instruction
stringclasses
1 value
input
stringlengths
31
235k
output
class label
2 classes
Categorize the following code snippet as vulnerable or not. True or False
static int handle_cgroup_settings ( struct cgroup_mount_point * mp , char * cgroup_path ) { int r , saved_errno = 0 ; char buf [ 2 ] ; mp -> need_cpuset_init = false ; if ( lxc_string_in_array ( "memory" , ( const char * * ) mp -> hierarchy -> subsystems ) ) { char * cc_path = cgroup_to_absolute_path ( mp , cgroup_path , "/memory.use_hierarchy" ) ; if ( cc_path ) { r = lxc_read_from_file ( cc_path , buf , 1 ) ; if ( r < 1 || buf [ 0 ] != '1' ) { r = lxc_write_to_file ( cc_path , "1" , 1 , false ) ; if ( r < 0 ) SYSERROR ( "failed to set memory.use_hierarchy to 1; continuing" ) ; } free ( cc_path ) ; } } if ( lxc_string_in_array ( "cpuset" , ( const char * * ) mp -> hierarchy -> subsystems ) ) { char * cc_path = cgroup_to_absolute_path ( mp , cgroup_path , "/cgroup.clone_children" ) ; struct stat sb ; if ( ! cc_path ) return - 1 ; if ( stat ( cc_path , & sb ) != 0 && errno == ENOENT ) { mp -> need_cpuset_init = true ; free ( cc_path ) ; return 0 ; } r = lxc_read_from_file ( cc_path , buf , 1 ) ; if ( r == 1 && buf [ 0 ] == '1' ) { free ( cc_path ) ; return 0 ; } r = lxc_write_to_file ( cc_path , "1" , 1 , false ) ; saved_errno = errno ; free ( cc_path ) ; errno = saved_errno ; return r < 0 ? - 1 : 0 ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int ztokenexec ( i_ctx_t * i_ctx_p ) { os_ptr op = osp ; stream * s ; scanner_state state ; check_read_file ( i_ctx_p , s , op ) ; check_estack ( 1 ) ; gs_scanner_init ( & state , op ) ; return tokenexec_continue ( i_ctx_p , & state , true ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int dissect_h225_AliasAddress ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h225_AliasAddress , AliasAddress_choice , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
float lut_interp_linear_float ( float value , float * table , size_t length ) { int upper , lower ; value = value * ( length - 1 ) ; upper = ceil ( value ) ; lower = floor ( value ) ; value = table [ upper ] * ( 1. - ( upper - value ) ) + table [ lower ] * ( upper - value ) ; return value ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static __inline__ void __swab16s ( __u16 * p ) { # ifdef __arch_swab16s __arch_swab16s ( p ) ; # else * p = __swab16p ( p ) ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const gchar * gen_olc_key ( guint16 lc_num , address * dst_addr , address * src_addr ) { return wmem_strdup_printf ( wmem_packet_scope ( ) , "%s/%s/%u" , address_to_str ( wmem_packet_scope ( ) , dst_addr ) , address_to_str ( wmem_packet_scope ( ) , src_addr ) , lc_num ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int extra_setup_location ( struct isoent * isoent , int location ) { struct extr_rec * rec ; int cnt ; cnt = 0 ; rec = isoent -> extr_rec_list . first ; isoent -> extr_rec_list . current = rec ; while ( rec ) { cnt ++ ; rec -> location = location ++ ; rec -> offset = 0 ; rec = rec -> next ; } return ( cnt ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int64_t TSMimeHdrFieldValueInt64Get ( TSMBuffer bufp , TSMLoc hdr , TSMLoc field , int idx ) { sdk_assert ( sdk_sanity_check_mbuffer ( bufp ) == TS_SUCCESS ) ; sdk_assert ( ( sdk_sanity_check_mime_hdr_handle ( hdr ) == TS_SUCCESS ) || ( sdk_sanity_check_http_hdr_handle ( hdr ) == TS_SUCCESS ) ) ; sdk_assert ( sdk_sanity_check_field_handle ( field , hdr ) == TS_SUCCESS ) ; int value_len ; const char * value_str = TSMimeFieldValueGet ( bufp , field , idx , & value_len ) ; if ( value_str == nullptr ) { return 0 ; } return mime_parse_int64 ( value_str , value_str + value_len ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void identify_locking_dependencies ( ArchiveHandle * AH , TocEntry * te ) { DumpId * lockids ; int nlockids ; int i ; if ( te -> nDeps == 0 ) return ; if ( ! ( strcmp ( te -> desc , "CONSTRAINT" ) == 0 || strcmp ( te -> desc , "CHECK CONSTRAINT" ) == 0 || strcmp ( te -> desc , "FK CONSTRAINT" ) == 0 || strcmp ( te -> desc , "RULE" ) == 0 || strcmp ( te -> desc , "TRIGGER" ) == 0 ) ) return ; lockids = ( DumpId * ) pg_malloc ( te -> nDeps * sizeof ( DumpId ) ) ; nlockids = 0 ; for ( i = 0 ; i < te -> nDeps ; i ++ ) { DumpId depid = te -> dependencies [ i ] ; if ( depid <= AH -> maxDumpId && AH -> tocsByDumpId [ depid ] != NULL && ( ( strcmp ( AH -> tocsByDumpId [ depid ] -> desc , "TABLE DATA" ) == 0 ) || strcmp ( AH -> tocsByDumpId [ depid ] -> desc , "TABLE" ) == 0 ) ) lockids [ nlockids ++ ] = depid ; } if ( nlockids == 0 ) { free ( lockids ) ; return ; } te -> lockDeps = pg_realloc ( lockids , nlockids * sizeof ( DumpId ) ) ; te -> nLockDeps = nlockids ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ProtocolHandlerRegistryTest , DisallowRegisteringExternallyHandledProtocols ) { delegate ( ) -> RegisterExternalHandler ( "test" ) ; ASSERT_FALSE ( registry ( ) -> CanSchemeBeOverridden ( "test" ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( FullscreenControllerStateUnitTest , TransitionsForEachState ) { AddTab ( browser ( ) , GURL ( url : : kAboutBlankURL ) ) ; TestTransitionsForEachState ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void save_mtu ( packet_info * pinfo , bluetooth_data_t * bluetooth_data , guint mtu ) { wmem_tree_key_t key [ 4 ] ; guint32 frame_number ; mtu_data_t * mtu_data ; frame_number = pinfo -> num ; key [ 0 ] . length = 1 ; key [ 0 ] . key = & bluetooth_data -> interface_id ; key [ 1 ] . length = 1 ; key [ 1 ] . key = & bluetooth_data -> adapter_id ; key [ 2 ] . length = 1 ; key [ 2 ] . key = & frame_number ; key [ 3 ] . length = 0 ; key [ 3 ] . key = NULL ; mtu_data = wmem_new ( wmem_file_scope ( ) , mtu_data_t ) ; mtu_data -> mtu = mtu ; wmem_tree_insert32_array ( mtus , key , mtu_data ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void show_frame ( WriterContext * w , AVFrame * frame , AVStream * stream , AVFormatContext * fmt_ctx ) { AVBPrint pbuf ; char val_str [ 128 ] ; const char * s ; int i ; av_bprint_init ( & pbuf , 1 , AV_BPRINT_SIZE_UNLIMITED ) ; writer_print_section_header ( w , SECTION_ID_FRAME ) ; s = av_get_media_type_string ( stream -> codecpar -> codec_type ) ; if ( s ) print_str ( "media_type" , s ) ; else print_str_opt ( "media_type" , "unknown" ) ; print_int ( "stream_index" , stream -> index ) ; print_int ( "key_frame" , frame -> key_frame ) ; print_ts ( "pkt_pts" , frame -> pts ) ; print_time ( "pkt_pts_time" , frame -> pts , & stream -> time_base ) ; print_ts ( "pkt_dts" , frame -> pkt_dts ) ; print_time ( "pkt_dts_time" , frame -> pkt_dts , & stream -> time_base ) ; print_ts ( "best_effort_timestamp" , frame -> best_effort_timestamp ) ; print_time ( "best_effort_timestamp_time" , frame -> best_effort_timestamp , & stream -> time_base ) ; print_duration_ts ( "pkt_duration" , frame -> pkt_duration ) ; print_duration_time ( "pkt_duration_time" , frame -> pkt_duration , & stream -> time_base ) ; if ( frame -> pkt_pos != - 1 ) print_fmt ( "pkt_pos" , "%" PRId64 , frame -> pkt_pos ) ; else print_str_opt ( "pkt_pos" , "N/A" ) ; if ( frame -> pkt_size != - 1 ) print_val ( "pkt_size" , frame -> pkt_size , unit_byte_str ) ; else print_str_opt ( "pkt_size" , "N/A" ) ; switch ( stream -> codecpar -> codec_type ) { AVRational sar ; case AVMEDIA_TYPE_VIDEO : print_int ( "width" , frame -> width ) ; print_int ( "height" , frame -> height ) ; s = av_get_pix_fmt_name ( frame -> format ) ; if ( s ) print_str ( "pix_fmt" , s ) ; else print_str_opt ( "pix_fmt" , "unknown" ) ; sar = av_guess_sample_aspect_ratio ( fmt_ctx , stream , frame ) ; if ( sar . num ) { print_q ( "sample_aspect_ratio" , sar , ':' ) ; } else { print_str_opt ( "sample_aspect_ratio" , "N/A" ) ; } print_fmt ( "pict_type" , "%c" , av_get_picture_type_char ( frame -> pict_type ) ) ; print_int ( "coded_picture_number" , frame -> coded_picture_number ) ; print_int ( "display_picture_number" , frame -> display_picture_number ) ; print_int ( "interlaced_frame" , frame -> interlaced_frame ) ; print_int ( "top_field_first" , frame -> top_field_first ) ; print_int ( "repeat_pict" , frame -> repeat_pict ) ; if ( frame -> color_range != AVCOL_RANGE_UNSPECIFIED ) print_str ( "color_range" , av_color_range_name ( frame -> color_range ) ) ; else print_str_opt ( "color_range" , av_color_range_name ( frame -> color_range ) ) ; if ( frame -> colorspace != AVCOL_SPC_UNSPECIFIED ) print_str ( "color_space" , av_color_space_name ( frame -> colorspace ) ) ; else print_str_opt ( "color_space" , av_color_space_name ( frame -> colorspace ) ) ; if ( frame -> color_primaries != AVCOL_PRI_UNSPECIFIED ) print_str ( "color_primaries" , av_color_primaries_name ( frame -> color_primaries ) ) ; else print_str_opt ( "color_primaries" , av_color_primaries_name ( frame -> color_primaries ) ) ; if ( frame -> color_trc != AVCOL_TRC_UNSPECIFIED ) print_str ( "color_transfer" , av_color_transfer_name ( frame -> color_trc ) ) ; else print_str_opt ( "color_transfer" , av_color_transfer_name ( frame -> color_trc ) ) ; if ( frame -> chroma_location != AVCHROMA_LOC_UNSPECIFIED ) print_str ( "chroma_location" , av_chroma_location_name ( frame -> chroma_location ) ) ; else print_str_opt ( "chroma_location" , av_chroma_location_name ( frame -> chroma_location ) ) ; break ; case AVMEDIA_TYPE_AUDIO : s = av_get_sample_fmt_name ( frame -> format ) ; if ( s ) print_str ( "sample_fmt" , s ) ; else print_str_opt ( "sample_fmt" , "unknown" ) ; print_int ( "nb_samples" , frame -> nb_samples ) ; print_int ( "channels" , frame -> channels ) ; if ( frame -> channel_layout ) { av_bprint_clear ( & pbuf ) ; av_bprint_channel_layout ( & pbuf , frame -> channels , frame -> channel_layout ) ; print_str ( "channel_layout" , pbuf . str ) ; } else print_str_opt ( "channel_layout" , "unknown" ) ; break ; } if ( do_show_frame_tags ) show_tags ( w , frame -> metadata , SECTION_ID_FRAME_TAGS ) ; if ( do_show_log ) show_log ( w , SECTION_ID_FRAME_LOGS , SECTION_ID_FRAME_LOG , do_show_log ) ; if ( frame -> nb_side_data ) { writer_print_section_header ( w , SECTION_ID_FRAME_SIDE_DATA_LIST ) ; for ( i = 0 ; i < frame -> nb_side_data ; i ++ ) { AVFrameSideData * sd = frame -> side_data [ i ] ; const char * name ; writer_print_section_header ( w , SECTION_ID_FRAME_SIDE_DATA ) ; name = av_frame_side_data_name ( sd -> type ) ; print_str ( "side_data_type" , name ? name : "unknown" ) ; if ( sd -> type == AV_FRAME_DATA_DISPLAYMATRIX && sd -> size >= 9 * 4 ) { writer_print_integers ( w , "displaymatrix" , sd -> data , 9 , " %11d" , 3 , 4 , 1 ) ; print_int ( "rotation" , av_display_rotation_get ( ( int32_t * ) sd -> data ) ) ; } else if ( sd -> type == AV_FRAME_DATA_GOP_TIMECODE && sd -> size >= 8 ) { char tcbuf [ AV_TIMECODE_STR_SIZE ] ; av_timecode_make_mpeg_tc_string ( tcbuf , * ( int64_t * ) ( sd -> data ) ) ; print_str ( "timecode" , tcbuf ) ; } else if ( sd -> type == AV_FRAME_DATA_MASTERING_DISPLAY_METADATA ) { AVMasteringDisplayMetadata * metadata = ( AVMasteringDisplayMetadata * ) sd -> data ; if ( metadata -> has_primaries ) { print_q ( "red_x" , metadata -> display_primaries [ 0 ] [ 0 ] , '/' ) ; print_q ( "red_y" , metadata -> display_primaries [ 0 ] [ 1 ] , '/' ) ; print_q ( "green_x" , metadata -> display_primaries [ 1 ] [ 0 ] , '/' ) ; print_q ( "green_y" , metadata -> display_primaries [ 1 ] [ 1 ] , '/' ) ; print_q ( "blue_x" , metadata -> display_primaries [ 2 ] [ 0 ] , '/' ) ; print_q ( "blue_y" , metadata -> display_primaries [ 2 ] [ 1 ] , '/' ) ; print_q ( "white_point_x" , metadata -> white_point [ 0 ] , '/' ) ; print_q ( "white_point_y" , metadata -> white_point [ 1 ] , '/' ) ; } if ( metadata -> has_luminance ) { print_q ( "min_luminance" , metadata -> min_luminance , '/' ) ; print_q ( "max_luminance" , metadata -> max_luminance , '/' ) ; } } else if ( sd -> type == AV_FRAME_DATA_CONTENT_LIGHT_LEVEL ) { AVContentLightMetadata * metadata = ( AVContentLightMetadata * ) sd -> data ; print_int ( "max_content" , metadata -> MaxCLL ) ; print_int ( "max_average" , metadata -> MaxFALL ) ; } else if ( sd -> type == AV_FRAME_DATA_ICC_PROFILE ) { AVDictionaryEntry * tag = av_dict_get ( sd -> metadata , "name" , NULL , AV_DICT_MATCH_CASE ) ; if ( tag ) print_str ( tag -> key , tag -> value ) ; print_int ( "size" , sd -> size ) ; } writer_print_section_footer ( w ) ; } writer_print_section_footer ( w ) ; } writer_print_section_footer ( w ) ; av_bprint_finalize ( & pbuf , NULL ) ; fflush ( stdout ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void U_CALLCONV _Latin1FromUnicodeWithOffsets ( UConverterFromUnicodeArgs * pArgs , UErrorCode * pErrorCode ) { UConverter * cnv ; const UChar * source , * sourceLimit ; uint8_t * target , * oldTarget ; int32_t targetCapacity , length ; int32_t * offsets ; UChar32 cp ; UChar c , max ; int32_t sourceIndex ; cnv = pArgs -> converter ; source = pArgs -> source ; sourceLimit = pArgs -> sourceLimit ; target = oldTarget = ( uint8_t * ) pArgs -> target ; targetCapacity = ( int32_t ) ( pArgs -> targetLimit - pArgs -> target ) ; offsets = pArgs -> offsets ; if ( cnv -> sharedData == & _Latin1Data ) { max = 0xff ; } else { max = 0x7f ; } cp = cnv -> fromUChar32 ; sourceIndex = cp == 0 ? 0 : - 1 ; length = ( int32_t ) ( sourceLimit - source ) ; if ( length < targetCapacity ) { targetCapacity = length ; } if ( cp != 0 && targetCapacity > 0 ) { goto getTrail ; } # if LATIN1_UNROLL_FROM_UNICODE if ( targetCapacity >= 16 ) { int32_t count , loops ; UChar u , oredChars ; loops = count = targetCapacity >> 4 ; do { oredChars = u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; oredChars |= u = * source ++ ; * target ++ = ( uint8_t ) u ; if ( oredChars > max ) { source -= 16 ; target -= 16 ; break ; } } while ( -- count > 0 ) ; count = loops - count ; targetCapacity -= 16 * count ; if ( offsets != NULL ) { oldTarget += 16 * count ; while ( count > 0 ) { * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; * offsets ++ = sourceIndex ++ ; -- count ; } } } # endif c = 0 ; while ( targetCapacity > 0 && ( c = * source ++ ) <= max ) { * target ++ = ( uint8_t ) c ; -- targetCapacity ; } if ( c > max ) { cp = c ; if ( ! U_IS_SURROGATE ( cp ) ) { } else if ( U_IS_SURROGATE_LEAD ( cp ) ) { getTrail : if ( source < sourceLimit ) { UChar trail = * source ; if ( U16_IS_TRAIL ( trail ) ) { ++ source ; cp = U16_GET_SUPPLEMENTARY ( cp , trail ) ; } else { } } else { cnv -> fromUChar32 = cp ; goto noMoreInput ; } } else { } * pErrorCode = U_IS_SURROGATE ( cp ) ? U_ILLEGAL_CHAR_FOUND : U_INVALID_CHAR_FOUND ; cnv -> fromUChar32 = cp ; } noMoreInput : if ( offsets != NULL ) { size_t count = target - oldTarget ; while ( count > 0 ) { * offsets ++ = sourceIndex ++ ; -- count ; } } if ( U_SUCCESS ( * pErrorCode ) && source < sourceLimit && target >= ( uint8_t * ) pArgs -> targetLimit ) { * pErrorCode = U_BUFFER_OVERFLOW_ERROR ; } pArgs -> source = source ; pArgs -> target = ( char * ) target ; pArgs -> offsets = offsets ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void test_bug2248 ( ) { MYSQL_STMT * stmt ; int rc ; const char * query1 = "SELECT DATABASE()" ; const char * query2 = "INSERT INTO test_bug2248 VALUES (10)" ; myheader ( "test_bug2248" ) ; rc = mysql_query ( mysql , "DROP TABLE IF EXISTS test_bug2248" ) ; myquery ( rc ) ; rc = mysql_query ( mysql , "CREATE TABLE test_bug2248 (id int)" ) ; myquery ( rc ) ; stmt = mysql_simple_prepare ( mysql , query1 ) ; check_stmt ( stmt ) ; rc = mysql_stmt_fetch ( stmt ) ; check_execute_r ( stmt , rc ) ; rc = mysql_stmt_store_result ( stmt ) ; check_execute_r ( stmt , rc ) ; mysql_stmt_close ( stmt ) ; stmt = mysql_simple_prepare ( mysql , query2 ) ; check_stmt ( stmt ) ; rc = mysql_stmt_execute ( stmt ) ; check_execute ( stmt , rc ) ; rc = mysql_stmt_fetch ( stmt ) ; DIE_UNLESS ( rc == 1 ) ; rc = mysql_stmt_store_result ( stmt ) ; check_execute ( stmt , rc ) ; rc = mysql_stmt_fetch ( stmt ) ; check_execute_r ( stmt , rc ) ; DIE_UNLESS ( rc == 1 ) ; mysql_stmt_close ( stmt ) ; rc = mysql_query ( mysql , "DROP TABLE test_bug2248" ) ; myquery ( rc ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int capture_android_bluetooth_external_parser ( char * interface , char * fifo , const char * adb_server_ip , unsigned short * adb_server_tcp_port , unsigned short * bt_server_tcp_port , unsigned int bt_forward_socket , const char * bt_local_ip , unsigned short * bt_local_tcp_port ) { struct extcap_dumper extcap_dumper ; static char buffer [ PACKET_LENGTH ] ; uint64_t * timestamp ; char * packet = buffer + BLUEDROID_TIMESTAMP_SIZE - sizeof ( own_pcap_bluetooth_h4_header ) ; own_pcap_bluetooth_h4_header * h4_header ; guint8 * payload = packet + sizeof ( own_pcap_bluetooth_h4_header ) ; const char * adb_transport = "0012" "host:transport-any" ; const char * adb_transport_serial_templace = "%04x" "host:transport:%s" ; const char * adb_tcp_bluedroid_external_parser_template = "%04x" "tcp:%05u" ; gssize length ; gssize used_buffer_length = 0 ; uint64_t ts ; socket_handle_t sock ; struct sockaddr_in server ; int captured_length ; char * serial_number = NULL ; size_t serial_number_length = 0 ; SET_DATA ( timestamp , value_u64 , buffer ) ; SET_DATA ( h4_header , value_own_pcap_bluetooth_h4_header , packet ) ; extcap_dumper = extcap_dumper_open ( fifo , EXTCAP_ENCAP_BLUETOOTH_H4_WITH_PHDR ) ; if ( is_specified_interface ( interface , INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER ) && strlen ( interface ) > strlen ( INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER ) + 1 ) { serial_number = interface + strlen ( INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER ) + 1 ; serial_number_length = strlen ( serial_number ) ; } if ( bt_forward_socket ) { if ( ( sock = socket ( AF_INET , SOCK_STREAM , IPPROTO_TCP ) ) == INVALID_SOCKET ) { errmsg_print ( "ERROR: Cannot open system TCP socket: %s" , strerror ( errno ) ) ; return EXIT_CODE_GENERIC ; } verbose_print ( "Using config: Server TCP Port=%u, Local IP=%s, Local TCP Port=%u\n" , * bt_server_tcp_port , bt_local_ip , * bt_local_tcp_port ) ; if ( * bt_local_tcp_port != 0 ) { int result ; result = adb_forward ( serial_number , adb_server_ip , adb_server_tcp_port , * bt_local_tcp_port , * bt_server_tcp_port ) ; verbose_print ( "DO: adb forward tcp:%u (local) tcp:%u (remote) result=%i\n" , * bt_local_tcp_port , * bt_server_tcp_port , result ) ; } memset ( & server , 0 , sizeof ( server ) ) ; server . sin_family = AF_INET ; server . sin_port = GINT16_TO_BE ( * bt_local_tcp_port ) ; server . sin_addr . s_addr = inet_addr ( bt_local_ip ) ; useSndTimeout ( sock ) ; if ( connect ( sock , ( struct sockaddr * ) & server , sizeof ( server ) ) == SOCKET_ERROR ) { errmsg_print ( "ERROR: <%s> Please check that adb daemon is running." , strerror ( errno ) ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } if ( verbose ) { struct sockaddr_in client ; length = sizeof ( client ) ; if ( getsockname ( sock , ( struct sockaddr * ) & client , ( socklen_t * ) & length ) ) { errmsg_print ( "ERROR getsockname: %s" , strerror ( errno ) ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } if ( length != sizeof ( client ) ) { errmsg_print ( "ERROR: incorrect length" ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } verbose_print ( "VERBOSE: Client port %u\n" , GUINT16_FROM_BE ( client . sin_port ) ) ; } } else { int result ; sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ; if ( sock == INVALID_SOCKET ) return EXIT_CODE_INVALID_SOCKET_6 ; if ( ! serial_number ) { result = adb_send ( sock , adb_transport ) ; if ( result ) { errmsg_print ( "ERROR: Error while setting adb transport" ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } } else { result = g_snprintf ( ( char * ) buffer , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ; if ( result <= 0 || result > PACKET_LENGTH ) { errmsg_print ( "ERROR: Error while completing adb packet" ) ; closesocket ( sock ) ; return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_13 ; } result = adb_send ( sock , buffer ) ; if ( result ) { errmsg_print ( "ERROR: Error while setting adb transport" ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } } result = g_snprintf ( ( char * ) buffer , PACKET_LENGTH , adb_tcp_bluedroid_external_parser_template , 4 + 5 , * bt_server_tcp_port ) ; if ( result <= 0 || result > PACKET_LENGTH ) { errmsg_print ( "ERROR: Error while completing adb packet" ) ; closesocket ( sock ) ; return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_14 ; } result = adb_send ( sock , buffer ) ; if ( result ) { errmsg_print ( "ERROR: Error while forwarding adb port" ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } } while ( endless_loop ) { errno = 0 ; length = recv ( sock , buffer + used_buffer_length , ( int ) ( PACKET_LENGTH - used_buffer_length ) , 0 ) ; if ( errno == EAGAIN # if EWOULDBLOCK != EAGAIN || errno == EWOULDBLOCK # endif ) { continue ; } else if ( errno != 0 ) { errmsg_print ( "ERROR capture: %s" , strerror ( errno ) ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } if ( length <= 0 ) { if ( bt_forward_socket ) { verbose_print ( "WARNING: Broken socket connection. Try reconnect.\n" ) ; closesocket ( sock ) ; if ( ( sock = socket ( AF_INET , SOCK_STREAM , IPPROTO_TCP ) ) == INVALID_SOCKET ) { errmsg_print ( "ERROR: %s" , strerror ( errno ) ) ; return EXIT_CODE_GENERIC ; } server . sin_family = AF_INET ; server . sin_port = GINT16_TO_BE ( * bt_local_tcp_port ) ; server . sin_addr . s_addr = inet_addr ( bt_local_ip ) ; useSndTimeout ( sock ) ; if ( connect ( sock , ( struct sockaddr * ) & server , sizeof ( server ) ) == SOCKET_ERROR ) { errmsg_print ( "ERROR reconnect: <%s> Please check that adb daemon is running." , strerror ( errno ) ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } } else { errmsg_print ( "ERROR: Broken socket connection." ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } continue ; } used_buffer_length += length ; verbose_print ( "Received: length=%" G_GSSIZE_FORMAT "\n" , length ) ; while ( ( ( payload [ BLUEDROID_H4_PACKET_TYPE ] == BLUEDROID_H4_PACKET_TYPE_HCI_CMD || payload [ BLUEDROID_H4_PACKET_TYPE ] == BLUEDROID_H4_PACKET_TYPE_SCO ) && used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + 1 && BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + payload [ BLUEDROID_H4_SIZE + 2 ] + 1 <= used_buffer_length ) || ( payload [ BLUEDROID_H4_PACKET_TYPE ] == BLUEDROID_H4_PACKET_TYPE_ACL && used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + 2 && BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + payload [ BLUEDROID_H4_SIZE + 2 ] + ( payload [ BLUEDROID_H4_SIZE + 2 + 1 ] << 8 ) + 2 <= used_buffer_length ) || ( payload [ BLUEDROID_H4_PACKET_TYPE ] == BLUEDROID_H4_PACKET_TYPE_SCO && used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + 1 && BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + payload [ BLUEDROID_H4_SIZE + 2 ] + 1 <= used_buffer_length ) || ( payload [ BLUEDROID_H4_PACKET_TYPE ] == BLUEDROID_H4_PACKET_TYPE_HCI_EVT && used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 1 + 1 && BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 1 + payload [ BLUEDROID_H4_SIZE + 1 ] + 1 <= used_buffer_length ) ) { ts = GINT64_FROM_BE ( * timestamp ) ; switch ( payload [ BLUEDROID_H4_PACKET_TYPE ] ) { case BLUEDROID_H4_PACKET_TYPE_HCI_CMD : h4_header -> direction = GINT32_TO_BE ( BLUEDROID_DIRECTION_SENT ) ; captured_length = ( unsigned int ) sizeof ( own_pcap_bluetooth_h4_header ) + payload [ 3 ] + 4 ; length = sizeof ( own_pcap_bluetooth_h4_header ) + BLUEDROID_H4_SIZE + 2 + 1 + payload [ 3 ] ; break ; case BLUEDROID_H4_PACKET_TYPE_ACL : h4_header -> direction = ( payload [ 2 ] & 0x80 ) ? GINT32_TO_BE ( BLUEDROID_DIRECTION_RECV ) : GINT32_TO_BE ( BLUEDROID_DIRECTION_SENT ) ; captured_length = ( unsigned int ) sizeof ( own_pcap_bluetooth_h4_header ) + payload [ 3 ] + ( payload [ 3 + 1 ] << 8 ) + 5 ; length = sizeof ( own_pcap_bluetooth_h4_header ) + BLUEDROID_H4_SIZE + 2 + 2 + payload [ 3 ] + ( gssize ) ( payload [ 3 + 1 ] << 8 ) ; break ; case BLUEDROID_H4_PACKET_TYPE_SCO : h4_header -> direction = ( payload [ 2 ] & 0x80 ) ? GINT32_TO_BE ( BLUEDROID_DIRECTION_RECV ) : GINT32_TO_BE ( BLUEDROID_DIRECTION_SENT ) ; captured_length = ( unsigned int ) sizeof ( own_pcap_bluetooth_h4_header ) + payload [ 3 ] + 4 ; length = sizeof ( own_pcap_bluetooth_h4_header ) + BLUEDROID_H4_SIZE + 2 + 1 + payload [ 3 ] ; break ; case BLUEDROID_H4_PACKET_TYPE_HCI_EVT : h4_header -> direction = GINT32_TO_BE ( BLUEDROID_DIRECTION_RECV ) ; captured_length = ( unsigned int ) sizeof ( own_pcap_bluetooth_h4_header ) + payload [ 2 ] + 3 ; length = sizeof ( own_pcap_bluetooth_h4_header ) + BLUEDROID_H4_SIZE + 1 + 1 + payload [ 2 ] ; break ; default : errmsg_print ( "ERROR: Invalid stream" ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } if ( verbose ) { static unsigned int id = 1 ; verbose_print ( "\t Packet %u: used_buffer_length=%" G_GSSIZE_FORMAT " length=%" G_GSSIZE_FORMAT " captured_length=%i type=0x%02x\n" , id , used_buffer_length , length , captured_length , payload [ BLUEDROID_H4_PACKET_TYPE ] ) ; if ( payload [ BLUEDROID_H4_PACKET_TYPE ] == BLUEDROID_H4_PACKET_TYPE_HCI_EVT ) verbose_print ( "\t Packet: %02x %02x %02x\n" , ( unsigned int ) payload [ 0 ] , ( unsigned int ) payload [ 1 ] , ( unsigned int ) payload [ 2 ] ) ; id += 1 ; } ts -= BLUEDROID_TIMESTAMP_BASE ; endless_loop = extcap_dumper_dump ( extcap_dumper , packet , captured_length , captured_length , ( uint32_t ) ( ts / 1000000 ) , ( ( uint32_t ) ( ts % 1000000 ) ) * 1000 ) ; used_buffer_length -= length - sizeof ( own_pcap_bluetooth_h4_header ) + BLUEDROID_TIMESTAMP_SIZE ; if ( used_buffer_length < 0 ) { errmsg_print ( "ERROR: Internal error: Negative used buffer length." ) ; closesocket ( sock ) ; return EXIT_CODE_GENERIC ; } memmove ( buffer , packet + length , used_buffer_length ) ; } } closesocket ( sock ) ; return EXIT_CODE_SUCCESS ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static PyObject * string_mod ( PyObject * v , PyObject * w ) { if ( ! PyString_Check ( v ) ) { Py_INCREF ( Py_NotImplemented ) ; return Py_NotImplemented ; } return PyString_Format ( v , w ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void vapic_reset ( DeviceState * dev ) { VAPICROMState * s = DO_UPCAST ( VAPICROMState , busdev . qdev , dev ) ; if ( s -> state == VAPIC_ACTIVE ) { s -> state = VAPIC_STANDBY ; } vapic_enable_tpr_reporting ( false ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( BrowsingDataRemoverImplTest , CompletionInhibition ) { BrowsingDataRemoverCompletionInhibitor completion_inhibitor ; BrowsingDataRemoverImpl * remover = static_cast < BrowsingDataRemoverImpl * > ( BrowsingDataRemoverFactory : : GetForBrowserContext ( GetBrowserContext ( ) ) ) ; InspectableCompletionObserver completion_observer ( remover ) ; remover -> RemoveAndReply ( base : : Time ( ) , base : : Time : : Max ( ) , BrowsingDataRemover : : REMOVE_HISTORY , BrowsingDataHelper : : UNPROTECTED_WEB , & completion_observer ) ; completion_inhibitor . BlockUntilNearCompletion ( ) ; base : : RunLoop ( ) . RunUntilIdle ( ) ; EXPECT_TRUE ( remover -> is_removing ( ) ) ; EXPECT_FALSE ( completion_observer . called ( ) ) ; completion_inhibitor . ContinueToCompletion ( ) ; completion_observer . BlockUntilCompletion ( ) ; EXPECT_FALSE ( remover -> is_removing ( ) ) ; EXPECT_TRUE ( completion_observer . called ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dissect_zcl_ota_upgradeendrsp ( tvbuff_t * tvb , proto_tree * tree , guint * offset ) { proto_tree_add_item ( tree , hf_zbee_zcl_ota_manufacturer_code , tvb , * offset , 2 , ENC_LITTLE_ENDIAN ) ; * offset += 2 ; proto_tree_add_item ( tree , hf_zbee_zcl_ota_image_type , tvb , * offset , 2 , ENC_LITTLE_ENDIAN ) ; * offset += 2 ; dissect_zcl_ota_file_version_field ( tvb , tree , offset ) ; proto_tree_add_item ( tree , hf_zbee_zcl_ota_current_time , tvb , * offset , 4 , ENC_LITTLE_ENDIAN ) ; * offset += 4 ; proto_tree_add_item ( tree , hf_zbee_zcl_ota_upgrade_time , tvb , * offset , 4 , ENC_LITTLE_ENDIAN ) ; * offset += 4 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void nameserver_read ( struct nameserver * ns ) { u8 packet [ 1500 ] ; struct sockaddr_storage ss ; socklen_t addrlen = sizeof ( ss ) ; for ( ; ; ) { const int r = recvfrom ( ns -> socket , packet , sizeof ( packet ) , 0 , ( struct sockaddr * ) & ss , & addrlen ) ; if ( r < 0 ) { int err = last_error ( ns -> socket ) ; if ( error_is_eagain ( err ) ) return ; nameserver_failed ( ns , strerror ( err ) ) ; return ; } if ( ! address_is_correct ( ns , ( struct sockaddr * ) & ss , addrlen ) ) { log ( EVDNS_LOG_WARN , "Address mismatch on received " "DNS packet." ) ; return ; } ns -> timedout = 0 ; reply_parse ( packet , r ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int vp9_pattern_search_sad ( const MACROBLOCK * x , MV * ref_mv , int search_param , int sad_per_bit , int do_init_search , int * sad_list , const vp9_variance_fn_ptr_t * vfp , int use_mvcost , const MV * center_mv , MV * best_mv , const int num_candidates [ MAX_PATTERN_SCALES ] , const MV candidates [ MAX_PATTERN_SCALES ] [ MAX_PATTERN_CANDIDATES ] ) { const MACROBLOCKD * const xd = & x -> e_mbd ; static const int search_param_to_steps [ MAX_MVSEARCH_STEPS ] = { 10 , 9 , 8 , 7 , 6 , 5 , 4 , 3 , 2 , 1 , 0 , } ; int i , s , t ; const struct buf_2d * const what = & x -> plane [ 0 ] . src ; const struct buf_2d * const in_what = & xd -> plane [ 0 ] . pre [ 0 ] ; int br , bc ; int bestsad = INT_MAX ; int thissad ; int k = - 1 ; const MV fcenter_mv = { center_mv -> row >> 3 , center_mv -> col >> 3 } ; int best_init_s = search_param_to_steps [ search_param ] ; clamp_mv ( ref_mv , x -> mv_col_min , x -> mv_col_max , x -> mv_row_min , x -> mv_row_max ) ; br = ref_mv -> row ; bc = ref_mv -> col ; if ( sad_list != NULL ) { sad_list [ 0 ] = sad_list [ 1 ] = sad_list [ 2 ] = sad_list [ 3 ] = sad_list [ 4 ] = INT_MAX ; } bestsad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , ref_mv ) , in_what -> stride ) + mvsad_err_cost ( x , ref_mv , & fcenter_mv , sad_per_bit ) ; if ( do_init_search ) { s = best_init_s ; best_init_s = - 1 ; for ( t = 0 ; t <= s ; ++ t ) { int best_site = - 1 ; if ( check_bounds ( x , br , bc , 1 << t ) ) { for ( i = 0 ; i < num_candidates [ t ] ; i ++ ) { const MV this_mv = { br + candidates [ t ] [ i ] . row , bc + candidates [ t ] [ i ] . col } ; thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } else { for ( i = 0 ; i < num_candidates [ t ] ; i ++ ) { const MV this_mv = { br + candidates [ t ] [ i ] . row , bc + candidates [ t ] [ i ] . col } ; if ( ! is_mv_in ( x , & this_mv ) ) continue ; thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } if ( best_site == - 1 ) { continue ; } else { best_init_s = t ; k = best_site ; } } if ( best_init_s != - 1 ) { br += candidates [ best_init_s ] [ k ] . row ; bc += candidates [ best_init_s ] [ k ] . col ; } } if ( best_init_s != - 1 ) { int do_sad = ( num_candidates [ 0 ] == 4 && sad_list != NULL ) ; int best_site = - 1 ; s = best_init_s ; for ( ; s >= do_sad ; s -- ) { if ( ! do_init_search || s != best_init_s ) { if ( check_bounds ( x , br , bc , 1 << s ) ) { for ( i = 0 ; i < num_candidates [ s ] ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ i ] . row , bc + candidates [ s ] [ i ] . col } ; thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } else { for ( i = 0 ; i < num_candidates [ s ] ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ i ] . row , bc + candidates [ s ] [ i ] . col } ; if ( ! is_mv_in ( x , & this_mv ) ) continue ; thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } if ( best_site == - 1 ) { continue ; } else { br += candidates [ s ] [ best_site ] . row ; bc += candidates [ s ] [ best_site ] . col ; k = best_site ; } } do { int next_chkpts_indices [ PATTERN_CANDIDATES_REF ] ; best_site = - 1 ; next_chkpts_indices [ 0 ] = ( k == 0 ) ? num_candidates [ s ] - 1 : k - 1 ; next_chkpts_indices [ 1 ] = k ; next_chkpts_indices [ 2 ] = ( k == num_candidates [ s ] - 1 ) ? 0 : k + 1 ; if ( check_bounds ( x , br , bc , 1 << s ) ) { for ( i = 0 ; i < PATTERN_CANDIDATES_REF ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ next_chkpts_indices [ i ] ] . row , bc + candidates [ s ] [ next_chkpts_indices [ i ] ] . col } ; thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } else { for ( i = 0 ; i < PATTERN_CANDIDATES_REF ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ next_chkpts_indices [ i ] ] . row , bc + candidates [ s ] [ next_chkpts_indices [ i ] ] . col } ; if ( ! is_mv_in ( x , & this_mv ) ) continue ; thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } if ( best_site != - 1 ) { k = next_chkpts_indices [ best_site ] ; br += candidates [ s ] [ k ] . row ; bc += candidates [ s ] [ k ] . col ; } } while ( best_site != - 1 ) ; } if ( s == 0 ) { sad_list [ 0 ] = bestsad ; if ( ! do_init_search || s != best_init_s ) { if ( check_bounds ( x , br , bc , 1 << s ) ) { for ( i = 0 ; i < num_candidates [ s ] ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ i ] . row , bc + candidates [ s ] [ i ] . col } ; sad_list [ i + 1 ] = thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } else { for ( i = 0 ; i < num_candidates [ s ] ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ i ] . row , bc + candidates [ s ] [ i ] . col } ; if ( ! is_mv_in ( x , & this_mv ) ) continue ; sad_list [ i + 1 ] = thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } if ( best_site != - 1 ) { br += candidates [ s ] [ best_site ] . row ; bc += candidates [ s ] [ best_site ] . col ; k = best_site ; } } while ( best_site != - 1 ) { int next_chkpts_indices [ PATTERN_CANDIDATES_REF ] ; best_site = - 1 ; next_chkpts_indices [ 0 ] = ( k == 0 ) ? num_candidates [ s ] - 1 : k - 1 ; next_chkpts_indices [ 1 ] = k ; next_chkpts_indices [ 2 ] = ( k == num_candidates [ s ] - 1 ) ? 0 : k + 1 ; sad_list [ 1 ] = sad_list [ 2 ] = sad_list [ 3 ] = sad_list [ 4 ] = INT_MAX ; sad_list [ ( ( k + 2 ) % 4 ) + 1 ] = sad_list [ 0 ] ; sad_list [ 0 ] = bestsad ; if ( check_bounds ( x , br , bc , 1 << s ) ) { for ( i = 0 ; i < PATTERN_CANDIDATES_REF ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ next_chkpts_indices [ i ] ] . row , bc + candidates [ s ] [ next_chkpts_indices [ i ] ] . col } ; sad_list [ next_chkpts_indices [ i ] + 1 ] = thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } else { for ( i = 0 ; i < PATTERN_CANDIDATES_REF ; i ++ ) { const MV this_mv = { br + candidates [ s ] [ next_chkpts_indices [ i ] ] . row , bc + candidates [ s ] [ next_chkpts_indices [ i ] ] . col } ; if ( ! is_mv_in ( x , & this_mv ) ) { sad_list [ next_chkpts_indices [ i ] + 1 ] = INT_MAX ; continue ; } sad_list [ next_chkpts_indices [ i ] + 1 ] = thissad = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; CHECK_BETTER } } if ( best_site != - 1 ) { k = next_chkpts_indices [ best_site ] ; br += candidates [ s ] [ k ] . row ; bc += candidates [ s ] [ k ] . col ; } } } } if ( sad_list ) { static const MV neighbors [ 4 ] = { { 0 , - 1 } , { 1 , 0 } , { 0 , 1 } , { - 1 , 0 } } ; if ( sad_list [ 0 ] == INT_MAX ) { sad_list [ 0 ] = bestsad ; if ( check_bounds ( x , br , bc , 1 ) ) { for ( i = 0 ; i < 4 ; i ++ ) { const MV this_mv = { br + neighbors [ i ] . row , bc + neighbors [ i ] . col } ; sad_list [ i + 1 ] = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; } } else { for ( i = 0 ; i < 4 ; i ++ ) { const MV this_mv = { br + neighbors [ i ] . row , bc + neighbors [ i ] . col } ; if ( ! is_mv_in ( x , & this_mv ) ) sad_list [ i + 1 ] = INT_MAX ; else sad_list [ i + 1 ] = vfp -> sdf ( what -> buf , what -> stride , get_buf_from_mv ( in_what , & this_mv ) , in_what -> stride ) ; } } } else { if ( use_mvcost ) { for ( i = 0 ; i < 4 ; i ++ ) { const MV this_mv = { br + neighbors [ i ] . row , bc + neighbors [ i ] . col } ; if ( sad_list [ i + 1 ] != INT_MAX ) { sad_list [ i + 1 ] += mvsad_err_cost ( x , & this_mv , & fcenter_mv , sad_per_bit ) ; } } } } } best_mv -> row = br ; best_mv -> col = bc ; return bestsad ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void PNGAPI png_set_hIST ( png_structp png_ptr , png_infop info_ptr , png_uint_16p hist ) { int i ; png_debug1 ( 1 , "in %s storage function" , "hIST" ) ; if ( png_ptr == NULL || info_ptr == NULL ) return ; if ( info_ptr -> num_palette == 0 || info_ptr -> num_palette > PNG_MAX_PALETTE_LENGTH ) { png_warning ( png_ptr , "Invalid palette size, hIST allocation skipped." ) ; return ; } # ifdef PNG_FREE_ME_SUPPORTED png_free_data ( png_ptr , info_ptr , PNG_FREE_HIST , 0 ) ; # endif png_ptr -> hist = ( png_uint_16p ) png_malloc_warn ( png_ptr , ( png_uint_32 ) ( PNG_MAX_PALETTE_LENGTH * png_sizeof ( png_uint_16 ) ) ) ; if ( png_ptr -> hist == NULL ) { png_warning ( png_ptr , "Insufficient memory for hIST chunk data." ) ; return ; } for ( i = 0 ; i < info_ptr -> num_palette ; i ++ ) png_ptr -> hist [ i ] = hist [ i ] ; info_ptr -> hist = png_ptr -> hist ; info_ptr -> valid |= PNG_INFO_hIST ; # ifdef PNG_FREE_ME_SUPPORTED info_ptr -> free_me |= PNG_FREE_HIST ; # else png_ptr -> flags |= PNG_FLAG_FREE_HIST ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
void proto_register_amf ( void ) { static hf_register_info hf [ ] = { { & hf_amf_version , { "AMF version" , "amf.version" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_header_count , { "Header count" , "amf.header_count" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_header_name , { "Name" , "amf.header.name" , FT_UINT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_header_must_understand , { "Must understand" , "amf.header.must_understand" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_header_length , { "Length" , "amf.header.length" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , # if 0 { & hf_amf_header_value_type , { "Value type" , "amf.header.value_type" , FT_UINT32 , BASE_HEX , VALS ( rtmpt_type_vals ) , 0x0 , NULL , HFILL } } , # endif { & hf_amf_message_count , { "Message count" , "amf.message_count" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_message_target_uri , { "Target URI" , "amf.message.target_uri" , FT_UINT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_message_response_uri , { "Response URI" , "amf.message.response_uri" , FT_UINT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_message_length , { "Length" , "amf.message.length" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_amf0_type , { "AMF0 type" , "amf.amf0_type" , FT_UINT8 , BASE_HEX , VALS ( amf0_type_vals ) , 0x0 , NULL , HFILL } } , { & hf_amf_amf3_type , { "AMF3 type" , "amf.amf3_type" , FT_UINT8 , BASE_HEX , VALS ( amf3_type_vals ) , 0x0 , NULL , HFILL } } , { & hf_amf_number , { "Number" , "amf.number" , FT_DOUBLE , BASE_NONE , NULL , 0x0 , "AMF number" , HFILL } } , { & hf_amf_integer , { "Integer" , "amf.integer" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "RTMPT AMF3 integer" , HFILL } } , { & hf_amf_boolean , { "Boolean" , "amf.boolean" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , "AMF boolean" , HFILL } } , { & hf_amf_stringlength , { "String length" , "amf.stringlength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF string length" , HFILL } } , { & hf_amf_string , { "String" , "amf.string" , FT_STRING , BASE_NONE , NULL , 0x0 , "AMF string" , HFILL } } , { & hf_amf_string_reference , { "String reference" , "amf.string_reference" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "RTMPT AMF3 string reference" , HFILL } } , { & hf_amf_object_reference , { "Object reference" , "amf.object_reference" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF object reference" , HFILL } } , { & hf_amf_date , { "Date" , "amf.date" , FT_ABSOLUTE_TIME , ABSOLUTE_TIME_LOCAL , NULL , 0x0 , "AMF date" , HFILL } } , # if 0 { & hf_amf_longstringlength , { "String length" , "amf.longstringlength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF long string length" , HFILL } } , # endif { & hf_amf_longstring , { "Long string" , "amf.longstring" , FT_STRING , BASE_NONE , NULL , 0x0 , "AMF long string" , HFILL } } , { & hf_amf_xml_doc , { "XML document" , "amf.xml_doc" , FT_STRING , BASE_NONE , NULL , 0x0 , "AMF XML document" , HFILL } } , { & hf_amf_xmllength , { "XML text length" , "amf.xmllength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF E4X XML length" , HFILL } } , { & hf_amf_xml , { "XML" , "amf.xml" , FT_STRING , BASE_NONE , NULL , 0x0 , "AMF E4X XML" , HFILL } } , { & hf_amf_int64 , { "Int64" , "amf.int64" , FT_INT64 , BASE_DEC , NULL , 0x0 , "AMF int64" , HFILL } } , { & hf_amf_bytearraylength , { "ByteArray length" , "amf.bytearraylength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "RTMPT AMF3 ByteArray length" , HFILL } } , { & hf_amf_bytearray , { "ByteArray" , "amf.bytearray" , FT_BYTES , BASE_NONE , NULL , 0x0 , "RTMPT AMF3 ByteArray" , HFILL } } , { & hf_amf_object , { "Object" , "amf.object" , FT_NONE , BASE_NONE , NULL , 0x0 , "AMF object" , HFILL } } , { & hf_amf_traitcount , { "Trait count" , "amf.traitcount" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF count of traits for an object" , HFILL } } , { & hf_amf_classnamelength , { "Class name length" , "amf.classnamelength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF class name length" , HFILL } } , { & hf_amf_classname , { "Class name" , "amf.classname" , FT_STRING , BASE_NONE , NULL , 0x0 , "AMF class name" , HFILL } } , { & hf_amf_membernamelength , { "Member name length" , "amf.membernamelength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF member name length" , HFILL } } , { & hf_amf_membername , { "Member name" , "amf.membername" , FT_STRING , BASE_NONE , NULL , 0x0 , "AMF member name" , HFILL } } , { & hf_amf_trait_reference , { "Trait reference" , "amf.trait_reference" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF trait reference" , HFILL } } , { & hf_amf_ecmaarray , { "ECMA array" , "amf.ecmaarray" , FT_NONE , BASE_NONE , NULL , 0x0 , "AMF ECMA array" , HFILL } } , { & hf_amf_strictarray , { "Strict array" , "amf.strictarray" , FT_NONE , BASE_NONE , NULL , 0x0 , "AMF strict array" , HFILL } } , { & hf_amf_array , { "Array" , "amf.array" , FT_NONE , BASE_NONE , NULL , 0x0 , "RTMPT AMF3 array" , HFILL } } , { & hf_amf_arraylength , { "Array length" , "amf.arraylength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF array length" , HFILL } } , { & hf_amf_arraydenselength , { "Length of dense portion" , "amf.arraydenselength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "AMF length of dense portion of array" , HFILL } } , { & hf_amf_end_of_object_marker , { "End Of Object Marker" , "amf.end_of_object_marker" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_end_of_associative_part , { "End of associative part" , "amf.end_of_associative_part" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_amf_end_of_dynamic_members , { "End Of dynamic members" , "amf.end_of_dynamic_members" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , } ; static gint * ett [ ] = { & ett_amf , & ett_amf_headers , & ett_amf_messages , & ett_amf_value , & ett_amf_property , & ett_amf_string , & ett_amf_array_element , & ett_amf_traits , & ett_amf_trait_member , } ; proto_amf = proto_register_protocol ( "Action Message Format" , "AMF" , "amf" ) ; proto_register_field_array ( proto_amf , hf , array_length ( hf ) ) ; proto_register_subtree_array ( ett , array_length ( ett ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int parse_CNatLanguageRestriction ( tvbuff_t * tvb , int offset , proto_tree * parent_tree , proto_tree * pad_tree , struct CNatLanguageRestriction * v , const char * fmt , ... ) { proto_tree * tree ; proto_item * item ; va_list ap ; guint32 cc ; const char * txt ; va_start ( ap , fmt ) ; txt = wmem_strdup_vprintf ( wmem_packet_scope ( ) , fmt , ap ) ; va_end ( ap ) ; tree = proto_tree_add_subtree ( parent_tree , tvb , offset , 0 , ett_CNatLanguageRestriction , & item , txt ) ; offset = parse_CFullPropSpec ( tvb , offset , tree , pad_tree , & v -> property , "Property" ) ; offset = parse_padding ( tvb , offset , 4 , pad_tree , "padding_cc" ) ; cc = tvb_get_letohl ( tvb , offset ) ; proto_tree_add_uint ( tree , hf_mswsp_natlangrestrict_cc , tvb , offset , 4 , cc ) ; offset += 4 ; proto_tree_add_item_ret_string ( tree , hf_mswsp_natlangrestrict_phrase , tvb , offset , 2 * cc , ENC_LITTLE_ENDIAN | ENC_UCS_2 , wmem_packet_scope ( ) , & v -> phrase ) ; offset += 2 * cc ; offset = parse_padding ( tvb , offset , 4 , pad_tree , "padding_lcid" ) ; v -> lcid = tvb_get_letohl ( tvb , offset ) ; offset = parse_lcid ( tvb , offset , tree , "lcid" ) ; proto_item_set_end ( item , tvb , offset ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int find_partition ( BlockBackend * blk , int partition , off_t * offset , off_t * size ) { struct partition_record mbr [ 4 ] ; uint8_t data [ MBR_SIZE ] ; int i ; int ext_partnum = 4 ; int ret ; ret = blk_pread ( blk , 0 , data , sizeof ( data ) ) ; if ( ret < 0 ) { error_report ( "error while reading: %s" , strerror ( - ret ) ) ; exit ( EXIT_FAILURE ) ; } if ( data [ 510 ] != 0x55 || data [ 511 ] != 0xaa ) { return - EINVAL ; } for ( i = 0 ; i < 4 ; i ++ ) { read_partition ( & data [ 446 + 16 * i ] , & mbr [ i ] ) ; if ( ! mbr [ i ] . system || ! mbr [ i ] . nb_sectors_abs ) { continue ; } if ( mbr [ i ] . system == 0xF || mbr [ i ] . system == 0x5 ) { struct partition_record ext [ 4 ] ; uint8_t data1 [ MBR_SIZE ] ; int j ; ret = blk_pread ( blk , mbr [ i ] . start_sector_abs * MBR_SIZE , data1 , sizeof ( data1 ) ) ; if ( ret < 0 ) { error_report ( "error while reading: %s" , strerror ( - ret ) ) ; exit ( EXIT_FAILURE ) ; } for ( j = 0 ; j < 4 ; j ++ ) { read_partition ( & data1 [ 446 + 16 * j ] , & ext [ j ] ) ; if ( ! ext [ j ] . system || ! ext [ j ] . nb_sectors_abs ) { continue ; } if ( ( ext_partnum + j + 1 ) == partition ) { * offset = ( uint64_t ) ext [ j ] . start_sector_abs << 9 ; * size = ( uint64_t ) ext [ j ] . nb_sectors_abs << 9 ; return 0 ; } } ext_partnum += 4 ; } else if ( ( i + 1 ) == partition ) { * offset = ( uint64_t ) mbr [ i ] . start_sector_abs << 9 ; * size = ( uint64_t ) mbr [ i ] . nb_sectors_abs << 9 ; return 0 ; } } return - ENOENT ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const char * cmd_upload_dir ( cmd_parms * cmd , void * _dcfg , const char * p1 ) { directory_config * dcfg = ( directory_config * ) _dcfg ; if ( dcfg == NULL ) return NULL ; if ( strcasecmp ( p1 , "none" ) == 0 ) dcfg -> upload_dir = NULL ; else dcfg -> upload_dir = ap_server_root_relative ( cmd -> pool , p1 ) ; return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExtensionServiceSyncTest , ProcessSyncDataNewExtension ) { InitializeEmptyExtensionService ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; const base : : FilePath path = data_dir ( ) . AppendASCII ( "good.crx" ) ; const ExtensionPrefs * prefs = ExtensionPrefs : : Get ( profile ( ) ) ; struct TestCase { const char * name ; bool sync_enabled ; int sync_disable_reasons ; int expect_disable_reasons ; bool expect_permissions_granted ; } test_cases [ ] = { { "Standard" , true , 0 , 0 , true } , { "Disabled" , false , extensions : : disable_reason : : DISABLE_USER_ACTION , extensions : : disable_reason : : DISABLE_USER_ACTION , true } , { "Legacy" , false , - 1 , extensions : : disable_reason : : DISABLE_USER_ACTION , true } , { "PermissionsIncrease" , false , extensions : : disable_reason : : DISABLE_PERMISSIONS_INCREASE , extensions : : disable_reason : : DISABLE_PERMISSIONS_INCREASE , false } , } ; for ( const TestCase & test_case : test_cases ) { SCOPED_TRACE ( test_case . name ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( good_crx ) ; ext_specifics -> set_version ( base : : Version ( "1" ) . GetString ( ) ) ; ext_specifics -> set_enabled ( test_case . sync_enabled ) ; if ( test_case . sync_disable_reasons != - 1 ) ext_specifics -> set_disable_reasons ( test_case . sync_disable_reasons ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; ASSERT_TRUE ( service ( ) -> pending_extension_manager ( ) -> IsIdPending ( good_crx ) ) ; UpdateExtension ( good_crx , path , test_case . sync_enabled ? ENABLED : DISABLED ) ; EXPECT_EQ ( test_case . expect_disable_reasons , prefs -> GetDisableReasons ( good_crx ) ) ; std : : unique_ptr < const PermissionSet > permissions = prefs -> GetGrantedPermissions ( good_crx ) ; EXPECT_EQ ( test_case . expect_permissions_granted , ! permissions -> IsEmpty ( ) ) ; ASSERT_FALSE ( service ( ) -> pending_extension_manager ( ) -> IsIdPending ( good_crx ) ) ; UninstallExtension ( good_crx , false , test_case . sync_enabled ? Extension : : ENABLED : Extension : : DISABLED ) ; } } TEST_F ( ExtensionServiceSyncTest , ProcessSyncDataTerminatedExtension ) { InitializeExtensionServiceWithUpdater ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; InstallCRX ( data_dir ( ) . AppendASCII ( "good.crx" ) , INSTALL_NEW ) ; TerminateExtension ( good_crx ) ; EXPECT_TRUE ( service ( ) -> IsExtensionEnabled ( good_crx ) ) ; EXPECT_FALSE ( extensions : : util : : IsIncognitoEnabled ( good_crx , profile ( ) ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( good_crx ) ; ext_specifics -> set_version ( service ( ) -> GetInstalledExtension ( good_crx ) -> version ( ) -> GetString ( ) ) ; ext_specifics -> set_enabled ( false ) ; ext_specifics -> set_incognito_enabled ( true ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_FALSE ( service ( ) -> IsExtensionEnabled ( good_crx ) ) ; EXPECT_TRUE ( extensions : : util : : IsIncognitoEnabled ( good_crx , profile ( ) ) ) ; EXPECT_FALSE ( service ( ) -> pending_extension_manager ( ) -> IsIdPending ( good_crx ) ) ; } TEST_F ( ExtensionServiceSyncTest , ProcessSyncDataVersionCheck ) { InitializeExtensionServiceWithUpdater ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; InstallCRX ( data_dir ( ) . AppendASCII ( "good.crx" ) , INSTALL_NEW ) ; EXPECT_TRUE ( service ( ) -> IsExtensionEnabled ( good_crx ) ) ; EXPECT_FALSE ( extensions : : util : : IsIncognitoEnabled ( good_crx , profile ( ) ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( good_crx ) ; ext_specifics -> set_enabled ( true ) ; const base : : Version installed_version = * service ( ) -> GetInstalledExtension ( good_crx ) -> version ( ) ; { ext_specifics -> set_version ( installed_version . GetString ( ) ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_FALSE ( service ( ) -> updater ( ) -> WillCheckSoon ( ) ) ; syncer : : SyncDataList data = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( 1u , data . size ( ) ) ; std : : unique_ptr < ExtensionSyncData > extension_data = ExtensionSyncData : : CreateFromSyncData ( data [ 0 ] ) ; ASSERT_TRUE ( extension_data ) ; EXPECT_EQ ( installed_version , extension_data -> version ( ) ) ; } { ext_specifics -> set_version ( "0.0.0.0" ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_FALSE ( service ( ) -> updater ( ) -> WillCheckSoon ( ) ) ; syncer : : SyncDataList data = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( 1u , data . size ( ) ) ; std : : unique_ptr < ExtensionSyncData > extension_data = ExtensionSyncData : : CreateFromSyncData ( data [ 0 ] ) ; ASSERT_TRUE ( extension_data ) ; EXPECT_EQ ( installed_version , extension_data -> version ( ) ) ; } { const base : : Version new_version ( "9.9.9.9" ) ; ext_specifics -> set_version ( new_version . GetString ( ) ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_TRUE ( service ( ) -> updater ( ) -> WillCheckSoon ( ) ) ; syncer : : SyncDataList data = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( 1u , data . size ( ) ) ; std : : unique_ptr < ExtensionSyncData > extension_data = ExtensionSyncData : : CreateFromSyncData ( data [ 0 ] ) ; ASSERT_TRUE ( extension_data ) ; EXPECT_EQ ( new_version , extension_data -> version ( ) ) ; } EXPECT_FALSE ( service ( ) -> pending_extension_manager ( ) -> IsIdPending ( good_crx ) ) ; } TEST_F ( ExtensionServiceSyncTest , ProcessSyncDataNotInstalled ) { InitializeExtensionServiceWithUpdater ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( good_crx ) ; ext_specifics -> set_enabled ( false ) ; ext_specifics -> set_incognito_enabled ( true ) ; ext_specifics -> set_update_url ( "http://www.google.com/" ) ; ext_specifics -> set_version ( "1.2.3.4" ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; EXPECT_TRUE ( service ( ) -> IsExtensionEnabled ( good_crx ) ) ; EXPECT_FALSE ( extensions : : util : : IsIncognitoEnabled ( good_crx , profile ( ) ) ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_TRUE ( service ( ) -> updater ( ) -> WillCheckSoon ( ) ) ; EXPECT_FALSE ( service ( ) -> IsExtensionEnabled ( good_crx ) ) ; EXPECT_TRUE ( extensions : : util : : IsIncognitoEnabled ( good_crx , profile ( ) ) ) ; const extensions : : PendingExtensionInfo * info ; EXPECT_TRUE ( ( info = service ( ) -> pending_extension_manager ( ) -> GetById ( good_crx ) ) ) ; EXPECT_EQ ( ext_specifics -> update_url ( ) , info -> update_url ( ) . spec ( ) ) ; EXPECT_TRUE ( info -> is_from_sync ( ) ) ; EXPECT_EQ ( Manifest : : INTERNAL , info -> install_source ( ) ) ; } TEST_F ( ExtensionServiceSyncTest , ProcessSyncDataEnableDisable ) { InitializeEmptyExtensionService ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; const ExtensionPrefs * prefs = ExtensionPrefs : : Get ( profile ( ) ) ; struct TestCase { const char * name ; int previous_disable_reasons ; bool sync_enable ; int sync_disable_reasons ; int expect_disable_reasons ; } test_cases [ ] = { { "NopEnable" , 0 , true , 0 , 0 } , { "NopDisable" , extensions : : disable_reason : : DISABLE_USER_ACTION , false , extensions : : disable_reason : : DISABLE_USER_ACTION , extensions : : disable_reason : : DISABLE_USER_ACTION } , { "Enable" , extensions : : disable_reason : : DISABLE_USER_ACTION , true , 0 , 0 } , { "Disable" , 0 , false , extensions : : disable_reason : : DISABLE_USER_ACTION , extensions : : disable_reason : : DISABLE_USER_ACTION } , { "AddDisableReason" , extensions : : disable_reason : : DISABLE_REMOTE_INSTALL , false , extensions : : disable_reason : : DISABLE_REMOTE_INSTALL | extensions : : disable_reason : : DISABLE_USER_ACTION , extensions : : disable_reason : : DISABLE_REMOTE_INSTALL | extensions : : disable_reason : : DISABLE_USER_ACTION } , { "RemoveDisableReason" , extensions : : disable_reason : : DISABLE_REMOTE_INSTALL | extensions : : disable_reason : : DISABLE_USER_ACTION , false , extensions : : disable_reason : : DISABLE_USER_ACTION , extensions : : disable_reason : : DISABLE_USER_ACTION } , { "PreserveLocalDisableReason" , extensions : : disable_reason : : DISABLE_RELOAD , true , 0 , extensions : : disable_reason : : DISABLE_RELOAD } , { "PreserveOnlyLocalDisableReason" , extensions : : disable_reason : : DISABLE_USER_ACTION | extensions : : disable_reason : : DISABLE_RELOAD , true , 0 , extensions : : disable_reason : : DISABLE_RELOAD } , { "M44Enable" , extensions : : disable_reason : : DISABLE_USER_ACTION , true , - 1 , 0 } , { "M44ReEnable" , extensions : : disable_reason : : DISABLE_USER_ACTION , true , extensions : : disable_reason : : DISABLE_USER_ACTION , 0 } , { "M44Disable" , 0 , false , - 1 , extensions : : disable_reason : : DISABLE_USER_ACTION } , { "M44ReDisable" , 0 , false , 0 , extensions : : disable_reason : : DISABLE_USER_ACTION } , { "M44AlreadyDisabledByUser" , extensions : : disable_reason : : DISABLE_USER_ACTION , false , - 1 , extensions : : disable_reason : : DISABLE_USER_ACTION } , { "M44AlreadyDisabledWithOtherReason" , extensions : : disable_reason : : DISABLE_REMOTE_INSTALL , false , - 1 , extensions : : disable_reason : : DISABLE_REMOTE_INSTALL | extensions : : disable_reason : : DISABLE_USER_ACTION } , } ; for ( const TestCase & test_case : test_cases ) { SCOPED_TRACE ( test_case . name ) ; std : : string id ; std : : string version ; { const Extension * extension = InstallCRX ( data_dir ( ) . AppendASCII ( "good.crx" ) , INSTALL_NEW ) ; ASSERT_TRUE ( extension ) ; id = extension -> id ( ) ; version = extension -> VersionString ( ) ; } ASSERT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; if ( test_case . previous_disable_reasons ) { service ( ) -> DisableExtension ( id , test_case . previous_disable_reasons ) ; ASSERT_TRUE ( registry ( ) -> disabled_extensions ( ) . Contains ( id ) ) ; } sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_enabled ( test_case . sync_enable ) ; ext_specifics -> set_version ( version ) ; if ( test_case . sync_disable_reasons != - 1 ) ext_specifics -> set_disable_reasons ( test_case . sync_disable_reasons ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; const bool expect_enabled = ! test_case . expect_disable_reasons ; EXPECT_EQ ( expect_enabled , service ( ) -> IsExtensionEnabled ( id ) ) ; EXPECT_EQ ( test_case . expect_disable_reasons , prefs -> GetDisableReasons ( id ) ) ; UninstallExtension ( id , false , expect_enabled ? Extension : : ENABLED : Extension : : DISABLED ) ; } } TEST_F ( ExtensionServiceSyncTest , ProcessSyncDataDeferredEnable ) { base : : CommandLine : : ForCurrentProcess ( ) -> AppendSwitchASCII ( switches : : kAppsGalleryUpdateURL , "http://localhost/autoupdate/updates.xml" ) ; InitializeEmptyExtensionService ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; base : : FilePath base_path = data_dir ( ) . AppendASCII ( "permissions_increase" ) ; base : : FilePath pem_path = base_path . AppendASCII ( "permissions.pem" ) ; base : : FilePath path = base_path . AppendASCII ( "v1" ) ; const Extension * extension = PackAndInstallCRX ( path , pem_path , INSTALL_NEW ) ; ASSERT_TRUE ( extension ) ; ASSERT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( extension -> id ( ) ) ) ; std : : string id = extension -> id ( ) ; path = base_path . AppendASCII ( "v2" ) ; PackCRXAndUpdateExtension ( id , path , pem_path , DISABLED ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_version ( "3" ) ; ext_specifics -> set_enabled ( true ) ; ext_specifics -> set_disable_reasons ( extensions : : disable_reason : : DISABLE_NONE ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_TRUE ( registry ( ) -> disabled_extensions ( ) . Contains ( id ) ) ; path = base_path . AppendASCII ( "v3" ) ; PackCRXAndUpdateExtension ( id , path , pem_path , ENABLED ) ; } class ExtensionServiceSyncCustomGalleryTest : public ExtensionServiceSyncTest { public : void SetUp ( ) override { ExtensionServiceSyncTest : : SetUp ( ) ; base : : CommandLine : : ForCurrentProcess ( ) -> AppendSwitchASCII ( switches : : kAppsGalleryUpdateURL , "http://localhost/autoupdate/updates.xml" ) ; } } ; TEST_F ( ExtensionServiceSyncCustomGalleryTest , ProcessSyncDataPermissionApproval ) { InitializeEmptyExtensionService ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; const base : : FilePath base_path = data_dir ( ) . AppendASCII ( "permissions_increase" ) ; const base : : FilePath pem_path = base_path . AppendASCII ( "permissions.pem" ) ; const base : : FilePath path_v1 = base_path . AppendASCII ( "v1" ) ; const base : : FilePath path_v2 = base_path . AppendASCII ( "v2" ) ; base : : ScopedTempDir crx_dir ; ASSERT_TRUE ( crx_dir . CreateUniqueTempDir ( ) ) ; const base : : FilePath crx_path_v1 = crx_dir . GetPath ( ) . AppendASCII ( "temp1.crx" ) ; PackCRX ( path_v1 , pem_path , crx_path_v1 ) ; const base : : FilePath crx_path_v2 = crx_dir . GetPath ( ) . AppendASCII ( "temp2.crx" ) ; PackCRX ( path_v2 , pem_path , crx_path_v2 ) ; const std : : string v1 ( "1" ) ; const std : : string v2 ( "2" ) ; const ExtensionPrefs * prefs = ExtensionPrefs : : Get ( profile ( ) ) ; struct TestCase { const char * name ; const std : : string & sync_version ; int sync_disable_reasons ; int expect_disable_reasons ; bool expect_permissions_granted ; } test_cases [ ] = { { "OldVersion" , v1 , 0 , extensions : : disable_reason : : DISABLE_PERMISSIONS_INCREASE , false } , { "Legacy" , v2 , - 1 , extensions : : disable_reason : : DISABLE_PERMISSIONS_INCREASE , false } , { "GrantPermissions" , v2 , 0 , extensions : : disable_reason : : DISABLE_NONE , true } , } ; for ( const TestCase & test_case : test_cases ) { SCOPED_TRACE ( test_case . name ) ; std : : string id ; { const Extension * extension = InstallCRX ( crx_path_v1 , INSTALL_NEW ) ; ASSERT_TRUE ( extension ) ; ASSERT_EQ ( v1 , extension -> VersionString ( ) ) ; id = extension -> id ( ) ; } ASSERT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; std : : unique_ptr < const PermissionSet > granted_permissions_v1 = prefs -> GetGrantedPermissions ( id ) ; UpdateExtension ( id , crx_path_v2 , DISABLED ) ; { const Extension * extension = registry ( ) -> disabled_extensions ( ) . GetByID ( id ) ; ASSERT_TRUE ( extension ) ; ASSERT_EQ ( v2 , extension -> VersionString ( ) ) ; } ASSERT_TRUE ( prefs -> HasDisableReason ( id , extensions : : disable_reason : : DISABLE_PERMISSIONS_INCREASE ) ) ; std : : unique_ptr < const PermissionSet > granted_permissions_v2 = prefs -> GetGrantedPermissions ( id ) ; ASSERT_EQ ( * granted_permissions_v1 , * granted_permissions_v2 ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_enabled ( true ) ; ext_specifics -> set_version ( test_case . sync_version ) ; if ( test_case . sync_disable_reasons != - 1 ) ext_specifics -> set_disable_reasons ( test_case . sync_disable_reasons ) ; SyncChangeList list = MakeSyncChangeList ( good_crx , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; const bool expect_enabled = ! test_case . expect_disable_reasons ; EXPECT_EQ ( expect_enabled , service ( ) -> IsExtensionEnabled ( id ) ) ; EXPECT_EQ ( test_case . expect_disable_reasons , prefs -> GetDisableReasons ( id ) ) ; std : : unique_ptr < const PermissionSet > granted_permissions = prefs -> GetGrantedPermissions ( id ) ; if ( test_case . expect_permissions_granted ) { std : : unique_ptr < const PermissionSet > active_permissions = prefs -> GetActivePermissions ( id ) ; EXPECT_EQ ( * granted_permissions , * active_permissions ) ; } else { EXPECT_EQ ( * granted_permissions , * granted_permissions_v1 ) ; } UninstallExtension ( id , false , expect_enabled ? Extension : : ENABLED : Extension : : DISABLED ) ; } } TEST_F ( ExtensionServiceSyncTest , DontSyncThemes ) { InitializeEmptyExtensionService ( ) ; ProfileSyncServiceFactory : : GetForProfile ( profile ( ) ) -> SetFirstSetupComplete ( ) ; extension_sync_service ( ) ; service ( ) -> Init ( ) ; ASSERT_TRUE ( service ( ) -> is_ready ( ) ) ; syncer : : FakeSyncChangeProcessor * processor = new syncer : : FakeSyncChangeProcessor ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : WrapUnique ( processor ) , base : : WrapUnique ( new syncer : : SyncErrorFactoryMock ) ) ; processor -> changes ( ) . clear ( ) ; InstallCRX ( data_dir ( ) . AppendASCII ( "good.crx" ) , INSTALL_NEW ) ; EXPECT_EQ ( 1u , processor -> changes ( ) . size ( ) ) ; processor -> changes ( ) . clear ( ) ; InstallCRX ( data_dir ( ) . AppendASCII ( "theme.crx" ) , INSTALL_NEW ) ; content : : WindowedNotificationObserver theme_change_observer ( chrome : : NOTIFICATION_BROWSER_THEME_CHANGED , content : : Source < ThemeService > ( ThemeServiceFactory : : GetForProfile ( profile ( ) ) ) ) ; theme_change_observer . Wait ( ) ; EXPECT_TRUE ( processor -> changes ( ) . empty ( ) ) ; } # if BUILDFLAG ( ENABLE_SUPERVISED_USERS ) class ExtensionServiceTestSupervised : public ExtensionServiceSyncCustomGalleryTest , public SupervisedUserService : : Delegate { public : ExtensionServiceTestSupervised ( ) : field_trial_list_ ( base : : MakeUnique < base : : MockEntropyProvider > ( ) ) { } void TearDown ( ) override { supervised_user_service ( ) -> SetDelegate ( nullptr ) ; ExtensionServiceSyncCustomGalleryTest : : TearDown ( ) ; } protected : void InitSupervisedUserInitiatedExtensionInstallFeature ( bool enabled ) { if ( enabled ) { scoped_feature_list_ . InitAndEnableFeature ( supervised_users : : kSupervisedUserInitiatedExtensionInstall ) ; } } bool IsPendingCustodianApproval ( const std : : string & extension_id ) { auto function = make_scoped_refptr ( new WebstorePrivateIsPendingCustodianApprovalFunction ( ) ) ; std : : unique_ptr < base : : Value > result ( RunFunctionAndReturnSingleResult ( function . get ( ) , "[\"" + extension_id + "\"]" , browser_context ( ) ) ) ; bool copy_bool_result = false ; EXPECT_TRUE ( result -> GetAsBoolean ( & copy_bool_result ) ) ; return copy_bool_result ; } void InitServices ( bool profile_is_supervised ) { ExtensionServiceInitParams params = CreateDefaultInitParams ( ) ; params . profile_is_supervised = profile_is_supervised ; if ( profile_is_supervised ) { params . pref_file = base : : FilePath ( ) ; } InitializeExtensionService ( params ) ; StartSyncing ( syncer : : EXTENSIONS ) ; supervised_user_service ( ) -> SetDelegate ( this ) ; supervised_user_service ( ) -> Init ( ) ; } std : : string InstallPermissionsTestExtension ( bool by_custodian ) { return InstallTestExtension ( permissions_increase , dir_path ( "1" ) , pem_path ( ) , by_custodian ) ; } void UpdatePermissionsTestExtension ( const std : : string & id , const std : : string & version , UpdateState expected_state ) { UpdateTestExtension ( dir_path ( version ) , pem_path ( ) , id , version , expected_state ) ; } std : : string InstallNoPermissionsTestExtension ( bool by_custodian ) { base : : FilePath base_path = data_dir ( ) . AppendASCII ( "autoupdate" ) ; base : : FilePath pem_path = base_path . AppendASCII ( "key.pem" ) ; base : : FilePath dir_path = base_path . AppendASCII ( "v1" ) ; return InstallTestExtension ( autoupdate , dir_path , pem_path , by_custodian ) ; } void UpdateNoPermissionsTestExtension ( const std : : string & id , const std : : string & version , UpdateState expected_state ) { base : : FilePath base_path = data_dir ( ) . AppendASCII ( "autoupdate" ) ; base : : FilePath pem_path = base_path . AppendASCII ( "key.pem" ) ; base : : FilePath dir_path = base_path . AppendASCII ( "v" + version ) ; UpdateTestExtension ( dir_path , pem_path , id , version , expected_state ) ; } std : : string InstallTestExtension ( const std : : string & id , const base : : FilePath & dir_path , const base : : FilePath & pem_path , bool by_custodian ) { InstallState expected_state = INSTALL_WITHOUT_LOAD ; if ( by_custodian ) { extensions : : util : : SetWasInstalledByCustodian ( id , profile ( ) , true ) ; expected_state = INSTALL_NEW ; } const Extension * extension = PackAndInstallCRX ( dir_path , pem_path , expected_state ) ; EXPECT_TRUE ( extension ) ; EXPECT_EQ ( extension -> id ( ) , id ) ; if ( by_custodian ) { EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; } else { CheckDisabledForCustodianApproval ( id ) ; } EXPECT_EQ ( * extension -> version ( ) , base : : Version ( "1" ) ) ; return id ; } void UpdateTestExtension ( const base : : FilePath & dir_path , const base : : FilePath & pem_path , const std : : string & id , const std : : string & version , const UpdateState & expected_state ) { PackCRXAndUpdateExtension ( id , dir_path , pem_path , expected_state ) ; const Extension * extension = registry ( ) -> GetInstalledExtension ( id ) ; ASSERT_TRUE ( extension ) ; EXPECT_EQ ( * extension -> version ( ) , base : : Version ( version ) ) ; } void SimulateCustodianApprovalChangeViaSync ( const std : : string & extension_id , const std : : string & version , SyncChange : : SyncChangeType type ) { std : : string key = SupervisedUserSettingsService : : MakeSplitSettingKey ( supervised_users : : kApprovedExtensions , extension_id ) ; syncer : : SyncData sync_data = SupervisedUserSettingsService : : CreateSyncDataForSetting ( key , base : : Value ( version ) ) ; SyncChangeList list ( 1 , SyncChange ( FROM_HERE , type , sync_data ) ) ; SupervisedUserSettingsService * supervised_user_settings_service = SupervisedUserSettingsServiceFactory : : GetForProfile ( profile ( ) ) ; supervised_user_settings_service -> ProcessSyncChanges ( FROM_HERE , list ) ; } void CheckDisabledForCustodianApproval ( const std : : string & extension_id ) { EXPECT_TRUE ( registry ( ) -> disabled_extensions ( ) . Contains ( extension_id ) ) ; ExtensionPrefs * extension_prefs = ExtensionPrefs : : Get ( profile ( ) ) ; EXPECT_TRUE ( extension_prefs -> HasDisableReason ( extension_id , extensions : : disable_reason : : DISABLE_CUSTODIAN_APPROVAL_REQUIRED ) ) ; } SupervisedUserService * supervised_user_service ( ) { return SupervisedUserServiceFactory : : GetForProfile ( profile ( ) ) ; } static std : : string RequestId ( const std : : string & extension_id , const std : : string & version ) { return SupervisedUserService : : GetExtensionRequestId ( extension_id , base : : Version ( version ) ) ; } private : bool SetActive ( bool active ) override { return true ; } base : : FilePath base_path ( ) const { return data_dir ( ) . AppendASCII ( "permissions_increase" ) ; } base : : FilePath dir_path ( const std : : string & version ) const { return base_path ( ) . AppendASCII ( "v" + version ) ; } base : : FilePath pem_path ( ) const { return base_path ( ) . AppendASCII ( "permissions.pem" ) ; } base : : FieldTrialList field_trial_list_ ; base : : test : : ScopedFeatureList scoped_feature_list_ ; } ; class MockPermissionRequestCreator : public PermissionRequestCreator { public : MockPermissionRequestCreator ( ) { } ~ MockPermissionRequestCreator ( ) override { } bool IsEnabled ( ) const override { return true ; } void CreateURLAccessRequest ( const GURL & url_requested , const SuccessCallback & callback ) override { FAIL ( ) ; } MOCK_METHOD2 ( CreateExtensionInstallRequest , void ( const std : : string & id , const SupervisedUserService : : SuccessCallback & callback ) ) ; MOCK_METHOD2 ( CreateExtensionUpdateRequest , void ( const std : : string & id , const SupervisedUserService : : SuccessCallback & callback ) ) ; private : DISALLOW_COPY_AND_ASSIGN ( MockPermissionRequestCreator ) ; } ; TEST_F ( ExtensionServiceTestSupervised , InstallOnlyAllowedByCustodian ) { InitServices ( true ) ; InitSupervisedUserInitiatedExtensionInstallFeature ( false ) ; extensions : : util : : SetWasInstalledByCustodian ( good2048 , profile ( ) , true ) ; base : : FilePath path1 = data_dir ( ) . AppendASCII ( "good.crx" ) ; base : : FilePath path2 = data_dir ( ) . AppendASCII ( "good2048.crx" ) ; const Extension * extensions [ ] = { InstallCRX ( path1 , INSTALL_FAILED ) , InstallCRX ( path2 , INSTALL_NEW ) } ; EXPECT_FALSE ( extensions [ 0 ] ) ; ASSERT_TRUE ( extensions [ 1 ] ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( extensions [ 1 ] -> id ( ) ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( extensions [ 1 ] -> id ( ) ) ) ; } TEST_F ( ExtensionServiceTestSupervised , DelegatedAndPreinstalledExtensionIsSUFirst ) { InitServices ( false ) ; InitSupervisedUserInitiatedExtensionInstallFeature ( false ) ; base : : FilePath path = data_dir ( ) . AppendASCII ( "good.crx" ) ; const Extension * extension = InstallCRX ( path , INSTALL_NEW ) ; std : : string id = extension -> id ( ) ; const std : : string version ( "1.0.0.0" ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; profile ( ) -> AsTestingProfile ( ) -> SetSupervisedUserId ( supervised_users : : kChildAccountSUID ) ; EXPECT_FALSE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_enabled ( true ) ; ext_specifics -> set_disable_reasons ( extensions : : disable_reason : : DISABLE_NONE ) ; ext_specifics -> set_installed_by_custodian ( true ) ; ext_specifics -> set_version ( version ) ; SyncChangeList list = MakeSyncChangeList ( id , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_TRUE ( extensions : : util : : WasInstalledByCustodian ( id , profile ( ) ) ) ; } TEST_F ( ExtensionServiceTestSupervised , DelegatedAndPreinstalledExtensionSyncFirst ) { InitServices ( false ) ; InitSupervisedUserInitiatedExtensionInstallFeature ( false ) ; base : : FilePath path = data_dir ( ) . AppendASCII ( "good.crx" ) ; const Extension * extension = InstallCRX ( path , INSTALL_NEW ) ; std : : string id = extension -> id ( ) ; const std : : string version ( "1.0.0.0" ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_enabled ( true ) ; ext_specifics -> set_disable_reasons ( extensions : : disable_reason : : DISABLE_NONE ) ; ext_specifics -> set_installed_by_custodian ( true ) ; ext_specifics -> set_version ( version ) ; SyncChangeList list = MakeSyncChangeList ( id , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_TRUE ( extensions : : util : : WasInstalledByCustodian ( id , profile ( ) ) ) ; } TEST_F ( ExtensionServiceTestSupervised , InstallAllowedByCustodianAndSupervisedUser ) { InitServices ( true ) ; InitSupervisedUserInitiatedExtensionInstallFeature ( true ) ; extensions : : util : : SetWasInstalledByCustodian ( good2048 , profile ( ) , true ) ; base : : FilePath path1 = data_dir ( ) . AppendASCII ( "good.crx" ) ; base : : FilePath path2 = data_dir ( ) . AppendASCII ( "good2048.crx" ) ; const Extension * extensions [ ] = { InstallCRX ( path1 , INSTALL_WITHOUT_LOAD ) , InstallCRX ( path2 , INSTALL_NEW ) } ; ASSERT_TRUE ( extensions [ 0 ] ) ; ASSERT_TRUE ( extensions [ 1 ] ) ; EXPECT_TRUE ( registry ( ) -> disabled_extensions ( ) . Contains ( extensions [ 0 ] -> id ( ) ) ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( extensions [ 0 ] -> id ( ) ) ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( extensions [ 1 ] -> id ( ) ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( extensions [ 1 ] -> id ( ) ) ) ; } TEST_F ( ExtensionServiceTestSupervised , PreinstalledExtensionWithSUInitiatedInstalls ) { InitServices ( false ) ; InitSupervisedUserInitiatedExtensionInstallFeature ( true ) ; base : : FilePath path = data_dir ( ) . AppendASCII ( "good.crx" ) ; const Extension * extension = InstallCRX ( path , INSTALL_NEW ) ; std : : string id = extension -> id ( ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; MockPermissionRequestCreator * creator = new MockPermissionRequestCreator ; supervised_user_service ( ) -> AddPermissionRequestCreator ( base : : WrapUnique ( creator ) ) ; const std : : string version ( "1.0.0.0" ) ; EXPECT_CALL ( * creator , CreateExtensionInstallRequest ( RequestId ( good_crx , version ) , testing : : _ ) ) ; profile ( ) -> AsTestingProfile ( ) -> SetSupervisedUserId ( supervised_users : : kChildAccountSUID ) ; Mock : : VerifyAndClearExpectations ( creator ) ; CheckDisabledForCustodianApproval ( id ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , PreinstalledExtensionWithoutSUInitiatedInstalls ) { InitServices ( false ) ; InitSupervisedUserInitiatedExtensionInstallFeature ( false ) ; base : : FilePath path = data_dir ( ) . AppendASCII ( "good.crx" ) ; const Extension * extension = InstallCRX ( path , INSTALL_NEW ) ; std : : string id = extension -> id ( ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; MockPermissionRequestCreator * creator = new MockPermissionRequestCreator ; supervised_user_service ( ) -> AddPermissionRequestCreator ( base : : WrapUnique ( creator ) ) ; const std : : string version ( "1.0.0.0" ) ; EXPECT_CALL ( * creator , CreateExtensionInstallRequest ( testing : : _ , testing : : _ ) ) . Times ( 0 ) ; profile ( ) -> AsTestingProfile ( ) -> SetSupervisedUserId ( supervised_users : : kChildAccountSUID ) ; EXPECT_FALSE ( registry ( ) -> GetInstalledExtension ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , ExtensionApprovalBeforeInstallation ) { InitServices ( true ) ; InitSupervisedUserInitiatedExtensionInstallFeature ( true ) ; MockPermissionRequestCreator * creator = new MockPermissionRequestCreator ; supervised_user_service ( ) -> AddPermissionRequestCreator ( base : : WrapUnique ( creator ) ) ; std : : string id = good_crx ; std : : string version ( "1.0.0.0" ) ; SimulateCustodianApprovalChangeViaSync ( id , version , SyncChange : : ACTION_ADD ) ; base : : FilePath path = data_dir ( ) . AppendASCII ( "good.crx" ) ; InstallCRX ( path , INSTALL_NEW ) ; EXPECT_CALL ( * creator , CreateExtensionInstallRequest ( testing : : _ , testing : : _ ) ) . Times ( 0 ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , UpdateWithoutPermissionIncrease ) { InitServices ( true ) ; std : : string id = InstallNoPermissionsTestExtension ( true ) ; std : : string version2 ( "2" ) ; UpdateNoPermissionsTestExtension ( id , version2 , ENABLED ) ; const Extension * extension = registry ( ) -> enabled_extensions ( ) . GetByID ( id ) ; ASSERT_TRUE ( extension ) ; EXPECT_EQ ( * extension -> version ( ) , base : : Version ( version2 ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , UpdateWithPermissionIncreaseApprovalOldVersion ) { InitServices ( true ) ; MockPermissionRequestCreator * creator = new MockPermissionRequestCreator ; supervised_user_service ( ) -> AddPermissionRequestCreator ( base : : WrapUnique ( creator ) ) ; const std : : string version1 ( "1" ) ; const std : : string version2 ( "2" ) ; std : : string id = InstallPermissionsTestExtension ( true ) ; EXPECT_CALL ( * creator , CreateExtensionUpdateRequest ( RequestId ( id , version2 ) , testing : : _ ) ) ; UpdatePermissionsTestExtension ( id , version2 , DISABLED ) ; Mock : : VerifyAndClearExpectations ( creator ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( id ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_enabled ( true ) ; ext_specifics -> set_disable_reasons ( extensions : : disable_reason : : DISABLE_NONE ) ; ext_specifics -> set_installed_by_custodian ( true ) ; ext_specifics -> set_version ( version1 ) ; EXPECT_CALL ( * creator , CreateExtensionUpdateRequest ( RequestId ( id , version2 ) , testing : : _ ) ) ; SyncChangeList list = MakeSyncChangeList ( id , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_FALSE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_FALSE ( extension_sync_service ( ) -> HasPendingReenable ( id , base : : Version ( version1 ) ) ) ; EXPECT_FALSE ( extension_sync_service ( ) -> HasPendingReenable ( id , base : : Version ( version2 ) ) ) ; Mock : : VerifyAndClearExpectations ( creator ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , UpdateWithPermissionIncreaseApprovalMatchingVersion ) { InitServices ( true ) ; MockPermissionRequestCreator * creator = new MockPermissionRequestCreator ; supervised_user_service ( ) -> AddPermissionRequestCreator ( base : : WrapUnique ( creator ) ) ; std : : string id = InstallPermissionsTestExtension ( true ) ; const std : : string version2 ( "2" ) ; EXPECT_CALL ( * creator , CreateExtensionUpdateRequest ( RequestId ( id , version2 ) , testing : : _ ) ) ; UpdatePermissionsTestExtension ( id , version2 , DISABLED ) ; Mock : : VerifyAndClearExpectations ( creator ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( id ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_enabled ( true ) ; ext_specifics -> set_disable_reasons ( extensions : : disable_reason : : DISABLE_NONE ) ; ext_specifics -> set_installed_by_custodian ( true ) ; ext_specifics -> set_version ( version2 ) ; SyncChangeList list = MakeSyncChangeList ( id , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , UpdateWithPermissionIncreaseApprovalNewVersion ) { InitServices ( true ) ; MockPermissionRequestCreator * creator = new MockPermissionRequestCreator ; supervised_user_service ( ) -> AddPermissionRequestCreator ( base : : WrapUnique ( creator ) ) ; std : : string id = InstallPermissionsTestExtension ( true ) ; const std : : string version2 ( "2" ) ; EXPECT_CALL ( * creator , CreateExtensionUpdateRequest ( RequestId ( id , version2 ) , testing : : _ ) ) ; UpdatePermissionsTestExtension ( id , version2 , DISABLED ) ; Mock : : VerifyAndClearExpectations ( creator ) ; const std : : string version3 ( "3" ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_enabled ( true ) ; ext_specifics -> set_disable_reasons ( extensions : : disable_reason : : DISABLE_NONE ) ; ext_specifics -> set_installed_by_custodian ( true ) ; ext_specifics -> set_version ( version3 ) ; EXPECT_CALL ( * creator , CreateExtensionUpdateRequest ( RequestId ( id , version3 ) , testing : : _ ) ) . Times ( 0 ) ; SyncChangeList list = MakeSyncChangeList ( id , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_FALSE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_TRUE ( extension_sync_service ( ) -> HasPendingReenable ( id , base : : Version ( version3 ) ) ) ; UpdatePermissionsTestExtension ( id , version3 , ENABLED ) ; } TEST_F ( ExtensionServiceTestSupervised , SupervisedUserInitiatedInstalls ) { InitSupervisedUserInitiatedExtensionInstallFeature ( true ) ; InitServices ( true ) ; MockPermissionRequestCreator * creator = new MockPermissionRequestCreator ; supervised_user_service ( ) -> AddPermissionRequestCreator ( base : : WrapUnique ( creator ) ) ; base : : FilePath path = data_dir ( ) . AppendASCII ( "good.crx" ) ; std : : string version ( "1.0.0.0" ) ; EXPECT_CALL ( * creator , CreateExtensionInstallRequest ( RequestId ( good_crx , version ) , testing : : _ ) ) ; const Extension * extension = InstallCRX ( path , INSTALL_WITHOUT_LOAD ) ; ASSERT_TRUE ( extension ) ; ASSERT_EQ ( extension -> id ( ) , good_crx ) ; EXPECT_TRUE ( registry ( ) -> disabled_extensions ( ) . Contains ( good_crx ) ) ; Mock : : VerifyAndClearExpectations ( creator ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( extension -> id ( ) ) ) ; SimulateCustodianApprovalChangeViaSync ( good_crx , version , SyncChange : : ACTION_ADD ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( good_crx ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( extension -> id ( ) ) ) ; SimulateCustodianApprovalChangeViaSync ( good_crx , version , SyncChange : : ACTION_DELETE ) ; EXPECT_TRUE ( registry ( ) -> disabled_extensions ( ) . Contains ( good_crx ) ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( extension -> id ( ) ) ) ; } TEST_F ( ExtensionServiceTestSupervised , UpdateSUInitiatedInstallWithoutPermissionIncrease ) { InitSupervisedUserInitiatedExtensionInstallFeature ( true ) ; InitServices ( true ) ; std : : string id = InstallNoPermissionsTestExtension ( false ) ; std : : string version1 ( "1" ) ; SimulateCustodianApprovalChangeViaSync ( id , version1 , SyncChange : : ACTION_ADD ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; std : : string version2 ( "2" ) ; UpdateNoPermissionsTestExtension ( id , version2 , ENABLED ) ; const Extension * extension = registry ( ) -> enabled_extensions ( ) . GetByID ( id ) ; ASSERT_TRUE ( extension ) ; EXPECT_EQ ( 1 , extension -> version ( ) -> CompareTo ( base : : Version ( version1 ) ) ) ; std : : string approved_version ; PrefService * pref_service = profile ( ) -> GetPrefs ( ) ; const base : : DictionaryValue * approved_extensions = pref_service -> GetDictionary ( prefs : : kSupervisedUserApprovedExtensions ) ; approved_extensions -> GetStringWithoutPathExpansion ( id , & approved_version ) ; EXPECT_EQ ( base : : Version ( approved_version ) , * extension -> version ( ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , UpdateSUInitiatedInstallWithPermissionIncrease ) { InitSupervisedUserInitiatedExtensionInstallFeature ( true ) ; InitServices ( true ) ; std : : string id = InstallPermissionsTestExtension ( false ) ; std : : string version1 ( "1" ) ; SimulateCustodianApprovalChangeViaSync ( id , version1 , SyncChange : : ACTION_ADD ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; std : : string version3 ( "3" ) ; UpdatePermissionsTestExtension ( id , version3 , DISABLED ) ; EXPECT_FALSE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_TRUE ( ExtensionPrefs : : Get ( profile ( ) ) -> HasDisableReason ( id , extensions : : disable_reason : : DISABLE_PERMISSIONS_INCREASE ) ) ; std : : string version2 ( "2" ) ; SimulateCustodianApprovalChangeViaSync ( id , version2 , SyncChange : : ACTION_UPDATE ) ; EXPECT_FALSE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_TRUE ( ExtensionPrefs : : Get ( profile ( ) ) -> HasDisableReason ( id , extensions : : disable_reason : : DISABLE_PERMISSIONS_INCREASE ) ) ; EXPECT_TRUE ( ExtensionPrefs : : Get ( profile ( ) ) -> HasDisableReason ( id , extensions : : disable_reason : : DISABLE_CUSTODIAN_APPROVAL_REQUIRED ) ) ; EXPECT_TRUE ( IsPendingCustodianApproval ( id ) ) ; SimulateCustodianApprovalChangeViaSync ( id , version3 , SyncChange : : ACTION_UPDATE ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceTestSupervised , UpdateSUInitiatedInstallWithPermissionIncreaseApprovalArrivesFirst ) { InitSupervisedUserInitiatedExtensionInstallFeature ( true ) ; InitServices ( true ) ; std : : string id = InstallPermissionsTestExtension ( false ) ; std : : string version1 ( "1" ) ; SimulateCustodianApprovalChangeViaSync ( id , version1 , SyncChange : : ACTION_ADD ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; std : : string version2 ( "2" ) ; SimulateCustodianApprovalChangeViaSync ( id , version2 , SyncChange : : ACTION_UPDATE ) ; CheckDisabledForCustodianApproval ( id ) ; UpdatePermissionsTestExtension ( id , version2 , ENABLED ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( id ) ) ; EXPECT_FALSE ( IsPendingCustodianApproval ( id ) ) ; } TEST_F ( ExtensionServiceSyncTest , SyncUninstallByCustodianSkipsPolicy ) { InitializeEmptyExtensionService ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; extensions : : util : : SetWasInstalledByCustodian ( good2048 , profile ( ) , true ) ; base : : FilePath path1 = data_dir ( ) . AppendASCII ( "good.crx" ) ; base : : FilePath path2 = data_dir ( ) . AppendASCII ( "good2048.crx" ) ; const Extension * extensions [ ] = { InstallCRX ( path1 , INSTALL_NEW ) , InstallCRX ( path2 , INSTALL_NEW ) } ; extensions : : TestManagementPolicyProvider provider ( extensions : : TestManagementPolicyProvider : : PROHIBIT_MODIFY_STATUS ) ; ExtensionSystem : : Get ( browser_context ( ) ) -> management_policy ( ) -> RegisterProvider ( & provider ) ; SyncChangeList list ; for ( size_t i = 0 ; i < arraysize ( extensions ) ; i ++ ) { const std : : string & id = extensions [ i ] -> id ( ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_version ( "1.0" ) ; ext_specifics -> set_installed_by_custodian ( extensions : : util : : WasInstalledByCustodian ( id , profile ( ) ) ) ; syncer : : SyncData sync_data = syncer : : SyncData : : CreateLocalData ( id , "Name" , specifics ) ; list . push_back ( SyncChange ( FROM_HERE , SyncChange : : ACTION_DELETE , sync_data ) ) ; } std : : string extension_ids [ ] = { extensions [ 0 ] -> id ( ) , extensions [ 1 ] -> id ( ) } ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . Contains ( extension_ids [ 0 ] ) ) ; EXPECT_FALSE ( registry ( ) -> GenerateInstalledExtensionsSet ( ) -> Contains ( extension_ids [ 1 ] ) ) ; } TEST_F ( ExtensionServiceSyncTest , SyncExtensionHasAllhostsWithheld ) { InitializeEmptyExtensionService ( ) ; StartSyncing ( syncer : : EXTENSIONS ) ; const std : : string kName ( "extension" ) ; scoped_refptr < const Extension > extension = extensions : : ExtensionBuilder ( kName ) . SetLocation ( Manifest : : INTERNAL ) . AddPermission ( "*://*/*" ) . Build ( ) ; service ( ) -> AddExtension ( extension . get ( ) ) ; service ( ) -> GrantPermissionsAndEnableExtension ( extension . get ( ) ) ; const std : : string id = extension -> id ( ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . GetByID ( id ) ) ; sync_pb : : EntitySpecifics specifics ; sync_pb : : ExtensionSpecifics * ext_specifics = specifics . mutable_extension ( ) ; ext_specifics -> set_id ( id ) ; ext_specifics -> set_name ( kName ) ; ext_specifics -> set_version ( "1.0" ) ; ext_specifics -> set_all_urls_enabled ( false ) ; ext_specifics -> set_enabled ( true ) ; SyncChangeList list = MakeSyncChangeList ( id , specifics , SyncChange : : ACTION_UPDATE ) ; extension_sync_service ( ) -> ProcessSyncChanges ( FROM_HERE , list ) ; const Extension * enabled_extension = registry ( ) -> enabled_extensions ( ) . GetByID ( id ) ; ASSERT_TRUE ( enabled_extension ) ; ScriptingPermissionsModifier modifier ( profile ( ) , enabled_extension ) ; EXPECT_FALSE ( modifier . IsAllowedOnAllUrls ( ) ) ; EXPECT_TRUE ( modifier . HasSetAllowedOnAllUrls ( ) ) ; } # endif TEST_F ( ExtensionServiceSyncTest , AppToExtension ) { InitializeEmptyExtensionService ( ) ; service ( ) -> Init ( ) ; ASSERT_TRUE ( service ( ) -> is_ready ( ) ) ; const Extension * v1 = InstallCRX ( data_dir ( ) . AppendASCII ( "sync_datatypes" ) . AppendASCII ( "v1.crx" ) , INSTALL_NEW ) ; EXPECT_TRUE ( v1 -> is_app ( ) ) ; EXPECT_FALSE ( v1 -> is_extension ( ) ) ; std : : string id = v1 -> id ( ) ; StatefulChangeProcessor extensions_processor ( syncer : : ModelType : : EXTENSIONS ) ; StatefulChangeProcessor apps_processor ( syncer : : ModelType : : APPS ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , extensions_processor . GetWrapped ( ) , base : : WrapUnique ( new syncer : : SyncErrorFactoryMock ( ) ) ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : APPS , syncer : : SyncDataList ( ) , apps_processor . GetWrapped ( ) , base : : WrapUnique ( new syncer : : SyncErrorFactoryMock ( ) ) ) ; EXPECT_TRUE ( extensions_processor . changes ( ) . empty ( ) ) ; EXPECT_TRUE ( extensions_processor . data ( ) . empty ( ) ) ; EXPECT_EQ ( 1u , apps_processor . data ( ) . size ( ) ) ; ASSERT_EQ ( 1u , apps_processor . changes ( ) . size ( ) ) ; const SyncChange & app_change = apps_processor . changes ( ) [ 0 ] ; EXPECT_EQ ( SyncChange : : ACTION_ADD , app_change . change_type ( ) ) ; std : : unique_ptr < ExtensionSyncData > app_data = ExtensionSyncData : : CreateFromSyncData ( app_change . sync_data ( ) ) ; EXPECT_TRUE ( app_data -> is_app ( ) ) ; EXPECT_EQ ( id , app_data -> id ( ) ) ; EXPECT_EQ ( * v1 -> version ( ) , app_data -> version ( ) ) ; const Extension * v2 = InstallCRX ( data_dir ( ) . AppendASCII ( "sync_datatypes" ) . AppendASCII ( "v2.crx" ) , INSTALL_UPDATED ) ; EXPECT_FALSE ( v2 -> is_app ( ) ) ; EXPECT_TRUE ( v2 -> is_extension ( ) ) ; EXPECT_EQ ( id , v2 -> id ( ) ) ; ASSERT_EQ ( 1u , extensions_processor . changes ( ) . size ( ) ) ; const SyncChange & extension_change = extensions_processor . changes ( ) [ 0 ] ; EXPECT_EQ ( SyncChange : : ACTION_ADD , extension_change . change_type ( ) ) ; std : : unique_ptr < ExtensionSyncData > extension_data = ExtensionSyncData : : CreateFromSyncData ( extension_change . sync_data ( ) ) ; EXPECT_FALSE ( extension_data -> is_app ( ) ) ; EXPECT_EQ ( id , extension_data -> id ( ) ) ; EXPECT_EQ ( * v2 -> version ( ) , extension_data -> version ( ) ) ; syncer : : SyncDataList extensions_data = extensions_processor . GetAllSyncData ( syncer : : EXTENSIONS ) ; syncer : : SyncDataList apps_data = apps_processor . GetAllSyncData ( syncer : : APPS ) ; extension_sync_service ( ) -> StopSyncing ( syncer : : EXTENSIONS ) ; extension_sync_service ( ) -> StopSyncing ( syncer : : APPS ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , extensions_data , extensions_processor . GetWrapped ( ) , base : : WrapUnique ( new syncer : : SyncErrorFactoryMock ( ) ) ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : APPS , apps_data , apps_processor . GetWrapped ( ) , base : : WrapUnique ( new syncer : : SyncErrorFactoryMock ( ) ) ) ; bool found_delete = false ; for ( const auto & change : apps_processor . changes ( ) ) { if ( change . change_type ( ) == SyncChange : : ACTION_DELETE ) { std : : unique_ptr < ExtensionSyncData > data = ExtensionSyncData : : CreateFromSyncChange ( change ) ; if ( data -> id ( ) == id ) { found_delete = true ; break ; } } } EXPECT_TRUE ( found_delete ) ; EXPECT_EQ ( 1u , extensions_processor . data ( ) . size ( ) ) ; EXPECT_TRUE ( apps_processor . data ( ) . empty ( ) ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
const char * SSL_state_string ( const SSL * s ) { const char * str ; switch ( s -> state ) { case SSL_ST_BEFORE : str = "PINIT " ; break ; case SSL_ST_ACCEPT : str = "AINIT " ; break ; case SSL_ST_CONNECT : str = "CINIT " ; break ; case SSL_ST_OK : str = "SSLOK " ; break ; # ifndef OPENSSL_NO_SSL2 case SSL2_ST_CLIENT_START_ENCRYPTION : str = "2CSENC" ; break ; case SSL2_ST_SERVER_START_ENCRYPTION : str = "2SSENC" ; break ; case SSL2_ST_SEND_CLIENT_HELLO_A : str = "2SCH_A" ; break ; case SSL2_ST_SEND_CLIENT_HELLO_B : str = "2SCH_B" ; break ; case SSL2_ST_GET_SERVER_HELLO_A : str = "2GSH_A" ; break ; case SSL2_ST_GET_SERVER_HELLO_B : str = "2GSH_B" ; break ; case SSL2_ST_SEND_CLIENT_MASTER_KEY_A : str = "2SCMKA" ; break ; case SSL2_ST_SEND_CLIENT_MASTER_KEY_B : str = "2SCMKB" ; break ; case SSL2_ST_SEND_CLIENT_FINISHED_A : str = "2SCF_A" ; break ; case SSL2_ST_SEND_CLIENT_FINISHED_B : str = "2SCF_B" ; break ; case SSL2_ST_SEND_CLIENT_CERTIFICATE_A : str = "2SCC_A" ; break ; case SSL2_ST_SEND_CLIENT_CERTIFICATE_B : str = "2SCC_B" ; break ; case SSL2_ST_SEND_CLIENT_CERTIFICATE_C : str = "2SCC_C" ; break ; case SSL2_ST_SEND_CLIENT_CERTIFICATE_D : str = "2SCC_D" ; break ; case SSL2_ST_GET_SERVER_VERIFY_A : str = "2GSV_A" ; break ; case SSL2_ST_GET_SERVER_VERIFY_B : str = "2GSV_B" ; break ; case SSL2_ST_GET_SERVER_FINISHED_A : str = "2GSF_A" ; break ; case SSL2_ST_GET_SERVER_FINISHED_B : str = "2GSF_B" ; break ; case SSL2_ST_GET_CLIENT_HELLO_A : str = "2GCH_A" ; break ; case SSL2_ST_GET_CLIENT_HELLO_B : str = "2GCH_B" ; break ; case SSL2_ST_GET_CLIENT_HELLO_C : str = "2GCH_C" ; break ; case SSL2_ST_SEND_SERVER_HELLO_A : str = "2SSH_A" ; break ; case SSL2_ST_SEND_SERVER_HELLO_B : str = "2SSH_B" ; break ; case SSL2_ST_GET_CLIENT_MASTER_KEY_A : str = "2GCMKA" ; break ; case SSL2_ST_GET_CLIENT_MASTER_KEY_B : str = "2GCMKA" ; break ; case SSL2_ST_SEND_SERVER_VERIFY_A : str = "2SSV_A" ; break ; case SSL2_ST_SEND_SERVER_VERIFY_B : str = "2SSV_B" ; break ; case SSL2_ST_SEND_SERVER_VERIFY_C : str = "2SSV_C" ; break ; case SSL2_ST_GET_CLIENT_FINISHED_A : str = "2GCF_A" ; break ; case SSL2_ST_GET_CLIENT_FINISHED_B : str = "2GCF_B" ; break ; case SSL2_ST_SEND_SERVER_FINISHED_A : str = "2SSF_A" ; break ; case SSL2_ST_SEND_SERVER_FINISHED_B : str = "2SSF_B" ; break ; case SSL2_ST_SEND_REQUEST_CERTIFICATE_A : str = "2SRC_A" ; break ; case SSL2_ST_SEND_REQUEST_CERTIFICATE_B : str = "2SRC_B" ; break ; case SSL2_ST_SEND_REQUEST_CERTIFICATE_C : str = "2SRC_C" ; break ; case SSL2_ST_SEND_REQUEST_CERTIFICATE_D : str = "2SRC_D" ; break ; case SSL2_ST_X509_GET_SERVER_CERTIFICATE : str = "2X9GSC" ; break ; case SSL2_ST_X509_GET_CLIENT_CERTIFICATE : str = "2X9GCC" ; break ; # endif # ifndef OPENSSL_NO_SSL3 case SSL3_ST_SW_FLUSH : case SSL3_ST_CW_FLUSH : str = "3FLUSH" ; break ; case SSL3_ST_CW_CLNT_HELLO_A : str = "3WCH_A" ; break ; case SSL3_ST_CW_CLNT_HELLO_B : str = "3WCH_B" ; break ; case SSL3_ST_CR_SRVR_HELLO_A : str = "3RSH_A" ; break ; case SSL3_ST_CR_SRVR_HELLO_B : str = "3RSH_B" ; break ; case SSL3_ST_CR_CERT_A : str = "3RSC_A" ; break ; case SSL3_ST_CR_CERT_B : str = "3RSC_B" ; break ; case SSL3_ST_CR_KEY_EXCH_A : str = "3RSKEA" ; break ; case SSL3_ST_CR_KEY_EXCH_B : str = "3RSKEB" ; break ; case SSL3_ST_CR_CERT_REQ_A : str = "3RCR_A" ; break ; case SSL3_ST_CR_CERT_REQ_B : str = "3RCR_B" ; break ; case SSL3_ST_CR_SRVR_DONE_A : str = "3RSD_A" ; break ; case SSL3_ST_CR_SRVR_DONE_B : str = "3RSD_B" ; break ; case SSL3_ST_CW_CERT_A : str = "3WCC_A" ; break ; case SSL3_ST_CW_CERT_B : str = "3WCC_B" ; break ; case SSL3_ST_CW_CERT_C : str = "3WCC_C" ; break ; case SSL3_ST_CW_CERT_D : str = "3WCC_D" ; break ; case SSL3_ST_CW_KEY_EXCH_A : str = "3WCKEA" ; break ; case SSL3_ST_CW_KEY_EXCH_B : str = "3WCKEB" ; break ; case SSL3_ST_CW_CERT_VRFY_A : str = "3WCV_A" ; break ; case SSL3_ST_CW_CERT_VRFY_B : str = "3WCV_B" ; break ; case SSL3_ST_SW_CHANGE_A : case SSL3_ST_CW_CHANGE_A : str = "3WCCSA" ; break ; case SSL3_ST_SW_CHANGE_B : case SSL3_ST_CW_CHANGE_B : str = "3WCCSB" ; break ; case SSL3_ST_SW_FINISHED_A : case SSL3_ST_CW_FINISHED_A : str = "3WFINA" ; break ; case SSL3_ST_SW_FINISHED_B : case SSL3_ST_CW_FINISHED_B : str = "3WFINB" ; break ; case SSL3_ST_SR_CHANGE_A : case SSL3_ST_CR_CHANGE_A : str = "3RCCSA" ; break ; case SSL3_ST_SR_CHANGE_B : case SSL3_ST_CR_CHANGE_B : str = "3RCCSB" ; break ; case SSL3_ST_SR_FINISHED_A : case SSL3_ST_CR_FINISHED_A : str = "3RFINA" ; break ; case SSL3_ST_SR_FINISHED_B : case SSL3_ST_CR_FINISHED_B : str = "3RFINB" ; break ; case SSL3_ST_SW_HELLO_REQ_A : str = "3WHR_A" ; break ; case SSL3_ST_SW_HELLO_REQ_B : str = "3WHR_B" ; break ; case SSL3_ST_SW_HELLO_REQ_C : str = "3WHR_C" ; break ; case SSL3_ST_SR_CLNT_HELLO_A : str = "3RCH_A" ; break ; case SSL3_ST_SR_CLNT_HELLO_B : str = "3RCH_B" ; break ; case SSL3_ST_SR_CLNT_HELLO_C : str = "3RCH_C" ; break ; case SSL3_ST_SW_SRVR_HELLO_A : str = "3WSH_A" ; break ; case SSL3_ST_SW_SRVR_HELLO_B : str = "3WSH_B" ; break ; case SSL3_ST_SW_CERT_A : str = "3WSC_A" ; break ; case SSL3_ST_SW_CERT_B : str = "3WSC_B" ; break ; case SSL3_ST_SW_KEY_EXCH_A : str = "3WSKEA" ; break ; case SSL3_ST_SW_KEY_EXCH_B : str = "3WSKEB" ; break ; case SSL3_ST_SW_CERT_REQ_A : str = "3WCR_A" ; break ; case SSL3_ST_SW_CERT_REQ_B : str = "3WCR_B" ; break ; case SSL3_ST_SW_SRVR_DONE_A : str = "3WSD_A" ; break ; case SSL3_ST_SW_SRVR_DONE_B : str = "3WSD_B" ; break ; case SSL3_ST_SR_CERT_A : str = "3RCC_A" ; break ; case SSL3_ST_SR_CERT_B : str = "3RCC_B" ; break ; case SSL3_ST_SR_KEY_EXCH_A : str = "3RCKEA" ; break ; case SSL3_ST_SR_KEY_EXCH_B : str = "3RCKEB" ; break ; case SSL3_ST_SR_CERT_VRFY_A : str = "3RCV_A" ; break ; case SSL3_ST_SR_CERT_VRFY_B : str = "3RCV_B" ; break ; # endif case SSL23_ST_CW_CLNT_HELLO_A : str = "23WCHA" ; break ; case SSL23_ST_CW_CLNT_HELLO_B : str = "23WCHB" ; break ; case SSL23_ST_CR_SRVR_HELLO_A : str = "23RSHA" ; break ; case SSL23_ST_CR_SRVR_HELLO_B : str = "23RSHA" ; break ; case SSL23_ST_SR_CLNT_HELLO_A : str = "23RCHA" ; break ; case SSL23_ST_SR_CLNT_HELLO_B : str = "23RCHB" ; break ; case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A : str = "DRCHVA" ; break ; case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B : str = "DRCHVB" ; break ; case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A : str = "DWCHVA" ; break ; case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B : str = "DWCHVB" ; break ; default : str = "UNKWN " ; break ; } return ( str ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void idct4_sse2 ( __m128i * in ) { const __m128i k__cospi_p16_p16 = pair_set_epi16 ( cospi_16_64 , cospi_16_64 ) ; const __m128i k__cospi_p16_m16 = pair_set_epi16 ( cospi_16_64 , - cospi_16_64 ) ; const __m128i k__cospi_p24_m08 = pair_set_epi16 ( cospi_24_64 , - cospi_8_64 ) ; const __m128i k__cospi_p08_p24 = pair_set_epi16 ( cospi_8_64 , cospi_24_64 ) ; const __m128i k__DCT_CONST_ROUNDING = _mm_set1_epi32 ( DCT_CONST_ROUNDING ) ; __m128i u [ 8 ] , v [ 8 ] ; transpose_4x4 ( in ) ; u [ 0 ] = _mm_unpacklo_epi16 ( in [ 0 ] , in [ 1 ] ) ; u [ 1 ] = _mm_unpackhi_epi16 ( in [ 0 ] , in [ 1 ] ) ; v [ 0 ] = _mm_madd_epi16 ( u [ 0 ] , k__cospi_p16_p16 ) ; v [ 1 ] = _mm_madd_epi16 ( u [ 0 ] , k__cospi_p16_m16 ) ; v [ 2 ] = _mm_madd_epi16 ( u [ 1 ] , k__cospi_p24_m08 ) ; v [ 3 ] = _mm_madd_epi16 ( u [ 1 ] , k__cospi_p08_p24 ) ; u [ 0 ] = _mm_add_epi32 ( v [ 0 ] , k__DCT_CONST_ROUNDING ) ; u [ 1 ] = _mm_add_epi32 ( v [ 1 ] , k__DCT_CONST_ROUNDING ) ; u [ 2 ] = _mm_add_epi32 ( v [ 2 ] , k__DCT_CONST_ROUNDING ) ; u [ 3 ] = _mm_add_epi32 ( v [ 3 ] , k__DCT_CONST_ROUNDING ) ; v [ 0 ] = _mm_srai_epi32 ( u [ 0 ] , DCT_CONST_BITS ) ; v [ 1 ] = _mm_srai_epi32 ( u [ 1 ] , DCT_CONST_BITS ) ; v [ 2 ] = _mm_srai_epi32 ( u [ 2 ] , DCT_CONST_BITS ) ; v [ 3 ] = _mm_srai_epi32 ( u [ 3 ] , DCT_CONST_BITS ) ; u [ 0 ] = _mm_packs_epi32 ( v [ 0 ] , v [ 1 ] ) ; u [ 1 ] = _mm_packs_epi32 ( v [ 3 ] , v [ 2 ] ) ; in [ 0 ] = _mm_add_epi16 ( u [ 0 ] , u [ 1 ] ) ; in [ 1 ] = _mm_sub_epi16 ( u [ 0 ] , u [ 1 ] ) ; in [ 1 ] = _mm_shuffle_epi32 ( in [ 1 ] , 0x4E ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_capset ( struct cred * new , const struct cred * old , const kernel_cap_t * effective , const kernel_cap_t * inheritable , const kernel_cap_t * permitted ) { return cred_has_perm ( old , new , PROCESS__SETCAP ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int crypto_encrypt_and_sign ( struct crypto_instance * instance , const unsigned char * buf_in , const size_t buf_in_len , unsigned char * buf_out , size_t * buf_out_len ) { struct crypto_config_header * cch = ( struct crypto_config_header * ) buf_out ; int err ; cch -> crypto_cipher_type = CRYPTO_CIPHER_TYPE_2_3 ; cch -> crypto_hash_type = CRYPTO_HASH_TYPE_2_3 ; cch -> __pad0 = 0 ; cch -> __pad1 = 0 ; err = encrypt_and_sign_nss_2_3 ( instance , buf_in , buf_in_len , buf_out , buf_out_len ) ; return err ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int count_new_keys ( int n_key_data , krb5_key_data * key_data ) { int n ; for ( n = 1 ; n < n_key_data ; n ++ ) { if ( key_data [ n - 1 ] . key_data_kvno != key_data [ n ] . key_data_kvno ) return n ; } return n_key_data ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void print_help ( ) { MEM_ROOT mem_root ; init_alloc_root ( & mem_root , 4096 , 4096 ) ; pop_dynamic ( & all_options ) ; sys_var_add_options ( & all_options , sys_var : : PARSE_EARLY ) ; add_plugin_options ( & all_options , & mem_root ) ; sort_dynamic ( & all_options , ( qsort_cmp ) option_cmp ) ; add_terminator ( & all_options ) ; my_print_help ( ( my_option * ) all_options . buffer ) ; my_print_variables ( ( my_option * ) all_options . buffer ) ; free_root ( & mem_root , MYF ( 0 ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dwarf_elf_object_access_internals_init ( void * obj_in , dwarf_elf_handle elf , int * error ) { dwarf_elf_object_access_internals_t * obj = ( dwarf_elf_object_access_internals_t * ) obj_in ; char * ehdr_ident = 0 ; Dwarf_Half machine = 0 ; obj -> elf = elf ; if ( ( ehdr_ident = elf_getident ( elf , NULL ) ) == NULL ) { * error = DW_DLE_ELF_GETIDENT_ERROR ; return DW_DLV_ERROR ; } obj -> is_64bit = ( ehdr_ident [ EI_CLASS ] == ELFCLASS64 ) ; if ( ehdr_ident [ EI_DATA ] == ELFDATA2LSB ) { obj -> endianness = DW_OBJECT_LSB ; } else if ( ehdr_ident [ EI_DATA ] == ELFDATA2MSB ) { obj -> endianness = DW_OBJECT_MSB ; } if ( obj -> is_64bit ) { # ifdef HAVE_ELF64_GETEHDR obj -> ehdr64 = elf64_getehdr ( elf ) ; if ( obj -> ehdr64 == NULL ) { * error = DW_DLE_ELF_GETEHDR_ERROR ; return DW_DLV_ERROR ; } obj -> section_count = obj -> ehdr64 -> e_shnum ; machine = obj -> ehdr64 -> e_machine ; obj -> machine = machine ; # else * error = DW_DLE_NO_ELF64_SUPPORT ; return DW_DLV_ERROR ; # endif } else { obj -> ehdr32 = elf32_getehdr ( elf ) ; if ( obj -> ehdr32 == NULL ) { * error = DW_DLE_ELF_GETEHDR_ERROR ; return DW_DLV_ERROR ; } obj -> section_count = obj -> ehdr32 -> e_shnum ; machine = obj -> ehdr32 -> e_machine ; obj -> machine = machine ; } obj -> length_size = obj -> is_64bit ? 8 : 4 ; obj -> pointer_size = obj -> is_64bit ? 8 : 4 ; # ifdef WIN32 if ( obj -> is_64bit && machine == EM_PPC64 ) { obj -> pointer_size = 4 ; } # endif if ( obj -> is_64bit && machine != EM_MIPS ) { obj -> length_size = 4 ; } return DW_DLV_OK ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline Quantum GetPixelAlpha ( const Image * restrict image , const Quantum * restrict pixel ) { if ( image -> channel_map [ AlphaPixelChannel ] . traits == UndefinedPixelTrait ) return ( OpaqueAlpha ) ; return ( pixel [ image -> channel_map [ AlphaPixelChannel ] . offset ] ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int avi_read_packet ( AVFormatContext * s , AVPacket * pkt ) { AVIContext * avi = s -> priv_data ; AVIOContext * pb = s -> pb ; int err ; if ( CONFIG_DV_DEMUXER && avi -> dv_demux ) { int size = avpriv_dv_get_packet ( avi -> dv_demux , pkt ) ; if ( size >= 0 ) return size ; else goto resync ; } if ( avi -> non_interleaved ) { err = ni_prepare_read ( s ) ; if ( err < 0 ) return err ; } resync : if ( avi -> stream_index >= 0 ) { AVStream * st = s -> streams [ avi -> stream_index ] ; AVIStream * ast = st -> priv_data ; int size , err ; if ( get_subtitle_pkt ( s , st , pkt ) ) return 0 ; if ( ast -> sample_size <= 1 ) size = INT_MAX ; else if ( ast -> sample_size < 32 ) size = 1024 * ast -> sample_size ; else size = ast -> sample_size ; if ( size > ast -> remaining ) size = ast -> remaining ; avi -> last_pkt_pos = avio_tell ( pb ) ; err = av_get_packet ( pb , pkt , size ) ; if ( err < 0 ) return err ; size = err ; if ( ast -> has_pal && pkt -> size < ( unsigned ) INT_MAX / 2 ) { uint8_t * pal ; pal = av_packet_new_side_data ( pkt , AV_PKT_DATA_PALETTE , AVPALETTE_SIZE ) ; if ( ! pal ) { av_log ( s , AV_LOG_ERROR , "Failed to allocate data for palette\n" ) ; } else { memcpy ( pal , ast -> pal , AVPALETTE_SIZE ) ; ast -> has_pal = 0 ; } } if ( CONFIG_DV_DEMUXER && avi -> dv_demux ) { AVBufferRef * avbuf = pkt -> buf ; size = avpriv_dv_produce_packet ( avi -> dv_demux , pkt , pkt -> data , pkt -> size , pkt -> pos ) ; pkt -> buf = avbuf ; pkt -> flags |= AV_PKT_FLAG_KEY ; if ( size < 0 ) av_packet_unref ( pkt ) ; } else if ( st -> codecpar -> codec_type == AVMEDIA_TYPE_SUBTITLE && ! st -> codecpar -> codec_tag && read_gab2_sub ( s , st , pkt ) ) { ast -> frame_offset ++ ; avi -> stream_index = - 1 ; ast -> remaining = 0 ; goto resync ; } else { pkt -> dts = ast -> frame_offset ; if ( ast -> sample_size ) pkt -> dts /= ast -> sample_size ; pkt -> stream_index = avi -> stream_index ; if ( st -> codecpar -> codec_type == AVMEDIA_TYPE_VIDEO && st -> index_entries ) { AVIndexEntry * e ; int index ; index = av_index_search_timestamp ( st , ast -> frame_offset , AVSEEK_FLAG_ANY ) ; e = & st -> index_entries [ index ] ; if ( index >= 0 && e -> timestamp == ast -> frame_offset ) { if ( index == st -> nb_index_entries - 1 ) { int key = 1 ; uint32_t state = - 1 ; if ( st -> codecpar -> codec_id == AV_CODEC_ID_MPEG4 ) { const uint8_t * ptr = pkt -> data , * end = ptr + FFMIN ( size , 256 ) ; while ( ptr < end ) { ptr = avpriv_find_start_code ( ptr , end , & state ) ; if ( state == 0x1B6 && ptr < end ) { key = ! ( * ptr & 0xC0 ) ; break ; } } } if ( ! key ) e -> flags &= ~ AVINDEX_KEYFRAME ; } if ( e -> flags & AVINDEX_KEYFRAME ) pkt -> flags |= AV_PKT_FLAG_KEY ; } } else { pkt -> flags |= AV_PKT_FLAG_KEY ; } ast -> frame_offset += get_duration ( ast , pkt -> size ) ; } ast -> remaining -= err ; if ( ! ast -> remaining ) { avi -> stream_index = - 1 ; ast -> packet_size = 0 ; } if ( ! avi -> non_interleaved && pkt -> pos >= 0 && ast -> seek_pos > pkt -> pos ) { av_packet_unref ( pkt ) ; goto resync ; } ast -> seek_pos = 0 ; if ( ! avi -> non_interleaved && st -> nb_index_entries > 1 && avi -> index_loaded > 1 ) { int64_t dts = av_rescale_q ( pkt -> dts , st -> time_base , AV_TIME_BASE_Q ) ; if ( avi -> dts_max - dts > 2 * AV_TIME_BASE ) { avi -> non_interleaved = 1 ; av_log ( s , AV_LOG_INFO , "Switching to NI mode, due to poor interleaving\n" ) ; } else if ( avi -> dts_max < dts ) avi -> dts_max = dts ; } return 0 ; } if ( ( err = avi_sync ( s , 0 ) ) < 0 ) return err ; goto resync ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExtensionWelcomeNotificationTest , DelayedPreferenceSyncPreviouslyDismissed ) { EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; ShowChromeNowNotification ( ) ; EXPECT_EQ ( message_center ( ) -> add_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> remove_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> notifications_with_shown_as_popup ( ) , 0 ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; SetBooleanPref ( prefs : : kWelcomeNotificationDismissed , true ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; StartPreferenceSyncing ( ) ; EXPECT_EQ ( message_center ( ) -> add_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> remove_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> notifications_with_shown_as_popup ( ) , 0 ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void _UTF16Reset ( UConverter * cnv , UConverterResetChoice choice ) { if ( choice <= UCNV_RESET_TO_UNICODE ) { cnv -> mode = 0 ; } if ( choice != UCNV_RESET_TO_UNICODE ) { cnv -> fromUnicodeStatus = UCNV_NEED_TO_WRITE_BOM ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int xwd_decode_frame ( AVCodecContext * avctx , void * data , int * got_frame , AVPacket * avpkt ) { AVFrame * p = avctx -> coded_frame ; const uint8_t * buf = avpkt -> data ; int i , ret , buf_size = avpkt -> size ; uint32_t version , header_size , vclass , ncolors ; uint32_t xoffset , be , bpp , lsize , rsize ; uint32_t pixformat , pixdepth , bunit , bitorder , bpad ; uint32_t rgb [ 3 ] ; uint8_t * ptr ; GetByteContext gb ; if ( buf_size < XWD_HEADER_SIZE ) return AVERROR_INVALIDDATA ; bytestream2_init ( & gb , buf , buf_size ) ; header_size = bytestream2_get_be32u ( & gb ) ; version = bytestream2_get_be32u ( & gb ) ; if ( version != XWD_VERSION ) { av_log ( avctx , AV_LOG_ERROR , "unsupported version\n" ) ; return AVERROR_INVALIDDATA ; } if ( buf_size < header_size || header_size < XWD_HEADER_SIZE ) { av_log ( avctx , AV_LOG_ERROR , "invalid header size\n" ) ; return AVERROR_INVALIDDATA ; } pixformat = bytestream2_get_be32u ( & gb ) ; pixdepth = bytestream2_get_be32u ( & gb ) ; avctx -> width = bytestream2_get_be32u ( & gb ) ; avctx -> height = bytestream2_get_be32u ( & gb ) ; xoffset = bytestream2_get_be32u ( & gb ) ; be = bytestream2_get_be32u ( & gb ) ; bunit = bytestream2_get_be32u ( & gb ) ; bitorder = bytestream2_get_be32u ( & gb ) ; bpad = bytestream2_get_be32u ( & gb ) ; bpp = bytestream2_get_be32u ( & gb ) ; lsize = bytestream2_get_be32u ( & gb ) ; vclass = bytestream2_get_be32u ( & gb ) ; rgb [ 0 ] = bytestream2_get_be32u ( & gb ) ; rgb [ 1 ] = bytestream2_get_be32u ( & gb ) ; rgb [ 2 ] = bytestream2_get_be32u ( & gb ) ; bytestream2_skipu ( & gb , 8 ) ; ncolors = bytestream2_get_be32u ( & gb ) ; bytestream2_skipu ( & gb , header_size - ( XWD_HEADER_SIZE - 20 ) ) ; av_log ( avctx , AV_LOG_DEBUG , "pixformat %d, pixdepth %d, bunit %d, bitorder %d, bpad %d\n" , pixformat , pixdepth , bunit , bitorder , bpad ) ; av_log ( avctx , AV_LOG_DEBUG , "vclass %d, ncolors %d, bpp %d, be %d, lsize %d, xoffset %d\n" , vclass , ncolors , bpp , be , lsize , xoffset ) ; av_log ( avctx , AV_LOG_DEBUG , "red %0x, green %0x, blue %0x\n" , rgb [ 0 ] , rgb [ 1 ] , rgb [ 2 ] ) ; if ( pixformat > XWD_Z_PIXMAP ) { av_log ( avctx , AV_LOG_ERROR , "invalid pixmap format\n" ) ; return AVERROR_INVALIDDATA ; } if ( pixdepth == 0 || pixdepth > 32 ) { av_log ( avctx , AV_LOG_ERROR , "invalid pixmap depth\n" ) ; return AVERROR_INVALIDDATA ; } if ( xoffset ) { av_log_ask_for_sample ( avctx , "unsupported xoffset %d\n" , xoffset ) ; return AVERROR_PATCHWELCOME ; } if ( be > 1 ) { av_log ( avctx , AV_LOG_ERROR , "invalid byte order\n" ) ; return AVERROR_INVALIDDATA ; } if ( bitorder > 1 ) { av_log ( avctx , AV_LOG_ERROR , "invalid bitmap bit order\n" ) ; return AVERROR_INVALIDDATA ; } if ( bunit != 8 && bunit != 16 && bunit != 32 ) { av_log ( avctx , AV_LOG_ERROR , "invalid bitmap unit\n" ) ; return AVERROR_INVALIDDATA ; } if ( bpad != 8 && bpad != 16 && bpad != 32 ) { av_log ( avctx , AV_LOG_ERROR , "invalid bitmap scan-line pad\n" ) ; return AVERROR_INVALIDDATA ; } if ( bpp == 0 || bpp > 32 ) { av_log ( avctx , AV_LOG_ERROR , "invalid bits per pixel\n" ) ; return AVERROR_INVALIDDATA ; } if ( ncolors > 256 ) { av_log ( avctx , AV_LOG_ERROR , "invalid number of entries in colormap\n" ) ; return AVERROR_INVALIDDATA ; } if ( ( ret = av_image_check_size ( avctx -> width , avctx -> height , 0 , NULL ) ) < 0 ) return ret ; rsize = FFALIGN ( avctx -> width * bpp , bpad ) / 8 ; if ( lsize < rsize ) { av_log ( avctx , AV_LOG_ERROR , "invalid bytes per scan-line\n" ) ; return AVERROR_INVALIDDATA ; } if ( bytestream2_get_bytes_left ( & gb ) < ncolors * XWD_CMAP_SIZE + avctx -> height * lsize ) { av_log ( avctx , AV_LOG_ERROR , "input buffer too small\n" ) ; return AVERROR_INVALIDDATA ; } if ( pixformat != XWD_Z_PIXMAP ) { av_log ( avctx , AV_LOG_ERROR , "pixmap format %d unsupported\n" , pixformat ) ; return AVERROR_PATCHWELCOME ; } avctx -> pix_fmt = AV_PIX_FMT_NONE ; switch ( vclass ) { case XWD_STATIC_GRAY : case XWD_GRAY_SCALE : if ( bpp != 1 ) return AVERROR_INVALIDDATA ; if ( pixdepth == 1 ) avctx -> pix_fmt = AV_PIX_FMT_MONOWHITE ; break ; case XWD_STATIC_COLOR : case XWD_PSEUDO_COLOR : if ( bpp == 8 ) avctx -> pix_fmt = AV_PIX_FMT_PAL8 ; break ; case XWD_TRUE_COLOR : case XWD_DIRECT_COLOR : if ( bpp != 16 && bpp != 24 && bpp != 32 ) return AVERROR_INVALIDDATA ; if ( bpp == 16 && pixdepth == 15 ) { if ( rgb [ 0 ] == 0x7C00 && rgb [ 1 ] == 0x3E0 && rgb [ 2 ] == 0x1F ) avctx -> pix_fmt = be ? AV_PIX_FMT_RGB555BE : AV_PIX_FMT_RGB555LE ; else if ( rgb [ 0 ] == 0x1F && rgb [ 1 ] == 0x3E0 && rgb [ 2 ] == 0x7C00 ) avctx -> pix_fmt = be ? AV_PIX_FMT_BGR555BE : AV_PIX_FMT_BGR555LE ; } else if ( bpp == 16 && pixdepth == 16 ) { if ( rgb [ 0 ] == 0xF800 && rgb [ 1 ] == 0x7E0 && rgb [ 2 ] == 0x1F ) avctx -> pix_fmt = be ? AV_PIX_FMT_RGB565BE : AV_PIX_FMT_RGB565LE ; else if ( rgb [ 0 ] == 0x1F && rgb [ 1 ] == 0x7E0 && rgb [ 2 ] == 0xF800 ) avctx -> pix_fmt = be ? AV_PIX_FMT_BGR565BE : AV_PIX_FMT_BGR565LE ; } else if ( bpp == 24 ) { if ( rgb [ 0 ] == 0xFF0000 && rgb [ 1 ] == 0xFF00 && rgb [ 2 ] == 0xFF ) avctx -> pix_fmt = be ? AV_PIX_FMT_RGB24 : AV_PIX_FMT_BGR24 ; else if ( rgb [ 0 ] == 0xFF && rgb [ 1 ] == 0xFF00 && rgb [ 2 ] == 0xFF0000 ) avctx -> pix_fmt = be ? AV_PIX_FMT_BGR24 : AV_PIX_FMT_RGB24 ; } else if ( bpp == 32 ) { if ( rgb [ 0 ] == 0xFF0000 && rgb [ 1 ] == 0xFF00 && rgb [ 2 ] == 0xFF ) avctx -> pix_fmt = be ? AV_PIX_FMT_ARGB : AV_PIX_FMT_BGRA ; else if ( rgb [ 0 ] == 0xFF && rgb [ 1 ] == 0xFF00 && rgb [ 2 ] == 0xFF0000 ) avctx -> pix_fmt = be ? AV_PIX_FMT_ABGR : AV_PIX_FMT_RGBA ; } bytestream2_skipu ( & gb , ncolors * XWD_CMAP_SIZE ) ; break ; default : av_log ( avctx , AV_LOG_ERROR , "invalid visual class\n" ) ; return AVERROR_INVALIDDATA ; } if ( avctx -> pix_fmt == AV_PIX_FMT_NONE ) { av_log_ask_for_sample ( avctx , "unknown file: bpp %d, pixdepth %d, vclass %d\n" , bpp , pixdepth , vclass ) ; return AVERROR_PATCHWELCOME ; } if ( p -> data [ 0 ] ) avctx -> release_buffer ( avctx , p ) ; p -> reference = 0 ; if ( ( ret = ff_get_buffer ( avctx , p ) ) < 0 ) { av_log ( avctx , AV_LOG_ERROR , "get_buffer() failed\n" ) ; return ret ; } p -> key_frame = 1 ; p -> pict_type = AV_PICTURE_TYPE_I ; if ( avctx -> pix_fmt == AV_PIX_FMT_PAL8 ) { uint32_t * dst = ( uint32_t * ) p -> data [ 1 ] ; uint8_t red , green , blue ; for ( i = 0 ; i < ncolors ; i ++ ) { bytestream2_skipu ( & gb , 4 ) ; red = bytestream2_get_byteu ( & gb ) ; bytestream2_skipu ( & gb , 1 ) ; green = bytestream2_get_byteu ( & gb ) ; bytestream2_skipu ( & gb , 1 ) ; blue = bytestream2_get_byteu ( & gb ) ; bytestream2_skipu ( & gb , 3 ) ; dst [ i ] = red << 16 | green << 8 | blue ; } } ptr = p -> data [ 0 ] ; for ( i = 0 ; i < avctx -> height ; i ++ ) { bytestream2_get_bufferu ( & gb , ptr , rsize ) ; bytestream2_skipu ( & gb , lsize - rsize ) ; ptr += p -> linesize [ 0 ] ; } * got_frame = 1 ; * ( AVFrame * ) data = * p ; return buf_size ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int token_continue ( i_ctx_t * i_ctx_p , scanner_state * pstate , bool save ) { os_ptr op = osp ; int code ; ref token ; pop ( 1 ) ; again : code = gs_scan_token ( i_ctx_p , & token , pstate ) ; op = osp ; switch ( code ) { default : if ( code > 0 ) code = gs_note_error ( gs_error_syntaxerror ) ; gs_scanner_error_object ( i_ctx_p , pstate , & i_ctx_p -> error_object ) ; break ; case scan_BOS : code = 0 ; case 0 : push ( 2 ) ; ref_assign ( op - 1 , & token ) ; make_true ( op ) ; break ; case scan_EOF : push ( 1 ) ; make_false ( op ) ; code = 0 ; break ; case scan_Refill : code = gs_scan_handle_refill ( i_ctx_p , pstate , save , ztoken_continue ) ; switch ( code ) { case 0 : goto again ; case o_push_estack : return code ; } break ; } if ( code <= 0 && ! save ) { ifree_object ( pstate , "token_continue" ) ; } return code ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int brenext ( struct vars * v , chr pc ) { chr c = ( chr ) pc ; switch ( c ) { case CHR ( '*' ) : if ( LASTTYPE ( EMPTY ) || LASTTYPE ( '(' ) || LASTTYPE ( '^' ) ) RETV ( PLAIN , c ) ; RET ( '*' ) ; break ; case CHR ( '[' ) : if ( HAVE ( 6 ) && * ( v -> now + 0 ) == CHR ( '[' ) && * ( v -> now + 1 ) == CHR ( ':' ) && ( * ( v -> now + 2 ) == CHR ( '<' ) || * ( v -> now + 2 ) == CHR ( '>' ) ) && * ( v -> now + 3 ) == CHR ( ':' ) && * ( v -> now + 4 ) == CHR ( ']' ) && * ( v -> now + 5 ) == CHR ( ']' ) ) { c = * ( v -> now + 2 ) ; v -> now += 6 ; NOTE ( REG_UNONPOSIX ) ; RET ( ( c == CHR ( '<' ) ) ? '<' : '>' ) ; } INTOCON ( L_BRACK ) ; if ( NEXT1 ( '^' ) ) { v -> now ++ ; RETV ( '[' , 0 ) ; } RETV ( '[' , 1 ) ; break ; case CHR ( '.' ) : RET ( '.' ) ; break ; case CHR ( '^' ) : if ( LASTTYPE ( EMPTY ) ) RET ( '^' ) ; if ( LASTTYPE ( '(' ) ) { NOTE ( REG_UUNSPEC ) ; RET ( '^' ) ; } RETV ( PLAIN , c ) ; break ; case CHR ( '$' ) : if ( v -> cflags & REG_EXPANDED ) skip ( v ) ; if ( ATEOS ( ) ) RET ( '$' ) ; if ( NEXT2 ( '\\' , ')' ) ) { NOTE ( REG_UUNSPEC ) ; RET ( '$' ) ; } RETV ( PLAIN , c ) ; break ; case CHR ( '\\' ) : break ; default : RETV ( PLAIN , c ) ; break ; } assert ( c == CHR ( '\\' ) ) ; if ( ATEOS ( ) ) FAILW ( REG_EESCAPE ) ; c = * v -> now ++ ; switch ( c ) { case CHR ( '{ ' ) : INTOCON ( L_BBND ) ; NOTE ( REG_UBOUNDS ) ; RET ( '{ ' ) ; break ; case CHR ( '(' ) : RETV ( '(' , 1 ) ; break ; case CHR ( ')' ) : RETV ( ')' , c ) ; break ; case CHR ( '<' ) : NOTE ( REG_UNONPOSIX ) ; RET ( '<' ) ; break ; case CHR ( '>' ) : NOTE ( REG_UNONPOSIX ) ; RET ( '>' ) ; break ; case CHR ( '1' ) : case CHR ( '2' ) : case CHR ( '3' ) : case CHR ( '4' ) : case CHR ( '5' ) : case CHR ( '6' ) : case CHR ( '7' ) : case CHR ( '8' ) : case CHR ( '9' ) : NOTE ( REG_UBACKREF ) ; RETV ( BACKREF , ( chr ) DIGITVAL ( c ) ) ; break ; default : if ( iscalnum ( c ) ) { NOTE ( REG_UBSALNUM ) ; NOTE ( REG_UUNSPEC ) ; } RETV ( PLAIN , c ) ; break ; } assert ( NOTREACHED ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void vble_restore_plane ( VBLEContext * ctx , int plane , int offset , int width , int height ) { AVFrame * pic = ctx -> avctx -> coded_frame ; uint8_t * dst = pic -> data [ plane ] ; uint8_t * val = ctx -> val + offset ; int stride = pic -> linesize [ plane ] ; int i , j , left , left_top ; for ( i = 0 ; i < height ; i ++ ) { for ( j = 0 ; j < width ; j ++ ) val [ j ] = ( val [ j ] >> 1 ) ^ - ( val [ j ] & 1 ) ; if ( i ) { left = 0 ; left_top = dst [ - stride ] ; ctx -> dsp . add_hfyu_median_prediction ( dst , dst - stride , val , width , & left , & left_top ) ; } else { dst [ 0 ] = val [ 0 ] ; for ( j = 1 ; j < width ; j ++ ) dst [ j ] = val [ j ] + dst [ j - 1 ] ; } dst += stride ; val += width ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static const char * flat_escape_key_str ( AVBPrint * dst , const char * src , const char sep ) { const char * p ; for ( p = src ; * p ; p ++ ) { if ( ! ( ( * p >= '0' && * p <= '9' ) || ( * p >= 'a' && * p <= 'z' ) || ( * p >= 'A' && * p <= 'Z' ) ) ) av_bprint_chars ( dst , '_' , 1 ) ; else av_bprint_chars ( dst , * p , 1 ) ; } return dst -> str ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static char * nexttok ( char * * str ) { register char * cp ; char * starttok ; cp = * str ; while ( * cp == ' ' || * cp == '\t' ) cp ++ ; starttok = cp ; while ( * cp != '\0' && * cp != '\n' && * cp != ' ' && * cp != '\t' && * cp != '#' ) cp ++ ; if ( starttok == cp ) return NULL ; if ( * cp == ' ' || * cp == '\t' ) * cp ++ = '\0' ; else * cp = '\0' ; * str = cp ; return starttok ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void decFinalize ( decNumber * dn , decContext * set , Int * residue , uInt * status ) { Int shift ; Int tinyexp = set -> emin - dn -> digits + 1 ; if ( dn -> exponent <= tinyexp ) { Int comp ; decNumber nmin ; if ( dn -> exponent < tinyexp ) { decSetSubnormal ( dn , set , residue , status ) ; return ; } uprv_decNumberZero ( & nmin ) ; nmin . lsu [ 0 ] = 1 ; nmin . exponent = set -> emin ; comp = decCompare ( dn , & nmin , 1 ) ; if ( comp == BADINT ) { * status |= DEC_Insufficient_storage ; return ; } if ( * residue < 0 && comp == 0 ) { decApplyRound ( dn , set , * residue , status ) ; decSetSubnormal ( dn , set , residue , status ) ; return ; } } if ( * residue != 0 ) decApplyRound ( dn , set , * residue , status ) ; if ( dn -> exponent <= set -> emax - set -> digits + 1 ) return ; if ( dn -> exponent > set -> emax - dn -> digits + 1 ) { decSetOverflow ( dn , set , status ) ; return ; } if ( ! set -> clamp ) return ; shift = dn -> exponent - ( set -> emax - set -> digits + 1 ) ; if ( ! ISZERO ( dn ) ) { dn -> digits = decShiftToMost ( dn -> lsu , dn -> digits , shift ) ; } dn -> exponent -= shift ; * status |= DEC_Clamped ; return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int decodeint ( char * str , long * val ) { if ( * str == '0' ) { if ( * ( str + 1 ) == 'x' || * ( str + 1 ) == 'X' ) return hextoint ( str + 2 , ( u_long * ) val ) ; return octtoint ( str , ( u_long * ) val ) ; } return atoint ( str , val ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void qmp_pmemsave ( int64_t addr , int64_t size , const char * filename , Error * * errp ) { FILE * f ; uint32_t l ; uint8_t buf [ 1024 ] ; f = fopen ( filename , "wb" ) ; if ( ! f ) { error_setg_file_open ( errp , errno , filename ) ; return ; } while ( size != 0 ) { l = sizeof ( buf ) ; if ( l > size ) l = size ; cpu_physical_memory_rw ( addr , buf , l , 0 ) ; if ( fwrite ( buf , 1 , l , f ) != l ) { error_set ( errp , QERR_IO_ERROR ) ; goto exit ; } addr += l ; size -= l ; } exit : fclose ( f ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( SplFileInfo , func_name ) \ { \ spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; \ zend_error_handling error_handling ; \ if ( zend_parse_parameters_none ( ) == FAILURE ) { \ return ; \ } \ \ zend_replace_error_handling ( EH_THROW , spl_ce_RuntimeException , & error_handling TSRMLS_CC ) ; \ spl_filesystem_object_get_file_name ( intern TSRMLS_CC ) ; \ php_stat ( intern -> file_name , intern -> file_name_len , func_num , return_value TSRMLS_CC ) ; \ zend_restore_error_handling ( & error_handling TSRMLS_CC ) ; \ } FileInfoFunction ( getPerms , FS_PERMS ) FileInfoFunction ( getInode , FS_INODE ) FileInfoFunction ( getSize , FS_SIZE ) FileInfoFunction ( getOwner , FS_OWNER ) FileInfoFunction ( getGroup , FS_GROUP ) FileInfoFunction ( getATime , FS_ATIME ) FileInfoFunction ( getMTime , FS_MTIME ) FileInfoFunction ( getCTime , FS_CTIME ) FileInfoFunction ( getType , FS_TYPE )
0False
Categorize the following code snippet as vulnerable or not. True or False
static int diffie_hellman_sha256 ( LIBSSH2_SESSION * session , _libssh2_bn * g , _libssh2_bn * p , int group_order , unsigned char packet_type_init , unsigned char packet_type_reply , unsigned char * midhash , unsigned long midhash_len , kmdhgGPshakex_state_t * exchange_state ) { int ret = 0 ; int rc ; libssh2_sha256_ctx exchange_hash_ctx ; if ( exchange_state -> state == libssh2_NB_state_idle ) { exchange_state -> e_packet = NULL ; exchange_state -> s_packet = NULL ; exchange_state -> k_value = NULL ; exchange_state -> ctx = _libssh2_bn_ctx_new ( ) ; exchange_state -> x = _libssh2_bn_init ( ) ; exchange_state -> e = _libssh2_bn_init ( ) ; exchange_state -> f = _libssh2_bn_init_from_bin ( ) ; exchange_state -> k = _libssh2_bn_init ( ) ; memset ( & exchange_state -> req_state , 0 , sizeof ( packet_require_state_t ) ) ; _libssh2_bn_rand ( exchange_state -> x , group_order * 8 - 1 , 0 , - 1 ) ; _libssh2_bn_mod_exp ( exchange_state -> e , g , exchange_state -> x , p , exchange_state -> ctx ) ; exchange_state -> e_packet_len = _libssh2_bn_bytes ( exchange_state -> e ) + 6 ; if ( _libssh2_bn_bits ( exchange_state -> e ) % 8 ) { exchange_state -> e_packet_len -- ; } exchange_state -> e_packet = LIBSSH2_ALLOC ( session , exchange_state -> e_packet_len ) ; if ( ! exchange_state -> e_packet ) { ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Out of memory error" ) ; goto clean_exit ; } exchange_state -> e_packet [ 0 ] = packet_type_init ; _libssh2_htonu32 ( exchange_state -> e_packet + 1 , exchange_state -> e_packet_len - 5 ) ; if ( _libssh2_bn_bits ( exchange_state -> e ) % 8 ) { _libssh2_bn_to_bin ( exchange_state -> e , exchange_state -> e_packet + 5 ) ; } else { exchange_state -> e_packet [ 5 ] = 0 ; _libssh2_bn_to_bin ( exchange_state -> e , exchange_state -> e_packet + 6 ) ; } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Sending KEX packet %d" , ( int ) packet_type_init ) ; exchange_state -> state = libssh2_NB_state_created ; } if ( exchange_state -> state == libssh2_NB_state_created ) { rc = _libssh2_transport_send ( session , exchange_state -> e_packet , exchange_state -> e_packet_len , NULL , 0 ) ; if ( rc == LIBSSH2_ERROR_EAGAIN ) { return rc ; } else if ( rc ) { ret = _libssh2_error ( session , rc , "Unable to send KEX init message" ) ; goto clean_exit ; } exchange_state -> state = libssh2_NB_state_sent ; } if ( exchange_state -> state == libssh2_NB_state_sent ) { if ( session -> burn_optimistic_kexinit ) { int burn_type ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Waiting for badly guessed KEX packet (to be ignored)" ) ; burn_type = _libssh2_packet_burn ( session , & exchange_state -> burn_state ) ; if ( burn_type == LIBSSH2_ERROR_EAGAIN ) { return burn_type ; } else if ( burn_type <= 0 ) { ret = burn_type ; goto clean_exit ; } session -> burn_optimistic_kexinit = 0 ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Burnt packet of type: %02x" , ( unsigned int ) burn_type ) ; } exchange_state -> state = libssh2_NB_state_sent1 ; } if ( exchange_state -> state == libssh2_NB_state_sent1 ) { rc = _libssh2_packet_require ( session , packet_type_reply , & exchange_state -> s_packet , & exchange_state -> s_packet_len , 0 , NULL , 0 , & exchange_state -> req_state ) ; if ( rc == LIBSSH2_ERROR_EAGAIN ) { return rc ; } if ( rc ) { ret = _libssh2_error ( session , LIBSSH2_ERROR_TIMEOUT , "Timed out waiting for KEX reply" ) ; goto clean_exit ; } exchange_state -> s = exchange_state -> s_packet + 1 ; session -> server_hostkey_len = _libssh2_ntohu32 ( exchange_state -> s ) ; exchange_state -> s += 4 ; if ( session -> server_hostkey ) LIBSSH2_FREE ( session , session -> server_hostkey ) ; session -> server_hostkey = LIBSSH2_ALLOC ( session , session -> server_hostkey_len ) ; if ( ! session -> server_hostkey ) { ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Unable to allocate memory for a copy " "of the host key" ) ; goto clean_exit ; } memcpy ( session -> server_hostkey , exchange_state -> s , session -> server_hostkey_len ) ; exchange_state -> s += session -> server_hostkey_len ; # if LIBSSH2_MD5 { libssh2_md5_ctx fingerprint_ctx ; if ( libssh2_md5_init ( & fingerprint_ctx ) ) { libssh2_md5_update ( fingerprint_ctx , session -> server_hostkey , session -> server_hostkey_len ) ; libssh2_md5_final ( fingerprint_ctx , session -> server_hostkey_md5 ) ; session -> server_hostkey_md5_valid = TRUE ; } else { session -> server_hostkey_md5_valid = FALSE ; } } # ifdef LIBSSH2DEBUG { char fingerprint [ 50 ] , * fprint = fingerprint ; int i ; for ( i = 0 ; i < 16 ; i ++ , fprint += 3 ) { snprintf ( fprint , 4 , "%02x:" , session -> server_hostkey_md5 [ i ] ) ; } * ( -- fprint ) = '\0' ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server's MD5 Fingerprint: %s" , fingerprint ) ; } # endif # endif { libssh2_sha1_ctx fingerprint_ctx ; if ( libssh2_sha1_init ( & fingerprint_ctx ) ) { libssh2_sha1_update ( fingerprint_ctx , session -> server_hostkey , session -> server_hostkey_len ) ; libssh2_sha1_final ( fingerprint_ctx , session -> server_hostkey_sha1 ) ; session -> server_hostkey_sha1_valid = TRUE ; } else { session -> server_hostkey_sha1_valid = FALSE ; } } # ifdef LIBSSH2DEBUG { char fingerprint [ 64 ] , * fprint = fingerprint ; int i ; for ( i = 0 ; i < 20 ; i ++ , fprint += 3 ) { snprintf ( fprint , 4 , "%02x:" , session -> server_hostkey_sha1 [ i ] ) ; } * ( -- fprint ) = '\0' ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server's SHA1 Fingerprint: %s" , fingerprint ) ; } # endif if ( session -> hostkey -> init ( session , session -> server_hostkey , session -> server_hostkey_len , & session -> server_hostkey_abstract ) ) { ret = _libssh2_error ( session , LIBSSH2_ERROR_HOSTKEY_INIT , "Unable to initialize hostkey importer" ) ; goto clean_exit ; } exchange_state -> f_value_len = _libssh2_ntohu32 ( exchange_state -> s ) ; exchange_state -> s += 4 ; exchange_state -> f_value = exchange_state -> s ; exchange_state -> s += exchange_state -> f_value_len ; _libssh2_bn_from_bin ( exchange_state -> f , exchange_state -> f_value_len , exchange_state -> f_value ) ; exchange_state -> h_sig_len = _libssh2_ntohu32 ( exchange_state -> s ) ; exchange_state -> s += 4 ; exchange_state -> h_sig = exchange_state -> s ; _libssh2_bn_mod_exp ( exchange_state -> k , exchange_state -> f , exchange_state -> x , p , exchange_state -> ctx ) ; exchange_state -> k_value_len = _libssh2_bn_bytes ( exchange_state -> k ) + 5 ; if ( _libssh2_bn_bits ( exchange_state -> k ) % 8 ) { exchange_state -> k_value_len -- ; } exchange_state -> k_value = LIBSSH2_ALLOC ( session , exchange_state -> k_value_len ) ; if ( ! exchange_state -> k_value ) { ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Unable to allocate buffer for K" ) ; goto clean_exit ; } _libssh2_htonu32 ( exchange_state -> k_value , exchange_state -> k_value_len - 4 ) ; if ( _libssh2_bn_bits ( exchange_state -> k ) % 8 ) { _libssh2_bn_to_bin ( exchange_state -> k , exchange_state -> k_value + 4 ) ; } else { exchange_state -> k_value [ 4 ] = 0 ; _libssh2_bn_to_bin ( exchange_state -> k , exchange_state -> k_value + 5 ) ; } exchange_state -> exchange_hash = ( void * ) & exchange_hash_ctx ; libssh2_sha256_init ( & exchange_hash_ctx ) ; if ( session -> local . banner ) { _libssh2_htonu32 ( exchange_state -> h_sig_comp , strlen ( ( char * ) session -> local . banner ) - 2 ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; libssh2_sha256_update ( exchange_hash_ctx , ( char * ) session -> local . banner , strlen ( ( char * ) session -> local . banner ) - 2 ) ; } else { _libssh2_htonu32 ( exchange_state -> h_sig_comp , sizeof ( LIBSSH2_SSH_DEFAULT_BANNER ) - 1 ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; libssh2_sha256_update ( exchange_hash_ctx , LIBSSH2_SSH_DEFAULT_BANNER , sizeof ( LIBSSH2_SSH_DEFAULT_BANNER ) - 1 ) ; } _libssh2_htonu32 ( exchange_state -> h_sig_comp , strlen ( ( char * ) session -> remote . banner ) ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; libssh2_sha256_update ( exchange_hash_ctx , session -> remote . banner , strlen ( ( char * ) session -> remote . banner ) ) ; _libssh2_htonu32 ( exchange_state -> h_sig_comp , session -> local . kexinit_len ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; libssh2_sha256_update ( exchange_hash_ctx , session -> local . kexinit , session -> local . kexinit_len ) ; _libssh2_htonu32 ( exchange_state -> h_sig_comp , session -> remote . kexinit_len ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; libssh2_sha256_update ( exchange_hash_ctx , session -> remote . kexinit , session -> remote . kexinit_len ) ; _libssh2_htonu32 ( exchange_state -> h_sig_comp , session -> server_hostkey_len ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; libssh2_sha256_update ( exchange_hash_ctx , session -> server_hostkey , session -> server_hostkey_len ) ; if ( packet_type_init == SSH_MSG_KEX_DH_GEX_INIT ) { # ifdef LIBSSH2_DH_GEX_NEW _libssh2_htonu32 ( exchange_state -> h_sig_comp , LIBSSH2_DH_GEX_MINGROUP ) ; _libssh2_htonu32 ( exchange_state -> h_sig_comp + 4 , LIBSSH2_DH_GEX_OPTGROUP ) ; _libssh2_htonu32 ( exchange_state -> h_sig_comp + 8 , LIBSSH2_DH_GEX_MAXGROUP ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 12 ) ; # else _libssh2_htonu32 ( exchange_state -> h_sig_comp , LIBSSH2_DH_GEX_OPTGROUP ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; # endif } if ( midhash ) { libssh2_sha256_update ( exchange_hash_ctx , midhash , midhash_len ) ; } libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> e_packet + 1 , exchange_state -> e_packet_len - 1 ) ; _libssh2_htonu32 ( exchange_state -> h_sig_comp , exchange_state -> f_value_len ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> f_value , exchange_state -> f_value_len ) ; libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> k_value , exchange_state -> k_value_len ) ; libssh2_sha256_final ( exchange_hash_ctx , exchange_state -> h_sig_comp ) ; if ( session -> hostkey -> sig_verify ( session , exchange_state -> h_sig , exchange_state -> h_sig_len , exchange_state -> h_sig_comp , SHA256_DIGEST_LENGTH , & session -> server_hostkey_abstract ) ) { ret = _libssh2_error ( session , LIBSSH2_ERROR_HOSTKEY_SIGN , "Unable to verify hostkey signature" ) ; goto clean_exit ; } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Sending NEWKEYS message" ) ; exchange_state -> c = SSH_MSG_NEWKEYS ; exchange_state -> state = libssh2_NB_state_sent2 ; } if ( exchange_state -> state == libssh2_NB_state_sent2 ) { rc = _libssh2_transport_send ( session , & exchange_state -> c , 1 , NULL , 0 ) ; if ( rc == LIBSSH2_ERROR_EAGAIN ) { return rc ; } else if ( rc ) { ret = _libssh2_error ( session , rc , "Unable to send NEWKEYS message" ) ; goto clean_exit ; } exchange_state -> state = libssh2_NB_state_sent3 ; } if ( exchange_state -> state == libssh2_NB_state_sent3 ) { rc = _libssh2_packet_require ( session , SSH_MSG_NEWKEYS , & exchange_state -> tmp , & exchange_state -> tmp_len , 0 , NULL , 0 , & exchange_state -> req_state ) ; if ( rc == LIBSSH2_ERROR_EAGAIN ) { return rc ; } else if ( rc ) { ret = _libssh2_error ( session , rc , "Timed out waiting for NEWKEYS" ) ; goto clean_exit ; } session -> state |= LIBSSH2_STATE_NEWKEYS ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Received NEWKEYS message" ) ; LIBSSH2_FREE ( session , exchange_state -> tmp ) ; if ( ! session -> session_id ) { session -> session_id = LIBSSH2_ALLOC ( session , SHA256_DIGEST_LENGTH ) ; if ( ! session -> session_id ) { ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Unable to allocate buffer for SHA digest" ) ; goto clean_exit ; } memcpy ( session -> session_id , exchange_state -> h_sig_comp , SHA256_DIGEST_LENGTH ) ; session -> session_id_len = SHA256_DIGEST_LENGTH ; _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "session_id calculated" ) ; } if ( session -> local . crypt -> dtor ) { session -> local . crypt -> dtor ( session , & session -> local . crypt_abstract ) ; } if ( session -> local . crypt -> init ) { unsigned char * iv = NULL , * secret = NULL ; int free_iv = 0 , free_secret = 0 ; LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( iv , session -> local . crypt -> iv_len , "A" ) ; if ( ! iv ) { ret = - 1 ; goto clean_exit ; } LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( secret , session -> local . crypt -> secret_len , "C" ) ; if ( ! secret ) { LIBSSH2_FREE ( session , iv ) ; ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } if ( session -> local . crypt -> init ( session , session -> local . crypt , iv , & free_iv , secret , & free_secret , 1 , & session -> local . crypt_abstract ) ) { LIBSSH2_FREE ( session , iv ) ; LIBSSH2_FREE ( session , secret ) ; ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } if ( free_iv ) { memset ( iv , 0 , session -> local . crypt -> iv_len ) ; LIBSSH2_FREE ( session , iv ) ; } if ( free_secret ) { memset ( secret , 0 , session -> local . crypt -> secret_len ) ; LIBSSH2_FREE ( session , secret ) ; } } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Client to Server IV and Key calculated" ) ; if ( session -> remote . crypt -> dtor ) { session -> remote . crypt -> dtor ( session , & session -> remote . crypt_abstract ) ; } if ( session -> remote . crypt -> init ) { unsigned char * iv = NULL , * secret = NULL ; int free_iv = 0 , free_secret = 0 ; LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( iv , session -> remote . crypt -> iv_len , "B" ) ; if ( ! iv ) { ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( secret , session -> remote . crypt -> secret_len , "D" ) ; if ( ! secret ) { LIBSSH2_FREE ( session , iv ) ; ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } if ( session -> remote . crypt -> init ( session , session -> remote . crypt , iv , & free_iv , secret , & free_secret , 0 , & session -> remote . crypt_abstract ) ) { LIBSSH2_FREE ( session , iv ) ; LIBSSH2_FREE ( session , secret ) ; ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } if ( free_iv ) { memset ( iv , 0 , session -> remote . crypt -> iv_len ) ; LIBSSH2_FREE ( session , iv ) ; } if ( free_secret ) { memset ( secret , 0 , session -> remote . crypt -> secret_len ) ; LIBSSH2_FREE ( session , secret ) ; } } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server to Client IV and Key calculated" ) ; if ( session -> local . mac -> dtor ) { session -> local . mac -> dtor ( session , & session -> local . mac_abstract ) ; } if ( session -> local . mac -> init ) { unsigned char * key = NULL ; int free_key = 0 ; LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( key , session -> local . mac -> key_len , "E" ) ; if ( ! key ) { ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } session -> local . mac -> init ( session , key , & free_key , & session -> local . mac_abstract ) ; if ( free_key ) { memset ( key , 0 , session -> local . mac -> key_len ) ; LIBSSH2_FREE ( session , key ) ; } } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Client to Server HMAC Key calculated" ) ; if ( session -> remote . mac -> dtor ) { session -> remote . mac -> dtor ( session , & session -> remote . mac_abstract ) ; } if ( session -> remote . mac -> init ) { unsigned char * key = NULL ; int free_key = 0 ; LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( key , session -> remote . mac -> key_len , "F" ) ; if ( ! key ) { ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } session -> remote . mac -> init ( session , key , & free_key , & session -> remote . mac_abstract ) ; if ( free_key ) { memset ( key , 0 , session -> remote . mac -> key_len ) ; LIBSSH2_FREE ( session , key ) ; } } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server to Client HMAC Key calculated" ) ; if ( session -> local . comp && session -> local . comp -> dtor ) { session -> local . comp -> dtor ( session , 1 , & session -> local . comp_abstract ) ; } if ( session -> local . comp && session -> local . comp -> init ) { if ( session -> local . comp -> init ( session , 1 , & session -> local . comp_abstract ) ) { ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Client to Server compression initialized" ) ; if ( session -> remote . comp && session -> remote . comp -> dtor ) { session -> remote . comp -> dtor ( session , 0 , & session -> remote . comp_abstract ) ; } if ( session -> remote . comp && session -> remote . comp -> init ) { if ( session -> remote . comp -> init ( session , 0 , & session -> remote . comp_abstract ) ) { ret = LIBSSH2_ERROR_KEX_FAILURE ; goto clean_exit ; } } _libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server to Client compression initialized" ) ; } clean_exit : _libssh2_bn_free ( exchange_state -> x ) ; exchange_state -> x = NULL ; _libssh2_bn_free ( exchange_state -> e ) ; exchange_state -> e = NULL ; _libssh2_bn_free ( exchange_state -> f ) ; exchange_state -> f = NULL ; _libssh2_bn_free ( exchange_state -> k ) ; exchange_state -> k = NULL ; _libssh2_bn_ctx_free ( exchange_state -> ctx ) ; exchange_state -> ctx = NULL ; if ( exchange_state -> e_packet ) { LIBSSH2_FREE ( session , exchange_state -> e_packet ) ; exchange_state -> e_packet = NULL ; } if ( exchange_state -> s_packet ) { LIBSSH2_FREE ( session , exchange_state -> s_packet ) ; exchange_state -> s_packet = NULL ; } if ( exchange_state -> k_value ) { LIBSSH2_FREE ( session , exchange_state -> k_value ) ; exchange_state -> k_value = NULL ; } exchange_state -> state = libssh2_NB_state_idle ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int SpoolssGetForm_r ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep _U_ ) { dcerpc_call_value * dcv = ( dcerpc_call_value * ) di -> call_data ; BUFFER buffer ; guint32 level = GPOINTER_TO_UINT ( dcv -> se_data ) ; proto_item * hidden_item ; hidden_item = proto_tree_add_uint ( tree , hf_form , tvb , offset , 0 , 1 ) ; PROTO_ITEM_SET_HIDDEN ( hidden_item ) ; offset = dissect_spoolss_buffer ( tvb , offset , pinfo , tree , di , drep , & buffer ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_needed , NULL ) ; col_append_fstr ( pinfo -> cinfo , COL_INFO , ", level %d" , level ) ; if ( buffer . tvb ) { int buffer_offset = 0 ; switch ( level ) { case 1 : { int struct_start = buffer_offset ; dissect_FORM_REL ( buffer . tvb , buffer_offset , pinfo , tree , di , drep , struct_start ) ; break ; } default : proto_tree_add_expert_format ( buffer . tree , pinfo , & ei_form_level , buffer . tvb , buffer_offset , - 1 , "Unknown form info level %d" , level ) ; break ; } } offset = dissect_doserror ( tvb , offset , pinfo , tree , di , drep , hf_rc , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void proto_reg_handoff_zbee_zcl_ota ( void ) { dissector_handle_t ota_handle ; ota_handle = find_dissector ( ZBEE_PROTOABBREV_ZCL_OTA ) ; dissector_add_uint ( "zbee.zcl.cluster" , ZBEE_ZCL_CID_OTA_UPGRADE , ota_handle ) ; zbee_zcl_init_cluster ( proto_zbee_zcl_ota , ett_zbee_zcl_ota , ZBEE_ZCL_CID_OTA_UPGRADE , hf_zbee_zcl_ota_attr_id , hf_zbee_zcl_ota_srv_rx_cmd_id , hf_zbee_zcl_ota_srv_tx_cmd_id , ( zbee_zcl_fn_attr_data ) dissect_zcl_ota_attr_data ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_TransparencyParameters ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_TransparencyParameters , TransparencyParameters_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void message_search_reset ( struct message_search_context * ctx ) { ctx -> content_type_text = TRUE ; ctx -> prev_part = NULL ; str_find_reset ( ctx -> str_find_ctx ) ; message_decoder_decode_reset ( ctx -> decoder ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static long uptomult ( long x , long y ) { assert ( x >= 0 ) ; return ( ( x + y - 1 ) / y ) * y ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void nautilus_file_operations_new_file_from_template ( GtkWidget * parent_view , GdkPoint * target_point , const char * parent_dir , const char * target_filename , const char * template_uri , NautilusCreateCallback done_callback , gpointer done_callback_data ) { GTask * task ; CreateJob * job ; GtkWindow * parent_window ; parent_window = NULL ; if ( parent_view ) { parent_window = ( GtkWindow * ) gtk_widget_get_ancestor ( parent_view , GTK_TYPE_WINDOW ) ; } job = op_job_new ( CreateJob , parent_window ) ; job -> done_callback = done_callback ; job -> done_callback_data = done_callback_data ; job -> dest_dir = g_file_new_for_uri ( parent_dir ) ; if ( target_point != NULL ) { job -> position = * target_point ; job -> has_position = TRUE ; } job -> filename = g_strdup ( target_filename ) ; if ( template_uri ) { job -> src = g_file_new_for_uri ( template_uri ) ; } if ( ! nautilus_file_undo_manager_is_operating ( ) ) { job -> common . undo_info = nautilus_file_undo_info_create_new ( NAUTILUS_FILE_UNDO_OP_CREATE_FILE_FROM_TEMPLATE ) ; } task = g_task_new ( NULL , job -> common . cancellable , create_task_done , job ) ; g_task_set_task_data ( task , job , NULL ) ; g_task_run_in_thread ( task , create_task_thread_func ) ; g_object_unref ( task ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static VALUE ossl_x509name_to_s ( int argc , VALUE * argv , VALUE self ) { X509_NAME * name ; VALUE flag , str ; BIO * out ; unsigned long iflag ; rb_scan_args ( argc , argv , "01" , & flag ) ; if ( NIL_P ( flag ) ) return ossl_x509name_to_s_old ( self ) ; else iflag = NUM2ULONG ( flag ) ; if ( ! ( out = BIO_new ( BIO_s_mem ( ) ) ) ) ossl_raise ( eX509NameError , NULL ) ; GetX509Name ( self , name ) ; if ( ! X509_NAME_print_ex ( out , name , 0 , iflag ) ) { BIO_free ( out ) ; ossl_raise ( eX509NameError , NULL ) ; } str = ossl_membio2str ( out ) ; return str ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int tunnel_tun ( int tun_fd , int dns_fd ) { unsigned long outlen ; struct ip * header ; char out [ 64 * 1024 ] ; char in [ 64 * 1024 ] ; int userid ; int read ; if ( ( read = read_tun ( tun_fd , in , sizeof ( in ) ) ) <= 0 ) return 0 ; header = ( struct ip * ) ( in + 4 ) ; userid = find_user_by_ip ( header -> ip_dst . s_addr ) ; if ( userid < 0 ) return 0 ; outlen = sizeof ( out ) ; compress2 ( ( uint8_t * ) out , & outlen , ( uint8_t * ) in , read , 9 ) ; if ( users [ userid ] . conn == CONN_DNS_NULL ) { # ifdef OUTPACKETQ_LEN if ( users [ userid ] . outpacket . len > 0 ) { save_to_outpacketq ( userid , out , outlen ) ; return 0 ; } # endif start_new_outpacket ( userid , out , outlen ) ; if ( users [ userid ] . q_sendrealsoon . id != 0 ) send_chunk_or_dataless ( dns_fd , userid , & users [ userid ] . q_sendrealsoon ) ; else if ( users [ userid ] . q . id != 0 ) send_chunk_or_dataless ( dns_fd , userid , & users [ userid ] . q ) ; return outlen ; } else { send_raw ( dns_fd , out , outlen , userid , RAW_HDR_CMD_DATA , & users [ userid ] . q ) ; return outlen ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
extern int name ( int , locale_t ) __THROW __exctype_l ( isalnum_l ) ; __exctype_l ( isalpha_l ) ; __exctype_l ( iscntrl_l ) ; __exctype_l ( isdigit_l ) ; __exctype_l ( islower_l ) ; __exctype_l ( isgraph_l ) ; __exctype_l ( isprint_l ) ; __exctype_l ( ispunct_l ) ; __exctype_l ( isspace_l ) ; __exctype_l ( isupper_l )
0False
Categorize the following code snippet as vulnerable or not. True or False
const char * TSHttpHdrReasonLookup ( TSHttpStatus status ) { return http_hdr_reason_lookup ( ( HTTPStatus ) status ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void ac6_proc_exit ( struct net * net ) { }
0False
Categorize the following code snippet as vulnerable or not. True or False
int MDC2_Init ( MDC2_CTX * c ) { c -> num = 0 ; c -> pad_type = 1 ; memset ( & ( c -> h [ 0 ] ) , 0x52 , MDC2_BLOCK ) ; memset ( & ( c -> hh [ 0 ] ) , 0x25 , MDC2_BLOCK ) ; return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void web_server_destroy ( void ) { if ( bWebServerState == WEB_SERVER_ENABLED ) { membuffer_destroy ( & gDocumentRootDir ) ; alias_release ( & gAliasDoc ) ; ithread_mutex_lock ( & gWebMutex ) ; memset ( & gAliasDoc , 0 , sizeof ( struct xml_alias_t ) ) ; ithread_mutex_unlock ( & gWebMutex ) ; ithread_mutex_destroy ( & gWebMutex ) ; bWebServerState = WEB_SERVER_DISABLED ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void get_icu_disp_value_src_php ( char * tag_name , INTERNAL_FUNCTION_PARAMETERS ) { const char * loc_name = NULL ; int loc_name_len = 0 ; const char * disp_loc_name = NULL ; int disp_loc_name_len = 0 ; int free_loc_name = 0 ; UChar * disp_name = NULL ; int32_t disp_name_len = 0 ; char * mod_loc_name = NULL ; int32_t buflen = 512 ; UErrorCode status = U_ZERO_ERROR ; char * utf8value = NULL ; int utf8value_len = 0 ; char * msg = NULL ; int grOffset = 0 ; intl_error_reset ( NULL TSRMLS_CC ) ; if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "s|s" , & loc_name , & loc_name_len , & disp_loc_name , & disp_loc_name_len ) == FAILURE ) { spprintf ( & msg , 0 , "locale_get_display_%s : unable to parse input params" , tag_name ) ; intl_error_set ( NULL , U_ILLEGAL_ARGUMENT_ERROR , msg , 1 TSRMLS_CC ) ; efree ( msg ) ; RETURN_FALSE ; } if ( loc_name_len > ULOC_FULLNAME_CAPACITY ) { spprintf ( & msg , 0 , "locale_get_display_%s : name too long" , tag_name ) ; intl_error_set ( NULL , U_ILLEGAL_ARGUMENT_ERROR , msg , 1 TSRMLS_CC ) ; efree ( msg ) ; RETURN_FALSE ; } if ( loc_name_len == 0 ) { loc_name = intl_locale_get_default ( TSRMLS_C ) ; } if ( strcmp ( tag_name , DISP_NAME ) != 0 ) { grOffset = findOffset ( LOC_GRANDFATHERED , loc_name ) ; if ( grOffset >= 0 ) { if ( strcmp ( tag_name , LOC_LANG_TAG ) == 0 ) { mod_loc_name = getPreferredTag ( loc_name ) ; } else { RETURN_FALSE ; } } } if ( mod_loc_name == NULL ) { mod_loc_name = estrdup ( loc_name ) ; } if ( ! disp_loc_name ) { disp_loc_name = estrdup ( intl_locale_get_default ( TSRMLS_C ) ) ; free_loc_name = 1 ; } do { disp_name = erealloc ( disp_name , buflen * sizeof ( UChar ) ) ; disp_name_len = buflen ; if ( strcmp ( tag_name , LOC_LANG_TAG ) == 0 ) { buflen = uloc_getDisplayLanguage ( mod_loc_name , disp_loc_name , disp_name , disp_name_len , & status ) ; } else if ( strcmp ( tag_name , LOC_SCRIPT_TAG ) == 0 ) { buflen = uloc_getDisplayScript ( mod_loc_name , disp_loc_name , disp_name , disp_name_len , & status ) ; } else if ( strcmp ( tag_name , LOC_REGION_TAG ) == 0 ) { buflen = uloc_getDisplayCountry ( mod_loc_name , disp_loc_name , disp_name , disp_name_len , & status ) ; } else if ( strcmp ( tag_name , LOC_VARIANT_TAG ) == 0 ) { buflen = uloc_getDisplayVariant ( mod_loc_name , disp_loc_name , disp_name , disp_name_len , & status ) ; } else if ( strcmp ( tag_name , DISP_NAME ) == 0 ) { buflen = uloc_getDisplayName ( mod_loc_name , disp_loc_name , disp_name , disp_name_len , & status ) ; } if ( U_FAILURE ( status ) ) { if ( status == U_BUFFER_OVERFLOW_ERROR ) { status = U_ZERO_ERROR ; continue ; } spprintf ( & msg , 0 , "locale_get_display_%s : unable to get locale %s" , tag_name , tag_name ) ; intl_error_set ( NULL , status , msg , 1 TSRMLS_CC ) ; efree ( msg ) ; if ( disp_name ) { efree ( disp_name ) ; } if ( mod_loc_name ) { efree ( mod_loc_name ) ; } if ( free_loc_name ) { efree ( ( void * ) disp_loc_name ) ; disp_loc_name = NULL ; } RETURN_FALSE ; } } while ( buflen > disp_name_len ) ; if ( mod_loc_name ) { efree ( mod_loc_name ) ; } if ( free_loc_name ) { efree ( ( void * ) disp_loc_name ) ; disp_loc_name = NULL ; } intl_convert_utf16_to_utf8 ( & utf8value , & utf8value_len , disp_name , buflen , & status ) ; efree ( disp_name ) ; if ( U_FAILURE ( status ) ) { spprintf ( & msg , 0 , "locale_get_display_%s :error converting display name for %s to UTF-8" , tag_name , tag_name ) ; intl_error_set ( NULL , status , msg , 1 TSRMLS_CC ) ; efree ( msg ) ; RETURN_FALSE ; } RETVAL_STRINGL ( utf8value , utf8value_len , FALSE ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void process_blob ( struct rev_info * revs , struct blob * blob , show_object_fn show , struct strbuf * path , const char * name , void * cb_data ) { struct object * obj = & blob -> object ; size_t pathlen ; if ( ! revs -> blob_objects ) return ; if ( ! obj ) die ( "bad blob object" ) ; if ( obj -> flags & ( UNINTERESTING | SEEN ) ) return ; obj -> flags |= SEEN ; pathlen = path -> len ; strbuf_addstr ( path , name ) ; show ( obj , path -> buf , cb_data ) ; strbuf_setlen ( path , pathlen ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void virtio_net_tx_bh ( void * opaque ) { VirtIONet * n = opaque ; int32_t ret ; assert ( n -> vdev . vm_running ) ; n -> tx_waiting = 0 ; if ( unlikely ( ! ( n -> vdev . status & VIRTIO_CONFIG_S_DRIVER_OK ) ) ) return ; ret = virtio_net_flush_tx ( n , n -> tx_vq ) ; if ( ret == - EBUSY ) { return ; } if ( ret >= n -> tx_burst ) { qemu_bh_schedule ( n -> tx_bh ) ; n -> tx_waiting = 1 ; return ; } virtio_queue_set_notification ( n -> tx_vq , 1 ) ; if ( virtio_net_flush_tx ( n , n -> tx_vq ) > 0 ) { virtio_queue_set_notification ( n -> tx_vq , 0 ) ; qemu_bh_schedule ( n -> tx_bh ) ; n -> tx_waiting = 1 ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void cmyk2rgb ( fz_context * ctx , fz_color_converter * cc , float * dv , const float * sv ) { # ifdef SLOWCMYK cmyk_to_rgb ( ctx , NULL , sv , dv ) ; # else dv [ 0 ] = 1 - fz_min ( sv [ 0 ] + sv [ 3 ] , 1 ) ; dv [ 1 ] = 1 - fz_min ( sv [ 1 ] + sv [ 3 ] , 1 ) ; dv [ 2 ] = 1 - fz_min ( sv [ 2 ] + sv [ 3 ] , 1 ) ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void do_rematrixing ( AC3DecodeContext * s ) { int bnd , i ; int end , bndend ; end = FFMIN ( s -> end_freq [ 1 ] , s -> end_freq [ 2 ] ) ; for ( bnd = 0 ; bnd < s -> num_rematrixing_bands ; bnd ++ ) { if ( s -> rematrixing_flags [ bnd ] ) { bndend = FFMIN ( end , ff_ac3_rematrix_band_tab [ bnd + 1 ] ) ; for ( i = ff_ac3_rematrix_band_tab [ bnd ] ; i < bndend ; i ++ ) { int tmp0 = s -> fixed_coeffs [ 1 ] [ i ] ; s -> fixed_coeffs [ 1 ] [ i ] += s -> fixed_coeffs [ 2 ] [ i ] ; s -> fixed_coeffs [ 2 ] [ i ] = tmp0 - s -> fixed_coeffs [ 2 ] [ i ] ; } } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static afs_int32 iNewEntry ( struct rx_call * call , char aname [ ] , afs_int32 aid , afs_int32 oid , afs_int32 * cid ) { struct ubik_trans * tt ; afs_int32 code ; afs_int32 gflag = 0 ; int admin ; stolower ( aname ) ; code = Initdb ( ) ; if ( code != PRSUCCESS ) return code ; code = ubik_BeginTrans ( dbase , UBIK_WRITETRANS , & tt ) ; if ( code ) return code ; code = ubik_SetLock ( tt , 1 , 1 , LOCKWRITE ) ; if ( code ) ABORT_WITH ( tt , code ) ; code = read_DbHeader ( tt ) ; if ( code ) ABORT_WITH ( tt , code ) ; code = WhoIsThis ( call , tt , cid ) ; if ( code ) ABORT_WITH ( tt , PRPERM ) ; admin = IsAMemberOf ( tt , * cid , SYSADMINID ) ; if ( aid == 0 ) ABORT_WITH ( tt , PRPERM ) ; if ( aid < 0 ) { gflag |= PRGRP ; if ( ! admin && ! pr_noAuth && ( aid != ntohl ( cheader . maxGroup ) - 1 ) ) ABORT_WITH ( tt , PRPERM ) ; } if ( FindByID ( tt , aid ) ) ABORT_WITH ( tt , PRIDEXIST ) ; if ( ! CreateOK ( tt , * cid , oid , gflag , admin ) ) ABORT_WITH ( tt , PRPERM ) ; code = CreateEntry ( tt , aname , & aid , 1 , gflag , oid , * cid ) ; if ( code != PRSUCCESS ) ABORT_WITH ( tt , code ) ; code = ubik_EndTrans ( tt ) ; if ( code ) return code ; return PRSUCCESS ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void get_command_type ( struct st_command * command ) { char save ; uint type ; DBUG_ENTER ( "get_command_type" ) ; if ( * command -> query == '} ' ) { command -> type = Q_END_BLOCK ; DBUG_VOID_RETURN ; } save = command -> query [ command -> first_word_len ] ; command -> query [ command -> first_word_len ] = 0 ; type = find_type ( command -> query , & command_typelib , FIND_TYPE_NO_PREFIX ) ; command -> query [ command -> first_word_len ] = save ; if ( type > 0 ) { command -> type = ( enum enum_commands ) type ; if ( type == Q_QUERY ) { command -> query = command -> first_argument ; } } else { if ( command -> type != Q_COMMENT_WITH_COMMAND ) { command -> type = Q_QUERY ; } else { report_or_die ( "Found line beginning with -- that didn't contain " "a valid mysqltest command, check your syntax or " "use # if you intended to write a comment" ) ; command -> type = Q_COMMENT ; } } memcpy ( & command -> expected_errors , & saved_expected_errors , sizeof ( saved_expected_errors ) ) ; DBUG_PRINT ( "info" , ( "There are %d expected errors" , command -> expected_errors . count ) ) ; DBUG_VOID_RETURN ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void steamdiscover_dissect_body_streamingrequest ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree , gint offset , gint bytes_left ) { gint len ; gint64 value ; protobuf_desc_t pb = { tvb , offset , bytes_left } ; protobuf_tag_t tag = { 0 , 0 , 0 } ; while ( protobuf_iter_next ( & pb , & tag ) ) { switch ( tag . field_number ) { case STEAMDISCOVER_FN_STREAMINGREQUEST_REQUESTID : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_uint ( tree , hf_steam_ihs_discovery_body_streamingrequest_requestid , pb . tvb , pb . offset , len , ( guint32 ) value ) ; col_add_fstr ( pinfo -> cinfo , COL_INFO , "%s ID=%08x" , hf_steam_ihs_discovery_header_msgtype_strings [ STEAMDISCOVER_MSGTYPE_DEVICESTREAMINGREQUEST ] . strptr , ( guint32 ) value ) ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_MAXIMUMRESOLUTIONX : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_int ( tree , hf_steam_ihs_discovery_body_streamingrequest_maximumresolutionx , pb . tvb , pb . offset , len , ( gint32 ) value ) ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_MAXIMUMRESOLUTIONY : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_int ( tree , hf_steam_ihs_discovery_body_streamingrequest_maximumresolutiony , pb . tvb , pb . offset , len , ( gint32 ) value ) ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_AUDIOCHANNELCOUNT : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_int ( tree , hf_steam_ihs_discovery_body_streamingrequest_audiochannelcount , pb . tvb , pb . offset , len , ( gint32 ) value ) ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_DEVICEVERSION : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_LENGTHDELIMITED ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_item ( tree , hf_steam_ihs_discovery_body_streamingrequest_deviceversion , pb . tvb , pb . offset + len , ( gint ) value , ENC_UTF_8 | ENC_NA ) ; len += ( gint ) value ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_STREAMDESKTOP : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_boolean ( tree , hf_steam_ihs_discovery_body_streamingrequest_streamdesktop , pb . tvb , pb . offset , len , ( gint32 ) value ) ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_DEVICETOKEN : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_LENGTHDELIMITED ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_item ( tree , hf_steam_ihs_discovery_body_streamingrequest_devicetoken , pb . tvb , pb . offset + len , ( gint ) value , ENC_NA ) ; len += ( gint ) value ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_PIN : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_LENGTHDELIMITED ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_item ( tree , hf_steam_ihs_discovery_body_streamingrequest_pin , pb . tvb , pb . offset + len , ( gint ) value , ENC_NA ) ; len += ( gint ) value ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_ENABLEVIDEOSTREAMING : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_boolean ( tree , hf_steam_ihs_discovery_body_streamingrequest_enablevideostreaming , pb . tvb , pb . offset , len , ( gint32 ) value ) ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_ENABLEAUDIOSTREAMING : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_boolean ( tree , hf_steam_ihs_discovery_body_streamingrequest_enableaudiostreaming , pb . tvb , pb . offset , len , ( gint32 ) value ) ; break ; case STEAMDISCOVER_FN_STREAMINGREQUEST_ENABLEINPUTSTREAMING : STEAMDISCOVER_ENSURE_WIRETYPE ( PROTOBUF_WIRETYPE_VARINT ) ; value = get_varint64 ( pb . tvb , pb . offset , pb . bytes_left , & len ) ; proto_tree_add_boolean ( tree , hf_steam_ihs_discovery_body_streamingrequest_enableinputstreaming , pb . tvb , pb . offset , len , ( gint32 ) value ) ; break ; default : len = protobuf_dissect_unknown_field ( & pb , & tag , pinfo , tree , NULL ) ; break ; } protobuf_seek_forward ( & pb , len ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int qemuAgentFSFreeze ( qemuAgentPtr mon , const char * * mountpoints , unsigned int nmountpoints ) { int ret = - 1 ; virJSONValuePtr cmd , arg = NULL ; virJSONValuePtr reply = NULL ; if ( mountpoints && nmountpoints ) { arg = qemuAgentMakeStringsArray ( mountpoints , nmountpoints ) ; if ( ! arg ) return - 1 ; cmd = qemuAgentMakeCommand ( "guest-fsfreeze-freeze-list" , "a:mountpoints" , arg , NULL ) ; } else { cmd = qemuAgentMakeCommand ( "guest-fsfreeze-freeze" , NULL ) ; } if ( ! cmd ) goto cleanup ; arg = NULL ; if ( qemuAgentCommand ( mon , cmd , & reply , true , VIR_DOMAIN_QEMU_AGENT_COMMAND_BLOCK ) < 0 ) goto cleanup ; if ( virJSONValueObjectGetNumberInt ( reply , "return" , & ret ) < 0 ) { virReportError ( VIR_ERR_INTERNAL_ERROR , "%s" , _ ( "malformed return value" ) ) ; } cleanup : virJSONValueFree ( arg ) ; virJSONValueFree ( cmd ) ; virJSONValueFree ( reply ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void HtmlPut ( char * * ppsz_html , const char * psz_text ) { HtmlNPut ( ppsz_html , psz_text , INT_MAX ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_inode_rename ( struct inode * old_inode , struct dentry * old_dentry , struct inode * new_inode , struct dentry * new_dentry ) { return may_rename ( old_inode , old_dentry , new_inode , new_dentry ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int checkcmap ( int n , uint16 * r , uint16 * g , uint16 * b ) { while ( n -- > 0 ) if ( * r ++ >= 256 || * g ++ >= 256 || * b ++ >= 256 ) return ( 16 ) ; fprintf ( stderr , "Warning, assuming 8-bit colormap.\n" ) ; return ( 8 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int ssl_cert_type ( X509 * x , EVP_PKEY * pkey ) { EVP_PKEY * pk ; int ret = - 1 , i ; if ( pkey == NULL ) pk = X509_get_pubkey ( x ) ; else pk = pkey ; if ( pk == NULL ) goto err ; i = pk -> type ; if ( i == EVP_PKEY_RSA ) { ret = SSL_PKEY_RSA_ENC ; } else if ( i == EVP_PKEY_DSA ) { ret = SSL_PKEY_DSA_SIGN ; } # ifndef OPENSSL_NO_EC else if ( i == EVP_PKEY_EC ) { ret = SSL_PKEY_ECC ; } # endif else if ( i == NID_id_GostR3410_94 || i == NID_id_GostR3410_94_cc ) { ret = SSL_PKEY_GOST94 ; } else if ( i == NID_id_GostR3410_2001 || i == NID_id_GostR3410_2001_cc ) { ret = SSL_PKEY_GOST01 ; } err : if ( ! pkey ) EVP_PKEY_free ( pk ) ; return ( ret ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline PixelTrait GetPixelYellowTraits ( const Image * restrict image ) { return ( image -> channel_map [ YellowPixelChannel ] . traits ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int gdev_pdf_put_params_impl ( gx_device * dev , const gx_device_pdf * save_dev , gs_param_list * plist ) { int ecode , code ; gx_device_pdf * pdev = ( gx_device_pdf * ) dev ; float cl = ( float ) pdev -> CompatibilityLevel ; bool locked = pdev -> params . LockDistillerParams , ForOPDFRead ; gs_param_name param_name ; pdev -> pdf_memory = gs_memory_stable ( pdev -> memory ) ; { gs_param_string_array ppa ; gs_param_string pps ; code = param_read_string_array ( plist , ( param_name = "pdfmark" ) , & ppa ) ; switch ( code ) { case 0 : code = pdfwrite_pdf_open_document ( pdev ) ; if ( code < 0 ) return code ; code = pdfmark_process ( pdev , & ppa ) ; if ( code >= 0 ) return code ; default : param_signal_error ( plist , param_name , code ) ; return code ; case 1 : break ; } code = param_read_string_array ( plist , ( param_name = "DSC" ) , & ppa ) ; switch ( code ) { case 0 : code = pdfwrite_pdf_open_document ( pdev ) ; if ( code < 0 ) return code ; code = pdf_dsc_process ( pdev , & ppa ) ; if ( code >= 0 ) return code ; default : param_signal_error ( plist , param_name , code ) ; return code ; case 1 : break ; } code = param_read_string ( plist , ( param_name = "pdfpagelabels" ) , & pps ) ; switch ( code ) { case 0 : { if ( ! pdev -> ForOPDFRead ) { cos_dict_t * const pcd = pdev -> Catalog ; code = pdfwrite_pdf_open_document ( pdev ) ; if ( code < 0 ) return code ; code = cos_dict_put_string ( pcd , ( const byte * ) "/PageLabels" , 11 , pps . data , pps . size ) ; if ( code >= 0 ) return code ; } else return 0 ; } default : param_signal_error ( plist , param_name , code ) ; return code ; case 1 : break ; } } ecode = param_read_bool ( plist , "LockDistillerParams" , & locked ) ; if ( ecode < 0 ) param_signal_error ( plist , param_name , ecode ) ; { int efo = 1 ; ecode = param_put_int ( plist , ( param_name = ".EmbedFontObjects" ) , & efo , ecode ) ; if ( ecode < 0 ) param_signal_error ( plist , param_name , ecode ) ; if ( efo != 1 ) param_signal_error ( plist , param_name , ecode = gs_error_rangecheck ) ; } { int cdv = CoreDistVersion ; ecode = param_put_int ( plist , ( param_name = "CoreDistVersion" ) , & cdv , ecode ) ; if ( ecode < 0 ) return gs_note_error ( ecode ) ; if ( cdv != CoreDistVersion ) param_signal_error ( plist , param_name , ecode = gs_error_rangecheck ) ; } switch ( code = param_read_float ( plist , ( param_name = "CompatibilityLevel" ) , & cl ) ) { default : ecode = code ; param_signal_error ( plist , param_name , ecode ) ; break ; case 0 : if ( ! ( locked && pdev -> params . LockDistillerParams ) ) { if ( cl < ( float ) 1.15 ) cl = ( float ) 1.1 ; else if ( cl < ( float ) 1.25 ) cl = ( float ) 1.2 ; else if ( cl < ( float ) 1.35 ) cl = ( float ) 1.3 ; else if ( cl < ( float ) 1.45 ) cl = ( float ) 1.4 ; else if ( cl < ( float ) 1.55 ) cl = ( float ) 1.5 ; else if ( cl < ( float ) 1.65 ) cl = ( float ) 1.6 ; else if ( cl < ( float ) 1.75 ) cl = ( float ) 1.7 ; else { cl = ( float ) 2.0 ; if ( pdev -> params . TransferFunctionInfo == tfi_Preserve ) pdev -> params . TransferFunctionInfo = tfi_Apply ; } } case 1 : break ; } { gs_memory_t * mem = plist -> memory ; plist -> memory = pdev -> pdf_memory ; code = gs_param_read_items ( plist , pdev , pdf_param_items ) ; if ( code < 0 || ( code = param_read_bool ( plist , "ForOPDFRead" , & ForOPDFRead ) ) < 0 ) { } if ( code == 0 && ! pdev -> is_ps2write && ! ( locked && pdev -> params . LockDistillerParams ) ) pdev -> ForOPDFRead = ForOPDFRead ; plist -> memory = mem ; } if ( code < 0 ) ecode = code ; { long fon = pdev -> FirstObjectNumber ; if ( fon != save_dev -> FirstObjectNumber ) { if ( fon <= 0 || fon > 0x7fff0000 || ( pdev -> next_id != 0 && pdev -> next_id != save_dev -> FirstObjectNumber + pdf_num_initial_ids ) ) { ecode = gs_error_rangecheck ; param_signal_error ( plist , "FirstObjectNumber" , ecode ) ; } } } { static const char * const pcm_names [ ] = { "DeviceGray" , "DeviceRGB" , "DeviceCMYK" , "DeviceN" , 0 } ; int pcm = - 1 ; ecode = param_put_enum ( plist , "ProcessColorModel" , & pcm , pcm_names , ecode ) ; if ( pcm >= 0 ) { pdf_set_process_color_model ( pdev , pcm ) ; rc_decrement ( pdev -> icc_struct , "gdev_pdf_put_params_impl, ProcessColorModel changed" ) ; pdev -> icc_struct = 0 ; } } if ( ecode < 0 ) goto fail ; if ( pdev -> is_ps2write && ( code = param_read_bool ( plist , "ProduceDSC" , & pdev -> ProduceDSC ) ) < 0 ) { param_signal_error ( plist , param_name , code ) ; } if ( pdev -> PDFA < 0 || pdev -> PDFA > 3 ) { ecode = gs_note_error ( gs_error_rangecheck ) ; param_signal_error ( plist , "PDFA" , ecode ) ; goto fail ; } if ( pdev -> PDFA != 0 && pdev -> AbortPDFAX ) pdev -> PDFA = 0 ; if ( pdev -> PDFX && pdev -> AbortPDFAX ) pdev -> PDFX = 0 ; if ( pdev -> PDFX && pdev -> PDFA != 0 ) { ecode = gs_note_error ( gs_error_rangecheck ) ; param_signal_error ( plist , "PDFA" , ecode ) ; goto fail ; } if ( pdev -> PDFX && pdev -> ForOPDFRead ) { ecode = gs_note_error ( gs_error_rangecheck ) ; param_signal_error ( plist , "PDFX" , ecode ) ; goto fail ; } if ( pdev -> PDFA != 0 && pdev -> ForOPDFRead ) { ecode = gs_note_error ( gs_error_rangecheck ) ; param_signal_error ( plist , "PDFA" , ecode ) ; goto fail ; } if ( pdev -> PDFA == 1 || pdev -> PDFX || pdev -> CompatibilityLevel < 1.4 ) { pdev -> HaveTransparency = false ; pdev -> PreserveSMask = false ; } if ( pdev -> PDFX ) cl = ( float ) 1.3 ; if ( pdev -> PDFA != 0 && cl < 1.4 ) cl = ( float ) 1.4 ; pdev -> version = ( cl < 1.2 ? psdf_version_level2 : psdf_version_ll3 ) ; if ( pdev -> ForOPDFRead ) { pdev -> ResourcesBeforeUsage = true ; pdev -> HaveCFF = false ; pdev -> HavePDFWidths = false ; pdev -> HaveStrokeColor = false ; cl = ( float ) 1.2 ; pdev -> MaxInlineImageSize = max_long ; pdev -> version = psdf_version_level2 ; } else { pdev -> ResourcesBeforeUsage = false ; pdev -> HaveCFF = true ; pdev -> HavePDFWidths = true ; pdev -> HaveStrokeColor = true ; } pdev -> ParamCompatibilityLevel = cl ; if ( cl < 1.2 ) { pdev -> HaveCFF = false ; } ecode = gdev_psdf_put_params ( dev , plist ) ; if ( ecode < 0 ) goto fail ; if ( pdev -> CompatibilityLevel > 1.7 && pdev -> params . TransferFunctionInfo == tfi_Preserve ) { pdev -> params . TransferFunctionInfo = tfi_Apply ; emprintf ( pdev -> memory , "\nIt is not possible to preserve transfer functions in PDF 2.0\ntransfer functions will be applied instead\n" ) ; } if ( pdev -> params . ConvertCMYKImagesToRGB ) { if ( pdev -> params . ColorConversionStrategy == ccs_CMYK ) { emprintf ( pdev -> memory , "ConvertCMYKImagesToRGB is not compatible with ColorConversionStrategy of CMYK\n" ) ; } else { if ( pdev -> params . ColorConversionStrategy == ccs_Gray ) { emprintf ( pdev -> memory , "ConvertCMYKImagesToRGB is not compatible with ColorConversionStrategy of Gray\n" ) ; } else { if ( pdev -> icc_struct ) rc_decrement ( pdev -> icc_struct , "reset default profile\n" ) ; pdf_set_process_color_model ( pdev , 1 ) ; ecode = gsicc_init_device_profile_struct ( ( gx_device * ) pdev , NULL , 0 ) ; if ( ecode < 0 ) goto fail ; } } } switch ( pdev -> params . ColorConversionStrategy ) { case ccs_ByObjectType : case ccs_LeaveColorUnchanged : break ; case ccs_UseDeviceDependentColor : case ccs_UseDeviceIndependentColor : case ccs_UseDeviceIndependentColorForImages : pdev -> params . TransferFunctionInfo = tfi_Apply ; break ; case ccs_CMYK : pdev -> params . TransferFunctionInfo = tfi_Apply ; if ( pdev -> icc_struct ) rc_decrement ( pdev -> icc_struct , "reset default profile\n" ) ; pdf_set_process_color_model ( pdev , 2 ) ; ecode = gsicc_init_device_profile_struct ( ( gx_device * ) pdev , NULL , 0 ) ; if ( ecode < 0 ) goto fail ; break ; case ccs_Gray : pdev -> params . TransferFunctionInfo = tfi_Apply ; if ( pdev -> icc_struct ) rc_decrement ( pdev -> icc_struct , "reset default profile\n" ) ; pdf_set_process_color_model ( pdev , 0 ) ; ecode = gsicc_init_device_profile_struct ( ( gx_device * ) pdev , NULL , 0 ) ; if ( ecode < 0 ) goto fail ; break ; case ccs_sRGB : case ccs_RGB : pdev -> params . TransferFunctionInfo = tfi_Apply ; if ( ! pdev -> params . ConvertCMYKImagesToRGB ) { if ( pdev -> icc_struct ) rc_decrement ( pdev -> icc_struct , "reset default profile\n" ) ; pdf_set_process_color_model ( pdev , 1 ) ; ecode = gsicc_init_device_profile_struct ( ( gx_device * ) pdev , NULL , 0 ) ; if ( ecode < 0 ) goto fail ; } break ; default : break ; } if ( cl < 1.5f && pdev -> params . ColorImage . Filter != NULL && ! strcmp ( pdev -> params . ColorImage . Filter , "JPXEncode" ) ) { emprintf ( pdev -> memory , "JPXEncode requires CompatibilityLevel >= 1.5 .\n" ) ; ecode = gs_note_error ( gs_error_rangecheck ) ; } if ( cl < 1.5f && pdev -> params . GrayImage . Filter != NULL && ! strcmp ( pdev -> params . GrayImage . Filter , "JPXEncode" ) ) { emprintf ( pdev -> memory , "JPXEncode requires CompatibilityLevel >= 1.5 .\n" ) ; ecode = gs_note_error ( gs_error_rangecheck ) ; } if ( cl < 1.4f && pdev -> params . MonoImage . Filter != NULL && ! strcmp ( pdev -> params . MonoImage . Filter , "JBIG2Encode" ) ) { emprintf ( pdev -> memory , "JBIG2Encode requires CompatibilityLevel >= 1.4 .\n" ) ; ecode = gs_note_error ( gs_error_rangecheck ) ; } if ( pdev -> HaveTrueTypes && pdev -> version == psdf_version_level2 ) { pdev -> version = psdf_version_level2_with_TT ; } if ( ecode < 0 ) goto fail ; if ( pdev -> FirstObjectNumber != save_dev -> FirstObjectNumber ) { if ( pdev -> xref . file != 0 ) { if ( gp_fseek_64 ( pdev -> xref . file , 0L , SEEK_SET ) != 0 ) { ecode = gs_error_ioerror ; goto fail ; } pdf_initialize_ids ( pdev ) ; } } pdev -> CompatibilityLevel = ( int ) ( cl * 10 + 0.5 ) / 10.0 ; if ( pdev -> OwnerPassword . size != save_dev -> OwnerPassword . size || ( pdev -> OwnerPassword . size != 0 && memcmp ( pdev -> OwnerPassword . data , save_dev -> OwnerPassword . data , pdev -> OwnerPassword . size ) != 0 ) ) { if ( pdev -> is_open ) { if ( pdev -> PageCount == 0 ) { gs_closedevice ( ( gx_device * ) save_dev ) ; return 0 ; } else emprintf ( pdev -> memory , "Owner Password changed mid-job, ignoring.\n" ) ; } } if ( pdev -> Linearise && pdev -> is_ps2write ) { emprintf ( pdev -> memory , "Can't linearise PostScript output, ignoring\n" ) ; pdev -> Linearise = false ; } if ( pdev -> Linearise && pdev -> OwnerPassword . size != 0 ) { emprintf ( pdev -> memory , "Can't linearise encrypted PDF, ignoring\n" ) ; pdev -> Linearise = false ; } if ( pdev -> FlattenFonts ) pdev -> PreserveTrMode = false ; return 0 ; fail : pdev -> version = save_dev -> version ; pdf_set_process_color_model ( pdev , save_dev -> pcm_color_info_index ) ; pdev -> saved_fill_color = save_dev -> saved_fill_color ; pdev -> saved_stroke_color = save_dev -> saved_fill_color ; { const gs_param_item_t * ppi = pdf_param_items ; for ( ; ppi -> key ; ++ ppi ) memcpy ( ( char * ) pdev + ppi -> offset , ( char * ) save_dev + ppi -> offset , gs_param_type_sizes [ ppi -> type ] ) ; pdev -> ForOPDFRead = save_dev -> ForOPDFRead ; } return ecode ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void test_simplesignal ( void ) { struct event ev ; struct itimerval itv ; setup_test ( "Simple signal: " ) ; signal_set ( & ev , SIGALRM , signal_cb , & ev ) ; signal_add ( & ev , NULL ) ; signal_del ( & ev ) ; signal_add ( & ev , NULL ) ; memset ( & itv , 0 , sizeof ( itv ) ) ; itv . it_value . tv_sec = 1 ; if ( setitimer ( ITIMER_REAL , & itv , NULL ) == - 1 ) goto skip_simplesignal ; event_dispatch ( ) ; skip_simplesignal : if ( signal_del ( & ev ) == - 1 ) test_ok = 0 ; cleanup_test ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static PHP_NAMED_FUNCTION ( zif_zip_entry_close ) { zval * zip_entry ; zip_read_rsrc * zr_rsrc ; if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "r" , & zip_entry ) == FAILURE ) { return ; } ZEND_FETCH_RESOURCE ( zr_rsrc , zip_read_rsrc * , & zip_entry , - 1 , le_zip_entry_name , le_zip_entry ) ; RETURN_BOOL ( SUCCESS == zend_list_delete ( Z_LVAL_P ( zip_entry ) ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static uint32_t e1000e_txdesc_writeback ( E1000ECore * core , dma_addr_t base , struct e1000_tx_desc * dp , bool * ide , int queue_idx ) { uint32_t txd_upper , txd_lower = le32_to_cpu ( dp -> lower . data ) ; if ( ! ( txd_lower & E1000_TXD_CMD_RS ) && ! ( core -> mac [ IVAR ] & E1000_IVAR_TX_INT_EVERY_WB ) ) { return 0 ; } * ide = ( txd_lower & E1000_TXD_CMD_IDE ) ? true : false ; txd_upper = le32_to_cpu ( dp -> upper . data ) | E1000_TXD_STAT_DD ; dp -> upper . data = cpu_to_le32 ( txd_upper ) ; pci_dma_write ( core -> owner , base + ( ( char * ) & dp -> upper - ( char * ) dp ) , & dp -> upper , sizeof ( dp -> upper ) ) ; return e1000e_tx_wb_interrupt_cause ( core , queue_idx ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExternalProtocolHandlerTest , TestLaunchSchemeUnBlockedChromeNotDefault ) { DoTest ( ExternalProtocolHandler : : DONT_BLOCK , shell_integration : : NOT_DEFAULT , Action : : LAUNCH ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void mspack_fmap_free ( void * mem ) { if ( mem ) { free ( mem ) ; mem = NULL ; } return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
zend_object_value pdo_dbstmt_new ( zend_class_entry * ce TSRMLS_DC ) { zend_object_value retval ; pdo_stmt_t * stmt ; stmt = emalloc ( sizeof ( * stmt ) ) ; memset ( stmt , 0 , sizeof ( * stmt ) ) ; zend_object_std_init ( & stmt -> std , ce TSRMLS_CC ) ; object_properties_init ( & stmt -> std , ce ) ; stmt -> refcount = 1 ; retval . handle = zend_objects_store_put ( stmt , ( zend_objects_store_dtor_t ) zend_objects_destroy_object , ( zend_objects_free_object_storage_t ) pdo_dbstmt_free_storage , ( zend_objects_store_clone_t ) dbstmt_clone_obj TSRMLS_CC ) ; retval . handlers = & pdo_dbstmt_object_handlers ; return retval ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_MIPAddress ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_MIPAddress , MIPAddress_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void DerFree ( Asn1Generic * a ) { Asn1Generic * it , * n ; if ( a == NULL ) return ; it = a ; while ( it ) { n = it -> next ; if ( it -> data ) { DerFree ( it -> data ) ; } if ( it -> str ) SCFree ( it -> str ) ; memset ( it , 0xff , sizeof ( Asn1Generic ) ) ; SCFree ( it ) ; it = n ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int AlreadyMSSymbolArea ( SplineFont * sf , EncMap * map ) { int i ; int acnt = 0 , pcnt = 0 ; for ( i = 0 ; i < map -> enccount && i < 0xffff ; ++ i ) { if ( map -> map [ i ] != - 1 && sf -> glyphs [ map -> map [ i ] ] != NULL && sf -> glyphs [ map -> map [ i ] ] -> ttf_glyph != - 1 ) { if ( i >= 0xf000 && i <= 0xf0ff ) ++ pcnt ; else if ( i >= 0x20 && i <= 0xff ) ++ acnt ; } } return ( pcnt > acnt ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int h263_decode_gob_header ( MpegEncContext * s ) { unsigned int val , gob_number ; int left ; val = show_bits ( & s -> gb , 16 ) ; if ( val ) return - 1 ; skip_bits ( & s -> gb , 16 ) ; left = get_bits_left ( & s -> gb ) ; for ( ; left > 13 ; left -- ) { if ( get_bits1 ( & s -> gb ) ) break ; } if ( left <= 13 ) return - 1 ; if ( s -> h263_slice_structured ) { if ( get_bits1 ( & s -> gb ) == 0 ) return - 1 ; ff_h263_decode_mba ( s ) ; if ( s -> mb_num > 1583 ) if ( get_bits1 ( & s -> gb ) == 0 ) return - 1 ; s -> qscale = get_bits ( & s -> gb , 5 ) ; if ( get_bits1 ( & s -> gb ) == 0 ) return - 1 ; skip_bits ( & s -> gb , 2 ) ; } else { gob_number = get_bits ( & s -> gb , 5 ) ; s -> mb_x = 0 ; s -> mb_y = s -> gob_index * gob_number ; skip_bits ( & s -> gb , 2 ) ; s -> qscale = get_bits ( & s -> gb , 5 ) ; } if ( s -> mb_y >= s -> mb_height ) return - 1 ; if ( s -> qscale == 0 ) return - 1 ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static Datum ExecEvalScalarVar ( ExprState * exprstate , ExprContext * econtext , bool * isNull , ExprDoneCond * isDone ) { Var * variable = ( Var * ) exprstate -> expr ; TupleTableSlot * slot ; AttrNumber attnum ; if ( isDone ) * isDone = ExprSingleResult ; switch ( variable -> varno ) { case INNER_VAR : slot = econtext -> ecxt_innertuple ; break ; case OUTER_VAR : slot = econtext -> ecxt_outertuple ; break ; default : slot = econtext -> ecxt_scantuple ; break ; } attnum = variable -> varattno ; Assert ( attnum != InvalidAttrNumber ) ; if ( attnum > 0 ) { TupleDesc slot_tupdesc = slot -> tts_tupleDescriptor ; Form_pg_attribute attr ; if ( attnum > slot_tupdesc -> natts ) elog ( ERROR , "attribute number %d exceeds number of columns %d" , attnum , slot_tupdesc -> natts ) ; attr = slot_tupdesc -> attrs [ attnum - 1 ] ; if ( ! attr -> attisdropped ) { if ( variable -> vartype != attr -> atttypid ) ereport ( ERROR , ( errcode ( ERRCODE_DATATYPE_MISMATCH ) , errmsg ( "attribute %d has wrong type" , attnum ) , errdetail ( "Table has type %s, but query expects %s." , format_type_be ( attr -> atttypid ) , format_type_be ( variable -> vartype ) ) ) ) ; } } exprstate -> evalfunc = ExecEvalScalarVarFast ; return slot_getattr ( slot , attnum , isNull ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_sad ## m ## x ## n ## x4d_c ( const uint8_t * src , int src_stride , const uint8_t * const refs [ ] , int ref_stride , unsigned int * sads ) { int i ; for ( i = 0 ; i < 4 ; ++ i ) sads [ i ] = vp9_sad ## m ## x ## n ## _c ( src , src_stride , refs [ i ] , ref_stride ) ; \ } sadMxN ( 64 , 64 ) sadMxNxK ( 64 , 64 , 3 ) sadMxNxK ( 64 , 64 , 8 ) sadMxNx4D ( 64 , 64 ) sadMxN ( 64 , 32 ) sadMxNx4D ( 64 , 32 ) sadMxN ( 32 , 64 ) sadMxNx4D ( 32 , 64 ) sadMxN ( 32 , 32 ) sadMxNxK ( 32 , 32 , 3 ) sadMxNxK ( 32 , 32 , 8 ) sadMxNx4D ( 32 , 32 ) sadMxN ( 32 , 16 ) sadMxNx4D ( 32 , 16 ) sadMxN ( 16 , 32 ) sadMxNx4D ( 16 , 32 ) sadMxN ( 16 , 16 ) sadMxNxK ( 16 , 16 , 3 ) sadMxNxK ( 16 , 16 , 8 ) sadMxNx4D ( 16 , 16 ) sadMxN ( 16 , 8 ) sadMxNxK ( 16 , 8 , 3 ) sadMxNxK ( 16 , 8 , 8 ) sadMxNx4D ( 16 , 8 ) sadMxN ( 8 , 16 ) sadMxNxK ( 8 , 16 , 3 ) sadMxNxK ( 8 , 16 , 8 ) sadMxNx4D ( 8 , 16 ) sadMxN ( 8 , 8 ) sadMxNxK ( 8 , 8 , 3 ) sadMxNxK ( 8 , 8 , 8 ) sadMxNx4D ( 8 , 8 ) sadMxN ( 8 , 4 ) sadMxNxK ( 8 , 4 , 8 ) sadMxNx4D ( 8 , 4 ) sadMxN ( 4 , 8 ) sadMxNxK ( 4 , 8 , 8 ) sadMxNx4D ( 4 , 8 ) sadMxN ( 4 , 4 ) sadMxNxK ( 4 , 4 , 3 ) sadMxNxK ( 4 , 4 , 8 ) sadMxNx4D ( 4 , 4 )
0False
Categorize the following code snippet as vulnerable or not. True or False
inline static void _slurm_rpc_dump_licenses ( slurm_msg_t * msg ) { DEF_TIMERS ; char * dump ; int dump_size ; slurm_msg_t response_msg ; license_info_request_msg_t * lic_req_msg ; uid_t uid = g_slurm_auth_get_uid ( msg -> auth_cred , slurmctld_config . auth_info ) ; START_TIMER ; debug2 ( "%s: Processing RPC: REQUEST_LICENSE_INFO uid=%d" , __func__ , uid ) ; lic_req_msg = ( license_info_request_msg_t * ) msg -> data ; if ( ( lic_req_msg -> last_update - 1 ) >= last_license_update ) { debug2 ( "%s: no change SLURM_NO_CHANGE_IN_DATA" , __func__ ) ; slurm_send_rc_msg ( msg , SLURM_NO_CHANGE_IN_DATA ) ; return ; } get_all_license_info ( & dump , & dump_size , uid , msg -> protocol_version ) ; END_TIMER2 ( "_slurm_rpc_dump_licenses" ) ; debug2 ( "%s: size=%d %s" , __func__ , dump_size , TIME_STR ) ; slurm_msg_t_init ( & response_msg ) ; response_msg . flags = msg -> flags ; response_msg . protocol_version = msg -> protocol_version ; response_msg . address = msg -> address ; response_msg . conn = msg -> conn ; response_msg . msg_type = RESPONSE_LICENSE_INFO ; response_msg . data = dump ; response_msg . data_size = dump_size ; slurm_send_node_msg ( msg -> conn_fd , & response_msg ) ; xfree ( dump ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static __inline__ void TLV_SET_TYPE ( struct tlv_desc * tlv , __u16 type ) { tlv -> tlv_type = htons ( type ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int vp3_init_thread_copy ( AVCodecContext * avctx ) { Vp3DecodeContext * s = avctx -> priv_data ; s -> superblock_coding = NULL ; s -> all_fragments = NULL ; s -> coded_fragment_list [ 0 ] = NULL ; s -> dct_tokens_base = NULL ; s -> superblock_fragments = NULL ; s -> macroblock_coding = NULL ; s -> motion_val [ 0 ] = NULL ; s -> motion_val [ 1 ] = NULL ; s -> edge_emu_buffer = NULL ; return init_frames ( s ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void mime_parser_clear ( MIMEParser * parser ) { mime_scanner_clear ( & parser -> m_scanner ) ; _mime_parser_init ( parser ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void U_CALLCONV _UTF7Open ( UConverter * cnv , UConverterLoadArgs * pArgs , UErrorCode * pErrorCode ) { ( void ) pArgs ; if ( UCNV_GET_VERSION ( cnv ) <= 1 ) { cnv -> fromUnicodeStatus = UCNV_GET_VERSION ( cnv ) << 28 ; _UTF7Reset ( cnv , UCNV_RESET_BOTH ) ; } else { * pErrorCode = U_ILLEGAL_ARGUMENT_ERROR ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static char * emnc10_opaque_binary_attr ( tvbuff_t * tvb , guint32 offset , guint8 token , guint8 codepage , guint32 * length ) { guint32 data_len = tvb_get_guintvar ( tvb , offset , length ) ; char * str = NULL ; switch ( codepage ) { case 0 : switch ( token ) { case 0x05 : str = date_time_from_opaque ( tvb , offset + * length , data_len ) ; break ; default : break ; } break ; default : break ; } if ( str == NULL ) { str = wmem_strdup_printf ( wmem_packet_scope ( ) , "(%d bytes of unparsed opaque data)" , data_len ) ; } * length += data_len ; return str ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static uint ms_to_precision ( uint ms ) { uint cut , precision ; for ( cut = 10 , precision = 6 ; precision > 0 ; cut *= 10 , precision -- ) { if ( ms % cut ) return precision ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dtap_gcc_setup ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len ) { guint32 curr_offset ; guint32 consumed ; guint curr_len ; curr_offset = offset ; curr_len = len ; ELEM_MAND_V ( GSM_A_PDU_TYPE_DTAP , DE_GCC_CALL_REF , NULL ) ; ELEM_OPT_TLV ( 0x7e , GSM_A_PDU_TYPE_DTAP , DE_USER_USER , NULL ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void encode_without_recode_loop ( VP9_COMP * cpi , int q ) { VP9_COMMON * const cm = & cpi -> common ; vp9_clear_system_state ( ) ; vp9_set_quantizer ( cm , q ) ; setup_frame ( cpi ) ; if ( cpi -> oxcf . aq_mode == VARIANCE_AQ ) { vp9_vaq_frame_setup ( cpi ) ; } else if ( cpi -> oxcf . aq_mode == COMPLEXITY_AQ ) { vp9_setup_in_frame_q_adj ( cpi ) ; } else if ( cpi -> oxcf . aq_mode == CYCLIC_REFRESH_AQ ) { vp9_cyclic_refresh_setup ( cpi ) ; } vp9_encode_frame ( cpi ) ; vp9_clear_system_state ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void proto_reg_handoff_mswsp ( void ) { heur_dissector_add ( "smb_transact" , dissect_mswsp_smb , "WSP over SMB1" , "smb1_wsp" , proto_mswsp , HEURISTIC_ENABLE ) ; heur_dissector_add ( "smb2_pipe_subdissectors" , dissect_mswsp_smb2 , "WSP over SMB2" , "smb2_wsp" , proto_mswsp , HEURISTIC_ENABLE ) ; }
0False