type, |
| elm->encoding_constraints.per_constraints, *memb_ptr2, po2)) |
| return -1; |
| |
| } |
| |
| return exts_present ? exts_count : 0; |
| } |
| |
| asn_enc_rval_t |
| SEQUENCE_encode_aper(const asn_TYPE_descriptor_t *td, |
| const asn_per_constraints_t *constraints, |
| const void *sptr, asn_per_outp_t *po) { |
| const asn_SEQUENCE_specifics_t *specs |
| = (const asn_SEQUENCE_specifics_t *)td->specifics; |
| asn_enc_rval_t er = {0,0,0}; |
| int n_extensions; |
| size_t edx; |
| size_t i; |
| |
| (void)constraints; |
| |
| if(!sptr) |
| ASN__ENCODE_FAILED; |
| |
| er.encoded = 0; |
| |
| ASN_DEBUG("Encoding %s as SEQUENCE (APER)", td->name); |
| |
| /* |
| * X.691#18.1 Whether structure is extensible |
| * and whether to encode extensions |
| */ |
| if(specs->first_extension < 0) { |
| n_extensions = 0; /* There are no extensions to encode */ |
| } else { |
| n_extensions = SEQUENCE_handle_extensions_aper(td, sptr, 0, 0); |
| if(n_extensions < 0) ASN__ENCODE_FAILED; |
| if(per_put_few_bits(po, n_extensions ? 1 : 0, 1)) { |
| ASN__ENCODE_FAILED; |
| } |
| } |
| |
| /* Encode a presence bitmap */ |
| for(i = 0; i < specs->roms_count; i++) { |
| asn_TYPE_member_t *elm; |
| const void *memb_ptr; /* Pointer to the member */ |
| const void * const *memb_ptr2; /* Pointer to that pointer */ |
| int present; |
| |
| edx = specs->oms[i]; |
| elm = &td->elements[edx]; |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (const void * const *)((const char *)sptr + elm->memb_offset); |
| present = (*memb_ptr2 != 0); |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| present = 1; |
| } |
| |
| /* Eliminate default values */ |
| if(present && elm->default_value_cmp |
| && elm->default_value_cmp(memb_ptr2) == 1) |
| present = 0; |
| |
| ASN_DEBUG("Element %s %s %s->%s is %s", |
| elm->flags & ATF_POINTER ? "ptr" : "inline", |
| elm->default_value_cmp ? "def" : "wtv", |
| td->name, elm->name, present ? "present" : "absent"); |
| if(per_put_few_bits(po, present, 1)) |
| ASN__ENCODE_FAILED; |
| } |
| |
| /* |
| * Encode the sequence ROOT elements. |
| */ |
| ASN_DEBUG("first_extension = %d, elements = %d", specs->first_extension, |
| td->elements_count); |
| for(edx = 0; |
| edx < ((specs->first_extension < 0) ? td->elements_count |
| : (size_t)specs->first_extension); |
| edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *memb_ptr; /* Pointer to the member */ |
| const void * const *memb_ptr2; /* Pointer to that pointer */ |
| |
| if(IN_EXTENSION_GROUP(specs, edx)) |
| continue; |
| |
| ASN_DEBUG("About to encode %s", elm->type->name); |
| |
| /* Fetch the pointer to this member */ |
| if(elm->flags & ATF_POINTER) { |
| memb_ptr2 = (const void * const *)((const char *)sptr + elm->memb_offset); |
| if(!*memb_ptr2) { |
| ASN_DEBUG("Element %s %ld not present", |
| elm->name, edx); |
| if(elm->optional) |
| continue; |
| /* Mandatory element is missing */ |
| ASN__ENCODE_FAILED; |
| } |
| } else { |
| memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| /* Eliminate default values */ |
| if(elm->default_value_cmp && elm->default_value_cmp(memb_ptr2) == 1) |
| continue; |
| |
| ASN_DEBUG("Encoding %s->%s", td->name, elm->name); |
| er = elm->type->op->aper_encoder(elm->type, elm->encoding_constraints.per_constraints, |
| *memb_ptr2, po); |
| if(er.encoded == -1) |
| return er; |
| } |
| |
| /* No extensions to encode */ |
| if(!n_extensions) ASN__ENCODED_OK(er); |
| |
| ASN_DEBUG("Length of %d bit-map", n_extensions); |
| /* #18.8. Write down the presence bit-map length. */ |
| if(aper_put_nslength(po, n_extensions)) |
| ASN__ENCODE_FAILED; |
| |
| ASN_DEBUG("Bit-map of %d elements", n_extensions); |
| /* #18.7. Encoding the extensions presence bit-map. */ |
| /* TODO: act upon NOTE in #18.7 for canonical PER */ |
| if(SEQUENCE_handle_extensions_aper(td, sptr, po, 0) != n_extensions) |
| ASN__ENCODE_FAILED; |
| |
| ASN_DEBUG("Writing %d extensions", n_extensions); |
| /* #18.9. Encode extensions as open type fields. */ |
| if(SEQUENCE_handle_extensions_aper(td, sptr, 0, po) != n_extensions) |
| ASN__ENCODE_FAILED; |
| |
| ASN__ENCODED_OK(er); |
| } |
| |
| #endif /* ASN_DISABLE_PER_SUPPORT */ |
| |
| int |
| SEQUENCE_compare(const asn_TYPE_descriptor_t *td, const void *aptr, |
| const void *bptr) { |
| size_t edx; |
| |
| for(edx = 0; edx < td->elements_count; edx++) { |
| asn_TYPE_member_t *elm = &td->elements[edx]; |
| const void *amemb; |
| const void *bmemb; |
| int ret; |
| |
| if(elm->flags & ATF_POINTER) { |
| amemb = |
| *(const void *const *)((const char *)aptr + elm->memb_offset); |
| bmemb = |
| *(const void *const *)((const char *)bptr + elm->memb_offset); |
| if(!amemb) { |
| if(!bmemb) continue; |
| if(elm->default_value_cmp |
| && elm->default_value_cmp(bmemb) == 0) { |
| /* A is absent, but B is present and equal to DEFAULT */ |
| continue; |
| } |
| return -1; |
| } else if(!bmemb) { |
| if(elm->default_value_cmp |
| && elm->default_value_cmp(amemb) == 0) { |
| /* B is absent, but A is present and equal to DEFAULT */ |
| continue; |
| } |
| return 1; |
| } |
| } else { |
| amemb = (const void *)((const char *)aptr + elm->memb_offset); |
| bmemb = (const void *)((const char *)bptr + elm->memb_offset); |
| } |
| |
| ret = elm->type->op->compare_struct(elm->type, amemb, bmemb); |
| if(ret != 0) return ret; |
| } |
| |
| return 0; |
| } |
| |
| asn_TYPE_operation_t asn_OP_SEQUENCE = { |
| SEQUENCE_free, |
| SEQUENCE_print, |
| SEQUENCE_compare, |
| SEQUENCE_decode_ber, |
| SEQUENCE_encode_der, |
| SEQUENCE_decode_xer, |
| SEQUENCE_encode_xer, |
| #ifdef ASN_DISABLE_OER_SUPPORT |
| 0, |
| 0, |
| #else |
| SEQUENCE_decode_oer, |
| SEQUENCE_encode_oer, |
| #endif /* ASN_DISABLE_OER_SUPPORT */ |
| #ifdef ASN_DISABLE_PER_SUPPORT |
| 0, |
| 0, |
| 0, |
| 0, |
| #else |
| SEQUENCE_decode_uper, |
| SEQUENCE_encode_uper, |
| SEQUENCE_decode_aper, |
| SEQUENCE_encode_aper, |
| #endif /* ASN_DISABLE_PER_SUPPORT */ |
| SEQUENCE_random_fill, |
| 0 /* Use generic outmost tag fetcher */ |
| }; |
| |
| |
| asn_random_fill_result_t |
| SEQUENCE_random_fill(const asn_TYPE_descriptor_t *td, void **sptr, |
| const asn_encoding_constraints_t *constr, |
| size_t max_length) { |
| const asn_SEQUENCE_specifics_t *specs = |
| (const asn_SEQUENCE_specifics_t *)td->specifics; |
| asn_random_fill_result_t result_ok = {ARFILL_OK, 0}; |
| asn_random_fill_result_t result_failed = {ARFILL_FAILED, 0}; |
| asn_random_fill_result_t result_skipped = {ARFILL_SKIPPED, 0}; |
| void *st = *sptr; |
| size_t edx; |
| |
| if(max_length == 0) return result_skipped; |
| |
| (void)constr; |
| |
| if(st == NULL) { |
| st = CALLOC(1, specs->struct_size); |
| if(st == NULL) { |
| return result_failed; |
| } |
| } |
| |
| for(edx = 0; edx < td->elements_count; edx++) { |
| const asn_TYPE_member_t *elm = &td->elements[edx]; |
| void *memb_ptr; /* Pointer to the member */ |
| void **memb_ptr2; /* Pointer to that pointer */ |
| asn_random_fill_result_t tmpres; |
| |
| if(elm->optional && asn_random_between(0, 4) == 2) { |
| /* Sometimes decide not to fill the optional value */ |
| continue; |
| } |
| |
| if(elm->flags & ATF_POINTER) { |
| /* Member is a pointer to another structure */ |
| memb_ptr2 = (void **)((char *)st + elm->memb_offset); |
| } else { |
| memb_ptr = (char *)st + elm->memb_offset; |
| memb_ptr2 = &memb_ptr; |
| } |
| |
| tmpres = elm->type->op->random_fill( |
| elm->type, memb_ptr2, &elm->encoding_constraints, |
| max_length > result_ok.length ? max_length - result_ok.length : 0); |
| switch(tmpres.code) { |
| case ARFILL_OK: |
| result_ok.length += tmpres.length; |
| continue; |
| case ARFILL_SKIPPED: |
| assert(!(elm->flags & ATF_POINTER) || *memb_ptr2 == NULL); |
| continue; |
| case ARFILL_FAILED: |
| if(st == *sptr) { |
| ASN_STRUCT_RESET(*td, st); |
| } else { |
| ASN_STRUCT_FREE(*td, st); |
| } |
| return tmpres; |
| } |
| } |
| |
| *sptr = st; |
| |
| return result_ok; |
| } |
| |