instruction
stringclasses
1 value
input
stringlengths
31
235k
output
class label
2 classes
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_INTEGER_0_1073741823 ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_constrained_integer ( tvb , offset , actx , tree , hf_index , 0U , 1073741823U , NULL , FALSE ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void set_good_speed_feature ( VP9_COMP * cpi , VP9_COMMON * cm , SPEED_FEATURES * sf , int speed ) { const int boosted = frame_is_boosted ( cpi ) ; sf -> adaptive_rd_thresh = 1 ; sf -> allow_skip_recode = 1 ; if ( speed >= 1 ) { sf -> use_square_partition_only = ! frame_is_intra_only ( cm ) ; sf -> less_rectangular_check = 1 ; if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> disable_split_mask = cm -> show_frame ? DISABLE_ALL_SPLIT : DISABLE_ALL_INTER_SPLIT ; else sf -> disable_split_mask = DISABLE_COMPOUND_SPLIT ; sf -> use_rd_breakout = 1 ; sf -> adaptive_motion_search = 1 ; sf -> mv . auto_mv_step_size = 1 ; sf -> adaptive_rd_thresh = 2 ; sf -> mv . subpel_iters_per_step = 1 ; sf -> mode_skip_start = 10 ; sf -> adaptive_pred_interp_filter = 1 ; sf -> recode_loop = ALLOW_RECODE_KFARFGF ; sf -> intra_y_mode_mask [ TX_32X32 ] = INTRA_DC_H_V ; sf -> intra_uv_mode_mask [ TX_32X32 ] = INTRA_DC_H_V ; sf -> intra_y_mode_mask [ TX_16X16 ] = INTRA_DC_H_V ; sf -> intra_uv_mode_mask [ TX_16X16 ] = INTRA_DC_H_V ; sf -> tx_size_search_breakout = 1 ; if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 23 ) ; else sf -> partition_search_breakout_dist_thr = ( 1 << 21 ) ; sf -> partition_search_breakout_rate_thr = 500 ; } if ( speed >= 2 ) { sf -> tx_size_search_method = frame_is_boosted ( cpi ) ? USE_FULL_RD : USE_LARGESTALL ; if ( MIN ( cm -> width , cm -> height ) >= 720 ) { sf -> disable_split_mask = cm -> show_frame ? DISABLE_ALL_SPLIT : DISABLE_ALL_INTER_SPLIT ; sf -> adaptive_pred_interp_filter = 0 ; } else { sf -> disable_split_mask = LAST_AND_INTRA_SPLIT_ONLY ; } sf -> reference_masking = 1 ; sf -> mode_search_skip_flags = FLAG_SKIP_INTRA_DIRMISMATCH | FLAG_SKIP_INTRA_BESTINTER | FLAG_SKIP_COMP_BESTINTRA | FLAG_SKIP_INTRA_LOWVAR ; sf -> disable_filter_search_var_thresh = 100 ; sf -> comp_inter_joint_search_thresh = BLOCK_SIZES ; sf -> auto_min_max_partition_size = CONSTRAIN_NEIGHBORING_MIN_MAX ; if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 24 ) ; else sf -> partition_search_breakout_dist_thr = ( 1 << 22 ) ; sf -> partition_search_breakout_rate_thr = 700 ; } if ( speed >= 3 ) { sf -> tx_size_search_method = frame_is_intra_only ( cm ) ? USE_FULL_RD : USE_LARGESTALL ; if ( MIN ( cm -> width , cm -> height ) >= 720 ) { sf -> disable_split_mask = DISABLE_ALL_SPLIT ; sf -> schedule_mode_search = cm -> base_qindex < 220 ? 1 : 0 ; } else { sf -> max_intra_bsize = BLOCK_32X32 ; sf -> disable_split_mask = DISABLE_ALL_INTER_SPLIT ; sf -> schedule_mode_search = cm -> base_qindex < 175 ? 1 : 0 ; } sf -> adaptive_pred_interp_filter = 0 ; sf -> adaptive_mode_search = 1 ; sf -> cb_partition_search = ! boosted ; sf -> cb_pred_filter_search = 1 ; sf -> alt_ref_search_fp = 1 ; sf -> motion_field_mode_search = ! boosted ; sf -> recode_loop = ALLOW_RECODE_KFMAXBW ; sf -> adaptive_rd_thresh = 3 ; sf -> mode_skip_start = 6 ; sf -> intra_y_mode_mask [ TX_32X32 ] = INTRA_DC ; sf -> intra_uv_mode_mask [ TX_32X32 ] = INTRA_DC ; sf -> adaptive_interp_filter_search = 1 ; if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 25 ) ; else sf -> partition_search_breakout_dist_thr = ( 1 << 23 ) ; sf -> partition_search_breakout_rate_thr = 1000 ; } if ( speed >= 4 ) { sf -> use_square_partition_only = 1 ; sf -> tx_size_search_method = USE_LARGESTALL ; sf -> disable_split_mask = DISABLE_ALL_SPLIT ; sf -> mv . search_method = BIGDIA ; sf -> mv . subpel_search_method = SUBPEL_TREE_PRUNED ; sf -> adaptive_rd_thresh = 4 ; sf -> mode_search_skip_flags |= FLAG_EARLY_TERMINATE ; sf -> disable_filter_search_var_thresh = 200 ; sf -> use_lp32x32fdct = 1 ; sf -> use_fast_coef_updates = ONE_LOOP_REDUCED ; sf -> use_fast_coef_costing = 1 ; if ( MIN ( cm -> width , cm -> height ) >= 720 ) sf -> partition_search_breakout_dist_thr = ( 1 << 26 ) ; else sf -> partition_search_breakout_dist_thr = ( 1 << 24 ) ; sf -> partition_search_breakout_rate_thr = 1500 ; } if ( speed >= 5 ) { int i ; sf -> partition_search_type = FIXED_PARTITION ; sf -> optimize_coefficients = 0 ; sf -> mv . search_method = HEX ; sf -> disable_filter_search_var_thresh = 500 ; for ( i = 0 ; i < TX_SIZES ; ++ i ) { sf -> intra_y_mode_mask [ i ] = INTRA_DC ; sf -> intra_uv_mode_mask [ i ] = INTRA_DC ; } cpi -> allow_encode_breakout = ENCODE_BREAKOUT_ENABLED ; } if ( speed >= 6 ) { sf -> mv . reduce_first_step_size = 1 ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void message ( BIO * out , char * m ) { fprintf ( stderr , "test %s\n" , m ) ; BIO_puts ( out , "print \"test " ) ; BIO_puts ( out , m ) ; BIO_puts ( out , "\\n\"\n" ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( NativeBackendLibsecretTest , PSLUpdatingStrictUpdateLogin ) { CheckPSLUpdate ( UPDATE_BY_UPDATELOGIN ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void rate_block ( int plane , int block , BLOCK_SIZE plane_bsize , TX_SIZE tx_size , struct rdcost_block_args * args ) { int x_idx , y_idx ; txfrm_block_to_raster_xy ( plane_bsize , tx_size , block , & x_idx , & y_idx ) ; args -> rate = cost_coeffs ( args -> x , plane , block , args -> t_above + x_idx , args -> t_left + y_idx , tx_size , args -> so -> scan , args -> so -> neighbors , args -> use_fast_coef_costing ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void * cgfs_init ( const char * name ) { struct cgfs_data * d ; d = malloc ( sizeof ( * d ) ) ; if ( ! d ) return NULL ; memset ( d , 0 , sizeof ( * d ) ) ; d -> name = strdup ( name ) ; if ( ! d -> name ) goto err1 ; d -> cgroup_pattern = lxc_global_config_value ( "lxc.cgroup.pattern" ) ; d -> meta = lxc_cgroup_load_meta ( ) ; if ( ! d -> meta ) { ERROR ( "cgroupfs failed to detect cgroup metadata" ) ; goto err2 ; } return d ; err2 : free ( d -> name ) ; err1 : free ( d ) ; return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int rebuild_existing_bitmaps ( struct packing_data * mapping , khash_sha1 * reused_bitmaps , int show_progress ) { uint32_t i , num_objects ; uint32_t * reposition ; struct bitmap * rebuild ; struct stored_bitmap * stored ; struct progress * progress = NULL ; khiter_t hash_pos ; int hash_ret ; if ( prepare_bitmap_git ( ) < 0 ) return - 1 ; num_objects = bitmap_git . pack -> num_objects ; reposition = xcalloc ( num_objects , sizeof ( uint32_t ) ) ; for ( i = 0 ; i < num_objects ; ++ i ) { const unsigned char * sha1 ; struct revindex_entry * entry ; struct object_entry * oe ; entry = & bitmap_git . pack -> revindex [ i ] ; sha1 = nth_packed_object_sha1 ( bitmap_git . pack , entry -> nr ) ; oe = packlist_find ( mapping , sha1 , NULL ) ; if ( oe ) reposition [ i ] = oe -> in_pack_pos + 1 ; } rebuild = bitmap_new ( ) ; i = 0 ; if ( show_progress ) progress = start_progress ( "Reusing bitmaps" , 0 ) ; kh_foreach_value ( bitmap_git . bitmaps , stored , { if ( stored -> flags & BITMAP_FLAG_REUSE ) { if ( ! rebuild_bitmap ( reposition , lookup_stored_bitmap ( stored ) , rebuild ) ) { hash_pos = kh_put_sha1 ( reused_bitmaps , stored -> sha1 , & hash_ret ) ; kh_value ( reused_bitmaps , hash_pos ) = bitmap_to_ewah ( rebuild ) ; } bitmap_reset ( rebuild ) ; display_progress ( progress , ++ i ) ; } } ) ; stop_progress ( & progress ) ; free ( reposition ) ; bitmap_free ( rebuild ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TSReturnCode TSMBufferDestroy ( TSMBuffer bufp ) { if ( ! isWriteable ( bufp ) ) { return TS_ERROR ; } sdk_assert ( sdk_sanity_check_mbuffer ( bufp ) == TS_SUCCESS ) ; HdrHeapSDKHandle * sdk_heap = ( HdrHeapSDKHandle * ) bufp ; sdk_heap -> m_heap -> destroy ( ) ; delete sdk_heap ; return TS_SUCCESS ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int test_stdout_behavior ( xd3_stream * stream , int ignore ) { int ret ; char buf [ TESTBUFSIZE ] ; test_setup ( ) ; snprintf_func ( buf , TESTBUFSIZE , "cp /devull %s" , TEST_TARGET_FILE ) ; if ( ( ret = do_cmd ( stream , buf ) ) ) { return ret ; } snprintf_func ( buf , TESTBUFSIZE , "%s -e %s %s" , program_name , TEST_TARGET_FILE , TEST_DELTA_FILE ) ; if ( ( ret = do_cmd ( stream , buf ) ) ) { return ret ; } snprintf_func ( buf , TESTBUFSIZE , "%s -e -c %s > %s" , program_name , TEST_TARGET_FILE , TEST_DELTA_FILE ) ; if ( ( ret = do_cmd ( stream , buf ) ) ) { return ret ; } snprintf_func ( buf , TESTBUFSIZE , "%s -q -d %s " , program_name , TEST_DELTA_FILE ) ; if ( ( ret = do_fail ( stream , buf ) ) ) { return ret ; } snprintf_func ( buf , TESTBUFSIZE , "%s -d -c %s > /devull" , program_name , TEST_DELTA_FILE ) ; if ( ( ret = do_cmd ( stream , buf ) ) ) { return ret ; } test_cleanup ( ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static ossl_inline t2 * sk_ ## t1 ## _shift ( STACK_OF ( t1 ) * sk ) { return ( t2 * ) OPENSSL_sk_shift ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline void sk_ ## t1 ## _pop_free ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _freefunc freefunc ) { OPENSSL_sk_pop_free ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_freefunc ) freefunc ) ; } static ossl_inline int sk_ ## t1 ## _insert ( STACK_OF ( t1 ) * sk , t2 * ptr , int idx ) { return OPENSSL_sk_insert ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr , idx ) ; } static ossl_inline t2 * sk_ ## t1 ## _set ( STACK_OF ( t1 ) * sk , int idx , t2 * ptr ) { return ( t2 * ) OPENSSL_sk_set ( ( OPENSSL_STACK * ) sk , idx , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _find ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_find ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _find_ex ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_find_ex ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) { OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) { return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ; } static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) { return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ; } # define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ; typedef const char * OPENSSL_CSTRING ; DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char ) DEFINE_SPECIAL_STACK_OF_CONST ( OPENSSL_CSTRING , char ) typedef void * OPENSSL_BLOCK ; DEFINE_SPECIAL_STACK_OF ( OPENSSL_BLOCK , void )
1True
Categorize the following code snippet as vulnerable or not. True or False
static void fail ( const char * format , ... ) { va_list arg_ptr ; fflush ( stdout ) ; fprintf ( stderr , "%s: " , PGM ) ; if ( wherestr ) fprintf ( stderr , "%s: " , wherestr ) ; va_start ( arg_ptr , format ) ; vfprintf ( stderr , format , arg_ptr ) ; va_end ( arg_ptr ) ; error_count ++ ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static byte * i_alloc_string_immovable ( gs_memory_t * mem , uint nbytes , client_name_t cname ) { gs_ref_memory_t * const imem = ( gs_ref_memory_t * ) mem ; byte * str ; uint asize ; clump_t * cp ; nbytes += HDR_ID_OFFSET ; # ifdef MEMENTO if ( Memento_failThisEvent ( ) ) return NULL ; # endif asize = string_clump_space ( nbytes ) + sizeof ( clump_head_t ) ; cp = alloc_acquire_clump ( imem , ( ulong ) asize , true , "large string clump" ) ; if ( cp == 0 ) return 0 ; cp -> c_alone = true ; str = cp -> ctop = cp -> climit - nbytes ; if_debug4m ( 'a' , mem , "[a%d|+>L]%s(%u) = 0x%lx\n" , alloc_trace_space ( imem ) , client_name_string ( cname ) , nbytes , ( ulong ) str ) ; gs_alloc_fill ( str , gs_alloc_fill_alloc , nbytes ) ; str += HDR_ID_OFFSET ; ASSIGN_HDR_ID ( str ) ; return str ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_q931_tpkt_pdu ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree , void * data _U_ ) { dissect_q931_pdu ( tvb , pinfo , tree , TRUE ) ; return tvb_captured_length ( tvb ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_mswsp_smb2 ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree , void * data ) { smb2_info_t * si = ( smb2_info_t * ) data ; gboolean in ; char * fid_name = NULL ; guint32 open_frame = 0 , close_frame = 0 ; if ( ! si ) { return 0 ; } if ( si -> saved ) { dcerpc_fetch_polhnd_data ( & si -> saved -> policy_hnd , & fid_name , NULL , & open_frame , & close_frame , pinfo -> num ) ; } if ( ! fid_name || strcmp ( fid_name , "File: MsFteWds" ) != 0 ) { return 0 ; } in = ! ( si -> flags & SMB2_FLAGS_RESPONSE ) ; p_add_proto_data ( wmem_file_scope ( ) , pinfo , proto_mswsp , 0 , ( void * ) & SMB2 ) ; return dissect_mswsp ( tvb , pinfo , tree , in , data ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_shm_shmat ( struct shmid_kernel * shp , char __user * shmaddr , int shmflg ) { u32 perms ; if ( shmflg & SHM_RDONLY ) perms = SHM__READ ; else perms = SHM__READ | SHM__WRITE ; return ipc_has_perm ( & shp -> shm_perm , perms ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void evhttp_write_buffer ( struct evhttp_connection * evcon , void ( * cb ) ( struct evhttp_connection * , void * ) , void * arg ) { event_debug ( ( "%s: preparing to write buffer\n" , __func__ ) ) ; evcon -> cb = cb ; evcon -> cb_arg = arg ; if ( event_pending ( & evcon -> ev , EV_WRITE | EV_TIMEOUT , NULL ) ) event_del ( & evcon -> ev ) ; event_set ( & evcon -> ev , evcon -> fd , EV_WRITE , evhttp_write , evcon ) ; EVHTTP_BASE_SET ( evcon , & evcon -> ev ) ; evhttp_add_event ( & evcon -> ev , evcon -> timeout , HTTP_WRITE_TIMEOUT ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static qcelp_packet_rate determine_bitrate ( AVCodecContext * avctx , const int buf_size , const uint8_t * * buf ) { qcelp_packet_rate bitrate ; if ( ( bitrate = buf_size2bitrate ( buf_size ) ) >= 0 ) { if ( bitrate > * * buf ) { QCELPContext * q = avctx -> priv_data ; if ( ! q -> warned_buf_mismatch_bitrate ) { av_log ( avctx , AV_LOG_WARNING , "Claimed bitrate and buffer size mismatch.\n" ) ; q -> warned_buf_mismatch_bitrate = 1 ; } bitrate = * * buf ; } else if ( bitrate < * * buf ) { av_log ( avctx , AV_LOG_ERROR , "Buffer is too small for the claimed bitrate.\n" ) ; return I_F_Q ; } ( * buf ) ++ ; } else if ( ( bitrate = buf_size2bitrate ( buf_size + 1 ) ) >= 0 ) { av_log ( avctx , AV_LOG_WARNING , "Bitrate byte is missing, guessing the bitrate from packet size.\n" ) ; } else return I_F_Q ; if ( bitrate == SILENCE ) { av_log_ask_for_sample ( avctx , "'Blank frame handling is experimental." ) ; } return bitrate ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int pfkey_sockaddr_size ( sa_family_t family ) { return PFKEY_ALIGN8 ( pfkey_sockaddr_len ( family ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void flat_print_str ( WriterContext * wctx , const char * key , const char * value ) { FlatContext * flat = wctx -> priv ; AVBPrint buf ; printf ( "%s" , wctx -> section_pbuf [ wctx -> level ] . str ) ; av_bprint_init ( & buf , 1 , AV_BPRINT_SIZE_UNLIMITED ) ; printf ( "%s=" , flat_escape_key_str ( & buf , key , flat -> sep ) ) ; av_bprint_clear ( & buf ) ; printf ( "\"%s\"\n" , flat_escape_value_str ( & buf , value ) ) ; av_bprint_finalize ( & buf , NULL ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int mpeg4_decode_profile_level ( MpegEncContext * s , GetBitContext * gb ) { int profile_and_level_indication ; profile_and_level_indication = get_bits ( gb , 8 ) ; s -> avctx -> profile = ( profile_and_level_indication & 0xf0 ) >> 4 ; s -> avctx -> level = ( profile_and_level_indication & 0x0f ) ; if ( s -> avctx -> profile == 0 && s -> avctx -> level == 8 ) { s -> avctx -> level = 0 ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int at1_unpack_dequant ( GetBitContext * gb , AT1SUCtx * su , float spec [ AT1_SU_SAMPLES ] ) { int bits_used , band_num , bfu_num , i ; uint8_t idwls [ AT1_MAX_BFU ] ; uint8_t idsfs [ AT1_MAX_BFU ] ; su -> num_bfus = bfu_amount_tab1 [ get_bits ( gb , 3 ) ] ; bits_used = su -> num_bfus * 10 + 32 + bfu_amount_tab2 [ get_bits ( gb , 2 ) ] + ( bfu_amount_tab3 [ get_bits ( gb , 3 ) ] << 1 ) ; for ( i = 0 ; i < su -> num_bfus ; i ++ ) idwls [ i ] = get_bits ( gb , 4 ) ; for ( i = 0 ; i < su -> num_bfus ; i ++ ) idsfs [ i ] = get_bits ( gb , 6 ) ; for ( i = su -> num_bfus ; i < AT1_MAX_BFU ; i ++ ) idwls [ i ] = idsfs [ i ] = 0 ; for ( band_num = 0 ; band_num < AT1_QMF_BANDS ; band_num ++ ) { for ( bfu_num = bfu_bands_t [ band_num ] ; bfu_num < bfu_bands_t [ band_num + 1 ] ; bfu_num ++ ) { int pos ; int num_specs = specs_per_bfu [ bfu_num ] ; int word_len = ! ! idwls [ bfu_num ] + idwls [ bfu_num ] ; float scale_factor = ff_atrac_sf_table [ idsfs [ bfu_num ] ] ; bits_used += word_len * num_specs ; if ( bits_used > AT1_SU_MAX_BITS ) return AVERROR_INVALIDDATA ; pos = su -> log2_block_count [ band_num ] ? bfu_start_short [ bfu_num ] : bfu_start_long [ bfu_num ] ; if ( word_len ) { float max_quant = 1.0 / ( float ) ( ( 1 << ( word_len - 1 ) ) - 1 ) ; for ( i = 0 ; i < num_specs ; i ++ ) { spec [ pos + i ] = get_sbits ( gb , word_len ) * scale_factor * max_quant ; } } else { memset ( & spec [ pos ] , 0 , num_specs * sizeof ( float ) ) ; } } } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
xmlChar * xsltAttrTemplateValueProcessNode ( xsltTransformContextPtr ctxt , const xmlChar * str , xmlNodePtr inst ) { xmlChar * ret = NULL ; const xmlChar * cur ; xmlChar * expr , * val ; xmlNsPtr * nsList = NULL ; int nsNr = 0 ; if ( str == NULL ) return ( NULL ) ; if ( * str == 0 ) return ( xmlStrndup ( ( xmlChar * ) "" , 0 ) ) ; cur = str ; while ( * cur != 0 ) { if ( * cur == '{ ' ) { if ( * ( cur + 1 ) == '{ ' ) { cur ++ ; ret = xmlStrncat ( ret , str , cur - str ) ; cur ++ ; str = cur ; continue ; } ret = xmlStrncat ( ret , str , cur - str ) ; str = cur ; cur ++ ; while ( ( * cur != 0 ) && ( * cur != '} ' ) ) { if ( ( * cur == '\'' ) || ( * cur == '"' ) ) { char delim = * ( cur ++ ) ; while ( ( * cur != 0 ) && ( * cur != delim ) ) cur ++ ; if ( * cur != 0 ) cur ++ ; } else cur ++ ; } if ( * cur == 0 ) { xsltTransformError ( ctxt , NULL , inst , "xsltAttrTemplateValueProcessNode: unmatched '{ '\n" ) ; ret = xmlStrncat ( ret , str , cur - str ) ; return ( ret ) ; } str ++ ; expr = xmlStrndup ( str , cur - str ) ; if ( expr == NULL ) return ( ret ) ; else if ( * expr == '{ ' ) { ret = xmlStrcat ( ret , expr ) ; xmlFree ( expr ) ; } else { xmlXPathCompExprPtr comp ; if ( ( nsList == NULL ) && ( inst != NULL ) ) { int i = 0 ; nsList = xmlGetNsList ( inst -> doc , inst ) ; if ( nsList != NULL ) { while ( nsList [ i ] != NULL ) i ++ ; nsNr = i ; } } comp = xmlXPathCompile ( expr ) ; val = xsltEvalXPathStringNs ( ctxt , comp , nsNr , nsList ) ; xmlXPathFreeCompExpr ( comp ) ; xmlFree ( expr ) ; if ( val != NULL ) { ret = xmlStrcat ( ret , val ) ; xmlFree ( val ) ; } } cur ++ ; str = cur ; } else if ( * cur == '} ' ) { cur ++ ; if ( * cur == '} ' ) { ret = xmlStrncat ( ret , str , cur - str ) ; cur ++ ; str = cur ; continue ; } else { xsltTransformError ( ctxt , NULL , inst , "xsltAttrTemplateValueProcessNode: unmatched '} '\n" ) ; } } else cur ++ ; } if ( cur != str ) { ret = xmlStrncat ( ret , str , cur - str ) ; } if ( nsList != NULL ) xmlFree ( nsList ) ; return ( ret ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int nsv_read_chunk ( AVFormatContext * s , int fill_header ) { NSVContext * nsv = s -> priv_data ; AVIOContext * pb = s -> pb ; AVStream * st [ 2 ] = { NULL , NULL } ; NSVStream * nst ; AVPacket * pkt ; int i , err = 0 ; uint8_t auxcount ; uint32_t vsize ; uint16_t asize ; uint16_t auxsize ; int ret ; if ( nsv -> ahead [ 0 ] . data || nsv -> ahead [ 1 ] . data ) return 0 ; null_chunk_retry : if ( avio_feof ( pb ) ) return - 1 ; for ( i = 0 ; i < NSV_MAX_RESYNC_TRIES && nsv -> state < NSV_FOUND_NSVS && ! err ; i ++ ) err = nsv_resync ( s ) ; if ( err < 0 ) return err ; if ( nsv -> state == NSV_FOUND_NSVS ) err = nsv_parse_NSVs_header ( s ) ; if ( err < 0 ) return err ; if ( nsv -> state != NSV_HAS_READ_NSVS && nsv -> state != NSV_FOUND_BEEF ) return - 1 ; auxcount = avio_r8 ( pb ) ; vsize = avio_rl16 ( pb ) ; asize = avio_rl16 ( pb ) ; vsize = ( vsize << 4 ) | ( auxcount >> 4 ) ; auxcount &= 0x0f ; av_log ( s , AV_LOG_TRACE , "NSV CHUNK %d aux, %" PRIu32 " bytes video, %d bytes audio\n" , auxcount , vsize , asize ) ; for ( i = 0 ; i < auxcount ; i ++ ) { uint32_t av_unused auxtag ; auxsize = avio_rl16 ( pb ) ; auxtag = avio_rl32 ( pb ) ; avio_skip ( pb , auxsize ) ; vsize -= auxsize + sizeof ( uint16_t ) + sizeof ( uint32_t ) ; } if ( avio_feof ( pb ) ) return - 1 ; if ( ! vsize && ! asize ) { nsv -> state = NSV_UNSYNC ; goto null_chunk_retry ; } if ( s -> nb_streams > 0 ) st [ s -> streams [ 0 ] -> id ] = s -> streams [ 0 ] ; if ( s -> nb_streams > 1 ) st [ s -> streams [ 1 ] -> id ] = s -> streams [ 1 ] ; if ( vsize && st [ NSV_ST_VIDEO ] ) { nst = st [ NSV_ST_VIDEO ] -> priv_data ; pkt = & nsv -> ahead [ NSV_ST_VIDEO ] ; if ( ( ret = av_get_packet ( pb , pkt , vsize ) ) < 0 ) return ret ; pkt -> stream_index = st [ NSV_ST_VIDEO ] -> index ; pkt -> dts = nst -> frame_offset ; pkt -> flags |= nsv -> state == NSV_HAS_READ_NSVS ? AV_PKT_FLAG_KEY : 0 ; for ( i = 0 ; i < FFMIN ( 8 , vsize ) ; i ++ ) av_log ( s , AV_LOG_TRACE , "NSV video: [%d] = %02x\n" , i , pkt -> data [ i ] ) ; } if ( st [ NSV_ST_VIDEO ] ) ( ( NSVStream * ) st [ NSV_ST_VIDEO ] -> priv_data ) -> frame_offset ++ ; if ( asize && st [ NSV_ST_AUDIO ] ) { nst = st [ NSV_ST_AUDIO ] -> priv_data ; pkt = & nsv -> ahead [ NSV_ST_AUDIO ] ; if ( asize && st [ NSV_ST_AUDIO ] -> codecpar -> codec_tag == MKTAG ( 'P' , 'C' , 'M' , ' ' ) ) { uint8_t bps ; uint8_t channels ; uint16_t samplerate ; bps = avio_r8 ( pb ) ; channels = avio_r8 ( pb ) ; samplerate = avio_rl16 ( pb ) ; if ( ! channels || ! samplerate ) return AVERROR_INVALIDDATA ; asize -= 4 ; av_log ( s , AV_LOG_TRACE , "NSV RAWAUDIO: bps %d, nchan %d, srate %d\n" , bps , channels , samplerate ) ; if ( fill_header ) { st [ NSV_ST_AUDIO ] -> need_parsing = AVSTREAM_PARSE_NONE ; if ( bps != 16 ) { av_log ( s , AV_LOG_TRACE , "NSV AUDIO bit/sample != 16 (%d)!!!\n" , bps ) ; } bps /= channels ; if ( bps == 8 ) st [ NSV_ST_AUDIO ] -> codecpar -> codec_id = AV_CODEC_ID_PCM_U8 ; samplerate /= 4 ; channels = 1 ; st [ NSV_ST_AUDIO ] -> codecpar -> channels = channels ; st [ NSV_ST_AUDIO ] -> codecpar -> sample_rate = samplerate ; av_log ( s , AV_LOG_TRACE , "NSV RAWAUDIO: bps %d, nchan %d, srate %d\n" , bps , channels , samplerate ) ; } } if ( ( ret = av_get_packet ( pb , pkt , asize ) ) < 0 ) return ret ; pkt -> stream_index = st [ NSV_ST_AUDIO ] -> index ; pkt -> flags |= nsv -> state == NSV_HAS_READ_NSVS ? AV_PKT_FLAG_KEY : 0 ; if ( nsv -> state == NSV_HAS_READ_NSVS && st [ NSV_ST_VIDEO ] ) { pkt -> dts = ( ( ( NSVStream * ) st [ NSV_ST_VIDEO ] -> priv_data ) -> frame_offset - 1 ) ; pkt -> dts *= ( int64_t ) 1000 * nsv -> framerate . den ; pkt -> dts += ( int64_t ) nsv -> avsync * nsv -> framerate . num ; av_log ( s , AV_LOG_TRACE , "NSV AUDIO: sync:%d, dts:%" PRId64 , nsv -> avsync , pkt -> dts ) ; } nst -> frame_offset ++ ; } nsv -> state = NSV_UNSYNC ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_ber_T_octet_aligned ( gboolean implicit_tag _U_ , tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { if ( actx -> external . u . ber . ber_callback ) { offset = actx -> external . u . ber . ber_callback ( FALSE , tvb , offset , actx , tree , hf_index ) ; } else if ( actx -> external . direct_ref_present && dissector_get_string_handle ( ber_oid_dissector_table , actx -> external . direct_reference ) ) { offset = call_ber_oid_callback ( actx -> external . direct_reference , tvb , offset , actx -> pinfo , tree , NULL ) ; } else { offset = dissect_ber_octet_string ( implicit_tag , actx , tree , tvb , offset , hf_index , & actx -> external . octet_aligned ) ; } return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ShortcutsProviderTest , SimpleSingleMatch ) { base : : string16 text ( ASCIIToUTF16 ( "go" ) ) ; std : : string expected_url ( "http://www.google.com/" ) ; ExpectedURLs expected_urls ; expected_urls . push_back ( ExpectedURLAndAllowedToBeDefault ( expected_url , true ) ) ; RunShortcutsProviderTest ( provider_ , text , false , expected_urls , expected_url , ASCIIToUTF16 ( "ogle.com" ) ) ; expected_urls . clear ( ) ; expected_urls . push_back ( ExpectedURLAndAllowedToBeDefault ( expected_url , false ) ) ; RunShortcutsProviderTest ( provider_ , text , true , expected_urls , expected_url , ASCIIToUTF16 ( "ogle.com" ) ) ; text = ASCIIToUTF16 ( "abcdef.com" ) ; expected_url = "http://abcdef.com/" ; expected_urls . clear ( ) ; expected_urls . push_back ( ExpectedURLAndAllowedToBeDefault ( expected_url , true ) ) ; RunShortcutsProviderTest ( provider_ , text , false , expected_urls , expected_url , base : : string16 ( ) ) ; RunShortcutsProviderTest ( provider_ , text , true , expected_urls , expected_url , base : : string16 ( ) ) ; text = ASCIIToUTF16 ( "que" ) ; expected_url = "https://www.google.com/search?q=query" ; expected_urls . clear ( ) ; expected_urls . push_back ( ExpectedURLAndAllowedToBeDefault ( expected_url , true ) ) ; RunShortcutsProviderTest ( provider_ , text , false , expected_urls , expected_url , ASCIIToUTF16 ( "ry" ) ) ; expected_urls . clear ( ) ; expected_urls . push_back ( ExpectedURLAndAllowedToBeDefault ( expected_url , false ) ) ; RunShortcutsProviderTest ( provider_ , text , true , expected_urls , expected_url , ASCIIToUTF16 ( "ry" ) ) ; text = ASCIIToUTF16 ( "query" ) ; expected_urls . clear ( ) ; expected_urls . push_back ( ExpectedURLAndAllowedToBeDefault ( expected_url , true ) ) ; RunShortcutsProviderTest ( provider_ , text , false , expected_urls , expected_url , base : : string16 ( ) ) ; RunShortcutsProviderTest ( provider_ , text , true , expected_urls , expected_url , base : : string16 ( ) ) ; text = ASCIIToUTF16 ( "word" ) ; expected_url = "https://www.google.com/search?q=www.word" ; expected_urls . clear ( ) ; expected_urls . push_back ( ExpectedURLAndAllowedToBeDefault ( expected_url , false ) ) ; RunShortcutsProviderTest ( provider_ , text , false , expected_urls , expected_url , base : : string16 ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_rsl_ie_smscb_inf ( tvbuff_t * tvb , packet_info * pinfo _U_ , proto_tree * tree , int offset , gboolean is_mandatory ) { proto_item * ti ; proto_tree * ie_tree ; tvbuff_t * next_tvb ; guint length ; guint8 ie_id ; if ( is_mandatory == FALSE ) { ie_id = tvb_get_guint8 ( tvb , offset ) ; if ( ie_id != RSL_IE_SMSCB_INF ) return offset ; } ie_tree = proto_tree_add_subtree ( tree , tvb , offset , 0 , ett_ie_smscb_inf , & ti , "SMSCB Information IE " ) ; proto_tree_add_item ( ie_tree , hf_rsl_ie_id , tvb , offset , 1 , ENC_BIG_ENDIAN ) ; offset ++ ; length = tvb_get_guint8 ( tvb , offset ) ; proto_item_set_len ( ti , length + 2 ) ; proto_tree_add_item ( ie_tree , hf_rsl_ie_length , tvb , offset , 1 , ENC_BIG_ENDIAN ) ; offset ++ ; next_tvb = tvb_new_subset_length ( tvb , offset , length ) ; call_dissector ( gsm_cbch_handle , next_tvb , pinfo , top_tree ) ; offset = offset + length ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int get_dns_name_type_class ( tvbuff_t * tvb , int offset , int dns_data_offset , const guchar * * name_ret , int * name_len_ret , int * type_ret , int * class_ret ) { int len ; int name_len ; int type ; int dns_class ; int start_offset = offset ; name_len = get_dns_name ( tvb , offset , 0 , dns_data_offset , name_ret ) ; offset += name_len ; type = tvb_get_ntohs ( tvb , offset ) ; offset += 2 ; dns_class = tvb_get_ntohs ( tvb , offset ) ; offset += 2 ; * type_ret = type ; * class_ret = dns_class ; * name_len_ret = name_len ; len = offset - start_offset ; return len ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int parse_CRowSeekAtRatio ( tvbuff_t * tvb , int offset , proto_tree * parent_tree , const char * fmt , ... ) { proto_tree * tree ; proto_item * item ; va_list ap ; const char * txt ; va_start ( ap , fmt ) ; txt = wmem_strdup_vprintf ( wmem_packet_scope ( ) , fmt , ap ) ; va_end ( ap ) ; tree = proto_tree_add_subtree ( parent_tree , tvb , offset , 0 , ett_CRowsSeekAtRatio , & item , txt ) ; proto_tree_add_item ( tree , hf_mswsp_crowseekatratio_ulnumerator , tvb , offset , 4 , ENC_LITTLE_ENDIAN ) ; offset += 4 ; proto_tree_add_item ( tree , hf_mswsp_crowseekatratio_uldenominator , tvb , offset , 4 , ENC_LITTLE_ENDIAN ) ; offset += 4 ; proto_tree_add_item ( tree , hf_mswsp_crowseekatratio_hregion , tvb , offset , 4 , ENC_LITTLE_ENDIAN ) ; offset += 4 ; proto_item_set_end ( item , tvb , offset ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int do_show_slave_status ( MYSQL * mysql_con ) { MYSQL_RES * slave = 0 ; const char * comment_prefix = ( opt_slave_data == MYSQL_OPT_SLAVE_DATA_COMMENTED_SQL ) ? "-- " : "" ; if ( mysql_query_with_error_report ( mysql_con , & slave , "SHOW SLAVE STATUS" ) ) { if ( ! ignore_errors ) { fprintf ( stderr , "%s: Error: Slave not set up\n" , my_progname_short ) ; } mysql_free_result ( slave ) ; return 1 ; } else { MYSQL_ROW row = mysql_fetch_row ( slave ) ; if ( row && row [ 9 ] && row [ 21 ] ) { if ( opt_comments ) fprintf ( md_result_file , "\n--\n-- Position to start replication or point-in-time " "recovery from (the master of this slave)\n--\n\n" ) ; fprintf ( md_result_file , "%sCHANGE MASTER TO " , comment_prefix ) ; if ( opt_include_master_host_port ) { if ( row [ 1 ] ) fprintf ( md_result_file , "MASTER_HOST='%s', " , row [ 1 ] ) ; if ( row [ 3 ] ) fprintf ( md_result_file , "MASTER_PORT=%s, " , row [ 3 ] ) ; } fprintf ( md_result_file , "MASTER_LOG_FILE='%s', MASTER_LOG_POS=%s; \n" , row [ 9 ] , row [ 21 ] ) ; check_io ( md_result_file ) ; } mysql_free_result ( slave ) ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void ohci_set_interrupt ( OHCIState * ohci , uint32_t intr ) { ohci -> intr_status |= intr ; ohci_intr_update ( ohci ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int pfkey_recvmsg ( struct kiocb * kiocb , struct socket * sock , struct msghdr * msg , size_t len , int flags ) { struct sock * sk = sock -> sk ; struct pfkey_sock * pfk = pfkey_sk ( sk ) ; struct sk_buff * skb ; int copied , err ; err = - EINVAL ; if ( flags & ~ ( MSG_PEEK | MSG_DONTWAIT | MSG_TRUNC | MSG_CMSG_COMPAT ) ) goto out ; msg -> msg_namelen = 0 ; skb = skb_recv_datagram ( sk , flags , flags & MSG_DONTWAIT , & err ) ; if ( skb == NULL ) goto out ; copied = skb -> len ; if ( copied > len ) { msg -> msg_flags |= MSG_TRUNC ; copied = len ; } skb_reset_transport_header ( skb ) ; err = skb_copy_datagram_iovec ( skb , 0 , msg -> msg_iov , copied ) ; if ( err ) goto out_free ; sock_recv_ts_and_drops ( msg , sk , skb ) ; err = ( flags & MSG_TRUNC ) ? skb -> len : copied ; if ( pfk -> dump . dump != NULL && * atomic_read ( & sk -> sk_rmem_alloc ) <= sk -> sk_rcvbuf ) pfkey_do_dump ( pfk ) ; out_free : skb_free_datagram ( sk , skb ) ; out : return err ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void apply_loop_filter ( Vp3DecodeContext * s , int plane , int ystart , int yend ) { int x , y ; int * bounding_values = s -> bounding_values_array + 127 ; int width = s -> fragment_width [ ! ! plane ] ; int height = s -> fragment_height [ ! ! plane ] ; int fragment = s -> fragment_start [ plane ] + ystart * width ; int stride = s -> current_frame . f -> linesize [ plane ] ; uint8_t * plane_data = s -> current_frame . f -> data [ plane ] ; if ( ! s -> flipped_image ) stride = - stride ; plane_data += s -> data_offset [ plane ] + 8 * ystart * stride ; for ( y = ystart ; y < yend ; y ++ ) { for ( x = 0 ; x < width ; x ++ ) { if ( s -> all_fragments [ fragment ] . coding_method != MODE_COPY ) { if ( x > 0 ) { s -> vp3dsp . h_loop_filter ( plane_data + 8 * x , stride , bounding_values ) ; } if ( y > 0 ) { s -> vp3dsp . v_loop_filter ( plane_data + 8 * x , stride , bounding_values ) ; } if ( ( x < width - 1 ) && ( s -> all_fragments [ fragment + 1 ] . coding_method == MODE_COPY ) ) { s -> vp3dsp . h_loop_filter ( plane_data + 8 * x + 8 , stride , bounding_values ) ; } if ( ( y < height - 1 ) && ( s -> all_fragments [ fragment + width ] . coding_method == MODE_COPY ) ) { s -> vp3dsp . v_loop_filter ( plane_data + 8 * x + 8 * stride , stride , bounding_values ) ; } } fragment ++ ; } plane_data += 8 * stride ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( UnloadTest , BrowserListDoubleCloseBeforeUnloadCancel ) { NavigateToDataURL ( BEFORE_UNLOAD_HTML , "beforeunload" ) ; UnloadResults unload_results ; BrowserList : : CloseAllBrowsersWithProfile ( browser ( ) -> profile ( ) , base : : Bind ( & UnloadResults : : AddSuccess , base : : Unretained ( & unload_results ) ) , base : : Bind ( & UnloadResults : : AddAbort , base : : Unretained ( & unload_results ) ) , false ) ; BrowserList : : CloseAllBrowsersWithProfile ( browser ( ) -> profile ( ) , base : : Bind ( & UnloadResults : : AddSuccess , base : : Unretained ( & unload_results ) ) , base : : Bind ( & UnloadResults : : AddAbort , base : : Unretained ( & unload_results ) ) , false ) ; base : : string16 expected_title = base : : ASCIIToUTF16 ( "cancelled" ) ; content : : TitleWatcher title_watcher ( browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) , expected_title ) ; ClickModalDialogButton ( false ) ; ASSERT_EQ ( expected_title , title_watcher . WaitAndGetTitle ( ) ) ; EXPECT_EQ ( 0 , unload_results . get_successes ( ) ) ; EXPECT_EQ ( 1 , unload_results . get_aborts ( ) ) ; content : : WindowedNotificationObserver window_observer ( chrome : : NOTIFICATION_BROWSER_CLOSED , content : : NotificationService : : AllSources ( ) ) ; chrome : : CloseWindow ( browser ( ) ) ; ClickModalDialogButton ( true ) ; window_observer . Wait ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void keytype ( struct parse * pcmd , FILE * fp ) { const char * digest_name ; size_t digest_len ; int key_type ; if ( ! pcmd -> nargs ) { fprintf ( fp , "keytype is %s with %lu octet digests\n" , keytype_name ( info_auth_keytype ) , ( u_long ) info_auth_hashlen ) ; return ; } digest_name = pcmd -> argval [ 0 ] . string ; digest_len = 0 ; key_type = keytype_from_text ( digest_name , & digest_len ) ; if ( ! key_type ) { fprintf ( fp , "keytype is not valid. " # ifdef OPENSSL "Type \"help keytype\" for the available digest types.\n" ) ; # else "Only \"md5\" is available.\n" ) ; # endif return ; } info_auth_keytype = key_type ; info_auth_hashlen = digest_len ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int dissect_ber_restricted_string ( gboolean implicit_tag , gint32 type , asn1_ctx_t * actx , proto_tree * tree , tvbuff_t * tvb , int offset , gint hf_id , tvbuff_t * * out_tvb ) { return dissect_ber_constrained_restricted_string ( implicit_tag , type , actx , tree , tvb , offset , NO_BOUND , NO_BOUND , hf_id , out_tvb ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int is_mv_diff_gt_3 ( int16_t ( * motion_val ) [ 2 ] , int step ) { int d ; d = motion_val [ 0 ] [ 0 ] - motion_val [ - step ] [ 0 ] ; if ( d < - 3 || d > 3 ) return 1 ; d = motion_val [ 0 ] [ 1 ] - motion_val [ - step ] [ 1 ] ; if ( d < - 3 || d > 3 ) return 1 ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_lpf_horizontal_4_dual_sse2 ( unsigned char * s , int p , const unsigned char * _blimit0 , const unsigned char * _limit0 , const unsigned char * _thresh0 , const unsigned char * _blimit1 , const unsigned char * _limit1 , const unsigned char * _thresh1 ) { const __m128i blimit = _mm_unpacklo_epi64 ( _mm_load_si128 ( ( const __m128i * ) _blimit0 ) , _mm_load_si128 ( ( const __m128i * ) _blimit1 ) ) ; const __m128i limit = _mm_unpacklo_epi64 ( _mm_load_si128 ( ( const __m128i * ) _limit0 ) , _mm_load_si128 ( ( const __m128i * ) _limit1 ) ) ; const __m128i thresh = _mm_unpacklo_epi64 ( _mm_load_si128 ( ( const __m128i * ) _thresh0 ) , _mm_load_si128 ( ( const __m128i * ) _thresh1 ) ) ; const __m128i zero = _mm_set1_epi16 ( 0 ) ; __m128i p3 , p2 , p1 , p0 , q0 , q1 , q2 , q3 ; __m128i mask , hev , flat ; p3 = _mm_loadu_si128 ( ( __m128i * ) ( s - 4 * p ) ) ; p2 = _mm_loadu_si128 ( ( __m128i * ) ( s - 3 * p ) ) ; p1 = _mm_loadu_si128 ( ( __m128i * ) ( s - 2 * p ) ) ; p0 = _mm_loadu_si128 ( ( __m128i * ) ( s - 1 * p ) ) ; q0 = _mm_loadu_si128 ( ( __m128i * ) ( s - 0 * p ) ) ; q1 = _mm_loadu_si128 ( ( __m128i * ) ( s + 1 * p ) ) ; q2 = _mm_loadu_si128 ( ( __m128i * ) ( s + 2 * p ) ) ; q3 = _mm_loadu_si128 ( ( __m128i * ) ( s + 3 * p ) ) ; { const __m128i abs_p1p0 = _mm_or_si128 ( _mm_subs_epu8 ( p1 , p0 ) , _mm_subs_epu8 ( p0 , p1 ) ) ; const __m128i abs_q1q0 = _mm_or_si128 ( _mm_subs_epu8 ( q1 , q0 ) , _mm_subs_epu8 ( q0 , q1 ) ) ; const __m128i fe = _mm_set1_epi8 ( 0xfe ) ; const __m128i ff = _mm_cmpeq_epi8 ( abs_p1p0 , abs_p1p0 ) ; __m128i abs_p0q0 = _mm_or_si128 ( _mm_subs_epu8 ( p0 , q0 ) , _mm_subs_epu8 ( q0 , p0 ) ) ; __m128i abs_p1q1 = _mm_or_si128 ( _mm_subs_epu8 ( p1 , q1 ) , _mm_subs_epu8 ( q1 , p1 ) ) ; __m128i work ; flat = _mm_max_epu8 ( abs_p1p0 , abs_q1q0 ) ; hev = _mm_subs_epu8 ( flat , thresh ) ; hev = _mm_xor_si128 ( _mm_cmpeq_epi8 ( hev , zero ) , ff ) ; abs_p0q0 = _mm_adds_epu8 ( abs_p0q0 , abs_p0q0 ) ; abs_p1q1 = _mm_srli_epi16 ( _mm_and_si128 ( abs_p1q1 , fe ) , 1 ) ; mask = _mm_subs_epu8 ( _mm_adds_epu8 ( abs_p0q0 , abs_p1q1 ) , blimit ) ; mask = _mm_xor_si128 ( _mm_cmpeq_epi8 ( mask , zero ) , ff ) ; mask = _mm_max_epu8 ( flat , mask ) ; work = _mm_max_epu8 ( _mm_or_si128 ( _mm_subs_epu8 ( p2 , p1 ) , _mm_subs_epu8 ( p1 , p2 ) ) , _mm_or_si128 ( _mm_subs_epu8 ( p3 , p2 ) , _mm_subs_epu8 ( p2 , p3 ) ) ) ; mask = _mm_max_epu8 ( work , mask ) ; work = _mm_max_epu8 ( _mm_or_si128 ( _mm_subs_epu8 ( q2 , q1 ) , _mm_subs_epu8 ( q1 , q2 ) ) , _mm_or_si128 ( _mm_subs_epu8 ( q3 , q2 ) , _mm_subs_epu8 ( q2 , q3 ) ) ) ; mask = _mm_max_epu8 ( work , mask ) ; mask = _mm_subs_epu8 ( mask , limit ) ; mask = _mm_cmpeq_epi8 ( mask , zero ) ; } { const __m128i t4 = _mm_set1_epi8 ( 4 ) ; const __m128i t3 = _mm_set1_epi8 ( 3 ) ; const __m128i t80 = _mm_set1_epi8 ( 0x80 ) ; const __m128i te0 = _mm_set1_epi8 ( 0xe0 ) ; const __m128i t1f = _mm_set1_epi8 ( 0x1f ) ; const __m128i t1 = _mm_set1_epi8 ( 0x1 ) ; const __m128i t7f = _mm_set1_epi8 ( 0x7f ) ; const __m128i ps1 = _mm_xor_si128 ( _mm_loadu_si128 ( ( __m128i * ) ( s - 2 * p ) ) , t80 ) ; const __m128i ps0 = _mm_xor_si128 ( _mm_loadu_si128 ( ( __m128i * ) ( s - 1 * p ) ) , t80 ) ; const __m128i qs0 = _mm_xor_si128 ( _mm_loadu_si128 ( ( __m128i * ) ( s + 0 * p ) ) , t80 ) ; const __m128i qs1 = _mm_xor_si128 ( _mm_loadu_si128 ( ( __m128i * ) ( s + 1 * p ) ) , t80 ) ; __m128i filt ; __m128i work_a ; __m128i filter1 , filter2 ; filt = _mm_and_si128 ( _mm_subs_epi8 ( ps1 , qs1 ) , hev ) ; work_a = _mm_subs_epi8 ( qs0 , ps0 ) ; filt = _mm_adds_epi8 ( filt , work_a ) ; filt = _mm_adds_epi8 ( filt , work_a ) ; filt = _mm_adds_epi8 ( filt , work_a ) ; filt = _mm_and_si128 ( filt , mask ) ; filter1 = _mm_adds_epi8 ( filt , t4 ) ; filter2 = _mm_adds_epi8 ( filt , t3 ) ; work_a = _mm_cmpgt_epi8 ( zero , filter1 ) ; filter1 = _mm_srli_epi16 ( filter1 , 3 ) ; work_a = _mm_and_si128 ( work_a , te0 ) ; filter1 = _mm_and_si128 ( filter1 , t1f ) ; filter1 = _mm_or_si128 ( filter1 , work_a ) ; work_a = _mm_cmpgt_epi8 ( zero , filter2 ) ; filter2 = _mm_srli_epi16 ( filter2 , 3 ) ; work_a = _mm_and_si128 ( work_a , te0 ) ; filter2 = _mm_and_si128 ( filter2 , t1f ) ; filter2 = _mm_or_si128 ( filter2 , work_a ) ; filt = _mm_adds_epi8 ( filter1 , t1 ) ; work_a = _mm_cmpgt_epi8 ( zero , filt ) ; filt = _mm_srli_epi16 ( filt , 1 ) ; work_a = _mm_and_si128 ( work_a , t80 ) ; filt = _mm_and_si128 ( filt , t7f ) ; filt = _mm_or_si128 ( filt , work_a ) ; filt = _mm_andnot_si128 ( hev , filt ) ; q0 = _mm_xor_si128 ( _mm_subs_epi8 ( qs0 , filter1 ) , t80 ) ; q1 = _mm_xor_si128 ( _mm_subs_epi8 ( qs1 , filt ) , t80 ) ; p0 = _mm_xor_si128 ( _mm_adds_epi8 ( ps0 , filter2 ) , t80 ) ; p1 = _mm_xor_si128 ( _mm_adds_epi8 ( ps1 , filt ) , t80 ) ; _mm_storeu_si128 ( ( __m128i * ) ( s - 2 * p ) , p1 ) ; _mm_storeu_si128 ( ( __m128i * ) ( s - 1 * p ) , p0 ) ; _mm_storeu_si128 ( ( __m128i * ) ( s + 0 * p ) , q0 ) ; _mm_storeu_si128 ( ( __m128i * ) ( s + 1 * p ) , q1 ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
int archive_mstring_get_utf8 ( struct archive * a , struct archive_mstring * aes , const char * * p ) { struct archive_string_conv * sc ; int r ; if ( aes -> aes_set & AES_SET_UTF8 ) { * p = aes -> aes_utf8 . s ; return ( 0 ) ; } * p = NULL ; if ( aes -> aes_set & AES_SET_MBS ) { sc = archive_string_conversion_to_charset ( a , "UTF-8" , 1 ) ; if ( sc == NULL ) return ( - 1 ) ; r = archive_strncpy_l ( & ( aes -> aes_utf8 ) , aes -> aes_mbs . s , aes -> aes_mbs . length , sc ) ; if ( a == NULL ) free_sconv_object ( sc ) ; if ( r == 0 ) { aes -> aes_set |= AES_SET_UTF8 ; * p = aes -> aes_utf8 . s ; return ( 0 ) ; } else return ( - 1 ) ; } return ( 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int dtls1_retransmit_message ( SSL * s , unsigned short seq , int * found ) { int ret ; pitem * item ; hm_fragment * frag ; unsigned long header_length ; unsigned char seq64be [ 8 ] ; struct dtls1_retransmit_state saved_state ; memset ( seq64be , 0 , sizeof ( seq64be ) ) ; seq64be [ 6 ] = ( unsigned char ) ( seq >> 8 ) ; seq64be [ 7 ] = ( unsigned char ) seq ; item = pqueue_find ( s -> d1 -> sent_messages , seq64be ) ; if ( item == NULL ) { SSLerr ( SSL_F_DTLS1_RETRANSMIT_MESSAGE , ERR_R_INTERNAL_ERROR ) ; * found = 0 ; return 0 ; } * found = 1 ; frag = ( hm_fragment * ) item -> data ; if ( frag -> msg_header . is_ccs ) header_length = DTLS1_CCS_HEADER_LENGTH ; else header_length = DTLS1_HM_HEADER_LENGTH ; memcpy ( s -> init_buf -> data , frag -> fragment , frag -> msg_header . msg_len + header_length ) ; s -> init_num = frag -> msg_header . msg_len + header_length ; dtls1_set_message_header_int ( s , frag -> msg_header . type , frag -> msg_header . msg_len , frag -> msg_header . seq , 0 , frag -> msg_header . frag_len ) ; saved_state . enc_write_ctx = s -> enc_write_ctx ; saved_state . write_hash = s -> write_hash ; saved_state . compress = s -> compress ; saved_state . session = s -> session ; saved_state . epoch = DTLS_RECORD_LAYER_get_w_epoch ( & s -> rlayer ) ; s -> d1 -> retransmitting = 1 ; s -> enc_write_ctx = frag -> msg_header . saved_retransmit_state . enc_write_ctx ; s -> write_hash = frag -> msg_header . saved_retransmit_state . write_hash ; s -> compress = frag -> msg_header . saved_retransmit_state . compress ; s -> session = frag -> msg_header . saved_retransmit_state . session ; DTLS_RECORD_LAYER_set_saved_w_epoch ( & s -> rlayer , frag -> msg_header . saved_retransmit_state . epoch ) ; ret = dtls1_do_write ( s , frag -> msg_header . is_ccs ? SSL3_RT_CHANGE_CIPHER_SPEC : SSL3_RT_HANDSHAKE ) ; s -> enc_write_ctx = saved_state . enc_write_ctx ; s -> write_hash = saved_state . write_hash ; s -> compress = saved_state . compress ; s -> session = saved_state . session ; DTLS_RECORD_LAYER_set_saved_w_epoch ( & s -> rlayer , saved_state . epoch ) ; s -> d1 -> retransmitting = 0 ; ( void ) BIO_flush ( s -> wbio ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static Datum ExecEvalMinMax ( MinMaxExprState * minmaxExpr , ExprContext * econtext , bool * isNull , ExprDoneCond * isDone ) { Datum result = ( Datum ) 0 ; MinMaxExpr * minmax = ( MinMaxExpr * ) minmaxExpr -> xprstate . expr ; Oid collation = minmax -> inputcollid ; MinMaxOp op = minmax -> op ; FunctionCallInfoData locfcinfo ; ListCell * arg ; if ( isDone ) * isDone = ExprSingleResult ; * isNull = true ; InitFunctionCallInfoData ( locfcinfo , & minmaxExpr -> cfunc , 2 , collation , NULL , NULL ) ; locfcinfo . argnull [ 0 ] = false ; locfcinfo . argnull [ 1 ] = false ; foreach ( arg , minmaxExpr -> args ) { ExprState * e = ( ExprState * ) lfirst ( arg ) ; Datum value ; bool valueIsNull ; int32 cmpresult ; value = ExecEvalExpr ( e , econtext , & valueIsNull , NULL ) ; if ( valueIsNull ) continue ; if ( * isNull ) { result = value ; * isNull = false ; } else { locfcinfo . arg [ 0 ] = result ; locfcinfo . arg [ 1 ] = value ; locfcinfo . isnull = false ; cmpresult = DatumGetInt32 ( FunctionCallInvoke ( & locfcinfo ) ) ; if ( locfcinfo . isnull ) continue ; if ( cmpresult > 0 && op == IS_LEAST ) result = value ; else if ( cmpresult < 0 && op == IS_GREATEST ) result = value ; } } return result ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
struct zip_cdir * _zip_cdir_new ( int nentry , struct zip_error * error ) { struct zip_cdir * cd ; if ( ( cd = ( struct zip_cdir * ) malloc ( sizeof ( * cd ) ) ) == NULL ) { _zip_error_set ( error , ZIP_ER_MEMORY , 0 ) ; return NULL ; } if ( nentry > ( ( size_t ) - 1 ) / sizeof ( * ( cd -> entry ) ) || ( cd -> entry = ( struct zip_dirent * ) malloc ( sizeof ( * ( cd -> entry ) ) * ( size_t ) nentry ) ) == NULL ) { _zip_error_set ( error , ZIP_ER_MEMORY , 0 ) ; free ( cd ) ; return NULL ; } cd -> nentry = nentry ; cd -> size = cd -> offset = 0 ; cd -> comment = NULL ; cd -> comment_len = 0 ; return cd ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void ImportCMYKOQuantum ( const Image * image , QuantumInfo * quantum_info , const MagickSizeType number_pixels , const unsigned char * magick_restrict p , Quantum * magick_restrict q , ExceptionInfo * exception ) { QuantumAny range ; register ssize_t x ; unsigned int pixel ; if ( image -> colorspace != CMYKColorspace ) { ( void ) ThrowMagickException ( exception , GetMagickModule ( ) , ImageError , "ColorSeparatedImageRequired" , "`%s'" , image -> filename ) ; return ; } switch ( quantum_info -> depth ) { case 8 : { unsigned char pixel ; for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushCharPixel ( p , & pixel ) ; SetPixelRed ( image , ScaleCharToQuantum ( pixel ) , q ) ; p = PushCharPixel ( p , & pixel ) ; SetPixelGreen ( image , ScaleCharToQuantum ( pixel ) , q ) ; p = PushCharPixel ( p , & pixel ) ; SetPixelBlue ( image , ScaleCharToQuantum ( pixel ) , q ) ; p = PushCharPixel ( p , & pixel ) ; SetPixelBlack ( image , ScaleCharToQuantum ( pixel ) , q ) ; p = PushCharPixel ( p , & pixel ) ; SetPixelOpacity ( image , ScaleCharToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 16 : { unsigned short pixel ; if ( quantum_info -> format == FloatingPointQuantumFormat ) { for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelRed ( image , ClampToQuantum ( QuantumRange * HalfToSinglePrecision ( pixel ) ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGreen ( image , ClampToQuantum ( QuantumRange * HalfToSinglePrecision ( pixel ) ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelBlue ( image , ClampToQuantum ( QuantumRange * HalfToSinglePrecision ( pixel ) ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelBlack ( image , ClampToQuantum ( QuantumRange * HalfToSinglePrecision ( pixel ) ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelOpacity ( image , ClampToQuantum ( QuantumRange * HalfToSinglePrecision ( pixel ) ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelRed ( image , ScaleShortToQuantum ( pixel ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGreen ( image , ScaleShortToQuantum ( pixel ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelBlue ( image , ScaleShortToQuantum ( pixel ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelBlack ( image , ScaleShortToQuantum ( pixel ) , q ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelOpacity ( image , ScaleShortToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 32 : { unsigned int pixel ; if ( quantum_info -> format == FloatingPointQuantumFormat ) { float pixel ; for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushFloatPixel ( quantum_info , p , & pixel ) ; SetPixelRed ( image , ClampToQuantum ( pixel ) , q ) ; p = PushFloatPixel ( quantum_info , p , & pixel ) ; SetPixelGreen ( image , ClampToQuantum ( pixel ) , q ) ; p = PushFloatPixel ( quantum_info , p , & pixel ) ; SetPixelBlue ( image , ClampToQuantum ( pixel ) , q ) ; p = PushFloatPixel ( quantum_info , p , & pixel ) ; SetPixelBlack ( image , ClampToQuantum ( pixel ) , q ) ; p = PushFloatPixel ( quantum_info , p , & pixel ) ; SetPixelOpacity ( image , ClampToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelRed ( image , ScaleLongToQuantum ( pixel ) , q ) ; p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGreen ( image , ScaleLongToQuantum ( pixel ) , q ) ; p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelBlue ( image , ScaleLongToQuantum ( pixel ) , q ) ; p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelBlack ( image , ScaleLongToQuantum ( pixel ) , q ) ; p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelOpacity ( image , ScaleLongToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 64 : { if ( quantum_info -> format == FloatingPointQuantumFormat ) { double pixel ; for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushDoublePixel ( quantum_info , p , & pixel ) ; SetPixelRed ( image , ClampToQuantum ( pixel ) , q ) ; p = PushDoublePixel ( quantum_info , p , & pixel ) ; SetPixelGreen ( image , ClampToQuantum ( pixel ) , q ) ; p = PushDoublePixel ( quantum_info , p , & pixel ) ; SetPixelBlue ( image , ClampToQuantum ( pixel ) , q ) ; p = PushDoublePixel ( quantum_info , p , & pixel ) ; SetPixelBlack ( image , ClampToQuantum ( pixel ) , q ) ; p = PushDoublePixel ( quantum_info , p , & pixel ) ; SetPixelOpacity ( image , ClampToQuantum ( pixel ) , q ) ; p = PushDoublePixel ( quantum_info , p , & pixel ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } } default : { range = GetQuantumRange ( quantum_info -> depth ) ; for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelRed ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelGreen ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelBlue ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelBlack ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelOpacity ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; q += GetPixelChannels ( image ) ; } break ; } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int xmlThrDefGetWarningsDefaultValue ( int v ) { int ret ; xmlMutexLock ( xmlThrDefMutex ) ; ret = xmlGetWarningsDefaultValueThrDef ; xmlGetWarningsDefaultValueThrDef = v ; xmlMutexUnlock ( xmlThrDefMutex ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static Datum ExecEvalScalarArrayOp ( ScalarArrayOpExprState * sstate , ExprContext * econtext , bool * isNull , ExprDoneCond * isDone ) { ScalarArrayOpExpr * opexpr = ( ScalarArrayOpExpr * ) sstate -> fxprstate . xprstate . expr ; bool useOr = opexpr -> useOr ; ArrayType * arr ; int nitems ; Datum result ; bool resultnull ; FunctionCallInfo fcinfo ; ExprDoneCond argDone ; int i ; int16 typlen ; bool typbyval ; char typalign ; char * s ; bits8 * bitmap ; int bitmask ; * isNull = false ; if ( isDone ) * isDone = ExprSingleResult ; if ( sstate -> fxprstate . func . fn_oid == InvalidOid ) { init_fcache ( opexpr -> opfuncid , opexpr -> inputcollid , & sstate -> fxprstate , econtext -> ecxt_per_query_memory , true ) ; Assert ( ! sstate -> fxprstate . func . fn_retset ) ; } fcinfo = & sstate -> fxprstate . fcinfo_data ; argDone = ExecEvalFuncArgs ( fcinfo , sstate -> fxprstate . args , econtext ) ; if ( argDone != ExprSingleResult ) ereport ( ERROR , ( errcode ( ERRCODE_DATATYPE_MISMATCH ) , errmsg ( "op ANY/ALL (array) does not support set arguments" ) ) ) ; Assert ( fcinfo -> nargs == 2 ) ; if ( fcinfo -> argnull [ 1 ] ) { * isNull = true ; return ( Datum ) 0 ; } arr = DatumGetArrayTypeP ( fcinfo -> arg [ 1 ] ) ; nitems = ArrayGetNItems ( ARR_NDIM ( arr ) , ARR_DIMS ( arr ) ) ; if ( nitems <= 0 ) return BoolGetDatum ( ! useOr ) ; if ( fcinfo -> argnull [ 0 ] && sstate -> fxprstate . func . fn_strict ) { * isNull = true ; return ( Datum ) 0 ; } if ( sstate -> element_type != ARR_ELEMTYPE ( arr ) ) { get_typlenbyvalalign ( ARR_ELEMTYPE ( arr ) , & sstate -> typlen , & sstate -> typbyval , & sstate -> typalign ) ; sstate -> element_type = ARR_ELEMTYPE ( arr ) ; } typlen = sstate -> typlen ; typbyval = sstate -> typbyval ; typalign = sstate -> typalign ; result = BoolGetDatum ( ! useOr ) ; resultnull = false ; s = ( char * ) ARR_DATA_PTR ( arr ) ; bitmap = ARR_NULLBITMAP ( arr ) ; bitmask = 1 ; for ( i = 0 ; i < nitems ; i ++ ) { Datum elt ; Datum thisresult ; if ( bitmap && ( * bitmap & bitmask ) == 0 ) { fcinfo -> arg [ 1 ] = ( Datum ) 0 ; fcinfo -> argnull [ 1 ] = true ; } else { elt = fetch_att ( s , typbyval , typlen ) ; s = att_addlength_pointer ( s , typlen , s ) ; s = ( char * ) att_align_nominal ( s , typalign ) ; fcinfo -> arg [ 1 ] = elt ; fcinfo -> argnull [ 1 ] = false ; } if ( fcinfo -> argnull [ 1 ] && sstate -> fxprstate . func . fn_strict ) { fcinfo -> isnull = true ; thisresult = ( Datum ) 0 ; } else { fcinfo -> isnull = false ; thisresult = FunctionCallInvoke ( fcinfo ) ; } if ( fcinfo -> isnull ) resultnull = true ; else if ( useOr ) { if ( DatumGetBool ( thisresult ) ) { result = BoolGetDatum ( true ) ; resultnull = false ; break ; } } else { if ( ! DatumGetBool ( thisresult ) ) { result = BoolGetDatum ( false ) ; resultnull = false ; break ; } } if ( bitmap ) { bitmask <<= 1 ; if ( bitmask == 0x100 ) { bitmap ++ ; bitmask = 1 ; } } } * isNull = resultnull ; return result ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void ps2_queue ( PS2State * s , int b ) { PS2Queue * q = & s -> queue ; if ( q -> count >= PS2_QUEUE_SIZE - 1 ) return ; q -> data [ q -> wptr ] = b ; if ( ++ q -> wptr == PS2_QUEUE_SIZE ) q -> wptr = 0 ; q -> count ++ ; s -> update_irq ( s -> update_arg , 1 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void rds_inc_addref ( struct rds_incoming * inc ) { rdsdebug ( "addref inc %p ref %d\n" , inc , atomic_read ( & inc -> i_refcount ) ) ; atomic_inc ( & inc -> i_refcount ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_INTEGER_1_32 ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_constrained_integer ( tvb , offset , actx , tree , hf_index , 1U , 32U , NULL , FALSE ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
proto_item * proto_tree_add_ether_format ( proto_tree * tree , int hfindex , tvbuff_t * tvb , gint start , gint length , const guint8 * value , const char * format , ... ) { proto_item * pi ; va_list ap ; pi = proto_tree_add_ether ( tree , hfindex , tvb , start , length , value ) ; if ( pi != tree ) { TRY_TO_FAKE_THIS_REPR ( pi ) ; va_start ( ap , format ) ; proto_tree_set_representation ( pi , format , ap ) ; va_end ( ap ) ; } return pi ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
block_t * decoder_NewAudioBuffer ( decoder_t * dec , int samples ) { if ( decoder_UpdateAudioFormat ( dec ) ) return NULL ; size_t length = samples * dec -> fmt_out . audio . i_bytes_per_frame / dec -> fmt_out . audio . i_frame_length ; block_t * block = block_Alloc ( length ) ; if ( likely ( block != NULL ) ) { block -> i_nb_samples = samples ; block -> i_pts = block -> i_length = 0 ; } return block ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int ts_lua_http_timeout_set ( lua_State * L ) { int conf ; int value ; ts_lua_http_ctx * http_ctx ; GET_HTTP_CONTEXT ( http_ctx , L ) ; conf = luaL_checkinteger ( L , 1 ) ; value = luaL_checkinteger ( L , 2 ) ; switch ( conf ) { case TS_LUA_TIMEOUT_ACTIVE : TSDebug ( TS_LUA_DEBUG_TAG , "setting active timeout" ) ; TSHttpTxnActiveTimeoutSet ( http_ctx -> txnp , value ) ; break ; case TS_LUA_TIMEOUT_CONNECT : TSDebug ( TS_LUA_DEBUG_TAG , "setting connect timeout" ) ; TSHttpTxnConnectTimeoutSet ( http_ctx -> txnp , value ) ; break ; case TS_LUA_TIMEOUT_DNS : TSDebug ( TS_LUA_DEBUG_TAG , "setting dns timeout" ) ; TSHttpTxnDNSTimeoutSet ( http_ctx -> txnp , value ) ; break ; case TS_LUA_TIMEOUT_NO_ACTIVITY : TSDebug ( TS_LUA_DEBUG_TAG , "setting no activity timeout" ) ; TSHttpTxnNoActivityTimeoutSet ( http_ctx -> txnp , value ) ; break ; default : TSError ( "[ts_lua] Unsupported timeout config option for lua plugin" ) ; break ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int qemuMonitorTextGetBlockStatsInfo ( qemuMonitorPtr mon , const char * dev_name , long long * rd_req , long long * rd_bytes , long long * rd_total_times , long long * wr_req , long long * wr_bytes , long long * wr_total_times , long long * flush_req , long long * flush_total_times , long long * errs ) { char * info = NULL ; int ret = - 1 ; char * dummy ; const char * p , * eol ; int devnamelen = strlen ( dev_name ) ; if ( qemuMonitorHMPCommand ( mon , "info blockstats" , & info ) < 0 ) { qemuReportError ( VIR_ERR_OPERATION_FAILED , "%s" , _ ( "'info blockstats' command failed" ) ) ; goto cleanup ; } if ( strstr ( info , "\ninfo " ) ) { qemuReportError ( VIR_ERR_OPERATION_INVALID , "%s" , _ ( "'info blockstats' not supported by this qemu" ) ) ; goto cleanup ; } * rd_req = * rd_bytes = - 1 ; * wr_req = * wr_bytes = * errs = - 1 ; if ( rd_total_times ) * rd_total_times = - 1 ; if ( wr_total_times ) * wr_total_times = - 1 ; if ( flush_req ) * flush_req = - 1 ; if ( flush_total_times ) * flush_total_times = - 1 ; p = info ; while ( * p ) { if ( STRPREFIX ( p , QEMU_DRIVE_HOST_PREFIX ) ) p += strlen ( QEMU_DRIVE_HOST_PREFIX ) ; if ( STREQLEN ( p , dev_name , devnamelen ) && p [ devnamelen ] == ':' && p [ devnamelen + 1 ] == ' ' ) { eol = strchr ( p , '\n' ) ; if ( ! eol ) eol = p + strlen ( p ) ; p += devnamelen + 2 ; while ( * p ) { if ( STRPREFIX ( p , "rd_bytes=" ) ) { p += strlen ( "rd_bytes=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , rd_bytes ) == - 1 ) VIR_DEBUG ( "error reading rd_bytes: %s" , p ) ; } else if ( STRPREFIX ( p , "wr_bytes=" ) ) { p += strlen ( "wr_bytes=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , wr_bytes ) == - 1 ) VIR_DEBUG ( "error reading wr_bytes: %s" , p ) ; } else if ( STRPREFIX ( p , "rd_operations=" ) ) { p += strlen ( "rd_operations=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , rd_req ) == - 1 ) VIR_DEBUG ( "error reading rd_req: %s" , p ) ; } else if ( STRPREFIX ( p , "wr_operations=" ) ) { p += strlen ( "wr_operations=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , wr_req ) == - 1 ) VIR_DEBUG ( "error reading wr_req: %s" , p ) ; } else if ( rd_total_times && STRPREFIX ( p , "rd_total_times_ns=" ) ) { p += strlen ( "rd_total_times_ns=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , rd_total_times ) == - 1 ) VIR_DEBUG ( "error reading rd_total_times: %s" , p ) ; } else if ( wr_total_times && STRPREFIX ( p , "wr_total_times_ns=" ) ) { p += strlen ( "wr_total_times_ns=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , wr_total_times ) == - 1 ) VIR_DEBUG ( "error reading wr_total_times: %s" , p ) ; } else if ( flush_req && STRPREFIX ( p , "flush_operations=" ) ) { p += strlen ( "flush_operations=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , flush_req ) == - 1 ) VIR_DEBUG ( "error reading flush_req: %s" , p ) ; } else if ( flush_total_times && STRPREFIX ( p , "flush_total_times_ns=" ) ) { p += strlen ( "flush_total_times_ns=" ) ; if ( virStrToLong_ll ( p , & dummy , 10 , flush_total_times ) == - 1 ) VIR_DEBUG ( "error reading flush_total_times: %s" , p ) ; } else { VIR_DEBUG ( "unknown block stat near %s" , p ) ; } p = strchr ( p , ' ' ) ; if ( ! p || p >= eol ) break ; p ++ ; } ret = 0 ; goto cleanup ; } p = strchr ( p , '\n' ) ; if ( ! p ) break ; p ++ ; } qemuReportError ( VIR_ERR_INVALID_ARG , _ ( "no stats found for device %s" ) , dev_name ) ; cleanup : VIR_FREE ( info ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void erase_screen ( AVCodecContext * avctx ) { AnsiContext * s = avctx -> priv_data ; int i ; for ( i = 0 ; i < avctx -> height ; i ++ ) memset ( s -> frame -> data [ 0 ] + i * s -> frame -> linesize [ 0 ] , DEFAULT_BG_COLOR , avctx -> width ) ; s -> x = s -> y = 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void row_prop_delete ( zval * object , zval * offset , const zend_literal * key TSRMLS_DC ) { php_error_docref ( NULL TSRMLS_CC , E_WARNING , "Cannot delete properties from a PDORow" ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int ff_mpeg4_decode_video_packet_header ( MpegEncContext * s ) { int mb_num_bits = av_log2 ( s -> mb_num - 1 ) + 1 ; int header_extension = 0 , mb_num , len ; if ( get_bits_count ( & s -> gb ) > s -> gb . size_in_bits - 20 ) return - 1 ; for ( len = 0 ; len < 32 ; len ++ ) { if ( get_bits1 ( & s -> gb ) ) break ; } if ( len != ff_mpeg4_get_video_packet_prefix_length ( s ) ) { av_log ( s -> avctx , AV_LOG_ERROR , "marker does not match f_code\n" ) ; return - 1 ; } if ( s -> shape != RECT_SHAPE ) { header_extension = get_bits1 ( & s -> gb ) ; } mb_num = get_bits ( & s -> gb , mb_num_bits ) ; if ( mb_num >= s -> mb_num ) { av_log ( s -> avctx , AV_LOG_ERROR , "illegal mb_num in video packet (%d %d) \n" , mb_num , s -> mb_num ) ; return - 1 ; } if ( s -> pict_type == AV_PICTURE_TYPE_B ) { int mb_x = 0 , mb_y = 0 ; while ( s -> next_picture . mbskip_table [ s -> mb_index2xy [ mb_num ] ] ) { if ( ! mb_x ) ff_thread_await_progress ( & s -> next_picture_ptr -> tf , mb_y ++ , 0 ) ; mb_num ++ ; if ( ++ mb_x == s -> mb_width ) mb_x = 0 ; } if ( mb_num >= s -> mb_num ) return - 1 ; } s -> mb_x = mb_num % s -> mb_width ; s -> mb_y = mb_num / s -> mb_width ; if ( s -> shape != BIN_ONLY_SHAPE ) { int qscale = get_bits ( & s -> gb , s -> quant_precision ) ; if ( qscale ) s -> chroma_qscale = s -> qscale = qscale ; } if ( s -> shape == RECT_SHAPE ) { header_extension = get_bits1 ( & s -> gb ) ; } if ( header_extension ) { int time_incr = 0 ; while ( get_bits1 ( & s -> gb ) != 0 ) time_incr ++ ; check_marker ( & s -> gb , "before time_increment in video packed header" ) ; skip_bits ( & s -> gb , s -> time_increment_bits ) ; check_marker ( & s -> gb , "before vop_coding_type in video packed header" ) ; skip_bits ( & s -> gb , 2 ) ; if ( s -> shape != BIN_ONLY_SHAPE ) { skip_bits ( & s -> gb , 3 ) ; if ( s -> pict_type == AV_PICTURE_TYPE_S && s -> vol_sprite_usage == GMC_SPRITE ) { mpeg4_decode_sprite_trajectory ( s , & s -> gb ) ; av_log ( s -> avctx , AV_LOG_ERROR , "untested\n" ) ; } if ( s -> pict_type != AV_PICTURE_TYPE_I ) { int f_code = get_bits ( & s -> gb , 3 ) ; if ( f_code == 0 ) { av_log ( s -> avctx , AV_LOG_ERROR , "Error, video packet header damaged (f_code=0)\n" ) ; } } if ( s -> pict_type == AV_PICTURE_TYPE_B ) { int b_code = get_bits ( & s -> gb , 3 ) ; if ( b_code == 0 ) { av_log ( s -> avctx , AV_LOG_ERROR , "Error, video packet header damaged (b_code=0)\n" ) ; } } } } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static zend_object_value spl_filesystem_object_clone ( zval * zobject TSRMLS_DC ) { zend_object_value new_obj_val ; zend_object * old_object ; zend_object * new_object ; zend_object_handle handle = Z_OBJ_HANDLE_P ( zobject ) ; spl_filesystem_object * intern ; spl_filesystem_object * source ; int index , skip_dots ; old_object = zend_objects_get_address ( zobject TSRMLS_CC ) ; source = ( spl_filesystem_object * ) old_object ; new_obj_val = spl_filesystem_object_new_ex ( old_object -> ce , & intern TSRMLS_CC ) ; new_object = & intern -> std ; intern -> flags = source -> flags ; switch ( source -> type ) { case SPL_FS_INFO : intern -> _path_len = source -> _path_len ; intern -> _path = estrndup ( source -> _path , source -> _path_len ) ; intern -> file_name_len = source -> file_name_len ; intern -> file_name = estrndup ( source -> file_name , intern -> file_name_len ) ; break ; case SPL_FS_DIR : spl_filesystem_dir_open ( intern , source -> _path TSRMLS_CC ) ; skip_dots = SPL_HAS_FLAG ( source -> flags , SPL_FILE_DIR_SKIPDOTS ) ; for ( index = 0 ; index < source -> u . dir . index ; ++ index ) { do { spl_filesystem_dir_read ( intern TSRMLS_CC ) ; } while ( skip_dots && spl_filesystem_is_dot ( intern -> u . dir . entry . d_name ) ) ; } intern -> u . dir . index = index ; break ; case SPL_FS_FILE : php_error_docref ( NULL TSRMLS_CC , E_ERROR , "An object of class %s cannot be cloned" , old_object -> ce -> name ) ; break ; } intern -> file_class = source -> file_class ; intern -> info_class = source -> info_class ; intern -> oth = source -> oth ; intern -> oth_handler = source -> oth_handler ; zend_objects_clone_members ( new_object , new_obj_val , old_object , handle TSRMLS_CC ) ; if ( intern -> oth_handler && intern -> oth_handler -> clone ) { intern -> oth_handler -> clone ( source , intern TSRMLS_CC ) ; } return new_obj_val ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static TranslationBlock * tb_find_slow ( CPUArchState * env , target_ulong pc , target_ulong cs_base , uint64_t flags ) { TranslationBlock * tb , * * ptb1 ; unsigned int h ; tb_page_addr_t phys_pc , phys_page1 ; target_ulong virt_page2 ; tcg_ctx . tb_ctx . tb_invalidated_flag = 0 ; phys_pc = get_page_addr_code ( env , pc ) ; phys_page1 = phys_pc & TARGET_PAGE_MASK ; h = tb_phys_hash_func ( phys_pc ) ; ptb1 = & tcg_ctx . tb_ctx . tb_phys_hash [ h ] ; for ( ; ; ) { tb = * ptb1 ; if ( ! tb ) goto not_found ; if ( tb -> pc == pc && tb -> page_addr [ 0 ] == phys_page1 && tb -> cs_base == cs_base && tb -> flags == flags ) { if ( tb -> page_addr [ 1 ] != - 1 ) { tb_page_addr_t phys_page2 ; virt_page2 = ( pc & TARGET_PAGE_MASK ) + TARGET_PAGE_SIZE ; phys_page2 = get_page_addr_code ( env , virt_page2 ) ; if ( tb -> page_addr [ 1 ] == phys_page2 ) goto found ; } else { goto found ; } } ptb1 = & tb -> phys_hash_next ; } not_found : tb = tb_gen_code ( env , pc , cs_base , flags , 0 ) ; found : if ( likely ( * ptb1 ) ) { * ptb1 = tb -> phys_hash_next ; tb -> phys_hash_next = tcg_ctx . tb_ctx . tb_phys_hash [ h ] ; tcg_ctx . tb_ctx . tb_phys_hash [ h ] = tb ; } env -> tb_jmp_cache [ tb_jmp_cache_hash_func ( pc ) ] = tb ; return tb ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int pefromupx ( const char * src , uint32_t ssize , char * dst , uint32_t * dsize , uint32_t ep , uint32_t upx0 , uint32_t upx1 , uint32_t * magic , uint32_t dend ) { char * imports , * sections = NULL , * pehdr = NULL , * newbuf ; unsigned int sectcnt = 0 , upd = 1 ; uint32_t realstuffsz = 0 , valign = 0 ; uint32_t foffset = 0xd0 + 0xf8 ; if ( ( dst == NULL ) || ( src == NULL ) ) return 0 ; while ( ( valign = magic [ sectcnt ++ ] ) ) { if ( ep - upx1 + valign <= ssize - 5 && src [ ep - upx1 + valign - 2 ] == '\x8d' && src [ ep - upx1 + valign - 1 ] == '\xbe' ) break ; } if ( ! valign && ep - upx1 + 0x80 < ssize - 8 ) { const char * pt = & src [ ep - upx1 + 0x80 ] ; cli_dbgmsg ( "UPX: bad magic - scanning for imports\n" ) ; while ( ( pt = cli_memstr ( pt , ssize - ( pt - src ) - 8 , "\x8d\xbe" , 2 ) ) ) { if ( pt [ 6 ] == '\x8b' && pt [ 7 ] == '\x07' ) { valign = pt - src + 2 - ep + upx1 ; break ; } pt ++ ; } } if ( valign && CLI_ISCONTAINED ( src , ssize , src + ep - upx1 + valign , 4 ) ) { imports = dst + cli_readint32 ( src + ep - upx1 + valign ) ; realstuffsz = imports - dst ; if ( realstuffsz >= * dsize ) { cli_dbgmsg ( "UPX: wrong realstuff size\n" ) ; } else { pehdr = imports ; while ( CLI_ISCONTAINED ( dst , * dsize , pehdr , 8 ) && cli_readint32 ( pehdr ) ) { pehdr += 8 ; while ( CLI_ISCONTAINED ( dst , * dsize , pehdr , 2 ) && * pehdr ) { pehdr ++ ; while ( CLI_ISCONTAINED ( dst , * dsize , pehdr , 2 ) && * pehdr ) pehdr ++ ; pehdr ++ ; } pehdr ++ ; } pehdr += 4 ; if ( ! ( sections = checkpe ( dst , * dsize , pehdr , & valign , & sectcnt ) ) ) pehdr = NULL ; } } if ( ! pehdr && dend > 0xf8 + 0x28 ) { cli_dbgmsg ( "UPX: no luck - scanning for PE\n" ) ; pehdr = & dst [ dend - 0xf8 - 0x28 ] ; while ( pehdr > dst ) { if ( ( sections = checkpe ( dst , * dsize , pehdr , & valign , & sectcnt ) ) ) break ; pehdr -- ; } if ( ! ( realstuffsz = pehdr - dst ) ) pehdr = NULL ; } if ( ! pehdr ) { uint32_t rebsz = PESALIGN ( dend , 0x1000 ) ; cli_dbgmsg ( "UPX: no luck - brutally crafing a reasonable PE\n" ) ; if ( ! ( newbuf = ( char * ) cli_calloc ( rebsz + 0x200 , sizeof ( char ) ) ) ) { cli_dbgmsg ( "UPX: malloc failed - giving up rebuild\n" ) ; return 0 ; } memcpy ( newbuf , HEADERS , 0xd0 ) ; memcpy ( newbuf + 0xd0 , FAKEPE , 0x120 ) ; memcpy ( newbuf + 0x200 , dst , dend ) ; memcpy ( dst , newbuf , dend + 0x200 ) ; free ( newbuf ) ; cli_writeint32 ( dst + 0xd0 + 0x50 , rebsz + 0x1000 ) ; cli_writeint32 ( dst + 0xd0 + 0x100 , rebsz ) ; cli_writeint32 ( dst + 0xd0 + 0x108 , rebsz ) ; * dsize = rebsz + 0x200 ; cli_dbgmsg ( "UPX: PE structure added to uncompressed data\n" ) ; return 1 ; } if ( ! sections ) sectcnt = 0 ; foffset = PESALIGN ( foffset + 0x28 * sectcnt , valign ) ; for ( upd = 0 ; upd < sectcnt ; upd ++ ) { uint32_t vsize = PESALIGN ( ( uint32_t ) cli_readint32 ( sections + 8 ) , valign ) ; uint32_t urva = PEALIGN ( ( uint32_t ) cli_readint32 ( sections + 12 ) , valign ) ; if ( ! CLI_ISCONTAINED ( upx0 , realstuffsz , urva , vsize ) ) { cli_dbgmsg ( "UPX: Sect %d out of bounds - giving up rebuild\n" , upd ) ; return 0 ; } cli_writeint32 ( sections + 8 , vsize ) ; cli_writeint32 ( sections + 12 , urva ) ; cli_writeint32 ( sections + 16 , vsize ) ; cli_writeint32 ( sections + 20 , foffset ) ; if ( foffset + vsize < foffset ) { return 0 ; } foffset += vsize ; sections += 0x28 ; } cli_writeint32 ( pehdr + 8 , 0x4d414c43 ) ; cli_writeint32 ( pehdr + 0x3c , valign ) ; if ( ! ( newbuf = ( char * ) cli_calloc ( foffset , sizeof ( char ) ) ) ) { cli_dbgmsg ( "UPX: malloc failed - giving up rebuild\n" ) ; return 0 ; } memcpy ( newbuf , HEADERS , 0xd0 ) ; memcpy ( newbuf + 0xd0 , pehdr , 0xf8 + 0x28 * sectcnt ) ; sections = pehdr + 0xf8 ; for ( upd = 0 ; upd < sectcnt ; upd ++ ) { uint32_t offset1 , offset2 , offset3 ; offset1 = ( uint32_t ) cli_readint32 ( sections + 20 ) ; offset2 = ( uint32_t ) cli_readint32 ( sections + 16 ) ; if ( offset1 > foffset || offset2 > foffset || offset1 + offset2 > foffset ) { free ( newbuf ) ; return 1 ; } offset3 = ( uint32_t ) cli_readint32 ( sections + 12 ) ; if ( offset3 - upx0 > * dsize ) { free ( newbuf ) ; return 1 ; } memcpy ( newbuf + offset1 , dst + offset3 - upx0 , offset2 ) ; sections += 0x28 ; } if ( foffset > * dsize + 8192 ) { cli_dbgmsg ( "UPX: wrong raw size - giving up rebuild\n" ) ; free ( newbuf ) ; return 0 ; } memcpy ( dst , newbuf , foffset ) ; * dsize = foffset ; free ( newbuf ) ; cli_dbgmsg ( "UPX: PE structure rebuilt from compressed file\n" ) ; return 1 ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void get_current_db ( ) { MYSQL_RES * res ; if ( one_database ) return ; my_free ( current_db ) ; current_db = NULL ; if ( ! mysql_query ( & mysql , "SELECT DATABASE()" ) && ( res = mysql_use_result ( & mysql ) ) ) { MYSQL_ROW row = mysql_fetch_row ( res ) ; if ( row && row [ 0 ] ) current_db = my_strdup ( row [ 0 ] , MYF ( MY_WME ) ) ; mysql_free_result ( res ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void sig_erase_complete_msg ( WINDOW_REC * window , const char * word , const char * line ) { SERVER_REC * server ; MODULE_SERVER_REC * mserver ; GSList * tmp ; server = line_get_server ( line ) ; if ( server == NULL ) { server = window -> active_server ; if ( server == NULL ) return ; } if ( * word == '\0' ) return ; completion_last_message_remove ( word ) ; if ( server != NULL ) { mserver = MODULE_DATA ( server ) ; for ( tmp = mserver -> lastmsgs ; tmp != NULL ; tmp = tmp -> next ) { LAST_MSG_REC * rec = tmp -> data ; if ( g_ascii_strcasecmp ( rec -> nick , word ) == 0 ) { last_msg_destroy ( & mserver -> lastmsgs , rec ) ; break ; } } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int send_xmessage_using_XAUTHORITY ( struct proclistlist * pll , int lokke , char * message ) { if ( lokke == pll -> length ) return 0 ; { char * xa_filename = get_pid_environ_val ( pll -> proclist [ lokke ] . pid , "XAUTHORITY" ) ; if ( xa_filename != NULL ) { if ( send_xmessage ( xa_filename , message ) == 1 ) { free ( xa_filename ) ; return 1 ; } } free ( xa_filename ) ; } return send_xmessage_using_XAUTHORITY ( pll , lokke + 1 , message ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int16 get_typlen ( Oid typid ) { HeapTuple tp ; tp = SearchSysCache1 ( TYPEOID , ObjectIdGetDatum ( typid ) ) ; if ( HeapTupleIsValid ( tp ) ) { Form_pg_type typtup = ( Form_pg_type ) GETSTRUCT ( tp ) ; int16 result ; result = typtup -> typlen ; ReleaseSysCache ( tp ) ; return result ; } else return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static unsigned long xmlHashComputeQKey ( xmlHashTablePtr table , const xmlChar * prefix , const xmlChar * name , const xmlChar * prefix2 , const xmlChar * name2 , const xmlChar * prefix3 , const xmlChar * name3 ) { unsigned long value = 0L ; char ch ; if ( prefix != NULL ) value += 30 * ( * prefix ) ; else value += 30 * ( * name ) ; if ( prefix != NULL ) { while ( ( ch = * prefix ++ ) != 0 ) { value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ch ) ; } value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ':' ) ; } if ( name != NULL ) { while ( ( ch = * name ++ ) != 0 ) { value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ch ) ; } } if ( prefix2 != NULL ) { while ( ( ch = * prefix2 ++ ) != 0 ) { value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ch ) ; } value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ':' ) ; } if ( name2 != NULL ) { while ( ( ch = * name2 ++ ) != 0 ) { value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ch ) ; } } if ( prefix3 != NULL ) { while ( ( ch = * prefix3 ++ ) != 0 ) { value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ch ) ; } value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ':' ) ; } if ( name3 != NULL ) { while ( ( ch = * name3 ++ ) != 0 ) { value = value ^ ( ( value << 5 ) + ( value >> 3 ) + ( unsigned long ) ch ) ; } } return ( value % table -> size ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void h245_setup_channels ( packet_info * pinfo , channel_info_t * upcoming_channel_lcl ) { gint * key ; GHashTable * rtp_dyn_payload = NULL ; struct srtp_info * dummy_srtp_info = NULL ; if ( ! upcoming_channel_lcl ) return ; if ( ! strcmp ( upcoming_channel_lcl -> data_type_str , "t38fax" ) ) { if ( upcoming_channel_lcl -> media_addr . addr . type != AT_NONE && upcoming_channel_lcl -> media_addr . port != 0 ) { t38_add_address ( pinfo , & upcoming_channel_lcl -> media_addr . addr , upcoming_channel_lcl -> media_addr . port , 0 , "H245" , pinfo -> fd -> num ) ; } return ; } if ( upcoming_channel_lcl -> rfc2198 > 0 ) { encoding_name_and_rate_t * encoding_name_and_rate = wmem_new ( wmem_file_scope ( ) , encoding_name_and_rate_t ) ; rtp_dyn_payload = g_hash_table_new ( g_int_hash , g_int_equal ) ; encoding_name_and_rate -> encoding_name = wmem_strdup ( wmem_file_scope ( ) , "red" ) ; encoding_name_and_rate -> sample_rate = 8000 ; key = wmem_new ( wmem_file_scope ( ) , gint ) ; * key = upcoming_channel_lcl -> rfc2198 ; g_hash_table_insert ( rtp_dyn_payload , key , encoding_name_and_rate ) ; } if ( upcoming_channel_lcl -> srtp_flag ) { dummy_srtp_info = wmem_new0 ( wmem_file_scope ( ) , struct srtp_info ) ; } if ( upcoming_channel_lcl -> media_addr . addr . type != AT_NONE && upcoming_channel_lcl -> media_addr . port != 0 ) { srtp_add_address ( pinfo , & upcoming_channel_lcl -> media_addr . addr , upcoming_channel_lcl -> media_addr . port , 0 , "H245" , pinfo -> fd -> num , upcoming_channel_lcl -> is_video , rtp_dyn_payload , dummy_srtp_info ) ; } if ( upcoming_channel_lcl -> media_control_addr . addr . type != AT_NONE && upcoming_channel_lcl -> media_control_addr . port != 0 && rtcp_handle ) { srtcp_add_address ( pinfo , & upcoming_channel_lcl -> media_control_addr . addr , upcoming_channel_lcl -> media_control_addr . port , 0 , "H245" , pinfo -> fd -> num , dummy_srtp_info ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static PyObject * get_value ( PyObject * self , const char * buffer , int * position , int type , int max , PyObject * as_class , unsigned char tz_aware , unsigned char uuid_subtype ) { struct module_state * state = GETSTATE ( self ) ; PyObject * value ; PyObject * error ; switch ( type ) { case 1 : { double d ; if ( max < 8 ) { goto invalid ; } memcpy ( & d , buffer + * position , 8 ) ; value = PyFloat_FromDouble ( d ) ; if ( ! value ) { return NULL ; } * position += 8 ; break ; } case 2 : case 14 : { int value_length = ( ( int * ) ( buffer + * position ) ) [ 0 ] - 1 ; if ( max < value_length ) { goto invalid ; } * position += 4 ; value = PyUnicode_DecodeUTF8 ( buffer + * position , value_length , "strict" ) ; if ( ! value ) { return NULL ; } * position += value_length + 1 ; break ; } case 3 : { int size ; memcpy ( & size , buffer + * position , 4 ) ; if ( max < size ) { goto invalid ; } value = elements_to_dict ( self , buffer + * position + 4 , size - 5 , as_class , tz_aware , uuid_subtype ) ; if ( ! value ) { return NULL ; } if ( strcmp ( buffer + * position + 5 , "$ref" ) == 0 ) { PyObject * dbref ; PyObject * collection = PyDict_GetItemString ( value , "$ref" ) ; PyObject * id = PyDict_GetItemString ( value , "$id" ) ; PyObject * database = PyDict_GetItemString ( value , "$db" ) ; Py_INCREF ( collection ) ; PyDict_DelItemString ( value , "$ref" ) ; Py_INCREF ( id ) ; PyDict_DelItemString ( value , "$id" ) ; if ( database == NULL ) { database = Py_None ; Py_INCREF ( database ) ; } else { Py_INCREF ( database ) ; PyDict_DelItemString ( value , "$db" ) ; } dbref = PyObject_CallFunctionObjArgs ( state -> DBRef , collection , id , database , value , NULL ) ; Py_DECREF ( value ) ; value = dbref ; Py_DECREF ( id ) ; Py_DECREF ( collection ) ; Py_DECREF ( database ) ; if ( ! value ) { return NULL ; } } * position += size ; break ; } case 4 : { int size , end ; memcpy ( & size , buffer + * position , 4 ) ; if ( max < size ) { goto invalid ; } end = * position + size - 1 ; * position += 4 ; value = PyList_New ( 0 ) ; if ( ! value ) { return NULL ; } while ( * position < end ) { PyObject * to_append ; int type = ( int ) buffer [ ( * position ) ++ ] ; int key_size = strlen ( buffer + * position ) ; * position += key_size + 1 ; to_append = get_value ( self , buffer , position , type , max - key_size , as_class , tz_aware , uuid_subtype ) ; if ( ! to_append ) { Py_DECREF ( value ) ; return NULL ; } PyList_Append ( value , to_append ) ; Py_DECREF ( to_append ) ; } ( * position ) ++ ; break ; } case 5 : { PyObject * data ; PyObject * st ; int length , subtype ; memcpy ( & length , buffer + * position , 4 ) ; if ( max < length ) { goto invalid ; } subtype = ( unsigned char ) buffer [ * position + 4 ] ; # if PY_MAJOR_VERSION >= 3 if ( subtype == 0 ) { value = PyBytes_FromStringAndSize ( buffer + * position + 5 , length ) ; * position += length + 5 ; break ; } if ( subtype == 2 ) { data = PyBytes_FromStringAndSize ( buffer + * position + 9 , length - 4 ) ; } else { data = PyBytes_FromStringAndSize ( buffer + * position + 5 , length ) ; } # else if ( subtype == 2 ) { data = PyString_FromStringAndSize ( buffer + * position + 9 , length - 4 ) ; } else { data = PyString_FromStringAndSize ( buffer + * position + 5 , length ) ; } # endif if ( ! data ) { return NULL ; } if ( ( subtype == 3 || subtype == 4 ) && state -> UUID ) { PyObject * kwargs ; PyObject * args = PyTuple_New ( 0 ) ; if ( ! args ) { Py_DECREF ( data ) ; return NULL ; } kwargs = PyDict_New ( ) ; if ( ! kwargs ) { Py_DECREF ( data ) ; Py_DECREF ( args ) ; return NULL ; } assert ( length == 16 ) ; if ( uuid_subtype == CSHARP_LEGACY ) { PyDict_SetItemString ( kwargs , "bytes_le" , data ) ; } else { if ( uuid_subtype == JAVA_LEGACY ) { char big_endian [ 16 ] ; _fix_java ( buffer + * position + 5 , big_endian ) ; Py_DECREF ( data ) ; # if PY_MAJOR_VERSION >= 3 data = PyBytes_FromStringAndSize ( big_endian , length ) ; # else data = PyString_FromStringAndSize ( big_endian , length ) ; # endif } PyDict_SetItemString ( kwargs , "bytes" , data ) ; } value = PyObject_Call ( state -> UUID , args , kwargs ) ; Py_DECREF ( args ) ; Py_DECREF ( kwargs ) ; Py_DECREF ( data ) ; if ( ! value ) { return NULL ; } * position += length + 5 ; break ; } # if PY_MAJOR_VERSION >= 3 st = PyLong_FromLong ( subtype ) ; # else st = PyInt_FromLong ( subtype ) ; # endif if ( ! st ) { Py_DECREF ( data ) ; return NULL ; } value = PyObject_CallFunctionObjArgs ( state -> Binary , data , st , NULL ) ; Py_DECREF ( st ) ; Py_DECREF ( data ) ; if ( ! value ) { return NULL ; } * position += length + 5 ; break ; } case 6 : case 10 : { value = Py_None ; Py_INCREF ( value ) ; break ; } case 7 : { if ( max < 12 ) { goto invalid ; } # if PY_MAJOR_VERSION >= 3 value = PyObject_CallFunction ( state -> ObjectId , "y#" , buffer + * position , 12 ) ; # else value = PyObject_CallFunction ( state -> ObjectId , "s#" , buffer + * position , 12 ) ; # endif if ( ! value ) { return NULL ; } * position += 12 ; break ; } case 8 : { value = buffer [ ( * position ) ++ ] ? Py_True : Py_False ; Py_INCREF ( value ) ; break ; } case 9 : { PyObject * naive ; PyObject * replace ; PyObject * args ; PyObject * kwargs ; if ( max < 8 ) { goto invalid ; } naive = datetime_from_millis ( * ( long long * ) ( buffer + * position ) ) ; * position += 8 ; if ( ! tz_aware ) { value = naive ; break ; } if ( ! naive ) { return NULL ; } replace = PyObject_GetAttrString ( naive , "replace" ) ; Py_DECREF ( naive ) ; if ( ! replace ) { return NULL ; } args = PyTuple_New ( 0 ) ; if ( ! args ) { Py_DECREF ( replace ) ; return NULL ; } kwargs = PyDict_New ( ) ; if ( ! kwargs ) { Py_DECREF ( replace ) ; Py_DECREF ( args ) ; return NULL ; } if ( PyDict_SetItemString ( kwargs , "tzinfo" , state -> UTC ) == - 1 ) { Py_DECREF ( replace ) ; Py_DECREF ( args ) ; Py_DECREF ( kwargs ) ; return NULL ; } value = PyObject_Call ( replace , args , kwargs ) ; Py_DECREF ( replace ) ; Py_DECREF ( args ) ; Py_DECREF ( kwargs ) ; break ; } case 11 : { PyObject * pattern ; int flags_length , flags , i ; int pattern_length = strlen ( buffer + * position ) ; if ( max < pattern_length ) { goto invalid ; } pattern = PyUnicode_DecodeUTF8 ( buffer + * position , pattern_length , "strict" ) ; if ( ! pattern ) { return NULL ; } * position += pattern_length + 1 ; flags_length = strlen ( buffer + * position ) ; if ( max < pattern_length + flags_length ) { Py_DECREF ( pattern ) ; goto invalid ; } flags = 0 ; for ( i = 0 ; i < flags_length ; i ++ ) { if ( buffer [ * position + i ] == 'i' ) { flags |= 2 ; } else if ( buffer [ * position + i ] == 'l' ) { flags |= 4 ; } else if ( buffer [ * position + i ] == 'm' ) { flags |= 8 ; } else if ( buffer [ * position + i ] == 's' ) { flags |= 16 ; } else if ( buffer [ * position + i ] == 'u' ) { flags |= 32 ; } else if ( buffer [ * position + i ] == 'x' ) { flags |= 64 ; } } * position += flags_length + 1 ; value = PyObject_CallFunction ( state -> RECompile , "Oi" , pattern , flags ) ; Py_DECREF ( pattern ) ; break ; } case 12 : { int collection_length ; PyObject * collection ; PyObject * id ; * position += 4 ; collection_length = strlen ( buffer + * position ) ; if ( max < collection_length ) { goto invalid ; } collection = PyUnicode_DecodeUTF8 ( buffer + * position , collection_length , "strict" ) ; if ( ! collection ) { return NULL ; } * position += collection_length + 1 ; if ( max < collection_length + 12 ) { Py_DECREF ( collection ) ; goto invalid ; } id = PyObject_CallFunction ( state -> ObjectId , "s#" , buffer + * position , 12 ) ; if ( ! id ) { Py_DECREF ( collection ) ; return NULL ; } * position += 12 ; value = PyObject_CallFunctionObjArgs ( state -> DBRef , collection , id , NULL ) ; Py_DECREF ( collection ) ; Py_DECREF ( id ) ; break ; } case 13 : { PyObject * code ; int value_length = ( ( int * ) ( buffer + * position ) ) [ 0 ] - 1 ; if ( max < value_length ) { goto invalid ; } * position += 4 ; code = PyUnicode_DecodeUTF8 ( buffer + * position , value_length , "strict" ) ; if ( ! code ) { return NULL ; } * position += value_length + 1 ; value = PyObject_CallFunctionObjArgs ( state -> Code , code , NULL , NULL ) ; Py_DECREF ( code ) ; break ; } case 15 : { int code_length , scope_size ; PyObject * code ; PyObject * scope ; * position += 8 ; code_length = strlen ( buffer + * position ) ; if ( max < 8 + code_length ) { goto invalid ; } code = PyUnicode_DecodeUTF8 ( buffer + * position , code_length , "strict" ) ; if ( ! code ) { return NULL ; } * position += code_length + 1 ; memcpy ( & scope_size , buffer + * position , 4 ) ; scope = elements_to_dict ( self , buffer + * position + 4 , scope_size - 5 , ( PyObject * ) & PyDict_Type , tz_aware , uuid_subtype ) ; if ( ! scope ) { Py_DECREF ( code ) ; return NULL ; } * position += scope_size ; value = PyObject_CallFunctionObjArgs ( state -> Code , code , scope , NULL ) ; Py_DECREF ( code ) ; Py_DECREF ( scope ) ; break ; } case 16 : { int i ; if ( max < 4 ) { goto invalid ; } memcpy ( & i , buffer + * position , 4 ) ; # if PY_MAJOR_VERSION >= 3 value = PyLong_FromLong ( i ) ; # else value = PyInt_FromLong ( i ) ; # endif if ( ! value ) { return NULL ; } * position += 4 ; break ; } case 17 : { unsigned int time , inc ; if ( max < 8 ) { goto invalid ; } memcpy ( & inc , buffer + * position , 4 ) ; memcpy ( & time , buffer + * position + 4 , 4 ) ; value = PyObject_CallFunction ( state -> Timestamp , "II" , time , inc ) ; if ( ! value ) { return NULL ; } * position += 8 ; break ; } case 18 : { long long ll ; if ( max < 8 ) { goto invalid ; } memcpy ( & ll , buffer + * position , 8 ) ; value = PyLong_FromLongLong ( ll ) ; if ( ! value ) { return NULL ; } * position += 8 ; break ; } case - 1 : { value = PyObject_CallFunctionObjArgs ( state -> MinKey , NULL ) ; break ; } case 127 : { value = PyObject_CallFunctionObjArgs ( state -> MaxKey , NULL ) ; break ; } default : { PyObject * InvalidDocument = _error ( "InvalidDocument" ) ; PyErr_SetString ( InvalidDocument , "no c decoder for this type yet" ) ; Py_DECREF ( InvalidDocument ) ; return NULL ; } } return value ; invalid : error = _error ( "InvalidBSON" ) ; PyErr_SetNone ( error ) ; Py_DECREF ( error ) ; return NULL ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int kvm_put_one_msr ( X86CPU * cpu , int index , uint64_t value ) { kvm_msr_buf_reset ( cpu ) ; kvm_msr_entry_add ( cpu , index , value ) ; return kvm_vcpu_ioctl ( CPU ( cpu ) , KVM_SET_MSRS , cpu -> kvm_msr_buf ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int ieee80211_radiotap_iterator_next ( struct ieee80211_radiotap_iterator * iterator ) { while ( 1 ) { int hit = 0 ; int pad , align , size , subns ; guint32 oui ; if ( ( iterator -> _arg_index % 32 ) == IEEE80211_RADIOTAP_EXT && ! ( iterator -> _bitmap_shifter & 1 ) ) return - ENOENT ; if ( ! ( iterator -> _bitmap_shifter & 1 ) ) goto next_entry ; switch ( iterator -> _arg_index % 32 ) { case IEEE80211_RADIOTAP_RADIOTAP_NAMESPACE : case IEEE80211_RADIOTAP_EXT : align = 1 ; size = 0 ; break ; case IEEE80211_RADIOTAP_VENDOR_NAMESPACE : align = 2 ; size = 6 ; break ; default : # ifdef RADIOTAP_SUPPORT_OVERRIDES if ( find_override ( iterator , & align , & size ) ) { } else # endif if ( ! iterator -> current_namespace || iterator -> _arg_index >= iterator -> current_namespace -> n_bits ) { if ( iterator -> current_namespace == & radiotap_ns ) return - ENOENT ; align = 0 ; } else { align = iterator -> current_namespace -> align_size [ iterator -> _arg_index ] . align ; size = iterator -> current_namespace -> align_size [ iterator -> _arg_index ] . size ; } if ( ! align ) { iterator -> _arg = iterator -> _next_ns_data ; iterator -> current_namespace = NULL ; goto next_entry ; } break ; } pad = ( int ) ( ( iterator -> _arg - ( unsigned char * ) iterator -> _rtheader ) & ( align - 1 ) ) ; if ( pad ) iterator -> _arg += align - pad ; if ( iterator -> _arg_index % 32 == IEEE80211_RADIOTAP_VENDOR_NAMESPACE ) { int vnslen ; if ( ! ITERATOR_VALID ( iterator , size ) ) return - EINVAL ; oui = ( * iterator -> _arg << 16 ) | ( * ( iterator -> _arg + 1 ) << 8 ) | * ( iterator -> _arg + 2 ) ; subns = * ( iterator -> _arg + 3 ) ; find_ns ( iterator , oui , subns ) ; vnslen = get_unaligned_le16 ( iterator -> _arg + 4 ) ; iterator -> _next_ns_data = iterator -> _arg + size + vnslen ; if ( ! iterator -> current_namespace ) size += vnslen ; } iterator -> this_arg_index = iterator -> _arg_index ; iterator -> this_arg = iterator -> _arg ; iterator -> this_arg_size = size ; iterator -> _arg += size ; if ( ! ITERATOR_VALID ( iterator , 0 ) ) return - EINVAL ; switch ( iterator -> _arg_index % 32 ) { case IEEE80211_RADIOTAP_VENDOR_NAMESPACE : iterator -> _reset_on_ext = 1 ; iterator -> is_radiotap_ns = 0 ; iterator -> this_arg_index = IEEE80211_RADIOTAP_VENDOR_NAMESPACE ; if ( ! iterator -> current_namespace ) hit = 1 ; goto next_entry ; case IEEE80211_RADIOTAP_RADIOTAP_NAMESPACE : iterator -> _reset_on_ext = 1 ; iterator -> current_namespace = & radiotap_ns ; iterator -> is_radiotap_ns = 1 ; goto next_entry ; case IEEE80211_RADIOTAP_EXT : iterator -> _bitmap_shifter = get_unaligned_le32 ( iterator -> _next_bitmap ) ; iterator -> _next_bitmap ++ ; if ( iterator -> _reset_on_ext ) iterator -> _arg_index = 0 ; else iterator -> _arg_index ++ ; iterator -> _reset_on_ext = 0 ; break ; default : hit = 1 ; next_entry : iterator -> _bitmap_shifter >>= 1 ; iterator -> _arg_index ++ ; } if ( hit ) return 0 ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void splay_move_to_root ( clump_t * x , gs_ref_memory_t * mem ) { clump_t * y , * z ; if ( x == NULL ) return ; while ( ( y = x -> parent ) != NULL ) { if ( ( z = y -> parent ) != NULL ) { x -> parent = z -> parent ; if ( x -> parent ) { if ( x -> parent -> left == z ) x -> parent -> left = x ; else x -> parent -> right = x ; } y -> parent = x ; if ( y -> left == x ) { if ( z -> left == y ) { y -> left = x -> right ; if ( y -> left ) y -> left -> parent = y ; z -> left = y -> right ; if ( z -> left ) z -> left -> parent = z ; y -> right = z ; z -> parent = y ; } else { z -> right = x -> left ; if ( z -> right ) z -> right -> parent = z ; y -> left = x -> right ; if ( y -> left ) y -> left -> parent = y ; x -> left = z ; z -> parent = x ; } x -> right = y ; } else { if ( z -> left == y ) { y -> right = x -> left ; if ( y -> right ) y -> right -> parent = y ; z -> left = x -> right ; if ( z -> left ) z -> left -> parent = z ; x -> right = z ; z -> parent = x ; } else { z -> right = y -> left ; if ( z -> right ) z -> right -> parent = z ; y -> right = x -> left ; if ( y -> right ) y -> right -> parent = y ; y -> left = z ; z -> parent = y ; } x -> left = y ; } } else { x -> parent = NULL ; y -> parent = x ; if ( y -> left == x ) { y -> left = x -> right ; if ( y -> left ) y -> left -> parent = y ; x -> right = y ; } else { y -> right = x -> left ; if ( y -> right ) y -> right -> parent = y ; x -> left = y ; } } } mem -> root = x ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int read_code_table ( CLLCContext * ctx , GetBitContext * gb , VLC * vlc ) { uint8_t symbols [ 256 ] ; uint8_t bits [ 256 ] ; uint16_t codes [ 256 ] ; int num_lens , num_codes , num_codes_sum , prefix ; int i , j , count ; prefix = 0 ; count = 0 ; num_codes_sum = 0 ; num_lens = get_bits ( gb , 5 ) ; for ( i = 0 ; i < num_lens ; i ++ ) { num_codes = get_bits ( gb , 9 ) ; num_codes_sum += num_codes ; if ( num_codes_sum > 256 ) { vlc -> table = NULL ; av_log ( ctx -> avctx , AV_LOG_ERROR , "Too many VLCs (%d) to be read.\n" , num_codes_sum ) ; return AVERROR_INVALIDDATA ; } for ( j = 0 ; j < num_codes ; j ++ ) { symbols [ count ] = get_bits ( gb , 8 ) ; bits [ count ] = i + 1 ; codes [ count ] = prefix ++ ; count ++ ; } prefix <<= 1 ; } return ff_init_vlc_sparse ( vlc , 7 , count , bits , 1 , 1 , codes , 2 , 2 , symbols , 1 , 1 , 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int fourcc_is_ivf ( const char detect [ 4 ] ) { if ( memcmp ( detect , "DKIF" , 4 ) == 0 ) { return 1 ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
fz_colorspace * fz_new_icc_colorspace ( fz_context * ctx , const char * name , int num , fz_buffer * buf ) { # ifdef NO_ICC fz_throw ( ctx , FZ_ERROR_GENERIC , "ICC Profiles not supported in NO_ICC build" ) ; # else fz_colorspace * cs = NULL ; fz_iccprofile * profile ; int is_lab = 0 ; enum fz_colorspace_type type = FZ_COLORSPACE_NONE ; int flags = FZ_COLORSPACE_IS_ICC ; profile = fz_malloc_struct ( ctx , fz_iccprofile ) ; fz_try ( ctx ) { if ( buf == NULL ) { size_t size ; const unsigned char * data ; data = fz_lookup_icc ( ctx , name , & size ) ; profile -> buffer = fz_new_buffer_from_shared_data ( ctx , data , size ) ; is_lab = ( strcmp ( name , FZ_ICC_PROFILE_LAB ) == 0 ) ; profile -> bgr = ( strcmp ( name , FZ_ICC_PROFILE_BGR ) == 0 ) ; flags |= FZ_COLORSPACE_IS_DEVICE ; } else { profile -> buffer = fz_keep_buffer ( ctx , buf ) ; } fz_cmm_init_profile ( ctx , profile ) ; if ( num != 0 && num != profile -> num_devcomp ) { fz_drop_buffer ( ctx , profile -> buffer ) ; fz_cmm_fin_profile ( ctx , profile ) ; fz_free ( ctx , profile ) ; break ; } fz_md5_icc ( ctx , profile ) ; switch ( profile -> num_devcomp ) { default : type = FZ_COLORSPACE_SEPARATION ; break ; case 1 : type = FZ_COLORSPACE_GRAY ; break ; case 3 : if ( is_lab ) type = FZ_COLORSPACE_LAB ; else if ( profile -> bgr ) type = FZ_COLORSPACE_BGR ; else type = FZ_COLORSPACE_RGB ; break ; case 4 : type = FZ_COLORSPACE_CMYK ; break ; } cs = fz_new_colorspace ( ctx , name , type , flags , profile -> num_devcomp , NULL , NULL , NULL , is_lab ? clamp_lab_icc : clamp_default_icc , free_icc , profile , sizeof ( profile ) ) ; switch ( profile -> num_devcomp ) { case 1 : fz_colorspace_name_colorant ( ctx , cs , 0 , "Gray" ) ; break ; case 3 : if ( is_lab ) { fz_colorspace_name_colorant ( ctx , cs , 0 , "L*" ) ; fz_colorspace_name_colorant ( ctx , cs , 1 , "a*" ) ; fz_colorspace_name_colorant ( ctx , cs , 2 , "b*" ) ; } else { fz_colorspace_name_colorant ( ctx , cs , profile -> bgr ? 2 : 0 , "Red" ) ; fz_colorspace_name_colorant ( ctx , cs , 1 , "Green" ) ; fz_colorspace_name_colorant ( ctx , cs , profile -> bgr ? 0 : 2 , "Blue" ) ; } break ; case 4 : fz_colorspace_name_colorant ( ctx , cs , 0 , "Cyan" ) ; fz_colorspace_name_colorant ( ctx , cs , 1 , "Magenta" ) ; fz_colorspace_name_colorant ( ctx , cs , 2 , "Yellow" ) ; fz_colorspace_name_colorant ( ctx , cs , 3 , "Black" ) ; break ; } } fz_catch ( ctx ) { fz_drop_buffer ( ctx , profile -> buffer ) ; fz_cmm_fin_profile ( ctx , profile ) ; fz_free ( ctx , profile ) ; } return cs ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
void xmlListReverseWalk ( xmlListPtr l , xmlListWalker walker , const void * user ) { xmlLinkPtr lk ; if ( ( l == NULL ) || ( walker == NULL ) ) return ; for ( lk = l -> sentinel -> prev ; lk != l -> sentinel ; lk = lk -> prev ) { if ( ( walker ( lk -> data , user ) ) == 0 ) break ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExtensionWelcomeNotificationTest , WelcomeNotificationPreviouslyDismissedSyncedAndLocal ) { StartPreferenceSyncing ( ) ; SetBooleanPref ( prefs : : kWelcomeNotificationDismissed , true ) ; SetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal , true ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; ShowChromeNowNotification ( ) ; EXPECT_EQ ( message_center ( ) -> add_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> remove_notification_calls ( ) , 0 ) ; EXPECT_EQ ( message_center ( ) -> notifications_with_shown_as_popup ( ) , 0 ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissed ) ) ; EXPECT_TRUE ( GetBooleanPref ( prefs : : kWelcomeNotificationDismissedLocal ) ) ; EXPECT_FALSE ( GetBooleanPref ( prefs : : kWelcomeNotificationPreviouslyPoppedUp ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void arabic_joining ( hb_buffer_t * buffer ) { unsigned int count = buffer -> len ; hb_glyph_info_t * info = buffer -> info ; unsigned int prev = ( unsigned int ) - 1 , state = 0 ; for ( unsigned int i = 0 ; i < buffer -> context_len [ 0 ] ; i ++ ) { unsigned int this_type = get_joining_type ( buffer -> context [ 0 ] [ i ] , buffer -> unicode -> general_category ( buffer -> context [ 0 ] [ i ] ) ) ; if ( unlikely ( this_type == JOINING_TYPE_T ) ) continue ; const arabic_state_table_entry * entry = & arabic_state_table [ state ] [ this_type ] ; state = entry -> next_state ; break ; } for ( unsigned int i = 0 ; i < count ; i ++ ) { unsigned int this_type = get_joining_type ( info [ i ] . codepoint , _hb_glyph_info_get_general_category ( & info [ i ] ) ) ; if ( unlikely ( this_type == JOINING_TYPE_T ) ) { info [ i ] . arabic_shaping_action ( ) = NONE ; continue ; } const arabic_state_table_entry * entry = & arabic_state_table [ state ] [ this_type ] ; if ( entry -> prev_action != NONE && prev != ( unsigned int ) - 1 ) info [ prev ] . arabic_shaping_action ( ) = entry -> prev_action ; info [ i ] . arabic_shaping_action ( ) = entry -> curr_action ; prev = i ; state = entry -> next_state ; } for ( unsigned int i = 0 ; i < buffer -> context_len [ 1 ] ; i ++ ) { unsigned int this_type = get_joining_type ( buffer -> context [ 1 ] [ i ] , buffer -> unicode -> general_category ( buffer -> context [ 1 ] [ i ] ) ) ; if ( unlikely ( this_type == JOINING_TYPE_T ) ) continue ; const arabic_state_table_entry * entry = & arabic_state_table [ state ] [ this_type ] ; if ( entry -> prev_action != NONE && prev != ( unsigned int ) - 1 ) info [ prev ] . arabic_shaping_action ( ) = entry -> prev_action ; break ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int set_file_attrs ( const char * fname , struct file_struct * file , stat_x * sxp , const char * fnamecmp , int flags ) { int updated = 0 ; stat_x sx2 ; int change_uid , change_gid ; mode_t new_mode = file -> mode ; int inherit ; if ( ! sxp ) { if ( dry_run ) return 1 ; if ( link_stat ( fname , & sx2 . st , 0 ) < 0 ) { rsyserr ( FERROR_XFER , errno , "stat %s failed" , full_fname ( fname ) ) ; return 0 ; } init_stat_x ( & sx2 ) ; sxp = & sx2 ; inherit = ! preserve_perms ; } else inherit = ! preserve_perms && file -> flags & FLAG_DIR_CREATED ; if ( inherit && S_ISDIR ( new_mode ) && sxp -> st . st_mode & S_ISGID ) { new_mode |= S_ISGID ; } if ( daemon_chmod_modes && ! S_ISLNK ( new_mode ) ) new_mode = tweak_mode ( new_mode , daemon_chmod_modes ) ; # ifdef SUPPORT_ACLS if ( preserve_acls && ! S_ISLNK ( file -> mode ) && ! ACL_READY ( * sxp ) ) get_acl ( fname , sxp ) ; # endif change_uid = am_root && uid_ndx && sxp -> st . st_uid != ( uid_t ) F_OWNER ( file ) ; change_gid = gid_ndx && ! ( file -> flags & FLAG_SKIP_GROUP ) && sxp -> st . st_gid != ( gid_t ) F_GROUP ( file ) ; # ifndef CAN_CHOWN_SYMLINK if ( S_ISLNK ( sxp -> st . st_mode ) ) { ; } else # endif if ( change_uid || change_gid ) { if ( DEBUG_GTE ( OWN , 1 ) ) { if ( change_uid ) { rprintf ( FINFO , "set uid of %s from %u to %u\n" , fname , ( unsigned ) sxp -> st . st_uid , F_OWNER ( file ) ) ; } if ( change_gid ) { rprintf ( FINFO , "set gid of %s from %u to %u\n" , fname , ( unsigned ) sxp -> st . st_gid , F_GROUP ( file ) ) ; } } if ( am_root >= 0 ) { uid_t uid = change_uid ? ( uid_t ) F_OWNER ( file ) : sxp -> st . st_uid ; gid_t gid = change_gid ? ( gid_t ) F_GROUP ( file ) : sxp -> st . st_gid ; if ( do_lchown ( fname , uid , gid ) != 0 ) { rsyserr ( FERROR_XFER , errno , "%s %s failed" , change_uid ? "chown" : "chgrp" , full_fname ( fname ) ) ; goto cleanup ; } if ( uid == ( uid_t ) - 1 && sxp -> st . st_uid != ( uid_t ) - 1 ) rprintf ( FERROR_XFER , "uid 4294967295 (-1) is impossible to set on %s\n" , full_fname ( fname ) ) ; if ( gid == ( gid_t ) - 1 && sxp -> st . st_gid != ( gid_t ) - 1 ) rprintf ( FERROR_XFER , "gid 4294967295 (-1) is impossible to set on %s\n" , full_fname ( fname ) ) ; if ( sxp -> st . st_mode & ( S_ISUID | S_ISGID ) ) { link_stat ( fname , & sxp -> st , keep_dirlinks && S_ISDIR ( sxp -> st . st_mode ) ) ; } } updated = 1 ; } # ifdef SUPPORT_XATTRS if ( am_root < 0 ) set_stat_xattr ( fname , file , new_mode ) ; if ( preserve_xattrs && fnamecmp ) set_xattr ( fname , file , fnamecmp , sxp ) ; # endif if ( ! preserve_times || ( ! ( preserve_times & PRESERVE_DIR_TIMES ) && S_ISDIR ( sxp -> st . st_mode ) ) || ( ! ( preserve_times & PRESERVE_LINK_TIMES ) && S_ISLNK ( sxp -> st . st_mode ) ) ) flags |= ATTRS_SKIP_MTIME ; if ( ! ( flags & ATTRS_SKIP_MTIME ) && ( sxp -> st . st_mtime != file -> modtime # ifdef ST_MTIME_NSEC || ( NSEC_BUMP ( file ) && ( uint32 ) sxp -> st . ST_MTIME_NSEC != F_MOD_NSEC ( file ) ) # endif ) ) { int ret = set_modtime ( fname , file -> modtime , F_MOD_NSEC ( file ) , sxp -> st . st_mode ) ; if ( ret < 0 ) { rsyserr ( FERROR_XFER , errno , "failed to set times on %s" , full_fname ( fname ) ) ; goto cleanup ; } if ( ret == 0 ) updated = 1 ; else file -> flags |= FLAG_TIME_FAILED ; } # ifdef SUPPORT_ACLS if ( preserve_acls && ! S_ISLNK ( new_mode ) ) { if ( set_acl ( fname , file , sxp , new_mode ) > 0 ) updated = 1 ; } # endif # ifdef HAVE_CHMOD if ( ! BITS_EQUAL ( sxp -> st . st_mode , new_mode , CHMOD_BITS ) ) { int ret = am_root < 0 ? 0 : do_chmod ( fname , new_mode ) ; if ( ret < 0 ) { rsyserr ( FERROR_XFER , errno , "failed to set permissions on %s" , full_fname ( fname ) ) ; goto cleanup ; } if ( ret == 0 ) updated = 1 ; } # endif if ( INFO_GTE ( NAME , 2 ) && flags & ATTRS_REPORT ) { if ( updated ) rprintf ( FCLIENT , "%s\n" , fname ) ; else rprintf ( FCLIENT , "%s is uptodate\n" , fname ) ; } cleanup : if ( sxp == & sx2 ) free_stat_x ( & sx2 ) ; return updated ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( SplFileObject , fwrite ) { spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; char * str ; int str_len ; long length = 0 ; if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "s|l" , & str , & str_len , & length ) == FAILURE ) { return ; } if ( ZEND_NUM_ARGS ( ) > 1 ) { str_len = MAX ( 0 , MIN ( length , str_len ) ) ; } if ( ! str_len ) { RETURN_LONG ( 0 ) ; } RETURN_LONG ( php_stream_write ( intern -> u . file . stream , str , str_len ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int ipvideo_decode_block_opcode_0x9 ( IpvideoContext * s , AVFrame * frame ) { int x , y ; unsigned char P [ 4 ] ; bytestream2_get_buffer ( & s -> stream_ptr , P , 4 ) ; if ( P [ 0 ] <= P [ 1 ] ) { if ( P [ 2 ] <= P [ 3 ] ) { for ( y = 0 ; y < 8 ; y ++ ) { int flags = bytestream2_get_le16 ( & s -> stream_ptr ) ; for ( x = 0 ; x < 8 ; x ++ , flags >>= 2 ) * s -> pixel_ptr ++ = P [ flags & 0x03 ] ; s -> pixel_ptr += s -> line_inc ; } } else { uint32_t flags ; flags = bytestream2_get_le32 ( & s -> stream_ptr ) ; for ( y = 0 ; y < 8 ; y += 2 ) { for ( x = 0 ; x < 8 ; x += 2 , flags >>= 2 ) { s -> pixel_ptr [ x ] = s -> pixel_ptr [ x + 1 ] = s -> pixel_ptr [ x + s -> stride ] = s -> pixel_ptr [ x + 1 + s -> stride ] = P [ flags & 0x03 ] ; } s -> pixel_ptr += s -> stride * 2 ; } } } else { uint64_t flags ; flags = bytestream2_get_le64 ( & s -> stream_ptr ) ; if ( P [ 2 ] <= P [ 3 ] ) { for ( y = 0 ; y < 8 ; y ++ ) { for ( x = 0 ; x < 8 ; x += 2 , flags >>= 2 ) { s -> pixel_ptr [ x ] = s -> pixel_ptr [ x + 1 ] = P [ flags & 0x03 ] ; } s -> pixel_ptr += s -> stride ; } } else { for ( y = 0 ; y < 8 ; y += 2 ) { for ( x = 0 ; x < 8 ; x ++ , flags >>= 2 ) { s -> pixel_ptr [ x ] = s -> pixel_ptr [ x + s -> stride ] = P [ flags & 0x03 ] ; } s -> pixel_ptr += s -> stride * 2 ; } } } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void pdf_copy_pattern_gstate ( fz_context * ctx , pdf_gstate * gs , const pdf_gstate * old ) { gs -> ctm = old -> ctm ; pdf_drop_font ( ctx , gs -> text . font ) ; gs -> text . font = pdf_keep_font ( ctx , old -> text . font ) ; pdf_drop_xobject ( ctx , gs -> softmask ) ; gs -> softmask = pdf_keep_xobject ( ctx , old -> softmask ) ; fz_drop_stroke_state ( ctx , gs -> stroke_state ) ; gs -> stroke_state = fz_keep_stroke_state ( ctx , old -> stroke_state ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void print_form_element ( int element , int cmd ) { time_t t ; int t_hour , t_min ; char buffer [ MAX_INPUT_BUFFER ] ; switch ( element ) { case PRINT_COMMON_HEADER : printf ( "<tr><td COLSPAN=\"2\">&nbsp; </td></tr>\n" ) ; printf ( "<tr><td COLSPAN=\"2\" CLASS='sectionHeader'>Common Data</td></tr>\n" ) ; printf ( "<tr><td COLSPAN=\"2\">&nbsp; </td></tr>\n" ) ; break ; case PRINT_AUTHOR : printf ( "<tr><td class=\"objectDescription descriptionleft\">Author (Your Name):</td><td align=\"left\">" ) ; if ( lock_author_names == TRUE ) printf ( "<INPUT TYPE='HIDDEN' NAME='com_author' VALUE='%s'>%s</td></tr>\n" , escape_string ( comment_author ) , escape_string ( comment_author ) ) ; else printf ( "<INPUT TYPE='INPUT' NAME='com_author' VALUE='%s'></td></tr>\n" , escape_string ( comment_author ) ) ; break ; case PRINT_COMMENT_BOX : strcpy ( help_text , "If you work with other administrators, you may find it useful to share information about a host/service " "that is having problems if more than one of you may be working on it. " "Make sure to enter a brief description of what you are doing." ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Comment:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<TEXTAREA ID=\"com_data\" NAME='com_data' COLS=25 ROWS=2 onkeyup=\"check_input(); \">%s</TEXTAREA>" , escape_string ( comment_data ) ) ; printf ( "<BR><DIV ID='com_data_error' class=\"inputError\" style=\"display:none; \">Comment data can't be sent empty</DIV>" ) ; printf ( "</td></tr>\n" ) ; break ; case PRINT_CHECK_OUTPUT_BOX : snprintf ( help_text , sizeof ( help_text ) , "Fill in the exact output string which sould be sent to %s" , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Check Output:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<TEXTAREA ID=\"plugin_output\" NAME='plugin_output' COLS=25 ROWS=2 onkeyup=\"check_input(); \"></TEXTAREA>" ) ; printf ( "<BR><DIV ID='plugin_output_error' class=\"inputError\" style=\"display:none; \">Output string can't be send empty</DIV>" ) ; printf ( "</td></tr>\n" ) ; break ; case PRINT_PERFORMANCE_DATA_BOX : snprintf ( help_text , sizeof ( help_text ) , "Fill in the exact performance data string which sould be sent to %s" , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Performance Data:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<TEXTAREA NAME='performance_data' COLS=25 ROWS=2></TEXTAREA></td></tr>\n" ) ; break ; case PRINT_STICKY_ACK : strcpy ( help_text , "If you want acknowledgement to disable notifications until the host/service recovers, check this option." ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Sticky Acknowledgement:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' NAME='sticky_ack' %s></td></tr>\n" , ( sticky_ack == TRUE ) ? "CHECKED" : "" ) ; break ; case PRINT_SEND_NOTFICATION : strcpy ( help_text , "If you do not want an acknowledgement notification sent out to the appropriate contacts, uncheck this option." ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Send Notification:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' NAME='send_notification' %s></td></tr>\n" , ( send_notification == TRUE ) ? "CHECKED" : "" ) ; break ; case PRINT_PERSISTENT : if ( cmd == CMD_ACKNOWLEDGE_HOST_PROBLEM || cmd == CMD_ACKNOWLEDGE_SVC_PROBLEM ) strcpy ( help_text , "If you would like the comment to remain once the acknowledgement is removed, check this checkbox." ) ; else { snprintf ( help_text , sizeof ( help_text ) , "If you uncheck this option, the comment will automatically be deleted the next time %s is restarted." , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; } printf ( "<tr><td class=\"objectDescription descriptionleft\">Persistent%s:" , ( cmd == CMD_ACKNOWLEDGE_HOST_PROBLEM || cmd == CMD_ACKNOWLEDGE_SVC_PROBLEM ) ? " Comment" : "" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' NAME='persistent' %s></td></tr>\n" , ( persistent_ack_comments == TRUE || cmd == CMD_ADD_HOST_COMMENT || cmd == CMD_ADD_SVC_COMMENT ) ? "CHECKED" : "" ) ; break ; case PRINT_NOTIFICATION_DELAY : strcpy ( help_text , "The notification delay will be disregarded if the host/service changes state before the next notification is scheduled to be sent out." ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Notification Delay (minutes from now):" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='TEXT' ID='not_dly' NAME='not_dly' VALUE='%d' SIZE=\"4\">" , notification_delay ) ; printf ( "<BR><DIV ID='not_dly_error' class=\"inputError\" style=\"display:none; \">Notification delay can't be zero</DIV>" ) ; printf ( "</td></tr>\n" ) ; break ; case PRINT_START_TIME : case PRINT_END_TIME : case PRINT_CHECK_TIME : time ( & t ) ; if ( element == PRINT_END_TIME ) t += ( unsigned long ) default_downtime_duration ; get_time_string ( & t , buffer , sizeof ( buffer ) - 1 , SHORT_DATE_TIME ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">" ) ; if ( element == PRINT_START_TIME ) { strcpy ( help_text , "Set the start date/time for the downtime." ) ; printf ( "Start Time:" ) ; } else if ( element == PRINT_END_TIME ) { strcpy ( help_text , "Set the end date/time for the downtime." ) ; printf ( "End Time:" ) ; } else { strcpy ( help_text , "Set the date/time when this check should be schedule to." ) ; printf ( "Check Time:" ) ; } print_help_box ( help_text ) ; printf ( "</td><td align=\"left\"><INPUT TYPE='TEXT' class='timepicker' NAME='%s_time' VALUE='%s' SIZE=\"25\"></td></tr>\n" , ( element == PRINT_END_TIME ) ? "end" : "start" , buffer ) ; break ; case PRINT_FIXED_FLEXIBLE_TYPE : default_downtime_duration = default_downtime_duration / 60 ; t_min = default_downtime_duration % 60 ; default_downtime_duration = default_downtime_duration - t_min ; t_hour = ( default_downtime_duration / 60 ) ; snprintf ( help_text , sizeof ( help_text ) , "If you select the <i>fixed</i> option, the downtime will be in effect between the start and end times you specify. If you do not select the <i>fixed</i> " "option, %s will treat this as <i>flexible</i> downtime. Flexible downtime starts when the host goes down or becomes unreachable / service becomes critical (sometime between the " "start and end times you specified) and lasts as long as the duration of time you enter. The duration fields do not apply for fixed downtime." , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Type:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">\n" ) ; printf ( "\t<SELECT ID=\"flexible_selection\" NAME='fixed' onChange=\"if (document.getElementById('flexible_selection').selectedIndex == 0) document.getElementById('fd_row').style.display = 'none'; else document.getElementById('fd_row').style.display = ''; \">\n" ) ; printf ( "\t\t<OPTION VALUE=1\">Fixed</OPTION>\n" ) ; printf ( "\t\t<OPTION VALUE=0\">Flexible</OPTION>\n" ) ; printf ( "\t</SELECT>\n" ) ; snprintf ( help_text , sizeof ( help_text ) , "Enter here the duration of the downtime. %s will automatically delete the downtime after this time expired." , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; printf ( "<tr id=\"fd_row\" style=\"display:none; \"><td class=\"objectDescription descriptionleft\">Flexible Duration:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">\n" ) ; printf ( "\t<table border=0 cellspacing=0 cellpadding=0>\n" ) ; printf ( "\t\t<tr>\n" ) ; printf ( "\t\t\t<td><INPUT TYPE='TEXT' NAME='hours' VALUE='%d' SIZE=4 MAXLENGTH=4></td>\n" , t_hour ) ; printf ( "\t\t\t<td width=\"50\">&nbsp; Hours</td>\n" ) ; printf ( "\t\t\t<td><INPUT TYPE='TEXT' NAME='minutes' VALUE='%d' SIZE=2 MAXLENGTH=2></td>\n" , t_min ) ; printf ( "\t\t\t<td width=\"50\">&nbsp; Minutes</td>\n" ) ; printf ( "\t\t</tr>\n" ) ; printf ( "\t</table>\n" ) ; printf ( "</td></tr>\n" ) ; break ; case PRINT_EXPIRE_ACKNOWLEDGEMENT : strcpy ( help_text , "If you want to let the acknowledgement expire, check this option." ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Use Expire Time:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' ID='expire_checkbox' NAME='use_ack_end_time' onClick=\"if (document.getElementById('expire_checkbox').checked == true) document.getElementById('expired_date_row').style.display = ''; else document.getElementById('expired_date_row').style.display = 'none'; \"></td></tr>\n" ) ; snprintf ( help_text , sizeof ( help_text ) , "Enter here the expire date/time for this acknowledgement. %s will automatically delete the acknowledgement after this time expired." , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; time ( & t ) ; t += ( unsigned long ) default_expiring_acknowledgement_duration ; get_time_string ( & t , buffer , sizeof ( buffer ) - 1 , SHORT_DATE_TIME ) ; printf ( "<tr id=\"expired_date_row\" style=\"display:none; \"><td class=\"objectDescription descriptionleft\">Expire Time:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\"><INPUT TYPE='TEXT' class='timepicker' NAME='end_time' VALUE='%s' SIZE=\"25\"></td></tr>\n" , buffer ) ; break ; case PRINT_EXPIRE_DISABLE_NOTIFICATIONS : strcpy ( help_text , "If you want to let the disabled notifications expire, check this option." ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Use Expire Time:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' ID='expire_checkbox' NAME='use_disabled_notif_end_time' onClick=\"if (document.getElementById('expire_checkbox').checked == true) document.getElementById('expired_date_row').style.display = ''; else document.getElementById('expired_date_row').style.display = 'none'; \"></td></tr>\n" ) ; snprintf ( help_text , sizeof ( help_text ) , "Enter the expire date/time for disabled notifications. %s will automatically re-enable all notifications after this time expired." , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; time ( & t ) ; t += ( unsigned long ) default_expiring_disabled_notifications_duration ; get_time_string ( & t , buffer , sizeof ( buffer ) - 1 , SHORT_DATE_TIME ) ; printf ( "<tr id=\"expired_date_row\" style=\"display:none; \"><td class=\"objectDescription descriptionleft\">Expire Time:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\"><INPUT TYPE='TEXT' class='timepicker' NAME='end_time' VALUE='%s' SIZE=\"25\"></td></tr>\n" , buffer ) ; break ; case PRINT_FORCE_CHECK : snprintf ( help_text , sizeof ( help_text ) , "If you select this option, %s will force a check of the host/service regardless of both what time the scheduled check occurs and whether or not checks are enabled for the host/service." , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Force Check:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' NAME='force_check' %s></td></tr>\n" , ( force_check == TRUE ) ? "CHECKED" : "" ) ; break ; case PRINT_BROADCAST_NOTIFICATION : strcpy ( help_text , "Selecting this option causes the notification to be sent out to all normal (non-escalated) and escalated contacts. These options allow you to override the normal notification logic if you need to get an important message out." ) ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Broadcast:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' NAME='broadcast_notification'></td></tr>\n" ) ; break ; case PRINT_FORCE_NOTIFICATION : snprintf ( help_text , sizeof ( help_text ) , "Custom notifications normally follow the regular notification logic in %s. Selecting this option will force the notification to be sent out, regardless of the time restrictions, whether or not notifications are enabled, etc." , PROGRAM_NAME ) ; help_text [ sizeof ( help_text ) - 1 ] = '\x0' ; printf ( "<tr><td class=\"objectDescription descriptionleft\">Forced:" ) ; print_help_box ( help_text ) ; printf ( "</td><td align=\"left\">" ) ; printf ( "<INPUT TYPE='checkbox' NAME='force_notification'></td></tr>\n" ) ; break ; default : break ; } return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int vp8_get_reference ( VP8_COMP * cpi , enum vpx_ref_frame_type ref_frame_flag , YV12_BUFFER_CONFIG * sd ) { VP8_COMMON * cm = & cpi -> common ; int ref_fb_idx ; if ( ref_frame_flag == VP8_LAST_FRAME ) ref_fb_idx = cm -> lst_fb_idx ; else if ( ref_frame_flag == VP8_GOLD_FRAME ) ref_fb_idx = cm -> gld_fb_idx ; else if ( ref_frame_flag == VP8_ALTR_FRAME ) ref_fb_idx = cm -> alt_fb_idx ; else return - 1 ; vp8_yv12_copy_frame ( & cm -> yv12_fb [ ref_fb_idx ] , sd ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void sbr_qmf_post_shuffle_c ( float W [ 32 ] [ 2 ] , const float * z ) { const union av_intfloat32 * zi = ( const union av_intfloat32 * ) z ; union av_intfloat32 * Wi = ( union av_intfloat32 * ) W ; int k ; for ( k = 0 ; k < 32 ; k += 2 ) { Wi [ 2 * k + 0 ] . i = zi [ 63 - k ] . i ^ ( 1U << 31 ) ; Wi [ 2 * k + 1 ] . i = zi [ k + 0 ] . i ; Wi [ 2 * k + 2 ] . i = zi [ 62 - k ] . i ^ ( 1U << 31 ) ; Wi [ 2 * k + 3 ] . i = zi [ k + 1 ] . i ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline int binkb_get_value ( BinkContext * c , int bundle_num ) { int16_t ret ; const int bits = binkb_bundle_sizes [ bundle_num ] ; if ( bits <= 8 ) { int val = * c -> bundle [ bundle_num ] . cur_ptr ++ ; return binkb_bundle_signed [ bundle_num ] ? ( int8_t ) val : val ; } ret = * ( int16_t * ) c -> bundle [ bundle_num ] . cur_ptr ; c -> bundle [ bundle_num ] . cur_ptr += 2 ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int32_t u_scanf_percent_handler ( UFILE * input , u_scanf_spec_info * info , ufmt_args * args , const UChar * fmt , int32_t * fmtConsumed , int32_t * argConverted ) { int32_t len ; double num ; UNumberFormat * format ; int32_t parsePos = 0 ; UErrorCode status = U_ZERO_ERROR ; u_scanf_skip_leading_ws ( input , info -> fPadChar ) ; ufile_fill_uchar_buffer ( input ) ; len = ( int32_t ) ( input -> str . fLimit - input -> str . fPos ) ; if ( info -> fWidth != - 1 ) len = ufmt_min ( len , info -> fWidth ) ; format = u_locbund_getNumberFormat ( & input -> str . fBundle , UNUM_PERCENT ) ; if ( format == 0 ) return 0 ; u_scanf_skip_leading_positive_sign ( input , format , & status ) ; num = unum_parseDouble ( format , input -> str . fPos , len , & parsePos , & status ) ; if ( ! info -> fSkipArg ) { * ( double * ) ( args [ 0 ] . ptrValue ) = num ; } input -> str . fPos += parsePos ; * argConverted = ! info -> fSkipArg ; return parsePos ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
void ufile_close_translit ( UFILE * f ) { # if ! UCONFIG_NO_TRANSLITERATION if ( ( ! f ) || ( ! f -> fTranslit ) ) return ; # endif ufile_flush_translit ( f ) ; # if ! UCONFIG_NO_TRANSLITERATION if ( f -> fTranslit -> translit ) utrans_close ( f -> fTranslit -> translit ) ; if ( f -> fTranslit -> buffer ) { uprv_free ( f -> fTranslit -> buffer ) ; } uprv_free ( f -> fTranslit ) ; f -> fTranslit = NULL ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( SplDoublyLinkedList , unserialize ) { spl_dllist_object * intern = ( spl_dllist_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; zval * flags , * elem ; char * buf ; int buf_len ; const unsigned char * p , * s ; php_unserialize_data_t var_hash ; if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "s" , & buf , & buf_len ) == FAILURE ) { return ; } if ( buf_len == 0 ) { zend_throw_exception_ex ( spl_ce_UnexpectedValueException , 0 TSRMLS_CC , "Serialized string cannot be empty" ) ; return ; } s = p = ( const unsigned char * ) buf ; PHP_VAR_UNSERIALIZE_INIT ( var_hash ) ; ALLOC_INIT_ZVAL ( flags ) ; if ( ! php_var_unserialize ( & flags , & p , s + buf_len , & var_hash TSRMLS_CC ) || Z_TYPE_P ( flags ) != IS_LONG ) { zval_ptr_dtor ( & flags ) ; goto error ; } intern -> flags = Z_LVAL_P ( flags ) ; zval_ptr_dtor ( & flags ) ; while ( * p == ':' ) { ++ p ; ALLOC_INIT_ZVAL ( elem ) ; if ( ! php_var_unserialize ( & elem , & p , s + buf_len , & var_hash TSRMLS_CC ) ) { zval_ptr_dtor ( & elem ) ; goto error ; } spl_ptr_llist_push ( intern -> llist , elem TSRMLS_CC ) ; } if ( * p != '\0' ) { goto error ; } PHP_VAR_UNSERIALIZE_DESTROY ( var_hash ) ; return ; error : PHP_VAR_UNSERIALIZE_DESTROY ( var_hash ) ; zend_throw_exception_ex ( spl_ce_UnexpectedValueException , 0 TSRMLS_CC , "Error at offset %ld of %d bytes" , ( long ) ( ( char * ) p - buf ) , buf_len ) ; return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static gboolean make_file_name_valid_for_dest_fs ( char * filename , const char * dest_fs_type ) { if ( dest_fs_type != NULL && filename != NULL ) { if ( ! strcmp ( dest_fs_type , "fat" ) || ! strcmp ( dest_fs_type , "vfat" ) || ! strcmp ( dest_fs_type , "msdos" ) || ! strcmp ( dest_fs_type , "msdosfs" ) ) { gboolean ret ; int i , old_len ; ret = fat_str_replace ( filename , '_' ) ; old_len = strlen ( filename ) ; for ( i = 0 ; i < old_len ; i ++ ) { if ( filename [ i ] != ' ' ) { g_strchomp ( filename ) ; ret |= ( old_len != strlen ( filename ) ) ; break ; } } return ret ; } } return FALSE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void Init_generator ( void ) { rb_require ( "json/common" ) ; mJSON = rb_define_module ( "JSON" ) ; mExt = rb_define_module_under ( mJSON , "Ext" ) ; mGenerator = rb_define_module_under ( mExt , "Generator" ) ; eGeneratorError = rb_path2class ( "JSON::GeneratorError" ) ; eNestingError = rb_path2class ( "JSON::NestingError" ) ; cState = rb_define_class_under ( mGenerator , "State" , rb_cObject ) ; rb_define_alloc_func ( cState , cState_s_allocate ) ; rb_define_singleton_method ( cState , "from_state" , cState_from_state_s , 1 ) ; rb_define_method ( cState , "initialize" , cState_initialize , - 1 ) ; rb_define_method ( cState , "initialize_copy" , cState_init_copy , 1 ) ; rb_define_method ( cState , "indent" , cState_indent , 0 ) ; rb_define_method ( cState , "indent=" , cState_indent_set , 1 ) ; rb_define_method ( cState , "space" , cState_space , 0 ) ; rb_define_method ( cState , "space=" , cState_space_set , 1 ) ; rb_define_method ( cState , "space_before" , cState_space_before , 0 ) ; rb_define_method ( cState , "space_before=" , cState_space_before_set , 1 ) ; rb_define_method ( cState , "object_nl" , cState_object_nl , 0 ) ; rb_define_method ( cState , "object_nl=" , cState_object_nl_set , 1 ) ; rb_define_method ( cState , "array_nl" , cState_array_nl , 0 ) ; rb_define_method ( cState , "array_nl=" , cState_array_nl_set , 1 ) ; rb_define_method ( cState , "max_nesting" , cState_max_nesting , 0 ) ; rb_define_method ( cState , "max_nesting=" , cState_max_nesting_set , 1 ) ; rb_define_method ( cState , "check_circular?" , cState_check_circular_p , 0 ) ; rb_define_method ( cState , "allow_nan?" , cState_allow_nan_p , 0 ) ; rb_define_method ( cState , "ascii_only?" , cState_ascii_only_p , 0 ) ; rb_define_method ( cState , "depth" , cState_depth , 0 ) ; rb_define_method ( cState , "depth=" , cState_depth_set , 1 ) ; rb_define_method ( cState , "buffer_initial_length" , cState_buffer_initial_length , 0 ) ; rb_define_method ( cState , "buffer_initial_length=" , cState_buffer_initial_length_set , 1 ) ; rb_define_method ( cState , "configure" , cState_configure , 1 ) ; rb_define_alias ( cState , "merge" , "configure" ) ; rb_define_method ( cState , "to_h" , cState_to_h , 0 ) ; rb_define_alias ( cState , "to_hash" , "to_h" ) ; rb_define_method ( cState , "[]" , cState_aref , 1 ) ; rb_define_method ( cState , "[]=" , cState_aset , 2 ) ; rb_define_method ( cState , "generate" , cState_generate , 1 ) ; mGeneratorMethods = rb_define_module_under ( mGenerator , "GeneratorMethods" ) ; mObject = rb_define_module_under ( mGeneratorMethods , "Object" ) ; rb_define_method ( mObject , "to_json" , mObject_to_json , - 1 ) ; mHash = rb_define_module_under ( mGeneratorMethods , "Hash" ) ; rb_define_method ( mHash , "to_json" , mHash_to_json , - 1 ) ; mArray = rb_define_module_under ( mGeneratorMethods , "Array" ) ; rb_define_method ( mArray , "to_json" , mArray_to_json , - 1 ) ; # ifdef RUBY_INTEGER_UNIFICATION mInteger = rb_define_module_under ( mGeneratorMethods , "Integer" ) ; rb_define_method ( mInteger , "to_json" , mInteger_to_json , - 1 ) ; # else mFixnum = rb_define_module_under ( mGeneratorMethods , "Fixnum" ) ; rb_define_method ( mFixnum , "to_json" , mFixnum_to_json , - 1 ) ; mBignum = rb_define_module_under ( mGeneratorMethods , "Bignum" ) ; rb_define_method ( mBignum , "to_json" , mBignum_to_json , - 1 ) ; # endif mFloat = rb_define_module_under ( mGeneratorMethods , "Float" ) ; rb_define_method ( mFloat , "to_json" , mFloat_to_json , - 1 ) ; mString = rb_define_module_under ( mGeneratorMethods , "String" ) ; rb_define_singleton_method ( mString , "included" , mString_included_s , 1 ) ; rb_define_method ( mString , "to_json" , mString_to_json , - 1 ) ; rb_define_method ( mString , "to_json_raw" , mString_to_json_raw , - 1 ) ; rb_define_method ( mString , "to_json_raw_object" , mString_to_json_raw_object , 0 ) ; mString_Extend = rb_define_module_under ( mString , "Extend" ) ; rb_define_method ( mString_Extend , "json_create" , mString_Extend_json_create , 1 ) ; mTrueClass = rb_define_module_under ( mGeneratorMethods , "TrueClass" ) ; rb_define_method ( mTrueClass , "to_json" , mTrueClass_to_json , - 1 ) ; mFalseClass = rb_define_module_under ( mGeneratorMethods , "FalseClass" ) ; rb_define_method ( mFalseClass , "to_json" , mFalseClass_to_json , - 1 ) ; mNilClass = rb_define_module_under ( mGeneratorMethods , "NilClass" ) ; rb_define_method ( mNilClass , "to_json" , mNilClass_to_json , - 1 ) ; CRegexp_MULTILINE = rb_const_get ( rb_cRegexp , rb_intern ( "MULTILINE" ) ) ; i_to_s = rb_intern ( "to_s" ) ; i_to_json = rb_intern ( "to_json" ) ; i_new = rb_intern ( "new" ) ; i_indent = rb_intern ( "indent" ) ; i_space = rb_intern ( "space" ) ; i_space_before = rb_intern ( "space_before" ) ; i_object_nl = rb_intern ( "object_nl" ) ; i_array_nl = rb_intern ( "array_nl" ) ; i_max_nesting = rb_intern ( "max_nesting" ) ; i_allow_nan = rb_intern ( "allow_nan" ) ; i_ascii_only = rb_intern ( "ascii_only" ) ; i_depth = rb_intern ( "depth" ) ; i_buffer_initial_length = rb_intern ( "buffer_initial_length" ) ; i_pack = rb_intern ( "pack" ) ; i_unpack = rb_intern ( "unpack" ) ; i_create_id = rb_intern ( "create_id" ) ; i_extend = rb_intern ( "extend" ) ; i_key_p = rb_intern ( "key?" ) ; i_aref = rb_intern ( "[]" ) ; i_send = rb_intern ( "__send__" ) ; i_respond_to_p = rb_intern ( "respond_to?" ) ; i_match = rb_intern ( "match" ) ; i_keys = rb_intern ( "keys" ) ; i_dup = rb_intern ( "dup" ) ; # ifdef HAVE_RUBY_ENCODING_H CEncoding_UTF_8 = rb_funcall ( rb_path2class ( "Encoding" ) , rb_intern ( "find" ) , 1 , rb_str_new2 ( "utf-8" ) ) ; i_encoding = rb_intern ( "encoding" ) ; i_encode = rb_intern ( "encode" ) ; # endif i_SAFE_STATE_PROTOTYPE = rb_intern ( "SAFE_STATE_PROTOTYPE" ) ; CJSON_SAFE_STATE_PROTOTYPE = Qnil ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void ff_draw_horiz_band ( AVCodecContext * avctx , DSPContext * dsp , Picture * cur , Picture * last , int y , int h , int picture_structure , int first_field , int draw_edges , int low_delay , int v_edge_pos , int h_edge_pos ) { const AVPixFmtDescriptor * desc = av_pix_fmt_desc_get ( avctx -> pix_fmt ) ; int hshift = desc -> log2_chroma_w ; int vshift = desc -> log2_chroma_h ; const int field_pic = picture_structure != PICT_FRAME ; if ( field_pic ) { h <<= 1 ; y <<= 1 ; } if ( ! avctx -> hwaccel && ! ( avctx -> codec -> capabilities & CODEC_CAP_HWACCEL_VDPAU ) && draw_edges && cur -> f . reference && ! ( avctx -> flags & CODEC_FLAG_EMU_EDGE ) ) { int * linesize = cur -> f . linesize ; int sides = 0 , edge_h ; if ( y == 0 ) sides |= EDGE_TOP ; if ( y + h >= v_edge_pos ) sides |= EDGE_BOTTOM ; edge_h = FFMIN ( h , v_edge_pos - y ) ; dsp -> draw_edges ( cur -> f . data [ 0 ] + y * linesize [ 0 ] , linesize [ 0 ] , h_edge_pos , edge_h , EDGE_WIDTH , EDGE_WIDTH , sides ) ; dsp -> draw_edges ( cur -> f . data [ 1 ] + ( y >> vshift ) * linesize [ 1 ] , linesize [ 1 ] , h_edge_pos >> hshift , edge_h >> vshift , EDGE_WIDTH >> hshift , EDGE_WIDTH >> vshift , sides ) ; dsp -> draw_edges ( cur -> f . data [ 2 ] + ( y >> vshift ) * linesize [ 2 ] , linesize [ 2 ] , h_edge_pos >> hshift , edge_h >> vshift , EDGE_WIDTH >> hshift , EDGE_WIDTH >> vshift , sides ) ; } h = FFMIN ( h , avctx -> height - y ) ; if ( field_pic && first_field && ! ( avctx -> slice_flags & SLICE_FLAG_ALLOW_FIELD ) ) return ; if ( avctx -> draw_horiz_band ) { AVFrame * src ; int offset [ AV_NUM_DATA_POINTERS ] ; int i ; if ( cur -> f . pict_type == AV_PICTURE_TYPE_B || low_delay || ( avctx -> slice_flags & SLICE_FLAG_CODED_ORDER ) ) src = & cur -> f ; else if ( last ) src = & last -> f ; else return ; if ( cur -> f . pict_type == AV_PICTURE_TYPE_B && picture_structure == PICT_FRAME && avctx -> codec_id != AV_CODEC_ID_H264 && avctx -> codec_id != AV_CODEC_ID_SVQ3 ) { for ( i = 0 ; i < AV_NUM_DATA_POINTERS ; i ++ ) offset [ i ] = 0 ; } else { offset [ 0 ] = y * src -> linesize [ 0 ] ; offset [ 1 ] = offset [ 2 ] = ( y >> vshift ) * src -> linesize [ 1 ] ; for ( i = 3 ; i < AV_NUM_DATA_POINTERS ; i ++ ) offset [ i ] = 0 ; } emms_c ( ) ; avctx -> draw_horiz_band ( avctx , src , offset , y , picture_structure , h ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_pcp_message ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree , void * data _U_ ) { proto_item * root_pcp_item ; proto_tree * pcp_tree ; conversation_t * conversation ; pcp_conv_info_t * pcp_conv_info ; guint32 packet_type ; gint32 err_bytes ; int offset = 0 ; col_set_str ( pinfo -> cinfo , COL_PROTOCOL , "PCP" ) ; col_clear ( pinfo -> cinfo , COL_INFO ) ; conversation = find_or_create_conversation ( pinfo ) ; pcp_conv_info = ( pcp_conv_info_t * ) conversation_get_proto_data ( conversation , proto_pcp ) ; if ( pcp_conv_info == NULL ) { pcp_conv_info = ( pcp_conv_info_t * ) g_malloc ( sizeof ( pcp_conv_info_t ) ) ; conversation_add_proto_data ( conversation , proto_pcp , pcp_conv_info ) ; pcp_conv_info -> pmid_name_candidates = wmem_array_new ( wmem_file_scope ( ) , sizeof ( guint8 * ) ) ; pcp_conv_info -> pmid_to_name = wmem_map_new ( wmem_file_scope ( ) , g_direct_hash , g_direct_equal ) ; pcp_conv_info -> last_pmns_names_frame = 0 ; pcp_conv_info -> last_processed_pmns_names_frame = 0 ; } root_pcp_item = proto_tree_add_item ( tree , proto_pcp , tvb , 0 , - 1 , ENC_NA ) ; pcp_tree = proto_item_add_subtree ( root_pcp_item , ett_pcp ) ; packet_type = tvb_get_ntohl ( tvb , 4 ) ; if ( pinfo -> srcport == PCP_PORT || pinfo -> srcport == PMPROXY_PORT ) { col_set_str ( pinfo -> cinfo , COL_INFO , "Server > Client " ) ; } else { col_set_str ( pinfo -> cinfo , COL_INFO , "Client > Server " ) ; } proto_tree_add_item ( pcp_tree , hf_pcp_pdu_length , tvb , offset , 4 , ENC_BIG_ENDIAN ) ; offset += 4 ; proto_tree_add_item ( pcp_tree , hf_pcp_pdu_type , tvb , offset , 4 , ENC_BIG_ENDIAN ) ; offset += 4 ; proto_tree_add_item ( pcp_tree , hf_pcp_pdu_pid , tvb , offset , 4 , ENC_BIG_ENDIAN ) ; offset += 4 ; switch ( packet_type ) { case PCP_PDU_CREDS : dissect_pcp_message_creds ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_START_OR_ERROR : err_bytes = tvb_get_ntohl ( tvb , offset ) ; if ( err_bytes < 0 ) { dissect_pcp_message_error ( tvb , pinfo , pcp_tree , offset ) ; } else { dissect_pcp_message_start ( tvb , pinfo , pcp_tree , offset ) ; } break ; case PCP_PDU_PMNS_TRAVERSE : dissect_pcp_message_pmns_traverse ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PMNS_NAMES : dissect_pcp_message_pmns_names ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PMNS_CHILD : dissect_pcp_message_pmns_child ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PMNS_IDS : dissect_pcp_message_pmns_ids ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_PROFILE : dissect_pcp_message_profile ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_FETCH : dissect_pcp_message_fetch ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_RESULT : dissect_pcp_message_result ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_DESC_REQ : dissect_pcp_message_desc_req ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_DESC : dissect_pcp_message_desc ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_INSTANCE_REQ : dissect_pcp_message_instance_req ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_INSTANCE : dissect_pcp_message_instance ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_TEXT_REQ : dissect_pcp_message_text_req ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_TEXT : dissect_pcp_message_text ( tvb , pinfo , pcp_tree , offset ) ; break ; case PCP_PDU_USER_AUTH : dissect_pcp_message_user_auth ( tvb , pinfo , pcp_tree , offset ) ; break ; default : col_append_str ( pinfo -> cinfo , COL_INFO , "[UNIMPLEMENTED TYPE]" ) ; expert_add_info ( pinfo , pcp_tree , & ei_pcp_unimplemented_packet_type ) ; break ; } return tvb_captured_length ( tvb ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
int master_service_settings_read ( struct master_service * service ATTR_UNUSED , const struct master_service_settings_input * input ATTR_UNUSED , struct master_service_settings_output * output_r , const char * * error_r ATTR_UNUSED ) { * output_r = output ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int nbd_can_accept ( void ) { return state == RUNNING && nb_fds < shared ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void WriteData ( Archive * AHX , const void * data , size_t dLen ) { ArchiveHandle * AH = ( ArchiveHandle * ) AHX ; if ( ! AH -> currToc ) exit_horribly ( modulename , "internal error -- WriteData cannot be called outside the context of a DataDumper routine\n" ) ; ( * AH -> WriteDataPtr ) ( AH , data , dLen ) ; return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ProtocolHandlerRegistryTest , MAYBE_TestInstallDefaultHandler ) { RecreateRegistry ( false ) ; registry ( ) -> AddPredefinedHandler ( CreateProtocolHandler ( "test" , GURL ( "http://test.com/%s" ) ) ) ; registry ( ) -> InitProtocolSettings ( ) ; std : : vector < std : : string > protocols ; registry ( ) -> GetRegisteredProtocols ( & protocols ) ; ASSERT_EQ ( static_cast < size_t > ( 1 ) , protocols . size ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static guint16 de_emerg_num_list ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo , guint32 offset , guint len _U_ , gchar * add_string _U_ , int string_len _U_ ) { guint32 curr_offset ; guint8 en_len ; guint8 count ; proto_tree * subtree ; proto_item * item ; const char * digit_str ; curr_offset = offset ; count = 1 ; while ( ( curr_offset - offset ) < len ) { en_len = tvb_get_guint8 ( tvb , curr_offset ) ; item = proto_tree_add_uint ( tree , hf_gsm_a_dtap_emergency_number_information , tvb , curr_offset , en_len + 1 , count ) ; subtree = proto_item_add_subtree ( item , ett_gsm_dtap_elem [ DE_EMERGENCY_NUM_LIST ] ) ; proto_tree_add_item ( subtree , hf_gsm_a_dtap_emerg_num_info_length , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; curr_offset ++ ; proto_tree_add_bits_item ( subtree , hf_gsm_a_spare_bits , tvb , curr_offset << 3 , 3 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( subtree , hf_gsm_a_dtap_serv_cat_b5 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( subtree , hf_gsm_a_dtap_serv_cat_b4 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( subtree , hf_gsm_a_dtap_serv_cat_b3 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( subtree , hf_gsm_a_dtap_serv_cat_b2 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( subtree , hf_gsm_a_dtap_serv_cat_b1 , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; curr_offset ++ ; en_len -- ; digit_str = tvb_bcd_dig_to_wmem_packet_str ( tvb , curr_offset , en_len , NULL , FALSE ) ; item = proto_tree_add_string ( subtree , hf_gsm_a_dtap_emergency_bcd_num , tvb , curr_offset , en_len , digit_str ) ; if ( strchr ( digit_str , '?' ) ) { expert_add_info ( pinfo , item , & ei_gsm_a_dtap_not_digit ) ; } curr_offset = curr_offset + en_len ; count ++ ; } return ( len ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
uint gx_device_raster_plane ( const gx_device * dev , const gx_render_plane_t * render_plane ) { ulong bpc = ( render_plane && render_plane -> index >= 0 ? render_plane -> depth : dev -> color_info . depth / ( dev -> is_planar ? dev -> color_info . num_components : 1 ) ) ; ulong bits = ( ulong ) dev -> width * bpc ; int l2align ; l2align = dev -> log2_align_mod ; if ( l2align < log2_align_bitmap_mod ) l2align = log2_align_bitmap_mod ; return ( uint ) ( ( ( bits + ( 8 << l2align ) - 1 ) >> ( l2align + 3 ) ) << l2align ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static OFCondition parseMaxPDU ( DUL_MAXLENGTH * max , unsigned char * buf , unsigned long * itemLength , unsigned long availData ) { if ( availData < 8 ) return makeLengthError ( "Max PDU" , availData , 8 ) ; max -> type = * buf ++ ; max -> rsv1 = * buf ++ ; EXTRACT_SHORT_BIG ( buf , max -> length ) ; buf += 2 ; EXTRACT_LONG_BIG ( buf , max -> maxLength ) ; * itemLength = 2 + 2 + max -> length ; if ( max -> length != 4 ) DCMNET_WARN ( "Invalid length (" << max -> length << ") for maximum length item, must be 4" ) ; DCMNET_TRACE ( "Maximum PDU Length: " << ( unsigned long ) max -> maxLength ) ; return EC_Normal ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void ResetPTStlb ( encoder_t * p_enc ) { encoder_sys_t * p_sys = p_enc -> p_sys ; for ( int i = 0 ; i < SCHRO_PTS_TLB_SIZE ; i ++ ) { p_sys -> pts_tlb [ i ] . b_empty = true ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void copy_partitioning ( VP9_COMMON * cm , MODE_INFO * mi_8x8 , MODE_INFO * prev_mi_8x8 ) { const int mis = cm -> mi_stride ; int block_row , block_col ; for ( block_row = 0 ; block_row < 8 ; ++ block_row ) { for ( block_col = 0 ; block_col < 8 ; ++ block_col ) { MODE_INFO * const prev_mi = prev_mi_8x8 [ block_row * mis + block_col ] . src_mi ; const BLOCK_SIZE sb_type = prev_mi ? prev_mi -> mbmi . sb_type : 0 ; if ( prev_mi ) { const ptrdiff_t offset = prev_mi - cm -> prev_mi ; mi_8x8 [ block_row * mis + block_col ] . src_mi = cm -> mi + offset ; mi_8x8 [ block_row * mis + block_col ] . src_mi -> mbmi . sb_type = sb_type ; } } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
void h245dg_calls_init_tap ( void ) { GString * error_string ; if ( have_H245dg_tap_listener == FALSE ) { error_string = register_tap_listener ( "h245dg" , & ( the_tapinfo_struct . h245dg_dummy ) , NULL , 0 , voip_calls_dlg_reset , H245dgcalls_packet , voip_calls_dlg_draw ) ; if ( error_string != NULL ) { simple_dialog ( ESD_TYPE_ERROR , ESD_BTN_OK , "%s" , error_string -> str ) ; g_string_free ( error_string , TRUE ) ; exit ( 1 ) ; } have_H245dg_tap_listener = TRUE ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
void relpTcpHintBurstBegin ( relpTcp_t * pThis ) { setCORKopt ( pThis -> sock , 1 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static unsigned int read_sbr_data ( AACContext * ac , SpectralBandReplication * sbr , GetBitContext * gb , int id_aac ) { unsigned int cnt = get_bits_count ( gb ) ; sbr -> id_aac = id_aac ; if ( id_aac == TYPE_SCE || id_aac == TYPE_CCE ) { if ( read_sbr_single_channel_element ( ac , sbr , gb ) ) { sbr_turnoff ( sbr ) ; return get_bits_count ( gb ) - cnt ; } } else if ( id_aac == TYPE_CPE ) { if ( read_sbr_channel_pair_element ( ac , sbr , gb ) ) { sbr_turnoff ( sbr ) ; return get_bits_count ( gb ) - cnt ; } } else { av_log ( ac -> avctx , AV_LOG_ERROR , "Invalid bitstream - cannot apply SBR to element type %d\n" , id_aac ) ; sbr_turnoff ( sbr ) ; return get_bits_count ( gb ) - cnt ; } if ( get_bits1 ( gb ) ) { int num_bits_left = get_bits ( gb , 4 ) ; if ( num_bits_left == 15 ) num_bits_left += get_bits ( gb , 8 ) ; num_bits_left <<= 3 ; while ( num_bits_left > 7 ) { num_bits_left -= 2 ; read_sbr_extension ( ac , sbr , gb , get_bits ( gb , 2 ) , & num_bits_left ) ; } if ( num_bits_left < 0 ) { av_log ( ac -> avctx , AV_LOG_ERROR , "SBR Extension over read.\n" ) ; } if ( num_bits_left > 0 ) skip_bits ( gb , num_bits_left ) ; } return get_bits_count ( gb ) - cnt ; }
1True