instruction
stringclasses 1
value | input
stringlengths 31
235k
| output
class label 2
classes |
---|---|---|
Categorize the following code snippet as vulnerable or not. True or False
|
static __inline__ int TLV_LIST_CHECK ( struct tlv_list_desc * list , __u16 exp_type ) {
return TLV_CHECK ( list -> tlv_ptr , list -> tlv_space , exp_type ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void docmd ( const char * cmdline ) {
char * tokens [ 1 + MAXARGS + 2 ] ;
struct parse pcmd ;
int ntok ;
static int i ;
struct xcmd * xcmd ;
tokenize ( cmdline , tokens , & ntok ) ;
if ( ntok == 0 ) return ;
i = findcmd ( tokens [ 0 ] , builtins , opcmds , & xcmd ) ;
if ( i == 0 ) {
( void ) fprintf ( stderr , "***Command `%s' unknown\n" , tokens [ 0 ] ) ;
return ;
}
else if ( i >= 2 ) {
( void ) fprintf ( stderr , "***Command `%s' ambiguous\n" , tokens [ 0 ] ) ;
return ;
}
for ( i = MAXARGS + 1 ;
i < ntok ;
++ i ) {
fprintf ( stderr , "***Extra arg `%s' ignored\n" , tokens [ i ] ) ;
}
pcmd . keyword = tokens [ 0 ] ;
pcmd . nargs = 0 ;
for ( i = 0 ;
i < MAXARGS && xcmd -> arg [ i ] != NO ;
i ++ ) {
if ( ( i + 1 ) >= ntok ) {
if ( ! ( xcmd -> arg [ i ] & OPT ) ) {
printusage ( xcmd , stderr ) ;
return ;
}
break ;
}
if ( ( xcmd -> arg [ i ] & OPT ) && ( * tokens [ i + 1 ] == '>' ) ) break ;
if ( ! getarg ( tokens [ i + 1 ] , ( int ) xcmd -> arg [ i ] , & pcmd . argval [ i ] ) ) return ;
pcmd . nargs ++ ;
}
i ++ ;
if ( i < ntok && * tokens [ i ] == '>' ) {
char * fname ;
if ( * ( tokens [ i ] + 1 ) != '\0' ) fname = tokens [ i ] + 1 ;
else if ( ( i + 1 ) < ntok ) fname = tokens [ i + 1 ] ;
else {
( void ) fprintf ( stderr , "***No file for redirect\n" ) ;
return ;
}
current_output = fopen ( fname , "w" ) ;
if ( current_output == NULL ) {
( void ) fprintf ( stderr , "***Error opening %s: " , fname ) ;
perror ( "" ) ;
return ;
}
i = 1 ;
}
else {
current_output = stdout ;
i = 0 ;
}
if ( interactive && setjmp ( interrupt_buf ) ) {
jump = 0 ;
return ;
}
else {
jump ++ ;
( xcmd -> handler ) ( & pcmd , current_output ) ;
jump = 0 ;
if ( i ) ( void ) fclose ( current_output ) ;
}
return ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline int x8_get_orient_vlc ( IntraX8Context * w ) {
MpegEncContext * const s = w -> s ;
int table_index ;
if ( ! w -> j_orient_vlc ) {
table_index = get_bits ( & s -> gb , 1 + ( w -> quant < 13 ) ) ;
w -> j_orient_vlc = & j_orient_vlc [ w -> quant < 13 ] [ table_index ] ;
}
assert ( w -> j_orient_vlc ) ;
assert ( w -> j_orient_vlc -> table ) ;
return get_vlc2 ( & s -> gb , w -> j_orient_vlc -> table , OR_VLC_BITS , OR_VLC_MTD ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static enum fetch_step vbf_stp_fetchbody ( struct worker * wrk , struct busyobj * bo ) {
ssize_t l ;
uint8_t * ptr ;
enum vfp_status vfps = VFP_ERROR ;
ssize_t est ;
struct vfp_ctx * vfc ;
CHECK_OBJ_NOTNULL ( bo , BUSYOBJ_MAGIC ) ;
vfc = bo -> vfc ;
CHECK_OBJ_NOTNULL ( vfc , VFP_CTX_MAGIC ) ;
AN ( vfc -> vfp_nxt ) ;
est = bo -> htc -> content_length ;
if ( est < 0 ) est = 0 ;
do {
if ( vfc -> oc -> flags & OC_F_ABANDON ) {
AN ( vfc -> oc -> flags & OC_F_PASS ) ;
VSLb ( wrk -> vsl , SLT_FetchError , "Pass delivery abandoned" ) ;
bo -> htc -> doclose = SC_RX_BODY ;
break ;
}
AZ ( vfc -> failed ) ;
l = est ;
assert ( l >= 0 ) ;
if ( VFP_GetStorage ( vfc , & l , & ptr ) != VFP_OK ) {
bo -> htc -> doclose = SC_RX_BODY ;
break ;
}
AZ ( vfc -> failed ) ;
vfps = VFP_Suck ( vfc , ptr , & l ) ;
if ( l > 0 && vfps != VFP_ERROR ) {
bo -> acct . beresp_bodybytes += l ;
VFP_Extend ( vfc , l ) ;
if ( est >= l ) est -= l ;
else est = 0 ;
}
}
while ( vfps == VFP_OK ) ;
if ( vfc -> failed ) {
( void ) VFP_Error ( vfc , "Fetch pipeline failed to process" ) ;
bo -> htc -> doclose = SC_RX_BODY ;
VFP_Close ( vfc ) ;
VDI_Finish ( wrk , bo ) ;
if ( ! bo -> do_stream ) {
assert ( bo -> fetch_objcore -> boc -> state < BOS_STREAM ) ;
return ( F_STP_ERROR ) ;
}
else {
wrk -> stats -> fetch_failed ++ ;
return ( F_STP_FAIL ) ;
}
}
ObjTrimStore ( wrk , vfc -> oc ) ;
return ( F_STP_FETCHEND ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int x ( struct vcache * avc , int afun , struct vrequest * areq , \ struct afs_pdata * ain , struct afs_pdata * aout , \ afs_ucred_t * * acred ) DECL_PIOCTL ( PGetFID ) ;
DECL_PIOCTL ( PSetAcl ) ;
DECL_PIOCTL ( PStoreBehind ) ;
DECL_PIOCTL ( PGCPAGs ) ;
DECL_PIOCTL ( PGetAcl ) ;
DECL_PIOCTL ( PNoop ) ;
DECL_PIOCTL ( PBogus ) ;
DECL_PIOCTL ( PGetFileCell ) ;
DECL_PIOCTL ( PGetWSCell ) ;
DECL_PIOCTL ( PGetUserCell ) ;
DECL_PIOCTL ( PSetTokens ) ;
DECL_PIOCTL ( PGetVolumeStatus ) ;
DECL_PIOCTL ( PSetVolumeStatus ) ;
DECL_PIOCTL ( PFlush ) ;
DECL_PIOCTL ( PNewStatMount )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
TEST_F ( SSLErrorAssistantTest , DynamicInterstitialListCertErrorMismatch ) {
ASSERT_TRUE ( embedded_test_server ( ) -> Start ( ) ) ;
EXPECT_EQ ( 1u , ssl_info ( ) . public_key_hashes . size ( ) ) ;
auto config_proto = std : : make_unique < chrome_browser_ssl : : SSLErrorAssistantConfig > ( ) ;
config_proto -> set_version_id ( kLargeVersionId ) ;
chrome_browser_ssl : : DynamicInterstitial * filter = config_proto -> add_dynamic_interstitial ( ) ;
filter -> set_interstitial_type ( chrome_browser_ssl : : DynamicInterstitial : : INTERSTITIAL_PAGE_SSL ) ;
filter -> set_cert_error ( chrome_browser_ssl : : DynamicInterstitial : : ERR_CERT_DATE_INVALID ) ;
filter -> add_sha256_hash ( "sha256uthatch" ) ;
filter -> add_sha256_hash ( ssl_info ( ) . public_key_hashes [ 0 ] . ToString ( ) ) ;
filter -> add_sha256_hash ( "sha256/treecreeper" ) ;
filter -> set_issuer_common_name_regex ( issuer_common_name ( ) ) ;
filter -> set_issuer_organization_regex ( issuer_organization_name ( ) ) ;
filter -> set_mitm_software_name ( "UwS" ) ;
error_assistant ( ) -> SetErrorAssistantProto ( std : : move ( config_proto ) ) ;
EXPECT_FALSE ( error_assistant ( ) -> MatchDynamicInterstitial ( ssl_info ( ) ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void de_emphasis ( float * out , float * in , float m , float mem [ 1 ] ) {
int i ;
out [ 0 ] = in [ 0 ] + m * mem [ 0 ] ;
for ( i = 1 ;
i < AMRWB_SFR_SIZE ;
i ++ ) out [ i ] = in [ i ] + out [ i - 1 ] * m ;
mem [ 0 ] = out [ AMRWB_SFR_SIZE - 1 ] ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
jpc_pchglist_t * jpc_pchglist_copy ( jpc_pchglist_t * pchglist ) {
jpc_pchglist_t * newpchglist ;
jpc_pchg_t * newpchg ;
int pchgno ;
if ( ! ( newpchglist = jpc_pchglist_create ( ) ) ) {
return 0 ;
}
for ( pchgno = 0 ;
pchgno < pchglist -> numpchgs ;
++ pchgno ) {
if ( ! ( newpchg = jpc_pchg_copy ( pchglist -> pchgs [ pchgno ] ) ) || jpc_pchglist_insert ( newpchglist , - 1 , newpchg ) ) {
jpc_pchglist_destroy ( newpchglist ) ;
return 0 ;
}
}
return newpchglist ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dtap_mm_id_req ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len ) {
guint32 curr_offset ;
guint curr_len ;
proto_tree * subtree ;
curr_offset = offset ;
curr_len = len ;
is_uplink = IS_UPLINK_FALSE ;
proto_tree_add_bits_item ( tree , hf_gsm_a_spare_bits , tvb , curr_offset << 3 , 4 , ENC_BIG_ENDIAN ) ;
subtree = proto_tree_add_subtree ( tree , tvb , curr_offset , 1 , ett_gsm_dtap_elem [ DE_ID_TYPE ] , NULL , val_to_str_ext_const ( DE_ID_TYPE , & gsm_dtap_elem_strings_ext , "" ) ) ;
proto_tree_add_bits_item ( subtree , hf_gsm_a_spare_bits , tvb , ( curr_offset << 3 ) + 4 , 1 , ENC_BIG_ENDIAN ) ;
proto_tree_add_item ( subtree , hf_gsm_a_dtap_type_of_identity , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ;
curr_offset ++ ;
curr_len -- ;
EXTRANEOUS_DATA_CHECK ( curr_len , 0 , pinfo , & ei_gsm_a_dtap_extraneous_data ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static ossl_inline t2 * sk_ ## t1 ## _delete_ptr ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return ( t2 * ) OPENSSL_sk_delete_ptr ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _push ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_push ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _unshift ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_unshift ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _pop ( STACK_OF ( t1 ) * sk ) {
return ( t2 * ) OPENSSL_sk_pop ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _shift ( STACK_OF ( t1 ) * sk ) {
return ( t2 * ) OPENSSL_sk_shift ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline void sk_ ## t1 ## _pop_free ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _freefunc freefunc ) {
OPENSSL_sk_pop_free ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline int sk_ ## t1 ## _insert ( STACK_OF ( t1 ) * sk , t2 * ptr , int idx ) {
return OPENSSL_sk_insert ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr , idx ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _set ( STACK_OF ( t1 ) * sk , int idx , t2 * ptr ) {
return ( t2 * ) OPENSSL_sk_set ( ( OPENSSL_STACK * ) sk , idx , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find_ex ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find_ex ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) {
return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) {
return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ;
}
# define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ;
typedef const char * OPENSSL_CSTRING ;
DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char ) DEFINE_SPECIAL_STACK_OF_CONST ( OPENSSL_CSTRING , char ) typedef void * OPENSSL_BLOCK ;
DEFINE_SPECIAL_STACK_OF ( OPENSSL_BLOCK , void )
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
TEST_F ( WebUsbDetectorTest , UsbDeviceAddedAndRemoved ) {
base : : string16 product_name = base : : UTF8ToUTF16 ( kProductName_1 ) ;
GURL landing_page ( kLandingPage_1 ) ;
scoped_refptr < device : : MockUsbDevice > device ( new device : : MockUsbDevice ( 0 , 1 , "Google" , kProductName_1 , "002" , landing_page ) ) ;
std : : string guid = device -> guid ( ) ;
Initialize ( ) ;
device_client_ . usb_service ( ) -> AddDevice ( device ) ;
message_center : : Notification * notification = message_center_ -> FindVisibleNotificationById ( guid ) ;
ASSERT_TRUE ( notification != nullptr ) ;
base : : string16 expected_title = base : : ASCIIToUTF16 ( "Google Product A detected" ) ;
EXPECT_EQ ( expected_title , notification -> title ( ) ) ;
base : : string16 expected_message = base : : ASCIIToUTF16 ( "Go to www.google.com to connect." ) ;
EXPECT_EQ ( expected_message , notification -> message ( ) ) ;
EXPECT_TRUE ( notification -> delegate ( ) != nullptr ) ;
device_client_ . usb_service ( ) -> RemoveDevice ( device ) ;
EXPECT_TRUE ( message_center_ -> FindVisibleNotificationById ( guid ) == nullptr ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( SessionRestorePageLoadMetricsBrowserTest , MultipleSessionRestores ) {
ui_test_utils : : NavigateToURL ( browser ( ) , GetTestURL ( ) ) ;
Browser * current_browser = browser ( ) ;
const int num_session_restores = 3 ;
for ( int i = 1 ;
i <= num_session_restores ;
++ i ) {
SessionRestorePaintWaiter session_restore_paint_waiter ;
current_browser = QuitBrowserAndRestore ( current_browser ) ;
session_restore_paint_waiter . WaitForForegroundTabs ( 1 ) ;
ExpectFirstPaintMetricsTotalCount ( i ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline void add_dct ( MpegEncContext * s , int16_t * block , int i , uint8_t * dest , int line_size ) {
if ( s -> block_last_index [ i ] >= 0 ) {
s -> dsp . idct_add ( dest , line_size , block ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static guint32 dissect_netb_terminate_trace ( tvbuff_t * tvb _U_ , packet_info * pinfo _U_ , int offset _U_ , proto_tree * tree _U_ ) {
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void wma_lsp_to_curve ( WMACodecContext * s , float * out , float * val_max_ptr , int n , float * lsp ) {
int i , j ;
float p , q , w , v , val_max ;
val_max = 0 ;
for ( i = 0 ;
i < n ;
i ++ ) {
p = 0.5f ;
q = 0.5f ;
w = s -> lsp_cos_table [ i ] ;
for ( j = 1 ;
j < NB_LSP_COEFS ;
j += 2 ) {
q *= w - lsp [ j - 1 ] ;
p *= w - lsp [ j ] ;
}
p *= p * ( 2.0f - w ) ;
q *= q * ( 2.0f + w ) ;
v = p + q ;
v = pow_m1_4 ( s , v ) ;
if ( v > val_max ) val_max = v ;
out [ i ] = v ;
}
* val_max_ptr = val_max ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
proto_item * proto_tree_add_ipv6_format ( proto_tree * tree , int hfindex , tvbuff_t * tvb , gint start , gint length , const struct e_in6_addr * value_ptr , const char * format , ... ) {
proto_item * pi ;
va_list ap ;
pi = proto_tree_add_ipv6 ( tree , hfindex , tvb , start , length , value_ptr ) ;
if ( pi != tree ) {
TRY_TO_FAKE_THIS_REPR ( pi ) ;
va_start ( ap , format ) ;
proto_tree_set_representation ( pi , format , ap ) ;
va_end ( ap ) ;
}
return pi ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dtls1_fix_message_header ( SSL * s , unsigned long frag_off , unsigned long frag_len ) {
struct hm_header_st * msg_hdr = & s -> d1 -> w_msg_hdr ;
msg_hdr -> frag_off = frag_off ;
msg_hdr -> frag_len = frag_len ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
guint16 elem_lv_e ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo , gint pdu_type , int idx , guint32 offset , guint len _U_ , const gchar * name_add ) {
guint16 parm_len ;
guint16 consumed ;
guint32 curr_offset ;
proto_tree * subtree ;
proto_item * item ;
value_string_ext elem_names_ext ;
gint * elem_ett ;
const gchar * elem_name ;
guint16 ( * * elem_funcs ) ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo , guint32 offset , guint len , gchar * add_string , int string_len ) ;
curr_offset = offset ;
consumed = 0 ;
SET_ELEM_VARS ( pdu_type , elem_names_ext , elem_ett , elem_funcs , & ei_gsm_a_unknown_pdu_type ) ;
parm_len = tvb_get_ntohs ( tvb , curr_offset ) ;
elem_name = try_val_to_str_ext ( idx , & elem_names_ext ) ;
if ( elem_name == NULL ) {
proto_tree_add_expert_format ( tree , pinfo , & ei_gsm_a_unknown_element , tvb , curr_offset , parm_len + 2 , "Unknown - aborting dissection%s" , ( name_add == NULL ) || ( name_add [ 0 ] == '\0' ) ? "" : name_add ) ;
return consumed ;
}
subtree = proto_tree_add_subtree_format ( tree , tvb , curr_offset , parm_len + 2 , elem_ett [ idx ] , & item , "%s%s" , elem_name , ( name_add == NULL ) || ( name_add [ 0 ] == '\0' ) ? "" : name_add ) ;
proto_tree_add_uint ( subtree , hf_gsm_a_length , tvb , curr_offset , 2 , parm_len ) ;
if ( parm_len > 0 ) {
if ( elem_funcs [ idx ] == NULL ) {
proto_tree_add_item ( subtree , hf_gsm_a_element_value , tvb , curr_offset + 2 , parm_len , ENC_NA ) ;
consumed = parm_len ;
}
else {
gchar * a_add_string ;
a_add_string = ( gchar * ) wmem_alloc ( wmem_packet_scope ( ) , 1024 ) ;
a_add_string [ 0 ] = '\0' ;
consumed = ( * elem_funcs [ idx ] ) ( tvb , subtree , pinfo , curr_offset + 2 , parm_len , a_add_string , 1024 ) ;
if ( a_add_string [ 0 ] != '\0' ) {
proto_item_append_text ( item , "%s" , a_add_string ) ;
}
}
}
return ( consumed + 2 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline int get_len ( LZOContext * c , int x , int mask ) {
int cnt = x & mask ;
if ( ! cnt ) {
while ( ! ( x = get_byte ( c ) ) ) cnt += 255 ;
cnt += mask + x ;
}
return cnt ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
Oid get_range_subtype ( Oid rangeOid ) {
HeapTuple tp ;
tp = SearchSysCache1 ( RANGETYPE , ObjectIdGetDatum ( rangeOid ) ) ;
if ( HeapTupleIsValid ( tp ) ) {
Form_pg_range rngtup = ( Form_pg_range ) GETSTRUCT ( tp ) ;
Oid result ;
result = rngtup -> rngsubtype ;
ReleaseSysCache ( tp ) ;
return result ;
}
else return InvalidOid ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline Float11 * i2f ( int i , Float11 * f ) {
f -> sign = ( i < 0 ) ;
if ( f -> sign ) i = - i ;
f -> exp = av_log2_16bit ( i ) + ! ! i ;
f -> mant = i ? ( i << 6 ) >> f -> exp : 1 << 5 ;
return f ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int xhci_try_complete_packet ( XHCITransfer * xfer ) {
if ( xfer -> packet . status == USB_RET_ASYNC ) {
trace_usb_xhci_xfer_async ( xfer ) ;
xfer -> running_async = 1 ;
xfer -> running_retry = 0 ;
xfer -> complete = 0 ;
return 0 ;
}
else if ( xfer -> packet . status == USB_RET_NAK ) {
trace_usb_xhci_xfer_nak ( xfer ) ;
xfer -> running_async = 0 ;
xfer -> running_retry = 1 ;
xfer -> complete = 0 ;
return 0 ;
}
else {
xfer -> running_async = 0 ;
xfer -> running_retry = 0 ;
xfer -> complete = 1 ;
xhci_xfer_unmap ( xfer ) ;
}
if ( xfer -> packet . status == USB_RET_SUCCESS ) {
trace_usb_xhci_xfer_success ( xfer , xfer -> packet . actual_length ) ;
xfer -> status = CC_SUCCESS ;
xhci_xfer_report ( xfer ) ;
return 0 ;
}
trace_usb_xhci_xfer_error ( xfer , xfer -> packet . status ) ;
switch ( xfer -> packet . status ) {
case USB_RET_NODEV : case USB_RET_IOERROR : xfer -> status = CC_USB_TRANSACTION_ERROR ;
xhci_xfer_report ( xfer ) ;
xhci_stall_ep ( xfer ) ;
break ;
case USB_RET_STALL : xfer -> status = CC_STALL_ERROR ;
xhci_xfer_report ( xfer ) ;
xhci_stall_ep ( xfer ) ;
break ;
case USB_RET_BABBLE : xfer -> status = CC_BABBLE_DETECTED ;
xhci_xfer_report ( xfer ) ;
xhci_stall_ep ( xfer ) ;
break ;
default : DPRINTF ( "%s: FIXME: status = %d\n" , __func__ , xfer -> packet . status ) ;
FIXME ( "unhandled USB_RET_*" ) ;
}
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_btgatt_microbit_button_a_state ( tvbuff_t * tvb , packet_info * pinfo _U_ , proto_tree * tree , void * data ) {
btatt_data_t * att_data = ( btatt_data_t * ) data ;
gint offset = 0 ;
if ( bluetooth_gatt_has_no_parameter ( att_data -> opcode ) ) return - 1 ;
proto_tree_add_item ( tree , hf_gatt_microbit_button_a_state , tvb , offset , 1 , ENC_NA ) ;
offset += 1 ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_h245_SequenceNumber ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_constrained_integer ( tvb , offset , actx , tree , hf_index , 0U , 255U , NULL , FALSE ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
bool cephx_decode_ticket ( CephContext * cct , KeyStore * keys , uint32_t service_id , CephXTicketBlob & ticket_blob , CephXServiceTicketInfo & ticket_info ) {
uint64_t secret_id = ticket_blob . secret_id ;
CryptoKey service_secret ;
if ( ! ticket_blob . blob . length ( ) ) {
return false ;
}
if ( secret_id == ( uint64_t ) - 1 ) {
if ( ! keys -> get_secret ( cct -> _conf -> name , service_secret ) ) {
ldout ( cct , 0 ) << "ceph_decode_ticket could not get general service secret for service_id=" << ceph_entity_type_name ( service_id ) << " secret_id=" << secret_id << dendl ;
return false ;
}
}
else {
if ( ! keys -> get_service_secret ( service_id , secret_id , service_secret ) ) {
ldout ( cct , 0 ) << "ceph_decode_ticket could not get service secret for service_id=" << ceph_entity_type_name ( service_id ) << " secret_id=" << secret_id << dendl ;
return false ;
}
}
std : : string error ;
decode_decrypt_enc_bl ( cct , ticket_info , service_secret , ticket_blob . blob , error ) ;
if ( ! error . empty ( ) ) {
ldout ( cct , 0 ) << "ceph_decode_ticket could not decrypt ticket info. error:" << error << dendl ;
return false ;
}
return true ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void f_parser ( lua_State * L , void * ud ) {
int i ;
Proto * tf ;
Closure * cl ;
struct SParser * p = cast ( struct SParser * , ud ) ;
int c = luaZ_lookahead ( p -> z ) ;
luaC_checkGC ( L ) ;
tf = ( luaY_parser ) ( L , p -> z , & p -> buff , p -> name ) ;
cl = luaF_newLclosure ( L , tf -> nups , hvalue ( gt ( L ) ) ) ;
cl -> l . p = tf ;
for ( i = 0 ;
i < tf -> nups ;
i ++ ) cl -> l . upvals [ i ] = luaF_newupval ( L ) ;
setclvalue ( L , L -> top , cl ) ;
incr_top ( L ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int SpoolssFCPN_r ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep ) {
offset = dissect_doserror ( tvb , offset , pinfo , tree , di , drep , hf_rc , NULL ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dsa_cb ( int operation , ASN1_VALUE * * pval , const ASN1_ITEM * it , void * exarg ) {
if ( operation == ASN1_OP_NEW_PRE ) {
* pval = ( ASN1_VALUE * ) DSA_new ( ) ;
if ( * pval ) return 2 ;
return 0 ;
}
else if ( operation == ASN1_OP_FREE_PRE ) {
DSA_free ( ( DSA * ) * pval ) ;
* pval = NULL ;
return 2 ;
}
return 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vp8_regular_quantize_b_c ( BLOCK * b , BLOCKD * d ) {
int i , rc , eob ;
int zbin ;
int x , y , z , sz ;
short * zbin_boost_ptr = b -> zrun_zbin_boost ;
short * coeff_ptr = b -> coeff ;
short * zbin_ptr = b -> zbin ;
short * round_ptr = b -> round ;
short * quant_ptr = b -> quant ;
short * quant_shift_ptr = b -> quant_shift ;
short * qcoeff_ptr = d -> qcoeff ;
short * dqcoeff_ptr = d -> dqcoeff ;
short * dequant_ptr = d -> dequant ;
short zbin_oq_value = b -> zbin_extra ;
vpx_memset ( qcoeff_ptr , 0 , 32 ) ;
vpx_memset ( dqcoeff_ptr , 0 , 32 ) ;
eob = - 1 ;
for ( i = 0 ;
i < 16 ;
i ++ ) {
rc = vp8_default_zig_zag1d [ i ] ;
z = coeff_ptr [ rc ] ;
zbin = zbin_ptr [ rc ] + * zbin_boost_ptr + zbin_oq_value ;
zbin_boost_ptr ++ ;
sz = ( z >> 31 ) ;
x = ( z ^ sz ) - sz ;
if ( x >= zbin ) {
x += round_ptr [ rc ] ;
y = ( ( ( ( x * quant_ptr [ rc ] ) >> 16 ) + x ) * quant_shift_ptr [ rc ] ) >> 16 ;
x = ( y ^ sz ) - sz ;
qcoeff_ptr [ rc ] = x ;
dqcoeff_ptr [ rc ] = x * dequant_ptr [ rc ] ;
if ( y ) {
eob = i ;
zbin_boost_ptr = b -> zrun_zbin_boost ;
}
}
}
* d -> eob = ( char ) ( eob + 1 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( PageLoadMetricsBrowserTest , AbortNewNavigation ) {
ASSERT_TRUE ( embedded_test_server ( ) -> Start ( ) ) ;
GURL url ( embedded_test_server ( ) -> GetURL ( "/title1.html" ) ) ;
NavigateParams params ( browser ( ) , url , ui : : PAGE_TRANSITION_LINK ) ;
content : : TestNavigationManager manager ( browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) , url ) ;
Navigate ( & params ) ;
EXPECT_TRUE ( manager . WaitForRequestStart ( ) ) ;
GURL url2 ( embedded_test_server ( ) -> GetURL ( "/title2.html" ) ) ;
NavigateParams params2 ( browser ( ) , url2 , ui : : PAGE_TRANSITION_FROM_ADDRESS_BAR ) ;
auto waiter = CreatePageLoadMetricsWaiter ( ) ;
waiter -> AddPageExpectation ( TimingField : : LOAD_EVENT ) ;
Navigate ( & params2 ) ;
waiter -> Wait ( ) ;
histogram_tester_ . ExpectTotalCount ( internal : : kHistogramAbortNewNavigationBeforeCommit , 1 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void cancel_mime_list_for_file ( NautilusDirectory * directory , NautilusFile * file ) {
if ( directory -> details -> mime_list_in_progress != NULL && directory -> details -> mime_list_in_progress -> mime_list_file == file ) {
mime_list_cancel ( directory ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int main ( int argc , char * * argv ) {
int frame_cnt = 0 ;
FILE * outfile = NULL ;
vpx_codec_ctx_t codec ;
VpxVideoReader * reader = NULL ;
const VpxInterface * decoder = NULL ;
const VpxVideoInfo * info = NULL ;
exec_name = argv [ 0 ] ;
if ( argc != 3 ) die ( "Invalid number of arguments." ) ;
reader = vpx_video_reader_open ( argv [ 1 ] ) ;
if ( ! reader ) die ( "Failed to open %s for reading." , argv [ 1 ] ) ;
if ( ! ( outfile = fopen ( argv [ 2 ] , "wb" ) ) ) die ( "Failed to open %s for writing." , argv [ 2 ] ) ;
info = vpx_video_reader_get_info ( reader ) ;
decoder = get_vpx_decoder_by_fourcc ( info -> codec_fourcc ) ;
if ( ! decoder ) die ( "Unknown input codec." ) ;
printf ( "Using %s\n" , vpx_codec_iface_name ( decoder -> codec_interface ( ) ) ) ;
if ( vpx_codec_dec_init ( & codec , decoder -> codec_interface ( ) , NULL , 0 ) ) die_codec ( & codec , "Failed to initialize decoder." ) ;
while ( vpx_video_reader_read_frame ( reader ) ) {
vpx_codec_iter_t iter = NULL ;
vpx_image_t * img = NULL ;
size_t frame_size = 0 ;
const unsigned char * frame = vpx_video_reader_get_frame ( reader , & frame_size ) ;
if ( vpx_codec_decode ( & codec , frame , ( unsigned int ) frame_size , NULL , 0 ) ) die_codec ( & codec , "Failed to decode frame." ) ;
while ( ( img = vpx_codec_get_frame ( & codec , & iter ) ) != NULL ) {
vpx_img_write ( img , outfile ) ;
++ frame_cnt ;
}
}
printf ( "Processed %d frames.\n" , frame_cnt ) ;
if ( vpx_codec_destroy ( & codec ) ) die_codec ( & codec , "Failed to destroy codec" ) ;
printf ( "Play: ffplay -f rawvideo -pix_fmt yuv420p -s %dx%d %s\n" , info -> frame_width , info -> frame_height , argv [ 2 ] ) ;
vpx_video_reader_close ( reader ) ;
fclose ( outfile ) ;
return EXIT_SUCCESS ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dequant ( float * out , const int * idx , const float * cbs [ ] ) {
int i ;
int stride = 2 ;
int num_vec = 5 ;
for ( i = 0 ;
i < num_vec ;
i ++ ) memcpy ( out + stride * i , cbs [ i ] + stride * idx [ i ] , stride * sizeof ( float ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
unsigned int vp9_sad ## m ## x ## n ## _c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride ) {
return sad ( src , src_stride , ref , ref_stride , m , n ) ;
\ }
unsigned int vp9_sad ## m ## x ## n ## _avg_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , const uint8_t * second_pred ) {
uint8_t comp_pred [ m * n ] ;
vp9_comp_avg_pred ( comp_pred , second_pred , m , n , ref , ref_stride ) ;
return sad ( src , src_stride , comp_pred , m , m , n ) ;
\ }
# define sadMxNxK ( m , n , k ) void vp9_sad ## m ## x ## n ## x ## k ## _c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sads ) {
int i ;
for ( i = 0 ;
i < k ;
++ i ) sads [ i ] = vp9_sad ## m ## x ## n ## _c ( src , src_stride , & ref [ i ] , ref_stride ) ;
\ }
# define sadMxNx4D ( m , n ) void vp9_sad ## m ## x ## n ## x4d_c ( const uint8_t * src , int src_stride , const uint8_t * const refs [ ] , int ref_stride , unsigned int * sads ) {
int i ;
for ( i = 0 ;
i < 4 ;
++ i ) sads [ i ] = vp9_sad ## m ## x ## n ## _c ( src , src_stride , refs [ i ] , ref_stride ) ;
\ }
sadMxN ( 64 , 64 )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void add_h245_Address ( h323_calls_info_t * h323info , h245_address_t * h245_address ) {
h323info -> h245_list = g_list_prepend ( h323info -> h245_list , h245_address ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int xsltSecurityAllow ( xsltSecurityPrefsPtr sec ATTRIBUTE_UNUSED , xsltTransformContextPtr ctxt ATTRIBUTE_UNUSED , const char * value ATTRIBUTE_UNUSED ) {
return ( 1 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void gdev_mem_mono_set_inverted ( gx_device_memory * dev , bool black_is_1 ) {
if ( black_is_1 ) dev -> palette = mem_mono_b_w_palette ;
else dev -> palette = mem_mono_w_b_palette ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void _slurm_rpc_delete_partition ( slurm_msg_t * msg ) {
int error_code = SLURM_SUCCESS ;
DEF_TIMERS ;
delete_part_msg_t * part_desc_ptr = ( delete_part_msg_t * ) msg -> data ;
slurmctld_lock_t part_write_lock = {
NO_LOCK , WRITE_LOCK , READ_LOCK , WRITE_LOCK , NO_LOCK }
;
uid_t uid = g_slurm_auth_get_uid ( msg -> auth_cred , slurmctld_config . auth_info ) ;
START_TIMER ;
debug2 ( "Processing RPC: REQUEST_DELETE_PARTITION from uid=%d" , uid ) ;
if ( ! validate_super_user ( uid ) ) {
error_code = ESLURM_USER_ID_MISSING ;
error ( "Security violation, DELETE_PARTITION RPC from uid=%d" , uid ) ;
}
if ( error_code == SLURM_SUCCESS ) {
lock_slurmctld ( part_write_lock ) ;
error_code = delete_partition ( part_desc_ptr ) ;
unlock_slurmctld ( part_write_lock ) ;
END_TIMER2 ( "_slurm_rpc_delete_partition" ) ;
}
if ( error_code ) {
info ( "_slurm_rpc_delete_partition partition=%s: %s" , part_desc_ptr -> name , slurm_strerror ( error_code ) ) ;
slurm_send_rc_msg ( msg , error_code ) ;
}
else {
info ( "_slurm_rpc_delete_partition complete for %s %s" , part_desc_ptr -> name , TIME_STR ) ;
slurm_send_rc_msg ( msg , SLURM_SUCCESS ) ;
save_all_state ( ) ;
queue_job_scheduler ( ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline bool e1000e_itr_should_postpone ( E1000ECore * core ) {
return e1000e_postpone_interrupt ( & core -> itr_intr_pending , & core -> itr ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vp8_mbpost_proc_across_ip_c ( unsigned char * src , int pitch , int rows , int cols , int flimit ) {
int r , c , i ;
unsigned char * s = src ;
unsigned char d [ 16 ] ;
for ( r = 0 ;
r < rows ;
r ++ ) {
int sumsq = 0 ;
int sum = 0 ;
for ( i = - 8 ;
i < 0 ;
i ++ ) s [ i ] = s [ 0 ] ;
for ( i = cols ;
i < cols + 17 ;
i ++ ) s [ i ] = s [ cols - 1 ] ;
for ( i = - 8 ;
i <= 6 ;
i ++ ) {
sumsq += s [ i ] * s [ i ] ;
sum += s [ i ] ;
d [ i + 8 ] = 0 ;
}
for ( c = 0 ;
c < cols + 8 ;
c ++ ) {
int x = s [ c + 7 ] - s [ c - 8 ] ;
int y = s [ c + 7 ] + s [ c - 8 ] ;
sum += x ;
sumsq += x * y ;
d [ c & 15 ] = s [ c ] ;
if ( sumsq * 15 - sum * sum < flimit ) {
d [ c & 15 ] = ( 8 + sum + s [ c ] ) >> 4 ;
}
s [ c - 8 ] = d [ ( c - 8 ) & 15 ] ;
}
s += pitch ;
}
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
void SFDummyUpCIDs ( struct glyphinfo * gi , SplineFont * sf ) {
int i , j , k , max ;
int * bygid ;
max = 0 ;
for ( k = 0 ;
k < sf -> subfontcnt ;
++ k ) if ( sf -> subfonts [ k ] -> glyphcnt > max ) max = sf -> subfonts [ k ] -> glyphcnt ;
if ( max == 0 ) return ;
sf -> glyphs = calloc ( max , sizeof ( SplineChar * ) ) ;
sf -> glyphcnt = sf -> glyphmax = max ;
for ( k = 0 ;
k < sf -> subfontcnt ;
++ k ) for ( i = 0 ;
i < sf -> subfonts [ k ] -> glyphcnt ;
++ i ) if ( sf -> subfonts [ k ] -> glyphs [ i ] != NULL ) sf -> glyphs [ i ] = sf -> subfonts [ k ] -> glyphs [ i ] ;
if ( gi == NULL ) return ;
bygid = malloc ( ( sf -> glyphcnt + 3 ) * sizeof ( int ) ) ;
memset ( bygid , 0xff , ( sf -> glyphcnt + 3 ) * sizeof ( int ) ) ;
j = 1 ;
for ( i = 0 ;
i < sf -> glyphcnt ;
++ i ) if ( sf -> glyphs [ i ] != NULL ) {
if ( bygid [ 0 ] == - 1 && strcmp ( sf -> glyphs [ i ] -> name , ".notdef" ) == 0 ) {
sf -> glyphs [ i ] -> ttf_glyph = 0 ;
bygid [ 0 ] = i ;
}
else if ( SCWorthOutputting ( sf -> glyphs [ i ] ) ) {
sf -> glyphs [ i ] -> ttf_glyph = j ;
bygid [ j ++ ] = i ;
}
}
gi -> bygid = bygid ;
gi -> gcnt = j ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline int padr_match ( PCNetState * s , const uint8_t * buf , int size ) {
struct qemu_ether_header * hdr = ( void * ) buf ;
uint8_t padr [ 6 ] = {
s -> csr [ 12 ] & 0xff , s -> csr [ 12 ] >> 8 , s -> csr [ 13 ] & 0xff , s -> csr [ 13 ] >> 8 , s -> csr [ 14 ] & 0xff , s -> csr [ 14 ] >> 8 }
;
int result = ( ! CSR_DRCVPA ( s ) ) && ! memcmp ( hdr -> ether_dhost , padr , 6 ) ;
# ifdef PCNET_DEBUG_MATCH printf ( "packet dhost=%02x:%02x:%02x:%02x:%02x:%02x, " "padr=%02x:%02x:%02x:%02x:%02x:%02x\n" , hdr -> ether_dhost [ 0 ] , hdr -> ether_dhost [ 1 ] , hdr -> ether_dhost [ 2 ] , hdr -> ether_dhost [ 3 ] , hdr -> ether_dhost [ 4 ] , hdr -> ether_dhost [ 5 ] , padr [ 0 ] , padr [ 1 ] , padr [ 2 ] , padr [ 3 ] , padr [ 4 ] , padr [ 5 ] ) ;
printf ( "padr_match result=%d\n" , result ) ;
# endif return result ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void set_good_speed_feature ( VP9_COMP * cpi , VP9_COMMON * cm , SPEED_FEATURES * sf , int speed ) {
const int boosted = frame_is_boosted ( cpi ) ;
sf -> adaptive_rd_thresh = 1 ;
sf -> allow_skip_recode = 1 ;
if ( speed >= 1 ) {
sf -> use_square_partition_only = ! frame_is_intra_only ( cm ) ;
sf -> less_rectangular_check = 1 ;
if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> disable_split_mask = cm -> show_frame ? DISABLE_ALL_SPLIT : DISABLE_ALL_INTER_SPLIT ;
else sf -> disable_split_mask = DISABLE_COMPOUND_SPLIT ;
sf -> use_rd_breakout = 1 ;
sf -> adaptive_motion_search = 1 ;
sf -> mv . auto_mv_step_size = 1 ;
sf -> adaptive_rd_thresh = 2 ;
sf -> mv . subpel_iters_per_step = 1 ;
sf -> mode_skip_start = 10 ;
sf -> adaptive_pred_interp_filter = 1 ;
sf -> recode_loop = ALLOW_RECODE_KFARFGF ;
sf -> intra_y_mode_mask [ TX_32X32 ] = INTRA_DC_H_V ;
sf -> intra_uv_mode_mask [ TX_32X32 ] = INTRA_DC_H_V ;
sf -> intra_y_mode_mask [ TX_16X16 ] = INTRA_DC_H_V ;
sf -> intra_uv_mode_mask [ TX_16X16 ] = INTRA_DC_H_V ;
sf -> tx_size_search_breakout = 1 ;
if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 23 ) ;
else sf -> partition_search_breakout_dist_thr = ( 1 << 21 ) ;
sf -> partition_search_breakout_rate_thr = 500 ;
}
if ( speed >= 2 ) {
sf -> tx_size_search_method = frame_is_boosted ( cpi ) ? USE_FULL_RD : USE_LARGESTALL ;
if ( MIN ( cm -> width , cm -> height ) >= 720 ) {
sf -> lf_motion_threshold = LOW_MOTION_THRESHOLD ;
sf -> last_partitioning_redo_frequency = 3 ;
sf -> disable_split_mask = cm -> show_frame ? DISABLE_ALL_SPLIT : DISABLE_ALL_INTER_SPLIT ;
sf -> adaptive_pred_interp_filter = 0 ;
}
else {
sf -> disable_split_mask = LAST_AND_INTRA_SPLIT_ONLY ;
sf -> last_partitioning_redo_frequency = 2 ;
sf -> lf_motion_threshold = NO_MOTION_THRESHOLD ;
}
sf -> reference_masking = 1 ;
sf -> mode_search_skip_flags = FLAG_SKIP_INTRA_DIRMISMATCH | FLAG_SKIP_INTRA_BESTINTER | FLAG_SKIP_COMP_BESTINTRA | FLAG_SKIP_INTRA_LOWVAR ;
sf -> disable_filter_search_var_thresh = 100 ;
sf -> comp_inter_joint_search_thresh = BLOCK_SIZES ;
sf -> auto_min_max_partition_size = CONSTRAIN_NEIGHBORING_MIN_MAX ;
sf -> use_lastframe_partitioning = LAST_FRAME_PARTITION_LOW_MOTION ;
sf -> adjust_partitioning_from_last_frame = 1 ;
if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 24 ) ;
else sf -> partition_search_breakout_dist_thr = ( 1 << 22 ) ;
sf -> partition_search_breakout_rate_thr = 700 ;
}
if ( speed >= 3 ) {
sf -> tx_size_search_method = frame_is_intra_only ( cm ) ? USE_FULL_RD : USE_LARGESTALL ;
if ( MIN ( cm -> width , cm -> height ) >= 720 ) {
sf -> disable_split_mask = DISABLE_ALL_SPLIT ;
}
else {
sf -> max_intra_bsize = BLOCK_32X32 ;
sf -> disable_split_mask = DISABLE_ALL_INTER_SPLIT ;
}
sf -> adaptive_pred_interp_filter = 0 ;
sf -> adaptive_mode_search = 1 ;
sf -> cb_partition_search = ! boosted ;
sf -> cb_pred_filter_search = 1 ;
sf -> alt_ref_search_fp = 1 ;
sf -> motion_field_mode_search = ! boosted ;
sf -> lf_motion_threshold = LOW_MOTION_THRESHOLD ;
sf -> last_partitioning_redo_frequency = 2 ;
sf -> recode_loop = ALLOW_RECODE_KFMAXBW ;
sf -> adaptive_rd_thresh = 3 ;
sf -> mode_skip_start = 6 ;
sf -> intra_y_mode_mask [ TX_32X32 ] = INTRA_DC ;
sf -> intra_uv_mode_mask [ TX_32X32 ] = INTRA_DC ;
sf -> adaptive_interp_filter_search = 1 ;
if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 25 ) ;
else sf -> partition_search_breakout_dist_thr = ( 1 << 23 ) ;
sf -> partition_search_breakout_rate_thr = 1000 ;
}
if ( speed >= 4 ) {
sf -> use_square_partition_only = 1 ;
sf -> tx_size_search_method = USE_LARGESTALL ;
sf -> disable_split_mask = DISABLE_ALL_SPLIT ;
sf -> adaptive_rd_thresh = 4 ;
sf -> mode_search_skip_flags |= FLAG_SKIP_COMP_REFMISMATCH | FLAG_EARLY_TERMINATE ;
sf -> disable_filter_search_var_thresh = 200 ;
sf -> use_lastframe_partitioning = LAST_FRAME_PARTITION_ALL ;
sf -> use_lp32x32fdct = 1 ;
sf -> use_fast_coef_updates = ONE_LOOP_REDUCED ;
sf -> use_fast_coef_costing = 1 ;
if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 26 ) ;
else sf -> partition_search_breakout_dist_thr = ( 1 << 24 ) ;
sf -> partition_search_breakout_rate_thr = 1500 ;
}
if ( speed >= 5 ) {
int i ;
sf -> partition_search_type = FIXED_PARTITION ;
sf -> optimize_coefficients = 0 ;
sf -> mv . search_method = HEX ;
sf -> disable_filter_search_var_thresh = 500 ;
for ( i = 0 ;
i < TX_SIZES ;
++ i ) {
sf -> intra_y_mode_mask [ i ] = INTRA_DC ;
sf -> intra_uv_mode_mask [ i ] = INTRA_DC ;
}
cpi -> allow_encode_breakout = ENCODE_BREAKOUT_ENABLED ;
}
if ( speed >= 6 ) {
sf -> mv . reduce_first_step_size = 1 ;
}
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static VALUE cState_indent_set ( VALUE self , VALUE indent ) {
unsigned long len ;
GET_STATE ( self ) ;
Check_Type ( indent , T_STRING ) ;
len = RSTRING_LEN ( indent ) ;
if ( len == 0 ) {
if ( state -> indent ) {
ruby_xfree ( state -> indent ) ;
state -> indent = NULL ;
state -> indent_len = 0 ;
}
}
else {
if ( state -> indent ) ruby_xfree ( state -> indent ) ;
state -> indent = fstrndup ( RSTRING_PTR ( indent ) , len ) ;
state -> indent_len = len ;
}
return Qnil ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static ossl_inline t2 * sk_ ## t1 ## _shift ( STACK_OF ( t1 ) * sk ) {
return ( t2 * ) OPENSSL_sk_shift ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline void sk_ ## t1 ## _pop_free ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _freefunc freefunc ) {
OPENSSL_sk_pop_free ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline int sk_ ## t1 ## _insert ( STACK_OF ( t1 ) * sk , t2 * ptr , int idx ) {
return OPENSSL_sk_insert ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr , idx ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _set ( STACK_OF ( t1 ) * sk , int idx , t2 * ptr ) {
return ( t2 * ) OPENSSL_sk_set ( ( OPENSSL_STACK * ) sk , idx , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find_ex ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find_ex ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) {
return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) {
return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ;
}
# define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ;
typedef const char * OPENSSL_CSTRING ;
DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
TEST_F ( PrintPreviewUIUnitTest , PrintPreviewData ) {
WebContents * initiator = browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) ;
ASSERT_TRUE ( initiator ) ;
EXPECT_FALSE ( IsShowingWebContentsModalDialog ( initiator ) ) ;
printing : : PrintPreviewDialogController * controller = printing : : PrintPreviewDialogController : : GetInstance ( ) ;
ASSERT_TRUE ( controller ) ;
printing : : PrintViewManager * print_view_manager = printing : : PrintViewManager : : FromWebContents ( initiator ) ;
print_view_manager -> PrintPreviewNow ( false ) ;
WebContents * preview_dialog = controller -> GetOrCreatePreviewDialog ( initiator ) ;
EXPECT_NE ( initiator , preview_dialog ) ;
EXPECT_EQ ( 1 , browser ( ) -> tab_strip_model ( ) -> count ( ) ) ;
EXPECT_TRUE ( IsShowingWebContentsModalDialog ( initiator ) ) ;
PrintPreviewUI * preview_ui = static_cast < PrintPreviewUI * > ( preview_dialog -> GetWebUI ( ) -> GetController ( ) ) ;
ASSERT_TRUE ( preview_ui != NULL ) ;
scoped_refptr < base : : RefCountedBytes > data ;
preview_ui -> GetPrintPreviewDataForIndex ( printing : : COMPLETE_PREVIEW_DOCUMENT_INDEX , & data ) ;
EXPECT_EQ ( NULL , data . get ( ) ) ;
scoped_refptr < base : : RefCountedBytes > dummy_data = CreateTestData ( ) ;
preview_ui -> SetPrintPreviewDataForIndex ( printing : : COMPLETE_PREVIEW_DOCUMENT_INDEX , dummy_data . get ( ) ) ;
preview_ui -> GetPrintPreviewDataForIndex ( printing : : COMPLETE_PREVIEW_DOCUMENT_INDEX , & data ) ;
EXPECT_EQ ( dummy_data -> size ( ) , data -> size ( ) ) ;
EXPECT_EQ ( dummy_data . get ( ) , data . get ( ) ) ;
dummy_data = new base : : RefCountedBytes ( ) ;
preview_ui -> SetPrintPreviewDataForIndex ( printing : : FIRST_PAGE_INDEX , dummy_data . get ( ) ) ;
preview_ui -> ClearAllPreviewData ( ) ;
preview_ui -> GetPrintPreviewDataForIndex ( printing : : COMPLETE_PREVIEW_DOCUMENT_INDEX , & data ) ;
EXPECT_EQ ( NULL , data . get ( ) ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int collated_compare ( const void * a , const void * b ) {
const char * const s1 = * ( const char * const * const ) a ;
const char * const s2 = * ( const char * const * const ) b ;
if ( s1 == s2 ) return 0 ;
if ( s1 == NULL ) return 1 ;
if ( s2 == NULL ) return - 1 ;
return strcoll ( s1 , s2 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void truespeech_filters_merge ( TSContext * dec ) {
int i ;
if ( ! dec -> flag ) {
for ( i = 0 ;
i < 8 ;
i ++ ) {
dec -> filters [ i + 0 ] = dec -> prevfilt [ i ] ;
dec -> filters [ i + 8 ] = dec -> prevfilt [ i ] ;
}
}
else {
for ( i = 0 ;
i < 8 ;
i ++ ) {
dec -> filters [ i + 0 ] = ( dec -> cvector [ i ] * 21846 + dec -> prevfilt [ i ] * 10923 + 16384 ) >> 15 ;
dec -> filters [ i + 8 ] = ( dec -> cvector [ i ] * 10923 + dec -> prevfilt [ i ] * 21846 + 16384 ) >> 15 ;
}
}
for ( i = 0 ;
i < 8 ;
i ++ ) {
dec -> filters [ i + 16 ] = dec -> cvector [ i ] ;
dec -> filters [ i + 24 ] = dec -> cvector [ i ] ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void bn_sqr_comba8 ( BN_ULONG * r , const BN_ULONG * a ) {
BN_ULONG c1 , c2 , c3 ;
c1 = 0 ;
c2 = 0 ;
c3 = 0 ;
sqr_add_c ( a , 0 , c1 , c2 , c3 ) ;
r [ 0 ] = c1 ;
c1 = 0 ;
sqr_add_c2 ( a , 1 , 0 , c2 , c3 , c1 ) ;
r [ 1 ] = c2 ;
c2 = 0 ;
sqr_add_c ( a , 1 , c3 , c1 , c2 ) ;
sqr_add_c2 ( a , 2 , 0 , c3 , c1 , c2 ) ;
r [ 2 ] = c3 ;
c3 = 0 ;
sqr_add_c2 ( a , 3 , 0 , c1 , c2 , c3 ) ;
sqr_add_c2 ( a , 2 , 1 , c1 , c2 , c3 ) ;
r [ 3 ] = c1 ;
c1 = 0 ;
sqr_add_c ( a , 2 , c2 , c3 , c1 ) ;
sqr_add_c2 ( a , 3 , 1 , c2 , c3 , c1 ) ;
sqr_add_c2 ( a , 4 , 0 , c2 , c3 , c1 ) ;
r [ 4 ] = c2 ;
c2 = 0 ;
sqr_add_c2 ( a , 5 , 0 , c3 , c1 , c2 ) ;
sqr_add_c2 ( a , 4 , 1 , c3 , c1 , c2 ) ;
sqr_add_c2 ( a , 3 , 2 , c3 , c1 , c2 ) ;
r [ 5 ] = c3 ;
c3 = 0 ;
sqr_add_c ( a , 3 , c1 , c2 , c3 ) ;
sqr_add_c2 ( a , 4 , 2 , c1 , c2 , c3 ) ;
sqr_add_c2 ( a , 5 , 1 , c1 , c2 , c3 ) ;
sqr_add_c2 ( a , 6 , 0 , c1 , c2 , c3 ) ;
r [ 6 ] = c1 ;
c1 = 0 ;
sqr_add_c2 ( a , 7 , 0 , c2 , c3 , c1 ) ;
sqr_add_c2 ( a , 6 , 1 , c2 , c3 , c1 ) ;
sqr_add_c2 ( a , 5 , 2 , c2 , c3 , c1 ) ;
sqr_add_c2 ( a , 4 , 3 , c2 , c3 , c1 ) ;
r [ 7 ] = c2 ;
c2 = 0 ;
sqr_add_c ( a , 4 , c3 , c1 , c2 ) ;
sqr_add_c2 ( a , 5 , 3 , c3 , c1 , c2 ) ;
sqr_add_c2 ( a , 6 , 2 , c3 , c1 , c2 ) ;
sqr_add_c2 ( a , 7 , 1 , c3 , c1 , c2 ) ;
r [ 8 ] = c3 ;
c3 = 0 ;
sqr_add_c2 ( a , 7 , 2 , c1 , c2 , c3 ) ;
sqr_add_c2 ( a , 6 , 3 , c1 , c2 , c3 ) ;
sqr_add_c2 ( a , 5 , 4 , c1 , c2 , c3 ) ;
r [ 9 ] = c1 ;
c1 = 0 ;
sqr_add_c ( a , 5 , c2 , c3 , c1 ) ;
sqr_add_c2 ( a , 6 , 4 , c2 , c3 , c1 ) ;
sqr_add_c2 ( a , 7 , 3 , c2 , c3 , c1 ) ;
r [ 10 ] = c2 ;
c2 = 0 ;
sqr_add_c2 ( a , 7 , 4 , c3 , c1 , c2 ) ;
sqr_add_c2 ( a , 6 , 5 , c3 , c1 , c2 ) ;
r [ 11 ] = c3 ;
c3 = 0 ;
sqr_add_c ( a , 6 , c1 , c2 , c3 ) ;
sqr_add_c2 ( a , 7 , 5 , c1 , c2 , c3 ) ;
r [ 12 ] = c1 ;
c1 = 0 ;
sqr_add_c2 ( a , 7 , 6 , c2 , c3 , c1 ) ;
r [ 13 ] = c2 ;
c2 = 0 ;
sqr_add_c ( a , 7 , c3 , c1 , c2 ) ;
r [ 14 ] = c3 ;
r [ 15 ] = c1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void mark_commit ( struct commit * c , void * data ) {
mark_object ( & c -> object , NULL , NULL , data ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
void timeout_process ( struct event_base * base ) {
struct timeval now ;
struct event * ev ;
if ( min_heap_empty ( & base -> timeheap ) ) return ;
gettime ( base , & now ) ;
while ( ( ev = min_heap_top ( & base -> timeheap ) ) ) {
if ( evutil_timercmp ( & ev -> ev_timeout , & now , > ) ) break ;
event_del ( ev ) ;
event_debug ( ( "timeout_process: call %p" , ev -> ev_callback ) ) ;
event_active ( ev , EV_TIMEOUT , 1 ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void gx_ttfReader__Reset ( gx_ttfReader * self ) {
if ( self -> extra_glyph_index != - 1 ) {
self -> extra_glyph_index = - 1 ;
gs_glyph_data_free ( & self -> glyph_data , "gx_ttfReader__Reset" ) ;
}
self -> error = false ;
self -> pos = 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int tipc_nl_compat_bearer_disable ( struct tipc_nl_compat_cmd_doit * cmd , struct sk_buff * skb , struct tipc_nl_compat_msg * msg ) {
char * name ;
struct nlattr * bearer ;
name = ( char * ) TLV_DATA ( msg -> req ) ;
bearer = nla_nest_start ( skb , TIPC_NLA_BEARER ) ;
if ( ! bearer ) return - EMSGSIZE ;
if ( nla_put_string ( skb , TIPC_NLA_BEARER_NAME , name ) ) return - EMSGSIZE ;
nla_nest_end ( skb , bearer ) ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static inline void dpy_resize ( DisplayState * s , int w , int h ) {
s -> dpy_resize ( s , w , h ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( AppApiTest , SameBrowsingInstanceAfterSwap ) {
extensions : : ProcessMap * process_map = extensions : : ProcessMap : : Get ( browser ( ) -> profile ( ) ) ;
GURL base_url = GetTestBaseURL ( "app_process" ) ;
const Extension * app = LoadExtension ( test_data_dir_ . AppendASCII ( "app_process" ) ) ;
ASSERT_TRUE ( app ) ;
ui_test_utils : : NavigateToURL ( browser ( ) , base_url . Resolve ( "path1/iframe.html" ) ) ;
content : : SiteInstance * app_instance = browser ( ) -> tab_strip_model ( ) -> GetWebContentsAt ( 0 ) -> GetSiteInstance ( ) ;
EXPECT_TRUE ( process_map -> Contains ( app_instance -> GetProcess ( ) -> GetID ( ) ) ) ;
const BrowserList * active_browser_list = BrowserList : : GetInstance ( ) ;
EXPECT_EQ ( 2U , active_browser_list -> size ( ) ) ;
content : : WebContents * popup_contents = active_browser_list -> get ( 1 ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) ;
content : : WaitForLoadStop ( popup_contents ) ;
SiteInstance * popup_instance = popup_contents -> GetSiteInstance ( ) ;
EXPECT_EQ ( app_instance , popup_instance ) ;
GURL non_app_url ( base_url . Resolve ( "path3/empty.html" ) ) ;
ui_test_utils : : NavigateToURL ( active_browser_list -> get ( 1 ) , non_app_url ) ;
SiteInstance * new_instance = popup_contents -> GetSiteInstance ( ) ;
EXPECT_NE ( app_instance , new_instance ) ;
EXPECT_TRUE ( app_instance -> IsRelatedSiteInstance ( new_instance ) ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void PNGAPI png_set_tRNS ( png_structp png_ptr , png_infop info_ptr , png_bytep trans , int num_trans , png_color_16p trans_values ) {
png_debug1 ( 1 , "in %s storage function" , "tRNS" ) ;
if ( png_ptr == NULL || info_ptr == NULL ) return ;
if ( num_trans < 0 || num_trans > PNG_MAX_PALETTE_LENGTH ) {
png_warning ( png_ptr , "Ignoring invalid num_trans value" ) ;
return ;
}
if ( trans != NULL ) {
# ifdef PNG_FREE_ME_SUPPORTED png_free_data ( png_ptr , info_ptr , PNG_FREE_TRNS , 0 ) ;
# endif png_ptr -> trans = info_ptr -> trans = ( png_bytep ) png_malloc ( png_ptr , ( png_uint_32 ) PNG_MAX_PALETTE_LENGTH ) ;
if ( num_trans > 0 && num_trans <= PNG_MAX_PALETTE_LENGTH ) png_memcpy ( info_ptr -> trans , trans , ( png_size_t ) num_trans ) ;
}
if ( trans_values != NULL ) {
int sample_max = ( 1 << info_ptr -> bit_depth ) ;
if ( ( info_ptr -> color_type == PNG_COLOR_TYPE_GRAY && ( int ) trans_values -> gray > sample_max ) || ( info_ptr -> color_type == PNG_COLOR_TYPE_RGB && ( ( int ) trans_values -> red > sample_max || ( int ) trans_values -> green > sample_max || ( int ) trans_values -> blue > sample_max ) ) ) png_warning ( png_ptr , "tRNS chunk has out-of-range samples for bit_depth" ) ;
png_memcpy ( & ( info_ptr -> trans_values ) , trans_values , png_sizeof ( png_color_16 ) ) ;
if ( num_trans == 0 ) num_trans = 1 ;
}
info_ptr -> num_trans = ( png_uint_16 ) num_trans ;
if ( num_trans != 0 ) {
info_ptr -> valid |= PNG_INFO_tRNS ;
# ifdef PNG_FREE_ME_SUPPORTED info_ptr -> free_me |= PNG_FREE_TRNS ;
# else png_ptr -> flags |= PNG_FLAG_FREE_TRNS ;
# endif }
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static uint32_t getFromUBytesValue ( CnvExtData * extData , UCMTable * table , UCMapping * m ) {
uint8_t * bytes , * resultBytes ;
uint32_t value ;
int32_t u16Length , ratio ;
if ( m -> f == 2 ) {
return UCNV_EXT_FROM_U_SUBCHAR1 ;
}
bytes = UCM_GET_BYTES ( table , m ) ;
value = 0 ;
switch ( m -> bLen ) {
case 3 : value = ( ( uint32_t ) * bytes ++ ) << 16 ;
case 2 : value |= ( ( uint32_t ) * bytes ++ ) << 8 ;
case 1 : value |= * bytes ;
break ;
default : value = ( uint32_t ) utm_countItems ( extData -> fromUBytes ) ;
resultBytes = utm_allocN ( extData -> fromUBytes , m -> bLen ) ;
uprv_memcpy ( resultBytes , bytes , m -> bLen ) ;
break ;
}
value |= ( uint32_t ) m -> bLen << UCNV_EXT_FROM_U_LENGTH_SHIFT ;
if ( m -> f == 0 ) {
value |= UCNV_EXT_FROM_U_ROUNDTRIP_FLAG ;
}
else if ( m -> f == 4 ) {
value |= UCNV_EXT_FROM_U_GOOD_ONE_WAY_FLAG ;
}
if ( m -> uLen == 1 ) {
u16Length = U16_LENGTH ( m -> u ) ;
}
else {
u16Length = U16_LENGTH ( UCM_GET_CODE_POINTS ( table , m ) [ 0 ] ) + ( m -> uLen - 2 ) ;
}
if ( u16Length > extData -> maxInUChars ) {
extData -> maxInUChars = u16Length ;
}
if ( m -> bLen > extData -> maxOutBytes ) {
extData -> maxOutBytes = m -> bLen ;
}
ratio = ( m -> bLen + ( u16Length - 1 ) ) / u16Length ;
if ( ratio > extData -> maxBytesPerUChar ) {
extData -> maxBytesPerUChar = ratio ;
}
return value ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
char op_volatile ( Oid opno ) {
RegProcedure funcid = get_opcode ( opno ) ;
if ( funcid == ( RegProcedure ) InvalidOid ) elog ( ERROR , "operator %u does not exist" , opno ) ;
return func_volatile ( ( Oid ) funcid ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IN_PROC_BROWSER_TEST_F ( ChooserDialogViewTest , Accept ) {
EXPECT_CALL ( * mock_chooser_controller_ , Select ( testing : : _ ) ) . Times ( 1 ) ;
chooser_dialog_view_ -> Accept ( ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void add_range ( fz_context * ctx , pdf_cmap * cmap , unsigned int low , unsigned int high , unsigned int out , int check_for_overlap , int many ) {
int current ;
cmap_splay * tree ;
if ( low > high ) {
fz_warn ( ctx , "range limits out of range in cmap %s" , cmap -> cmap_name ) ;
return ;
}
tree = cmap -> tree ;
if ( cmap -> tlen ) {
unsigned int move = cmap -> ttop ;
unsigned int gt = EMPTY ;
unsigned int lt = EMPTY ;
if ( check_for_overlap ) {
do {
current = move ;
if ( low <= tree [ current ] . low && tree [ current ] . low <= high ) {
tree [ current ] . out += high + 1 - tree [ current ] . low ;
tree [ current ] . low = high + 1 ;
if ( tree [ current ] . low > tree [ current ] . high ) {
move = delete_node ( cmap , current ) ;
current = EMPTY ;
continue ;
}
}
else if ( low <= tree [ current ] . high && tree [ current ] . high <= high ) {
tree [ current ] . high = low - 1 ;
assert ( tree [ current ] . low <= tree [ current ] . high ) ;
}
else if ( tree [ current ] . low < low && high < tree [ current ] . high ) {
int new_high = tree [ current ] . high ;
tree [ current ] . high = low - 1 ;
add_range ( ctx , cmap , high + 1 , new_high , tree [ current ] . out + high + 1 - tree [ current ] . low , 0 , many ) ;
}
if ( tree [ current ] . low > high ) {
move = tree [ current ] . left ;
gt = current ;
}
else {
move = tree [ current ] . right ;
lt = current ;
}
}
while ( move != EMPTY ) ;
}
else {
do {
current = move ;
if ( tree [ current ] . low > high ) {
move = tree [ current ] . left ;
gt = current ;
}
else {
move = tree [ current ] . right ;
lt = current ;
}
}
while ( move != EMPTY ) ;
}
if ( ! many ) {
if ( lt != EMPTY && ! tree [ lt ] . many && tree [ lt ] . high == low - 1 && tree [ lt ] . out - tree [ lt ] . low == out - low ) {
tree [ lt ] . high = high ;
if ( gt != EMPTY && ! tree [ gt ] . many && tree [ gt ] . low == high + 1 && tree [ gt ] . out - tree [ gt ] . low == out - low ) {
tree [ lt ] . high = tree [ gt ] . high ;
delete_node ( cmap , gt ) ;
}
goto exit ;
}
if ( gt != EMPTY && ! tree [ gt ] . many && tree [ gt ] . low == high + 1 && tree [ gt ] . out - tree [ gt ] . low == out - low ) {
tree [ gt ] . low = low ;
tree [ gt ] . out = out ;
goto exit ;
}
}
}
else current = EMPTY ;
if ( cmap -> tlen == cmap -> tcap ) {
int new_cap = cmap -> tcap ? cmap -> tcap * 2 : 256 ;
tree = cmap -> tree = fz_resize_array ( ctx , cmap -> tree , new_cap , sizeof * cmap -> tree ) ;
cmap -> tcap = new_cap ;
}
tree [ cmap -> tlen ] . low = low ;
tree [ cmap -> tlen ] . high = high ;
tree [ cmap -> tlen ] . out = out ;
tree [ cmap -> tlen ] . parent = current ;
tree [ cmap -> tlen ] . left = EMPTY ;
tree [ cmap -> tlen ] . right = EMPTY ;
tree [ cmap -> tlen ] . many = many ;
cmap -> tlen ++ ;
if ( current == EMPTY ) cmap -> ttop = 0 ;
else if ( tree [ current ] . low > high ) tree [ current ] . left = cmap -> tlen - 1 ;
else {
assert ( tree [ current ] . high < low ) ;
tree [ current ] . right = cmap -> tlen - 1 ;
}
move_to_root ( tree , cmap -> tlen - 1 ) ;
cmap -> ttop = cmap -> tlen - 1 ;
exit : {
}
# ifdef CHECK_SPLAY check_splay ( cmap -> tree , cmap -> ttop , 0 ) ;
# endif # ifdef DUMP_SPLAY dump_splay ( cmap -> tree , cmap -> ttop , 0 , "" ) ;
# endif }
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int register_interfaces ( extcap_parameters * extcap_conf , const char * adb_server_ip , unsigned short * adb_server_tcp_port ) {
static char packet [ PACKET_LENGTH ] ;
static char helpful_packet [ PACKET_LENGTH ] ;
char * response ;
char * device_list ;
gssize data_length ;
gssize device_length ;
socket_handle_t sock ;
const char * adb_transport_serial_templace = "%04x" "host:transport:%s" ;
const char * adb_check_port_templace = "%04x" "shell:cat /proc/%set/tcp" ;
const char * adb_devices = "000E" "host:devices-l" ;
const char * adb_api_level = "0022" "shell:getprop ro.build.version.sdk" ;
const char * adb_hcidump_version = "0017" "shell:hcidump --version" ;
const char * adb_ps_droid_bluetooth = "0018" "shell:ps droid.bluetooth" ;
const char * adb_ps_bluetooth_app = "001E" "shell:ps com.android.bluetooth" ;
const char * adb_tcpdump_help = "0010" "shell:tcpdump -h" ;
char serial_number [ SERIAL_NUMBER_LENGTH_MAX ] ;
size_t serial_number_length ;
char model_name [ MODEL_NAME_LENGTH_MAX ] ;
int result ;
char * pos ;
char * i_pos ;
char * model_pos ;
char * device_pos ;
char * prev_pos ;
int api_level ;
int disable_interface ;
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) return EXIT_CODE_INVALID_SOCKET_INTERFACES_LIST ;
device_list = adb_send_and_receive ( sock , adb_devices , packet , sizeof ( packet ) , & device_length ) ;
closesocket ( sock ) ;
if ( ! device_list ) {
errmsg_print ( "ERROR: Cannot get list of interfaces from devices" ) ;
return EXIT_CODE_CANNOT_GET_INTERFACES_LIST ;
}
device_list [ device_length ] = '\0' ;
pos = ( char * ) device_list ;
while ( pos < ( char * ) ( device_list + device_length ) ) {
prev_pos = pos ;
pos = strchr ( pos , ' ' ) ;
i_pos = pos ;
result = ( int ) ( pos - prev_pos ) ;
pos = strchr ( pos , '\n' ) + 1 ;
if ( result >= ( int ) sizeof ( serial_number ) ) {
verbose_print ( "WARNING: Serial number too long, ignore device\n" ) ;
continue ;
}
memcpy ( serial_number , prev_pos , result ) ;
serial_number [ result ] = '\0' ;
serial_number_length = strlen ( serial_number ) ;
model_name [ 0 ] = '\0' ;
model_pos = g_strstr_len ( i_pos , pos - i_pos , "model:" ) ;
if ( model_pos ) {
device_pos = g_strstr_len ( i_pos , pos - i_pos , "device:" ) ;
if ( device_pos && device_pos - model_pos - 6 - 1 < MODEL_NAME_LENGTH_MAX ) {
memcpy ( model_name , model_pos + 6 , device_pos - model_pos - 6 - 1 ) ;
model_name [ device_pos - model_pos - 6 - 1 ] = '\0' ;
}
}
if ( model_name [ 0 ] == '\0' ) strcpy ( model_name , "unknown" ) ;
verbose_print ( "VERBOSE: Processing device: \"%s\" <%s>\n" , serial_number , model_name ) ;
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) continue ;
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet for transport" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_1 ;
}
result = adb_send ( sock , helpful_packet ) ;
if ( result ) {
verbose_print ( "WARNING: Error while setting adb transport for <%s>\n" , helpful_packet ) ;
closesocket ( sock ) ;
}
else {
response = adb_send_and_read ( sock , adb_tcpdump_help , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
closesocket ( sock ) ;
if ( response ) {
response [ data_length ] = '\0' ;
if ( strstr ( response , "tcpdump version" ) ) {
new_interface ( extcap_conf , INTERFACE_ANDROID_WIFI_TCPDUMP , model_name , serial_number , "Android WiFi" ) ;
}
}
else {
verbose_print ( "WARNING: Error on socket: <%s>\n" , helpful_packet ) ;
}
}
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) continue ;
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_2 ;
}
result = adb_send ( sock , helpful_packet ) ;
if ( result ) {
verbose_print ( "WARNING: Error while setting adb transport for <%s>\n" , helpful_packet ) ;
closesocket ( sock ) ;
continue ;
}
response = adb_send_and_read ( sock , adb_api_level , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
closesocket ( sock ) ;
if ( ! response ) {
verbose_print ( "WARNING: Error on socket: <%s>\n" , helpful_packet ) ;
continue ;
}
response [ data_length ] = '\0' ;
api_level = ( int ) g_ascii_strtoll ( response , NULL , 10 ) ;
verbose_print ( "VERBOSE: Android API Level for %s is %i\n" , serial_number , api_level ) ;
if ( api_level < 21 ) {
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_MAIN , model_name , serial_number , "Android Logcat Main" ) ;
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_SYSTEM , model_name , serial_number , "Android Logcat System" ) ;
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_RADIO , model_name , serial_number , "Android Logcat Radio" ) ;
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_EVENTS , model_name , serial_number , "Android Logcat Events" ) ;
}
else {
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_TEXT_MAIN , model_name , serial_number , "Android Logcat Main" ) ;
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM , model_name , serial_number , "Android Logcat System" ) ;
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_TEXT_RADIO , model_name , serial_number , "Android Logcat Radio" ) ;
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS , model_name , serial_number , "Android Logcat Events" ) ;
new_interface ( extcap_conf , INTERFACE_ANDROID_LOGCAT_TEXT_CRASH , model_name , serial_number , "Android Logcat Crash" ) ;
}
if ( api_level >= 5 && api_level < 17 ) {
disable_interface = 0 ;
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) continue ;
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_3 ;
}
result = adb_send ( sock , helpful_packet ) ;
if ( result ) {
errmsg_print ( "ERROR: Error while setting adb transport for <%s>" , helpful_packet ) ;
closesocket ( sock ) ;
return EXIT_CODE_GENERIC ;
}
response = adb_send_and_read ( sock , adb_hcidump_version , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
closesocket ( sock ) ;
if ( ! response || data_length < 1 ) {
verbose_print ( "WARNING: Error while getting hcidump version by <%s> (%p len=%" G_GSSIZE_FORMAT ")\n" , adb_hcidump_version , ( void * ) response , data_length ) ;
verbose_print ( "VERBOSE: Android hcidump version for %s is unknown\n" , serial_number ) ;
disable_interface = 1 ;
}
else {
response [ data_length ] = '\0' ;
if ( g_ascii_strtoull ( response , NULL , 10 ) == 0 ) {
verbose_print ( "VERBOSE: Android hcidump version for %s is unknown\n" , serial_number ) ;
disable_interface = 1 ;
}
else {
verbose_print ( "VERBOSE: Android hcidump version for %s is %s\n" , serial_number , response ) ;
}
}
if ( ! disable_interface ) {
new_interface ( extcap_conf , INTERFACE_ANDROID_BLUETOOTH_HCIDUMP , model_name , serial_number , "Android Bluetooth Hcidump" ) ;
}
}
if ( api_level >= 17 && api_level < 21 ) {
disable_interface = 0 ;
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) continue ;
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_4 ;
}
result = adb_send ( sock , helpful_packet ) ;
if ( result ) {
errmsg_print ( "ERROR: Error while setting adb transport for <%s>" , helpful_packet ) ;
closesocket ( sock ) ;
return EXIT_CODE_GENERIC ;
}
response = adb_send_and_read ( sock , adb_ps_droid_bluetooth , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
closesocket ( sock ) ;
if ( ! response || data_length < 1 ) {
verbose_print ( "WARNING: Error while getting Bluetooth application process id by <%s> " "(%p len=%" G_GSSIZE_FORMAT ")\n" , adb_hcidump_version , ( void * ) response , data_length ) ;
verbose_print ( "VERBOSE: Android Bluetooth application PID for %s is unknown\n" , serial_number ) ;
disable_interface = 1 ;
}
else {
char * data_str ;
char pid [ 16 ] ;
memset ( pid , 0 , sizeof ( pid ) ) ;
response [ data_length ] = '\0' ;
data_str = strchr ( response , '\n' ) ;
if ( data_str && sscanf ( data_str , "%*s %s" , pid ) == 1 ) {
verbose_print ( "VERBOSE: Android Bluetooth application PID for %s is %s\n" , serial_number , pid ) ;
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) return EXIT_CODE_INVALID_SOCKET_1 ;
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_5 ;
}
result = adb_send ( sock , helpful_packet ) ;
if ( result ) {
errmsg_print ( "ERROR: Error while setting adb transport for <%s>" , helpful_packet ) ;
closesocket ( sock ) ;
return EXIT_CODE_GENERIC ;
}
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_check_port_templace , strlen ( adb_check_port_templace ) - 6 + strlen ( pid ) , pid ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_6 ;
}
response = adb_send_and_read ( sock , helpful_packet , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
closesocket ( sock ) ;
if ( ! response ) {
disable_interface = 1 ;
}
else {
response [ data_length ] = '\0' ;
data_str = strchr ( response , '\n' ) ;
if ( data_str && sscanf ( data_str , "%*s %s" , pid ) == 1 && strcmp ( pid + 9 , "10EA" ) == 0 ) {
verbose_print ( "VERBOSE: Bluedroid External Parser Port for %s is %s\n" , serial_number , pid + 9 ) ;
}
else {
disable_interface = 1 ;
verbose_print ( "VERBOSE: Bluedroid External Parser Port for %s is unknown\n" , serial_number ) ;
}
}
}
else {
disable_interface = 1 ;
verbose_print ( "VERBOSE: Android Bluetooth application PID for %s is unknown\n" , serial_number ) ;
}
}
if ( ! disable_interface ) {
new_interface ( extcap_conf , INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER , model_name , serial_number , "Android Bluetooth External Parser" ) ;
}
}
if ( api_level >= 21 ) {
disable_interface = 0 ;
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) continue ;
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_7 ;
}
result = adb_send ( sock , helpful_packet ) ;
if ( result ) {
errmsg_print ( "ERROR: Error while setting adb transport for <%s>" , helpful_packet ) ;
closesocket ( sock ) ;
return EXIT_CODE_GENERIC ;
}
if ( api_level >= 23 ) {
response = adb_send_and_read ( sock , adb_ps_bluetooth_app , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
}
else response = adb_send_and_read ( sock , adb_ps_droid_bluetooth , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
closesocket ( sock ) ;
if ( ! response || data_length < 1 ) {
verbose_print ( "WARNING: Error while getting Bluetooth application process id by <%s> " "(%p len=%" G_GSSIZE_FORMAT ")\n" , adb_hcidump_version , ( void * ) response , data_length ) ;
verbose_print ( "VERBOSE: Android Bluetooth application PID for %s is unknown\n" , serial_number ) ;
disable_interface = 1 ;
}
else {
char * data_str ;
char pid [ 16 ] ;
memset ( pid , 0 , sizeof ( pid ) ) ;
response [ data_length ] = '\0' ;
data_str = strchr ( response , '\n' ) ;
if ( data_str && sscanf ( data_str , "%*s %s" , pid ) == 1 ) {
verbose_print ( "VERBOSE: Android Bluetooth application PID for %s is %s\n" , serial_number , pid ) ;
sock = adb_connect ( adb_server_ip , adb_server_tcp_port ) ;
if ( sock == INVALID_SOCKET ) return EXIT_CODE_INVALID_SOCKET_2 ;
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_transport_serial_templace , 15 + serial_number_length , serial_number ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_8 ;
}
result = adb_send ( sock , helpful_packet ) ;
if ( result ) {
errmsg_print ( "ERROR: Error while setting adb transport for <%s>" , helpful_packet ) ;
closesocket ( sock ) ;
return EXIT_CODE_GENERIC ;
}
result = g_snprintf ( ( char * ) helpful_packet , PACKET_LENGTH , adb_check_port_templace , strlen ( adb_check_port_templace ) - 6 + strlen ( pid ) , pid ) ;
if ( result <= 0 || result > PACKET_LENGTH ) {
errmsg_print ( "ERROR: Error while completing adb packet" ) ;
closesocket ( sock ) ;
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_9 ;
}
response = adb_send_and_read ( sock , helpful_packet , helpful_packet , sizeof ( helpful_packet ) , & data_length ) ;
closesocket ( sock ) ;
if ( ! response ) {
disable_interface = 1 ;
}
else {
response [ data_length ] = '\0' ;
data_str = strchr ( response , '\n' ) ;
if ( data_str && sscanf ( data_str , "%*s %s" , pid ) == 1 && strcmp ( pid + 9 , "22A8" ) == 0 ) {
verbose_print ( "VERBOSE: Btsnoop Net Port for %s is %s\n" , serial_number , pid + 9 ) ;
}
else {
disable_interface = 1 ;
verbose_print ( "VERBOSE: Btsnoop Net Port for %s is unknown\n" , serial_number ) ;
}
}
}
else {
disable_interface = 1 ;
verbose_print ( "VERBOSE: Android Bluetooth application PID for %s is unknown\n" , serial_number ) ;
}
}
if ( ! disable_interface ) {
new_interface ( extcap_conf , INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET , model_name , serial_number , "Android Bluetooth Btsnoop Net" ) ;
}
}
}
return EXIT_CODE_SUCCESS ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dummy ( void ) {
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
IF_DEBUG ( static int main_mallocs = 0 ;
)
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static XHCIEPContext * xhci_alloc_epctx ( XHCIState * xhci , unsigned int slotid , unsigned int epid ) {
XHCIEPContext * epctx ;
epctx = g_new0 ( XHCIEPContext , 1 ) ;
epctx -> xhci = xhci ;
epctx -> slotid = slotid ;
epctx -> epid = epid ;
QTAILQ_INIT ( & epctx -> transfers ) ;
epctx -> kick_timer = timer_new_ns ( QEMU_CLOCK_VIRTUAL , xhci_ep_kick_timer , epctx ) ;
return epctx ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void at1_subband_synthesis ( AT1Ctx * q , AT1SUCtx * su , float * pOut ) {
float temp [ 256 ] ;
float iqmf_temp [ 512 + 46 ] ;
ff_atrac_iqmf ( q -> bands [ 0 ] , q -> bands [ 1 ] , 128 , temp , su -> fst_qmf_delay , iqmf_temp ) ;
memcpy ( su -> last_qmf_delay , & su -> last_qmf_delay [ 256 ] , sizeof ( float ) * 23 ) ;
memcpy ( & su -> last_qmf_delay [ 23 ] , q -> bands [ 2 ] , sizeof ( float ) * 256 ) ;
ff_atrac_iqmf ( temp , su -> last_qmf_delay , 256 , pOut , su -> snd_qmf_delay , iqmf_temp ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static ossl_inline t2 * sk_ ## t1 ## _value ( const STACK_OF ( t1 ) * sk , int idx ) {
return ( t2 * ) OPENSSL_sk_value ( ( const OPENSSL_STACK * ) sk , idx ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _new ( sk_ ## t1 ## _compfunc compare ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_new ( ( OPENSSL_sk_compfunc ) compare ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _new_null ( void ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_new_null ( ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _new_reserve ( sk_ ## t1 ## _compfunc compare , int n ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_new_reserve ( ( OPENSSL_sk_compfunc ) compare , n ) ;
}
static ossl_inline int sk_ ## t1 ## _reserve ( STACK_OF ( t1 ) * sk , int n ) {
return OPENSSL_sk_reserve ( ( OPENSSL_STACK * ) sk , n ) ;
}
static ossl_inline void sk_ ## t1 ## _free ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_free ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline void sk_ ## t1 ## _zero ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_zero ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _delete ( STACK_OF ( t1 ) * sk , int i ) {
return ( t2 * ) OPENSSL_sk_delete ( ( OPENSSL_STACK * ) sk , i ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _delete_ptr ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return ( t2 * ) OPENSSL_sk_delete_ptr ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _push ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_push ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _unshift ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_unshift ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _pop ( STACK_OF ( t1 ) * sk ) {
return ( t2 * ) OPENSSL_sk_pop ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _shift ( STACK_OF ( t1 ) * sk ) {
return ( t2 * ) OPENSSL_sk_shift ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline void sk_ ## t1 ## _pop_free ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _freefunc freefunc ) {
OPENSSL_sk_pop_free ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline int sk_ ## t1 ## _insert ( STACK_OF ( t1 ) * sk , t2 * ptr , int idx ) {
return OPENSSL_sk_insert ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr , idx ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _set ( STACK_OF ( t1 ) * sk , int idx , t2 * ptr ) {
return ( t2 * ) OPENSSL_sk_set ( ( OPENSSL_STACK * ) sk , idx , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find_ex ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find_ex ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) {
return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) {
return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ;
}
# define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ;
typedef const char * OPENSSL_CSTRING ;
DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char ) DEFINE_SPECIAL_STACK_OF_CONST ( OPENSSL_CSTRING , char )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
virLogPriority virLogGetDefaultPriority ( void ) {
return virLogDefaultPriority ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int raw_decode ( AVCodecContext * avctx , void * data , int * got_frame , AVPacket * avpkt ) {
const AVPixFmtDescriptor * desc = av_pix_fmt_desc_get ( avctx -> pix_fmt ) ;
RawVideoContext * context = avctx -> priv_data ;
const uint8_t * buf = avpkt -> data ;
int buf_size = avpkt -> size ;
int res ;
AVFrame * frame = data ;
AVPicture * picture = data ;
frame -> pict_type = avctx -> coded_frame -> pict_type ;
frame -> interlaced_frame = avctx -> coded_frame -> interlaced_frame ;
frame -> top_field_first = avctx -> coded_frame -> top_field_first ;
frame -> reordered_opaque = avctx -> reordered_opaque ;
frame -> pkt_pts = avctx -> pkt -> pts ;
if ( buf_size < context -> length - ( avctx -> pix_fmt == AV_PIX_FMT_PAL8 ? AVPALETTE_SIZE : 0 ) ) return - 1 ;
if ( context -> buffer ) {
int i ;
uint8_t * dst = context -> buffer ;
buf_size = context -> length - AVPALETTE_SIZE ;
if ( avctx -> bits_per_coded_sample == 4 ) {
for ( i = 0 ;
2 * i + 1 < buf_size ;
i ++ ) {
dst [ 2 * i + 0 ] = buf [ i ] >> 4 ;
dst [ 2 * i + 1 ] = buf [ i ] & 15 ;
}
}
else {
for ( i = 0 ;
4 * i + 3 < buf_size ;
i ++ ) {
dst [ 4 * i + 0 ] = buf [ i ] >> 6 ;
dst [ 4 * i + 1 ] = buf [ i ] >> 4 & 3 ;
dst [ 4 * i + 2 ] = buf [ i ] >> 2 & 3 ;
dst [ 4 * i + 3 ] = buf [ i ] & 3 ;
}
}
buf = dst ;
}
if ( avctx -> codec_tag == MKTAG ( 'A' , 'V' , '1' , 'x' ) || avctx -> codec_tag == MKTAG ( 'A' , 'V' , 'u' , 'p' ) ) buf += buf_size - context -> length ;
if ( ( res = avpicture_fill ( picture , buf , avctx -> pix_fmt , avctx -> width , avctx -> height ) ) < 0 ) return res ;
if ( ( avctx -> pix_fmt == AV_PIX_FMT_PAL8 && buf_size < context -> length ) || ( desc -> flags & PIX_FMT_PSEUDOPAL ) ) {
frame -> data [ 1 ] = context -> palette ;
}
if ( avctx -> pix_fmt == AV_PIX_FMT_PAL8 ) {
const uint8_t * pal = av_packet_get_side_data ( avpkt , AV_PKT_DATA_PALETTE , NULL ) ;
if ( pal ) {
memcpy ( frame -> data [ 1 ] , pal , AVPALETTE_SIZE ) ;
frame -> palette_has_changed = 1 ;
}
}
if ( avctx -> pix_fmt == AV_PIX_FMT_BGR24 && ( ( frame -> linesize [ 0 ] + 3 ) & ~ 3 ) * avctx -> height <= buf_size ) frame -> linesize [ 0 ] = ( frame -> linesize [ 0 ] + 3 ) & ~ 3 ;
if ( context -> flip ) flip ( avctx , picture ) ;
if ( avctx -> codec_tag == MKTAG ( 'Y' , 'V' , '1' , '2' ) || avctx -> codec_tag == MKTAG ( 'Y' , 'V' , '1' , '6' ) || avctx -> codec_tag == MKTAG ( 'Y' , 'V' , '2' , '4' ) || avctx -> codec_tag == MKTAG ( 'Y' , 'V' , 'U' , '9' ) ) FFSWAP ( uint8_t * , picture -> data [ 1 ] , picture -> data [ 2 ] ) ;
if ( avctx -> codec_tag == AV_RL32 ( "yuv2" ) && avctx -> pix_fmt == AV_PIX_FMT_YUYV422 ) {
int x , y ;
uint8_t * line = picture -> data [ 0 ] ;
for ( y = 0 ;
y < avctx -> height ;
y ++ ) {
for ( x = 0 ;
x < avctx -> width ;
x ++ ) line [ 2 * x + 1 ] ^= 0x80 ;
line += picture -> linesize [ 0 ] ;
}
}
* got_frame = 1 ;
return buf_size ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int get_aq_c_strength ( int q_index ) {
int base_quant = vp9_ac_quant ( q_index , 0 ) / 4 ;
return ( base_quant > 20 ) + ( base_quant > 45 ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void bug31418_impl ( ) {
MYSQL con ;
my_bool is_null ;
int rc = 0 ;
DIE_UNLESS ( mysql_client_init ( & con ) ) ;
DIE_UNLESS ( mysql_real_connect ( & con , opt_host , opt_user , opt_password , opt_db ? opt_db : "test" , opt_port , opt_unix_socket , CLIENT_FOUND_ROWS ) ) ;
is_null = query_int_variable ( & con , "IS_FREE_LOCK('bug31418')" , & rc ) ;
DIE_UNLESS ( ! is_null && rc ) ;
is_null = query_int_variable ( & con , "IS_USED_LOCK('bug31418')" , & rc ) ;
DIE_UNLESS ( is_null ) ;
query_int_variable ( & con , "GET_LOCK('bug31418', 1)" , & rc ) ;
DIE_UNLESS ( rc ) ;
is_null = query_int_variable ( & con , "IS_FREE_LOCK('bug31418')" , & rc ) ;
DIE_UNLESS ( ! is_null && ! rc ) ;
is_null = query_int_variable ( & con , "IS_USED_LOCK('bug31418')" , & rc ) ;
DIE_UNLESS ( ! is_null && rc ) ;
bug20023_change_user ( & con ) ;
is_null = query_int_variable ( & con , "IS_FREE_LOCK('bug31418')" , & rc ) ;
DIE_UNLESS ( ! is_null && rc ) ;
is_null = query_int_variable ( & con , "IS_USED_LOCK('bug31418')" , & rc ) ;
DIE_UNLESS ( is_null ) ;
mysql_close ( & con ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void fill_decode_caches ( H264Context * h , int mb_type ) {
int topleft_xy , top_xy , topright_xy , left_xy [ LEFT_MBS ] ;
int topleft_type , top_type , topright_type , left_type [ LEFT_MBS ] ;
const uint8_t * left_block = h -> left_block ;
int i ;
uint8_t * nnz ;
uint8_t * nnz_cache ;
topleft_xy = h -> topleft_mb_xy ;
top_xy = h -> top_mb_xy ;
topright_xy = h -> topright_mb_xy ;
left_xy [ LTOP ] = h -> left_mb_xy [ LTOP ] ;
left_xy [ LBOT ] = h -> left_mb_xy [ LBOT ] ;
topleft_type = h -> topleft_type ;
top_type = h -> top_type ;
topright_type = h -> topright_type ;
left_type [ LTOP ] = h -> left_type [ LTOP ] ;
left_type [ LBOT ] = h -> left_type [ LBOT ] ;
if ( ! IS_SKIP ( mb_type ) ) {
if ( IS_INTRA ( mb_type ) ) {
int type_mask = h -> pps . constrained_intra_pred ? IS_INTRA ( - 1 ) : - 1 ;
h -> topleft_samples_available = h -> top_samples_available = h -> left_samples_available = 0xFFFF ;
h -> topright_samples_available = 0xEEEA ;
if ( ! ( top_type & type_mask ) ) {
h -> topleft_samples_available = 0xB3FF ;
h -> top_samples_available = 0x33FF ;
h -> topright_samples_available = 0x26EA ;
}
if ( IS_INTERLACED ( mb_type ) != IS_INTERLACED ( left_type [ LTOP ] ) ) {
if ( IS_INTERLACED ( mb_type ) ) {
if ( ! ( left_type [ LTOP ] & type_mask ) ) {
h -> topleft_samples_available &= 0xDFFF ;
h -> left_samples_available &= 0x5FFF ;
}
if ( ! ( left_type [ LBOT ] & type_mask ) ) {
h -> topleft_samples_available &= 0xFF5F ;
h -> left_samples_available &= 0xFF5F ;
}
}
else {
int left_typei = h -> cur_pic . f . mb_type [ left_xy [ LTOP ] + h -> mb_stride ] ;
assert ( left_xy [ LTOP ] == left_xy [ LBOT ] ) ;
if ( ! ( ( left_typei & type_mask ) && ( left_type [ LTOP ] & type_mask ) ) ) {
h -> topleft_samples_available &= 0xDF5F ;
h -> left_samples_available &= 0x5F5F ;
}
}
}
else {
if ( ! ( left_type [ LTOP ] & type_mask ) ) {
h -> topleft_samples_available &= 0xDF5F ;
h -> left_samples_available &= 0x5F5F ;
}
}
if ( ! ( topleft_type & type_mask ) ) h -> topleft_samples_available &= 0x7FFF ;
if ( ! ( topright_type & type_mask ) ) h -> topright_samples_available &= 0xFBFF ;
if ( IS_INTRA4x4 ( mb_type ) ) {
if ( IS_INTRA4x4 ( top_type ) ) {
AV_COPY32 ( h -> intra4x4_pred_mode_cache + 4 + 8 * 0 , h -> intra4x4_pred_mode + h -> mb2br_xy [ top_xy ] ) ;
}
else {
h -> intra4x4_pred_mode_cache [ 4 + 8 * 0 ] = h -> intra4x4_pred_mode_cache [ 5 + 8 * 0 ] = h -> intra4x4_pred_mode_cache [ 6 + 8 * 0 ] = h -> intra4x4_pred_mode_cache [ 7 + 8 * 0 ] = 2 - 3 * ! ( top_type & type_mask ) ;
}
for ( i = 0 ;
i < 2 ;
i ++ ) {
if ( IS_INTRA4x4 ( left_type [ LEFT ( i ) ] ) ) {
int8_t * mode = h -> intra4x4_pred_mode + h -> mb2br_xy [ left_xy [ LEFT ( i ) ] ] ;
h -> intra4x4_pred_mode_cache [ 3 + 8 * 1 + 2 * 8 * i ] = mode [ 6 - left_block [ 0 + 2 * i ] ] ;
h -> intra4x4_pred_mode_cache [ 3 + 8 * 2 + 2 * 8 * i ] = mode [ 6 - left_block [ 1 + 2 * i ] ] ;
}
else {
h -> intra4x4_pred_mode_cache [ 3 + 8 * 1 + 2 * 8 * i ] = h -> intra4x4_pred_mode_cache [ 3 + 8 * 2 + 2 * 8 * i ] = 2 - 3 * ! ( left_type [ LEFT ( i ) ] & type_mask ) ;
}
}
}
}
nnz_cache = h -> non_zero_count_cache ;
if ( top_type ) {
nnz = h -> non_zero_count [ top_xy ] ;
AV_COPY32 ( & nnz_cache [ 4 + 8 * 0 ] , & nnz [ 4 * 3 ] ) ;
if ( ! h -> chroma_y_shift ) {
AV_COPY32 ( & nnz_cache [ 4 + 8 * 5 ] , & nnz [ 4 * 7 ] ) ;
AV_COPY32 ( & nnz_cache [ 4 + 8 * 10 ] , & nnz [ 4 * 11 ] ) ;
}
else {
AV_COPY32 ( & nnz_cache [ 4 + 8 * 5 ] , & nnz [ 4 * 5 ] ) ;
AV_COPY32 ( & nnz_cache [ 4 + 8 * 10 ] , & nnz [ 4 * 9 ] ) ;
}
}
else {
uint32_t top_empty = CABAC && ! IS_INTRA ( mb_type ) ? 0 : 0x40404040 ;
AV_WN32A ( & nnz_cache [ 4 + 8 * 0 ] , top_empty ) ;
AV_WN32A ( & nnz_cache [ 4 + 8 * 5 ] , top_empty ) ;
AV_WN32A ( & nnz_cache [ 4 + 8 * 10 ] , top_empty ) ;
}
for ( i = 0 ;
i < 2 ;
i ++ ) {
if ( left_type [ LEFT ( i ) ] ) {
nnz = h -> non_zero_count [ left_xy [ LEFT ( i ) ] ] ;
nnz_cache [ 3 + 8 * 1 + 2 * 8 * i ] = nnz [ left_block [ 8 + 0 + 2 * i ] ] ;
nnz_cache [ 3 + 8 * 2 + 2 * 8 * i ] = nnz [ left_block [ 8 + 1 + 2 * i ] ] ;
if ( CHROMA444 ) {
nnz_cache [ 3 + 8 * 6 + 2 * 8 * i ] = nnz [ left_block [ 8 + 0 + 2 * i ] + 4 * 4 ] ;
nnz_cache [ 3 + 8 * 7 + 2 * 8 * i ] = nnz [ left_block [ 8 + 1 + 2 * i ] + 4 * 4 ] ;
nnz_cache [ 3 + 8 * 11 + 2 * 8 * i ] = nnz [ left_block [ 8 + 0 + 2 * i ] + 8 * 4 ] ;
nnz_cache [ 3 + 8 * 12 + 2 * 8 * i ] = nnz [ left_block [ 8 + 1 + 2 * i ] + 8 * 4 ] ;
}
else if ( CHROMA422 ) {
nnz_cache [ 3 + 8 * 6 + 2 * 8 * i ] = nnz [ left_block [ 8 + 0 + 2 * i ] - 2 + 4 * 4 ] ;
nnz_cache [ 3 + 8 * 7 + 2 * 8 * i ] = nnz [ left_block [ 8 + 1 + 2 * i ] - 2 + 4 * 4 ] ;
nnz_cache [ 3 + 8 * 11 + 2 * 8 * i ] = nnz [ left_block [ 8 + 0 + 2 * i ] - 2 + 8 * 4 ] ;
nnz_cache [ 3 + 8 * 12 + 2 * 8 * i ] = nnz [ left_block [ 8 + 1 + 2 * i ] - 2 + 8 * 4 ] ;
}
else {
nnz_cache [ 3 + 8 * 6 + 8 * i ] = nnz [ left_block [ 8 + 4 + 2 * i ] ] ;
nnz_cache [ 3 + 8 * 11 + 8 * i ] = nnz [ left_block [ 8 + 5 + 2 * i ] ] ;
}
}
else {
nnz_cache [ 3 + 8 * 1 + 2 * 8 * i ] = nnz_cache [ 3 + 8 * 2 + 2 * 8 * i ] = nnz_cache [ 3 + 8 * 6 + 2 * 8 * i ] = nnz_cache [ 3 + 8 * 7 + 2 * 8 * i ] = nnz_cache [ 3 + 8 * 11 + 2 * 8 * i ] = nnz_cache [ 3 + 8 * 12 + 2 * 8 * i ] = CABAC && ! IS_INTRA ( mb_type ) ? 0 : 64 ;
}
}
if ( CABAC ) {
if ( top_type ) h -> top_cbp = h -> cbp_table [ top_xy ] ;
else h -> top_cbp = IS_INTRA ( mb_type ) ? 0x7CF : 0x00F ;
if ( left_type [ LTOP ] ) {
h -> left_cbp = ( h -> cbp_table [ left_xy [ LTOP ] ] & 0x7F0 ) | ( ( h -> cbp_table [ left_xy [ LTOP ] ] >> ( left_block [ 0 ] & ( ~ 1 ) ) ) & 2 ) | ( ( ( h -> cbp_table [ left_xy [ LBOT ] ] >> ( left_block [ 2 ] & ( ~ 1 ) ) ) & 2 ) << 2 ) ;
}
else {
h -> left_cbp = IS_INTRA ( mb_type ) ? 0x7CF : 0x00F ;
}
}
}
if ( IS_INTER ( mb_type ) || ( IS_DIRECT ( mb_type ) && h -> direct_spatial_mv_pred ) ) {
int list ;
int b_stride = h -> b_stride ;
for ( list = 0 ;
list < h -> list_count ;
list ++ ) {
int8_t * ref_cache = & h -> ref_cache [ list ] [ scan8 [ 0 ] ] ;
int8_t * ref = h -> cur_pic . f . ref_index [ list ] ;
int16_t ( * mv_cache ) [ 2 ] = & h -> mv_cache [ list ] [ scan8 [ 0 ] ] ;
int16_t ( * mv ) [ 2 ] = h -> cur_pic . f . motion_val [ list ] ;
if ( ! USES_LIST ( mb_type , list ) ) continue ;
assert ( ! ( IS_DIRECT ( mb_type ) && ! h -> direct_spatial_mv_pred ) ) ;
if ( USES_LIST ( top_type , list ) ) {
const int b_xy = h -> mb2b_xy [ top_xy ] + 3 * b_stride ;
AV_COPY128 ( mv_cache [ 0 - 1 * 8 ] , mv [ b_xy + 0 ] ) ;
ref_cache [ 0 - 1 * 8 ] = ref_cache [ 1 - 1 * 8 ] = ref [ 4 * top_xy + 2 ] ;
ref_cache [ 2 - 1 * 8 ] = ref_cache [ 3 - 1 * 8 ] = ref [ 4 * top_xy + 3 ] ;
}
else {
AV_ZERO128 ( mv_cache [ 0 - 1 * 8 ] ) ;
AV_WN32A ( & ref_cache [ 0 - 1 * 8 ] , ( ( top_type ? LIST_NOT_USED : PART_NOT_AVAILABLE ) & 0xFF ) * 0x01010101u ) ;
}
if ( mb_type & ( MB_TYPE_16x8 | MB_TYPE_8x8 ) ) {
for ( i = 0 ;
i < 2 ;
i ++ ) {
int cache_idx = - 1 + i * 2 * 8 ;
if ( USES_LIST ( left_type [ LEFT ( i ) ] , list ) ) {
const int b_xy = h -> mb2b_xy [ left_xy [ LEFT ( i ) ] ] + 3 ;
const int b8_xy = 4 * left_xy [ LEFT ( i ) ] + 1 ;
AV_COPY32 ( mv_cache [ cache_idx ] , mv [ b_xy + b_stride * left_block [ 0 + i * 2 ] ] ) ;
AV_COPY32 ( mv_cache [ cache_idx + 8 ] , mv [ b_xy + b_stride * left_block [ 1 + i * 2 ] ] ) ;
ref_cache [ cache_idx ] = ref [ b8_xy + ( left_block [ 0 + i * 2 ] & ~ 1 ) ] ;
ref_cache [ cache_idx + 8 ] = ref [ b8_xy + ( left_block [ 1 + i * 2 ] & ~ 1 ) ] ;
}
else {
AV_ZERO32 ( mv_cache [ cache_idx ] ) ;
AV_ZERO32 ( mv_cache [ cache_idx + 8 ] ) ;
ref_cache [ cache_idx ] = ref_cache [ cache_idx + 8 ] = ( left_type [ LEFT ( i ) ] ) ? LIST_NOT_USED : PART_NOT_AVAILABLE ;
}
}
}
else {
if ( USES_LIST ( left_type [ LTOP ] , list ) ) {
const int b_xy = h -> mb2b_xy [ left_xy [ LTOP ] ] + 3 ;
const int b8_xy = 4 * left_xy [ LTOP ] + 1 ;
AV_COPY32 ( mv_cache [ - 1 ] , mv [ b_xy + b_stride * left_block [ 0 ] ] ) ;
ref_cache [ - 1 ] = ref [ b8_xy + ( left_block [ 0 ] & ~ 1 ) ] ;
}
else {
AV_ZERO32 ( mv_cache [ - 1 ] ) ;
ref_cache [ - 1 ] = left_type [ LTOP ] ? LIST_NOT_USED : PART_NOT_AVAILABLE ;
}
}
if ( USES_LIST ( topright_type , list ) ) {
const int b_xy = h -> mb2b_xy [ topright_xy ] + 3 * b_stride ;
AV_COPY32 ( mv_cache [ 4 - 1 * 8 ] , mv [ b_xy ] ) ;
ref_cache [ 4 - 1 * 8 ] = ref [ 4 * topright_xy + 2 ] ;
}
else {
AV_ZERO32 ( mv_cache [ 4 - 1 * 8 ] ) ;
ref_cache [ 4 - 1 * 8 ] = topright_type ? LIST_NOT_USED : PART_NOT_AVAILABLE ;
}
if ( ref_cache [ 4 - 1 * 8 ] < 0 ) {
if ( USES_LIST ( topleft_type , list ) ) {
const int b_xy = h -> mb2b_xy [ topleft_xy ] + 3 + b_stride + ( h -> topleft_partition & 2 * b_stride ) ;
const int b8_xy = 4 * topleft_xy + 1 + ( h -> topleft_partition & 2 ) ;
AV_COPY32 ( mv_cache [ - 1 - 1 * 8 ] , mv [ b_xy ] ) ;
ref_cache [ - 1 - 1 * 8 ] = ref [ b8_xy ] ;
}
else {
AV_ZERO32 ( mv_cache [ - 1 - 1 * 8 ] ) ;
ref_cache [ - 1 - 1 * 8 ] = topleft_type ? LIST_NOT_USED : PART_NOT_AVAILABLE ;
}
}
if ( ( mb_type & ( MB_TYPE_SKIP | MB_TYPE_DIRECT2 ) ) && ! FRAME_MBAFF ) continue ;
if ( ! ( mb_type & ( MB_TYPE_SKIP | MB_TYPE_DIRECT2 ) ) ) {
uint8_t ( * mvd_cache ) [ 2 ] = & h -> mvd_cache [ list ] [ scan8 [ 0 ] ] ;
uint8_t ( * mvd ) [ 2 ] = h -> mvd_table [ list ] ;
ref_cache [ 2 + 8 * 0 ] = ref_cache [ 2 + 8 * 2 ] = PART_NOT_AVAILABLE ;
AV_ZERO32 ( mv_cache [ 2 + 8 * 0 ] ) ;
AV_ZERO32 ( mv_cache [ 2 + 8 * 2 ] ) ;
if ( CABAC ) {
if ( USES_LIST ( top_type , list ) ) {
const int b_xy = h -> mb2br_xy [ top_xy ] ;
AV_COPY64 ( mvd_cache [ 0 - 1 * 8 ] , mvd [ b_xy + 0 ] ) ;
}
else {
AV_ZERO64 ( mvd_cache [ 0 - 1 * 8 ] ) ;
}
if ( USES_LIST ( left_type [ LTOP ] , list ) ) {
const int b_xy = h -> mb2br_xy [ left_xy [ LTOP ] ] + 6 ;
AV_COPY16 ( mvd_cache [ - 1 + 0 * 8 ] , mvd [ b_xy - left_block [ 0 ] ] ) ;
AV_COPY16 ( mvd_cache [ - 1 + 1 * 8 ] , mvd [ b_xy - left_block [ 1 ] ] ) ;
}
else {
AV_ZERO16 ( mvd_cache [ - 1 + 0 * 8 ] ) ;
AV_ZERO16 ( mvd_cache [ - 1 + 1 * 8 ] ) ;
}
if ( USES_LIST ( left_type [ LBOT ] , list ) ) {
const int b_xy = h -> mb2br_xy [ left_xy [ LBOT ] ] + 6 ;
AV_COPY16 ( mvd_cache [ - 1 + 2 * 8 ] , mvd [ b_xy - left_block [ 2 ] ] ) ;
AV_COPY16 ( mvd_cache [ - 1 + 3 * 8 ] , mvd [ b_xy - left_block [ 3 ] ] ) ;
}
else {
AV_ZERO16 ( mvd_cache [ - 1 + 2 * 8 ] ) ;
AV_ZERO16 ( mvd_cache [ - 1 + 3 * 8 ] ) ;
}
AV_ZERO16 ( mvd_cache [ 2 + 8 * 0 ] ) ;
AV_ZERO16 ( mvd_cache [ 2 + 8 * 2 ] ) ;
if ( h -> slice_type_nos == AV_PICTURE_TYPE_B ) {
uint8_t * direct_cache = & h -> direct_cache [ scan8 [ 0 ] ] ;
uint8_t * direct_table = h -> direct_table ;
fill_rectangle ( direct_cache , 4 , 4 , 8 , MB_TYPE_16x16 >> 1 , 1 ) ;
if ( IS_DIRECT ( top_type ) ) {
AV_WN32A ( & direct_cache [ - 1 * 8 ] , 0x01010101u * ( MB_TYPE_DIRECT2 >> 1 ) ) ;
}
else if ( IS_8X8 ( top_type ) ) {
int b8_xy = 4 * top_xy ;
direct_cache [ 0 - 1 * 8 ] = direct_table [ b8_xy + 2 ] ;
direct_cache [ 2 - 1 * 8 ] = direct_table [ b8_xy + 3 ] ;
}
else {
AV_WN32A ( & direct_cache [ - 1 * 8 ] , 0x01010101 * ( MB_TYPE_16x16 >> 1 ) ) ;
}
if ( IS_DIRECT ( left_type [ LTOP ] ) ) direct_cache [ - 1 + 0 * 8 ] = MB_TYPE_DIRECT2 >> 1 ;
else if ( IS_8X8 ( left_type [ LTOP ] ) ) direct_cache [ - 1 + 0 * 8 ] = direct_table [ 4 * left_xy [ LTOP ] + 1 + ( left_block [ 0 ] & ~ 1 ) ] ;
else direct_cache [ - 1 + 0 * 8 ] = MB_TYPE_16x16 >> 1 ;
if ( IS_DIRECT ( left_type [ LBOT ] ) ) direct_cache [ - 1 + 2 * 8 ] = MB_TYPE_DIRECT2 >> 1 ;
else if ( IS_8X8 ( left_type [ LBOT ] ) ) direct_cache [ - 1 + 2 * 8 ] = direct_table [ 4 * left_xy [ LBOT ] + 1 + ( left_block [ 2 ] & ~ 1 ) ] ;
else direct_cache [ - 1 + 2 * 8 ] = MB_TYPE_16x16 >> 1 ;
}
}
}
# define MAP_MVS MAP_F2F ( scan8 [ 0 ] - 1 - 1 * 8 , topleft_type ) MAP_F2F ( scan8 [ 0 ] + 0 - 1 * 8 , top_type ) MAP_F2F ( scan8 [ 0 ] + 1 - 1 * 8 , top_type ) MAP_F2F ( scan8 [ 0 ] + 2 - 1 * 8 , top_type ) MAP_F2F ( scan8 [ 0 ] + 3 - 1 * 8 , top_type ) MAP_F2F ( scan8 [ 0 ] + 4 - 1 * 8 , topright_type ) MAP_F2F ( scan8 [ 0 ] - 1 + 0 * 8 , left_type [ LTOP ] ) MAP_F2F ( scan8 [ 0 ] - 1 + 1 * 8 , left_type [ LTOP ] ) MAP_F2F ( scan8 [ 0 ] - 1 + 2 * 8 , left_type [ LBOT ] ) MAP_F2F ( scan8 [ 0 ] - 1 + 3 * 8 , left_type [ LBOT ] ) if ( FRAME_MBAFF ) {
if ( MB_FIELD ) {
# define MAP_F2F ( idx , mb_type ) if ( ! IS_INTERLACED ( mb_type ) && h -> ref_cache [ list ] [ idx ] >= 0 ) {
h -> ref_cache [ list ] [ idx ] <<= 1 ;
h -> mv_cache [ list ] [ idx ] [ 1 ] /= 2 ;
h -> mvd_cache [ list ] [ idx ] [ 1 ] >>= 1 ;
}
MAP_MVS }
else {
# undef MAP_F2F # define MAP_F2F ( idx , mb_type ) if ( IS_INTERLACED ( mb_type ) && h -> ref_cache [ list ] [ idx ] >= 0 ) {
h -> ref_cache [ list ] [ idx ] >>= 1 ;
h -> mv_cache [ list ] [ idx ] [ 1 ] <<= 1 ;
h -> mvd_cache [ list ] [ idx ] [ 1 ] <<= 1 ;
}
MAP_MVS # undef MAP_F2F }
}
}
}
h -> neighbor_transform_size = ! ! IS_8x8DCT ( top_type ) + ! ! IS_8x8DCT ( left_type [ LTOP ] ) ;
}
| 1True
|
Categorize the following code snippet as vulnerable or not. True or False
|
TSReturnCode TSHttpHdrStatusSet ( TSMBuffer bufp , TSMLoc obj , TSHttpStatus status ) {
sdk_assert ( sdk_sanity_check_mbuffer ( bufp ) == TS_SUCCESS ) ;
sdk_assert ( sdk_sanity_check_http_hdr_handle ( obj ) == TS_SUCCESS ) ;
if ( ! isWriteable ( bufp ) ) {
return TS_ERROR ;
}
HTTPHdr h ;
SET_HTTP_HDR ( h , bufp , obj ) ;
ink_assert ( h . m_http -> m_type == HDR_HEAP_OBJ_HTTP_HEADER ) ;
h . status_set ( ( HTTPStatus ) status ) ;
return TS_SUCCESS ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
const char * proto_field_display_to_string ( int field_display ) {
return val_to_str_const ( field_display , hf_display , "Unknown" ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int raw_decode ( char * packet , int len , struct query * q , int dns_fd , int tun_fd ) {
int raw_user ;
if ( len < RAW_HDR_LEN ) return 0 ;
if ( memcmp ( packet , raw_header , RAW_HDR_IDENT_LEN ) ) return 0 ;
raw_user = RAW_HDR_GET_USR ( packet ) ;
switch ( RAW_HDR_GET_CMD ( packet ) ) {
case RAW_HDR_CMD_LOGIN : handle_raw_login ( & packet [ RAW_HDR_LEN ] , len - RAW_HDR_LEN , q , dns_fd , raw_user ) ;
break ;
case RAW_HDR_CMD_DATA : handle_raw_data ( & packet [ RAW_HDR_LEN ] , len - RAW_HDR_LEN , q , dns_fd , tun_fd , raw_user ) ;
break ;
case RAW_HDR_CMD_PING : handle_raw_ping ( q , dns_fd , raw_user ) ;
break ;
default : warnx ( "Unhandled raw command %02X from user %d" , RAW_HDR_GET_CMD ( packet ) , raw_user ) ;
break ;
}
return 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static uint32_t virtio_pci_config_readb ( void * opaque , uint32_t addr ) {
VirtIOPCIProxy * proxy = opaque ;
uint32_t config = VIRTIO_PCI_CONFIG ( & proxy -> pci_dev ) ;
addr -= proxy -> addr ;
if ( addr < config ) return virtio_ioport_read ( proxy , addr ) ;
addr -= config ;
return virtio_config_readb ( proxy -> vdev , addr ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
kadm5_ret_t kadm5_create_policy_internal ( void * server_handle , kadm5_policy_ent_t entry , long mask ) {
kadm5_server_handle_t handle = server_handle ;
osa_policy_ent_rec pent ;
int ret ;
char * p ;
CHECK_HANDLE ( server_handle ) ;
if ( ( entry == ( kadm5_policy_ent_t ) NULL ) || ( entry -> policy == NULL ) ) return EINVAL ;
if ( strlen ( entry -> policy ) == 0 ) return KADM5_BAD_POLICY ;
if ( ! ( mask & KADM5_POLICY ) ) return KADM5_BAD_MASK ;
if ( ( mask & KADM5_POLICY_ALLOWED_KEYSALTS ) && entry -> allowed_keysalts != NULL ) {
ret = validate_allowed_keysalts ( entry -> allowed_keysalts ) ;
if ( ret ) return ret ;
}
memset ( & pent , 0 , sizeof ( pent ) ) ;
pent . name = entry -> policy ;
p = entry -> policy ;
while ( * p != '\0' ) {
if ( * p < ' ' || * p > '~' ) return KADM5_BAD_POLICY ;
else p ++ ;
}
if ( ! ( mask & KADM5_PW_MAX_LIFE ) ) pent . pw_max_life = 0 ;
else pent . pw_max_life = entry -> pw_max_life ;
if ( ! ( mask & KADM5_PW_MIN_LIFE ) ) pent . pw_min_life = 0 ;
else {
if ( ( mask & KADM5_PW_MAX_LIFE ) ) {
if ( entry -> pw_min_life > entry -> pw_max_life && entry -> pw_max_life != 0 ) return KADM5_BAD_MIN_PASS_LIFE ;
}
pent . pw_min_life = entry -> pw_min_life ;
}
if ( ! ( mask & KADM5_PW_MIN_LENGTH ) ) pent . pw_min_length = MIN_PW_LENGTH ;
else {
if ( entry -> pw_min_length < MIN_PW_LENGTH ) return KADM5_BAD_LENGTH ;
pent . pw_min_length = entry -> pw_min_length ;
}
if ( ! ( mask & KADM5_PW_MIN_CLASSES ) ) pent . pw_min_classes = MIN_PW_CLASSES ;
else {
if ( entry -> pw_min_classes > MAX_PW_CLASSES || entry -> pw_min_classes < MIN_PW_CLASSES ) return KADM5_BAD_CLASS ;
pent . pw_min_classes = entry -> pw_min_classes ;
}
if ( ! ( mask & KADM5_PW_HISTORY_NUM ) ) pent . pw_history_num = MIN_PW_HISTORY ;
else {
if ( entry -> pw_history_num < MIN_PW_HISTORY ) return KADM5_BAD_HISTORY ;
else pent . pw_history_num = entry -> pw_history_num ;
}
if ( handle -> api_version >= KADM5_API_VERSION_4 ) {
if ( ! ( mask & KADM5_POLICY_ATTRIBUTES ) ) pent . attributes = 0 ;
else pent . attributes = entry -> attributes ;
if ( ! ( mask & KADM5_POLICY_MAX_LIFE ) ) pent . max_life = 0 ;
else pent . max_life = entry -> max_life ;
if ( ! ( mask & KADM5_POLICY_MAX_RLIFE ) ) pent . max_renewable_life = 0 ;
else pent . max_renewable_life = entry -> max_renewable_life ;
if ( ! ( mask & KADM5_POLICY_ALLOWED_KEYSALTS ) ) pent . allowed_keysalts = 0 ;
else pent . allowed_keysalts = entry -> allowed_keysalts ;
if ( ! ( mask & KADM5_POLICY_TL_DATA ) ) {
pent . n_tl_data = 0 ;
pent . tl_data = NULL ;
}
else {
pent . n_tl_data = entry -> n_tl_data ;
pent . tl_data = entry -> tl_data ;
}
}
if ( handle -> api_version >= KADM5_API_VERSION_3 ) {
if ( ! ( mask & KADM5_PW_MAX_FAILURE ) ) pent . pw_max_fail = 0 ;
else pent . pw_max_fail = entry -> pw_max_fail ;
if ( ! ( mask & KADM5_PW_FAILURE_COUNT_INTERVAL ) ) pent . pw_failcnt_interval = 0 ;
else pent . pw_failcnt_interval = entry -> pw_failcnt_interval ;
if ( ! ( mask & KADM5_PW_LOCKOUT_DURATION ) ) pent . pw_lockout_duration = 0 ;
else pent . pw_lockout_duration = entry -> pw_lockout_duration ;
}
if ( ( ret = krb5_db_create_policy ( handle -> context , & pent ) ) ) return ret ;
else return KADM5_OK ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void h245_setup_channels ( packet_info * pinfo , channel_info_t * upcoming_channel_lcl ) {
rtp_dyn_payload_t * rtp_dyn_payload = NULL ;
struct srtp_info * dummy_srtp_info = NULL ;
if ( ! upcoming_channel_lcl ) return ;
if ( ! strcmp ( upcoming_channel_lcl -> data_type_str , "t38fax" ) ) {
if ( upcoming_channel_lcl -> media_addr . addr . type != AT_NONE && upcoming_channel_lcl -> media_addr . port != 0 ) {
t38_add_address ( pinfo , & upcoming_channel_lcl -> media_addr . addr , upcoming_channel_lcl -> media_addr . port , 0 , "H245" , pinfo -> fd -> num ) ;
}
return ;
}
if ( upcoming_channel_lcl -> rfc2198 > 0 ) {
rtp_dyn_payload = rtp_dyn_payload_new ( ) ;
rtp_dyn_payload_insert ( rtp_dyn_payload , upcoming_channel_lcl -> rfc2198 , "red" , 8000 ) ;
}
if ( upcoming_channel_lcl -> srtp_flag ) {
dummy_srtp_info = wmem_new0 ( wmem_file_scope ( ) , struct srtp_info ) ;
}
if ( upcoming_channel_lcl -> media_addr . addr . type != AT_NONE && upcoming_channel_lcl -> media_addr . port != 0 ) {
srtp_add_address ( pinfo , & upcoming_channel_lcl -> media_addr . addr , upcoming_channel_lcl -> media_addr . port , 0 , "H245" , pinfo -> fd -> num , upcoming_channel_lcl -> is_video , rtp_dyn_payload , dummy_srtp_info ) ;
}
if ( upcoming_channel_lcl -> media_control_addr . addr . type != AT_NONE && upcoming_channel_lcl -> media_control_addr . port != 0 && rtcp_handle ) {
srtcp_add_address ( pinfo , & upcoming_channel_lcl -> media_control_addr . addr , upcoming_channel_lcl -> media_control_addr . port , 0 , "H245" , pinfo -> fd -> num , dummy_srtp_info ) ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
int kvm_device_pci_assign ( KVMState * s , PCIHostDeviceAddress * dev_addr , uint32_t flags , uint32_t * dev_id ) {
struct kvm_assigned_pci_dev dev_data = {
. segnr = dev_addr -> domain , . busnr = dev_addr -> bus , . devfn = PCI_DEVFN ( dev_addr -> slot , dev_addr -> function ) , . flags = flags , }
;
int ret ;
dev_data . assigned_dev_id = ( dev_addr -> domain << 16 ) | ( dev_addr -> bus << 8 ) | dev_data . devfn ;
ret = kvm_vm_ioctl ( s , KVM_ASSIGN_PCI_DEVICE , & dev_data ) ;
if ( ret < 0 ) {
return ret ;
}
* dev_id = dev_data . assigned_dev_id ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
mbfl_string * mbfl_mime_header_decode ( mbfl_string * string , mbfl_string * result , enum mbfl_no_encoding outcode ) {
int n ;
unsigned char * p ;
struct mime_header_decoder_data * pd ;
mbfl_string_init ( result ) ;
result -> no_language = string -> no_language ;
result -> no_encoding = outcode ;
pd = mime_header_decoder_new ( outcode ) ;
if ( pd == NULL ) {
return NULL ;
}
n = string -> len ;
p = string -> val ;
while ( n > 0 ) {
mime_header_decoder_collector ( * p ++ , pd ) ;
n -- ;
}
result = mime_header_decoder_result ( pd , result ) ;
mime_header_decoder_delete ( pd ) ;
return result ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
REGRESSION_TEST ( SDK_API_TSMgmtGet ) ( RegressionTest * test , int , int * pstatus ) {
const char * CONFIG_PARAM_COUNTER_NAME = "proxy.process.ssl.total_tickets_renewed" ;
int CONFIG_PARAM_COUNTER_VALUE = 0 ;
const char * CONFIG_PARAM_FLOAT_NAME = "proxy.config.http.background_fill_completed_threshold" ;
float CONFIG_PARAM_FLOAT_VALUE = 0.0 ;
const char * CONFIG_PARAM_INT_NAME = "proxy.config.http.cache.http" ;
int CONFIG_PARAM_INT_VALUE = 1 ;
const char * CONFIG_PARAM_STRING_NAME = "proxy.config.product_name" ;
const char * CONFIG_PARAM_STRING_VALUE = "Traffic Server" ;
* pstatus = REGRESSION_TEST_INPROGRESS ;
int err = 0 ;
TSMgmtCounter cvalue = 0 ;
TSMgmtFloat fvalue = 0.0 ;
TSMgmtInt ivalue = - 1 ;
TSMgmtString svalue = nullptr ;
if ( TS_SUCCESS != TSMgmtCounterGet ( CONFIG_PARAM_COUNTER_NAME , & cvalue ) ) {
SDK_RPRINT ( test , "TSMgmtCounterGet" , "TestCase1.1" , TC_FAIL , "can not get value of param %s" , CONFIG_PARAM_COUNTER_NAME ) ;
err = 1 ;
}
else if ( cvalue != CONFIG_PARAM_COUNTER_VALUE ) {
SDK_RPRINT ( test , "TSMgmtCounterGet" , "TestCase1.1" , TC_FAIL , "got incorrect value of param %s, should have been %d, found %d" , CONFIG_PARAM_COUNTER_NAME , CONFIG_PARAM_COUNTER_VALUE , cvalue ) ;
err = 1 ;
}
else {
SDK_RPRINT ( test , "TSMgmtCounterGet" , "TestCase1.1" , TC_PASS , "ok" ) ;
}
if ( ( TS_SUCCESS != TSMgmtFloatGet ( CONFIG_PARAM_FLOAT_NAME , & fvalue ) ) || ( fvalue != CONFIG_PARAM_FLOAT_VALUE ) ) {
SDK_RPRINT ( test , "TSMgmtFloatGet" , "TestCase2" , TC_FAIL , "can not get value of param %s" , CONFIG_PARAM_FLOAT_NAME ) ;
err = 1 ;
}
else {
SDK_RPRINT ( test , "TSMgmtFloatGet" , "TestCase1.2" , TC_PASS , "ok" ) ;
}
if ( ( TSMgmtIntGet ( CONFIG_PARAM_INT_NAME , & ivalue ) != TS_SUCCESS ) || ( ivalue != CONFIG_PARAM_INT_VALUE ) ) {
SDK_RPRINT ( test , "TSMgmtIntGet" , "TestCase1.3" , TC_FAIL , "can not get value of param %s" , CONFIG_PARAM_INT_NAME ) ;
err = 1 ;
}
else {
SDK_RPRINT ( test , "TSMgmtIntGet" , "TestCase1.3" , TC_PASS , "ok" ) ;
}
if ( TS_SUCCESS != TSMgmtStringGet ( CONFIG_PARAM_STRING_NAME , & svalue ) ) {
SDK_RPRINT ( test , "TSMgmtStringGet" , "TestCase1.4" , TC_FAIL , "can not get value of param %s" , CONFIG_PARAM_STRING_NAME ) ;
err = 1 ;
}
else if ( strcmp ( svalue , CONFIG_PARAM_STRING_VALUE ) != 0 ) {
SDK_RPRINT ( test , "TSMgmtStringGet" , "TestCase1.4" , TC_FAIL , R "(got incorrect value of param %s, should have been " % s ", found " % s ")" , CONFIG_PARAM_STRING_NAME , CONFIG_PARAM_STRING_VALUE , svalue ) ;
err = 1 ;
}
else {
SDK_RPRINT ( test , "TSMgmtStringGet" , "TestCase1.4" , TC_PASS , "ok" ) ;
}
if ( err ) {
* pstatus = REGRESSION_TEST_FAILED ;
return ;
}
* pstatus = REGRESSION_TEST_PASSED ;
SDK_RPRINT ( test , "TSMgmtGet" , "TestCase1" , TC_PASS , "ok" ) ;
return ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int mxpeg_decode_app ( MXpegDecodeContext * s , const uint8_t * buf_ptr , int buf_size ) {
int len ;
if ( buf_size < 2 ) return 0 ;
len = AV_RB16 ( buf_ptr ) ;
skip_bits ( & s -> jpg . gb , 8 * FFMIN ( len , buf_size ) ) ;
return 0 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void remove_tap_listener_isup_calls ( void ) {
remove_tap_listener ( & ( the_tapinfo_struct . isup_dummy ) ) ;
have_isup_tap_listener = FALSE ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static const char * qemuAgentStringifyErrorClass ( const char * klass ) {
if ( STREQ_NULLABLE ( klass , "BufferOverrun" ) ) return "Buffer overrun" ;
else if ( STREQ_NULLABLE ( klass , "CommandDisabled" ) ) return "The command has been disabled for this instance" ;
else if ( STREQ_NULLABLE ( klass , "CommandNotFound" ) ) return "The command has not been found" ;
else if ( STREQ_NULLABLE ( klass , "FdNotFound" ) ) return "File descriptor not found" ;
else if ( STREQ_NULLABLE ( klass , "InvalidParameter" ) ) return "Invalid parameter" ;
else if ( STREQ_NULLABLE ( klass , "InvalidParameterType" ) ) return "Invalid parameter type" ;
else if ( STREQ_NULLABLE ( klass , "InvalidParameterValue" ) ) return "Invalid parameter value" ;
else if ( STREQ_NULLABLE ( klass , "OpenFileFailed" ) ) return "Cannot open file" ;
else if ( STREQ_NULLABLE ( klass , "QgaCommandFailed" ) ) return "Guest agent command failed" ;
else if ( STREQ_NULLABLE ( klass , "QMPBadInputObjectMember" ) ) return "Bad QMP input object member" ;
else if ( STREQ_NULLABLE ( klass , "QMPExtraInputObjectMember" ) ) return "Unexpected extra object member" ;
else if ( STREQ_NULLABLE ( klass , "UndefinedError" ) ) return "An undefined error has occurred" ;
else if ( STREQ_NULLABLE ( klass , "Unsupported" ) ) return "this feature or command is not currently supported" ;
else if ( klass ) return klass ;
else return "unknown QEMU command error" ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dnslabel_table_add ( struct dnslabel_table * table , const char * label , off_t pos ) {
char * v ;
int p ;
if ( table -> n_labels == MAX_LABELS ) return ( - 1 ) ;
v = strdup ( label ) ;
if ( v == NULL ) return ( - 1 ) ;
p = table -> n_labels ++ ;
table -> labels [ p ] . v = v ;
table -> labels [ p ] . pos = pos ;
return ( 0 ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static Datum ExecEvalAnd ( BoolExprState * andExpr , ExprContext * econtext , bool * isNull , ExprDoneCond * isDone ) {
List * clauses = andExpr -> args ;
ListCell * clause ;
bool AnyNull ;
if ( isDone ) * isDone = ExprSingleResult ;
AnyNull = false ;
foreach ( clause , clauses ) {
ExprState * clausestate = ( ExprState * ) lfirst ( clause ) ;
Datum clause_value ;
clause_value = ExecEvalExpr ( clausestate , econtext , isNull , NULL ) ;
if ( * isNull ) AnyNull = true ;
else if ( ! DatumGetBool ( clause_value ) ) return clause_value ;
}
* isNull = AnyNull ;
return BoolGetDatum ( ! AnyNull ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
void vp9_update_layer_context_change_config ( VP9_COMP * const cpi , const int target_bandwidth ) {
SVC * const svc = & cpi -> svc ;
const VP9EncoderConfig * const oxcf = & cpi -> oxcf ;
const RATE_CONTROL * const rc = & cpi -> rc ;
int layer ;
int layer_end ;
float bitrate_alloc = 1.0 ;
if ( svc -> number_temporal_layers > 1 && cpi -> oxcf . rc_mode == VPX_CBR ) {
layer_end = svc -> number_temporal_layers ;
}
else {
layer_end = svc -> number_spatial_layers ;
}
for ( layer = 0 ;
layer < layer_end ;
++ layer ) {
LAYER_CONTEXT * const lc = & svc -> layer_context [ layer ] ;
RATE_CONTROL * const lrc = & lc -> rc ;
if ( svc -> number_temporal_layers > 1 && cpi -> oxcf . rc_mode == VPX_CBR ) {
lc -> target_bandwidth = oxcf -> ts_target_bitrate [ layer ] ;
}
else {
lc -> target_bandwidth = oxcf -> ss_target_bitrate [ layer ] ;
}
bitrate_alloc = ( float ) lc -> target_bandwidth / target_bandwidth ;
lrc -> starting_buffer_level = ( int64_t ) ( rc -> starting_buffer_level * bitrate_alloc ) ;
lrc -> optimal_buffer_level = ( int64_t ) ( rc -> optimal_buffer_level * bitrate_alloc ) ;
lrc -> maximum_buffer_size = ( int64_t ) ( rc -> maximum_buffer_size * bitrate_alloc ) ;
lrc -> bits_off_target = MIN ( lrc -> bits_off_target , lrc -> maximum_buffer_size ) ;
lrc -> buffer_level = MIN ( lrc -> buffer_level , lrc -> maximum_buffer_size ) ;
if ( svc -> number_temporal_layers > 1 && cpi -> oxcf . rc_mode == VPX_CBR ) {
lc -> framerate = cpi -> framerate / oxcf -> ts_rate_decimator [ layer ] ;
}
else {
lc -> framerate = cpi -> framerate ;
}
lrc -> avg_frame_bandwidth = ( int ) ( lc -> target_bandwidth / lc -> framerate ) ;
lrc -> max_frame_bandwidth = rc -> max_frame_bandwidth ;
lrc -> worst_quality = rc -> worst_quality ;
lrc -> best_quality = rc -> best_quality ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void dtap_tp_epc_test_loop_mode_c_mbms_packet_counter_response ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len ) {
guint32 curr_offset ;
guint32 consumed ;
guint curr_len ;
curr_len = len ;
curr_offset = offset ;
ELEM_MAND_V ( GSM_A_PDU_TYPE_DTAP , DE_TP_EPC_MBMS_PACKET_COUNTER_VALUE , NULL ) ;
EXTRANEOUS_DATA_CHECK ( curr_len , 0 , pinfo , & ei_gsm_a_dtap_extraneous_data ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void timelib_eat_spaces ( char * * ptr ) {
while ( * * ptr == ' ' || * * ptr == '\t' ) {
++ * ptr ;
}
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void nvic_sysreg_write ( void * opaque , hwaddr addr , uint64_t value , unsigned size ) {
nvic_state * s = ( nvic_state * ) opaque ;
uint32_t offset = addr ;
int i ;
switch ( offset ) {
case 0xd18 ... 0xd23 : for ( i = 0 ;
i < size ;
i ++ ) {
s -> gic . priority1 [ ( offset - 0xd14 ) + i ] [ 0 ] = ( value >> ( i * 8 ) ) & 0xff ;
}
gic_update ( & s -> gic ) ;
return ;
}
if ( size == 4 ) {
nvic_writel ( s , offset , value ) ;
return ;
}
qemu_log_mask ( LOG_GUEST_ERROR , "NVIC: Bad write of size %d at offset 0x%x\n" , size , offset ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
bool parsePGArray ( const char * atext , char * * * itemarray , int * nitems ) {
int inputlen ;
char * * items ;
char * strings ;
int curitem ;
* itemarray = NULL ;
* nitems = 0 ;
inputlen = strlen ( atext ) ;
if ( inputlen < 2 || atext [ 0 ] != '{
' || atext [ inputlen - 1 ] != '}
' ) return false ;
items = ( char * * ) malloc ( inputlen * ( sizeof ( char * ) + sizeof ( char ) ) ) ;
if ( items == NULL ) return false ;
* itemarray = items ;
strings = ( char * ) ( items + inputlen ) ;
atext ++ ;
curitem = 0 ;
while ( * atext != '}
' ) {
if ( * atext == '\0' ) return false ;
items [ curitem ] = strings ;
while ( * atext != '}
' && * atext != ',' ) {
if ( * atext == '\0' ) return false ;
if ( * atext != '"' ) * strings ++ = * atext ++ ;
else {
atext ++ ;
while ( * atext != '"' ) {
if ( * atext == '\0' ) return false ;
if ( * atext == '\\' ) {
atext ++ ;
if ( * atext == '\0' ) return false ;
}
* strings ++ = * atext ++ ;
}
atext ++ ;
}
}
* strings ++ = '\0' ;
if ( * atext == ',' ) atext ++ ;
curitem ++ ;
}
if ( atext [ 1 ] != '\0' ) return false ;
* nitems = curitem ;
return true ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int dissect_pvfs2_rmdirent_request ( tvbuff_t * tvb , proto_tree * tree , int offset , packet_info * pinfo ) {
offset = dissect_pvfs_string ( tvb , tree , hf_pvfs_path , offset , NULL ) ;
offset = dissect_pvfs_fh ( tvb , offset , pinfo , tree , "handle" , NULL ) ;
offset = dissect_pvfs_fs_id ( tvb , tree , offset ) ;
offset += 4 ;
offset = dissect_pvfs_time ( tvb , tree , offset , hf_pvfs_atime , hf_pvfs_atime_sec , hf_pvfs_atime_nsec ) ;
offset = dissect_pvfs_time ( tvb , tree , offset , hf_pvfs_mtime , hf_pvfs_mtime_sec , hf_pvfs_mtime_nsec ) ;
offset = dissect_pvfs_time ( tvb , tree , offset , hf_pvfs_ctime , hf_pvfs_ctime_sec , hf_pvfs_ctime_nsec ) ;
return offset ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static uint32_t PPC_io_readb ( target_phys_addr_t addr ) {
uint32_t ret = cpu_inb ( NULL , addr - PPC_IO_BASE ) ;
# if 0 if ( ( addr < 0x800003F0 || addr > 0x80000400 ) && ( addr < 0x80000074 || addr > 0x80000077 ) && ( addr < 0x80000020 || addr > 0x80000021 ) && ( addr < 0x800000a0 || addr > 0x800000a1 ) && ( addr < 0x800001f0 || addr > 0x800001f7 ) && ( addr < 0x80000170 || addr > 0x80000177 ) && ( addr < 0x8000060 || addr > 0x8000064 ) ) # endif {
PPC_IO_DPRINTF ( "0x%08x <= 0x%02x\n" , addr - PPC_IO_BASE , ret ) ;
}
return ret ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
char * xmlrpc_normalizeBuffer ( const char * buf ) {
char * newbuf ;
int i , len , j = 0 ;
len = strlen ( buf ) ;
newbuf = ( char * ) smalloc ( sizeof ( char ) * len + 1 ) ;
for ( i = 0 ;
i < len ;
i ++ ) {
switch ( buf [ i ] ) {
case 1 : break ;
case 2 : break ;
case 3 : if ( isdigit ( ( unsigned char ) buf [ i + 1 ] ) ) {
i ++ ;
if ( isdigit ( ( unsigned char ) buf [ i + 1 ] ) ) {
i ++ ;
}
if ( buf [ i + 1 ] == ',' ) {
i ++ ;
if ( isdigit ( ( unsigned char ) buf [ i + 1 ] ) ) {
i ++ ;
}
if ( isdigit ( ( unsigned char ) buf [ i + 1 ] ) ) {
i ++ ;
}
}
}
break ;
case 9 : break ;
case 10 : break ;
case 13 : break ;
case 22 : break ;
case 31 : break ;
default : if ( buf [ i ] > 31 ) {
newbuf [ j ] = buf [ i ] ;
j ++ ;
}
}
}
newbuf [ j ] = 0 ;
return ( newbuf ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int address_is_correct ( struct nameserver * ns , struct sockaddr * sa , socklen_t slen ) {
struct sockaddr_in * sin = ( struct sockaddr_in * ) sa ;
if ( sa -> sa_family != AF_INET || slen != sizeof ( struct sockaddr_in ) ) return 0 ;
if ( sin -> sin_addr . s_addr != ns -> address ) return 0 ;
return 1 ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void allocate_gf_group_bits ( VP9_COMP * cpi , int64_t gf_group_bits , double group_error , int gf_arf_bits ) {
RATE_CONTROL * const rc = & cpi -> rc ;
const VP9EncoderConfig * const oxcf = & cpi -> oxcf ;
TWO_PASS * const twopass = & cpi -> twopass ;
GF_GROUP * const gf_group = & twopass -> gf_group ;
FIRSTPASS_STATS frame_stats ;
int i ;
int frame_index = 1 ;
int target_frame_size ;
int key_frame ;
const int max_bits = frame_max_bits ( & cpi -> rc , & cpi -> oxcf ) ;
int64_t total_group_bits = gf_group_bits ;
double modified_err = 0.0 ;
double err_fraction ;
int mid_boost_bits = 0 ;
int mid_frame_idx ;
unsigned char arf_buffer_indices [ MAX_ACTIVE_ARFS ] ;
int alt_frame_index = frame_index ;
int has_temporal_layers = is_two_pass_svc ( cpi ) && cpi -> svc . number_temporal_layers > 1 ;
if ( has_temporal_layers ) alt_frame_index = cpi -> svc . number_temporal_layers ;
key_frame = cpi -> common . frame_type == KEY_FRAME || vp9_is_upper_layer_key_frame ( cpi ) ;
get_arf_buffer_indices ( arf_buffer_indices ) ;
if ( ! key_frame ) {
if ( rc -> source_alt_ref_active ) {
gf_group -> update_type [ 0 ] = OVERLAY_UPDATE ;
gf_group -> rf_level [ 0 ] = INTER_NORMAL ;
gf_group -> bit_allocation [ 0 ] = 0 ;
gf_group -> arf_update_idx [ 0 ] = arf_buffer_indices [ 0 ] ;
gf_group -> arf_ref_idx [ 0 ] = arf_buffer_indices [ 0 ] ;
}
else {
gf_group -> update_type [ 0 ] = GF_UPDATE ;
gf_group -> rf_level [ 0 ] = GF_ARF_STD ;
gf_group -> bit_allocation [ 0 ] = gf_arf_bits ;
gf_group -> arf_update_idx [ 0 ] = arf_buffer_indices [ 0 ] ;
gf_group -> arf_ref_idx [ 0 ] = arf_buffer_indices [ 0 ] ;
}
if ( EOF == input_stats ( twopass , & frame_stats ) ) return ;
}
if ( rc -> source_alt_ref_pending || ! key_frame ) total_group_bits -= gf_arf_bits ;
if ( rc -> source_alt_ref_pending ) {
gf_group -> update_type [ alt_frame_index ] = ARF_UPDATE ;
gf_group -> rf_level [ alt_frame_index ] = GF_ARF_STD ;
gf_group -> bit_allocation [ alt_frame_index ] = gf_arf_bits ;
if ( has_temporal_layers ) gf_group -> arf_src_offset [ alt_frame_index ] = ( unsigned char ) ( rc -> baseline_gf_interval - cpi -> svc . number_temporal_layers ) ;
else gf_group -> arf_src_offset [ alt_frame_index ] = ( unsigned char ) ( rc -> baseline_gf_interval - 1 ) ;
gf_group -> arf_update_idx [ alt_frame_index ] = arf_buffer_indices [ 0 ] ;
gf_group -> arf_ref_idx [ alt_frame_index ] = arf_buffer_indices [ cpi -> multi_arf_last_grp_enabled && rc -> source_alt_ref_active ] ;
if ( ! has_temporal_layers ) ++ frame_index ;
if ( cpi -> multi_arf_enabled ) {
gf_group -> update_type [ frame_index ] = ARF_UPDATE ;
gf_group -> rf_level [ frame_index ] = GF_ARF_LOW ;
gf_group -> arf_src_offset [ frame_index ] = ( unsigned char ) ( ( rc -> baseline_gf_interval >> 1 ) - 1 ) ;
gf_group -> arf_update_idx [ frame_index ] = arf_buffer_indices [ 1 ] ;
gf_group -> arf_ref_idx [ frame_index ] = arf_buffer_indices [ 0 ] ;
++ frame_index ;
}
}
mid_frame_idx = frame_index + ( rc -> baseline_gf_interval >> 1 ) - 1 ;
for ( i = 0 ;
i < rc -> baseline_gf_interval - 1 ;
++ i ) {
int arf_idx = 0 ;
if ( EOF == input_stats ( twopass , & frame_stats ) ) break ;
if ( has_temporal_layers && frame_index == alt_frame_index ) {
++ frame_index ;
}
modified_err = calculate_modified_err ( twopass , oxcf , & frame_stats ) ;
if ( group_error > 0 ) err_fraction = modified_err / DOUBLE_DIVIDE_CHECK ( group_error ) ;
else err_fraction = 0.0 ;
target_frame_size = ( int ) ( ( double ) total_group_bits * err_fraction ) ;
if ( rc -> source_alt_ref_pending && cpi -> multi_arf_enabled ) {
mid_boost_bits += ( target_frame_size >> 4 ) ;
target_frame_size -= ( target_frame_size >> 4 ) ;
if ( frame_index <= mid_frame_idx ) arf_idx = 1 ;
}
gf_group -> arf_update_idx [ frame_index ] = arf_buffer_indices [ arf_idx ] ;
gf_group -> arf_ref_idx [ frame_index ] = arf_buffer_indices [ arf_idx ] ;
target_frame_size = clamp ( target_frame_size , 0 , MIN ( max_bits , ( int ) total_group_bits ) ) ;
gf_group -> update_type [ frame_index ] = LF_UPDATE ;
gf_group -> rf_level [ frame_index ] = INTER_NORMAL ;
gf_group -> bit_allocation [ frame_index ] = target_frame_size ;
++ frame_index ;
}
gf_group -> arf_update_idx [ frame_index ] = arf_buffer_indices [ 0 ] ;
gf_group -> arf_ref_idx [ frame_index ] = arf_buffer_indices [ 0 ] ;
if ( rc -> source_alt_ref_pending ) {
gf_group -> update_type [ frame_index ] = OVERLAY_UPDATE ;
gf_group -> rf_level [ frame_index ] = INTER_NORMAL ;
if ( cpi -> multi_arf_enabled ) {
gf_group -> bit_allocation [ 2 ] = gf_group -> bit_allocation [ mid_frame_idx ] + mid_boost_bits ;
gf_group -> update_type [ mid_frame_idx ] = OVERLAY_UPDATE ;
gf_group -> bit_allocation [ mid_frame_idx ] = 0 ;
}
}
else {
gf_group -> update_type [ frame_index ] = GF_UPDATE ;
gf_group -> rf_level [ frame_index ] = GF_ARF_STD ;
}
cpi -> multi_arf_last_grp_enabled = cpi -> multi_arf_enabled ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static int decode_frame ( AVCodecContext * avctx , void * data , int * got_frame , AVPacket * avpkt ) {
const uint8_t * buf = avpkt -> data ;
int buf_size = avpkt -> size ;
VmncContext * const c = avctx -> priv_data ;
uint8_t * outptr ;
const uint8_t * src = buf ;
int dx , dy , w , h , depth , enc , chunks , res , size_left , ret ;
if ( ( ret = ff_reget_buffer ( avctx , & c -> pic ) ) < 0 ) {
av_log ( avctx , AV_LOG_ERROR , "reget_buffer() failed\n" ) ;
return ret ;
}
c -> pic . key_frame = 0 ;
c -> pic . pict_type = AV_PICTURE_TYPE_P ;
if ( c -> screendta ) {
int i ;
w = c -> cur_w ;
if ( c -> width < c -> cur_x + w ) w = c -> width - c -> cur_x ;
h = c -> cur_h ;
if ( c -> height < c -> cur_y + h ) h = c -> height - c -> cur_y ;
dx = c -> cur_x ;
if ( dx < 0 ) {
w += dx ;
dx = 0 ;
}
dy = c -> cur_y ;
if ( dy < 0 ) {
h += dy ;
dy = 0 ;
}
if ( ( w > 0 ) && ( h > 0 ) ) {
outptr = c -> pic . data [ 0 ] + dx * c -> bpp2 + dy * c -> pic . linesize [ 0 ] ;
for ( i = 0 ;
i < h ;
i ++ ) {
memcpy ( outptr , c -> screendta + i * c -> cur_w * c -> bpp2 , w * c -> bpp2 ) ;
outptr += c -> pic . linesize [ 0 ] ;
}
}
}
src += 2 ;
chunks = AV_RB16 ( src ) ;
src += 2 ;
while ( chunks -- ) {
dx = AV_RB16 ( src ) ;
src += 2 ;
dy = AV_RB16 ( src ) ;
src += 2 ;
w = AV_RB16 ( src ) ;
src += 2 ;
h = AV_RB16 ( src ) ;
src += 2 ;
enc = AV_RB32 ( src ) ;
src += 4 ;
outptr = c -> pic . data [ 0 ] + dx * c -> bpp2 + dy * c -> pic . linesize [ 0 ] ;
size_left = buf_size - ( src - buf ) ;
switch ( enc ) {
case MAGIC_WMVd : if ( size_left < 2 + w * h * c -> bpp2 * 2 ) {
av_log ( avctx , AV_LOG_ERROR , "Premature end of data! (need %i got %i)\n" , 2 + w * h * c -> bpp2 * 2 , size_left ) ;
return - 1 ;
}
src += 2 ;
c -> cur_w = w ;
c -> cur_h = h ;
c -> cur_hx = dx ;
c -> cur_hy = dy ;
if ( ( c -> cur_hx > c -> cur_w ) || ( c -> cur_hy > c -> cur_h ) ) {
av_log ( avctx , AV_LOG_ERROR , "Cursor hot spot is not in image: %ix%i of %ix%i cursor size\n" , c -> cur_hx , c -> cur_hy , c -> cur_w , c -> cur_h ) ;
c -> cur_hx = c -> cur_hy = 0 ;
}
c -> curbits = av_realloc ( c -> curbits , c -> cur_w * c -> cur_h * c -> bpp2 ) ;
c -> curmask = av_realloc ( c -> curmask , c -> cur_w * c -> cur_h * c -> bpp2 ) ;
c -> screendta = av_realloc ( c -> screendta , c -> cur_w * c -> cur_h * c -> bpp2 ) ;
load_cursor ( c , src ) ;
src += w * h * c -> bpp2 * 2 ;
break ;
case MAGIC_WMVe : src += 2 ;
break ;
case MAGIC_WMVf : c -> cur_x = dx - c -> cur_hx ;
c -> cur_y = dy - c -> cur_hy ;
break ;
case MAGIC_WMVg : src += 10 ;
break ;
case MAGIC_WMVh : src += 4 ;
break ;
case MAGIC_WMVi : c -> pic . key_frame = 1 ;
c -> pic . pict_type = AV_PICTURE_TYPE_I ;
depth = * src ++ ;
if ( depth != c -> bpp ) {
av_log ( avctx , AV_LOG_INFO , "Depth mismatch. Container %i bpp, Frame data: %i bpp\n" , c -> bpp , depth ) ;
}
src ++ ;
c -> bigendian = * src ++ ;
if ( c -> bigendian & ( ~ 1 ) ) {
av_log ( avctx , AV_LOG_INFO , "Invalid header: bigendian flag = %i\n" , c -> bigendian ) ;
return - 1 ;
}
src += 13 ;
break ;
case MAGIC_WMVj : src += 2 ;
break ;
case 0x00000000 : if ( ( dx + w > c -> width ) || ( dy + h > c -> height ) ) {
av_log ( avctx , AV_LOG_ERROR , "Incorrect frame size: %ix%i+%ix%i of %ix%i\n" , w , h , dx , dy , c -> width , c -> height ) ;
return - 1 ;
}
if ( size_left < w * h * c -> bpp2 ) {
av_log ( avctx , AV_LOG_ERROR , "Premature end of data! (need %i got %i)\n" , w * h * c -> bpp2 , size_left ) ;
return - 1 ;
}
paint_raw ( outptr , w , h , src , c -> bpp2 , c -> bigendian , c -> pic . linesize [ 0 ] ) ;
src += w * h * c -> bpp2 ;
break ;
case 0x00000005 : if ( ( dx + w > c -> width ) || ( dy + h > c -> height ) ) {
av_log ( avctx , AV_LOG_ERROR , "Incorrect frame size: %ix%i+%ix%i of %ix%i\n" , w , h , dx , dy , c -> width , c -> height ) ;
return - 1 ;
}
res = decode_hextile ( c , outptr , src , size_left , w , h , c -> pic . linesize [ 0 ] ) ;
if ( res < 0 ) return - 1 ;
src += res ;
break ;
default : av_log ( avctx , AV_LOG_ERROR , "Unsupported block type 0x%08X\n" , enc ) ;
chunks = 0 ;
}
}
if ( c -> screendta ) {
int i ;
w = c -> cur_w ;
if ( c -> width < c -> cur_x + w ) w = c -> width - c -> cur_x ;
h = c -> cur_h ;
if ( c -> height < c -> cur_y + h ) h = c -> height - c -> cur_y ;
dx = c -> cur_x ;
if ( dx < 0 ) {
w += dx ;
dx = 0 ;
}
dy = c -> cur_y ;
if ( dy < 0 ) {
h += dy ;
dy = 0 ;
}
if ( ( w > 0 ) && ( h > 0 ) ) {
outptr = c -> pic . data [ 0 ] + dx * c -> bpp2 + dy * c -> pic . linesize [ 0 ] ;
for ( i = 0 ;
i < h ;
i ++ ) {
memcpy ( c -> screendta + i * c -> cur_w * c -> bpp2 , outptr , w * c -> bpp2 ) ;
outptr += c -> pic . linesize [ 0 ] ;
}
outptr = c -> pic . data [ 0 ] ;
put_cursor ( outptr , c -> pic . linesize [ 0 ] , c , c -> cur_x , c -> cur_y ) ;
}
}
* got_frame = 1 ;
if ( ( ret = av_frame_ref ( data , & c -> pic ) ) < 0 ) return ret ;
return buf_size ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
unsigned int vp9_sub_pixel_avg_variance ## W ## x ## H ## _c ( const uint8_t * src , int src_stride , int xoffset , int yoffset , const uint8_t * dst , int dst_stride , unsigned int * sse , const uint8_t * second_pred ) {
uint16_t fdata3 [ ( H + 1 ) * W ] ;
uint8_t temp2 [ H * W ] ;
DECLARE_ALIGNED_ARRAY ( 16 , uint8_t , temp3 , H * W ) ;
var_filter_block2d_bil_first_pass ( src , fdata3 , src_stride , 1 , H + 1 , W , BILINEAR_FILTERS_2TAP ( xoffset ) ) ;
var_filter_block2d_bil_second_pass ( fdata3 , temp2 , W , W , H , W , BILINEAR_FILTERS_2TAP ( yoffset ) ) ;
vp9_comp_avg_pred ( temp3 , second_pred , W , H , temp2 , W ) ;
return vp9_variance ## W ## x ## H ## _c ( temp3 , W , dst , dst_stride , sse ) ;
\ }
void vp9_get16x16var_c ( const uint8_t * src_ptr , int source_stride , const uint8_t * ref_ptr , int ref_stride , unsigned int * sse , int * sum ) {
variance ( src_ptr , source_stride , ref_ptr , ref_stride , 16 , 16 , sse , sum ) ;
}
void vp9_get8x8var_c ( const uint8_t * src_ptr , int source_stride , const uint8_t * ref_ptr , int ref_stride , unsigned int * sse , int * sum ) {
variance ( src_ptr , source_stride , ref_ptr , ref_stride , 8 , 8 , sse , sum ) ;
}
unsigned int vp9_mse16x16_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 16 , 16 , sse , & sum ) ;
return * sse ;
}
unsigned int vp9_mse16x8_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 16 , 8 , sse , & sum ) ;
return * sse ;
}
unsigned int vp9_mse8x16_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 8 , 16 , sse , & sum ) ;
return * sse ;
}
unsigned int vp9_mse8x8_c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sse ) {
int sum ;
variance ( src , src_stride , ref , ref_stride , 8 , 8 , sse , & sum ) ;
return * sse ;
}
VAR ( 4 , 4 ) SUBPIX_VAR ( 4 , 4 ) SUBPIX_AVG_VAR ( 4 , 4 )
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void e1000e_rss_parse_packet ( E1000ECore * core , struct NetRxPkt * pkt , E1000E_RSSInfo * info ) {
trace_e1000e_rx_rss_started ( ) ;
if ( ! e1000e_rss_enabled ( core ) ) {
info -> enabled = false ;
info -> hash = 0 ;
info -> queue = 0 ;
info -> type = 0 ;
trace_e1000e_rx_rss_disabled ( ) ;
return ;
}
info -> enabled = true ;
info -> type = e1000e_rss_get_hash_type ( core , pkt ) ;
trace_e1000e_rx_rss_type ( info -> type ) ;
if ( info -> type == E1000_MRQ_RSS_TYPE_NONE ) {
info -> hash = 0 ;
info -> queue = 0 ;
return ;
}
info -> hash = e1000e_rss_calc_hash ( core , pkt , info ) ;
info -> queue = E1000_RSS_QUEUE ( & core -> mac [ RETA ] , info -> hash ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static __inline__ unsigned int dccp_packet_hdr_len ( const __u8 type ) {
if ( type == DCCP_PKT_DATA ) return 0 ;
if ( type == DCCP_PKT_DATAACK || type == DCCP_PKT_ACK || type == DCCP_PKT_SYNC || type == DCCP_PKT_SYNCACK || type == DCCP_PKT_CLOSE || type == DCCP_PKT_CLOSEREQ ) return sizeof ( struct dccp_hdr_ack_bits ) ;
if ( type == DCCP_PKT_REQUEST ) return sizeof ( struct dccp_hdr_request ) ;
if ( type == DCCP_PKT_RESPONSE ) return sizeof ( struct dccp_hdr_response ) ;
return sizeof ( struct dccp_hdr_reset ) ;
}
| 0False
|
Categorize the following code snippet as vulnerable or not. True or False
|
static void gx_ttfMemory__free ( ttfMemory * self , void * p , const char * cname ) {
gs_memory_t * mem = ( ( gx_ttfMemory * ) self ) -> memory ;
gs_free_object ( mem , p , cname ) ;
}
| 0False
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.