+++ /dev/null
-
-/*
- * Copyright (c) 2003-2017 Lev Walkin <vlm@lionet.info>.
- * All rights reserved.
- * Redistribution and modifications are permitted subject to BSD license.
- */
-#include <asn_internal.h>
-#include <constr_SET_OF.h>
-#include <asn_SET_OF.h>
-
-/*
- * Number of bytes left for this structure.
- * (ctx->left) indicates the number of bytes _transferred_ for the structure.
- * (size) contains the number of bytes in the buffer passed.
- */
-#define LEFT ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
-
-/*
- * If the subprocessor function returns with an indication that it wants
- * more data, it may well be a fatal decoding problem, because the
- * size is constrained by the <TLV>'s L, even if the buffer size allows
- * reading more data.
- * For example, consider the buffer containing the following TLVs:
- * <T:5><L:1><V> <T:6>...
- * The TLV length clearly indicates that one byte is expected in V, but
- * if the V processor returns with "want more data" even if the buffer
- * contains way more data than the V processor have seen.
- */
-#define SIZE_VIOLATION (ctx->left >= 0 && (size_t)ctx->left <= size)
-
-/*
- * This macro "eats" the part of the buffer which is definitely "consumed",
- * i.e. was correctly converted into local representation or rightfully skipped.
- */
-#undef ADVANCE
-#define ADVANCE(num_bytes) do { \
- size_t num = num_bytes; \
- ptr = ((const char *)ptr) + num;\
- size -= num; \
- if(ctx->left >= 0) \
- ctx->left -= num; \
- consumed_myself += num; \
- } while(0)
-
-/*
- * Switch to the next phase of parsing.
- */
-#undef NEXT_PHASE
-#undef PHASE_OUT
-#define NEXT_PHASE(ctx) do { \
- ctx->phase++; \
- ctx->step = 0; \
- } while(0)
-#define PHASE_OUT(ctx) do { ctx->phase = 10; } while(0)
-
-/*
- * Return a standardized complex structure.
- */
-#undef RETURN
-#define RETURN(_code) do { \
- rval.code = _code; \
- rval.consumed = consumed_myself;\
- return rval; \
- } while(0)
-
-/*
- * The decoder of the SET OF type.
- */
-asn_dec_rval_t
-SET_OF_decode_ber(const asn_codec_ctx_t *opt_codec_ctx,
- const asn_TYPE_descriptor_t *td, void **struct_ptr,
- const void *ptr, size_t size, int tag_mode) {
- /*
- * Bring closer parts of structure description.
- */
- const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics;
- const asn_TYPE_member_t *elm = td->elements; /* Single one */
-
- /*
- * Parts of the structure being constructed.
- */
- void *st = *struct_ptr; /* Target structure. */
- asn_struct_ctx_t *ctx; /* Decoder context */
-
- ber_tlv_tag_t tlv_tag; /* T from TLV */
- asn_dec_rval_t rval; /* Return code from subparsers */
-
- ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
-
- ASN_DEBUG("Decoding %s as SET OF", td->name);
-
- /*
- * Create the target structure if it is not present already.
- */
- if(st == 0) {
- st = *struct_ptr = CALLOC(1, specs->struct_size);
- if(st == 0) {
- RETURN(RC_FAIL);
- }
- }
-
- /*
- * Restore parsing context.
- */
- ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
-
- /*
- * Start to parse where left previously
- */
- switch(ctx->phase) {
- case 0:
- /*
- * PHASE 0.
- * Check that the set of tags associated with given structure
- * perfectly fits our expectations.
- */
-
- rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
- tag_mode, 1, &ctx->left, 0);
- if(rval.code != RC_OK) {
- ASN_DEBUG("%s tagging check failed: %d",
- td->name, rval.code);
- return rval;
- }
-
- if(ctx->left >= 0)
- ctx->left += rval.consumed; /* ?Substracted below! */
- ADVANCE(rval.consumed);
-
- ASN_DEBUG("Structure consumes %ld bytes, "
- "buffer %ld", (long)ctx->left, (long)size);
-
- NEXT_PHASE(ctx);
- /* Fall through */
- case 1:
- /*
- * PHASE 1.
- * From the place where we've left it previously,
- * try to decode the next item.
- */
- for(;; ctx->step = 0) {
- ssize_t tag_len; /* Length of TLV's T */
-
- if(ctx->step & 1)
- goto microphase2;
-
- /*
- * MICROPHASE 1: Synchronize decoding.
- */
-
- if(ctx->left == 0) {
- ASN_DEBUG("End of SET OF %s", td->name);
- /*
- * No more things to decode.
- * Exit out of here.
- */
- PHASE_OUT(ctx);
- RETURN(RC_OK);
- }
-
- /*
- * Fetch the T from TLV.
- */
- tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
- switch(tag_len) {
- case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
- /* Fall through */
- case -1: RETURN(RC_FAIL);
- }
-
- if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) {
- if(LEFT < 2) {
- if(SIZE_VIOLATION)
- RETURN(RC_FAIL);
- else
- RETURN(RC_WMORE);
- } else if(((const uint8_t *)ptr)[1] == 0) {
- /*
- * Found the terminator of the
- * indefinite length structure.
- */
- break;
- }
- }
-
- /* Outmost tag may be unknown and cannot be fetched/compared */
- if(elm->tag != (ber_tlv_tag_t)-1) {
- if(BER_TAGS_EQUAL(tlv_tag, elm->tag)) {
- /*
- * The new list member of expected type has arrived.
- */
- } else {
- ASN_DEBUG("Unexpected tag %s fixed SET OF %s",
- ber_tlv_tag_string(tlv_tag), td->name);
- ASN_DEBUG("%s SET OF has tag %s",
- td->name, ber_tlv_tag_string(elm->tag));
- RETURN(RC_FAIL);
- }
- }
-
- /*
- * MICROPHASE 2: Invoke the member-specific decoder.
- */
- ctx->step |= 1; /* Confirm entering next microphase */
- microphase2:
-
- /*
- * Invoke the member fetch routine according to member's type
- */
- rval = elm->type->op->ber_decoder(opt_codec_ctx,
- elm->type, &ctx->ptr, ptr, LEFT, 0);
- ASN_DEBUG("In %s SET OF %s code %d consumed %d",
- td->name, elm->type->name,
- rval.code, (int)rval.consumed);
- switch(rval.code) {
- case RC_OK:
- {
- asn_anonymous_set_ *list = _A_SET_FROM_VOID(st);
- if(ASN_SET_ADD(list, ctx->ptr) != 0)
- RETURN(RC_FAIL);
- else
- ctx->ptr = 0;
- }
- break;
- case RC_WMORE: /* More data expected */
- if(!SIZE_VIOLATION) {
- ADVANCE(rval.consumed);
- RETURN(RC_WMORE);
- }
- /* Fall through */
- case RC_FAIL: /* Fatal error */
- ASN_STRUCT_FREE(*elm->type, ctx->ptr);
- ctx->ptr = 0;
- RETURN(RC_FAIL);
- } /* switch(rval) */
-
- ADVANCE(rval.consumed);
- } /* for(all list members) */
-
- NEXT_PHASE(ctx);
- case 2:
- /*
- * Read in all "end of content" TLVs.
- */
- while(ctx->left < 0) {
- if(LEFT < 2) {
- if(LEFT > 0 && ((const char *)ptr)[0] != 0) {
- /* Unexpected tag */
- RETURN(RC_FAIL);
- } else {
- RETURN(RC_WMORE);
- }
- }
- if(((const char *)ptr)[0] == 0
- && ((const char *)ptr)[1] == 0) {
- ADVANCE(2);
- ctx->left++;
- } else {
- RETURN(RC_FAIL);
- }
- }
-
- PHASE_OUT(ctx);
- }
-
- RETURN(RC_OK);
-}
-
-/*
- * Internally visible buffer holding a single encoded element.
- */
-struct _el_buffer {
- uint8_t *buf;
- size_t length;
- size_t allocated_size;
- unsigned bits_unused;
-};
-/* Append bytes to the above structure */
-static int _el_addbytes(const void *buffer, size_t size, void *el_buf_ptr) {
- struct _el_buffer *el_buf = (struct _el_buffer *)el_buf_ptr;
-
- if(el_buf->length + size > el_buf->allocated_size) {
- size_t new_size = el_buf->allocated_size ? el_buf->allocated_size : 8;
- void *p;
-
- do {
- new_size <<= 2;
- } while(el_buf->length + size > new_size);
-
- p = REALLOC(el_buf->buf, new_size);
- if(p) {
- el_buf->buf = p;
- el_buf->allocated_size = new_size;
- } else {
- return -1;
- }
- }
-
- memcpy(el_buf->buf + el_buf->length, buffer, size);
-
- el_buf->length += size;
- return 0;
-}
-
-static void assert_unused_bits(const struct _el_buffer* p) {
- if(p->length) {
- assert((p->buf[p->length-1] & ~(0xff << p->bits_unused)) == 0);
- } else {
- assert(p->bits_unused == 0);
- }
-}
-
-static int _el_buf_cmp(const void *ap, const void *bp) {
- const struct _el_buffer *a = (const struct _el_buffer *)ap;
- const struct _el_buffer *b = (const struct _el_buffer *)bp;
- size_t common_len;
- int ret = 0;
-
- if(a->length < b->length)
- common_len = a->length;
- else
- common_len = b->length;
-
- if (a->buf && b->buf) {
- ret = memcmp(a->buf, b->buf, common_len);
- }
- if(ret == 0) {
- if(a->length < b->length)
- ret = -1;
- else if(a->length > b->length)
- ret = 1;
- /* Ignore unused bits. */
- assert_unused_bits(a);
- assert_unused_bits(b);
- }
-
- return ret;
-}
-
-static void
-SET_OF__encode_sorted_free(struct _el_buffer *el_buf, size_t count) {
- size_t i;
-
- for(i = 0; i < count; i++) {
- FREEMEM(el_buf[i].buf);
- }
-
- FREEMEM(el_buf);
-}
-
-enum SET_OF__encode_method {
- SOES_DER, /* Distinguished Encoding Rules */
- SOES_CUPER /* Canonical Unaligned Packed Encoding Rules */
-};
-
-static struct _el_buffer *
-SET_OF__encode_sorted(const asn_TYPE_member_t *elm,
- const asn_anonymous_set_ *list,
- enum SET_OF__encode_method method) {
- struct _el_buffer *encoded_els;
- int edx;
-
- encoded_els =
- (struct _el_buffer *)CALLOC(list->count, sizeof(encoded_els[0]));
- if(encoded_els == NULL) {
- return NULL;
- }
-
- /*
- * Encode all members.
- */
- for(edx = 0; edx < list->count; edx++) {
- const void *memb_ptr = list->array[edx];
- struct _el_buffer *encoding_el = &encoded_els[edx];
- asn_enc_rval_t erval = {0,0,0};
-
- if(!memb_ptr) break;
-
- /*
- * Encode the member into the prepared space.
- */
- switch(method) {
- case SOES_DER:
- erval = elm->type->op->der_encoder(elm->type, memb_ptr, 0, elm->tag,
- _el_addbytes, encoding_el);
- break;
- case SOES_CUPER:
- erval = uper_encode(elm->type,
- elm->encoding_constraints.per_constraints,
- memb_ptr, _el_addbytes, encoding_el);
- if(erval.encoded != -1) {
- size_t extra_bits = erval.encoded % 8;
- assert(encoding_el->length == (size_t)(erval.encoded + 7) / 8);
- encoding_el->bits_unused = (8 - extra_bits) & 0x7;
- }
- break;
- default:
- assert(!"Unreachable");
- break;
- }
- if(erval.encoded < 0) break;
- }
-
- if(edx == list->count) {
- /*
- * Sort the encoded elements according to their encoding.
- */
- qsort(encoded_els, list->count, sizeof(encoded_els[0]), _el_buf_cmp);
-
- return encoded_els;
- } else {
- SET_OF__encode_sorted_free(encoded_els, edx);
- return NULL;
- }
-}
-
-
-/*
- * The DER encoder of the SET OF type.
- */
-asn_enc_rval_t
-SET_OF_encode_der(const asn_TYPE_descriptor_t *td, const void *sptr,
- int tag_mode, ber_tlv_tag_t tag, asn_app_consume_bytes_f *cb,
- void *app_key) {
- const asn_TYPE_member_t *elm = td->elements;
- const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
- size_t computed_size = 0;
- ssize_t encoding_size = 0;
- struct _el_buffer *encoded_els;
- int edx;
-
- ASN_DEBUG("Estimating size for SET OF %s", td->name);
-
- /*
- * Gather the length of the underlying members sequence.
- */
- for(edx = 0; edx < list->count; edx++) {
- void *memb_ptr = list->array[edx];
- asn_enc_rval_t erval = {0,0,0};
-
- if(!memb_ptr) ASN__ENCODE_FAILED;
-
- erval =
- elm->type->op->der_encoder(elm->type, memb_ptr, 0, elm->tag, 0, 0);
- if(erval.encoded == -1) return erval;
- computed_size += erval.encoded;
- }
-
-
- /*
- * Encode the TLV for the sequence itself.
- */
- encoding_size =
- der_write_tags(td, computed_size, tag_mode, 1, tag, cb, app_key);
- if(encoding_size < 0) {
- ASN__ENCODE_FAILED;
- }
- computed_size += encoding_size;
-
- if(!cb || list->count == 0) {
- asn_enc_rval_t erval = {0,0,0};
- erval.encoded = computed_size;
- ASN__ENCODED_OK(erval);
- }
-
- ASN_DEBUG("Encoding members of %s SET OF", td->name);
-
- /*
- * DER mandates dynamic sorting of the SET OF elements
- * according to their encodings. Build an array of the
- * encoded elements.
- */
- encoded_els = SET_OF__encode_sorted(elm, list, SOES_DER);
-
- /*
- * Report encoded elements to the application.
- * Dispose of temporary sorted members table.
- */
- for(edx = 0; edx < list->count; edx++) {
- struct _el_buffer *encoded_el = &encoded_els[edx];
- /* Report encoded chunks to the application */
- if(cb(encoded_el->buf, encoded_el->length, app_key) < 0) {
- break;
- } else {
- encoding_size += encoded_el->length;
- }
- }
-
- SET_OF__encode_sorted_free(encoded_els, list->count);
-
- if(edx == list->count) {
- asn_enc_rval_t erval = {0,0,0};
- assert(computed_size == (size_t)encoding_size);
- erval.encoded = computed_size;
- ASN__ENCODED_OK(erval);
- } else {
- ASN__ENCODE_FAILED;
- }
-}
-
-#undef XER_ADVANCE
-#define XER_ADVANCE(num_bytes) do { \
- size_t num = num_bytes; \
- buf_ptr = ((const char *)buf_ptr) + num;\
- size -= num; \
- consumed_myself += num; \
- } while(0)
-
-/*
- * Decode the XER (XML) data.
- */
-asn_dec_rval_t
-SET_OF_decode_xer(const asn_codec_ctx_t *opt_codec_ctx,
- const asn_TYPE_descriptor_t *td, void **struct_ptr,
- const char *opt_mname, const void *buf_ptr, size_t size) {
- /*
- * Bring closer parts of structure description.
- */
- const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics;
- const asn_TYPE_member_t *element = td->elements;
- const char *elm_tag;
- const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
-
- /*
- * ... and parts of the structure being constructed.
- */
- void *st = *struct_ptr; /* Target structure. */
- asn_struct_ctx_t *ctx; /* Decoder context */
-
- asn_dec_rval_t rval = {RC_OK, 0};/* Return value from a decoder */
- ssize_t consumed_myself = 0; /* Consumed bytes from ptr */
-
- /*
- * Create the target structure if it is not present already.
- */
- if(st == 0) {
- st = *struct_ptr = CALLOC(1, specs->struct_size);
- if(st == 0) RETURN(RC_FAIL);
- }
-
- /* Which tag is expected for the downstream */
- if(specs->as_XMLValueList) {
- elm_tag = (specs->as_XMLValueList == 1) ? 0 : "";
- } else {
- elm_tag = (*element->name)
- ? element->name : element->type->xml_tag;
- }
-
- /*
- * Restore parsing context.
- */
- ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
-
- /*
- * Phases of XER/XML processing:
- * Phase 0: Check that the opening tag matches our expectations.
- * Phase 1: Processing body and reacting on closing tag.
- * Phase 2: Processing inner type.
- */
- for(; ctx->phase <= 2;) {
- pxer_chunk_type_e ch_type; /* XER chunk type */
- ssize_t ch_size; /* Chunk size */
- xer_check_tag_e tcv; /* Tag check value */
-
- /*
- * Go inside the inner member of a set.
- */
- if(ctx->phase == 2) {
- asn_dec_rval_t tmprval = {RC_OK, 0};
-
- /* Invoke the inner type decoder, m.b. multiple times */
- ASN_DEBUG("XER/SET OF element [%s]", elm_tag);
- tmprval = element->type->op->xer_decoder(opt_codec_ctx,
- element->type, &ctx->ptr, elm_tag,
- buf_ptr, size);
- if(tmprval.code == RC_OK) {
- asn_anonymous_set_ *list = _A_SET_FROM_VOID(st);
- if(ASN_SET_ADD(list, ctx->ptr) != 0)
- RETURN(RC_FAIL);
- ctx->ptr = 0;
- XER_ADVANCE(tmprval.consumed);
- } else {
- XER_ADVANCE(tmprval.consumed);
- RETURN(tmprval.code);
- }
- ctx->phase = 1; /* Back to body processing */
- ASN_DEBUG("XER/SET OF phase => %d", ctx->phase);
- /* Fall through */
- }
-
- /*
- * Get the next part of the XML stream.
- */
- ch_size = xer_next_token(&ctx->context,
- buf_ptr, size, &ch_type);
- if(ch_size == -1) {
- RETURN(RC_FAIL);
- } else {
- switch(ch_type) {
- case PXER_WMORE:
- RETURN(RC_WMORE);
- case PXER_COMMENT: /* Got XML comment */
- case PXER_TEXT: /* Ignore free-standing text */
- XER_ADVANCE(ch_size); /* Skip silently */
- continue;
- case PXER_TAG:
- break; /* Check the rest down there */
- }
- }
-
- tcv = xer_check_tag(buf_ptr, ch_size, xml_tag);
- ASN_DEBUG("XER/SET OF: tcv = %d, ph=%d t=%s",
- tcv, ctx->phase, xml_tag);
- switch(tcv) {
- case XCT_CLOSING:
- if(ctx->phase == 0) break;
- ctx->phase = 0;
- /* Fall through */
- case XCT_BOTH:
- if(ctx->phase == 0) {
- /* No more things to decode */
- XER_ADVANCE(ch_size);
- ctx->phase = 3; /* Phase out */
- RETURN(RC_OK);
- }
- /* Fall through */
- case XCT_OPENING:
- if(ctx->phase == 0) {
- XER_ADVANCE(ch_size);
- ctx->phase = 1; /* Processing body phase */
- continue;
- }
- /* Fall through */
- case XCT_UNKNOWN_OP:
- case XCT_UNKNOWN_BO:
-
- ASN_DEBUG("XER/SET OF: tcv=%d, ph=%d", tcv, ctx->phase);
- if(ctx->phase == 1) {
- /*
- * Process a single possible member.
- */
- ctx->phase = 2;
- continue;
- }
- /* Fall through */
- default:
- break;
- }
-
- ASN_DEBUG("Unexpected XML tag in SET OF");
- break;
- }
-
- ctx->phase = 3; /* "Phase out" on hard failure */
- RETURN(RC_FAIL);
-}
-
-
-
-typedef struct xer_tmp_enc_s {
- void *buffer;
- size_t offset;
- size_t size;
-} xer_tmp_enc_t;
-static int
-SET_OF_encode_xer_callback(const void *buffer, size_t size, void *key) {
- xer_tmp_enc_t *t = (xer_tmp_enc_t *)key;
- if(t->offset + size >= t->size) {
- size_t newsize = (t->size << 2) + size;
- void *p = REALLOC(t->buffer, newsize);
- if(!p) return -1;
- t->buffer = p;
- t->size = newsize;
- }
- memcpy((char *)t->buffer + t->offset, buffer, size);
- t->offset += size;
- return 0;
-}
-static int
-SET_OF_xer_order(const void *aptr, const void *bptr) {
- const xer_tmp_enc_t *a = (const xer_tmp_enc_t *)aptr;
- const xer_tmp_enc_t *b = (const xer_tmp_enc_t *)bptr;
- size_t minlen = a->offset;
- int ret;
- if(b->offset < minlen) minlen = b->offset;
- /* Well-formed UTF-8 has this nice lexicographical property... */
- ret = memcmp(a->buffer, b->buffer, minlen);
- if(ret != 0) return ret;
- if(a->offset == b->offset)
- return 0;
- if(a->offset == minlen)
- return -1;
- return 1;
-}
-
-
-asn_enc_rval_t
-SET_OF_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
- enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb,
- void *app_key) {
- asn_enc_rval_t er = {0,0,0};
- const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics;
- const asn_TYPE_member_t *elm = td->elements;
- const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
- const char *mname = specs->as_XMLValueList
- ? 0 : ((*elm->name) ? elm->name : elm->type->xml_tag);
- size_t mlen = mname ? strlen(mname) : 0;
- int xcan = (flags & XER_F_CANONICAL);
- xer_tmp_enc_t *encs = 0;
- size_t encs_count = 0;
- void *original_app_key = app_key;
- asn_app_consume_bytes_f *original_cb = cb;
- int i;
-
- if(!sptr) ASN__ENCODE_FAILED;
-
- if(xcan) {
- encs = (xer_tmp_enc_t *)MALLOC(list->count * sizeof(encs[0]));
- if(!encs) ASN__ENCODE_FAILED;
- cb = SET_OF_encode_xer_callback;
- }
-
- er.encoded = 0;
-
- for(i = 0; i < list->count; i++) {
- asn_enc_rval_t tmper = {0,0,0};
-
- void *memb_ptr = list->array[i];
- if(!memb_ptr) continue;
-
- if(encs) {
- memset(&encs[encs_count], 0, sizeof(encs[0]));
- app_key = &encs[encs_count];
- encs_count++;
- }
-
- if(mname) {
- if(!xcan) ASN__TEXT_INDENT(1, ilevel);
- ASN__CALLBACK3("<", 1, mname, mlen, ">", 1);
- }
-
- if(!xcan && specs->as_XMLValueList == 1)
- ASN__TEXT_INDENT(1, ilevel + 1);
- tmper = elm->type->op->xer_encoder(elm->type, memb_ptr,
- ilevel + (specs->as_XMLValueList != 2),
- flags, cb, app_key);
- if(tmper.encoded == -1) return tmper;
- er.encoded += tmper.encoded;
- if(tmper.encoded == 0 && specs->as_XMLValueList) {
- const char *name = elm->type->xml_tag;
- size_t len = strlen(name);
- ASN__CALLBACK3("<", 1, name, len, "/>", 2);
- }
-
- if(mname) {
- ASN__CALLBACK3("</", 2, mname, mlen, ">", 1);
- }
-
- }
-
- if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1);
-
- if(encs) {
- xer_tmp_enc_t *enc = encs;
- xer_tmp_enc_t *end = encs + encs_count;
- ssize_t control_size = 0;
-
- er.encoded = 0;
- cb = original_cb;
- app_key = original_app_key;
- qsort(encs, encs_count, sizeof(encs[0]), SET_OF_xer_order);
-
- for(; enc < end; enc++) {
- ASN__CALLBACK(enc->buffer, enc->offset);
- FREEMEM(enc->buffer);
- enc->buffer = 0;
- control_size += enc->offset;
- }
- assert(control_size == er.encoded);
- }
-
- goto cleanup;
-cb_failed:
- ASN__ENCODE_FAILED;
-cleanup:
- if(encs) {
- size_t n;
- for(n = 0; n < encs_count; n++) {
- FREEMEM(encs[n].buffer);
- }
- FREEMEM(encs);
- }
- ASN__ENCODED_OK(er);
-}
-
-int
-SET_OF_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
- asn_app_consume_bytes_f *cb, void *app_key) {
- asn_TYPE_member_t *elm = td->elements;
- const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
- int ret;
- int i;
-
- if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
-
- /* Dump preamble */
- if(cb(td->name, strlen(td->name), app_key) < 0
- || cb(" ::= {", 6, app_key) < 0)
- return -1;
-
- for(i = 0; i < list->count; i++) {
- const void *memb_ptr = list->array[i];
- if(!memb_ptr) continue;
-
- _i_INDENT(1);
-
- ret = elm->type->op->print_struct(elm->type, memb_ptr,
- ilevel + 1, cb, app_key);
- if(ret) return ret;
- }
-
- ilevel--;
- _i_INDENT(1);
-
- return (cb("}", 1, app_key) < 0) ? -1 : 0;
-}
-
-void
-SET_OF_free(const asn_TYPE_descriptor_t *td, void *ptr,
- enum asn_struct_free_method method) {
- if(td && ptr) {
- const asn_SET_OF_specifics_t *specs;
- asn_TYPE_member_t *elm = td->elements;
- asn_anonymous_set_ *list = _A_SET_FROM_VOID(ptr);
- asn_struct_ctx_t *ctx; /* Decoder context */
- int i;
-
- /*
- * Could not use set_of_empty() because of (*free)
- * incompatibility.
- */
- for(i = 0; i < list->count; i++) {
- void *memb_ptr = list->array[i];
- if(memb_ptr)
- ASN_STRUCT_FREE(*elm->type, memb_ptr);
- }
- list->count = 0; /* No meaningful elements left */
-
- asn_set_empty(list); /* Remove (list->array) */
-
- specs = (const asn_SET_OF_specifics_t *)td->specifics;
- ctx = (asn_struct_ctx_t *)((char *)ptr + specs->ctx_offset);
- if(ctx->ptr) {
- ASN_STRUCT_FREE(*elm->type, ctx->ptr);
- ctx->ptr = 0;
- }
-
- switch(method) {
- case ASFM_FREE_EVERYTHING:
- FREEMEM(ptr);
- break;
- case ASFM_FREE_UNDERLYING:
- break;
- case ASFM_FREE_UNDERLYING_AND_RESET:
- memset(ptr, 0, specs->struct_size);
- break;
- }
- }
-}
-
-int
-SET_OF_constraint(const asn_TYPE_descriptor_t *td, const void *sptr,
- asn_app_constraint_failed_f *ctfailcb, void *app_key) {
- const asn_TYPE_member_t *elm = td->elements;
- asn_constr_check_f *constr;
- const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr);
- int i;
-
- if(!sptr) {
- ASN__CTFAIL(app_key, td, sptr,
- "%s: value not given (%s:%d)",
- td->name, __FILE__, __LINE__);
- return -1;
- }
-
- constr = elm->encoding_constraints.general_constraints;
- if(!constr) constr = elm->type->encoding_constraints.general_constraints;
-
- /*
- * Iterate over the members of an array.
- * Validate each in turn, until one fails.
- */
- for(i = 0; i < list->count; i++) {
- const void *memb_ptr = list->array[i];
- int ret;
-
- if(!memb_ptr) continue;
-
- ret = constr(elm->type, memb_ptr, ctfailcb, app_key);
- if(ret) return ret;
- }
-
- return 0;
-}
-
-#ifndef ASN_DISABLE_PER_SUPPORT
-
-asn_dec_rval_t
-SET_OF_decode_uper(const asn_codec_ctx_t *opt_codec_ctx,
- const asn_TYPE_descriptor_t *td,
- const asn_per_constraints_t *constraints, void **sptr,
- asn_per_data_t *pd) {
- asn_dec_rval_t rv = {RC_OK, 0};
- const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics;
- const asn_TYPE_member_t *elm = td->elements; /* Single one */
- void *st = *sptr;
- asn_anonymous_set_ *list;
- const asn_per_constraint_t *ct;
- int repeat = 0;
- ssize_t nelems;
-
- if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx))
- ASN__DECODE_FAILED;
-
- /*
- * Create the target structure if it is not present already.
- */
- if(!st) {
- st = *sptr = CALLOC(1, specs->struct_size);
- if(!st) ASN__DECODE_FAILED;
- }
- list = _A_SET_FROM_VOID(st);
-
- /* Figure out which constraints to use */
- if(constraints) ct = &constraints->size;
- else if(td->encoding_constraints.per_constraints)
- ct = &td->encoding_constraints.per_constraints->size;
- else ct = 0;
-
- if(ct && ct->flags & APC_EXTENSIBLE) {
- int value = per_get_few_bits(pd, 1);
- if(value < 0) ASN__DECODE_STARVED;
- if(value) ct = 0; /* Not restricted! */
- }
-
- if(ct && ct->effective_bits >= 0) {
- /* X.691, #19.5: No length determinant */
- nelems = per_get_few_bits(pd, ct->effective_bits);
- ASN_DEBUG("Preparing to fetch %ld+%ld elements from %s",
- (long)nelems, ct->lower_bound, td->name);
- if(nelems < 0) ASN__DECODE_STARVED;
- nelems += ct->lower_bound;
- } else {
- nelems = -1;
- }
-
- do {
- int i;
- if(nelems < 0) {
- nelems = uper_get_length(pd, -1, 0, &repeat);
- ASN_DEBUG("Got to decode %" ASN_PRI_SSIZE " elements (eff %d)",
- nelems, (int)(ct ? ct->effective_bits : -1));
- if(nelems < 0) ASN__DECODE_STARVED;
- }
-
- for(i = 0; i < nelems; i++) {
- void *ptr = 0;
- ASN_DEBUG("SET OF %s decoding", elm->type->name);
- rv = elm->type->op->uper_decoder(opt_codec_ctx, elm->type,
- elm->encoding_constraints.per_constraints, &ptr, pd);
- ASN_DEBUG("%s SET OF %s decoded %d, %p",
- td->name, elm->type->name, rv.code, ptr);
- if(rv.code == RC_OK) {
- if(ASN_SET_ADD(list, ptr) == 0) {
- if(rv.consumed == 0 && nelems > 200) {
- /* Protect from SET OF NULL compression bombs. */
- ASN__DECODE_FAILED;
- }
- continue;
- }
- ASN_DEBUG("Failed to add element into %s",
- td->name);
- /* Fall through */
- rv.code = RC_FAIL;
- } else {
- ASN_DEBUG("Failed decoding %s of %s (SET OF)",
- elm->type->name, td->name);
- }
- if(ptr) ASN_STRUCT_FREE(*elm->type, ptr);
- return rv;
- }
-
- nelems = -1; /* Allow uper_get_length() */
- } while(repeat);
-
- ASN_DEBUG("Decoded %s as SET OF", td->name);
-
- rv.code = RC_OK;
- rv.consumed = 0;
- return rv;
-}
-
-asn_enc_rval_t
-SET_OF_encode_uper(const asn_TYPE_descriptor_t *td,
- const asn_per_constraints_t *constraints, const void *sptr,
- asn_per_outp_t *po) {
- const asn_anonymous_set_ *list;
- const asn_per_constraint_t *ct;
- const asn_TYPE_member_t *elm = td->elements;
- struct _el_buffer *encoded_els;
- asn_enc_rval_t er = {0,0,0};
- size_t encoded_edx;
-
- if(!sptr) ASN__ENCODE_FAILED;
-
- list = _A_CSET_FROM_VOID(sptr);
-
- er.encoded = 0;
-
- ASN_DEBUG("Encoding %s as SEQUENCE OF (%d)", td->name, list->count);
-
- if(constraints) ct = &constraints->size;
- else if(td->encoding_constraints.per_constraints)
- ct = &td->encoding_constraints.per_constraints->size;
- else ct = 0;
-
- /* If extensible constraint, check if size is in root */
- if(ct) {
- int not_in_root =
- (list->count < ct->lower_bound || list->count > ct->upper_bound);
- ASN_DEBUG("lb %ld ub %ld %s", ct->lower_bound, ct->upper_bound,
- ct->flags & APC_EXTENSIBLE ? "ext" : "fix");
- if(ct->flags & APC_EXTENSIBLE) {
- /* Declare whether size is in extension root */
- if(per_put_few_bits(po, not_in_root, 1)) ASN__ENCODE_FAILED;
- if(not_in_root) ct = 0;
- } else if(not_in_root && ct->effective_bits >= 0) {
- ASN__ENCODE_FAILED;
- }
-
- }
-
- if(ct && ct->effective_bits >= 0) {
- /* X.691, #19.5: No length determinant */
- if(per_put_few_bits(po, list->count - ct->lower_bound,
- ct->effective_bits))
- ASN__ENCODE_FAILED;
- } else if(list->count == 0) {
- /* When the list is empty add only the length determinant
- * X.691, #20.6 and #11.9.4.1
- */
- if (uper_put_length(po, 0, 0)) {
- ASN__ENCODE_FAILED;
- }
- ASN__ENCODED_OK(er);
- }
-
-
- /*
- * Canonical UPER #22.1 mandates dynamic sorting of the SET OF elements
- * according to their encodings. Build an array of the encoded elements.
- */
- encoded_els = SET_OF__encode_sorted(elm, list, SOES_CUPER);
-
- for(encoded_edx = 0; (ssize_t)encoded_edx < list->count;) {
- ssize_t may_encode;
- size_t edx;
- int need_eom = 0;
-
- if(ct && ct->effective_bits >= 0) {
- may_encode = list->count;
- } else {
- may_encode =
- uper_put_length(po, list->count - encoded_edx, &need_eom);
- if(may_encode < 0) ASN__ENCODE_FAILED;
- }
-
- for(edx = encoded_edx; edx < encoded_edx + may_encode; edx++) {
- const struct _el_buffer *el = &encoded_els[edx];
- if(asn_put_many_bits(po, el->buf,
- (8 * el->length) - el->bits_unused) < 0) {
- break;
- }
- }
-
- if(need_eom && uper_put_length(po, 0, 0))
- ASN__ENCODE_FAILED; /* End of Message length */
-
- encoded_edx += may_encode;
- }
-
- SET_OF__encode_sorted_free(encoded_els, list->count);
-
- if((ssize_t)encoded_edx == list->count) {
- ASN__ENCODED_OK(er);
- } else {
- ASN__ENCODE_FAILED;
- }
-}
-
-asn_dec_rval_t
-SET_OF_decode_aper(const asn_codec_ctx_t *opt_codec_ctx,
- const asn_TYPE_descriptor_t *td,
- const asn_per_constraints_t *constraints, void **sptr, asn_per_data_t *pd) {
- asn_dec_rval_t rv = {RC_OK, 0};
- const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics;
- const asn_TYPE_member_t *elm = td->elements; /* Single one */
- void *st = *sptr;
- asn_anonymous_set_ *list;
- const asn_per_constraint_t *ct;
- int repeat = 0;
- ssize_t nelems;
-
- if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx))
- ASN__DECODE_FAILED;
-
- /*
- * Create the target structure if it is not present already.
- */
- if(!st) {
- st = *sptr = CALLOC(1, specs->struct_size);
- if(!st) ASN__DECODE_FAILED;
- }
- list = _A_SET_FROM_VOID(st);
-
- /* Figure out which constraints to use */
- if(constraints) ct = &constraints->size;
- else if(td->encoding_constraints.per_constraints)
- ct = &td->encoding_constraints.per_constraints->size;
- else ct = 0;
-
- if(ct && ct->flags & APC_EXTENSIBLE) {
- int value = per_get_few_bits(pd, 1);
- if(value < 0) ASN__DECODE_STARVED;
- if(value) ct = 0; /* Not restricted! */
- }
-
- if(ct && ct->effective_bits >= 0) {
- /* X.691, #19.5: No length determinant */
- nelems = aper_get_nsnnwn(pd, ct->upper_bound - ct->lower_bound + 1);
- ASN_DEBUG("Preparing to fetch %ld+%ld elements from %s",
- (long)nelems, ct->lower_bound, td->name);
- if(nelems < 0) ASN__DECODE_STARVED;
- nelems += ct->lower_bound;
- } else {
- nelems = -1;
- }
-
- do {
- int i;
- if(nelems < 0) {
- nelems = aper_get_length(pd, ct ? ct->upper_bound - ct->lower_bound + 1 : -1,
- ct ? ct->effective_bits : -1, &repeat);
- ASN_DEBUG("Got to decode %d elements (eff %d)",
- (int)nelems, (int)(ct ? ct->effective_bits : -1));
- if(nelems < 0) ASN__DECODE_STARVED;
- }
-
- for(i = 0; i < nelems; i++) {
- void *ptr = 0;
- ASN_DEBUG("SET OF %s decoding", elm->type->name);
- rv = elm->type->op->aper_decoder(opt_codec_ctx, elm->type,
- elm->encoding_constraints.per_constraints, &ptr, pd);
- ASN_DEBUG("%s SET OF %s decoded %d, %p",
- td->name, elm->type->name, rv.code, ptr);
- if(rv.code == RC_OK) {
- if(ASN_SET_ADD(list, ptr) == 0)
- continue;
- ASN_DEBUG("Failed to add element into %s",
- td->name);
- /* Fall through */
- rv.code = RC_FAIL;
- } else {
- ASN_DEBUG("Failed decoding %s of %s (SET OF)",
- elm->type->name, td->name);
- }
- if(ptr) ASN_STRUCT_FREE(*elm->type, ptr);
- return rv;
- }
-
- nelems = -1; /* Allow uper_get_length() */
- } while(repeat);
-
- ASN_DEBUG("Decoded %s as SET OF", td->name);
-
- rv.code = RC_OK;
- rv.consumed = 0;
- return rv;
-}
-
-#endif /* ASN_DISABLE_PER_SUPPORT */
-
-struct comparable_ptr {
- const asn_TYPE_descriptor_t *td;
- const void *sptr;
-};
-
-static int
-SET_OF__compare_cb(const void *aptr, const void *bptr) {
- const struct comparable_ptr *a = aptr;
- const struct comparable_ptr *b = bptr;
- assert(a->td == b->td);
- return a->td->op->compare_struct(a->td, a->sptr, b->sptr);
-}
-
-int
-SET_OF_compare(const asn_TYPE_descriptor_t *td, const void *aptr,
- const void *bptr) {
- const asn_anonymous_set_ *a = _A_CSET_FROM_VOID(aptr);
- const asn_anonymous_set_ *b = _A_CSET_FROM_VOID(bptr);
-
- if(a && b) {
- struct comparable_ptr *asorted;
- struct comparable_ptr *bsorted;
- ssize_t common_length;
- ssize_t idx;
-
- if(a->count == 0) {
- if(b->count) return -1;
- return 0;
- } else if(b->count == 0) {
- return 1;
- }
-
- asorted = MALLOC(a->count * sizeof(asorted[0]));
- bsorted = MALLOC(b->count * sizeof(bsorted[0]));
- if(!asorted || !bsorted) {
- FREEMEM(asorted);
- FREEMEM(bsorted);
- return -1;
- }
-
- for(idx = 0; idx < a->count; idx++) {
- asorted[idx].td = td->elements->type;
- asorted[idx].sptr = a->array[idx];
- }
-
- for(idx = 0; idx < b->count; idx++) {
- bsorted[idx].td = td->elements->type;
- bsorted[idx].sptr = b->array[idx];
- }
-
- qsort(asorted, a->count, sizeof(asorted[0]), SET_OF__compare_cb);
- qsort(bsorted, b->count, sizeof(bsorted[0]), SET_OF__compare_cb);
-
- common_length = (a->count < b->count ? a->count : b->count);
- for(idx = 0; idx < common_length; idx++) {
- int ret = td->elements->type->op->compare_struct(
- td->elements->type, asorted[idx].sptr, bsorted[idx].sptr);
- if(ret) {
- FREEMEM(asorted);
- FREEMEM(bsorted);
- return ret;
- }
- }
-
- FREEMEM(asorted);
- FREEMEM(bsorted);
-
- if(idx < b->count) /* more elements in b */
- return -1; /* a is shorter, so put it first */
- if(idx < a->count) return 1;
- } else if(!a) {
- return -1;
- } else if(!b) {
- return 1;
- }
-
- return 0;
-}
-
-
-asn_TYPE_operation_t asn_OP_SET_OF = {
- SET_OF_free,
- SET_OF_print,
- SET_OF_compare,
- SET_OF_decode_ber,
- SET_OF_encode_der,
- SET_OF_decode_xer,
- SET_OF_encode_xer,
-#ifdef ASN_DISABLE_OER_SUPPORT
- 0,
- 0,
-#else
- SET_OF_decode_oer,
- SET_OF_encode_oer,
-#endif
-#ifdef ASN_DISABLE_PER_SUPPORT
- 0,
- 0,
- 0,
- 0,
-#else
- SET_OF_decode_uper,
- SET_OF_encode_uper,
- SET_OF_decode_aper,
- 0, /* SET_OF_encode_aper */
-#endif /* ASN_DISABLE_PER_SUPPORT */
- SET_OF_random_fill,
- 0 /* Use generic outmost tag fetcher */
-};
-
-
-asn_random_fill_result_t
-SET_OF_random_fill(const asn_TYPE_descriptor_t *td, void **sptr,
- const asn_encoding_constraints_t *constraints,
- size_t max_length) {
- const asn_SET_OF_specifics_t *specs =
- (const asn_SET_OF_specifics_t *)td->specifics;
- asn_random_fill_result_t res_ok = {ARFILL_OK, 0};
- asn_random_fill_result_t result_failed = {ARFILL_FAILED, 0};
- asn_random_fill_result_t result_skipped = {ARFILL_SKIPPED, 0};
- const asn_TYPE_member_t *elm = td->elements;
- void *st = *sptr;
- long max_elements = 5;
- long slb = 0; /* Lower size bound */
- long sub = 0; /* Upper size bound */
- size_t rnd_len;
-
- if(max_length == 0) return result_skipped;
-
- if(st == NULL) {
- st = (*sptr = CALLOC(1, specs->struct_size));
- if(st == NULL) {
- return result_failed;
- }
- }
-
- switch(asn_random_between(0, 6)) {
- case 0: max_elements = 0; break;
- case 1: max_elements = 1; break;
- case 2: max_elements = 5; break;
- case 3: max_elements = max_length; break;
- case 4: max_elements = max_length / 2; break;
- case 5: max_elements = max_length / 4; break;
- default: break;
- }
- sub = slb + max_elements;
-
- if(!constraints || !constraints->per_constraints)
- constraints = &td->encoding_constraints;
- if(constraints->per_constraints) {
- const asn_per_constraint_t *pc = &constraints->per_constraints->size;
- if(pc->flags & APC_SEMI_CONSTRAINED) {
- slb = pc->lower_bound;
- sub = pc->lower_bound + max_elements;
- } else if(pc->flags & APC_CONSTRAINED) {
- slb = pc->lower_bound;
- sub = pc->upper_bound;
- if(sub - slb > max_elements) sub = slb + max_elements;
- }
- }
-
- /* Bias towards edges of allowed space */
- switch(asn_random_between(-1, 4)) {
- default:
- case -1:
- /* Prepare lengths somewhat outside of constrained range. */
- if(constraints->per_constraints
- && (constraints->per_constraints->size.flags & APC_EXTENSIBLE)) {
- switch(asn_random_between(0, 5)) {
- default:
- case 0:
- rnd_len = 0;
- break;
- case 1:
- if(slb > 0) {
- rnd_len = slb - 1;
- } else {
- rnd_len = 0;
- }
- break;
- case 2:
- rnd_len = asn_random_between(0, slb);
- break;
- case 3:
- if(sub < (ssize_t)max_length) {
- rnd_len = sub + 1;
- } else {
- rnd_len = max_length;
- }
- break;
- case 4:
- if(sub < (ssize_t)max_length) {
- rnd_len = asn_random_between(sub + 1, max_length);
- } else {
- rnd_len = max_length;
- }
- break;
- case 5:
- rnd_len = max_length;
- break;
- }
- break;
- }
- /* Fall through */
- case 0:
- rnd_len = asn_random_between(slb, sub);
- break;
- case 1:
- if(slb < sub) {
- rnd_len = asn_random_between(slb + 1, sub);
- break;
- }
- /* Fall through */
- case 2:
- rnd_len = asn_random_between(slb, slb);
- break;
- case 3:
- if(slb < sub) {
- rnd_len = asn_random_between(slb, sub - 1);
- break;
- }
- /* Fall through */
- case 4:
- rnd_len = asn_random_between(sub, sub);
- break;
- }
-
- for(; rnd_len > 0; rnd_len--) {
- asn_anonymous_set_ *list = _A_SET_FROM_VOID(st);
- void *ptr = 0;
- asn_random_fill_result_t tmpres = elm->type->op->random_fill(
- elm->type, &ptr, &elm->encoding_constraints,
- (max_length > res_ok.length ? max_length - res_ok.length : 0)
- / rnd_len);
- switch(tmpres.code) {
- case ARFILL_OK:
- ASN_SET_ADD(list, ptr);
- res_ok.length += tmpres.length;
- break;
- case ARFILL_SKIPPED:
- break;
- case ARFILL_FAILED:
- assert(ptr == 0);
- return tmpres;
- }
- }
-
- return res_ok;
-}
-