Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
/*
* Generated by asn1c-0.9.29 (http://lionet.info/asn1c)
* From ASN.1 module "IEEE1609dot2"
* found in "../asn1/1609Dot2-ASN1/asn1c/IEEE1609dot2.asn"
* `asn1c -S ../../asn1c/skeletons -fcompound-names -no-gen-PER -gen-autotools -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage`
*/
#include "AesCcmCiphertext.h"
static int
memb_nonce_constraint_1(const asn_TYPE_descriptor_t *td, const void *sptr,
asn_app_constraint_failed_f *ctfailcb, void *app_key) {
const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr;
size_t size;
if(!sptr) {
ASN__CTFAIL(app_key, td, sptr,
"%s: value not given (%s:%d)",
td->name, __FILE__, __LINE__);
return -1;
}
size = st->size;
if((size == 12)) {
/* Constraint check succeeded */
return 0;
} else {
ASN__CTFAIL(app_key, td, sptr,
"%s: constraint failed (%s:%d)",
td->name, __FILE__, __LINE__);
return -1;
}
}
static asn_oer_constraints_t asn_OER_memb_nonce_constr_2 CC_NOTUSED = {
{ 0, 0 },
12 /* (SIZE(12..12)) */};
asn_TYPE_member_t asn_MBR_AesCcmCiphertext_1[] = {
{ ATF_NOFLAGS, 0, offsetof(struct AesCcmCiphertext, nonce),
(ASN_TAG_CLASS_CONTEXT | (0 << 2)),
-1, /* IMPLICIT tag at current level */
&asn_DEF_OCTET_STRING,
0,
{ &asn_OER_memb_nonce_constr_2, 0, memb_nonce_constraint_1 },
0, 0, /* No default value */
"nonce"
},
{ ATF_NOFLAGS, 0, offsetof(struct AesCcmCiphertext, ccmCiphertext),
(ASN_TAG_CLASS_CONTEXT | (1 << 2)),
-1, /* IMPLICIT tag at current level */
&asn_DEF_Opaque,
0,
{ 0, 0, 0 },
0, 0, /* No default value */
"ccmCiphertext"
},
};
static const ber_tlv_tag_t asn_DEF_AesCcmCiphertext_tags_1[] = {
(ASN_TAG_CLASS_UNIVERSAL | (16 << 2))
};
static const asn_TYPE_tag2member_t asn_MAP_AesCcmCiphertext_tag2el_1[] = {
{ (ASN_TAG_CLASS_CONTEXT | (0 << 2)), 0, 0, 0 }, /* nonce */
{ (ASN_TAG_CLASS_CONTEXT | (1 << 2)), 1, 0, 0 } /* ccmCiphertext */
};
asn_SEQUENCE_specifics_t asn_SPC_AesCcmCiphertext_specs_1 = {
sizeof(struct AesCcmCiphertext),
offsetof(struct AesCcmCiphertext, _asn_ctx),
asn_MAP_AesCcmCiphertext_tag2el_1,
2, /* Count of tags in the map */
0, 0, 0, /* Optional elements (not needed) */
-1, /* First extension addition */
};
asn_TYPE_descriptor_t asn_DEF_AesCcmCiphertext = {
"AesCcmCiphertext",
"AesCcmCiphertext",
&asn_OP_SEQUENCE,
asn_DEF_AesCcmCiphertext_tags_1,
sizeof(asn_DEF_AesCcmCiphertext_tags_1)
/sizeof(asn_DEF_AesCcmCiphertext_tags_1[0]), /* 1 */
asn_DEF_AesCcmCiphertext_tags_1, /* Same as above */
sizeof(asn_DEF_AesCcmCiphertext_tags_1)
/sizeof(asn_DEF_AesCcmCiphertext_tags_1[0]), /* 1 */
{ 0, 0, SEQUENCE_constraint },
asn_MBR_AesCcmCiphertext_1,
2, /* Elements count */
&asn_SPC_AesCcmCiphertext_specs_1 /* Additional specs */
};