blob: 43dcac70b5ed235222db0f0eab7c5beeeea6f7f0 [file] [log] [blame]
Peter Szilagyifbc56f92019-07-23 19:29:46 +00001/*
2 * Copyright (c) 2003-2017 Lev Walkin <vlm@lionet.info>.
3 * All rights reserved.
4 * Redistribution and modifications are permitted subject to BSD license.
5 */
6#include <asn_internal.h>
7#include <constr_SEQUENCE.h>
8#include <OPEN_TYPE.h>
9#include <per_opentype.h>
10
11/*
12 * Number of bytes left for this structure.
13 * (ctx->left) indicates the number of bytes _transferred_ for the structure.
14 * (size) contains the number of bytes in the buffer passed.
15 */
16#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
17
18/*
19 * If the subprocessor function returns with an indication that it wants
20 * more data, it may well be a fatal decoding problem, because the
21 * size is constrained by the <TLV>'s L, even if the buffer size allows
22 * reading more data.
23 * For example, consider the buffer containing the following TLVs:
24 * <T:5><L:1><V> <T:6>...
25 * The TLV length clearly indicates that one byte is expected in V, but
26 * if the V processor returns with "want more data" even if the buffer
27 * contains way more data than the V processor have seen.
28 */
29#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
30
31/*
32 * This macro "eats" the part of the buffer which is definitely "consumed",
33 * i.e. was correctly converted into local representation or rightfully skipped.
34 */
35#undef ADVANCE
36#define ADVANCE(num_bytes) do { \
37 size_t num = num_bytes; \
38 ptr = ((const char *)ptr) + num; \
39 size -= num; \
40 if(ctx->left >= 0) \
41 ctx->left -= num; \
42 consumed_myself += num; \
43 } while(0)
44
45/*
46 * Switch to the next phase of parsing.
47 */
48#undef NEXT_PHASE
49#undef PHASE_OUT
50#define NEXT_PHASE(ctx) do { \
51 ctx->phase++; \
52 ctx->step = 0; \
53 } while(0)
54#define PHASE_OUT(ctx) do { ctx->phase = 10; } while(0)
55
56/*
57 * Return a standardized complex structure.
58 */
59#undef RETURN
60#define RETURN(_code) do { \
61 rval.code = _code; \
62 rval.consumed = consumed_myself;\
63 return rval; \
64 } while(0)
65
66/*
67 * Check whether we are inside the extensions group.
68 */
69#define IN_EXTENSION_GROUP(specs, memb_idx) \
70 ((specs)->first_extension >= 0 \
71 && (unsigned)(specs)->first_extension <= (memb_idx))
72
73/*
74 * Tags are canonically sorted in the tag2element map.
75 */
76static int
77_t2e_cmp(const void *ap, const void *bp) {
78 const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap;
79 const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp;
80
81 int a_class = BER_TAG_CLASS(a->el_tag);
82 int b_class = BER_TAG_CLASS(b->el_tag);
83
84 if(a_class == b_class) {
85 ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag);
86 ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag);
87
88 if(a_value == b_value) {
89 if(a->el_no > b->el_no)
90 return 1;
91 /*
92 * Important: we do not check
93 * for a->el_no <= b->el_no!
94 */
95 return 0;
96 } else if(a_value < b_value)
97 return -1;
98 else
99 return 1;
100 } else if(a_class < b_class) {
101 return -1;
102 } else {
103 return 1;
104 }
105}
106
107
108/*
109 * The decoder of the SEQUENCE type.
110 */
111asn_dec_rval_t
112SEQUENCE_decode_ber(const asn_codec_ctx_t *opt_codec_ctx,
113 const asn_TYPE_descriptor_t *td, void **struct_ptr,
114 const void *ptr, size_t size, int tag_mode) {
115 /*
116 * Bring closer parts of structure description.
117 */
118 const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics;
119 const asn_TYPE_member_t *elements = td->elements;
120
121 /*
122 * Parts of the structure being constructed.
123 */
124 void *st = *struct_ptr; /* Target structure. */
125 asn_struct_ctx_t *ctx; /* Decoder context */
126
127 ber_tlv_tag_t tlv_tag; /* T from TLV */
128 asn_dec_rval_t rval; /* Return code from subparsers */
129
130 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
131 size_t edx; /* SEQUENCE element's index */
132
133 ASN_DEBUG("Decoding %s as SEQUENCE", td->name);
134
135 /*
136 * Create the target structure if it is not present already.
137 */
138 if(st == 0) {
139 st = *struct_ptr = CALLOC(1, specs->struct_size);
140 if(st == 0) {
141 RETURN(RC_FAIL);
142 }
143 }
144
145 /*
146 * Restore parsing context.
147 */
148 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
149
150 /*
151 * Start to parse where left previously
152 */
153 switch(ctx->phase) {
154 case 0:
155 /*
156 * PHASE 0.
157 * Check that the set of tags associated with given structure
158 * perfectly fits our expectations.
159 */
160
161 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
162 tag_mode, 1, &ctx->left, 0);
163 if(rval.code != RC_OK) {
164 ASN_DEBUG("%s tagging check failed: %d",
165 td->name, rval.code);
166 return rval;
167 }
168
169 if(ctx->left >= 0)
170 ctx->left += rval.consumed; /* ?Substracted below! */
171 ADVANCE(rval.consumed);
172
173 NEXT_PHASE(ctx);
174
175 ASN_DEBUG("Structure consumes %ld bytes, buffer %ld",
176 (long)ctx->left, (long)size);
177
178 /* Fall through */
179 case 1:
180 /*
181 * PHASE 1.
182 * From the place where we've left it previously,
183 * try to decode the next member from the list of
184 * this structure's elements.
185 * (ctx->step) stores the member being processed
186 * between invocations and the microphase {0,1} of parsing
187 * that member:
188 * step = (<member_number> * 2 + <microphase>).
189 */
190 for(edx = ((size_t)ctx->step >> 1); edx < td->elements_count;
191 edx++, ctx->step = (ctx->step & ~1) + 2) {
192 void *memb_ptr; /* Pointer to the member */
193 void **memb_ptr2; /* Pointer to that pointer */
194 ssize_t tag_len; /* Length of TLV's T */
195 size_t opt_edx_end; /* Next non-optional element */
196 size_t n;
197 int use_bsearch;
198
199 if(ctx->step & 1)
200 goto microphase2;
201
202 /*
203 * MICROPHASE 1: Synchronize decoding.
204 */
205 ASN_DEBUG("In %s SEQUENCE left %d, edx=%" ASN_PRI_SIZE " flags=%d"
206 " opt=%d ec=%d",
207 td->name, (int)ctx->left, edx,
208 elements[edx].flags, elements[edx].optional,
209 td->elements_count);
210
211 if(ctx->left == 0 /* No more stuff is expected */
212 && (
213 /* Explicit OPTIONAL specification reaches the end */
214 (edx + elements[edx].optional == td->elements_count) ||
215 /* All extensions are optional */
216 IN_EXTENSION_GROUP(specs, edx))) {
217 ASN_DEBUG("End of SEQUENCE %s", td->name);
218 /*
219 * Found the legitimate end of the structure.
220 */
221 PHASE_OUT(ctx);
222 RETURN(RC_OK);
223 }
224
225 /*
226 * Fetch the T from TLV.
227 */
228 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
229 ASN_DEBUG("Current tag in %s SEQUENCE for element %" ASN_PRI_SIZE " "
230 "(%s) is %s encoded in %d bytes, of frame %ld",
231 td->name, edx, elements[edx].name,
232 ber_tlv_tag_string(tlv_tag), (int)tag_len, (long)LEFT);
233 switch(tag_len) {
234 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
235 /* Fall through */
236 case -1: RETURN(RC_FAIL);
237 }
238
239 if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) {
240 if(LEFT < 2) {
241 if(SIZE_VIOLATION) {
242 RETURN(RC_FAIL);
243 } else {
244 RETURN(RC_WMORE);
245 }
246 } else if(((const uint8_t *)ptr)[1] == 0) {
247 ASN_DEBUG("edx = %" ASN_PRI_SIZE ", opt = %d, ec=%d", edx,
248 elements[edx].optional, td->elements_count);
249 if((edx + elements[edx].optional == td->elements_count)
250 || IN_EXTENSION_GROUP(specs, edx)) {
251 /*
252 * Yeah, baby! Found the terminator
253 * of the indefinite length structure.
254 */
255 /*
256 * Proceed to the canonical
257 * finalization function.
258 * No advancing is necessary.
259 */
260 goto phase3;
261 }
262 }
263 }
264
265 /*
266 * Find the next available type with this tag.
267 */
268 use_bsearch = 0;
269 opt_edx_end = edx + elements[edx].optional + 1;
270 if(opt_edx_end > td->elements_count)
271 opt_edx_end = td->elements_count; /* Cap */
272 else if(opt_edx_end - edx > 8) {
273 /* Limit the scope of linear search... */
274 opt_edx_end = edx + 8;
275 use_bsearch = 1;
276 /* ... and resort to bsearch() */
277 }
278 for(n = edx; n < opt_edx_end; n++) {
279 if(BER_TAGS_EQUAL(tlv_tag, elements[n].tag)) {
280 /*
281 * Found element corresponding to the tag
282 * being looked at.
283 * Reposition over the right element.
284 */
285 edx = n;
286 ctx->step = 1 + 2 * edx; /* Remember! */
287 goto microphase2;
288 } else if(elements[n].flags & ATF_ANY_TYPE) {
289 /*
290 * This is the ANY type, which may bear
291 * any flag whatsoever.
292 */
293 edx = n;
294 ctx->step = 1 + 2 * edx; /* Remember! */
295 goto microphase2;
296 } else if(elements[n].tag == (ber_tlv_tag_t)-1) {
297 use_bsearch = 1;
298 break;
299 }
300 }
301 if(use_bsearch) {
302 /*
303 * Resort to a binary search over
304 * sorted array of tags.
305 */
306 const asn_TYPE_tag2member_t *t2m;
307 asn_TYPE_tag2member_t key = {0, 0, 0, 0};
308 key.el_tag = tlv_tag;
309 key.el_no = edx;
310 t2m = (const asn_TYPE_tag2member_t *)bsearch(&key,
311 specs->tag2el, specs->tag2el_count,
312 sizeof(specs->tag2el[0]), _t2e_cmp);
313 if(t2m) {
314 const asn_TYPE_tag2member_t *best = 0;
315 const asn_TYPE_tag2member_t *t2m_f, *t2m_l;
316 size_t edx_max = edx + elements[edx].optional;
317 /*
318 * Rewind to the first element with that tag,
319 * `cause bsearch() does not guarantee order.
320 */
321 t2m_f = t2m + t2m->toff_first;
322 t2m_l = t2m + t2m->toff_last;
323 for(t2m = t2m_f; t2m <= t2m_l; t2m++) {
324 if(t2m->el_no > edx_max) break;
325 if(t2m->el_no < edx) continue;
326 best = t2m;
327 }
328 if(best) {
329 edx = best->el_no;
330 ctx->step = 1 + 2 * edx;
331 goto microphase2;
332 }
333 }
334 n = opt_edx_end;
335 }
336 if(n == opt_edx_end) {
337 /*
338 * If tag is unknown, it may be either
339 * an unknown (thus, incorrect) tag,
340 * or an extension (...),
341 * or an end of the indefinite-length structure.
342 */
343 if(!IN_EXTENSION_GROUP(specs,
344 edx + elements[edx].optional)) {
345 ASN_DEBUG("Unexpected tag %s (at %" ASN_PRI_SIZE ")",
346 ber_tlv_tag_string(tlv_tag), edx);
347 ASN_DEBUG("Expected tag %s (%s)%s",
348 ber_tlv_tag_string(elements[edx].tag),
349 elements[edx].name,
350 elements[edx].optional
351 ?" or alternatives":"");
352 RETURN(RC_FAIL);
353 } else {
354 /* Skip this tag */
355 ssize_t skip;
356 edx += elements[edx].optional;
357
358 ASN_DEBUG("Skipping unexpected %s (at %" ASN_PRI_SIZE ")",
359 ber_tlv_tag_string(tlv_tag), edx);
360 skip = ber_skip_length(opt_codec_ctx,
361 BER_TLV_CONSTRUCTED(ptr),
362 (const char *)ptr + tag_len,
363 LEFT - tag_len);
364 ASN_DEBUG("Skip length %d in %s",
365 (int)skip, td->name);
366 switch(skip) {
367 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
368 /* Fall through */
369 case -1: RETURN(RC_FAIL);
370 }
371
372 ADVANCE(skip + tag_len);
373 ctx->step -= 2;
374 edx--;
375 continue; /* Try again with the next tag */
376 }
377 }
378
379 /*
380 * MICROPHASE 2: Invoke the member-specific decoder.
381 */
382 ctx->step |= 1; /* Confirm entering next microphase */
383 microphase2:
384 ASN_DEBUG("Inside SEQUENCE %s MF2", td->name);
385
386 /*
387 * Compute the position of the member inside a structure,
388 * and also a type of containment (it may be contained
389 * as pointer or using inline inclusion).
390 */
391 if(elements[edx].flags & ATF_POINTER) {
392 /* Member is a pointer to another structure */
393 memb_ptr2 = (void **)((char *)st + elements[edx].memb_offset);
394 } else {
395 /*
396 * A pointer to a pointer
397 * holding the start of the structure
398 */
399 memb_ptr = (char *)st + elements[edx].memb_offset;
400 memb_ptr2 = &memb_ptr;
401 }
402 /*
403 * Invoke the member fetch routine according to member's type
404 */
405 if(elements[edx].flags & ATF_OPEN_TYPE) {
406 rval = OPEN_TYPE_ber_get(opt_codec_ctx, td, st, &elements[edx], ptr, LEFT);
407 } else {
408 rval = elements[edx].type->op->ber_decoder(opt_codec_ctx,
409 elements[edx].type,
410 memb_ptr2, ptr, LEFT,
411 elements[edx].tag_mode);
412 }
413 ASN_DEBUG("In %s SEQUENCE decoded %" ASN_PRI_SIZE " %s of %d "
414 "in %d bytes rval.code %d, size=%d",
415 td->name, edx, elements[edx].type->name,
416 (int)LEFT, (int)rval.consumed, rval.code, (int)size);
417 switch(rval.code) {
418 case RC_OK:
419 break;
420 case RC_WMORE: /* More data expected */
421 if(!SIZE_VIOLATION) {
422 ADVANCE(rval.consumed);
423 RETURN(RC_WMORE);
424 }
425 ASN_DEBUG("Size violation (c->l=%ld <= s=%ld)",
426 (long)ctx->left, (long)size);
427 /* Fall through */
428 case RC_FAIL: /* Fatal error */
429 RETURN(RC_FAIL);
430 } /* switch(rval) */
431
432 ADVANCE(rval.consumed);
433 } /* for(all structure members) */
434
435 phase3:
436 ctx->phase = 3;
437 /* Fall through */
438 case 3: /* 00 and other tags expected */
439 case 4: /* only 00's expected */
440
441 ASN_DEBUG("SEQUENCE %s Leftover: %ld, size = %ld",
442 td->name, (long)ctx->left, (long)size);
443
444 /*
445 * Skip everything until the end of the SEQUENCE.
446 */
447 while(ctx->left) {
448 ssize_t tl, ll;
449
450 tl = ber_fetch_tag(ptr, LEFT, &tlv_tag);
451 switch(tl) {
452 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
453 /* Fall through */
454 case -1: RETURN(RC_FAIL);
455 }
456
457 /*
458 * If expected <0><0>...
459 */
460 if(ctx->left < 0
461 && ((const uint8_t *)ptr)[0] == 0) {
462 if(LEFT < 2) {
463 if(SIZE_VIOLATION)
464 RETURN(RC_FAIL);
465 else
466 RETURN(RC_WMORE);
467 } else if(((const uint8_t *)ptr)[1] == 0) {
468 /*
469 * Correctly finished with <0><0>.
470 */
471 ADVANCE(2);
472 ctx->left++;
473 ctx->phase = 4;
474 continue;
475 }
476 }
477
478 if(!IN_EXTENSION_GROUP(specs, td->elements_count)
479 || ctx->phase == 4) {
480 ASN_DEBUG("Unexpected continuation "
481 "of a non-extensible type "
482 "%s (SEQUENCE): %s",
483 td->name,
484 ber_tlv_tag_string(tlv_tag));
485 RETURN(RC_FAIL);
486 }
487
488 ll = ber_skip_length(opt_codec_ctx,
489 BER_TLV_CONSTRUCTED(ptr),
490 (const char *)ptr + tl, LEFT - tl);
491 switch(ll) {
492 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
493 /* Fall through */
494 case -1: RETURN(RC_FAIL);
495 }
496
497 ADVANCE(tl + ll);
498 }
499
500 PHASE_OUT(ctx);
501 }
502
503 RETURN(RC_OK);
504}
505
506
507/*
508 * The DER encoder of the SEQUENCE type.
509 */
510asn_enc_rval_t
511SEQUENCE_encode_der(const asn_TYPE_descriptor_t *td, const void *sptr,
512 int tag_mode, ber_tlv_tag_t tag,
513 asn_app_consume_bytes_f *cb, void *app_key) {
514 size_t computed_size = 0;
515 asn_enc_rval_t erval = {0,0,0};
516 ssize_t ret;
517 size_t edx;
518
519 ASN_DEBUG("%s %s as SEQUENCE",
520 cb?"Encoding":"Estimating", td->name);
521
522 /*
523 * Gather the length of the underlying members sequence.
524 */
525 for(edx = 0; edx < td->elements_count; edx++) {
526 asn_TYPE_member_t *elm = &td->elements[edx];
527
528 const void *memb_ptr; /* Pointer to the member */
529 const void *const *memb_ptr2; /* Pointer to that pointer */
530
531 if(elm->flags & ATF_POINTER) {
532 memb_ptr2 =
533 (const void *const *)((const char *)sptr + elm->memb_offset);
534 if(!*memb_ptr2) {
535 ASN_DEBUG("Element %s %" ASN_PRI_SIZE " not present",
536 elm->name, edx);
537 if(elm->optional)
538 continue;
539 /* Mandatory element is missing */
540 ASN__ENCODE_FAILED;
541 }
542 } else {
543 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
544 memb_ptr2 = &memb_ptr;
545 }
546
547 /* Eliminate default values */
548 if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0)
549 continue;
550
551 erval = elm->type->op->der_encoder(elm->type, *memb_ptr2,
552 elm->tag_mode, elm->tag,
553 0, 0);
554 if(erval.encoded == -1)
555 return erval;
556 computed_size += erval.encoded;
557 ASN_DEBUG("Member %" ASN_PRI_SIZE " %s estimated %ld bytes",
558 edx, elm->name, (long)erval.encoded);
559 }
560
561 /*
562 * Encode the TLV for the sequence itself.
563 */
564 ret = der_write_tags(td, computed_size, tag_mode, 1, tag, cb, app_key);
565 ASN_DEBUG("Wrote tags: %ld (+%ld)", (long)ret, (long)computed_size);
566 if(ret == -1)
567 ASN__ENCODE_FAILED;
568 erval.encoded = computed_size + ret;
569
570 if(!cb) ASN__ENCODED_OK(erval);
571
572 /*
573 * Encode all members.
574 */
575 for(edx = 0; edx < td->elements_count; edx++) {
576 asn_TYPE_member_t *elm = &td->elements[edx];
577 asn_enc_rval_t tmperval = {0,0,0};
578 const void *memb_ptr; /* Pointer to the member */
579 const void *const *memb_ptr2; /* Pointer to that pointer */
580
581 if(elm->flags & ATF_POINTER) {
582 memb_ptr2 =
583 (const void *const *)((const char *)sptr + elm->memb_offset);
584 if(!*memb_ptr2) continue;
585 } else {
586 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
587 memb_ptr2 = &memb_ptr;
588 }
589
590 /* Eliminate default values */
591 if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0)
592 continue;
593
594 tmperval = elm->type->op->der_encoder(elm->type, *memb_ptr2,
595 elm->tag_mode, elm->tag, cb, app_key);
596 if(tmperval.encoded == -1)
597 return tmperval;
598 computed_size -= tmperval.encoded;
599 ASN_DEBUG("Member %" ASN_PRI_SIZE " %s of SEQUENCE %s encoded in %ld bytes",
600 edx, elm->name, td->name, (long)tmperval.encoded);
601 }
602
603 if(computed_size != 0)
604 /*
605 * Encoded size is not equal to the computed size.
606 */
607 ASN__ENCODE_FAILED;
608
609 ASN__ENCODED_OK(erval);
610}
611
612
613#undef XER_ADVANCE
614#define XER_ADVANCE(num_bytes) \
615 do { \
616 size_t num = (num_bytes); \
617 ptr = ((const char *)ptr) + num; \
618 size -= num; \
619 consumed_myself += num; \
620 } while(0)
621
622/*
623 * Decode the XER (XML) data.
624 */
625asn_dec_rval_t
626SEQUENCE_decode_xer(const asn_codec_ctx_t *opt_codec_ctx,
627 const asn_TYPE_descriptor_t *td, void **struct_ptr,
628 const char *opt_mname, const void *ptr, size_t size) {
629 /*
630 * Bring closer parts of structure description.
631 */
632 const asn_SEQUENCE_specifics_t *specs
633 = (const asn_SEQUENCE_specifics_t *)td->specifics;
634 asn_TYPE_member_t *elements = td->elements;
635 const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
636
637 /*
638 * ... and parts of the structure being constructed.
639 */
640 void *st = *struct_ptr; /* Target structure. */
641 asn_struct_ctx_t *ctx; /* Decoder context */
642
643 asn_dec_rval_t rval; /* Return value from a decoder */
644 ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
645 size_t edx; /* Element index */
646
647 /*
648 * Create the target structure if it is not present already.
649 */
650 if(st == 0) {
651 st = *struct_ptr = CALLOC(1, specs->struct_size);
652 if(st == 0) RETURN(RC_FAIL);
653 }
654
655 /*
656 * Restore parsing context.
657 */
658 ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
659
660
661 /*
662 * Phases of XER/XML processing:
663 * Phase 0: Check that the opening tag matches our expectations.
664 * Phase 1: Processing body and reacting on closing tag.
665 * Phase 2: Processing inner type.
666 * Phase 3: Skipping unknown extensions.
667 * Phase 4: PHASED OUT
668 */
669 for(edx = ctx->step; ctx->phase <= 3;) {
670 pxer_chunk_type_e ch_type; /* XER chunk type */
671 ssize_t ch_size; /* Chunk size */
672 xer_check_tag_e tcv; /* Tag check value */
673 asn_TYPE_member_t *elm;
674
675 /*
676 * Go inside the inner member of a sequence.
677 */
678 if(ctx->phase == 2) {
679 asn_dec_rval_t tmprval;
680 void *memb_ptr_dontuse; /* Pointer to the member */
681 void **memb_ptr2; /* Pointer to that pointer */
682
683 elm = &td->elements[edx];
684
685 if(elm->flags & ATF_POINTER) {
686 /* Member is a pointer to another structure */
687 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
688 } else {
689 memb_ptr_dontuse = (char *)st + elm->memb_offset;
690 memb_ptr2 = &memb_ptr_dontuse; /* Only use of memb_ptr_dontuse */
691 }
692
693 if(elm->flags & ATF_OPEN_TYPE) {
694 tmprval = OPEN_TYPE_xer_get(opt_codec_ctx, td, st, elm, ptr, size);
695 } else {
696 /* Invoke the inner type decoder, m.b. multiple times */
697 tmprval = elm->type->op->xer_decoder(opt_codec_ctx,
698 elm->type, memb_ptr2, elm->name,
699 ptr, size);
700 }
701 XER_ADVANCE(tmprval.consumed);
702 if(tmprval.code != RC_OK)
703 RETURN(tmprval.code);
704 ctx->phase = 1; /* Back to body processing */
705 ctx->step = ++edx;
706 ASN_DEBUG("XER/SEQUENCE phase => %d, step => %d",
707 ctx->phase, ctx->step);
708 /* Fall through */
709 }
710
711 /*
712 * Get the next part of the XML stream.
713 */
714 ch_size = xer_next_token(&ctx->context, ptr, size,
715 &ch_type);
716 if(ch_size == -1) {
717 RETURN(RC_FAIL);
718 } else {
719 switch(ch_type) {
720 case PXER_WMORE:
721 RETURN(RC_WMORE);
722 case PXER_COMMENT: /* Got XML comment */
723 case PXER_TEXT: /* Ignore free-standing text */
724 XER_ADVANCE(ch_size); /* Skip silently */
725 continue;
726 case PXER_TAG:
727 break; /* Check the rest down there */
728 }
729 }
730
731 tcv = xer_check_tag(ptr, ch_size, xml_tag);
732 ASN_DEBUG("XER/SEQUENCE: tcv = %d, ph=%d [%s]",
733 tcv, ctx->phase, xml_tag);
734
735 /* Skip the extensions section */
736 if(ctx->phase == 3) {
737 switch(xer_skip_unknown(tcv, &ctx->left)) {
738 case -1:
739 ctx->phase = 4;
740 RETURN(RC_FAIL);
741 case 0:
742 XER_ADVANCE(ch_size);
743 continue;
744 case 1:
745 XER_ADVANCE(ch_size);
746 ctx->phase = 1;
747 continue;
748 case 2:
749 ctx->phase = 1;
750 break;
751 }
752 }
753
754 switch(tcv) {
755 case XCT_CLOSING:
756 if(ctx->phase == 0) break;
757 ctx->phase = 0;
758 /* Fall through */
759 case XCT_BOTH:
760 if(ctx->phase == 0) {
761 if(edx >= td->elements_count ||
762 /* Explicit OPTIONAL specs reaches the end */
763 (edx + elements[edx].optional == td->elements_count) ||
764 /* All extensions are optional */
765 IN_EXTENSION_GROUP(specs, edx)) {
766 XER_ADVANCE(ch_size);
767 ctx->phase = 4; /* Phase out */
768 RETURN(RC_OK);
769 } else {
770 ASN_DEBUG("Premature end of XER SEQUENCE");
771 RETURN(RC_FAIL);
772 }
773 }
774 /* Fall through */
775 case XCT_OPENING:
776 if(ctx->phase == 0) {
777 XER_ADVANCE(ch_size);
778 ctx->phase = 1; /* Processing body phase */
779 continue;
780 }
781 /* Fall through */
782 case XCT_UNKNOWN_OP:
783 case XCT_UNKNOWN_BO:
784
785 ASN_DEBUG("XER/SEQUENCE: tcv=%d, ph=%d, edx=%" ASN_PRI_SIZE "",
786 tcv, ctx->phase, edx);
787 if(ctx->phase != 1) {
788 break; /* Really unexpected */
789 }
790
791 if(edx < td->elements_count) {
792 /*
793 * Search which member corresponds to this tag.
794 */
795 size_t n;
796 size_t edx_end = edx + elements[edx].optional + 1;
797 if(edx_end > td->elements_count)
798 edx_end = td->elements_count;
799 for(n = edx; n < edx_end; n++) {
800 elm = &td->elements[n];
801 tcv = xer_check_tag(ptr, ch_size, elm->name);
802 switch(tcv) {
803 case XCT_BOTH:
804 case XCT_OPENING:
805 /*
806 * Process this member.
807 */
808 ctx->step = edx = n;
809 ctx->phase = 2;
810 break;
811 case XCT_UNKNOWN_OP:
812 case XCT_UNKNOWN_BO:
813 continue;
814 default:
815 n = edx_end;
816 break; /* Phase out */
817 }
818 break;
819 }
820 if(n != edx_end)
821 continue;
822 } else {
823 ASN_DEBUG("Out of defined members: %" ASN_PRI_SIZE "/%u",
824 edx, td->elements_count);
825 }
826
827 /* It is expected extension */
828 if(IN_EXTENSION_GROUP(specs,
829 edx + (edx < td->elements_count
830 ? elements[edx].optional : 0))) {
831 ASN_DEBUG("Got anticipated extension at %" ASN_PRI_SIZE "",
832 edx);
833 /*
834 * Check for (XCT_BOTH or XCT_UNKNOWN_BO)
835 * By using a mask. Only record a pure
836 * <opening> tags.
837 */
838 if(tcv & XCT_CLOSING) {
839 /* Found </extension> without body */
840 } else {
841 ctx->left = 1;
842 ctx->phase = 3; /* Skip ...'s */
843 }
844 XER_ADVANCE(ch_size);
845 continue;
846 }
847
848 /* Fall through */
849 default:
850 break;
851 }
852
853 ASN_DEBUG("Unexpected XML tag in SEQUENCE [%c%c%c%c%c%c]",
854 size>0?((const char *)ptr)[0]:'.',
855 size>1?((const char *)ptr)[1]:'.',
856 size>2?((const char *)ptr)[2]:'.',
857 size>3?((const char *)ptr)[3]:'.',
858 size>4?((const char *)ptr)[4]:'.',
859 size>5?((const char *)ptr)[5]:'.');
860 break;
861 }
862
863 ctx->phase = 4; /* "Phase out" on hard failure */
864 RETURN(RC_FAIL);
865}
866
867asn_enc_rval_t
868SEQUENCE_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr,
869 int ilevel, enum xer_encoder_flags_e flags,
870 asn_app_consume_bytes_f *cb, void *app_key) {
871 asn_enc_rval_t er = {0,0,0};
872 int xcan = (flags & XER_F_CANONICAL);
873 asn_TYPE_descriptor_t *tmp_def_val_td = 0;
874 void *tmp_def_val = 0;
875 size_t edx;
876
877 if(!sptr) ASN__ENCODE_FAILED;
878
879 er.encoded = 0;
880
881 for(edx = 0; edx < td->elements_count; edx++) {
882 asn_enc_rval_t tmper = {0,0,0};
883 asn_TYPE_member_t *elm = &td->elements[edx];
884 const void *memb_ptr;
885 const char *mname = elm->name;
886 unsigned int mlen = strlen(mname);
887
888 if(elm->flags & ATF_POINTER) {
889 memb_ptr =
890 *(const void *const *)((const char *)sptr + elm->memb_offset);
891 if(!memb_ptr) {
892 assert(tmp_def_val == 0);
893 if(elm->default_value_set) {
894 if(elm->default_value_set(&tmp_def_val)) {
895 ASN__ENCODE_FAILED;
896 } else {
897 memb_ptr = tmp_def_val;
898 tmp_def_val_td = elm->type;
899 }
900 } else if(elm->optional) {
901 continue;
902 } else {
903 /* Mandatory element is missing */
904 ASN__ENCODE_FAILED;
905 }
906 }
907 } else {
908 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
909 }
910
911 if(!xcan) ASN__TEXT_INDENT(1, ilevel);
912 ASN__CALLBACK3("<", 1, mname, mlen, ">", 1);
913
914 /* Print the member itself */
915 tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, ilevel + 1,
916 flags, cb, app_key);
917 if(tmp_def_val) {
918 ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val);
919 tmp_def_val = 0;
920 }
921 if(tmper.encoded == -1) return tmper;
922 er.encoded += tmper.encoded;
923
924 ASN__CALLBACK3("</", 2, mname, mlen, ">", 1);
925 }
926
927 if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1);
928
929 ASN__ENCODED_OK(er);
930cb_failed:
931 if(tmp_def_val) ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val);
932 ASN__ENCODE_FAILED;
933}
934
935int
936SEQUENCE_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
937 asn_app_consume_bytes_f *cb, void *app_key) {
938 size_t edx;
939 int ret;
940
941 if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
942
943 /* Dump preamble */
944 if(cb(td->name, strlen(td->name), app_key) < 0
945 || cb(" ::= {", 6, app_key) < 0)
946 return -1;
947
948 for(edx = 0; edx < td->elements_count; edx++) {
949 asn_TYPE_member_t *elm = &td->elements[edx];
950 const void *memb_ptr;
951
952 if(elm->flags & ATF_POINTER) {
953 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
954 if(!memb_ptr) {
955 if(elm->optional) continue;
956 /* Print <absent> line */
957 /* Fall through */
958 }
959 } else {
960 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
961 }
962
963 /* Indentation */
964 _i_INDENT(1);
965
966 /* Print the member's name and stuff */
967 if(cb(elm->name, strlen(elm->name), app_key) < 0
968 || cb(": ", 2, app_key) < 0)
969 return -1;
970
971 /* Print the member itself */
972 ret = elm->type->op->print_struct(elm->type, memb_ptr, ilevel + 1,
973 cb, app_key);
974 if(ret) return ret;
975 }
976
977 ilevel--;
978 _i_INDENT(1);
979
980 return (cb("}", 1, app_key) < 0) ? -1 : 0;
981}
982
983void
984SEQUENCE_free(const asn_TYPE_descriptor_t *td, void *sptr,
985 enum asn_struct_free_method method) {
986 size_t edx;
987 const asn_SEQUENCE_specifics_t *specs =
988 (const asn_SEQUENCE_specifics_t *)td->specifics;
989 asn_struct_ctx_t *ctx; /* Decoder context */
990
991 if(!td || !sptr)
992 return;
993
994 ASN_DEBUG("Freeing %s as SEQUENCE", td->name);
995
996 for(edx = 0; edx < td->elements_count; edx++) {
997 asn_TYPE_member_t *elm = &td->elements[edx];
998 void *memb_ptr;
999 if(elm->flags & ATF_POINTER) {
1000 memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
1001 if(memb_ptr)
1002 ASN_STRUCT_FREE(*elm->type, memb_ptr);
1003 } else {
1004 memb_ptr = (void *)((char *)sptr + elm->memb_offset);
1005 ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr);
1006 }
1007 }
1008
1009 /* Clean parsing context */
1010 ctx = (asn_struct_ctx_t *)((char *)sptr + specs->ctx_offset);
1011 FREEMEM(ctx->ptr);
1012
1013 switch(method) {
1014 case ASFM_FREE_EVERYTHING:
1015 FREEMEM(sptr);
1016 break;
1017 case ASFM_FREE_UNDERLYING:
1018 break;
1019 case ASFM_FREE_UNDERLYING_AND_RESET:
1020 memset(
1021 sptr, 0,
1022 ((const asn_SEQUENCE_specifics_t *)(td->specifics))->struct_size);
1023 break;
1024 }
1025}
1026
1027int
1028SEQUENCE_constraint(const asn_TYPE_descriptor_t *td, const void *sptr,
1029 asn_app_constraint_failed_f *ctfailcb, void *app_key) {
1030 size_t edx;
1031
1032 if(!sptr) {
1033 ASN__CTFAIL(app_key, td, sptr,
1034 "%s: value not given (%s:%d)",
1035 td->name, __FILE__, __LINE__);
1036 return -1;
1037 }
1038
1039 /*
1040 * Iterate over structure members and check their validity.
1041 */
1042 for(edx = 0; edx < td->elements_count; edx++) {
1043 asn_TYPE_member_t *elm = &td->elements[edx];
1044 const void *memb_ptr;
1045
1046 if(elm->flags & ATF_POINTER) {
1047 memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
1048 if(!memb_ptr) {
1049 if(elm->optional)
1050 continue;
1051 ASN__CTFAIL(app_key, td, sptr,
1052 "%s: mandatory element %s absent (%s:%d)",
1053 td->name, elm->name, __FILE__, __LINE__);
1054 return -1;
1055 }
1056 } else {
1057 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1058 }
1059
1060 if(elm->encoding_constraints.general_constraints) {
1061 int ret = elm->encoding_constraints.general_constraints(elm->type, memb_ptr,
1062 ctfailcb, app_key);
1063 if(ret) return ret;
1064 } else {
1065 return elm->type->encoding_constraints.general_constraints(elm->type,
1066 memb_ptr, ctfailcb, app_key);
1067 }
1068 }
1069
1070 return 0;
1071}
1072
1073#ifndef ASN_DISABLE_PER_SUPPORT
1074
1075asn_dec_rval_t
1076SEQUENCE_decode_uper(const asn_codec_ctx_t *opt_codec_ctx,
1077 const asn_TYPE_descriptor_t *td,
1078 const asn_per_constraints_t *constraints, void **sptr,
1079 asn_per_data_t *pd) {
1080 const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics;
1081 void *st = *sptr; /* Target structure. */
1082 int extpresent; /* Extension additions are present */
1083 uint8_t *opres; /* Presence of optional root members */
1084 asn_per_data_t opmd;
1085 asn_dec_rval_t rv;
1086 size_t edx;
1087
1088 (void)constraints;
1089
1090 if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx))
1091 ASN__DECODE_FAILED;
1092
1093 if(!st) {
1094 st = *sptr = CALLOC(1, specs->struct_size);
1095 if(!st) ASN__DECODE_FAILED;
1096 }
1097
1098 ASN_DEBUG("Decoding %s as SEQUENCE (UPER)", td->name);
1099
1100 /* Handle extensions */
1101 if(specs->first_extension < 0) {
1102 extpresent = 0;
1103 } else {
1104 extpresent = per_get_few_bits(pd, 1);
1105 if(extpresent < 0) ASN__DECODE_STARVED;
1106 }
1107
1108 /* Prepare a place and read-in the presence bitmap */
1109 memset(&opmd, 0, sizeof(opmd));
1110 if(specs->roms_count) {
1111 opres = (uint8_t *)MALLOC(((specs->roms_count + 7) >> 3) + 1);
1112 if(!opres) ASN__DECODE_FAILED;
1113 /* Get the presence map */
1114 if(per_get_many_bits(pd, opres, 0, specs->roms_count)) {
1115 FREEMEM(opres);
1116 ASN__DECODE_STARVED;
1117 }
1118 opmd.buffer = opres;
1119 opmd.nbits = specs->roms_count;
1120 ASN_DEBUG("Read in presence bitmap for %s of %d bits (%x..)",
1121 td->name, specs->roms_count, *opres);
1122 } else {
1123 opres = 0;
1124 }
1125
1126 /*
1127 * Get the sequence ROOT elements.
1128 */
1129 for(edx = 0;
1130 edx < (specs->first_extension < 0 ? td->elements_count
1131 : (size_t)specs->first_extension);
1132 edx++) {
1133 asn_TYPE_member_t *elm = &td->elements[edx];
1134 void *memb_ptr; /* Pointer to the member */
1135 void **memb_ptr2; /* Pointer to that pointer */
1136
1137 assert(!IN_EXTENSION_GROUP(specs, edx));
1138
1139 /* Fetch the pointer to this member */
1140 if(elm->flags & ATF_POINTER) {
1141 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1142 } else {
1143 memb_ptr = (char *)st + elm->memb_offset;
1144 memb_ptr2 = &memb_ptr;
1145 }
1146
1147 /* Deal with optionality */
1148 if(elm->optional) {
1149 int present = per_get_few_bits(&opmd, 1);
1150 ASN_DEBUG("Member %s->%s is optional, p=%d (%d->%d)",
1151 td->name, elm->name, present,
1152 (int)opmd.nboff, (int)opmd.nbits);
1153 if(present == 0) {
1154 /* This element is not present */
1155 if(elm->default_value_set) {
1156 /* Fill-in DEFAULT */
1157 if(elm->default_value_set(memb_ptr2)) {
1158 FREEMEM(opres);
1159 ASN__DECODE_FAILED;
1160 }
1161 ASN_DEBUG("Filled-in default");
1162 }
1163 /* The member is just not present */
1164 continue;
1165 }
1166 /* Fall through */
1167 }
1168
1169 /* Fetch the member from the stream */
1170 ASN_DEBUG("Decoding member \"%s\" in %s", elm->name, td->name);
1171
1172 if(elm->flags & ATF_OPEN_TYPE) {
1173 rv = OPEN_TYPE_uper_get(opt_codec_ctx, td, st, elm, pd);
1174 } else {
1175 rv = elm->type->op->uper_decoder(opt_codec_ctx, elm->type,
1176 elm->encoding_constraints.per_constraints, memb_ptr2, pd);
1177 }
1178 if(rv.code != RC_OK) {
1179 ASN_DEBUG("Failed decode %s in %s",
1180 elm->name, td->name);
1181 FREEMEM(opres);
1182 return rv;
1183 }
1184 }
1185
1186 /* Optionality map is not needed anymore */
1187 FREEMEM(opres);
1188
1189 /*
1190 * Deal with extensions.
1191 */
1192 if(extpresent) {
1193 ssize_t bmlength;
1194 uint8_t *epres; /* Presence of extension members */
1195 asn_per_data_t epmd;
1196
1197 bmlength = uper_get_nslength(pd);
1198 if(bmlength < 0) ASN__DECODE_STARVED;
1199
1200 ASN_DEBUG("Extensions %" ASN_PRI_SSIZE " present in %s", bmlength, td->name);
1201
1202 epres = (uint8_t *)MALLOC((bmlength + 15) >> 3);
1203 if(!epres) ASN__DECODE_STARVED;
1204
1205 /* Get the extensions map */
1206 if(per_get_many_bits(pd, epres, 0, bmlength)) {
1207 FREEMEM(epres);
1208 ASN__DECODE_STARVED;
1209 }
1210
1211 memset(&epmd, 0, sizeof(epmd));
1212 epmd.buffer = epres;
1213 epmd.nbits = bmlength;
1214 ASN_DEBUG("Read in extensions bitmap for %s of %ld bits (%x..)",
1215 td->name, (long)bmlength, *epres);
1216
1217 /* Go over extensions and read them in */
1218 for(edx = specs->first_extension; edx < td->elements_count; edx++) {
1219 asn_TYPE_member_t *elm = &td->elements[edx];
1220 void *memb_ptr; /* Pointer to the member */
1221 void **memb_ptr2; /* Pointer to that pointer */
1222 int present;
1223
1224 /* Fetch the pointer to this member */
1225 if(elm->flags & ATF_POINTER) {
1226 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1227 } else {
1228 memb_ptr = (void *)((char *)st + elm->memb_offset);
1229 memb_ptr2 = &memb_ptr;
1230 }
1231
1232 present = per_get_few_bits(&epmd, 1);
1233 if(present <= 0) {
1234 if(present < 0) break; /* No more extensions */
1235 continue;
1236 }
1237
1238 ASN_DEBUG("Decoding member %s in %s %p", elm->name, td->name,
1239 *memb_ptr2);
1240 rv = uper_open_type_get(opt_codec_ctx, elm->type,
1241 elm->encoding_constraints.per_constraints,
1242 memb_ptr2, pd);
1243 if(rv.code != RC_OK) {
1244 FREEMEM(epres);
1245 return rv;
1246 }
1247 }
1248
1249 /* Skip over overflow extensions which aren't present
1250 * in this system's version of the protocol */
1251 for(;;) {
1252 ASN_DEBUG("Getting overflow extensions");
1253 switch(per_get_few_bits(&epmd, 1)) {
1254 case -1: break;
1255 case 0: continue;
1256 default:
1257 if(uper_open_type_skip(opt_codec_ctx, pd)) {
1258 FREEMEM(epres);
1259 ASN__DECODE_STARVED;
1260 }
1261 ASN_DEBUG("Skipped overflow extension");
1262 continue;
1263 }
1264 break;
1265 }
1266
1267 FREEMEM(epres);
1268 }
1269
1270 if(specs->first_extension >= 0) {
1271 unsigned i;
1272 /* Fill DEFAULT members in extensions */
1273 for(i = specs->roms_count; i < specs->roms_count + specs->aoms_count;
1274 i++) {
1275 asn_TYPE_member_t *elm;
1276 void **memb_ptr2; /* Pointer to member pointer */
1277
1278 edx = specs->oms[i];
1279 elm = &td->elements[edx];
1280
1281 if(!elm->default_value_set) continue;
1282
1283 /* Fetch the pointer to this member */
1284 if(elm->flags & ATF_POINTER) {
1285 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1286 if(*memb_ptr2) continue;
1287 } else {
1288 continue; /* Extensions are all optionals */
1289 }
1290
1291 /* Set default value */
1292 if(elm->default_value_set(memb_ptr2)) {
1293 ASN__DECODE_FAILED;
1294 }
1295 }
1296 }
1297
1298 rv.consumed = 0;
1299 rv.code = RC_OK;
1300 return rv;
1301}
1302
1303static int
1304SEQUENCE__handle_extensions(const asn_TYPE_descriptor_t *td, const void *sptr,
1305 asn_per_outp_t *po1, asn_per_outp_t *po2) {
1306 const asn_SEQUENCE_specifics_t *specs =
1307 (const asn_SEQUENCE_specifics_t *)td->specifics;
1308 int exts_present = 0;
1309 int exts_count = 0;
1310 size_t edx;
1311
1312 if(specs->first_extension < 0) {
1313 return 0;
1314 }
1315
1316 /* Find out which extensions are present */
1317 for(edx = specs->first_extension; edx < td->elements_count; edx++) {
1318 asn_TYPE_member_t *elm = &td->elements[edx];
1319 const void *memb_ptr; /* Pointer to the member */
1320 const void *const *memb_ptr2; /* Pointer to that pointer */
1321 int present;
1322
1323 /* Fetch the pointer to this member */
1324 if(elm->flags & ATF_POINTER) {
1325 memb_ptr2 =
1326 (const void *const *)((const char *)sptr + elm->memb_offset);
1327 present = (*memb_ptr2 != 0);
1328 } else {
1329 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1330 memb_ptr2 = &memb_ptr;
1331 present = 1;
1332 }
1333
1334 ASN_DEBUG("checking %s:%s (@%" ASN_PRI_SIZE ") present => %d", elm->name,
1335 elm->type->name, edx, present);
1336 exts_count++;
1337 exts_present += present;
1338
1339 /* Encode as presence marker */
1340 if(po1 && per_put_few_bits(po1, present, 1)) {
1341 return -1;
1342 }
1343 /* Encode as open type field */
1344 if(po2 && present
1345 && uper_open_type_put(elm->type,
1346 elm->encoding_constraints.per_constraints,
1347 *memb_ptr2, po2))
1348 return -1;
1349 }
1350
1351 return exts_present ? exts_count : 0;
1352}
1353
1354asn_enc_rval_t
1355SEQUENCE_encode_uper(const asn_TYPE_descriptor_t *td,
1356 const asn_per_constraints_t *constraints, const void *sptr,
1357 asn_per_outp_t *po) {
1358 const asn_SEQUENCE_specifics_t *specs
1359 = (const asn_SEQUENCE_specifics_t *)td->specifics;
1360 asn_enc_rval_t er = {0,0,0};
1361 int n_extensions;
1362 size_t edx;
1363 size_t i;
1364
1365 (void)constraints;
1366
1367 if(!sptr)
1368 ASN__ENCODE_FAILED;
1369
1370 er.encoded = 0;
1371
1372 ASN_DEBUG("Encoding %s as SEQUENCE (UPER)", td->name);
1373
1374 /*
1375 * X.691#18.1 Whether structure is extensible
1376 * and whether to encode extensions
1377 */
1378 if(specs->first_extension < 0) {
1379 n_extensions = 0; /* There are no extensions to encode */
1380 } else {
1381 n_extensions = SEQUENCE__handle_extensions(td, sptr, 0, 0);
1382 if(n_extensions < 0) ASN__ENCODE_FAILED;
1383 if(per_put_few_bits(po, n_extensions ? 1 : 0, 1)) {
1384 ASN__ENCODE_FAILED;
1385 }
1386 }
1387
1388 /* Encode a presence bitmap */
1389 for(i = 0; i < specs->roms_count; i++) {
1390 asn_TYPE_member_t *elm;
1391 const void *memb_ptr; /* Pointer to the member */
1392 const void *const *memb_ptr2; /* Pointer to that pointer */
1393 int present;
1394
1395 edx = specs->oms[i];
1396 elm = &td->elements[edx];
1397
1398 /* Fetch the pointer to this member */
1399 if(elm->flags & ATF_POINTER) {
1400 memb_ptr2 =
1401 (const void *const *)((const char *)sptr + elm->memb_offset);
1402 present = (*memb_ptr2 != 0);
1403 } else {
1404 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1405 memb_ptr2 = &memb_ptr;
1406 present = 1;
1407 }
1408
1409 /* Eliminate default values */
1410 if(present && elm->default_value_cmp
1411 && elm->default_value_cmp(*memb_ptr2) == 0)
1412 present = 0;
1413
1414 ASN_DEBUG("Element %s %s %s->%s is %s",
1415 elm->flags & ATF_POINTER ? "ptr" : "inline",
1416 elm->default_value_cmp ? "def" : "wtv",
1417 td->name, elm->name, present ? "present" : "absent");
1418 if(per_put_few_bits(po, present, 1))
1419 ASN__ENCODE_FAILED;
1420 }
1421
1422 /*
1423 * Encode the sequence ROOT elements.
1424 */
1425 ASN_DEBUG("first_extension = %d, elements = %d", specs->first_extension,
1426 td->elements_count);
1427 for(edx = 0;
1428 edx < ((specs->first_extension < 0) ? td->elements_count
1429 : (size_t)specs->first_extension);
1430 edx++) {
1431 asn_TYPE_member_t *elm = &td->elements[edx];
1432 const void *memb_ptr; /* Pointer to the member */
1433 const void *const *memb_ptr2; /* Pointer to that pointer */
1434
1435 ASN_DEBUG("About to encode %s", elm->type->name);
1436
1437 /* Fetch the pointer to this member */
1438 if(elm->flags & ATF_POINTER) {
1439 memb_ptr2 =
1440 (const void *const *)((const char *)sptr + elm->memb_offset);
1441 if(!*memb_ptr2) {
1442 ASN_DEBUG("Element %s %" ASN_PRI_SIZE " not present",
1443 elm->name, edx);
1444 if(elm->optional)
1445 continue;
1446 /* Mandatory element is missing */
1447 ASN__ENCODE_FAILED;
1448 }
1449 } else {
1450 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1451 memb_ptr2 = &memb_ptr;
1452 }
1453
1454 /* Eliminate default values */
1455 if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0)
1456 continue;
1457
1458 ASN_DEBUG("Encoding %s->%s:%s", td->name, elm->name, elm->type->name);
1459 er = elm->type->op->uper_encoder(
1460 elm->type, elm->encoding_constraints.per_constraints, *memb_ptr2,
1461 po);
1462 if(er.encoded == -1) return er;
1463 }
1464
1465 /* No extensions to encode */
1466 if(!n_extensions) ASN__ENCODED_OK(er);
1467
1468 ASN_DEBUG("Length of extensions %d bit-map", n_extensions);
1469 /* #18.8. Write down the presence bit-map length. */
1470 if(uper_put_nslength(po, n_extensions))
1471 ASN__ENCODE_FAILED;
1472
1473 ASN_DEBUG("Bit-map of %d elements", n_extensions);
1474 /* #18.7. Encoding the extensions presence bit-map. */
1475 /* TODO: act upon NOTE in #18.7 for canonical PER */
1476 if(SEQUENCE__handle_extensions(td, sptr, po, 0) != n_extensions)
1477 ASN__ENCODE_FAILED;
1478
1479 ASN_DEBUG("Writing %d extensions", n_extensions);
1480 /* #18.9. Encode extensions as open type fields. */
1481 if(SEQUENCE__handle_extensions(td, sptr, 0, po) != n_extensions)
1482 ASN__ENCODE_FAILED;
1483
1484 ASN__ENCODED_OK(er);
1485}
1486
1487asn_dec_rval_t
1488SEQUENCE_decode_aper(const asn_codec_ctx_t *opt_codec_ctx,
1489 const asn_TYPE_descriptor_t *td,
1490 const asn_per_constraints_t *constraints, void **sptr, asn_per_data_t *pd) {
1491 const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics;
1492 void *st = *sptr; /* Target structure. */
1493 int extpresent; /* Extension additions are present */
1494 uint8_t *opres; /* Presence of optional root members */
1495 asn_per_data_t opmd;
1496 asn_dec_rval_t rv;
1497 size_t edx;
1498
1499 (void)constraints;
1500
1501 if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx))
1502 ASN__DECODE_FAILED;
1503
1504 if(!st) {
1505 st = *sptr = CALLOC(1, specs->struct_size);
1506 if(!st) ASN__DECODE_FAILED;
1507 }
1508
1509 ASN_DEBUG("Decoding %s as SEQUENCE (APER)", td->name);
1510
1511 /* Handle extensions */
1512 if(specs->first_extension < 0) {
1513 extpresent = 0;
1514 } else {
1515 extpresent = per_get_few_bits(pd, 1);
1516 if(extpresent < 0) ASN__DECODE_STARVED;
1517 }
1518
1519 /* Prepare a place and read-in the presence bitmap */
1520 memset(&opmd, 0, sizeof(opmd));
1521 if(specs->roms_count) {
1522 opres = (uint8_t *)MALLOC(((specs->roms_count + 7) >> 3) + 1);
1523 if(!opres) ASN__DECODE_FAILED;
1524 /* Get the presence map */
1525 if(per_get_many_bits(pd, opres, 0, specs->roms_count)) {
1526 FREEMEM(opres);
1527 ASN__DECODE_STARVED;
1528 }
1529 opmd.buffer = opres;
1530 opmd.nbits = specs->roms_count;
1531 ASN_DEBUG("Read in presence bitmap for %s of %d bits (%x..)",
1532 td->name, specs->roms_count, *opres);
1533 } else {
1534 opres = 0;
1535 }
1536
1537 /*
1538 * Get the sequence ROOT elements.
1539 */
1540 for(edx = 0; edx < td->elements_count; edx++) {
1541 asn_TYPE_member_t *elm = &td->elements[edx];
1542 void *memb_ptr; /* Pointer to the member */
1543 void **memb_ptr2; /* Pointer to that pointer */
1544#if 0
1545 int padding;
1546#endif
1547
1548 if(IN_EXTENSION_GROUP(specs, edx))
1549 continue;
1550
1551 /* Fetch the pointer to this member */
1552 if(elm->flags & ATF_POINTER) {
1553 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1554 } else {
1555 memb_ptr = (char *)st + elm->memb_offset;
1556 memb_ptr2 = &memb_ptr;
1557 }
1558#if 0
1559 /* Get Padding */
1560 padding = (8 - (pd->moved % 8)) % 8;
1561 if(padding > 0)
1562 ASN_DEBUG("For element %s,offset= %ld Padding bits = %d", td->name, pd->moved, padding);
1563#if 0 /* old way of removing padding */
1564 per_get_few_bits(pd, padding);
1565#else /* Experimental fix proposed by @mhanna123 */
1566 if(edx != (td->elements_count-1))
1567 per_get_few_bits(pd, padding);
1568 else {
1569 if(specs->roms_count && (padding > 0))
1570 ASN_DEBUG(">>>>> not skipping padding of %d bits for element:%ld out of %d", padding, edx, td->elements_count);
1571 else
1572 per_get_few_bits(pd, padding);
1573 }
1574#endif /* dealing with padding */
1575#endif
1576 /* Deal with optionality */
1577 if(elm->optional) {
1578 int present = per_get_few_bits(&opmd, 1);
1579 ASN_DEBUG("Member %s->%s is optional, p=%d (%d->%d)",
1580 td->name, elm->name, present,
1581 (int)opmd.nboff, (int)opmd.nbits);
1582 if(present == 0) {
1583 /* This element is not present */
1584 if(elm->default_value_set) {
1585 /* Fill-in DEFAULT */
1586 if(elm->default_value_set(memb_ptr2)) {
1587 FREEMEM(opres);
1588 ASN__DECODE_FAILED;
1589 }
1590 ASN_DEBUG("Filled-in default");
1591 }
1592 /* The member is just not present */
1593 continue;
1594 }
1595 /* Fall through */
1596 }
1597
1598 /* Fetch the member from the stream */
1599 ASN_DEBUG("Decoding member \"%s\" in %s", elm->name, td->name);
1600
1601 if(elm->flags & ATF_OPEN_TYPE) {
1602 rv = OPEN_TYPE_aper_get(opt_codec_ctx, td, st, elm, pd);
1603 } else {
1604 rv = elm->type->op->aper_decoder(opt_codec_ctx, elm->type,
1605 elm->encoding_constraints.per_constraints, memb_ptr2, pd);
1606 }
1607 if(rv.code != RC_OK) {
1608 ASN_DEBUG("Failed decode %s in %s",
1609 elm->name, td->name);
1610 FREEMEM(opres);
1611 return rv;
1612 }
1613 }
1614
1615 /* Optionality map is not needed anymore */
1616 FREEMEM(opres);
1617
1618 /*
1619 * Deal with extensions.
1620 */
1621 if(extpresent) {
1622 ssize_t bmlength;
1623 uint8_t *epres; /* Presence of extension members */
1624 asn_per_data_t epmd;
1625
1626 bmlength = aper_get_nslength(pd);
1627 if(bmlength < 0) ASN__DECODE_STARVED;
1628
1629 ASN_DEBUG("Extensions %" ASN_PRI_SSIZE " present in %s", bmlength, td->name);
1630
1631 epres = (uint8_t *)MALLOC((bmlength + 15) >> 3);
1632 if(!epres) ASN__DECODE_STARVED;
1633
1634 /* Get the extensions map */
1635 if(per_get_many_bits(pd, epres, 0, bmlength))
1636 ASN__DECODE_STARVED;
1637
1638 memset(&epmd, 0, sizeof(epmd));
1639 epmd.buffer = epres;
1640 epmd.nbits = bmlength;
1641 ASN_DEBUG("Read in extensions bitmap for %s of %ld bits (%x..)",
1642 td->name, bmlength, *epres);
1643
1644 /* Go over extensions and read them in */
1645 for(edx = specs->first_extension; edx < td->elements_count; edx++) {
1646 asn_TYPE_member_t *elm = &td->elements[edx];
1647 void *memb_ptr; /* Pointer to the member */
1648 void **memb_ptr2; /* Pointer to that pointer */
1649 int present;
1650
1651 if(!IN_EXTENSION_GROUP(specs, edx)) {
1652 ASN_DEBUG("%ld is not extension", edx);
1653 continue;
1654 }
1655
1656 /* Fetch the pointer to this member */
1657 if(elm->flags & ATF_POINTER) {
1658 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1659 } else {
1660 memb_ptr = (void *)((char *)st + elm->memb_offset);
1661 memb_ptr2 = &memb_ptr;
1662 }
1663
1664 present = per_get_few_bits(&epmd, 1);
1665 if(present <= 0) {
1666 if(present < 0) break; /* No more extensions */
1667 continue;
1668 }
1669
1670 ASN_DEBUG("Decoding member %s in %s %p", elm->name, td->name, *memb_ptr2);
1671 rv = aper_open_type_get(opt_codec_ctx, elm->type,
1672 elm->encoding_constraints.per_constraints, memb_ptr2, pd);
1673 if(rv.code != RC_OK) {
1674 FREEMEM(epres);
1675 return rv;
1676 }
1677 }
1678
1679 /* Skip over overflow extensions which aren't present
1680 * in this system's version of the protocol */
1681 for(;;) {
1682 ASN_DEBUG("Getting overflow extensions");
1683 switch(per_get_few_bits(&epmd, 1)) {
1684 case -1:
1685 break;
1686 case 0:
1687 continue;
1688 default:
1689 if(aper_open_type_skip(opt_codec_ctx, pd)) {
1690 FREEMEM(epres);
1691 ASN__DECODE_STARVED;
1692 }
1693 }
1694 break;
1695 }
1696
1697 FREEMEM(epres);
1698 }
1699
1700 /* Fill DEFAULT members in extensions */
1701 for(edx = specs->roms_count; edx < specs->roms_count
1702 + specs->aoms_count; edx++) {
1703 asn_TYPE_member_t *elm = &td->elements[edx];
1704 void **memb_ptr2; /* Pointer to member pointer */
1705
1706 if(!elm->default_value_set) continue;
1707
1708 /* Fetch the pointer to this member */
1709 if(elm->flags & ATF_POINTER) {
1710 memb_ptr2 = (void **)((char *)st
1711 + elm->memb_offset);
1712 if(*memb_ptr2) continue;
1713 } else {
1714 continue; /* Extensions are all optionals */
1715 }
1716
1717 /* Set default value */
1718 if(elm->default_value_set(memb_ptr2)) {
1719 ASN__DECODE_FAILED;
1720 }
1721 }
1722
1723 rv.consumed = 0;
1724 rv.code = RC_OK;
1725 return rv;
1726}
1727
1728static int
1729SEQUENCE_handle_extensions_aper(const asn_TYPE_descriptor_t *td,
1730 const void *sptr,
1731 asn_per_outp_t *po1, asn_per_outp_t *po2) {
1732 const asn_SEQUENCE_specifics_t *specs
1733 = (const asn_SEQUENCE_specifics_t *)td->specifics;
1734 int exts_present = 0;
1735 int exts_count = 0;
1736 size_t edx;
1737
1738 if(specs->first_extension < 0) {
1739 return 0;
1740 }
1741
1742 /* Find out which extensions are present */
1743 for(edx = specs->first_extension; edx < td->elements_count; edx++) {
1744 asn_TYPE_member_t *elm = &td->elements[edx];
1745 const void *memb_ptr; /* Pointer to the member */
1746 const void * const *memb_ptr2; /* Pointer to that pointer */
1747 int present;
1748
1749 if(!IN_EXTENSION_GROUP(specs, edx)) {
1750 ASN_DEBUG("%s (@%ld) is not extension", elm->type->name, edx);
1751 continue;
1752 }
1753
1754 /* Fetch the pointer to this member */
1755 if(elm->flags & ATF_POINTER) {
1756 memb_ptr2 = (const void * const *)((const char *)sptr + elm->memb_offset);
1757 present = (*memb_ptr2 != 0);
1758 } else {
1759 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1760 memb_ptr2 = &memb_ptr;
1761 present = 1;
1762 }
1763
1764 ASN_DEBUG("checking %s (@%ld) present => %d",
1765 elm->type->name, edx, present);
1766 exts_count++;
1767 exts_present += present;
1768
1769 /* Encode as presence marker */
1770 if(po1 && per_put_few_bits(po1, present, 1))
1771 return -1;
1772 /* Encode as open type field */
1773 if(po2 && present && aper_open_type_put(elm->type,
1774 elm->encoding_constraints.per_constraints, *memb_ptr2, po2))
1775 return -1;
1776
1777 }
1778
1779 return exts_present ? exts_count : 0;
1780}
1781
1782asn_enc_rval_t
1783SEQUENCE_encode_aper(const asn_TYPE_descriptor_t *td,
1784 const asn_per_constraints_t *constraints,
1785 const void *sptr, asn_per_outp_t *po) {
1786 const asn_SEQUENCE_specifics_t *specs
1787 = (const asn_SEQUENCE_specifics_t *)td->specifics;
1788 asn_enc_rval_t er = {0,0,0};
1789 int n_extensions;
1790 size_t edx;
1791 size_t i;
1792
1793 (void)constraints;
1794
1795 if(!sptr)
1796 ASN__ENCODE_FAILED;
1797
1798 er.encoded = 0;
1799
1800 ASN_DEBUG("Encoding %s as SEQUENCE (APER)", td->name);
1801
1802 /*
1803 * X.691#18.1 Whether structure is extensible
1804 * and whether to encode extensions
1805 */
1806 if(specs->first_extension < 0) {
1807 n_extensions = 0; /* There are no extensions to encode */
1808 } else {
1809 n_extensions = SEQUENCE_handle_extensions_aper(td, sptr, 0, 0);
1810 if(n_extensions < 0) ASN__ENCODE_FAILED;
1811 if(per_put_few_bits(po, n_extensions ? 1 : 0, 1)) {
1812 ASN__ENCODE_FAILED;
1813 }
1814 }
1815
1816 /* Encode a presence bitmap */
1817 for(i = 0; i < specs->roms_count; i++) {
1818 asn_TYPE_member_t *elm;
1819 const void *memb_ptr; /* Pointer to the member */
1820 const void * const *memb_ptr2; /* Pointer to that pointer */
1821 int present;
1822
1823 edx = specs->oms[i];
1824 elm = &td->elements[edx];
1825
1826 /* Fetch the pointer to this member */
1827 if(elm->flags & ATF_POINTER) {
1828 memb_ptr2 = (const void * const *)((const char *)sptr + elm->memb_offset);
1829 present = (*memb_ptr2 != 0);
1830 } else {
1831 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1832 memb_ptr2 = &memb_ptr;
1833 present = 1;
1834 }
1835
1836 /* Eliminate default values */
1837 if(present && elm->default_value_cmp
1838 && elm->default_value_cmp(memb_ptr2) == 1)
1839 present = 0;
1840
1841 ASN_DEBUG("Element %s %s %s->%s is %s",
1842 elm->flags & ATF_POINTER ? "ptr" : "inline",
1843 elm->default_value_cmp ? "def" : "wtv",
1844 td->name, elm->name, present ? "present" : "absent");
1845 if(per_put_few_bits(po, present, 1))
1846 ASN__ENCODE_FAILED;
1847 }
1848
1849 /*
1850 * Encode the sequence ROOT elements.
1851 */
1852 ASN_DEBUG("first_extension = %d, elements = %d", specs->first_extension,
1853 td->elements_count);
1854 for(edx = 0;
1855 edx < ((specs->first_extension < 0) ? td->elements_count
1856 : (size_t)specs->first_extension);
1857 edx++) {
1858 asn_TYPE_member_t *elm = &td->elements[edx];
1859 const void *memb_ptr; /* Pointer to the member */
1860 const void * const *memb_ptr2; /* Pointer to that pointer */
1861
1862 if(IN_EXTENSION_GROUP(specs, edx))
1863 continue;
1864
1865 ASN_DEBUG("About to encode %s", elm->type->name);
1866
1867 /* Fetch the pointer to this member */
1868 if(elm->flags & ATF_POINTER) {
1869 memb_ptr2 = (const void * const *)((const char *)sptr + elm->memb_offset);
1870 if(!*memb_ptr2) {
1871 ASN_DEBUG("Element %s %ld not present",
1872 elm->name, edx);
1873 if(elm->optional)
1874 continue;
1875 /* Mandatory element is missing */
1876 ASN__ENCODE_FAILED;
1877 }
1878 } else {
1879 memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1880 memb_ptr2 = &memb_ptr;
1881 }
1882
1883 /* Eliminate default values */
1884 if(elm->default_value_cmp && elm->default_value_cmp(memb_ptr2) == 1)
1885 continue;
1886
1887 ASN_DEBUG("Encoding %s->%s", td->name, elm->name);
1888 er = elm->type->op->aper_encoder(elm->type, elm->encoding_constraints.per_constraints,
1889 *memb_ptr2, po);
1890 if(er.encoded == -1)
1891 return er;
1892 }
1893
1894 /* No extensions to encode */
1895 if(!n_extensions) ASN__ENCODED_OK(er);
1896
1897 ASN_DEBUG("Length of %d bit-map", n_extensions);
1898 /* #18.8. Write down the presence bit-map length. */
1899 if(aper_put_nslength(po, n_extensions))
1900 ASN__ENCODE_FAILED;
1901
1902 ASN_DEBUG("Bit-map of %d elements", n_extensions);
1903 /* #18.7. Encoding the extensions presence bit-map. */
1904 /* TODO: act upon NOTE in #18.7 for canonical PER */
1905 if(SEQUENCE_handle_extensions_aper(td, sptr, po, 0) != n_extensions)
1906 ASN__ENCODE_FAILED;
1907
1908 ASN_DEBUG("Writing %d extensions", n_extensions);
1909 /* #18.9. Encode extensions as open type fields. */
1910 if(SEQUENCE_handle_extensions_aper(td, sptr, 0, po) != n_extensions)
1911 ASN__ENCODE_FAILED;
1912
1913 ASN__ENCODED_OK(er);
1914}
1915
1916#endif /* ASN_DISABLE_PER_SUPPORT */
1917
1918int
1919SEQUENCE_compare(const asn_TYPE_descriptor_t *td, const void *aptr,
1920 const void *bptr) {
1921 size_t edx;
1922
1923 for(edx = 0; edx < td->elements_count; edx++) {
1924 asn_TYPE_member_t *elm = &td->elements[edx];
1925 const void *amemb;
1926 const void *bmemb;
1927 int ret;
1928
1929 if(elm->flags & ATF_POINTER) {
1930 amemb =
1931 *(const void *const *)((const char *)aptr + elm->memb_offset);
1932 bmemb =
1933 *(const void *const *)((const char *)bptr + elm->memb_offset);
1934 if(!amemb) {
1935 if(!bmemb) continue;
1936 if(elm->default_value_cmp
1937 && elm->default_value_cmp(bmemb) == 0) {
1938 /* A is absent, but B is present and equal to DEFAULT */
1939 continue;
1940 }
1941 return -1;
1942 } else if(!bmemb) {
1943 if(elm->default_value_cmp
1944 && elm->default_value_cmp(amemb) == 0) {
1945 /* B is absent, but A is present and equal to DEFAULT */
1946 continue;
1947 }
1948 return 1;
1949 }
1950 } else {
1951 amemb = (const void *)((const char *)aptr + elm->memb_offset);
1952 bmemb = (const void *)((const char *)bptr + elm->memb_offset);
1953 }
1954
1955 ret = elm->type->op->compare_struct(elm->type, amemb, bmemb);
1956 if(ret != 0) return ret;
1957 }
1958
1959 return 0;
1960}
1961
1962asn_TYPE_operation_t asn_OP_SEQUENCE = {
1963 SEQUENCE_free,
1964 SEQUENCE_print,
1965 SEQUENCE_compare,
1966 SEQUENCE_decode_ber,
1967 SEQUENCE_encode_der,
1968 SEQUENCE_decode_xer,
1969 SEQUENCE_encode_xer,
1970#ifdef ASN_DISABLE_OER_SUPPORT
1971 0,
1972 0,
1973#else
1974 SEQUENCE_decode_oer,
1975 SEQUENCE_encode_oer,
1976#endif /* ASN_DISABLE_OER_SUPPORT */
1977#ifdef ASN_DISABLE_PER_SUPPORT
1978 0,
1979 0,
1980 0,
1981 0,
1982#else
1983 SEQUENCE_decode_uper,
1984 SEQUENCE_encode_uper,
1985 SEQUENCE_decode_aper,
1986 SEQUENCE_encode_aper,
1987#endif /* ASN_DISABLE_PER_SUPPORT */
1988 SEQUENCE_random_fill,
1989 0 /* Use generic outmost tag fetcher */
1990};
1991
1992
1993asn_random_fill_result_t
1994SEQUENCE_random_fill(const asn_TYPE_descriptor_t *td, void **sptr,
1995 const asn_encoding_constraints_t *constr,
1996 size_t max_length) {
1997 const asn_SEQUENCE_specifics_t *specs =
1998 (const asn_SEQUENCE_specifics_t *)td->specifics;
1999 asn_random_fill_result_t result_ok = {ARFILL_OK, 0};
2000 asn_random_fill_result_t result_failed = {ARFILL_FAILED, 0};
2001 asn_random_fill_result_t result_skipped = {ARFILL_SKIPPED, 0};
2002 void *st = *sptr;
2003 size_t edx;
2004
2005 if(max_length == 0) return result_skipped;
2006
2007 (void)constr;
2008
2009 if(st == NULL) {
2010 st = CALLOC(1, specs->struct_size);
2011 if(st == NULL) {
2012 return result_failed;
2013 }
2014 }
2015
2016 for(edx = 0; edx < td->elements_count; edx++) {
2017 const asn_TYPE_member_t *elm = &td->elements[edx];
2018 void *memb_ptr; /* Pointer to the member */
2019 void **memb_ptr2; /* Pointer to that pointer */
2020 asn_random_fill_result_t tmpres;
2021
2022 if(elm->optional && asn_random_between(0, 4) == 2) {
2023 /* Sometimes decide not to fill the optional value */
2024 continue;
2025 }
2026
2027 if(elm->flags & ATF_POINTER) {
2028 /* Member is a pointer to another structure */
2029 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
2030 } else {
2031 memb_ptr = (char *)st + elm->memb_offset;
2032 memb_ptr2 = &memb_ptr;
2033 }
2034
2035 tmpres = elm->type->op->random_fill(
2036 elm->type, memb_ptr2, &elm->encoding_constraints,
2037 max_length > result_ok.length ? max_length - result_ok.length : 0);
2038 switch(tmpres.code) {
2039 case ARFILL_OK:
2040 result_ok.length += tmpres.length;
2041 continue;
2042 case ARFILL_SKIPPED:
2043 assert(!(elm->flags & ATF_POINTER) || *memb_ptr2 == NULL);
2044 continue;
2045 case ARFILL_FAILED:
2046 if(st == *sptr) {
2047 ASN_STRUCT_RESET(*td, st);
2048 } else {
2049 ASN_STRUCT_FREE(*td, st);
2050 }
2051 return tmpres;
2052 }
2053 }
2054
2055 *sptr = st;
2056
2057 return result_ok;
2058}
2059