instruction
stringclasses 1
value | input
stringlengths 31
235k
| output
class label 2
classes |
---|---|---|
Categorize the following code snippet as vulnerable or not. True or False
|
static gboolean logcat_read_packet ( struct logcat_phdr * logcat , FILE_T fh , struct wtap_pkthdr * phdr , Buffer * buf , int * err , gchar * * err_info ) {
gint bytes_read ;
gint packet_size ;
guint16 payload_length ;
guint tmp [ 2 ] ;
guint8 * pd ;
struct logger_entry * log_entry ;
bytes_read = file_read ( & tmp , 2 , fh ) ;
if ( bytes_read != 2 ) {
* err = file_error ( fh , err_info ) ;
if ( * err == 0 && bytes_read != 0 ) * err = WTAP_ERR_SHORT_READ ;
return FALSE ;
}
payload_length = pletoh16 ( tmp ) ;
if ( logcat -> version == 1 ) {
packet_size = sizeof ( struct logger_entry ) + payload_length ;
}
else if ( logcat -> version == 2 ) {
packet_size = sizeof ( struct logger_entry_v2 ) + payload_length ;
}
else {
return FALSE ;
}
buffer_assure_space ( buf , packet_size ) ;
pd = buffer_start_ptr ( buf ) ;
log_entry = ( struct logger_entry * ) pd ;
memcpy ( pd , tmp , 2 ) ;
bytes_read = file_read ( pd + 2 , packet_size - 2 , fh ) ;
if ( bytes_read != packet_size - 2 ) {
* err = file_error ( fh , err_info ) ;
if ( * err == 0 ) * err = WTAP_ERR_SHORT_READ ;
return FALSE ;
}
phdr -> rec_type = REC_TYPE_PACKET ;
phdr -> presence_flags = WTAP_HAS_TS ;
phdr -> ts . secs = ( time_t ) GINT32_FROM_LE ( log_entry -> sec ) ;
phdr -> ts . nsecs = GINT32_FROM_LE ( log_entry -> nsec ) ;
phdr -> caplen = packet_size ;
phdr -> len = packet_size ;
phdr -> pseudo_header . logcat . version = logcat -> version ;
return TRUE ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static zval * row_dim_read ( zval * object , zval * member , int type TSRMLS_DC ) {
return row_prop_read ( object , member , type , NULL TSRMLS_CC ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int ipvideo_decode_block_opcode_0x1 ( IpvideoContext * s , AVFrame * frame ) {
return copy_from ( s , s -> second_last_frame , frame , 0 , 0 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vp9_pick_filter_level ( const YV12_BUFFER_CONFIG * sd , VP9_COMP * cpi , LPF_PICK_METHOD method ) {
VP9_COMMON * const cm = & cpi -> common ;
struct loopfilter * const lf = & cm -> lf ;
lf -> sharpness_level = cm -> frame_type == KEY_FRAME ? 0 : cpi -> oxcf . sharpness ;
if ( method == LPF_PICK_MINIMAL_LPF && lf -> filter_level ) {
lf -> filter_level = 0 ;
}
else if ( method >= LPF_PICK_FROM_Q ) {
const int min_filter_level = 0 ;
const int max_filter_level = get_max_filter_level ( cpi ) ;
const int q = vp9_ac_quant ( cm -> base_qindex , 0 , cm -> bit_depth ) ;
int filt_guess = ROUND_POWER_OF_TWO ( q * 20723 + 1015158 , 18 ) ;
if ( cm -> frame_type == KEY_FRAME ) filt_guess -= 4 ;
lf -> filter_level = clamp ( filt_guess , min_filter_level , max_filter_level ) ;
}
else {
lf -> filter_level = search_filter_level ( sd , cpi , method == LPF_PICK_FROM_SUBIMAGE ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void notef ( struct GlobalConfig * config , const char * fmt , ... ) {
va_list ap ;
va_start ( ap , fmt ) ;
if ( config -> tracetype ) voutf ( config , NOTE_PREFIX , fmt , ap ) ;
va_end ( ap ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static Pattern_Prefix_Status regex_fixed_prefix ( Const * patt_const , bool case_insensitive , Oid collation , Const * * prefix_const , Selectivity * rest_selec ) {
Oid typeid = patt_const -> consttype ;
char * prefix ;
bool exact ;
if ( typeid == BYTEAOID ) ereport ( ERROR , ( errcode ( ERRCODE_FEATURE_NOT_SUPPORTED ) , errmsg ( "regular-expression matching not supported on type bytea" ) ) ) ;
prefix = regexp_fixed_prefix ( DatumGetTextPP ( patt_const -> constvalue ) , case_insensitive , collation , & exact ) ;
if ( prefix == NULL ) {
* prefix_const = NULL ;
if ( rest_selec != NULL ) {
char * patt = TextDatumGetCString ( patt_const -> constvalue ) ;
* rest_selec = regex_selectivity ( patt , strlen ( patt ) , case_insensitive , 0 ) ;
pfree ( patt ) ;
}
return Pattern_Prefix_None ;
}
* prefix_const = string_to_const ( prefix , typeid ) ;
if ( rest_selec != NULL ) {
if ( exact ) {
* rest_selec = 1.0 ;
}
else {
char * patt = TextDatumGetCString ( patt_const -> constvalue ) ;
* rest_selec = regex_selectivity ( patt , strlen ( patt ) , case_insensitive , strlen ( prefix ) ) ;
pfree ( patt ) ;
}
}
pfree ( prefix ) ;
if ( exact ) return Pattern_Prefix_Exact ;
else return Pattern_Prefix_Partial ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void test_list_fields ( ) {
MYSQL_RES * result ;
int rc ;
myheader ( "test_list_fields" ) ;
rc = mysql_query ( mysql , "drop table if exists t1" ) ;
myquery ( rc ) ;
rc = mysql_query ( mysql , "create table t1(c1 int primary key auto_increment, c2 char(10) default 'mysql')" ) ;
myquery ( rc ) ;
result = mysql_list_fields ( mysql , "t1" , NULL ) ;
mytest ( result ) ;
rc = my_process_result_set ( result ) ;
DIE_UNLESS ( rc == 0 ) ;
verify_prepare_field ( result , 0 , "c1" , "c1" , MYSQL_TYPE_LONG , "t1" , "t1" , current_db , 11 , "0" ) ;
verify_prepare_field ( result , 1 , "c2" , "c2" , MYSQL_TYPE_STRING , "t1" , "t1" , current_db , 10 , "mysql" ) ;
mysql_free_result ( result ) ;
myquery ( mysql_query ( mysql , "drop table t1" ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
file_transfer_t * imcb_file_send_start ( struct im_connection * ic , char * handle , char * file_name , size_t file_size ) {
bee_t * bee = ic -> bee ;
bee_user_t * bu = bee_user_by_handle ( bee , ic , handle ) ;
if ( bee -> ui -> ft_in_start && bu ) {
return bee -> ui -> ft_in_start ( bee , bu , file_name , file_size ) ;
}
else {
return NULL ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( ContentFaviconDriverTest , AssociateIconWithInitialPageIconDespiteReplaceState ) {
ASSERT_TRUE ( embedded_test_server ( ) -> Start ( ) ) ;
GURL url = embedded_test_server ( ) -> GetURL ( "/favicon/replacestate_with_favicon.html" ) ;
GURL replacestate_url = embedded_test_server ( ) -> GetURL ( "/favicon/replacestate_with_favicon_replaced.html" ) ;
PendingTaskWaiter waiter ( web_contents ( ) ) ;
waiter . AlsoRequireUrl ( replacestate_url ) ;
ui_test_utils : : NavigateToURLWithDisposition ( browser ( ) , url , WindowOpenDisposition : : CURRENT_TAB , ui_test_utils : : BROWSER_TEST_NONE ) ;
waiter . Wait ( ) ;
EXPECT_NE ( nullptr , GetFaviconForPageURL ( url , favicon_base : : IconType : : kFavicon ) . bitmap_data ) ;
EXPECT_NE ( nullptr , GetFaviconForPageURL ( replacestate_url , favicon_base : : IconType : : kFavicon ) . bitmap_data ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void decorrelate_stereo ( int32_t * buffer [ 2 ] , int nb_samples , int decorr_shift , int decorr_left_weight ) {
int i ;
for ( i = 0 ;
i < nb_samples ;
i ++ ) {
int32_t a , b ;
a = buffer [ 0 ] [ i ] ;
b = buffer [ 1 ] [ i ] ;
a -= ( b * decorr_left_weight ) >> decorr_shift ;
b += a ;
buffer [ 0 ] [ i ] = b ;
buffer [ 1 ] [ i ] = a ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int jpc_pchglist_numpchgs ( jpc_pchglist_t * pchglist ) {
return pchglist -> numpchgs ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int reassemble_octet_string ( asn1_ctx_t * actx , proto_tree * tree , gint hf_id , tvbuff_t * tvb , int offset , guint32 con_len , gboolean ind , tvbuff_t * * out_tvb ) {
fragment_head * fd_head = NULL ;
tvbuff_t * next_tvb = NULL ;
tvbuff_t * reassembled_tvb = NULL ;
guint16 dst_ref = 0 ;
int start_offset = offset ;
gboolean fragment = TRUE ;
gboolean firstFragment = TRUE ;
if ( out_tvb ) * out_tvb = NULL ;
if ( con_len == 0 ) return offset ;
actx -> pinfo -> fragmented = TRUE ;
while ( ! fd_head ) {
offset = dissect_ber_octet_string ( FALSE , actx , NULL , tvb , offset , hf_id , & next_tvb ) ;
if ( next_tvb == NULL ) {
THROW ( ReportedBoundsError ) ;
}
if ( ind ) {
if ( ( tvb_get_guint8 ( tvb , offset ) == 0 ) && ( tvb_get_guint8 ( tvb , offset + 1 ) == 0 ) ) {
fragment = FALSE ;
offset += 2 ;
}
}
else {
if ( ( guint32 ) ( offset - start_offset ) >= con_len ) fragment = FALSE ;
}
if ( ! fragment && firstFragment ) {
gboolean pc ;
get_ber_identifier ( tvb , start_offset , NULL , & pc , NULL ) ;
if ( ! pc && tree ) {
dissect_ber_octet_string ( FALSE , actx , tree , tvb , start_offset , hf_id , NULL ) ;
}
reassembled_tvb = next_tvb ;
break ;
}
if ( tvb_reported_length ( next_tvb ) < 1 ) {
THROW ( ReportedBoundsError ) ;
}
fd_head = fragment_add_seq_next ( & octet_segment_reassembly_table , next_tvb , 0 , actx -> pinfo , dst_ref , NULL , tvb_reported_length ( next_tvb ) , fragment ) ;
firstFragment = FALSE ;
}
if ( fd_head ) {
if ( fd_head -> next ) {
proto_tree * next_tree ;
proto_item * frag_tree_item ;
reassembled_tvb = tvb_new_chain ( next_tvb , fd_head -> tvb_data ) ;
actx -> created_item = proto_tree_add_item ( tree , hf_id , reassembled_tvb , 0 , - 1 , ENC_BIG_ENDIAN ) ;
next_tree = proto_item_add_subtree ( actx -> created_item , ett_ber_reassembled_octet_string ) ;
add_new_data_source ( actx -> pinfo , reassembled_tvb , "Reassembled OCTET STRING" ) ;
show_fragment_seq_tree ( fd_head , & octet_string_frag_items , next_tree , actx -> pinfo , reassembled_tvb , & frag_tree_item ) ;
}
}
if ( out_tvb ) * out_tvb = reassembled_tvb ;
actx -> pinfo -> fragmented = FALSE ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
unsigned int vp9_sub_pixel_avg_variance ## W ## x ## H ## _c ( const uint8_t * src , int src_stride , int xoffset , int yoffset , const uint8_t * dst , int dst_stride , unsigned int * sse , const uint8_t * second_pred ) {
uint16_t fdata3 [ ( H + 1 ) * W ] ;
uint8_t temp2 [ H * W ] ;
DECLARE_ALIGNED_ARRAY ( 16 , uint8_t , temp3 , H * W ) ;
var_filter_block2d_bil_first_pass ( src , fdata3 , src_stride , 1 , H + 1 , W , BILINEAR_FILTERS_2TAP ( xoffset ) ) ;
var_filter_block2d_bil_second_pass ( fdata3 , temp2 , W , W , H , W , BILINEAR_FILTERS_2TAP ( yoffset ) ) ;
vp9_comp_avg_pred ( temp3 , second_pred , W , H , temp2 , W ) ;
return vp9_variance ## W ## x ## H ## _c ( temp3 , W , dst , dst_stride , sse ) ;
\ }
void vp9_get16x16var_c ( const uint8_t * src_ptr , int source_stride , const uint8_t * ref_ptr , int ref_stride , unsigned int * sse , int * sum ) {
variance ( src_ptr , source_stride , ref_ptr , ref_stride , 16 , 16 , sse , sum ) ;
}
void vp9_get8x8var_c ( const uint8_t * src_ptr , int source_stride , const uint8_t * ref_ptr , int ref_stride , unsigned int * sse , int * sum ) {
variance ( src_ptr , source_stride , ref_ptr , ref_stride , 8 , 8 , sse , sum ) ;
}
unsigned int vp9_mse16x16_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 16 , 16 , sse , & sum ) ;
return * sse ;
}
unsigned int vp9_mse16x8_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 16 , 8 , sse , & sum ) ;
return * sse ;
}
unsigned int vp9_mse8x16_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 8 , 16 , sse , & sum ) ;
return * sse ;
}
unsigned int vp9_mse8x8_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 8 , 8 , sse , & sum ) ;
return * sse ;
}
VAR ( 4 , 4 ) SUBPIX_VAR ( 4 , 4 ) SUBPIX_AVG_VAR ( 4 , 4 ) VAR ( 4 , 8 ) SUBPIX_VAR ( 4 , 8 ) SUBPIX_AVG_VAR ( 4 , 8 )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void http_hdr_describe ( HdrHeapObjImpl * raw , bool recurse ) {
HTTPHdrImpl * obj = ( HTTPHdrImpl * ) raw ;
if ( obj -> m_polarity == HTTP_TYPE_REQUEST ) {
Debug ( "http" , "[TYPE: REQ, V: %04X, URL: %p, METHOD: \"%.*s\", METHOD_LEN: %d, FIELDS: %p]" , obj -> m_version , obj -> u . req . m_url_impl , obj -> u . req . m_len_method , ( obj -> u . req . m_ptr_method ? obj -> u . req . m_ptr_method : "NULL" ) , obj -> u . req . m_len_method , obj -> m_fields_impl ) ;
if ( recurse ) {
if ( obj -> u . req . m_url_impl ) {
obj_describe ( obj -> u . req . m_url_impl , recurse ) ;
}
if ( obj -> m_fields_impl ) {
obj_describe ( obj -> m_fields_impl , recurse ) ;
}
}
}
else {
Debug ( "http" , "[TYPE: RSP, V: %04X, STATUS: %d, REASON: \"%.*s\", REASON_LEN: %d, FIELDS: %p]" , obj -> m_version , obj -> u . resp . m_status , obj -> u . resp . m_len_reason , ( obj -> u . resp . m_ptr_reason ? obj -> u . resp . m_ptr_reason : "NULL" ) , obj -> u . resp . m_len_reason , obj -> m_fields_impl ) ;
if ( recurse ) {
if ( obj -> m_fields_impl ) {
obj_describe ( obj -> m_fields_impl , recurse ) ;
}
}
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
kadm5_ret_t kadm5_delete_policy ( void * server_handle , kadm5_policy_t name ) {
kadm5_server_handle_t handle = server_handle ;
osa_policy_ent_t entry ;
int ret ;
CHECK_HANDLE ( server_handle ) ;
krb5_clear_error_message ( handle -> context ) ;
if ( name == ( kadm5_policy_t ) NULL ) return EINVAL ;
if ( strlen ( name ) == 0 ) return KADM5_BAD_POLICY ;
ret = krb5_db_get_policy ( handle -> context , name , & entry ) ;
if ( ret == KRB5_KDB_NOENTRY ) return KADM5_UNK_POLICY ;
else if ( ret ) return ret ;
if ( entry -> policy_refcnt != 0 ) {
krb5_db_free_policy ( handle -> context , entry ) ;
return KADM5_POLICY_REF ;
}
krb5_db_free_policy ( handle -> context , entry ) ;
ret = krb5_db_delete_policy ( handle -> context , name ) ;
if ( ret == KRB5_KDB_POLICY_REF ) ret = KADM5_POLICY_REF ;
return ( ret == 0 ) ? KADM5_OK : ret ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
SPL_METHOD ( SplFileObject , fscanf ) {
spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ;
spl_filesystem_file_free_line ( intern TSRMLS_CC ) ;
intern -> u . file . current_line_num ++ ;
FileFunctionCall ( fscanf , ZEND_NUM_ARGS ( ) , NULL ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_MultilinkIndication ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_MultilinkIndication , MultilinkIndication_choice , NULL ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pdf_process_BDC ( fz_context * ctx , pdf_processor * proc , pdf_csi * csi ) {
if ( proc -> op_BDC ) proc -> op_BDC ( ctx , proc , csi -> name , csi -> obj , resolve_properties ( ctx , csi , csi -> obj ) ) ;
if ( proc -> hidden > 0 ) {
++ proc -> hidden ;
return ;
}
if ( strcmp ( csi -> name , "OC" ) ) return ;
if ( pdf_is_hidden_ocg ( ctx , csi -> doc -> ocg , csi -> rdb , proc -> usage , csi -> obj ) ) ++ proc -> hidden ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void reindex_system_catalogs ( const char * dbname , const char * host , const char * port , const char * username , enum trivalue prompt_password , const char * progname , bool echo , bool verbose ) {
PGconn * conn ;
PQExpBufferData sql ;
conn = connectDatabase ( dbname , host , port , username , prompt_password , progname , false , false ) ;
initPQExpBuffer ( & sql ) ;
appendPQExpBuffer ( & sql , "REINDEX" ) ;
if ( verbose ) appendPQExpBuffer ( & sql , " (VERBOSE)" ) ;
appendPQExpBuffer ( & sql , " SYSTEM %s;
" , PQdb ( conn ) ) ;
if ( ! executeMaintenanceCommand ( conn , sql . data , echo ) ) {
fprintf ( stderr , _ ( "%s: reindexing of system catalogs failed: %s" ) , progname , PQerrorMessage ( conn ) ) ;
PQfinish ( conn ) ;
exit ( 1 ) ;
}
PQfinish ( conn ) ;
termPQExpBuffer ( & sql ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
int EvaluatePS ( char * str , real * stack , int size ) {
EntityChar ec ;
RetStack rs ;
memset ( & ec , '\0' , sizeof ( ec ) ) ;
memset ( & rs , '\0' , sizeof ( rs ) ) ;
rs . max = size ;
rs . stack = stack ;
InterpretPS ( NULL , str , & ec , & rs ) ;
return ( rs . cnt ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void nautilus_self_check_file_operations ( void ) {
setlocale ( LC_MESSAGES , "C" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( " (copy)" , 1 , - 1 ) , " (another copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo" , 1 , - 1 ) , "foo (copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( ".bashrc" , 1 , - 1 ) , ".bashrc (copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( ".foo.txt" , 1 , - 1 ) , ".foo (copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo foo" , 1 , - 1 ) , "foo foo (copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo.txt" , 1 , - 1 ) , "foo (copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo foo.txt" , 1 , - 1 ) , "foo foo (copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo foo.txt txt" , 1 , - 1 ) , "foo foo (copy).txt txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo...txt" , 1 , - 1 ) , "foo.. (copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo..." , 1 , - 1 ) , "foo... (copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo. (copy)" , 1 , - 1 ) , "foo. (another copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (copy)" , 1 , - 1 ) , "foo (another copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (copy).txt" , 1 , - 1 ) , "foo (another copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (another copy)" , 1 , - 1 ) , "foo (3rd copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (another copy).txt" , 1 , - 1 ) , "foo (3rd copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo foo (another copy).txt" , 1 , - 1 ) , "foo foo (3rd copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (13th copy)" , 1 , - 1 ) , "foo (14th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (13th copy).txt" , 1 , - 1 ) , "foo (14th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (21st copy)" , 1 , - 1 ) , "foo (22nd copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (21st copy).txt" , 1 , - 1 ) , "foo (22nd copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (22nd copy)" , 1 , - 1 ) , "foo (23rd copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (22nd copy).txt" , 1 , - 1 ) , "foo (23rd copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (23rd copy)" , 1 , - 1 ) , "foo (24th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (23rd copy).txt" , 1 , - 1 ) , "foo (24th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (24th copy)" , 1 , - 1 ) , "foo (25th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (24th copy).txt" , 1 , - 1 ) , "foo (25th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo foo (24th copy)" , 1 , - 1 ) , "foo foo (25th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo foo (24th copy).txt" , 1 , - 1 ) , "foo foo (25th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo foo (100000000000000th copy).txt" , 1 , - 1 ) , "foo foo (copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (10th copy)" , 1 , - 1 ) , "foo (11th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (10th copy).txt" , 1 , - 1 ) , "foo (11th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (11th copy)" , 1 , - 1 ) , "foo (12th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (11th copy).txt" , 1 , - 1 ) , "foo (12th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (12th copy)" , 1 , - 1 ) , "foo (13th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (12th copy).txt" , 1 , - 1 ) , "foo (13th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (110th copy)" , 1 , - 1 ) , "foo (111th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (110th copy).txt" , 1 , - 1 ) , "foo (111th copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (122nd copy)" , 1 , - 1 ) , "foo (123rd copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (122nd copy).txt" , 1 , - 1 ) , "foo (123rd copy).txt" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (123rd copy)" , 1 , - 1 ) , "foo (124th copy)" ) ;
EEL_CHECK_STRING_RESULT ( get_duplicate_name ( "foo (123rd copy).txt" , 1 , - 1 ) , "foo (124th copy).txt" ) ;
setlocale ( LC_MESSAGES , "" ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pnm_get ( PNMContext * sc , char * str , int buf_size ) {
char * s ;
int c ;
for ( ;
;
) {
c = * sc -> bytestream ++ ;
if ( c == '#' ) {
do {
c = * sc -> bytestream ++ ;
}
while ( c != '\n' && sc -> bytestream < sc -> bytestream_end ) ;
}
else if ( ! pnm_space ( c ) ) {
break ;
}
}
s = str ;
while ( sc -> bytestream < sc -> bytestream_end && ! pnm_space ( c ) ) {
if ( ( s - str ) < buf_size - 1 ) * s ++ = c ;
c = * sc -> bytestream ++ ;
}
* s = '\0' ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void gistcostestimate ( PlannerInfo * root , IndexPath * path , double loop_count , Cost * indexStartupCost , Cost * indexTotalCost , Selectivity * indexSelectivity , double * indexCorrelation ) {
IndexOptInfo * index = path -> indexinfo ;
List * qinfos ;
GenericCosts costs ;
Cost descentCost ;
qinfos = deconstruct_indexquals ( path ) ;
MemSet ( & costs , 0 , sizeof ( costs ) ) ;
genericcostestimate ( root , path , loop_count , qinfos , & costs ) ;
if ( index -> tree_height < 0 ) {
if ( index -> pages > 1 ) index -> tree_height = ( int ) ( log ( index -> pages ) / log ( 100.0 ) ) ;
else index -> tree_height = 0 ;
}
if ( index -> tuples > 1 ) {
descentCost = ceil ( log ( index -> tuples ) ) * cpu_operator_cost ;
costs . indexStartupCost += descentCost ;
costs . indexTotalCost += costs . num_sa_scans * descentCost ;
}
descentCost = ( index -> tree_height + 1 ) * 50.0 * cpu_operator_cost ;
costs . indexStartupCost += descentCost ;
costs . indexTotalCost += costs . num_sa_scans * descentCost ;
* indexStartupCost = costs . indexStartupCost ;
* indexTotalCost = costs . indexTotalCost ;
* indexSelectivity = costs . indexSelectivity ;
* indexCorrelation = costs . indexCorrelation ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int decode_picture_header ( ProresContext * ctx , const uint8_t * buf , const int data_size , AVCodecContext * avctx ) {
int i , hdr_size , pic_data_size , num_slices ;
int slice_width_factor , slice_height_factor ;
int remainder , num_x_slices ;
const uint8_t * data_ptr , * index_ptr ;
hdr_size = data_size > 0 ? buf [ 0 ] >> 3 : 0 ;
if ( hdr_size < 8 || hdr_size > data_size ) {
av_log ( avctx , AV_LOG_ERROR , "picture header too small\n" ) ;
return AVERROR_INVALIDDATA ;
}
pic_data_size = AV_RB32 ( buf + 1 ) ;
if ( pic_data_size > data_size ) {
av_log ( avctx , AV_LOG_ERROR , "picture data too small\n" ) ;
return AVERROR_INVALIDDATA ;
}
slice_width_factor = buf [ 7 ] >> 4 ;
slice_height_factor = buf [ 7 ] & 0xF ;
if ( slice_width_factor > 3 || slice_height_factor ) {
av_log ( avctx , AV_LOG_ERROR , "unsupported slice dimension: %d x %d\n" , 1 << slice_width_factor , 1 << slice_height_factor ) ;
return AVERROR_INVALIDDATA ;
}
ctx -> slice_width_factor = slice_width_factor ;
ctx -> slice_height_factor = slice_height_factor ;
ctx -> num_x_mbs = ( avctx -> width + 15 ) >> 4 ;
ctx -> num_y_mbs = ( avctx -> height + ( 1 << ( 4 + ctx -> picture . interlaced_frame ) ) - 1 ) >> ( 4 + ctx -> picture . interlaced_frame ) ;
remainder = ctx -> num_x_mbs & ( ( 1 << slice_width_factor ) - 1 ) ;
num_x_slices = ( ctx -> num_x_mbs >> slice_width_factor ) + ( remainder & 1 ) + ( ( remainder >> 1 ) & 1 ) + ( ( remainder >> 2 ) & 1 ) ;
num_slices = num_x_slices * ctx -> num_y_mbs ;
if ( num_slices != AV_RB16 ( buf + 5 ) ) {
av_log ( avctx , AV_LOG_ERROR , "invalid number of slices\n" ) ;
return AVERROR_INVALIDDATA ;
}
if ( ctx -> total_slices != num_slices ) {
av_freep ( & ctx -> slice_data ) ;
ctx -> slice_data = av_malloc ( ( num_slices + 1 ) * sizeof ( ctx -> slice_data [ 0 ] ) ) ;
if ( ! ctx -> slice_data ) return AVERROR ( ENOMEM ) ;
ctx -> total_slices = num_slices ;
}
if ( hdr_size + num_slices * 2 > data_size ) {
av_log ( avctx , AV_LOG_ERROR , "slice table too small\n" ) ;
return AVERROR_INVALIDDATA ;
}
index_ptr = buf + hdr_size ;
data_ptr = index_ptr + num_slices * 2 ;
for ( i = 0 ;
i < num_slices ;
i ++ ) {
ctx -> slice_data [ i ] . index = data_ptr ;
ctx -> slice_data [ i ] . prev_slice_sf = 0 ;
data_ptr += AV_RB16 ( index_ptr + i * 2 ) ;
}
ctx -> slice_data [ i ] . index = data_ptr ;
ctx -> slice_data [ i ] . prev_slice_sf = 0 ;
if ( data_ptr > buf + data_size ) {
av_log ( avctx , AV_LOG_ERROR , "out of slice data\n" ) ;
return - 1 ;
}
return pic_data_size ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void _slurm_rpc_dump_front_end ( slurm_msg_t * msg ) {
DEF_TIMERS ;
char * dump = NULL ;
int dump_size = 0 ;
slurm_msg_t response_msg ;
front_end_info_request_msg_t * front_end_req_msg = ( front_end_info_request_msg_t * ) msg -> data ;
slurmctld_lock_t node_read_lock = {
READ_LOCK , NO_LOCK , NO_LOCK , READ_LOCK , NO_LOCK }
;
uid_t uid = g_slurm_auth_get_uid ( msg -> auth_cred , slurmctld_config . auth_info ) ;
START_TIMER ;
debug3 ( "Processing RPC: REQUEST_FRONT_END_INFO from uid=%d" , uid ) ;
lock_slurmctld ( node_read_lock ) ;
if ( ( front_end_req_msg -> last_update - 1 ) >= last_front_end_update ) {
unlock_slurmctld ( node_read_lock ) ;
debug3 ( "_slurm_rpc_dump_front_end, no change" ) ;
slurm_send_rc_msg ( msg , SLURM_NO_CHANGE_IN_DATA ) ;
}
else {
pack_all_front_end ( & dump , & dump_size , uid , msg -> protocol_version ) ;
unlock_slurmctld ( node_read_lock ) ;
END_TIMER2 ( "_slurm_rpc_dump_front_end" ) ;
debug2 ( "_slurm_rpc_dump_front_end, size=%d %s" , dump_size , TIME_STR ) ;
slurm_msg_t_init ( & response_msg ) ;
response_msg . flags = msg -> flags ;
response_msg . protocol_version = msg -> protocol_version ;
response_msg . address = msg -> address ;
response_msg . conn = msg -> conn ;
response_msg . msg_type = RESPONSE_FRONT_END_INFO ;
response_msg . data = dump ;
response_msg . data_size = dump_size ;
slurm_send_node_msg ( msg -> conn_fd , & response_msg ) ;
xfree ( dump ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
bool chal_reply_h ( connection_t * c ) {
char hishash [ MAX_STRING_SIZE ] ;
char myhash [ EVP_MAX_MD_SIZE ] ;
EVP_MD_CTX * ctx ;
if ( sscanf ( c -> buffer , "%*d " MAX_STRING , hishash ) != 1 ) {
logger ( LOG_ERR , "Got bad %s from %s (%s)" , "CHAL_REPLY" , c -> name , c -> hostname ) ;
return false ;
}
if ( strlen ( hishash ) != ( size_t ) EVP_MD_size ( c -> outdigest ) * 2 ) {
logger ( LOG_ERR , "Possible intruder %s (%s): %s" , c -> name , c -> hostname , "wrong challenge reply length" ) ;
return false ;
}
if ( ! hex2bin ( hishash , hishash , EVP_MD_size ( c -> outdigest ) ) ) {
logger ( LOG_ERR , "Got bad %s from %s(%s): %s" , "CHAL_REPLY" , c -> name , c -> hostname , "invalid hash" ) ;
return false ;
}
ctx = EVP_MD_CTX_create ( ) ;
if ( ! ctx ) {
abort ( ) ;
}
if ( ! EVP_DigestInit ( ctx , c -> outdigest ) || ! EVP_DigestUpdate ( ctx , c -> hischallenge , RSA_size ( c -> rsa_key ) ) || ! EVP_DigestFinal ( ctx , ( unsigned char * ) myhash , NULL ) ) {
EVP_MD_CTX_destroy ( ctx ) ;
logger ( LOG_ERR , "Error during calculation of response from %s (%s): %s" , c -> name , c -> hostname , ERR_error_string ( ERR_get_error ( ) , NULL ) ) ;
return false ;
}
EVP_MD_CTX_destroy ( ctx ) ;
if ( memcmp ( hishash , myhash , EVP_MD_size ( c -> outdigest ) ) ) {
logger ( LOG_ERR , "Possible intruder %s (%s): %s" , c -> name , c -> hostname , "wrong challenge reply" ) ;
ifdebug ( SCARY_THINGS ) {
bin2hex ( myhash , hishash , SHA_DIGEST_LENGTH ) ;
hishash [ SHA_DIGEST_LENGTH * 2 ] = '\0' ;
logger ( LOG_DEBUG , "Expected challenge reply: %s" , hishash ) ;
}
return false ;
}
c -> allow_request = ACK ;
if ( ! c -> outgoing ) {
send_chal_reply ( c ) ;
}
return send_ack ( c ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void stroke_purge ( private_stroke_socket_t * this , stroke_msg_t * msg , FILE * out ) {
if ( msg -> purge . flags & PURGE_OCSP ) {
lib -> credmgr -> flush_cache ( lib -> credmgr , CERT_X509_OCSP_RESPONSE ) ;
}
if ( msg -> purge . flags & PURGE_CRLS ) {
lib -> credmgr -> flush_cache ( lib -> credmgr , CERT_X509_CRL ) ;
}
if ( msg -> purge . flags & PURGE_CERTS ) {
lib -> credmgr -> flush_cache ( lib -> credmgr , CERT_X509 ) ;
}
if ( msg -> purge . flags & PURGE_IKE ) {
this -> control -> purge_ike ( this -> control , msg , out ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static char * w_addchar ( char * buffer , size_t * actlen , size_t * maxlen , char ch ) {
if ( * actlen == * maxlen ) {
char * old_buffer = buffer ;
assert ( buffer == NULL || * maxlen != 0 ) ;
* maxlen += W_CHUNK ;
buffer = ( char * ) realloc ( buffer , 1 + * maxlen ) ;
if ( buffer == NULL ) free ( old_buffer ) ;
}
if ( buffer != NULL ) {
buffer [ * actlen ] = ch ;
buffer [ ++ ( * actlen ) ] = '\0' ;
}
return buffer ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
ber_tag_t ber_get_next ( Sockbuf * sb , ber_len_t * len , BerElement * ber ) {
assert ( sb != NULL ) ;
assert ( len != NULL ) ;
assert ( ber != NULL ) ;
assert ( SOCKBUF_VALID ( sb ) ) ;
assert ( LBER_VALID ( ber ) ) ;
if ( ber -> ber_debug & LDAP_DEBUG_TRACE ) {
ber_log_printf ( LDAP_DEBUG_TRACE , ber -> ber_debug , "ber_get_next\n" ) ;
}
if ( ber -> ber_rwptr == NULL ) {
assert ( ber -> ber_buf == NULL ) ;
ber -> ber_rwptr = ( char * ) & ber -> ber_len - 1 ;
ber -> ber_ptr = ber -> ber_rwptr ;
ber -> ber_tag = 0 ;
}
while ( ber -> ber_rwptr > ( char * ) & ber -> ber_tag && ber -> ber_rwptr < ( char * ) & ber -> ber_len + LENSIZE * 2 ) {
ber_slen_t sblen ;
char buf [ sizeof ( ber -> ber_len ) - 1 ] ;
ber_len_t tlen = 0 ;
sock_errset ( 0 ) ;
sblen = ( ( char * ) & ber -> ber_len + LENSIZE * 2 - 1 ) - ber -> ber_rwptr ;
if ( sblen < 1 ) sblen = 1 ;
sblen = ber_int_sb_read ( sb , ber -> ber_rwptr , sblen ) ;
if ( sblen <= 0 ) return LBER_DEFAULT ;
ber -> ber_rwptr += sblen ;
if ( ber -> ber_ptr == ( char * ) & ber -> ber_len - 1 ) {
ber_tag_t tag ;
unsigned char * p = ( unsigned char * ) ber -> ber_ptr ;
tag = * p ++ ;
if ( ( tag & LBER_BIG_TAG_MASK ) == LBER_BIG_TAG_MASK ) {
ber_len_t i ;
for ( i = 1 ;
( char * ) p < ber -> ber_rwptr ;
i ++ ) {
tag <<= 8 ;
tag |= * p ++ ;
if ( ! ( tag & LBER_MORE_TAG_MASK ) ) break ;
if ( i == sizeof ( ber_tag_t ) - 1 ) {
sock_errset ( ERANGE ) ;
return LBER_DEFAULT ;
}
}
if ( ( char * ) p == ber -> ber_rwptr ) {
sock_errset ( EWOULDBLOCK ) ;
return LBER_DEFAULT ;
}
}
ber -> ber_tag = tag ;
ber -> ber_ptr = ( char * ) p ;
}
if ( ber -> ber_ptr == ber -> ber_rwptr ) {
sock_errset ( EWOULDBLOCK ) ;
return LBER_DEFAULT ;
}
if ( * ber -> ber_ptr & 0x80 ) {
int i ;
unsigned char * p = ( unsigned char * ) ber -> ber_ptr ;
int llen = * p ++ & 0x7f ;
if ( llen > LENSIZE ) {
sock_errset ( ERANGE ) ;
return LBER_DEFAULT ;
}
if ( ber -> ber_rwptr - ( char * ) p < llen ) {
sock_errset ( EWOULDBLOCK ) ;
return LBER_DEFAULT ;
}
for ( i = 0 ;
i < llen ;
i ++ ) {
tlen <<= 8 ;
tlen |= * p ++ ;
}
ber -> ber_ptr = ( char * ) p ;
}
else {
tlen = * ( unsigned char * ) ber -> ber_ptr ++ ;
}
if ( ber -> ber_ptr < ( char * ) & ber -> ber_usertag ) {
if ( ber -> ber_rwptr < ( char * ) & ber -> ber_usertag ) {
sblen = ber -> ber_rwptr - ber -> ber_ptr ;
}
else {
sblen = ( char * ) & ber -> ber_usertag - ber -> ber_ptr ;
}
AC_MEMCPY ( buf , ber -> ber_ptr , sblen ) ;
ber -> ber_ptr += sblen ;
}
else {
sblen = 0 ;
}
ber -> ber_len = tlen ;
if ( ber -> ber_len == 0 ) {
sock_errset ( ERANGE ) ;
return LBER_DEFAULT ;
}
if ( sb -> sb_max_incoming && ber -> ber_len > sb -> sb_max_incoming ) {
ber_log_printf ( LDAP_DEBUG_CONNS , ber -> ber_debug , "ber_get_next: sockbuf_max_incoming exceeded " "(%ld > %ld)\n" , ber -> ber_len , sb -> sb_max_incoming ) ;
sock_errset ( ERANGE ) ;
return LBER_DEFAULT ;
}
if ( ber -> ber_buf == NULL ) {
ber_len_t l = ber -> ber_rwptr - ber -> ber_ptr ;
if ( ber -> ber_len < sblen + l ) {
sock_errset ( ERANGE ) ;
return LBER_DEFAULT ;
}
ber -> ber_buf = ( char * ) ber_memalloc_x ( ber -> ber_len + 1 , ber -> ber_memctx ) ;
if ( ber -> ber_buf == NULL ) {
return LBER_DEFAULT ;
}
ber -> ber_end = ber -> ber_buf + ber -> ber_len ;
if ( sblen ) {
AC_MEMCPY ( ber -> ber_buf , buf , sblen ) ;
}
if ( l > 0 ) {
AC_MEMCPY ( ber -> ber_buf + sblen , ber -> ber_ptr , l ) ;
sblen += l ;
}
* ber -> ber_end = '\0' ;
ber -> ber_ptr = ber -> ber_buf ;
ber -> ber_usertag = 0 ;
if ( ( ber_len_t ) sblen == ber -> ber_len ) {
goto done ;
}
ber -> ber_rwptr = ber -> ber_buf + sblen ;
}
}
if ( ( ber -> ber_rwptr >= ber -> ber_buf ) && ( ber -> ber_rwptr < ber -> ber_end ) ) {
ber_slen_t res ;
ber_slen_t to_go ;
to_go = ber -> ber_end - ber -> ber_rwptr ;
assert ( to_go > 0 ) ;
sock_errset ( 0 ) ;
res = ber_int_sb_read ( sb , ber -> ber_rwptr , to_go ) ;
if ( res <= 0 ) return LBER_DEFAULT ;
ber -> ber_rwptr += res ;
if ( res < to_go ) {
sock_errset ( EWOULDBLOCK ) ;
return LBER_DEFAULT ;
}
done : ber -> ber_rwptr = NULL ;
* len = ber -> ber_len ;
if ( ber -> ber_debug ) {
ber_log_printf ( LDAP_DEBUG_TRACE , ber -> ber_debug , "ber_get_next: tag 0x%lx len %ld contents:\n" , ber -> ber_tag , ber -> ber_len ) ;
ber_log_dump ( LDAP_DEBUG_BER , ber -> ber_debug , ber , 1 ) ;
}
return ( ber -> ber_tag ) ;
}
assert ( 0 ) ;
return LBER_DEFAULT ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static gpgme_error_t uiserver_verify ( void * engine , gpgme_data_t sig , gpgme_data_t signed_text , gpgme_data_t plaintext ) {
engine_uiserver_t uiserver = engine ;
gpgme_error_t err ;
const char * protocol ;
char * cmd ;
if ( ! uiserver ) return gpg_error ( GPG_ERR_INV_VALUE ) ;
if ( uiserver -> protocol == GPGME_PROTOCOL_DEFAULT ) protocol = "" ;
else if ( uiserver -> protocol == GPGME_PROTOCOL_OpenPGP ) protocol = " --protocol=OpenPGP" ;
else if ( uiserver -> protocol == GPGME_PROTOCOL_CMS ) protocol = " --protocol=CMS" ;
else return gpgme_error ( GPG_ERR_UNSUPPORTED_PROTOCOL ) ;
if ( asprintf ( & cmd , "VERIFY%s" , protocol ) < 0 ) return gpg_error_from_syserror ( ) ;
uiserver -> input_cb . data = sig ;
err = uiserver_set_fd ( uiserver , INPUT_FD , map_data_enc ( uiserver -> input_cb . data ) ) ;
if ( err ) {
free ( cmd ) ;
return err ;
}
if ( plaintext ) {
uiserver -> output_cb . data = plaintext ;
err = uiserver_set_fd ( uiserver , OUTPUT_FD , 0 ) ;
}
else {
uiserver -> message_cb . data = signed_text ;
err = uiserver_set_fd ( uiserver , MESSAGE_FD , 0 ) ;
}
uiserver -> inline_data = NULL ;
if ( ! err ) err = start ( uiserver , cmd ) ;
free ( cmd ) ;
return err ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static guint16 de_tp_epc_ue_tl_c_setup ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len _U_ , gchar * add_string _U_ , int string_len _U_ ) {
guint32 curr_offset ;
curr_offset = offset ;
proto_tree_add_bits_item ( tree , hf_gsm_a_dtap_epc_ue_tl_c_mbsfn_area_id , tvb , curr_offset << 3 , 8 , ENC_BIG_ENDIAN ) ;
curr_offset ++ ;
proto_tree_add_bits_item ( tree , hf_gsm_a_dtap_epc_ue_tl_c_mch_id , tvb , ( curr_offset << 3 ) + 4 , 4 , ENC_BIG_ENDIAN ) ;
curr_offset ++ ;
proto_tree_add_bits_item ( tree , hf_gsm_a_dtap_epc_ue_tl_c_lcid , tvb , ( curr_offset << 3 ) + 3 , 5 , ENC_BIG_ENDIAN ) ;
curr_offset ++ ;
return ( curr_offset - offset ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static __inline__ __u32 __arch_swab32 ( __u32 val ) {
__asm__ ( "bswapl %0" : "=r" ( val ) : "0" ( val ) ) ;
return val ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_CommandMessage ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
# line 461 "../../asn1/h245/h245.cnf" gint32 value ;
offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_CommandMessage , CommandMessage_choice , & value ) ;
if ( h245_shorttypes == TRUE ) {
col_prepend_fstr ( actx -> pinfo -> cinfo , COL_INFO , "%s " , val_to_str ( value , h245_CommandMessage_short_vals , "<unknown>" ) ) ;
}
else {
col_prepend_fstr ( actx -> pinfo -> cinfo , COL_INFO , "%s " , val_to_str ( value , h245_CommandMessage_vals , "<unknown>" ) ) ;
}
col_set_fence ( actx -> pinfo -> cinfo , COL_INFO ) ;
if ( h245_pi != NULL ) {
if ( strlen ( h245_pi -> frame_label ) == 0 ) {
g_snprintf ( h245_pi -> frame_label , 50 , "%s" , val_to_str ( value , h245_CommandMessage_short_vals , "UKN" ) ) ;
}
g_strlcat ( h245_pi -> comment , val_to_str ( value , h245_CommandMessage_vals , "<unknown>" ) , 50 ) ;
}
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int exsltMathXpathCtxtRegister ( xmlXPathContextPtr ctxt , const xmlChar * prefix ) {
if ( ctxt && prefix && ! xmlXPathRegisterNs ( ctxt , prefix , ( const xmlChar * ) EXSLT_MATH_NAMESPACE ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "min" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathMinFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "max" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathMaxFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "highest" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathHighestFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "lowest" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathLowestFunction ) # ifdef HAVE_STDLIB_H && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "random" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathRandomFunction ) # endif # if HAVE_MATH_H && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "abs" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathAbsFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "sqrt" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathSqrtFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "power" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathPowerFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "log" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathLogFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "sin" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathSinFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "cos" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathCosFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "tan" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathTanFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "asin" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathAsinFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "acos" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathAcosFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "atan" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathAtanFunction ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "atan2" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathAtan2Function ) && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "exp" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathExpFunction ) # endif && ! xmlXPathRegisterFuncNS ( ctxt , ( const xmlChar * ) "constant" , ( const xmlChar * ) EXSLT_MATH_NAMESPACE , exsltMathConstantFunction ) ) {
return 0 ;
}
return - 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int asn1_d2i_read_bio ( BIO * in , BUF_MEM * * pb ) {
BUF_MEM * b ;
unsigned char * p ;
int i ;
size_t want = HEADER_SIZE ;
int eos = 0 ;
size_t off = 0 ;
size_t len = 0 ;
const unsigned char * q ;
long slen ;
int inf , tag , xclass ;
b = BUF_MEM_new ( ) ;
if ( b == NULL ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ERR_R_MALLOC_FAILURE ) ;
return - 1 ;
}
ERR_clear_error ( ) ;
for ( ;
;
) {
if ( want >= ( len - off ) ) {
want -= ( len - off ) ;
if ( len + want < len || ! BUF_MEM_grow_clean ( b , len + want ) ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ERR_R_MALLOC_FAILURE ) ;
goto err ;
}
i = BIO_read ( in , & ( b -> data [ len ] ) , want ) ;
if ( ( i < 0 ) && ( ( len - off ) == 0 ) ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ASN1_R_NOT_ENOUGH_DATA ) ;
goto err ;
}
if ( i > 0 ) {
if ( len + i < len ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ASN1_R_TOO_LONG ) ;
goto err ;
}
len += i ;
}
}
p = ( unsigned char * ) & ( b -> data [ off ] ) ;
q = p ;
inf = ASN1_get_object ( & q , & slen , & tag , & xclass , len - off ) ;
if ( inf & 0x80 ) {
unsigned long e ;
e = ERR_GET_REASON ( ERR_peek_error ( ) ) ;
if ( e != ASN1_R_TOO_LONG ) goto err ;
else ERR_clear_error ( ) ;
}
i = q - p ;
off += i ;
if ( inf & 1 ) {
eos ++ ;
if ( eos < 0 ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ASN1_R_HEADER_TOO_LONG ) ;
goto err ;
}
want = HEADER_SIZE ;
}
else if ( eos && ( slen == 0 ) && ( tag == V_ASN1_EOC ) ) {
eos -- ;
if ( eos <= 0 ) break ;
else want = HEADER_SIZE ;
}
else {
want = slen ;
if ( want > ( len - off ) ) {
want -= ( len - off ) ;
if ( want > INT_MAX || len + want < len ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ASN1_R_TOO_LONG ) ;
goto err ;
}
if ( ! BUF_MEM_grow_clean ( b , len + want ) ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ERR_R_MALLOC_FAILURE ) ;
goto err ;
}
while ( want > 0 ) {
i = BIO_read ( in , & ( b -> data [ len ] ) , want ) ;
if ( i <= 0 ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ASN1_R_NOT_ENOUGH_DATA ) ;
goto err ;
}
len += i ;
want -= i ;
}
}
if ( off + slen < off ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ASN1_R_TOO_LONG ) ;
goto err ;
}
off += slen ;
if ( eos <= 0 ) {
break ;
}
else want = HEADER_SIZE ;
}
}
if ( off > INT_MAX ) {
ASN1err ( ASN1_F_ASN1_D2I_READ_BIO , ASN1_R_TOO_LONG ) ;
goto err ;
}
* pb = b ;
return off ;
err : BUF_MEM_free ( b ) ;
return - 1 ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int cine_read_probe ( AVProbeData * p ) {
int HeaderSize ;
if ( p -> buf [ 0 ] == 'C' && p -> buf [ 1 ] == 'I' && ( HeaderSize = AV_RL16 ( p -> buf + 2 ) ) >= 0x2C && AV_RL16 ( p -> buf + 4 ) <= CC_UNINT && AV_RL16 ( p -> buf + 6 ) <= 1 && AV_RL32 ( p -> buf + 20 ) && AV_RL32 ( p -> buf + 24 ) >= HeaderSize && AV_RL32 ( p -> buf + 28 ) >= HeaderSize && AV_RL32 ( p -> buf + 32 ) >= HeaderSize ) return AVPROBE_SCORE_MAX ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int alloc_addbyter ( int output , FILE * data ) {
struct asprintf * infop = ( struct asprintf * ) data ;
unsigned char outc = ( unsigned char ) output ;
if ( ! infop -> buffer ) {
infop -> buffer = malloc ( 32 ) ;
if ( ! infop -> buffer ) {
infop -> fail = 1 ;
return - 1 ;
}
infop -> alloc = 32 ;
infop -> len = 0 ;
}
else if ( infop -> len + 1 >= infop -> alloc ) {
char * newptr = NULL ;
size_t newsize = infop -> alloc * 2 ;
if ( newsize > infop -> alloc ) newptr = realloc ( infop -> buffer , newsize ) ;
if ( ! newptr ) {
infop -> fail = 1 ;
return - 1 ;
}
infop -> buffer = newptr ;
infop -> alloc = newsize ;
}
infop -> buffer [ infop -> len ] = outc ;
infop -> len ++ ;
return outc ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void setup_masks_hangul ( const hb_ot_shape_plan_t * plan , hb_buffer_t * buffer , hb_font_t * font HB_UNUSED ) {
const hangul_shape_plan_t * hangul_plan = ( const hangul_shape_plan_t * ) plan -> data ;
if ( likely ( hangul_plan ) ) {
unsigned int count = buffer -> len ;
hb_glyph_info_t * info = buffer -> info ;
for ( unsigned int i = 0 ;
i < count ;
i ++ , info ++ ) info -> mask |= hangul_plan -> mask_array [ info -> hangul_shaping_feature ( ) ] ;
}
HB_BUFFER_DEALLOCATE_VAR ( buffer , hangul_shaping_feature ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int kvm_get_xcrs ( X86CPU * cpu ) {
CPUX86State * env = & cpu -> env ;
int i , ret ;
struct kvm_xcrs xcrs ;
if ( ! has_xcrs ) {
return 0 ;
}
ret = kvm_vcpu_ioctl ( CPU ( cpu ) , KVM_GET_XCRS , & xcrs ) ;
if ( ret < 0 ) {
return ret ;
}
for ( i = 0 ;
i < xcrs . nr_xcrs ;
i ++ ) {
if ( xcrs . xcrs [ i ] . xcr == 0 ) {
env -> xcr0 = xcrs . xcrs [ i ] . value ;
break ;
}
}
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_FECCapability ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_FECCapability , FECCapability_sequence ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) {
return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) {
return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ;
}
# define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ;
typedef const char * OPENSSL_CSTRING ;
DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char ) DEFINE_SPECIAL_STACK_OF_CONST ( OPENSSL_CSTRING , char )
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
int ssl3_send_finished ( SSL * s , int a , int b , const char * sender , int slen ) {
unsigned char * p , * d ;
int i ;
unsigned long l ;
if ( s -> state == a ) {
d = ( unsigned char * ) s -> init_buf -> data ;
p = & ( d [ 4 ] ) ;
i = s -> method -> ssl3_enc -> final_finish_mac ( s , sender , slen , s -> s3 -> tmp . finish_md ) ;
s -> s3 -> tmp . finish_md_len = i ;
memcpy ( p , s -> s3 -> tmp . finish_md , i ) ;
p += i ;
l = i ;
if ( s -> type == SSL_ST_CONNECT ) {
OPENSSL_assert ( i <= EVP_MAX_MD_SIZE ) ;
memcpy ( s -> s3 -> previous_client_finished , s -> s3 -> tmp . finish_md , i ) ;
s -> s3 -> previous_client_finished_len = i ;
}
else {
OPENSSL_assert ( i <= EVP_MAX_MD_SIZE ) ;
memcpy ( s -> s3 -> previous_server_finished , s -> s3 -> tmp . finish_md , i ) ;
s -> s3 -> previous_server_finished_len = i ;
}
# ifdef OPENSSL_SYS_WIN16 l &= 0xffff ;
# endif * ( d ++ ) = SSL3_MT_FINISHED ;
l2n3 ( l , d ) ;
s -> init_num = ( int ) l + 4 ;
s -> init_off = 0 ;
s -> state = b ;
}
return ( ssl3_do_write ( s , SSL3_RT_HANDSHAKE ) ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dct_unquantize_mpeg1_inter_c ( MpegEncContext * s , int16_t * block , int n , int qscale ) {
int i , level , nCoeffs ;
const uint16_t * quant_matrix ;
nCoeffs = s -> block_last_index [ n ] ;
quant_matrix = s -> inter_matrix ;
for ( i = 0 ;
i <= nCoeffs ;
i ++ ) {
int j = s -> intra_scantable . permutated [ i ] ;
level = block [ j ] ;
if ( level ) {
if ( level < 0 ) {
level = - level ;
level = ( ( ( level << 1 ) + 1 ) * qscale * ( ( int ) ( quant_matrix [ j ] ) ) ) >> 4 ;
level = ( level - 1 ) | 1 ;
level = - level ;
}
else {
level = ( ( ( level << 1 ) + 1 ) * qscale * ( ( int ) ( quant_matrix [ j ] ) ) ) >> 4 ;
level = ( level - 1 ) | 1 ;
}
block [ j ] = level ;
}
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static PyObject * authGSSClientClean ( PyObject * self , PyObject * args ) {
gss_client_state * state ;
PyObject * pystate ;
int result = 0 ;
if ( ! PyArg_ParseTuple ( args , "O" , & pystate ) ) return NULL ;
# if PY_MAJOR_VERSION >= 3 if ( ! PyCapsule_CheckExact ( pystate ) ) {
# else if ( ! PyCObject_Check ( pystate ) ) {
# endif PyErr_SetString ( PyExc_TypeError , "Expected a context object" ) ;
return NULL ;
}
# if PY_MAJOR_VERSION >= 3 state = PyCapsule_GetPointer ( pystate , NULL ) ;
# else state = ( gss_client_state * ) PyCObject_AsVoidPtr ( pystate ) ;
# endif if ( state != NULL ) {
result = authenticate_gss_client_clean ( state ) ;
free ( state ) ;
# if PY_MAJOR_VERSION >= 3 PyCapsule_SetPointer ( pystate , NULL ) ;
# else PyCObject_SetVoidPtr ( pystate , NULL ) ;
# endif }
return Py_BuildValue ( "i" , result ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
TSReturnCode TSMimeHdrFieldCreateNamed ( TSMBuffer bufp , TSMLoc mh_mloc , const char * name , int name_len , TSMLoc * locp ) {
sdk_assert ( sdk_sanity_check_mbuffer ( bufp ) == TS_SUCCESS ) ;
sdk_assert ( ( sdk_sanity_check_mime_hdr_handle ( mh_mloc ) == TS_SUCCESS ) || ( sdk_sanity_check_http_hdr_handle ( mh_mloc ) == TS_SUCCESS ) ) ;
sdk_assert ( sdk_sanity_check_null_ptr ( ( void * ) name ) == TS_SUCCESS ) ;
sdk_assert ( sdk_sanity_check_null_ptr ( ( void * ) locp ) == TS_SUCCESS ) ;
if ( ! isWriteable ( bufp ) ) {
return TS_ERROR ;
}
if ( name_len == - 1 ) {
name_len = strlen ( name ) ;
}
MIMEHdrImpl * mh = _hdr_mloc_to_mime_hdr_impl ( mh_mloc ) ;
HdrHeap * heap = ( HdrHeap * ) ( ( ( HdrHeapSDKHandle * ) bufp ) -> m_heap ) ;
MIMEFieldSDKHandle * h = sdk_alloc_field_handle ( bufp , mh ) ;
h -> field_ptr = mime_field_create_named ( heap , mh , name , name_len ) ;
* locp = reinterpret_cast < TSMLoc > ( h ) ;
return TS_SUCCESS ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline void skip_char ( hb_buffer_t * buffer ) {
buffer -> skip_glyph ( ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dissect_q931_protocol_discriminator ( tvbuff_t * tvb , int offset , proto_tree * tree ) {
unsigned int discriminator = tvb_get_guint8 ( tvb , offset ) ;
if ( discriminator == NLPID_DMS ) {
proto_tree_add_uint_format_value ( tree , hf_q931_discriminator , tvb , offset , 1 , discriminator , "Maintenance messages" ) ;
}
else if ( discriminator == NLPID_Q_931 ) {
proto_tree_add_uint_format_value ( tree , hf_q931_discriminator , tvb , offset , 1 , discriminator , "Q.931" ) ;
}
else if ( discriminator == NLPID_Q_2931 ) {
proto_tree_add_uint_format_value ( tree , hf_q931_discriminator , tvb , offset , 1 , discriminator , "Q.2931" ) ;
}
else if ( ( discriminator >= 16 && discriminator < 63 ) || ( ( discriminator >= 80 ) && ( discriminator < 254 ) ) ) {
proto_tree_add_uint_format_value ( tree , hf_q931_discriminator , tvb , offset , 1 , discriminator , "Network layer or layer 3 protocol (0x%02X)" , discriminator ) ;
}
else if ( discriminator >= 64 && discriminator <= 79 ) {
proto_tree_add_uint_format_value ( tree , hf_q931_discriminator , tvb , offset , 1 , discriminator , "National use (0x%02X)" , discriminator ) ;
}
else {
proto_tree_add_uint_format_value ( tree , hf_q931_discriminator , tvb , offset , 1 , discriminator , "Reserved (0x%02X)" , discriminator ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void usb_ohci_exit ( PCIDevice * dev ) {
OHCIPCIState * ohci = PCI_OHCI ( dev ) ;
OHCIState * s = & ohci -> state ;
trace_usb_ohci_exit ( s -> name ) ;
ohci_bus_stop ( s ) ;
if ( s -> async_td ) {
usb_cancel_packet ( & s -> usb_packet ) ;
s -> async_td = 0 ;
}
ohci_stop_endpoints ( s ) ;
if ( ! ohci -> masterbus ) {
usb_bus_release ( & s -> bus ) ;
}
timer_del ( s -> eof_timer ) ;
timer_free ( s -> eof_timer ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int open_pack_bitmap ( void ) {
struct packed_git * p ;
int ret = - 1 ;
assert ( ! bitmap_git . map && ! bitmap_git . loaded ) ;
prepare_packed_git ( ) ;
for ( p = packed_git ;
p ;
p = p -> next ) {
if ( open_pack_bitmap_1 ( p ) == 0 ) ret = 0 ;
}
return ret ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline int ac6_proc_init ( struct net * net ) {
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
ttfFont * ttfFont__create ( gs_font_dir * dir ) {
gs_memory_t * mem = dir -> memory -> stable_memory ;
ttfFont * ttf ;
if ( dir -> ttm == NULL ) {
gx_ttfMemory * m = gs_alloc_struct ( mem , gx_ttfMemory , & st_gx_ttfMemory , "ttfFont__create(gx_ttfMemory)" ) ;
if ( ! m ) return 0 ;
m -> super . alloc_struct = gx_ttfMemory__alloc_struct ;
m -> super . alloc_bytes = gx_ttfMemory__alloc_bytes ;
m -> super . free = gx_ttfMemory__free ;
m -> memory = mem ;
dir -> ttm = m ;
}
if ( ttfInterpreter__obtain ( & dir -> ttm -> super , & dir -> tti ) ) return 0 ;
if ( gx_san__obtain ( mem , & dir -> san ) ) return 0 ;
ttf = gs_alloc_struct ( mem , ttfFont , & st_ttfFont , "ttfFont__create" ) ;
if ( ttf == NULL ) return 0 ;
# ifdef DEBUG ttfFont__init ( ttf , & dir -> ttm -> super , DebugRepaint , ( gs_debug_c ( 'Y' ) ? DebugPrint : NULL ) , mem ) ;
# else ttfFont__init ( ttf , & dir -> ttm -> super , DebugRepaint , NULL , mem ) ;
# endif return ttf ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static gboolean is_64bit_mode ( struct mswsp_ct * ct , packet_info * pinfo , gboolean * result , void * private_data ) {
guint32 client_ver = 0 ;
guint32 server_ver = 0 ;
struct message_data * data = find_matching_request_by_fid ( ct , pinfo , 0xC8 , TRUE , private_data ) ;
if ( data ) {
client_ver = data -> content . version ;
data = find_matching_request_by_fid ( ct , pinfo , 0xC8 , FALSE , private_data ) ;
if ( data ) {
server_ver = data -> content . version ;
* result = ( server_ver & 0xffff0000 ) && ( client_ver & 0xffff0000 ) ;
return TRUE ;
}
}
return FALSE ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int may_create ( struct inode * dir , struct dentry * dentry , u16 tclass ) {
const struct task_security_struct * tsec = current_security ( ) ;
struct inode_security_struct * dsec ;
struct superblock_security_struct * sbsec ;
u32 sid , newsid ;
struct common_audit_data ad ;
int rc ;
dsec = inode_security ( dir ) ;
sbsec = dir -> i_sb -> s_security ;
sid = tsec -> sid ;
ad . type = LSM_AUDIT_DATA_DENTRY ;
ad . u . dentry = dentry ;
rc = avc_has_perm ( sid , dsec -> sid , SECCLASS_DIR , DIR__ADD_NAME | DIR__SEARCH , & ad ) ;
if ( rc ) return rc ;
rc = selinux_determine_inode_label ( current_security ( ) , dir , & dentry -> d_name , tclass , & newsid ) ;
if ( rc ) return rc ;
rc = avc_has_perm ( sid , newsid , tclass , FILE__CREATE , & ad ) ;
if ( rc ) return rc ;
return avc_has_perm ( newsid , sbsec -> sid , SECCLASS_FILESYSTEM , FILESYSTEM__ASSOCIATE , & ad ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_MultiplexEntrySend ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_MultiplexEntrySend , MultiplexEntrySend_sequence ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void vc1_decode_i_blocks ( VC1Context * v ) {
int k , j ;
MpegEncContext * s = & v -> s ;
int cbp , val ;
uint8_t * coded_val ;
int mb_pos ;
switch ( v -> y_ac_table_index ) {
case 0 : v -> codingset = ( v -> pqindex <= 8 ) ? CS_HIGH_RATE_INTRA : CS_LOW_MOT_INTRA ;
break ;
case 1 : v -> codingset = CS_HIGH_MOT_INTRA ;
break ;
case 2 : v -> codingset = CS_MID_RATE_INTRA ;
break ;
}
switch ( v -> c_ac_table_index ) {
case 0 : v -> codingset2 = ( v -> pqindex <= 8 ) ? CS_HIGH_RATE_INTER : CS_LOW_MOT_INTER ;
break ;
case 1 : v -> codingset2 = CS_HIGH_MOT_INTER ;
break ;
case 2 : v -> codingset2 = CS_MID_RATE_INTER ;
break ;
}
s -> y_dc_scale = s -> y_dc_scale_table [ v -> pq ] ;
s -> c_dc_scale = s -> c_dc_scale_table [ v -> pq ] ;
s -> mb_x = s -> mb_y = 0 ;
s -> mb_intra = 1 ;
s -> first_slice_line = 1 ;
for ( s -> mb_y = 0 ;
s -> mb_y < s -> end_mb_y ;
s -> mb_y ++ ) {
s -> mb_x = 0 ;
ff_init_block_index ( s ) ;
for ( ;
s -> mb_x < v -> end_mb_x ;
s -> mb_x ++ ) {
uint8_t * dst [ 6 ] ;
ff_update_block_index ( s ) ;
dst [ 0 ] = s -> dest [ 0 ] ;
dst [ 1 ] = dst [ 0 ] + 8 ;
dst [ 2 ] = s -> dest [ 0 ] + s -> linesize * 8 ;
dst [ 3 ] = dst [ 2 ] + 8 ;
dst [ 4 ] = s -> dest [ 1 ] ;
dst [ 5 ] = s -> dest [ 2 ] ;
s -> dsp . clear_blocks ( s -> block [ 0 ] ) ;
mb_pos = s -> mb_x + s -> mb_y * s -> mb_width ;
s -> current_picture . f . mb_type [ mb_pos ] = MB_TYPE_INTRA ;
s -> current_picture . f . qscale_table [ mb_pos ] = v -> pq ;
s -> current_picture . f . motion_val [ 1 ] [ s -> block_index [ 0 ] ] [ 0 ] = 0 ;
s -> current_picture . f . motion_val [ 1 ] [ s -> block_index [ 0 ] ] [ 1 ] = 0 ;
cbp = get_vlc2 ( & v -> s . gb , ff_msmp4_mb_i_vlc . table , MB_INTRA_VLC_BITS , 2 ) ;
v -> s . ac_pred = get_bits1 ( & v -> s . gb ) ;
for ( k = 0 ;
k < 6 ;
k ++ ) {
val = ( ( cbp >> ( 5 - k ) ) & 1 ) ;
if ( k < 4 ) {
int pred = vc1_coded_block_pred ( & v -> s , k , & coded_val ) ;
val = val ^ pred ;
* coded_val = val ;
}
cbp |= val << ( 5 - k ) ;
vc1_decode_i_block ( v , s -> block [ k ] , k , val , ( k < 4 ) ? v -> codingset : v -> codingset2 ) ;
if ( k > 3 && ( s -> flags & CODEC_FLAG_GRAY ) ) continue ;
v -> vc1dsp . vc1_inv_trans_8x8 ( s -> block [ k ] ) ;
if ( v -> pq >= 9 && v -> overlap ) {
if ( v -> rangeredfrm ) for ( j = 0 ;
j < 64 ;
j ++ ) s -> block [ k ] [ j ] <<= 1 ;
s -> dsp . put_signed_pixels_clamped ( s -> block [ k ] , dst [ k ] , k & 4 ? s -> uvlinesize : s -> linesize ) ;
}
else {
if ( v -> rangeredfrm ) for ( j = 0 ;
j < 64 ;
j ++ ) s -> block [ k ] [ j ] = ( s -> block [ k ] [ j ] - 64 ) << 1 ;
s -> dsp . put_pixels_clamped ( s -> block [ k ] , dst [ k ] , k & 4 ? s -> uvlinesize : s -> linesize ) ;
}
}
if ( v -> pq >= 9 && v -> overlap ) {
if ( s -> mb_x ) {
v -> vc1dsp . vc1_h_overlap ( s -> dest [ 0 ] , s -> linesize ) ;
v -> vc1dsp . vc1_h_overlap ( s -> dest [ 0 ] + 8 * s -> linesize , s -> linesize ) ;
if ( ! ( s -> flags & CODEC_FLAG_GRAY ) ) {
v -> vc1dsp . vc1_h_overlap ( s -> dest [ 1 ] , s -> uvlinesize ) ;
v -> vc1dsp . vc1_h_overlap ( s -> dest [ 2 ] , s -> uvlinesize ) ;
}
}
v -> vc1dsp . vc1_h_overlap ( s -> dest [ 0 ] + 8 , s -> linesize ) ;
v -> vc1dsp . vc1_h_overlap ( s -> dest [ 0 ] + 8 * s -> linesize + 8 , s -> linesize ) ;
if ( ! s -> first_slice_line ) {
v -> vc1dsp . vc1_v_overlap ( s -> dest [ 0 ] , s -> linesize ) ;
v -> vc1dsp . vc1_v_overlap ( s -> dest [ 0 ] + 8 , s -> linesize ) ;
if ( ! ( s -> flags & CODEC_FLAG_GRAY ) ) {
v -> vc1dsp . vc1_v_overlap ( s -> dest [ 1 ] , s -> uvlinesize ) ;
v -> vc1dsp . vc1_v_overlap ( s -> dest [ 2 ] , s -> uvlinesize ) ;
}
}
v -> vc1dsp . vc1_v_overlap ( s -> dest [ 0 ] + 8 * s -> linesize , s -> linesize ) ;
v -> vc1dsp . vc1_v_overlap ( s -> dest [ 0 ] + 8 * s -> linesize + 8 , s -> linesize ) ;
}
if ( v -> s . loop_filter ) vc1_loop_filter_iblk ( v , v -> pq ) ;
if ( get_bits_count ( & s -> gb ) > v -> bits ) {
ff_er_add_slice ( & s -> er , 0 , 0 , s -> mb_x , s -> mb_y , ER_MB_ERROR ) ;
av_log ( s -> avctx , AV_LOG_ERROR , "Bits overconsumption: %i > %i\n" , get_bits_count ( & s -> gb ) , v -> bits ) ;
return ;
}
}
if ( ! v -> s . loop_filter ) ff_mpeg_draw_horiz_band ( s , s -> mb_y * 16 , 16 ) ;
else if ( s -> mb_y ) ff_mpeg_draw_horiz_band ( s , ( s -> mb_y - 1 ) * 16 , 16 ) ;
s -> first_slice_line = 0 ;
}
if ( v -> s . loop_filter ) ff_mpeg_draw_horiz_band ( s , ( s -> end_mb_y - 1 ) * 16 , 16 ) ;
ff_er_add_slice ( & s -> er , 0 , 0 , s -> mb_width - 1 , s -> mb_height - 1 , ER_MB_END ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void test_create_drop ( ) {
MYSQL_STMT * stmt_create , * stmt_drop , * stmt_select , * stmt_create_select ;
char * query ;
int rc , i ;
myheader ( "test_table_manipulation" ) ;
rc = mysql_query ( mysql , "DROP TABLE IF EXISTS t1, t2" ) ;
myquery ( rc ) ;
rc = mysql_query ( mysql , "create table t2 (a int);
" ) ;
myquery ( rc ) ;
rc = mysql_query ( mysql , "create table t1 (a int);
" ) ;
myquery ( rc ) ;
rc = mysql_query ( mysql , "insert into t2 values (3), (2), (1);
" ) ;
myquery ( rc ) ;
query = ( char * ) "create table t1 (a int)" ;
stmt_create = mysql_simple_prepare ( mysql , query ) ;
check_stmt ( stmt_create ) ;
query = ( char * ) "drop table t1" ;
stmt_drop = mysql_simple_prepare ( mysql , query ) ;
check_stmt ( stmt_drop ) ;
query = ( char * ) "select a in (select a from t2) from t1" ;
stmt_select = mysql_simple_prepare ( mysql , query ) ;
check_stmt ( stmt_select ) ;
rc = mysql_query ( mysql , "DROP TABLE t1" ) ;
myquery ( rc ) ;
query = ( char * ) "create table t1 select a from t2" ;
stmt_create_select = mysql_simple_prepare ( mysql , query ) ;
check_stmt ( stmt_create_select ) ;
for ( i = 0 ;
i < 3 ;
i ++ ) {
rc = mysql_stmt_execute ( stmt_create ) ;
check_execute ( stmt_create , rc ) ;
if ( ! opt_silent ) fprintf ( stdout , "created %i\n" , i ) ;
rc = mysql_stmt_execute ( stmt_select ) ;
check_execute ( stmt_select , rc ) ;
rc = my_process_stmt_result ( stmt_select ) ;
DIE_UNLESS ( rc == 0 ) ;
rc = mysql_stmt_execute ( stmt_drop ) ;
check_execute ( stmt_drop , rc ) ;
if ( ! opt_silent ) fprintf ( stdout , "dropped %i\n" , i ) ;
rc = mysql_stmt_execute ( stmt_create_select ) ;
check_execute ( stmt_create , rc ) ;
if ( ! opt_silent ) fprintf ( stdout , "created select %i\n" , i ) ;
rc = mysql_stmt_execute ( stmt_select ) ;
check_execute ( stmt_select , rc ) ;
rc = my_process_stmt_result ( stmt_select ) ;
DIE_UNLESS ( rc == 3 ) ;
rc = mysql_stmt_execute ( stmt_drop ) ;
check_execute ( stmt_drop , rc ) ;
if ( ! opt_silent ) fprintf ( stdout , "dropped %i\n" , i ) ;
}
mysql_stmt_close ( stmt_create ) ;
mysql_stmt_close ( stmt_drop ) ;
mysql_stmt_close ( stmt_select ) ;
mysql_stmt_close ( stmt_create_select ) ;
rc = mysql_query ( mysql , "DROP TABLE t2" ) ;
myquery ( rc ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void h225_init_routine ( void ) {
int i ;
for ( i = 0 ;
i < 7 ;
i ++ ) {
ras_calls [ i ] = g_hash_table_new ( h225ras_call_hash , h225ras_call_equal ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( PageLoadMetricsBrowserTest , AbortReload ) {
ASSERT_TRUE ( embedded_test_server ( ) -> Start ( ) ) ;
GURL url ( embedded_test_server ( ) -> GetURL ( "/title1.html" ) ) ;
NavigateParams params ( browser ( ) , url , ui : : PAGE_TRANSITION_LINK ) ;
content : : TestNavigationManager manager ( browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) , url ) ;
Navigate ( & params ) ;
EXPECT_TRUE ( manager . WaitForRequestStart ( ) ) ;
NavigateParams params2 ( browser ( ) , url , ui : : PAGE_TRANSITION_RELOAD ) ;
auto waiter = CreatePageLoadMetricsWaiter ( ) ;
waiter -> AddPageExpectation ( TimingField : : LOAD_EVENT ) ;
Navigate ( & params2 ) ;
waiter -> Wait ( ) ;
histogram_tester_ . ExpectTotalCount ( internal : : kHistogramAbortReloadBeforeCommit , 1 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pxa2xx_ssp_save ( QEMUFile * f , void * opaque ) {
PXA2xxSSPState * s = ( PXA2xxSSPState * ) opaque ;
int i ;
qemu_put_be32 ( f , s -> enable ) ;
qemu_put_be32s ( f , & s -> sscr [ 0 ] ) ;
qemu_put_be32s ( f , & s -> sscr [ 1 ] ) ;
qemu_put_be32s ( f , & s -> sspsp ) ;
qemu_put_be32s ( f , & s -> ssto ) ;
qemu_put_be32s ( f , & s -> ssitr ) ;
qemu_put_be32s ( f , & s -> sssr ) ;
qemu_put_8s ( f , & s -> sstsa ) ;
qemu_put_8s ( f , & s -> ssrsa ) ;
qemu_put_8s ( f , & s -> ssacd ) ;
qemu_put_byte ( f , s -> rx_level ) ;
for ( i = 0 ;
i < s -> rx_level ;
i ++ ) qemu_put_byte ( f , s -> rx_fifo [ ( s -> rx_start + i ) & 0xf ] ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static cmsTagTypeSignature DecideXYZtype ( cmsFloat64Number ICCVersion , const void * Data ) {
return cmsSigXYZType ;
cmsUNUSED_PARAMETER ( ICCVersion ) ;
cmsUNUSED_PARAMETER ( Data ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int vp8_yv12_de_alloc_frame_buffer ( YV12_BUFFER_CONFIG * ybf ) {
if ( ybf ) {
if ( ybf -> buffer_alloc_sz > 0 ) {
vpx_free ( ybf -> buffer_alloc ) ;
}
vpx_memset ( ybf , 0 , sizeof ( YV12_BUFFER_CONFIG ) ) ;
}
else {
return - 1 ;
}
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void draw_arrow ( uint8_t * buf , int sx , int sy , int ex , int ey , int w , int h , int stride , int color ) {
int dx , dy ;
sx = av_clip ( sx , - 100 , w + 100 ) ;
sy = av_clip ( sy , - 100 , h + 100 ) ;
ex = av_clip ( ex , - 100 , w + 100 ) ;
ey = av_clip ( ey , - 100 , h + 100 ) ;
dx = ex - sx ;
dy = ey - sy ;
if ( dx * dx + dy * dy > 3 * 3 ) {
int rx = dx + dy ;
int ry = - dx + dy ;
int length = ff_sqrt ( ( rx * rx + ry * ry ) << 8 ) ;
rx = ROUNDED_DIV ( rx * 3 << 4 , length ) ;
ry = ROUNDED_DIV ( ry * 3 << 4 , length ) ;
draw_line ( buf , sx , sy , sx + rx , sy + ry , w , h , stride , color ) ;
draw_line ( buf , sx , sy , sx - ry , sy + rx , w , h , stride , color ) ;
}
draw_line ( buf , sx , sy , ex , ey , w , h , stride , color ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void show ( const char * format , ... ) {
va_list arg_ptr ;
if ( ! verbose ) return ;
fprintf ( stderr , "%s: " , PGM ) ;
va_start ( arg_ptr , format ) ;
vfprintf ( stderr , format , arg_ptr ) ;
va_end ( arg_ptr ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static fz_font * xps_lookup_font ( xps_document * doc , char * name ) {
xps_font_cache * cache ;
for ( cache = doc -> font_table ;
cache ;
cache = cache -> next ) if ( ! xps_strcasecmp ( cache -> name , name ) ) return fz_keep_font ( doc -> ctx , cache -> font ) ;
return NULL ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int checkHttpTxnClientAddrGet ( SocketTest * test , void * data ) {
uint16_t port ;
uint16_t browser_port ;
TSHttpTxn txnp = ( TSHttpTxn ) data ;
sockaddr const * ptr = TSHttpTxnClientAddrGet ( txnp ) ;
browser_port = test -> browser -> local_port ;
if ( nullptr == ptr ) {
SDK_RPRINT ( test -> regtest , "TSHttpTxnClientClientAddrGet" , "TestCase2" , TC_FAIL , "TSHttpTxnClientAddrGet returned 0 pointer." ) ;
test -> test_client_remote_port_get = false ;
return TS_EVENT_CONTINUE ;
}
port = ats_ip_port_host_order ( ptr ) ;
TSDebug ( UTDBG_TAG , "Browser port = %x, Txn remote port = %x" , browser_port , port ) ;
if ( port == browser_port ) {
SDK_RPRINT ( test -> regtest , "TSHttpTxnClientAddrGet" , "TestCase1" , TC_PASS , "ok" ) ;
test -> test_client_remote_port_get = true ;
}
else {
SDK_RPRINT ( test -> regtest , "TSHttpTxnClientAddrGet" , "TestCase1" , TC_FAIL , "Value's Mismatch. From Function: %d Expected Value: %d" , port , browser_port ) ;
test -> test_client_remote_port_get = false ;
}
return TS_EVENT_CONTINUE ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int dtls1_retransmit_buffered_messages ( SSL * s ) {
pqueue sent = s -> d1 -> sent_messages ;
piterator iter ;
pitem * item ;
hm_fragment * frag ;
int found = 0 ;
iter = pqueue_iterator ( sent ) ;
for ( item = pqueue_next ( & iter ) ;
item != NULL ;
item = pqueue_next ( & iter ) ) {
frag = ( hm_fragment * ) item -> data ;
if ( dtls1_retransmit_message ( s , ( unsigned short ) dtls1_get_queue_priority ( frag -> msg_header . seq , frag -> msg_header . is_ccs ) , 0 , & found ) <= 0 && found ) {
fprintf ( stderr , "dtls1_retransmit_message() failed\n" ) ;
return - 1 ;
}
}
return 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline int pfkey_sockaddr_len ( sa_family_t family ) {
switch ( family ) {
case AF_INET : return sizeof ( struct sockaddr_in ) ;
# if IS_ENABLED ( CONFIG_IPV6 ) case AF_INET6 : return sizeof ( struct sockaddr_in6 ) ;
# endif }
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static PyObject * authGSSClientUserName ( PyObject * self , PyObject * args ) {
gss_client_state * state ;
PyObject * pystate ;
if ( ! PyArg_ParseTuple ( args , "O" , & pystate ) ) return NULL ;
# if PY_MAJOR_VERSION >= 3 if ( ! PyCapsule_CheckExact ( pystate ) ) {
# else if ( ! PyCObject_Check ( pystate ) ) {
# endif PyErr_SetString ( PyExc_TypeError , "Expected a context object" ) ;
return NULL ;
}
# if PY_MAJOR_VERSION >= 3 state = PyCapsule_GetPointer ( pystate , NULL ) ;
# else state = ( gss_client_state * ) PyCObject_AsVoidPtr ( pystate ) ;
# endif if ( state == NULL ) return NULL ;
return Py_BuildValue ( "s" , state -> username ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static struct cgroup_meta_data * lxc_cgroup_load_meta2 ( const char * * subsystem_whitelist ) {
bool all_kernel_subsystems = true ;
bool all_named_subsystems = false ;
struct cgroup_meta_data * meta_data = NULL ;
char * * kernel_subsystems = NULL ;
int saved_errno = 0 ;
all_kernel_subsystems = subsystem_whitelist ? ( lxc_string_in_array ( "@kernel" , subsystem_whitelist ) || lxc_string_in_array ( "@all" , subsystem_whitelist ) ) : true ;
all_named_subsystems = subsystem_whitelist ? ( lxc_string_in_array ( "@named" , subsystem_whitelist ) || lxc_string_in_array ( "@all" , subsystem_whitelist ) ) : false ;
meta_data = calloc ( 1 , sizeof ( struct cgroup_meta_data ) ) ;
if ( ! meta_data ) return NULL ;
meta_data -> ref = 1 ;
if ( ! find_cgroup_subsystems ( & kernel_subsystems ) ) goto out_error ;
if ( ! find_cgroup_hierarchies ( meta_data , all_kernel_subsystems , all_named_subsystems , subsystem_whitelist ) ) goto out_error ;
if ( ! find_hierarchy_mountpts ( meta_data , kernel_subsystems ) ) goto out_error ;
if ( ! meta_data -> hierarchies || ! meta_data -> mount_points ) {
errno = EINVAL ;
goto out_error ;
}
lxc_free_array ( ( void * * ) kernel_subsystems , free ) ;
return meta_data ;
out_error : saved_errno = errno ;
lxc_free_array ( ( void * * ) kernel_subsystems , free ) ;
lxc_cgroup_put_meta ( meta_data ) ;
errno = saved_errno ;
return NULL ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
my_bool mi_test_if_sort_rep ( MI_INFO * info , ha_rows rows , ulonglong key_map , my_bool force ) {
MYISAM_SHARE * share = info -> s ;
MI_KEYDEF * key = share -> keyinfo ;
uint i ;
if ( ! mi_is_any_key_active ( key_map ) ) return FALSE ;
for ( i = 0 ;
i < share -> base . keys ;
i ++ , key ++ ) {
if ( ! force && mi_too_big_key_for_sort ( key , rows ) ) return FALSE ;
}
return TRUE ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vp9_ ## type ## _predictor_ ## size ## x ## size ## _c ( uint8_t * dst , ptrdiff_t stride , const uint8_t * above , const uint8_t * left ) {
type ## _predictor ( dst , stride , size , above , left ) ;
}
# if CONFIG_VP9_HIGHBITDEPTH # define intra_pred_high_sized ( type , size ) void vp9_high_ ## type ## _predictor_ ## size ## x ## size ## _c ( uint16_t * dst , ptrdiff_t stride , const uint16_t * above , const uint16_t * left , int bd ) {
high_ ## type ## _predictor ( dst , stride , size , above , left , bd ) ;
}
# define intra_pred_allsizes ( type ) intra_pred_sized ( type , 4 ) intra_pred_sized ( type , 8 ) intra_pred_sized ( type , 16 ) intra_pred_sized ( type , 32 ) intra_pred_high_sized ( type , 4 ) intra_pred_high_sized ( type , 8 ) intra_pred_high_sized ( type , 16 ) intra_pred_high_sized ( type , 32 ) # else # define intra_pred_allsizes ( type ) intra_pred_sized ( type , 4 ) intra_pred_sized ( type , 8 ) intra_pred_sized ( type , 16 ) intra_pred_sized ( type , 32 ) # endif # if CONFIG_VP9_HIGHBITDEPTH static INLINE void high_d207_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r , c ;
( void ) above ;
( void ) bd ;
for ( r = 0 ;
r < bs - 1 ;
++ r ) {
dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r ] + left [ r + 1 ] , 1 ) ;
}
dst [ ( bs - 1 ) * stride ] = left [ bs - 1 ] ;
dst ++ ;
for ( r = 0 ;
r < bs - 2 ;
++ r ) {
dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r ] + left [ r + 1 ] * 2 + left [ r + 2 ] , 2 ) ;
}
dst [ ( bs - 2 ) * stride ] = ROUND_POWER_OF_TWO ( left [ bs - 2 ] + left [ bs - 1 ] * 3 , 2 ) ;
dst [ ( bs - 1 ) * stride ] = left [ bs - 1 ] ;
dst ++ ;
for ( c = 0 ;
c < bs - 2 ;
++ c ) dst [ ( bs - 1 ) * stride + c ] = left [ bs - 1 ] ;
for ( r = bs - 2 ;
r >= 0 ;
-- r ) {
for ( c = 0 ;
c < bs - 2 ;
++ c ) dst [ r * stride + c ] = dst [ ( r + 1 ) * stride + c - 2 ] ;
}
}
static INLINE void high_d63_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r , c ;
( void ) left ;
( void ) bd ;
for ( r = 0 ;
r < bs ;
++ r ) {
for ( c = 0 ;
c < bs ;
++ c ) {
dst [ c ] = r & 1 ? ROUND_POWER_OF_TWO ( above [ r / 2 + c ] + above [ r / 2 + c + 1 ] * 2 + above [ r / 2 + c + 2 ] , 2 ) : ROUND_POWER_OF_TWO ( above [ r / 2 + c ] + above [ r / 2 + c + 1 ] , 1 ) ;
}
dst += stride ;
}
}
static INLINE void high_d45_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r , c ;
( void ) left ;
( void ) bd ;
for ( r = 0 ;
r < bs ;
++ r ) {
for ( c = 0 ;
c < bs ;
++ c ) {
dst [ c ] = r + c + 2 < bs * 2 ? ROUND_POWER_OF_TWO ( above [ r + c ] + above [ r + c + 1 ] * 2 + above [ r + c + 2 ] , 2 ) : above [ bs * 2 - 1 ] ;
}
dst += stride ;
}
}
static INLINE void high_d117_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r , c ;
( void ) bd ;
for ( c = 0 ;
c < bs ;
c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 1 ] + above [ c ] , 1 ) ;
dst += stride ;
dst [ 0 ] = ROUND_POWER_OF_TWO ( left [ 0 ] + above [ - 1 ] * 2 + above [ 0 ] , 2 ) ;
for ( c = 1 ;
c < bs ;
c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 2 ] + above [ c - 1 ] * 2 + above [ c ] , 2 ) ;
dst += stride ;
dst [ 0 ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] * 2 + left [ 1 ] , 2 ) ;
for ( r = 3 ;
r < bs ;
++ r ) dst [ ( r - 2 ) * stride ] = ROUND_POWER_OF_TWO ( left [ r - 3 ] + left [ r - 2 ] * 2 + left [ r - 1 ] , 2 ) ;
for ( r = 2 ;
r < bs ;
++ r ) {
for ( c = 1 ;
c < bs ;
c ++ ) dst [ c ] = dst [ - 2 * stride + c - 1 ] ;
dst += stride ;
}
}
static INLINE void high_d135_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r , c ;
( void ) bd ;
dst [ 0 ] = ROUND_POWER_OF_TWO ( left [ 0 ] + above [ - 1 ] * 2 + above [ 0 ] , 2 ) ;
for ( c = 1 ;
c < bs ;
c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 2 ] + above [ c - 1 ] * 2 + above [ c ] , 2 ) ;
dst [ stride ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] * 2 + left [ 1 ] , 2 ) ;
for ( r = 2 ;
r < bs ;
++ r ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r - 2 ] + left [ r - 1 ] * 2 + left [ r ] , 2 ) ;
dst += stride ;
for ( r = 1 ;
r < bs ;
++ r ) {
for ( c = 1 ;
c < bs ;
c ++ ) dst [ c ] = dst [ - stride + c - 1 ] ;
dst += stride ;
}
}
static INLINE void high_d153_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r , c ;
( void ) bd ;
dst [ 0 ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] , 1 ) ;
for ( r = 1 ;
r < bs ;
r ++ ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r - 1 ] + left [ r ] , 1 ) ;
dst ++ ;
dst [ 0 ] = ROUND_POWER_OF_TWO ( left [ 0 ] + above [ - 1 ] * 2 + above [ 0 ] , 2 ) ;
dst [ stride ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] * 2 + left [ 1 ] , 2 ) ;
for ( r = 2 ;
r < bs ;
r ++ ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r - 2 ] + left [ r - 1 ] * 2 + left [ r ] , 2 ) ;
dst ++ ;
for ( c = 0 ;
c < bs - 2 ;
c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 1 ] + above [ c ] * 2 + above [ c + 1 ] , 2 ) ;
dst += stride ;
for ( r = 1 ;
r < bs ;
++ r ) {
for ( c = 0 ;
c < bs - 2 ;
c ++ ) dst [ c ] = dst [ - stride + c - 2 ] ;
dst += stride ;
}
}
static INLINE void high_v_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r ;
( void ) left ;
( void ) bd ;
for ( r = 0 ;
r < bs ;
r ++ ) {
vpx_memcpy ( dst , above , bs * sizeof ( uint16_t ) ) ;
dst += stride ;
}
}
static INLINE void high_h_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r ;
( void ) above ;
( void ) bd ;
for ( r = 0 ;
r < bs ;
r ++ ) {
vpx_memset16 ( dst , left [ r ] , bs ) ;
dst += stride ;
}
}
static INLINE void high_tm_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r , c ;
int ytop_left = above [ - 1 ] ;
( void ) bd ;
for ( r = 0 ;
r < bs ;
r ++ ) {
for ( c = 0 ;
c < bs ;
c ++ ) dst [ c ] = clip_pixel_high ( left [ r ] + above [ c ] - ytop_left , bd ) ;
dst += stride ;
}
}
static INLINE void high_dc_128_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int r ;
( void ) above ;
( void ) left ;
for ( r = 0 ;
r < bs ;
r ++ ) {
vpx_memset16 ( dst , 128 << ( bd - 8 ) , bs ) ;
dst += stride ;
}
}
static INLINE void high_dc_left_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int i , r , expected_dc , sum = 0 ;
( void ) above ;
( void ) bd ;
for ( i = 0 ;
i < bs ;
i ++ ) sum += left [ i ] ;
expected_dc = ( sum + ( bs >> 1 ) ) / bs ;
for ( r = 0 ;
r < bs ;
r ++ ) {
vpx_memset16 ( dst , expected_dc , bs ) ;
dst += stride ;
}
}
static INLINE void high_dc_top_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int i , r , expected_dc , sum = 0 ;
( void ) left ;
( void ) bd ;
for ( i = 0 ;
i < bs ;
i ++ ) sum += above [ i ] ;
expected_dc = ( sum + ( bs >> 1 ) ) / bs ;
for ( r = 0 ;
r < bs ;
r ++ ) {
vpx_memset16 ( dst , expected_dc , bs ) ;
dst += stride ;
}
}
static INLINE void high_dc_predictor ( uint16_t * dst , ptrdiff_t stride , int bs , const uint16_t * above , const uint16_t * left , int bd ) {
int i , r , expected_dc , sum = 0 ;
const int count = 2 * bs ;
( void ) bd ;
for ( i = 0 ;
i < bs ;
i ++ ) {
sum += above [ i ] ;
sum += left [ i ] ;
}
expected_dc = ( sum + ( count >> 1 ) ) / count ;
for ( r = 0 ;
r < bs ;
r ++ ) {
vpx_memset16 ( dst , expected_dc , bs ) ;
dst += stride ;
}
}
# endif static INLINE void d207_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) {
int r , c ;
( void ) above ;
for ( r = 0 ;
r < bs - 1 ;
++ r ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r ] + left [ r + 1 ] , 1 ) ;
dst [ ( bs - 1 ) * stride ] = left [ bs - 1 ] ;
dst ++ ;
for ( r = 0 ;
r < bs - 2 ;
++ r ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r ] + left [ r + 1 ] * 2 + left [ r + 2 ] , 2 ) ;
dst [ ( bs - 2 ) * stride ] = ROUND_POWER_OF_TWO ( left [ bs - 2 ] + left [ bs - 1 ] * 3 , 2 ) ;
dst [ ( bs - 1 ) * stride ] = left [ bs - 1 ] ;
dst ++ ;
for ( c = 0 ;
c < bs - 2 ;
++ c ) dst [ ( bs - 1 ) * stride + c ] = left [ bs - 1 ] ;
for ( r = bs - 2 ;
r >= 0 ;
-- r ) for ( c = 0 ;
c < bs - 2 ;
++ c ) dst [ r * stride + c ] = dst [ ( r + 1 ) * stride + c - 2 ] ;
}
intra_pred_allsizes ( d207 ) static INLINE void d63_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) {
int r , c ;
( void ) left ;
for ( r = 0 ;
r < bs ;
++ r ) {
for ( c = 0 ;
c < bs ;
++ c ) dst [ c ] = r & 1 ? ROUND_POWER_OF_TWO ( above [ r / 2 + c ] + above [ r / 2 + c + 1 ] * 2 + above [ r / 2 + c + 2 ] , 2 ) : ROUND_POWER_OF_TWO ( above [ r / 2 + c ] + above [ r / 2 + c + 1 ] , 1 ) ;
dst += stride ;
}
}
intra_pred_allsizes ( d63 ) static INLINE void d45_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) {
int r , c ;
( void ) left ;
for ( r = 0 ;
r < bs ;
++ r ) {
for ( c = 0 ;
c < bs ;
++ c ) dst [ c ] = r + c + 2 < bs * 2 ? ROUND_POWER_OF_TWO ( above [ r + c ] + above [ r + c + 1 ] * 2 + above [ r + c + 2 ] , 2 ) : above [ bs * 2 - 1 ] ;
dst += stride ;
}
}
intra_pred_allsizes ( d45 ) static INLINE void d117_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) {
int r , c ;
for ( c = 0 ;
c < bs ;
c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 1 ] + above [ c ] , 1 ) ;
dst += stride ;
dst [ 0 ] = ROUND_POWER_OF_TWO ( left [ 0 ] + above [ - 1 ] * 2 + above [ 0 ] , 2 ) ;
for ( c = 1 ;
c < bs ;
c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 2 ] + above [ c - 1 ] * 2 + above [ c ] , 2 ) ;
dst += stride ;
dst [ 0 ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] * 2 + left [ 1 ] , 2 ) ;
for ( r = 3 ;
r < bs ;
++ r ) dst [ ( r - 2 ) * stride ] = ROUND_POWER_OF_TWO ( left [ r - 3 ] + left [ r - 2 ] * 2 + left [ r - 1 ] , 2 ) ;
for ( r = 2 ;
r < bs ;
++ r ) {
for ( c = 1 ;
c < bs ;
c ++ ) dst [ c ] = dst [ - 2 * stride + c - 1 ] ;
dst += stride ;
}
}
intra_pred_allsizes ( d117 )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h225_RTPSession ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_RTPSession , RTPSession_sequence ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static VALUE mFalseClass_to_json ( int argc , VALUE * argv , VALUE self ) {
GENERATE_JSON ( false ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int gs_main_finit ( gs_main_instance * minst , int exit_status , int code ) {
i_ctx_t * i_ctx_p = minst -> i_ctx_p ;
gs_dual_memory_t dmem = {
0 }
;
int exit_code ;
ref error_object ;
char * tempnames ;
tempnames = gs_main_tempnames ( minst ) ;
gs_finit_push_systemdict ( i_ctx_p ) ;
if ( minst -> init_done >= 2 ) {
gs_main_run_string ( minst , "/BGPrint /GetDeviceParam .special_op \ {
{
<</BeginPage {
pop}
/EndPage {
pop pop //false }
\ /BGPrint false /NumRenderingThreads 0>> setpagedevice}
if}
if \ serverdict /.jobsavelevel get 0 eq {
/quit}
{
/stop}
ifelse \ .systemvar exec" , 0 , & exit_code , & error_object ) ;
}
if ( minst -> init_done >= 2 ) {
int code = 0 ;
if ( idmemory -> reclaim != 0 ) {
code = interp_reclaim ( & minst -> i_ctx_p , avm_global ) ;
if ( code < 0 ) {
ref error_name ;
if ( tempnames ) free ( tempnames ) ;
if ( gs_errorname ( i_ctx_p , code , & error_name ) >= 0 ) {
char err_str [ 32 ] = {
0 }
;
name_string_ref ( imemory , & error_name , & error_name ) ;
memcpy ( err_str , error_name . value . const_bytes , r_size ( & error_name ) ) ;
emprintf2 ( imemory , "ERROR: %s (%d) reclaiming the memory while the interpreter finalization.\n" , err_str , code ) ;
}
else {
emprintf1 ( imemory , "UNKNOWN ERROR %d reclaiming the memory while the interpreter finalization.\n" , code ) ;
}
# ifdef MEMENTO_SQUEEZE_BUILD if ( code != gs_error_VMerror ) return gs_error_Fatal ;
# else return gs_error_Fatal ;
# endif }
i_ctx_p = minst -> i_ctx_p ;
}
if ( i_ctx_p -> pgs != NULL && i_ctx_p -> pgs -> device != NULL && gx_device_is_null ( i_ctx_p -> pgs -> device ) ) {
int code = gs_grestoreall ( i_ctx_p -> pgs ) ;
if ( code < 0 ) return_error ( gs_error_Fatal ) ;
}
if ( i_ctx_p -> pgs != NULL && i_ctx_p -> pgs -> device != NULL ) {
gx_device * pdev = i_ctx_p -> pgs -> device ;
const char * dname = pdev -> dname ;
rc_adjust ( pdev , 1 , "gs_main_finit" ) ;
gs_main_run_string ( minst , ".uninstallpagedevice serverdict \ /.jobsavelevel get 0 eq {
/quit}
{
/stop}
ifelse .systemvar exec" , 0 , & exit_code , & error_object ) ;
code = gs_closedevice ( pdev ) ;
if ( code < 0 ) {
ref error_name ;
if ( gs_errorname ( i_ctx_p , code , & error_name ) >= 0 ) {
char err_str [ 32 ] = {
0 }
;
name_string_ref ( imemory , & error_name , & error_name ) ;
memcpy ( err_str , error_name . value . const_bytes , r_size ( & error_name ) ) ;
emprintf3 ( imemory , "ERROR: %s (%d) on closing %s device.\n" , err_str , code , dname ) ;
}
else {
emprintf2 ( imemory , "UNKNOWN ERROR %d closing %s device.\n" , code , dname ) ;
}
}
rc_decrement ( pdev , "gs_main_finit" ) ;
if ( exit_status == 0 || exit_status == gs_error_Quit ) exit_status = code ;
}
gs_main_run_string ( minst , "(%stdout) (w) file closefile (%stderr) (w) file closefile \ serverdict /.jobsavelevel get 0 eq {
/quit}
{
/stop}
ifelse .systemexec \ systemdict /savedinitialgstate .forceundef" , 0 , & exit_code , & error_object ) ;
}
gp_readline_finit ( minst -> readline_data ) ;
i_ctx_p = minst -> i_ctx_p ;
if ( gs_debug_c ( ':' ) ) {
print_resource_usage ( minst , & gs_imemory , "Final" ) ;
dmprintf1 ( minst -> heap , "%% Exiting instance 0x%p\n" , minst ) ;
}
if ( minst -> init_done >= 1 ) {
gs_memory_t * mem_raw = i_ctx_p -> memory . current -> non_gc_memory ;
i_plugin_holder * h = i_ctx_p -> plugin_list ;
dmem = * idmemory ;
code = alloc_restore_all ( i_ctx_p ) ;
if ( code < 0 ) emprintf1 ( mem_raw , "ERROR %d while the final restore. See gs/psi/ierrors.h for code explanation.\n" , code ) ;
i_iodev_finit ( & dmem ) ;
i_plugin_finit ( mem_raw , h ) ;
}
if ( minst -> heap -> gs_lib_ctx -> fstdout2 && ( minst -> heap -> gs_lib_ctx -> fstdout2 != minst -> heap -> gs_lib_ctx -> fstdout ) && ( minst -> heap -> gs_lib_ctx -> fstdout2 != minst -> heap -> gs_lib_ctx -> fstderr ) ) {
fclose ( minst -> heap -> gs_lib_ctx -> fstdout2 ) ;
minst -> heap -> gs_lib_ctx -> fstdout2 = ( FILE * ) NULL ;
}
minst -> heap -> gs_lib_ctx -> stdout_is_redirected = 0 ;
minst -> heap -> gs_lib_ctx -> stdout_to_stderr = 0 ;
if ( tempnames ) {
char * p = tempnames ;
while ( * p ) {
unlink ( p ) ;
p += strlen ( p ) + 1 ;
}
free ( tempnames ) ;
}
gs_lib_finit ( exit_status , code , minst -> heap ) ;
gs_free_object ( minst -> heap , minst -> lib_path . container . value . refs , "lib_path array" ) ;
ialloc_finit ( & dmem ) ;
return exit_status ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static const char * ultag_getRegion ( const ULanguageTag * langtag ) {
return langtag -> region ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int main_atou ( const char * arg , usize_t * uo , usize_t low , usize_t high , char which ) {
int ret ;
xoff_t xo ;
if ( ( ret = main_atoux ( arg , & xo , low , high , which ) ) ) {
return ret ;
}
* uo = ( usize_t ) xo ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void _toUnicodeWithCallback ( UConverterToUnicodeArgs * pArgs , UErrorCode * err ) {
UConverterToUnicode toUnicode ;
UConverter * cnv ;
const char * s ;
UChar * t ;
int32_t * offsets ;
int32_t sourceIndex ;
int32_t errorInputLength ;
UBool converterSawEndOfInput , calledCallback ;
char replay [ UCNV_EXT_MAX_BYTES ] ;
const char * realSource , * realSourceLimit ;
int32_t realSourceIndex ;
UBool realFlush ;
cnv = pArgs -> converter ;
s = pArgs -> source ;
t = pArgs -> target ;
offsets = pArgs -> offsets ;
sourceIndex = 0 ;
if ( offsets == NULL ) {
toUnicode = cnv -> sharedData -> impl -> toUnicode ;
}
else {
toUnicode = cnv -> sharedData -> impl -> toUnicodeWithOffsets ;
if ( toUnicode == NULL ) {
toUnicode = cnv -> sharedData -> impl -> toUnicode ;
sourceIndex = - 1 ;
}
}
if ( cnv -> preToULength >= 0 ) {
realSource = NULL ;
realSourceLimit = NULL ;
realFlush = FALSE ;
realSourceIndex = 0 ;
}
else {
realSource = pArgs -> source ;
realSourceLimit = pArgs -> sourceLimit ;
realFlush = pArgs -> flush ;
realSourceIndex = sourceIndex ;
uprv_memcpy ( replay , cnv -> preToU , - cnv -> preToULength ) ;
pArgs -> source = replay ;
pArgs -> sourceLimit = replay - cnv -> preToULength ;
pArgs -> flush = FALSE ;
sourceIndex = - 1 ;
cnv -> preToULength = 0 ;
}
for ( ;
;
) {
if ( U_SUCCESS ( * err ) ) {
toUnicode ( pArgs , err ) ;
converterSawEndOfInput = ( UBool ) ( U_SUCCESS ( * err ) && pArgs -> flush && pArgs -> source == pArgs -> sourceLimit && cnv -> toULength == 0 ) ;
}
else {
converterSawEndOfInput = FALSE ;
}
calledCallback = FALSE ;
errorInputLength = 0 ;
for ( ;
;
) {
if ( offsets != NULL ) {
int32_t length = ( int32_t ) ( pArgs -> target - t ) ;
if ( length > 0 ) {
_updateOffsets ( offsets , length , sourceIndex , errorInputLength ) ;
pArgs -> offsets = offsets += length ;
}
if ( sourceIndex >= 0 ) {
sourceIndex += ( int32_t ) ( pArgs -> source - s ) ;
}
}
if ( cnv -> preToULength < 0 ) {
if ( realSource == NULL ) {
realSource = pArgs -> source ;
realSourceLimit = pArgs -> sourceLimit ;
realFlush = pArgs -> flush ;
realSourceIndex = sourceIndex ;
uprv_memcpy ( replay , cnv -> preToU , - cnv -> preToULength ) ;
pArgs -> source = replay ;
pArgs -> sourceLimit = replay - cnv -> preToULength ;
pArgs -> flush = FALSE ;
if ( ( sourceIndex += cnv -> preToULength ) < 0 ) {
sourceIndex = - 1 ;
}
cnv -> preToULength = 0 ;
}
else {
U_ASSERT ( realSource == NULL ) ;
* err = U_INTERNAL_PROGRAM_ERROR ;
}
}
s = pArgs -> source ;
t = pArgs -> target ;
if ( U_SUCCESS ( * err ) ) {
if ( s < pArgs -> sourceLimit ) {
break ;
}
else if ( realSource != NULL ) {
pArgs -> source = realSource ;
pArgs -> sourceLimit = realSourceLimit ;
pArgs -> flush = realFlush ;
sourceIndex = realSourceIndex ;
realSource = NULL ;
break ;
}
else if ( pArgs -> flush && cnv -> toULength > 0 ) {
* err = U_TRUNCATED_CHAR_FOUND ;
calledCallback = FALSE ;
}
else {
if ( pArgs -> flush ) {
if ( ! converterSawEndOfInput ) {
break ;
}
_reset ( cnv , UCNV_RESET_TO_UNICODE , FALSE ) ;
}
return ;
}
}
{
UErrorCode e ;
if ( calledCallback || ( e = * err ) == U_BUFFER_OVERFLOW_ERROR || ( e != U_INVALID_CHAR_FOUND && e != U_ILLEGAL_CHAR_FOUND && e != U_TRUNCATED_CHAR_FOUND && e != U_ILLEGAL_ESCAPE_SEQUENCE && e != U_UNSUPPORTED_ESCAPE_SEQUENCE ) ) {
if ( realSource != NULL ) {
int32_t length ;
U_ASSERT ( cnv -> preToULength == 0 ) ;
length = ( int32_t ) ( pArgs -> sourceLimit - pArgs -> source ) ;
if ( length > 0 ) {
uprv_memcpy ( cnv -> preToU , pArgs -> source , length ) ;
cnv -> preToULength = ( int8_t ) - length ;
}
pArgs -> source = realSource ;
pArgs -> sourceLimit = realSourceLimit ;
pArgs -> flush = realFlush ;
}
return ;
}
}
errorInputLength = cnv -> invalidCharLength = cnv -> toULength ;
if ( errorInputLength > 0 ) {
uprv_memcpy ( cnv -> invalidCharBuffer , cnv -> toUBytes , errorInputLength ) ;
}
cnv -> toULength = 0 ;
if ( cnv -> toUCallbackReason == UCNV_ILLEGAL && * err == U_INVALID_CHAR_FOUND ) {
cnv -> toUCallbackReason = UCNV_UNASSIGNED ;
}
cnv -> fromCharErrorBehaviour ( cnv -> toUContext , pArgs , cnv -> invalidCharBuffer , errorInputLength , cnv -> toUCallbackReason , err ) ;
cnv -> toUCallbackReason = UCNV_ILLEGAL ;
calledCallback = TRUE ;
}
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
CURLcode Curl_http ( struct connectdata * conn , bool * done ) {
struct Curl_easy * data = conn -> data ;
CURLcode result = CURLE_OK ;
struct HTTP * http ;
const char * ppath = data -> state . path ;
bool paste_ftp_userpwd = FALSE ;
char ftp_typecode [ sizeof ( "/;
type=?" ) ] = "" ;
const char * host = conn -> host . name ;
const char * te = "" ;
const char * ptr ;
const char * request ;
Curl_HttpReq httpreq = data -> set . httpreq ;
# if ! defined ( CURL_DISABLE_COOKIES ) char * addcookies = NULL ;
# endif curl_off_t included_body = 0 ;
const char * httpstring ;
Curl_send_buffer * req_buffer ;
curl_off_t postsize = 0 ;
int seekerr = CURL_SEEKFUNC_OK ;
* done = TRUE ;
if ( conn -> httpversion < 20 ) {
switch ( conn -> negnpn ) {
case CURL_HTTP_VERSION_2 : conn -> httpversion = 20 ;
result = Curl_http2_switched ( conn , NULL , 0 ) ;
if ( result ) return result ;
break ;
case CURL_HTTP_VERSION_1_1 : break ;
default : # ifdef USE_NGHTTP2 if ( conn -> data -> set . httpversion == CURL_HTTP_VERSION_2_PRIOR_KNOWLEDGE ) {
DEBUGF ( infof ( data , "HTTP/2 over clean TCP\n" ) ) ;
conn -> httpversion = 20 ;
result = Curl_http2_switched ( conn , NULL , 0 ) ;
if ( result ) return result ;
}
# endif break ;
}
}
else {
result = Curl_http2_setup ( conn ) ;
if ( result ) return result ;
}
http = data -> req . protop ;
if ( ! data -> state . this_is_a_follow ) {
free ( data -> state . first_host ) ;
data -> state . first_host = strdup ( conn -> host . name ) ;
if ( ! data -> state . first_host ) return CURLE_OUT_OF_MEMORY ;
data -> state . first_remote_port = conn -> remote_port ;
}
http -> writebytecount = http -> readbytecount = 0 ;
if ( ( conn -> handler -> protocol & ( PROTO_FAMILY_HTTP | CURLPROTO_FTP ) ) && data -> set . upload ) {
httpreq = HTTPREQ_PUT ;
}
if ( data -> set . str [ STRING_CUSTOMREQUEST ] ) request = data -> set . str [ STRING_CUSTOMREQUEST ] ;
else {
if ( data -> set . opt_no_body ) request = "HEAD" ;
else {
DEBUGASSERT ( ( httpreq > HTTPREQ_NONE ) && ( httpreq < HTTPREQ_LAST ) ) ;
switch ( httpreq ) {
case HTTPREQ_POST : case HTTPREQ_POST_FORM : request = "POST" ;
break ;
case HTTPREQ_PUT : request = "PUT" ;
break ;
default : case HTTPREQ_GET : request = "GET" ;
break ;
case HTTPREQ_HEAD : request = "HEAD" ;
break ;
}
}
}
if ( Curl_checkheaders ( conn , "User-Agent:" ) ) {
free ( conn -> allocptr . uagent ) ;
conn -> allocptr . uagent = NULL ;
}
result = Curl_http_output_auth ( conn , request , ppath , FALSE ) ;
if ( result ) return result ;
if ( ( data -> state . authhost . multi || data -> state . authproxy . multi ) && ( httpreq != HTTPREQ_GET ) && ( httpreq != HTTPREQ_HEAD ) ) {
conn -> bits . authneg = TRUE ;
}
else conn -> bits . authneg = FALSE ;
Curl_safefree ( conn -> allocptr . ref ) ;
if ( data -> change . referer && ! Curl_checkheaders ( conn , "Referer:" ) ) {
conn -> allocptr . ref = aprintf ( "Referer: %s\r\n" , data -> change . referer ) ;
if ( ! conn -> allocptr . ref ) return CURLE_OUT_OF_MEMORY ;
}
else conn -> allocptr . ref = NULL ;
# if ! defined ( CURL_DISABLE_COOKIES ) if ( data -> set . str [ STRING_COOKIE ] && ! Curl_checkheaders ( conn , "Cookie:" ) ) addcookies = data -> set . str [ STRING_COOKIE ] ;
# endif if ( ! Curl_checkheaders ( conn , "Accept-Encoding:" ) && data -> set . str [ STRING_ENCODING ] ) {
Curl_safefree ( conn -> allocptr . accept_encoding ) ;
conn -> allocptr . accept_encoding = aprintf ( "Accept-Encoding: %s\r\n" , data -> set . str [ STRING_ENCODING ] ) ;
if ( ! conn -> allocptr . accept_encoding ) return CURLE_OUT_OF_MEMORY ;
}
else {
Curl_safefree ( conn -> allocptr . accept_encoding ) ;
conn -> allocptr . accept_encoding = NULL ;
}
# ifdef HAVE_LIBZ if ( ! Curl_checkheaders ( conn , "TE:" ) && data -> set . http_transfer_encoding ) {
char * cptr = Curl_checkheaders ( conn , "Connection:" ) ;
# define TE_HEADER "TE: gzip\r\n" Curl_safefree ( conn -> allocptr . te ) ;
conn -> allocptr . te = cptr ? aprintf ( "%s, TE\r\n" TE_HEADER , cptr ) : strdup ( "Connection: TE\r\n" TE_HEADER ) ;
if ( ! conn -> allocptr . te ) return CURLE_OUT_OF_MEMORY ;
}
# endif ptr = Curl_checkheaders ( conn , "Transfer-Encoding:" ) ;
if ( ptr ) {
data -> req . upload_chunky = Curl_compareheader ( ptr , "Transfer-Encoding:" , "chunked" ) ;
}
else {
if ( ( conn -> handler -> protocol & PROTO_FAMILY_HTTP ) && data -> set . upload && ( data -> state . infilesize == - 1 ) ) {
if ( conn -> bits . authneg ) ;
else if ( use_http_1_1plus ( data , conn ) ) {
data -> req . upload_chunky = TRUE ;
}
else {
failf ( data , "Chunky upload is not supported by HTTP 1.0" ) ;
return CURLE_UPLOAD_FAILED ;
}
}
else {
data -> req . upload_chunky = FALSE ;
}
if ( data -> req . upload_chunky ) te = "Transfer-Encoding: chunked\r\n" ;
}
Curl_safefree ( conn -> allocptr . host ) ;
ptr = Curl_checkheaders ( conn , "Host:" ) ;
if ( ptr && ( ! data -> state . this_is_a_follow || Curl_raw_equal ( data -> state . first_host , conn -> host . name ) ) ) {
# if ! defined ( CURL_DISABLE_COOKIES ) char * cookiehost = Curl_copy_header_value ( ptr ) ;
if ( ! cookiehost ) return CURLE_OUT_OF_MEMORY ;
if ( ! * cookiehost ) free ( cookiehost ) ;
else {
int startsearch = 0 ;
if ( * cookiehost == '[' ) {
char * closingbracket ;
memmove ( cookiehost , cookiehost + 1 , strlen ( cookiehost ) - 1 ) ;
closingbracket = strchr ( cookiehost , ']' ) ;
if ( closingbracket ) * closingbracket = 0 ;
}
else {
char * colon = strchr ( cookiehost + startsearch , ':' ) ;
if ( colon ) * colon = 0 ;
}
Curl_safefree ( conn -> allocptr . cookiehost ) ;
conn -> allocptr . cookiehost = cookiehost ;
}
# endif if ( strcmp ( "Host:" , ptr ) ) {
conn -> allocptr . host = aprintf ( "%s\r\n" , ptr ) ;
if ( ! conn -> allocptr . host ) return CURLE_OUT_OF_MEMORY ;
}
else conn -> allocptr . host = NULL ;
}
else {
if ( ( ( conn -> given -> protocol & CURLPROTO_HTTPS ) && ( conn -> remote_port == PORT_HTTPS ) ) || ( ( conn -> given -> protocol & CURLPROTO_HTTP ) && ( conn -> remote_port == PORT_HTTP ) ) ) conn -> allocptr . host = aprintf ( "Host: %s%s%s\r\n" , conn -> bits . ipv6_ip ? "[" : "" , host , conn -> bits . ipv6_ip ? "]" : "" ) ;
else conn -> allocptr . host = aprintf ( "Host: %s%s%s:%hu\r\n" , conn -> bits . ipv6_ip ? "[" : "" , host , conn -> bits . ipv6_ip ? "]" : "" , conn -> remote_port ) ;
if ( ! conn -> allocptr . host ) return CURLE_OUT_OF_MEMORY ;
}
# ifndef CURL_DISABLE_PROXY if ( conn -> bits . httpproxy && ! conn -> bits . tunnel_proxy ) {
if ( conn -> host . dispname != conn -> host . name ) {
char * url = data -> change . url ;
ptr = strstr ( url , conn -> host . dispname ) ;
if ( ptr ) {
size_t currlen = strlen ( conn -> host . dispname ) ;
size_t newlen = strlen ( conn -> host . name ) ;
size_t urllen = strlen ( url ) ;
char * newurl ;
newurl = malloc ( urllen + newlen - currlen + 1 ) ;
if ( newurl ) {
memcpy ( newurl , url , ptr - url ) ;
memcpy ( newurl + ( ptr - url ) , conn -> host . name , newlen ) ;
memcpy ( newurl + newlen + ( ptr - url ) , ptr + currlen , urllen - ( ptr - url ) - currlen + 1 ) ;
if ( data -> change . url_alloc ) {
Curl_safefree ( data -> change . url ) ;
data -> change . url_alloc = FALSE ;
}
data -> change . url = newurl ;
data -> change . url_alloc = TRUE ;
}
else return CURLE_OUT_OF_MEMORY ;
}
}
ppath = data -> change . url ;
if ( checkprefix ( "ftp://" , ppath ) ) {
if ( data -> set . proxy_transfer_mode ) {
char * type = strstr ( ppath , ";
type=" ) ;
if ( type && type [ 6 ] && type [ 7 ] == 0 ) {
switch ( Curl_raw_toupper ( type [ 6 ] ) ) {
case 'A' : case 'D' : case 'I' : break ;
default : type = NULL ;
}
}
if ( ! type ) {
char * p = ftp_typecode ;
if ( ! * data -> state . path && ppath [ strlen ( ppath ) - 1 ] != '/' ) {
* p ++ = '/' ;
}
snprintf ( p , sizeof ( ftp_typecode ) - 1 , ";
type=%c" , data -> set . prefer_ascii ? 'a' : 'i' ) ;
}
}
if ( conn -> bits . user_passwd && ! conn -> bits . userpwd_in_url ) paste_ftp_userpwd = TRUE ;
}
}
# endif if ( HTTPREQ_POST_FORM == httpreq ) {
result = Curl_getformdata ( data , & http -> sendit , data -> set . httppost , Curl_checkheaders ( conn , "Content-Type:" ) , & http -> postsize ) ;
if ( result ) return result ;
}
http -> p_accept = Curl_checkheaders ( conn , "Accept:" ) ? NULL : "Accept: */*\r\n" ;
if ( ( ( HTTPREQ_POST == httpreq ) || ( HTTPREQ_POST_FORM == httpreq ) || ( HTTPREQ_PUT == httpreq ) ) && data -> state . resume_from ) {
if ( data -> state . resume_from < 0 ) {
data -> state . resume_from = 0 ;
}
if ( data -> state . resume_from && ! data -> state . this_is_a_follow ) {
if ( conn -> seek_func ) {
seekerr = conn -> seek_func ( conn -> seek_client , data -> state . resume_from , SEEK_SET ) ;
}
if ( seekerr != CURL_SEEKFUNC_OK ) {
if ( seekerr != CURL_SEEKFUNC_CANTSEEK ) {
failf ( data , "Could not seek stream" ) ;
return CURLE_READ_ERROR ;
}
else {
curl_off_t passed = 0 ;
do {
size_t readthisamountnow = ( data -> state . resume_from - passed > CURL_OFF_T_C ( BUFSIZE ) ) ? BUFSIZE : curlx_sotouz ( data -> state . resume_from - passed ) ;
size_t actuallyread = data -> state . fread_func ( data -> state . buffer , 1 , readthisamountnow , data -> state . in ) ;
passed += actuallyread ;
if ( ( actuallyread == 0 ) || ( actuallyread > readthisamountnow ) ) {
failf ( data , "Could only read %" CURL_FORMAT_CURL_OFF_T " bytes from the input" , passed ) ;
return CURLE_READ_ERROR ;
}
}
while ( passed < data -> state . resume_from ) ;
}
}
if ( data -> state . infilesize > 0 ) {
data -> state . infilesize -= data -> state . resume_from ;
if ( data -> state . infilesize <= 0 ) {
failf ( data , "File already completely uploaded" ) ;
return CURLE_PARTIAL_FILE ;
}
}
}
}
if ( data -> state . use_range ) {
if ( ( ( httpreq == HTTPREQ_GET ) || ( httpreq == HTTPREQ_HEAD ) ) && ! Curl_checkheaders ( conn , "Range:" ) ) {
free ( conn -> allocptr . rangeline ) ;
conn -> allocptr . rangeline = aprintf ( "Range: bytes=%s\r\n" , data -> state . range ) ;
}
else if ( ( httpreq != HTTPREQ_GET ) && ! Curl_checkheaders ( conn , "Content-Range:" ) ) {
free ( conn -> allocptr . rangeline ) ;
if ( data -> set . set_resume_from < 0 ) {
conn -> allocptr . rangeline = aprintf ( "Content-Range: bytes 0-%" CURL_FORMAT_CURL_OFF_T "/%" CURL_FORMAT_CURL_OFF_T "\r\n" , data -> state . infilesize - 1 , data -> state . infilesize ) ;
}
else if ( data -> state . resume_from ) {
curl_off_t total_expected_size = data -> state . resume_from + data -> state . infilesize ;
conn -> allocptr . rangeline = aprintf ( "Content-Range: bytes %s%" CURL_FORMAT_CURL_OFF_T "/%" CURL_FORMAT_CURL_OFF_T "\r\n" , data -> state . range , total_expected_size - 1 , total_expected_size ) ;
}
else {
conn -> allocptr . rangeline = aprintf ( "Content-Range: bytes %s/%" CURL_FORMAT_CURL_OFF_T "\r\n" , data -> state . range , data -> state . infilesize ) ;
}
if ( ! conn -> allocptr . rangeline ) return CURLE_OUT_OF_MEMORY ;
}
}
httpstring = use_http_1_1plus ( data , conn ) ? "1.1" : "1.0" ;
req_buffer = Curl_add_buffer_init ( ) ;
if ( ! req_buffer ) return CURLE_OUT_OF_MEMORY ;
result = Curl_add_bufferf ( req_buffer , "%s " , request ) ;
if ( result ) return result ;
if ( paste_ftp_userpwd ) result = Curl_add_bufferf ( req_buffer , "ftp://%s:%s@%s" , conn -> user , conn -> passwd , ppath + sizeof ( "ftp://" ) - 1 ) ;
else result = Curl_add_buffer ( req_buffer , ppath , strlen ( ppath ) ) ;
if ( result ) return result ;
result = Curl_add_bufferf ( req_buffer , "%s" " HTTP/%s\r\n" "%s" "%s" "%s" "%s" "%s" "%s" "%s" "%s" "%s" "%s" "%s" , ftp_typecode , httpstring , ( conn -> allocptr . host ? conn -> allocptr . host : "" ) , conn -> allocptr . proxyuserpwd ? conn -> allocptr . proxyuserpwd : "" , conn -> allocptr . userpwd ? conn -> allocptr . userpwd : "" , ( data -> state . use_range && conn -> allocptr . rangeline ) ? conn -> allocptr . rangeline : "" , ( data -> set . str [ STRING_USERAGENT ] && * data -> set . str [ STRING_USERAGENT ] && conn -> allocptr . uagent ) ? conn -> allocptr . uagent : "" , http -> p_accept ? http -> p_accept : "" , conn -> allocptr . te ? conn -> allocptr . te : "" , ( data -> set . str [ STRING_ENCODING ] && * data -> set . str [ STRING_ENCODING ] && conn -> allocptr . accept_encoding ) ? conn -> allocptr . accept_encoding : "" , ( data -> change . referer && conn -> allocptr . ref ) ? conn -> allocptr . ref : "" , ( conn -> bits . httpproxy && ! conn -> bits . tunnel_proxy && ! Curl_checkProxyheaders ( conn , "Proxy-Connection:" ) ) ? "Proxy-Connection: Keep-Alive\r\n" : "" , te ) ;
Curl_safefree ( conn -> allocptr . userpwd ) ;
switch ( data -> state . authproxy . picked ) {
case CURLAUTH_NEGOTIATE : case CURLAUTH_NTLM : case CURLAUTH_NTLM_WB : Curl_safefree ( conn -> allocptr . proxyuserpwd ) ;
break ;
}
if ( result ) return result ;
if ( ! ( conn -> handler -> flags & PROTOPT_SSL ) && conn -> httpversion != 20 && ( data -> set . httpversion == CURL_HTTP_VERSION_2 ) ) {
result = Curl_http2_request_upgrade ( req_buffer , conn ) ;
if ( result ) return result ;
}
# if ! defined ( CURL_DISABLE_COOKIES ) if ( data -> cookies || addcookies ) {
struct Cookie * co = NULL ;
int count = 0 ;
if ( data -> cookies ) {
Curl_share_lock ( data , CURL_LOCK_DATA_COOKIE , CURL_LOCK_ACCESS_SINGLE ) ;
co = Curl_cookie_getlist ( data -> cookies , conn -> allocptr . cookiehost ? conn -> allocptr . cookiehost : host , data -> state . path , ( conn -> handler -> protocol & CURLPROTO_HTTPS ) ? TRUE : FALSE ) ;
Curl_share_unlock ( data , CURL_LOCK_DATA_COOKIE ) ;
}
if ( co ) {
struct Cookie * store = co ;
while ( co ) {
if ( co -> value ) {
if ( 0 == count ) {
result = Curl_add_bufferf ( req_buffer , "Cookie: " ) ;
if ( result ) break ;
}
result = Curl_add_bufferf ( req_buffer , "%s%s=%s" , count ? ";
" : "" , co -> name , co -> value ) ;
if ( result ) break ;
count ++ ;
}
co = co -> next ;
}
Curl_cookie_freelist ( store , FALSE ) ;
}
if ( addcookies && ! result ) {
if ( ! count ) result = Curl_add_bufferf ( req_buffer , "Cookie: " ) ;
if ( ! result ) {
result = Curl_add_bufferf ( req_buffer , "%s%s" , count ? ";
" : "" , addcookies ) ;
count ++ ;
}
}
if ( count && ! result ) result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
if ( result ) return result ;
}
# endif result = Curl_add_timecondition ( data , req_buffer ) ;
if ( result ) return result ;
result = Curl_add_custom_headers ( conn , FALSE , req_buffer ) ;
if ( result ) return result ;
http -> postdata = NULL ;
Curl_pgrsSetUploadSize ( data , - 1 ) ;
switch ( httpreq ) {
case HTTPREQ_POST_FORM : if ( ! http -> sendit || conn -> bits . authneg ) {
result = Curl_add_bufferf ( req_buffer , "Content-Length: 0\r\n\r\n" ) ;
if ( result ) return result ;
result = Curl_add_buffer_send ( req_buffer , conn , & data -> info . request_size , 0 , FIRSTSOCKET ) ;
if ( result ) failf ( data , "Failed sending POST request" ) ;
else Curl_setup_transfer ( conn , FIRSTSOCKET , - 1 , TRUE , & http -> readbytecount , - 1 , NULL ) ;
break ;
}
if ( Curl_FormInit ( & http -> form , http -> sendit ) ) {
failf ( data , "Internal HTTP POST error!" ) ;
return CURLE_HTTP_POST_ERROR ;
}
http -> form . fread_func = data -> state . fread_func ;
data -> state . fread_func = ( curl_read_callback ) Curl_FormReader ;
data -> state . in = & http -> form ;
http -> sending = HTTPSEND_BODY ;
if ( ! data -> req . upload_chunky && ! Curl_checkheaders ( conn , "Content-Length:" ) ) {
result = Curl_add_bufferf ( req_buffer , "Content-Length: %" CURL_FORMAT_CURL_OFF_T "\r\n" , http -> postsize ) ;
if ( result ) return result ;
}
result = expect100 ( data , conn , req_buffer ) ;
if ( result ) return result ;
{
char * contentType ;
size_t linelength = 0 ;
contentType = Curl_formpostheader ( ( void * ) & http -> form , & linelength ) ;
if ( ! contentType ) {
failf ( data , "Could not get Content-Type header line!" ) ;
return CURLE_HTTP_POST_ERROR ;
}
result = Curl_add_buffer ( req_buffer , contentType , linelength ) ;
if ( result ) return result ;
}
result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
if ( result ) return result ;
Curl_pgrsSetUploadSize ( data , http -> postsize ) ;
result = Curl_add_buffer_send ( req_buffer , conn , & data -> info . request_size , 0 , FIRSTSOCKET ) ;
if ( result ) failf ( data , "Failed sending POST request" ) ;
else Curl_setup_transfer ( conn , FIRSTSOCKET , - 1 , TRUE , & http -> readbytecount , FIRSTSOCKET , & http -> writebytecount ) ;
if ( result ) {
Curl_formclean ( & http -> sendit ) ;
return result ;
}
result = Curl_convert_form ( data , http -> sendit ) ;
if ( result ) {
Curl_formclean ( & http -> sendit ) ;
return result ;
}
break ;
case HTTPREQ_PUT : if ( conn -> bits . authneg ) postsize = 0 ;
else postsize = data -> state . infilesize ;
if ( ( postsize != - 1 ) && ! data -> req . upload_chunky && ! Curl_checkheaders ( conn , "Content-Length:" ) ) {
result = Curl_add_bufferf ( req_buffer , "Content-Length: %" CURL_FORMAT_CURL_OFF_T "\r\n" , postsize ) ;
if ( result ) return result ;
}
if ( postsize != 0 ) {
result = expect100 ( data , conn , req_buffer ) ;
if ( result ) return result ;
}
result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
if ( result ) return result ;
Curl_pgrsSetUploadSize ( data , postsize ) ;
result = Curl_add_buffer_send ( req_buffer , conn , & data -> info . request_size , 0 , FIRSTSOCKET ) ;
if ( result ) failf ( data , "Failed sending PUT request" ) ;
else Curl_setup_transfer ( conn , FIRSTSOCKET , - 1 , TRUE , & http -> readbytecount , postsize ? FIRSTSOCKET : - 1 , postsize ? & http -> writebytecount : NULL ) ;
if ( result ) return result ;
break ;
case HTTPREQ_POST : if ( conn -> bits . authneg ) postsize = 0 ;
else {
postsize = ( data -> state . infilesize != - 1 ) ? data -> state . infilesize : ( data -> set . postfields ? ( curl_off_t ) strlen ( data -> set . postfields ) : - 1 ) ;
}
if ( ( postsize != - 1 ) && ! data -> req . upload_chunky && ! Curl_checkheaders ( conn , "Content-Length:" ) ) {
result = Curl_add_bufferf ( req_buffer , "Content-Length: %" CURL_FORMAT_CURL_OFF_T "\r\n" , postsize ) ;
if ( result ) return result ;
}
if ( ! Curl_checkheaders ( conn , "Content-Type:" ) ) {
result = Curl_add_bufferf ( req_buffer , "Content-Type: application/" "x-www-form-urlencoded\r\n" ) ;
if ( result ) return result ;
}
ptr = Curl_checkheaders ( conn , "Expect:" ) ;
if ( ptr ) {
data -> state . expect100header = Curl_compareheader ( ptr , "Expect:" , "100-continue" ) ;
}
else if ( postsize > TINY_INITIAL_POST_SIZE || postsize < 0 ) {
result = expect100 ( data , conn , req_buffer ) ;
if ( result ) return result ;
}
else data -> state . expect100header = FALSE ;
if ( data -> set . postfields ) {
if ( conn -> httpversion != 20 && ! data -> state . expect100header && ( postsize < MAX_INITIAL_POST_SIZE ) ) {
result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
if ( result ) return result ;
if ( ! data -> req . upload_chunky ) {
result = Curl_add_buffer ( req_buffer , data -> set . postfields , ( size_t ) postsize ) ;
included_body = postsize ;
}
else {
if ( postsize ) {
result = Curl_add_bufferf ( req_buffer , "%x\r\n" , ( int ) postsize ) ;
if ( ! result ) {
result = Curl_add_buffer ( req_buffer , data -> set . postfields , ( size_t ) postsize ) ;
if ( ! result ) result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
included_body = postsize + 2 ;
}
}
if ( ! result ) result = Curl_add_buffer ( req_buffer , "\x30\x0d\x0a\x0d\x0a" , 5 ) ;
included_body += 5 ;
}
if ( result ) return result ;
Curl_pgrsSetUploadSize ( data , postsize ) ;
}
else {
http -> postsize = postsize ;
http -> postdata = data -> set . postfields ;
http -> sending = HTTPSEND_BODY ;
data -> state . fread_func = ( curl_read_callback ) readmoredata ;
data -> state . in = ( void * ) conn ;
Curl_pgrsSetUploadSize ( data , http -> postsize ) ;
result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
if ( result ) return result ;
}
}
else {
result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
if ( result ) return result ;
if ( data -> req . upload_chunky && conn -> bits . authneg ) {
result = Curl_add_buffer ( req_buffer , "\x30\x0d\x0a\x0d\x0a" , 5 ) ;
if ( result ) return result ;
}
else if ( data -> state . infilesize ) {
Curl_pgrsSetUploadSize ( data , postsize ? postsize : - 1 ) ;
if ( ! conn -> bits . authneg ) {
http -> postdata = ( char * ) & http -> postdata ;
http -> postsize = postsize ;
}
}
}
result = Curl_add_buffer_send ( req_buffer , conn , & data -> info . request_size , ( size_t ) included_body , FIRSTSOCKET ) ;
if ( result ) failf ( data , "Failed sending HTTP POST request" ) ;
else Curl_setup_transfer ( conn , FIRSTSOCKET , - 1 , TRUE , & http -> readbytecount , http -> postdata ? FIRSTSOCKET : - 1 , http -> postdata ? & http -> writebytecount : NULL ) ;
break ;
default : result = Curl_add_buffer ( req_buffer , "\r\n" , 2 ) ;
if ( result ) return result ;
result = Curl_add_buffer_send ( req_buffer , conn , & data -> info . request_size , 0 , FIRSTSOCKET ) ;
if ( result ) failf ( data , "Failed sending HTTP request" ) ;
else Curl_setup_transfer ( conn , FIRSTSOCKET , - 1 , TRUE , & http -> readbytecount , http -> postdata ? FIRSTSOCKET : - 1 , http -> postdata ? & http -> writebytecount : NULL ) ;
}
if ( result ) return result ;
if ( http -> writebytecount ) {
Curl_pgrsSetUploadCounter ( data , http -> writebytecount ) ;
if ( Curl_pgrsUpdate ( conn ) ) result = CURLE_ABORTED_BY_CALLBACK ;
if ( http -> writebytecount >= postsize ) {
infof ( data , "upload completely sent off: %" CURL_FORMAT_CURL_OFF_T " out of %" CURL_FORMAT_CURL_OFF_T " bytes\n" , http -> writebytecount , postsize ) ;
data -> req . upload_done = TRUE ;
data -> req . keepon &= ~ KEEP_SEND ;
data -> req . exp100 = EXP100_SEND_DATA ;
}
}
if ( ( conn -> httpversion == 20 ) && data -> req . upload_chunky ) data -> req . upload_chunky = FALSE ;
return result ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void cdxl_decode_ham6 ( CDXLVideoContext * c , AVFrame * frame ) {
AVCodecContext * avctx = c -> avctx ;
uint32_t new_palette [ 16 ] , r , g , b ;
uint8_t * ptr , * out , index , op ;
int x , y ;
ptr = c -> new_video ;
out = frame -> data [ 0 ] ;
import_palette ( c , new_palette ) ;
import_format ( c , avctx -> width , c -> new_video ) ;
for ( y = 0 ;
y < avctx -> height ;
y ++ ) {
r = new_palette [ 0 ] & 0xFF0000 ;
g = new_palette [ 0 ] & 0xFF00 ;
b = new_palette [ 0 ] & 0xFF ;
for ( x = 0 ;
x < avctx -> width ;
x ++ ) {
index = * ptr ++ ;
op = index >> 4 ;
index &= 15 ;
switch ( op ) {
case 0 : r = new_palette [ index ] & 0xFF0000 ;
g = new_palette [ index ] & 0xFF00 ;
b = new_palette [ index ] & 0xFF ;
break ;
case 1 : b = index * 0x11 ;
break ;
case 2 : r = index * 0x11 << 16 ;
break ;
case 3 : g = index * 0x11 << 8 ;
break ;
}
AV_WL24 ( out + x * 3 , r | g | b ) ;
}
out += frame -> linesize [ 0 ] ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pdf_process_stream ( fz_context * ctx , pdf_processor * proc , pdf_csi * csi , fz_stream * stm ) {
pdf_document * doc = csi -> doc ;
pdf_lexbuf * buf = csi -> buf ;
fz_cookie * cookie = csi -> cookie ;
pdf_token tok = PDF_TOK_ERROR ;
int in_text_array = 0 ;
int syntax_errors = 0 ;
pdf_clear_stack ( ctx , csi ) ;
fz_var ( in_text_array ) ;
fz_var ( tok ) ;
if ( cookie ) {
cookie -> progress_max = - 1 ;
cookie -> progress = 0 ;
}
do {
fz_try ( ctx ) {
do {
if ( cookie ) {
if ( cookie -> abort ) {
tok = PDF_TOK_EOF ;
break ;
}
cookie -> progress ++ ;
}
tok = pdf_lex ( ctx , stm , buf ) ;
if ( in_text_array ) {
switch ( tok ) {
case PDF_TOK_CLOSE_ARRAY : in_text_array = 0 ;
break ;
case PDF_TOK_REAL : pdf_array_push_drop ( ctx , csi -> obj , pdf_new_real ( ctx , doc , buf -> f ) ) ;
break ;
case PDF_TOK_INT : pdf_array_push_drop ( ctx , csi -> obj , pdf_new_int ( ctx , doc , buf -> i ) ) ;
break ;
case PDF_TOK_STRING : pdf_array_push_drop ( ctx , csi -> obj , pdf_new_string ( ctx , doc , buf -> scratch , buf -> len ) ) ;
break ;
case PDF_TOK_EOF : break ;
case PDF_TOK_KEYWORD : if ( buf -> scratch [ 0 ] == 'T' && ( buf -> scratch [ 1 ] == 'w' || buf -> scratch [ 1 ] == 'c' ) && buf -> scratch [ 2 ] == 0 ) {
int n = pdf_array_len ( ctx , csi -> obj ) ;
if ( n > 0 ) {
pdf_obj * o = pdf_array_get ( ctx , csi -> obj , n - 1 ) ;
if ( pdf_is_number ( ctx , o ) ) {
csi -> stack [ 0 ] = pdf_to_real ( ctx , o ) ;
pdf_array_delete ( ctx , csi -> obj , n - 1 ) ;
pdf_process_keyword ( ctx , proc , csi , stm , buf -> scratch ) ;
}
}
}
default : fz_throw ( ctx , FZ_ERROR_SYNTAX , "syntax error in array" ) ;
}
}
else switch ( tok ) {
case PDF_TOK_ENDSTREAM : case PDF_TOK_EOF : tok = PDF_TOK_EOF ;
break ;
case PDF_TOK_OPEN_ARRAY : if ( csi -> obj ) {
pdf_drop_obj ( ctx , csi -> obj ) ;
csi -> obj = NULL ;
}
if ( csi -> in_text ) {
in_text_array = 1 ;
csi -> obj = pdf_new_array ( ctx , doc , 4 ) ;
}
else {
csi -> obj = pdf_parse_array ( ctx , doc , stm , buf ) ;
}
break ;
case PDF_TOK_OPEN_DICT : if ( csi -> obj ) {
pdf_drop_obj ( ctx , csi -> obj ) ;
csi -> obj = NULL ;
}
csi -> obj = pdf_parse_dict ( ctx , doc , stm , buf ) ;
break ;
case PDF_TOK_NAME : if ( csi -> name [ 0 ] ) {
pdf_drop_obj ( ctx , csi -> obj ) ;
csi -> obj = NULL ;
csi -> obj = pdf_new_name ( ctx , doc , buf -> scratch ) ;
}
else fz_strlcpy ( csi -> name , buf -> scratch , sizeof ( csi -> name ) ) ;
break ;
case PDF_TOK_INT : if ( csi -> top < nelem ( csi -> stack ) ) {
csi -> stack [ csi -> top ] = buf -> i ;
csi -> top ++ ;
}
else fz_throw ( ctx , FZ_ERROR_SYNTAX , "stack overflow" ) ;
break ;
case PDF_TOK_REAL : if ( csi -> top < nelem ( csi -> stack ) ) {
csi -> stack [ csi -> top ] = buf -> f ;
csi -> top ++ ;
}
else fz_throw ( ctx , FZ_ERROR_SYNTAX , "stack overflow" ) ;
break ;
case PDF_TOK_STRING : if ( buf -> len <= sizeof ( csi -> string ) ) {
memcpy ( csi -> string , buf -> scratch , buf -> len ) ;
csi -> string_len = buf -> len ;
}
else {
if ( csi -> obj ) {
pdf_drop_obj ( ctx , csi -> obj ) ;
csi -> obj = NULL ;
}
csi -> obj = pdf_new_string ( ctx , doc , buf -> scratch , buf -> len ) ;
}
break ;
case PDF_TOK_KEYWORD : pdf_process_keyword ( ctx , proc , csi , stm , buf -> scratch ) ;
pdf_clear_stack ( ctx , csi ) ;
break ;
default : fz_throw ( ctx , FZ_ERROR_SYNTAX , "syntax error in content stream" ) ;
}
}
while ( tok != PDF_TOK_EOF ) ;
}
fz_always ( ctx ) {
pdf_clear_stack ( ctx , csi ) ;
}
fz_catch ( ctx ) {
int caught = fz_caught ( ctx ) ;
if ( cookie ) {
if ( caught == FZ_ERROR_TRYLATER ) {
if ( cookie -> incomplete_ok ) cookie -> incomplete ++ ;
else fz_rethrow ( ctx ) ;
}
else if ( caught == FZ_ERROR_ABORT ) {
fz_rethrow ( ctx ) ;
}
else if ( caught == FZ_ERROR_SYNTAX ) {
cookie -> errors ++ ;
if ( ++ syntax_errors >= MAX_SYNTAX_ERRORS ) {
fz_warn ( ctx , "too many syntax errors;
ignoring rest of page" ) ;
tok = PDF_TOK_EOF ;
}
}
else {
cookie -> errors ++ ;
fz_warn ( ctx , "unrecoverable error;
ignoring rest of page" ) ;
tok = PDF_TOK_EOF ;
}
}
else {
if ( caught == FZ_ERROR_TRYLATER ) fz_rethrow ( ctx ) ;
else if ( caught == FZ_ERROR_ABORT ) fz_rethrow ( ctx ) ;
else if ( caught == FZ_ERROR_SYNTAX ) {
if ( ++ syntax_errors >= MAX_SYNTAX_ERRORS ) {
fz_warn ( ctx , "too many syntax errors;
ignoring rest of page" ) ;
tok = PDF_TOK_EOF ;
}
}
else {
fz_warn ( ctx , "unrecoverable error;
ignoring rest of page" ) ;
tok = PDF_TOK_EOF ;
}
}
in_text_array = 0 ;
}
}
while ( tok != PDF_TOK_EOF ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int restore_check_save ( i_ctx_t * i_ctx_p , alloc_save_t * * asave ) {
os_ptr op = osp ;
int code = restore_check_operand ( op , asave , idmemory ) ;
if ( code < 0 ) return code ;
if_debug2m ( 'u' , imemory , "[u]vmrestore 0x%lx, id = %lu\n" , ( ulong ) alloc_save_client_data ( * asave ) , ( ulong ) op -> value . saveid ) ;
if ( I_VALIDATE_BEFORE_RESTORE ) ivalidate_clean_spaces ( i_ctx_p ) ;
osp -- ;
{
int code ;
if ( ( code = restore_check_stack ( i_ctx_p , & o_stack , * asave , false ) ) < 0 || ( code = restore_check_stack ( i_ctx_p , & e_stack , * asave , true ) ) < 0 || ( code = restore_check_stack ( i_ctx_p , & d_stack , * asave , false ) ) < 0 ) {
osp ++ ;
return code ;
}
}
osp ++ ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int mss1_decode_frame ( AVCodecContext * avctx , void * data , int * got_frame , AVPacket * avpkt ) {
const uint8_t * buf = avpkt -> data ;
int buf_size = avpkt -> size ;
MSS1Context * ctx = avctx -> priv_data ;
MSS12Context * c = & ctx -> ctx ;
GetBitContext gb ;
ArithCoder acoder ;
int pal_changed = 0 ;
int ret ;
init_get_bits ( & gb , buf , buf_size * 8 ) ;
arith_init ( & acoder , & gb ) ;
ctx -> pic . reference = 3 ;
ctx -> pic . buffer_hints = FF_BUFFER_HINTS_VALID | FF_BUFFER_HINTS_READABLE | FF_BUFFER_HINTS_PRESERVE | FF_BUFFER_HINTS_REUSABLE ;
if ( ( ret = avctx -> reget_buffer ( avctx , & ctx -> pic ) ) < 0 ) {
av_log ( avctx , AV_LOG_ERROR , "reget_buffer() failed\n" ) ;
return ret ;
}
c -> pal_pic = ctx -> pic . data [ 0 ] + ctx -> pic . linesize [ 0 ] * ( avctx -> height - 1 ) ;
c -> pal_stride = - ctx -> pic . linesize [ 0 ] ;
c -> keyframe = ! arith_get_bit ( & acoder ) ;
if ( c -> keyframe ) {
c -> corrupted = 0 ;
ff_mss12_slicecontext_reset ( & ctx -> sc ) ;
pal_changed = decode_pal ( c , & acoder ) ;
ctx -> pic . key_frame = 1 ;
ctx -> pic . pict_type = AV_PICTURE_TYPE_I ;
}
else {
if ( c -> corrupted ) return AVERROR_INVALIDDATA ;
ctx -> pic . key_frame = 0 ;
ctx -> pic . pict_type = AV_PICTURE_TYPE_P ;
}
c -> corrupted = ff_mss12_decode_rect ( & ctx -> sc , & acoder , 0 , 0 , avctx -> width , avctx -> height ) ;
if ( c -> corrupted ) return AVERROR_INVALIDDATA ;
memcpy ( ctx -> pic . data [ 1 ] , c -> pal , AVPALETTE_SIZE ) ;
ctx -> pic . palette_has_changed = pal_changed ;
* got_frame = 1 ;
* ( AVFrame * ) data = ctx -> pic ;
return buf_size ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void update_frame_size ( VP9_COMP * cpi ) {
VP9_COMMON * const cm = & cpi -> common ;
MACROBLOCKD * const xd = & cpi -> mb . e_mbd ;
vp9_set_mb_mi ( cm , cm -> width , cm -> height ) ;
vp9_init_context_buffers ( cm ) ;
init_macroblockd ( cm , xd ) ;
if ( is_two_pass_svc ( cpi ) ) {
if ( vp9_realloc_frame_buffer ( & cpi -> alt_ref_buffer , cm -> width , cm -> height , cm -> subsampling_x , cm -> subsampling_y , # if CONFIG_VP9_HIGHBITDEPTH cm -> use_highbitdepth , # endif VP9_ENC_BORDER_IN_PIXELS , NULL , NULL , NULL ) ) vpx_internal_error ( & cm -> error , VPX_CODEC_MEM_ERROR , "Failed to reallocate alt_ref_buffer" ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void http_hdr_init ( HdrHeap * heap , HTTPHdrImpl * hh , HTTPType polarity ) {
memset ( & ( hh -> u ) , 0 , sizeof ( hh -> u ) ) ;
hh -> m_polarity = polarity ;
hh -> m_version = HTTP_VERSION ( 1 , 0 ) ;
hh -> m_fields_impl = mime_hdr_create ( heap ) ;
if ( polarity == HTTP_TYPE_REQUEST ) {
hh -> u . req . m_url_impl = url_create ( heap ) ;
hh -> u . req . m_method_wks_idx = - 1 ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static UBool _isPrivateuseValueSubtags ( const char * s , int32_t len ) {
const char * p = s ;
const char * pSubtag = NULL ;
if ( len < 0 ) {
len = ( int32_t ) uprv_strlen ( s ) ;
}
while ( ( p - s ) < len ) {
if ( * p == SEP ) {
if ( pSubtag == NULL ) {
return FALSE ;
}
if ( ! _isPrivateuseValueSubtag ( pSubtag , ( int32_t ) ( p - pSubtag ) ) ) {
return FALSE ;
}
pSubtag = NULL ;
}
else if ( pSubtag == NULL ) {
pSubtag = p ;
}
p ++ ;
}
if ( pSubtag == NULL ) {
return FALSE ;
}
return _isPrivateuseValueSubtag ( pSubtag , ( int32_t ) ( p - pSubtag ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int x8_get_dc_rlf ( IntraX8Context * const w , int const mode , int * const level , int * const final ) {
MpegEncContext * const s = w -> s ;
int i , e , c ;
assert ( mode < 3 ) ;
if ( ! w -> j_dc_vlc [ mode ] ) {
int table_index ;
table_index = get_bits ( & s -> gb , 3 ) ;
w -> j_dc_vlc [ mode ] = & j_dc_vlc [ w -> quant < 13 ] [ table_index ] ;
}
assert ( w -> j_dc_vlc ) ;
assert ( w -> j_dc_vlc [ mode ] -> table ) ;
i = get_vlc2 ( & s -> gb , w -> j_dc_vlc [ mode ] -> table , DC_VLC_BITS , DC_VLC_MTD ) ;
c = i > 16 ;
( * final ) = c ;
i -= 17 * c ;
if ( i <= 0 ) {
( * level ) = 0 ;
return - i ;
}
c = ( i + 1 ) >> 1 ;
c -= c > 1 ;
e = get_bits ( & s -> gb , c ) ;
i = dc_index_offset [ i ] + ( e >> 1 ) ;
e = - ( e & 1 ) ;
( * level ) = ( i ^ e ) - e ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int restore_check_operand ( os_ptr op , alloc_save_t * * pasave , gs_dual_memory_t * idmem ) {
vm_save_t * vmsave ;
ulong sid ;
alloc_save_t * asave ;
check_type ( * op , t_save ) ;
vmsave = r_ptr ( op , vm_save_t ) ;
if ( vmsave == 0 ) return_error ( gs_error_invalidrestore ) ;
sid = op -> value . saveid ;
asave = alloc_find_save ( idmem , sid ) ;
if ( asave == 0 ) return_error ( gs_error_invalidrestore ) ;
* pasave = asave ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void Type_ColorantOrderType_Free ( struct _cms_typehandler_struct * self , void * Ptr ) {
_cmsFree ( self -> ContextID , Ptr ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vp9_idct32x32_1024_add_sse2 ( const int16_t * input , uint8_t * dest , int stride ) {
const __m128i rounding = _mm_set1_epi32 ( DCT_CONST_ROUNDING ) ;
const __m128i final_rounding = _mm_set1_epi16 ( 1 << 5 ) ;
const __m128i zero = _mm_setzero_si128 ( ) ;
const __m128i stg1_0 = pair_set_epi16 ( cospi_31_64 , - cospi_1_64 ) ;
const __m128i stg1_1 = pair_set_epi16 ( cospi_1_64 , cospi_31_64 ) ;
const __m128i stg1_2 = pair_set_epi16 ( cospi_15_64 , - cospi_17_64 ) ;
const __m128i stg1_3 = pair_set_epi16 ( cospi_17_64 , cospi_15_64 ) ;
const __m128i stg1_4 = pair_set_epi16 ( cospi_23_64 , - cospi_9_64 ) ;
const __m128i stg1_5 = pair_set_epi16 ( cospi_9_64 , cospi_23_64 ) ;
const __m128i stg1_6 = pair_set_epi16 ( cospi_7_64 , - cospi_25_64 ) ;
const __m128i stg1_7 = pair_set_epi16 ( cospi_25_64 , cospi_7_64 ) ;
const __m128i stg1_8 = pair_set_epi16 ( cospi_27_64 , - cospi_5_64 ) ;
const __m128i stg1_9 = pair_set_epi16 ( cospi_5_64 , cospi_27_64 ) ;
const __m128i stg1_10 = pair_set_epi16 ( cospi_11_64 , - cospi_21_64 ) ;
const __m128i stg1_11 = pair_set_epi16 ( cospi_21_64 , cospi_11_64 ) ;
const __m128i stg1_12 = pair_set_epi16 ( cospi_19_64 , - cospi_13_64 ) ;
const __m128i stg1_13 = pair_set_epi16 ( cospi_13_64 , cospi_19_64 ) ;
const __m128i stg1_14 = pair_set_epi16 ( cospi_3_64 , - cospi_29_64 ) ;
const __m128i stg1_15 = pair_set_epi16 ( cospi_29_64 , cospi_3_64 ) ;
const __m128i stg2_0 = pair_set_epi16 ( cospi_30_64 , - cospi_2_64 ) ;
const __m128i stg2_1 = pair_set_epi16 ( cospi_2_64 , cospi_30_64 ) ;
const __m128i stg2_2 = pair_set_epi16 ( cospi_14_64 , - cospi_18_64 ) ;
const __m128i stg2_3 = pair_set_epi16 ( cospi_18_64 , cospi_14_64 ) ;
const __m128i stg2_4 = pair_set_epi16 ( cospi_22_64 , - cospi_10_64 ) ;
const __m128i stg2_5 = pair_set_epi16 ( cospi_10_64 , cospi_22_64 ) ;
const __m128i stg2_6 = pair_set_epi16 ( cospi_6_64 , - cospi_26_64 ) ;
const __m128i stg2_7 = pair_set_epi16 ( cospi_26_64 , cospi_6_64 ) ;
const __m128i stg3_0 = pair_set_epi16 ( cospi_28_64 , - cospi_4_64 ) ;
const __m128i stg3_1 = pair_set_epi16 ( cospi_4_64 , cospi_28_64 ) ;
const __m128i stg3_2 = pair_set_epi16 ( cospi_12_64 , - cospi_20_64 ) ;
const __m128i stg3_3 = pair_set_epi16 ( cospi_20_64 , cospi_12_64 ) ;
const __m128i stg3_4 = pair_set_epi16 ( - cospi_4_64 , cospi_28_64 ) ;
const __m128i stg3_5 = pair_set_epi16 ( cospi_28_64 , cospi_4_64 ) ;
const __m128i stg3_6 = pair_set_epi16 ( - cospi_28_64 , - cospi_4_64 ) ;
const __m128i stg3_8 = pair_set_epi16 ( - cospi_20_64 , cospi_12_64 ) ;
const __m128i stg3_9 = pair_set_epi16 ( cospi_12_64 , cospi_20_64 ) ;
const __m128i stg3_10 = pair_set_epi16 ( - cospi_12_64 , - cospi_20_64 ) ;
const __m128i stg4_0 = pair_set_epi16 ( cospi_16_64 , cospi_16_64 ) ;
const __m128i stg4_1 = pair_set_epi16 ( cospi_16_64 , - cospi_16_64 ) ;
const __m128i stg4_2 = pair_set_epi16 ( cospi_24_64 , - cospi_8_64 ) ;
const __m128i stg4_3 = pair_set_epi16 ( cospi_8_64 , cospi_24_64 ) ;
const __m128i stg4_4 = pair_set_epi16 ( - cospi_8_64 , cospi_24_64 ) ;
const __m128i stg4_5 = pair_set_epi16 ( cospi_24_64 , cospi_8_64 ) ;
const __m128i stg4_6 = pair_set_epi16 ( - cospi_24_64 , - cospi_8_64 ) ;
const __m128i stg6_0 = pair_set_epi16 ( - cospi_16_64 , cospi_16_64 ) ;
__m128i in [ 32 ] , col [ 128 ] , zero_idx [ 16 ] ;
__m128i stp1_0 , stp1_1 , stp1_2 , stp1_3 , stp1_4 , stp1_5 , stp1_6 , stp1_7 , stp1_8 , stp1_9 , stp1_10 , stp1_11 , stp1_12 , stp1_13 , stp1_14 , stp1_15 , stp1_16 , stp1_17 , stp1_18 , stp1_19 , stp1_20 , stp1_21 , stp1_22 , stp1_23 , stp1_24 , stp1_25 , stp1_26 , stp1_27 , stp1_28 , stp1_29 , stp1_30 , stp1_31 ;
__m128i stp2_0 , stp2_1 , stp2_2 , stp2_3 , stp2_4 , stp2_5 , stp2_6 , stp2_7 , stp2_8 , stp2_9 , stp2_10 , stp2_11 , stp2_12 , stp2_13 , stp2_14 , stp2_15 , stp2_16 , stp2_17 , stp2_18 , stp2_19 , stp2_20 , stp2_21 , stp2_22 , stp2_23 , stp2_24 , stp2_25 , stp2_26 , stp2_27 , stp2_28 , stp2_29 , stp2_30 , stp2_31 ;
__m128i tmp0 , tmp1 , tmp2 , tmp3 , tmp4 , tmp5 , tmp6 , tmp7 ;
int i , j , i32 ;
for ( i = 0 ;
i < 4 ;
i ++ ) {
i32 = ( i << 5 ) ;
LOAD_DQCOEFF ( in [ 0 ] , input ) ;
LOAD_DQCOEFF ( in [ 8 ] , input ) ;
LOAD_DQCOEFF ( in [ 16 ] , input ) ;
LOAD_DQCOEFF ( in [ 24 ] , input ) ;
LOAD_DQCOEFF ( in [ 1 ] , input ) ;
LOAD_DQCOEFF ( in [ 9 ] , input ) ;
LOAD_DQCOEFF ( in [ 17 ] , input ) ;
LOAD_DQCOEFF ( in [ 25 ] , input ) ;
LOAD_DQCOEFF ( in [ 2 ] , input ) ;
LOAD_DQCOEFF ( in [ 10 ] , input ) ;
LOAD_DQCOEFF ( in [ 18 ] , input ) ;
LOAD_DQCOEFF ( in [ 26 ] , input ) ;
LOAD_DQCOEFF ( in [ 3 ] , input ) ;
LOAD_DQCOEFF ( in [ 11 ] , input ) ;
LOAD_DQCOEFF ( in [ 19 ] , input ) ;
LOAD_DQCOEFF ( in [ 27 ] , input ) ;
LOAD_DQCOEFF ( in [ 4 ] , input ) ;
LOAD_DQCOEFF ( in [ 12 ] , input ) ;
LOAD_DQCOEFF ( in [ 20 ] , input ) ;
LOAD_DQCOEFF ( in [ 28 ] , input ) ;
LOAD_DQCOEFF ( in [ 5 ] , input ) ;
LOAD_DQCOEFF ( in [ 13 ] , input ) ;
LOAD_DQCOEFF ( in [ 21 ] , input ) ;
LOAD_DQCOEFF ( in [ 29 ] , input ) ;
LOAD_DQCOEFF ( in [ 6 ] , input ) ;
LOAD_DQCOEFF ( in [ 14 ] , input ) ;
LOAD_DQCOEFF ( in [ 22 ] , input ) ;
LOAD_DQCOEFF ( in [ 30 ] , input ) ;
LOAD_DQCOEFF ( in [ 7 ] , input ) ;
LOAD_DQCOEFF ( in [ 15 ] , input ) ;
LOAD_DQCOEFF ( in [ 23 ] , input ) ;
LOAD_DQCOEFF ( in [ 31 ] , input ) ;
zero_idx [ 0 ] = _mm_or_si128 ( in [ 0 ] , in [ 1 ] ) ;
zero_idx [ 1 ] = _mm_or_si128 ( in [ 2 ] , in [ 3 ] ) ;
zero_idx [ 2 ] = _mm_or_si128 ( in [ 4 ] , in [ 5 ] ) ;
zero_idx [ 3 ] = _mm_or_si128 ( in [ 6 ] , in [ 7 ] ) ;
zero_idx [ 4 ] = _mm_or_si128 ( in [ 8 ] , in [ 9 ] ) ;
zero_idx [ 5 ] = _mm_or_si128 ( in [ 10 ] , in [ 11 ] ) ;
zero_idx [ 6 ] = _mm_or_si128 ( in [ 12 ] , in [ 13 ] ) ;
zero_idx [ 7 ] = _mm_or_si128 ( in [ 14 ] , in [ 15 ] ) ;
zero_idx [ 8 ] = _mm_or_si128 ( in [ 16 ] , in [ 17 ] ) ;
zero_idx [ 9 ] = _mm_or_si128 ( in [ 18 ] , in [ 19 ] ) ;
zero_idx [ 10 ] = _mm_or_si128 ( in [ 20 ] , in [ 21 ] ) ;
zero_idx [ 11 ] = _mm_or_si128 ( in [ 22 ] , in [ 23 ] ) ;
zero_idx [ 12 ] = _mm_or_si128 ( in [ 24 ] , in [ 25 ] ) ;
zero_idx [ 13 ] = _mm_or_si128 ( in [ 26 ] , in [ 27 ] ) ;
zero_idx [ 14 ] = _mm_or_si128 ( in [ 28 ] , in [ 29 ] ) ;
zero_idx [ 15 ] = _mm_or_si128 ( in [ 30 ] , in [ 31 ] ) ;
zero_idx [ 0 ] = _mm_or_si128 ( zero_idx [ 0 ] , zero_idx [ 1 ] ) ;
zero_idx [ 1 ] = _mm_or_si128 ( zero_idx [ 2 ] , zero_idx [ 3 ] ) ;
zero_idx [ 2 ] = _mm_or_si128 ( zero_idx [ 4 ] , zero_idx [ 5 ] ) ;
zero_idx [ 3 ] = _mm_or_si128 ( zero_idx [ 6 ] , zero_idx [ 7 ] ) ;
zero_idx [ 4 ] = _mm_or_si128 ( zero_idx [ 8 ] , zero_idx [ 9 ] ) ;
zero_idx [ 5 ] = _mm_or_si128 ( zero_idx [ 10 ] , zero_idx [ 11 ] ) ;
zero_idx [ 6 ] = _mm_or_si128 ( zero_idx [ 12 ] , zero_idx [ 13 ] ) ;
zero_idx [ 7 ] = _mm_or_si128 ( zero_idx [ 14 ] , zero_idx [ 15 ] ) ;
zero_idx [ 8 ] = _mm_or_si128 ( zero_idx [ 0 ] , zero_idx [ 1 ] ) ;
zero_idx [ 9 ] = _mm_or_si128 ( zero_idx [ 2 ] , zero_idx [ 3 ] ) ;
zero_idx [ 10 ] = _mm_or_si128 ( zero_idx [ 4 ] , zero_idx [ 5 ] ) ;
zero_idx [ 11 ] = _mm_or_si128 ( zero_idx [ 6 ] , zero_idx [ 7 ] ) ;
zero_idx [ 12 ] = _mm_or_si128 ( zero_idx [ 8 ] , zero_idx [ 9 ] ) ;
zero_idx [ 13 ] = _mm_or_si128 ( zero_idx [ 10 ] , zero_idx [ 11 ] ) ;
zero_idx [ 14 ] = _mm_or_si128 ( zero_idx [ 12 ] , zero_idx [ 13 ] ) ;
if ( _mm_movemask_epi8 ( _mm_cmpeq_epi32 ( zero_idx [ 14 ] , zero ) ) == 0xFFFF ) {
col [ i32 + 0 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 1 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 2 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 3 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 4 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 5 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 6 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 7 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 8 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 9 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 10 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 11 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 12 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 13 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 14 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 15 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 16 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 17 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 18 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 19 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 20 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 21 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 22 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 23 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 24 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 25 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 26 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 27 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 28 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 29 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 30 ] = _mm_setzero_si128 ( ) ;
col [ i32 + 31 ] = _mm_setzero_si128 ( ) ;
continue ;
}
array_transpose_8x8 ( in , in ) ;
array_transpose_8x8 ( in + 8 , in + 8 ) ;
array_transpose_8x8 ( in + 16 , in + 16 ) ;
array_transpose_8x8 ( in + 24 , in + 24 ) ;
IDCT32 col [ i32 + 0 ] = _mm_add_epi16 ( stp1_0 , stp1_31 ) ;
col [ i32 + 1 ] = _mm_add_epi16 ( stp1_1 , stp1_30 ) ;
col [ i32 + 2 ] = _mm_add_epi16 ( stp1_2 , stp1_29 ) ;
col [ i32 + 3 ] = _mm_add_epi16 ( stp1_3 , stp1_28 ) ;
col [ i32 + 4 ] = _mm_add_epi16 ( stp1_4 , stp1_27 ) ;
col [ i32 + 5 ] = _mm_add_epi16 ( stp1_5 , stp1_26 ) ;
col [ i32 + 6 ] = _mm_add_epi16 ( stp1_6 , stp1_25 ) ;
col [ i32 + 7 ] = _mm_add_epi16 ( stp1_7 , stp1_24 ) ;
col [ i32 + 8 ] = _mm_add_epi16 ( stp1_8 , stp1_23 ) ;
col [ i32 + 9 ] = _mm_add_epi16 ( stp1_9 , stp1_22 ) ;
col [ i32 + 10 ] = _mm_add_epi16 ( stp1_10 , stp1_21 ) ;
col [ i32 + 11 ] = _mm_add_epi16 ( stp1_11 , stp1_20 ) ;
col [ i32 + 12 ] = _mm_add_epi16 ( stp1_12 , stp1_19 ) ;
col [ i32 + 13 ] = _mm_add_epi16 ( stp1_13 , stp1_18 ) ;
col [ i32 + 14 ] = _mm_add_epi16 ( stp1_14 , stp1_17 ) ;
col [ i32 + 15 ] = _mm_add_epi16 ( stp1_15 , stp1_16 ) ;
col [ i32 + 16 ] = _mm_sub_epi16 ( stp1_15 , stp1_16 ) ;
col [ i32 + 17 ] = _mm_sub_epi16 ( stp1_14 , stp1_17 ) ;
col [ i32 + 18 ] = _mm_sub_epi16 ( stp1_13 , stp1_18 ) ;
col [ i32 + 19 ] = _mm_sub_epi16 ( stp1_12 , stp1_19 ) ;
col [ i32 + 20 ] = _mm_sub_epi16 ( stp1_11 , stp1_20 ) ;
col [ i32 + 21 ] = _mm_sub_epi16 ( stp1_10 , stp1_21 ) ;
col [ i32 + 22 ] = _mm_sub_epi16 ( stp1_9 , stp1_22 ) ;
col [ i32 + 23 ] = _mm_sub_epi16 ( stp1_8 , stp1_23 ) ;
col [ i32 + 24 ] = _mm_sub_epi16 ( stp1_7 , stp1_24 ) ;
col [ i32 + 25 ] = _mm_sub_epi16 ( stp1_6 , stp1_25 ) ;
col [ i32 + 26 ] = _mm_sub_epi16 ( stp1_5 , stp1_26 ) ;
col [ i32 + 27 ] = _mm_sub_epi16 ( stp1_4 , stp1_27 ) ;
col [ i32 + 28 ] = _mm_sub_epi16 ( stp1_3 , stp1_28 ) ;
col [ i32 + 29 ] = _mm_sub_epi16 ( stp1_2 , stp1_29 ) ;
col [ i32 + 30 ] = _mm_sub_epi16 ( stp1_1 , stp1_30 ) ;
col [ i32 + 31 ] = _mm_sub_epi16 ( stp1_0 , stp1_31 ) ;
}
for ( i = 0 ;
i < 4 ;
i ++ ) {
j = i << 3 ;
array_transpose_8x8 ( col + j , in ) ;
array_transpose_8x8 ( col + j + 32 , in + 8 ) ;
array_transpose_8x8 ( col + j + 64 , in + 16 ) ;
array_transpose_8x8 ( col + j + 96 , in + 24 ) ;
IDCT32 in [ 0 ] = _mm_add_epi16 ( stp1_0 , stp1_31 ) ;
in [ 1 ] = _mm_add_epi16 ( stp1_1 , stp1_30 ) ;
in [ 2 ] = _mm_add_epi16 ( stp1_2 , stp1_29 ) ;
in [ 3 ] = _mm_add_epi16 ( stp1_3 , stp1_28 ) ;
in [ 4 ] = _mm_add_epi16 ( stp1_4 , stp1_27 ) ;
in [ 5 ] = _mm_add_epi16 ( stp1_5 , stp1_26 ) ;
in [ 6 ] = _mm_add_epi16 ( stp1_6 , stp1_25 ) ;
in [ 7 ] = _mm_add_epi16 ( stp1_7 , stp1_24 ) ;
in [ 8 ] = _mm_add_epi16 ( stp1_8 , stp1_23 ) ;
in [ 9 ] = _mm_add_epi16 ( stp1_9 , stp1_22 ) ;
in [ 10 ] = _mm_add_epi16 ( stp1_10 , stp1_21 ) ;
in [ 11 ] = _mm_add_epi16 ( stp1_11 , stp1_20 ) ;
in [ 12 ] = _mm_add_epi16 ( stp1_12 , stp1_19 ) ;
in [ 13 ] = _mm_add_epi16 ( stp1_13 , stp1_18 ) ;
in [ 14 ] = _mm_add_epi16 ( stp1_14 , stp1_17 ) ;
in [ 15 ] = _mm_add_epi16 ( stp1_15 , stp1_16 ) ;
in [ 16 ] = _mm_sub_epi16 ( stp1_15 , stp1_16 ) ;
in [ 17 ] = _mm_sub_epi16 ( stp1_14 , stp1_17 ) ;
in [ 18 ] = _mm_sub_epi16 ( stp1_13 , stp1_18 ) ;
in [ 19 ] = _mm_sub_epi16 ( stp1_12 , stp1_19 ) ;
in [ 20 ] = _mm_sub_epi16 ( stp1_11 , stp1_20 ) ;
in [ 21 ] = _mm_sub_epi16 ( stp1_10 , stp1_21 ) ;
in [ 22 ] = _mm_sub_epi16 ( stp1_9 , stp1_22 ) ;
in [ 23 ] = _mm_sub_epi16 ( stp1_8 , stp1_23 ) ;
in [ 24 ] = _mm_sub_epi16 ( stp1_7 , stp1_24 ) ;
in [ 25 ] = _mm_sub_epi16 ( stp1_6 , stp1_25 ) ;
in [ 26 ] = _mm_sub_epi16 ( stp1_5 , stp1_26 ) ;
in [ 27 ] = _mm_sub_epi16 ( stp1_4 , stp1_27 ) ;
in [ 28 ] = _mm_sub_epi16 ( stp1_3 , stp1_28 ) ;
in [ 29 ] = _mm_sub_epi16 ( stp1_2 , stp1_29 ) ;
in [ 30 ] = _mm_sub_epi16 ( stp1_1 , stp1_30 ) ;
in [ 31 ] = _mm_sub_epi16 ( stp1_0 , stp1_31 ) ;
in [ 0 ] = _mm_adds_epi16 ( in [ 0 ] , final_rounding ) ;
in [ 1 ] = _mm_adds_epi16 ( in [ 1 ] , final_rounding ) ;
in [ 2 ] = _mm_adds_epi16 ( in [ 2 ] , final_rounding ) ;
in [ 3 ] = _mm_adds_epi16 ( in [ 3 ] , final_rounding ) ;
in [ 4 ] = _mm_adds_epi16 ( in [ 4 ] , final_rounding ) ;
in [ 5 ] = _mm_adds_epi16 ( in [ 5 ] , final_rounding ) ;
in [ 6 ] = _mm_adds_epi16 ( in [ 6 ] , final_rounding ) ;
in [ 7 ] = _mm_adds_epi16 ( in [ 7 ] , final_rounding ) ;
in [ 8 ] = _mm_adds_epi16 ( in [ 8 ] , final_rounding ) ;
in [ 9 ] = _mm_adds_epi16 ( in [ 9 ] , final_rounding ) ;
in [ 10 ] = _mm_adds_epi16 ( in [ 10 ] , final_rounding ) ;
in [ 11 ] = _mm_adds_epi16 ( in [ 11 ] , final_rounding ) ;
in [ 12 ] = _mm_adds_epi16 ( in [ 12 ] , final_rounding ) ;
in [ 13 ] = _mm_adds_epi16 ( in [ 13 ] , final_rounding ) ;
in [ 14 ] = _mm_adds_epi16 ( in [ 14 ] , final_rounding ) ;
in [ 15 ] = _mm_adds_epi16 ( in [ 15 ] , final_rounding ) ;
in [ 16 ] = _mm_adds_epi16 ( in [ 16 ] , final_rounding ) ;
in [ 17 ] = _mm_adds_epi16 ( in [ 17 ] , final_rounding ) ;
in [ 18 ] = _mm_adds_epi16 ( in [ 18 ] , final_rounding ) ;
in [ 19 ] = _mm_adds_epi16 ( in [ 19 ] , final_rounding ) ;
in [ 20 ] = _mm_adds_epi16 ( in [ 20 ] , final_rounding ) ;
in [ 21 ] = _mm_adds_epi16 ( in [ 21 ] , final_rounding ) ;
in [ 22 ] = _mm_adds_epi16 ( in [ 22 ] , final_rounding ) ;
in [ 23 ] = _mm_adds_epi16 ( in [ 23 ] , final_rounding ) ;
in [ 24 ] = _mm_adds_epi16 ( in [ 24 ] , final_rounding ) ;
in [ 25 ] = _mm_adds_epi16 ( in [ 25 ] , final_rounding ) ;
in [ 26 ] = _mm_adds_epi16 ( in [ 26 ] , final_rounding ) ;
in [ 27 ] = _mm_adds_epi16 ( in [ 27 ] , final_rounding ) ;
in [ 28 ] = _mm_adds_epi16 ( in [ 28 ] , final_rounding ) ;
in [ 29 ] = _mm_adds_epi16 ( in [ 29 ] , final_rounding ) ;
in [ 30 ] = _mm_adds_epi16 ( in [ 30 ] , final_rounding ) ;
in [ 31 ] = _mm_adds_epi16 ( in [ 31 ] , final_rounding ) ;
in [ 0 ] = _mm_srai_epi16 ( in [ 0 ] , 6 ) ;
in [ 1 ] = _mm_srai_epi16 ( in [ 1 ] , 6 ) ;
in [ 2 ] = _mm_srai_epi16 ( in [ 2 ] , 6 ) ;
in [ 3 ] = _mm_srai_epi16 ( in [ 3 ] , 6 ) ;
in [ 4 ] = _mm_srai_epi16 ( in [ 4 ] , 6 ) ;
in [ 5 ] = _mm_srai_epi16 ( in [ 5 ] , 6 ) ;
in [ 6 ] = _mm_srai_epi16 ( in [ 6 ] , 6 ) ;
in [ 7 ] = _mm_srai_epi16 ( in [ 7 ] , 6 ) ;
in [ 8 ] = _mm_srai_epi16 ( in [ 8 ] , 6 ) ;
in [ 9 ] = _mm_srai_epi16 ( in [ 9 ] , 6 ) ;
in [ 10 ] = _mm_srai_epi16 ( in [ 10 ] , 6 ) ;
in [ 11 ] = _mm_srai_epi16 ( in [ 11 ] , 6 ) ;
in [ 12 ] = _mm_srai_epi16 ( in [ 12 ] , 6 ) ;
in [ 13 ] = _mm_srai_epi16 ( in [ 13 ] , 6 ) ;
in [ 14 ] = _mm_srai_epi16 ( in [ 14 ] , 6 ) ;
in [ 15 ] = _mm_srai_epi16 ( in [ 15 ] , 6 ) ;
in [ 16 ] = _mm_srai_epi16 ( in [ 16 ] , 6 ) ;
in [ 17 ] = _mm_srai_epi16 ( in [ 17 ] , 6 ) ;
in [ 18 ] = _mm_srai_epi16 ( in [ 18 ] , 6 ) ;
in [ 19 ] = _mm_srai_epi16 ( in [ 19 ] , 6 ) ;
in [ 20 ] = _mm_srai_epi16 ( in [ 20 ] , 6 ) ;
in [ 21 ] = _mm_srai_epi16 ( in [ 21 ] , 6 ) ;
in [ 22 ] = _mm_srai_epi16 ( in [ 22 ] , 6 ) ;
in [ 23 ] = _mm_srai_epi16 ( in [ 23 ] , 6 ) ;
in [ 24 ] = _mm_srai_epi16 ( in [ 24 ] , 6 ) ;
in [ 25 ] = _mm_srai_epi16 ( in [ 25 ] , 6 ) ;
in [ 26 ] = _mm_srai_epi16 ( in [ 26 ] , 6 ) ;
in [ 27 ] = _mm_srai_epi16 ( in [ 27 ] , 6 ) ;
in [ 28 ] = _mm_srai_epi16 ( in [ 28 ] , 6 ) ;
in [ 29 ] = _mm_srai_epi16 ( in [ 29 ] , 6 ) ;
in [ 30 ] = _mm_srai_epi16 ( in [ 30 ] , 6 ) ;
in [ 31 ] = _mm_srai_epi16 ( in [ 31 ] , 6 ) ;
RECON_AND_STORE ( dest , in [ 0 ] ) ;
RECON_AND_STORE ( dest , in [ 1 ] ) ;
RECON_AND_STORE ( dest , in [ 2 ] ) ;
RECON_AND_STORE ( dest , in [ 3 ] ) ;
RECON_AND_STORE ( dest , in [ 4 ] ) ;
RECON_AND_STORE ( dest , in [ 5 ] ) ;
RECON_AND_STORE ( dest , in [ 6 ] ) ;
RECON_AND_STORE ( dest , in [ 7 ] ) ;
RECON_AND_STORE ( dest , in [ 8 ] ) ;
RECON_AND_STORE ( dest , in [ 9 ] ) ;
RECON_AND_STORE ( dest , in [ 10 ] ) ;
RECON_AND_STORE ( dest , in [ 11 ] ) ;
RECON_AND_STORE ( dest , in [ 12 ] ) ;
RECON_AND_STORE ( dest , in [ 13 ] ) ;
RECON_AND_STORE ( dest , in [ 14 ] ) ;
RECON_AND_STORE ( dest , in [ 15 ] ) ;
RECON_AND_STORE ( dest , in [ 16 ] ) ;
RECON_AND_STORE ( dest , in [ 17 ] ) ;
RECON_AND_STORE ( dest , in [ 18 ] ) ;
RECON_AND_STORE ( dest , in [ 19 ] ) ;
RECON_AND_STORE ( dest , in [ 20 ] ) ;
RECON_AND_STORE ( dest , in [ 21 ] ) ;
RECON_AND_STORE ( dest , in [ 22 ] ) ;
RECON_AND_STORE ( dest , in [ 23 ] ) ;
RECON_AND_STORE ( dest , in [ 24 ] ) ;
RECON_AND_STORE ( dest , in [ 25 ] ) ;
RECON_AND_STORE ( dest , in [ 26 ] ) ;
RECON_AND_STORE ( dest , in [ 27 ] ) ;
RECON_AND_STORE ( dest , in [ 28 ] ) ;
RECON_AND_STORE ( dest , in [ 29 ] ) ;
RECON_AND_STORE ( dest , in [ 30 ] ) ;
RECON_AND_STORE ( dest , in [ 31 ] ) ;
dest += 8 - ( stride * 32 ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static unsigned long get_pfxmatch ( char * * s , struct masks * m ) {
while ( m -> name ) {
if ( strncmp ( * s , m -> name , strlen ( m -> name ) ) == 0 ) {
* s += strlen ( m -> name ) ;
return m -> mask ;
}
else {
m ++ ;
}
}
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void test_bug10794 ( ) {
MYSQL_STMT * stmt , * stmt1 ;
MYSQL_BIND my_bind [ 2 ] ;
char a [ 21 ] ;
int id_val ;
ulong a_len ;
int rc ;
const char * stmt_text ;
int i = 0 ;
ulong type ;
myheader ( "test_bug10794" ) ;
mysql_query ( mysql , "drop table if exists t1" ) ;
mysql_query ( mysql , "create table t1 (id integer not null primary key," "name varchar(20) not null)" ) ;
stmt = mysql_stmt_init ( mysql ) ;
stmt_text = "insert into t1 (id, name) values (?, ?)" ;
rc = mysql_stmt_prepare ( stmt , stmt_text , strlen ( stmt_text ) ) ;
check_execute ( stmt , rc ) ;
memset ( my_bind , 0 , sizeof ( my_bind ) ) ;
my_bind [ 0 ] . buffer_type = MYSQL_TYPE_LONG ;
my_bind [ 0 ] . buffer = ( void * ) & id_val ;
my_bind [ 1 ] . buffer_type = MYSQL_TYPE_STRING ;
my_bind [ 1 ] . buffer = ( void * ) a ;
my_bind [ 1 ] . length = & a_len ;
rc = mysql_stmt_bind_param ( stmt , my_bind ) ;
check_execute ( stmt , rc ) ;
for ( i = 0 ;
i < 42 ;
i ++ ) {
id_val = ( i + 1 ) * 10 ;
sprintf ( a , "a%d" , i ) ;
a_len = strlen ( a ) ;
rc = mysql_stmt_execute ( stmt ) ;
check_execute ( stmt , rc ) ;
}
stmt_text = "select name from t1" ;
rc = mysql_stmt_prepare ( stmt , stmt_text , strlen ( stmt_text ) ) ;
type = ( ulong ) CURSOR_TYPE_READ_ONLY ;
mysql_stmt_attr_set ( stmt , STMT_ATTR_CURSOR_TYPE , ( const void * ) & type ) ;
stmt1 = mysql_stmt_init ( mysql ) ;
mysql_stmt_attr_set ( stmt1 , STMT_ATTR_CURSOR_TYPE , ( const void * ) & type ) ;
memset ( my_bind , 0 , sizeof ( my_bind ) ) ;
my_bind [ 0 ] . buffer_type = MYSQL_TYPE_STRING ;
my_bind [ 0 ] . buffer = ( void * ) a ;
my_bind [ 0 ] . buffer_length = sizeof ( a ) ;
my_bind [ 0 ] . length = & a_len ;
rc = mysql_stmt_bind_result ( stmt , my_bind ) ;
check_execute ( stmt , rc ) ;
rc = mysql_stmt_execute ( stmt ) ;
check_execute ( stmt , rc ) ;
rc = mysql_stmt_fetch ( stmt ) ;
check_execute ( stmt , rc ) ;
if ( ! opt_silent ) printf ( "Fetched row from stmt: %s\n" , a ) ;
mysql_stmt_free_result ( stmt ) ;
mysql_stmt_reset ( stmt ) ;
stmt_text = "select name from t1 where id=10" ;
rc = mysql_stmt_prepare ( stmt1 , stmt_text , strlen ( stmt_text ) ) ;
check_execute ( stmt1 , rc ) ;
rc = mysql_stmt_bind_result ( stmt1 , my_bind ) ;
check_execute ( stmt1 , rc ) ;
rc = mysql_stmt_execute ( stmt1 ) ;
while ( 1 ) {
rc = mysql_stmt_fetch ( stmt1 ) ;
if ( rc == MYSQL_NO_DATA ) {
if ( ! opt_silent ) printf ( "End of data in stmt1\n" ) ;
break ;
}
check_execute ( stmt1 , rc ) ;
if ( ! opt_silent ) printf ( "Fetched row from stmt1: %s\n" , a ) ;
}
mysql_stmt_close ( stmt ) ;
mysql_stmt_close ( stmt1 ) ;
rc = mysql_query ( mysql , "drop table t1" ) ;
myquery ( rc ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void write_partition ( const VP9_COMMON * const cm , const MACROBLOCKD * const xd , int hbs , int mi_row , int mi_col , PARTITION_TYPE p , BLOCK_SIZE bsize , vp9_writer * w ) {
const int ctx = partition_plane_context ( xd , mi_row , mi_col , bsize ) ;
const vp9_prob * const probs = get_partition_probs ( cm , ctx ) ;
const int has_rows = ( mi_row + hbs ) < cm -> mi_rows ;
const int has_cols = ( mi_col + hbs ) < cm -> mi_cols ;
if ( has_rows && has_cols ) {
vp9_write_token ( w , vp9_partition_tree , probs , & partition_encodings [ p ] ) ;
}
else if ( ! has_rows && has_cols ) {
assert ( p == PARTITION_SPLIT || p == PARTITION_HORZ ) ;
vp9_write ( w , p == PARTITION_SPLIT , probs [ 1 ] ) ;
}
else if ( has_rows && ! has_cols ) {
assert ( p == PARTITION_SPLIT || p == PARTITION_VERT ) ;
vp9_write ( w , p == PARTITION_SPLIT , probs [ 2 ] ) ;
}
else {
assert ( p == PARTITION_SPLIT ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int mem_close ( jas_stream_obj_t * obj ) {
jas_stream_memobj_t * m = ( jas_stream_memobj_t * ) obj ;
if ( m -> myalloc_ && m -> buf_ ) {
jas_free ( m -> buf_ ) ;
m -> buf_ = 0 ;
}
jas_free ( obj ) ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static const char * qio_channel_websock_find_header ( QIOChannelWebsockHTTPHeader * hdrs , size_t nhdrs , const char * name ) {
size_t i ;
for ( i = 0 ;
i < nhdrs ;
i ++ ) {
if ( g_str_equal ( hdrs [ i ] . name , name ) ) {
return hdrs [ i ] . value ;
}
}
return NULL ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void config_setvar ( config_tree * ptree ) {
setvar_node * my_node ;
size_t varlen , vallen , octets ;
char * str ;
str = NULL ;
my_node = HEAD_PFIFO ( ptree -> setvar ) ;
for ( ;
my_node != NULL ;
my_node = my_node -> link ) {
varlen = strlen ( my_node -> var ) ;
vallen = strlen ( my_node -> val ) ;
octets = varlen + vallen + 1 + 1 ;
str = erealloc ( str , octets ) ;
snprintf ( str , octets , "%s=%s" , my_node -> var , my_node -> val ) ;
set_sys_var ( str , octets , ( my_node -> isdefault ) ? DEF : 0 ) ;
}
if ( str != NULL ) free ( str ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
inline static void _slurm_rpc_kill_job ( slurm_msg_t * msg ) {
static int active_rpc_cnt = 0 ;
DEF_TIMERS ;
job_step_kill_msg_t * kill ;
slurmctld_lock_t fed_job_read_lock = {
NO_LOCK , READ_LOCK , NO_LOCK , NO_LOCK , READ_LOCK }
;
slurmctld_lock_t lock = {
READ_LOCK , WRITE_LOCK , WRITE_LOCK , NO_LOCK , READ_LOCK }
;
uid_t uid ;
int cc ;
kill = ( job_step_kill_msg_t * ) msg -> data ;
uid = g_slurm_auth_get_uid ( msg -> auth_cred , slurmctld_config . auth_info ) ;
lock_slurmctld ( fed_job_read_lock ) ;
if ( fed_mgr_fed_rec ) {
uint32_t job_id , origin_id ;
struct job_record * job_ptr ;
slurmdb_cluster_rec_t * origin ;
job_id = strtol ( kill -> sjob_id , NULL , 10 ) ;
origin_id = fed_mgr_get_cluster_id ( job_id ) ;
origin = fed_mgr_get_cluster_by_id ( origin_id ) ;
if ( origin && origin -> fed . send && ( ( ( slurm_persist_conn_t * ) origin -> fed . send ) -> fd != - 1 ) && ( origin != fed_mgr_cluster_rec ) && ( ! ( job_ptr = find_job_record ( job_id ) ) || ( job_ptr && job_ptr -> fed_details && ( job_ptr -> fed_details -> cluster_lock != fed_mgr_cluster_rec -> fed . id ) ) ) ) {
slurmdb_cluster_rec_t * dst = fed_mgr_get_cluster_by_id ( origin_id ) ;
if ( ! dst ) {
error ( "couldn't find cluster by cluster id %d" , origin_id ) ;
slurm_send_rc_msg ( msg , SLURM_ERROR ) ;
}
else {
slurm_send_reroute_msg ( msg , dst ) ;
info ( "%s: REQUEST_KILL_JOB job %s uid %d routed to %s" , __func__ , kill -> sjob_id , uid , dst -> name ) ;
}
unlock_slurmctld ( fed_job_read_lock ) ;
return ;
}
}
unlock_slurmctld ( fed_job_read_lock ) ;
START_TIMER ;
info ( "%s: REQUEST_KILL_JOB job %s uid %d" , __func__ , kill -> sjob_id , uid ) ;
_throttle_start ( & active_rpc_cnt ) ;
lock_slurmctld ( lock ) ;
if ( kill -> sibling ) {
uint32_t job_id = strtol ( kill -> sjob_id , NULL , 10 ) ;
cc = fed_mgr_remove_active_sibling ( job_id , kill -> sibling ) ;
}
else {
cc = job_str_signal ( kill -> sjob_id , kill -> signal , kill -> flags , uid , 0 ) ;
}
unlock_slurmctld ( lock ) ;
_throttle_fini ( & active_rpc_cnt ) ;
if ( cc == ESLURM_ALREADY_DONE ) {
debug2 ( "%s: job_str_signal() job %s sig %d returned %s" , __func__ , kill -> sjob_id , kill -> signal , slurm_strerror ( cc ) ) ;
}
else if ( cc != SLURM_SUCCESS ) {
info ( "%s: job_str_signal() job %s sig %d returned %s" , __func__ , kill -> sjob_id , kill -> signal , slurm_strerror ( cc ) ) ;
}
else {
slurmctld_diag_stats . jobs_canceled ++ ;
}
slurm_send_rc_msg ( msg , cc ) ;
END_TIMER2 ( "_slurm_rpc_kill_job" ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void pdf_run_MP ( fz_context * ctx , pdf_processor * proc , const char * tag ) {
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_T_numberOfRetransmissions ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_T_numberOfRetransmissions , T_numberOfRetransmissions_choice , NULL ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
bool equality_ops_are_compatible ( Oid opno1 , Oid opno2 ) {
bool result ;
CatCList * catlist ;
int i ;
if ( opno1 == opno2 ) return true ;
catlist = SearchSysCacheList1 ( AMOPOPID , ObjectIdGetDatum ( opno1 ) ) ;
result = false ;
for ( i = 0 ;
i < catlist -> n_members ;
i ++ ) {
HeapTuple op_tuple = & catlist -> members [ i ] -> tuple ;
Form_pg_amop op_form = ( Form_pg_amop ) GETSTRUCT ( op_tuple ) ;
if ( op_form -> amopmethod == BTREE_AM_OID || op_form -> amopmethod == HASH_AM_OID ) {
if ( op_in_opfamily ( opno2 , op_form -> amopfamily ) ) {
result = true ;
break ;
}
}
}
ReleaseSysCacheList ( catlist ) ;
return result ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void PNGAPI png_set_gAMA_fixed ( png_structp png_ptr , png_infop info_ptr , png_fixed_point int_gamma ) {
png_fixed_point png_gamma ;
png_debug1 ( 1 , "in %s storage function" , "gAMA" ) ;
if ( png_ptr == NULL || info_ptr == NULL ) return ;
if ( int_gamma > ( png_fixed_point ) PNG_UINT_31_MAX ) {
png_warning ( png_ptr , "Limiting gamma to 21474.83" ) ;
png_gamma = PNG_UINT_31_MAX ;
}
else {
if ( int_gamma < 0 ) {
png_warning ( png_ptr , "Setting negative gamma to zero" ) ;
png_gamma = 0 ;
}
else png_gamma = int_gamma ;
}
# ifdef PNG_FLOATING_POINT_SUPPORTED info_ptr -> gamma = ( float ) ( png_gamma / 100000. ) ;
# endif # ifdef PNG_FIXED_POINT_SUPPORTED info_ptr -> int_gamma = png_gamma ;
# endif info_ptr -> valid |= PNG_INFO_gAMA ;
if ( png_gamma == 0 ) png_warning ( png_ptr , "Setting gamma=0" ) ;
}
| 0False
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.