instruction
stringclasses 1
value | input
stringlengths 31
235k
| output
class label 2
classes |
---|---|---|
Categorize the following code snippet as vulnerable or not. True or False
|
static gboolean gsm_a_bssmap_stat_packet ( void * tapdata , packet_info * pinfo _U_ , epan_dissect_t * edt _U_ , const void * gatr_ptr ) {
return gsm_a_stat_packet ( tapdata , gatr_ptr , BSSAP_PDU_TYPE_BSSMAP , 0 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
GAppInfo * nautilus_mime_get_default_application_for_files ( GList * files ) {
GList * l , * sorted_files ;
NautilusFile * file ;
GAppInfo * app , * one_app ;
g_assert ( files != NULL ) ;
sorted_files = g_list_sort ( g_list_copy ( files ) , ( GCompareFunc ) file_compare_by_mime_type ) ;
app = NULL ;
for ( l = sorted_files ;
l != NULL ;
l = l -> next ) {
file = l -> data ;
if ( l -> prev && file_compare_by_mime_type ( file , l -> prev -> data ) == 0 && file_compare_by_parent_uri ( file , l -> prev -> data ) == 0 ) {
continue ;
}
one_app = nautilus_mime_get_default_application_for_file ( file ) ;
if ( one_app == NULL || ( app != NULL && ! g_app_info_equal ( app , one_app ) ) ) {
if ( app ) {
g_object_unref ( app ) ;
}
if ( one_app ) {
g_object_unref ( one_app ) ;
}
app = NULL ;
break ;
}
if ( app == NULL ) {
app = one_app ;
}
else {
g_object_unref ( one_app ) ;
}
}
g_list_free ( sorted_files ) ;
return app ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static gboolean ascend_seek_read ( wtap * wth , gint64 seek_off , struct wtap_pkthdr * phdr , Buffer * buf , int * err , gchar * * err_info ) {
ascend_t * ascend = ( ascend_t * ) wth -> priv ;
if ( file_seek ( wth -> random_fh , seek_off , SEEK_SET , err ) == - 1 ) return FALSE ;
if ( parse_ascend ( ascend , wth -> random_fh , phdr , buf , wth -> snapshot_length ) != PARSED_RECORD ) {
* err = WTAP_ERR_BAD_FILE ;
* err_info = g_strdup ( ( ascend_parse_error != NULL ) ? ascend_parse_error : "parse error" ) ;
return FALSE ;
}
return TRUE ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_notify_field ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep , guint16 type , guint16 * data ) {
guint16 field ;
const char * str ;
offset = dissect_ndr_uint16 ( tvb , offset , pinfo , NULL , di , drep , hf_notify_field , & field ) ;
switch ( type ) {
case PRINTER_NOTIFY_TYPE : str = val_to_str_ext_const ( field , & printer_notify_option_data_vals_ext , "Unknown" ) ;
break ;
case JOB_NOTIFY_TYPE : str = val_to_str_ext_const ( field , & job_notify_option_data_vals_ext , "Unknown" ) ;
break ;
default : str = "Unknown notify type" ;
break ;
}
proto_tree_add_uint_format_value ( tree , hf_notify_field , tvb , offset - 2 , 2 , field , "%s (%d)" , str , field ) ;
if ( data ) * data = field ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h225_InfoRequestResponseStatus ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h225_InfoRequestResponseStatus , InfoRequestResponseStatus_choice , NULL ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static proto_tree * ptvcursor_add_subtree_item ( ptvcursor_t * ptvc , proto_item * it , gint ett_subtree , gint length ) {
ptvcursor_push_subtree ( ptvc , it , ett_subtree ) ;
if ( length == SUBTREE_UNDEFINED_LENGTH ) ptvcursor_subtree_set_item ( ptvc , it ) ;
return ptvcursor_tree ( ptvc ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h225_Q954Details ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_Q954Details , Q954Details_sequence ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static VALUE ossl_asn1_decode ( VALUE self , VALUE obj ) {
VALUE ret ;
unsigned char * p ;
VALUE tmp ;
long len , read = 0 , offset = 0 ;
obj = ossl_to_der_if_possible ( obj ) ;
tmp = rb_str_new4 ( StringValue ( obj ) ) ;
p = ( unsigned char * ) RSTRING_PTR ( tmp ) ;
len = RSTRING_LEN ( tmp ) ;
ret = ossl_asn1_decode0 ( & p , len , & offset , 0 , 0 , & read ) ;
RB_GC_GUARD ( tmp ) ;
int_ossl_decode_sanity_check ( len , read , offset ) ;
return ret ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pmac_ide_transfer_cb ( void * opaque , int ret ) {
DBDMA_io * io = opaque ;
MACIOIDEState * m = io -> opaque ;
IDEState * s = idebus_active_if ( & m -> bus ) ;
int n = 0 ;
int64_t sector_num ;
int unaligned ;
if ( ret < 0 ) {
MACIO_DPRINTF ( "DMA error\n" ) ;
m -> aiocb = NULL ;
qemu_sglist_destroy ( & s -> sg ) ;
ide_dma_error ( s ) ;
io -> remainder_len = 0 ;
goto done ;
}
if ( -- io -> requests ) {
return ;
}
if ( ! m -> dma_active ) {
MACIO_DPRINTF ( "waiting for data (%#x - %#x - %x)\n" , s -> nsector , io -> len , s -> status ) ;
io -> processing = false ;
return ;
}
sector_num = ide_get_sector ( s ) ;
MACIO_DPRINTF ( "io_buffer_size = %#x\n" , s -> io_buffer_size ) ;
if ( s -> io_buffer_size > 0 ) {
m -> aiocb = NULL ;
qemu_sglist_destroy ( & s -> sg ) ;
n = ( s -> io_buffer_size + 0x1ff ) >> 9 ;
sector_num += n ;
ide_set_sector ( s , sector_num ) ;
s -> nsector -= n ;
}
if ( io -> finish_remain_read ) {
io -> finish_remain_read = false ;
cpu_physical_memory_write ( io -> finish_addr , io -> remainder , io -> finish_len ) ;
}
MACIO_DPRINTF ( "remainder: %d io->len: %d nsector: %d " "sector_num: %" PRId64 "\n" , io -> remainder_len , io -> len , s -> nsector , sector_num ) ;
if ( io -> remainder_len && io -> len ) {
int remainder_len = MIN ( io -> remainder_len , io -> len ) ;
uint8_t * p = & io -> remainder [ 0x200 - remainder_len ] ;
MACIO_DPRINTF ( "copying remainder %d bytes at %#" HWADDR_PRIx "\n" , remainder_len , io -> addr ) ;
switch ( s -> dma_cmd ) {
case IDE_DMA_READ : cpu_physical_memory_write ( io -> addr , p , remainder_len ) ;
break ;
case IDE_DMA_WRITE : cpu_physical_memory_read ( io -> addr , p , remainder_len ) ;
break ;
case IDE_DMA_TRIM : break ;
}
io -> addr += remainder_len ;
io -> len -= remainder_len ;
io -> remainder_len -= remainder_len ;
if ( s -> dma_cmd == IDE_DMA_WRITE && ! io -> remainder_len ) {
io -> requests ++ ;
qemu_iovec_reset ( & io -> iov ) ;
qemu_iovec_add ( & io -> iov , io -> remainder , 0x200 ) ;
m -> aiocb = blk_aio_writev ( s -> blk , sector_num - 1 , & io -> iov , 1 , pmac_ide_transfer_cb , io ) ;
}
}
if ( s -> nsector == 0 && ! io -> remainder_len ) {
MACIO_DPRINTF ( "end of transfer\n" ) ;
s -> status = READY_STAT | SEEK_STAT ;
ide_set_irq ( s -> bus ) ;
m -> dma_active = false ;
}
if ( io -> len == 0 ) {
MACIO_DPRINTF ( "end of DMA\n" ) ;
goto done ;
}
s -> io_buffer_index = 0 ;
s -> io_buffer_size = MIN ( io -> len , s -> nsector * 512 ) ;
unaligned = io -> len & 0x1ff ;
if ( unaligned ) {
int nsector = io -> len >> 9 ;
MACIO_DPRINTF ( "precopying unaligned %d bytes to %#" HWADDR_PRIx "\n" , unaligned , io -> addr + io -> len - unaligned ) ;
switch ( s -> dma_cmd ) {
case IDE_DMA_READ : io -> requests ++ ;
io -> finish_addr = io -> addr + io -> len - unaligned ;
io -> finish_len = unaligned ;
io -> finish_remain_read = true ;
qemu_iovec_reset ( & io -> iov ) ;
qemu_iovec_add ( & io -> iov , io -> remainder , 0x200 ) ;
m -> aiocb = blk_aio_readv ( s -> blk , sector_num + nsector , & io -> iov , 1 , pmac_ide_transfer_cb , io ) ;
break ;
case IDE_DMA_WRITE : cpu_physical_memory_read ( io -> addr + io -> len - unaligned , io -> remainder + io -> remainder_len , unaligned ) ;
break ;
case IDE_DMA_TRIM : break ;
}
}
MACIO_DPRINTF ( "io->len = %#x\n" , io -> len ) ;
qemu_sglist_init ( & s -> sg , DEVICE ( m ) , io -> len / MACIO_PAGE_SIZE + 1 , & address_space_memory ) ;
qemu_sglist_add ( & s -> sg , io -> addr , io -> len ) ;
io -> addr += io -> len + unaligned ;
io -> remainder_len = ( 0x200 - unaligned ) & 0x1ff ;
MACIO_DPRINTF ( "set remainder to: %d\n" , io -> remainder_len ) ;
if ( ! io -> len ) {
if ( ! io -> requests ) {
io -> requests ++ ;
pmac_ide_transfer_cb ( opaque , ret ) ;
}
return ;
}
io -> len = 0 ;
MACIO_DPRINTF ( "sector_num=%" PRId64 " n=%d, nsector=%d, cmd_cmd=%d\n" , sector_num , n , s -> nsector , s -> dma_cmd ) ;
switch ( s -> dma_cmd ) {
case IDE_DMA_READ : m -> aiocb = dma_blk_read ( s -> blk , & s -> sg , sector_num , pmac_ide_transfer_cb , io ) ;
break ;
case IDE_DMA_WRITE : m -> aiocb = dma_blk_write ( s -> blk , & s -> sg , sector_num , pmac_ide_transfer_cb , io ) ;
break ;
case IDE_DMA_TRIM : m -> aiocb = dma_blk_io ( s -> blk , & s -> sg , sector_num , ide_issue_trim , pmac_ide_transfer_cb , io , DMA_DIRECTION_TO_DEVICE ) ;
break ;
}
io -> requests ++ ;
return ;
done : if ( s -> dma_cmd == IDE_DMA_READ || s -> dma_cmd == IDE_DMA_WRITE ) {
block_acct_done ( blk_get_stats ( s -> blk ) , & s -> acct ) ;
}
io -> dma_end ( io ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
gboolean rtp_dyn_payload_remove ( rtp_dyn_payload_t * rtp_dyn_payload , const guint8 pt ) {
return ( rtp_dyn_payload && rtp_dyn_payload -> table && g_hash_table_remove ( rtp_dyn_payload -> table , GUINT_TO_POINTER ( pt ) ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int mainwindow_rgrow ( MAIN_WINDOW_REC * window , int count ) {
if ( ! try_rshrink_right ( window , count ) ) {
if ( ! try_rshrink_left ( window , count ) ) return FALSE ;
}
return TRUE ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void idct4 ( const int16_t * input , int16_t * output ) {
int16_t step [ 4 ] ;
int temp1 , temp2 ;
temp1 = ( input [ 0 ] + input [ 2 ] ) * cospi_16_64 ;
temp2 = ( input [ 0 ] - input [ 2 ] ) * cospi_16_64 ;
step [ 0 ] = dct_const_round_shift ( temp1 ) ;
step [ 1 ] = dct_const_round_shift ( temp2 ) ;
temp1 = input [ 1 ] * cospi_24_64 - input [ 3 ] * cospi_8_64 ;
temp2 = input [ 1 ] * cospi_8_64 + input [ 3 ] * cospi_24_64 ;
step [ 2 ] = dct_const_round_shift ( temp1 ) ;
step [ 3 ] = dct_const_round_shift ( temp2 ) ;
output [ 0 ] = step [ 0 ] + step [ 3 ] ;
output [ 1 ] = step [ 1 ] + step [ 2 ] ;
output [ 2 ] = step [ 1 ] - step [ 2 ] ;
output [ 3 ] = step [ 0 ] - step [ 3 ] ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pdo_stmt_iter_move_forwards ( zend_object_iterator * iter TSRMLS_DC ) {
struct php_pdo_iterator * I = ( struct php_pdo_iterator * ) iter -> data ;
if ( I -> fetch_ahead ) {
zval_ptr_dtor ( & I -> fetch_ahead ) ;
I -> fetch_ahead = NULL ;
}
MAKE_STD_ZVAL ( I -> fetch_ahead ) ;
if ( ! do_fetch ( I -> stmt , TRUE , I -> fetch_ahead , PDO_FETCH_USE_DEFAULT , PDO_FETCH_ORI_NEXT , 0 , 0 TSRMLS_CC ) ) {
pdo_stmt_t * stmt = I -> stmt ;
PDO_HANDLE_STMT_ERR ( ) ;
I -> key = ( ulong ) - 1 ;
FREE_ZVAL ( I -> fetch_ahead ) ;
I -> fetch_ahead = NULL ;
return ;
}
I -> key ++ ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static UChar32 U_CALLCONV _UTF16LEGetNextUChar ( UConverterToUnicodeArgs * pArgs , UErrorCode * err ) {
const uint8_t * s , * sourceLimit ;
UChar32 c ;
if ( pArgs -> converter -> mode < 8 ) {
return UCNV_GET_NEXT_UCHAR_USE_TO_U ;
}
s = ( const uint8_t * ) pArgs -> source ;
sourceLimit = ( const uint8_t * ) pArgs -> sourceLimit ;
if ( s >= sourceLimit ) {
* err = U_INDEX_OUTOFBOUNDS_ERROR ;
return 0xffff ;
}
if ( s + 2 > sourceLimit ) {
pArgs -> converter -> toUBytes [ 0 ] = * s ++ ;
pArgs -> converter -> toULength = 1 ;
pArgs -> source = ( const char * ) s ;
* err = U_TRUNCATED_CHAR_FOUND ;
return 0xffff ;
}
c = ( ( UChar32 ) s [ 1 ] << 8 ) | * s ;
s += 2 ;
if ( U_IS_SURROGATE ( c ) ) {
if ( U16_IS_SURROGATE_LEAD ( c ) ) {
if ( s + 2 <= sourceLimit ) {
UChar trail ;
trail = ( ( UChar ) s [ 1 ] << 8 ) | * s ;
if ( U16_IS_TRAIL ( trail ) ) {
c = U16_GET_SUPPLEMENTARY ( c , trail ) ;
s += 2 ;
}
else {
c = - 2 ;
}
}
else {
uint8_t * bytes = pArgs -> converter -> toUBytes ;
s -= 2 ;
pArgs -> converter -> toULength = ( int8_t ) ( sourceLimit - s ) ;
do {
* bytes ++ = * s ++ ;
}
while ( s < sourceLimit ) ;
c = 0xffff ;
* err = U_TRUNCATED_CHAR_FOUND ;
}
}
else {
c = - 2 ;
}
if ( c < 0 ) {
uint8_t * bytes = pArgs -> converter -> toUBytes ;
pArgs -> converter -> toULength = 2 ;
* bytes = * ( s - 2 ) ;
bytes [ 1 ] = * ( s - 1 ) ;
c = 0xffff ;
* err = U_ILLEGAL_CHAR_FOUND ;
}
}
pArgs -> source = ( const char * ) s ;
return c ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vpx_svc_release ( SvcContext * svc_ctx ) {
SvcInternal * si ;
if ( svc_ctx == NULL ) return ;
si = ( SvcInternal * ) svc_ctx -> internal ;
if ( si != NULL ) {
free ( si ) ;
svc_ctx -> internal = NULL ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void parseExtensionObject ( proto_tree * tree , tvbuff_t * tvb , packet_info * pinfo , gint * pOffset , const char * szFieldName ) {
static const int * extobj_mask [ ] = {
& hf_opcua_extobj_mask_binbodyflag , & hf_opcua_extobj_mask_xmlbodyflag , NULL }
;
gint iOffset = * pOffset ;
guint8 EncodingMask ;
guint32 TypeId ;
proto_tree * extobj_tree ;
proto_item * ti ;
guint opcua_nested_count ;
extobj_tree = proto_tree_add_subtree_format ( tree , tvb , * pOffset , - 1 , ett_opcua_extensionobject , & ti , "%s: ExtensionObject" , szFieldName ) ;
opcua_nested_count = GPOINTER_TO_UINT ( p_get_proto_data ( pinfo -> pool , pinfo , proto_opcua , 0 ) ) ;
if ( ++ opcua_nested_count > MAX_NESTING_DEPTH ) {
expert_add_info ( pinfo , ti , & ei_nesting_depth ) ;
return ;
}
p_add_proto_data ( pinfo -> pool , pinfo , proto_opcua , 0 , GUINT_TO_POINTER ( opcua_nested_count ) ) ;
TypeId = getExtensionObjectType ( tvb , & iOffset ) ;
parseExpandedNodeId ( extobj_tree , tvb , pinfo , & iOffset , "TypeId" ) ;
EncodingMask = tvb_get_guint8 ( tvb , iOffset ) ;
proto_tree_add_bitmask ( extobj_tree , tvb , iOffset , hf_opcua_extobj_mask , ett_opcua_extensionobject_encodingmask , extobj_mask , ENC_LITTLE_ENDIAN ) ;
iOffset ++ ;
if ( EncodingMask & EXTOBJ_ENCODINGMASK_BINBODY_FLAG ) {
dispatchExtensionObjectType ( extobj_tree , tvb , pinfo , & iOffset , TypeId ) ;
}
proto_item_set_end ( ti , tvb , iOffset ) ;
* pOffset = iOffset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( SessionRestorePageLoadMetricsBrowserTest , SingleTabSessionRestore ) {
ui_test_utils : : NavigateToURL ( browser ( ) , GetTestURL ( ) ) ;
SessionRestorePaintWaiter session_restore_paint_waiter ;
QuitBrowserAndRestore ( browser ( ) ) ;
session_restore_paint_waiter . WaitForForegroundTabs ( 1 ) ;
ExpectFirstPaintMetricsTotalCount ( 1 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dsa_pub_print ( BIO * bp , const EVP_PKEY * pkey , int indent , ASN1_PCTX * ctx ) {
return do_dsa_print ( bp , pkey -> pkey . dsa , indent , 1 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int qemuAssignDeviceNetAlias ( virDomainDefPtr def , virDomainNetDefPtr net , int idx ) {
if ( networkGetActualType ( net ) == VIR_DOMAIN_NET_TYPE_HOSTDEV ) return qemuAssignDeviceHostdevAlias ( def , & net -> info . alias , - 1 ) ;
if ( idx == - 1 ) {
size_t i ;
idx = 0 ;
for ( i = 0 ;
i < def -> nnets ;
i ++ ) {
int thisidx ;
if ( ( thisidx = qemuDomainDeviceAliasIndex ( & def -> nets [ i ] -> info , "net" ) ) < 0 ) continue ;
if ( thisidx >= idx ) idx = thisidx + 1 ;
}
}
if ( virAsprintf ( & net -> info . alias , "net%d" , idx ) < 0 ) return - 1 ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
struct message_search_context * message_search_init ( const char * normalized_key_utf8 , normalizer_func_t * normalizer , enum message_search_flags flags ) {
struct message_search_context * ctx ;
i_assert ( * normalized_key_utf8 != '\0' ) ;
ctx = i_new ( struct message_search_context , 1 ) ;
ctx -> flags = flags ;
ctx -> decoder = message_decoder_init ( normalizer , 0 ) ;
ctx -> str_find_ctx = str_find_init ( default_pool , normalized_key_utf8 ) ;
return ctx ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void ff_init_qscale_tab ( MpegEncContext * s ) {
int8_t * const qscale_table = s -> current_picture . f . qscale_table ;
int i ;
for ( i = 0 ;
i < s -> mb_num ;
i ++ ) {
unsigned int lam = s -> lambda_table [ s -> mb_index2xy [ i ] ] ;
int qp = ( lam * 139 + FF_LAMBDA_SCALE * 64 ) >> ( FF_LAMBDA_SHIFT + 7 ) ;
qscale_table [ s -> mb_index2xy [ i ] ] = av_clip ( qp , s -> avctx -> qmin , s -> avctx -> qmax ) ;
}
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
extern rtype gnu_dev_ ## name proto __THROW __attribute_const__ ;
# define __SYSMACROS_IMPL_TEMPL ( rtype , name , proto ) __extension__ __extern_inline __attribute_const__ rtype __NTH ( gnu_dev_ ## name proto ) __BEGIN_DECLS __SYSMACROS_DECLARE_MAJOR ( __SYSMACROS_DECL_TEMPL ) __SYSMACROS_DECLARE_MINOR ( __SYSMACROS_DECL_TEMPL )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int dissect_ber_GeneralizedTime ( gboolean implicit_tag , asn1_ctx_t * actx , proto_tree * tree , tvbuff_t * tvb , int offset , gint hf_id ) {
char str [ 35 ] ;
int tmp_int ;
const guint8 * tmpstr ;
char * strptr ;
char first_delim [ 2 ] ;
int first_digits ;
char second_delim [ 2 ] ;
int second_digits ;
int ret ;
gint8 ber_class ;
gboolean pc ;
gint32 tag ;
guint32 len ;
int end_offset ;
int hoffset ;
proto_item * cause ;
if ( ! implicit_tag ) {
hoffset = offset ;
offset = dissect_ber_identifier ( actx -> pinfo , tree , tvb , offset , & ber_class , & pc , & tag ) ;
offset = dissect_ber_length ( actx -> pinfo , tree , tvb , offset , & len , NULL ) ;
end_offset = offset + len ;
if ( ( ber_class != BER_CLASS_UNI ) || ( tag != BER_UNI_TAG_GeneralizedTime ) ) {
tvb_ensure_bytes_exist ( tvb , hoffset , 2 ) ;
cause = proto_tree_add_string_format_value ( tree , hf_ber_error , tvb , offset , len , "generalized_time_expected" , "GeneralizedTime expected but class:%s(%d) %s tag:%d was unexpected" , val_to_str_const ( ber_class , ber_class_codes , "Unknown" ) , ber_class , pc ? ber_pc_codes_short . true_string : ber_pc_codes_short . false_string , tag ) ;
expert_add_info ( actx -> pinfo , cause , & ei_ber_expected_generalized_time ) ;
if ( decode_unexpected ) {
proto_tree * unknown_tree = proto_item_add_subtree ( cause , ett_ber_unknown ) ;
dissect_unknown_ber ( actx -> pinfo , tvb , hoffset , unknown_tree ) ;
}
return end_offset ;
}
}
else {
len = tvb_reported_length_remaining ( tvb , offset ) ;
end_offset = offset + len ;
}
if ( ( len < 14 ) || ( len > 23 ) ) {
cause = proto_tree_add_string_format_value ( tree , hf_ber_error , tvb , offset , len , "illegal_length" , "GeneralizedTime invalid length: %u" , len ) ;
expert_add_info_format ( actx -> pinfo , cause , & ei_ber_error_length , "BER Error: GeneralizedTime invalid length" ) ;
if ( decode_unexpected ) {
proto_tree * unknown_tree = proto_item_add_subtree ( cause , ett_ber_unknown ) ;
dissect_unknown_ber ( actx -> pinfo , tvb , offset , unknown_tree ) ;
}
return end_offset ;
}
tmpstr = tvb_get_string_enc ( wmem_packet_scope ( ) , tvb , offset , len , ENC_ASCII ) ;
strptr = str ;
strptr += g_snprintf ( str , 20 , "%.4s-%.2s-%.2s %.2s:%.2s:%.2s" , tmpstr , tmpstr + 4 , tmpstr + 6 , tmpstr + 8 , tmpstr + 10 , tmpstr + 12 ) ;
first_delim [ 0 ] = 0 ;
second_delim [ 0 ] = 0 ;
ret = sscanf ( tmpstr , "%14d%1[.,+-Z]%4d%1[+-Z]%4d" , & tmp_int , first_delim , & first_digits , second_delim , & second_digits ) ;
if ( ret < 1 ) {
cause = proto_tree_add_string_format_value ( tree , hf_ber_error , tvb , offset , len , "invalid_generalized_time" , "GeneralizedTime invalid format: %s" , tmpstr ) ;
expert_add_info ( actx -> pinfo , cause , & ei_ber_invalid_format_generalized_time ) ;
if ( decode_unexpected ) {
proto_tree * unknown_tree = proto_item_add_subtree ( cause , ett_ber_unknown ) ;
dissect_unknown_ber ( actx -> pinfo , tvb , offset , unknown_tree ) ;
}
return end_offset ;
}
switch ( first_delim [ 0 ] ) {
case '.' : case ',' : strptr += g_snprintf ( strptr , 5 , "%c%.3d" , first_delim [ 0 ] , first_digits ) ;
switch ( second_delim [ 0 ] ) {
case '+' : case '-' : g_snprintf ( strptr , 12 , " (UTC%c%.4d)" , second_delim [ 0 ] , second_digits ) ;
break ;
case 'Z' : g_snprintf ( strptr , 7 , " (UTC)" ) ;
break ;
case 0 : break ;
default : break ;
}
break ;
case '+' : case '-' : g_snprintf ( strptr , 12 , " (UTC%c%.4d)" , first_delim [ 0 ] , first_digits ) ;
break ;
case 'Z' : g_snprintf ( strptr , 7 , " (UTC)" ) ;
break ;
case 0 : break ;
default : break ;
}
if ( hf_id >= 0 ) {
proto_tree_add_string ( tree , hf_id , tvb , offset , len , str ) ;
}
offset += len ;
return offset ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
const char * proto_get_protocol_long_name ( const protocol_t * protocol ) {
if ( protocol == NULL ) return "(none)" ;
return protocol -> name ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static DeviceState * qdev_find_recursive ( BusState * bus , const char * id ) {
DeviceState * dev , * ret ;
BusState * child ;
QLIST_FOREACH ( dev , & bus -> children , sibling ) {
if ( dev -> id && strcmp ( dev -> id , id ) == 0 ) return dev ;
QLIST_FOREACH ( child , & dev -> child_bus , sibling ) {
ret = qdev_find_recursive ( child , id ) ;
if ( ret ) {
return ret ;
}
}
}
return NULL ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( ContentFaviconDriverTest , AssociateIconWithInitialPageIconDespitePushState ) {
ASSERT_TRUE ( embedded_test_server ( ) -> Start ( ) ) ;
GURL url = embedded_test_server ( ) -> GetURL ( "/favicon/pushstate_with_favicon.html" ) ;
GURL pushstate_url = embedded_test_server ( ) -> GetURL ( "/favicon/pushstate_with_favicon_pushed.html" ) ;
PendingTaskWaiter waiter ( web_contents ( ) ) ;
waiter . AlsoRequireUrl ( pushstate_url ) ;
ui_test_utils : : NavigateToURLWithDisposition ( browser ( ) , url , WindowOpenDisposition : : CURRENT_TAB , ui_test_utils : : BROWSER_TEST_NONE ) ;
waiter . Wait ( ) ;
EXPECT_NE ( nullptr , GetFaviconForPageURL ( url , favicon_base : : IconType : : kFavicon ) . bitmap_data ) ;
EXPECT_NE ( nullptr , GetFaviconForPageURL ( pushstate_url , favicon_base : : IconType : : kFavicon ) . bitmap_data ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline void U_EXPORT2 utimer_getTime ( UTimer * timer ) {
uprv_initFrequency ( timer ) ;
uprv_start ( timer ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( SupervisedUserNavigationThrottleNotSupervisedTest , DontBlock ) {
BlockHost ( kExampleHost ) ;
WebContents * tab = browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) ;
GURL blocked_url = embedded_test_server ( ) -> GetURL ( kExampleHost , "/supervised_user/simple.html" ) ;
ui_test_utils : : NavigateToURL ( browser ( ) , blocked_url ) ;
EXPECT_FALSE ( tab -> ShowingInterstitialPage ( ) ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static uint32_t e1000e_rss_calc_hash ( E1000ECore * core , struct NetRxPkt * pkt , E1000E_RSSInfo * info ) {
NetRxPktRssType type ;
assert ( e1000e_rss_enabled ( core ) ) ;
switch ( info -> type ) {
case E1000_MRQ_RSS_TYPE_IPV4 : type = NetPktRssIpV4 ;
break ;
case E1000_MRQ_RSS_TYPE_IPV4TCP : type = NetPktRssIpV4Tcp ;
break ;
case E1000_MRQ_RSS_TYPE_IPV6TCP : type = NetPktRssIpV6Tcp ;
break ;
case E1000_MRQ_RSS_TYPE_IPV6 : type = NetPktRssIpV6 ;
break ;
case E1000_MRQ_RSS_TYPE_IPV6EX : type = NetPktRssIpV6Ex ;
break ;
default : assert ( false ) ;
return 0 ;
}
return net_rx_pkt_calc_rss_hash ( pkt , type , ( uint8_t * ) & core -> mac [ RSSRK ] ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void evdns_set_log_fn ( evdns_debug_log_fn_type fn ) {
evdns_log_fn = fn ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void openpic_save ( QEMUFile * f , void * opaque ) {
OpenPICState * opp = ( OpenPICState * ) opaque ;
unsigned int i ;
qemu_put_be32s ( f , & opp -> gcr ) ;
qemu_put_be32s ( f , & opp -> vir ) ;
qemu_put_be32s ( f , & opp -> pir ) ;
qemu_put_be32s ( f , & opp -> spve ) ;
qemu_put_be32s ( f , & opp -> tfrr ) ;
qemu_put_be32s ( f , & opp -> nb_cpus ) ;
for ( i = 0 ;
i < opp -> nb_cpus ;
i ++ ) {
qemu_put_sbe32s ( f , & opp -> dst [ i ] . ctpr ) ;
openpic_save_IRQ_queue ( f , & opp -> dst [ i ] . raised ) ;
openpic_save_IRQ_queue ( f , & opp -> dst [ i ] . servicing ) ;
qemu_put_buffer ( f , ( uint8_t * ) & opp -> dst [ i ] . outputs_active , sizeof ( opp -> dst [ i ] . outputs_active ) ) ;
}
for ( i = 0 ;
i < OPENPIC_MAX_TMR ;
i ++ ) {
qemu_put_be32s ( f , & opp -> timers [ i ] . tccr ) ;
qemu_put_be32s ( f , & opp -> timers [ i ] . tbcr ) ;
}
for ( i = 0 ;
i < opp -> max_irq ;
i ++ ) {
qemu_put_be32s ( f , & opp -> src [ i ] . ivpr ) ;
qemu_put_be32s ( f , & opp -> src [ i ] . idr ) ;
qemu_get_be32s ( f , & opp -> src [ i ] . destmask ) ;
qemu_put_sbe32s ( f , & opp -> src [ i ] . last_cpu ) ;
qemu_put_sbe32s ( f , & opp -> src [ i ] . pending ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int unistim_calls_packet ( void * ptr _U_ , packet_info * pinfo , epan_dissect_t * edt _U_ , const void * unistim_info ) {
voip_calls_tapinfo_t * tapinfo = & the_tapinfo_struct ;
voip_calls_info_t * tmp_listinfo ;
voip_calls_info_t * callsinfo = NULL ;
unistim_info_t * tmp_unistim_info = NULL ;
GList * list = NULL ;
GString * g_tmp = NULL ;
const gchar * frame_label = NULL ;
gchar * comment = NULL ;
const unistim_info_t * pi = ( const unistim_info_t * ) unistim_info ;
g_tmp = g_string_new ( NULL ) ;
list = g_list_first ( tapinfo -> callsinfo_list ) ;
while ( list ) {
tmp_listinfo = ( voip_calls_info_t * ) list -> data ;
if ( tmp_listinfo -> protocol == VOIP_UNISTIM ) {
tmp_unistim_info = ( unistim_info_t * ) tmp_listinfo -> prot_info ;
if ( pi -> termid != 0 ) {
if ( tmp_unistim_info -> termid == pi -> termid ) {
if ( tmp_listinfo -> call_state == VOIP_COMPLETED || tmp_listinfo -> call_state == VOIP_UNKNOWN ) {
}
else {
callsinfo = ( voip_calls_info_t * ) ( list -> data ) ;
break ;
}
}
}
else {
if ( ADDRESSES_EQUAL ( & tmp_unistim_info -> it_ip , & pinfo -> dst ) && ADDRESSES_EQUAL ( & tmp_unistim_info -> ni_ip , & pinfo -> src ) && ( tmp_unistim_info -> it_port == pinfo -> destport ) ) {
if ( tmp_listinfo -> call_state == VOIP_COMPLETED || tmp_listinfo -> call_state == VOIP_UNKNOWN ) {
}
else {
callsinfo = ( voip_calls_info_t * ) ( list -> data ) ;
break ;
}
}
else if ( ADDRESSES_EQUAL ( & tmp_unistim_info -> it_ip , & pinfo -> src ) && ADDRESSES_EQUAL ( & tmp_unistim_info -> ni_ip , & pinfo -> dst ) && ( tmp_unistim_info -> it_port == pinfo -> srcport ) ) {
if ( tmp_listinfo -> call_state == VOIP_COMPLETED || tmp_listinfo -> call_state == VOIP_UNKNOWN ) {
}
else {
callsinfo = ( voip_calls_info_t * ) ( list -> data ) ;
break ;
}
}
}
}
list = g_list_next ( list ) ;
}
if ( pi -> payload_type == 2 || pi -> payload_type == 1 ) {
if ( pi -> key_state == 1 || pi -> hook_state == 1 ) {
if ( callsinfo == NULL ) {
callsinfo = ( voip_calls_info_t * ) g_malloc0 ( sizeof ( voip_calls_info_t ) ) ;
callsinfo -> call_active_state = VOIP_ACTIVE ;
callsinfo -> call_state = VOIP_CALL_SETUP ;
callsinfo -> from_identity = g_strdup_printf ( "%x" , pi -> termid ) ;
callsinfo -> to_identity = g_strdup ( "UNKNOWN" ) ;
COPY_ADDRESS ( & ( callsinfo -> initial_speaker ) , & ( pinfo -> src ) ) ;
callsinfo -> selected = FALSE ;
callsinfo -> start_fd = pinfo -> fd ;
callsinfo -> start_rel_ts = pinfo -> rel_ts ;
callsinfo -> protocol = VOIP_UNISTIM ;
callsinfo -> prot_info = g_malloc ( sizeof ( unistim_info_t ) ) ;
tmp_unistim_info = ( unistim_info_t * ) callsinfo -> prot_info ;
tmp_unistim_info -> rudp_type = 0 ;
tmp_unistim_info -> payload_type = 0 ;
tmp_unistim_info -> sequence = pi -> sequence ;
tmp_unistim_info -> termid = pi -> termid ;
tmp_unistim_info -> key_val = - 1 ;
tmp_unistim_info -> key_state = - 1 ;
tmp_unistim_info -> hook_state = - 1 ;
tmp_unistim_info -> stream_connect = - 1 ;
tmp_unistim_info -> trans_connect = - 1 ;
tmp_unistim_info -> set_termid = - 1 ;
tmp_unistim_info -> string_data = NULL ;
tmp_unistim_info -> key_buffer = NULL ;
COPY_ADDRESS ( & ( tmp_unistim_info -> it_ip ) , & ( pi -> it_ip ) ) ;
COPY_ADDRESS ( & ( tmp_unistim_info -> ni_ip ) , & ( pi -> ni_ip ) ) ;
tmp_unistim_info -> it_port = pi -> it_port ;
callsinfo -> free_prot_info = g_free ;
callsinfo -> npackets = 0 ;
callsinfo -> call_num = tapinfo -> ncalls ++ ;
tapinfo -> callsinfo_list = g_list_prepend ( tapinfo -> callsinfo_list , callsinfo ) ;
}
else {
tmp_unistim_info = ( unistim_info_t * ) callsinfo -> prot_info ;
tmp_unistim_info -> sequence = pi -> sequence ;
}
callsinfo -> stop_fd = pinfo -> fd ;
callsinfo -> stop_rel_ts = pinfo -> rel_ts ;
++ ( callsinfo -> npackets ) ;
++ ( tapinfo -> npackets ) ;
if ( pi -> key_val >= 0 && pi -> key_val <= 11 ) {
if ( tmp_unistim_info -> key_buffer != NULL ) {
g_string_assign ( g_tmp , tmp_unistim_info -> key_buffer ) ;
if ( pi -> key_val == 10 ) {
tmp_unistim_info -> key_buffer = g_strdup_printf ( "%s*" , g_tmp -> str ) ;
}
else if ( pi -> key_val == 11 ) {
tmp_unistim_info -> key_buffer = g_strdup_printf ( "%s#" , g_tmp -> str ) ;
}
else {
tmp_unistim_info -> key_buffer = g_strdup_printf ( "%s%d" , g_tmp -> str , pi -> key_val ) ;
}
}
else {
if ( pi -> key_val == 10 ) {
tmp_unistim_info -> key_buffer = g_strdup ( "*" ) ;
}
else if ( pi -> key_val == 11 ) {
tmp_unistim_info -> key_buffer = g_strdup ( "#" ) ;
}
else {
tmp_unistim_info -> key_buffer = g_strdup_printf ( "%d" , pi -> key_val ) ;
}
}
if ( pi -> key_val == 10 ) {
comment = g_strdup_printf ( "Key Input Sent: * (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 11 ) {
comment = g_strdup_printf ( "Key Input Sent: # (%d)" , pi -> sequence ) ;
}
else {
comment = g_strdup_printf ( "Key Input Sent: %d (%d)" , pi -> key_val , pi -> sequence ) ;
}
}
else if ( pi -> key_val == 12 ) {
comment = g_strdup_printf ( "Key Input Sent: UP (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 13 ) {
comment = g_strdup_printf ( "Key Input Sent: DOWN (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 14 ) {
comment = g_strdup_printf ( "Key Input Sent: RIGHT (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 15 ) {
if ( pi -> key_buffer != NULL ) {
g_string_assign ( g_tmp , pi -> key_buffer ) ;
g_string_truncate ( g_tmp , g_tmp -> len - 1 ) ;
tmp_unistim_info -> key_buffer = g_strdup ( g_tmp -> str ) ;
}
comment = g_strdup_printf ( "Key Input Sent: LEFT (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 20 ) {
comment = g_strdup_printf ( "Key Input Sent: S0 (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 21 ) {
comment = g_strdup_printf ( "Key Input Sent: S1 (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 22 ) {
if ( pi -> key_buffer != NULL ) {
g_string_assign ( g_tmp , pi -> key_buffer ) ;
g_string_truncate ( g_tmp , g_tmp -> len - 1 ) ;
tmp_unistim_info -> key_buffer = g_strdup ( g_tmp -> str ) ;
}
comment = g_strdup_printf ( "Key Input Sent: S2 (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 28 ) {
comment = g_strdup_printf ( "Key Input Sent: Release (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 23 ) {
tmp_unistim_info -> key_buffer = g_strdup ( "\n" ) ;
comment = g_strdup_printf ( "Key Input Sent: S3 (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 27 ) {
comment = g_strdup_printf ( "Key Input Sent: Hold (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 29 ) {
comment = g_strdup_printf ( "Key Input Sent: Mute (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 30 ) {
comment = g_strdup_printf ( "Key Input Sent: Headset (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val == 31 ) {
comment = g_strdup_printf ( "Key Input Sent: Handsfree (%d)" , pi -> sequence ) ;
}
else if ( pi -> key_val >= 32 && pi -> key_val <= 56 ) {
comment = g_strdup_printf ( "Key Input Sent: Prog%d (%d)" , ( pi -> key_val & 31 ) , pi -> sequence ) ;
}
if ( pi -> key_val != - 1 ) {
frame_label = "KEY INPUT" ;
if ( comment == NULL ) comment = g_strdup_printf ( "Key Input Sent: UNKNOWN - %d (%d)" , pi -> key_val , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
g_free ( comment ) ;
}
if ( pi -> hook_state == 1 ) {
frame_label = "OFF HOOK" ;
comment = g_strdup_printf ( "Off Hook (%d)" , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
g_free ( comment ) ;
}
else if ( pi -> hook_state == 0 ) {
frame_label = "ON HOOK" ;
comment = g_strdup_printf ( "On Hook (%d)" , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
g_free ( comment ) ;
}
}
if ( pi -> stream_connect == 1 && callsinfo != NULL ) {
callsinfo -> start_fd = pinfo -> fd ;
callsinfo -> start_rel_ts = pinfo -> rel_ts ;
callsinfo -> stop_fd = pinfo -> fd ;
callsinfo -> stop_rel_ts = pinfo -> rel_ts ;
++ ( callsinfo -> npackets ) ;
++ ( tapinfo -> npackets ) ;
if ( tmp_unistim_info -> key_buffer != NULL ) {
callsinfo -> to_identity = g_strdup_printf ( "?? %s" , tmp_unistim_info -> key_buffer ) ;
}
tmp_unistim_info -> sequence = pi -> sequence ;
callsinfo -> call_active_state = VOIP_ACTIVE ;
callsinfo -> call_state = VOIP_IN_CALL ;
frame_label = "STREAM OPENED" ;
comment = g_strdup_printf ( "Stream Opened (%d)" , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
}
else if ( pi -> stream_connect == 1 && callsinfo == NULL ) {
callsinfo = ( voip_calls_info_t * ) g_malloc0 ( sizeof ( voip_calls_info_t ) ) ;
callsinfo -> call_active_state = VOIP_ACTIVE ;
callsinfo -> call_state = VOIP_CALL_SETUP ;
callsinfo -> from_identity = g_strdup ( "UNKNOWN" ) ;
callsinfo -> to_identity = g_strdup ( "UNKNOWN" ) ;
COPY_ADDRESS ( & ( callsinfo -> initial_speaker ) , & ( pinfo -> src ) ) ;
callsinfo -> selected = FALSE ;
callsinfo -> start_fd = pinfo -> fd ;
callsinfo -> start_rel_ts = pinfo -> rel_ts ;
callsinfo -> protocol = VOIP_UNISTIM ;
callsinfo -> prot_info = g_malloc ( sizeof ( unistim_info_t ) ) ;
tmp_unistim_info = ( unistim_info_t * ) callsinfo -> prot_info ;
tmp_unistim_info -> rudp_type = 0 ;
tmp_unistim_info -> payload_type = 0 ;
tmp_unistim_info -> sequence = pi -> sequence ;
tmp_unistim_info -> termid = 0 ;
tmp_unistim_info -> key_val = - 1 ;
tmp_unistim_info -> key_state = - 1 ;
tmp_unistim_info -> hook_state = - 1 ;
tmp_unistim_info -> stream_connect = - 1 ;
tmp_unistim_info -> trans_connect = - 1 ;
tmp_unistim_info -> set_termid = - 1 ;
tmp_unistim_info -> string_data = NULL ;
tmp_unistim_info -> key_buffer = NULL ;
COPY_ADDRESS ( & ( tmp_unistim_info -> it_ip ) , & ( pi -> it_ip ) ) ;
COPY_ADDRESS ( & ( tmp_unistim_info -> ni_ip ) , & ( pi -> ni_ip ) ) ;
tmp_unistim_info -> it_port = pi -> it_port ;
callsinfo -> free_prot_info = g_free ;
callsinfo -> npackets = 0 ;
callsinfo -> call_num = tapinfo -> ncalls ++ ;
tapinfo -> callsinfo_list = g_list_prepend ( tapinfo -> callsinfo_list , callsinfo ) ;
callsinfo -> stop_fd = pinfo -> fd ;
callsinfo -> stop_rel_ts = pinfo -> rel_ts ;
++ ( callsinfo -> npackets ) ;
++ ( tapinfo -> npackets ) ;
if ( tmp_unistim_info -> key_buffer != NULL ) {
callsinfo -> to_identity = g_strdup_printf ( "?? %s" , tmp_unistim_info -> key_buffer ) ;
}
tmp_unistim_info -> sequence = pi -> sequence ;
callsinfo -> call_active_state = VOIP_ACTIVE ;
callsinfo -> call_state = VOIP_IN_CALL ;
frame_label = "STREAM OPENED" ;
comment = g_strdup_printf ( "Stream Opened (%d)" , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
}
else if ( pi -> stream_connect == 0 && callsinfo != NULL ) {
callsinfo -> stop_fd = pinfo -> fd ;
callsinfo -> stop_rel_ts = pinfo -> rel_ts ;
tmp_unistim_info -> sequence = pi -> sequence ;
if ( callsinfo -> call_state == VOIP_IN_CALL ) {
callsinfo -> call_active_state = VOIP_INACTIVE ;
callsinfo -> call_state = VOIP_COMPLETED ;
}
else {
callsinfo -> call_state = VOIP_UNKNOWN ;
callsinfo -> call_active_state = VOIP_INACTIVE ;
}
frame_label = "STREAM CLOSED" ;
comment = g_strdup_printf ( "Stream Closed (%d)" , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
}
else comment = NULL ;
}
else if ( pi -> rudp_type == 1 && callsinfo != NULL ) {
if ( tmp_unistim_info -> sequence == pi -> sequence ) {
frame_label = "ACK" ;
comment = g_strdup_printf ( "ACK for sequence %d" , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
}
}
else if ( pi -> rudp_type == 0 && callsinfo != NULL ) {
frame_label = "NAK" ;
comment = g_strdup_printf ( "NAK for sequence %d" , pi -> sequence ) ;
add_to_graph ( tapinfo , pinfo , frame_label , comment , callsinfo -> call_num , & ( pinfo -> src ) , & ( pinfo -> dst ) , 1 ) ;
}
g_free ( comment ) ;
tapinfo -> redraw = TRUE ;
return 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void send_restrict_entry ( restrict_u * pres , int ipv6 , u_int idx ) {
const char addr_fmtu [ ] = "addr.%u" ;
const char mask_fmtu [ ] = "mask.%u" ;
const char hits_fmt [ ] = "hits.%u" ;
const char flags_fmt [ ] = "flags.%u" ;
char tag [ 32 ] ;
u_char sent [ RESLIST_FIELDS ] ;
int noisebits ;
u_int32 noise ;
u_int which ;
u_int remaining ;
sockaddr_u addr ;
sockaddr_u mask ;
const char * pch ;
char * buf ;
const char * match_str ;
const char * access_str ;
sockaddrs_from_restrict_u ( & addr , & mask , pres , ipv6 ) ;
remaining = COUNTOF ( sent ) ;
ZERO ( sent ) ;
noise = 0 ;
noisebits = 0 ;
while ( remaining > 0 ) {
if ( noisebits < 2 ) {
noise = rand ( ) ^ ( rand ( ) << 16 ) ;
noisebits = 31 ;
}
which = ( noise & 0x3 ) % COUNTOF ( sent ) ;
noise >>= 2 ;
noisebits -= 2 ;
while ( sent [ which ] ) which = ( which + 1 ) % COUNTOF ( sent ) ;
switch ( which ) {
case 0 : snprintf ( tag , sizeof ( tag ) , addr_fmtu , idx ) ;
pch = stoa ( & addr ) ;
ctl_putunqstr ( tag , pch , strlen ( pch ) ) ;
break ;
case 1 : snprintf ( tag , sizeof ( tag ) , mask_fmtu , idx ) ;
pch = stoa ( & mask ) ;
ctl_putunqstr ( tag , pch , strlen ( pch ) ) ;
break ;
case 2 : snprintf ( tag , sizeof ( tag ) , hits_fmt , idx ) ;
ctl_putuint ( tag , pres -> count ) ;
break ;
case 3 : snprintf ( tag , sizeof ( tag ) , flags_fmt , idx ) ;
match_str = res_match_flags ( pres -> mflags ) ;
access_str = res_access_flags ( pres -> flags ) ;
if ( '\0' == match_str [ 0 ] ) {
pch = access_str ;
}
else {
LIB_GETBUF ( buf ) ;
snprintf ( buf , LIB_BUFLENGTH , "%s %s" , match_str , access_str ) ;
pch = buf ;
}
ctl_putunqstr ( tag , pch , strlen ( pch ) ) ;
break ;
}
sent [ which ] = TRUE ;
remaining -- ;
}
send_random_tag_value ( ( int ) idx ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline uint64_t replicate64 ( uint64_t a ) {
# if HAVE_BIGENDIAN a &= 0xFF00FF00FF00FF00ULL ;
a |= a >> 8 ;
# else a &= 0x00FF00FF00FF00FFULL ;
a |= a << 8 ;
# endif return a ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void * init_tls ( void ) {
GL ( dl_tls_static_nelem ) = GL ( dl_tls_max_dtv_idx ) ;
if ( GL ( dl_initial_dtv ) != NULL ) return NULL ;
size_t nelem = GL ( dl_tls_max_dtv_idx ) + 1 + TLS_SLOTINFO_SURPLUS ;
GL ( dl_tls_dtv_slotinfo_list ) = ( struct dtv_slotinfo_list * ) calloc ( sizeof ( struct dtv_slotinfo_list ) + nelem * sizeof ( struct dtv_slotinfo ) , 1 ) ;
struct dtv_slotinfo * slotinfo = GL ( dl_tls_dtv_slotinfo_list ) -> slotinfo ;
GL ( dl_tls_dtv_slotinfo_list ) -> len = nelem ;
GL ( dl_tls_dtv_slotinfo_list ) -> next = NULL ;
assert ( GL ( dl_ns ) [ LM_ID_BASE + 1 ] . _ns_loaded == NULL ) ;
int i = 0 ;
for ( struct link_map * l = GL ( dl_ns ) [ LM_ID_BASE ] . _ns_loaded ;
l != NULL ;
l = l -> l_next ) if ( l -> l_tls_blocksize != 0 ) {
slotinfo [ i ] . map = l ;
++ i ;
}
assert ( i == GL ( dl_tls_max_dtv_idx ) ) ;
_dl_determine_tlsoffset ( ) ;
void * tcbp = _dl_allocate_tls_storage ( ) ;
if ( tcbp == NULL ) _dl_fatal_printf ( "\ cannot allocate TLS data structures for initial thread" ) ;
GL ( dl_initial_dtv ) = GET_DTV ( tcbp ) ;
const char * lossage = TLS_INIT_TP ( tcbp ) ;
if ( __glibc_unlikely ( lossage != NULL ) ) _dl_fatal_printf ( "cannot set up thread-local storage: %s\n" , lossage ) ;
tls_init_tp_called = true ;
return tcbp ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static PREDICTION_MODE read_intra_mode ( vp9_reader * r , const vp9_prob * p ) {
return ( PREDICTION_MODE ) vp9_read_tree ( r , vp9_intra_mode_tree , p ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int decode_blockcodes ( int code1 , int code2 , int levels , int * values ) {
return decode_blockcode ( code1 , levels , values ) | decode_blockcode ( code2 , levels , values + 4 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int xml_complete ( modsec_rec * msr , char * * error_msg ) {
if ( error_msg == NULL ) return - 1 ;
* error_msg = NULL ;
if ( msr -> xml -> parsing_ctx != NULL ) {
xmlParseChunk ( msr -> xml -> parsing_ctx , NULL , 0 , 1 ) ;
msr -> xml -> well_formed = msr -> xml -> parsing_ctx -> wellFormed ;
msr -> xml -> doc = msr -> xml -> parsing_ctx -> myDoc ;
xmlFreeParserCtxt ( msr -> xml -> parsing_ctx ) ;
msr -> xml -> parsing_ctx = NULL ;
msr_log ( msr , 4 , "XML: Parsing complete (well_formed %u)." , msr -> xml -> well_formed ) ;
if ( msr -> xml -> well_formed != 1 ) {
* error_msg = apr_psprintf ( msr -> mp , "XML: Failed parsing document." ) ;
return - 1 ;
}
}
return 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int synthesis ( AMRContext * p , float * lpc , float fixed_gain , const float * fixed_vector , float * samples , uint8_t overflow ) {
int i ;
float excitation [ AMR_SUBFRAME_SIZE ] ;
if ( overflow ) for ( i = 0 ;
i < AMR_SUBFRAME_SIZE ;
i ++ ) p -> pitch_vector [ i ] *= 0.25 ;
ff_weighted_vector_sumf ( excitation , p -> pitch_vector , fixed_vector , p -> pitch_gain [ 4 ] , fixed_gain , AMR_SUBFRAME_SIZE ) ;
if ( p -> pitch_gain [ 4 ] > 0.5 && ! overflow ) {
float energy = avpriv_scalarproduct_float_c ( excitation , excitation , AMR_SUBFRAME_SIZE ) ;
float pitch_factor = p -> pitch_gain [ 4 ] * ( p -> cur_frame_mode == MODE_12k2 ? 0.25 * FFMIN ( p -> pitch_gain [ 4 ] , 1.0 ) : 0.5 * FFMIN ( p -> pitch_gain [ 4 ] , SHARP_MAX ) ) ;
for ( i = 0 ;
i < AMR_SUBFRAME_SIZE ;
i ++ ) excitation [ i ] += pitch_factor * p -> pitch_vector [ i ] ;
ff_scale_vector_to_given_sum_of_squares ( excitation , excitation , energy , AMR_SUBFRAME_SIZE ) ;
}
ff_celp_lp_synthesis_filterf ( samples , lpc , excitation , AMR_SUBFRAME_SIZE , LP_FILTER_ORDER ) ;
for ( i = 0 ;
i < AMR_SUBFRAME_SIZE ;
i ++ ) if ( fabsf ( samples [ i ] ) > AMR_SAMPLE_BOUND ) {
return 1 ;
}
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_INTEGER_0_524287 ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_constrained_integer ( tvb , offset , actx , tree , hf_index , 0U , 524287U , NULL , FALSE ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int decode_rle ( GetBitContext * gb , uint8_t * pal_dst , int pal_stride , uint8_t * rgb_dst , int rgb_stride , uint32_t * pal , int keyframe , int kf_slipt , int slice , int w , int h ) {
uint8_t bits [ 270 ] = {
0 }
;
uint32_t codes [ 270 ] ;
VLC vlc ;
int current_length = 0 , read_codes = 0 , next_code = 0 , current_codes = 0 ;
int remaining_codes , surplus_codes , i ;
const int alphabet_size = 270 - keyframe ;
int last_symbol = 0 , repeat = 0 , prev_avail = 0 ;
if ( ! keyframe ) {
int x , y , clipw , cliph ;
x = get_bits ( gb , 12 ) ;
y = get_bits ( gb , 12 ) ;
clipw = get_bits ( gb , 12 ) + 1 ;
cliph = get_bits ( gb , 12 ) + 1 ;
if ( x + clipw > w || y + cliph > h ) return AVERROR_INVALIDDATA ;
pal_dst += pal_stride * y + x ;
rgb_dst += rgb_stride * y + x * 3 ;
w = clipw ;
h = cliph ;
if ( y ) prev_avail = 1 ;
}
else {
if ( slice > 0 ) {
pal_dst += pal_stride * kf_slipt ;
rgb_dst += rgb_stride * kf_slipt ;
prev_avail = 1 ;
h -= kf_slipt ;
}
else h = kf_slipt ;
}
do {
while ( current_codes -- ) {
int symbol = get_bits ( gb , 8 ) ;
if ( symbol >= 204 - keyframe ) symbol += 14 - keyframe ;
else if ( symbol > 189 ) symbol = get_bits1 ( gb ) + ( symbol << 1 ) - 190 ;
if ( bits [ symbol ] ) return AVERROR_INVALIDDATA ;
bits [ symbol ] = current_length ;
codes [ symbol ] = next_code ++ ;
read_codes ++ ;
}
current_length ++ ;
next_code <<= 1 ;
remaining_codes = ( 1 << current_length ) - next_code ;
current_codes = get_bits ( gb , av_ceil_log2 ( remaining_codes + 1 ) ) ;
if ( current_length > 22 || current_codes > remaining_codes ) return AVERROR_INVALIDDATA ;
}
while ( current_codes != remaining_codes ) ;
remaining_codes = alphabet_size - read_codes ;
while ( ( surplus_codes = ( 2 << current_length ) - ( next_code << 1 ) - remaining_codes ) < 0 ) {
current_length ++ ;
next_code <<= 1 ;
}
for ( i = 0 ;
i < alphabet_size ;
i ++ ) if ( ! bits [ i ] ) {
if ( surplus_codes -- == 0 ) {
current_length ++ ;
next_code <<= 1 ;
}
bits [ i ] = current_length ;
codes [ i ] = next_code ++ ;
}
if ( next_code != 1 << current_length ) return AVERROR_INVALIDDATA ;
if ( i = init_vlc ( & vlc , 9 , alphabet_size , bits , 1 , 1 , codes , 4 , 4 , 0 ) ) return i ;
do {
uint8_t * pp = pal_dst ;
uint8_t * rp = rgb_dst ;
do {
if ( repeat -- < 1 ) {
int b = get_vlc2 ( gb , vlc . table , 9 , 3 ) ;
if ( b < 256 ) last_symbol = b ;
else if ( b < 268 ) {
b -= 256 ;
if ( b == 11 ) b = get_bits ( gb , 4 ) + 10 ;
if ( ! b ) repeat = 0 ;
else repeat = get_bits ( gb , b ) ;
repeat += ( 1 << b ) - 1 ;
if ( last_symbol == - 2 ) {
int skip = FFMIN ( repeat , pal_dst + w - pp ) ;
repeat -= skip ;
pp += skip ;
rp += skip * 3 ;
}
}
else last_symbol = 267 - b ;
}
if ( last_symbol >= 0 ) {
* pp = last_symbol ;
AV_WB24 ( rp , pal [ last_symbol ] ) ;
}
else if ( last_symbol == - 1 && prev_avail ) {
* pp = * ( pp - pal_stride ) ;
memcpy ( rp , rp - rgb_stride , 3 ) ;
}
rp += 3 ;
}
while ( ++ pp < pal_dst + w ) ;
pal_dst += pal_stride ;
rgb_dst += rgb_stride ;
prev_avail = 1 ;
}
while ( -- h ) ;
ff_free_vlc ( & vlc ) ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int DecoderGetInputAttachments ( decoder_t * p_dec , input_attachment_t * * * ppp_attachment , int * pi_attachment ) {
input_thread_t * p_input = p_dec -> p_owner -> p_input ;
if ( unlikely ( p_input == NULL ) ) return VLC_ENOOBJ ;
return input_Control ( p_input , INPUT_GET_ATTACHMENTS , ppp_attachment , pi_attachment ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int x_catch_alloc ( Display * dpy , XErrorEvent * err ) {
if ( err -> error_code == BadAlloc ) x_error_handler . alloc_error = True ;
if ( x_error_handler . alloc_error ) return 0 ;
return x_error_handler . oldhandler ( dpy , err ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static guint16 compute_key_id ( tvbuff_t * tvb , int offset , int size , guint8 algo ) {
guint32 ac ;
guint8 c1 , c2 ;
DISSECTOR_ASSERT ( size >= 4 ) ;
switch ( algo ) {
case DNS_ALGO_RSAMD5 : return ( guint16 ) ( tvb_get_guint8 ( tvb , offset + size - 3 ) << 8 ) + tvb_get_guint8 ( tvb , offset + size - 2 ) ;
default : for ( ac = 0 ;
size > 1 ;
size -= 2 , offset += 2 ) {
c1 = tvb_get_guint8 ( tvb , offset ) ;
c2 = tvb_get_guint8 ( tvb , offset + 1 ) ;
ac += ( c1 << 8 ) + c2 ;
}
if ( size > 0 ) {
c1 = tvb_get_guint8 ( tvb , offset ) ;
ac += c1 << 8 ;
}
ac += ( ac >> 16 ) & 0xffff ;
return ( guint16 ) ( ac & 0xffff ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int spl_filesystem_file_read_line ( zval * this_ptr , spl_filesystem_object * intern , int silent TSRMLS_DC ) {
int ret = spl_filesystem_file_read_line_ex ( this_ptr , intern , silent TSRMLS_CC ) ;
while ( SPL_HAS_FLAG ( intern -> flags , SPL_FILE_OBJECT_SKIP_EMPTY ) && ret == SUCCESS && spl_filesystem_file_is_empty_line ( intern TSRMLS_CC ) ) {
spl_filesystem_file_free_line ( intern TSRMLS_CC ) ;
ret = spl_filesystem_file_read_line_ex ( this_ptr , intern , silent TSRMLS_CC ) ;
}
return ret ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
SPL_METHOD ( SplFileObject , fgetcsv ) {
spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ;
char delimiter = intern -> u . file . delimiter , enclosure = intern -> u . file . enclosure , escape = intern -> u . file . escape ;
char * delim = NULL , * enclo = NULL , * esc = NULL ;
int d_len = 0 , e_len = 0 , esc_len = 0 ;
if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "|sss" , & delim , & d_len , & enclo , & e_len , & esc , & esc_len ) == SUCCESS ) {
switch ( ZEND_NUM_ARGS ( ) ) {
case 3 : if ( esc_len != 1 ) {
php_error_docref ( NULL TSRMLS_CC , E_WARNING , "escape must be a character" ) ;
RETURN_FALSE ;
}
escape = esc [ 0 ] ;
case 2 : if ( e_len != 1 ) {
php_error_docref ( NULL TSRMLS_CC , E_WARNING , "enclosure must be a character" ) ;
RETURN_FALSE ;
}
enclosure = enclo [ 0 ] ;
case 1 : if ( d_len != 1 ) {
php_error_docref ( NULL TSRMLS_CC , E_WARNING , "delimiter must be a character" ) ;
RETURN_FALSE ;
}
delimiter = delim [ 0 ] ;
case 0 : break ;
}
spl_filesystem_file_read_csv ( intern , delimiter , enclosure , escape , return_value TSRMLS_CC ) ;
}
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
void mime_init ( ) {
static int init = 1 ;
if ( init ) {
init = 0 ;
hdrtoken_init ( ) ;
day_names_dfa = new DFA ;
day_names_dfa -> compile ( day_names , SIZEOF ( day_names ) , RE_CASE_INSENSITIVE ) ;
month_names_dfa = new DFA ;
month_names_dfa -> compile ( month_names , SIZEOF ( month_names ) , RE_CASE_INSENSITIVE ) ;
MIME_FIELD_ACCEPT = hdrtoken_string_to_wks ( "Accept" ) ;
MIME_FIELD_ACCEPT_CHARSET = hdrtoken_string_to_wks ( "Accept-Charset" ) ;
MIME_FIELD_ACCEPT_ENCODING = hdrtoken_string_to_wks ( "Accept-Encoding" ) ;
MIME_FIELD_ACCEPT_LANGUAGE = hdrtoken_string_to_wks ( "Accept-Language" ) ;
MIME_FIELD_ACCEPT_RANGES = hdrtoken_string_to_wks ( "Accept-Ranges" ) ;
MIME_FIELD_AGE = hdrtoken_string_to_wks ( "Age" ) ;
MIME_FIELD_ALLOW = hdrtoken_string_to_wks ( "Allow" ) ;
MIME_FIELD_APPROVED = hdrtoken_string_to_wks ( "Approved" ) ;
MIME_FIELD_AUTHORIZATION = hdrtoken_string_to_wks ( "Authorization" ) ;
MIME_FIELD_BYTES = hdrtoken_string_to_wks ( "Bytes" ) ;
MIME_FIELD_CACHE_CONTROL = hdrtoken_string_to_wks ( "Cache-Control" ) ;
MIME_FIELD_CLIENT_IP = hdrtoken_string_to_wks ( "Client-ip" ) ;
MIME_FIELD_CONNECTION = hdrtoken_string_to_wks ( "Connection" ) ;
MIME_FIELD_CONTENT_BASE = hdrtoken_string_to_wks ( "Content-Base" ) ;
MIME_FIELD_CONTENT_ENCODING = hdrtoken_string_to_wks ( "Content-Encoding" ) ;
MIME_FIELD_CONTENT_LANGUAGE = hdrtoken_string_to_wks ( "Content-Language" ) ;
MIME_FIELD_CONTENT_LENGTH = hdrtoken_string_to_wks ( "Content-Length" ) ;
MIME_FIELD_CONTENT_LOCATION = hdrtoken_string_to_wks ( "Content-Location" ) ;
MIME_FIELD_CONTENT_MD5 = hdrtoken_string_to_wks ( "Content-MD5" ) ;
MIME_FIELD_CONTENT_RANGE = hdrtoken_string_to_wks ( "Content-Range" ) ;
MIME_FIELD_CONTENT_TYPE = hdrtoken_string_to_wks ( "Content-Type" ) ;
MIME_FIELD_CONTROL = hdrtoken_string_to_wks ( "Control" ) ;
MIME_FIELD_COOKIE = hdrtoken_string_to_wks ( "Cookie" ) ;
MIME_FIELD_DATE = hdrtoken_string_to_wks ( "Date" ) ;
MIME_FIELD_DISTRIBUTION = hdrtoken_string_to_wks ( "Distribution" ) ;
MIME_FIELD_ETAG = hdrtoken_string_to_wks ( "Etag" ) ;
MIME_FIELD_EXPECT = hdrtoken_string_to_wks ( "Expect" ) ;
MIME_FIELD_EXPIRES = hdrtoken_string_to_wks ( "Expires" ) ;
MIME_FIELD_FOLLOWUP_TO = hdrtoken_string_to_wks ( "Followup-To" ) ;
MIME_FIELD_FROM = hdrtoken_string_to_wks ( "From" ) ;
MIME_FIELD_HOST = hdrtoken_string_to_wks ( "Host" ) ;
MIME_FIELD_IF_MATCH = hdrtoken_string_to_wks ( "If-Match" ) ;
MIME_FIELD_IF_MODIFIED_SINCE = hdrtoken_string_to_wks ( "If-Modified-Since" ) ;
MIME_FIELD_IF_NONE_MATCH = hdrtoken_string_to_wks ( "If-None-Match" ) ;
MIME_FIELD_IF_RANGE = hdrtoken_string_to_wks ( "If-Range" ) ;
MIME_FIELD_IF_UNMODIFIED_SINCE = hdrtoken_string_to_wks ( "If-Unmodified-Since" ) ;
MIME_FIELD_KEEP_ALIVE = hdrtoken_string_to_wks ( "Keep-Alive" ) ;
MIME_FIELD_KEYWORDS = hdrtoken_string_to_wks ( "Keywords" ) ;
MIME_FIELD_LAST_MODIFIED = hdrtoken_string_to_wks ( "Last-Modified" ) ;
MIME_FIELD_LINES = hdrtoken_string_to_wks ( "Lines" ) ;
MIME_FIELD_LOCATION = hdrtoken_string_to_wks ( "Location" ) ;
MIME_FIELD_MAX_FORWARDS = hdrtoken_string_to_wks ( "Max-Forwards" ) ;
MIME_FIELD_MESSAGE_ID = hdrtoken_string_to_wks ( "Message-ID" ) ;
MIME_FIELD_NEWSGROUPS = hdrtoken_string_to_wks ( "Newsgroups" ) ;
MIME_FIELD_ORGANIZATION = hdrtoken_string_to_wks ( "Organization" ) ;
MIME_FIELD_PATH = hdrtoken_string_to_wks ( "Path" ) ;
MIME_FIELD_PRAGMA = hdrtoken_string_to_wks ( "Pragma" ) ;
MIME_FIELD_PROXY_AUTHENTICATE = hdrtoken_string_to_wks ( "Proxy-Authenticate" ) ;
MIME_FIELD_PROXY_AUTHORIZATION = hdrtoken_string_to_wks ( "Proxy-Authorization" ) ;
MIME_FIELD_PROXY_CONNECTION = hdrtoken_string_to_wks ( "Proxy-Connection" ) ;
MIME_FIELD_PUBLIC = hdrtoken_string_to_wks ( "Public" ) ;
MIME_FIELD_RANGE = hdrtoken_string_to_wks ( "Range" ) ;
MIME_FIELD_REFERENCES = hdrtoken_string_to_wks ( "References" ) ;
MIME_FIELD_REFERER = hdrtoken_string_to_wks ( "Referer" ) ;
MIME_FIELD_REPLY_TO = hdrtoken_string_to_wks ( "Reply-To" ) ;
MIME_FIELD_RETRY_AFTER = hdrtoken_string_to_wks ( "Retry-After" ) ;
MIME_FIELD_SENDER = hdrtoken_string_to_wks ( "Sender" ) ;
MIME_FIELD_SERVER = hdrtoken_string_to_wks ( "Server" ) ;
MIME_FIELD_SET_COOKIE = hdrtoken_string_to_wks ( "Set-Cookie" ) ;
MIME_FIELD_STRICT_TRANSPORT_SECURITY = hdrtoken_string_to_wks ( "Strict-Transport-Security" ) ;
MIME_FIELD_SUBJECT = hdrtoken_string_to_wks ( "Subject" ) ;
MIME_FIELD_SUMMARY = hdrtoken_string_to_wks ( "Summary" ) ;
MIME_FIELD_TE = hdrtoken_string_to_wks ( "TE" ) ;
MIME_FIELD_TRANSFER_ENCODING = hdrtoken_string_to_wks ( "Transfer-Encoding" ) ;
MIME_FIELD_UPGRADE = hdrtoken_string_to_wks ( "Upgrade" ) ;
MIME_FIELD_USER_AGENT = hdrtoken_string_to_wks ( "User-Agent" ) ;
MIME_FIELD_VARY = hdrtoken_string_to_wks ( "Vary" ) ;
MIME_FIELD_VIA = hdrtoken_string_to_wks ( "Via" ) ;
MIME_FIELD_WARNING = hdrtoken_string_to_wks ( "Warning" ) ;
MIME_FIELD_WWW_AUTHENTICATE = hdrtoken_string_to_wks ( "Www-Authenticate" ) ;
MIME_FIELD_XREF = hdrtoken_string_to_wks ( "Xref" ) ;
MIME_FIELD_ATS_INTERNAL = hdrtoken_string_to_wks ( "@Ats-Internal" ) ;
MIME_FIELD_X_ID = hdrtoken_string_to_wks ( "X-ID" ) ;
MIME_FIELD_X_FORWARDED_FOR = hdrtoken_string_to_wks ( "X-Forwarded-For" ) ;
MIME_FIELD_SEC_WEBSOCKET_KEY = hdrtoken_string_to_wks ( "Sec-WebSocket-Key" ) ;
MIME_FIELD_SEC_WEBSOCKET_VERSION = hdrtoken_string_to_wks ( "Sec-WebSocket-Version" ) ;
MIME_FIELD_HTTP2_SETTINGS = hdrtoken_string_to_wks ( "HTTP2-Settings" ) ;
MIME_LEN_ACCEPT = hdrtoken_wks_to_length ( MIME_FIELD_ACCEPT ) ;
MIME_LEN_ACCEPT_CHARSET = hdrtoken_wks_to_length ( MIME_FIELD_ACCEPT_CHARSET ) ;
MIME_LEN_ACCEPT_ENCODING = hdrtoken_wks_to_length ( MIME_FIELD_ACCEPT_ENCODING ) ;
MIME_LEN_ACCEPT_LANGUAGE = hdrtoken_wks_to_length ( MIME_FIELD_ACCEPT_LANGUAGE ) ;
MIME_LEN_ACCEPT_RANGES = hdrtoken_wks_to_length ( MIME_FIELD_ACCEPT_RANGES ) ;
MIME_LEN_AGE = hdrtoken_wks_to_length ( MIME_FIELD_AGE ) ;
MIME_LEN_ALLOW = hdrtoken_wks_to_length ( MIME_FIELD_ALLOW ) ;
MIME_LEN_APPROVED = hdrtoken_wks_to_length ( MIME_FIELD_APPROVED ) ;
MIME_LEN_AUTHORIZATION = hdrtoken_wks_to_length ( MIME_FIELD_AUTHORIZATION ) ;
MIME_LEN_BYTES = hdrtoken_wks_to_length ( MIME_FIELD_BYTES ) ;
MIME_LEN_CACHE_CONTROL = hdrtoken_wks_to_length ( MIME_FIELD_CACHE_CONTROL ) ;
MIME_LEN_CLIENT_IP = hdrtoken_wks_to_length ( MIME_FIELD_CLIENT_IP ) ;
MIME_LEN_CONNECTION = hdrtoken_wks_to_length ( MIME_FIELD_CONNECTION ) ;
MIME_LEN_CONTENT_BASE = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_BASE ) ;
MIME_LEN_CONTENT_ENCODING = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_ENCODING ) ;
MIME_LEN_CONTENT_LANGUAGE = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_LANGUAGE ) ;
MIME_LEN_CONTENT_LENGTH = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_LENGTH ) ;
MIME_LEN_CONTENT_LOCATION = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_LOCATION ) ;
MIME_LEN_CONTENT_MD5 = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_MD5 ) ;
MIME_LEN_CONTENT_RANGE = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_RANGE ) ;
MIME_LEN_CONTENT_TYPE = hdrtoken_wks_to_length ( MIME_FIELD_CONTENT_TYPE ) ;
MIME_LEN_CONTROL = hdrtoken_wks_to_length ( MIME_FIELD_CONTROL ) ;
MIME_LEN_COOKIE = hdrtoken_wks_to_length ( MIME_FIELD_COOKIE ) ;
MIME_LEN_DATE = hdrtoken_wks_to_length ( MIME_FIELD_DATE ) ;
MIME_LEN_DISTRIBUTION = hdrtoken_wks_to_length ( MIME_FIELD_DISTRIBUTION ) ;
MIME_LEN_ETAG = hdrtoken_wks_to_length ( MIME_FIELD_ETAG ) ;
MIME_LEN_EXPECT = hdrtoken_wks_to_length ( MIME_FIELD_EXPECT ) ;
MIME_LEN_EXPIRES = hdrtoken_wks_to_length ( MIME_FIELD_EXPIRES ) ;
MIME_LEN_FOLLOWUP_TO = hdrtoken_wks_to_length ( MIME_FIELD_FOLLOWUP_TO ) ;
MIME_LEN_FROM = hdrtoken_wks_to_length ( MIME_FIELD_FROM ) ;
MIME_LEN_HOST = hdrtoken_wks_to_length ( MIME_FIELD_HOST ) ;
MIME_LEN_IF_MATCH = hdrtoken_wks_to_length ( MIME_FIELD_IF_MATCH ) ;
MIME_LEN_IF_MODIFIED_SINCE = hdrtoken_wks_to_length ( MIME_FIELD_IF_MODIFIED_SINCE ) ;
MIME_LEN_IF_NONE_MATCH = hdrtoken_wks_to_length ( MIME_FIELD_IF_NONE_MATCH ) ;
MIME_LEN_IF_RANGE = hdrtoken_wks_to_length ( MIME_FIELD_IF_RANGE ) ;
MIME_LEN_IF_UNMODIFIED_SINCE = hdrtoken_wks_to_length ( MIME_FIELD_IF_UNMODIFIED_SINCE ) ;
MIME_LEN_KEEP_ALIVE = hdrtoken_wks_to_length ( MIME_FIELD_KEEP_ALIVE ) ;
MIME_LEN_KEYWORDS = hdrtoken_wks_to_length ( MIME_FIELD_KEYWORDS ) ;
MIME_LEN_LAST_MODIFIED = hdrtoken_wks_to_length ( MIME_FIELD_LAST_MODIFIED ) ;
MIME_LEN_LINES = hdrtoken_wks_to_length ( MIME_FIELD_LINES ) ;
MIME_LEN_LOCATION = hdrtoken_wks_to_length ( MIME_FIELD_LOCATION ) ;
MIME_LEN_MAX_FORWARDS = hdrtoken_wks_to_length ( MIME_FIELD_MAX_FORWARDS ) ;
MIME_LEN_MESSAGE_ID = hdrtoken_wks_to_length ( MIME_FIELD_MESSAGE_ID ) ;
MIME_LEN_NEWSGROUPS = hdrtoken_wks_to_length ( MIME_FIELD_NEWSGROUPS ) ;
MIME_LEN_ORGANIZATION = hdrtoken_wks_to_length ( MIME_FIELD_ORGANIZATION ) ;
MIME_LEN_PATH = hdrtoken_wks_to_length ( MIME_FIELD_PATH ) ;
MIME_LEN_PRAGMA = hdrtoken_wks_to_length ( MIME_FIELD_PRAGMA ) ;
MIME_LEN_PROXY_AUTHENTICATE = hdrtoken_wks_to_length ( MIME_FIELD_PROXY_AUTHENTICATE ) ;
MIME_LEN_PROXY_AUTHORIZATION = hdrtoken_wks_to_length ( MIME_FIELD_PROXY_AUTHORIZATION ) ;
MIME_LEN_PROXY_CONNECTION = hdrtoken_wks_to_length ( MIME_FIELD_PROXY_CONNECTION ) ;
MIME_LEN_PUBLIC = hdrtoken_wks_to_length ( MIME_FIELD_PUBLIC ) ;
MIME_LEN_RANGE = hdrtoken_wks_to_length ( MIME_FIELD_RANGE ) ;
MIME_LEN_REFERENCES = hdrtoken_wks_to_length ( MIME_FIELD_REFERENCES ) ;
MIME_LEN_REFERER = hdrtoken_wks_to_length ( MIME_FIELD_REFERER ) ;
MIME_LEN_REPLY_TO = hdrtoken_wks_to_length ( MIME_FIELD_REPLY_TO ) ;
MIME_LEN_RETRY_AFTER = hdrtoken_wks_to_length ( MIME_FIELD_RETRY_AFTER ) ;
MIME_LEN_SENDER = hdrtoken_wks_to_length ( MIME_FIELD_SENDER ) ;
MIME_LEN_SERVER = hdrtoken_wks_to_length ( MIME_FIELD_SERVER ) ;
MIME_LEN_SET_COOKIE = hdrtoken_wks_to_length ( MIME_FIELD_SET_COOKIE ) ;
MIME_LEN_STRICT_TRANSPORT_SECURITY = hdrtoken_wks_to_length ( MIME_FIELD_STRICT_TRANSPORT_SECURITY ) ;
MIME_LEN_SUBJECT = hdrtoken_wks_to_length ( MIME_FIELD_SUBJECT ) ;
MIME_LEN_SUMMARY = hdrtoken_wks_to_length ( MIME_FIELD_SUMMARY ) ;
MIME_LEN_TE = hdrtoken_wks_to_length ( MIME_FIELD_TE ) ;
MIME_LEN_TRANSFER_ENCODING = hdrtoken_wks_to_length ( MIME_FIELD_TRANSFER_ENCODING ) ;
MIME_LEN_UPGRADE = hdrtoken_wks_to_length ( MIME_FIELD_UPGRADE ) ;
MIME_LEN_USER_AGENT = hdrtoken_wks_to_length ( MIME_FIELD_USER_AGENT ) ;
MIME_LEN_VARY = hdrtoken_wks_to_length ( MIME_FIELD_VARY ) ;
MIME_LEN_VIA = hdrtoken_wks_to_length ( MIME_FIELD_VIA ) ;
MIME_LEN_WARNING = hdrtoken_wks_to_length ( MIME_FIELD_WARNING ) ;
MIME_LEN_WWW_AUTHENTICATE = hdrtoken_wks_to_length ( MIME_FIELD_WWW_AUTHENTICATE ) ;
MIME_LEN_XREF = hdrtoken_wks_to_length ( MIME_FIELD_XREF ) ;
MIME_LEN_ATS_INTERNAL = hdrtoken_wks_to_length ( MIME_FIELD_ATS_INTERNAL ) ;
MIME_LEN_X_ID = hdrtoken_wks_to_length ( MIME_FIELD_X_ID ) ;
MIME_LEN_X_FORWARDED_FOR = hdrtoken_wks_to_length ( MIME_FIELD_X_FORWARDED_FOR ) ;
MIME_LEN_SEC_WEBSOCKET_KEY = hdrtoken_wks_to_length ( MIME_FIELD_SEC_WEBSOCKET_KEY ) ;
MIME_LEN_SEC_WEBSOCKET_VERSION = hdrtoken_wks_to_length ( MIME_FIELD_SEC_WEBSOCKET_VERSION ) ;
MIME_LEN_HTTP2_SETTINGS = hdrtoken_wks_to_length ( MIME_FIELD_HTTP2_SETTINGS ) ;
MIME_WKSIDX_ACCEPT = hdrtoken_wks_to_index ( MIME_FIELD_ACCEPT ) ;
MIME_WKSIDX_ACCEPT_CHARSET = hdrtoken_wks_to_index ( MIME_FIELD_ACCEPT_CHARSET ) ;
MIME_WKSIDX_ACCEPT_ENCODING = hdrtoken_wks_to_index ( MIME_FIELD_ACCEPT_ENCODING ) ;
MIME_WKSIDX_ACCEPT_LANGUAGE = hdrtoken_wks_to_index ( MIME_FIELD_ACCEPT_LANGUAGE ) ;
MIME_WKSIDX_ACCEPT_RANGES = hdrtoken_wks_to_index ( MIME_FIELD_ACCEPT_RANGES ) ;
MIME_WKSIDX_AGE = hdrtoken_wks_to_index ( MIME_FIELD_AGE ) ;
MIME_WKSIDX_ALLOW = hdrtoken_wks_to_index ( MIME_FIELD_ALLOW ) ;
MIME_WKSIDX_APPROVED = hdrtoken_wks_to_index ( MIME_FIELD_APPROVED ) ;
MIME_WKSIDX_AUTHORIZATION = hdrtoken_wks_to_index ( MIME_FIELD_AUTHORIZATION ) ;
MIME_WKSIDX_BYTES = hdrtoken_wks_to_index ( MIME_FIELD_BYTES ) ;
MIME_WKSIDX_CACHE_CONTROL = hdrtoken_wks_to_index ( MIME_FIELD_CACHE_CONTROL ) ;
MIME_WKSIDX_CLIENT_IP = hdrtoken_wks_to_index ( MIME_FIELD_CLIENT_IP ) ;
MIME_WKSIDX_CONNECTION = hdrtoken_wks_to_index ( MIME_FIELD_CONNECTION ) ;
MIME_WKSIDX_CONTENT_BASE = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_BASE ) ;
MIME_WKSIDX_CONTENT_ENCODING = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_ENCODING ) ;
MIME_WKSIDX_CONTENT_LANGUAGE = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_LANGUAGE ) ;
MIME_WKSIDX_CONTENT_LENGTH = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_LENGTH ) ;
MIME_WKSIDX_CONTENT_LOCATION = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_LOCATION ) ;
MIME_WKSIDX_CONTENT_MD5 = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_MD5 ) ;
MIME_WKSIDX_CONTENT_RANGE = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_RANGE ) ;
MIME_WKSIDX_CONTENT_TYPE = hdrtoken_wks_to_index ( MIME_FIELD_CONTENT_TYPE ) ;
MIME_WKSIDX_CONTROL = hdrtoken_wks_to_index ( MIME_FIELD_CONTROL ) ;
MIME_WKSIDX_COOKIE = hdrtoken_wks_to_index ( MIME_FIELD_COOKIE ) ;
MIME_WKSIDX_DATE = hdrtoken_wks_to_index ( MIME_FIELD_DATE ) ;
MIME_WKSIDX_DISTRIBUTION = hdrtoken_wks_to_index ( MIME_FIELD_DISTRIBUTION ) ;
MIME_WKSIDX_ETAG = hdrtoken_wks_to_index ( MIME_FIELD_ETAG ) ;
MIME_WKSIDX_EXPECT = hdrtoken_wks_to_index ( MIME_FIELD_EXPECT ) ;
MIME_WKSIDX_EXPIRES = hdrtoken_wks_to_index ( MIME_FIELD_EXPIRES ) ;
MIME_WKSIDX_FOLLOWUP_TO = hdrtoken_wks_to_index ( MIME_FIELD_FOLLOWUP_TO ) ;
MIME_WKSIDX_FROM = hdrtoken_wks_to_index ( MIME_FIELD_FROM ) ;
MIME_WKSIDX_HOST = hdrtoken_wks_to_index ( MIME_FIELD_HOST ) ;
MIME_WKSIDX_IF_MATCH = hdrtoken_wks_to_index ( MIME_FIELD_IF_MATCH ) ;
MIME_WKSIDX_IF_MODIFIED_SINCE = hdrtoken_wks_to_index ( MIME_FIELD_IF_MODIFIED_SINCE ) ;
MIME_WKSIDX_IF_NONE_MATCH = hdrtoken_wks_to_index ( MIME_FIELD_IF_NONE_MATCH ) ;
MIME_WKSIDX_IF_RANGE = hdrtoken_wks_to_index ( MIME_FIELD_IF_RANGE ) ;
MIME_WKSIDX_IF_UNMODIFIED_SINCE = hdrtoken_wks_to_index ( MIME_FIELD_IF_UNMODIFIED_SINCE ) ;
MIME_WKSIDX_KEEP_ALIVE = hdrtoken_wks_to_index ( MIME_FIELD_KEEP_ALIVE ) ;
MIME_WKSIDX_KEYWORDS = hdrtoken_wks_to_index ( MIME_FIELD_KEYWORDS ) ;
MIME_WKSIDX_LAST_MODIFIED = hdrtoken_wks_to_index ( MIME_FIELD_LAST_MODIFIED ) ;
MIME_WKSIDX_LINES = hdrtoken_wks_to_index ( MIME_FIELD_LINES ) ;
MIME_WKSIDX_LOCATION = hdrtoken_wks_to_index ( MIME_FIELD_LOCATION ) ;
MIME_WKSIDX_MAX_FORWARDS = hdrtoken_wks_to_index ( MIME_FIELD_MAX_FORWARDS ) ;
MIME_WKSIDX_MESSAGE_ID = hdrtoken_wks_to_index ( MIME_FIELD_MESSAGE_ID ) ;
MIME_WKSIDX_NEWSGROUPS = hdrtoken_wks_to_index ( MIME_FIELD_NEWSGROUPS ) ;
MIME_WKSIDX_ORGANIZATION = hdrtoken_wks_to_index ( MIME_FIELD_ORGANIZATION ) ;
MIME_WKSIDX_PATH = hdrtoken_wks_to_index ( MIME_FIELD_PATH ) ;
MIME_WKSIDX_PRAGMA = hdrtoken_wks_to_index ( MIME_FIELD_PRAGMA ) ;
MIME_WKSIDX_PROXY_AUTHENTICATE = hdrtoken_wks_to_index ( MIME_FIELD_PROXY_AUTHENTICATE ) ;
MIME_WKSIDX_PROXY_AUTHORIZATION = hdrtoken_wks_to_index ( MIME_FIELD_PROXY_AUTHORIZATION ) ;
MIME_WKSIDX_PROXY_CONNECTION = hdrtoken_wks_to_index ( MIME_FIELD_PROXY_CONNECTION ) ;
MIME_WKSIDX_PUBLIC = hdrtoken_wks_to_index ( MIME_FIELD_PUBLIC ) ;
MIME_WKSIDX_RANGE = hdrtoken_wks_to_index ( MIME_FIELD_RANGE ) ;
MIME_WKSIDX_REFERENCES = hdrtoken_wks_to_index ( MIME_FIELD_REFERENCES ) ;
MIME_WKSIDX_REFERER = hdrtoken_wks_to_index ( MIME_FIELD_REFERER ) ;
MIME_WKSIDX_REPLY_TO = hdrtoken_wks_to_index ( MIME_FIELD_REPLY_TO ) ;
MIME_WKSIDX_RETRY_AFTER = hdrtoken_wks_to_index ( MIME_FIELD_RETRY_AFTER ) ;
MIME_WKSIDX_SENDER = hdrtoken_wks_to_index ( MIME_FIELD_SENDER ) ;
MIME_WKSIDX_SERVER = hdrtoken_wks_to_index ( MIME_FIELD_SERVER ) ;
MIME_WKSIDX_SET_COOKIE = hdrtoken_wks_to_index ( MIME_FIELD_SET_COOKIE ) ;
MIME_WKSIDX_STRICT_TRANSPORT_SECURITY = hdrtoken_wks_to_index ( MIME_FIELD_STRICT_TRANSPORT_SECURITY ) ;
MIME_WKSIDX_SUBJECT = hdrtoken_wks_to_index ( MIME_FIELD_SUBJECT ) ;
MIME_WKSIDX_SUMMARY = hdrtoken_wks_to_index ( MIME_FIELD_SUMMARY ) ;
MIME_WKSIDX_TE = hdrtoken_wks_to_index ( MIME_FIELD_TE ) ;
MIME_WKSIDX_TRANSFER_ENCODING = hdrtoken_wks_to_index ( MIME_FIELD_TRANSFER_ENCODING ) ;
MIME_WKSIDX_UPGRADE = hdrtoken_wks_to_index ( MIME_FIELD_UPGRADE ) ;
MIME_WKSIDX_USER_AGENT = hdrtoken_wks_to_index ( MIME_FIELD_USER_AGENT ) ;
MIME_WKSIDX_VARY = hdrtoken_wks_to_index ( MIME_FIELD_VARY ) ;
MIME_WKSIDX_VIA = hdrtoken_wks_to_index ( MIME_FIELD_VIA ) ;
MIME_WKSIDX_WARNING = hdrtoken_wks_to_index ( MIME_FIELD_WARNING ) ;
MIME_WKSIDX_WWW_AUTHENTICATE = hdrtoken_wks_to_index ( MIME_FIELD_WWW_AUTHENTICATE ) ;
MIME_WKSIDX_XREF = hdrtoken_wks_to_index ( MIME_FIELD_XREF ) ;
MIME_WKSIDX_X_ID = hdrtoken_wks_to_index ( MIME_FIELD_X_ID ) ;
MIME_WKSIDX_X_FORWARDED_FOR = hdrtoken_wks_to_index ( MIME_FIELD_X_FORWARDED_FOR ) ;
MIME_WKSIDX_SEC_WEBSOCKET_KEY = hdrtoken_wks_to_index ( MIME_FIELD_SEC_WEBSOCKET_KEY ) ;
MIME_WKSIDX_SEC_WEBSOCKET_VERSION = hdrtoken_wks_to_index ( MIME_FIELD_SEC_WEBSOCKET_VERSION ) ;
MIME_WKSIDX_HTTP2_SETTINGS = hdrtoken_wks_to_index ( MIME_FIELD_HTTP2_SETTINGS ) ;
MIME_VALUE_BYTES = hdrtoken_string_to_wks ( "bytes" ) ;
MIME_VALUE_CHUNKED = hdrtoken_string_to_wks ( "chunked" ) ;
MIME_VALUE_CLOSE = hdrtoken_string_to_wks ( "close" ) ;
MIME_VALUE_COMPRESS = hdrtoken_string_to_wks ( "compress" ) ;
MIME_VALUE_DEFLATE = hdrtoken_string_to_wks ( "deflate" ) ;
MIME_VALUE_GZIP = hdrtoken_string_to_wks ( "gzip" ) ;
MIME_VALUE_IDENTITY = hdrtoken_string_to_wks ( "identity" ) ;
MIME_VALUE_KEEP_ALIVE = hdrtoken_string_to_wks ( "keep-alive" ) ;
MIME_VALUE_MAX_AGE = hdrtoken_string_to_wks ( "max-age" ) ;
MIME_VALUE_MAX_STALE = hdrtoken_string_to_wks ( "max-stale" ) ;
MIME_VALUE_MIN_FRESH = hdrtoken_string_to_wks ( "min-fresh" ) ;
MIME_VALUE_MUST_REVALIDATE = hdrtoken_string_to_wks ( "must-revalidate" ) ;
MIME_VALUE_NONE = hdrtoken_string_to_wks ( "none" ) ;
MIME_VALUE_NO_CACHE = hdrtoken_string_to_wks ( "no-cache" ) ;
MIME_VALUE_NO_STORE = hdrtoken_string_to_wks ( "no-store" ) ;
MIME_VALUE_NO_TRANSFORM = hdrtoken_string_to_wks ( "no-transform" ) ;
MIME_VALUE_ONLY_IF_CACHED = hdrtoken_string_to_wks ( "only-if-cached" ) ;
MIME_VALUE_PRIVATE = hdrtoken_string_to_wks ( "private" ) ;
MIME_VALUE_PROXY_REVALIDATE = hdrtoken_string_to_wks ( "proxy-revalidate" ) ;
MIME_VALUE_PUBLIC = hdrtoken_string_to_wks ( "public" ) ;
MIME_VALUE_S_MAXAGE = hdrtoken_string_to_wks ( "s-maxage" ) ;
MIME_VALUE_NEED_REVALIDATE_ONCE = hdrtoken_string_to_wks ( "need-revalidate-once" ) ;
MIME_VALUE_WEBSOCKET = hdrtoken_string_to_wks ( "websocket" ) ;
MIME_VALUE_H2C = hdrtoken_string_to_wks ( MIME_UPGRADE_H2C_TOKEN ) ;
mime_init_date_format_table ( ) ;
mime_init_cache_control_cooking_masks ( ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int dissect_ber_real ( gboolean implicit_tag , asn1_ctx_t * actx , proto_tree * tree , tvbuff_t * tvb , int offset , gint hf_id _U_ , double * value ) {
gint8 ber_class ;
gboolean pc ;
gint32 tag ;
guint32 val_length = 0 , len_remain , end_offset ;
double val = 0 ;
proto_item * cause ;
if ( ! implicit_tag ) {
offset = dissect_ber_identifier ( actx -> pinfo , tree , tvb , offset , & ber_class , & pc , & tag ) ;
offset = dissect_ber_length ( actx -> pinfo , tree , tvb , offset , & val_length , NULL ) ;
end_offset = offset + val_length ;
}
else {
get_last_ber_identifier ( & ber_class , & pc , & tag ) ;
get_last_ber_length ( & val_length , NULL ) ;
end_offset = offset + val_length ;
len_remain = ( guint32 ) tvb_reported_length_remaining ( tvb , offset ) ;
if ( len_remain < val_length ) {
cause = proto_tree_add_string_format_value ( tree , hf_ber_error , tvb , offset , val_length , "illegal_length" , "length:%u longer than tvb_reported_length_remaining:%d" , val_length , len_remain ) ;
expert_add_info ( actx -> pinfo , cause , & ei_ber_error_length ) ;
return end_offset ;
}
}
if ( pc ) {
cause = proto_tree_add_string_format_value ( tree , hf_ber_error , tvb , offset - 2 , 1 , "wrong_tag" , "REAL class must be encoded as primitive" ) ;
expert_add_info ( actx -> pinfo , cause , & ei_ber_error_length ) ;
}
val = asn1_get_real ( tvb_get_ptr ( tvb , offset , val_length ) , val_length ) ;
actx -> created_item = proto_tree_add_double ( tree , hf_id , tvb , end_offset - val_length , val_length , val ) ;
if ( value ) * value = val ;
return end_offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int imc_decode_frame ( AVCodecContext * avctx , void * data , int * got_frame_ptr , AVPacket * avpkt ) {
AVFrame * frame = data ;
const uint8_t * buf = avpkt -> data ;
int buf_size = avpkt -> size ;
int ret , i ;
IMCContext * q = avctx -> priv_data ;
LOCAL_ALIGNED_16 ( uint16_t , buf16 , [ IMC_BLOCK_SIZE / 2 ] ) ;
if ( buf_size < IMC_BLOCK_SIZE * avctx -> channels ) {
av_log ( avctx , AV_LOG_ERROR , "frame too small!\n" ) ;
return AVERROR_INVALIDDATA ;
}
frame -> nb_samples = COEFFS ;
if ( ( ret = ff_get_buffer ( avctx , frame ) ) < 0 ) {
av_log ( avctx , AV_LOG_ERROR , "get_buffer() failed\n" ) ;
return ret ;
}
for ( i = 0 ;
i < avctx -> channels ;
i ++ ) {
q -> out_samples = ( float * ) frame -> extended_data [ i ] ;
q -> dsp . bswap16_buf ( buf16 , ( const uint16_t * ) buf , IMC_BLOCK_SIZE / 2 ) ;
init_get_bits ( & q -> gb , ( const uint8_t * ) buf16 , IMC_BLOCK_SIZE * 8 ) ;
buf += IMC_BLOCK_SIZE ;
if ( ( ret = imc_decode_block ( avctx , q , i ) ) < 0 ) return ret ;
}
if ( avctx -> channels == 2 ) {
q -> fdsp . butterflies_float ( ( float * ) frame -> extended_data [ 0 ] , ( float * ) frame -> extended_data [ 1 ] , COEFFS ) ;
}
* got_frame_ptr = 1 ;
return IMC_BLOCK_SIZE * avctx -> channels ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
void ttfFont__destroy ( ttfFont * self , gs_font_dir * dir ) {
gs_memory_t * mem = dir -> memory -> stable_memory ;
ttfFont__finit ( self ) ;
gs_free_object ( mem , self , "ttfFont__destroy" ) ;
ttfInterpreter__release ( & dir -> tti ) ;
gx_san__release ( & dir -> san ) ;
if ( dir -> tti == NULL && dir -> ttm != NULL ) {
gs_free_object ( mem , dir -> ttm , "ttfFont__destroy(gx_ttfMemory)" ) ;
dir -> ttm = NULL ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pxa2xx_i2s_write ( void * opaque , hwaddr addr , uint64_t value , unsigned size ) {
PXA2xxI2SState * s = ( PXA2xxI2SState * ) opaque ;
uint32_t * sample ;
switch ( addr ) {
case SACR0 : if ( value & ( 1 << 3 ) ) pxa2xx_i2s_reset ( s ) ;
s -> control [ 0 ] = value & 0xff3d ;
if ( ! s -> enable && ( value & 1 ) && s -> tx_len ) {
for ( sample = s -> fifo ;
s -> fifo_len > 0 ;
s -> fifo_len -- , sample ++ ) s -> codec_out ( s -> opaque , * sample ) ;
s -> status &= ~ ( 1 << 7 ) ;
}
if ( value & ( 1 << 4 ) ) printf ( "%s: Attempt to use special function\n" , __FUNCTION__ ) ;
s -> enable = ( value & 9 ) == 1 ;
pxa2xx_i2s_update ( s ) ;
break ;
case SACR1 : s -> control [ 1 ] = value & 0x0039 ;
if ( value & ( 1 << 5 ) ) printf ( "%s: Attempt to use loopback function\n" , __FUNCTION__ ) ;
if ( value & ( 1 << 4 ) ) s -> fifo_len = 0 ;
pxa2xx_i2s_update ( s ) ;
break ;
case SAIMR : s -> mask = value & 0x0078 ;
pxa2xx_i2s_update ( s ) ;
break ;
case SAICR : s -> status &= ~ ( value & ( 3 << 5 ) ) ;
pxa2xx_i2s_update ( s ) ;
break ;
case SADIV : s -> clk = value & 0x007f ;
break ;
case SADR : if ( s -> tx_len && s -> enable ) {
s -> tx_len -- ;
pxa2xx_i2s_update ( s ) ;
s -> codec_out ( s -> opaque , value ) ;
}
else if ( s -> fifo_len < 16 ) {
s -> fifo [ s -> fifo_len ++ ] = value ;
pxa2xx_i2s_update ( s ) ;
}
break ;
default : printf ( "%s: Bad register " REG_FMT "\n" , __FUNCTION__ , addr ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void free_sip_info ( gpointer p ) {
sip_calls_info_t * si = ( sip_calls_info_t * ) p ;
g_free ( si -> call_identifier ) ;
g_free ( si ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h225_H323Caps ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_H323Caps , H323Caps_sequence ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline uint32_t e1000e_tx_wb_interrupt_cause ( E1000ECore * core , int queue_idx ) {
if ( ! msix_enabled ( core -> owner ) ) {
return E1000_ICR_TXDW ;
}
return ( queue_idx == 0 ) ? E1000_ICR_TXQ0 : E1000_ICR_TXQ1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static decNumber * decDecap ( decNumber * dn , Int drop ) {
Unit * msu ;
Int cut ;
if ( drop >= dn -> digits ) {
# if DECCHECK if ( drop > dn -> digits ) printf ( "decDecap called with drop>digits [%ld>%ld]\n" , ( LI ) drop , ( LI ) dn -> digits ) ;
# endif dn -> lsu [ 0 ] = 0 ;
dn -> digits = 1 ;
return dn ;
}
msu = dn -> lsu + D2U ( dn -> digits - drop ) - 1 ;
cut = MSUDIGITS ( dn -> digits - drop ) ;
if ( cut != DECDPUN ) * msu %= powers [ cut ] ;
dn -> digits = decGetDigits ( dn -> lsu , msu - dn -> lsu + 1 ) ;
return dn ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline gboolean is_sysex_code ( guint8 code ) {
return ( code == 0x04 || code == 0x05 || code == 0x06 || code == 0x07 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
ATF_TC_HEAD ( option_refcnt , tc ) {
atf_tc_set_md_var ( tc , "descr" , "Verify option reference count does not overflow." ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void rtp_dyn_payloads_init ( void ) {
if ( rtp_dyn_payloads == NULL ) {
rtp_dyn_payloads = g_hash_table_new ( NULL , NULL ) ;
wmem_register_callback ( wmem_file_scope ( ) , wmem_rtp_dyn_payload_destroy_cb , NULL ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dissect_rsvp_lsp_attributes ( proto_tree * ti , packet_info * pinfo , proto_tree * rsvp_object_tree , tvbuff_t * tvb , int offset , int obj_length , int rsvp_class _U_ , int type ) {
int tlv_off ;
guint32 attributes ;
guint16 tlv_type , tlv_len ;
proto_tree * ti2 , * rsvp_lsp_attr_subtree ;
if ( rsvp_class == RSVP_CLASS_LSP_REQUIRED_ATTRIBUTES ) proto_item_set_text ( ti , "LSP REQUIRED ATTRIBUTES: " ) ;
else proto_item_set_text ( ti , "LSP ATTRIBUTES: " ) ;
switch ( type ) {
case 1 : proto_tree_add_uint ( rsvp_object_tree , hf_rsvp_ctype , tvb , offset + 3 , 1 , type ) ;
for ( tlv_off = 4 ;
tlv_off < obj_length - 4 ;
) {
tlv_type = tvb_get_ntohs ( tvb , offset + tlv_off ) ;
tlv_len = tvb_get_ntohs ( tvb , offset + tlv_off + 2 ) ;
if ( ( tlv_len == 0 ) || ( tlv_off + tlv_len > obj_length ) ) {
proto_tree_add_expert ( rsvp_object_tree , pinfo , & ei_rsvp_invalid_length , tvb , offset + tlv_off + 2 , 2 ) ;
return ;
}
switch ( tlv_type ) {
case 1 : attributes = tvb_get_ntohl ( tvb , offset + tlv_off + 4 ) ;
ti2 = proto_tree_add_item ( rsvp_object_tree , hf_rsvp_lsp_attributes_tlv , tvb , offset + tlv_off , 4 , ENC_BIG_ENDIAN ) ;
rsvp_lsp_attr_subtree = proto_item_add_subtree ( ti2 , TREE ( TT_LSP_ATTRIBUTES_FLAGS ) ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_e2e , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_boundary , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_segment , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_integrity , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_contiguous , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_stitching , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_preplanned , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_nophp , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_oobmap , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_entropy , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_srlgcollect , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_costcollect , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_latcollect , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_lsp_attr_subtree , hf_rsvp_lsp_attr_latvarcollect , tvb , offset + tlv_off + 4 , 4 , ENC_BIG_ENDIAN ) ;
proto_item_append_text ( ti , "LSP Attribute:%s%s%s%s%s%s%s%s%s%s%s%s%s%s" , ( attributes & 0x00000001 ) ? " End-to-end re-routing" : "" , ( attributes & 0x00000002 ) ? " Boundary re-routing" : "" , ( attributes & 0x00000004 ) ? " Segment-based re-routing" : "" , ( attributes & 0x00000008 ) ? " LSP Integrity Required" : "" , ( attributes & 0x00000010 ) ? " Contiguous LSP" : "" , ( attributes & 0x00000020 ) ? " LSP stitching desired" : "" , ( attributes & 0x00000040 ) ? " Pre-Planned LSP Flag" : "" , ( attributes & 0x00000080 ) ? " Non-PHP behavior flag" : "" , ( attributes & 0x00000100 ) ? " OOB mapping flag" : "" , ( attributes & 0x00000200 ) ? " Entropy Label Capability" : "" , ( attributes & 0x00000400 ) ? " SRLG Collection Flag" : "" , ( attributes & 0x00000800 ) ? " Cost Collection Flag" : "" , ( attributes & 0x00001000 ) ? " Latency Collection Flag" : "" , ( attributes & 0x00002000 ) ? " Latency Variation Flag" : "" ) ;
break ;
default : proto_tree_add_uint_format ( rsvp_object_tree , hf_rsvp_type , tvb , offset + tlv_off , tlv_len , tlv_type , "Unknown TLV: %d" , tlv_type ) ;
break ;
}
tlv_off += tlv_len ;
}
break ;
default : proto_tree_add_uint_format_value ( rsvp_object_tree , hf_rsvp_ctype , tvb , offset + 3 , 1 , type , "Unknown (%u)" , type ) ;
proto_tree_add_item ( rsvp_object_tree , hf_rsvp_lsp_attributes_tlv_data , tvb , offset + 4 , obj_length - 4 , ENC_NA ) ;
break ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline int PopLZWStack ( LZWStack * stack_info ) {
if ( stack_info -> index <= stack_info -> codes ) return ( - 1 ) ;
stack_info -> index -- ;
return ( ( int ) * stack_info -> index ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int decode_frame ( AVCodecContext * avctx , void * data , int * got_frame , AVPacket * avpkt ) {
ASV1Context * const a = avctx -> priv_data ;
const uint8_t * buf = avpkt -> data ;
int buf_size = avpkt -> size ;
AVFrame * picture = data ;
AVFrame * const p = & a -> picture ;
int mb_x , mb_y , ret ;
if ( p -> data [ 0 ] ) avctx -> release_buffer ( avctx , p ) ;
p -> reference = 0 ;
if ( ( ret = ff_get_buffer ( avctx , p ) ) < 0 ) {
av_log ( avctx , AV_LOG_ERROR , "get_buffer() failed\n" ) ;
return ret ;
}
p -> pict_type = AV_PICTURE_TYPE_I ;
p -> key_frame = 1 ;
av_fast_padded_malloc ( & a -> bitstream_buffer , & a -> bitstream_buffer_size , buf_size ) ;
if ( ! a -> bitstream_buffer ) return AVERROR ( ENOMEM ) ;
if ( avctx -> codec_id == AV_CODEC_ID_ASV1 ) a -> dsp . bswap_buf ( ( uint32_t * ) a -> bitstream_buffer , ( const uint32_t * ) buf , buf_size / 4 ) ;
else {
int i ;
for ( i = 0 ;
i < buf_size ;
i ++ ) a -> bitstream_buffer [ i ] = ff_reverse [ buf [ i ] ] ;
}
init_get_bits ( & a -> gb , a -> bitstream_buffer , buf_size * 8 ) ;
for ( mb_y = 0 ;
mb_y < a -> mb_height2 ;
mb_y ++ ) {
for ( mb_x = 0 ;
mb_x < a -> mb_width2 ;
mb_x ++ ) {
if ( ( ret = decode_mb ( a , a -> block ) ) < 0 ) return ret ;
idct_put ( a , mb_x , mb_y ) ;
}
}
if ( a -> mb_width2 != a -> mb_width ) {
mb_x = a -> mb_width2 ;
for ( mb_y = 0 ;
mb_y < a -> mb_height2 ;
mb_y ++ ) {
if ( ( ret = decode_mb ( a , a -> block ) ) < 0 ) return ret ;
idct_put ( a , mb_x , mb_y ) ;
}
}
if ( a -> mb_height2 != a -> mb_height ) {
mb_y = a -> mb_height2 ;
for ( mb_x = 0 ;
mb_x < a -> mb_width ;
mb_x ++ ) {
if ( ( ret = decode_mb ( a , a -> block ) ) < 0 ) return ret ;
idct_put ( a , mb_x , mb_y ) ;
}
}
* picture = a -> picture ;
* got_frame = 1 ;
emms_c ( ) ;
return ( get_bits_count ( & a -> gb ) + 31 ) / 32 * 4 ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int process_rec_header2_v2 ( wtap * wth , unsigned char * buffer , guint16 length , int * err , gchar * * err_info ) {
static const char x_25_str [ ] = "HDLC\nX.25\n" ;
if ( length < sizeof x_25_str - 1 ) {
* err = WTAP_ERR_UNSUPPORTED ;
* err_info = g_strdup_printf ( "ngsniffer: WAN capture has too-short protocol list" ) ;
return - 1 ;
}
if ( strncmp ( ( char * ) buffer , x_25_str , sizeof x_25_str - 1 ) == 0 ) {
wth -> file_encap = WTAP_ENCAP_LAPB ;
}
else {
* err = WTAP_ERR_UNSUPPORTED ;
* err_info = g_strdup_printf ( "ngsniffer: WAN capture protocol string %.*s unknown" , length , buffer ) ;
return - 1 ;
}
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
TSReturnCode TSHttpAltInfoClientReqGet ( TSHttpAltInfo infop , TSMBuffer * bufp , TSMLoc * obj ) {
sdk_assert ( sdk_sanity_check_alt_info ( infop ) == TS_SUCCESS ) ;
HttpAltInfo * info = ( HttpAltInfo * ) infop ;
* ( reinterpret_cast < HTTPHdr * * > ( bufp ) ) = & info -> m_client_req ;
* obj = reinterpret_cast < TSMLoc > ( info -> m_client_req . m_http ) ;
return sdk_sanity_check_mbuffer ( * bufp ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
zend_object_iterator * spl_filesystem_dir_get_iterator ( zend_class_entry * ce , zval * object , int by_ref TSRMLS_DC ) {
spl_filesystem_iterator * iterator ;
spl_filesystem_object * dir_object ;
if ( by_ref ) {
zend_error ( E_ERROR , "An iterator cannot be used with foreach by reference" ) ;
}
dir_object = ( spl_filesystem_object * ) zend_object_store_get_object ( object TSRMLS_CC ) ;
iterator = spl_filesystem_object_to_iterator ( dir_object ) ;
if ( iterator -> intern . data == NULL ) {
iterator -> intern . data = object ;
iterator -> intern . funcs = & spl_filesystem_dir_it_funcs ;
iterator -> current = object ;
}
zval_add_ref ( & object ) ;
return ( zend_object_iterator * ) iterator ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( BluetoothChooserBrowserTest , InvokeDialog_UnavailableBubble ) {
RunDialog ( ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void MCFUNC ( hl_motion ) ( H264Context * h , uint8_t * dest_y , uint8_t * dest_cb , uint8_t * dest_cr , qpel_mc_func ( * qpix_put ) [ 16 ] , h264_chroma_mc_func ( * chroma_put ) , qpel_mc_func ( * qpix_avg ) [ 16 ] , h264_chroma_mc_func ( * chroma_avg ) , h264_weight_func * weight_op , h264_biweight_func * weight_avg ) {
const int mb_xy = h -> mb_xy ;
const int mb_type = h -> cur_pic . f . mb_type [ mb_xy ] ;
assert ( IS_INTER ( mb_type ) ) ;
if ( HAVE_THREADS && ( h -> avctx -> active_thread_type & FF_THREAD_FRAME ) ) await_references ( h ) ;
prefetch_motion ( h , 0 , PIXEL_SHIFT , CHROMA_IDC ) ;
if ( IS_16X16 ( mb_type ) ) {
mc_part ( h , 0 , 1 , 16 , 0 , dest_y , dest_cb , dest_cr , 0 , 0 , qpix_put [ 0 ] , chroma_put [ 0 ] , qpix_avg [ 0 ] , chroma_avg [ 0 ] , weight_op , weight_avg , IS_DIR ( mb_type , 0 , 0 ) , IS_DIR ( mb_type , 0 , 1 ) ) ;
}
else if ( IS_16X8 ( mb_type ) ) {
mc_part ( h , 0 , 0 , 8 , 8 << PIXEL_SHIFT , dest_y , dest_cb , dest_cr , 0 , 0 , qpix_put [ 1 ] , chroma_put [ 0 ] , qpix_avg [ 1 ] , chroma_avg [ 0 ] , weight_op , weight_avg , IS_DIR ( mb_type , 0 , 0 ) , IS_DIR ( mb_type , 0 , 1 ) ) ;
mc_part ( h , 8 , 0 , 8 , 8 << PIXEL_SHIFT , dest_y , dest_cb , dest_cr , 0 , 4 , qpix_put [ 1 ] , chroma_put [ 0 ] , qpix_avg [ 1 ] , chroma_avg [ 0 ] , weight_op , weight_avg , IS_DIR ( mb_type , 1 , 0 ) , IS_DIR ( mb_type , 1 , 1 ) ) ;
}
else if ( IS_8X16 ( mb_type ) ) {
mc_part ( h , 0 , 0 , 16 , 8 * h -> mb_linesize , dest_y , dest_cb , dest_cr , 0 , 0 , qpix_put [ 1 ] , chroma_put [ 1 ] , qpix_avg [ 1 ] , chroma_avg [ 1 ] , & weight_op [ 1 ] , & weight_avg [ 1 ] , IS_DIR ( mb_type , 0 , 0 ) , IS_DIR ( mb_type , 0 , 1 ) ) ;
mc_part ( h , 4 , 0 , 16 , 8 * h -> mb_linesize , dest_y , dest_cb , dest_cr , 4 , 0 , qpix_put [ 1 ] , chroma_put [ 1 ] , qpix_avg [ 1 ] , chroma_avg [ 1 ] , & weight_op [ 1 ] , & weight_avg [ 1 ] , IS_DIR ( mb_type , 1 , 0 ) , IS_DIR ( mb_type , 1 , 1 ) ) ;
}
else {
int i ;
assert ( IS_8X8 ( mb_type ) ) ;
for ( i = 0 ;
i < 4 ;
i ++ ) {
const int sub_mb_type = h -> sub_mb_type [ i ] ;
const int n = 4 * i ;
int x_offset = ( i & 1 ) << 2 ;
int y_offset = ( i & 2 ) << 1 ;
if ( IS_SUB_8X8 ( sub_mb_type ) ) {
mc_part ( h , n , 1 , 8 , 0 , dest_y , dest_cb , dest_cr , x_offset , y_offset , qpix_put [ 1 ] , chroma_put [ 1 ] , qpix_avg [ 1 ] , chroma_avg [ 1 ] , & weight_op [ 1 ] , & weight_avg [ 1 ] , IS_DIR ( sub_mb_type , 0 , 0 ) , IS_DIR ( sub_mb_type , 0 , 1 ) ) ;
}
else if ( IS_SUB_8X4 ( sub_mb_type ) ) {
mc_part ( h , n , 0 , 4 , 4 << PIXEL_SHIFT , dest_y , dest_cb , dest_cr , x_offset , y_offset , qpix_put [ 2 ] , chroma_put [ 1 ] , qpix_avg [ 2 ] , chroma_avg [ 1 ] , & weight_op [ 1 ] , & weight_avg [ 1 ] , IS_DIR ( sub_mb_type , 0 , 0 ) , IS_DIR ( sub_mb_type , 0 , 1 ) ) ;
mc_part ( h , n + 2 , 0 , 4 , 4 << PIXEL_SHIFT , dest_y , dest_cb , dest_cr , x_offset , y_offset + 2 , qpix_put [ 2 ] , chroma_put [ 1 ] , qpix_avg [ 2 ] , chroma_avg [ 1 ] , & weight_op [ 1 ] , & weight_avg [ 1 ] , IS_DIR ( sub_mb_type , 0 , 0 ) , IS_DIR ( sub_mb_type , 0 , 1 ) ) ;
}
else if ( IS_SUB_4X8 ( sub_mb_type ) ) {
mc_part ( h , n , 0 , 8 , 4 * h -> mb_linesize , dest_y , dest_cb , dest_cr , x_offset , y_offset , qpix_put [ 2 ] , chroma_put [ 2 ] , qpix_avg [ 2 ] , chroma_avg [ 2 ] , & weight_op [ 2 ] , & weight_avg [ 2 ] , IS_DIR ( sub_mb_type , 0 , 0 ) , IS_DIR ( sub_mb_type , 0 , 1 ) ) ;
mc_part ( h , n + 1 , 0 , 8 , 4 * h -> mb_linesize , dest_y , dest_cb , dest_cr , x_offset + 2 , y_offset , qpix_put [ 2 ] , chroma_put [ 2 ] , qpix_avg [ 2 ] , chroma_avg [ 2 ] , & weight_op [ 2 ] , & weight_avg [ 2 ] , IS_DIR ( sub_mb_type , 0 , 0 ) , IS_DIR ( sub_mb_type , 0 , 1 ) ) ;
}
else {
int j ;
assert ( IS_SUB_4X4 ( sub_mb_type ) ) ;
for ( j = 0 ;
j < 4 ;
j ++ ) {
int sub_x_offset = x_offset + 2 * ( j & 1 ) ;
int sub_y_offset = y_offset + ( j & 2 ) ;
mc_part ( h , n + j , 1 , 4 , 0 , dest_y , dest_cb , dest_cr , sub_x_offset , sub_y_offset , qpix_put [ 2 ] , chroma_put [ 2 ] , qpix_avg [ 2 ] , chroma_avg [ 2 ] , & weight_op [ 2 ] , & weight_avg [ 2 ] , IS_DIR ( sub_mb_type , 0 , 0 ) , IS_DIR ( sub_mb_type , 0 , 1 ) ) ;
}
}
}
}
prefetch_motion ( h , 1 , PIXEL_SHIFT , CHROMA_IDC ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int decode_udvm_literal_operand ( guint8 * buff , guint operand_address , guint16 * value ) {
guint bytecode ;
guint16 operand ;
guint test_bits ;
guint offset = operand_address ;
guint8 temp_data ;
bytecode = buff [ operand_address ] ;
test_bits = bytecode >> 7 ;
if ( test_bits == 1 ) {
test_bits = bytecode >> 6 ;
if ( test_bits == 2 ) {
temp_data = buff [ operand_address ] & 0x1f ;
operand = temp_data << 8 ;
temp_data = buff [ ( operand_address + 1 ) & 0xffff ] ;
operand = operand | temp_data ;
* value = operand ;
offset = offset + 2 ;
}
else {
offset ++ ;
temp_data = buff [ operand_address ] & 0x1f ;
operand = temp_data << 8 ;
temp_data = buff [ ( operand_address + 1 ) & 0xffff ] ;
operand = operand | temp_data ;
* value = operand ;
offset = offset + 2 ;
}
}
else {
operand = ( bytecode & 0x7f ) ;
* value = operand ;
offset ++ ;
}
return offset ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
TEST_F ( WebFrameTest , ContextMenuDataNonLocatedMenu ) {
ContextMenuWebFrameClient frame ;
FrameTestHelpers : : WebViewHelper web_view_helper ;
WebViewImpl * web_view = web_view_helper . Initialize ( & frame ) ;
const std : : string & html = "<div style='font-size: 1000%;
line-height: 0.7em'>Select me<br/>" "Next line</div>" ;
FrameTestHelpers : : LoadHTMLString ( web_view -> MainFrameImpl ( ) , html , ToKURL ( "about:blank" ) ) ;
web_view -> Resize ( WebSize ( 500 , 300 ) ) ;
web_view -> UpdateAllLifecyclePhases ( ) ;
RunPendingTasks ( ) ;
web_view -> SetInitialFocus ( false ) ;
RunPendingTasks ( ) ;
WebMouseEvent mouse_event ( WebInputEvent : : kMouseDown , WebInputEvent : : kNoModifiers , WebInputEvent : : GetStaticTimeStampForTests ( ) ) ;
mouse_event . button = WebMouseEvent : : Button : : kLeft ;
mouse_event . SetPositionInWidget ( 0 , 0 ) ;
mouse_event . click_count = 2 ;
web_view -> HandleInputEvent ( WebCoalescedInputEvent ( mouse_event ) ) ;
web_view -> ShowContextMenu ( kMenuSourceTouch ) ;
RunPendingTasks ( ) ;
web_view_helper . Reset ( ) ;
EXPECT_EQ ( frame . GetMenuData ( ) . source_type , kMenuSourceTouch ) ;
EXPECT_FALSE ( frame . GetMenuData ( ) . selected_text . IsEmpty ( ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int rfc2047_encode ( const char * d , size_t dlen , int col , const char * fromcode , const char * charsets , char * * e , size_t * elen , const char * specials ) {
int rc = 0 ;
char * buf = NULL ;
size_t bufpos , buflen ;
char * t0 = NULL , * t1 = NULL , * t = NULL ;
char * s0 = NULL , * s1 = NULL ;
size_t ulen , r , wlen = 0 ;
encoder_t encoder = NULL ;
char * tocode1 = NULL ;
const char * tocode = NULL ;
char * icode = "utf-8" ;
char * u = mutt_str_substr_dup ( d , d + dlen ) ;
if ( mutt_ch_convert_string ( & u , fromcode , icode , 0 ) != 0 ) {
rc = 1 ;
icode = 0 ;
}
ulen = mutt_str_strlen ( u ) ;
s0 = s1 = t0 = t1 = 0 ;
for ( t = u ;
t < ( u + ulen ) ;
t ++ ) {
if ( ( * t & 0x80 ) || ( ( * t == '=' ) && ( t [ 1 ] == '?' ) && ( ( t == u ) || HSPACE ( * ( t - 1 ) ) ) ) ) {
if ( ! t0 ) t0 = t ;
t1 = t ;
}
else if ( specials && * t && strchr ( specials , * t ) ) {
if ( ! s0 ) s0 = t ;
s1 = t ;
}
}
if ( t0 && s0 && ( s0 < t0 ) ) t0 = s0 ;
if ( t1 && s1 && ( s1 > t1 ) ) t1 = s1 ;
if ( ! t0 ) {
* e = u ;
* elen = ulen ;
return rc ;
}
tocode = fromcode ;
if ( icode ) {
tocode1 = mutt_ch_choose ( icode , charsets , u , ulen , 0 , 0 ) ;
if ( tocode1 ) tocode = tocode1 ;
else {
rc = 2 ;
icode = 0 ;
}
}
if ( ! icode && mutt_ch_is_us_ascii ( tocode ) ) tocode = "unknown-8bit" ;
t = u + ( ENCWORD_LEN_MAX + 1 ) - col - ENCWORD_LEN_MIN ;
if ( t < u ) t = u ;
if ( t < t0 ) t0 = t ;
for ( ;
t0 > u ;
t0 -- ) {
if ( ! HSPACE ( * ( t0 - 1 ) ) ) continue ;
t = t0 + 1 ;
if ( icode ) while ( ( t < ( u + ulen ) ) && CONTINUATION_BYTE ( * t ) ) t ++ ;
if ( ( try_block ( t0 , t - t0 , icode , tocode , & encoder , & wlen ) == 0 ) && ( ( col + ( t0 - u ) + wlen ) <= ( ENCWORD_LEN_MAX + 1 ) ) ) {
break ;
}
}
for ( ;
t1 < ( u + ulen ) ;
t1 ++ ) {
if ( ! HSPACE ( * t1 ) ) continue ;
t = t1 - 1 ;
if ( icode ) while ( CONTINUATION_BYTE ( * t ) ) t -- ;
if ( ( try_block ( t , t1 - t , icode , tocode , & encoder , & wlen ) == 0 ) && ( ( 1 + wlen + ( u + ulen - t1 ) ) <= ( ENCWORD_LEN_MAX + 1 ) ) ) {
break ;
}
}
buflen = 2 * ulen ;
buf = mutt_mem_malloc ( buflen ) ;
bufpos = t0 - u ;
memcpy ( buf , u , t0 - u ) ;
col += t0 - u ;
t = t0 ;
while ( true ) {
size_t n = choose_block ( t , t1 - t , col , icode , tocode , & encoder , & wlen ) ;
if ( n == ( t1 - t ) ) {
if ( ( col + wlen + ( u + ulen - t1 ) ) <= ( ENCWORD_LEN_MAX + 1 ) ) break ;
n = t1 - t - 1 ;
if ( icode ) while ( CONTINUATION_BYTE ( t [ n ] ) ) n -- ;
if ( ! n ) {
assert ( t1 < ( u + ulen ) ) ;
for ( t1 ++ ;
( t1 < ( u + ulen ) ) && ! HSPACE ( * t1 ) ;
t1 ++ ) ;
continue ;
}
n = choose_block ( t , n , col , icode , tocode , & encoder , & wlen ) ;
}
const char * line_break = "\n\t" ;
const int lb_len = 2 ;
if ( ( bufpos + wlen + lb_len ) > buflen ) {
buflen = bufpos + wlen + lb_len ;
mutt_mem_realloc ( & buf , buflen ) ;
}
r = encode_block ( buf + bufpos , t , n , icode , tocode , encoder ) ;
assert ( r == wlen ) ;
bufpos += wlen ;
memcpy ( buf + bufpos , line_break , lb_len ) ;
bufpos += lb_len ;
col = 1 ;
t += n ;
}
buflen = bufpos + wlen + ( u + ulen - t1 ) ;
mutt_mem_realloc ( & buf , buflen + 1 ) ;
r = encode_block ( buf + bufpos , t , t1 - t , icode , tocode , encoder ) ;
assert ( r == wlen ) ;
bufpos += wlen ;
memcpy ( buf + bufpos , t1 , u + ulen - t1 ) ;
FREE ( & tocode1 ) ;
FREE ( & u ) ;
buf [ buflen ] = '\0' ;
* e = buf ;
* elen = buflen + 1 ;
return rc ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline int file_path_has_perm ( const struct cred * cred , struct file * file , u32 av ) {
struct common_audit_data ad ;
ad . type = LSM_AUDIT_DATA_FILE ;
ad . u . file = file ;
return inode_has_perm ( cred , file_inode ( file ) , av , & ad ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void print_value ( FILE * file , MYSQL_RES * result , MYSQL_ROW row , const char * prefix , const char * name , int string_value ) {
MYSQL_FIELD * field ;
mysql_field_seek ( result , 0 ) ;
for ( ;
( field = mysql_fetch_field ( result ) ) ;
row ++ ) {
if ( ! strcmp ( field -> name , name ) ) {
if ( row [ 0 ] && row [ 0 ] [ 0 ] && strcmp ( row [ 0 ] , "0" ) ) {
fputc ( ' ' , file ) ;
fputs ( prefix , file ) ;
if ( string_value ) unescape ( file , row [ 0 ] , strlen ( row [ 0 ] ) ) ;
else fputs ( row [ 0 ] , file ) ;
check_io ( file ) ;
return ;
}
}
}
return ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dissect_rsvp_xro_subobjects ( proto_tree * ti , packet_info * pinfo , proto_tree * rsvp_object_tree , tvbuff_t * tvb , int offset , int obj_length , int rsvp_class ) {
int i , lbit , type , l ;
proto_tree * rsvp_xro_subtree ;
int tree_type ;
switch ( rsvp_class ) {
case RSVP_CLASS_EXCLUDE_ROUTE : tree_type = TREE ( TT_EXCLUDE_ROUTE_SUBOBJ ) ;
break ;
default : return ;
}
for ( i = 1 , l = 0 ;
l < obj_length - 4 ;
i ++ ) {
lbit = tvb_get_guint8 ( tvb , offset + l ) & 0x80 ;
type = tvb_get_guint8 ( tvb , offset + l ) & 0x7f ;
switch ( type ) {
case 1 : rsvp_xro_subtree = proto_tree_add_subtree_format ( rsvp_object_tree , tvb , offset + l , 8 , tree_type , NULL , "IPv4 Subobject - %s" , tvb_ip_to_str ( tvb , offset + l + 2 ) ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_lbit , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_type , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_len , tvb , offset + l + 1 , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_ipv4_addr , tvb , offset + l + 2 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_ipv4_prefix , tvb , offset + l + 6 , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_ipv4_attr , tvb , offset + l + 7 , 1 , ENC_BIG_ENDIAN ) ;
if ( i < 4 ) {
proto_item_append_text ( ti , "IPv4 %s%s" , tvb_ip_to_str ( tvb , offset + l + 2 ) , lbit ? " [L]" : "" ) ;
}
break ;
case 2 : rsvp_xro_subtree = proto_tree_add_subtree_format ( rsvp_object_tree , tvb , offset + l , 20 , tree_type , NULL , "IPv6 Subobject - %s" , tvb_ip6_to_str ( tvb , offset + l + 2 ) ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_lbit , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_type , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_len , tvb , offset + l + 1 , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_ipv6_addr , tvb , offset + l + 2 , 16 , ENC_NA ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_ipv6_prefix , tvb , offset + l + 18 , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_ipv6_attr , tvb , offset + l + 19 , 1 , ENC_BIG_ENDIAN ) ;
if ( i < 4 ) {
proto_item_append_text ( ti , "IPv6 [...]%s" , lbit ? " [L]" : "" ) ;
}
break ;
case 34 : rsvp_xro_subtree = proto_tree_add_subtree_format ( rsvp_object_tree , tvb , offset + l , 8 , tree_type , NULL , "SRLG Subobject - %u" , tvb_get_ntohl ( tvb , offset + l + 2 ) ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_lbit , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_type , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_len , tvb , offset + l + 1 , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_srlg_id , tvb , offset + l + 2 , 4 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_srlg_res , tvb , offset + l + 6 , 2 , ENC_BIG_ENDIAN ) ;
if ( i < 4 ) {
proto_item_append_text ( ti , "SRLG %u%s" , tvb_get_ntohl ( tvb , offset + l + 2 ) , lbit ? " [L]" : "" ) ;
}
break ;
default : rsvp_xro_subtree = proto_tree_add_subtree_format ( rsvp_object_tree , tvb , offset + l , tvb_get_guint8 ( tvb , offset + l + 1 ) , tree_type , NULL , "Unknown subobject: %d" , type ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_lbit , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_type , tvb , offset + l , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( rsvp_xro_subtree , hf_rsvp_xro_sobj_len , tvb , offset + l + 1 , 1 , ENC_BIG_ENDIAN ) ;
break ;
}
if ( tvb_get_guint8 ( tvb , offset + l + 1 ) < 1 ) {
proto_tree_add_expert_format ( rsvp_xro_subtree , pinfo , & ei_rsvp_invalid_length , tvb , offset + l + 1 , 1 , "Invalid Length: %u" , tvb_get_guint8 ( tvb , offset + l + 1 ) ) ;
return ;
}
l += tvb_get_guint8 ( tvb , offset + l + 1 ) ;
if ( l < obj_length - 4 ) {
if ( i < 4 ) proto_item_append_text ( ti , ", " ) ;
else if ( i == 4 ) proto_item_append_text ( ti , "..." ) ;
}
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
err_status_t srtp_kdf_clear ( srtp_kdf_t * kdf ) {
err_status_t status ;
status = cipher_dealloc ( kdf -> cipher ) ;
if ( status ) return status ;
kdf -> cipher = NULL ;
return err_status_ok ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void test_bind_nagative ( ) {
MYSQL_STMT * stmt_insert ;
char * query ;
int rc ;
MYSQL_BIND my_bind [ 1 ] ;
int32 my_val = 0 ;
ulong my_length = 0L ;
my_bool my_null = FALSE ;
myheader ( "test_insert_select" ) ;
rc = mysql_query ( mysql , "DROP TABLE IF EXISTS t1" ) ;
myquery ( rc ) ;
rc = mysql_query ( mysql , "create temporary table t1 (c1 int unsigned)" ) ;
myquery ( rc ) ;
rc = mysql_query ( mysql , "INSERT INTO t1 VALUES (1), (-1)" ) ;
myquery ( rc ) ;
query = ( char * ) "INSERT INTO t1 VALUES (?)" ;
stmt_insert = mysql_simple_prepare ( mysql , query ) ;
check_stmt ( stmt_insert ) ;
memset ( my_bind , 0 , sizeof ( my_bind ) ) ;
my_bind [ 0 ] . buffer_type = MYSQL_TYPE_LONG ;
my_bind [ 0 ] . buffer = ( void * ) & my_val ;
my_bind [ 0 ] . length = & my_length ;
my_bind [ 0 ] . is_null = ( char * ) & my_null ;
rc = mysql_stmt_bind_param ( stmt_insert , my_bind ) ;
check_execute ( stmt_insert , rc ) ;
my_val = - 1 ;
rc = mysql_stmt_execute ( stmt_insert ) ;
check_execute ( stmt_insert , rc ) ;
mysql_stmt_close ( stmt_insert ) ;
rc = mysql_query ( mysql , "drop table t1" ) ;
myquery ( rc ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
TSAction TSNetConnect ( TSCont contp , sockaddr const * addr ) {
sdk_assert ( sdk_sanity_check_continuation ( contp ) == TS_SUCCESS ) ;
sdk_assert ( ats_is_ip ( addr ) ) ;
HttpConfigParams * http_config_param = HttpConfig : : acquire ( ) ;
NetVCOptions opt ;
if ( http_config_param ) {
opt . set_sock_param ( http_config_param -> oride . sock_recv_buffer_size_out , http_config_param -> oride . sock_send_buffer_size_out , http_config_param -> oride . sock_option_flag_out , http_config_param -> oride . sock_packet_mark_out , http_config_param -> oride . sock_packet_tos_out ) ;
HttpConfig : : release ( http_config_param ) ;
}
FORCE_PLUGIN_SCOPED_MUTEX ( contp ) ;
return reinterpret_cast < TSAction > ( netProcessor . connect_re ( reinterpret_cast < INKContInternal * > ( contp ) , addr , & opt ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static ossl_inline type * lh_ ## type ## _insert ( LHASH_OF ( type ) * lh , type * d ) {
return ( type * ) OPENSSL_LH_insert ( ( OPENSSL_LHASH * ) lh , d ) ;
}
static ossl_inline type * lh_ ## type ## _delete ( LHASH_OF ( type ) * lh , const type * d ) {
return ( type * ) OPENSSL_LH_delete ( ( OPENSSL_LHASH * ) lh , d ) ;
}
static ossl_inline type * lh_ ## type ## _retrieve ( LHASH_OF ( type ) * lh , const type * d ) {
return ( type * ) OPENSSL_LH_retrieve ( ( OPENSSL_LHASH * ) lh , d ) ;
}
static ossl_inline int lh_ ## type ## _error ( LHASH_OF ( type ) * lh ) {
return OPENSSL_LH_error ( ( OPENSSL_LHASH * ) lh ) ;
}
static ossl_inline unsigned long lh_ ## type ## _num_items ( LHASH_OF ( type ) * lh ) {
return OPENSSL_LH_num_items ( ( OPENSSL_LHASH * ) lh ) ;
}
static ossl_inline void lh_ ## type ## _node_stats_bio ( const LHASH_OF ( type ) * lh , BIO * out ) {
OPENSSL_LH_node_stats_bio ( ( const OPENSSL_LHASH * ) lh , out ) ;
}
static ossl_inline void lh_ ## type ## _node_usage_stats_bio ( const LHASH_OF ( type ) * lh , BIO * out ) {
OPENSSL_LH_node_usage_stats_bio ( ( const OPENSSL_LHASH * ) lh , out ) ;
}
static ossl_inline void lh_ ## type ## _stats_bio ( const LHASH_OF ( type ) * lh , BIO * out ) {
OPENSSL_LH_stats_bio ( ( const OPENSSL_LHASH * ) lh , out ) ;
}
static ossl_inline unsigned long lh_ ## type ## _get_down_load ( LHASH_OF ( type ) * lh ) {
return OPENSSL_LH_get_down_load ( ( OPENSSL_LHASH * ) lh ) ;
}
static ossl_inline void lh_ ## type ## _set_down_load ( LHASH_OF ( type ) * lh , unsigned long dl ) {
OPENSSL_LH_set_down_load ( ( OPENSSL_LHASH * ) lh , dl ) ;
}
static ossl_inline void lh_ ## type ## _doall ( LHASH_OF ( type ) * lh , void ( * doall ) ( type * ) ) {
OPENSSL_LH_doall ( ( OPENSSL_LHASH * ) lh , ( OPENSSL_LH_DOALL_FUNC ) doall ) ;
}
LHASH_OF ( type ) # define IMPLEMENT_LHASH_DOALL_ARG_CONST ( type , argtype ) int_implement_lhash_doall ( type , argtype , const type ) # define IMPLEMENT_LHASH_DOALL_ARG ( type , argtype ) int_implement_lhash_doall ( type , argtype , type ) # define int_implement_lhash_doall ( type , argtype , cbargtype ) static ossl_inline void lh_ ## type ## _doall_ ## argtype ( LHASH_OF ( type ) * lh , void ( * fn ) ( cbargtype * , argtype * ) , argtype * arg ) {
OPENSSL_LH_doall_arg ( ( OPENSSL_LHASH * ) lh , ( OPENSSL_LH_DOALL_FUNCARG ) fn , ( void * ) arg ) ;
}
LHASH_OF ( type ) DEFINE_LHASH_OF ( OPENSSL_STRING ) ;
# ifdef _MSC_VER # pragma warning ( push ) # pragma warning ( disable : 4090 ) # endif DEFINE_LHASH_OF ( OPENSSL_CSTRING )
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int decode_residual_block ( AVSContext * h , GetBitContext * gb , const struct dec_2dvlc * r , int esc_golomb_order , int qp , uint8_t * dst , int stride ) {
int i , level_code , esc_code , level , run , mask ;
int16_t level_buf [ 65 ] ;
uint8_t run_buf [ 65 ] ;
int16_t * block = h -> block ;
for ( i = 0 ;
i < 65 ;
i ++ ) {
level_code = get_ue_code ( gb , r -> golomb_order ) ;
if ( level_code >= ESCAPE_CODE ) {
run = ( ( level_code - ESCAPE_CODE ) >> 1 ) + 1 ;
esc_code = get_ue_code ( gb , esc_golomb_order ) ;
level = esc_code + ( run > r -> max_run ? 1 : r -> level_add [ run ] ) ;
while ( level > r -> inc_limit ) r ++ ;
mask = - ( level_code & 1 ) ;
level = ( level ^ mask ) - mask ;
}
else if ( level_code >= 0 ) {
level = r -> rltab [ level_code ] [ 0 ] ;
if ( ! level ) break ;
run = r -> rltab [ level_code ] [ 1 ] ;
r += r -> rltab [ level_code ] [ 2 ] ;
}
else {
break ;
}
level_buf [ i ] = level ;
run_buf [ i ] = run ;
}
if ( dequant ( h , level_buf , run_buf , block , dequant_mul [ qp ] , dequant_shift [ qp ] , i ) ) return - 1 ;
h -> cdsp . cavs_idct8_add ( dst , block , stride ) ;
h -> dsp . clear_block ( block ) ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static struct hash_list * parse_merge ( unsigned int * count ) {
struct hash_list * list = NULL , * * tail = & list , * n ;
const char * from ;
struct branch * s ;
* count = 0 ;
while ( skip_prefix ( command_buf . buf , "merge " , & from ) ) {
n = xmalloc ( sizeof ( * n ) ) ;
s = lookup_branch ( from ) ;
if ( s ) hashcpy ( n -> sha1 , s -> sha1 ) ;
else if ( * from == ':' ) {
uintmax_t idnum = parse_mark_ref_eol ( from ) ;
struct object_entry * oe = find_mark ( idnum ) ;
if ( oe -> type != OBJ_COMMIT ) die ( "Mark :%" PRIuMAX " not a commit" , idnum ) ;
hashcpy ( n -> sha1 , oe -> idx . sha1 ) ;
}
else if ( ! get_sha1 ( from , n -> sha1 ) ) {
unsigned long size ;
char * buf = read_object_with_reference ( n -> sha1 , commit_type , & size , n -> sha1 ) ;
if ( ! buf || size < 46 ) die ( "Not a valid commit: %s" , from ) ;
free ( buf ) ;
}
else die ( "Invalid ref name or SHA1 expression: %s" , from ) ;
n -> next = NULL ;
* tail = n ;
tail = & n -> next ;
( * count ) ++ ;
read_next_command ( ) ;
}
return list ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void print_table_data_vertically ( MYSQL_RES * result ) {
MYSQL_ROW cur ;
uint max_length = 0 ;
MYSQL_FIELD * field ;
while ( ( field = mysql_fetch_field ( result ) ) ) {
uint length = field -> name_length ;
if ( length > max_length ) max_length = length ;
field -> max_length = length ;
}
mysql_field_seek ( result , 0 ) ;
for ( uint row_count = 1 ;
( cur = mysql_fetch_row ( result ) ) ;
row_count ++ ) {
if ( interrupted_query ) break ;
mysql_field_seek ( result , 0 ) ;
tee_fprintf ( PAGER , "*************************** %d. row ***************************\n" , row_count ) ;
ulong * lengths = mysql_fetch_lengths ( result ) ;
for ( uint off = 0 ;
off < mysql_num_fields ( result ) ;
off ++ ) {
field = mysql_fetch_field ( result ) ;
if ( column_names ) tee_fprintf ( PAGER , "%*s: " , ( int ) max_length , field -> name ) ;
if ( cur [ off ] ) {
unsigned int i ;
const char * p ;
for ( i = 0 , p = cur [ off ] ;
i < lengths [ off ] ;
i += 1 , p += 1 ) {
if ( * p == '\0' ) tee_putc ( ( int ) ' ' , PAGER ) ;
else tee_putc ( ( int ) * p , PAGER ) ;
}
tee_putc ( '\n' , PAGER ) ;
}
else tee_fprintf ( PAGER , "NULL\n" ) ;
}
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static UBool hasCESU8Data ( const UConverter * cnv ) {
# if UCONFIG_ONLY_HTML_CONVERSION return FALSE ;
# else return ( UBool ) ( cnv -> sharedData == & _CESU8Data ) ;
# endif }
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vp8_strict_quantize_b_c ( BLOCK * b , BLOCKD * d ) {
int i ;
int rc ;
int eob ;
int x ;
int y ;
int z ;
int sz ;
short * coeff_ptr ;
short * quant_ptr ;
short * quant_shift_ptr ;
short * qcoeff_ptr ;
short * dqcoeff_ptr ;
short * dequant_ptr ;
coeff_ptr = b -> coeff ;
quant_ptr = b -> quant ;
quant_shift_ptr = b -> quant_shift ;
qcoeff_ptr = d -> qcoeff ;
dqcoeff_ptr = d -> dqcoeff ;
dequant_ptr = d -> dequant ;
eob = - 1 ;
vpx_memset ( qcoeff_ptr , 0 , 32 ) ;
vpx_memset ( dqcoeff_ptr , 0 , 32 ) ;
for ( i = 0 ;
i < 16 ;
i ++ ) {
int dq ;
int rounding ;
rc = vp8_default_zig_zag1d [ i ] ;
z = coeff_ptr [ rc ] ;
dq = dequant_ptr [ rc ] ;
rounding = dq >> 1 ;
sz = - ( z < 0 ) ;
x = ( z + sz ) ^ sz ;
x += rounding ;
if ( x >= dq ) {
y = ( ( ( ( x * quant_ptr [ rc ] ) >> 16 ) + x ) * quant_shift_ptr [ rc ] ) >> 16 ;
x = ( y + sz ) ^ sz ;
qcoeff_ptr [ rc ] = x ;
dqcoeff_ptr [ rc ] = x * dq ;
if ( y ) eob = i ;
}
}
* d -> eob = ( char ) ( eob + 1 ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int run_cancel_or_skip_warning ( CommonJob * job , char * primary_text , char * secondary_text , const char * details_text , int total_operations , int operations_remaining ) {
int response ;
if ( total_operations == 1 ) {
response = run_warning ( job , primary_text , secondary_text , details_text , FALSE , CANCEL , NULL ) ;
}
else {
response = run_warning ( job , primary_text , secondary_text , details_text , operations_remaining > 1 , CANCEL , SKIP_ALL , SKIP , NULL ) ;
}
return response ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int setup_interp_filter_search_mask ( VP9_COMP * cpi ) {
INTERP_FILTER ifilter ;
int ref_total [ MAX_REF_FRAMES ] = {
0 }
;
MV_REFERENCE_FRAME ref ;
int mask = 0 ;
if ( cpi -> common . last_frame_type == KEY_FRAME || cpi -> refresh_alt_ref_frame ) return mask ;
for ( ref = LAST_FRAME ;
ref <= ALTREF_FRAME ;
++ ref ) for ( ifilter = EIGHTTAP ;
ifilter <= EIGHTTAP_SHARP ;
++ ifilter ) ref_total [ ref ] += cpi -> interp_filter_selected [ ref ] [ ifilter ] ;
for ( ifilter = EIGHTTAP ;
ifilter <= EIGHTTAP_SHARP ;
++ ifilter ) {
if ( ( ref_total [ LAST_FRAME ] && cpi -> interp_filter_selected [ LAST_FRAME ] [ ifilter ] == 0 ) && ( ref_total [ GOLDEN_FRAME ] == 0 || cpi -> interp_filter_selected [ GOLDEN_FRAME ] [ ifilter ] * 50 < ref_total [ GOLDEN_FRAME ] ) && ( ref_total [ ALTREF_FRAME ] == 0 || cpi -> interp_filter_selected [ ALTREF_FRAME ] [ ifilter ] * 50 < ref_total [ ALTREF_FRAME ] ) ) mask |= 1 << ifilter ;
}
return mask ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline void store_mvs ( AVSContext * h ) {
h -> col_mv [ h -> mbidx * 4 + 0 ] = h -> mv [ MV_FWD_X0 ] ;
h -> col_mv [ h -> mbidx * 4 + 1 ] = h -> mv [ MV_FWD_X1 ] ;
h -> col_mv [ h -> mbidx * 4 + 2 ] = h -> mv [ MV_FWD_X2 ] ;
h -> col_mv [ h -> mbidx * 4 + 3 ] = h -> mv [ MV_FWD_X3 ] ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
unsigned int auth_server_connection_add_request ( struct auth_server_connection * conn , struct auth_client_request * request ) {
unsigned int id ;
i_assert ( conn -> handshake_received ) ;
id = ++ conn -> client -> request_id_counter ;
if ( id == 0 ) {
id = ++ conn -> client -> request_id_counter ;
}
i_assert ( hash_table_lookup ( conn -> requests , POINTER_CAST ( id ) ) == NULL ) ;
hash_table_insert ( conn -> requests , POINTER_CAST ( id ) , request ) ;
return id ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
SPL_METHOD ( SplFileObject , setFlags ) {
spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ;
if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "l" , & intern -> flags ) == FAILURE ) {
return ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void kvm_synchronize_all_tsc ( void ) {
CPUState * cpu ;
if ( kvm_enabled ( ) ) {
CPU_FOREACH ( cpu ) {
run_on_cpu ( cpu , do_kvm_synchronize_tsc , RUN_ON_CPU_NULL ) ;
}
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void activate_files ( ActivateParameters * parameters ) {
NautilusFile * file ;
NautilusWindow * window ;
NautilusWindowOpenFlags flags ;
g_autoptr ( GList ) open_in_app_parameters = NULL ;
g_autoptr ( GList ) unhandled_open_in_app_uris = NULL ;
ApplicationLaunchParameters * one_parameters ;
int count ;
g_autofree char * old_working_dir = NULL ;
GdkScreen * screen ;
gint num_apps ;
gint num_unhandled ;
gint num_files ;
gboolean open_files ;
gboolean closed_window ;
g_autoptr ( GQueue ) launch_desktop_files = NULL ;
g_autoptr ( GQueue ) launch_files = NULL ;
g_autoptr ( GQueue ) launch_in_terminal_files = NULL ;
g_autoptr ( GQueue ) open_in_app_uris = NULL ;
g_autoptr ( GQueue ) open_in_view_files = NULL ;
GList * l ;
ActivationAction action ;
LaunchLocation * location ;
launch_desktop_files = g_queue_new ( ) ;
launch_files = g_queue_new ( ) ;
launch_in_terminal_files = g_queue_new ( ) ;
open_in_view_files = g_queue_new ( ) ;
open_in_app_uris = g_queue_new ( ) ;
for ( l = parameters -> locations ;
l != NULL ;
l = l -> next ) {
location = l -> data ;
file = location -> file ;
if ( file_was_cancelled ( file ) ) {
continue ;
}
action = get_activation_action ( file ) ;
if ( action == ACTIVATION_ACTION_ASK ) {
pause_activation_timed_cancel ( parameters ) ;
action = get_executable_text_file_action ( parameters -> parent_window , file ) ;
unpause_activation_timed_cancel ( parameters ) ;
}
switch ( action ) {
case ACTIVATION_ACTION_LAUNCH_DESKTOP_FILE : {
g_queue_push_tail ( launch_desktop_files , file ) ;
}
break ;
case ACTIVATION_ACTION_LAUNCH : {
g_queue_push_tail ( launch_files , file ) ;
}
break ;
case ACTIVATION_ACTION_LAUNCH_IN_TERMINAL : {
g_queue_push_tail ( launch_in_terminal_files , file ) ;
}
break ;
case ACTIVATION_ACTION_OPEN_IN_VIEW : {
g_queue_push_tail ( open_in_view_files , file ) ;
}
break ;
case ACTIVATION_ACTION_OPEN_IN_APPLICATION : {
g_queue_push_tail ( open_in_app_uris , location -> uri ) ;
}
break ;
case ACTIVATION_ACTION_DO_NOTHING : {
}
break ;
case ACTIVATION_ACTION_EXTRACT : {
g_assert_not_reached ( ) ;
}
break ;
case ACTIVATION_ACTION_ASK : {
g_assert_not_reached ( ) ;
}
break ;
}
}
for ( l = g_queue_peek_head_link ( launch_desktop_files ) ;
l != NULL ;
l = l -> next ) {
file = NAUTILUS_FILE ( l -> data ) ;
activate_desktop_file ( parameters , file ) ;
}
if ( parameters -> activation_directory && ( ! g_queue_is_empty ( launch_files ) || ! g_queue_is_empty ( launch_in_terminal_files ) ) ) {
old_working_dir = g_get_current_dir ( ) ;
g_chdir ( parameters -> activation_directory ) ;
}
screen = gtk_widget_get_screen ( GTK_WIDGET ( parameters -> parent_window ) ) ;
for ( l = g_queue_peek_head_link ( launch_files ) ;
l != NULL ;
l = l -> next ) {
g_autofree char * uri = NULL ;
g_autofree char * executable_path = NULL ;
g_autofree char * quoted_path = NULL ;
file = NAUTILUS_FILE ( l -> data ) ;
uri = nautilus_file_get_activation_uri ( file ) ;
executable_path = g_filename_from_uri ( uri , NULL , NULL ) ;
quoted_path = g_shell_quote ( executable_path ) ;
DEBUG ( "Launching file path %s" , quoted_path ) ;
nautilus_launch_application_from_command ( screen , quoted_path , FALSE , NULL ) ;
}
for ( l = g_queue_peek_head_link ( launch_in_terminal_files ) ;
l != NULL ;
l = l -> next ) {
g_autofree char * uri = NULL ;
g_autofree char * executable_path = NULL ;
g_autofree char * quoted_path = NULL ;
file = NAUTILUS_FILE ( l -> data ) ;
uri = nautilus_file_get_activation_uri ( file ) ;
executable_path = g_filename_from_uri ( uri , NULL , NULL ) ;
quoted_path = g_shell_quote ( executable_path ) ;
DEBUG ( "Launching in terminal file quoted path %s" , quoted_path ) ;
nautilus_launch_application_from_command ( screen , quoted_path , TRUE , NULL ) ;
}
if ( old_working_dir != NULL ) {
g_chdir ( old_working_dir ) ;
}
count = g_queue_get_length ( open_in_view_files ) ;
flags = parameters -> flags ;
if ( count > 1 ) {
if ( ( parameters -> flags & NAUTILUS_WINDOW_OPEN_FLAG_NEW_WINDOW ) == 0 ) {
if ( ( parameters -> flags & NAUTILUS_WINDOW_OPEN_FLAG_CLOSE_BEHIND ) != 0 ) {
flags |= NAUTILUS_WINDOW_OPEN_FLAG_NEW_WINDOW ;
}
else {
flags |= NAUTILUS_WINDOW_OPEN_FLAG_NEW_TAB ;
}
}
else {
flags |= NAUTILUS_WINDOW_OPEN_FLAG_NEW_WINDOW ;
}
}
else {
if ( ( parameters -> flags & NAUTILUS_WINDOW_OPEN_FLAG_CLOSE_BEHIND ) != 0 ) {
flags |= NAUTILUS_WINDOW_OPEN_FLAG_NEW_WINDOW ;
}
}
if ( parameters -> slot != NULL && ( ! parameters -> user_confirmation || confirm_multiple_windows ( parameters -> parent_window , count , ( flags & NAUTILUS_WINDOW_OPEN_FLAG_NEW_TAB ) != 0 ) ) ) {
if ( ( flags & NAUTILUS_WINDOW_OPEN_FLAG_NEW_TAB ) != 0 && g_settings_get_enum ( nautilus_preferences , NAUTILUS_PREFERENCES_NEW_TAB_POSITION ) == NAUTILUS_NEW_TAB_POSITION_AFTER_CURRENT_TAB ) {
g_queue_reverse ( open_in_view_files ) ;
}
closed_window = FALSE ;
for ( l = g_queue_peek_head_link ( open_in_view_files ) ;
l != NULL ;
l = l -> next ) {
g_autofree char * uri = NULL ;
g_autoptr ( GFile ) location = NULL ;
g_autoptr ( GFile ) location_with_permissions = NULL ;
file = NAUTILUS_FILE ( l -> data ) ;
uri = nautilus_file_get_activation_uri ( file ) ;
location = g_file_new_for_uri ( uri ) ;
if ( g_file_is_native ( location ) && ( nautilus_file_is_in_admin ( file ) || ! nautilus_file_can_read ( file ) || ! nautilus_file_can_execute ( file ) ) ) {
g_autofree gchar * file_path = NULL ;
g_free ( uri ) ;
file_path = g_file_get_path ( location ) ;
uri = g_strconcat ( "admin://" , file_path , NULL ) ;
}
location_with_permissions = g_file_new_for_uri ( uri ) ;
nautilus_application_open_location_full ( NAUTILUS_APPLICATION ( g_application_get_default ( ) ) , location_with_permissions , flags , NULL , NULL , parameters -> slot ) ;
if ( ! closed_window && ( flags & NAUTILUS_WINDOW_OPEN_FLAG_CLOSE_BEHIND ) != 0 ) {
flags &= ( ~ NAUTILUS_WINDOW_OPEN_FLAG_CLOSE_BEHIND ) ;
if ( ( parameters -> flags & NAUTILUS_WINDOW_OPEN_FLAG_NEW_WINDOW ) == 0 ) {
flags &= ( ~ NAUTILUS_WINDOW_OPEN_FLAG_NEW_WINDOW ) ;
flags |= NAUTILUS_WINDOW_OPEN_FLAG_NEW_TAB ;
}
closed_window = TRUE ;
}
}
}
if ( open_in_app_uris != NULL ) {
open_in_app_parameters = make_activation_parameters ( g_queue_peek_head_link ( open_in_app_uris ) , & unhandled_open_in_app_uris ) ;
}
num_apps = g_list_length ( open_in_app_parameters ) ;
num_unhandled = g_list_length ( unhandled_open_in_app_uris ) ;
num_files = g_queue_get_length ( open_in_app_uris ) ;
open_files = TRUE ;
if ( g_queue_is_empty ( open_in_app_uris ) && ( ! parameters -> user_confirmation || num_files + num_unhandled > SILENT_OPEN_LIMIT ) && num_apps > 1 ) {
GtkDialog * dialog ;
char * prompt ;
g_autofree char * detail = NULL ;
int response ;
pause_activation_timed_cancel ( parameters ) ;
prompt = _ ( "Are you sure you want to open all files?" ) ;
detail = g_strdup_printf ( ngettext ( "This will open %d separate application." , "This will open %d separate applications." , num_apps ) , num_apps ) ;
dialog = eel_show_yes_no_dialog ( prompt , detail , _ ( "_OK" ) , _ ( "_Cancel" ) , parameters -> parent_window ) ;
response = gtk_dialog_run ( dialog ) ;
gtk_widget_destroy ( GTK_WIDGET ( dialog ) ) ;
unpause_activation_timed_cancel ( parameters ) ;
if ( response != GTK_RESPONSE_YES ) {
open_files = FALSE ;
}
}
if ( open_files ) {
for ( l = open_in_app_parameters ;
l != NULL ;
l = l -> next ) {
one_parameters = l -> data ;
nautilus_launch_application_by_uri ( one_parameters -> application , one_parameters -> uris , parameters -> parent_window ) ;
application_launch_parameters_free ( one_parameters ) ;
}
for ( l = unhandled_open_in_app_uris ;
l != NULL ;
l = l -> next ) {
char * uri = l -> data ;
application_unhandled_uri ( parameters , uri ) ;
}
}
window = NULL ;
if ( parameters -> slot != NULL ) {
window = nautilus_window_slot_get_window ( parameters -> slot ) ;
}
if ( open_in_app_parameters != NULL || unhandled_open_in_app_uris != NULL ) {
if ( ( parameters -> flags & NAUTILUS_WINDOW_OPEN_FLAG_CLOSE_BEHIND ) != 0 && window != NULL ) {
nautilus_window_close ( window ) ;
}
}
activation_parameters_free ( parameters ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h225_T_billingMode ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h225_T_billingMode , T_billingMode_choice , NULL ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int main ( int argc , char * * argv ) {
using std : : string ;
if ( argc != 2 ) {
fprintf ( stderr , "One argument, the input filename, must be provided.\n" ) ;
return 1 ;
}
string filename ( argv [ 1 ] ) ;
string outfilename = filename . substr ( 0 , filename . find_last_of ( "." ) ) + ".ttf" ;
string input = woff2 : : GetFileContent ( filename ) ;
const uint8_t * raw_input = reinterpret_cast < const uint8_t * > ( input . data ( ) ) ;
string output ( std : : min ( woff2 : : ComputeWOFF2FinalSize ( raw_input , input . size ( ) ) , woff2 : : kDefaultMaxSize ) , 0 ) ;
woff2 : : WOFF2StringOut out ( & output ) ;
const bool ok = woff2 : : ConvertWOFF2ToTTF ( raw_input , input . size ( ) , & out ) ;
if ( ok ) {
woff2 : : SetFileContents ( outfilename , output . begin ( ) , output . begin ( ) + out . Size ( ) ) ;
}
return ok ? 0 : 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int dissect_ber_constrained_sequence_of ( gboolean implicit_tag , asn1_ctx_t * actx , proto_tree * parent_tree , tvbuff_t * tvb , int offset , gint32 min_len , gint32 max_len , const ber_sequence_t * seq , gint hf_id , gint ett_id ) {
return dissect_ber_sq_of ( implicit_tag , BER_UNI_TAG_SEQUENCE , actx , parent_tree , tvb , offset , min_len , max_len , seq , hf_id , ett_id ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static cmsStage * ReadMatrix ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , cmsUInt32Number Offset ) {
cmsFloat64Number dMat [ 3 * 3 ] ;
cmsFloat64Number dOff [ 3 ] ;
cmsStage * Mat ;
if ( ! io -> Seek ( io , Offset ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 0 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 1 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 2 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 3 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 4 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 5 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 6 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 7 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dMat [ 8 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dOff [ 0 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dOff [ 1 ] ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & dOff [ 2 ] ) ) return NULL ;
Mat = cmsStageAllocMatrix ( self -> ContextID , 3 , 3 , dMat , dOff ) ;
return Mat ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int main ( int argc , char * * argv ) {
BlockBackend * blk ;
BlockDriverState * bs ;
off_t dev_offset = 0 ;
uint16_t nbdflags = 0 ;
bool disconnect = false ;
const char * bindto = NULL ;
const char * port = NULL ;
char * sockpath = NULL ;
char * device = NULL ;
off_t fd_size ;
QemuOpts * sn_opts = NULL ;
const char * sn_id_or_name = NULL ;
const char * sopt = "hVb:o:p:rsnP:c:dvk:e:f:tl:x:T:D:" ;
struct option lopt [ ] = {
{
"help" , no_argument , NULL , 'h' }
, {
"version" , no_argument , NULL , 'V' }
, {
"bind" , required_argument , NULL , 'b' }
, {
"port" , required_argument , NULL , 'p' }
, {
"socket" , required_argument , NULL , 'k' }
, {
"offset" , required_argument , NULL , 'o' }
, {
"read-only" , no_argument , NULL , 'r' }
, {
"partition" , required_argument , NULL , 'P' }
, {
"connect" , required_argument , NULL , 'c' }
, {
"disconnect" , no_argument , NULL , 'd' }
, {
"snapshot" , no_argument , NULL , 's' }
, {
"load-snapshot" , required_argument , NULL , 'l' }
, {
"nocache" , no_argument , NULL , 'n' }
, {
"cache" , required_argument , NULL , QEMU_NBD_OPT_CACHE }
, {
"aio" , required_argument , NULL , QEMU_NBD_OPT_AIO }
, {
"discard" , required_argument , NULL , QEMU_NBD_OPT_DISCARD }
, {
"detect-zeroes" , required_argument , NULL , QEMU_NBD_OPT_DETECT_ZEROES }
, {
"shared" , required_argument , NULL , 'e' }
, {
"format" , required_argument , NULL , 'f' }
, {
"persistent" , no_argument , NULL , 't' }
, {
"verbose" , no_argument , NULL , 'v' }
, {
"object" , required_argument , NULL , QEMU_NBD_OPT_OBJECT }
, {
"export-name" , required_argument , NULL , 'x' }
, {
"description" , required_argument , NULL , 'D' }
, {
"tls-creds" , required_argument , NULL , QEMU_NBD_OPT_TLSCREDS }
, {
"image-opts" , no_argument , NULL , QEMU_NBD_OPT_IMAGE_OPTS }
, {
"trace" , required_argument , NULL , 'T' }
, {
"fork" , no_argument , NULL , QEMU_NBD_OPT_FORK }
, {
NULL , 0 , NULL , 0 }
}
;
int ch ;
int opt_ind = 0 ;
char * end ;
int flags = BDRV_O_RDWR ;
int partition = - 1 ;
int ret = 0 ;
bool seen_cache = false ;
bool seen_discard = false ;
bool seen_aio = false ;
pthread_t client_thread ;
const char * fmt = NULL ;
Error * local_err = NULL ;
BlockdevDetectZeroesOptions detect_zeroes = BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF ;
QDict * options = NULL ;
const char * export_name = NULL ;
const char * export_description = NULL ;
const char * tlscredsid = NULL ;
bool imageOpts = false ;
bool writethrough = true ;
char * trace_file = NULL ;
bool fork_process = false ;
int old_stderr = - 1 ;
unsigned socket_activation ;
struct sigaction sa_sigterm ;
memset ( & sa_sigterm , 0 , sizeof ( sa_sigterm ) ) ;
sa_sigterm . sa_handler = termsig_handler ;
sigaction ( SIGTERM , & sa_sigterm , NULL ) ;
module_call_init ( MODULE_INIT_TRACE ) ;
qcrypto_init ( & error_fatal ) ;
module_call_init ( MODULE_INIT_QOM ) ;
qemu_add_opts ( & qemu_object_opts ) ;
qemu_add_opts ( & qemu_trace_opts ) ;
qemu_init_exec_dir ( argv [ 0 ] ) ;
while ( ( ch = getopt_long ( argc , argv , sopt , lopt , & opt_ind ) ) != - 1 ) {
switch ( ch ) {
case 's' : flags |= BDRV_O_SNAPSHOT ;
break ;
case 'n' : optarg = ( char * ) "none" ;
case QEMU_NBD_OPT_CACHE : if ( seen_cache ) {
error_report ( "-n and --cache can only be specified once" ) ;
exit ( EXIT_FAILURE ) ;
}
seen_cache = true ;
if ( bdrv_parse_cache_mode ( optarg , & flags , & writethrough ) == - 1 ) {
error_report ( "Invalid cache mode `%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case QEMU_NBD_OPT_AIO : if ( seen_aio ) {
error_report ( "--aio can only be specified once" ) ;
exit ( EXIT_FAILURE ) ;
}
seen_aio = true ;
if ( ! strcmp ( optarg , "native" ) ) {
flags |= BDRV_O_NATIVE_AIO ;
}
else if ( ! strcmp ( optarg , "threads" ) ) {
}
else {
error_report ( "invalid aio mode `%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case QEMU_NBD_OPT_DISCARD : if ( seen_discard ) {
error_report ( "--discard can only be specified once" ) ;
exit ( EXIT_FAILURE ) ;
}
seen_discard = true ;
if ( bdrv_parse_discard_flags ( optarg , & flags ) == - 1 ) {
error_report ( "Invalid discard mode `%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case QEMU_NBD_OPT_DETECT_ZEROES : detect_zeroes = qapi_enum_parse ( BlockdevDetectZeroesOptions_lookup , optarg , BLOCKDEV_DETECT_ZEROES_OPTIONS__MAX , BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF , & local_err ) ;
if ( local_err ) {
error_reportf_err ( local_err , "Failed to parse detect_zeroes mode: " ) ;
exit ( EXIT_FAILURE ) ;
}
if ( detect_zeroes == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP && ! ( flags & BDRV_O_UNMAP ) ) {
error_report ( "setting detect-zeroes to unmap is not allowed " "without setting discard operation to unmap" ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case 'b' : bindto = optarg ;
break ;
case 'p' : port = optarg ;
break ;
case 'o' : dev_offset = strtoll ( optarg , & end , 0 ) ;
if ( * end ) {
error_report ( "Invalid offset `%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
if ( dev_offset < 0 ) {
error_report ( "Offset must be positive `%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case 'l' : if ( strstart ( optarg , SNAPSHOT_OPT_BASE , NULL ) ) {
sn_opts = qemu_opts_parse_noisily ( & internal_snapshot_opts , optarg , false ) ;
if ( ! sn_opts ) {
error_report ( "Failed in parsing snapshot param `%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
}
else {
sn_id_or_name = optarg ;
}
case 'r' : nbdflags |= NBD_FLAG_READ_ONLY ;
flags &= ~ BDRV_O_RDWR ;
break ;
case 'P' : partition = strtol ( optarg , & end , 0 ) ;
if ( * end ) {
error_report ( "Invalid partition `%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
if ( partition < 1 || partition > 8 ) {
error_report ( "Invalid partition %d" , partition ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case 'k' : sockpath = optarg ;
if ( sockpath [ 0 ] != '/' ) {
error_report ( "socket path must be absolute" ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case 'd' : disconnect = true ;
break ;
case 'c' : device = optarg ;
break ;
case 'e' : shared = strtol ( optarg , & end , 0 ) ;
if ( * end ) {
error_report ( "Invalid shared device number '%s'" , optarg ) ;
exit ( EXIT_FAILURE ) ;
}
if ( shared < 1 ) {
error_report ( "Shared device number must be greater than 0" ) ;
exit ( EXIT_FAILURE ) ;
}
break ;
case 'f' : fmt = optarg ;
break ;
case 't' : persistent = 1 ;
break ;
case 'x' : export_name = optarg ;
break ;
case 'D' : export_description = optarg ;
break ;
case 'v' : verbose = 1 ;
break ;
case 'V' : version ( argv [ 0 ] ) ;
exit ( 0 ) ;
break ;
case 'h' : usage ( argv [ 0 ] ) ;
exit ( 0 ) ;
break ;
case '?' : error_report ( "Try `%s --help' for more information." , argv [ 0 ] ) ;
exit ( EXIT_FAILURE ) ;
case QEMU_NBD_OPT_OBJECT : {
QemuOpts * opts ;
opts = qemu_opts_parse_noisily ( & qemu_object_opts , optarg , true ) ;
if ( ! opts ) {
exit ( EXIT_FAILURE ) ;
}
}
break ;
case QEMU_NBD_OPT_TLSCREDS : tlscredsid = optarg ;
break ;
case QEMU_NBD_OPT_IMAGE_OPTS : imageOpts = true ;
break ;
case 'T' : g_free ( trace_file ) ;
trace_file = trace_opt_parse ( optarg ) ;
break ;
case QEMU_NBD_OPT_FORK : fork_process = true ;
break ;
}
}
if ( ( argc - optind ) != 1 ) {
error_report ( "Invalid number of arguments" ) ;
error_printf ( "Try `%s --help' for more information.\n" , argv [ 0 ] ) ;
exit ( EXIT_FAILURE ) ;
}
if ( qemu_opts_foreach ( & qemu_object_opts , user_creatable_add_opts_foreach , NULL , NULL ) ) {
exit ( EXIT_FAILURE ) ;
}
if ( ! trace_init_backends ( ) ) {
exit ( 1 ) ;
}
trace_init_file ( trace_file ) ;
qemu_set_log ( LOG_TRACE ) ;
socket_activation = check_socket_activation ( ) ;
if ( socket_activation == 0 ) {
setup_address_and_port ( & bindto , & port ) ;
}
else {
const char * err_msg = socket_activation_validate_opts ( device , sockpath , bindto , port ) ;
if ( err_msg != NULL ) {
error_report ( "%s" , err_msg ) ;
exit ( EXIT_FAILURE ) ;
}
if ( socket_activation > 1 ) {
error_report ( "qemu-nbd does not support socket activation with %s > 1" , "LISTEN_FDS" ) ;
exit ( EXIT_FAILURE ) ;
}
}
if ( tlscredsid ) {
if ( sockpath ) {
error_report ( "TLS is only supported with IPv4/IPv6" ) ;
exit ( EXIT_FAILURE ) ;
}
if ( device ) {
error_report ( "TLS is not supported with a host device" ) ;
exit ( EXIT_FAILURE ) ;
}
if ( ! export_name ) {
export_name = "" ;
}
tlscreds = nbd_get_tls_creds ( tlscredsid , & local_err ) ;
if ( local_err ) {
error_report ( "Failed to get TLS creds %s" , error_get_pretty ( local_err ) ) ;
exit ( EXIT_FAILURE ) ;
}
}
if ( disconnect ) {
int nbdfd = open ( argv [ optind ] , O_RDWR ) ;
if ( nbdfd < 0 ) {
error_report ( "Cannot open %s: %s" , argv [ optind ] , strerror ( errno ) ) ;
exit ( EXIT_FAILURE ) ;
}
nbd_disconnect ( nbdfd ) ;
close ( nbdfd ) ;
printf ( "%s disconnected\n" , argv [ optind ] ) ;
return 0 ;
}
if ( ( device && ! verbose ) || fork_process ) {
int stderr_fd [ 2 ] ;
pid_t pid ;
int ret ;
if ( qemu_pipe ( stderr_fd ) < 0 ) {
error_report ( "Error setting up communication pipe: %s" , strerror ( errno ) ) ;
exit ( EXIT_FAILURE ) ;
}
pid = fork ( ) ;
if ( pid < 0 ) {
error_report ( "Failed to fork: %s" , strerror ( errno ) ) ;
exit ( EXIT_FAILURE ) ;
}
else if ( pid == 0 ) {
close ( stderr_fd [ 0 ] ) ;
ret = qemu_daemon ( 1 , 0 ) ;
old_stderr = dup ( STDERR_FILENO ) ;
dup2 ( stderr_fd [ 1 ] , STDERR_FILENO ) ;
if ( ret < 0 ) {
error_report ( "Failed to daemonize: %s" , strerror ( errno ) ) ;
exit ( EXIT_FAILURE ) ;
}
close ( stderr_fd [ 1 ] ) ;
}
else {
bool errors = false ;
char * buf ;
close ( stderr_fd [ 1 ] ) ;
buf = g_malloc ( 1024 ) ;
while ( ( ret = read ( stderr_fd [ 0 ] , buf , 1024 ) ) > 0 ) {
errors = true ;
ret = qemu_write_full ( STDERR_FILENO , buf , ret ) ;
if ( ret < 0 ) {
exit ( EXIT_FAILURE ) ;
}
}
if ( ret < 0 ) {
error_report ( "Cannot read from daemon: %s" , strerror ( errno ) ) ;
exit ( EXIT_FAILURE ) ;
}
exit ( errors ) ;
}
}
if ( device != NULL && sockpath == NULL ) {
sockpath = g_malloc ( 128 ) ;
snprintf ( sockpath , 128 , SOCKET_PATH , basename ( device ) ) ;
}
if ( socket_activation == 0 ) {
server_ioc = qio_channel_socket_new ( ) ;
saddr = nbd_build_socket_address ( sockpath , bindto , port ) ;
if ( qio_channel_socket_listen_sync ( server_ioc , saddr , & local_err ) < 0 ) {
object_unref ( OBJECT ( server_ioc ) ) ;
error_report_err ( local_err ) ;
return 1 ;
}
}
else {
assert ( socket_activation == 1 ) ;
server_ioc = qio_channel_socket_new_fd ( FIRST_SOCKET_ACTIVATION_FD , & local_err ) ;
if ( server_ioc == NULL ) {
error_report ( "Failed to use socket activation: %s" , error_get_pretty ( local_err ) ) ;
exit ( EXIT_FAILURE ) ;
}
}
if ( qemu_init_main_loop ( & local_err ) ) {
error_report_err ( local_err ) ;
exit ( EXIT_FAILURE ) ;
}
bdrv_init ( ) ;
atexit ( bdrv_close_all ) ;
srcpath = argv [ optind ] ;
if ( imageOpts ) {
QemuOpts * opts ;
if ( fmt ) {
error_report ( "--image-opts and -f are mutually exclusive" ) ;
exit ( EXIT_FAILURE ) ;
}
opts = qemu_opts_parse_noisily ( & file_opts , srcpath , true ) ;
if ( ! opts ) {
qemu_opts_reset ( & file_opts ) ;
exit ( EXIT_FAILURE ) ;
}
options = qemu_opts_to_qdict ( opts , NULL ) ;
qemu_opts_reset ( & file_opts ) ;
blk = blk_new_open ( NULL , NULL , options , flags , & local_err ) ;
}
else {
if ( fmt ) {
options = qdict_new ( ) ;
qdict_put_str ( options , "driver" , fmt ) ;
}
blk = blk_new_open ( srcpath , NULL , options , flags , & local_err ) ;
}
if ( ! blk ) {
error_reportf_err ( local_err , "Failed to blk_new_open '%s': " , argv [ optind ] ) ;
exit ( EXIT_FAILURE ) ;
}
bs = blk_bs ( blk ) ;
blk_set_enable_write_cache ( blk , ! writethrough ) ;
if ( sn_opts ) {
ret = bdrv_snapshot_load_tmp ( bs , qemu_opt_get ( sn_opts , SNAPSHOT_OPT_ID ) , qemu_opt_get ( sn_opts , SNAPSHOT_OPT_NAME ) , & local_err ) ;
}
else if ( sn_id_or_name ) {
ret = bdrv_snapshot_load_tmp_by_id_or_name ( bs , sn_id_or_name , & local_err ) ;
}
if ( ret < 0 ) {
error_reportf_err ( local_err , "Failed to load snapshot: " ) ;
exit ( EXIT_FAILURE ) ;
}
bs -> detect_zeroes = detect_zeroes ;
fd_size = blk_getlength ( blk ) ;
if ( fd_size < 0 ) {
error_report ( "Failed to determine the image length: %s" , strerror ( - fd_size ) ) ;
exit ( EXIT_FAILURE ) ;
}
if ( dev_offset >= fd_size ) {
error_report ( "Offset (%lld) has to be smaller than the image size " "(%lld)" , ( long long int ) dev_offset , ( long long int ) fd_size ) ;
exit ( EXIT_FAILURE ) ;
}
fd_size -= dev_offset ;
if ( partition != - 1 ) {
ret = find_partition ( blk , partition , & dev_offset , & fd_size ) ;
if ( ret < 0 ) {
error_report ( "Could not find partition %d: %s" , partition , strerror ( - ret ) ) ;
exit ( EXIT_FAILURE ) ;
}
}
exp = nbd_export_new ( bs , dev_offset , fd_size , nbdflags , nbd_export_closed , writethrough , NULL , & local_err ) ;
if ( ! exp ) {
error_report_err ( local_err ) ;
exit ( EXIT_FAILURE ) ;
}
if ( export_name ) {
nbd_export_set_name ( exp , export_name ) ;
nbd_export_set_description ( exp , export_description ) ;
newproto = true ;
}
else if ( export_description ) {
error_report ( "Export description requires an export name" ) ;
exit ( EXIT_FAILURE ) ;
}
if ( device ) {
int ret ;
ret = pthread_create ( & client_thread , NULL , nbd_client_thread , device ) ;
if ( ret != 0 ) {
error_report ( "Failed to create client thread: %s" , strerror ( ret ) ) ;
exit ( EXIT_FAILURE ) ;
}
}
else {
memset ( & client_thread , 0 , sizeof ( client_thread ) ) ;
}
nbd_update_server_watch ( ) ;
if ( chdir ( "/" ) < 0 ) {
error_report ( "Could not chdir to root directory: %s" , strerror ( errno ) ) ;
exit ( EXIT_FAILURE ) ;
}
if ( fork_process ) {
dup2 ( old_stderr , STDERR_FILENO ) ;
close ( old_stderr ) ;
}
state = RUNNING ;
do {
main_loop_wait ( false ) ;
if ( state == TERMINATE ) {
state = TERMINATING ;
nbd_export_close ( exp ) ;
nbd_export_put ( exp ) ;
exp = NULL ;
}
}
while ( state != TERMINATED ) ;
blk_unref ( blk ) ;
if ( sockpath ) {
unlink ( sockpath ) ;
}
qemu_opts_del ( sn_opts ) ;
if ( device ) {
void * ret ;
pthread_join ( client_thread , & ret ) ;
exit ( ret != NULL ) ;
}
else {
exit ( EXIT_SUCCESS ) ;
}
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline void vc1_pred_mv ( VC1Context * v , int n , int dmv_x , int dmv_y , int mv1 , int r_x , int r_y , uint8_t * is_intra , int pred_flag , int dir ) {
MpegEncContext * s = & v -> s ;
int xy , wrap , off = 0 ;
int16_t * A , * B , * C ;
int px , py ;
int sum ;
int mixedmv_pic , num_samefield = 0 , num_oppfield = 0 ;
int opposite , a_f , b_f , c_f ;
int16_t field_predA [ 2 ] ;
int16_t field_predB [ 2 ] ;
int16_t field_predC [ 2 ] ;
int a_valid , b_valid , c_valid ;
int hybridmv_thresh , y_bias = 0 ;
if ( v -> mv_mode == MV_PMODE_MIXED_MV || ( ( v -> mv_mode == MV_PMODE_INTENSITY_COMP ) && ( v -> mv_mode2 == MV_PMODE_MIXED_MV ) ) ) mixedmv_pic = 1 ;
else mixedmv_pic = 0 ;
dmv_x <<= 1 - s -> quarter_sample ;
dmv_y <<= 1 - s -> quarter_sample ;
wrap = s -> b8_stride ;
xy = s -> block_index [ n ] ;
if ( s -> mb_intra ) {
s -> mv [ 0 ] [ n ] [ 0 ] = s -> current_picture . f . motion_val [ 0 ] [ xy + v -> blocks_off ] [ 0 ] = 0 ;
s -> mv [ 0 ] [ n ] [ 1 ] = s -> current_picture . f . motion_val [ 0 ] [ xy + v -> blocks_off ] [ 1 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + v -> blocks_off ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + v -> blocks_off ] [ 1 ] = 0 ;
if ( mv1 ) {
s -> current_picture . f . motion_val [ 0 ] [ xy + 1 + v -> blocks_off ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 0 ] [ xy + 1 + v -> blocks_off ] [ 1 ] = 0 ;
s -> current_picture . f . motion_val [ 0 ] [ xy + wrap + v -> blocks_off ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 0 ] [ xy + wrap + v -> blocks_off ] [ 1 ] = 0 ;
s -> current_picture . f . motion_val [ 0 ] [ xy + wrap + 1 + v -> blocks_off ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 0 ] [ xy + wrap + 1 + v -> blocks_off ] [ 1 ] = 0 ;
v -> luma_mv [ s -> mb_x ] [ 0 ] = v -> luma_mv [ s -> mb_x ] [ 1 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + 1 + v -> blocks_off ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + 1 + v -> blocks_off ] [ 1 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + wrap ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + wrap + v -> blocks_off ] [ 1 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + wrap + 1 + v -> blocks_off ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ xy + wrap + 1 + v -> blocks_off ] [ 1 ] = 0 ;
}
return ;
}
C = s -> current_picture . f . motion_val [ dir ] [ xy - 1 + v -> blocks_off ] ;
A = s -> current_picture . f . motion_val [ dir ] [ xy - wrap + v -> blocks_off ] ;
if ( mv1 ) {
if ( v -> field_mode && mixedmv_pic ) off = ( s -> mb_x == ( s -> mb_width - 1 ) ) ? - 2 : 2 ;
else off = ( s -> mb_x == ( s -> mb_width - 1 ) ) ? - 1 : 2 ;
}
else {
switch ( n ) {
case 0 : off = ( s -> mb_x > 0 ) ? - 1 : 1 ;
break ;
case 1 : off = ( s -> mb_x == ( s -> mb_width - 1 ) ) ? - 1 : 1 ;
break ;
case 2 : off = 1 ;
break ;
case 3 : off = - 1 ;
}
}
B = s -> current_picture . f . motion_val [ dir ] [ xy - wrap + off + v -> blocks_off ] ;
a_valid = ! s -> first_slice_line || ( n == 2 || n == 3 ) ;
b_valid = a_valid && ( s -> mb_width > 1 ) ;
c_valid = s -> mb_x || ( n == 1 || n == 3 ) ;
if ( v -> field_mode ) {
a_valid = a_valid && ! is_intra [ xy - wrap ] ;
b_valid = b_valid && ! is_intra [ xy - wrap + off ] ;
c_valid = c_valid && ! is_intra [ xy - 1 ] ;
}
if ( a_valid ) {
a_f = v -> mv_f [ dir ] [ xy - wrap + v -> blocks_off ] ;
num_oppfield += a_f ;
num_samefield += 1 - a_f ;
field_predA [ 0 ] = A [ 0 ] ;
field_predA [ 1 ] = A [ 1 ] ;
}
else {
field_predA [ 0 ] = field_predA [ 1 ] = 0 ;
a_f = 0 ;
}
if ( b_valid ) {
b_f = v -> mv_f [ dir ] [ xy - wrap + off + v -> blocks_off ] ;
num_oppfield += b_f ;
num_samefield += 1 - b_f ;
field_predB [ 0 ] = B [ 0 ] ;
field_predB [ 1 ] = B [ 1 ] ;
}
else {
field_predB [ 0 ] = field_predB [ 1 ] = 0 ;
b_f = 0 ;
}
if ( c_valid ) {
c_f = v -> mv_f [ dir ] [ xy - 1 + v -> blocks_off ] ;
num_oppfield += c_f ;
num_samefield += 1 - c_f ;
field_predC [ 0 ] = C [ 0 ] ;
field_predC [ 1 ] = C [ 1 ] ;
}
else {
field_predC [ 0 ] = field_predC [ 1 ] = 0 ;
c_f = 0 ;
}
if ( v -> field_mode ) {
if ( ! v -> numref ) opposite = 1 - v -> reffield ;
else {
if ( num_samefield <= num_oppfield ) opposite = 1 - pred_flag ;
else opposite = pred_flag ;
}
}
else opposite = 0 ;
if ( opposite ) {
if ( a_valid && ! a_f ) {
field_predA [ 0 ] = scaleforopp ( v , field_predA [ 0 ] , 0 , dir ) ;
field_predA [ 1 ] = scaleforopp ( v , field_predA [ 1 ] , 1 , dir ) ;
}
if ( b_valid && ! b_f ) {
field_predB [ 0 ] = scaleforopp ( v , field_predB [ 0 ] , 0 , dir ) ;
field_predB [ 1 ] = scaleforopp ( v , field_predB [ 1 ] , 1 , dir ) ;
}
if ( c_valid && ! c_f ) {
field_predC [ 0 ] = scaleforopp ( v , field_predC [ 0 ] , 0 , dir ) ;
field_predC [ 1 ] = scaleforopp ( v , field_predC [ 1 ] , 1 , dir ) ;
}
v -> mv_f [ dir ] [ xy + v -> blocks_off ] = 1 ;
v -> ref_field_type [ dir ] = ! v -> cur_field_type ;
}
else {
if ( a_valid && a_f ) {
field_predA [ 0 ] = scaleforsame ( v , n , field_predA [ 0 ] , 0 , dir ) ;
field_predA [ 1 ] = scaleforsame ( v , n , field_predA [ 1 ] , 1 , dir ) ;
}
if ( b_valid && b_f ) {
field_predB [ 0 ] = scaleforsame ( v , n , field_predB [ 0 ] , 0 , dir ) ;
field_predB [ 1 ] = scaleforsame ( v , n , field_predB [ 1 ] , 1 , dir ) ;
}
if ( c_valid && c_f ) {
field_predC [ 0 ] = scaleforsame ( v , n , field_predC [ 0 ] , 0 , dir ) ;
field_predC [ 1 ] = scaleforsame ( v , n , field_predC [ 1 ] , 1 , dir ) ;
}
v -> mv_f [ dir ] [ xy + v -> blocks_off ] = 0 ;
v -> ref_field_type [ dir ] = v -> cur_field_type ;
}
if ( a_valid ) {
px = field_predA [ 0 ] ;
py = field_predA [ 1 ] ;
}
else if ( c_valid ) {
px = field_predC [ 0 ] ;
py = field_predC [ 1 ] ;
}
else if ( b_valid ) {
px = field_predB [ 0 ] ;
py = field_predB [ 1 ] ;
}
else {
px = 0 ;
py = 0 ;
}
if ( num_samefield + num_oppfield > 1 ) {
px = mid_pred ( field_predA [ 0 ] , field_predB [ 0 ] , field_predC [ 0 ] ) ;
py = mid_pred ( field_predA [ 1 ] , field_predB [ 1 ] , field_predC [ 1 ] ) ;
}
if ( ! v -> field_mode ) {
int qx , qy , X , Y ;
qx = ( s -> mb_x << 6 ) + ( ( n == 1 || n == 3 ) ? 32 : 0 ) ;
qy = ( s -> mb_y << 6 ) + ( ( n == 2 || n == 3 ) ? 32 : 0 ) ;
X = ( s -> mb_width << 6 ) - 4 ;
Y = ( s -> mb_height << 6 ) - 4 ;
if ( mv1 ) {
if ( qx + px < - 60 ) px = - 60 - qx ;
if ( qy + py < - 60 ) py = - 60 - qy ;
}
else {
if ( qx + px < - 28 ) px = - 28 - qx ;
if ( qy + py < - 28 ) py = - 28 - qy ;
}
if ( qx + px > X ) px = X - qx ;
if ( qy + py > Y ) py = Y - qy ;
}
if ( ! v -> field_mode || s -> pict_type != AV_PICTURE_TYPE_B ) {
hybridmv_thresh = 32 ;
if ( a_valid && c_valid ) {
if ( is_intra [ xy - wrap ] ) sum = FFABS ( px ) + FFABS ( py ) ;
else sum = FFABS ( px - field_predA [ 0 ] ) + FFABS ( py - field_predA [ 1 ] ) ;
if ( sum > hybridmv_thresh ) {
if ( get_bits1 ( & s -> gb ) ) {
px = field_predA [ 0 ] ;
py = field_predA [ 1 ] ;
}
else {
px = field_predC [ 0 ] ;
py = field_predC [ 1 ] ;
}
}
else {
if ( is_intra [ xy - 1 ] ) sum = FFABS ( px ) + FFABS ( py ) ;
else sum = FFABS ( px - field_predC [ 0 ] ) + FFABS ( py - field_predC [ 1 ] ) ;
if ( sum > hybridmv_thresh ) {
if ( get_bits1 ( & s -> gb ) ) {
px = field_predA [ 0 ] ;
py = field_predA [ 1 ] ;
}
else {
px = field_predC [ 0 ] ;
py = field_predC [ 1 ] ;
}
}
}
}
}
if ( v -> field_mode && v -> numref ) r_y >>= 1 ;
if ( v -> field_mode && v -> cur_field_type && v -> ref_field_type [ dir ] == 0 ) y_bias = 1 ;
s -> mv [ dir ] [ n ] [ 0 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 0 ] = ( ( px + dmv_x + r_x ) & ( ( r_x << 1 ) - 1 ) ) - r_x ;
s -> mv [ dir ] [ n ] [ 1 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 1 ] = ( ( py + dmv_y + r_y - y_bias ) & ( ( r_y << 1 ) - 1 ) ) - r_y + y_bias ;
if ( mv1 ) {
s -> current_picture . f . motion_val [ dir ] [ xy + 1 + v -> blocks_off ] [ 0 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 0 ] ;
s -> current_picture . f . motion_val [ dir ] [ xy + 1 + v -> blocks_off ] [ 1 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 1 ] ;
s -> current_picture . f . motion_val [ dir ] [ xy + wrap + v -> blocks_off ] [ 0 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 0 ] ;
s -> current_picture . f . motion_val [ dir ] [ xy + wrap + v -> blocks_off ] [ 1 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 1 ] ;
s -> current_picture . f . motion_val [ dir ] [ xy + wrap + 1 + v -> blocks_off ] [ 0 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 0 ] ;
s -> current_picture . f . motion_val [ dir ] [ xy + wrap + 1 + v -> blocks_off ] [ 1 ] = s -> current_picture . f . motion_val [ dir ] [ xy + v -> blocks_off ] [ 1 ] ;
v -> mv_f [ dir ] [ xy + 1 + v -> blocks_off ] = v -> mv_f [ dir ] [ xy + v -> blocks_off ] ;
v -> mv_f [ dir ] [ xy + wrap + v -> blocks_off ] = v -> mv_f [ dir ] [ xy + wrap + 1 + v -> blocks_off ] = v -> mv_f [ dir ] [ xy + v -> blocks_off ] ;
}
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
void tcg_exec_init ( unsigned long tb_size ) {
cpu_gen_init ( ) ;
code_gen_alloc ( tb_size ) ;
tcg_ctx . code_gen_ptr = tcg_ctx . code_gen_buffer ;
tcg_register_jit ( tcg_ctx . code_gen_buffer , tcg_ctx . code_gen_buffer_size ) ;
page_init ( ) ;
# if ! defined ( CONFIG_USER_ONLY ) || ! defined ( CONFIG_USE_GUEST_BASE ) tcg_prologue_init ( & tcg_ctx ) ;
# endif }
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int read_dct_coeffs ( GetBitContext * gb , int32_t block [ 64 ] , const uint8_t * scan , const int32_t quant_matrices [ 16 ] [ 64 ] , int q ) {
int coef_list [ 128 ] ;
int mode_list [ 128 ] ;
int i , t , bits , ccoef , mode , sign ;
int list_start = 64 , list_end = 64 , list_pos ;
int coef_count = 0 ;
int coef_idx [ 64 ] ;
int quant_idx ;
const int32_t * quant ;
coef_list [ list_end ] = 4 ;
mode_list [ list_end ++ ] = 0 ;
coef_list [ list_end ] = 24 ;
mode_list [ list_end ++ ] = 0 ;
coef_list [ list_end ] = 44 ;
mode_list [ list_end ++ ] = 0 ;
coef_list [ list_end ] = 1 ;
mode_list [ list_end ++ ] = 3 ;
coef_list [ list_end ] = 2 ;
mode_list [ list_end ++ ] = 3 ;
coef_list [ list_end ] = 3 ;
mode_list [ list_end ++ ] = 3 ;
for ( bits = get_bits ( gb , 4 ) - 1 ;
bits >= 0 ;
bits -- ) {
list_pos = list_start ;
while ( list_pos < list_end ) {
if ( ! ( mode_list [ list_pos ] | coef_list [ list_pos ] ) || ! get_bits1 ( gb ) ) {
list_pos ++ ;
continue ;
}
ccoef = coef_list [ list_pos ] ;
mode = mode_list [ list_pos ] ;
switch ( mode ) {
case 0 : coef_list [ list_pos ] = ccoef + 4 ;
mode_list [ list_pos ] = 1 ;
case 2 : if ( mode == 2 ) {
coef_list [ list_pos ] = 0 ;
mode_list [ list_pos ++ ] = 0 ;
}
for ( i = 0 ;
i < 4 ;
i ++ , ccoef ++ ) {
if ( get_bits1 ( gb ) ) {
coef_list [ -- list_start ] = ccoef ;
mode_list [ list_start ] = 3 ;
}
else {
if ( ! bits ) {
t = 1 - ( get_bits1 ( gb ) << 1 ) ;
}
else {
t = get_bits ( gb , bits ) | 1 << bits ;
sign = - get_bits1 ( gb ) ;
t = ( t ^ sign ) - sign ;
}
block [ scan [ ccoef ] ] = t ;
coef_idx [ coef_count ++ ] = ccoef ;
}
}
break ;
case 1 : mode_list [ list_pos ] = 2 ;
for ( i = 0 ;
i < 3 ;
i ++ ) {
ccoef += 4 ;
coef_list [ list_end ] = ccoef ;
mode_list [ list_end ++ ] = 2 ;
}
break ;
case 3 : if ( ! bits ) {
t = 1 - ( get_bits1 ( gb ) << 1 ) ;
}
else {
t = get_bits ( gb , bits ) | 1 << bits ;
sign = - get_bits1 ( gb ) ;
t = ( t ^ sign ) - sign ;
}
block [ scan [ ccoef ] ] = t ;
coef_idx [ coef_count ++ ] = ccoef ;
coef_list [ list_pos ] = 0 ;
mode_list [ list_pos ++ ] = 0 ;
break ;
}
}
}
if ( q == - 1 ) {
quant_idx = get_bits ( gb , 4 ) ;
}
else {
quant_idx = q ;
}
quant = quant_matrices [ quant_idx ] ;
block [ 0 ] = ( block [ 0 ] * quant [ 0 ] ) >> 11 ;
for ( i = 0 ;
i < coef_count ;
i ++ ) {
int idx = coef_idx [ i ] ;
block [ scan [ idx ] ] = ( block [ scan [ idx ] ] * quant [ idx ] ) >> 11 ;
}
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_T_videoFastUpdateMB ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_T_videoFastUpdateMB , T_videoFastUpdateMB_sequence ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
SPL_METHOD ( FilesystemIterator , getFlags ) {
spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ;
if ( zend_parse_parameters_none ( ) == FAILURE ) {
return ;
}
RETURN_LONG ( intern -> flags & ( SPL_FILE_DIR_KEY_MODE_MASK | SPL_FILE_DIR_CURRENT_MODE_MASK | SPL_FILE_DIR_OTHERS_MASK ) ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
int gdev_mem_open_scan_lines ( gx_device_memory * mdev , int setup_height ) {
bool line_pointers_adjacent = true ;
ulong size ;
if ( setup_height < 0 || setup_height > mdev -> height ) return_error ( gs_error_rangecheck ) ;
if ( mdev -> bitmap_memory != 0 ) {
int align ;
if ( gdev_mem_bitmap_size ( mdev , & size ) < 0 ) return_error ( gs_error_VMerror ) ;
if ( ( uint ) size != size ) return_error ( gs_error_limitcheck ) ;
mdev -> base = gs_alloc_bytes ( mdev -> bitmap_memory , ( uint ) size , "mem_open" ) ;
if ( mdev -> base == 0 ) return_error ( gs_error_VMerror ) ;
# ifdef PACIFY_VALGRIND memset ( mdev -> base , 0x00 , size ) ;
# endif align = 1 << mdev -> log2_align_mod ;
mdev -> base += ( - ( int ) ( intptr_t ) mdev -> base ) & ( align - 1 ) ;
mdev -> foreign_bits = false ;
}
else if ( mdev -> line_pointer_memory != 0 ) {
mdev -> line_ptrs = ( byte * * ) gs_alloc_byte_array ( mdev -> line_pointer_memory , mdev -> height , sizeof ( byte * ) * ( mdev -> is_planar ? mdev -> color_info . num_components : 1 ) , "gdev_mem_open_scan_lines" ) ;
if ( mdev -> line_ptrs == 0 ) return_error ( gs_error_VMerror ) ;
mdev -> foreign_line_pointers = false ;
line_pointers_adjacent = false ;
}
if ( line_pointers_adjacent ) {
int code ;
if ( mdev -> base == 0 ) return_error ( gs_error_rangecheck ) ;
code = gdev_mem_bits_size ( mdev , mdev -> width , mdev -> height , & size ) ;
if ( code < 0 ) return code ;
mdev -> line_ptrs = ( byte * * ) ( mdev -> base + size ) ;
}
mdev -> raster = gx_device_raster ( ( gx_device * ) mdev , 1 ) ;
return gdev_mem_set_line_ptrs ( mdev , NULL , 0 , NULL , setup_height ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( SessionRestorePageLoadMetricsBrowserTest , MultipleTabsSessionRestore ) {
ui_test_utils : : NavigateToURL ( browser ( ) , GetTestURL ( ) ) ;
ui_test_utils : : NavigateToURLWithDisposition ( browser ( ) , GetTestURL ( ) , WindowOpenDisposition : : NEW_BACKGROUND_TAB , ui_test_utils : : BROWSER_TEST_WAIT_FOR_NAVIGATION ) ;
SessionRestorePaintWaiter session_restore_paint_waiter ;
Browser * new_browser = QuitBrowserAndRestore ( browser ( ) ) ;
TabStripModel * tab_strip = new_browser -> tab_strip_model ( ) ;
ASSERT_TRUE ( tab_strip ) ;
ASSERT_EQ ( 2 , tab_strip -> count ( ) ) ;
session_restore_paint_waiter . WaitForForegroundTabs ( 1 ) ;
ASSERT_NO_FATAL_FAILURE ( WaitForTabsToLoad ( new_browser ) ) ;
ExpectFirstPaintMetricsTotalCount ( 1 ) ;
}
| 0False
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.