]> git.stg.codes - stg.git/blob - libs/smux/constr_SEQUENCE.c
Disable cppcheck for foreign libs by default.
[stg.git] / libs / smux / constr_SEQUENCE.c
1 /*
2  * Copyright (c) 2003-2017 Lev Walkin <vlm@lionet.info>.
3  * All rights reserved.
4  * Redistribution and modifications are permitted subject to BSD license.
5  */
6 #include <asn_internal.h>
7 #include <constr_SEQUENCE.h>
8 #include <OPEN_TYPE.h>
9 #include <per_opentype.h>
10
11 /*
12  * Number of bytes left for this structure.
13  * (ctx->left) indicates the number of bytes _transferred_ for the structure.
14  * (size) contains the number of bytes in the buffer passed.
15  */
16 #define LEFT    ((size<(size_t)ctx->left)?size:(size_t)ctx->left)
17
18 /*
19  * If the subprocessor function returns with an indication that it wants
20  * more data, it may well be a fatal decoding problem, because the
21  * size is constrained by the <TLV>'s L, even if the buffer size allows
22  * reading more data.
23  * For example, consider the buffer containing the following TLVs:
24  * <T:5><L:1><V> <T:6>...
25  * The TLV length clearly indicates that one byte is expected in V, but
26  * if the V processor returns with "want more data" even if the buffer
27  * contains way more data than the V processor have seen.
28  */
29 #define SIZE_VIOLATION  (ctx->left >= 0 && (size_t)ctx->left <= size)
30
31 /*
32  * This macro "eats" the part of the buffer which is definitely "consumed",
33  * i.e. was correctly converted into local representation or rightfully skipped.
34  */
35 #undef  ADVANCE
36 #define ADVANCE(num_bytes)      do {            \
37                 size_t num = num_bytes;         \
38                 ptr = ((const char *)ptr) + num; \
39                 size -= num;                    \
40                 if(ctx->left >= 0)              \
41                         ctx->left -= num;       \
42                 consumed_myself += num;         \
43         } while(0)
44
45 /*
46  * Switch to the next phase of parsing.
47  */
48 #undef  NEXT_PHASE
49 #undef  PHASE_OUT
50 #define NEXT_PHASE(ctx) do {                    \
51                 ctx->phase++;                   \
52                 ctx->step = 0;                  \
53         } while(0)
54 #define PHASE_OUT(ctx)  do { ctx->phase = 10; } while(0)
55
56 /*
57  * Return a standardized complex structure.
58  */
59 #undef  RETURN
60 #define RETURN(_code)   do {                    \
61                 rval.code = _code;              \
62                 rval.consumed = consumed_myself;\
63                 return rval;                    \
64         } while(0)
65
66 /*
67  * Check whether we are inside the extensions group.
68  */
69 #define IN_EXTENSION_GROUP(specs, memb_idx) \
70     ((specs)->first_extension >= 0          \
71      && (unsigned)(specs)->first_extension <= (memb_idx))
72
73 /*
74  * Tags are canonically sorted in the tag2element map.
75  */
76 static int
77 _t2e_cmp(const void *ap, const void *bp) {
78         const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap;
79         const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp;
80
81         int a_class = BER_TAG_CLASS(a->el_tag);
82         int b_class = BER_TAG_CLASS(b->el_tag);
83
84         if(a_class == b_class) {
85                 ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag);
86                 ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag);
87
88                 if(a_value == b_value) {
89                         if(a->el_no > b->el_no)
90                                 return 1;
91                         /*
92                          * Important: we do not check
93                          * for a->el_no <= b->el_no!
94                          */
95                         return 0;
96                 } else if(a_value < b_value)
97                         return -1;
98                 else
99                         return 1;
100         } else if(a_class < b_class) {
101                 return -1;
102         } else {
103                 return 1;
104         }
105 }
106
107
108 /*
109  * The decoder of the SEQUENCE type.
110  */
111 asn_dec_rval_t
112 SEQUENCE_decode_ber(const asn_codec_ctx_t *opt_codec_ctx,
113                     const asn_TYPE_descriptor_t *td, void **struct_ptr,
114                     const void *ptr, size_t size, int tag_mode) {
115     /*
116          * Bring closer parts of structure description.
117          */
118         const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics;
119     const asn_TYPE_member_t *elements = td->elements;
120
121     /*
122          * Parts of the structure being constructed.
123          */
124         void *st = *struct_ptr; /* Target structure. */
125         asn_struct_ctx_t *ctx;  /* Decoder context */
126
127         ber_tlv_tag_t tlv_tag;  /* T from TLV */
128         asn_dec_rval_t rval;    /* Return code from subparsers */
129
130         ssize_t consumed_myself = 0;    /* Consumed bytes from ptr */
131         size_t edx;                     /* SEQUENCE element's index */
132
133         ASN_DEBUG("Decoding %s as SEQUENCE", td->name);
134         
135         /*
136          * Create the target structure if it is not present already.
137          */
138         if(st == 0) {
139                 st = *struct_ptr = CALLOC(1, specs->struct_size);
140                 if(st == 0) {
141                         RETURN(RC_FAIL);
142                 }
143         }
144
145         /*
146          * Restore parsing context.
147          */
148         ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
149         
150         /*
151          * Start to parse where left previously
152          */
153         switch(ctx->phase) {
154         case 0:
155                 /*
156                  * PHASE 0.
157                  * Check that the set of tags associated with given structure
158                  * perfectly fits our expectations.
159                  */
160
161                 rval = ber_check_tags(opt_codec_ctx, td, ctx, ptr, size,
162                         tag_mode, 1, &ctx->left, 0);
163                 if(rval.code != RC_OK) {
164                         ASN_DEBUG("%s tagging check failed: %d",
165                                 td->name, rval.code);
166                         return rval;
167                 }
168
169                 if(ctx->left >= 0)
170                         ctx->left += rval.consumed; /* ?Substracted below! */
171                 ADVANCE(rval.consumed);
172
173                 NEXT_PHASE(ctx);
174
175                 ASN_DEBUG("Structure consumes %ld bytes, buffer %ld",
176                         (long)ctx->left, (long)size);
177
178                 /* Fall through */
179         case 1:
180                 /*
181                  * PHASE 1.
182                  * From the place where we've left it previously,
183                  * try to decode the next member from the list of
184                  * this structure's elements.
185                  * (ctx->step) stores the member being processed
186                  * between invocations and the microphase {0,1} of parsing
187                  * that member:
188                  *      step = (<member_number> * 2 + <microphase>).
189                  */
190           for(edx = ((size_t)ctx->step >> 1); edx < td->elements_count;
191                         edx++, ctx->step = (ctx->step & ~1) + 2) {
192                 void *memb_ptr;         /* Pointer to the member */
193                 void **memb_ptr2;       /* Pointer to that pointer */
194                 ssize_t tag_len;        /* Length of TLV's T */
195                 size_t opt_edx_end;     /* Next non-optional element */
196                 size_t n;
197                 int use_bsearch;
198
199                 if(ctx->step & 1)
200                         goto microphase2;
201
202                 /*
203                  * MICROPHASE 1: Synchronize decoding.
204                  */
205                 ASN_DEBUG("In %s SEQUENCE left %d, edx=%" ASN_PRI_SIZE " flags=%d"
206                                 " opt=%d ec=%d",
207                         td->name, (int)ctx->left, edx,
208                         elements[edx].flags, elements[edx].optional,
209                         td->elements_count);
210
211         if(ctx->left == 0 /* No more stuff is expected */
212            && (
213                   /* Explicit OPTIONAL specification reaches the end */
214                   (edx + elements[edx].optional == td->elements_count) ||
215                   /* All extensions are optional */
216                   IN_EXTENSION_GROUP(specs, edx))) {
217             ASN_DEBUG("End of SEQUENCE %s", td->name);
218             /*
219              * Found the legitimate end of the structure.
220              */
221             PHASE_OUT(ctx);
222             RETURN(RC_OK);
223         }
224
225                 /*
226                  * Fetch the T from TLV.
227                  */
228                 tag_len = ber_fetch_tag(ptr, LEFT, &tlv_tag);
229                 ASN_DEBUG("Current tag in %s SEQUENCE for element %" ASN_PRI_SIZE " "
230                         "(%s) is %s encoded in %d bytes, of frame %ld",
231                         td->name, edx, elements[edx].name,
232                         ber_tlv_tag_string(tlv_tag), (int)tag_len, (long)LEFT);
233                 switch(tag_len) {
234                 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
235                         /* Fall through */
236                 case -1: RETURN(RC_FAIL);
237                 }
238
239         if(ctx->left < 0 && ((const uint8_t *)ptr)[0] == 0) {
240             if(LEFT < 2) {
241                 if(SIZE_VIOLATION) {
242                     RETURN(RC_FAIL);
243                 } else {
244                     RETURN(RC_WMORE);
245                 }
246             } else if(((const uint8_t *)ptr)[1] == 0) {
247                 ASN_DEBUG("edx = %" ASN_PRI_SIZE ", opt = %d, ec=%d", edx,
248                           elements[edx].optional, td->elements_count);
249                 if((edx + elements[edx].optional == td->elements_count)
250                    || IN_EXTENSION_GROUP(specs, edx)) {
251                     /*
252                      * Yeah, baby! Found the terminator
253                      * of the indefinite length structure.
254                      */
255                     /*
256                      * Proceed to the canonical
257                      * finalization function.
258                      * No advancing is necessary.
259                      */
260                     goto phase3;
261                 }
262             }
263         }
264
265                 /*
266                  * Find the next available type with this tag.
267                  */
268                 use_bsearch = 0;
269                 opt_edx_end = edx + elements[edx].optional + 1;
270                 if(opt_edx_end > td->elements_count)
271                         opt_edx_end = td->elements_count;       /* Cap */
272                 else if(opt_edx_end - edx > 8) {
273                         /* Limit the scope of linear search... */
274                         opt_edx_end = edx + 8;
275                         use_bsearch = 1;
276                         /* ... and resort to bsearch() */
277                 }
278                 for(n = edx; n < opt_edx_end; n++) {
279                         if(BER_TAGS_EQUAL(tlv_tag, elements[n].tag)) {
280                                 /*
281                                  * Found element corresponding to the tag
282                                  * being looked at.
283                                  * Reposition over the right element.
284                                  */
285                                 edx = n;
286                                 ctx->step = 1 + 2 * edx;        /* Remember! */
287                                 goto microphase2;
288                         } else if(elements[n].flags & ATF_ANY_TYPE) {
289                                 /*
290                                  * This is the ANY type, which may bear
291                                  * any flag whatsoever.
292                                  */
293                                 edx = n;
294                                 ctx->step = 1 + 2 * edx;        /* Remember! */
295                                 goto microphase2;
296                         } else if(elements[n].tag == (ber_tlv_tag_t)-1) {
297                                 use_bsearch = 1;
298                                 break;
299                         }
300                 }
301                 if(use_bsearch) {
302                         /*
303                          * Resort to a binary search over
304                          * sorted array of tags.
305                          */
306                         const asn_TYPE_tag2member_t *t2m;
307                         asn_TYPE_tag2member_t key = {0, 0, 0, 0};
308                         key.el_tag = tlv_tag;
309                         key.el_no = edx;
310                         t2m = (const asn_TYPE_tag2member_t *)bsearch(&key,
311                                 specs->tag2el, specs->tag2el_count,
312                                 sizeof(specs->tag2el[0]), _t2e_cmp);
313                         if(t2m) {
314                                 const asn_TYPE_tag2member_t *best = 0;
315                                 const asn_TYPE_tag2member_t *t2m_f, *t2m_l;
316                                 size_t edx_max = edx + elements[edx].optional;
317                                 /*
318                                  * Rewind to the first element with that tag,
319                                  * `cause bsearch() does not guarantee order.
320                                  */
321                                 t2m_f = t2m + t2m->toff_first;
322                                 t2m_l = t2m + t2m->toff_last;
323                                 for(t2m = t2m_f; t2m <= t2m_l; t2m++) {
324                                         if(t2m->el_no > edx_max) break;
325                                         if(t2m->el_no < edx) continue;
326                                         best = t2m;
327                                 }
328                                 if(best) {
329                                         edx = best->el_no;
330                                         ctx->step = 1 + 2 * edx;
331                                         goto microphase2;
332                                 }
333                         }
334                         n = opt_edx_end;
335                 }
336                 if(n == opt_edx_end) {
337                         /*
338                          * If tag is unknown, it may be either
339                          * an unknown (thus, incorrect) tag,
340                          * or an extension (...),
341                          * or an end of the indefinite-length structure.
342                          */
343                         if(!IN_EXTENSION_GROUP(specs,
344                                 edx + elements[edx].optional)) {
345                                 ASN_DEBUG("Unexpected tag %s (at %" ASN_PRI_SIZE ")",
346                                         ber_tlv_tag_string(tlv_tag), edx);
347                                 ASN_DEBUG("Expected tag %s (%s)%s",
348                                         ber_tlv_tag_string(elements[edx].tag),
349                                         elements[edx].name,
350                                         elements[edx].optional
351                                                 ?" or alternatives":"");
352                                 RETURN(RC_FAIL);
353                         } else {
354                                 /* Skip this tag */
355                                 ssize_t skip;
356                                 edx += elements[edx].optional;
357
358                                 ASN_DEBUG("Skipping unexpected %s (at %" ASN_PRI_SIZE ")",
359                                         ber_tlv_tag_string(tlv_tag), edx);
360                                 skip = ber_skip_length(opt_codec_ctx,
361                                         BER_TLV_CONSTRUCTED(ptr),
362                                         (const char *)ptr + tag_len,
363                                         LEFT - tag_len);
364                                 ASN_DEBUG("Skip length %d in %s",
365                                         (int)skip, td->name);
366                                 switch(skip) {
367                                 case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
368                                         /* Fall through */
369                                 case -1: RETURN(RC_FAIL);
370                                 }
371
372                                 ADVANCE(skip + tag_len);
373                                 ctx->step -= 2;
374                                 edx--;
375                                 continue;  /* Try again with the next tag */
376                         }
377                 }
378
379                 /*
380                  * MICROPHASE 2: Invoke the member-specific decoder.
381                  */
382                 ctx->step |= 1;         /* Confirm entering next microphase */
383         microphase2:
384                 ASN_DEBUG("Inside SEQUENCE %s MF2", td->name);
385                 
386                 /*
387                  * Compute the position of the member inside a structure,
388                  * and also a type of containment (it may be contained
389                  * as pointer or using inline inclusion).
390                  */
391                 if(elements[edx].flags & ATF_POINTER) {
392                         /* Member is a pointer to another structure */
393                         memb_ptr2 = (void **)((char *)st + elements[edx].memb_offset);
394                 } else {
395                         /*
396                          * A pointer to a pointer
397                          * holding the start of the structure
398                          */
399                         memb_ptr = (char *)st + elements[edx].memb_offset;
400                         memb_ptr2 = &memb_ptr;
401                 }
402                 /*
403                  * Invoke the member fetch routine according to member's type
404                  */
405                 if(elements[edx].flags & ATF_OPEN_TYPE) {
406                         rval = OPEN_TYPE_ber_get(opt_codec_ctx, td, st, &elements[edx], ptr, LEFT);
407         } else {
408                         rval = elements[edx].type->op->ber_decoder(opt_codec_ctx,
409                                         elements[edx].type,
410                                         memb_ptr2, ptr, LEFT,
411                                         elements[edx].tag_mode);
412                 }
413                 ASN_DEBUG("In %s SEQUENCE decoded %" ASN_PRI_SIZE " %s of %d "
414                         "in %d bytes rval.code %d, size=%d",
415                         td->name, edx, elements[edx].type->name,
416                         (int)LEFT, (int)rval.consumed, rval.code, (int)size);
417                 switch(rval.code) {
418                 case RC_OK:
419                         break;
420                 case RC_WMORE: /* More data expected */
421                         if(!SIZE_VIOLATION) {
422                                 ADVANCE(rval.consumed);
423                                 RETURN(RC_WMORE);
424                         }
425                         ASN_DEBUG("Size violation (c->l=%ld <= s=%ld)",
426                                 (long)ctx->left, (long)size);
427                         /* Fall through */
428                 case RC_FAIL: /* Fatal error */
429                         RETURN(RC_FAIL);
430                 } /* switch(rval) */
431                 
432                 ADVANCE(rval.consumed);
433           }     /* for(all structure members) */
434
435         phase3:
436                 ctx->phase = 3;
437         /* Fall through */
438         case 3: /* 00 and other tags expected */
439         case 4: /* only 00's expected */
440
441                 ASN_DEBUG("SEQUENCE %s Leftover: %ld, size = %ld",
442                         td->name, (long)ctx->left, (long)size);
443
444                 /*
445                  * Skip everything until the end of the SEQUENCE.
446                  */
447                 while(ctx->left) {
448                         ssize_t tl, ll;
449
450                         tl = ber_fetch_tag(ptr, LEFT, &tlv_tag);
451                         switch(tl) {
452                         case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
453                                 /* Fall through */
454                         case -1: RETURN(RC_FAIL);
455                         }
456
457                         /*
458                          * If expected <0><0>...
459                          */
460                         if(ctx->left < 0
461                                 && ((const uint8_t *)ptr)[0] == 0) {
462                                 if(LEFT < 2) {
463                                         if(SIZE_VIOLATION)
464                                                 RETURN(RC_FAIL);
465                                         else
466                                                 RETURN(RC_WMORE);
467                                 } else if(((const uint8_t *)ptr)[1] == 0) {
468                                         /*
469                                          * Correctly finished with <0><0>.
470                                          */
471                                         ADVANCE(2);
472                                         ctx->left++;
473                                         ctx->phase = 4;
474                                         continue;
475                                 }
476                         }
477
478                         if(!IN_EXTENSION_GROUP(specs, td->elements_count)
479                         || ctx->phase == 4) {
480                                 ASN_DEBUG("Unexpected continuation "
481                                         "of a non-extensible type "
482                                         "%s (SEQUENCE): %s",
483                                         td->name,
484                                         ber_tlv_tag_string(tlv_tag));
485                                 RETURN(RC_FAIL);
486                         }
487
488                         ll = ber_skip_length(opt_codec_ctx,
489                                 BER_TLV_CONSTRUCTED(ptr),
490                                 (const char *)ptr + tl, LEFT - tl);
491                         switch(ll) {
492                         case 0: if(!SIZE_VIOLATION) RETURN(RC_WMORE);
493                                 /* Fall through */
494                         case -1: RETURN(RC_FAIL);
495                         }
496
497                         ADVANCE(tl + ll);
498                 }
499
500                 PHASE_OUT(ctx);
501         }
502         
503         RETURN(RC_OK);
504 }
505
506
507 /*
508  * The DER encoder of the SEQUENCE type.
509  */
510 asn_enc_rval_t
511 SEQUENCE_encode_der(const asn_TYPE_descriptor_t *td, const void *sptr,
512                     int tag_mode, ber_tlv_tag_t tag,
513                     asn_app_consume_bytes_f *cb, void *app_key) {
514     size_t computed_size = 0;
515         asn_enc_rval_t erval;
516         ssize_t ret;
517         size_t edx;
518
519         ASN_DEBUG("%s %s as SEQUENCE",
520                 cb?"Encoding":"Estimating", td->name);
521
522         /*
523          * Gather the length of the underlying members sequence.
524          */
525         for(edx = 0; edx < td->elements_count; edx++) {
526                 asn_TYPE_member_t *elm = &td->elements[edx];
527
528                 const void *memb_ptr;           /* Pointer to the member */
529         const void *const *memb_ptr2; /* Pointer to that pointer */
530
531         if(elm->flags & ATF_POINTER) {
532             memb_ptr2 =
533                 (const void *const *)((const char *)sptr + elm->memb_offset);
534             if(!*memb_ptr2) {
535                                 ASN_DEBUG("Element %s %" ASN_PRI_SIZE " not present",
536                                         elm->name, edx);
537                                 if(elm->optional)
538                                         continue;
539                                 /* Mandatory element is missing */
540                                 ASN__ENCODE_FAILED;
541                         }
542                 } else {
543             memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
544             memb_ptr2 = &memb_ptr;
545                 }
546
547                 /* Eliminate default values */
548                 if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0)
549                         continue;
550
551                 erval = elm->type->op->der_encoder(elm->type, *memb_ptr2,
552                         elm->tag_mode, elm->tag,
553                         0, 0);
554                 if(erval.encoded == -1)
555                         return erval;
556                 computed_size += erval.encoded;
557                 ASN_DEBUG("Member %" ASN_PRI_SIZE " %s estimated %ld bytes",
558                         edx, elm->name, (long)erval.encoded);
559         }
560
561         /*
562          * Encode the TLV for the sequence itself.
563          */
564         ret = der_write_tags(td, computed_size, tag_mode, 1, tag, cb, app_key);
565         ASN_DEBUG("Wrote tags: %ld (+%ld)", (long)ret, (long)computed_size);
566         if(ret == -1)
567                 ASN__ENCODE_FAILED;
568         erval.encoded = computed_size + ret;
569
570         if(!cb) ASN__ENCODED_OK(erval);
571
572         /*
573          * Encode all members.
574          */
575         for(edx = 0; edx < td->elements_count; edx++) {
576                 asn_TYPE_member_t *elm = &td->elements[edx];
577                 asn_enc_rval_t tmperval;
578         const void *memb_ptr;           /* Pointer to the member */
579         const void *const *memb_ptr2;   /* Pointer to that pointer */
580
581         if(elm->flags & ATF_POINTER) {
582             memb_ptr2 =
583                 (const void *const *)((const char *)sptr + elm->memb_offset);
584             if(!*memb_ptr2) continue;
585                 } else {
586             memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
587             memb_ptr2 = &memb_ptr;
588                 }
589
590                 /* Eliminate default values */
591         if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0)
592             continue;
593
594                 tmperval = elm->type->op->der_encoder(elm->type, *memb_ptr2,
595                         elm->tag_mode, elm->tag, cb, app_key);
596                 if(tmperval.encoded == -1)
597                         return tmperval;
598                 computed_size -= tmperval.encoded;
599                 ASN_DEBUG("Member %" ASN_PRI_SIZE " %s of SEQUENCE %s encoded in %ld bytes",
600                         edx, elm->name, td->name, (long)tmperval.encoded);
601         }
602
603         if(computed_size != 0)
604                 /*
605                  * Encoded size is not equal to the computed size.
606                  */
607                 ASN__ENCODE_FAILED;
608
609         ASN__ENCODED_OK(erval);
610 }
611
612
613 #undef  XER_ADVANCE
614 #define XER_ADVANCE(num_bytes)           \
615     do {                                 \
616         size_t num = (num_bytes);        \
617         ptr = ((const char *)ptr) + num; \
618         size -= num;                     \
619         consumed_myself += num;          \
620     } while(0)
621
622 /*
623  * Decode the XER (XML) data.
624  */
625 asn_dec_rval_t
626 SEQUENCE_decode_xer(const asn_codec_ctx_t *opt_codec_ctx,
627                     const asn_TYPE_descriptor_t *td, void **struct_ptr,
628                     const char *opt_mname, const void *ptr, size_t size) {
629     /*
630          * Bring closer parts of structure description.
631          */
632         const asn_SEQUENCE_specifics_t *specs
633                 = (const asn_SEQUENCE_specifics_t *)td->specifics;
634         asn_TYPE_member_t *elements = td->elements;
635         const char *xml_tag = opt_mname ? opt_mname : td->xml_tag;
636
637         /*
638          * ... and parts of the structure being constructed.
639          */
640         void *st = *struct_ptr; /* Target structure. */
641         asn_struct_ctx_t *ctx;  /* Decoder context */
642
643         asn_dec_rval_t rval;            /* Return value from a decoder */
644         ssize_t consumed_myself = 0;    /* Consumed bytes from ptr */
645         size_t edx;                     /* Element index */
646
647         /*
648          * Create the target structure if it is not present already.
649          */
650         if(st == 0) {
651                 st = *struct_ptr = CALLOC(1, specs->struct_size);
652                 if(st == 0) RETURN(RC_FAIL);
653         }
654
655         /*
656          * Restore parsing context.
657          */
658         ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset);
659
660
661         /*
662          * Phases of XER/XML processing:
663          * Phase 0: Check that the opening tag matches our expectations.
664          * Phase 1: Processing body and reacting on closing tag.
665          * Phase 2: Processing inner type.
666          * Phase 3: Skipping unknown extensions.
667          * Phase 4: PHASED OUT
668          */
669         for(edx = ctx->step; ctx->phase <= 3;) {
670                 pxer_chunk_type_e ch_type;      /* XER chunk type */
671                 ssize_t ch_size;                /* Chunk size */
672                 xer_check_tag_e tcv;            /* Tag check value */
673                 asn_TYPE_member_t *elm;
674
675                 /*
676                  * Go inside the inner member of a sequence.
677                  */
678                 if(ctx->phase == 2) {
679                         asn_dec_rval_t tmprval;
680                         void *memb_ptr_dontuse;         /* Pointer to the member */
681                         void **memb_ptr2;       /* Pointer to that pointer */
682
683                         elm = &td->elements[edx];
684
685                         if(elm->flags & ATF_POINTER) {
686                                 /* Member is a pointer to another structure */
687                                 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
688                         } else {
689                                 memb_ptr_dontuse = (char *)st + elm->memb_offset;
690                                 memb_ptr2 = &memb_ptr_dontuse;  /* Only use of memb_ptr_dontuse */
691                         }
692
693                         if(elm->flags & ATF_OPEN_TYPE) {
694                                 tmprval = OPEN_TYPE_xer_get(opt_codec_ctx, td, st, elm, ptr, size);
695                         } else {
696                                 /* Invoke the inner type decoder, m.b. multiple times */
697                                 tmprval = elm->type->op->xer_decoder(opt_codec_ctx,
698                                                 elm->type, memb_ptr2, elm->name,
699                                                 ptr, size);
700                         }
701                         XER_ADVANCE(tmprval.consumed);
702                         if(tmprval.code != RC_OK)
703                                 RETURN(tmprval.code);
704                         ctx->phase = 1; /* Back to body processing */
705                         ctx->step = ++edx;
706                         ASN_DEBUG("XER/SEQUENCE phase => %d, step => %d",
707                                 ctx->phase, ctx->step);
708                         /* Fall through */
709                 }
710
711                 /*
712                  * Get the next part of the XML stream.
713                  */
714                 ch_size = xer_next_token(&ctx->context, ptr, size,
715                         &ch_type);
716                 if(ch_size == -1) {
717                     RETURN(RC_FAIL);
718                 } else {
719                         switch(ch_type) {
720                         case PXER_WMORE:
721                                 RETURN(RC_WMORE);
722                         case PXER_COMMENT:      /* Got XML comment */
723                         case PXER_TEXT:         /* Ignore free-standing text */
724                                 XER_ADVANCE(ch_size);   /* Skip silently */
725                                 continue;
726                         case PXER_TAG:
727                                 break;  /* Check the rest down there */
728                         }
729                 }
730
731                 tcv = xer_check_tag(ptr, ch_size, xml_tag);
732                 ASN_DEBUG("XER/SEQUENCE: tcv = %d, ph=%d [%s]",
733                         tcv, ctx->phase, xml_tag);
734
735                 /* Skip the extensions section */
736                 if(ctx->phase == 3) {
737                         switch(xer_skip_unknown(tcv, &ctx->left)) {
738                         case -1:
739                                 ctx->phase = 4;
740                                 RETURN(RC_FAIL);
741                         case 0:
742                                 XER_ADVANCE(ch_size);
743                                 continue;
744                         case 1:
745                                 XER_ADVANCE(ch_size);
746                                 ctx->phase = 1;
747                                 continue;
748                         case 2:
749                                 ctx->phase = 1;
750                                 break;
751                         }
752                 }
753
754                 switch(tcv) {
755                 case XCT_CLOSING:
756                         if(ctx->phase == 0) break;
757                         ctx->phase = 0;
758                         /* Fall through */
759                 case XCT_BOTH:
760             if(ctx->phase == 0) {
761                 if(edx >= td->elements_count ||
762                    /* Explicit OPTIONAL specs reaches the end */
763                    (edx + elements[edx].optional == td->elements_count) ||
764                    /* All extensions are optional */
765                    IN_EXTENSION_GROUP(specs, edx)) {
766                     XER_ADVANCE(ch_size);
767                                         ctx->phase = 4; /* Phase out */
768                                         RETURN(RC_OK);
769                                 } else {
770                                         ASN_DEBUG("Premature end of XER SEQUENCE");
771                                         RETURN(RC_FAIL);
772                                 }
773                         }
774                         /* Fall through */
775                 case XCT_OPENING:
776                         if(ctx->phase == 0) {
777                                 XER_ADVANCE(ch_size);
778                                 ctx->phase = 1; /* Processing body phase */
779                                 continue;
780                         }
781                         /* Fall through */
782                 case XCT_UNKNOWN_OP:
783                 case XCT_UNKNOWN_BO:
784
785                         ASN_DEBUG("XER/SEQUENCE: tcv=%d, ph=%d, edx=%" ASN_PRI_SIZE "",
786                                 tcv, ctx->phase, edx);
787                         if(ctx->phase != 1) {
788                                 break;  /* Really unexpected */
789                         }
790
791                         if(edx < td->elements_count) {
792                                 /*
793                                  * Search which member corresponds to this tag.
794                                  */
795                                 size_t n;
796                                 size_t edx_end = edx + elements[edx].optional + 1;
797                                 if(edx_end > td->elements_count)
798                                         edx_end = td->elements_count;
799                                 for(n = edx; n < edx_end; n++) {
800                                         elm = &td->elements[n];
801                                         tcv = xer_check_tag(ptr, ch_size, elm->name);
802                                         switch(tcv) {
803                                         case XCT_BOTH:
804                                         case XCT_OPENING:
805                                                 /*
806                                                  * Process this member.
807                                                  */
808                                                 ctx->step = edx = n;
809                                                 ctx->phase = 2;
810                                                 break;
811                                         case XCT_UNKNOWN_OP:
812                                         case XCT_UNKNOWN_BO:
813                                                 continue;
814                                         default:
815                                                 n = edx_end;
816                                                 break;  /* Phase out */
817                                         }
818                                         break;
819                                 }
820                                 if(n != edx_end)
821                                         continue;
822                         } else {
823                                 ASN_DEBUG("Out of defined members: %" ASN_PRI_SIZE "/%u",
824                                         edx, td->elements_count);
825                         }
826
827                         /* It is expected extension */
828                         if(IN_EXTENSION_GROUP(specs,
829                                 edx + (edx < td->elements_count
830                                         ? elements[edx].optional : 0))) {
831                                 ASN_DEBUG("Got anticipated extension at %" ASN_PRI_SIZE "",
832                                         edx);
833                                 /*
834                                  * Check for (XCT_BOTH or XCT_UNKNOWN_BO)
835                                  * By using a mask. Only record a pure
836                                  * <opening> tags.
837                                  */
838                                 if(tcv & XCT_CLOSING) {
839                                         /* Found </extension> without body */
840                                 } else {
841                                         ctx->left = 1;
842                                         ctx->phase = 3; /* Skip ...'s */
843                                 }
844                                 XER_ADVANCE(ch_size);
845                                 continue;
846                         }
847
848                         /* Fall through */
849                 default:
850                         break;
851                 }
852
853                 ASN_DEBUG("Unexpected XML tag in SEQUENCE [%c%c%c%c%c%c]",
854                         size>0?((const char *)ptr)[0]:'.',
855                         size>1?((const char *)ptr)[1]:'.',
856                         size>2?((const char *)ptr)[2]:'.',
857                         size>3?((const char *)ptr)[3]:'.',
858                         size>4?((const char *)ptr)[4]:'.',
859                         size>5?((const char *)ptr)[5]:'.');
860                 break;
861         }
862
863         ctx->phase = 4; /* "Phase out" on hard failure */
864         RETURN(RC_FAIL);
865 }
866
867 asn_enc_rval_t
868 SEQUENCE_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr,
869                     int ilevel, enum xer_encoder_flags_e flags,
870                     asn_app_consume_bytes_f *cb, void *app_key) {
871     asn_enc_rval_t er;
872     int xcan = (flags & XER_F_CANONICAL);
873     asn_TYPE_descriptor_t *tmp_def_val_td = 0;
874     void *tmp_def_val = 0;
875         size_t edx;
876
877     if(!sptr) ASN__ENCODE_FAILED;
878
879     er.encoded = 0;
880
881     for(edx = 0; edx < td->elements_count; edx++) {
882         asn_enc_rval_t tmper;
883         asn_TYPE_member_t *elm = &td->elements[edx];
884         const void *memb_ptr;
885         const char *mname = elm->name;
886         unsigned int mlen = strlen(mname);
887
888         if(elm->flags & ATF_POINTER) {
889             memb_ptr =
890                 *(const void *const *)((const char *)sptr + elm->memb_offset);
891             if(!memb_ptr) {
892                 assert(tmp_def_val == 0);
893                 if(elm->default_value_set) {
894                     if(elm->default_value_set(&tmp_def_val)) {
895                         ASN__ENCODE_FAILED;
896                     } else {
897                         memb_ptr = tmp_def_val;
898                         tmp_def_val_td = elm->type;
899                     }
900                 } else if(elm->optional) {
901                     continue;
902                 } else {
903                     /* Mandatory element is missing */
904                     ASN__ENCODE_FAILED;
905                 }
906             }
907         } else {
908             memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
909         }
910
911         if(!xcan) ASN__TEXT_INDENT(1, ilevel);
912         ASN__CALLBACK3("<", 1, mname, mlen, ">", 1);
913
914         /* Print the member itself */
915         tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, ilevel + 1,
916                                            flags, cb, app_key);
917         if(tmp_def_val) {
918             ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val);
919             tmp_def_val = 0;
920         }
921         if(tmper.encoded == -1) return tmper;
922         er.encoded += tmper.encoded;
923
924         ASN__CALLBACK3("</", 2, mname, mlen, ">", 1);
925     }
926
927     if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1);
928
929     ASN__ENCODED_OK(er);
930 cb_failed:
931     if(tmp_def_val) ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val);
932     ASN__ENCODE_FAILED;
933 }
934
935 int
936 SEQUENCE_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel,
937                asn_app_consume_bytes_f *cb, void *app_key) {
938     size_t edx;
939         int ret;
940
941         if(!sptr) return (cb("<absent>", 8, app_key) < 0) ? -1 : 0;
942
943         /* Dump preamble */
944         if(cb(td->name, strlen(td->name), app_key) < 0
945         || cb(" ::= {", 6, app_key) < 0)
946                 return -1;
947
948         for(edx = 0; edx < td->elements_count; edx++) {
949                 asn_TYPE_member_t *elm = &td->elements[edx];
950                 const void *memb_ptr;
951
952                 if(elm->flags & ATF_POINTER) {
953                         memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
954                         if(!memb_ptr) {
955                                 if(elm->optional) continue;
956                                 /* Print <absent> line */
957                                 /* Fall through */
958                         }
959                 } else {
960                         memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
961                 }
962
963                 /* Indentation */
964                 _i_INDENT(1);
965
966                 /* Print the member's name and stuff */
967                 if(cb(elm->name, strlen(elm->name), app_key) < 0
968                 || cb(": ", 2, app_key) < 0)
969                         return -1;
970
971                 /* Print the member itself */
972                 ret = elm->type->op->print_struct(elm->type, memb_ptr, ilevel + 1,
973                         cb, app_key);
974                 if(ret) return ret;
975         }
976
977         ilevel--;
978         _i_INDENT(1);
979
980         return (cb("}", 1, app_key) < 0) ? -1 : 0;
981 }
982
983 void
984 SEQUENCE_free(const asn_TYPE_descriptor_t *td, void *sptr,
985               enum asn_struct_free_method method) {
986     size_t edx;
987     const asn_SEQUENCE_specifics_t *specs =
988         (const asn_SEQUENCE_specifics_t *)td->specifics;
989     asn_struct_ctx_t *ctx; /* Decoder context */
990
991         if(!td || !sptr)
992                 return;
993
994         ASN_DEBUG("Freeing %s as SEQUENCE", td->name);
995
996         for(edx = 0; edx < td->elements_count; edx++) {
997                 asn_TYPE_member_t *elm = &td->elements[edx];
998                 void *memb_ptr;
999                 if(elm->flags & ATF_POINTER) {
1000                         memb_ptr = *(void **)((char *)sptr + elm->memb_offset);
1001                         if(memb_ptr)
1002                                 ASN_STRUCT_FREE(*elm->type, memb_ptr);
1003                 } else {
1004                         memb_ptr = (void *)((char *)sptr + elm->memb_offset);
1005                         ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr);
1006                 }
1007         }
1008
1009         /* Clean parsing context */
1010         ctx = (asn_struct_ctx_t *)((char *)sptr + specs->ctx_offset);
1011         FREEMEM(ctx->ptr);
1012
1013     switch(method) {
1014     case ASFM_FREE_EVERYTHING:
1015         FREEMEM(sptr);
1016         break;
1017     case ASFM_FREE_UNDERLYING:
1018         break;
1019     case ASFM_FREE_UNDERLYING_AND_RESET:
1020         memset(
1021             sptr, 0,
1022             ((const asn_SEQUENCE_specifics_t *)(td->specifics))->struct_size);
1023         break;
1024     }
1025 }
1026
1027 int
1028 SEQUENCE_constraint(const asn_TYPE_descriptor_t *td, const void *sptr,
1029                     asn_app_constraint_failed_f *ctfailcb, void *app_key) {
1030     size_t edx;
1031
1032         if(!sptr) {
1033                 ASN__CTFAIL(app_key, td, sptr,
1034                         "%s: value not given (%s:%d)",
1035                         td->name, __FILE__, __LINE__);
1036                 return -1;
1037         }
1038
1039         /*
1040          * Iterate over structure members and check their validity.
1041          */
1042         for(edx = 0; edx < td->elements_count; edx++) {
1043                 asn_TYPE_member_t *elm = &td->elements[edx];
1044                 const void *memb_ptr;
1045
1046                 if(elm->flags & ATF_POINTER) {
1047                         memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset);
1048                         if(!memb_ptr) {
1049                                 if(elm->optional)
1050                                         continue;
1051                                 ASN__CTFAIL(app_key, td, sptr,
1052                                 "%s: mandatory element %s absent (%s:%d)",
1053                                 td->name, elm->name, __FILE__, __LINE__);
1054                                 return -1;
1055                         }
1056                 } else {
1057                         memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1058                 }
1059
1060                 if(elm->encoding_constraints.general_constraints) {
1061                         int ret = elm->encoding_constraints.general_constraints(elm->type, memb_ptr,
1062                                 ctfailcb, app_key);
1063                         if(ret) return ret;
1064                 } else {
1065                         return elm->type->encoding_constraints.general_constraints(elm->type,
1066                                 memb_ptr, ctfailcb, app_key);
1067                 }
1068         }
1069
1070         return 0;
1071 }
1072
1073 #ifndef ASN_DISABLE_PER_SUPPORT
1074
1075 asn_dec_rval_t
1076 SEQUENCE_decode_uper(const asn_codec_ctx_t *opt_codec_ctx,
1077                      const asn_TYPE_descriptor_t *td,
1078                      const asn_per_constraints_t *constraints, void **sptr,
1079                      asn_per_data_t *pd) {
1080     const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics;
1081         void *st = *sptr;       /* Target structure. */
1082         int extpresent;         /* Extension additions are present */
1083         uint8_t *opres;         /* Presence of optional root members */
1084         asn_per_data_t opmd;
1085         asn_dec_rval_t rv;
1086         size_t edx;
1087
1088         (void)constraints;
1089
1090         if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx))
1091                 ASN__DECODE_FAILED;
1092
1093         if(!st) {
1094                 st = *sptr = CALLOC(1, specs->struct_size);
1095                 if(!st) ASN__DECODE_FAILED;
1096         }
1097
1098         ASN_DEBUG("Decoding %s as SEQUENCE (UPER)", td->name);
1099
1100         /* Handle extensions */
1101         if(specs->first_extension < 0) {
1102                 extpresent = 0;
1103         } else {
1104                 extpresent = per_get_few_bits(pd, 1);
1105                 if(extpresent < 0) ASN__DECODE_STARVED;
1106         }
1107
1108         /* Prepare a place and read-in the presence bitmap */
1109         memset(&opmd, 0, sizeof(opmd));
1110         if(specs->roms_count) {
1111                 opres = (uint8_t *)MALLOC(((specs->roms_count + 7) >> 3) + 1);
1112                 if(!opres) ASN__DECODE_FAILED;
1113                 /* Get the presence map */
1114                 if(per_get_many_bits(pd, opres, 0, specs->roms_count)) {
1115                         FREEMEM(opres);
1116                         ASN__DECODE_STARVED;
1117                 }
1118                 opmd.buffer = opres;
1119                 opmd.nbits = specs->roms_count;
1120                 ASN_DEBUG("Read in presence bitmap for %s of %d bits (%x..)",
1121                         td->name, specs->roms_count, *opres);
1122         } else {
1123                 opres = 0;
1124         }
1125
1126         /*
1127          * Get the sequence ROOT elements.
1128          */
1129     for(edx = 0;
1130         edx < (specs->first_extension < 0 ? td->elements_count
1131                                           : (size_t)specs->first_extension);
1132         edx++) {
1133         asn_TYPE_member_t *elm = &td->elements[edx];
1134                 void *memb_ptr;         /* Pointer to the member */
1135                 void **memb_ptr2;       /* Pointer to that pointer */
1136
1137                 assert(!IN_EXTENSION_GROUP(specs, edx));
1138
1139                 /* Fetch the pointer to this member */
1140                 if(elm->flags & ATF_POINTER) {
1141                         memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1142                 } else {
1143                         memb_ptr = (char *)st + elm->memb_offset;
1144                         memb_ptr2 = &memb_ptr;
1145                 }
1146
1147                 /* Deal with optionality */
1148                 if(elm->optional) {
1149                         int present = per_get_few_bits(&opmd, 1);
1150                         ASN_DEBUG("Member %s->%s is optional, p=%d (%d->%d)",
1151                                 td->name, elm->name, present,
1152                                 (int)opmd.nboff, (int)opmd.nbits);
1153                         if(present == 0) {
1154                                 /* This element is not present */
1155                                 if(elm->default_value_set) {
1156                                         /* Fill-in DEFAULT */
1157                                         if(elm->default_value_set(memb_ptr2)) {
1158                                                 FREEMEM(opres);
1159                                                 ASN__DECODE_FAILED;
1160                                         }
1161                                         ASN_DEBUG("Filled-in default");
1162                                 }
1163                                 /* The member is just not present */
1164                                 continue;
1165                         }
1166                         /* Fall through */
1167                 }
1168
1169                 /* Fetch the member from the stream */
1170                 ASN_DEBUG("Decoding member \"%s\" in %s", elm->name, td->name);
1171
1172                 if(elm->flags & ATF_OPEN_TYPE) {
1173                         rv = OPEN_TYPE_uper_get(opt_codec_ctx, td, st, elm, pd);
1174                 } else {
1175                         rv = elm->type->op->uper_decoder(opt_codec_ctx, elm->type,
1176                                         elm->encoding_constraints.per_constraints, memb_ptr2, pd);
1177                 }
1178                 if(rv.code != RC_OK) {
1179                         ASN_DEBUG("Failed decode %s in %s",
1180                                 elm->name, td->name);
1181                         FREEMEM(opres);
1182                         return rv;
1183                 }
1184         }
1185
1186         /* Optionality map is not needed anymore */
1187         FREEMEM(opres);
1188
1189         /*
1190          * Deal with extensions.
1191          */
1192         if(extpresent) {
1193                 ssize_t bmlength;
1194                 uint8_t *epres;         /* Presence of extension members */
1195                 asn_per_data_t epmd;
1196
1197                 bmlength = uper_get_nslength(pd);
1198                 if(bmlength < 0) ASN__DECODE_STARVED;
1199
1200                 ASN_DEBUG("Extensions %" ASN_PRI_SSIZE " present in %s", bmlength, td->name);
1201
1202                 epres = (uint8_t *)MALLOC((bmlength + 15) >> 3);
1203                 if(!epres) ASN__DECODE_STARVED;
1204
1205                 /* Get the extensions map */
1206                 if(per_get_many_bits(pd, epres, 0, bmlength)) {
1207                         FREEMEM(epres);
1208                         ASN__DECODE_STARVED;
1209                 }
1210
1211                 memset(&epmd, 0, sizeof(epmd));
1212                 epmd.buffer = epres;
1213                 epmd.nbits = bmlength;
1214                 ASN_DEBUG("Read in extensions bitmap for %s of %ld bits (%x..)",
1215                         td->name, (long)bmlength, *epres);
1216
1217             /* Go over extensions and read them in */
1218         for(edx = specs->first_extension; edx < td->elements_count; edx++) {
1219             asn_TYPE_member_t *elm = &td->elements[edx];
1220             void *memb_ptr;   /* Pointer to the member */
1221             void **memb_ptr2; /* Pointer to that pointer */
1222             int present;
1223
1224             /* Fetch the pointer to this member */
1225             if(elm->flags & ATF_POINTER) {
1226                 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1227             } else {
1228                 memb_ptr = (void *)((char *)st + elm->memb_offset);
1229                 memb_ptr2 = &memb_ptr;
1230             }
1231
1232             present = per_get_few_bits(&epmd, 1);
1233             if(present <= 0) {
1234                 if(present < 0) break; /* No more extensions */
1235                 continue;
1236             }
1237
1238             ASN_DEBUG("Decoding member %s in %s %p", elm->name, td->name,
1239                       *memb_ptr2);
1240             rv = uper_open_type_get(opt_codec_ctx, elm->type,
1241                                     elm->encoding_constraints.per_constraints,
1242                                     memb_ptr2, pd);
1243             if(rv.code != RC_OK) {
1244                 FREEMEM(epres);
1245                 return rv;
1246             }
1247             }
1248
1249                 /* Skip over overflow extensions which aren't present
1250                  * in this system's version of the protocol */
1251                 for(;;) {
1252                         ASN_DEBUG("Getting overflow extensions");
1253                         switch(per_get_few_bits(&epmd, 1)) {
1254                         case -1: break;
1255                         case 0: continue;
1256                         default:
1257                                 if(uper_open_type_skip(opt_codec_ctx, pd)) {
1258                                         FREEMEM(epres);
1259                                         ASN__DECODE_STARVED;
1260                                 }
1261                 ASN_DEBUG("Skipped overflow extension");
1262                 continue;
1263                         }
1264                         break;
1265                 }
1266
1267                 FREEMEM(epres);
1268         }
1269
1270     if(specs->first_extension >= 0) {
1271         unsigned i;
1272         /* Fill DEFAULT members in extensions */
1273         for(i = specs->roms_count; i < specs->roms_count + specs->aoms_count;
1274             i++) {
1275             asn_TYPE_member_t *elm;
1276             void **memb_ptr2; /* Pointer to member pointer */
1277
1278             edx = specs->oms[i];
1279             elm = &td->elements[edx];
1280
1281             if(!elm->default_value_set) continue;
1282
1283             /* Fetch the pointer to this member */
1284             if(elm->flags & ATF_POINTER) {
1285                 memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1286                 if(*memb_ptr2) continue;
1287             } else {
1288                 continue; /* Extensions are all optionals */
1289             }
1290
1291             /* Set default value */
1292             if(elm->default_value_set(memb_ptr2)) {
1293                 ASN__DECODE_FAILED;
1294             }
1295         }
1296     }
1297
1298         rv.consumed = 0;
1299         rv.code = RC_OK;
1300         return rv;
1301 }
1302
1303 static int
1304 SEQUENCE__handle_extensions(const asn_TYPE_descriptor_t *td, const void *sptr,
1305                             asn_per_outp_t *po1, asn_per_outp_t *po2) {
1306     const asn_SEQUENCE_specifics_t *specs =
1307         (const asn_SEQUENCE_specifics_t *)td->specifics;
1308     int exts_present = 0;
1309     int exts_count = 0;
1310     size_t edx;
1311
1312     if(specs->first_extension < 0) {
1313         return 0;
1314     }
1315
1316     /* Find out which extensions are present */
1317     for(edx = specs->first_extension; edx < td->elements_count; edx++) {
1318         asn_TYPE_member_t *elm = &td->elements[edx];
1319         const void *memb_ptr;         /* Pointer to the member */
1320         const void *const *memb_ptr2; /* Pointer to that pointer */
1321         int present;
1322
1323         /* Fetch the pointer to this member */
1324         if(elm->flags & ATF_POINTER) {
1325             memb_ptr2 =
1326                 (const void *const *)((const char *)sptr + elm->memb_offset);
1327             present = (*memb_ptr2 != 0);
1328         } else {
1329             memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1330             memb_ptr2 = &memb_ptr;
1331                         present = 1;
1332                 }
1333
1334         ASN_DEBUG("checking %s:%s (@%" ASN_PRI_SIZE ") present => %d", elm->name,
1335                   elm->type->name, edx, present);
1336         exts_count++;
1337         exts_present += present;
1338
1339         /* Encode as presence marker */
1340         if(po1 && per_put_few_bits(po1, present, 1)) {
1341             return -1;
1342         }
1343         /* Encode as open type field */
1344         if(po2 && present
1345            && uper_open_type_put(elm->type,
1346                                  elm->encoding_constraints.per_constraints,
1347                                  *memb_ptr2, po2))
1348             return -1;
1349     }
1350
1351     return exts_present ? exts_count : 0;
1352 }
1353
1354 asn_enc_rval_t
1355 SEQUENCE_encode_uper(const asn_TYPE_descriptor_t *td,
1356                      const asn_per_constraints_t *constraints, const void *sptr,
1357                      asn_per_outp_t *po) {
1358     const asn_SEQUENCE_specifics_t *specs
1359                 = (const asn_SEQUENCE_specifics_t *)td->specifics;
1360         asn_enc_rval_t er;
1361         int n_extensions;
1362         size_t edx;
1363         size_t i;
1364
1365         (void)constraints;
1366
1367         if(!sptr)
1368                 ASN__ENCODE_FAILED;
1369
1370         er.encoded = 0;
1371
1372         ASN_DEBUG("Encoding %s as SEQUENCE (UPER)", td->name);
1373
1374         /*
1375          * X.691#18.1 Whether structure is extensible
1376          * and whether to encode extensions
1377          */
1378     if(specs->first_extension < 0) {
1379         n_extensions = 0; /* There are no extensions to encode */
1380     } else {
1381         n_extensions = SEQUENCE__handle_extensions(td, sptr, 0, 0);
1382         if(n_extensions < 0) ASN__ENCODE_FAILED;
1383         if(per_put_few_bits(po, n_extensions ? 1 : 0, 1)) {
1384             ASN__ENCODE_FAILED;
1385         }
1386     }
1387
1388         /* Encode a presence bitmap */
1389         for(i = 0; i < specs->roms_count; i++) {
1390                 asn_TYPE_member_t *elm;
1391                 const void *memb_ptr;           /* Pointer to the member */
1392         const void *const *memb_ptr2; /* Pointer to that pointer */
1393         int present;
1394
1395                 edx = specs->oms[i];
1396                 elm = &td->elements[edx];
1397
1398                 /* Fetch the pointer to this member */
1399                 if(elm->flags & ATF_POINTER) {
1400             memb_ptr2 =
1401                 (const void *const *)((const char *)sptr + elm->memb_offset);
1402             present = (*memb_ptr2 != 0);
1403                 } else {
1404             memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1405             memb_ptr2 = &memb_ptr;
1406                         present = 1;
1407                 }
1408
1409                 /* Eliminate default values */
1410         if(present && elm->default_value_cmp
1411            && elm->default_value_cmp(*memb_ptr2) == 0)
1412             present = 0;
1413
1414                 ASN_DEBUG("Element %s %s %s->%s is %s",
1415                         elm->flags & ATF_POINTER ? "ptr" : "inline",
1416                         elm->default_value_cmp ? "def" : "wtv",
1417                         td->name, elm->name, present ? "present" : "absent");
1418                 if(per_put_few_bits(po, present, 1))
1419                         ASN__ENCODE_FAILED;
1420         }
1421
1422         /*
1423          * Encode the sequence ROOT elements.
1424          */
1425     ASN_DEBUG("first_extension = %d, elements = %d", specs->first_extension,
1426               td->elements_count);
1427         for(edx = 0;
1428                 edx < ((specs->first_extension < 0) ? td->elements_count
1429                                             : (size_t)specs->first_extension);
1430                 edx++) {
1431                 asn_TYPE_member_t *elm = &td->elements[edx];
1432                 const void *memb_ptr;         /* Pointer to the member */
1433                 const void *const *memb_ptr2; /* Pointer to that pointer */
1434
1435                 ASN_DEBUG("About to encode %s", elm->type->name);
1436
1437                 /* Fetch the pointer to this member */
1438                 if(elm->flags & ATF_POINTER) {
1439             memb_ptr2 =
1440                 (const void *const *)((const char *)sptr + elm->memb_offset);
1441             if(!*memb_ptr2) {
1442                                 ASN_DEBUG("Element %s %" ASN_PRI_SIZE " not present",
1443                                         elm->name, edx);
1444                                 if(elm->optional)
1445                                         continue;
1446                                 /* Mandatory element is missing */
1447                                 ASN__ENCODE_FAILED;
1448                         }
1449                 } else {
1450             memb_ptr = (const void *)((const char *)sptr + elm->memb_offset);
1451             memb_ptr2 = &memb_ptr;
1452                 }
1453
1454                 /* Eliminate default values */
1455                 if(elm->default_value_cmp && elm->default_value_cmp(*memb_ptr2) == 0)
1456                         continue;
1457
1458         ASN_DEBUG("Encoding %s->%s:%s", td->name, elm->name, elm->type->name);
1459         er = elm->type->op->uper_encoder(
1460             elm->type, elm->encoding_constraints.per_constraints, *memb_ptr2,
1461             po);
1462         if(er.encoded == -1) return er;
1463     }
1464
1465         /* No extensions to encode */
1466         if(!n_extensions) ASN__ENCODED_OK(er);
1467
1468         ASN_DEBUG("Length of extensions %d bit-map", n_extensions);
1469         /* #18.8. Write down the presence bit-map length. */
1470         if(uper_put_nslength(po, n_extensions))
1471                 ASN__ENCODE_FAILED;
1472
1473         ASN_DEBUG("Bit-map of %d elements", n_extensions);
1474         /* #18.7. Encoding the extensions presence bit-map. */
1475         /* TODO: act upon NOTE in #18.7 for canonical PER */
1476         if(SEQUENCE__handle_extensions(td, sptr, po, 0) != n_extensions)
1477                 ASN__ENCODE_FAILED;
1478
1479         ASN_DEBUG("Writing %d extensions", n_extensions);
1480         /* #18.9. Encode extensions as open type fields. */
1481         if(SEQUENCE__handle_extensions(td, sptr, 0, po) != n_extensions)
1482                 ASN__ENCODE_FAILED;
1483
1484         ASN__ENCODED_OK(er);
1485 }
1486
1487 #endif  /* ASN_DISABLE_PER_SUPPORT */
1488
1489 int
1490 SEQUENCE_compare(const asn_TYPE_descriptor_t *td, const void *aptr,
1491                  const void *bptr) {
1492     size_t edx;
1493
1494         for(edx = 0; edx < td->elements_count; edx++) {
1495                 asn_TYPE_member_t *elm = &td->elements[edx];
1496                 const void *amemb;
1497                 const void *bmemb;
1498         int ret;
1499
1500                 if(elm->flags & ATF_POINTER) {
1501             amemb =
1502                 *(const void *const *)((const char *)aptr + elm->memb_offset);
1503             bmemb =
1504                 *(const void *const *)((const char *)bptr + elm->memb_offset);
1505             if(!amemb) {
1506                 if(!bmemb) continue;
1507                 if(elm->default_value_cmp
1508                    && elm->default_value_cmp(bmemb) == 0) {
1509                     /* A is absent, but B is present and equal to DEFAULT */
1510                     continue;
1511                 }
1512                 return -1;
1513             } else if(!bmemb) {
1514                 if(elm->default_value_cmp
1515                    && elm->default_value_cmp(amemb) == 0) {
1516                     /* B is absent, but A is present and equal to DEFAULT */
1517                     continue;
1518                 }
1519                 return 1;
1520             }
1521                 } else {
1522             amemb = (const void *)((const char *)aptr + elm->memb_offset);
1523             bmemb = (const void *)((const char *)bptr + elm->memb_offset);
1524                 }
1525
1526         ret = elm->type->op->compare_struct(elm->type, amemb, bmemb);
1527         if(ret != 0) return ret;
1528     }
1529
1530     return 0;
1531 }
1532
1533 asn_TYPE_operation_t asn_OP_SEQUENCE = {
1534         SEQUENCE_free,
1535         SEQUENCE_print,
1536         SEQUENCE_compare,
1537         SEQUENCE_decode_ber,
1538         SEQUENCE_encode_der,
1539         SEQUENCE_decode_xer,
1540         SEQUENCE_encode_xer,
1541 #ifdef  ASN_DISABLE_OER_SUPPORT
1542         0,
1543         0,
1544 #else
1545         SEQUENCE_decode_oer,
1546         SEQUENCE_encode_oer,
1547 #endif  /* ASN_DISABLE_OER_SUPPORT */
1548 #ifdef ASN_DISABLE_PER_SUPPORT
1549         0,
1550         0,
1551 #else
1552         SEQUENCE_decode_uper,
1553         SEQUENCE_encode_uper,
1554 #endif /* ASN_DISABLE_PER_SUPPORT */
1555         SEQUENCE_random_fill,
1556         0       /* Use generic outmost tag fetcher */
1557 };
1558
1559
1560 asn_random_fill_result_t
1561 SEQUENCE_random_fill(const asn_TYPE_descriptor_t *td, void **sptr,
1562                    const asn_encoding_constraints_t *constr,
1563                    size_t max_length) {
1564     const asn_SEQUENCE_specifics_t *specs =
1565         (const asn_SEQUENCE_specifics_t *)td->specifics;
1566     asn_random_fill_result_t result_ok = {ARFILL_OK, 0};
1567     asn_random_fill_result_t result_failed = {ARFILL_FAILED, 0};
1568     asn_random_fill_result_t result_skipped = {ARFILL_SKIPPED, 0};
1569     void *st = *sptr;
1570     size_t edx;
1571
1572     if(max_length == 0) return result_skipped;
1573
1574     (void)constr;
1575
1576     if(st == NULL) {
1577         st = CALLOC(1, specs->struct_size);
1578         if(st == NULL) {
1579             return result_failed;
1580         }
1581     }
1582
1583     for(edx = 0; edx < td->elements_count; edx++) {
1584         const asn_TYPE_member_t *elm = &td->elements[edx];
1585         void *memb_ptr;   /* Pointer to the member */
1586         void **memb_ptr2; /* Pointer to that pointer */
1587         asn_random_fill_result_t tmpres;
1588
1589         if(elm->optional && asn_random_between(0, 4) == 2) {
1590             /* Sometimes decide not to fill the optional value */
1591             continue;
1592         }
1593
1594         if(elm->flags & ATF_POINTER) {
1595             /* Member is a pointer to another structure */
1596             memb_ptr2 = (void **)((char *)st + elm->memb_offset);
1597         } else {
1598             memb_ptr = (char *)st + elm->memb_offset;
1599             memb_ptr2 = &memb_ptr;
1600         }
1601
1602         tmpres = elm->type->op->random_fill(
1603             elm->type, memb_ptr2, &elm->encoding_constraints,
1604             max_length > result_ok.length ? max_length - result_ok.length : 0);
1605         switch(tmpres.code) {
1606         case ARFILL_OK:
1607             result_ok.length += tmpres.length;
1608             continue;
1609         case ARFILL_SKIPPED:
1610             assert(!(elm->flags & ATF_POINTER) || *memb_ptr2 == NULL);
1611             continue;
1612         case ARFILL_FAILED:
1613             if(st == *sptr) {
1614                 ASN_STRUCT_RESET(*td, st);
1615             } else {
1616                 ASN_STRUCT_FREE(*td, st);
1617             }
1618             return tmpres;
1619         }
1620     }
1621
1622     *sptr = st;
1623
1624     return result_ok;
1625 }
1626