1
0
mirror of https://github.com/gnss-sdr/gnss-sdr synced 2024-06-24 22:13:15 +00:00
gnss-sdr/src/core/libs/supl/asn-supl/SETAuthKey.c
Carles Fernandez 4d0d263280
Make the software package compliant with the REUSE Specification v3.0 (see https://reuse.software/spec/)
Update license headers to SPDX format (see https://spdx.org/)
Add license to all files
Add CI job in GitHub Actions to ensure compliance
2020-02-08 01:20:02 +01:00

151 lines
4.3 KiB
C

/*
* SPDX-FileCopyrightText: (c) 2003, 2004 Lev Walkin <vlm@lionet.info>. All rights reserved.
* SPDX-License-Identifier: BSD-1-Clause
* Generated by asn1c-0.9.22 (http://lionet.info/asn1c)
* From ASN.1 module "SUPL-RESPONSE"
* found in "../supl-response.asn"
*/
#include "SETAuthKey.h"
static int memb_shortKey_constraint_1(asn_TYPE_descriptor_t *td,
const void *sptr,
asn_app_constraint_failed_f *ctfailcb,
void *app_key)
{
const BIT_STRING_t *st = (const BIT_STRING_t *)sptr;
size_t size;
if (!sptr)
{
_ASN_CTFAIL(app_key, td, sptr, "%s: value not given (%s:%d)",
td->name, __FILE__, __LINE__);
return -1;
}
if (st->size > 0)
{
/* Size in bits */
size = 8 * st->size - (st->bits_unused & 0x07);
}
else
{
size = 0;
}
if (size == 128)
{
/* Constraint check succeeded */
return 0;
}
else
{
_ASN_CTFAIL(app_key, td, sptr, "%s: constraint failed (%s:%d)",
td->name, __FILE__, __LINE__);
return -1;
}
}
static int memb_longKey_constraint_1(asn_TYPE_descriptor_t *td,
const void *sptr,
asn_app_constraint_failed_f *ctfailcb,
void *app_key)
{
const BIT_STRING_t *st = (const BIT_STRING_t *)sptr;
size_t size;
if (!sptr)
{
_ASN_CTFAIL(app_key, td, sptr, "%s: value not given (%s:%d)",
td->name, __FILE__, __LINE__);
return -1;
}
if (st->size > 0)
{
/* Size in bits */
size = 8 * st->size - (st->bits_unused & 0x07);
}
else
{
size = 0;
}
if (size == 256)
{
/* Constraint check succeeded */
return 0;
}
else
{
_ASN_CTFAIL(app_key, td, sptr, "%s: constraint failed (%s:%d)",
td->name, __FILE__, __LINE__);
return -1;
}
}
static asn_per_constraints_t ASN_PER_MEMB_SHORT_KEY_CONSTR_2 = {
{APC_UNCONSTRAINED, -1, -1, 0, 0},
{APC_CONSTRAINED, 0, 0, 128, 128} /* (SIZE(128..128)) */,
0,
0 /* No PER value map */
};
static asn_per_constraints_t ASN_PER_MEMB_LONG_KEY_CONSTR_3 = {
{APC_UNCONSTRAINED, -1, -1, 0, 0},
{APC_CONSTRAINED, 0, 0, 256, 256} /* (SIZE(256..256)) */,
0,
0 /* No PER value map */
};
static asn_per_constraints_t ASN_PER_TYPE_SET_AUTH_KEY_CONSTR_1 = {
{APC_CONSTRAINED | APC_EXTENSIBLE, 1, 1, 0, 1} /* (0..1,...) */,
{APC_UNCONSTRAINED, -1, -1, 0, 0},
0,
0 /* No PER value map */
};
static asn_TYPE_member_t asn_MBR_SETAuthKey_1[] = {
{ATF_NOFLAGS, 0, offsetof(struct SETAuthKey, choice.shortKey),
(ASN_TAG_CLASS_CONTEXT | (0 << 2)), -1, /* IMPLICIT tag at current level */
&asn_DEF_BIT_STRING, memb_shortKey_constraint_1,
&ASN_PER_MEMB_SHORT_KEY_CONSTR_2, 0, "shortKey"},
{ATF_NOFLAGS, 0, offsetof(struct SETAuthKey, choice.longKey),
(ASN_TAG_CLASS_CONTEXT | (1 << 2)), -1, /* IMPLICIT tag at current level */
&asn_DEF_BIT_STRING, memb_longKey_constraint_1,
&ASN_PER_MEMB_LONG_KEY_CONSTR_3, 0, "longKey"},
};
static asn_TYPE_tag2member_t asn_MAP_SETAuthKey_tag2el_1[] = {
{(ASN_TAG_CLASS_CONTEXT | (0 << 2)), 0, 0, 0}, /* shortKey at 17 */
{(ASN_TAG_CLASS_CONTEXT | (1 << 2)), 1, 0, 0} /* longKey at 18 */
};
static asn_CHOICE_specifics_t asn_SPC_SETAuthKey_specs_1 = {
sizeof(struct SETAuthKey),
offsetof(struct SETAuthKey, _asn_ctx),
offsetof(struct SETAuthKey, present),
sizeof(((struct SETAuthKey *)0)->present),
asn_MAP_SETAuthKey_tag2el_1,
2, /* Count of tags in the map */
0,
2 /* Extensions start */
};
asn_TYPE_descriptor_t asn_DEF_SETAuthKey = {
"SETAuthKey",
"SETAuthKey",
CHOICE_free,
CHOICE_print,
CHOICE_constraint,
CHOICE_decode_ber,
CHOICE_encode_der,
CHOICE_decode_xer,
CHOICE_encode_xer,
CHOICE_decode_uper,
CHOICE_encode_uper,
CHOICE_outmost_tag,
0, /* No effective tags (pointer) */
0, /* No effective tags (count) */
0, /* No tags (pointer) */
0, /* No tags (count) */
&ASN_PER_TYPE_SET_AUTH_KEY_CONSTR_1,
asn_MBR_SETAuthKey_1,
2, /* Elements count */
&asn_SPC_SETAuthKey_specs_1 /* Additional specs */
};