133 lines
4.9 KiB
C
133 lines
4.9 KiB
C
/*
|
|
* Generated by asn1c-0.9.29 (http://lionet.info/asn1c)
|
|
* From ASN.1 module "E2SM-KPM-RC"
|
|
* found in "e2sm-kpm-rc.asn"
|
|
* `asn1c -fcompound-names -fno-include-deps -findirect-choice -pdu=auto -gen-PER -gen-OER -no-gen-example -D .`
|
|
*/
|
|
|
|
#include "E2SM-KPM-EventTriggerDefinition-Format1.h"
|
|
|
|
#include "Trigger-ConditionIE-Item.h"
|
|
static int
|
|
memb_policyTest_List_constraint_1(const asn_TYPE_descriptor_t *td, const void *sptr,
|
|
asn_app_constraint_failed_f *ctfailcb, void *app_key) {
|
|
size_t size;
|
|
|
|
if(!sptr) {
|
|
ASN__CTFAIL(app_key, td, sptr,
|
|
"%s: value not given (%s:%d)",
|
|
td->name, __FILE__, __LINE__);
|
|
return -1;
|
|
}
|
|
|
|
/* Determine the number of elements */
|
|
size = _A_CSEQUENCE_FROM_VOID(sptr)->count;
|
|
|
|
if((size >= 1 && size <= 15)) {
|
|
/* Perform validation of the inner elements */
|
|
return td->encoding_constraints.general_constraints(td, sptr, ctfailcb, app_key);
|
|
} else {
|
|
ASN__CTFAIL(app_key, td, sptr,
|
|
"%s: constraint failed (%s:%d)",
|
|
td->name, __FILE__, __LINE__);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
static asn_oer_constraints_t asn_OER_type_policyTest_List_constr_2 CC_NOTUSED = {
|
|
{ 0, 0 },
|
|
-1 /* (SIZE(1..15)) */};
|
|
static asn_per_constraints_t asn_PER_type_policyTest_List_constr_2 CC_NOTUSED = {
|
|
{ APC_UNCONSTRAINED, -1, -1, 0, 0 },
|
|
{ APC_CONSTRAINED, 4, 4, 1, 15 } /* (SIZE(1..15)) */,
|
|
0, 0 /* No PER value map */
|
|
};
|
|
static asn_oer_constraints_t asn_OER_memb_policyTest_List_constr_2 CC_NOTUSED = {
|
|
{ 0, 0 },
|
|
-1 /* (SIZE(1..15)) */};
|
|
static asn_per_constraints_t asn_PER_memb_policyTest_List_constr_2 CC_NOTUSED = {
|
|
{ APC_UNCONSTRAINED, -1, -1, 0, 0 },
|
|
{ APC_CONSTRAINED, 4, 4, 1, 15 } /* (SIZE(1..15)) */,
|
|
0, 0 /* No PER value map */
|
|
};
|
|
static asn_TYPE_member_t asn_MBR_policyTest_List_2[] = {
|
|
{ ATF_POINTER, 0, 0,
|
|
(ASN_TAG_CLASS_UNIVERSAL | (16 << 2)),
|
|
0,
|
|
&asn_DEF_Trigger_ConditionIE_Item,
|
|
0,
|
|
{ 0, 0, 0 },
|
|
0, 0, /* No default value */
|
|
""
|
|
},
|
|
};
|
|
static const ber_tlv_tag_t asn_DEF_policyTest_List_tags_2[] = {
|
|
(ASN_TAG_CLASS_CONTEXT | (0 << 2)),
|
|
(ASN_TAG_CLASS_UNIVERSAL | (16 << 2))
|
|
};
|
|
static asn_SET_OF_specifics_t asn_SPC_policyTest_List_specs_2 = {
|
|
sizeof(struct E2SM_KPM_EventTriggerDefinition_Format1__policyTest_List),
|
|
offsetof(struct E2SM_KPM_EventTriggerDefinition_Format1__policyTest_List, _asn_ctx),
|
|
0, /* XER encoding is XMLDelimitedItemList */
|
|
};
|
|
static /* Use -fall-defs-global to expose */
|
|
asn_TYPE_descriptor_t asn_DEF_policyTest_List_2 = {
|
|
"policyTest-List",
|
|
"policyTest-List",
|
|
&asn_OP_SEQUENCE_OF,
|
|
asn_DEF_policyTest_List_tags_2,
|
|
sizeof(asn_DEF_policyTest_List_tags_2)
|
|
/sizeof(asn_DEF_policyTest_List_tags_2[0]) - 1, /* 1 */
|
|
asn_DEF_policyTest_List_tags_2, /* Same as above */
|
|
sizeof(asn_DEF_policyTest_List_tags_2)
|
|
/sizeof(asn_DEF_policyTest_List_tags_2[0]), /* 2 */
|
|
{ &asn_OER_type_policyTest_List_constr_2, &asn_PER_type_policyTest_List_constr_2, SEQUENCE_OF_constraint },
|
|
asn_MBR_policyTest_List_2,
|
|
1, /* Single element */
|
|
&asn_SPC_policyTest_List_specs_2 /* Additional specs */
|
|
};
|
|
|
|
asn_TYPE_member_t asn_MBR_E2SM_KPM_EventTriggerDefinition_Format1_1[] = {
|
|
{ ATF_POINTER, 1, offsetof(struct E2SM_KPM_EventTriggerDefinition_Format1, policyTest_List),
|
|
(ASN_TAG_CLASS_CONTEXT | (0 << 2)),
|
|
0,
|
|
&asn_DEF_policyTest_List_2,
|
|
0,
|
|
{ &asn_OER_memb_policyTest_List_constr_2, &asn_PER_memb_policyTest_List_constr_2, memb_policyTest_List_constraint_1 },
|
|
0, 0, /* No default value */
|
|
"policyTest-List"
|
|
},
|
|
};
|
|
static const int asn_MAP_E2SM_KPM_EventTriggerDefinition_Format1_oms_1[] = { 0 };
|
|
static const ber_tlv_tag_t asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1_tags_1[] = {
|
|
(ASN_TAG_CLASS_UNIVERSAL | (16 << 2))
|
|
};
|
|
static const asn_TYPE_tag2member_t asn_MAP_E2SM_KPM_EventTriggerDefinition_Format1_tag2el_1[] = {
|
|
{ (ASN_TAG_CLASS_CONTEXT | (0 << 2)), 0, 0, 0 } /* policyTest-List */
|
|
};
|
|
asn_SEQUENCE_specifics_t asn_SPC_E2SM_KPM_EventTriggerDefinition_Format1_specs_1 = {
|
|
sizeof(struct E2SM_KPM_EventTriggerDefinition_Format1),
|
|
offsetof(struct E2SM_KPM_EventTriggerDefinition_Format1, _asn_ctx),
|
|
asn_MAP_E2SM_KPM_EventTriggerDefinition_Format1_tag2el_1,
|
|
1, /* Count of tags in the map */
|
|
asn_MAP_E2SM_KPM_EventTriggerDefinition_Format1_oms_1, /* Optional members */
|
|
1, 0, /* Root/Additions */
|
|
1, /* First extension addition */
|
|
};
|
|
asn_TYPE_descriptor_t asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1 = {
|
|
"E2SM-KPM-EventTriggerDefinition-Format1",
|
|
"E2SM-KPM-EventTriggerDefinition-Format1",
|
|
&asn_OP_SEQUENCE,
|
|
asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1_tags_1,
|
|
sizeof(asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1_tags_1)
|
|
/sizeof(asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1_tags_1[0]), /* 1 */
|
|
asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1_tags_1, /* Same as above */
|
|
sizeof(asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1_tags_1)
|
|
/sizeof(asn_DEF_E2SM_KPM_EventTriggerDefinition_Format1_tags_1[0]), /* 1 */
|
|
{ 0, 0, SEQUENCE_constraint },
|
|
asn_MBR_E2SM_KPM_EventTriggerDefinition_Format1_1,
|
|
1, /* Elements count */
|
|
&asn_SPC_E2SM_KPM_EventTriggerDefinition_Format1_specs_1 /* Additional specs */
|
|
};
|
|
|