instruction
stringclasses
1 value
input
stringlengths
31
235k
output
class label
2 classes
Categorize the following code snippet as vulnerable or not. True or False
static uint64_t calc_plane_error ( unsigned char * orig , int orig_stride , unsigned char * recon , int recon_stride , unsigned int cols , unsigned int rows ) { unsigned int row , col ; uint64_t total_sse = 0 ; int diff ; for ( row = 0 ; row + 16 <= rows ; row += 16 ) { for ( col = 0 ; col + 16 <= cols ; col += 16 ) { unsigned int sse ; vp8_mse16x16 ( orig + col , orig_stride , recon + col , recon_stride , & sse ) ; total_sse += sse ; } if ( col < cols ) { unsigned int border_row , border_col ; unsigned char * border_orig = orig ; unsigned char * border_recon = recon ; for ( border_row = 0 ; border_row < 16 ; border_row ++ ) { for ( border_col = col ; border_col < cols ; border_col ++ ) { diff = border_orig [ border_col ] - border_recon [ border_col ] ; total_sse += diff * diff ; } border_orig += orig_stride ; border_recon += recon_stride ; } } orig += orig_stride * 16 ; recon += recon_stride * 16 ; } for ( ; row < rows ; row ++ ) { for ( col = 0 ; col < cols ; col ++ ) { diff = orig [ col ] - recon [ col ] ; total_sse += diff * diff ; } orig += orig_stride ; recon += recon_stride ; } vp8_clear_system_state ( ) ; return total_sse ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int web_server_set_root_dir ( const char * root_dir ) { size_t index ; int ret ; ret = membuffer_assign_str ( & gDocumentRootDir , root_dir ) ; if ( ret != 0 ) return ret ; if ( gDocumentRootDir . length > 0 ) { index = gDocumentRootDir . length - 1 ; if ( gDocumentRootDir . buf [ index ] == '/' ) membuffer_delete ( & gDocumentRootDir , index , 1 ) ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int decode_channel ( TAKDecContext * s , int chan ) { AVCodecContext * avctx = s -> avctx ; GetBitContext * gb = & s -> gb ; int32_t * decoded = s -> decoded [ chan ] ; int left = s -> nb_samples - 1 ; int i , prev , ret , nb_subframes ; int subframe_len [ MAX_SUBFRAMES ] ; s -> sample_shift [ chan ] = get_bits_esc4 ( gb ) ; if ( s -> sample_shift [ chan ] >= avctx -> bits_per_coded_sample ) return AVERROR_INVALIDDATA ; * decoded ++ = get_sbits ( gb , avctx -> bits_per_coded_sample - s -> sample_shift [ chan ] ) ; s -> lpc_mode [ chan ] = get_bits ( gb , 2 ) ; nb_subframes = get_bits ( gb , 3 ) + 1 ; i = 0 ; if ( nb_subframes > 1 ) { if ( get_bits_left ( gb ) < ( nb_subframes - 1 ) * 6 ) return AVERROR_INVALIDDATA ; prev = 0 ; for ( ; i < nb_subframes - 1 ; i ++ ) { int subframe_end = get_bits ( gb , 6 ) * s -> subframe_scale ; if ( subframe_end <= prev ) return AVERROR_INVALIDDATA ; subframe_len [ i ] = subframe_end - prev ; left -= subframe_len [ i ] ; prev = subframe_end ; } if ( left <= 0 ) return AVERROR_INVALIDDATA ; } subframe_len [ i ] = left ; prev = 0 ; for ( i = 0 ; i < nb_subframes ; i ++ ) { if ( ( ret = decode_subframe ( s , decoded , subframe_len [ i ] , prev ) ) < 0 ) return ret ; decoded += subframe_len [ i ] ; prev = subframe_len [ i ] ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( SplFileInfo , setInfoClass ) { spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; zend_class_entry * ce = spl_ce_SplFileInfo ; zend_error_handling error_handling ; zend_replace_error_handling ( EH_THROW , spl_ce_UnexpectedValueException , & error_handling TSRMLS_CC ) ; if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "|C" , & ce ) == SUCCESS ) { intern -> info_class = ce ; } zend_restore_error_handling ( & error_handling TSRMLS_CC ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
char * get_constraint_name ( Oid conoid ) { HeapTuple tp ; tp = SearchSysCache1 ( CONSTROID , ObjectIdGetDatum ( conoid ) ) ; if ( HeapTupleIsValid ( tp ) ) { Form_pg_constraint contup = ( Form_pg_constraint ) GETSTRUCT ( tp ) ; char * result ; result = pstrdup ( NameStr ( contup -> conname ) ) ; ReleaseSysCache ( tp ) ; return result ; } else return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void map_linear_vram_bank ( CirrusVGAState * s , unsigned bank ) { MemoryRegion * mr = & s -> cirrus_bank [ bank ] ; bool enabled = ! ( s -> cirrus_srcptr != s -> cirrus_srcptr_end ) && ! ( ( s -> vga . sr [ 0x07 ] & 0x01 ) == 0 ) && ! ( ( s -> vga . gr [ 0x0B ] & 0x14 ) == 0x14 ) && ! ( s -> vga . gr [ 0x0B ] & 0x02 ) ; memory_region_set_enabled ( mr , enabled ) ; memory_region_set_alias_offset ( mr , s -> cirrus_bank_base [ bank ] ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void event_text ( const char * data , SERVER_REC * server , WI_ITEM_REC * item ) { char * line , * str , * target ; g_return_if_fail ( data != NULL ) ; if ( item == NULL ) return ; if ( * data == '\0' ) { signal_stop ( ) ; return ; } line = settings_get_bool ( "expand_escapes" ) ? expand_escapes ( data , server , item ) : g_strdup ( data ) ; if ( completion_auto && IS_CHANNEL ( item ) ) { str = auto_complete ( CHANNEL ( item ) , line ) ; if ( str != NULL ) { g_free ( line ) ; line = str ; } } target = escape_string ( window_item_get_target ( item ) ) ; str = g_strdup_printf ( IS_CHANNEL ( item ) ? "-channel \"%s\" %s" : IS_QUERY ( item ) ? "-nick \"%s\" %s" : "%s %s" , target , line ) ; g_free ( target ) ; signal_emit ( "command msg" , 3 , str , server , item ) ; g_free ( str ) ; g_free ( line ) ; signal_stop ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( FullscreenControllerInteractiveTest , DISABLED_TestTabExitsFullscreenOnGoBack ) { ASSERT_TRUE ( test_server ( ) -> Start ( ) ) ; ui_test_utils : : NavigateToURL ( browser ( ) , GURL ( "about:blank" ) ) ; ui_test_utils : : NavigateToURL ( browser ( ) , GURL ( "chrome:/ewtab" ) ) ; ASSERT_NO_FATAL_FAILURE ( ToggleTabFullscreen ( true ) ) ; GoBack ( ) ; ASSERT_FALSE ( browser ( ) -> window ( ) -> IsFullscreen ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_append_sub8x8_mvs_for_idx ( VP9_COMMON * cm , MACROBLOCKD * xd , const TileInfo * const tile , int block , int ref , int mi_row , int mi_col , int_mv * nearest , int_mv * near ) { int_mv mv_list [ MAX_MV_REF_CANDIDATES ] ; MODE_INFO * const mi = xd -> mi [ 0 ] ; b_mode_info * bmi = mi -> bmi ; int n ; assert ( MAX_MV_REF_CANDIDATES == 2 ) ; find_mv_refs_idx ( cm , xd , tile , mi , mi -> mbmi . ref_frame [ ref ] , mv_list , block , mi_row , mi_col ) ; near -> as_int = 0 ; switch ( block ) { case 0 : nearest -> as_int = mv_list [ 0 ] . as_int ; near -> as_int = mv_list [ 1 ] . as_int ; break ; case 1 : case 2 : nearest -> as_int = bmi [ 0 ] . as_mv [ ref ] . as_int ; for ( n = 0 ; n < MAX_MV_REF_CANDIDATES ; ++ n ) if ( nearest -> as_int != mv_list [ n ] . as_int ) { near -> as_int = mv_list [ n ] . as_int ; break ; } break ; case 3 : { int_mv candidates [ 2 + MAX_MV_REF_CANDIDATES ] ; candidates [ 0 ] = bmi [ 1 ] . as_mv [ ref ] ; candidates [ 1 ] = bmi [ 0 ] . as_mv [ ref ] ; candidates [ 2 ] = mv_list [ 0 ] ; candidates [ 3 ] = mv_list [ 1 ] ; nearest -> as_int = bmi [ 2 ] . as_mv [ ref ] . as_int ; for ( n = 0 ; n < 2 + MAX_MV_REF_CANDIDATES ; ++ n ) if ( nearest -> as_int != candidates [ n ] . as_int ) { near -> as_int = candidates [ n ] . as_int ; break ; } break ; } default : assert ( "Invalid block index." ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void * gx_ttfMemory__alloc_struct ( ttfMemory * self , const ttfMemoryDescriptor * d , const char * cname ) { gs_memory_t * mem = ( ( gx_ttfMemory * ) self ) -> memory ; return mem -> procs . alloc_struct ( mem , ( const gs_memory_struct_type_t * ) d , cname ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static VP9_DENOISER_DECISION perform_motion_compensation ( VP9_DENOISER * denoiser , MACROBLOCK * mb , BLOCK_SIZE bs , int increase_denoising , int mi_row , int mi_col , PICK_MODE_CONTEXT * ctx , int * motion_magnitude ) { int mv_col , mv_row ; int sse_diff = ctx -> zeromv_sse - ctx -> newmv_sse ; MV_REFERENCE_FRAME frame ; MACROBLOCKD * filter_mbd = & mb -> e_mbd ; MB_MODE_INFO * mbmi = & filter_mbd -> mi [ 0 ] . src_mi -> mbmi ; MB_MODE_INFO saved_mbmi ; int i , j ; struct buf_2d saved_dst [ MAX_MB_PLANE ] ; struct buf_2d saved_pre [ MAX_MB_PLANE ] [ 2 ] ; saved_mbmi = * mbmi ; for ( i = 0 ; i < MAX_MB_PLANE ; ++ i ) { for ( j = 0 ; j < 2 ; ++ j ) { saved_pre [ i ] [ j ] = filter_mbd -> plane [ i ] . pre [ j ] ; } saved_dst [ i ] = filter_mbd -> plane [ i ] . dst ; } mv_col = ctx -> best_sse_mv . as_mv . col ; mv_row = ctx -> best_sse_mv . as_mv . row ; * motion_magnitude = mv_row * mv_row + mv_col * mv_col ; frame = ctx -> best_reference_frame ; if ( frame != INTRA_FRAME && sse_diff > sse_diff_thresh ( bs , increase_denoising , mv_row , mv_col ) ) { mbmi -> ref_frame [ 0 ] = ctx -> best_reference_frame ; mbmi -> mode = ctx -> best_sse_inter_mode ; mbmi -> mv [ 0 ] = ctx -> best_sse_mv ; } else { frame = ctx -> best_zeromv_reference_frame ; mbmi -> ref_frame [ 0 ] = ctx -> best_zeromv_reference_frame ; mbmi -> mode = ZEROMV ; mbmi -> mv [ 0 ] . as_int = 0 ; ctx -> best_sse_inter_mode = ZEROMV ; ctx -> best_sse_mv . as_int = 0 ; ctx -> newmv_sse = ctx -> zeromv_sse ; } for ( j = 0 ; j < 2 ; ++ j ) { filter_mbd -> plane [ 0 ] . pre [ j ] . buf = block_start ( denoiser -> running_avg_y [ frame ] . y_buffer , denoiser -> running_avg_y [ frame ] . y_stride , mi_row , mi_col ) ; filter_mbd -> plane [ 0 ] . pre [ j ] . stride = denoiser -> running_avg_y [ frame ] . y_stride ; filter_mbd -> plane [ 1 ] . pre [ j ] . buf = block_start ( denoiser -> running_avg_y [ frame ] . u_buffer , denoiser -> running_avg_y [ frame ] . uv_stride , mi_row , mi_col ) ; filter_mbd -> plane [ 1 ] . pre [ j ] . stride = denoiser -> running_avg_y [ frame ] . uv_stride ; filter_mbd -> plane [ 2 ] . pre [ j ] . buf = block_start ( denoiser -> running_avg_y [ frame ] . v_buffer , denoiser -> running_avg_y [ frame ] . uv_stride , mi_row , mi_col ) ; filter_mbd -> plane [ 2 ] . pre [ j ] . stride = denoiser -> running_avg_y [ frame ] . uv_stride ; } filter_mbd -> plane [ 0 ] . dst . buf = block_start ( denoiser -> mc_running_avg_y . y_buffer , denoiser -> mc_running_avg_y . y_stride , mi_row , mi_col ) ; filter_mbd -> plane [ 0 ] . dst . stride = denoiser -> mc_running_avg_y . y_stride ; filter_mbd -> plane [ 1 ] . dst . buf = block_start ( denoiser -> mc_running_avg_y . u_buffer , denoiser -> mc_running_avg_y . uv_stride , mi_row , mi_col ) ; filter_mbd -> plane [ 1 ] . dst . stride = denoiser -> mc_running_avg_y . uv_stride ; filter_mbd -> plane [ 2 ] . dst . buf = block_start ( denoiser -> mc_running_avg_y . v_buffer , denoiser -> mc_running_avg_y . uv_stride , mi_row , mi_col ) ; filter_mbd -> plane [ 2 ] . dst . stride = denoiser -> mc_running_avg_y . uv_stride ; vp9_build_inter_predictors_sby ( filter_mbd , mv_row , mv_col , bs ) ; * mbmi = saved_mbmi ; for ( i = 0 ; i < MAX_MB_PLANE ; ++ i ) { for ( j = 0 ; j < 2 ; ++ j ) { filter_mbd -> plane [ i ] . pre [ j ] = saved_pre [ i ] [ j ] ; } filter_mbd -> plane [ i ] . dst = saved_dst [ i ] ; } mv_row = ctx -> best_sse_mv . as_mv . row ; mv_col = ctx -> best_sse_mv . as_mv . col ; if ( ctx -> newmv_sse > sse_thresh ( bs , increase_denoising ) ) { return COPY_BLOCK ; } if ( mv_row * mv_row + mv_col * mv_col > * noise_motion_thresh ( bs , increase_denoising ) ) { return COPY_BLOCK ; } return FILTER_BLOCK ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_sad ## m ## x ## n ## x ## k ## _c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sads ) { int i ; for ( i = 0 ; i < k ; ++ i ) sads [ i ] = vp9_sad ## m ## x ## n ## _c ( src , src_stride , & ref [ i ] , ref_stride ) ; \ } # define sadMxNx4D ( m , n ) void vp9_sad ## m ## x ## n ## x4d_c ( const uint8_t * src , int src_stride , const uint8_t * const refs [ ] , int ref_stride , unsigned int * sads ) { int i ; for ( i = 0 ; i < 4 ; ++ i ) sads [ i ] = vp9_sad ## m ## x ## n ## _c ( src , src_stride , refs [ i ] , ref_stride ) ; \ } sadMxN ( 64 , 64 ) sadMxNxK ( 64 , 64 , 3 ) sadMxNxK ( 64 , 64 , 8 ) sadMxNx4D ( 64 , 64 ) sadMxN ( 64 , 32 ) sadMxNx4D ( 64 , 32 ) sadMxN ( 32 , 64 ) sadMxNx4D ( 32 , 64 ) sadMxN ( 32 , 32 ) sadMxNxK ( 32 , 32 , 3 ) sadMxNxK ( 32 , 32 , 8 )
0False
Categorize the following code snippet as vulnerable or not. True or False
int ASN1_TYPE_set1 ( ASN1_TYPE * a , int type , const void * value ) { if ( ! value || ( type == V_ASN1_BOOLEAN ) ) { void * p = ( void * ) value ; ASN1_TYPE_set ( a , type , p ) ; } else if ( type == V_ASN1_OBJECT ) { ASN1_OBJECT * odup ; odup = OBJ_dup ( value ) ; if ( ! odup ) return 0 ; ASN1_TYPE_set ( a , type , odup ) ; } else { ASN1_STRING * sdup ; sdup = ASN1_STRING_dup ( value ) ; if ( ! sdup ) return 0 ; ASN1_TYPE_set ( a , type , sdup ) ; } return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void * mspack_fmap_alloc ( struct mspack_system * self , size_t num ) { return malloc ( num ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int check_principals_line ( struct ssh * ssh , char * cp , const struct sshkey_cert * cert , const char * loc , struct sshauthopt * * authoptsp ) { u_int i , found = 0 ; char * ep , * line_opts ; const char * reason = NULL ; struct sshauthopt * opts = NULL ; if ( authoptsp != NULL ) * authoptsp = NULL ; ep = cp + strlen ( cp ) - 1 ; while ( ep > cp && ( * ep == '\n' || * ep == ' ' || * ep == '\t' ) ) * ep -- = '\0' ; line_opts = NULL ; if ( ( ep = strrchr ( cp , ' ' ) ) != NULL || ( ep = strrchr ( cp , '\t' ) ) != NULL ) { for ( ; * ep == ' ' || * ep == '\t' ; ep ++ ) ; line_opts = cp ; cp = ep ; } if ( ( opts = sshauthopt_parse ( line_opts , & reason ) ) == NULL ) { debug ( "%s: bad principals options: %s" , loc , reason ) ; auth_debug_add ( "%s: bad principals options: %s" , loc , reason ) ; return - 1 ; } for ( i = 0 ; i < cert -> nprincipals ; i ++ ) { if ( strcmp ( cp , cert -> principals [ i ] ) != 0 ) continue ; debug3 ( "%s: matched principal \"%.100s\"" , loc , cert -> principals [ i ] ) ; found = 1 ; } if ( found && authoptsp != NULL ) { * authoptsp = opts ; opts = NULL ; } sshauthopt_free ( opts ) ; return found ? 0 : - 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline int c6_to_8 ( int v ) { int b ; v &= 0x3f ; b = v & 1 ; return ( v << 2 ) | ( b << 1 ) | b ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static ossl_inline t2 * sk_ ## t1 ## _delete ( STACK_OF ( t1 ) * sk , int i ) { return ( t2 * ) OPENSSL_sk_delete ( ( OPENSSL_STACK * ) sk , i ) ; } static ossl_inline t2 * sk_ ## t1 ## _delete_ptr ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return ( t2 * ) OPENSSL_sk_delete_ptr ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _push ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_push ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _unshift ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_unshift ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline t2 * sk_ ## t1 ## _pop ( STACK_OF ( t1 ) * sk ) { return ( t2 * ) OPENSSL_sk_pop ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline t2 * sk_ ## t1 ## _shift ( STACK_OF ( t1 ) * sk ) { return ( t2 * ) OPENSSL_sk_shift ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline void sk_ ## t1 ## _pop_free ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _freefunc freefunc ) { OPENSSL_sk_pop_free ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_freefunc ) freefunc ) ; } static ossl_inline int sk_ ## t1 ## _insert ( STACK_OF ( t1 ) * sk , t2 * ptr , int idx ) { return OPENSSL_sk_insert ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr , idx ) ; } static ossl_inline t2 * sk_ ## t1 ## _set ( STACK_OF ( t1 ) * sk , int idx , t2 * ptr ) { return ( t2 * ) OPENSSL_sk_set ( ( OPENSSL_STACK * ) sk , idx , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _find ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_find ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _find_ex ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_find_ex ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) { OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) { return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ; } static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) { return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ; } # define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ; typedef const char * OPENSSL_CSTRING ; DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char )
1True
Categorize the following code snippet as vulnerable or not. True or False
void proto_register_rsvp ( void ) { gint i ; static hf_register_info rsvpf_info [ ] = { { & hf_rsvp_filter [ RSVPF_MSG ] , { "Message Type" , "rsvp.msg" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & message_type_vals_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_PATH ] , { "Path Message" , "rsvp.path" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RESV ] , { "Resv Message" , "rsvp.resv" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_PATHERR ] , { "Path Error Message" , "rsvp.perr" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RESVERR ] , { "Resv Error Message" , "rsvp.rerr" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_PATHTEAR ] , { "Path Tear Message" , "rsvp.ptear" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RESVTEAR ] , { "Resv Tear Message" , "rsvp.rtear" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RCONFIRM ] , { "Resv Confirm Message" , "rsvp.resvconf" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RTEARCONFIRM ] , { "Resv Tear Confirm Message" , "rsvp.rtearconf" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_BUNDLE ] , { "Bundle Message" , "rsvp.bundle" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ACK ] , { "Ack Message" , "rsvp.ack" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SREFRESH ] , { "Srefresh Message" , "rsvp.srefresh" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_HELLO ] , { "HELLO Message" , "rsvp.hello" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_OBJECT ] , { "Object class" , "rsvp.object" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & rsvp_class_vals_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_ctype , { "C-type" , "rsvp.ctype" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_parameter , { "Parameter" , "rsvp.parameter" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & svc_vals_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_parameter_flags , { "Parameter flags" , "rsvp.parameter_flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_parameter_length , { "Parameter length" , "rsvp.parameter_length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_error_value , { "Error value" , "rsvp.error_value" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_class , { "Class" , "rsvp.class" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_class_length , { "Length" , "rsvp.class_length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_switching_granularity , { "Switching granularity" , "rsvp.switching_granularity" , FT_UINT16 , BASE_DEC , VALS ( rsvp_switching_granularity_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_NOTIFY ] , { "Notify Message" , "rsvp.notify" , FT_BOOLEAN , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION ] , { "SESSION" , "rsvp.session" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_HOP ] , { "HOP" , "rsvp.hop" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_HELLO_OBJ ] , { "HELLO Request/Ack" , "rsvp.hello_obj" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_INTEGRITY ] , { "INTEGRITY" , "rsvp.integrity" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_TIME_VALUES ] , { "TIME VALUES" , "rsvp.time" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ERROR ] , { "ERROR" , "rsvp.error" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SCOPE ] , { "SCOPE" , "rsvp.scope" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_STYLE ] , { "STYLE" , "rsvp.style" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_FLOWSPEC ] , { "FLOWSPEC" , "rsvp.flowspec" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_FILTER_SPEC ] , { "FILTERSPEC" , "rsvp.filter" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SENDER ] , { "SENDER TEMPLATE" , "rsvp.sender" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_TSPEC ] , { "SENDER TSPEC" , "rsvp.tspec" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADSPEC ] , { "ADSPEC" , "rsvp.adspec" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_POLICY ] , { "POLICY" , "rsvp.policy" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_CONFIRM ] , { "CONFIRM" , "rsvp.confirm" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_LABEL ] , { "LABEL" , "rsvp.label" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RECOVERY_LABEL ] , { "RECOVERY LABEL" , "rsvp.recovery_label" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_UPSTREAM_LABEL ] , { "UPSTREAM LABEL" , "rsvp.upstream_label" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SUGGESTED_LABEL ] , { "SUGGESTED LABEL" , "rsvp.suggested_label" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_LABEL_SET ] , { "LABEL SET" , "rsvp.label_set" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ACCEPTABLE_LABEL_SET ] , { "ACCEPTABLE LABEL SET" , "rsvp.acceptable_label_set" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_PROTECTION ] , { "PROTECTION" , "rsvp.protection" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV ] , { "DIFFSERV" , "rsvp.diffserv" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DSTE ] , { "CLASSTYPE" , "rsvp.dste" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RESTART_CAP ] , { "RESTART CAPABILITY" , "rsvp.restart" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_LINK_CAP ] , { "LINK CAPABILITY" , "rsvp.link" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_LABEL_REQUEST ] , { "LABEL REQUEST" , "rsvp.label_request" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_ATTRIBUTE ] , { "SESSION ATTRIBUTE" , "rsvp.session_attribute" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_EXPLICIT_ROUTE ] , { "EXPLICIT ROUTE" , "rsvp.explicit_route" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_RECORD_ROUTE ] , { "RECORD ROUTE" , "rsvp.record_route" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_MESSAGE_ID ] , { "MESSAGE-ID" , "rsvp.msgid" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_MESSAGE_ID_ACK ] , { "MESSAGE-ID ACK" , "rsvp.msgid_ack" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_MESSAGE_ID_LIST ] , { "MESSAGE-ID LIST" , "rsvp.msgid_list" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DCLASS ] , { "DCLASS" , "rsvp.dclass" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_LSP_TUNNEL_IF_ID ] , { "LSP INTERFACE-ID" , "rsvp.lsp_tunnel_if_id" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS ] , { "ADMIN STATUS" , "rsvp.admin_status" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_REFLECT ] , { "Reflect" , "rsvp.admin_status.reflect" , FT_BOOLEAN , 32 , NULL , 0x80000000 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_HANDOVER ] , { "Handover" , "rsvp.admin_status.handover" , FT_BOOLEAN , 32 , NULL , 0x40 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_LOCKOUT ] , { "Lockout" , "rsvp.admin_status.lockout" , FT_BOOLEAN , 32 , NULL , 0x20 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_INHIBIT ] , { "Inhibit Alarm Communication" , "rsvp.admin_status.inhibit" , FT_BOOLEAN , 32 , NULL , 0x10 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_CALL_MGMT ] , { "Call Management" , "rsvp.admin_status.callmgmt" , FT_BOOLEAN , 32 , NULL , 0x08 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_TESTING ] , { "Testing" , "rsvp.admin_status.testing" , FT_BOOLEAN , 32 , NULL , 0x04 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_DOWN ] , { "Administratively down" , "rsvp.admin_status.down" , FT_BOOLEAN , 32 , NULL , 0x02 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ADMIN_STATUS_DELETE ] , { "Delete in progress" , "rsvp.admin_status.delete" , FT_BOOLEAN , 32 , NULL , 0x01 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_LSP_ATTRIBUTES ] , { "LSP ATTRIBUTES" , "rsvp.lsp_attributes" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ASSOCIATION ] , { "ASSOCIATION" , "rsvp.association" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_CALL_ATTRIBUTES ] , { "CALL ATTRIBUTES" , "rsvp.call_attributes" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_NOTIFY_REQUEST ] , { "NOTIFY REQUEST" , "rsvp.notify_request" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_GENERALIZED_UNI ] , { "GENERALIZED UNI" , "rsvp.generalized_uni" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_CALL_ID ] , { "CALL ID" , "rsvp.call_id" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_3GPP2_OBJECT ] , { "3GPP2 OBJECT" , "rsvp.3gpp2_object" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_PRIVATE_OBJ ] , { "Private object" , "rsvp.obj_private" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_UNKNOWN_OBJ ] , { "Unknown object" , "rsvp.obj_unknown" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_IP ] , { "Destination address" , "rsvp.session.ip" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_SHORT_CALL_ID ] , { "Short Call ID" , "rsvp.session.short_call_id" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_PORT ] , { "Port number" , "rsvp.session.port" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_PROTO ] , { "Protocol" , "rsvp.session.proto" , FT_UINT8 , BASE_DEC , VALS ( proto_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_TUNNEL_ID ] , { "Tunnel ID" , "rsvp.session.tunnel_id" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_EXT_TUNNEL_ID ] , { "Extended tunnel ID" , "rsvp.session.ext_tunnel_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SESSION_EXT_TUNNEL_ID_IPV6 ] , { "Extended tunnel ID" , "rsvp.session.ext_tunnel_id_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_JUNIPER ] , { "Juniper" , "rsvp.juniper" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SENDER_IP ] , { "Sender IPv4 address" , "rsvp.sender.ip" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SENDER_PORT ] , { "Sender port number" , "rsvp.sender.port" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SENDER_LSP_ID ] , { "Sender LSP ID" , "rsvp.sender.lsp_id" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_SENDER_SHORT_CALL_ID ] , { "Short Call ID" , "rsvp.sender.short_call_id" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_MAPNB ] , { "MAPnb" , "rsvp.diffserv.mapnb" , FT_UINT8 , BASE_DEC , NULL , 0x0 , MAPNB_DESCRIPTION , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_MAP ] , { "MAP" , "rsvp.diffserv.map" , FT_NONE , BASE_NONE , NULL , 0x0 , MAP_DESCRIPTION , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_MAP_EXP ] , { "EXP" , "rsvp.diffserv.map.exp" , FT_UINT8 , BASE_DEC , NULL , 0x0 , EXP_DESCRIPTION , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_PHBID ] , { PHBID_DESCRIPTION , "rsvp.diffserv.phbid" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_PHBID_DSCP ] , { PHBID_DSCP_DESCRIPTION , "rsvp.diffserv.phbid.dscp" , FT_UINT16 , BASE_DEC , NULL , PHBID_DSCP_MASK , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_PHBID_CODE ] , { PHBID_CODE_DESCRIPTION , "rsvp.diffserv.phbid.code" , FT_UINT16 , BASE_DEC , NULL , PHBID_CODE_MASK , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_PHBID_BIT14 ] , { PHBID_BIT14_DESCRIPTION , "rsvp.diffserv.phbid.bit14" , FT_UINT16 , BASE_DEC , VALS ( phbid_bit14_vals ) , PHBID_BIT14_MASK , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DIFFSERV_PHBID_BIT15 ] , { PHBID_BIT15_DESCRIPTION , "rsvp.diffserv.phbid.bit15" , FT_UINT16 , BASE_DEC , VALS ( phbid_bit15_vals ) , PHBID_BIT15_MASK , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_DSTE_CLASSTYPE ] , { "CT" , "rsvp.dste.classtype" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_GUNI_SRC_IPV4 ] , { "Source TNA" , "rsvp.guni.srctna.ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_GUNI_DST_IPV4 ] , { "Destination TNA" , "rsvp.guni.dsttna.ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_GUNI_SRC_IPV6 ] , { "Source TNA" , "rsvp.guni.srctna.ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_GUNI_DST_IPV6 ] , { "Destination TNA" , "rsvp.guni.dsttna.ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_CALL_ID_SRC_ADDR_IPV4 ] , { "Source Transport Network Address" , "rsvp.callid.srcaddr.ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_CALL_ID_SRC_ADDR_IPV6 ] , { "Source Transport Network Address" , "rsvp.callid.srcaddr.ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_callid_srcaddr_ether , { "Source Transport Network Address" , "rsvp.callid.srcaddr.ether" , FT_ETHER , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_callid_srcaddr_bytes , { "Source Transport Network Address" , "rsvp.callid.srcaddr.bytes" , FT_ETHER , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_filter [ RSVPF_ENT_CODE ] , { "Enterprise Code" , "rsvp.obj_private.enterprise" , FT_UINT32 , BASE_DEC | BASE_EXT_STRING , & sminmpec_values_ext , 0x0 , "IANA Network Management Private Enterprise Code" , HFILL } } , { & hf_rsvp_error_flags , { "Flags" , "rsvp.error_flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_error_flags_path_state_removed , { "Path State Removed" , "rsvp.error_flags.path_state_removed" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , 0x04 , NULL , HFILL } } , { & hf_rsvp_error_flags_not_guilty , { "NotGuilty" , "rsvp.error_flags.not_guilty" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_error_flags_in_place , { "InPlace" , "rsvp.error_flags.in_place" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_tlv_color_mode , { "Color Mode (CM)" , "rsvp.eth_tspec_tlv.color_mode" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_tlv_coupling_flag , { "Coupling Flag (CF)" , "rsvp.eth_tspec_tlv.coupling_flag" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_standard_contiguous_concatenation , { "Standard contiguous concatenation" , "rsvp.sender_tspec.standard_contiguous_concatenation" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_arbitrary_contiguous_concatenation , { "Arbitrary contiguous concatenation" , "rsvp.sender_tspec.arbitrary_contiguous_concatenation" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_regenerator_section , { "Section/Regenerator Section layer transparency" , "rsvp.sender_tspec.regenerator_section" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0001 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_multiplex_section , { "Line/Multiplex Section layer transparency" , "rsvp.sender_tspec.multiplex_section" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0002 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_J0_transparency , { "J0 transparency" , "rsvp.sender_tspec.J0_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0004 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_SOH_RSOH_DCC_transparency , { "SOH/RSOH DCC transparency" , "rsvp.sender_tspec.SOH_RSOH_DCC_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0008 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_LOH_MSOH_DCC_transparency , { "LOH/MSOH DCC transparency" , "rsvp.sender_tspec.LOH_MSOH_DCC_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0010 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_LOH_MSOH_extended_DCC_transparency , { "LOH/MSOH Extended DCC transparency" , "rsvp.sender_tspec.LOH_MSOH_extended_DCC_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0020 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_K1_K2_transparency , { "K1/K2 transparency" , "rsvp.sender_tspec.K1_K2_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0040 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_E1_transparency , { "E1 transparency" , "rsvp.sender_tspec.E1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0080 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_F1_transparency , { "F1 transparency" , "rsvp.sender_tspec.F1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0100 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_E2_transparency , { "E2 transparency" , "rsvp.sender_tspec.E2_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0200 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_B1_transparency , { "B1 transparency" , "rsvp.sender_tspec.B1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0400 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_B2_transparency , { "B2 transparency" , "rsvp.sender_tspec.B2_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0800 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_M0_transparency , { "M0 transparency" , "rsvp.sender_tspec.M0_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x1000 , NULL , HFILL } } , { & hf_rsvp_sender_tspec_M1_transparency , { "M1 transparency" , "rsvp.sender_tspec.M1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x2000 , NULL , HFILL } } , { & hf_rsvp_flowspec_standard_contiguous_concatenation , { "Standard contiguous concatenation" , "rsvp.flowspec.standard_contiguous_concatenation" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_flowspec_arbitrary_contiguous_concatenation , { "Arbitrary contiguous concatenation" , "rsvp.flowspec.arbitrary_contiguous_concatenation" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_flowspec_regenerator_section , { "Section/Regenerator Section layer transparency" , "rsvp.flowspec.regenerator_section" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0001 , NULL , HFILL } } , { & hf_rsvp_flowspec_multiplex_section , { "Line/Multiplex Section layer transparency" , "rsvp.flowspec.multiplex_section" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0002 , NULL , HFILL } } , { & hf_rsvp_flowspec_J0_transparency , { "J0 transparency" , "rsvp.flowspec.J0_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0004 , NULL , HFILL } } , { & hf_rsvp_flowspec_SOH_RSOH_DCC_transparency , { "SOH/RSOH DCC transparency" , "rsvp.flowspec.SOH_RSOH_DCC_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0008 , NULL , HFILL } } , { & hf_rsvp_flowspec_LOH_MSOH_DCC_transparency , { "LOH/MSOH DCC transparency" , "rsvp.flowspec.LOH_MSOH_DCC_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0010 , NULL , HFILL } } , { & hf_rsvp_flowspec_LOH_MSOH_extended_DCC_transparency , { "LOH/MSOH Extended DCC transparency" , "rsvp.flowspec.LOH_MSOH_extended_DCC_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0020 , NULL , HFILL } } , { & hf_rsvp_flowspec_K1_K2_transparency , { "K1/K2 transparency" , "rsvp.flowspec.K1_K2_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0040 , NULL , HFILL } } , { & hf_rsvp_flowspec_E1_transparency , { "E1 transparency" , "rsvp.flowspec.E1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0080 , NULL , HFILL } } , { & hf_rsvp_flowspec_F1_transparency , { "F1 transparency" , "rsvp.flowspec.F1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0100 , NULL , HFILL } } , { & hf_rsvp_flowspec_E2_transparency , { "E2 transparency" , "rsvp.flowspec.E2_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0200 , NULL , HFILL } } , { & hf_rsvp_flowspec_B1_transparency , { "B1 transparency" , "rsvp.flowspec.B1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0400 , NULL , HFILL } } , { & hf_rsvp_flowspec_B2_transparency , { "B2 transparency" , "rsvp.flowspec.B2_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x0800 , NULL , HFILL } } , { & hf_rsvp_flowspec_M0_transparency , { "M0 transparency" , "rsvp.flowspec.M0_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x1000 , NULL , HFILL } } , { & hf_rsvp_flowspec_M1_transparency , { "M1 transparency" , "rsvp.flowspec.M1_transparency" , FT_BOOLEAN , 32 , TFS ( & tfs_yes_no ) , 0x2000 , NULL , HFILL } } , { & hf_rsvp_integrity_flags_handshake , { "Handshake" , "rsvp.integrity.flags.handshake" , FT_BOOLEAN , 8 , TFS ( & tfs_capable_not_capable ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_sa_flags_local , { "Local protection" , "rsvp.sa.flags.local" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_sa_flags_label , { "Label recording" , "rsvp.sa.flags.label" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_sa_flags_se_style , { "SE style" , "rsvp.sa.flags.se_style" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x04 , NULL , HFILL } } , { & hf_rsvp_sa_flags_bandwidth , { "Bandwidth protection" , "rsvp.sa.flags.bandwidth" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x08 , NULL , HFILL } } , { & hf_rsvp_sa_flags_node , { "Node protection" , "rsvp.sa.flags.node" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x10 , NULL , HFILL } } , { & hf_rsvp_rro_flags_local_avail , { "Local Protection" , "rsvp.rro.flags.local_avail" , FT_BOOLEAN , 8 , TFS ( & tfs_available_not_available ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_rro_flags_local_in_use , { "Local Protection" , "rsvp.rro.flags.local_in_use" , FT_BOOLEAN , 8 , TFS ( & tfs_used_notused ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_rro_flags_bandwidth , { "Bandwidth Protection" , "rsvp.rro.flags.bandwidth" , FT_BOOLEAN , 8 , TFS ( & tfs_available_not_available ) , 0x04 , NULL , HFILL } } , { & hf_rsvp_rro_flags_node , { "Node Protection" , "rsvp.rro.flags.node" , FT_BOOLEAN , 8 , TFS ( & tfs_available_not_available ) , 0x08 , NULL , HFILL } } , { & hf_rsvp_rro_flags_node_address , { "Address Specifies a Node-id Address" , "rsvp.rro.flags.node_address" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x20 , NULL , HFILL } } , { & hf_rsvp_rro_flags_backup_tunnel_bandwidth , { "Backup Tunnel Has Bandwidth" , "rsvp.rro.flags.backup_tunnel_bandwidth" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x04 , NULL , HFILL } } , { & hf_rsvp_rro_flags_backup_tunnel_hop , { "Backup Tunnel Goes To" , "rsvp.rro.flags.backup_tunnel_hop" , FT_BOOLEAN , 8 , TFS ( & tfs_next_next_hop_next_hop ) , 0x08 , NULL , HFILL } } , { & hf_rsvp_rro_flags_global_label , { "Global label" , "rsvp.rro.flags.global_label" , FT_BOOLEAN , 8 , NULL , 0x01 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_e2e , { "End-to-end re-routing" , "rsvp.lsp_attr.e2e" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000001 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_boundary , { "Boundary re-routing" , "rsvp.lsp_attr.boundary" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000002 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_segment , { "Segment-based re-routing" , "rsvp.lsp_attr.segment" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000004 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_integrity , { "LSP Integrity Required" , "rsvp.lsp_attr.integrity" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000008 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_contiguous , { "Contiguous LSP" , "rsvp.lsp_attr.contiguous" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000010 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_stitching , { "LSP stitching desired" , "rsvp.lsp_attr.stitching" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000020 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_preplanned , { "Pre-Planned LSP Flag" , "rsvp.lsp_attr.preplanned" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000040 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_nophp , { "Non-PHP behavior flag" , "rsvp.lsp_attr.nophp" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000080 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_oobmap , { "OOB mapping flag" , "rsvp.lsp_attr.oobmap" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000100 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_entropy , { "Entropy Label Capability" , "rsvp.lsp_attr.entropy" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000200 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_srlgcollect , { "SRLG Collection Flag" , "rsvp.lsp_attr.srlgcollect" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000400 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_costcollect , { "Cost Collection Flag" , "rsvp.lsp_attr.costcollect" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00000800 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_latcollect , { "Latency Collection Flag" , "rsvp.lsp_attr.latcollect" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00001000 , NULL , HFILL } } , { & hf_rsvp_lsp_attr_latvarcollect , { "Latency Variation Flag" , "rsvp.lsp_attr.latvarcollect" , FT_BOOLEAN , 32 , TFS ( & tfs_desired_not_desired ) , 0x00002000 , NULL , HFILL } } , { & hf_rsvp_gen_uni_direction , { "Direction" , "rsvp.gen_uni.direction" , FT_BOOLEAN , 8 , TFS ( & tfs_gen_uni_direction ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_protection_info_flags_secondary_lsp , { "Secondary LSP" , "rsvp.pi.flags.secondary_lsp" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_extra_traffic , { "Extra Traffic" , "rsvp.pi_link.flags.extra_traffic" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_unprotected , { "Unprotected" , "rsvp.pi_link.flags.unprotected" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_shared , { "Shared" , "rsvp.pi_link.flags.shared" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x04 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_dedicated1_1 , { "Dedicated 1:1" , "rsvp.pi_link.flags.dedicated1_1" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x08 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_dedicated1plus1 , { "Dedicated 1+1" , "rsvp.pi_link.flags.dedicated1plus1" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x10 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_enhanced , { "Enhanced" , "rsvp.pi_link.flags.enhanced" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x20 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_extra , { "Extra Traffic" , "rsvp.pi_link.flags.extra" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_dedicated_1_1 , { "Dedicated 1:1" , "rsvp.pi_link.flags.dedicated_1_1" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x08 , NULL , HFILL } } , { & hf_rsvp_pi_link_flags_dedicated_1plus1 , { "Dedicated 1+1" , "rsvp.pi_link.flags.dedicated_1plus1" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x10 , NULL , HFILL } } , { & hf_rsvp_rfc4872_secondary , { "Secondary LSP" , "rsvp.rfc4872.secondary" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_rfc4872_protecting , { "Protecting LSP" , "rsvp.rfc4872.protecting" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x40 , NULL , HFILL } } , { & hf_rsvp_rfc4872_notification_msg , { "Protecting LSP" , "rsvp.rfc4872.notification_msg" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x20 , NULL , HFILL } } , { & hf_rsvp_rfc4872_operational , { "Protecting LSP" , "rsvp.rfc4872.operational" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x10 , NULL , HFILL } } , { & hf_rsvp_pi_lsp_flags_full_rerouting , { "(Full) rerouting" , "rsvp.pi_lsp.flags.full_rerouting" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_pi_lsp_flags_rerouting_extra , { "Rerouting without extra-traffic" , "rsvp.pi_lsp.flags.rerouting_extra" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_pi_lsp_flags_1_n_protection , { "1:N protection with extra-traffic" , "rsvp.pi_lsp.flags.1_n_protection" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x04 , NULL , HFILL } } , { & hf_rsvp_pi_lsp_flags_1plus1_unidirectional , { "1+1 unidirectional protection" , "rsvp.pi_lsp.flags.1plus1_unidirectional" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x08 , NULL , HFILL } } , { & hf_rsvp_pi_lsp_flags_1plus1_bidirectional , { "1+1 bidirectional protection" , "rsvp.pi_lsp.flags.1plus1_bidirectional" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x10 , NULL , HFILL } } , { & hf_rsvp_protection_info_in_place , { "In-Place" , "rsvp.protection_info.in_place" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_protection_info_required , { "Required" , "rsvp.protection_info.required" , FT_BOOLEAN , 8 , TFS ( & tfs_yes_no ) , 0x40 , NULL , HFILL } } , { & hf_rsvp_pi_seg_flags_full_rerouting , { "(Full) rerouting" , "rsvp.pi_seg.flags.full_rerouting" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_pi_seg_flags_rerouting_extra , { "Rerouting without extra-traffic" , "rsvp.pi_seg.flags.rerouting_extra" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_pi_seg_flags_1_n_protection , { "1:N protection with extra-traffic" , "rsvp.pi_seg.flags.1_n_protection" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x04 , NULL , HFILL } } , { & hf_rsvp_pi_seg_flags_1plus1_unidirectional , { "1+1 unidirectional protection" , "rsvp.pi_seg.flags.1plus1_unidirectional" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x08 , NULL , HFILL } } , { & hf_rsvp_pi_seg_flags_1plus1_bidirectional , { "1+1 bidirectional protection" , "rsvp.pi_seg.flags.1plus1_bidirectional" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x10 , NULL , HFILL } } , { & hf_rsvp_frr_flags_one2one_backup , { "One-to-One Backup" , "rsvp.frr.flags.one2one_backup" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x01 , NULL , HFILL } } , { & hf_rsvp_frr_flags_facility_backup , { "Facility Backup" , "rsvp.frr.flags.facility_backup" , FT_BOOLEAN , 8 , TFS ( & tfs_desired_not_desired ) , 0x02 , NULL , HFILL } } , { & hf_rsvp_type , { "Type" , "rsvp.type" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tid , { "Transaction ID" , "rsvp.3gpp_obj.tid" , FT_UINT32 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_ie_len , { "Length" , "rsvp.3gpp_obj.length" , FT_UINT32 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_ie_type , { "IE Type" , "rsvp.3gpp_obj.ie_type" , FT_UINT32 , BASE_DEC , VALS ( rsvp_3gpp_object_ie_type_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_ue_ipv4_addr , { "UE IPv4 address" , "rsvp.3gpp_obj.ue_ipv4_addr" , FT_IPv4 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_ue_ipv6_addr , { "UE IPv6 address" , "rsvp.3gpp_obj.ue_ipv6_addr" , FT_IPv6 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tft_d , { "Direction(D)" , "rsvp.3gpp_obj.tft_d" , FT_UINT32 , BASE_DEC , VALS ( rsvp_3gpp_object_tft_d_vals ) , 0xc0000000 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tft_ns , { "Non-Specific bit(NS)" , "rsvp.3gpp_obj.tft_ns" , FT_UINT32 , BASE_DEC , NULL , 0x08000000 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tft_sr_id , { "SR_ID" , "rsvp.3gpp_obj.tft_sr_id" , FT_UINT32 , BASE_DEC , NULL , 0x07000000 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tft_p , { "Persistency(P)" , "rsvp.3gpp_obj.tft_p" , FT_UINT32 , BASE_DEC , NULL , 0x00010000 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tft_opcode , { "TFT Operation Code" , "rsvp.3gpp_obj.tft_opcode" , FT_UINT32 , BASE_DEC , VALS ( rsvp_3gpp_obj_tft_opcode_vals ) , 0x000ff00 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tft_n_pkt_flt , { "Number of Packet filters" , "rsvp.3gpp_obj.tft_n_pkt_flt" , FT_UINT32 , BASE_DEC , NULL , 0x00000ff , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_flow_id , { "Flow Identifier" , "rsvp.3gpp_obj.flow_id" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_ev_prec , { "Packet filter evaluation precedence" , "rsvp.3gpp_obj.pf_ev_prec" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_len , { "Packet filter length" , "rsvp.3gpp_obj.pf_len" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_type , { "PF Type" , "rsvp.3gpp_obj.pf_type" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_cont_len , { "Length" , "rsvp.3gpp_obj.pf_cont_len" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_comp_type_id , { "PF component identifier" , "rsvp.3gpp_obj.pf_comp_type_id" , FT_UINT8 , BASE_DEC , VALS ( rsvp_3gpp_obj_pf_comp_type_id_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_src_ipv4 , { "IPv4 Source Address" , "rsvp.3gpp_obj.pf_src_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_dst_ipv4 , { "IPv4 Destination Address" , "rsvp.3gpp_obj.pf_dst_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_ipv4_mask , { "IPv4 Mask" , "rsvp.3gpp_obj.pf_ipv4_mask" , FT_UINT32 , BASE_HEX , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_src_ipv6 , { "IPv6 Source Address" , "rsvp.3gpp_obj.pf_src_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_dst_ipv6 , { "IPv6 Destination Address" , "rsvp.3gpp_obj.pf_dst_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_ipv6_prefix_length , { "IPv6 Prefix length" , "rsvp.3gpp_obj.pf_ipv6_prefix_length" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_prot_next , { "Protocol field(IPv4) or Next Header(IPv6)" , "rsvp.3gpp_obj.pf_prot_next" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_dst_port , { "Single Destination Port" , "rsvp.3gpp_obj.pf_dst_port" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_src_port , { "Single Source Port" , "rsvp.3gpp_obj.pf_src_port" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_ipsec_spi , { "IPsec SPI" , "rsvp.3gpp_obj.pf_ipsec_spi" , FT_UINT32 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_tos_tc , { "Type of Service (IPv4)/Traffic Class (IPv6)" , "rsvp.3gpp_obj.pf_tos_tc" , FT_UINT8 , BASE_HEX , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_flow_lbl , { "Flow label" , "rsvp.3gpp_obj.pf_flow_lbl" , FT_UINT24 , BASE_DEC , NULL , 0x0fffff , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_ipv6 , { "IPv6 Address" , "rsvp.3gpp_obj.pf_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_treatment , { "PF Treatment" , "rsvp.3gpp_obj.pf_treatment" , FT_UINT8 , BASE_DEC , VALS ( rsvp_3gpp_obj_pf_treatment_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_hint , { "PF Hint" , "rsvp.3gpp_obj.pf_hint" , FT_UINT32 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_tft_qos_list_len , { "QoS List Length" , "rsvp.3gpp_obj.qos_list_len" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_r_qos_blob_len , { "R_QOS_SUB_BLOB_LEN" , "rsvp.3gpp_obj.r_qos_blob_len" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_r_qos_blob_flow_pri , { "FLOW_PRIORITY" , "rsvp.3gpp_obj.r_qos_blob.flow_pri" , FT_UINT8 , BASE_DEC , NULL , 0xf0 , NULL , HFILL } } , { & hf_rsvp_3gpp_r_qos_blob_num_qos_att_set , { "NUM_QoS_ATTRIBUTE_SETS" , "rsvp.3gpp_obj.r_qos_blob.num_qos_att_set" , FT_UINT8 , BASE_DEC , NULL , 0x0e , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_att_set_len , { "QoS_ATTRIBUTE_SET_LEN" , "rsvp.3gpp_obj.r_qos_blob.qos_att_set_len" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_set_id , { "QoS_ATTRIBUTE_SET_ID" , "rsvp.3gpp_obj.r_qos_blob.qos_attribute_set_id" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_verbose , { "VERBOSE" , "rsvp.3gpp_obj.r_qos_blob.verbose" , FT_BOOLEAN , 8 , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_prof_id , { "ProfileID" , "rsvp.3gpp_obj.r_qos_blob.prof_id" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_traff_cls , { "Traffic_Class" , "rsvp.3gpp_obj.r_qos_blob.traff_cls" , FT_UINT8 , BASE_DEC , VALS ( rsvp_3gpp_obj_traffic_class_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_peak_rate , { "Peak_Rate" , "rsvp.3gpp_obj.r_qos_blob.peak_rate" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_bucket_size , { "Bucket_Size" , "rsvp.3gpp_obj.r_qos_blob.bucket_size" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_token_rate , { "Token_Rate" , "rsvp.3gpp_obj.r_qos_blob.token_rate" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_max_latency , { "Max_Latency" , "rsvp.3gpp_obj.r_qos_blob.max_latency" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_max_loss_rte , { "Max_Loss_Rate" , "rsvp.3gpp_obj.r_qos_blob.max_loss_rte" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_delay_var_sensitive , { "Delay_Var_Sensitive" , "rsvp.3gpp_obj.r_qos_blob.delay_var_sensitive" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_attribute_reserved , { "Reserved" , "rsvp.3gpp_obj.r_qos_blob.reserved" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_r_qos_blob , { "R_QOS_SUB_BLOB" , "rsvp.3gpp_obj.r_qos_blob" , FT_BYTES , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_3gpp_qos_result , { "Result Code" , "rsvp.3gpp_obj.qos_result_code" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_lbit , { "L(oose) bit" , "rsvp.xro.sobj.lbit" , FT_UINT8 , BASE_DEC , VALS ( rsvp_xro_sobj_lbit_vals ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_type , { "Type" , "rsvp.xro.sobj.type" , FT_UINT8 , BASE_DEC , VALS ( rsvp_xro_sobj_type_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_len , { "Length" , "rsvp.xro.sobj.len" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_ipv4_addr , { "IPv4 prefix" , "rsvp.xro.sobj.ipv4.addr" , FT_IPv4 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_ipv4_prefix , { "Prefix Length" , "rsvp.xro.sobj.ipv4.prefix" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_ipv4_attr , { "Attribute" , "rsvp.xro.sobj.ipv4.attr" , FT_UINT8 , BASE_DEC , VALS ( rsvp_xro_sobj_ip_attr_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_ipv6_addr , { "IPv6 prefix" , "rsvp.xro.sobj.ipv6.addr" , FT_IPv6 , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_ipv6_prefix , { "Prefix Length" , "rsvp.xro.sobj.ipv6.prefix" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_ipv6_attr , { "Attribute" , "rsvp.xro.sobj.ipv6.attr" , FT_UINT8 , BASE_DEC , VALS ( rsvp_xro_sobj_ip_attr_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_srlg_id , { "SRLG Id" , "rsvp.xro.sobj.srlg.id" , FT_UINT32 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_xro_sobj_srlg_res , { "Reserved" , "rsvp.xro.sobj.srlg.res" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_private_data , { "Data" , "rsvp.private.data" , FT_BYTES , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_numtlvs , { "Num TLVs" , "rsvp.juniper.tlvs" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_padlength , { "Padlength" , "rsvp.juniper.padlength" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_type , { "Juniper type" , "rsvp.juniper.type" , FT_UINT8 , BASE_HEX , VALS ( rsvp_juniper_attr_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_length , { "Juniper length" , "rsvp.juniper.length" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_attrib_cos , { "Cos" , "rsvp.juniper.attrib.cos" , FT_UINT16 , BASE_HEX , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_attrib_metric1 , { "Metric 1" , "rsvp.juniper.attrib.metric1" , FT_UINT16 , BASE_HEX , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_attrib_metric2 , { "Metric 2" , "rsvp.juniper.attrib.metric2" , FT_UINT16 , BASE_HEX , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_attrib_ccc_status , { "CCC Status" , "rsvp.juniper.attrib.ccc_status" , FT_UINT16 , BASE_HEX , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_attrib_path , { "Path type" , "rsvp.juniper.attrib.path" , FT_UINT16 , BASE_HEX , VALS ( rsvp_juniper_path_attr_vals ) , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_attrib_unknown , { "Unknown" , "rsvp.juniper.attrib.unknown" , FT_BYTES , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_pad , { "Pad" , "rsvp.juniper.pad" , FT_BYTES , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_juniper_unknown , { "Unknown" , "rsvp.juniper.unknown" , FT_BYTES , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_unknown_data , { "Data" , "rsvp.unknown.data" , FT_BYTES , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_loose_hop , { "Hop" , "rsvp.loose_hop" , FT_BOOLEAN , 8 , TFS ( & tfs_loose_strict_hop ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_data_length , { "Data length" , "rsvp.data_length" , FT_UINT16 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_rsvp_session_flags , { "Flags" , "rsvp.session.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_destination_address , { "Destination address" , "rsvp.session.destination_address" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_protocol , { "Protocol" , "rsvp.session.protocol" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_destination_port , { "Destination port" , "rsvp.session.destination_port" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_dscp , { "DSCP" , "rsvp.session.dscp" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & dscp_vals_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_extended_ipv4_address , { "Extended IPv4 Address" , "rsvp.session.extended_ipv4_address" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_data , { "Data" , "rsvp.session.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_length , { "Length" , "rsvp.ifid_tlv.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_ipv4_address , { "IPv4 address" , "rsvp.ifid_tlv.ipv4_address" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_ipv6_address , { "IPv6 address" , "rsvp.ifid_tlv.ipv6_address" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlvinterface_id , { "Interface-ID" , "rsvp.ifid_tlv.interface_id" , FT_UINT32 , BASE_DEC_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_label , { "Label" , "rsvp.ifid_tlv.label" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_node_id , { "Node ID" , "rsvp.ifid_tlv.node_id" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_area , { "Area" , "rsvp.ifid_tlv.area" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_autonomous_system , { "Autonomous System" , "rsvp.ifid_tlv.autonomous_system" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_error_string , { "Error String" , "rsvp.ifid_tlv.error_string" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_data , { "Data" , "rsvp.ifid_tlv.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ifid_tlv_padding , { "Padding" , "rsvp.ifid_tlv.padding" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_hop_neighbor_address_ipv4 , { "Neighbor address" , "rsvp.hop.neighbor_address_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_hop_logical_interface , { "Logical interface" , "rsvp.hop.logical_interface" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_hop_neighbor_address_ipv6 , { "Neighbor address" , "rsvp.neighbor_address_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_hop_data , { "Data" , "rsvp.hop.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_time_values_data , { "Data" , "rsvp.time_values.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_error_error_node_ipv4 , { "Error node" , "rsvp.error.error_node_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_error_error_node_ipv6 , { "Error node" , "rsvp.error.error_node_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_error_data , { "Data" , "rsvp.error.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_error_error_code , { "Error code" , "rsvp.error.error_code" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & rsvp_error_codes_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_scope_ipv4_address , { "IPv4 Address" , "rsvp.scope.ipv4_address" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_scope_ipv6_address , { "IPv6 Address" , "rsvp.scope.ipv6_address" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_scope_data , { "Data" , "rsvp.scope.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_style_flags , { "Flags" , "rsvp.style.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_style_style , { "Style" , "rsvp.style.style" , FT_UINT24 , BASE_HEX , VALS ( style_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_style_data , { "Data" , "rsvp.style.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_confirm_receiver_address_ipv4 , { "Receiver address" , "rsvp.confirm.receiver_address_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_confirm_receiver_address_ipv6 , { "Receiver address" , "rsvp.confirm.receiver_address_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_confirm_data , { "Data" , "rsvp.confirm.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_template_filter_source_address_ipv6 , { "Source address" , "rsvp.template_filter.source_address_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_template_filter_source_port , { "Source port" , "rsvp.template_filter.source_port" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_template_filter_data , { "Data" , "rsvp.template_filter.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_length , { "Length" , "rsvp.eth_tspec.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_profile , { "Profile" , "rsvp.eth_tspec.profile" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_index , { "Index" , "rsvp.eth_tspec.index" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_reserved , { "Reserved" , "rsvp.eth_tspec.reserved" , FT_UINT16 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_el2cp , { "EL2CP" , "rsvp.eth_tspec.el2cp" , FT_UINT8 , BASE_DEC , VALS ( el2cp_val_str ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_il2cp , { "IL2CP" , "rsvp.eth_tspec.il2cp" , FT_UINT8 , BASE_DEC , VALS ( il2cp_val_str ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_cir , { "CIR" , "rsvp.eth_tspec.cir" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_cbs , { "CBS" , "rsvp.eth_tspec.cbs" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_eir , { "EIR" , "rsvp.eth_tspec.eir" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_eth_tspec_ebs , { "EBS" , "rsvp.eth_tspec.ebs" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_message_format_version , { "Message format version" , "rsvp.tspec.message_format_version" , FT_UINT8 , BASE_DEC , NULL , 0xF0 , NULL , HFILL } } , { & hf_rsvp_tspec_service_header , { "Service header" , "rsvp.tspec.service_header" , FT_UINT8 , BASE_DEC , VALS ( qos_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_token_bucket_rate , { "Token bucket rate" , "rsvp.tspec.token_bucket_rate" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_token_bucket_size , { "Token bucket size" , "rsvp.tspec.token_bucket_size" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_peak_data_rate , { "Peak data rate" , "rsvp.tspec.peak_data_rate" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_hint , { "Hint" , "rsvp.tspec.hint" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_compression_factor , { "Compression Factor" , "rsvp.tspec.compression_factor" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_signal_type_sonet , { "Signal Type" , "rsvp.tspec.signal_type" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & gmpls_sonet_signal_type_str_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_requested_concatenation , { "Requested Concatenation (RCC)" , "rsvp.tspec.requested_concatenation" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_number_of_contiguous_components , { "Number of Contiguous Components (NCC)" , "rsvp.tspec.number_of_contiguous_components" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_number_of_virtual_components , { "Number of Virtual Components (NVC)" , "rsvp.tspec.number_of_virtual_components" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_multiplier , { "Multiplier (MT)" , "rsvp.tspec.multiplier" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_transparency , { "Transparency (T)" , "rsvp.tspec.transparency" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_profile , { "Profile (P)" , "rsvp.tspec.profile" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_signal_type_g709 , { "Signal Type" , "rsvp.tspec.signal_type" , FT_UINT8 , BASE_DEC | BASE_RANGE_STRING , RVALS ( gmpls_g709_signal_type_rvals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_number_of_multiplexed_components , { "Number of Multiplexed Components (NMC)" , "rsvp.number_of_multiplexed_components" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_mtu , { "MTU" , "rsvp.tspec.mtu" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_tspec_data , { "Data" , "rsvp.tspec.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_message_format_version , { "Message format version" , "rsvp.flowspec.message_format_version" , FT_UINT8 , BASE_DEC , NULL , 0xF0 , NULL , HFILL } } , { & hf_rsvp_flowspec_service_header , { "Service header" , "rsvp.flowspec.service_header" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & intsrv_services_str_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_token_bucket_rate , { "Token bucket rate" , "rsvp.flowspec.token_bucket_rate" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_token_bucket_size , { "Token bucket size" , "rsvp.flowspec.token_bucket_size" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_peak_data_rate , { "Peak data rate" , "rsvp.flowspec.peak_data_rate" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_rate , { "Rate" , "rsvp.flowspec.rate" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_slack_term , { "Slack term" , "rsvp.flowspec.slack_term" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_signal_type_sonet , { "Signal Type" , "rsvp.flowspec.signal_type" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & gmpls_sonet_signal_type_str_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_requested_concatenation , { "Requested Concatenation (RCC)" , "rsvp.flowspec.requested_concatenation" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_number_of_contiguous_components , { "Number of Contiguous Components (NCC)" , "rsvp.flowspec.number_of_contiguous_components" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_number_of_virtual_components , { "Number of Virtual Components (NVC)" , "rsvp.flowspec.number_of_virtual_components" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_multiplier , { "Multiplier (MT)" , "rsvp.flowspec.multiplier" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_transparency , { "Transparency (T)" , "rsvp.flowspec.transparency" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_profile , { "Profile (P)" , "rsvp.flowspec.profile" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_signal_type_g709 , { "Signal Type" , "rsvp.flowspec.signal_type" , FT_UINT8 , BASE_DEC | BASE_RANGE_STRING , RVALS ( gmpls_g709_signal_type_rvals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_number_of_multiplexed_components , { "Number of Multiplexed Components (NMC)" , "rsvp.flowspec.number_of_multiplexed_components" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_flowspec_mtu , { "MTU" , "rsvp.flowspec.mtu" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_adspec_message_format_version , { "Message format version" , "rsvp.adspec.message_format_version" , FT_UINT8 , BASE_DEC , NULL , 0xF0 , NULL , HFILL } } , { & hf_rsvp_adspec_service_header , { "Service header" , "rsvp.adspec.service_header" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & intsrv_services_str_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_integrity_flags , { "Flags" , "rsvp.integrity.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_integrity_key_identifier , { "Key Identifier" , "rsvp.integrity.key_identifier" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_integrity_sequence_number , { "Sequence Number" , "rsvp.integrity.sequence_number" , FT_UINT64 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_integrity_hash , { "Hash" , "rsvp.integrity.hash" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_policy_data , { "Data" , "rsvp.policy.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_request_l3pid , { "L3PID" , "rsvp.label_request.l3pid" , FT_UINT16 , BASE_HEX , VALS ( etype_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_request_min_vpi , { "Min VPI" , "rsvp.label_request.min_vpi" , FT_UINT16 , BASE_DEC , NULL , 0x7f , NULL , HFILL } } , { & hf_rsvp_label_request_min_vci , { "Min VCI" , "rsvp.label_request.min_vci" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_request_max_vpi , { "Max VPI" , "rsvp.label_request.max_vpi" , FT_UINT16 , BASE_DEC , NULL , 0x7f , NULL , HFILL } } , { & hf_rsvp_label_request_max_vci , { "Max VCI" , "rsvp.label_request.max_vci" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_request_lsp_encoding_type , { "LSP Encoding Type" , "rsvp.label_request.lsp_encoding_type" , FT_UINT8 , BASE_DEC | BASE_RANGE_STRING , RVALS ( gmpls_lsp_enc_rvals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_request_switching_type , { "Switching Type" , "rsvp.label_request.switching_type" , FT_UINT8 , BASE_DEC | BASE_RANGE_STRING , RVALS ( gmpls_switching_type_rvals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_g_pid , { "G-PID" , "rsvp.label_request.g_pid" , FT_UINT16 , BASE_HEX | BASE_RANGE_STRING , RVALS ( gmpls_gpid_rvals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_request_data , { "Data" , "rsvp.label_request.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_label , { "Label" , "rsvp.label.label" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_generalized_label , { "Generalized Label" , "rsvp.label.generalized_label" , FT_UINT32 , BASE_DEC_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_generalized_label_evpl_vlad_id , { "VLAN ID" , "rsvp.label.generalized_label_evpl_vlad_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_data , { "Data" , "rsvp.label.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_set_action , { "Action" , "rsvp.label_set.action" , FT_UINT8 , BASE_DEC , VALS ( action_type_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_exclude_any , { "Exclude-Any" , "rsvp.session_attribute.exclude_any" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_include_any , { "Include-Any" , "rsvp.session_attribute.include_any" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_include_all , { "Include-All" , "rsvp.session_attribute.include_all" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_setup_priority , { "Setup priority" , "rsvp.session_attribute.setup_priority" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_hold_priority , { "Hold priority" , "rsvp.session_attribute.hold_priority" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_flags , { "Flags" , "rsvp.session_attribute.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_name_length , { "Name length" , "rsvp.session_attribute.name_length" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_name , { "Name" , "rsvp.session_attribute.name" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_session_attribute_data , { "Data" , "rsvp.session_attribute.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_length , { "Length" , "rsvp.ero_rro_subobjects.length" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_ipv4_hop , { "IPv4 hop" , "rsvp.ero_rro_subobjects.ipv4_hop" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_prefix_length , { "Prefix length" , "rsvp.ero_rro_subobjects.prefix_length" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_flags , { "Flags" , "rsvp.ero_rro_subobjects.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_ipv6_hop , { "IPv6 hop" , "rsvp.ero_rro_subobjects.ipv6_hop" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_label , { "Label" , "rsvp.ero_rro_subobjects.label" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_router_id , { "Router-ID" , "rsvp.ero_rro_subobjects.router_id" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_interface_id , { "Interface-ID" , "rsvp.ero_rro_subobjects.interface_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_path_key , { "Path Key" , "rsvp.ero_rro_subobjects.path_key" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_pce_id_ipv4 , { "PCE-ID" , "rsvp.ero_rro_subobjects.pce_id_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_pce_id_ipv6 , { "PCE-ID" , "rsvp.ero_rro_subobjects.pce_id_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_private_length , { "Length" , "rsvp.ero_rro_subobjects.private_length" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_subobjects_private_data , { "Data" , "rsvp.ero_rro_subobjects.private_data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_explicit_route_data , { "Data" , "rsvp.explicit_route.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_record_route_data , { "Data" , "rsvp.record_route.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_exclude_route_data , { "Data" , "rsvp.exclude_route.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_flags , { "Flags" , "rsvp.message_id.flags" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_epoch , { "Epoch" , "rsvp.message_id.epoch" , FT_UINT24 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_message_id , { "Message-ID" , "rsvp.message_id.message_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_data , { "Data" , "rsvp.message_id.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_ack_flags , { "Flags" , "rsvp.message_id_ack.flags" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_ack_epoch , { "Epoch" , "rsvp.message_id_ack.epoch" , FT_UINT24 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_ack_message_id , { "Message-ID" , "rsvp.message_id_ack.message_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_ack_data , { "Data" , "rsvp.message_id_ack.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_list_flags , { "Flags" , "rsvp.message_id_list.flags" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_list_epoch , { "Epoch" , "rsvp.message_id_list.epoch" , FT_UINT24 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_list_message_id , { "Message-ID" , "rsvp.message_id_list.message_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_id_list_data , { "Data" , "rsvp.message_id_list.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_hello_source_instance , { "Source Instance" , "rsvp.hello.source_instance" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_hello_destination_instance , { "Destination Instance" , "rsvp.hello.destination_instance" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_dclass_dscp , { "DSCP" , "rsvp.dclass.dscp" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & dscp_vals_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_dclass_data , { "Data" , "rsvp.dclass.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_admin_status_bits , { "Admin Status" , "rsvp.admin_status.bits" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_admin_status_data , { "Data" , "rsvp.admin_status.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_attributes_tlv , { "LSP attributes TLV" , "rsvp.lsp_attributes_tlv" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_attributes_tlv_data , { "Data" , "rsvp.lsp_attributes_tlv.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_type , { "Association type" , "rsvp.association.type" , FT_UINT16 , BASE_DEC , VALS ( association_type_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_id , { "Association ID" , "rsvp.association.id" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_source_ipv4 , { "Association source" , "rsvp.association.source_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_source_ipv6 , { "Association source" , "rsvp.association.source_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_routing_area_id , { "Routing Area ID" , "rsvp.association.routing_area_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_node_id , { "Node ID" , "rsvp.association.node_id" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_padding , { "Padding" , "rsvp.association.padding" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_association_data , { "Data" , "rsvp.association.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_length , { "Length" , "rsvp.lsp_tunnel_if_id.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_component_link_identifier , { "Component link identifier" , "rsvp.lsp_tunnel_if_id.component_link_identifier" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_component_link_identifier_ipv4 , { "Component link identifier" , "rsvp.lsp_tunnel_if_id.component_link_identifier_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_lsp_encoding_type , { "LSP Encoding Type" , "rsvp.lsp_tunnel_if_id.lsp_encoding_type" , FT_UINT8 , BASE_DEC | BASE_RANGE_STRING , RVALS ( gmpls_lsp_enc_rvals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_switching_type , { "Switching Type" , "rsvp.lsp_tunnel_if_id.switching_type" , FT_UINT8 , BASE_DEC | BASE_RANGE_STRING , RVALS ( gmpls_switching_type_rvals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_signal_type , { "Signal Type" , "rsvp.lsp_tunnel_if_id.signal_type" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & gmpls_sonet_signal_type_str_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_connection_id , { "Sub Interface/Connection ID" , "rsvp.lsp_tunnel_if_id.connection_id" , FT_UINT64 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_sc_pc_id , { "SC PC ID" , "rsvp.lsp_tunnel_if_id.sc_pc_id" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_sc_pc_scn_address , { "SC PC SCN Address" , "rsvp.lsp_tunnel_if_id.sc_pc_scn_address" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_router_id , { "Router ID" , "rsvp.lsp_tunnel_if_id.router_id" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_interface_id , { "Interface ID" , "rsvp.lsp_tunnel_if_id.interface_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_ipv4_interface_address , { "IPv4 interface address" , "rsvp.lsp_tunnel_if_id.ipv4_interface_address" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_target_igp_instance , { "Target IGP instance" , "rsvp.lsp_tunnel_if_id.target_igp_instance" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_action , { "Action" , "rsvp.lsp_tunnel_if_id.action" , FT_UINT8 , BASE_DEC , VALS ( lsp_tunnel_if_id_action_str ) , 0xF0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_ipv6_interface_address , { "IPv6 interface address" , "rsvp.lsp_tunnel_if_id.ipv6_interface_address" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_lsp_tunnel_if_id_data , { "Data" , "rsvp.lsp_tunnel_if_id.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_notify_request_notify_node_address_ipv4 , { "Notify node address" , "rsvp.notify_request.notify_node_address_ipv4" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_notify_request_notify_node_address_ipv6 , { "Notify node address" , "rsvp.notify_request.notify_node_address_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_notify_request_data , { "Data" , "rsvp.notify_request.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_call_id_data , { "Data" , "rsvp.call_id.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_call_id_address_type , { "Address type" , "rsvp.call_id.address_type" , FT_UINT8 , BASE_DEC , VALS ( address_type_vals ) , 0x0 , NULL , HFILL } } , { & hf_rsvp_call_id_reserved , { "Reserved" , "rsvp.call_id.reserved" , FT_UINT24 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_call_id_international_segment , { "International Segment" , "rsvp.call_id.international_segment" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_call_id_national_segment , { "National Segment" , "rsvp.call_id.national_segment" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_call_id_local_identifier , { "Local Identifier" , "rsvp.call_id.local_identifier" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_restart_cap_data , { "Data" , "rsvp.restart_cap.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_protection_info_link_flags , { "Link Flags" , "rsvp.protection_info.link_flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_protection_info_data , { "Data" , "rsvp.protection_info.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_setup_priority , { "Setup Priority" , "rsvp.fast_reroute.setup_priority" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_hold_priority , { "Hold Priority" , "rsvp.fast_reroute.hold_priority" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_hop_limit , { "Hop Limit" , "rsvp.fast_reroute.hop_limit" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_flags , { "Flags" , "rsvp.fast_reroute.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_bandwidth , { "Bandwidth" , "rsvp.fast_reroute.bandwidth" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_include_any , { "Include-Any" , "rsvp.fast_reroute.include_any" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_exclude_any , { "Exclude-Any" , "rsvp.fast_reroute.exclude_any" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_include_all , { "Include-All" , "rsvp.fast_reroute.include_all" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_fast_reroute_data , { "Data" , "rsvp.fast_reroute.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_detour_data , { "Data" , "rsvp.detour.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_diffserv_data , { "Data" , "rsvp.diffserv.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_diffserv_aware_te_data , { "Data" , "rsvp.diffserv_aware_te.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_version , { "RSVP Version" , "rsvp.version" , FT_UINT8 , BASE_DEC , NULL , 0xF0 , NULL , HFILL } } , { & hf_rsvp_flags , { "Flags" , "rsvp.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0F , NULL , HFILL } } , { & hf_rsvp_sending_ttl , { "Sending TTL" , "rsvp.sending_ttl" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_length , { "Message length" , "rsvp.message_length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_length , { "Length" , "rsvp.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_extended_tunnel_id , { "Extended Tunnel ID" , "rsvp.extended_tunnel_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_extended_tunnel_ipv6 , { "Extended Tunnel ID" , "rsvp.extended_tunnel_id_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_extended_tunnel , { "Extended Tunnel" , "rsvp.extended_tunnel" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_refresh_interval , { "Refresh interval" , "rsvp.refresh_interval" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_minimum_policed_unit , { "Minimum policed unit [m]" , "rsvp.minimum_policed_unit" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_maximum_packet_size , { "Maximum packet size [M]" , "rsvp.maximum_packet_size" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_hf_rsvp_adspec_break_bit , { "Break bit" , "rsvp.adspec.break_bit" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_label_request_m , { "M (Merge in Data Plane)" , "rsvp.label_request.m" , FT_BOOLEAN , 8 , TFS ( & tfs_can_cannot ) , 0x80 , NULL , HFILL } } , { & hf_rsvp_dlci_length , { "DLCI Length" , "rsvp.label_request.dlci_length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_min_dlci , { "Min DLCI" , "rsvp.label_request.min_dlci" , FT_UINT24 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_max_dlci , { "Max DLCI" , "rsvp.label_request.max_dlci" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ero_rro_autonomous_system , { "Autonomous System" , "rsvp.ero_rro_subobjects.autonomous_system" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_nsap_length , { "NSAP Length" , "rsvp.nsap_length" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_gen_uni_data , { "Data" , "rsvp.gen_uni.data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_gen_uni_logical_port_id , { "Logical Port ID" , "rsvp.gen_uni.logical_port_id" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_gen_uni_service_level , { "Service Level" , "rsvp.gen_uni.service_level" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_restart_cap_restart_time , { "Restart Time" , "rsvp.restart_cap.restart_time" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_restart_cap_recovery_time , { "Recovery Time" , "rsvp.restart_cap.recovery_time" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_detour_plr_id , { "PLR ID" , "rsvp.detour.plr_id" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_detour_avoid_node_id , { "Avoid Node ID" , "rsvp.detour.avoid_node_id" , FT_IPv4 , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_message_checksum , { "Message Checksum" , "rsvp.message_checksum" , FT_UINT16 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_call_attributes_endpont_id , { "Endpoint ID" , "rsvp.call_attributes.endpoint_id" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_isis_area_id , { "IS-IS Area Identifier" , "rsvp.isis_area_id" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_adspec_type , { "Adspec Type" , "rsvp.adspec.type" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & adspec_params_ext , 0x0 , NULL , HFILL } } , { & hf_rsvp_adspec_len , { "Length" , "rsvp.adspec.len" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_adspec_uint , { "Adspec uint" , "rsvp.adspec.uint" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_adspec_float , { "Adspec float" , "rsvp.adspec.float" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_adspec_bytes , { "Adspec bytes" , "rsvp.adspec.bytes" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_wavelength_freq , { "Freq" , "rsvp.wavelength.freq" , FT_FLOAT , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_wavelength_grid , { "Grid" , "rsvp.wavelength.grid" , FT_UINT8 , BASE_DEC , VALS ( lambda_grid_vals ) , 0xE0 , NULL , HFILL } } , { & hf_rsvp_wavelength_channel_spacing , { "Channel Spacing" , "rsvp.wavelength.channel_spacing" , FT_UINT8 , BASE_DEC , NULL , 0x1E , NULL , HFILL } } , { & hf_rsvp_wavelength_n , { "n" , "rsvp.wavelength.n" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_wavelength_wavelength , { "Wavelength" , "rsvp.wavelength.wavelength" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_sonet_s , { "S" , "rsvp.sonet.s" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_sonet_u , { "U" , "rsvp.sonet.u" , FT_UINT8 , BASE_DEC , NULL , 0xF0 , NULL , HFILL } } , { & hf_rsvp_sonet_k , { "K" , "rsvp.sonet.k" , FT_UINT8 , BASE_DEC , NULL , 0x0F , NULL , HFILL } } , { & hf_rsvp_sonet_l , { "L" , "rsvp.sonet.l" , FT_UINT8 , BASE_DEC , NULL , 0xF0 , NULL , HFILL } } , { & hf_rsvp_sonet_m , { "M" , "rsvp.sonet.m" , FT_UINT8 , BASE_DEC , NULL , 0x0F , NULL , HFILL } } , { & hf_rsvp_g709_t3 , { "t3" , "rsvp.g709.t3" , FT_UINT16 , BASE_DEC , NULL , 0x03F0 , NULL , HFILL } } , { & hf_rsvp_g709_t2 , { "t2" , "rsvp.g709.t2" , FT_UINT8 , BASE_DEC , NULL , 0x0E , NULL , HFILL } } , { & hf_rsvp_g709_t1 , { "t1" , "rsvp.g709.t1" , FT_UINT8 , BASE_DEC , NULL , 0x01 , NULL , HFILL } } , { & hf_rsvp_label_set_type , { "Label type" , "rsvp.label_set.type" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_label_set_subchannel , { "Subchannel" , "rsvp.label_set.subchannel" , FT_UINT32 , BASE_DEC_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_nsap_address , { "NSAP address" , "rsvp.nsap_address" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_class_diversity , { "Diversity" , "rsvp.class_diversity" , FT_UINT8 , BASE_DEC , VALS ( ouni_guni_diversity_str ) , 0xF0 , NULL , HFILL } } , { & hf_rsvp_egress_label_type , { "Label type" , "rsvp.egress.label_type" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_egress_label , { "Label" , "rsvp.egress.label" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_source_transport_network_addr , { "Source Transport Network addr" , "rsvp.source_transport_network_addr" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_ie_data , { "IE Data" , "rsvp.ie_data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_dst_port_range , { "Destination Port range" , "rsvp.3gpp_obj.pf_dst_port_range" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_rsvp_3gpp_obj_pf_src_port_range , { "Source Port range" , "rsvp.3gpp_obj.pf_src_port_range" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , } ; static ei_register_info ei [ ] = { { & ei_rsvp_invalid_length , { "rsvp.invalid_length" , PI_MALFORMED , PI_ERROR , "Invalid length" , EXPFILL } } , { & ei_rsvp_packet_filter_component , { "rsvp.packet_filter_component" , PI_UNDECODED , PI_WARN , "Not dissected Packet filter component" , EXPFILL } } , { & ei_rsvp_bundle_component_msg , { "rsvp.bundle_component_msg" , PI_UNDECODED , PI_WARN , "Bundle Component Messages Not Dissected" , EXPFILL } } , { & ei_rsvp_parameter , { "rsvp.parameter.unknown" , PI_PROTOCOL , PI_WARN , "Unknown parameter" , EXPFILL } } , { & ei_rsvp_adspec_type , { "rsvp.adspec.type.unknown" , PI_PROTOCOL , PI_WARN , "Unknown type" , EXPFILL } } , { & ei_rsvp_call_id_address_type , { "rsvp.call_id.address_type.unknown" , PI_PROTOCOL , PI_WARN , "Unknown Transport Network type" , EXPFILL } } , { & ei_rsvp_session_type , { "rsvp.session_type.unknown" , PI_PROTOCOL , PI_WARN , "Unknown session type" , EXPFILL } } , } ; expert_module_t * expert_rsvp ; gint * ett_tree [ TT_MAX ] ; for ( i = 0 ; i < TT_MAX ; i ++ ) { ett_treelist [ i ] = - 1 ; ett_tree [ i ] = & ( ett_treelist [ i ] ) ; } proto_rsvp = proto_register_protocol ( "Resource ReserVation Protocol (RSVP)" , "RSVP" , "rsvp" ) ; proto_rsvp_e2e1 = proto_register_protocol ( "Resource ReserVation Protocol (RSVP-E2EI)" , "RSVP-E2EI" , "rsvp-e2ei" ) ; proto_register_field_array ( proto_rsvp , rsvpf_info , array_length ( rsvpf_info ) ) ; proto_register_subtree_array ( ett_tree , array_length ( ett_tree ) ) ; expert_rsvp = expert_register_protocol ( proto_rsvp ) ; expert_register_field_array ( expert_rsvp , ei , array_length ( ei ) ) ; register_rsvp_prefs ( ) ; register_init_routine ( & rsvp_init_protocol ) ; register_cleanup_routine ( & rsvp_cleanup_protocol ) ; register_conversation_table ( proto_rsvp , TRUE , rsvp_conversation_packet , rsvp_hostlist_packet ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
char * jas_image_fmttostr ( int fmt ) { jas_image_fmtinfo_t * fmtinfo ; if ( ! ( fmtinfo = jas_image_lookupfmtbyid ( fmt ) ) ) { return 0 ; } return fmtinfo -> name ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void set_indic_properties ( hb_glyph_info_t & info ) { hb_codepoint_t u = info . codepoint ; unsigned int type = hb_indic_get_categories ( u ) ; indic_category_t cat = ( indic_category_t ) ( type & 0x7Fu ) ; indic_position_t pos = ( indic_position_t ) ( type >> 8 ) ; if ( unlikely ( hb_in_ranges ( u , 0x0951u , 0x0952u , 0x1CD0u , 0x1CD2u , 0x1CD4u , 0x1CE1u ) || u == 0x1CF4u ) ) cat = OT_A ; else if ( unlikely ( hb_in_range ( u , 0x0953u , 0x0954u ) ) ) cat = OT_SM ; else if ( unlikely ( hb_in_ranges ( u , 0x0A72u , 0x0A73u , 0x1CF5u , 0x1CF6u ) ) ) cat = OT_C ; else if ( unlikely ( hb_in_range ( u , 0x1CE2u , 0x1CE8u ) ) ) cat = OT_A ; else if ( unlikely ( u == 0x1CEDu ) ) cat = OT_A ; else if ( unlikely ( hb_in_ranges ( u , 0xA8F2u , 0xA8F7u , 0x1CE9u , 0x1CECu , 0x1CEEu , 0x1CF1u ) ) ) { cat = OT_Symbol ; ASSERT_STATIC ( ( int ) INDIC_SYLLABIC_CATEGORY_AVAGRAHA == OT_Symbol ) ; } else if ( unlikely ( hb_in_range ( u , 0x17CDu , 0x17D1u ) || u == 0x17CBu || u == 0x17D3u || u == 0x17DDu ) ) { cat = OT_M ; pos = POS_ABOVE_C ; } else if ( unlikely ( u == 0x17C6u ) ) cat = OT_N ; else if ( unlikely ( u == 0x17D2u ) ) cat = OT_Coeng ; else if ( unlikely ( hb_in_range ( u , 0x2010u , 0x2011u ) ) ) cat = OT_PLACEHOLDER ; else if ( unlikely ( u == 0x25CCu ) ) cat = OT_DOTTEDCIRCLE ; else if ( unlikely ( u == 0xA982u ) ) cat = OT_SM ; else if ( unlikely ( u == 0xA9BEu ) ) cat = OT_CM2 ; else if ( unlikely ( u == 0xA9BDu ) ) { cat = OT_M ; pos = POS_POST_C ; } if ( ( FLAG_SAFE ( cat ) & CONSONANT_FLAGS ) ) { pos = POS_BASE_C ; if ( is_ra ( u ) ) cat = OT_Ra ; } else if ( cat == OT_M ) { pos = matra_position ( u , pos ) ; } else if ( ( FLAG_SAFE ( cat ) & ( FLAG ( OT_SM ) | FLAG ( OT_VD ) | FLAG ( OT_A ) | FLAG ( OT_Symbol ) ) ) ) { pos = POS_SMVD ; } if ( unlikely ( u == 0x0B01u ) ) pos = POS_BEFORE_SUB ; info . indic_category ( ) = cat ; info . indic_position ( ) = pos ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
rfbBool rfbSendFileTransferChunk ( rfbClientPtr cl ) { unsigned char readBuf [ sz_rfbBlockSize ] ; int bytesRead = 0 ; int retval = 0 ; fd_set wfds ; struct timeval tv ; int n ; # ifdef LIBVNCSERVER_HAVE_LIBZ unsigned char compBuf [ sz_rfbBlockSize + 1024 ] ; unsigned long nMaxCompSize = sizeof ( compBuf ) ; int nRetC = 0 ; # endif if ( cl -> screen -> permitFileTransfer != TRUE || ( cl -> screen -> getFileTransferPermission != NULL && cl -> screen -> getFileTransferPermission ( cl ) != TRUE ) ) { return TRUE ; } if ( ( cl -> fileTransfer . fd != - 1 ) && ( cl -> fileTransfer . sending == 1 ) ) { FD_ZERO ( & wfds ) ; FD_SET ( cl -> sock , & wfds ) ; tv . tv_sec = 0 ; tv . tv_usec = 0 ; n = select ( cl -> sock + 1 , NULL , & wfds , NULL , & tv ) ; if ( n < 0 ) { # ifdef WIN32 errno = WSAGetLastError ( ) ; # endif rfbLog ( "rfbSendFileTransferChunk() select failed: %s\n" , strerror ( errno ) ) ; } if ( n > 0 ) { bytesRead = read ( cl -> fileTransfer . fd , readBuf , sz_rfbBlockSize ) ; switch ( bytesRead ) { case 0 : retval = rfbSendFileTransferMessage ( cl , rfbEndOfFile , 0 , 0 , 0 , NULL ) ; close ( cl -> fileTransfer . fd ) ; cl -> fileTransfer . fd = - 1 ; cl -> fileTransfer . sending = 0 ; cl -> fileTransfer . receiving = 0 ; return retval ; case - 1 : # ifdef WIN32 errno = WSAGetLastError ( ) ; # endif rfbLog ( "rfbSendFileTransferChunk(): %s\n" , strerror ( errno ) ) ; retval = rfbSendFileTransferMessage ( cl , rfbAbortFileTransfer , 0 , 0 , 0 , NULL ) ; close ( cl -> fileTransfer . fd ) ; cl -> fileTransfer . fd = - 1 ; cl -> fileTransfer . sending = 0 ; cl -> fileTransfer . receiving = 0 ; return retval ; default : if ( ! cl -> fileTransfer . compressionEnabled ) return rfbSendFileTransferMessage ( cl , rfbFilePacket , 0 , 0 , bytesRead , ( char * ) readBuf ) ; else { # ifdef LIBVNCSERVER_HAVE_LIBZ nRetC = compress ( compBuf , & nMaxCompSize , readBuf , bytesRead ) ; if ( ( nRetC == 0 ) && ( nMaxCompSize < bytesRead ) ) return rfbSendFileTransferMessage ( cl , rfbFilePacket , 0 , 1 , nMaxCompSize , ( char * ) compBuf ) ; else return rfbSendFileTransferMessage ( cl , rfbFilePacket , 0 , 0 , bytesRead , ( char * ) readBuf ) ; # else return rfbSendFileTransferMessage ( cl , rfbFilePacket , 0 , 0 , bytesRead , ( char * ) readBuf ) ; # endif } } } } return TRUE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
guint16 de_serv_cat ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len _U_ , gchar * add_string _U_ , int string_len _U_ ) { guint32 curr_offset ; curr_offset = offset ; proto_tree_add_bits_item ( tree , hf_gsm_a_spare_bits , tvb , curr_offset << 3 , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( tree , hf_gsm_a_dtap_serv_cat_b7 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( tree , hf_gsm_a_dtap_serv_cat_b6 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( tree , hf_gsm_a_dtap_serv_cat_b5 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( tree , hf_gsm_a_dtap_serv_cat_b4 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( tree , hf_gsm_a_dtap_serv_cat_b3 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( tree , hf_gsm_a_dtap_serv_cat_b2 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( tree , hf_gsm_a_dtap_serv_cat_b1 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; curr_offset ++ ; return len ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int qemuMonitorTextStartCPUs ( qemuMonitorPtr mon , virConnectPtr conn ) { char * reply ; if ( qemuMonitorTextCommandWithHandler ( mon , "cont" , qemuMonitorSendDiskPassphrase , conn , - 1 , & reply ) < 0 ) return - 1 ; VIR_FREE ( reply ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void mss4_update_dc_cache ( MSS4Context * c , int mb_x ) { int i ; c -> dc_cache [ 0 ] [ TOP ] = c -> prev_dc [ 0 ] [ mb_x * 2 + 1 ] ; c -> dc_cache [ 0 ] [ LEFT ] = 0 ; c -> dc_cache [ 1 ] [ TOP ] = 0 ; c -> dc_cache [ 1 ] [ LEFT ] = 0 ; for ( i = 0 ; i < 2 ; i ++ ) c -> prev_dc [ 0 ] [ mb_x * 2 + i ] = 0 ; for ( i = 1 ; i < 3 ; i ++ ) { c -> dc_cache [ i + 1 ] [ TOP ] = c -> prev_dc [ i ] [ mb_x ] ; c -> dc_cache [ i + 1 ] [ LEFT ] = 0 ; c -> prev_dc [ i ] [ mb_x ] = 0 ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int kvm_has_pit_state2 ( void ) { return has_pit_state2 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static bool equivalent_locale ( int category , const char * loca , const char * locb ) { const char * chara ; const char * charb ; char * canona ; char * canonb ; int lena ; int lenb ; if ( pg_strcasecmp ( loca , locb ) == 0 ) return true ; canona = get_canonical_locale_name ( category , loca ) ; chara = strrchr ( canona , '.' ) ; lena = chara ? ( chara - canona ) : strlen ( canona ) ; canonb = get_canonical_locale_name ( category , locb ) ; charb = strrchr ( canonb , '.' ) ; lenb = charb ? ( charb - canonb ) : strlen ( canonb ) ; if ( lena == lenb && pg_strncasecmp ( canona , canonb , lena ) == 0 ) { pg_free ( canona ) ; pg_free ( canonb ) ; return true ; } pg_free ( canona ) ; pg_free ( canonb ) ; return false ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static Pattern_Prefix_Status like_fixed_prefix ( Const * patt_const , bool case_insensitive , Oid collation , Const * * prefix_const , Selectivity * rest_selec ) { char * match ; char * patt ; int pattlen ; Oid typeid = patt_const -> consttype ; int pos , match_pos ; bool is_multibyte = ( pg_database_encoding_max_length ( ) > 1 ) ; pg_locale_t locale = 0 ; bool locale_is_c = false ; Assert ( typeid == BYTEAOID || typeid == TEXTOID ) ; if ( case_insensitive ) { if ( typeid == BYTEAOID ) ereport ( ERROR , ( errcode ( ERRCODE_FEATURE_NOT_SUPPORTED ) , errmsg ( "case insensitive matching not supported on type bytea" ) ) ) ; if ( lc_ctype_is_c ( collation ) ) locale_is_c = true ; else if ( collation != DEFAULT_COLLATION_OID ) { if ( ! OidIsValid ( collation ) ) { ereport ( ERROR , ( errcode ( ERRCODE_INDETERMINATE_COLLATION ) , errmsg ( "could not determine which collation to use for ILIKE" ) , errhint ( "Use the COLLATE clause to set the collation explicitly." ) ) ) ; } locale = pg_newlocale_from_collation ( collation ) ; } } if ( typeid != BYTEAOID ) { patt = TextDatumGetCString ( patt_const -> constvalue ) ; pattlen = strlen ( patt ) ; } else { bytea * bstr = DatumGetByteaP ( patt_const -> constvalue ) ; pattlen = VARSIZE ( bstr ) - VARHDRSZ ; patt = ( char * ) palloc ( pattlen ) ; memcpy ( patt , VARDATA ( bstr ) , pattlen ) ; if ( ( Pointer ) bstr != DatumGetPointer ( patt_const -> constvalue ) ) pfree ( bstr ) ; } match = palloc ( pattlen + 1 ) ; match_pos = 0 ; for ( pos = 0 ; pos < pattlen ; pos ++ ) { if ( patt [ pos ] == '%' || patt [ pos ] == '_' ) break ; if ( patt [ pos ] == '\\' ) { pos ++ ; if ( pos >= pattlen ) break ; } if ( case_insensitive && pattern_char_isalpha ( patt [ pos ] , is_multibyte , locale , locale_is_c ) ) break ; match [ match_pos ++ ] = patt [ pos ] ; } match [ match_pos ] = '\0' ; if ( typeid != BYTEAOID ) * prefix_const = string_to_const ( match , typeid ) ; else * prefix_const = string_to_bytea_const ( match , match_pos ) ; if ( rest_selec != NULL ) * rest_selec = like_selectivity ( & patt [ pos ] , pattlen - pos , case_insensitive ) ; pfree ( patt ) ; pfree ( match ) ; if ( pos == pattlen ) return Pattern_Prefix_Exact ; if ( match_pos > 0 ) return Pattern_Prefix_Partial ; return Pattern_Prefix_None ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static bool check_for_exec ( const_os_ptr op ) { if ( ! r_has_attr ( op , a_execute ) && ref_type_uses_access ( r_type ( op ) ) && ( r_has_attr ( op , a_executable ) || ! r_has_type ( op , t_dictionary ) ) ) { return_error ( gs_error_invalidaccess ) ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static GstFlowReturn gst_asf_demux_process_simple_index ( GstASFDemux * demux , guint8 * data , guint64 size ) { GstClockTime interval ; guint32 count , i ; if ( size < ( 16 + 8 + 4 + 4 ) ) goto not_enough_data ; gst_asf_demux_skip_bytes ( 16 , & data , & size ) ; interval = gst_asf_demux_get_uint64 ( & data , & size ) * ( GstClockTime ) 100 ; gst_asf_demux_skip_bytes ( 4 , & data , & size ) ; count = gst_asf_demux_get_uint32 ( & data , & size ) ; if ( count > 0 ) { demux -> sidx_interval = interval ; demux -> sidx_num_entries = count ; g_free ( demux -> sidx_entries ) ; demux -> sidx_entries = g_new0 ( AsfSimpleIndexEntry , count ) ; for ( i = 0 ; i < count ; ++ i ) { if ( G_UNLIKELY ( size < 6 ) ) { demux -> sidx_num_entries -= ( count - i ) ; break ; } demux -> sidx_entries [ i ] . packet = gst_asf_demux_get_uint32 ( & data , & size ) ; demux -> sidx_entries [ i ] . count = gst_asf_demux_get_uint16 ( & data , & size ) ; GST_LOG_OBJECT ( demux , "%" GST_TIME_FORMAT " = packet %4u count : %2d" , GST_TIME_ARGS ( i * interval ) , demux -> sidx_entries [ i ] . packet , demux -> sidx_entries [ i ] . count ) ; } } else { GST_DEBUG_OBJECT ( demux , "simple index object with 0 entries" ) ; } return GST_FLOW_OK ; not_enough_data : { GST_WARNING_OBJECT ( demux , "short read parsing simple index object!" ) ; return GST_FLOW_OK ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static uint64_t dchip_read ( void * opaque , hwaddr addr , unsigned size ) { return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
wtap_open_return_val ngsniffer_open ( wtap * wth , int * err , gchar * * err_info ) { char magic [ sizeof ngsniffer_magic ] ; char record_type [ 2 ] ; char record_length [ 4 ] ; guint16 type ; struct vers_rec version ; guint16 maj_vers ; guint16 start_date ; # if 0 guint16 start_time ; # endif static const int sniffer_encap [ ] = { WTAP_ENCAP_TOKEN_RING , WTAP_ENCAP_ETHERNET , WTAP_ENCAP_ARCNET , WTAP_ENCAP_UNKNOWN , WTAP_ENCAP_UNKNOWN , WTAP_ENCAP_UNKNOWN , WTAP_ENCAP_UNKNOWN , WTAP_ENCAP_PER_PACKET , WTAP_ENCAP_PER_PACKET , WTAP_ENCAP_FDDI_BITSWAPPED , WTAP_ENCAP_ATM_PDUS } ; # define NUM_NGSNIFF_ENCAPS ( sizeof sniffer_encap / sizeof sniffer_encap [ 0 ] ) struct tm tm ; gint64 current_offset ; ngsniffer_t * ngsniffer ; if ( ! wtap_read_bytes ( wth -> fh , magic , sizeof magic , err , err_info ) ) { if ( * err != WTAP_ERR_SHORT_READ ) return WTAP_OPEN_ERROR ; return WTAP_OPEN_NOT_MINE ; } if ( memcmp ( magic , ngsniffer_magic , sizeof ngsniffer_magic ) ) { return WTAP_OPEN_NOT_MINE ; } if ( ! wtap_read_bytes ( wth -> fh , record_type , 2 , err , err_info ) ) return WTAP_OPEN_ERROR ; if ( ! wtap_read_bytes ( wth -> fh , record_length , 4 , err , err_info ) ) return WTAP_OPEN_ERROR ; type = pletoh16 ( record_type ) ; if ( type != REC_VERS ) { * err = WTAP_ERR_BAD_FILE ; * err_info = g_strdup_printf ( "ngsniffer: Sniffer file doesn't start with a version record" ) ; return WTAP_OPEN_ERROR ; } if ( ! wtap_read_bytes ( wth -> fh , & version , sizeof version , err , err_info ) ) return WTAP_OPEN_ERROR ; if ( version . network >= NUM_NGSNIFF_ENCAPS || sniffer_encap [ version . network ] == WTAP_ENCAP_UNKNOWN ) { * err = WTAP_ERR_UNSUPPORTED ; * err_info = g_strdup_printf ( "ngsniffer: network type %u unknown or unsupported" , version . network ) ; return WTAP_OPEN_ERROR ; } if ( version . timeunit >= NUM_NGSNIFF_TIMEUNITS ) { * err = WTAP_ERR_UNSUPPORTED ; * err_info = g_strdup_printf ( "ngsniffer: Unknown timeunit %u" , version . timeunit ) ; return WTAP_OPEN_ERROR ; } if ( version . format != 1 ) { wth -> file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_NGSNIFFER_COMPRESSED ; } else { wth -> file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_NGSNIFFER_UNCOMPRESSED ; } wth -> file_encap = sniffer_encap [ version . network ] ; maj_vers = pletoh16 ( & version . maj_vers ) ; if ( process_header_records ( wth , err , err_info , maj_vers , version . network ) < 0 ) return WTAP_OPEN_ERROR ; if ( ( version . network == NETWORK_SYNCHRO || version . network == NETWORK_ASYNC ) && wth -> file_encap == WTAP_ENCAP_PER_PACKET ) { switch ( maj_vers ) { case 1 : switch ( pletoh16 ( & version . rsvd [ 0 ] ) ) { case 1 : case 2 : wth -> file_encap = WTAP_ENCAP_ISDN ; break ; } break ; case 3 : wth -> file_encap = WTAP_ENCAP_FRELAY_WITH_PHDR ; break ; } } current_offset = file_tell ( wth -> fh ) ; if ( wth -> random_fh != NULL ) { if ( file_seek ( wth -> random_fh , current_offset , SEEK_SET , err ) == - 1 ) return WTAP_OPEN_ERROR ; } ngsniffer = ( ngsniffer_t * ) g_malloc ( sizeof ( ngsniffer_t ) ) ; wth -> priv = ( void * ) ngsniffer ; ngsniffer -> maj_vers = maj_vers ; ngsniffer -> min_vers = pletoh16 ( & version . min_vers ) ; ngsniffer -> seq . buf = NULL ; ngsniffer -> seq . nbytes = 0 ; ngsniffer -> seq . nextout = 0 ; ngsniffer -> rand . buf = NULL ; ngsniffer -> rand . nbytes = 0 ; ngsniffer -> rand . nextout = 0 ; ngsniffer -> seq . uncomp_offset = current_offset ; ngsniffer -> seq . comp_offset = current_offset ; ngsniffer -> rand . uncomp_offset = current_offset ; ngsniffer -> rand . comp_offset = current_offset ; ngsniffer -> first_blob = NULL ; ngsniffer -> last_blob = NULL ; ngsniffer -> current_blob = NULL ; wth -> subtype_read = ngsniffer_read ; wth -> subtype_seek_read = ngsniffer_seek_read ; wth -> subtype_sequential_close = ngsniffer_sequential_close ; wth -> subtype_close = ngsniffer_close ; wth -> snapshot_length = 0 ; ngsniffer -> timeunit = Psec [ version . timeunit ] ; ngsniffer -> network = version . network ; start_date = pletoh16 ( & version . date ) ; tm . tm_year = ( ( start_date & DOS_YEAR_MASK ) >> DOS_YEAR_SHIFT ) + DOS_YEAR_OFFSET ; tm . tm_mon = ( ( start_date & DOS_MONTH_MASK ) >> DOS_MONTH_SHIFT ) + DOS_MONTH_OFFSET ; tm . tm_mday = ( ( start_date & DOS_DAY_MASK ) >> DOS_DAY_SHIFT ) ; # if 0 start_time = pletoh16 ( & version . time ) ; tm . tm_hour = ( start_time & 0xf800 ) >> 11 ; tm . tm_min = ( start_time & 0x7e0 ) >> 5 ; tm . tm_sec = ( start_time & 0x1f ) << 1 ; # endif tm . tm_hour = 0 ; tm . tm_min = 0 ; tm . tm_sec = 0 ; tm . tm_isdst = - 1 ; ngsniffer -> start = mktime ( & tm ) ; wth -> file_tsprec = WTAP_TSPREC_NSEC ; return WTAP_OPEN_MINE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void do_info_qtree ( Monitor * mon ) { if ( main_system_bus ) qbus_print ( mon , main_system_bus , 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_T_extendedPAR ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_constrained_set_of ( tvb , offset , actx , tree , hf_index , ett_h245_T_extendedPAR , T_extendedPAR_set_of , 1 , 256 , FALSE ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int decrypt_nss_2_3 ( struct crypto_instance * instance , unsigned char * buf , int * buf_len ) { * buf_len -= sizeof ( struct crypto_config_header ) ; if ( decrypt_nss ( instance , buf + sizeof ( struct crypto_config_header ) , buf_len ) < 0 ) { return - 1 ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void read_variables ( struct recvbuf * rbufp , int restrict_mask ) { if ( res_associd ) read_peervars ( ) ; else read_sysvars ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void aes_crypt_ecb ( aes_context * ctx , int mode , const unsigned char input [ 16 ] , unsigned char output [ 16 ] ) { int i ; unsigned long * RK , X0 , X1 , X2 , X3 , Y0 , Y1 , Y2 , Y3 ; # if defined ( XYSSL_PADLOCK_C ) && defined ( XYSSL_HAVE_X86 ) if ( padlock_supports ( PADLOCK_ACE ) ) { if ( padlock_xcryptecb ( ctx , mode , input , output ) == 0 ) return ; } # endif RK = ctx -> rk ; GET_ULONG_LE ( X0 , input , 0 ) ; X0 ^= * RK ++ ; GET_ULONG_LE ( X1 , input , 4 ) ; X1 ^= * RK ++ ; GET_ULONG_LE ( X2 , input , 8 ) ; X2 ^= * RK ++ ; GET_ULONG_LE ( X3 , input , 12 ) ; X3 ^= * RK ++ ; if ( mode == AES_DECRYPT ) { for ( i = ( ctx -> nr >> 1 ) - 1 ; i > 0 ; i -- ) { AES_RROUND ( Y0 , Y1 , Y2 , Y3 , X0 , X1 , X2 , X3 ) ; AES_RROUND ( X0 , X1 , X2 , X3 , Y0 , Y1 , Y2 , Y3 ) ; } AES_RROUND ( Y0 , Y1 , Y2 , Y3 , X0 , X1 , X2 , X3 ) ; X0 = * RK ++ ^ ( RSb [ ( Y0 ) & 0xFF ] ) ^ ( RSb [ ( Y3 >> 8 ) & 0xFF ] << 8 ) ^ ( RSb [ ( Y2 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) RSb [ ( Y1 >> 24 ) & 0xFF ] ) << 24 ) ; X1 = * RK ++ ^ ( RSb [ ( Y1 ) & 0xFF ] ) ^ ( RSb [ ( Y0 >> 8 ) & 0xFF ] << 8 ) ^ ( RSb [ ( Y3 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) RSb [ ( Y2 >> 24 ) & 0xFF ] ) << 24 ) ; X2 = * RK ++ ^ ( RSb [ ( Y2 ) & 0xFF ] ) ^ ( RSb [ ( Y1 >> 8 ) & 0xFF ] << 8 ) ^ ( RSb [ ( Y0 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) RSb [ ( Y3 >> 24 ) & 0xFF ] ) << 24 ) ; X3 = * RK ++ ^ ( RSb [ ( Y3 ) & 0xFF ] ) ^ ( RSb [ ( Y2 >> 8 ) & 0xFF ] << 8 ) ^ ( RSb [ ( Y1 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) RSb [ ( Y0 >> 24 ) & 0xFF ] ) << 24 ) ; } else { for ( i = ( ctx -> nr >> 1 ) - 1 ; i > 0 ; i -- ) { AES_FROUND ( Y0 , Y1 , Y2 , Y3 , X0 , X1 , X2 , X3 ) ; AES_FROUND ( X0 , X1 , X2 , X3 , Y0 , Y1 , Y2 , Y3 ) ; } AES_FROUND ( Y0 , Y1 , Y2 , Y3 , X0 , X1 , X2 , X3 ) ; X0 = * RK ++ ^ ( FSb [ ( Y0 ) & 0xFF ] ) ^ ( FSb [ ( Y1 >> 8 ) & 0xFF ] << 8 ) ^ ( FSb [ ( Y2 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) FSb [ ( Y3 >> 24 ) & 0xFF ] ) << 24 ) ; X1 = * RK ++ ^ ( FSb [ ( Y1 ) & 0xFF ] ) ^ ( FSb [ ( Y2 >> 8 ) & 0xFF ] << 8 ) ^ ( FSb [ ( Y3 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) FSb [ ( Y0 >> 24 ) & 0xFF ] ) << 24 ) ; X2 = * RK ++ ^ ( FSb [ ( Y2 ) & 0xFF ] ) ^ ( FSb [ ( Y3 >> 8 ) & 0xFF ] << 8 ) ^ ( FSb [ ( Y0 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) FSb [ ( Y1 >> 24 ) & 0xFF ] ) << 24 ) ; X3 = * RK ++ ^ ( FSb [ ( Y3 ) & 0xFF ] ) ^ ( FSb [ ( Y0 >> 8 ) & 0xFF ] << 8 ) ^ ( FSb [ ( Y1 >> 16 ) & 0xFF ] << 16 ) ^ ( ( ( unsigned int ) FSb [ ( Y2 >> 24 ) & 0xFF ] ) << 24 ) ; } PUT_ULONG_LE ( X0 , output , 0 ) ; PUT_ULONG_LE ( X1 , output , 4 ) ; PUT_ULONG_LE ( X2 , output , 8 ) ; PUT_ULONG_LE ( X3 , output , 12 ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void add_range ( fz_context * ctx , pdf_cmap * cmap , unsigned int low , unsigned int high , unsigned int out , int check_for_overlap , int many ) { int current ; cmap_splay * tree ; if ( low > high ) { fz_warn ( ctx , "range limits out of range in cmap %s" , cmap -> cmap_name ) ; return ; } tree = cmap -> tree ; if ( cmap -> tlen ) { unsigned int move = cmap -> ttop ; unsigned int gt = EMPTY ; unsigned int lt = EMPTY ; if ( check_for_overlap ) { do { current = move ; if ( low <= tree [ current ] . low && tree [ current ] . low <= high ) { tree [ current ] . out += high + 1 - tree [ current ] . low ; tree [ current ] . low = high + 1 ; if ( tree [ current ] . low > tree [ current ] . high ) { move = delete_node ( cmap , current ) ; current = EMPTY ; continue ; } } else if ( low <= tree [ current ] . high && tree [ current ] . high <= high ) { tree [ current ] . high = low - 1 ; assert ( tree [ current ] . low <= tree [ current ] . high ) ; } else if ( tree [ current ] . low < low && high < tree [ current ] . high ) { int new_high = tree [ current ] . high ; tree [ current ] . high = low - 1 ; add_range ( ctx , cmap , high + 1 , new_high , tree [ current ] . out + high + 1 - tree [ current ] . low , 0 , tree [ current ] . many ) ; } if ( tree [ current ] . low > high ) { move = tree [ current ] . left ; gt = current ; } else { move = tree [ current ] . right ; lt = current ; } } while ( move != EMPTY ) ; } else { do { current = move ; if ( tree [ current ] . low > high ) { move = tree [ current ] . left ; gt = current ; } else { move = tree [ current ] . right ; lt = current ; } } while ( move != EMPTY ) ; } if ( ! many ) { if ( lt != EMPTY && ! tree [ lt ] . many && tree [ lt ] . high == low - 1 && tree [ lt ] . out - tree [ lt ] . low == out - low ) { tree [ lt ] . high = high ; if ( gt != EMPTY && ! tree [ gt ] . many && tree [ gt ] . low == high + 1 && tree [ gt ] . out - tree [ gt ] . low == out - low ) { tree [ lt ] . high = tree [ gt ] . high ; delete_node ( cmap , gt ) ; } goto exit ; } if ( gt != EMPTY && ! tree [ gt ] . many && tree [ gt ] . low == high + 1 && tree [ gt ] . out - tree [ gt ] . low == out - low ) { tree [ gt ] . low = low ; tree [ gt ] . out = out ; goto exit ; } } } else current = EMPTY ; if ( cmap -> tlen == cmap -> tcap ) { int new_cap = cmap -> tcap ? cmap -> tcap * 2 : 256 ; tree = cmap -> tree = fz_resize_array ( ctx , cmap -> tree , new_cap , sizeof * cmap -> tree ) ; cmap -> tcap = new_cap ; } tree [ cmap -> tlen ] . low = low ; tree [ cmap -> tlen ] . high = high ; tree [ cmap -> tlen ] . out = out ; tree [ cmap -> tlen ] . parent = current ; tree [ cmap -> tlen ] . left = EMPTY ; tree [ cmap -> tlen ] . right = EMPTY ; tree [ cmap -> tlen ] . many = many ; cmap -> tlen ++ ; if ( current == EMPTY ) cmap -> ttop = 0 ; else if ( tree [ current ] . low > high ) tree [ current ] . left = cmap -> tlen - 1 ; else { assert ( tree [ current ] . high < low ) ; tree [ current ] . right = cmap -> tlen - 1 ; } move_to_root ( tree , cmap -> tlen - 1 ) ; cmap -> ttop = cmap -> tlen - 1 ; exit : { } # ifdef CHECK_SPLAY check_splay ( cmap -> tree , cmap -> ttop , 0 ) ; # endif # ifdef DUMP_SPLAY dump_splay ( cmap -> tree , cmap -> ttop , 0 , "" ) ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int RTP_packet ( void * ptr _U_ , packet_info * pinfo , epan_dissect_t * edt _U_ , void const * RTPinfo ) { voip_rtp_tapinfo_t * tapinfo = & the_tapinfo_rtp_struct ; voip_rtp_stream_info_t * tmp_listinfo ; voip_rtp_stream_info_t * strinfo = NULL ; GList * list ; struct _rtp_conversation_info * p_conv_data = NULL ; const struct _rtp_info * pi = ( const struct _rtp_info * ) RTPinfo ; if ( pi -> info_setup_frame_num == 0 ) { return 0 ; } # ifdef HAVE_LIBPORTAUDIO add_rtp_packet ( pi , pinfo ) ; # endif list = g_list_first ( tapinfo -> list ) ; while ( list ) { tmp_listinfo = ( voip_rtp_stream_info_t * ) list -> data ; if ( ( tmp_listinfo -> setup_frame_number == pi -> info_setup_frame_num ) && ( tmp_listinfo -> ssrc == pi -> info_sync_src ) && ( tmp_listinfo -> end_stream == FALSE ) ) { if ( tmp_listinfo -> pt != pi -> info_payload_type ) { tmp_listinfo -> end_stream = TRUE ; } else { strinfo = ( voip_rtp_stream_info_t * ) ( list -> data ) ; break ; } } list = g_list_next ( list ) ; } if ( ( rtp_evt_frame_num == pinfo -> fd -> num ) && ! strinfo && ( rtp_evt_end == TRUE ) ) { return 0 ; } if ( strinfo == NULL ) { strinfo = ( voip_rtp_stream_info_t * ) g_malloc ( sizeof ( voip_rtp_stream_info_t ) ) ; COPY_ADDRESS ( & ( strinfo -> src_addr ) , & ( pinfo -> src ) ) ; strinfo -> src_port = pinfo -> srcport ; COPY_ADDRESS ( & ( strinfo -> dest_addr ) , & ( pinfo -> dst ) ) ; strinfo -> dest_port = pinfo -> destport ; strinfo -> ssrc = pi -> info_sync_src ; strinfo -> end_stream = FALSE ; strinfo -> pt = pi -> info_payload_type ; strinfo -> pt_str = NULL ; strinfo -> is_srtp = pi -> info_is_srtp ; if ( ( strinfo -> pt >= PT_UNDF_96 ) && ( strinfo -> pt <= PT_UNDF_127 ) ) { p_conv_data = ( struct _rtp_conversation_info * ) p_get_proto_data ( wmem_file_scope ( ) , pinfo , proto_get_id_by_filter_name ( "rtp" ) , 0 ) ; if ( p_conv_data && p_conv_data -> rtp_dyn_payload ) { encoding_name_and_rate_t * encoding_name_and_rate_pt = NULL ; encoding_name_and_rate_pt = ( encoding_name_and_rate_t * ) g_hash_table_lookup ( p_conv_data -> rtp_dyn_payload , & strinfo -> pt ) ; if ( encoding_name_and_rate_pt ) { strinfo -> pt_str = g_strdup ( encoding_name_and_rate_pt -> encoding_name ) ; } } } if ( ! strinfo -> pt_str ) strinfo -> pt_str = g_strdup ( val_to_str_ext ( strinfo -> pt , & rtp_payload_type_short_vals_ext , "%u" ) ) ; strinfo -> npackets = 0 ; strinfo -> start_fd = pinfo -> fd ; strinfo -> start_rel_ts = pinfo -> rel_ts ; strinfo -> setup_frame_number = pi -> info_setup_frame_num ; strinfo -> rtp_event = - 1 ; tapinfo -> list = g_list_prepend ( tapinfo -> list , strinfo ) ; } strinfo -> npackets ++ ; strinfo -> stop_fd = pinfo -> fd ; strinfo -> stop_rel_ts = pinfo -> rel_ts ; if ( rtp_evt_frame_num == pinfo -> fd -> num ) { strinfo -> rtp_event = rtp_evt ; if ( rtp_evt_end == TRUE ) { strinfo -> end_stream = TRUE ; } } the_tapinfo_struct . redraw = TRUE ; return 1 ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
int ber_ptrlen ( BerElement * ber ) { return ( ber -> ber_ptr - ber -> ber_buf ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void data_destroy_indic ( void * data ) { free ( data ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( PageLoadMetricsBrowserTest , NoAbortMetricsOnClientRedirect ) { ASSERT_TRUE ( embedded_test_server ( ) -> Start ( ) ) ; GURL first_url ( embedded_test_server ( ) -> GetURL ( "/title1.html" ) ) ; ui_test_utils : : NavigateToURL ( browser ( ) , first_url ) ; GURL second_url ( embedded_test_server ( ) -> GetURL ( "/title2.html" ) ) ; NavigateParams params ( browser ( ) , second_url , ui : : PAGE_TRANSITION_LINK ) ; content : : TestNavigationManager manager ( browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) , second_url ) ; Navigate ( & params ) ; EXPECT_TRUE ( manager . WaitForRequestStart ( ) ) ; { auto waiter = CreatePageLoadMetricsWaiter ( ) ; waiter -> AddPageExpectation ( TimingField : : LOAD_EVENT ) ; EXPECT_TRUE ( content : : ExecuteScript ( browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) , "window.location.reload(); " ) ) ; waiter -> Wait ( ) ; } manager . WaitForNavigationFinished ( ) ; EXPECT_TRUE ( histogram_tester_ . GetTotalCountsForPrefix ( "PageLoad.Experimental.AbortTiming." ) . empty ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
afs_int32 SPR_ListEntries ( struct rx_call * call , afs_int32 flag , afs_int32 startindex , prentries * bulkentries , afs_int32 * nextstartindex ) { afs_int32 code ; afs_int32 cid = ANONYMOUSID ; code = listEntries ( call , flag , startindex , bulkentries , nextstartindex , & cid ) ; osi_auditU ( call , PTS_LstEntsEvent , code , AUD_LONG , flag , AUD_END ) ; ViceLog ( 125 , ( "PTS_ListEntries: code %d cid %d flag %d\n" , code , cid , flag ) ) ; return code ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void weighted_vector_sumd ( double * out , const double * in_a , const double * in_b , double weight_coeff_a , double weight_coeff_b , int length ) { int i ; for ( i = 0 ; i < length ; i ++ ) out [ i ] = weight_coeff_a * in_a [ i ] + weight_coeff_b * in_b [ i ] ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void scalar_dequant_float ( COOKContext * q , int index , int quant_index , int * subband_coef_index , int * subband_coef_sign , float * mlt_p ) { int i ; float f1 ; for ( i = 0 ; i < SUBBAND_SIZE ; i ++ ) { if ( subband_coef_index [ i ] ) { f1 = quant_centroid_tab [ index ] [ subband_coef_index [ i ] ] ; if ( subband_coef_sign [ i ] ) f1 = - f1 ; } else { f1 = dither_tab [ index ] ; if ( av_lfg_get ( & q -> random_state ) < 0x80000000 ) f1 = - f1 ; } mlt_p [ i ] = f1 * rootpow2tab [ quant_index + 63 ] ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_iwht4x4_add ( const int16_t * input , uint8_t * dest , int stride , int eob ) { if ( eob > 1 ) vp9_iwht4x4_16_add ( input , dest , stride ) ; else vp9_iwht4x4_1_add ( input , dest , stride ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
int key_reject_and_link ( struct key * key , unsigned timeout , unsigned error , struct key * keyring , struct key * authkey ) { struct assoc_array_edit * edit ; struct timespec now ; int ret , awaken , link_ret = 0 ; key_check ( key ) ; key_check ( keyring ) ; awaken = 0 ; ret = - EBUSY ; if ( keyring ) { if ( keyring -> restrict_link ) return - EPERM ; link_ret = __key_link_begin ( keyring , & key -> index_key , & edit ) ; } mutex_lock ( & key_construction_mutex ) ; if ( ! test_bit ( KEY_FLAG_INSTANTIATED , & key -> flags ) ) { atomic_inc ( & key -> user -> nikeys ) ; key -> reject_error = - error ; smp_wmb ( ) ; set_bit ( KEY_FLAG_NEGATIVE , & key -> flags ) ; set_bit ( KEY_FLAG_INSTANTIATED , & key -> flags ) ; now = current_kernel_time ( ) ; key -> expiry = now . tv_sec + timeout ; key_schedule_gc ( key -> expiry + key_gc_delay ) ; if ( test_and_clear_bit ( KEY_FLAG_USER_CONSTRUCT , & key -> flags ) ) awaken = 1 ; ret = 0 ; if ( keyring && link_ret == 0 ) __key_link ( key , & edit ) ; if ( authkey ) key_revoke ( authkey ) ; } mutex_unlock ( & key_construction_mutex ) ; if ( keyring ) __key_link_end ( keyring , & key -> index_key , edit ) ; if ( awaken ) wake_up_bit ( & key -> flags , KEY_FLAG_USER_CONSTRUCT ) ; return ret == 0 ? link_ret : ret ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
void var_set_int ( const char * name , int value ) { char buf [ 21 ] ; my_snprintf ( buf , sizeof ( buf ) , "%d" , value ) ; var_set_string ( name , buf ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
inline static void _slurm_rpc_trigger_get ( slurm_msg_t * msg ) { uid_t uid = g_slurm_auth_get_uid ( msg -> auth_cred , slurmctld_config . auth_info ) ; trigger_info_msg_t * resp_data ; trigger_info_msg_t * trigger_ptr = ( trigger_info_msg_t * ) msg -> data ; slurm_msg_t response_msg ; DEF_TIMERS ; START_TIMER ; debug ( "Processing RPC: REQUEST_TRIGGER_GET from uid=%d" , uid ) ; resp_data = trigger_get ( uid , trigger_ptr ) ; END_TIMER2 ( "_slurm_rpc_trigger_get" ) ; slurm_msg_t_init ( & response_msg ) ; response_msg . flags = msg -> flags ; response_msg . protocol_version = msg -> protocol_version ; response_msg . address = msg -> address ; response_msg . conn = msg -> conn ; response_msg . msg_type = RESPONSE_TRIGGER_GET ; response_msg . data = resp_data ; slurm_send_node_msg ( msg -> conn_fd , & response_msg ) ; slurm_free_trigger_msg ( resp_data ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int unupack ( int upack , char * dest , uint32_t dsize , char * buff , uint32_t vma , uint32_t ep , uint32_t base , uint32_t va , int file ) { int j , searchval ; char * loc_esi , * loc_edi = NULL , * loc_ebx , * end_edi , * save_edi , * alvalue ; char * paddr , * pushed_esi , * save2 ; uint32_t save1 , save3 , loc_ecx , count , shlsize , original_ep , ret , loc_ebx_u ; struct cli_exe_section section ; int upack_version = UPACK_399 ; if ( upack ) { uint32_t aljump , shroff , lngjmpoff ; if ( buff [ 5 ] == '\xff' && buff [ 6 ] == '\x36' ) upack_version = UPACK_0297729 ; loc_esi = dest + ( cli_readint32 ( buff + 1 ) - vma ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , loc_esi , 12 ) ) return - 1 ; original_ep = cli_readint32 ( loc_esi ) ; loc_esi += 4 ; loc_esi += 4 ; original_ep -= vma ; cli_dbgmsg ( "Upack: EP: %08x original: %08X || %08x\n" , ep , original_ep , cli_readint32 ( loc_esi - 8 ) ) ; if ( upack_version == UPACK_399 ) { loc_edi = dest + ( cli_readint32 ( loc_esi ) - vma ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , dest + ep + 0xa , 2 ) || dest [ ep + 0xa ] != '\xeb' ) return - 1 ; loc_esi = dest + * ( dest + ep + 0xb ) + ep + 0xc ; alvalue = loc_esi + 0x1a ; if ( ! CLI_ISCONTAINED ( dest , dsize , alvalue , 2 ) || * alvalue != '\xeb' ) return - 1 ; alvalue ++ ; alvalue += ( * alvalue & 0xff ) + 1 + 0xa ; lngjmpoff = 8 ; } else { if ( ! CLI_ISCONTAINED ( dest , dsize , dest + ep + 7 , 5 ) || dest [ ep + 7 ] != '\xe9' ) return - 1 ; loc_esi = dest + cli_readint32 ( dest + ep + 8 ) + ep + 0xc ; alvalue = loc_esi + 0x25 ; lngjmpoff = 10 ; } if ( ! CLI_ISCONTAINED ( dest , dsize , alvalue , 2 ) || * alvalue != '\xb5' ) return - 1 ; alvalue ++ ; count = * alvalue & 0xff ; if ( ! CLI_ISCONTAINED ( dest , dsize , alvalue , lngjmpoff + 5 ) || * ( alvalue + lngjmpoff ) != '\xe9' ) return - 1 ; shlsize = cli_readint32 ( alvalue + lngjmpoff + 1 ) ; if ( upack_version == UPACK_399 ) shlsize = shlsize + ( loc_esi - dest ) + * ( loc_esi + 0x1b ) + 0x1c + 0x018 ; else shlsize = shlsize + ( loc_esi - dest ) + 0x035 ; alvalue = dest + shlsize + 43 ; aljump = 8 ; shroff = 24 ; if ( ! CLI_ISCONTAINED ( dest , dsize , alvalue - 1 , 2 ) || * ( alvalue - 1 ) != '\xe3' ) { alvalue = dest + shlsize + 46 ; if ( ! CLI_ISCONTAINED ( dest , dsize , alvalue - 1 , 2 ) || * ( alvalue - 1 ) != '\xe3' ) return - 1 ; else { if ( upack_version != UPACK_0297729 ) upack_version = UPACK_0151477 ; aljump = 7 ; shroff = 26 ; } } alvalue += ( * alvalue & 0xff ) + 1 ; if ( ! CLI_ISCONTAINED ( dest , dsize , alvalue , aljump + 5 ) || * ( alvalue + aljump ) != '\xe9' ) return - 1 ; ret = cli_readint32 ( alvalue + aljump + 1 ) ; alvalue += ret + aljump + 1 + 4 + 27 ; if ( upack_version == UPACK_0297729 ) alvalue += 2 ; if ( ! CLI_ISCONTAINED ( dest , dsize , dest + shlsize + shroff , 3 ) || * ( dest + shlsize + shroff ) != '\xc1' || * ( dest + shlsize + shroff + 1 ) != '\xed' ) return - 1 ; shlsize = ( * ( dest + shlsize + shroff + 2 ) ) & 0xff ; count *= 0x100 ; if ( shlsize < 2 || shlsize > 8 ) { cli_dbgmsg ( "Upack: context bits out of bounds\n" ) ; return - 1 ; } cli_dbgmsg ( "Upack: Context Bits parameter used with lzma: %02x, %02x\n" , shlsize , count ) ; if ( upack_version == UPACK_0297729 ) { if ( ! CLI_ISCONTAINED ( dest , dsize , loc_esi + 6 , 10 ) || * ( loc_esi + 6 ) != '\xbe' || * ( loc_esi + 11 ) != '\xbf' ) return - 1 ; if ( ( uint32_t ) cli_readint32 ( loc_esi + 7 ) < base || ( uint32_t ) cli_readint32 ( loc_esi + 7 ) > vma ) return - 1 ; loc_edi = dest + ( cli_readint32 ( loc_esi + 12 ) - vma ) ; loc_esi = dest + ( cli_readint32 ( loc_esi + 7 ) - base ) ; } else { if ( ! CLI_ISCONTAINED ( dest , dsize , loc_esi + 7 , 5 ) || * ( loc_esi + 7 ) != '\xbe' ) return - 1 ; loc_esi = dest + ( cli_readint32 ( loc_esi + 8 ) - vma ) ; } if ( upack_version == UPACK_0297729 ) { if ( ! CLI_ISCONTAINED ( dest , dsize , loc_edi , ( 0x58 + 24 + 4 * count ) ) || ! CLI_ISCONTAINED ( dest , dsize , loc_esi , ( 0x58 + 0x64 + 4 ) ) ) return - 1 ; for ( j = 0 ; j < 0x16 ; j ++ , loc_esi += 4 , loc_edi += 4 ) cli_writeint32 ( loc_edi , cli_readint32 ( loc_esi ) ) ; } else { if ( ! CLI_ISCONTAINED ( dest , dsize , loc_edi , ( 0x9c + 24 + 4 * count ) ) || ! CLI_ISCONTAINED ( dest , dsize , loc_esi , ( 0x9c + 0x34 + 4 ) ) ) return - 1 ; for ( j = 0 ; j < 0x27 ; j ++ , loc_esi += 4 , loc_edi += 4 ) cli_writeint32 ( loc_edi , cli_readint32 ( loc_esi ) ) ; } save3 = cli_readint32 ( loc_esi + 4 ) ; paddr = dest + ( ( uint32_t ) cli_readint32 ( loc_edi - 4 ) ) - vma ; loc_ebx = loc_edi ; cli_writeint32 ( loc_edi , 0xffffffff ) ; loc_edi += 4 ; cli_writeint32 ( loc_edi , 0 ) ; loc_edi += 4 ; for ( j = 0 ; j < 4 ; j ++ , loc_edi += 4 ) cli_writeint32 ( loc_edi , ( 1 ) ) ; for ( j = 0 ; ( unsigned int ) j < count ; j ++ , loc_edi += 4 ) cli_writeint32 ( loc_edi , 0x400 ) ; loc_edi = dest + cli_readint32 ( loc_esi + 0xc ) - vma ; if ( upack_version == UPACK_0297729 ) loc_edi = dest + vma - base ; pushed_esi = loc_edi ; if ( upack_version == UPACK_0297729 ) { end_edi = dest + cli_readint32 ( loc_esi + 0x64 ) - vma ; save3 = cli_readint32 ( loc_esi + 0x40 ) ; } else { end_edi = dest + cli_readint32 ( loc_esi + 0x34 ) - vma ; } if ( loc_edi > end_edi ) { cli_debug ( "Upack: loc_edi > end_edi breaks cli_rebuildpe() bb#11216\n" ) ; return - 1 ; } cli_dbgmsg ( "Upack: data initialized, before upack lzma call!\n" ) ; if ( ( ret = ( uint32_t ) unupack399 ( dest , dsize , 0 , loc_ebx , 0 , loc_edi , end_edi , shlsize , paddr ) ) == 0xffffffff ) return - 1 ; } else { int ep_jmp_offs , rep_stosd_count_offs , context_bits_offs ; loc_esi = dest + vma + ep ; if ( buff [ 0 ] == '\xbe' && buff [ 5 ] == '\xad' && buff [ 6 ] == '\x8b' && buff [ 7 ] == '\xf8' ) upack_version = UPACK_11_12 ; if ( upack_version == UPACK_11_12 ) { ep_jmp_offs = 0x1a4 ; rep_stosd_count_offs = 0x1b ; context_bits_offs = 0x41 ; alvalue = loc_esi + 0x184 ; } else { ep_jmp_offs = 0x217 ; rep_stosd_count_offs = 0x3a ; context_bits_offs = 0x5f ; alvalue = loc_esi + 0x1c1 ; } if ( ! CLI_ISCONTAINED ( dest , dsize , loc_esi , ep_jmp_offs + 4 ) ) return - 1 ; save1 = cli_readint32 ( loc_esi + ep_jmp_offs ) ; original_ep = ( loc_esi - dest ) + ep_jmp_offs + 4 ; original_ep += ( int32_t ) save1 ; cli_dbgmsg ( "Upack: EP: %08x original %08x\n" , ep , original_ep ) ; count = ( * ( loc_esi + rep_stosd_count_offs ) ) & 0xff ; shlsize = ( * ( loc_esi + context_bits_offs ) ) & 0xff ; shlsize = 8 - shlsize ; if ( shlsize < 2 || shlsize > 8 ) { cli_dbgmsg ( "Upack: context bits out of bounds\n" ) ; return - 1 ; } count *= 0x100 ; cli_dbgmsg ( "Upack: Context Bits parameter used with lzma: %02x, %02x\n" , shlsize , count ) ; if ( upack_version == UPACK_399 ) { loc_esi += 4 ; loc_ecx = cli_readint32 ( loc_esi + 2 ) ; cli_writeint32 ( loc_esi + 2 , 0 ) ; if ( ! loc_ecx ) { cli_dbgmsg ( "Upack: something's wrong, report back\n" ) ; return - 1 ; } loc_esi -= ( loc_ecx - 2 ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , loc_esi , 12 ) ) return - 1 ; cli_dbgmsg ( "Upack: %p %p %08x %08x\n" , loc_esi , dest , cli_readint32 ( loc_esi ) , base ) ; loc_ebx_u = loc_esi - ( dest + cli_readint32 ( loc_esi ) - base ) ; cli_dbgmsg ( "Upack: EBX: %08x\n" , loc_ebx_u ) ; loc_esi += 4 ; save2 = loc_edi = dest + cli_readint32 ( loc_esi ) - base ; cli_dbgmsg ( "Upack: DEST: %08x, %08x\n" , cli_readint32 ( loc_esi ) , cli_readint32 ( loc_esi ) - base ) ; loc_esi += 4 ; j = cli_readint32 ( loc_esi ) ; if ( j < 0 ) { cli_dbgmsg ( "Upack: probably hand-crafted data, report back\n" ) ; return - 1 ; } loc_esi += 4 ; cli_dbgmsg ( "Upack: ecx counter: %08x\n" , j ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , loc_esi , ( j * 4 ) ) || ! CLI_ISCONTAINED ( dest , dsize , loc_edi , ( ( j + count ) * 4 ) ) ) return - 1 ; for ( ; j -- ; loc_edi += 4 , loc_esi += 4 ) cli_writeint32 ( loc_edi , cli_readint32 ( loc_esi ) ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , save2 , 8 ) ) return - 1 ; loc_ecx = cli_readint32 ( save2 ) ; save2 += 4 ; loc_esi = save2 ; do { loc_esi += loc_ebx_u ; loc_esi += 4 ; } while ( -- loc_ecx ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , loc_esi , 4 ) ) return - 1 ; save1 = cli_readint32 ( loc_esi ) ; loc_esi += 4 ; for ( j = 0 ; ( uint32_t ) j < count ; j ++ , loc_edi += 4 ) cli_writeint32 ( loc_edi , ( save1 ) ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , ( loc_esi + 0x10 ) , 4 ) ) return - 1 ; cli_writeint32 ( loc_esi + 0x10 , ( uint32_t ) cli_readint32 ( loc_esi + 0x10 ) + loc_ebx_u ) ; loc_ebx = loc_esi + 0x14 ; loc_esi = save2 ; save_edi = loc_edi = dest + ( ( uint32_t ) cli_readint32 ( loc_esi ) - base ) ; loc_esi += 4 ; cli_dbgmsg ( "Upack: before_fixing\n" ) ; if ( ! CLI_ISCONTAINED ( dest , dsize , loc_ebx - 4 , ( 12 + 4 * 4 ) ) || ! CLI_ISCONTAINED ( dest , dsize , loc_esi + 0x24 , 4 ) || ! CLI_ISCONTAINED ( dest , dsize , loc_esi + 0x40 , 4 ) ) return - 1 ; for ( j = 2 ; j < 6 ; j ++ ) cli_writeint32 ( loc_ebx + ( j << 2 ) , cli_readint32 ( loc_ebx + ( j << 2 ) ) ) ; paddr = dest + cli_readint32 ( loc_ebx - 4 ) - base ; save1 = loc_ecx ; pushed_esi = loc_edi ; end_edi = dest + cli_readint32 ( loc_esi + 0x24 ) - base ; vma = cli_readint32 ( loc_ebx ) ; cli_writeint32 ( loc_ebx , cli_readint32 ( loc_ebx + 4 ) ) ; cli_writeint32 ( ( loc_ebx + 4 ) , vma ) ; } else if ( upack_version == UPACK_11_12 ) { cli_dbgmsg ( "Upack v 1.1/1.2\n" ) ; loc_esi = dest + 0x148 ; loc_edi = dest + cli_readint32 ( loc_esi ) - base ; loc_esi += 4 ; save_edi = loc_edi ; paddr = dest + ( ( uint32_t ) cli_readint32 ( loc_esi ) ) - base ; loc_esi += 4 ; loc_edi += 4 ; loc_ebx = loc_edi ; if ( ! CLI_ISCONTAINED ( dest , dsize , loc_edi , ( ( 6 + count ) * 4 ) ) ) return - 1 ; cli_writeint32 ( loc_edi , 0xffffffff ) ; loc_edi += 4 ; cli_writeint32 ( loc_edi , 0 ) ; loc_edi += 4 ; for ( j = 0 ; j < 4 ; j ++ , loc_edi += 4 ) cli_writeint32 ( loc_edi , ( 1 ) ) ; for ( j = 0 ; ( uint32_t ) j < count ; j ++ , loc_edi += 4 ) cli_writeint32 ( loc_edi , 0x400 ) ; loc_edi = dest + cli_readint32 ( loc_esi ) - base ; pushed_esi = loc_edi ; loc_esi += 4 ; loc_ecx = 0 ; loc_esi += 4 ; end_edi = dest + cli_readint32 ( loc_esi - 0x28 ) - base ; loc_esi = save_edi ; } if ( loc_edi > end_edi ) { cli_debug ( "Upack(alt begin): loc_edi > end_edi breaks cli_rebuildpe() bb#11216\n" ) ; return - 1 ; } cli_dbgmsg ( "Upack: data initialized, before upack lzma call!\n" ) ; if ( ( ret = ( uint32_t ) unupack399 ( dest , dsize , loc_ecx , loc_ebx , loc_ecx , loc_edi , end_edi , shlsize , paddr ) ) == 0xffffffff ) return - 1 ; if ( upack_version == UPACK_399 ) save3 = cli_readint32 ( loc_esi + 0x40 ) ; else if ( upack_version == UPACK_11_12 ) save3 = cli_readint32 ( dest + vma + ep + 0x174 ) ; } loc_ecx = 0 ; if ( ! CLI_ISCONTAINED ( dest , dsize , alvalue , 1 ) ) { cli_dbgmsg ( "Upack: alvalue out of bounds\n" ) ; return - 1 ; } searchval = * alvalue & 0xff ; cli_dbgmsg ( "Upack: loops: %08x search value: %02x\n" , save3 , searchval ) ; while ( save3 ) { if ( ! CLI_ISCONTAINED ( dest , dsize , pushed_esi + loc_ecx , 1 ) ) { cli_dbgmsg ( "Upack: callfixerr %p %08x = %p, %p\n" , dest , dsize , dest + dsize , pushed_esi + loc_ecx ) ; return - 1 ; } if ( pushed_esi [ loc_ecx ] == '\xe8' || pushed_esi [ loc_ecx ] == '\xe9' ) { char * adr = ( pushed_esi + loc_ecx + 1 ) ; loc_ecx ++ ; if ( ! CLI_ISCONTAINED ( dest , dsize , adr , 4 ) ) { cli_dbgmsg ( "Upack: callfixerr\n" ) ; return - 1 ; } if ( ( cli_readint32 ( adr ) & 0xff ) != searchval ) continue ; cli_writeint32 ( adr , EC32 ( CE32 ( ( uint32_t ) ( cli_readint32 ( adr ) & 0xffffff00 ) ) ) - loc_ecx - 4 ) ; loc_ecx += 4 ; save3 -- ; } else loc_ecx ++ ; } section . raw = 0 ; section . rva = va ; section . rsz = end_edi - loc_edi ; section . vsz = end_edi - loc_edi ; if ( ! cli_rebuildpe ( dest + ( upack ? 0 : va ) , & section , 1 , base , original_ep , 0 , 0 , file ) ) { cli_dbgmsg ( "Upack: Rebuilding failed\n" ) ; return 0 ; } return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static GFile * get_target_file_for_link ( GFile * src , GFile * dest_dir , const char * dest_fs_type , int count ) { const char * editname ; char * basename , * new_name ; GFileInfo * info ; GFile * dest ; int max_length ; max_length = get_max_name_length ( dest_dir ) ; dest = NULL ; info = g_file_query_info ( src , G_FILE_ATTRIBUTE_STANDARD_EDIT_NAME , 0 , NULL , NULL ) ; if ( info != NULL ) { editname = g_file_info_get_attribute_string ( info , G_FILE_ATTRIBUTE_STANDARD_EDIT_NAME ) ; if ( editname != NULL ) { new_name = get_link_name ( editname , count , max_length ) ; make_file_name_valid_for_dest_fs ( new_name , dest_fs_type ) ; dest = g_file_get_child_for_display_name ( dest_dir , new_name , NULL ) ; g_free ( new_name ) ; } g_object_unref ( info ) ; } if ( dest == NULL ) { basename = g_file_get_basename ( src ) ; make_file_name_valid_for_dest_fs ( basename , dest_fs_type ) ; if ( g_utf8_validate ( basename , - 1 , NULL ) ) { new_name = get_link_name ( basename , count , max_length ) ; make_file_name_valid_for_dest_fs ( new_name , dest_fs_type ) ; dest = g_file_get_child_for_display_name ( dest_dir , new_name , NULL ) ; g_free ( new_name ) ; } if ( dest == NULL ) { if ( count == 1 ) { new_name = g_strdup_printf ( "%s.lnk" , basename ) ; } else { new_name = g_strdup_printf ( "%s.lnk%d" , basename , count ) ; } make_file_name_valid_for_dest_fs ( new_name , dest_fs_type ) ; dest = g_file_get_child ( dest_dir , new_name ) ; g_free ( new_name ) ; } g_free ( basename ) ; } return dest ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int archive_read_format_cpio_bid ( struct archive_read * a , int best_bid ) { const unsigned char * p ; struct cpio * cpio ; int bid ; ( void ) best_bid ; cpio = ( struct cpio * ) ( a -> format -> data ) ; if ( ( p = __archive_read_ahead ( a , 6 , NULL ) ) == NULL ) return ( - 1 ) ; bid = 0 ; if ( memcmp ( p , "070707" , 6 ) == 0 ) { cpio -> read_header = header_odc ; bid += 48 ; } else if ( memcmp ( p , "070727" , 6 ) == 0 ) { cpio -> read_header = header_odc ; bid += 48 ; } else if ( memcmp ( p , "070701" , 6 ) == 0 ) { cpio -> read_header = header_newc ; bid += 48 ; } else if ( memcmp ( p , "070702" , 6 ) == 0 ) { cpio -> read_header = header_newc ; bid += 48 ; } else if ( p [ 0 ] * 256 + p [ 1 ] == 070707 ) { cpio -> read_header = header_bin_be ; bid += 16 ; } else if ( p [ 0 ] + p [ 1 ] * 256 == 070707 ) { cpio -> read_header = header_bin_le ; bid += 16 ; } else return ( ARCHIVE_WARN ) ; return ( bid ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_inode_getxattr ( struct dentry * dentry , const char * name ) { const struct cred * cred = current_cred ( ) ; return dentry_has_perm ( cred , dentry , FILE__GETATTR ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_LocationRequest ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_LocationRequest , LocationRequest_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void compute_precache_lut ( uint8_t * output , uint16_t * table , int length ) { uint32_t v = 0 ; for ( v = 0 ; v < PRECACHE_OUTPUT_SIZE ; v ++ ) { output [ v ] = lut_interp_linear_precache_output ( v , table , length ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
Expr * get_notclausearg ( Expr * notclause ) { return linitial ( ( ( BoolExpr * ) notclause ) -> args ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int32_t u_scanf_simple_percent_handler ( UFILE * input , u_scanf_spec_info * info , ufmt_args * args , const UChar * fmt , int32_t * fmtConsumed , int32_t * argConverted ) { * argConverted = 0 ; if ( u_fgetc ( input ) != 0x0025 ) { * argConverted = - 1 ; } return 1 ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void vapic_register ( void ) { type_register_static ( & vapic_type ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( FilesystemIterator , current ) { spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; if ( zend_parse_parameters_none ( ) == FAILURE ) { return ; } if ( SPL_FILE_DIR_CURRENT ( intern , SPL_FILE_DIR_CURRENT_AS_PATHNAME ) ) { spl_filesystem_object_get_file_name ( intern TSRMLS_CC ) ; RETURN_STRINGL ( intern -> file_name , intern -> file_name_len , 1 ) ; } else if ( SPL_FILE_DIR_CURRENT ( intern , SPL_FILE_DIR_CURRENT_AS_FILEINFO ) ) { spl_filesystem_object_get_file_name ( intern TSRMLS_CC ) ; spl_filesystem_object_create_type ( 0 , intern , SPL_FS_INFO , NULL , return_value TSRMLS_CC ) ; } else { RETURN_ZVAL ( getThis ( ) , 1 , 0 ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
void mime_hdr_field_attach ( MIMEHdrImpl * mh , MIMEField * field , int check_for_dups , MIMEField * prev_dup ) { MIME_HDR_SANITY_CHECK ( mh ) ; if ( ! field -> is_detached ( ) ) { return ; } ink_assert ( field -> m_ptr_name != nullptr ) ; if ( check_for_dups || ( prev_dup && ( ! prev_dup -> is_dup_head ( ) ) ) ) { int length ; const char * name = mime_field_name_get ( field , & length ) ; prev_dup = mime_hdr_field_find ( mh , name , length ) ; ink_assert ( ( prev_dup == nullptr ) || ( prev_dup -> is_dup_head ( ) ) ) ; } field -> m_readiness = MIME_FIELD_SLOT_READINESS_LIVE ; if ( prev_dup ) { MIMEField * next_dup ; int field_slotnum , prev_slotnum , next_slotnum ; field_slotnum = mime_hdr_field_slotnum ( mh , field ) ; prev_slotnum = mime_hdr_field_slotnum ( mh , prev_dup ) ; next_dup = prev_dup -> m_next_dup ; next_slotnum = ( next_dup ? mime_hdr_field_slotnum ( mh , next_dup ) : - 1 ) ; ink_assert ( field_slotnum != prev_slotnum ) ; while ( prev_slotnum < field_slotnum ) { if ( next_dup == nullptr ) { break ; } if ( next_slotnum > field_slotnum ) { break ; } prev_dup = next_dup ; prev_slotnum = next_slotnum ; next_dup = prev_dup -> m_next_dup ; } if ( prev_slotnum > field_slotnum ) { field -> m_flags = ( field -> m_flags | MIME_FIELD_SLOT_FLAGS_DUP_HEAD ) ; field -> m_next_dup = prev_dup ; prev_dup -> m_flags = ( prev_dup -> m_flags & ~ MIME_FIELD_SLOT_FLAGS_DUP_HEAD ) ; mime_hdr_set_accelerators_and_presence_bits ( mh , field ) ; } else { ink_assert ( prev_slotnum < field_slotnum ) ; ink_assert ( ( next_dup == nullptr ) || ( next_slotnum > field_slotnum ) ) ; field -> m_flags = ( field -> m_flags & ~ MIME_FIELD_SLOT_FLAGS_DUP_HEAD ) ; ink_assert ( ( next_dup == nullptr ) || next_dup -> is_live ( ) ) ; prev_dup -> m_next_dup = field ; field -> m_next_dup = next_dup ; } } else { field -> m_flags = ( field -> m_flags | MIME_FIELD_SLOT_FLAGS_DUP_HEAD ) ; mime_hdr_set_accelerators_and_presence_bits ( mh , field ) ; } ink_assert ( field -> is_live ( ) ) ; if ( field -> m_ptr_value && field -> is_cooked ( ) ) { mh -> recompute_cooked_stuff ( field ) ; } MIME_HDR_SANITY_CHECK ( mh ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void usage_exit ( ) { fprintf ( stderr , "Usage: %s <codec> <width> <height> <infile> <outfile> " "<keyframe-interval> [<error-resilient>]\nSee comments in " "simple_encoder.c for more information.\n" , exec_name ) ; exit ( EXIT_FAILURE ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static MAIN_WINDOW_REC * mainwindows_find_left_upper ( MAIN_WINDOW_REC * window ) { MAIN_WINDOW_REC * best ; best = mainwindows_find_left ( window , FALSE ) ; if ( best == NULL ) best = mainwindows_find_left ( mainwindows_find_upper ( window ) , TRUE ) ; return best ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_T_tableEntryCapacityExceeded ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_T_tableEntryCapacityExceeded , T_tableEntryCapacityExceeded_choice , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void jbig2_global_ctx_free ( Jbig2GlobalCtx * global_ctx ) { jbig2_ctx_free ( ( Jbig2Ctx * ) global_ctx ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static size_t unquote_string ( const char * string , size_t length , unsigned char * buf ) { int esc = 0 ; const unsigned char * s = ( const unsigned char * ) string ; unsigned char * d = buf ; size_t n = length ; for ( ; n ; n -- , s ++ ) { if ( esc ) { switch ( * s ) { case 'b' : * d ++ = '\b' ; break ; case 't' : * d ++ = '\t' ; break ; case 'v' : * d ++ = '\v' ; break ; case 'n' : * d ++ = '\n' ; break ; case 'f' : * d ++ = '\f' ; break ; case 'r' : * d ++ = '\r' ; break ; case '"' : * d ++ = '\"' ; break ; case '\'' : * d ++ = '\'' ; break ; case '\\' : * d ++ = '\\' ; break ; case '\r' : if ( n > 1 && s [ 1 ] == '\n' ) { s ++ ; n -- ; } break ; case '\n' : if ( n > 1 && s [ 1 ] == '\r' ) { s ++ ; n -- ; } break ; case 'x' : if ( n > 2 && hexdigitp ( s + 1 ) && hexdigitp ( s + 2 ) ) { s ++ ; n -- ; * d ++ = xtoi_2 ( s ) ; s ++ ; n -- ; } break ; default : if ( n > 2 && octdigitp ( s ) && octdigitp ( s + 1 ) && octdigitp ( s + 2 ) ) { * d ++ = ( atoi_1 ( s ) * 64 ) + ( atoi_1 ( s + 1 ) * 8 ) + atoi_1 ( s + 2 ) ; s += 2 ; n -= 2 ; } break ; } esc = 0 ; } else if ( * s == '\\' ) esc = 1 ; else * d ++ = * s ; } return d - buf ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ImmersiveModeControllerAshTest , EnabledCommands ) { ASSERT_FALSE ( controller ( ) -> IsEnabled ( ) ) ; EXPECT_TRUE ( chrome : : IsCommandEnabled ( browser ( ) , IDC_OPEN_CURRENT_URL ) ) ; EXPECT_TRUE ( chrome : : IsCommandEnabled ( browser ( ) , IDC_ABOUT ) ) ; EXPECT_TRUE ( chrome : : IsCommandEnabled ( browser ( ) , IDC_FOCUS_LOCATION ) ) ; ToggleFullscreen ( ) ; EXPECT_TRUE ( controller ( ) -> IsEnabled ( ) ) ; EXPECT_TRUE ( chrome : : IsCommandEnabled ( browser ( ) , IDC_OPEN_CURRENT_URL ) ) ; EXPECT_TRUE ( chrome : : IsCommandEnabled ( browser ( ) , IDC_ABOUT ) ) ; EXPECT_TRUE ( chrome : : IsCommandEnabled ( browser ( ) , IDC_FOCUS_LOCATION ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int evutil_vsnprintf ( char * buf , size_t buflen , const char * format , va_list ap ) { # ifdef _MSC_VER int r = _vsnprintf ( buf , buflen , format , ap ) ; buf [ buflen - 1 ] = '\0' ; if ( r >= 0 ) return r ; else return _vscprintf ( format , ap ) ; # else int r = vsnprintf ( buf , buflen , format , ap ) ; buf [ buflen - 1 ] = '\0' ; return r ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int row_prop_exists ( zval * object , zval * member , int check_empty , const zend_literal * key TSRMLS_DC ) { pdo_stmt_t * stmt = ( pdo_stmt_t * ) zend_object_store_get_object ( object TSRMLS_CC ) ; int colno = - 1 ; if ( stmt ) { if ( Z_TYPE_P ( member ) == IS_LONG ) { return Z_LVAL_P ( member ) >= 0 && Z_LVAL_P ( member ) < stmt -> column_count ; } else { convert_to_string ( member ) ; for ( colno = 0 ; colno < stmt -> column_count ; colno ++ ) { if ( strcmp ( stmt -> columns [ colno ] . name , Z_STRVAL_P ( member ) ) == 0 ) { int res ; zval * val ; MAKE_STD_ZVAL ( val ) ; fetch_value ( stmt , val , colno , NULL TSRMLS_CC ) ; res = check_empty ? i_zend_is_true ( val ) : Z_TYPE_P ( val ) != IS_NULL ; zval_ptr_dtor ( & val ) ; return res ; } } } } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int vp9_get_compressed_data ( VP9_COMP * cpi , unsigned int * frame_flags , size_t * size , uint8_t * dest , int64_t * time_stamp , int64_t * time_end , int flush ) { const VP9EncoderConfig * const oxcf = & cpi -> oxcf ; VP9_COMMON * const cm = & cpi -> common ; MACROBLOCKD * const xd = & cpi -> mb . e_mbd ; RATE_CONTROL * const rc = & cpi -> rc ; struct vpx_usec_timer cmptimer ; YV12_BUFFER_CONFIG * force_src_buffer = NULL ; struct lookahead_entry * last_source = NULL ; struct lookahead_entry * source = NULL ; MV_REFERENCE_FRAME ref_frame ; int arf_src_index ; if ( is_two_pass_svc ( cpi ) ) { # if CONFIG_SPATIAL_SVC vp9_svc_start_frame ( cpi ) ; # endif if ( oxcf -> pass == 2 ) vp9_restore_layer_context ( cpi ) ; } vpx_usec_timer_start ( & cmptimer ) ; vp9_set_high_precision_mv ( cpi , ALTREF_HIGH_PRECISION_MV ) ; cm -> reset_frame_context = 0 ; cm -> refresh_frame_context = 1 ; cpi -> refresh_last_frame = 1 ; cpi -> refresh_golden_frame = 0 ; cpi -> refresh_alt_ref_frame = 0 ; arf_src_index = get_arf_src_index ( cpi ) ; if ( arf_src_index ) { assert ( arf_src_index <= rc -> frames_to_key ) ; if ( ( source = vp9_lookahead_peek ( cpi -> lookahead , arf_src_index ) ) != NULL ) { cpi -> alt_ref_source = source ; # if CONFIG_SPATIAL_SVC if ( is_two_pass_svc ( cpi ) && cpi -> svc . spatial_layer_id > 0 ) { int i ; for ( i = cpi -> svc . spatial_layer_id - 1 ; i >= 0 ; -- i ) { if ( oxcf -> ss_play_alternate [ i ] ) { cpi -> gld_fb_idx = cpi -> svc . layer_context [ i ] . alt_ref_idx ; break ; } } } cpi -> svc . layer_context [ cpi -> svc . spatial_layer_id ] . has_alt_frame = 1 ; # endif if ( oxcf -> arnr_max_frames > 0 ) { vp9_temporal_filter ( cpi , arf_src_index ) ; vp9_extend_frame_borders ( & cpi -> alt_ref_buffer ) ; force_src_buffer = & cpi -> alt_ref_buffer ; } cm -> show_frame = 0 ; cpi -> refresh_alt_ref_frame = 1 ; cpi -> refresh_golden_frame = 0 ; cpi -> refresh_last_frame = 0 ; rc -> is_src_frame_alt_ref = 0 ; rc -> source_alt_ref_pending = 0 ; } else { rc -> source_alt_ref_pending = 0 ; } } if ( ! source ) { if ( cm -> current_video_frame > 0 ) { if ( ( last_source = vp9_lookahead_peek ( cpi -> lookahead , - 1 ) ) == NULL ) return - 1 ; } # if CONFIG_SPATIAL_SVC if ( is_two_pass_svc ( cpi ) ) source = vp9_svc_lookahead_pop ( cpi , cpi -> lookahead , flush ) ; else # endif source = vp9_lookahead_pop ( cpi -> lookahead , flush ) ; if ( source != NULL ) { cm -> show_frame = 1 ; cm -> intra_only = 0 ; check_src_altref ( cpi , source ) ; } } if ( source ) { cpi -> un_scaled_source = cpi -> Source = force_src_buffer ? force_src_buffer : & source -> img ; cpi -> unscaled_last_source = last_source != NULL ? & last_source -> img : NULL ; * time_stamp = source -> ts_start ; * time_end = source -> ts_end ; * frame_flags = ( source -> flags & VPX_EFLAG_FORCE_KF ) ? FRAMEFLAGS_KEY : 0 ; } else { * size = 0 ; if ( flush && oxcf -> pass == 1 && ! cpi -> twopass . first_pass_done ) { vp9_end_first_pass ( cpi ) ; cpi -> twopass . first_pass_done = 1 ; } return - 1 ; } if ( source -> ts_start < cpi -> first_time_stamp_ever ) { cpi -> first_time_stamp_ever = source -> ts_start ; cpi -> last_end_time_stamp_seen = source -> ts_start ; } vp9_clear_system_state ( ) ; if ( cm -> show_frame ) { adjust_frame_rate ( cpi , source ) ; } if ( cpi -> svc . number_temporal_layers > 1 && oxcf -> rc_mode == VPX_CBR ) { vp9_update_temporal_layer_framerate ( cpi ) ; vp9_restore_layer_context ( cpi ) ; } * size = 0 ; cm -> frame_bufs [ cm -> new_fb_idx ] . ref_count -- ; cm -> new_fb_idx = get_free_fb ( cm ) ; if ( ( oxcf -> pass == 2 ) && ( ! cpi -> use_svc || is_two_pass_svc ( cpi ) ) ) { vp9_rc_get_second_pass_params ( cpi ) ; } if ( ! cpi -> use_svc && cpi -> multi_arf_allowed ) { if ( cm -> frame_type == KEY_FRAME ) { init_buffer_indices ( cpi ) ; } else if ( oxcf -> pass == 2 ) { const GF_GROUP * const gf_group = & cpi -> twopass . gf_group ; cpi -> alt_fb_idx = gf_group -> arf_ref_idx [ gf_group -> index ] ; } } cpi -> frame_flags = * frame_flags ; if ( oxcf -> pass == 2 && cm -> current_video_frame == 0 && oxcf -> allow_spatial_resampling && oxcf -> rc_mode == VPX_VBR ) { vp9_set_size_literal ( cpi , oxcf -> scaled_frame_width , oxcf -> scaled_frame_height ) ; } vp9_realloc_frame_buffer ( get_frame_new_buffer ( cm ) , cm -> width , cm -> height , cm -> subsampling_x , cm -> subsampling_y , # if CONFIG_VP9_HIGHBITDEPTH cm -> use_highbitdepth , # endif VP9_ENC_BORDER_IN_PIXELS , NULL , NULL , NULL ) ; alloc_util_frame_buffers ( cpi ) ; init_motion_estimation ( cpi ) ; for ( ref_frame = LAST_FRAME ; ref_frame <= ALTREF_FRAME ; ++ ref_frame ) { const int idx = cm -> ref_frame_map [ get_ref_frame_idx ( cpi , ref_frame ) ] ; YV12_BUFFER_CONFIG * const buf = & cm -> frame_bufs [ idx ] . buf ; RefBuffer * const ref_buf = & cm -> frame_refs [ ref_frame - 1 ] ; ref_buf -> buf = buf ; ref_buf -> idx = idx ; # if CONFIG_VP9_HIGHBITDEPTH vp9_setup_scale_factors_for_frame ( & ref_buf -> sf , buf -> y_crop_width , buf -> y_crop_height , cm -> width , cm -> height , ( buf -> flags & YV12_FLAG_HIGHBITDEPTH ) ? : 0 ) ; # else vp9_setup_scale_factors_for_frame ( & ref_buf -> sf , buf -> y_crop_width , buf -> y_crop_height , cm -> width , cm -> height ) ; # endif if ( vp9_is_scaled ( & ref_buf -> sf ) ) vp9_extend_frame_borders ( buf ) ; } set_ref_ptrs ( cm , xd , LAST_FRAME , LAST_FRAME ) ; if ( oxcf -> aq_mode == VARIANCE_AQ ) { vp9_vaq_init ( ) ; } if ( oxcf -> pass == 1 && ( ! cpi -> use_svc || is_two_pass_svc ( cpi ) ) ) { const int lossless = is_lossless_requested ( oxcf ) ; # if CONFIG_VP9_HIGHBITDEPTH if ( cpi -> oxcf . use_highbitdepth ) cpi -> mb . fwd_txm4x4 = lossless ? vp9_high_fwht4x4 : vp9_high_fdct4x4 ; else cpi -> mb . fwd_txm4x4 = lossless ? vp9_fwht4x4 : vp9_fdct4x4 ; cpi -> mb . high_itxm_add = lossless ? vp9_high_iwht4x4_add : vp9_high_idct4x4_add ; # else cpi -> mb . fwd_txm4x4 = lossless ? vp9_fwht4x4 : vp9_fdct4x4 ; # endif cpi -> mb . itxm_add = lossless ? vp9_iwht4x4_add : vp9_idct4x4_add ; vp9_first_pass ( cpi , source ) ; } else if ( oxcf -> pass == 2 && ( ! cpi -> use_svc || is_two_pass_svc ( cpi ) ) ) { Pass2Encode ( cpi , size , dest , frame_flags ) ; } else if ( cpi -> use_svc ) { SvcEncode ( cpi , size , dest , frame_flags ) ; } else { Pass0Encode ( cpi , size , dest , frame_flags ) ; } if ( cm -> refresh_frame_context ) cm -> frame_contexts [ cm -> frame_context_idx ] = cm -> fc ; if ( * size == 0 ) { release_scaled_references ( cpi ) ; } if ( * size > 0 ) { cpi -> droppable = ! frame_is_reference ( cpi ) ; } if ( ( cpi -> svc . number_temporal_layers > 1 && oxcf -> rc_mode == VPX_CBR ) || ( ( cpi -> svc . number_temporal_layers > 1 || cpi -> svc . number_spatial_layers > 1 ) && oxcf -> pass == 2 ) ) { vp9_save_layer_context ( cpi ) ; } vpx_usec_timer_mark ( & cmptimer ) ; cpi -> time_compress_data += vpx_usec_timer_elapsed ( & cmptimer ) ; if ( cpi -> b_calculate_psnr && oxcf -> pass != 1 && cm -> show_frame ) generate_psnr_packet ( cpi ) ; # if CONFIG_INTERNAL_STATS if ( oxcf -> pass != 1 ) { cpi -> bytes += ( int ) ( * size ) ; if ( cm -> show_frame ) { cpi -> count ++ ; if ( cpi -> b_calculate_psnr ) { YV12_BUFFER_CONFIG * orig = cpi -> Source ; YV12_BUFFER_CONFIG * recon = cpi -> common . frame_to_show ; YV12_BUFFER_CONFIG * pp = & cm -> post_proc_buffer ; PSNR_STATS psnr ; calc_psnr ( orig , recon , & psnr ) ; cpi -> total += psnr . psnr [ 0 ] ; cpi -> total_y += psnr . psnr [ 1 ] ; cpi -> total_u += psnr . psnr [ 2 ] ; cpi -> total_v += psnr . psnr [ 3 ] ; cpi -> total_sq_error += psnr . sse [ 0 ] ; cpi -> total_samples += psnr . samples [ 0 ] ; { PSNR_STATS psnr2 ; double frame_ssim2 = 0 , weight = 0 ; # if CONFIG_VP9_POSTPROC vp9_deblock ( cm -> frame_to_show , & cm -> post_proc_buffer , cm -> lf . filter_level * 10 / 6 ) ; # endif vp9_clear_system_state ( ) ; calc_psnr ( orig , pp , & psnr2 ) ; cpi -> totalp += psnr2 . psnr [ 0 ] ; cpi -> totalp_y += psnr2 . psnr [ 1 ] ; cpi -> totalp_u += psnr2 . psnr [ 2 ] ; cpi -> totalp_v += psnr2 . psnr [ 3 ] ; cpi -> totalp_sq_error += psnr2 . sse [ 0 ] ; cpi -> totalp_samples += psnr2 . samples [ 0 ] ; frame_ssim2 = vp9_calc_ssim ( orig , recon , & weight ) ; cpi -> summed_quality += frame_ssim2 * weight ; cpi -> summed_weights += weight ; frame_ssim2 = vp9_calc_ssim ( orig , & cm -> post_proc_buffer , & weight ) ; cpi -> summedp_quality += frame_ssim2 * weight ; cpi -> summedp_weights += weight ; # if 0 { FILE * f = fopen ( "q_used.stt" , "a" ) ; fprintf ( f , "%5d : Y%f7.3:U%f7.3:V%f7.3:F%f7.3:S%7.3f\n" , cpi -> common . current_video_frame , y2 , u2 , v2 , frame_psnr2 , frame_ssim2 ) ; fclose ( f ) ; } # endif } } if ( cpi -> b_calculate_ssimg ) { double y , u , v , frame_all ; frame_all = vp9_calc_ssimg ( cpi -> Source , cm -> frame_to_show , & y , & u , & v ) ; cpi -> total_ssimg_y += y ; cpi -> total_ssimg_u += u ; cpi -> total_ssimg_v += v ; cpi -> total_ssimg_all += frame_all ; } } } # endif if ( is_two_pass_svc ( cpi ) && cm -> show_frame ) { ++ cpi -> svc . spatial_layer_to_encode ; if ( cpi -> svc . spatial_layer_to_encode >= cpi -> svc . number_spatial_layers ) cpi -> svc . spatial_layer_to_encode = 0 ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dumpustr ( FILE * file , char * utf8_str ) { unichar_t * ustr = utf82u_copy ( utf8_str ) , * pt = ustr ; do { putc ( * pt >> 8 , file ) ; putc ( * pt & 0xff , file ) ; } while ( * pt ++ != '\0' ) ; free ( ustr ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static Selectivity calc_arraycontsel ( VariableStatData * vardata , Datum constval , Oid elemtype , Oid operator ) { Selectivity selec ; TypeCacheEntry * typentry ; FmgrInfo * cmpfunc ; ArrayType * array ; typentry = lookup_type_cache ( elemtype , TYPECACHE_CMP_PROC_FINFO ) ; if ( ! OidIsValid ( typentry -> cmp_proc_finfo . fn_oid ) ) return DEFAULT_SEL ( operator ) ; cmpfunc = & typentry -> cmp_proc_finfo ; array = DatumGetArrayTypeP ( constval ) ; if ( HeapTupleIsValid ( vardata -> statsTuple ) ) { Form_pg_statistic stats ; Datum * values ; int nvalues ; float4 * numbers ; int nnumbers ; float4 * hist ; int nhist ; stats = ( Form_pg_statistic ) GETSTRUCT ( vardata -> statsTuple ) ; if ( get_attstatsslot ( vardata -> statsTuple , elemtype , vardata -> atttypmod , STATISTIC_KIND_MCELEM , InvalidOid , NULL , & values , & nvalues , & numbers , & nnumbers ) ) { if ( operator != OID_ARRAY_CONTAINED_OP || ! get_attstatsslot ( vardata -> statsTuple , elemtype , vardata -> atttypmod , STATISTIC_KIND_DECHIST , InvalidOid , NULL , NULL , NULL , & hist , & nhist ) ) { hist = NULL ; nhist = 0 ; } selec = mcelem_array_selec ( array , typentry , values , nvalues , numbers , nnumbers , hist , nhist , operator , cmpfunc ) ; if ( hist ) free_attstatsslot ( elemtype , NULL , 0 , hist , nhist ) ; free_attstatsslot ( elemtype , values , nvalues , numbers , nnumbers ) ; } else { selec = mcelem_array_selec ( array , typentry , NULL , 0 , NULL , 0 , NULL , 0 , operator , cmpfunc ) ; } selec *= ( 1.0 - stats -> stanullfrac ) ; } else { selec = mcelem_array_selec ( array , typentry , NULL , 0 , NULL , 0 , NULL , 0 , operator , cmpfunc ) ; } if ( PointerGetDatum ( array ) != constval ) pfree ( array ) ; return selec ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int set_palette ( BethsoftvidContext * ctx ) { uint32_t * palette = ( uint32_t * ) ctx -> frame . data [ 1 ] ; int a ; if ( bytestream2_get_bytes_left ( & ctx -> g ) < 256 * 3 ) return AVERROR_INVALIDDATA ; for ( a = 0 ; a < 256 ; a ++ ) { palette [ a ] = bytestream2_get_be24u ( & ctx -> g ) * 4 ; } ctx -> frame . palette_has_changed = 1 ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int getnetnum ( const char * num , sockaddr_u * addr , int complain , enum gnn_type a_type ) { NTP_REQUIRE ( AF_UNSPEC == AF ( addr ) || AF_INET == AF ( addr ) || AF_INET6 == AF ( addr ) ) ; if ( ! is_ip_address ( num , AF ( addr ) , addr ) ) return 0 ; if ( IS_IPV6 ( addr ) && ! ipv6_works ) return - 1 ; # ifdef ISC_PLATFORM_HAVESALEN addr -> sa . sa_len = SIZEOF_SOCKADDR ( AF ( addr ) ) ; # endif SET_PORT ( addr , NTP_PORT ) ; DPRINTF ( 2 , ( "getnetnum given %s, got %s\n" , num , stoa ( addr ) ) ) ; return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int matroska_read_seek ( AVFormatContext * s , int stream_index , int64_t timestamp , int flags ) { MatroskaDemuxContext * matroska = s -> priv_data ; MatroskaTrack * tracks = NULL ; AVStream * st = s -> streams [ stream_index ] ; int i , index , index_sub , index_min ; if ( matroska -> cues_parsing_deferred ) { matroska_parse_cues ( matroska ) ; matroska -> cues_parsing_deferred = 0 ; } if ( ! st -> nb_index_entries ) return 0 ; timestamp = FFMAX ( timestamp , st -> index_entries [ 0 ] . timestamp ) ; if ( ( index = av_index_search_timestamp ( st , timestamp , flags ) ) < 0 ) { avio_seek ( s -> pb , st -> index_entries [ st -> nb_index_entries - 1 ] . pos , SEEK_SET ) ; matroska -> current_id = 0 ; while ( ( index = av_index_search_timestamp ( st , timestamp , flags ) ) < 0 ) { matroska_clear_queue ( matroska ) ; if ( matroska_parse_cluster ( matroska ) < 0 ) break ; } } matroska_clear_queue ( matroska ) ; if ( index < 0 ) return 0 ; index_min = index ; tracks = matroska -> tracks . elem ; for ( i = 0 ; i < matroska -> tracks . nb_elem ; i ++ ) { tracks [ i ] . audio . pkt_cnt = 0 ; tracks [ i ] . audio . sub_packet_cnt = 0 ; tracks [ i ] . audio . buf_timecode = AV_NOPTS_VALUE ; tracks [ i ] . end_timecode = 0 ; if ( tracks [ i ] . type == MATROSKA_TRACK_TYPE_SUBTITLE && tracks [ i ] . stream -> discard != AVDISCARD_ALL ) { index_sub = av_index_search_timestamp ( tracks [ i ] . stream , st -> index_entries [ index ] . timestamp , AVSEEK_FLAG_BACKWARD ) ; if ( index_sub >= 0 && st -> index_entries [ index_sub ] . pos < st -> index_entries [ index_min ] . pos && st -> index_entries [ index ] . timestamp - st -> index_entries [ index_sub ] . timestamp < 30000000000 / matroska -> time_scale ) index_min = index_sub ; } } avio_seek ( s -> pb , st -> index_entries [ index_min ] . pos , SEEK_SET ) ; matroska -> current_id = 0 ; matroska -> skip_to_keyframe = ! ( flags & AVSEEK_FLAG_ANY ) ; matroska -> skip_to_timecode = st -> index_entries [ index ] . timestamp ; matroska -> done = 0 ; ff_update_cur_dts ( s , st , st -> index_entries [ index ] . timestamp ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int aes_cfb_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; int num = EVP_CIPHER_CTX_num ( ctx ) ; CRYPTO_cfb128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int optimize_b ( MACROBLOCK * mb , int plane , int block , TX_SIZE tx_size , int ctx ) { MACROBLOCKD * const xd = & mb -> e_mbd ; struct macroblock_plane * const p = & mb -> plane [ plane ] ; struct macroblockd_plane * const pd = & xd -> plane [ plane ] ; const int ref = is_inter_block ( & xd -> mi [ 0 ] . src_mi -> mbmi ) ; vp9_token_state tokens [ 1025 ] [ 2 ] ; unsigned best_index [ 1025 ] [ 2 ] ; uint8_t token_cache [ 1024 ] ; const tran_low_t * const coeff = BLOCK_OFFSET ( mb -> plane [ plane ] . coeff , block ) ; tran_low_t * const qcoeff = BLOCK_OFFSET ( p -> qcoeff , block ) ; tran_low_t * const dqcoeff = BLOCK_OFFSET ( pd -> dqcoeff , block ) ; const int eob = p -> eobs [ block ] ; const PLANE_TYPE type = pd -> plane_type ; const int default_eob = 16 << ( tx_size << 1 ) ; const int mul = 1 + ( tx_size == TX_32X32 ) ; const int16_t * dequant_ptr = pd -> dequant ; const uint8_t * const band_translate = get_band_translate ( tx_size ) ; const scan_order * const so = get_scan ( xd , tx_size , type , block ) ; const int16_t * const scan = so -> scan ; const int16_t * const nb = so -> neighbors ; int next = eob , sz = 0 ; int64_t rdmult = mb -> rdmult * plane_rd_mult [ type ] , rddiv = mb -> rddiv ; int64_t rd_cost0 , rd_cost1 ; int rate0 , rate1 , error0 , error1 , t0 , t1 ; int best , band , pt , i , final_eob ; assert ( ( ! type && ! plane ) || ( type && plane ) ) ; assert ( eob <= default_eob ) ; if ( ! ref ) rdmult = ( rdmult * 9 ) >> 4 ; tokens [ eob ] [ 0 ] . rate = 0 ; tokens [ eob ] [ 0 ] . error = 0 ; tokens [ eob ] [ 0 ] . next = default_eob ; tokens [ eob ] [ 0 ] . token = EOB_TOKEN ; tokens [ eob ] [ 0 ] . qc = 0 ; tokens [ eob ] [ 1 ] = tokens [ eob ] [ 0 ] ; for ( i = 0 ; i < eob ; i ++ ) token_cache [ scan [ i ] ] = vp9_pt_energy_class [ vp9_dct_value_tokens_ptr [ qcoeff [ scan [ i ] ] ] . token ] ; for ( i = eob ; i -- > 0 ; ) { int base_bits , d2 , dx ; const int rc = scan [ i ] ; int x = qcoeff [ rc ] ; if ( x ) { int shortcut = 0 ; error0 = tokens [ next ] [ 0 ] . error ; error1 = tokens [ next ] [ 1 ] . error ; rate0 = tokens [ next ] [ 0 ] . rate ; rate1 = tokens [ next ] [ 1 ] . rate ; t0 = ( vp9_dct_value_tokens_ptr + x ) -> token ; if ( next < default_eob ) { band = band_translate [ i + 1 ] ; pt = trellis_get_coeff_context ( scan , nb , i , t0 , token_cache ) ; rate0 += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ 0 ] [ pt ] [ tokens [ next ] [ 0 ] . token ] ; rate1 += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ 0 ] [ pt ] [ tokens [ next ] [ 1 ] . token ] ; } UPDATE_RD_COST ( ) ; best = rd_cost1 < rd_cost0 ; base_bits = vp9_dct_value_cost_ptr [ x ] ; dx = mul * ( dqcoeff [ rc ] - coeff [ rc ] ) ; d2 = dx * dx ; tokens [ i ] [ 0 ] . rate = base_bits + ( best ? rate1 : rate0 ) ; tokens [ i ] [ 0 ] . error = d2 + ( best ? error1 : error0 ) ; tokens [ i ] [ 0 ] . next = next ; tokens [ i ] [ 0 ] . token = t0 ; tokens [ i ] [ 0 ] . qc = x ; best_index [ i ] [ 0 ] = best ; rate0 = tokens [ next ] [ 0 ] . rate ; rate1 = tokens [ next ] [ 1 ] . rate ; if ( ( abs ( x ) * dequant_ptr [ rc != 0 ] > abs ( coeff [ rc ] ) * mul ) && ( abs ( x ) * dequant_ptr [ rc != 0 ] < abs ( coeff [ rc ] ) * mul + dequant_ptr [ rc != 0 ] ) ) shortcut = 1 ; else shortcut = 0 ; if ( shortcut ) { sz = - ( x < 0 ) ; x -= 2 * sz + 1 ; } if ( ! x ) { t0 = tokens [ next ] [ 0 ] . token == EOB_TOKEN ? EOB_TOKEN : ZERO_TOKEN ; t1 = tokens [ next ] [ 1 ] . token == EOB_TOKEN ? EOB_TOKEN : ZERO_TOKEN ; } else { t0 = t1 = ( vp9_dct_value_tokens_ptr + x ) -> token ; } if ( next < default_eob ) { band = band_translate [ i + 1 ] ; if ( t0 != EOB_TOKEN ) { pt = trellis_get_coeff_context ( scan , nb , i , t0 , token_cache ) ; rate0 += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ ! x ] [ pt ] [ tokens [ next ] [ 0 ] . token ] ; } if ( t1 != EOB_TOKEN ) { pt = trellis_get_coeff_context ( scan , nb , i , t1 , token_cache ) ; rate1 += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ ! x ] [ pt ] [ tokens [ next ] [ 1 ] . token ] ; } } UPDATE_RD_COST ( ) ; best = rd_cost1 < rd_cost0 ; base_bits = vp9_dct_value_cost_ptr [ x ] ; if ( shortcut ) { dx -= ( dequant_ptr [ rc != 0 ] + sz ) ^ sz ; d2 = dx * dx ; } tokens [ i ] [ 1 ] . rate = base_bits + ( best ? rate1 : rate0 ) ; tokens [ i ] [ 1 ] . error = d2 + ( best ? error1 : error0 ) ; tokens [ i ] [ 1 ] . next = next ; tokens [ i ] [ 1 ] . token = best ? t1 : t0 ; tokens [ i ] [ 1 ] . qc = x ; best_index [ i ] [ 1 ] = best ; next = i ; } else { band = band_translate [ i + 1 ] ; t0 = tokens [ next ] [ 0 ] . token ; t1 = tokens [ next ] [ 1 ] . token ; if ( t0 != EOB_TOKEN ) { tokens [ next ] [ 0 ] . rate += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ 1 ] [ 0 ] [ t0 ] ; tokens [ next ] [ 0 ] . token = ZERO_TOKEN ; } if ( t1 != EOB_TOKEN ) { tokens [ next ] [ 1 ] . rate += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ 1 ] [ 0 ] [ t1 ] ; tokens [ next ] [ 1 ] . token = ZERO_TOKEN ; } best_index [ i ] [ 0 ] = best_index [ i ] [ 1 ] = 0 ; } } band = band_translate [ i + 1 ] ; rate0 = tokens [ next ] [ 0 ] . rate ; rate1 = tokens [ next ] [ 1 ] . rate ; error0 = tokens [ next ] [ 0 ] . error ; error1 = tokens [ next ] [ 1 ] . error ; t0 = tokens [ next ] [ 0 ] . token ; t1 = tokens [ next ] [ 1 ] . token ; rate0 += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ 0 ] [ ctx ] [ t0 ] ; rate1 += mb -> token_costs [ tx_size ] [ type ] [ ref ] [ band ] [ 0 ] [ ctx ] [ t1 ] ; UPDATE_RD_COST ( ) ; best = rd_cost1 < rd_cost0 ; final_eob = - 1 ; vpx_memset ( qcoeff , 0 , sizeof ( * qcoeff ) * ( 16 << ( tx_size * 2 ) ) ) ; vpx_memset ( dqcoeff , 0 , sizeof ( * dqcoeff ) * ( 16 << ( tx_size * 2 ) ) ) ; for ( i = next ; i < eob ; i = next ) { const int x = tokens [ i ] [ best ] . qc ; const int rc = scan [ i ] ; if ( x ) { final_eob = i ; } qcoeff [ rc ] = x ; dqcoeff [ rc ] = ( x * dequant_ptr [ rc != 0 ] ) / mul ; next = tokens [ i ] [ best ] . next ; best = best_index [ i ] [ best ] ; } final_eob ++ ; mb -> plane [ plane ] . eobs [ block ] = final_eob ; return final_eob ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void modify_pred ( const int8_t * mod_table , int * mode ) { * mode = mod_table [ * mode ] ; if ( * mode < 0 ) { av_log ( NULL , AV_LOG_ERROR , "Illegal intra prediction mode\n" ) ; * mode = 0 ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void test_bug28075 ( ) { int rc ; DBUG_ENTER ( "test_bug28075" ) ; myheader ( "test_bug28075" ) ; rc = mysql_dump_debug_info ( mysql ) ; DIE_UNLESS ( rc == 0 ) ; rc = mysql_ping ( mysql ) ; DIE_UNLESS ( rc == 0 ) ; DBUG_VOID_RETURN ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static gint protobuf_iter_next ( protobuf_desc_t * pb , protobuf_tag_t * tag ) { gint len ; if ( pb -> bytes_left <= 0 ) { return 0 ; } tag -> value = get_varint64 ( pb -> tvb , pb -> offset , pb -> bytes_left , & len ) ; tag -> field_number = tag -> value >> 3 ; tag -> wire_type = tag -> value & 0x7 ; protobuf_seek_forward ( pb , len ) ; return pb -> bytes_left ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void build_inter_predictors ( MACROBLOCKD * xd , int plane , int block , int bw , int bh , int x , int y , int w , int h , int mi_x , int mi_y ) { struct macroblockd_plane * const pd = & xd -> plane [ plane ] ; const MODE_INFO * mi = xd -> mi [ 0 ] ; const int is_compound = has_second_ref ( & mi -> mbmi ) ; const InterpKernel * kernel = vp9_get_interp_kernel ( mi -> mbmi . interp_filter ) ; int ref ; for ( ref = 0 ; ref < 1 + is_compound ; ++ ref ) { const struct scale_factors * const sf = & xd -> block_refs [ ref ] -> sf ; struct buf_2d * const pre_buf = & pd -> pre [ ref ] ; struct buf_2d * const dst_buf = & pd -> dst ; uint8_t * const dst = dst_buf -> buf + dst_buf -> stride * y + x ; const MV mv = mi -> mbmi . sb_type < BLOCK_8X8 ? average_split_mvs ( pd , mi , ref , block ) : mi -> mbmi . mv [ ref ] . as_mv ; const MV mv_q4 = clamp_mv_to_umv_border_sb ( xd , & mv , bw , bh , pd -> subsampling_x , pd -> subsampling_y ) ; uint8_t * pre ; MV32 scaled_mv ; int xs , ys , subpel_x , subpel_y ; if ( vp9_is_scaled ( sf ) ) { pre = pre_buf -> buf + scaled_buffer_offset ( x , y , pre_buf -> stride , sf ) ; scaled_mv = vp9_scale_mv ( & mv_q4 , mi_x + x , mi_y + y , sf ) ; xs = sf -> x_step_q4 ; ys = sf -> y_step_q4 ; } else { pre = pre_buf -> buf + ( y * pre_buf -> stride + x ) ; scaled_mv . row = mv_q4 . row ; scaled_mv . col = mv_q4 . col ; xs = ys = 16 ; } subpel_x = scaled_mv . col & SUBPEL_MASK ; subpel_y = scaled_mv . row & SUBPEL_MASK ; pre += ( scaled_mv . row >> SUBPEL_BITS ) * pre_buf -> stride + ( scaled_mv . col >> SUBPEL_BITS ) ; inter_predictor ( pre , pre_buf -> stride , dst , dst_buf -> stride , subpel_x , subpel_y , sf , w , h , ref , kernel , xs , ys ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static inline void cirrus_bitblt_bgcol ( CirrusVGAState * s ) { unsigned int color ; switch ( s -> cirrus_blt_pixelwidth ) { case 1 : s -> cirrus_blt_bgcol = s -> cirrus_shadow_gr0 ; break ; case 2 : color = s -> cirrus_shadow_gr0 | ( s -> vga . gr [ 0x10 ] << 8 ) ; s -> cirrus_blt_bgcol = le16_to_cpu ( color ) ; break ; case 3 : s -> cirrus_blt_bgcol = s -> cirrus_shadow_gr0 | ( s -> vga . gr [ 0x10 ] << 8 ) | ( s -> vga . gr [ 0x12 ] << 16 ) ; break ; default : case 4 : color = s -> cirrus_shadow_gr0 | ( s -> vga . gr [ 0x10 ] << 8 ) | ( s -> vga . gr [ 0x12 ] << 16 ) | ( s -> vga . gr [ 0x14 ] << 24 ) ; s -> cirrus_blt_bgcol = le32_to_cpu ( color ) ; break ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dumpglyph ( SplineChar * sc , struct glyphinfo * gi ) { struct glyphhead gh ; DBounds bb ; SplineSet * ss , * ttfss ; int contourcnt , ptcnt , origptcnt ; BasePoint * bp ; char * fs ; SplineChar * isc = sc -> ttf_instrs == NULL && sc -> parent -> mm != NULL && sc -> parent -> mm -> apple ? sc -> parent -> mm -> normal -> glyphs [ sc -> orig_pos ] : sc ; if ( sc -> layers [ gi -> layer ] . splines == NULL && sc -> layers [ gi -> layer ] . refs == NULL ) { dumpspace ( sc , gi ) ; return ; } if ( gi -> next_glyph != sc -> ttf_glyph ) IError ( "Glyph count wrong in ttf output" ) ; if ( gi -> next_glyph >= gi -> maxp -> numGlyphs ) IError ( "max glyph count wrong in ttf output" ) ; gi -> loca [ gi -> next_glyph ] = ftell ( gi -> glyphs ) ; ttfss = SCttfApprox ( sc , gi -> layer ) ; ptcnt = SSTtfNumberPoints ( ttfss ) ; for ( ss = ttfss , contourcnt = 0 ; ss != NULL ; ss = ss -> next ) { ++ contourcnt ; } origptcnt = ptcnt ; SplineSetQuickBounds ( ttfss , & bb ) ; gh . numContours = contourcnt ; gh . xmin = floor ( bb . minx ) ; gh . ymin = floor ( bb . miny ) ; gh . xmax = ceil ( bb . maxx ) ; gh . ymax = ceil ( bb . maxy ) ; dumpghstruct ( gi , & gh ) ; if ( contourcnt > gi -> maxp -> maxContours ) gi -> maxp -> maxContours = contourcnt ; if ( ptcnt > gi -> maxp -> maxPoints ) gi -> maxp -> maxPoints = ptcnt ; bp = malloc ( ptcnt * sizeof ( BasePoint ) ) ; fs = malloc ( ptcnt ) ; ptcnt = contourcnt = 0 ; for ( ss = ttfss ; ss != NULL ; ss = ss -> next ) { ptcnt = SSAddPoints ( ss , ptcnt , bp , fs ) ; putshort ( gi -> glyphs , ptcnt - 1 ) ; } if ( ptcnt != origptcnt ) IError ( "Point count wrong calculated=%d, actual=%d in %.20s" , origptcnt , ptcnt , sc -> name ) ; gi -> pointcounts [ gi -> next_glyph ++ ] = ptcnt ; dumpinstrs ( gi , isc -> ttf_instrs , isc -> ttf_instrs_len ) ; dumppointarrays ( gi , bp , fs , ptcnt ) ; SplinePointListsFree ( ttfss ) ; free ( bp ) ; free ( fs ) ; ttfdumpmetrics ( sc , gi , & bb ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_mswsp_smb ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree , void * data ) { smb_info_t * si = ( smb_info_t * ) data ; gboolean in = si -> request ; smb_fid_info_t * fid_info = NULL ; fid_info = find_fid_info ( si ) ; if ( ! fid_info || ! fid_info -> fsi || ! fid_info -> fsi -> filename ) { return 0 ; } if ( g_ascii_strcasecmp ( fid_info -> fsi -> filename , "\\MsFteWds" ) != 0 ) { return 0 ; } p_add_proto_data ( wmem_file_scope ( ) , pinfo , proto_mswsp , 0 , ( void * ) & SMB1 ) ; return dissect_mswsp ( tvb , pinfo , tree , in , data ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp8_de_noise ( VP8_COMMON * cm , YV12_BUFFER_CONFIG * source , YV12_BUFFER_CONFIG * post , int q , int low_var_thresh , int flag , int uvfilter ) { int mbr ; double level = 6.0e-05 * q * q * q - .0067 * q * q + .306 * q + .0065 ; int ppl = ( int ) ( level + .5 ) ; int mb_rows = cm -> mb_rows ; int mb_cols = cm -> mb_cols ; unsigned char * limits = cm -> pp_limits_buffer ; ; ( void ) post ; ( void ) low_var_thresh ; ( void ) flag ; vpx_memset ( limits , ( unsigned char ) ppl , 16 * mb_cols ) ; for ( mbr = 0 ; mbr < mb_rows ; mbr ++ ) { vp8_post_proc_down_and_across_mb_row ( source -> y_buffer + 16 * mbr * source -> y_stride , source -> y_buffer + 16 * mbr * source -> y_stride , source -> y_stride , source -> y_stride , source -> y_width , limits , 16 ) ; if ( uvfilter == 1 ) { vp8_post_proc_down_and_across_mb_row ( source -> u_buffer + 8 * mbr * source -> uv_stride , source -> u_buffer + 8 * mbr * source -> uv_stride , source -> uv_stride , source -> uv_stride , source -> uv_width , limits , 8 ) ; vp8_post_proc_down_and_across_mb_row ( source -> v_buffer + 8 * mbr * source -> uv_stride , source -> v_buffer + 8 * mbr * source -> uv_stride , source -> uv_stride , source -> uv_stride , source -> uv_width , limits , 8 ) ; } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static uint get_table_structure ( char * table , char * db , char * table_type , char * ignore_flag ) { my_bool init = 0 , delayed , write_data , complete_insert ; my_ulonglong num_fields ; char * result_table , * opt_quoted_table ; const char * insert_option ; char name_buff [ NAME_LEN + 3 ] , table_buff [ NAME_LEN * 2 + 3 ] ; char table_buff2 [ NAME_LEN * 2 + 3 ] , query_buff [ QUERY_LENGTH ] ; const char * show_fields_stmt = "SELECT `COLUMN_NAME` AS `Field`, " "`COLUMN_TYPE` AS `Type`, " "`IS_NULLABLE` AS `Null`, " "`COLUMN_KEY` AS `Key`, " "`COLUMN_DEFAULT` AS `Default`, " "`EXTRA` AS `Extra`, " "`COLUMN_COMMENT` AS `Comment` " "FROM `INFORMATION_SCHEMA`.`COLUMNS` WHERE " "TABLE_SCHEMA = '%s' AND TABLE_NAME = '%s'" ; FILE * sql_file = md_result_file ; int len ; my_bool is_log_table ; MYSQL_RES * result ; MYSQL_ROW row ; DBUG_ENTER ( "get_table_structure" ) ; DBUG_PRINT ( "enter" , ( "db: %s table: %s" , db , table ) ) ; * ignore_flag = check_if_ignore_table ( table , table_type ) ; delayed = opt_delayed ; if ( delayed && ( * ignore_flag & IGNORE_INSERT_DELAYED ) ) { delayed = 0 ; verbose_msg ( "-- Warning: Unable to use delayed inserts for table '%s' " "because it's of type %s\n" , table , table_type ) ; } complete_insert = 0 ; if ( ( write_data = ! ( * ignore_flag & IGNORE_DATA ) ) ) { complete_insert = opt_complete_insert ; if ( ! insert_pat_inited ) { insert_pat_inited = 1 ; init_dynamic_string_checked ( & insert_pat , "" , 1024 , 1024 ) ; } else dynstr_set_checked ( & insert_pat , "" ) ; } insert_option = ( ( delayed && opt_ignore ) ? " DELAYED IGNORE " : delayed ? " DELAYED " : opt_ignore ? " IGNORE " : "" ) ; verbose_msg ( "-- Retrieving table structure for table %s...\n" , table ) ; len = my_snprintf ( query_buff , sizeof ( query_buff ) , "SET SQL_QUOTE_SHOW_CREATE=%d" , ( opt_quoted || opt_keywords ) ) ; if ( ! create_options ) strmov ( query_buff + len , "/*!40102 ,SQL_MODE=concat(@@sql_mode, _utf8 ',NO_KEY_OPTIONS,NO_TABLE_OPTIONS,NO_FIELD_OPTIONS') */" ) ; result_table = quote_name ( table , table_buff , 1 ) ; opt_quoted_table = quote_name ( table , table_buff2 , 0 ) ; if ( opt_order_by_primary ) order_by = primary_key_fields ( result_table ) ; if ( ! opt_xml && ! mysql_query_with_error_report ( mysql , 0 , query_buff ) ) { if ( ! opt_no_create_info ) { char buff [ 20 + FN_REFLEN ] ; MYSQL_FIELD * field ; my_snprintf ( buff , sizeof ( buff ) , "show create table %s" , result_table ) ; if ( switch_character_set_results ( mysql , "binary" ) || mysql_query_with_error_report ( mysql , & result , buff ) || switch_character_set_results ( mysql , default_charset ) ) DBUG_RETURN ( 0 ) ; if ( path ) { if ( ! ( sql_file = open_sql_file_for_table ( table , O_WRONLY ) ) ) DBUG_RETURN ( 0 ) ; write_header ( sql_file , db ) ; } if ( strcmp ( table_type , "VIEW" ) == 0 ) print_comment ( sql_file , 0 , "\n--\n-- Temporary table structure for view %s\n--\n\n" , fix_for_comment ( result_table ) ) ; else print_comment ( sql_file , 0 , "\n--\n-- Table structure for table %s\n--\n\n" , fix_for_comment ( result_table ) ) ; if ( opt_drop ) { if ( ! general_log_or_slow_log_tables ( db , table ) ) fprintf ( sql_file , "DROP TABLE IF EXISTS %s; \n" , opt_quoted_table ) ; check_io ( sql_file ) ; } field = mysql_fetch_field_direct ( result , 0 ) ; if ( strcmp ( field -> name , "View" ) == 0 ) { char * scv_buff = NULL ; my_ulonglong n_cols ; verbose_msg ( "-- It's a view, create dummy table for view\n" ) ; if ( ( row = mysql_fetch_row ( result ) ) && ( scv_buff = row [ 1 ] ) ) scv_buff = my_strdup ( scv_buff , MYF ( 0 ) ) ; mysql_free_result ( result ) ; my_snprintf ( query_buff , sizeof ( query_buff ) , "SHOW FIELDS FROM %s" , result_table ) ; if ( switch_character_set_results ( mysql , "binary" ) || mysql_query_with_error_report ( mysql , & result , query_buff ) || switch_character_set_results ( mysql , default_charset ) ) { if ( mysql_errno ( mysql ) == ER_VIEW_INVALID ) fprintf ( sql_file , "\n-- failed on view %s: %s\n\n" , result_table , scv_buff ? scv_buff : "" ) ; my_free ( scv_buff ) ; DBUG_RETURN ( 0 ) ; } else my_free ( scv_buff ) ; n_cols = mysql_num_rows ( result ) ; if ( 0 != n_cols ) { if ( n_cols >= 1000 ) fprintf ( stderr , "-- Warning: Creating a stand-in table for view %s may" " fail when replaying the dump file produced because " "of the number of columns exceeding 1000. Exercise " "caution when replaying the produced dump file.\n" , table ) ; if ( opt_drop ) { fprintf ( sql_file , "/*!50001 DROP VIEW IF EXISTS %s*/; \n" , opt_quoted_table ) ; check_io ( sql_file ) ; } fprintf ( sql_file , "SET @saved_cs_client = @@character_set_client; \n" "SET character_set_client = utf8; \n" "/*!50001 CREATE TABLE %s (\n" , result_table ) ; row = mysql_fetch_row ( result ) ; fprintf ( sql_file , " %s tinyint NOT NULL" , quote_name ( row [ 0 ] , name_buff , 0 ) ) ; while ( ( row = mysql_fetch_row ( result ) ) ) { fprintf ( sql_file , ",\n %s tinyint NOT NULL" , quote_name ( row [ 0 ] , name_buff , 0 ) ) ; } fprintf ( sql_file , "\n) ENGINE=MyISAM */; \n" "SET character_set_client = @saved_cs_client; \n" ) ; check_io ( sql_file ) ; } mysql_free_result ( result ) ; if ( path ) my_fclose ( sql_file , MYF ( MY_WME ) ) ; seen_views = 1 ; DBUG_RETURN ( 0 ) ; } row = mysql_fetch_row ( result ) ; is_log_table = general_log_or_slow_log_tables ( db , table ) ; if ( is_log_table ) row [ 1 ] += 13 ; if ( opt_compatible_mode & 3 ) { fprintf ( sql_file , is_log_table ? "CREATE TABLE IF NOT EXISTS %s; \n" : "%s; \n" , row [ 1 ] ) ; } else { fprintf ( sql_file , "/*!40101 SET @saved_cs_client = @@character_set_client */; \n" "/*!40101 SET character_set_client = utf8 */; \n" "%s%s; \n" "/*!40101 SET character_set_client = @saved_cs_client */; \n" , is_log_table ? "CREATE TABLE IF NOT EXISTS " : "" , row [ 1 ] ) ; } check_io ( sql_file ) ; mysql_free_result ( result ) ; } my_snprintf ( query_buff , sizeof ( query_buff ) , "show fields from %s" , result_table ) ; if ( mysql_query_with_error_report ( mysql , & result , query_buff ) ) { if ( path ) my_fclose ( sql_file , MYF ( MY_WME ) ) ; DBUG_RETURN ( 0 ) ; } if ( write_data ) { if ( opt_replace_into ) dynstr_append_checked ( & insert_pat , "REPLACE " ) ; else dynstr_append_checked ( & insert_pat , "INSERT " ) ; dynstr_append_checked ( & insert_pat , insert_option ) ; dynstr_append_checked ( & insert_pat , "INTO " ) ; dynstr_append_checked ( & insert_pat , opt_quoted_table ) ; if ( complete_insert ) { dynstr_append_checked ( & insert_pat , " (" ) ; } else { dynstr_append_checked ( & insert_pat , " VALUES " ) ; if ( ! extended_insert ) dynstr_append_checked ( & insert_pat , "(" ) ; } } while ( ( row = mysql_fetch_row ( result ) ) ) { if ( complete_insert ) { if ( init ) { dynstr_append_checked ( & insert_pat , ", " ) ; } init = 1 ; dynstr_append_checked ( & insert_pat , quote_name ( row [ SHOW_FIELDNAME ] , name_buff , 0 ) ) ; } } num_fields = mysql_num_rows ( result ) ; mysql_free_result ( result ) ; } else { verbose_msg ( "%s: Warning: Can't set SQL_QUOTE_SHOW_CREATE option (%s)\n" , my_progname_short , mysql_error ( mysql ) ) ; my_snprintf ( query_buff , sizeof ( query_buff ) , show_fields_stmt , db , table ) ; if ( mysql_query_with_error_report ( mysql , & result , query_buff ) ) DBUG_RETURN ( 0 ) ; if ( ! opt_no_create_info ) { if ( path ) { if ( ! ( sql_file = open_sql_file_for_table ( table , O_WRONLY ) ) ) DBUG_RETURN ( 0 ) ; write_header ( sql_file , db ) ; } print_comment ( sql_file , 0 , "\n--\n-- Table structure for table %s\n--\n\n" , fix_for_comment ( result_table ) ) ; if ( opt_drop ) fprintf ( sql_file , "DROP TABLE IF EXISTS %s; \n" , result_table ) ; if ( ! opt_xml ) fprintf ( sql_file , "CREATE TABLE %s (\n" , result_table ) ; else print_xml_tag ( sql_file , "\t" , "\n" , "table_structure" , "name=" , table , NullS ) ; check_io ( sql_file ) ; } if ( write_data ) { if ( opt_replace_into ) dynstr_append_checked ( & insert_pat , "REPLACE " ) ; else dynstr_append_checked ( & insert_pat , "INSERT " ) ; dynstr_append_checked ( & insert_pat , insert_option ) ; dynstr_append_checked ( & insert_pat , "INTO " ) ; dynstr_append_checked ( & insert_pat , result_table ) ; if ( complete_insert ) dynstr_append_checked ( & insert_pat , " (" ) ; else { dynstr_append_checked ( & insert_pat , " VALUES " ) ; if ( ! extended_insert ) dynstr_append_checked ( & insert_pat , "(" ) ; } } while ( ( row = mysql_fetch_row ( result ) ) ) { ulong * lengths = mysql_fetch_lengths ( result ) ; if ( init ) { if ( ! opt_xml && ! opt_no_create_info ) { fputs ( ",\n" , sql_file ) ; check_io ( sql_file ) ; } if ( complete_insert ) dynstr_append_checked ( & insert_pat , ", " ) ; } init = 1 ; if ( complete_insert ) dynstr_append_checked ( & insert_pat , quote_name ( row [ SHOW_FIELDNAME ] , name_buff , 0 ) ) ; if ( ! opt_no_create_info ) { if ( opt_xml ) { print_xml_row ( sql_file , "field" , result , & row , NullS ) ; continue ; } if ( opt_keywords ) fprintf ( sql_file , " %s.%s %s" , result_table , quote_name ( row [ SHOW_FIELDNAME ] , name_buff , 0 ) , row [ SHOW_TYPE ] ) ; else fprintf ( sql_file , " %s %s" , quote_name ( row [ SHOW_FIELDNAME ] , name_buff , 0 ) , row [ SHOW_TYPE ] ) ; if ( row [ SHOW_DEFAULT ] ) { fputs ( " DEFAULT " , sql_file ) ; unescape ( sql_file , row [ SHOW_DEFAULT ] , lengths [ SHOW_DEFAULT ] ) ; } if ( ! row [ SHOW_NULL ] [ 0 ] ) fputs ( " NOT NULL" , sql_file ) ; if ( row [ SHOW_EXTRA ] [ 0 ] ) fprintf ( sql_file , " %s" , row [ SHOW_EXTRA ] ) ; check_io ( sql_file ) ; } } num_fields = mysql_num_rows ( result ) ; mysql_free_result ( result ) ; if ( ! opt_no_create_info ) { char buff [ 20 + FN_REFLEN ] ; uint keynr , primary_key ; my_snprintf ( buff , sizeof ( buff ) , "show keys from %s" , result_table ) ; if ( mysql_query_with_error_report ( mysql , & result , buff ) ) { if ( mysql_errno ( mysql ) == ER_WRONG_OBJECT ) { fputs ( "\t\t<options Comment=\"view\" />\n" , sql_file ) ; goto continue_xml ; } fprintf ( stderr , "%s: Can't get keys for table %s (%s)\n" , my_progname_short , result_table , mysql_error ( mysql ) ) ; if ( path ) my_fclose ( sql_file , MYF ( MY_WME ) ) ; DBUG_RETURN ( 0 ) ; } keynr = 0 ; primary_key = INT_MAX ; while ( ( row = mysql_fetch_row ( result ) ) ) { if ( atoi ( row [ 3 ] ) == 1 ) { keynr ++ ; # ifdef FORCE_PRIMARY_KEY if ( atoi ( row [ 1 ] ) == 0 && primary_key == INT_MAX ) primary_key = keynr ; # endif if ( ! strcmp ( row [ 2 ] , "PRIMARY" ) ) { primary_key = keynr ; break ; } } } mysql_data_seek ( result , 0 ) ; keynr = 0 ; while ( ( row = mysql_fetch_row ( result ) ) ) { if ( opt_xml ) { print_xml_row ( sql_file , "key" , result , & row , NullS ) ; continue ; } if ( atoi ( row [ 3 ] ) == 1 ) { if ( keynr ++ ) putc ( ')' , sql_file ) ; if ( atoi ( row [ 1 ] ) ) fprintf ( sql_file , ",\n KEY %s (" , quote_name ( row [ 2 ] , name_buff , 0 ) ) ; else if ( keynr == primary_key ) fputs ( ",\n PRIMARY KEY (" , sql_file ) ; else fprintf ( sql_file , ",\n UNIQUE %s (" , quote_name ( row [ 2 ] , name_buff , 0 ) ) ; } else putc ( ',' , sql_file ) ; fputs ( quote_name ( row [ 4 ] , name_buff , 0 ) , sql_file ) ; if ( row [ 7 ] ) fprintf ( sql_file , " (%s)" , row [ 7 ] ) ; check_io ( sql_file ) ; } mysql_free_result ( result ) ; if ( ! opt_xml ) { if ( keynr ) putc ( ')' , sql_file ) ; fputs ( "\n)" , sql_file ) ; check_io ( sql_file ) ; } if ( create_options ) { char show_name_buff [ NAME_LEN * 2 + 2 + 24 ] ; my_snprintf ( buff , sizeof ( buff ) , "show table status like %s" , quote_for_like ( table , show_name_buff ) ) ; if ( mysql_query_with_error_report ( mysql , & result , buff ) ) { if ( mysql_errno ( mysql ) != ER_PARSE_ERROR ) { verbose_msg ( "-- Warning: Couldn't get status information for " "table %s (%s)\n" , result_table , mysql_error ( mysql ) ) ; } } else if ( ! ( row = mysql_fetch_row ( result ) ) ) { fprintf ( stderr , "Error: Couldn't read status information for table %s (%s)\n" , result_table , mysql_error ( mysql ) ) ; } else { if ( opt_xml ) print_xml_row ( sql_file , "options" , result , & row , NullS ) ; else { fputs ( "/*!" , sql_file ) ; print_value ( sql_file , result , row , "engine=" , "Engine" , 0 ) ; print_value ( sql_file , result , row , "" , "Create_options" , 0 ) ; print_value ( sql_file , result , row , "comment=" , "Comment" , 1 ) ; fputs ( " */" , sql_file ) ; check_io ( sql_file ) ; } } mysql_free_result ( result ) ; } continue_xml : if ( ! opt_xml ) fputs ( "; \n" , sql_file ) ; else fputs ( "\t</table_structure>\n" , sql_file ) ; check_io ( sql_file ) ; } } if ( complete_insert ) { dynstr_append_checked ( & insert_pat , ") VALUES " ) ; if ( ! extended_insert ) dynstr_append_checked ( & insert_pat , "(" ) ; } if ( sql_file != md_result_file ) { fputs ( "\n" , sql_file ) ; write_footer ( sql_file ) ; my_fclose ( sql_file , MYF ( MY_WME ) ) ; } DBUG_RETURN ( ( uint ) num_fields ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
const mbfl_encoding * mbfl_identify_encoding ( mbfl_string * string , enum mbfl_no_encoding * elist , int elistsz , int strict ) { int i , n , num , bad ; unsigned char * p ; mbfl_identify_filter * flist , * filter ; const mbfl_encoding * encoding ; flist = ( mbfl_identify_filter * ) mbfl_calloc ( elistsz , sizeof ( mbfl_identify_filter ) ) ; if ( flist == NULL ) { return NULL ; } num = 0 ; if ( elist != NULL ) { for ( i = 0 ; i < elistsz ; i ++ ) { if ( ! mbfl_identify_filter_init ( & flist [ num ] , elist [ i ] ) ) { num ++ ; } } } n = string -> len ; p = string -> val ; if ( p != NULL ) { bad = 0 ; while ( n > 0 ) { for ( i = 0 ; i < num ; i ++ ) { filter = & flist [ i ] ; if ( ! filter -> flag ) { ( * filter -> filter_function ) ( * p , filter ) ; if ( filter -> flag ) { bad ++ ; } } } if ( ( num - 1 ) <= bad && ! strict ) { break ; } p ++ ; n -- ; } } encoding = NULL ; for ( i = 0 ; i < num ; i ++ ) { filter = & flist [ i ] ; if ( ! filter -> flag ) { if ( strict && filter -> status ) { continue ; } encoding = filter -> encoding ; break ; } } if ( ! encoding ) { for ( i = 0 ; i < num ; i ++ ) { filter = & flist [ i ] ; if ( ! filter -> flag && ( ! strict || ! filter -> status ) ) { encoding = filter -> encoding ; break ; } } } i = num ; while ( -- i >= 0 ) { mbfl_identify_filter_cleanup ( & flist [ i ] ) ; } mbfl_free ( ( void * ) flist ) ; return encoding ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void link_info_cancel ( NautilusDirectory * directory ) { if ( directory -> details -> link_info_read_state != NULL ) { g_cancellable_cancel ( directory -> details -> link_info_read_state -> cancellable ) ; directory -> details -> link_info_read_state -> directory = NULL ; directory -> details -> link_info_read_state = NULL ; async_job_end ( directory , "link info" ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
uint8_t * * jbig2_decode_gray_scale_image ( Jbig2Ctx * ctx , Jbig2Segment * segment , const byte * data , const size_t size , bool GSMMR , uint32_t GSW , uint32_t GSH , uint32_t GSBPP , bool GSUSESKIP , Jbig2Image * GSKIP , int GSTEMPLATE , Jbig2ArithCx * GB_stats ) { uint8_t * * GSVALS = NULL ; size_t consumed_bytes = 0 ; uint32_t i , j , stride , x , y ; int code ; Jbig2Image * * GSPLANES ; Jbig2GenericRegionParams rparams ; Jbig2WordStream * ws = NULL ; Jbig2ArithState * as = NULL ; GSPLANES = jbig2_new ( ctx , Jbig2Image * , GSBPP ) ; if ( GSPLANES == NULL ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "failed to allocate %d bytes for GSPLANES" , GSBPP ) ; return NULL ; } for ( i = 0 ; i < GSBPP ; ++ i ) { GSPLANES [ i ] = jbig2_image_new ( ctx , GSW , GSH ) ; if ( GSPLANES [ i ] == NULL ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "failed to allocate %dx%d image for GSPLANES" , GSW , GSH ) ; for ( j = i ; j > 0 ; ) jbig2_image_release ( ctx , GSPLANES [ -- j ] ) ; jbig2_free ( ctx -> allocator , GSPLANES ) ; return NULL ; } } rparams . MMR = GSMMR ; rparams . GBTEMPLATE = GSTEMPLATE ; rparams . TPGDON = 0 ; rparams . USESKIP = GSUSESKIP ; rparams . gbat [ 0 ] = ( GSTEMPLATE <= 1 ? 3 : 2 ) ; rparams . gbat [ 1 ] = - 1 ; rparams . gbat [ 2 ] = - 3 ; rparams . gbat [ 3 ] = - 1 ; rparams . gbat [ 4 ] = 2 ; rparams . gbat [ 5 ] = - 2 ; rparams . gbat [ 6 ] = - 2 ; rparams . gbat [ 7 ] = - 2 ; if ( GSMMR ) { code = jbig2_decode_halftone_mmr ( ctx , & rparams , data , size , GSPLANES [ GSBPP - 1 ] , & consumed_bytes ) ; } else { ws = jbig2_word_stream_buf_new ( ctx , data , size ) ; if ( ws == NULL ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "failed to allocate ws in jbig2_decode_gray_scale_image" ) ; goto cleanup ; } as = jbig2_arith_new ( ctx , ws ) ; if ( as == NULL ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "failed to allocate as in jbig2_decode_gray_scale_image" ) ; goto cleanup ; } code = jbig2_decode_generic_region ( ctx , segment , & rparams , as , GSPLANES [ GSBPP - 1 ] , GB_stats ) ; } if ( code != 0 ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "error decoding GSPLANES for halftone image" ) ; goto cleanup ; } j = GSBPP - 1 ; while ( j > 0 ) { j -- ; if ( GSMMR ) { code = jbig2_decode_halftone_mmr ( ctx , & rparams , data + consumed_bytes , size - consumed_bytes , GSPLANES [ j ] , & consumed_bytes ) ; } else { code = jbig2_decode_generic_region ( ctx , segment , & rparams , as , GSPLANES [ j ] , GB_stats ) ; } if ( code != 0 ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "error decoding GSPLANES for halftone image" ) ; goto cleanup ; } stride = GSPLANES [ 0 ] -> stride ; for ( i = 0 ; i < stride * GSH ; ++ i ) GSPLANES [ j ] -> data [ i ] ^= GSPLANES [ j + 1 ] -> data [ i ] ; } GSVALS = jbig2_new ( ctx , uint8_t * , GSW ) ; if ( GSVALS == NULL ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "failed to allocate GSVALS: %d bytes" , GSW ) ; goto cleanup ; } for ( i = 0 ; i < GSW ; ++ i ) { GSVALS [ i ] = jbig2_new ( ctx , uint8_t , GSH ) ; if ( GSVALS [ i ] == NULL ) { jbig2_error ( ctx , JBIG2_SEVERITY_FATAL , segment -> number , "failed to allocate GSVALS: %d bytes" , GSH * GSW ) ; for ( j = i ; j > 0 ; ) jbig2_free ( ctx -> allocator , GSVALS [ -- j ] ) ; jbig2_free ( ctx -> allocator , GSVALS ) ; GSVALS = NULL ; goto cleanup ; } } for ( x = 0 ; x < GSW ; ++ x ) { for ( y = 0 ; y < GSH ; ++ y ) { GSVALS [ x ] [ y ] = 0 ; for ( j = 0 ; j < GSBPP ; ++ j ) GSVALS [ x ] [ y ] += jbig2_image_get_pixel ( GSPLANES [ j ] , x , y ) << j ; } } cleanup : if ( ! GSMMR ) { jbig2_free ( ctx -> allocator , as ) ; jbig2_word_stream_buf_free ( ctx , ws ) ; } for ( i = 0 ; i < GSBPP ; ++ i ) jbig2_image_release ( ctx , GSPLANES [ i ] ) ; jbig2_free ( ctx -> allocator , GSPLANES ) ; return GSVALS ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
PGconn * GetConnection ( Archive * AHX ) { ArchiveHandle * AH = ( ArchiveHandle * ) AHX ; return AH -> connection ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int zsave ( i_ctx_t * i_ctx_p ) { os_ptr op = osp ; uint space = icurrent_space ; vm_save_t * vmsave ; ulong sid ; int code ; gs_gstate * prev ; if ( I_VALIDATE_BEFORE_SAVE ) ivalidate_clean_spaces ( i_ctx_p ) ; ialloc_set_space ( idmemory , avm_local ) ; vmsave = ialloc_struct ( vm_save_t , & st_vm_save , "zsave" ) ; ialloc_set_space ( idmemory , space ) ; if ( vmsave == 0 ) return_error ( gs_error_VMerror ) ; vmsave -> gsave = NULL ; code = alloc_save_state ( idmemory , vmsave , & sid ) ; if ( code < 0 ) return code ; if ( sid == 0 ) { ifree_object ( vmsave , "zsave" ) ; return_error ( gs_error_VMerror ) ; } if_debug2m ( 'u' , imemory , "[u]vmsave 0x%lx, id = %lu\n" , ( ulong ) vmsave , ( ulong ) sid ) ; code = gs_gsave_for_save ( igs , & prev ) ; if ( code < 0 ) return code ; code = gs_gsave ( igs ) ; if ( code < 0 ) return code ; vmsave -> gsave = prev ; push ( 1 ) ; make_tav ( op , t_save , 0 , saveid , sid ) ; if ( I_VALIDATE_AFTER_SAVE ) ivalidate_clean_spaces ( i_ctx_p ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void proto_register_sigcomp ( void ) { static hf_register_info hf [ ] = { { & hf_sigcomp_t_bit , { "T bit" , "sigcomp.t.bit" , FT_UINT8 , BASE_DEC , NULL , 0x04 , "Sigcomp T bit" , HFILL } } , { & hf_sigcomp_len , { "Partial state id length" , "sigcomp.length" , FT_UINT8 , BASE_HEX , VALS ( length_encoding_vals ) , 0x03 , "Sigcomp length" , HFILL } } , { & hf_sigcomp_returned_feedback_item , { "Returned_feedback item" , "sigcomp.returned.feedback.item" , FT_BYTES , BASE_NONE , NULL , 0x0 , "Returned feedback item" , HFILL } } , { & hf_sigcomp_partial_state , { "Partial state identifier" , "sigcomp.partial.state.identifier" , FT_STRING , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_remaining_message_bytes , { "Remaining SigComp message bytes" , "sigcomp.remaining-bytes" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "Number of bytes remaining in message" , HFILL } } , { & hf_sigcomp_compression_ratio , { "Compression ratio (%)" , "sigcomp.compression-ratio" , FT_UINT32 , BASE_DEC , NULL , 0x0 , "Compression ratio (decompressed / compressed) %" , HFILL } } , { & hf_sigcomp_returned_feedback_item_len , { "Returned feedback item length" , "sigcomp.returned.feedback.item.len" , FT_UINT8 , BASE_DEC , NULL , 0x7f , NULL , HFILL } } , { & hf_sigcomp_code_len , { "Code length" , "sigcomp.code.len" , FT_UINT16 , BASE_HEX , NULL , 0xfff0 , NULL , HFILL } } , { & hf_sigcomp_destination , { "Destination" , "sigcomp.destination" , FT_UINT8 , BASE_HEX | BASE_EXT_STRING , & destination_address_encoding_vals_ext , 0xf , NULL , HFILL } } , { & hf_sigcomp_udvm_bytecode , { "Uploaded UDVM bytecode" , "sigcomp.udvm.byte-code" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_udvm_instr , { "UDVM instruction code" , "sigcomp.udvm.instr" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & udvm_instruction_code_vals_ext , 0x0 , NULL , HFILL } } , { & hf_udvm_execution_trace , { "UDVM execution trace" , "sigcomp.udvm.execution-trace" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_udvm_multitype_bytecode , { "UDVM bytecode" , "sigcomp.udvm.multyt.bytecode" , FT_UINT8 , BASE_HEX , VALS ( display_bytecode_vals ) , 0x0 , NULL , HFILL } } , { & hf_udvm_reference_bytecode , { "UDVM bytecode" , "sigcomp.udvm.ref.bytecode" , FT_UINT8 , BASE_HEX , VALS ( display_ref_bytecode_vals ) , 0x0 , NULL , HFILL } } , { & hf_udvm_literal_bytecode , { "UDVM bytecode" , "sigcomp.udvm.lit.bytecode" , FT_UINT8 , BASE_HEX , VALS ( display_lit_bytecode_vals ) , 0x0 , NULL , HFILL } } , # if 0 { & hf_udvm_operand , { "UDVM operand" , "sigcomp.udvm.operand" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , # endif { & hf_udvm_length , { "%Length" , "sigcomp.udvm.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Length" , HFILL } } , { & hf_udvm_addr_length , { "%Length[memory address]" , "sigcomp.udvm.addr.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Length" , HFILL } } , { & hf_udvm_destination , { "%Destination" , "sigcomp.udvm.destination" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Destination" , HFILL } } , { & hf_udvm_addr_destination , { "%Destination[memory address]" , "sigcomp.udvm.addr.destination" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Destination" , HFILL } } , { & hf_udvm_at_address , { "@Address(mem_add_of_inst + D) mod 2^16)" , "sigcomp.udvm.at.address" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Address" , HFILL } } , { & hf_udvm_address , { "%Address" , "sigcomp.udvm.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Address" , HFILL } } , { & hf_udvm_literal_num , { "#n" , "sigcomp.udvm.literal-num" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Literal number" , HFILL } } , { & hf_udvm_value , { "%Value" , "sigcomp.udvm.value" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Value" , HFILL } } , { & hf_udvm_addr_value , { "%Value[memory address]" , "sigcomp.udvm.value" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Value" , HFILL } } , { & hf_partial_identifier_start , { "%Partial identifier start" , "sigcomp.udvm.partial.identifier.start" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Partial identifier start" , HFILL } } , { & hf_partial_identifier_length , { "%Partial identifier length" , "sigcomp.udvm.partial.identifier.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Partial identifier length" , HFILL } } , { & hf_state_begin , { "%State begin" , "sigcomp.udvm.state.begin" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "State begin" , HFILL } } , { & hf_udvm_state_length , { "%State length" , "sigcomp.udvm.state.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "State length" , HFILL } } , { & hf_udvm_state_length_addr , { "%State length[memory address]" , "sigcomp.udvm.state.length.addr" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "State length" , HFILL } } , { & hf_udvm_state_address , { "%State address" , "sigcomp.udvm.start.address" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "State address" , HFILL } } , { & hf_udvm_state_address_addr , { "%State address[memory address]" , "sigcomp.udvm.start.address.addr" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "State address" , HFILL } } , { & hf_udvm_state_instr , { "%State instruction" , "sigcomp.udvm.start.instr" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "State instruction" , HFILL } } , { & hf_udvm_operand_1 , { "$Operand 1[memory address]" , "sigcomp.udvm.operand.1" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Reference $ Operand 1" , HFILL } } , { & hf_udvm_operand_2 , { "%Operand 2" , "sigcomp.udvm.operand.2" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Operand 2" , HFILL } } , { & hf_udvm_operand_2_addr , { "%Operand 2[memory address]" , "sigcomp.udvm.operand.2.addr" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Operand 2" , HFILL } } , { & hf_udvm_j , { "%j" , "sigcomp.udvm.j" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "j" , HFILL } } , { & hf_udvm_addr_j , { "%j[memory address]" , "sigcomp.udvm.addr.j" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "j" , HFILL } } , { & hf_udvm_output_start , { "%Output_start" , "sigcomp.output.start" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Output start" , HFILL } } , { & hf_udvm_addr_output_start , { "%Output_start[memory address]" , "sigcomp.addr.output.start" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Output start" , HFILL } } , { & hf_udvm_output_length , { "%Output_length" , "sigcomp.output.length" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Output length" , HFILL } } , { & hf_udvm_output_length_addr , { "%Output_length[memory address]" , "sigcomp.output.length.addr" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Output length" , HFILL } } , { & hf_udvm_req_feedback_loc , { "%Requested feedback location" , "sigcomp.req.feedback.loc" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Requested feedback location" , HFILL } } , { & hf_udvm_min_acc_len , { "%Minimum access length" , "sigcomp.min.acc.len" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Minimum access length" , HFILL } } , { & hf_udvm_state_ret_pri , { "%State retention priority" , "sigcomp.udvm.state.ret.pri" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "State retention priority" , HFILL } } , { & hf_udvm_ret_param_loc , { "%Returned parameters location" , "sigcomp.ret.param.loc" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Returned parameters location" , HFILL } } , { & hf_udvm_position , { "%Position" , "sigcomp.udvm.position" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Position" , HFILL } } , { & hf_udvm_ref_dest , { "$Destination[memory address]" , "sigcomp.udvm.ref.destination" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "(reference)Destination" , HFILL } } , { & hf_udvm_bits , { "%Bits" , "sigcomp.udvm.bits" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Bits" , HFILL } } , { & hf_udvm_lower_bound , { "%Lower bound" , "sigcomp.udvm.lower.bound" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Lower_bound" , HFILL } } , { & hf_udvm_upper_bound , { "%Upper bound" , "sigcomp.udvm.upper.bound" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Upper bound" , HFILL } } , { & hf_udvm_uncompressed , { "%Uncompressed" , "sigcomp.udvm.uncompressed" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Uncompressed" , HFILL } } , { & hf_udvm_start_value , { "%Start value" , "sigcomp.udvm.start.value" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Start value" , HFILL } } , { & hf_udvm_offset , { "%Offset" , "sigcomp.udvm.offset" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Offset" , HFILL } } , { & hf_udvm_addr_offset , { "%Offset[memory address]" , "sigcomp.udvm.addr.offset" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "Offset" , HFILL } } , { & hf_sigcomp_nack_ver , { "NACK Version" , "sigcomp.nack.ver" , FT_UINT8 , BASE_DEC , NULL , 0x0f , NULL , HFILL } } , { & hf_sigcomp_nack_reason_code , { "Reason Code" , "sigcomp.nack.reason" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & sigcomp_nack_reason_code_vals_ext , 0x0 , "NACK Reason Code" , HFILL } } , { & hf_sigcomp_nack_failed_op_code , { "OPCODE of failed instruction" , "sigcomp.nack.failed_op_code" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & udvm_instruction_code_vals_ext , 0x0 , "NACK OPCODE of failed instruction" , HFILL } } , { & hf_sigcomp_nack_pc , { "PC of failed instruction" , "sigcomp.nack.pc" , FT_UINT16 , BASE_DEC , NULL , 0x0 , "NACK PC of failed instruction" , HFILL } } , { & hf_sigcomp_nack_sha1 , { "SHA-1 Hash of failed message" , "sigcomp.nack.sha1" , FT_BYTES , BASE_NONE , NULL , 0x0 , "NACK SHA-1 Hash of failed message" , HFILL } } , { & hf_sigcomp_nack_state_id , { "State ID (6 - 20 bytes)" , "sigcomp.nack.state_id" , FT_BYTES , BASE_NONE , NULL , 0x0 , "NACK State ID (6 - 20 bytes)" , HFILL } } , { & hf_sigcomp_nack_cycles_per_bit , { "Cycles Per Bit" , "sigcomp.nack.cycles_per_bit" , FT_UINT8 , BASE_DEC , NULL , 0x0 , "NACK Cycles Per Bit" , HFILL } } , { & hf_sigcomp_nack_memory_size , { "Memory size" , "sigcomp.memory_size" , FT_UINT16 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_decompress_instruction , { "Instruction" , "sigcomp.decompress_instruction" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_loading_result , { "Loading result" , "sigcomp.loading_result" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_byte_copy , { "byte copy" , "sigcomp.byte_copy" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_accessing_state , { "### Accessing state ###" , "sigcomp.accessing_state" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_getting_value , { "Getting value" , "sigcomp.getting_value" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_load_bytecode_into_udvm_start , { "Load bytecode into UDVM starting at" , "sigcomp.load_bytecode_into_udvm_start" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_instruction_code , { "Instruction code" , "sigcomp.instruction_code" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_current_instruction , { "Addr" , "sigcomp.current_instruction" , FT_UINT8 , BASE_DEC | BASE_EXT_STRING , & udvm_instruction_code_vals_ext , 0x0 , NULL , HFILL } } , { & hf_sigcomp_decompression_failure , { "DECOMPRESSION-FAILURE" , "sigcomp.decompression_failure" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_wireshark_udvm_diagnostic , { "Wireshark UDVM diagnostic" , "sigcomp.wireshark_udvm_diagnostic" , FT_UINT32 , BASE_DEC , VALS ( result_code_vals ) , 0x0 , NULL , HFILL } } , { & hf_sigcomp_calculated_sha_1 , { "Calculated SHA-1" , "sigcomp.calculated_sha_1" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_copying_value , { "Copying value" , "sigcomp.copying_value" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_storing_value , { "Storing value" , "sigcomp.storing_value" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_loading_value , { "Loading value" , "sigcomp.loading_value" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_set_hu , { "Set Hu" , "sigcomp.set_hu" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_loading_h , { "Loading H" , "sigcomp.loading_h" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_state_value , { "Addr" , "sigcomp.state_value" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_output_value , { "Output value" , "sigcomp.output_value" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_num_state_create , { "no_of_state_create" , "sigcomp.num_state_create" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_sha1_digest , { "SHA1 digest" , "sigcomp.sha1_digest" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_creating_state , { "### Creating state ###" , "sigcomp.creating_state" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_sigcomp_message_decompressed , { "SigComp message Decompressed" , "sigcomp.message_decompressed" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_starting_to_remove_escape_digits , { "Starting to remove escape digits" , "sigcomp.starting_to_remove_escape_digits" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_escape_digit_found , { "Escape digit found" , "sigcomp.escape_digit_found" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_illegal_escape_code , { "Illegal escape code" , "sigcomp.illegal_escape_code" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_end_of_sigcomp_message_indication_found , { "End of SigComp message indication found" , "sigcomp.end_of_sigcomp_message_indication_found" , FT_NONE , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_addr_value , { "Addr" , "sigcomp.addr" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_copying_bytes_literally , { "Copying bytes literally" , "sigcomp.copying_bytes_literally" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_data_for_sigcomp_dissector , { "Data handed to the Sigcomp dissector" , "sigcomp.data_for_sigcomp_dissector" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_remaining_sigcomp_message , { "Remaining SigComp message" , "sigcomp.remaining_sigcomp_message" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_sha1buff , { "sha1buff" , "sigcomp.sha1buff" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_udvm_instruction , { "UDVM instruction" , "sigcomp.udvm_instruction" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_remaining_bytes , { "Remaining bytes" , "sigcomp.remaining_bytes" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_max_udvm_cycles , { "maximum_UDVM_cycles" , "sigcomp.max_udvm_cycles" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_used_udvm_cycles , { "used_udvm_cycles" , "sigcomp.used_udvm_cycles" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_udvm_execution_stated , { "UDVM EXECUTION STARTED" , "sigcomp.udvm_execution_stated" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_message_length , { "Message Length" , "sigcomp.message_length" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_sigcomp_byte_code_length , { "Byte code length" , "sigcomp.byte_code_length" , FT_UINT8 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , } ; static gint * ett [ ] = { & ett_sigcomp , & ett_sigcomp_udvm , & ett_sigcomp_udvm_exe , } ; static gint * ett_raw [ ] = { & ett_raw_text , } ; static ei_register_info ei [ ] = { { & ei_sigcomp_nack_failed_op_code , { "sigcomp.nack.failed_op_code.expert" , PI_SEQUENCE , PI_WARN , "SigComp NACK" , EXPFILL } } , { & ei_sigcomp_invalid_instruction , { "sigcomp.invalid_instruction" , PI_PROTOCOL , PI_WARN , "Invalid instruction" , EXPFILL } } , { & ei_sigcomp_invalid_shift_value , { "sigcomp.invalid_shift_value" , PI_PROTOCOL , PI_WARN , "Invalid shift value" , EXPFILL } } , { & ei_sigcomp_sigcomp_message_decompression_failure , { "sigcomp.message_decompression_failure" , PI_PROTOCOL , PI_WARN , "SigComp message Decompression failure" , EXPFILL } } , { & ei_sigcomp_execution_of_this_instruction_is_not_implemented , { "sigcomp.execution_of_this_instruction_is_not_implemented" , PI_UNDECODED , PI_WARN , "Execution of this instruction is NOT implemented" , EXPFILL } } , { & ei_sigcomp_decompression_failure , { "sigcomp.decompression_failure_expert" , PI_PROTOCOL , PI_WARN , "DECOMPRESSION FAILURE" , EXPFILL } } , { & ei_sigcomp_tcp_fragment , { "sigcomp.tcp_fragment" , PI_MALFORMED , PI_ERROR , "TCP Fragment" , EXPFILL } } , { & ei_sigcomp_failed_to_access_state_wireshark_udvm_diagnostic , { "sigcomp.failed_to_access_state_wireshark_udvm_diagnostic" , PI_PROTOCOL , PI_WARN , "Failed to Access state Wireshark UDVM diagnostic" , EXPFILL } } , { & ei_sigcomp_all_remaining_parameters_zero , { "sigcomp.all_remaining_parameters" , PI_PROTOCOL , PI_NOTE , "All remaining parameters = 0(Not in the uploaded code as UDVM buffer initialized to Zero" , EXPFILL } } , } ; module_t * sigcomp_module ; expert_module_t * expert_sigcomp ; static const enum_val_t udvm_detail_vals [ ] = { { "no-printout" , "No-Printout" , 0 } , { "low-detail" , "Low-detail" , 1 } , { "medium-detail" , "Medium-detail" , 2 } , { "high-detail" , "High-detail" , 3 } , { NULL , NULL , - 1 } } ; proto_sigcomp = proto_register_protocol ( "Signaling Compression" , "SIGCOMP" , "sigcomp" ) ; proto_raw_sigcomp = proto_register_protocol ( "Decompressed SigComp message as raw text" , "Raw_SigComp" , "raw_sigcomp" ) ; register_dissector ( "sigcomp" , dissect_sigcomp , proto_sigcomp ) ; proto_register_field_array ( proto_sigcomp , hf , array_length ( hf ) ) ; proto_register_subtree_array ( ett , array_length ( ett ) ) ; proto_register_subtree_array ( ett_raw , array_length ( ett_raw ) ) ; expert_sigcomp = expert_register_protocol ( proto_sigcomp ) ; expert_register_field_array ( expert_sigcomp , ei , array_length ( ei ) ) ; sigcomp_module = prefs_register_protocol ( proto_sigcomp , proto_reg_handoff_sigcomp ) ; prefs_register_uint_preference ( sigcomp_module , "udp.port" , "Sigcomp UDP Port 1" , "Set UDP port 1 for SigComp messages" , 10 , & SigCompUDPPort1 ) ; prefs_register_uint_preference ( sigcomp_module , "udp.port2" , "Sigcomp UDP Port 2" , "Set UDP port 2 for SigComp messages" , 10 , & SigCompUDPPort2 ) ; prefs_register_uint_preference ( sigcomp_module , "tcp.port" , "Sigcomp TCP Port 1" , "Set TCP port 1 for SigComp messages" , 10 , & SigCompTCPPort1 ) ; prefs_register_uint_preference ( sigcomp_module , "tcp.port2" , "Sigcomp TCP Port 2" , "Set TCP port 2 for SigComp messages" , 10 , & SigCompTCPPort2 ) ; prefs_register_bool_preference ( sigcomp_module , "display.udvm.code" , "Dissect the UDVM code" , "Preference whether to Dissect the UDVM code or not" , & dissect_udvm_code ) ; prefs_register_bool_preference ( sigcomp_module , "display.bytecode" , "Display the bytecode of operands" , "preference whether to display the bytecode in " "UDVM operands or not" , & display_udvm_bytecode ) ; prefs_register_bool_preference ( sigcomp_module , "decomp.msg" , "Decompress message" , "preference whether to decompress message or not" , & decompress ) ; prefs_register_bool_preference ( sigcomp_module , "display.decomp.msg.as.txt" , "Displays the decompressed message as text" , "preference whether to display the decompressed message " "as raw text or not" , & display_raw_txt ) ; prefs_register_enum_preference ( sigcomp_module , "show.udvm.execution" , "Level of detail of UDVM execution:" , "'No-Printout' = UDVM executes silently, then increasing detail " "about execution of UDVM instructions; " "Warning! CPU intense at high detail" , & udvm_print_detail_level , udvm_detail_vals , FALSE ) ; register_init_routine ( & sigcomp_init_udvm ) ; register_cleanup_routine ( & sigcomp_cleanup_udvm ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void join_print_po ( struct packet_object * po ) { int ret ; if ( ! data_window ) return ; if ( GBL_OPTIONS -> regex && regexec ( GBL_OPTIONS -> regex , po -> DATA . disp_data , 0 , NULL , 0 ) != 0 ) { return ; } SAFE_REALLOC ( dispbuf , hex_len ( po -> DATA . disp_len ) * sizeof ( u_char ) + 1 ) ; ret = GBL_FORMAT ( po -> DATA . disp_data , po -> DATA . disp_len , dispbuf ) ; dispbuf [ ret ] = 0 ; if ( ! ip_addr_cmp ( & po -> L3 . src , & curr_conn -> L3_addr1 ) ) gtkui_data_print ( 3 , dispbuf , 1 ) ; else gtkui_data_print ( 3 , dispbuf , 2 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void ff_MPV_common_end ( MpegEncContext * s ) { int i ; if ( s -> slice_context_count > 1 ) { for ( i = 0 ; i < s -> slice_context_count ; i ++ ) { free_duplicate_context ( s -> thread_context [ i ] ) ; } for ( i = 1 ; i < s -> slice_context_count ; i ++ ) { av_freep ( & s -> thread_context [ i ] ) ; } s -> slice_context_count = 1 ; } else free_duplicate_context ( s ) ; av_freep ( & s -> parse_context . buffer ) ; s -> parse_context . buffer_size = 0 ; av_freep ( & s -> bitstream_buffer ) ; s -> allocated_bitstream_buffer_size = 0 ; av_freep ( & s -> avctx -> stats_out ) ; av_freep ( & s -> ac_stats ) ; av_freep ( & s -> q_intra_matrix ) ; av_freep ( & s -> q_inter_matrix ) ; av_freep ( & s -> q_intra_matrix16 ) ; av_freep ( & s -> q_inter_matrix16 ) ; av_freep ( & s -> input_picture ) ; av_freep ( & s -> reordered_input_picture ) ; av_freep ( & s -> dct_offset ) ; if ( s -> picture && ! s -> avctx -> internal -> is_copy ) { for ( i = 0 ; i < s -> picture_count ; i ++ ) { free_picture ( s , & s -> picture [ i ] ) ; } } av_freep ( & s -> picture ) ; free_context_frame ( s ) ; if ( ! ( s -> avctx -> active_thread_type & FF_THREAD_FRAME ) ) avcodec_default_free_buffers ( s -> avctx ) ; s -> context_initialized = 0 ; s -> last_picture_ptr = s -> next_picture_ptr = s -> current_picture_ptr = NULL ; s -> linesize = s -> uvlinesize = 0 ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_MultiplePayloadStreamElement ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_MultiplePayloadStreamElement , MultiplePayloadStreamElement_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int get_qzbin_factor ( int q , vpx_bit_depth_t bit_depth ) { const int quant = vp9_dc_quant ( q , 0 , bit_depth ) ; # if CONFIG_VP9_HIGHBITDEPTH switch ( bit_depth ) { case VPX_BITS_8 : return q == 0 ? 64 : ( quant < 148 ? 84 : 80 ) ; case VPX_BITS_10 : return q == 0 ? 64 : ( quant < 592 ? 84 : 80 ) ; case VPX_BITS_12 : return q == 0 ? 64 : ( quant < 2368 ? 84 : 80 ) ; default : assert ( 0 && "bit_depth should be VPX_BITS_8, VPX_BITS_10 or VPX_BITS_12" ) ; return - 1 ; } # else ( void ) bit_depth ; return q == 0 ? 64 : ( quant < 148 ? 84 : 80 ) ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline hwaddr pcnet_rdra_addr ( PCNetState * s , int idx ) { while ( idx < 1 ) { idx += CSR_RCVRL ( s ) ; } return s -> rdra + ( ( CSR_RCVRL ( s ) - idx ) * ( BCR_SWSTYLE ( s ) ? 16 : 8 ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( HttpsEngagementPageLoadMetricsBrowserTest , Simple_Https ) { StartHttpsServer ( false ) ; base : : TimeDelta upper_bound = NavigateInForegroundAndCloseWithTiming ( https_test_server_ -> GetURL ( "/simple.html" ) ) ; histogram_tester_ . ExpectTotalCount ( internal : : kHttpEngagementHistogram , 0 ) ; histogram_tester_ . ExpectTotalCount ( internal : : kHttpsEngagementHistogram , 1 ) ; int32_t bucket_min = histogram_tester_ . GetAllSamples ( internal : : kHttpsEngagementHistogram ) [ 0 ] . min ; EXPECT_GE ( upper_bound . InMilliseconds ( ) , bucket_min ) ; EXPECT_LT ( 0 , bucket_min ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
WORK_STATE ossl_statem_server_post_work ( SSL * s , WORK_STATE wst ) { OSSL_STATEM * st = & s -> statem ; s -> init_num = 0 ; switch ( st -> hand_state ) { case TLS_ST_SW_HELLO_REQ : if ( statem_flush ( s ) != 1 ) return WORK_MORE_A ; if ( ! ssl3_init_finished_mac ( s ) ) { ossl_statem_set_error ( s ) ; return WORK_ERROR ; } break ; case DTLS_ST_SW_HELLO_VERIFY_REQUEST : if ( statem_flush ( s ) != 1 ) return WORK_MORE_A ; if ( s -> version != DTLS1_BAD_VER && ! ssl3_init_finished_mac ( s ) ) { ossl_statem_set_error ( s ) ; return WORK_ERROR ; } s -> first_packet = 1 ; break ; case TLS_ST_SW_SRVR_HELLO : # ifndef OPENSSL_NO_SCTP if ( SSL_IS_DTLS ( s ) && s -> hit ) { unsigned char sctpauthkey [ 64 ] ; char labelbuffer [ sizeof ( DTLS1_SCTP_AUTH_LABEL ) ] ; memcpy ( labelbuffer , DTLS1_SCTP_AUTH_LABEL , sizeof ( DTLS1_SCTP_AUTH_LABEL ) ) ; if ( SSL_export_keying_material ( s , sctpauthkey , sizeof ( sctpauthkey ) , labelbuffer , sizeof ( labelbuffer ) , NULL , 0 , 0 ) <= 0 ) { ossl_statem_set_error ( s ) ; return WORK_ERROR ; } BIO_ctrl ( SSL_get_wbio ( s ) , BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY , sizeof ( sctpauthkey ) , sctpauthkey ) ; } # endif break ; case TLS_ST_SW_CHANGE : # ifndef OPENSSL_NO_SCTP if ( SSL_IS_DTLS ( s ) && ! s -> hit ) { BIO_ctrl ( SSL_get_wbio ( s ) , BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY , 0 , NULL ) ; } # endif if ( ! s -> method -> ssl3_enc -> change_cipher_state ( s , SSL3_CHANGE_CIPHER_SERVER_WRITE ) ) { ossl_statem_set_error ( s ) ; return WORK_ERROR ; } if ( SSL_IS_DTLS ( s ) ) dtls1_reset_seq_numbers ( s , SSL3_CC_WRITE ) ; break ; case TLS_ST_SW_SRVR_DONE : if ( statem_flush ( s ) != 1 ) return WORK_MORE_A ; break ; case TLS_ST_SW_FINISHED : if ( statem_flush ( s ) != 1 ) return WORK_MORE_A ; # ifndef OPENSSL_NO_SCTP if ( SSL_IS_DTLS ( s ) && s -> hit ) { BIO_ctrl ( SSL_get_wbio ( s ) , BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY , 0 , NULL ) ; } # endif break ; default : break ; } return WORK_FINISHED_CONTINUE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TSReturnCode TSMimeHdrDestroy ( TSMBuffer bufp , TSMLoc obj ) { sdk_assert ( sdk_sanity_check_mbuffer ( bufp ) == TS_SUCCESS ) ; sdk_assert ( ( sdk_sanity_check_mime_hdr_handle ( obj ) == TS_SUCCESS ) || ( sdk_sanity_check_http_hdr_handle ( obj ) == TS_SUCCESS ) ) ; if ( ! isWriteable ( bufp ) ) { return TS_ERROR ; } MIMEHdrImpl * mh = _hdr_mloc_to_mime_hdr_impl ( obj ) ; mime_hdr_destroy ( ( ( HdrHeapSDKHandle * ) bufp ) -> m_heap , mh ) ; return TS_SUCCESS ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int rawv6_recvmsg ( struct kiocb * iocb , struct sock * sk , struct msghdr * msg , size_t len , int noblock , int flags , int * addr_len ) { struct ipv6_pinfo * np = inet6_sk ( sk ) ; struct sockaddr_in6 * sin6 = ( struct sockaddr_in6 * ) msg -> msg_name ; struct sk_buff * skb ; size_t copied ; int err ; if ( flags & MSG_OOB ) return - EOPNOTSUPP ; if ( addr_len ) * addr_len = sizeof ( * sin6 ) ; if ( flags & MSG_ERRQUEUE ) return ipv6_recv_error ( sk , msg , len ) ; if ( np -> rxpmtu && np -> rxopt . bits . rxpmtu ) return ipv6_recv_rxpmtu ( sk , msg , len ) ; skb = skb_recv_datagram ( sk , flags , noblock , & err ) ; if ( ! skb ) goto out ; copied = skb -> len ; if ( copied > len ) { copied = len ; msg -> msg_flags |= MSG_TRUNC ; } if ( skb_csum_unnecessary ( skb ) ) { err = skb_copy_datagram_iovec ( skb , 0 , msg -> msg_iov , copied ) ; } else if ( msg -> msg_flags & MSG_TRUNC ) { if ( __skb_checksum_complete ( skb ) ) goto csum_copy_err ; err = skb_copy_datagram_iovec ( skb , 0 , msg -> msg_iov , copied ) ; } else { err = skb_copy_and_csum_datagram_iovec ( skb , 0 , msg -> msg_iov ) ; if ( err == - EINVAL ) goto csum_copy_err ; } if ( err ) goto out_free ; if ( sin6 ) { sin6 -> sin6_family = AF_INET6 ; sin6 -> sin6_port = 0 ; ipv6_addr_copy ( & sin6 -> sin6_addr , & ipv6_hdr ( skb ) -> saddr ) ; sin6 -> sin6_flowinfo = 0 ; sin6 -> sin6_scope_id = 0 ; if ( ipv6_addr_type ( & sin6 -> sin6_addr ) & IPV6_ADDR_LINKLOCAL ) sin6 -> sin6_scope_id = IP6CB ( skb ) -> iif ; } sock_recv_ts_and_drops ( msg , sk , skb ) ; if ( np -> rxopt . all ) datagram_recv_ctl ( sk , msg , skb ) ; err = copied ; if ( flags & MSG_TRUNC ) err = skb -> len ; out_free : skb_free_datagram ( sk , skb ) ; out : return err ; csum_copy_err : skb_kill_datagram ( sk , skb , flags ) ; err = ( flags & MSG_DONTWAIT ) ? - EAGAIN : - EHOSTUNREACH ; goto out ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( PageLoadMetricsBrowserTest , UseCounterFeaturesInIframe ) { ASSERT_TRUE ( embedded_test_server ( ) -> Start ( ) ) ; auto waiter = CreatePageLoadMetricsWaiter ( ) ; waiter -> AddPageExpectation ( TimingField : : LOAD_EVENT ) ; ui_test_utils : : NavigateToURL ( browser ( ) , embedded_test_server ( ) -> GetURL ( "/page_load_metrics/use_counter_features_in_iframe.html" ) ) ; waiter -> Wait ( ) ; NavigateToUntrackedUrl ( ) ; histogram_tester_ . ExpectBucketCount ( internal : : kFeaturesHistogramName , static_cast < int32_t > ( WebFeature : : kTextWholeText ) , 1 ) ; histogram_tester_ . ExpectBucketCount ( internal : : kFeaturesHistogramName , static_cast < int32_t > ( WebFeature : : kV8Element_Animate_Method ) , 1 ) ; histogram_tester_ . ExpectBucketCount ( internal : : kFeaturesHistogramName , static_cast < int32_t > ( WebFeature : : kNavigatorVibrate ) , 1 ) ; histogram_tester_ . ExpectBucketCount ( internal : : kFeaturesHistogramName , static_cast < int32_t > ( WebFeature : : kPageVisits ) , 1 ) ; }
0False