instruction
stringclasses
1 value
input
stringlengths
31
235k
output
class label
2 classes
Categorize the following code snippet as vulnerable or not. True or False
TSReturnCode TSUrlPathSet ( TSMBuffer bufp , TSMLoc obj , const char * value , int length ) { return URLPartSet ( bufp , obj , value , length , & URL : : path_set ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dissect_coap_opt_uint ( tvbuff_t * tvb , proto_item * head_item , proto_tree * subtree , gint offset , gint opt_length , int hf ) { guint i = 0 ; if ( opt_length != 0 ) { i = coap_get_opt_uint ( tvb , offset , opt_length ) ; } proto_tree_add_uint ( subtree , hf , tvb , offset , opt_length , i ) ; proto_item_append_text ( head_item , ": %u" , i ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void _moveBefore ( ArchiveHandle * AH , TocEntry * pos , TocEntry * te ) { te -> prev -> next = te -> next ; te -> next -> prev = te -> prev ; te -> prev = pos -> prev ; te -> next = pos ; pos -> prev -> next = te ; pos -> prev = te ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( AppApiTest , ClientRedirectToAppFromExtension ) { LoadExtension ( test_data_dir_ . AppendASCII ( "app_process" ) ) ; const Extension * launcher = LoadExtension ( test_data_dir_ . AppendASCII ( "app_launcher" ) ) ; content : : TestNavigationObserver test_navigation_observer ( browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) , 3 ) ; test_navigation_observer . StartWatchingNewWebContents ( ) ; ui_test_utils : : NavigateToURL ( browser ( ) , launcher -> GetResourceURL ( "client_redirect.html" ) ) ; test_navigation_observer . Wait ( ) ; bool is_installed = false ; ASSERT_TRUE ( content : : ExecuteScriptAndExtractBool ( browser ( ) -> tab_strip_model ( ) -> GetActiveWebContents ( ) , "window.domAutomationController.send(chrome.app.isInstalled)" , & is_installed ) ) ; ASSERT_TRUE ( is_installed ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
char get_rel_relkind ( Oid relid ) { HeapTuple tp ; tp = SearchSysCache1 ( RELOID , ObjectIdGetDatum ( relid ) ) ; if ( HeapTupleIsValid ( tp ) ) { Form_pg_class reltup = ( Form_pg_class ) GETSTRUCT ( tp ) ; char result ; result = reltup -> relkind ; ReleaseSysCache ( tp ) ; return result ; } else return '\0' ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static struct cgroup_hierarchy * lxc_cgroup_find_hierarchy ( struct cgroup_meta_data * meta_data , const char * subsystem ) { size_t i ; for ( i = 0 ; i <= meta_data -> maximum_hierarchy ; i ++ ) { struct cgroup_hierarchy * h = meta_data -> hierarchies [ i ] ; if ( h && lxc_string_in_array ( subsystem , ( const char * * ) h -> subsystems ) ) return h ; } return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int32_t u_printf_pointer_handler ( const u_printf_stream_handler * handler , void * context , ULocaleBundle * formatBundle , const u_printf_spec_info * info , const ufmt_args * args ) { ( void ) formatBundle ; UChar result [ UPRINTF_BUFFER_SIZE ] ; int32_t len = UPRINTF_BUFFER_SIZE ; ufmt_ptou ( result , & len , args [ 0 ] . ptrValue , TRUE ) ; return handler -> pad_and_justify ( context , info , result , len ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static hb_ ## name ## _t * _hb_ ## name ## _reference ( const hb_ ## name ## _t * l ) { hb_ ## name ## _t * c = ( hb_ ## name ## _t * ) calloc ( 1 , sizeof ( hb_ ## name ## _t ) ) ; if ( unlikely ( ! c ) ) return NULL ; * c = * l ; return c ; } static void _hb_ ## name ## _destroy ( hb_ ## name ## _t * l ) { free ( l ) ; } HB_DEFINE_BOXED_TYPE ( name , _hb_ ## name ## _reference , _hb_ ## name ## _destroy ) ; HB_DEFINE_OBJECT_TYPE ( buffer ) HB_DEFINE_OBJECT_TYPE ( blob ) HB_DEFINE_OBJECT_TYPE ( face ) HB_DEFINE_OBJECT_TYPE ( font ) HB_DEFINE_OBJECT_TYPE ( font_funcs ) HB_DEFINE_OBJECT_TYPE ( set ) HB_DEFINE_OBJECT_TYPE ( shape_plan ) HB_DEFINE_OBJECT_TYPE ( unicode_funcs ) HB_DEFINE_VALUE_TYPE ( feature ) HB_DEFINE_VALUE_TYPE ( glyph_info ) HB_DEFINE_VALUE_TYPE ( glyph_position )
0False
Categorize the following code snippet as vulnerable or not. True or False
static void decode_power_conf_batt_AHr ( gchar * s , guint32 value ) { g_snprintf ( s , ITEM_LABEL_LENGTH , "%d [mAHr]" , value * 10 ) ; return ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_DisplayName ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_DisplayName , DisplayName_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static pid_t name2pid ( char * name ) { pid_t pid = - 1 ; int lokke ; int num_procs = 0 ; struct das_proclist * proclist = get_proclist ( & num_procs ) ; for ( lokke = 0 ; lokke < num_procs ; lokke ++ ) { glibtop_proc_state state ; glibtop_get_proc_state ( & state , proclist [ lokke ] . pid ) ; if ( ! strcmp ( state . cmd , name ) ) { pid = proclist [ lokke ] . pid ; break ; } } free ( proclist ) ; return pid ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_TBCD_STRING ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { # line 912 "./asn1/h225/h225.cnf" int min_len , max_len ; gboolean has_extension ; get_size_constraint_from_stack ( actx , "TBCD_STRING" , & min_len , & max_len , & has_extension ) ; offset = dissect_per_restricted_character_string ( tvb , offset , actx , tree , hf_index , min_len , max_len , has_extension , "0123456789#*abc" , 15 , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int ssl_choose_client_version ( SSL * s , int version ) { const version_info * vent ; const version_info * table ; switch ( s -> method -> version ) { default : if ( version != s -> version ) return SSL_R_WRONG_SSL_VERSION ; return 0 ; case TLS_ANY_VERSION : table = tls_version_table ; break ; case DTLS_ANY_VERSION : table = dtls_version_table ; break ; } for ( vent = table ; vent -> version != 0 ; ++ vent ) { const SSL_METHOD * method ; int err ; if ( version != vent -> version ) continue ; if ( vent -> cmeth == NULL ) break ; method = vent -> cmeth ( ) ; err = ssl_method_error ( s , method ) ; if ( err != 0 ) return err ; s -> method = method ; s -> version = version ; return 0 ; } return SSL_R_UNSUPPORTED_PROTOCOL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void pdf_run_i ( fz_context * ctx , pdf_processor * proc , float flatness ) { }
0False
Categorize the following code snippet as vulnerable or not. True or False
static gid_t add_supp_group ( const char * name , gid_t * * groups , size_t * ngroups ) { struct group * gr ; if ( * ngroups >= NGROUPS_MAX ) errx ( EXIT_FAILURE , P_ ( "specifying more than %d supplemental group is not possible" , "specifying more than %d supplemental groups is not possible" , NGROUPS_MAX - 1 ) , NGROUPS_MAX - 1 ) ; gr = getgrnam ( name ) ; if ( ! gr ) errx ( EXIT_FAILURE , _ ( "group %s does not exist" ) , name ) ; * groups = xrealloc ( * groups , sizeof ( gid_t ) * ( * ngroups + 1 ) ) ; ( * groups ) [ * ngroups ] = gr -> gr_gid ; ( * ngroups ) ++ ; return gr -> gr_gid ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void do_vm_stop ( RunState state ) { if ( runstate_is_running ( ) ) { cpu_disable_ticks ( ) ; pause_all_vcpus ( ) ; runstate_set ( state ) ; vm_state_notify ( 0 , state ) ; bdrv_drain_all ( ) ; bdrv_flush_all ( ) ; monitor_protocol_event ( QEVENT_STOP , NULL ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( WebFrameSimTest , TickmarksDocumentRelative ) { WebView ( ) . Resize ( WebSize ( 500 , 300 ) ) ; WebView ( ) . GetPage ( ) -> GetSettings ( ) . SetTextAutosizingEnabled ( false ) ; SimRequest request ( "https://example.com/test.html" , "text/html" ) ; LoadURL ( "https://example.com/test.html" ) ; request . Complete ( R "HTML( < ! DOCTYPE html > < style > body , html { width : 4000px ; height : 4000px ; margin : 0 ; } div { position : absolute ; left : 800px ; top : 2000px ; } < / style > < div > test < / div > ) HTML "); Compositor ( ) . BeginFrame ( ) ; WebLocalFrameImpl * frame = ToWebLocalFrameImpl ( WebView ( ) . MainFrame ( ) ) ; LocalFrameView * frame_view = ToLocalFrame ( WebView ( ) . GetPage ( ) -> MainFrame ( ) ) -> View ( ) ; frame_view -> GetScrollableArea ( ) -> SetScrollOffset ( ScrollOffset ( 3000 , 1000 ) , kProgrammaticScroll ) ; WebFindOptions options ; WebString search_text = WebString : : FromUTF8 ( "test" ) ; const int kFindIdentifier = 12345 ; EXPECT_TRUE ( frame -> Find ( kFindIdentifier , search_text , options , false ) ) ; frame -> EnsureTextFinder ( ) . ResetMatchCount ( ) ; frame -> EnsureTextFinder ( ) . StartScopingStringMatches ( kFindIdentifier , search_text , options ) ; RunPendingTasks ( ) ; Vector < IntRect > original_tickmarks ; frame_view -> LayoutViewport ( ) -> GetTickmarks ( original_tickmarks ) ; EXPECT_EQ ( 1u , original_tickmarks . size ( ) ) ; EXPECT_EQ ( IntPoint ( 800 , 2000 ) , original_tickmarks [ 0 ] . Location ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( SoundContentSettingObserverTest , MuteByDefaultAndExceptionRecordsException ) { ChangeSoundContentSettingTo ( CONTENT_SETTING_BLOCK ) ; ChangeDefaultSoundContentSettingTo ( CONTENT_SETTING_BLOCK ) ; SimulateAudioStarting ( ) ; EXPECT_TRUE ( RecordedSiteMuted ( ) ) ; ExpectRecordedForReason ( SoundContentSettingObserver : : MuteReason : : kSiteException ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int evdns_resolve_reverse_ipv6 ( const struct in6_addr * in , int flags , evdns_callback_type callback , void * ptr ) { char buf [ 73 ] ; char * cp ; struct request * req ; int i ; assert ( in ) ; cp = buf ; for ( i = 15 ; i >= 0 ; -- i ) { u8 byte = in -> s6_addr [ i ] ; * cp ++ = "0123456789abcdef" [ byte & 0x0f ] ; * cp ++ = '.' ; * cp ++ = "0123456789abcdef" [ byte >> 4 ] ; * cp ++ = '.' ; } assert ( cp + strlen ( "ip6.arpa" ) < buf + sizeof ( buf ) ) ; memcpy ( cp , "ip6.arpa" , strlen ( "ip6.arpa" ) + 1 ) ; log ( EVDNS_LOG_DEBUG , "Resolve requested for %s (reverse)" , buf ) ; req = request_new ( TYPE_PTR , buf , flags , callback , ptr ) ; if ( ! req ) return 1 ; request_submit ( req ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int set_str_utf16be ( struct archive_write * a , unsigned char * p , const char * s , size_t l , uint16_t uf , enum vdc vdc ) { size_t size , i ; int onepad ; if ( s == NULL ) s = "" ; if ( l & 0x01 ) { onepad = 1 ; l &= ~ 1 ; } else onepad = 0 ; if ( vdc == VDC_UCS2 ) { struct iso9660 * iso9660 = a -> format_data ; if ( archive_strncpy_l ( & iso9660 -> utf16be , s , strlen ( s ) , iso9660 -> sconv_to_utf16be ) != 0 && errno == ENOMEM ) { archive_set_error ( & a -> archive , ENOMEM , "Can't allocate memory for UTF-16BE" ) ; return ( ARCHIVE_FATAL ) ; } size = iso9660 -> utf16be . length ; if ( size > l ) size = l ; memcpy ( p , iso9660 -> utf16be . s , size ) ; } else { const uint16_t * u16 = ( const uint16_t * ) s ; size = 0 ; while ( * u16 ++ ) size += 2 ; if ( size > l ) size = l ; memcpy ( p , s , size ) ; } for ( i = 0 ; i < size ; i += 2 , p += 2 ) { if ( ! joliet_allowed_char ( p [ 0 ] , p [ 1 ] ) ) archive_be16enc ( p , 0x005F ) ; } l -= size ; while ( l > 0 ) { archive_be16enc ( p , uf ) ; p += 2 ; l -= 2 ; } if ( onepad ) * p = 0 ; return ( ARCHIVE_OK ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void init_util ( void ) { filegen_register ( statsdir , "peerstats" , & peerstats ) ; filegen_register ( statsdir , "loopstats" , & loopstats ) ; filegen_register ( statsdir , "clockstats" , & clockstats ) ; filegen_register ( statsdir , "rawstats" , & rawstats ) ; filegen_register ( statsdir , "sysstats" , & sysstats ) ; filegen_register ( statsdir , "protostats" , & protostats ) ; filegen_register ( statsdir , "cryptostats" , & cryptostats ) ; filegen_register ( statsdir , "timingstats" , & timingstats ) ; step_callback = & ntpd_time_stepped ; # ifdef DEBUG atexit ( & uninit_util ) ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
int X509_verify ( X509 * a , EVP_PKEY * r ) { if ( X509_ALGOR_cmp ( a -> sig_alg , a -> cert_info -> signature ) ) return 0 ; return ( ASN1_item_verify ( ASN1_ITEM_rptr ( X509_CINF ) , a -> sig_alg , a -> signature , a -> cert_info , r ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static hb_user_data_key_t user_data_key_reference ( hb_user_data_key_t l ) { return l ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
int y4m_input_fetch_frame ( y4m_input * _y4m , FILE * _fin , vpx_image_t * _img ) { char frame [ 6 ] ; int pic_sz ; int c_w ; int c_h ; int c_sz ; int bytes_per_sample = _y4m -> bit_depth > 8 ? 2 : 1 ; if ( ! file_read ( frame , 6 , _fin ) ) return 0 ; if ( memcmp ( frame , "FRAME" , 5 ) ) { fprintf ( stderr , "Loss of framing in Y4M input data\n" ) ; return - 1 ; } if ( frame [ 5 ] != '\n' ) { char c ; int j ; for ( j = 0 ; j < 79 && file_read ( & c , 1 , _fin ) && c != '\n' ; j ++ ) { } if ( j == 79 ) { fprintf ( stderr , "Error parsing Y4M frame header\n" ) ; return - 1 ; } } if ( ! file_read ( _y4m -> dst_buf , _y4m -> dst_buf_read_sz , _fin ) ) { fprintf ( stderr , "Error reading Y4M frame data.\n" ) ; return - 1 ; } if ( ! file_read ( _y4m -> aux_buf , _y4m -> aux_buf_read_sz , _fin ) ) { fprintf ( stderr , "Error reading Y4M frame data.\n" ) ; return - 1 ; } ( * _y4m -> convert ) ( _y4m , _y4m -> dst_buf , _y4m -> aux_buf ) ; memset ( _img , 0 , sizeof ( * _img ) ) ; _img -> fmt = _y4m -> vpx_fmt ; _img -> w = _img -> d_w = _y4m -> pic_w ; _img -> h = _img -> d_h = _y4m -> pic_h ; _img -> x_chroma_shift = _y4m -> dst_c_dec_h >> 1 ; _img -> y_chroma_shift = _y4m -> dst_c_dec_v >> 1 ; _img -> bps = _y4m -> bps ; pic_sz = _y4m -> pic_w * _y4m -> pic_h * bytes_per_sample ; c_w = ( _y4m -> pic_w + _y4m -> dst_c_dec_h - 1 ) / _y4m -> dst_c_dec_h ; c_w *= bytes_per_sample ; c_h = ( _y4m -> pic_h + _y4m -> dst_c_dec_v - 1 ) / _y4m -> dst_c_dec_v ; c_sz = c_w * c_h ; _img -> stride [ VPX_PLANE_Y ] = _img -> stride [ VPX_PLANE_ALPHA ] = _y4m -> pic_w * bytes_per_sample ; _img -> stride [ VPX_PLANE_U ] = _img -> stride [ VPX_PLANE_V ] = c_w ; _img -> planes [ VPX_PLANE_Y ] = _y4m -> dst_buf ; _img -> planes [ VPX_PLANE_U ] = _y4m -> dst_buf + pic_sz ; _img -> planes [ VPX_PLANE_V ] = _y4m -> dst_buf + pic_sz + c_sz ; _img -> planes [ VPX_PLANE_ALPHA ] = _y4m -> dst_buf + pic_sz + 2 * c_sz ; return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void qemuAgentClose ( qemuAgentPtr mon ) { if ( ! mon ) return ; VIR_DEBUG ( "mon=%p" , mon ) ; virObjectLock ( mon ) ; if ( mon -> fd >= 0 ) { if ( mon -> watch ) virEventRemoveHandle ( mon -> watch ) ; VIR_FORCE_CLOSE ( mon -> fd ) ; } qemuAgentNotifyCloseLocked ( mon ) ; virObjectUnlock ( mon ) ; virObjectUnref ( mon ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static double rfc1867_size ( tvbuff_t * tvb , int offset ) { guint8 val ; double size ; guint32 exponent ; val = tvb_get_guint8 ( tvb , offset ) ; size = ( val & 0xF0 ) >> 4 ; exponent = ( val & 0x0F ) ; while ( exponent != 0 ) { size *= 10 ; exponent -- ; } return size / 100 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int SpoolssSetJob_r ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep ) { offset = dissect_doserror ( tvb , offset , pinfo , tree , di , drep , hf_rc , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void qio_channel_websock_handshake ( QIOChannelWebsock * ioc , QIOTaskFunc func , gpointer opaque , GDestroyNotify destroy ) { QIOTask * task ; task = qio_task_new ( OBJECT ( ioc ) , func , opaque , destroy ) ; trace_qio_channel_websock_handshake_start ( ioc ) ; trace_qio_channel_websock_handshake_pending ( ioc , G_IO_IN ) ; qio_channel_add_watch ( ioc -> master , G_IO_IN , qio_channel_websock_handshake_io , task , NULL ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dtap_tp_test_interface ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len ) { guint32 curr_offset ; guint32 consumed ; guint curr_len ; curr_len = len ; curr_offset = offset ; ELEM_MAND_V ( GSM_A_PDU_TYPE_DTAP , DE_TP_TESTED_DEVICE , NULL ) ; EXTRANEOUS_DATA_CHECK ( curr_len , 0 , pinfo , & ei_gsm_a_dtap_extraneous_data ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int aout_update_format ( decoder_t * p_dec ) { decoder_owner_sys_t * p_owner = p_dec -> p_owner ; if ( p_owner -> p_aout && ( ! AOUT_FMTS_IDENTICAL ( & p_dec -> fmt_out . audio , & p_owner -> audio ) || p_dec -> fmt_out . i_codec != p_dec -> fmt_out . audio . i_format ) ) { audio_output_t * p_aout = p_owner -> p_aout ; vlc_mutex_lock ( & p_owner -> lock ) ; aout_DecDelete ( p_owner -> p_aout ) ; p_owner -> p_aout = NULL ; vlc_mutex_unlock ( & p_owner -> lock ) ; input_resource_PutAout ( p_owner -> p_resource , p_aout ) ; } if ( p_owner -> p_aout == NULL ) { const int i_force_dolby = var_InheritInteger ( p_dec , "force-dolby-surround" ) ; audio_sample_format_t format ; audio_output_t * p_aout ; aout_request_vout_t request_vout ; p_dec -> fmt_out . audio . i_format = p_dec -> fmt_out . i_codec ; p_owner -> audio = p_dec -> fmt_out . audio ; aout_FormatPrepare ( & p_owner -> audio ) ; memcpy ( & format , & p_owner -> audio , sizeof ( audio_sample_format_t ) ) ; if ( i_force_dolby && ( format . i_original_channels & AOUT_CHAN_PHYSMASK ) == ( AOUT_CHAN_LEFT | AOUT_CHAN_RIGHT ) ) { if ( i_force_dolby == 1 ) { format . i_original_channels = format . i_original_channels | AOUT_CHAN_DOLBYSTEREO ; } else { format . i_original_channels = format . i_original_channels & ~ AOUT_CHAN_DOLBYSTEREO ; } } request_vout . pf_request_vout = aout_request_vout ; request_vout . p_private = p_dec ; assert ( p_owner -> p_aout == NULL ) ; p_aout = input_resource_GetAout ( p_owner -> p_resource ) ; if ( p_aout ) { if ( aout_DecNew ( p_aout , & format , & p_dec -> fmt_out . audio_replay_gain , & request_vout ) ) { input_resource_PutAout ( p_owner -> p_resource , p_aout ) ; p_aout = NULL ; } } vlc_mutex_lock ( & p_owner -> lock ) ; p_owner -> p_aout = p_aout ; DecoderUpdateFormatLocked ( p_dec ) ; if ( unlikely ( p_owner -> b_paused ) && p_aout != NULL ) aout_DecChangePause ( p_aout , true , mdate ( ) ) ; vlc_mutex_unlock ( & p_owner -> lock ) ; if ( p_owner -> p_input != NULL ) input_SendEventAout ( p_owner -> p_input ) ; if ( p_aout == NULL ) { msg_Err ( p_dec , "failed to create audio output" ) ; p_dec -> b_error = true ; return - 1 ; } p_dec -> fmt_out . audio . i_bytes_per_frame = p_owner -> audio . i_bytes_per_frame ; p_dec -> fmt_out . audio . i_frame_length = p_owner -> audio . i_frame_length ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int afx_init1 ( SysBusDevice * dev ) { AFXState * s = FROM_SYSBUS ( AFXState , dev ) ; memory_region_init_ram ( & s -> mem , OBJECT ( s ) , "sun4m.afx" , 4 ) ; vmstate_register_ram_global ( & s -> mem ) ; sysbus_init_mmio ( dev , & s -> mem ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_ResourcesAvailableConfirm ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_ResourcesAvailableConfirm , ResourcesAvailableConfirm_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void test_bug29687 ( ) { const int NUM_ITERATIONS = 40 ; int i ; int rc ; MYSQL_STMT * stmt = NULL ; DBUG_ENTER ( "test_bug29687" ) ; myheader ( "test_bug29687" ) ; stmt = mysql_simple_prepare ( mysql , "SELECT 1 FROM dual WHERE 0=2" ) ; DIE_UNLESS ( stmt ) ; for ( i = 0 ; i < NUM_ITERATIONS ; i ++ ) { rc = mysql_stmt_execute ( stmt ) ; check_execute ( stmt , rc ) ; mysql_stmt_store_result ( stmt ) ; while ( mysql_stmt_fetch ( stmt ) == 0 ) ; mysql_stmt_free_result ( stmt ) ; } mysql_stmt_close ( stmt ) ; DBUG_VOID_RETURN ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void * Type_Data_Read ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , cmsUInt32Number * nItems , cmsUInt32Number SizeOfTag ) { cmsICCData * BinData ; cmsUInt32Number LenOfData ; * nItems = 0 ; if ( SizeOfTag < sizeof ( cmsUInt32Number ) ) return NULL ; LenOfData = SizeOfTag - sizeof ( cmsUInt32Number ) ; if ( LenOfData > INT_MAX ) return NULL ; BinData = ( cmsICCData * ) _cmsMalloc ( self -> ContextID , sizeof ( cmsICCData ) + LenOfData - 1 ) ; if ( BinData == NULL ) return NULL ; BinData -> len = LenOfData ; if ( ! _cmsReadUInt32Number ( io , & BinData -> flag ) ) { _cmsFree ( self -> ContextID , BinData ) ; return NULL ; } if ( io -> Read ( io , BinData -> data , sizeof ( cmsUInt8Number ) , LenOfData ) != LenOfData ) { _cmsFree ( self -> ContextID , BinData ) ; return NULL ; } * nItems = 1 ; return ( void * ) BinData ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int mbfl_buffer_converter_feed ( mbfl_buffer_converter * convd , mbfl_string * string ) { return mbfl_buffer_converter_feed2 ( convd , string , NULL ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int decode_tilehdr ( WMAProDecodeCtx * s ) { uint16_t num_samples [ WMAPRO_MAX_CHANNELS ] = { 0 } ; uint8_t contains_subframe [ WMAPRO_MAX_CHANNELS ] ; int channels_for_cur_subframe = s -> avctx -> channels ; int fixed_channel_layout = 0 ; int min_channel_len = 0 ; int c ; for ( c = 0 ; c < s -> avctx -> channels ; c ++ ) s -> channel [ c ] . num_subframes = 0 ; if ( s -> max_num_subframes == 1 || get_bits1 ( & s -> gb ) ) fixed_channel_layout = 1 ; do { int subframe_len ; for ( c = 0 ; c < s -> avctx -> channels ; c ++ ) { if ( num_samples [ c ] == min_channel_len ) { if ( fixed_channel_layout || channels_for_cur_subframe == 1 || ( min_channel_len == s -> samples_per_frame - s -> min_samples_per_subframe ) ) contains_subframe [ c ] = 1 ; else contains_subframe [ c ] = get_bits1 ( & s -> gb ) ; } else contains_subframe [ c ] = 0 ; } if ( ( subframe_len = decode_subframe_length ( s , min_channel_len ) ) <= 0 ) return AVERROR_INVALIDDATA ; min_channel_len += subframe_len ; for ( c = 0 ; c < s -> avctx -> channels ; c ++ ) { WMAProChannelCtx * chan = & s -> channel [ c ] ; if ( contains_subframe [ c ] ) { if ( chan -> num_subframes >= MAX_SUBFRAMES ) { av_log ( s -> avctx , AV_LOG_ERROR , "broken frame: num subframes > 31\n" ) ; return AVERROR_INVALIDDATA ; } chan -> subframe_len [ chan -> num_subframes ] = subframe_len ; num_samples [ c ] += subframe_len ; ++ chan -> num_subframes ; if ( num_samples [ c ] > s -> samples_per_frame ) { av_log ( s -> avctx , AV_LOG_ERROR , "broken frame: " "channel len > samples_per_frame\n" ) ; return AVERROR_INVALIDDATA ; } } else if ( num_samples [ c ] <= min_channel_len ) { if ( num_samples [ c ] < min_channel_len ) { channels_for_cur_subframe = 0 ; min_channel_len = num_samples [ c ] ; } ++ channels_for_cur_subframe ; } } } while ( min_channel_len < s -> samples_per_frame ) ; for ( c = 0 ; c < s -> avctx -> channels ; c ++ ) { int i ; int offset = 0 ; for ( i = 0 ; i < s -> channel [ c ] . num_subframes ; i ++ ) { av_dlog ( s -> avctx , "frame[%i] channel[%i] subframe[%i]" " len %i\n" , s -> frame_num , c , i , s -> channel [ c ] . subframe_len [ i ] ) ; s -> channel [ c ] . subframe_offset [ i ] = offset ; offset += s -> channel [ c ] . subframe_len [ i ] ; } } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int arith2_get_prob ( ArithCoder * c , int16_t * probs ) { int range = c -> high - c -> low + 1 , n = * probs ; int scale = av_log2 ( range ) - av_log2 ( n ) ; int i = 0 , val ; if ( n << scale > range ) scale -- ; n <<= scale ; val = arith2_get_scaled_value ( c -> value - c -> low , n , range ) >> scale ; while ( probs [ ++ i ] > val ) ; arith2_rescale_interval ( c , range , probs [ i ] << scale , probs [ i - 1 ] << scale , n ) ; return i ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int _route_msg_to_origin ( slurm_msg_t * msg , char * src_job_id_str , uint32_t src_job_id , uid_t uid ) { xassert ( msg ) ; if ( ! msg -> conn && fed_mgr_fed_rec ) { uint32_t job_id , origin_id ; if ( src_job_id_str ) job_id = strtol ( src_job_id_str , NULL , 10 ) ; else job_id = src_job_id ; origin_id = fed_mgr_get_cluster_id ( job_id ) ; if ( origin_id && ( origin_id != fed_mgr_cluster_rec -> fed . id ) ) { slurmdb_cluster_rec_t * dst = fed_mgr_get_cluster_by_id ( origin_id ) ; if ( ! dst ) { error ( "couldn't find cluster by cluster id %d" , origin_id ) ; slurm_send_rc_msg ( msg , SLURM_ERROR ) ; } else { slurm_send_reroute_msg ( msg , dst ) ; info ( "%s: %s job %d uid %d routed to %s" , __func__ , rpc_num2string ( msg -> msg_type ) , job_id , uid , dst -> name ) ; } return SLURM_SUCCESS ; } } return SLURM_ERROR ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int s_aos_flush ( stream * s ) { s -> position = ( ( aos_state_t * ) s -> state ) -> file_sz ; s -> srptr = s -> srlimit = s -> cbuf - 1 ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int32_t u_scanf_skip_leading_ws ( UFILE * input , UChar pad ) { UChar c ; int32_t count = 0 ; UBool isNotEOF ; while ( ( isNotEOF = ufile_getch ( input , & c ) ) && ( c == pad || u_isWhitespace ( c ) ) ) { count ++ ; } if ( isNotEOF ) u_fungetc ( c , input ) ; return count ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void set_result_format_version ( ulong new_version ) { switch ( new_version ) { case 1 : break ; case 2 : break ; default : die ( "Version format %lu has not yet been implemented" , new_version ) ; break ; } opt_result_format_version = new_version ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp8_denoiser_set_parameters ( VP8_DENOISER * denoiser , int mode ) { assert ( mode > 0 ) ; if ( mode == 1 ) { denoiser -> denoiser_mode = kDenoiserOnYOnly ; } else if ( mode == 2 ) { denoiser -> denoiser_mode = kDenoiserOnYUV ; } else if ( mode == 3 ) { denoiser -> denoiser_mode = kDenoiserOnYUVAggressive ; } else { denoiser -> denoiser_mode = kDenoiserOnAdaptive ; } if ( denoiser -> denoiser_mode != kDenoiserOnYUVAggressive ) { denoiser -> denoise_pars . scale_sse_thresh = 1 ; denoiser -> denoise_pars . scale_motion_thresh = 8 ; denoiser -> denoise_pars . scale_increase_filter = 0 ; denoiser -> denoise_pars . denoise_mv_bias = 95 ; denoiser -> denoise_pars . pickmode_mv_bias = 100 ; denoiser -> denoise_pars . qp_thresh = 0 ; denoiser -> denoise_pars . consec_zerolast = UINT_MAX ; } else { denoiser -> denoise_pars . scale_sse_thresh = 2 ; denoiser -> denoise_pars . scale_motion_thresh = 16 ; denoiser -> denoise_pars . scale_increase_filter = 1 ; denoiser -> denoise_pars . denoise_mv_bias = 60 ; denoiser -> denoise_pars . pickmode_mv_bias = 60 ; denoiser -> denoise_pars . qp_thresh = 100 ; denoiser -> denoise_pars . consec_zerolast = 10 ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void * _conf_to_memberp ( TSOverridableConfigKey conf , OverridableHttpConfigParams * overridableHttpConfig , OverridableDataType * typep ) { OverridableDataType typ = OVERRIDABLE_TYPE_BYTE ; void * ret = nullptr ; switch ( conf ) { case TS_CONFIG_URL_REMAP_PRISTINE_HOST_HDR : ret = & overridableHttpConfig -> maintain_pristine_host_hdr ; break ; case TS_CONFIG_HTTP_CHUNKING_ENABLED : ret = & overridableHttpConfig -> chunking_enabled ; break ; case TS_CONFIG_HTTP_NEGATIVE_CACHING_ENABLED : ret = & overridableHttpConfig -> negative_caching_enabled ; break ; case TS_CONFIG_HTTP_NEGATIVE_CACHING_LIFETIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> negative_caching_lifetime ; break ; case TS_CONFIG_HTTP_CACHE_WHEN_TO_REVALIDATE : ret = & overridableHttpConfig -> cache_when_to_revalidate ; break ; case TS_CONFIG_HTTP_KEEP_ALIVE_ENABLED_IN : ret = & overridableHttpConfig -> keep_alive_enabled_in ; break ; case TS_CONFIG_HTTP_KEEP_ALIVE_ENABLED_OUT : ret = & overridableHttpConfig -> keep_alive_enabled_out ; break ; case TS_CONFIG_HTTP_KEEP_ALIVE_POST_OUT : ret = & overridableHttpConfig -> keep_alive_post_out ; break ; case TS_CONFIG_HTTP_SERVER_SESSION_SHARING_MATCH : ret = & overridableHttpConfig -> server_session_sharing_match ; break ; case TS_CONFIG_NET_SOCK_RECV_BUFFER_SIZE_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> sock_recv_buffer_size_out ; break ; case TS_CONFIG_NET_SOCK_SEND_BUFFER_SIZE_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> sock_send_buffer_size_out ; break ; case TS_CONFIG_NET_SOCK_OPTION_FLAG_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> sock_option_flag_out ; break ; case TS_CONFIG_HTTP_FORWARD_PROXY_AUTH_TO_PARENT : ret = & overridableHttpConfig -> fwd_proxy_auth_to_parent ; break ; case TS_CONFIG_HTTP_ANONYMIZE_REMOVE_FROM : ret = & overridableHttpConfig -> anonymize_remove_from ; break ; case TS_CONFIG_HTTP_ANONYMIZE_REMOVE_REFERER : ret = & overridableHttpConfig -> anonymize_remove_referer ; break ; case TS_CONFIG_HTTP_ANONYMIZE_REMOVE_USER_AGENT : ret = & overridableHttpConfig -> anonymize_remove_user_agent ; break ; case TS_CONFIG_HTTP_ANONYMIZE_REMOVE_COOKIE : ret = & overridableHttpConfig -> anonymize_remove_cookie ; break ; case TS_CONFIG_HTTP_ANONYMIZE_REMOVE_CLIENT_IP : ret = & overridableHttpConfig -> anonymize_remove_client_ip ; break ; case TS_CONFIG_HTTP_ANONYMIZE_INSERT_CLIENT_IP : ret = & overridableHttpConfig -> anonymize_insert_client_ip ; break ; case TS_CONFIG_HTTP_RESPONSE_SERVER_ENABLED : ret = & overridableHttpConfig -> proxy_response_server_enabled ; break ; case TS_CONFIG_HTTP_INSERT_SQUID_X_FORWARDED_FOR : ret = & overridableHttpConfig -> insert_squid_x_forwarded_for ; break ; case TS_CONFIG_HTTP_SERVER_TCP_INIT_CWND : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> server_tcp_init_cwnd ; break ; case TS_CONFIG_HTTP_SEND_HTTP11_REQUESTS : ret = & overridableHttpConfig -> send_http11_requests ; break ; case TS_CONFIG_HTTP_CACHE_HTTP : ret = & overridableHttpConfig -> cache_http ; break ; case TS_CONFIG_HTTP_CACHE_CLUSTER_CACHE_LOCAL : ret = & overridableHttpConfig -> cache_cluster_cache_local ; break ; case TS_CONFIG_HTTP_CACHE_IGNORE_CLIENT_NO_CACHE : ret = & overridableHttpConfig -> cache_ignore_client_no_cache ; break ; case TS_CONFIG_HTTP_CACHE_IGNORE_CLIENT_CC_MAX_AGE : ret = & overridableHttpConfig -> cache_ignore_client_cc_max_age ; break ; case TS_CONFIG_HTTP_CACHE_IMS_ON_CLIENT_NO_CACHE : ret = & overridableHttpConfig -> cache_ims_on_client_no_cache ; break ; case TS_CONFIG_HTTP_CACHE_IGNORE_SERVER_NO_CACHE : ret = & overridableHttpConfig -> cache_ignore_server_no_cache ; break ; case TS_CONFIG_HTTP_CACHE_CACHE_RESPONSES_TO_COOKIES : ret = & overridableHttpConfig -> cache_responses_to_cookies ; break ; case TS_CONFIG_HTTP_CACHE_IGNORE_AUTHENTICATION : ret = & overridableHttpConfig -> cache_ignore_auth ; break ; case TS_CONFIG_HTTP_CACHE_CACHE_URLS_THAT_LOOK_DYNAMIC : ret = & overridableHttpConfig -> cache_urls_that_look_dynamic ; break ; case TS_CONFIG_HTTP_CACHE_REQUIRED_HEADERS : ret = & overridableHttpConfig -> cache_required_headers ; break ; case TS_CONFIG_HTTP_INSERT_REQUEST_VIA_STR : ret = & overridableHttpConfig -> insert_request_via_string ; break ; case TS_CONFIG_HTTP_INSERT_RESPONSE_VIA_STR : ret = & overridableHttpConfig -> insert_response_via_string ; break ; case TS_CONFIG_HTTP_CACHE_HEURISTIC_MIN_LIFETIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> cache_heuristic_min_lifetime ; break ; case TS_CONFIG_HTTP_CACHE_HEURISTIC_MAX_LIFETIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> cache_heuristic_max_lifetime ; break ; case TS_CONFIG_HTTP_CACHE_GUARANTEED_MIN_LIFETIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> cache_guaranteed_min_lifetime ; break ; case TS_CONFIG_HTTP_CACHE_GUARANTEED_MAX_LIFETIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> cache_guaranteed_max_lifetime ; break ; case TS_CONFIG_HTTP_CACHE_MAX_STALE_AGE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> cache_max_stale_age ; break ; case TS_CONFIG_HTTP_KEEP_ALIVE_NO_ACTIVITY_TIMEOUT_IN : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> keep_alive_no_activity_timeout_in ; break ; case TS_CONFIG_HTTP_KEEP_ALIVE_NO_ACTIVITY_TIMEOUT_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> keep_alive_no_activity_timeout_out ; break ; case TS_CONFIG_HTTP_TRANSACTION_NO_ACTIVITY_TIMEOUT_IN : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> transaction_no_activity_timeout_in ; break ; case TS_CONFIG_HTTP_TRANSACTION_NO_ACTIVITY_TIMEOUT_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> transaction_no_activity_timeout_out ; break ; case TS_CONFIG_HTTP_TRANSACTION_ACTIVE_TIMEOUT_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> transaction_active_timeout_out ; break ; case TS_CONFIG_HTTP_ORIGIN_MAX_CONNECTIONS : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> origin_max_connections ; break ; case TS_CONFIG_HTTP_CONNECT_ATTEMPTS_MAX_RETRIES : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> connect_attempts_max_retries ; break ; case TS_CONFIG_HTTP_CONNECT_ATTEMPTS_MAX_RETRIES_DEAD_SERVER : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> connect_attempts_max_retries_dead_server ; break ; case TS_CONFIG_HTTP_CONNECT_ATTEMPTS_RR_RETRIES : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> connect_attempts_rr_retries ; break ; case TS_CONFIG_HTTP_CONNECT_ATTEMPTS_TIMEOUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> connect_attempts_timeout ; break ; case TS_CONFIG_HTTP_POST_CONNECT_ATTEMPTS_TIMEOUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> post_connect_attempts_timeout ; break ; case TS_CONFIG_HTTP_DOWN_SERVER_CACHE_TIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> down_server_timeout ; break ; case TS_CONFIG_HTTP_DOWN_SERVER_ABORT_THRESHOLD : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> client_abort_threshold ; break ; case TS_CONFIG_HTTP_CACHE_FUZZ_TIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> freshness_fuzz_time ; break ; case TS_CONFIG_HTTP_CACHE_FUZZ_MIN_TIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> freshness_fuzz_min_time ; break ; case TS_CONFIG_HTTP_DOC_IN_CACHE_SKIP_DNS : ret = & overridableHttpConfig -> doc_in_cache_skip_dns ; break ; case TS_CONFIG_HTTP_BACKGROUND_FILL_ACTIVE_TIMEOUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> background_fill_active_timeout ; break ; case TS_CONFIG_HTTP_RESPONSE_SERVER_STR : typ = OVERRIDABLE_TYPE_STRING ; ret = & overridableHttpConfig -> proxy_response_server_string ; break ; case TS_CONFIG_HTTP_CACHE_HEURISTIC_LM_FACTOR : typ = OVERRIDABLE_TYPE_FLOAT ; ret = & overridableHttpConfig -> cache_heuristic_lm_factor ; break ; case TS_CONFIG_HTTP_CACHE_FUZZ_PROBABILITY : typ = OVERRIDABLE_TYPE_FLOAT ; ret = & overridableHttpConfig -> freshness_fuzz_prob ; break ; case TS_CONFIG_HTTP_BACKGROUND_FILL_COMPLETED_THRESHOLD : typ = OVERRIDABLE_TYPE_FLOAT ; ret = & overridableHttpConfig -> background_fill_threshold ; break ; case TS_CONFIG_NET_SOCK_PACKET_MARK_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> sock_packet_mark_out ; break ; case TS_CONFIG_NET_SOCK_PACKET_TOS_OUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> sock_packet_tos_out ; break ; case TS_CONFIG_HTTP_INSERT_AGE_IN_RESPONSE : ret = & overridableHttpConfig -> insert_age_in_response ; break ; case TS_CONFIG_HTTP_CHUNKING_SIZE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> http_chunking_size ; break ; case TS_CONFIG_HTTP_FLOW_CONTROL_ENABLED : ret = & overridableHttpConfig -> flow_control_enabled ; break ; case TS_CONFIG_HTTP_FLOW_CONTROL_LOW_WATER_MARK : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> flow_low_water_mark ; break ; case TS_CONFIG_HTTP_FLOW_CONTROL_HIGH_WATER_MARK : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> flow_high_water_mark ; break ; case TS_CONFIG_HTTP_CACHE_RANGE_LOOKUP : ret = & overridableHttpConfig -> cache_range_lookup ; break ; case TS_CONFIG_HTTP_NORMALIZE_AE_GZIP : ret = & overridableHttpConfig -> normalize_ae_gzip ; break ; case TS_CONFIG_HTTP_DEFAULT_BUFFER_SIZE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> default_buffer_size_index ; break ; case TS_CONFIG_HTTP_DEFAULT_BUFFER_WATER_MARK : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> default_buffer_water_mark ; break ; case TS_CONFIG_HTTP_REQUEST_HEADER_MAX_SIZE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> request_hdr_max_size ; break ; case TS_CONFIG_HTTP_RESPONSE_HEADER_MAX_SIZE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> response_hdr_max_size ; break ; case TS_CONFIG_HTTP_NEGATIVE_REVALIDATING_ENABLED : ret = & overridableHttpConfig -> negative_revalidating_enabled ; break ; case TS_CONFIG_HTTP_NEGATIVE_REVALIDATING_LIFETIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> negative_revalidating_lifetime ; break ; case TS_CONFIG_SSL_HSTS_MAX_AGE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> proxy_response_hsts_max_age ; break ; case TS_CONFIG_SSL_HSTS_INCLUDE_SUBDOMAINS : ret = & overridableHttpConfig -> proxy_response_hsts_include_subdomains ; break ; case TS_CONFIG_HTTP_CACHE_OPEN_READ_RETRY_TIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> cache_open_read_retry_time ; break ; case TS_CONFIG_HTTP_CACHE_MAX_OPEN_READ_RETRIES : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> max_cache_open_read_retries ; break ; case TS_CONFIG_HTTP_CACHE_RANGE_WRITE : ret = & overridableHttpConfig -> cache_range_write ; break ; case TS_CONFIG_HTTP_POST_CHECK_CONTENT_LENGTH_ENABLED : ret = & overridableHttpConfig -> post_check_content_length_enabled ; break ; case TS_CONFIG_HTTP_GLOBAL_USER_AGENT_HEADER : typ = OVERRIDABLE_TYPE_STRING ; ret = & overridableHttpConfig -> global_user_agent_header ; break ; case TS_CONFIG_HTTP_AUTH_SERVER_SESSION_PRIVATE : ret = & overridableHttpConfig -> auth_server_session_private ; break ; case TS_CONFIG_HTTP_SLOW_LOG_THRESHOLD : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> slow_log_threshold ; break ; case TS_CONFIG_HTTP_CACHE_GENERATION : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> cache_generation_number ; break ; case TS_CONFIG_BODY_FACTORY_TEMPLATE_BASE : typ = OVERRIDABLE_TYPE_STRING ; ret = & overridableHttpConfig -> body_factory_template_base ; break ; case TS_CONFIG_HTTP_CACHE_OPEN_WRITE_FAIL_ACTION : ret = & overridableHttpConfig -> cache_open_write_fail_action ; break ; case TS_CONFIG_HTTP_ENABLE_REDIRECTION : ret = & overridableHttpConfig -> redirection_enabled ; break ; case TS_CONFIG_HTTP_NUMBER_OF_REDIRECTIONS : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> number_of_redirections ; break ; case TS_CONFIG_HTTP_CACHE_MAX_OPEN_WRITE_RETRIES : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> max_cache_open_write_retries ; break ; case TS_CONFIG_HTTP_REDIRECT_USE_ORIG_CACHE_KEY : ret = & overridableHttpConfig -> redirect_use_orig_cache_key ; break ; case TS_CONFIG_HTTP_ATTACH_SERVER_SESSION_TO_CLIENT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> attach_server_session_to_client ; break ; case TS_CONFIG_HTTP_SAFE_REQUESTS_RETRYABLE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> safe_requests_retryable ; break ; case TS_CONFIG_HTTP_ORIGIN_MAX_CONNECTIONS_QUEUE : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> origin_max_connections_queue ; break ; case TS_CONFIG_WEBSOCKET_NO_ACTIVITY_TIMEOUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> websocket_inactive_timeout ; break ; case TS_CONFIG_WEBSOCKET_ACTIVE_TIMEOUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> websocket_active_timeout ; break ; case TS_CONFIG_HTTP_UNCACHEABLE_REQUESTS_BYPASS_PARENT : ret = & overridableHttpConfig -> uncacheable_requests_bypass_parent ; break ; case TS_CONFIG_HTTP_PARENT_PROXY_TOTAL_CONNECT_ATTEMPTS : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> parent_connect_attempts ; break ; case TS_CONFIG_HTTP_TRANSACTION_ACTIVE_TIMEOUT_IN : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> transaction_active_timeout_in ; break ; case TS_CONFIG_SRV_ENABLED : ret = & overridableHttpConfig -> srv_enabled ; break ; case TS_CONFIG_HTTP_FORWARD_CONNECT_METHOD : ret = & overridableHttpConfig -> forward_connect_method ; break ; case TS_CONFIG_SSL_CERT_FILENAME : typ = OVERRIDABLE_TYPE_STRING ; ret = & overridableHttpConfig -> client_cert_filename ; break ; case TS_CONFIG_SSL_CERT_FILEPATH : typ = OVERRIDABLE_TYPE_STRING ; ret = & overridableHttpConfig -> client_cert_filepath ; break ; case TS_CONFIG_PARENT_FAILURES_UPDATE_HOSTDB : ret = & overridableHttpConfig -> parent_failures_update_hostdb ; break ; case TS_CONFIG_SSL_CLIENT_VERIFY_SERVER : ret = & overridableHttpConfig -> ssl_client_verify_server ; break ; case TS_CONFIG_HTTP_PARENT_PROXY_FAIL_THRESHOLD : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> parent_fail_threshold ; break ; case TS_CONFIG_HTTP_PARENT_PROXY_RETRY_TIME : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> parent_retry_time ; break ; case TS_CONFIG_HTTP_PER_PARENT_CONNECT_ATTEMPTS : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> per_parent_connect_attempts ; break ; case TS_CONFIG_HTTP_PARENT_CONNECT_ATTEMPT_TIMEOUT : typ = OVERRIDABLE_TYPE_INT ; ret = & overridableHttpConfig -> parent_connect_timeout ; break ; case TS_CONFIG_HTTP_ALLOW_MULTI_RANGE : ret = & overridableHttpConfig -> allow_multi_range ; break ; case TS_CONFIG_NULL : case TS_CONFIG_LAST_ENTRY : typ = OVERRIDABLE_TYPE_NULL ; ret = nullptr ; break ; } * typep = typ ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( SplFileInfo , func_name ) \ { \ spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; \ zend_error_handling error_handling ; \ if ( zend_parse_parameters_none ( ) == FAILURE ) { \ return ; \ } \ \ zend_replace_error_handling ( EH_THROW , spl_ce_RuntimeException , & error_handling TSRMLS_CC ) ; \ spl_filesystem_object_get_file_name ( intern TSRMLS_CC ) ; \ php_stat ( intern -> file_name , intern -> file_name_len , func_num , return_value TSRMLS_CC ) ; \ zend_restore_error_handling ( & error_handling TSRMLS_CC ) ; \ } FileInfoFunction ( getPerms , FS_PERMS )
0False
Categorize the following code snippet as vulnerable or not. True or False
static void cmd_window_move_dleft ( void ) { MAIN_WINDOW_REC * rec ; rec = mainwindows_find_left ( active_mainwin , FALSE ) ; if ( rec == NULL ) rec = mainwindows_find_left ( active_mainwin , TRUE ) ; if ( rec != NULL ) window_reparent ( active_win , rec ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int SpoolssEnumPrinterKey_r ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep ) { offset = dissect_spoolss_keybuffer ( tvb , offset , pinfo , tree , di , drep ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_needed , NULL ) ; offset = dissect_doserror ( tvb , offset , pinfo , tree , di , drep , hf_rc , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int dissect_h225_GenericData ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { # line 828 "./asn1/h225/h225.cnf" void * priv_data = actx -> private_data ; gef_ctx_t * gefx ; gefx = gef_ctx_get ( actx -> private_data ) ; if ( ! gefx ) { gefx = gef_ctx_alloc ( NULL , "GenericData" ) ; actx -> private_data = gefx ; } offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_GenericData , GenericData_sequence ) ; # line 838 "./asn1/h225/h225.cnf" actx -> private_data = priv_data ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
GType hb_gobject_ ## name ## _get_type ( void ) \ { static gsize type_id = 0 ; if ( g_once_init_enter ( & type_id ) ) { GType id = g_boxed_type_register_static ( g_intern_static_string ( "hb_" # name "_t" ) , ( GBoxedCopyFunc ) copy_func , ( GBoxedFreeFunc ) free_func ) ; g_once_init_leave ( & type_id , id ) ; } return type_id ; \ } # define HB_DEFINE_OBJECT_TYPE ( name ) HB_DEFINE_BOXED_TYPE ( name , hb_ ## name ## _reference , hb_ ## name ## _destroy ) ; # define HB_DEFINE_VALUE_TYPE ( name ) static hb_ ## name ## _t * _hb_ ## name ## _reference ( const hb_ ## name ## _t * l ) { hb_ ## name ## _t * c = ( hb_ ## name ## _t * ) calloc ( 1 , sizeof ( hb_ ## name ## _t ) ) ; if ( unlikely ( ! c ) ) return NULL ; * c = * l ; return c ; } static void _hb_ ## name ## _destroy ( hb_ ## name ## _t * l ) { free ( l ) ; } HB_DEFINE_BOXED_TYPE ( name , _hb_ ## name ## _reference , _hb_ ## name ## _destroy ) ; HB_DEFINE_OBJECT_TYPE ( buffer ) HB_DEFINE_OBJECT_TYPE ( blob ) HB_DEFINE_OBJECT_TYPE ( face ) HB_DEFINE_OBJECT_TYPE ( font ) HB_DEFINE_OBJECT_TYPE ( font_funcs ) HB_DEFINE_OBJECT_TYPE ( set ) HB_DEFINE_OBJECT_TYPE ( shape_plan ) HB_DEFINE_OBJECT_TYPE ( unicode_funcs ) HB_DEFINE_VALUE_TYPE ( feature ) HB_DEFINE_VALUE_TYPE ( glyph_info ) HB_DEFINE_VALUE_TYPE ( glyph_position ) HB_DEFINE_VALUE_TYPE ( segment_properties ) HB_DEFINE_VALUE_TYPE ( user_data_key )
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void add_dequant_dct ( MpegEncContext * s , int16_t * block , int i , uint8_t * dest , int line_size , int qscale ) { if ( s -> block_last_index [ i ] >= 0 ) { s -> dct_unquantize_inter ( s , block , i , qscale ) ; s -> dsp . idct_add ( dest , line_size , block ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int jas_image_addfmt ( int id , char * name , char * ext , char * desc , jas_image_fmtops_t * ops ) { jas_image_fmtinfo_t * fmtinfo ; assert ( id >= 0 && name && ext && ops ) ; if ( jas_image_numfmts >= JAS_IMAGE_MAXFMTS ) { return - 1 ; } fmtinfo = & jas_image_fmtinfos [ jas_image_numfmts ] ; fmtinfo -> id = id ; if ( ! ( fmtinfo -> name = jas_strdup ( name ) ) ) { return - 1 ; } if ( ! ( fmtinfo -> ext = jas_strdup ( ext ) ) ) { jas_free ( fmtinfo -> name ) ; return - 1 ; } if ( ! ( fmtinfo -> desc = jas_strdup ( desc ) ) ) { jas_free ( fmtinfo -> name ) ; jas_free ( fmtinfo -> ext ) ; return - 1 ; } fmtinfo -> ops = * ops ; ++ jas_image_numfmts ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_rc_get_one_pass_cbr_params ( VP9_COMP * cpi ) { VP9_COMMON * const cm = & cpi -> common ; RATE_CONTROL * const rc = & cpi -> rc ; int target ; if ( ( cm -> current_video_frame == 0 || ( cpi -> frame_flags & FRAMEFLAGS_KEY ) || rc -> frames_to_key == 0 || ( cpi -> oxcf . auto_key && 0 ) ) ) { cm -> frame_type = KEY_FRAME ; rc -> this_key_frame_forced = cm -> current_video_frame != 0 && rc -> frames_to_key == 0 ; rc -> frames_to_key = cpi -> oxcf . key_freq ; rc -> kf_boost = DEFAULT_KF_BOOST ; rc -> source_alt_ref_active = 0 ; target = calc_iframe_target_size_one_pass_cbr ( cpi ) ; } else { cm -> frame_type = INTER_FRAME ; target = calc_pframe_target_size_one_pass_cbr ( cpi ) ; } vp9_rc_set_frame_target ( cpi , target ) ; rc -> frames_till_gf_update_due = INT_MAX ; rc -> baseline_gf_interval = INT_MAX ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const char * rsvp_conv_get_filter_type ( conv_item_t * conv , conv_filter_type_e filter _U_ ) { if ( ( filter == CONV_FT_SRC_ADDRESS ) && ( conv -> src_address . type == AT_IPv4 ) ) return "ip.src" ; if ( ( filter == CONV_FT_DST_ADDRESS ) && ( conv -> dst_address . type == AT_IPv4 ) ) return "ip.dst" ; if ( ( filter == CONV_FT_ANY_ADDRESS ) && ( conv -> src_address . type == AT_IPv4 ) ) return "ip.addr" ; return CONV_FILTER_INVALID ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void nautilus_directory_schedule_dequeue_pending ( NautilusDirectory * directory ) { if ( directory -> details -> dequeue_pending_idle_id == 0 ) { directory -> details -> dequeue_pending_idle_id = g_idle_add ( dequeue_pending_idle_callback , directory ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void ss20_init ( QEMUMachineInitArgs * args ) { ram_addr_t RAM_size = args -> ram_size ; const char * cpu_model = args -> cpu_model ; const char * kernel_filename = args -> kernel_filename ; const char * kernel_cmdline = args -> kernel_cmdline ; const char * initrd_filename = args -> initrd_filename ; const char * boot_device = args -> boot_device ; sun4m_hw_init ( & sun4m_hwdefs [ 3 ] , RAM_size , boot_device , kernel_filename , kernel_cmdline , initrd_filename , cpu_model ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
inline const UChar * toUCharPtr ( const char16_t * p ) { # ifdef U_ALIASING_BARRIER U_ALIASING_BARRIER ( p ) ; # endif return reinterpret_cast < const UChar * > ( p ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void vga_draw_line24_be ( VGACommonState * vga , uint8_t * d , uint32_t addr , int width ) { int w ; uint32_t r , g , b ; w = width ; do { r = vga_read_byte ( vga , addr + 0 ) ; g = vga_read_byte ( vga , addr + 1 ) ; b = vga_read_byte ( vga , addr + 2 ) ; ( ( uint32_t * ) d ) [ 0 ] = rgb_to_pixel32 ( r , g , b ) ; addr += 3 ; d += 4 ; } while ( -- w != 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void free_months ( UChar * months [ ] ) { free_symbols ( months , MONTH_COUNT - 1 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
long dtls1_ctrl ( SSL * s , int cmd , long larg , void * parg ) { int ret = 0 ; switch ( cmd ) { case DTLS_CTRL_GET_TIMEOUT : if ( dtls1_get_timeout ( s , ( struct timeval * ) parg ) != NULL ) { ret = 1 ; } break ; case DTLS_CTRL_HANDLE_TIMEOUT : ret = dtls1_handle_timeout ( s ) ; break ; case DTLS_CTRL_SET_LINK_MTU : if ( larg < ( long ) dtls1_link_min_mtu ( ) ) return 0 ; s -> d1 -> link_mtu = larg ; return 1 ; case DTLS_CTRL_GET_LINK_MIN_MTU : return ( long ) dtls1_link_min_mtu ( ) ; case SSL_CTRL_SET_MTU : if ( larg < ( long ) dtls1_link_min_mtu ( ) - DTLS1_MAX_MTU_OVERHEAD ) return 0 ; s -> d1 -> mtu = larg ; return larg ; default : ret = ssl3_ctrl ( s , cmd , larg , parg ) ; break ; } return ( ret ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void * Type_MLU_Read ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , cmsUInt32Number * nItems , cmsUInt32Number SizeOfTag ) { cmsMLU * mlu ; cmsUInt32Number Count , RecLen , NumOfWchar ; cmsUInt32Number SizeOfHeader ; cmsUInt32Number Len , Offset ; cmsUInt32Number i ; wchar_t * Block ; cmsUInt32Number BeginOfThisString , EndOfThisString , LargestPosition ; * nItems = 0 ; if ( ! _cmsReadUInt32Number ( io , & Count ) ) return NULL ; if ( ! _cmsReadUInt32Number ( io , & RecLen ) ) return NULL ; if ( RecLen != 12 ) { cmsSignalError ( self -> ContextID , cmsERROR_UNKNOWN_EXTENSION , "multiLocalizedUnicodeType of len != 12 is not supported." ) ; return NULL ; } mlu = cmsMLUalloc ( self -> ContextID , Count ) ; if ( mlu == NULL ) return NULL ; mlu -> UsedEntries = Count ; SizeOfHeader = 12 * Count + sizeof ( _cmsTagBase ) ; LargestPosition = 0 ; for ( i = 0 ; i < Count ; i ++ ) { if ( ! _cmsReadUInt16Number ( io , & mlu -> Entries [ i ] . Language ) ) goto Error ; if ( ! _cmsReadUInt16Number ( io , & mlu -> Entries [ i ] . Country ) ) goto Error ; if ( ! _cmsReadUInt32Number ( io , & Len ) ) goto Error ; if ( ! _cmsReadUInt32Number ( io , & Offset ) ) goto Error ; if ( Offset < ( SizeOfHeader + 8 ) ) goto Error ; if ( ( Offset + Len ) > SizeOfTag + 8 ) goto Error ; BeginOfThisString = Offset - SizeOfHeader - 8 ; mlu -> Entries [ i ] . Len = ( Len * sizeof ( wchar_t ) ) / sizeof ( cmsUInt16Number ) ; mlu -> Entries [ i ] . StrW = ( BeginOfThisString * sizeof ( wchar_t ) ) / sizeof ( cmsUInt16Number ) ; EndOfThisString = BeginOfThisString + Len ; if ( EndOfThisString > LargestPosition ) LargestPosition = EndOfThisString ; } SizeOfTag = ( LargestPosition * sizeof ( wchar_t ) ) / sizeof ( cmsUInt16Number ) ; if ( SizeOfTag == 0 ) { Block = NULL ; NumOfWchar = 0 ; } else { Block = ( wchar_t * ) _cmsMalloc ( self -> ContextID , SizeOfTag ) ; if ( Block == NULL ) goto Error ; NumOfWchar = SizeOfTag / sizeof ( wchar_t ) ; if ( ! _cmsReadWCharArray ( io , NumOfWchar , Block ) ) goto Error ; } mlu -> MemPool = Block ; mlu -> PoolSize = SizeOfTag ; mlu -> PoolUsed = SizeOfTag ; * nItems = 1 ; return ( void * ) mlu ; Error : if ( mlu ) cmsMLUfree ( mlu ) ; return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
Selectivity booltestsel ( PlannerInfo * root , BoolTestType booltesttype , Node * arg , int varRelid , JoinType jointype , SpecialJoinInfo * sjinfo ) { VariableStatData vardata ; double selec ; examine_variable ( root , arg , varRelid , & vardata ) ; if ( HeapTupleIsValid ( vardata . statsTuple ) ) { Form_pg_statistic stats ; double freq_null ; Datum * values ; int nvalues ; float4 * numbers ; int nnumbers ; stats = ( Form_pg_statistic ) GETSTRUCT ( vardata . statsTuple ) ; freq_null = stats -> stanullfrac ; if ( get_attstatsslot ( vardata . statsTuple , vardata . atttype , vardata . atttypmod , STATISTIC_KIND_MCV , InvalidOid , NULL , & values , & nvalues , & numbers , & nnumbers ) && nnumbers > 0 ) { double freq_true ; double freq_false ; if ( DatumGetBool ( values [ 0 ] ) ) freq_true = numbers [ 0 ] ; else freq_true = 1.0 - numbers [ 0 ] - freq_null ; freq_false = 1.0 - freq_true - freq_null ; switch ( booltesttype ) { case IS_UNKNOWN : selec = freq_null ; break ; case IS_NOT_UNKNOWN : selec = 1.0 - freq_null ; break ; case IS_TRUE : selec = freq_true ; break ; case IS_NOT_TRUE : selec = 1.0 - freq_true ; break ; case IS_FALSE : selec = freq_false ; break ; case IS_NOT_FALSE : selec = 1.0 - freq_false ; break ; default : elog ( ERROR , "unrecognized booltesttype: %d" , ( int ) booltesttype ) ; selec = 0.0 ; break ; } free_attstatsslot ( vardata . atttype , values , nvalues , numbers , nnumbers ) ; } else { switch ( booltesttype ) { case IS_UNKNOWN : selec = freq_null ; break ; case IS_NOT_UNKNOWN : selec = 1.0 - freq_null ; break ; case IS_TRUE : case IS_FALSE : selec = ( 1.0 - freq_null ) / 2.0 ; break ; case IS_NOT_TRUE : case IS_NOT_FALSE : selec = ( freq_null + 1.0 ) / 2.0 ; break ; default : elog ( ERROR , "unrecognized booltesttype: %d" , ( int ) booltesttype ) ; selec = 0.0 ; break ; } } } else { switch ( booltesttype ) { case IS_UNKNOWN : selec = DEFAULT_UNK_SEL ; break ; case IS_NOT_UNKNOWN : selec = DEFAULT_NOT_UNK_SEL ; break ; case IS_TRUE : case IS_NOT_FALSE : selec = ( double ) clause_selectivity ( root , arg , varRelid , jointype , sjinfo ) ; break ; case IS_FALSE : case IS_NOT_TRUE : selec = 1.0 - ( double ) clause_selectivity ( root , arg , varRelid , jointype , sjinfo ) ; break ; default : elog ( ERROR , "unrecognized booltesttype: %d" , ( int ) booltesttype ) ; selec = 0.0 ; break ; } } ReleaseVariableStats ( vardata ) ; CLAMP_PROBABILITY ( selec ) ; return ( Selectivity ) selec ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int mi_repair_by_sort ( MI_CHECK * param , register MI_INFO * info , const char * name , int rep_quick ) { int got_error ; uint i ; ulong length ; ha_rows start_records ; my_off_t new_header_length , del ; File new_file ; MI_SORT_PARAM sort_param ; MYISAM_SHARE * share = info -> s ; HA_KEYSEG * keyseg ; ulong * rec_per_key_part ; char llbuff [ 22 ] ; SORT_INFO sort_info ; ulonglong UNINIT_VAR ( key_map ) ; DBUG_ENTER ( "mi_repair_by_sort" ) ; start_records = info -> state -> records ; got_error = 1 ; new_file = - 1 ; new_header_length = ( param -> testflag & T_UNPACK ) ? 0 : share -> pack . header_length ; if ( ! ( param -> testflag & T_SILENT ) ) { printf ( "- recovering (with sort) MyISAM-table '%s'\n" , name ) ; printf ( "Data records: %s\n" , llstr ( start_records , llbuff ) ) ; } param -> testflag |= T_REP ; if ( info -> s -> options & ( HA_OPTION_CHECKSUM | HA_OPTION_COMPRESS_RECORD ) ) param -> testflag |= T_CALC_CHECKSUM ; bzero ( ( char * ) & sort_info , sizeof ( sort_info ) ) ; bzero ( ( char * ) & sort_param , sizeof ( sort_param ) ) ; if ( ! ( sort_info . key_block = alloc_key_blocks ( param , ( uint ) param -> sort_key_blocks , share -> base . max_key_block_length ) ) || init_io_cache ( & param -> read_cache , info -> dfile , ( uint ) param -> read_buffer_length , READ_CACHE , share -> pack . header_length , 1 , MYF ( MY_WME ) ) || ( ! rep_quick && init_io_cache ( & info -> rec_cache , info -> dfile , ( uint ) param -> write_buffer_length , WRITE_CACHE , new_header_length , 1 , MYF ( MY_WME | MY_WAIT_IF_FULL ) & param -> myf_rw ) ) ) goto err ; sort_info . key_block_end = sort_info . key_block + param -> sort_key_blocks ; info -> opt_flag |= WRITE_CACHE_USED ; info -> rec_cache . file = info -> dfile ; if ( ! mi_alloc_rec_buff ( info , - 1 , & sort_param . record ) || ! mi_alloc_rec_buff ( info , - 1 , & sort_param . rec_buff ) ) { mi_check_print_error ( param , "Not enough memory for extra record" ) ; goto err ; } if ( ! rep_quick ) { if ( ( new_file = mysql_file_create ( mi_key_file_datatmp , fn_format ( param -> temp_filename , share -> data_file_name , "" , DATA_TMP_EXT , 2 + 4 ) , 0 , param -> tmpfile_createflag , MYF ( 0 ) ) ) < 0 ) { mi_check_print_error ( param , "Can't create new tempfile: '%s'" , param -> temp_filename ) ; goto err ; } if ( new_header_length && filecopy ( param , new_file , info -> dfile , 0L , new_header_length , "datafile-header" ) ) goto err ; if ( param -> testflag & T_UNPACK ) { share -> options &= ~ HA_OPTION_COMPRESS_RECORD ; mi_int2store ( share -> state . header . options , share -> options ) ; } share -> state . dellink = HA_OFFSET_ERROR ; info -> rec_cache . file = new_file ; } info -> update = ( short ) ( HA_STATE_CHANGED | HA_STATE_ROW_CHANGED ) ; mi_drop_all_indexes ( param , info , FALSE ) ; key_map = share -> state . key_map ; if ( param -> testflag & T_CREATE_MISSING_KEYS ) { key_map = ~ key_map ; } sort_info . info = info ; sort_info . param = param ; set_data_file_type ( & sort_info , share ) ; sort_param . filepos = new_header_length ; sort_info . dupp = 0 ; sort_info . buff = 0 ; param -> read_cache . end_of_file = sort_info . filelength = mysql_file_seek ( param -> read_cache . file , 0L , MY_SEEK_END , MYF ( 0 ) ) ; sort_param . wordlist = NULL ; init_alloc_root ( & sort_param . wordroot , FTPARSER_MEMROOT_ALLOC_SIZE , 0 ) ; if ( share -> data_file_type == DYNAMIC_RECORD ) length = max ( share -> base . min_pack_length + 1 , share -> base . min_block_length ) ; else if ( share -> data_file_type == COMPRESSED_RECORD ) length = share -> base . min_block_length ; else length = share -> base . pack_reclength ; sort_info . max_records = ( ( param -> testflag & T_CREATE_MISSING_KEYS ) ? info -> state -> records : ( ha_rows ) ( sort_info . filelength / length + 1 ) ) ; sort_param . key_cmp = sort_key_cmp ; sort_param . lock_in_memory = lock_memory ; sort_param . tmpdir = param -> tmpdir ; sort_param . sort_info = & sort_info ; sort_param . fix_datafile = ( my_bool ) ( ! rep_quick ) ; sort_param . master = 1 ; del = info -> state -> del ; param -> glob_crc = 0 ; if ( param -> testflag & T_CALC_CHECKSUM ) sort_param . calc_checksum = 1 ; rec_per_key_part = param -> rec_per_key_part ; for ( sort_param . key = 0 ; sort_param . key < share -> base . keys ; rec_per_key_part += sort_param . keyinfo -> keysegs , sort_param . key ++ ) { sort_param . read_cache = param -> read_cache ; sort_param . keyinfo = share -> keyinfo + sort_param . key ; sort_param . seg = sort_param . keyinfo -> seg ; if ( ! mi_is_key_active ( key_map , sort_param . key ) ) { memcpy ( ( char * ) rec_per_key_part , ( char * ) ( share -> state . rec_per_key_part + ( uint ) ( rec_per_key_part - param -> rec_per_key_part ) ) , sort_param . keyinfo -> keysegs * sizeof ( * rec_per_key_part ) ) ; DBUG_PRINT ( "repair" , ( "skipping seemingly disabled index #: %u" , sort_param . key ) ) ; continue ; } if ( ( ! ( param -> testflag & T_SILENT ) ) ) printf ( "- Fixing index %d\n" , sort_param . key + 1 ) ; sort_param . max_pos = sort_param . pos = share -> pack . header_length ; keyseg = sort_param . seg ; bzero ( ( char * ) sort_param . unique , sizeof ( sort_param . unique ) ) ; sort_param . key_length = share -> rec_reflength ; for ( i = 0 ; keyseg [ i ] . type != HA_KEYTYPE_END ; i ++ ) { sort_param . key_length += keyseg [ i ] . length ; if ( keyseg [ i ] . flag & HA_SPACE_PACK ) sort_param . key_length += get_pack_length ( keyseg [ i ] . length ) ; if ( keyseg [ i ] . flag & ( HA_BLOB_PART | HA_VAR_LENGTH_PART ) ) sort_param . key_length += 2 + test ( keyseg [ i ] . length >= 127 ) ; if ( keyseg [ i ] . flag & HA_NULL_PART ) sort_param . key_length ++ ; } info -> state -> records = info -> state -> del = share -> state . split = 0 ; info -> state -> empty = 0 ; if ( sort_param . keyinfo -> flag & HA_FULLTEXT ) { uint ft_max_word_len_for_sort = FT_MAX_WORD_LEN_FOR_SORT * sort_param . keyinfo -> seg -> charset -> mbmaxlen ; sort_param . key_length += ft_max_word_len_for_sort - HA_FT_MAXBYTELEN ; if ( sort_param . keyinfo -> parser == & ft_default_parser ) { sort_info . max_records = ( ha_rows ) ( sort_info . filelength / ft_min_word_len + 1 ) ; } else { sort_info . max_records = 10 * max ( param -> sort_buffer_length , MIN_SORT_BUFFER ) / sort_param . key_length ; } sort_param . key_read = sort_ft_key_read ; sort_param . key_write = sort_ft_key_write ; } else { sort_param . key_read = sort_key_read ; sort_param . key_write = sort_key_write ; } if ( _create_index_by_sort ( & sort_param , ( my_bool ) ( ! ( param -> testflag & T_VERBOSE ) ) , param -> sort_buffer_length ) ) { param -> retry_repair = 1 ; goto err ; } sort_param . calc_checksum = 0 ; free_root ( & sort_param . wordroot , MYF ( 0 ) ) ; sort_info . max_records = ( ha_rows ) info -> state -> records ; if ( param -> testflag & T_STATISTICS ) update_key_parts ( sort_param . keyinfo , rec_per_key_part , sort_param . unique , param -> stats_method == MI_STATS_METHOD_IGNORE_NULLS ? sort_param . notnull : NULL , ( ulonglong ) info -> state -> records ) ; mi_set_key_active ( share -> state . key_map , sort_param . key ) ; DBUG_PRINT ( "repair" , ( "set enabled index #: %u" , sort_param . key ) ) ; if ( sort_param . fix_datafile ) { param -> read_cache . end_of_file = sort_param . filepos ; if ( write_data_suffix ( & sort_info , 1 ) || end_io_cache ( & info -> rec_cache ) ) goto err ; if ( param -> testflag & T_SAFE_REPAIR ) { if ( info -> state -> records + 1 < start_records ) { info -> state -> records = start_records ; goto err ; } } share -> state . state . data_file_length = info -> state -> data_file_length = sort_param . filepos ; share -> state . version = ( ulong ) time ( ( time_t * ) 0 ) ; mysql_file_close ( info -> dfile , MYF ( 0 ) ) ; info -> dfile = new_file ; share -> data_file_type = sort_info . new_data_file_type ; share -> pack . header_length = ( ulong ) new_header_length ; sort_param . fix_datafile = 0 ; } else info -> state -> data_file_length = sort_param . max_pos ; param -> read_cache . file = info -> dfile ; reinit_io_cache ( & param -> read_cache , READ_CACHE , share -> pack . header_length , 1 , 1 ) ; } if ( param -> testflag & T_WRITE_LOOP ) { ( void ) fputs ( " \r" , stdout ) ; ( void ) fflush ( stdout ) ; } if ( rep_quick && del + sort_info . dupp != info -> state -> del ) { mi_check_print_error ( param , "Couldn't fix table with quick recovery: Found wrong number of deleted records" ) ; mi_check_print_error ( param , "Run recovery again without -q" ) ; got_error = 1 ; param -> retry_repair = 1 ; param -> testflag |= T_RETRY_WITHOUT_QUICK ; goto err ; } if ( rep_quick & T_FORCE_UNIQUENESS ) { my_off_t skr = info -> state -> data_file_length + ( share -> options & HA_OPTION_COMPRESS_RECORD ? MEMMAP_EXTRA_MARGIN : 0 ) ; # ifdef USE_RELOC if ( share -> data_file_type == STATIC_RECORD && skr < share -> base . reloc * share -> base . min_pack_length ) skr = share -> base . reloc * share -> base . min_pack_length ; # endif if ( skr != sort_info . filelength ) if ( mysql_file_chsize ( info -> dfile , skr , 0 , MYF ( 0 ) ) ) mi_check_print_warning ( param , "Can't change size of datafile, error: %d" , my_errno ) ; } if ( param -> testflag & T_CALC_CHECKSUM ) info -> state -> checksum = param -> glob_crc ; if ( mysql_file_chsize ( share -> kfile , info -> state -> key_file_length , 0 , MYF ( 0 ) ) ) mi_check_print_warning ( param , "Can't change size of indexfile, error: %d" , my_errno ) ; if ( ! ( param -> testflag & T_SILENT ) ) { if ( start_records != info -> state -> records ) printf ( "Data records: %s\n" , llstr ( info -> state -> records , llbuff ) ) ; if ( sort_info . dupp ) mi_check_print_warning ( param , "%s records have been removed" , llstr ( sort_info . dupp , llbuff ) ) ; } got_error = 0 ; if ( & share -> state . state != info -> state ) memcpy ( & share -> state . state , info -> state , sizeof ( * info -> state ) ) ; err : got_error |= flush_blocks ( param , share -> key_cache , share -> kfile ) ; ( void ) end_io_cache ( & info -> rec_cache ) ; if ( ! got_error ) { if ( new_file >= 0 ) { mysql_file_close ( new_file , MYF ( 0 ) ) ; info -> dfile = new_file = - 1 ; if ( change_to_newfile ( share -> data_file_name , MI_NAME_DEXT , DATA_TMP_EXT , ( param -> testflag & T_BACKUP_DATA ? MYF ( MY_REDEL_MAKE_BACKUP ) : MYF ( 0 ) ) ) || mi_open_datafile ( info , share , name , - 1 ) ) got_error = 1 ; } } if ( got_error ) { if ( ! param -> error_printed ) mi_check_print_error ( param , "%d when fixing table" , my_errno ) ; if ( new_file >= 0 ) { ( void ) mysql_file_close ( new_file , MYF ( 0 ) ) ; ( void ) mysql_file_delete ( mi_key_file_datatmp , param -> temp_filename , MYF ( MY_WME ) ) ; if ( info -> dfile == new_file ) if ( unlikely ( mi_open_datafile ( info , share , name , - 1 ) ) ) param -> retry_repair = 0 ; } mi_mark_crashed_on_repair ( info ) ; } else if ( key_map == share -> state . key_map ) share -> state . changed &= ~ STATE_NOT_OPTIMIZED_KEYS ; share -> state . changed |= STATE_NOT_SORTED_PAGES ; my_free ( mi_get_rec_buff_ptr ( info , sort_param . rec_buff ) ) ; my_free ( mi_get_rec_buff_ptr ( info , sort_param . record ) ) ; my_free ( sort_info . key_block ) ; my_free ( sort_info . ft_buf ) ; my_free ( sort_info . buff ) ; ( void ) end_io_cache ( & param -> read_cache ) ; info -> opt_flag &= ~ ( READ_CACHE_USED | WRITE_CACHE_USED ) ; if ( ! got_error && ( param -> testflag & T_UNPACK ) ) { share -> state . header . options [ 0 ] &= ( uchar ) ~ HA_OPTION_COMPRESS_RECORD ; share -> pack . header_length = 0 ; } DBUG_RETURN ( got_error ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int x ( struct vcache * avc , int afun , struct vrequest * areq , \ struct afs_pdata * ain , struct afs_pdata * aout , \ afs_ucred_t * * acred ) DECL_PIOCTL ( PGetFID ) ; DECL_PIOCTL ( PSetAcl ) ; DECL_PIOCTL ( PStoreBehind ) ; DECL_PIOCTL ( PGCPAGs ) ; DECL_PIOCTL ( PGetAcl ) ; DECL_PIOCTL ( PNoop ) ; DECL_PIOCTL ( PBogus ) ; DECL_PIOCTL ( PGetFileCell ) ; DECL_PIOCTL ( PGetWSCell ) ; DECL_PIOCTL ( PGetUserCell ) ; DECL_PIOCTL ( PSetTokens ) ; DECL_PIOCTL ( PGetVolumeStatus ) ; DECL_PIOCTL ( PSetVolumeStatus ) ; DECL_PIOCTL ( PFlush ) ; DECL_PIOCTL ( PNewStatMount ) ; DECL_PIOCTL ( PGetTokens ) ; DECL_PIOCTL ( PUnlog ) ; DECL_PIOCTL ( PMariner ) ; DECL_PIOCTL ( PCheckServers ) ; DECL_PIOCTL ( PCheckVolNames ) ; DECL_PIOCTL ( PCheckAuth ) ; DECL_PIOCTL ( PFindVolume ) ; DECL_PIOCTL ( PViceAccess ) ; DECL_PIOCTL ( PSetCacheSize ) ; DECL_PIOCTL ( PGetCacheSize ) ; DECL_PIOCTL ( PRemoveCallBack ) ; DECL_PIOCTL ( PNewCell ) ; DECL_PIOCTL ( PNewAlias ) ; DECL_PIOCTL ( PListCells ) ; DECL_PIOCTL ( PListAliases ) ; DECL_PIOCTL ( PRemoveMount ) ; DECL_PIOCTL ( PGetCellStatus ) ; DECL_PIOCTL ( PSetCellStatus )
0False
Categorize the following code snippet as vulnerable or not. True or False
static cmsBool Type_ProfileSequenceDesc_Write ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , void * Ptr , cmsUInt32Number nItems ) { cmsSEQ * Seq = ( cmsSEQ * ) Ptr ; cmsUInt32Number i ; if ( ! _cmsWriteUInt32Number ( io , Seq -> n ) ) return FALSE ; for ( i = 0 ; i < Seq -> n ; i ++ ) { cmsPSEQDESC * sec = & Seq -> seq [ i ] ; if ( ! _cmsWriteUInt32Number ( io , sec -> deviceMfg ) ) return FALSE ; if ( ! _cmsWriteUInt32Number ( io , sec -> deviceModel ) ) return FALSE ; if ( ! _cmsWriteUInt64Number ( io , & sec -> attributes ) ) return FALSE ; if ( ! _cmsWriteUInt32Number ( io , sec -> technology ) ) return FALSE ; if ( ! SaveDescription ( self , io , sec -> Manufacturer ) ) return FALSE ; if ( ! SaveDescription ( self , io , sec -> Model ) ) return FALSE ; } return TRUE ; cmsUNUSED_PARAMETER ( nItems ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void s390_init ( ram_addr_t ram_size , const char * boot_device , const char * kernel_filename , const char * kernel_cmdline , const char * initrd_filename , const char * cpu_model ) { CPUState * env = NULL ; ram_addr_t ram_addr ; ram_addr_t kernel_size = 0 ; ram_addr_t initrd_offset ; ram_addr_t initrd_size = 0 ; int i ; if ( ! kvm_enabled ( ) ) { fprintf ( stderr , "The S390 target only works with KVM enabled\n" ) ; exit ( 1 ) ; } s390_bus = s390_virtio_bus_init ( & ram_size ) ; ram_addr = qemu_ram_alloc ( ram_size ) ; cpu_register_physical_memory ( 0 , ram_size , ram_addr ) ; if ( cpu_model == NULL ) { cpu_model = "host" ; } ipi_states = qemu_malloc ( sizeof ( CPUState * ) * smp_cpus ) ; for ( i = 0 ; i < smp_cpus ; i ++ ) { CPUState * tmp_env ; tmp_env = cpu_init ( cpu_model ) ; if ( ! env ) { env = tmp_env ; } ipi_states [ i ] = tmp_env ; tmp_env -> halted = 1 ; tmp_env -> exception_index = EXCP_HLT ; } env -> halted = 0 ; env -> exception_index = 0 ; if ( kernel_filename ) { kernel_size = load_image ( kernel_filename , qemu_get_ram_ptr ( 0 ) ) ; if ( lduw_phys ( KERN_IMAGE_START ) != 0x0dd0 ) { fprintf ( stderr , "Specified image is not an s390 boot image\n" ) ; exit ( 1 ) ; } cpu_synchronize_state ( env ) ; env -> psw . addr = KERN_IMAGE_START ; env -> psw . mask = 0x0000000180000000ULL ; } if ( initrd_filename ) { initrd_offset = INITRD_START ; while ( kernel_size + 0x100000 > initrd_offset ) { initrd_offset += 0x100000 ; } initrd_size = load_image ( initrd_filename , qemu_get_ram_ptr ( initrd_offset ) ) ; stq_phys ( INITRD_PARM_START , initrd_offset ) ; stq_phys ( INITRD_PARM_SIZE , initrd_size ) ; } if ( kernel_cmdline ) { cpu_physical_memory_rw ( KERN_PARM_AREA , ( uint8_t * ) kernel_cmdline , strlen ( kernel_cmdline ) , 1 ) ; } for ( i = 0 ; i < MAX_VIRTIO_CONSOLES ; i ++ ) { if ( virtcon_hds [ i ] ) { qdev_init_nofail ( qdev_create ( ( BusState * ) s390_bus , "virtio-console-s390" ) ) ; } } for ( i = 0 ; i < nb_nics ; i ++ ) { NICInfo * nd = & nd_table [ i ] ; DeviceState * dev ; if ( ! nd -> model ) { nd -> model = qemu_strdup ( "virtio" ) ; } if ( strcmp ( nd -> model , "virtio" ) ) { fprintf ( stderr , "S390 only supports VirtIO nics\n" ) ; exit ( 1 ) ; } dev = qdev_create ( ( BusState * ) s390_bus , "virtio-net-s390" ) ; qdev_set_nic_properties ( dev , nd ) ; qdev_init_nofail ( dev ) ; } for ( i = 0 ; i < MAX_BLK_DEVS ; i ++ ) { DriveInfo * dinfo ; DeviceState * dev ; dinfo = drive_get ( IF_IDE , 0 , i ) ; if ( ! dinfo ) { continue ; } dev = qdev_create ( ( BusState * ) s390_bus , "virtio-blk-s390" ) ; qdev_prop_set_drive ( dev , "drive" , dinfo ) ; qdev_init_nofail ( dev ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void _slurm_rpc_step_complete ( slurm_msg_t * msg , bool running_composite ) { static int active_rpc_cnt = 0 ; int error_code = SLURM_SUCCESS , rc , rem ; uint32_t step_rc ; DEF_TIMERS ; step_complete_msg_t * req = ( step_complete_msg_t * ) msg -> data ; slurmctld_lock_t job_write_lock = { NO_LOCK , WRITE_LOCK , WRITE_LOCK , NO_LOCK , READ_LOCK } ; uid_t uid = g_slurm_auth_get_uid ( msg -> auth_cred , slurmctld_config . auth_info ) ; bool dump_job = false ; START_TIMER ; if ( slurmctld_conf . debug_flags & DEBUG_FLAG_STEPS ) info ( "Processing RPC: REQUEST_STEP_COMPLETE for %u.%u " "nodes %u-%u rc=%u uid=%d" , req -> job_id , req -> job_step_id , req -> range_first , req -> range_last , req -> step_rc , uid ) ; if ( ! running_composite ) { _throttle_start ( & active_rpc_cnt ) ; lock_slurmctld ( job_write_lock ) ; } rc = step_partial_comp ( req , uid , & rem , & step_rc ) ; if ( rc || rem ) { if ( ! running_composite ) { unlock_slurmctld ( job_write_lock ) ; _throttle_fini ( & active_rpc_cnt ) ; } slurm_send_rc_msg ( msg , rc ) ; if ( ! rc ) schedule_job_save ( ) ; return ; } if ( req -> job_step_id == SLURM_BATCH_SCRIPT ) { error_code = job_complete ( req -> job_id , uid , false , false , step_rc ) ; if ( ! running_composite ) { unlock_slurmctld ( job_write_lock ) ; _throttle_fini ( & active_rpc_cnt ) ; } END_TIMER2 ( "_slurm_rpc_step_complete" ) ; if ( error_code ) { if ( slurmctld_conf . debug_flags & DEBUG_FLAG_STEPS ) info ( "%s JobId=%u: %s" , __func__ , req -> job_id , slurm_strerror ( error_code ) ) ; slurm_send_rc_msg ( msg , error_code ) ; } else { if ( slurmctld_conf . debug_flags & DEBUG_FLAG_STEPS ) info ( "sched: %s JobId=%u: %s" , __func__ , req -> job_id , TIME_STR ) ; slurm_send_rc_msg ( msg , SLURM_SUCCESS ) ; dump_job = true ; } } else { error_code = job_step_complete ( req -> job_id , req -> job_step_id , uid , false , step_rc ) ; if ( ! running_composite ) { unlock_slurmctld ( job_write_lock ) ; _throttle_fini ( & active_rpc_cnt ) ; } END_TIMER2 ( "_slurm_rpc_step_complete" ) ; if ( error_code ) { if ( slurmctld_conf . debug_flags & DEBUG_FLAG_STEPS ) info ( "%s 1 StepId=%u.%u %s" , __func__ , req -> job_id , req -> job_step_id , slurm_strerror ( error_code ) ) ; slurm_send_rc_msg ( msg , error_code ) ; } else { if ( slurmctld_conf . debug_flags & DEBUG_FLAG_STEPS ) info ( "sched: %s StepId=%u.%u %s" , __func__ , req -> job_id , req -> job_step_id , TIME_STR ) ; slurm_send_rc_msg ( msg , SLURM_SUCCESS ) ; dump_job = true ; } } if ( dump_job ) ( void ) schedule_job_save ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int64_t vp9_rd_pick_inter_mode_sb_seg_skip ( VP9_COMP * cpi , MACROBLOCK * x , int * returnrate , int64_t * returndistortion , BLOCK_SIZE bsize , PICK_MODE_CONTEXT * ctx , int64_t best_rd_so_far ) { VP9_COMMON * const cm = & cpi -> common ; RD_OPT * const rd_opt = & cpi -> rd ; MACROBLOCKD * const xd = & x -> e_mbd ; MB_MODE_INFO * const mbmi = & xd -> mi [ 0 ] -> mbmi ; unsigned char segment_id = mbmi -> segment_id ; const int comp_pred = 0 ; int i ; int64_t best_tx_diff [ TX_MODES ] ; int64_t best_pred_diff [ REFERENCE_MODES ] ; int64_t best_filter_diff [ SWITCHABLE_FILTER_CONTEXTS ] ; unsigned int ref_costs_single [ MAX_REF_FRAMES ] , ref_costs_comp [ MAX_REF_FRAMES ] ; vp9_prob comp_mode_p ; INTERP_FILTER best_filter = SWITCHABLE ; int64_t this_rd = INT64_MAX ; int rate2 = 0 ; const int64_t distortion2 = 0 ; x -> skip_encode = cpi -> sf . skip_encode_frame && x -> q_index < QIDX_SKIP_THRESH ; estimate_ref_frame_costs ( cm , xd , segment_id , ref_costs_single , ref_costs_comp , & comp_mode_p ) ; for ( i = 0 ; i < MAX_REF_FRAMES ; ++ i ) x -> pred_sse [ i ] = INT_MAX ; for ( i = LAST_FRAME ; i < MAX_REF_FRAMES ; ++ i ) x -> pred_mv_sad [ i ] = INT_MAX ; * returnrate = INT_MAX ; assert ( vp9_segfeature_active ( & cm -> seg , segment_id , SEG_LVL_SKIP ) ) ; mbmi -> mode = ZEROMV ; mbmi -> uv_mode = DC_PRED ; mbmi -> ref_frame [ 0 ] = LAST_FRAME ; mbmi -> ref_frame [ 1 ] = NONE ; mbmi -> mv [ 0 ] . as_int = 0 ; x -> skip = 1 ; rd_opt -> mask_filter = 0 ; for ( i = 0 ; i < SWITCHABLE_FILTER_CONTEXTS ; ++ i ) rd_opt -> filter_cache [ i ] = INT64_MAX ; if ( cm -> interp_filter != BILINEAR ) { best_filter = EIGHTTAP ; if ( cm -> interp_filter == SWITCHABLE && x -> source_variance >= cpi -> sf . disable_filter_search_var_thresh ) { int rs ; int best_rs = INT_MAX ; for ( i = 0 ; i < SWITCHABLE_FILTERS ; ++ i ) { mbmi -> interp_filter = i ; rs = vp9_get_switchable_rate ( cpi ) ; if ( rs < best_rs ) { best_rs = rs ; best_filter = mbmi -> interp_filter ; } } } } if ( cm -> interp_filter == SWITCHABLE ) { mbmi -> interp_filter = best_filter ; rate2 += vp9_get_switchable_rate ( cpi ) ; } else { mbmi -> interp_filter = cm -> interp_filter ; } if ( cm -> reference_mode == REFERENCE_MODE_SELECT ) rate2 += vp9_cost_bit ( comp_mode_p , comp_pred ) ; rate2 += ref_costs_single [ LAST_FRAME ] ; this_rd = RDCOST ( x -> rdmult , x -> rddiv , rate2 , distortion2 ) ; * returnrate = rate2 ; * returndistortion = distortion2 ; if ( this_rd >= best_rd_so_far ) return INT64_MAX ; assert ( ( cm -> interp_filter == SWITCHABLE ) || ( cm -> interp_filter == mbmi -> interp_filter ) ) ; update_rd_thresh_fact ( cpi , bsize , THR_ZEROMV ) ; vp9_zero ( best_pred_diff ) ; vp9_zero ( best_filter_diff ) ; vp9_zero ( best_tx_diff ) ; if ( ! x -> select_tx_size ) swap_block_ptr ( x , ctx , 1 , 0 , 0 , MAX_MB_PLANE ) ; store_coding_context ( x , ctx , THR_ZEROMV , best_pred_diff , best_tx_diff , best_filter_diff , 0 ) ; return this_rd ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
vpx_codec_err_t vpx_svc_init ( SvcContext * svc_ctx , vpx_codec_ctx_t * codec_ctx , vpx_codec_iface_t * iface , vpx_codec_enc_cfg_t * enc_cfg ) { vpx_codec_err_t res ; int i ; SvcInternal * const si = get_svc_internal ( svc_ctx ) ; if ( svc_ctx == NULL || codec_ctx == NULL || iface == NULL || enc_cfg == NULL ) { return VPX_CODEC_INVALID_PARAM ; } if ( si == NULL ) return VPX_CODEC_MEM_ERROR ; si -> codec_ctx = codec_ctx ; si -> width = enc_cfg -> g_w ; si -> height = enc_cfg -> g_h ; if ( enc_cfg -> kf_max_dist < 2 ) { svc_log ( svc_ctx , SVC_LOG_ERROR , "key frame distance too small: %d\n" , enc_cfg -> kf_max_dist ) ; return VPX_CODEC_INVALID_PARAM ; } si -> kf_dist = enc_cfg -> kf_max_dist ; if ( svc_ctx -> spatial_layers == 0 ) svc_ctx -> spatial_layers = VPX_SS_DEFAULT_LAYERS ; if ( svc_ctx -> spatial_layers < 1 || svc_ctx -> spatial_layers > VPX_SS_MAX_LAYERS ) { svc_log ( svc_ctx , SVC_LOG_ERROR , "spatial layers: invalid value: %d\n" , svc_ctx -> spatial_layers ) ; return VPX_CODEC_INVALID_PARAM ; } res = parse_quantizer_values ( svc_ctx , si -> quantizers ) ; if ( res != VPX_CODEC_OK ) return res ; res = parse_scale_factors ( svc_ctx , si -> scale_factors ) ; if ( res != VPX_CODEC_OK ) return res ; res = parse_options ( svc_ctx , si -> options ) ; if ( res != VPX_CODEC_OK ) return res ; if ( svc_ctx -> spatial_layers < 1 ) svc_ctx -> spatial_layers = 1 ; if ( svc_ctx -> spatial_layers > VPX_SS_MAX_LAYERS ) svc_ctx -> spatial_layers = VPX_SS_MAX_LAYERS ; if ( svc_ctx -> temporal_layers < 1 ) svc_ctx -> temporal_layers = 1 ; if ( svc_ctx -> temporal_layers > VPX_TS_MAX_LAYERS ) svc_ctx -> temporal_layers = VPX_TS_MAX_LAYERS ; si -> layers = svc_ctx -> spatial_layers ; if ( si -> layers > 1 ) { float total = 0 ; float alloc_ratio [ VPX_SS_MAX_LAYERS ] = { 0 } ; assert ( si -> layers <= VPX_SS_MAX_LAYERS ) ; for ( i = 0 ; i < si -> layers ; ++ i ) { int pos = i + VPX_SS_MAX_LAYERS - svc_ctx -> spatial_layers ; if ( pos < VPX_SS_MAX_LAYERS && si -> scaling_factor_den [ pos ] > 0 ) { alloc_ratio [ i ] = ( float ) ( si -> scaling_factor_num [ pos ] * 1.0 / si -> scaling_factor_den [ pos ] ) ; alloc_ratio [ i ] *= alloc_ratio [ i ] ; total += alloc_ratio [ i ] ; } } for ( i = 0 ; i < si -> layers ; ++ i ) { if ( total > 0 ) { enc_cfg -> ss_target_bitrate [ i ] = ( unsigned int ) ( enc_cfg -> rc_target_bitrate * alloc_ratio [ i ] / total ) ; } } } # if CONFIG_SPATIAL_SVC for ( i = 0 ; i < si -> layers ; ++ i ) enc_cfg -> ss_enable_auto_alt_ref [ i ] = si -> enable_auto_alt_ref [ i ] ; # endif if ( svc_ctx -> temporal_layers > 1 ) { int i ; for ( i = 0 ; i < svc_ctx -> temporal_layers ; ++ i ) { enc_cfg -> ts_target_bitrate [ i ] = enc_cfg -> rc_target_bitrate / svc_ctx -> temporal_layers ; enc_cfg -> ts_rate_decimator [ i ] = 1 << ( svc_ctx -> temporal_layers - 1 - i ) ; } } enc_cfg -> ss_number_layers = si -> layers ; enc_cfg -> ts_number_layers = svc_ctx -> temporal_layers ; enc_cfg -> rc_dropframe_thresh = 0 ; enc_cfg -> rc_resize_allowed = 0 ; if ( enc_cfg -> g_pass == VPX_RC_ONE_PASS ) { enc_cfg -> rc_min_quantizer = 33 ; enc_cfg -> rc_max_quantizer = 33 ; } enc_cfg -> rc_undershoot_pct = 100 ; enc_cfg -> rc_overshoot_pct = 15 ; enc_cfg -> rc_buf_initial_sz = 500 ; enc_cfg -> rc_buf_optimal_sz = 600 ; enc_cfg -> rc_buf_sz = 1000 ; if ( enc_cfg -> g_error_resilient == 0 && si -> use_multiple_frame_contexts == 0 ) enc_cfg -> g_error_resilient = 1 ; res = vpx_codec_enc_init ( codec_ctx , iface , enc_cfg , VPX_CODEC_USE_PSNR ) ; if ( res != VPX_CODEC_OK ) { svc_log ( svc_ctx , SVC_LOG_ERROR , "svc_enc_init error\n" ) ; return res ; } vpx_codec_control ( codec_ctx , VP9E_SET_SVC , 1 ) ; vpx_codec_control ( codec_ctx , VP8E_SET_TOKEN_PARTITIONS , 1 ) ; return VPX_CODEC_OK ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static guint find_tail ( body_parts * * body_parts_array , guint16 tsn ) { guint length = 0 ; for ( tsn = ( tsn + 1 ) % MAX_TSN ; body_parts_array [ tsn ] -> middle != NULL ; tsn = ( tsn + 1 ) % MAX_TSN ) length += body_parts_array [ tsn ] -> middle -> length ; if ( body_parts_array [ tsn ] -> tail != NULL ) return length + body_parts_array [ tsn ] -> tail -> length ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int vbf_allocobj ( struct busyobj * bo , unsigned l ) { struct objcore * oc ; const struct stevedore * stv ; double lifetime ; CHECK_OBJ_NOTNULL ( bo , BUSYOBJ_MAGIC ) ; oc = bo -> fetch_objcore ; CHECK_OBJ_NOTNULL ( oc , OBJCORE_MAGIC ) ; lifetime = oc -> ttl + oc -> grace + oc -> keep ; if ( bo -> uncacheable || lifetime < cache_param -> shortlived ) stv = stv_transient ; else stv = bo -> storage ; bo -> storage = NULL ; bo -> storage_hint = NULL ; if ( stv == NULL ) return ( 0 ) ; if ( STV_NewObject ( bo -> wrk , bo -> fetch_objcore , stv , l ) ) return ( 1 ) ; if ( stv == stv_transient ) return ( 0 ) ; if ( oc -> ttl > cache_param -> shortlived ) oc -> ttl = cache_param -> shortlived ; oc -> grace = 0.0 ; oc -> keep = 0.0 ; return ( STV_NewObject ( bo -> wrk , bo -> fetch_objcore , stv_transient , l ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static ossl_inline void sk_ ## t1 ## _zero ( STACK_OF ( t1 ) * sk ) { OPENSSL_sk_zero ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline t2 * sk_ ## t1 ## _delete ( STACK_OF ( t1 ) * sk , int i ) { return ( t2 * ) OPENSSL_sk_delete ( ( OPENSSL_STACK * ) sk , i ) ; } static ossl_inline t2 * sk_ ## t1 ## _delete_ptr ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return ( t2 * ) OPENSSL_sk_delete_ptr ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _push ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_push ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _unshift ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_unshift ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline t2 * sk_ ## t1 ## _pop ( STACK_OF ( t1 ) * sk ) { return ( t2 * ) OPENSSL_sk_pop ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline t2 * sk_ ## t1 ## _shift ( STACK_OF ( t1 ) * sk ) { return ( t2 * ) OPENSSL_sk_shift ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline void sk_ ## t1 ## _pop_free ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _freefunc freefunc ) { OPENSSL_sk_pop_free ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_freefunc ) freefunc ) ; } static ossl_inline int sk_ ## t1 ## _insert ( STACK_OF ( t1 ) * sk , t2 * ptr , int idx ) { return OPENSSL_sk_insert ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr , idx ) ; } static ossl_inline t2 * sk_ ## t1 ## _set ( STACK_OF ( t1 ) * sk , int idx , t2 * ptr ) { return ( t2 * ) OPENSSL_sk_set ( ( OPENSSL_STACK * ) sk , idx , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _find ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_find ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline int sk_ ## t1 ## _find_ex ( STACK_OF ( t1 ) * sk , t2 * ptr ) { return OPENSSL_sk_find_ex ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ; } static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) { OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ; } static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) { return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ; } static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) { return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ; } # define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ; typedef const char * OPENSSL_CSTRING ; DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char )
1True
Categorize the following code snippet as vulnerable or not. True or False
void exsltMathRegister ( void ) { xsltRegisterExtModuleFunction ( ( const xmlChar * ) "min" , EXSLT_MATH_NAMESPACE , exsltMathMinFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "max" , EXSLT_MATH_NAMESPACE , exsltMathMaxFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "highest" , EXSLT_MATH_NAMESPACE , exsltMathHighestFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "lowest" , EXSLT_MATH_NAMESPACE , exsltMathLowestFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "constant" , EXSLT_MATH_NAMESPACE , exsltMathConstantFunction ) ; # ifdef HAVE_STDLIB_H xsltRegisterExtModuleFunction ( ( const xmlChar * ) "random" , EXSLT_MATH_NAMESPACE , exsltMathRandomFunction ) ; # endif # if HAVE_MATH_H xsltRegisterExtModuleFunction ( ( const xmlChar * ) "abs" , EXSLT_MATH_NAMESPACE , exsltMathAbsFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "sqrt" , EXSLT_MATH_NAMESPACE , exsltMathSqrtFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "power" , EXSLT_MATH_NAMESPACE , exsltMathPowerFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "log" , EXSLT_MATH_NAMESPACE , exsltMathLogFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "sin" , EXSLT_MATH_NAMESPACE , exsltMathSinFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "cos" , EXSLT_MATH_NAMESPACE , exsltMathCosFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "tan" , EXSLT_MATH_NAMESPACE , exsltMathTanFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "asin" , EXSLT_MATH_NAMESPACE , exsltMathAsinFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "acos" , EXSLT_MATH_NAMESPACE , exsltMathAcosFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "atan" , EXSLT_MATH_NAMESPACE , exsltMathAtanFunction ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "atan2" , EXSLT_MATH_NAMESPACE , exsltMathAtan2Function ) ; xsltRegisterExtModuleFunction ( ( const xmlChar * ) "exp" , EXSLT_MATH_NAMESPACE , exsltMathExpFunction ) ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void gtkui_inject_user ( int side ) { size_t len ; len = strescape ( injectbuf , injectbuf ) ; if ( side == 1 || side == 2 ) { user_inject ( injectbuf , len , curr_conn , side ) ; } }
1True
Categorize the following code snippet as vulnerable or not. True or False
void nautilus_file_operations_new_file ( GtkWidget * parent_view , GdkPoint * target_point , const char * parent_dir , const char * target_filename , const char * initial_contents , int length , NautilusCreateCallback done_callback , gpointer done_callback_data ) { GTask * task ; CreateJob * job ; GtkWindow * parent_window ; parent_window = NULL ; if ( parent_view ) { parent_window = ( GtkWindow * ) gtk_widget_get_ancestor ( parent_view , GTK_TYPE_WINDOW ) ; } job = op_job_new ( CreateJob , parent_window ) ; job -> done_callback = done_callback ; job -> done_callback_data = done_callback_data ; job -> dest_dir = g_file_new_for_uri ( parent_dir ) ; if ( target_point != NULL ) { job -> position = * target_point ; job -> has_position = TRUE ; } job -> src_data = g_memdup ( initial_contents , length ) ; job -> length = length ; job -> filename = g_strdup ( target_filename ) ; if ( ! nautilus_file_undo_manager_is_operating ( ) ) { job -> common . undo_info = nautilus_file_undo_info_create_new ( NAUTILUS_FILE_UNDO_OP_CREATE_EMPTY_FILE ) ; } task = g_task_new ( NULL , job -> common . cancellable , create_task_done , job ) ; g_task_set_task_data ( task , job , NULL ) ; g_task_run_in_thread ( task , create_task_thread_func ) ; g_object_unref ( task ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int i2d_PKCS8_fp ( FILE * fp , X509_SIG * p8 ) { return ASN1_i2d_fp_of ( X509_SIG , i2d_X509_SIG , fp , p8 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int qemuMonitorJSONGetBlockJobInfoOne ( virJSONValuePtr entry , const char * device , virDomainBlockJobInfoPtr info ) { const char * this_dev ; const char * type ; unsigned long long speed_bytes ; if ( ( this_dev = virJSONValueObjectGetString ( entry , "device" ) ) == NULL ) { qemuReportError ( VIR_ERR_INTERNAL_ERROR , "%s" , _ ( "entry was missing 'device'" ) ) ; return - 1 ; } if ( ! STREQ ( this_dev , device ) ) return - 1 ; type = virJSONValueObjectGetString ( entry , "type" ) ; if ( ! type ) { qemuReportError ( VIR_ERR_INTERNAL_ERROR , "%s" , _ ( "entry was missing 'type'" ) ) ; return - 1 ; } if ( STREQ ( type , "stream" ) ) info -> type = VIR_DOMAIN_BLOCK_JOB_TYPE_PULL ; else info -> type = VIR_DOMAIN_BLOCK_JOB_TYPE_UNKNOWN ; if ( virJSONValueObjectGetNumberUlong ( entry , "speed" , & speed_bytes ) < 0 ) { qemuReportError ( VIR_ERR_INTERNAL_ERROR , "%s" , _ ( "entry was missing 'speed'" ) ) ; return - 1 ; } info -> bandwidth = speed_bytes / 1024ULL / 1024ULL ; if ( virJSONValueObjectGetNumberUlong ( entry , "offset" , & info -> cur ) < 0 ) { qemuReportError ( VIR_ERR_INTERNAL_ERROR , "%s" , _ ( "entry was missing 'offset'" ) ) ; return - 1 ; } if ( virJSONValueObjectGetNumberUlong ( entry , "len" , & info -> end ) < 0 ) { qemuReportError ( VIR_ERR_INTERNAL_ERROR , "%s" , _ ( "entry was missing 'len'" ) ) ; return - 1 ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int zstopped ( i_ctx_t * i_ctx_p ) { os_ptr op = osp ; check_op ( 1 ) ; check_estack ( 5 ) ; push_mark_estack ( es_stopped , no_cleanup ) ; ++ esp ; make_false ( esp ) ; ++ esp ; make_int ( esp , 1 ) ; push_op_estack ( stopped_push ) ; push_op_estack ( zexec ) ; return o_push_estack ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static Datum ExecEvalAggref ( AggrefExprState * aggref , ExprContext * econtext , bool * isNull , ExprDoneCond * isDone ) { if ( isDone ) * isDone = ExprSingleResult ; if ( econtext -> ecxt_aggvalues == NULL ) elog ( ERROR , "no aggregates in this expression context" ) ; * isNull = econtext -> ecxt_aggnulls [ aggref -> aggno ] ; return econtext -> ecxt_aggvalues [ aggref -> aggno ] ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int mbfl_strlen ( mbfl_string * string ) { int len , n , m , k ; unsigned char * p ; const unsigned char * mbtab ; const mbfl_encoding * encoding ; encoding = mbfl_no2encoding ( string -> no_encoding ) ; if ( encoding == NULL || string == NULL ) { return - 1 ; } len = 0 ; if ( encoding -> flag & MBFL_ENCTYPE_SBCS ) { len = string -> len ; } else if ( encoding -> flag & ( MBFL_ENCTYPE_WCS2BE | MBFL_ENCTYPE_WCS2LE ) ) { len = string -> len / 2 ; } else if ( encoding -> flag & ( MBFL_ENCTYPE_WCS4BE | MBFL_ENCTYPE_WCS4LE ) ) { len = string -> len / 4 ; } else if ( encoding -> mblen_table != NULL ) { mbtab = encoding -> mblen_table ; n = 0 ; p = string -> val ; k = string -> len ; if ( p != NULL ) { while ( n < k ) { m = mbtab [ * p ] ; n += m ; p += m ; len ++ ; } ; } } else { mbfl_convert_filter * filter = mbfl_convert_filter_new ( string -> no_encoding , mbfl_no_encoding_wchar , filter_count_output , 0 , & len ) ; if ( filter == NULL ) { return - 1 ; } n = string -> len ; p = string -> val ; if ( p != NULL ) { while ( n > 0 ) { ( * filter -> filter_function ) ( * p ++ , filter ) ; n -- ; } } mbfl_convert_filter_delete ( filter ) ; } return len ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static jpc_enc_prc_t * prc_create ( jpc_enc_prc_t * prc , jpc_enc_cp_t * cp , jpc_enc_band_t * band ) { uint_fast32_t prcno ; uint_fast32_t prcxind ; uint_fast32_t prcyind ; uint_fast32_t cbgtlx ; uint_fast32_t cbgtly ; uint_fast32_t tlprctlx ; uint_fast32_t tlprctly ; uint_fast32_t tlcbgtlx ; uint_fast32_t tlcbgtly ; uint_fast16_t rlvlno ; jpc_enc_rlvl_t * rlvl ; uint_fast32_t tlcblktlx ; uint_fast32_t tlcblktly ; uint_fast32_t brcblkbrx ; uint_fast32_t brcblkbry ; uint_fast32_t cblkno ; jpc_enc_cblk_t * cblk ; jpc_enc_tcmpt_t * tcmpt ; prc -> cblks = 0 ; prc -> incltree = 0 ; prc -> savincltree = 0 ; prc -> nlibtree = 0 ; prc -> savnlibtree = 0 ; rlvl = band -> rlvl ; tcmpt = rlvl -> tcmpt ; rlvlno = rlvl - tcmpt -> rlvls ; prcno = prc - band -> prcs ; prcxind = prcno % rlvl -> numhprcs ; prcyind = prcno / rlvl -> numhprcs ; prc -> band = band ; tlprctlx = JPC_FLOORTOMULTPOW2 ( rlvl -> tlx , rlvl -> prcwidthexpn ) ; tlprctly = JPC_FLOORTOMULTPOW2 ( rlvl -> tly , rlvl -> prcheightexpn ) ; if ( ! rlvlno ) { tlcbgtlx = tlprctlx ; tlcbgtly = tlprctly ; } else { tlcbgtlx = JPC_CEILDIVPOW2 ( tlprctlx , 1 ) ; tlcbgtly = JPC_CEILDIVPOW2 ( tlprctly , 1 ) ; } cbgtlx = tlcbgtlx + ( prcxind << rlvl -> cbgwidthexpn ) ; cbgtly = tlcbgtly + ( prcyind << rlvl -> cbgheightexpn ) ; prc -> tlx = JAS_MAX ( jas_seq2d_xstart ( band -> data ) , cbgtlx ) ; prc -> tly = JAS_MAX ( jas_seq2d_ystart ( band -> data ) , cbgtly ) ; prc -> brx = JAS_MIN ( jas_seq2d_xend ( band -> data ) , cbgtlx + ( 1 << rlvl -> cbgwidthexpn ) ) ; prc -> bry = JAS_MIN ( jas_seq2d_yend ( band -> data ) , cbgtly + ( 1 << rlvl -> cbgheightexpn ) ) ; if ( prc -> tlx < prc -> brx && prc -> tly < prc -> bry ) { tlcblktlx = JPC_FLOORTOMULTPOW2 ( prc -> tlx , rlvl -> cblkwidthexpn ) ; tlcblktly = JPC_FLOORTOMULTPOW2 ( prc -> tly , rlvl -> cblkheightexpn ) ; brcblkbrx = JPC_CEILTOMULTPOW2 ( prc -> brx , rlvl -> cblkwidthexpn ) ; brcblkbry = JPC_CEILTOMULTPOW2 ( prc -> bry , rlvl -> cblkheightexpn ) ; prc -> numhcblks = JPC_FLOORDIVPOW2 ( brcblkbrx - tlcblktlx , rlvl -> cblkwidthexpn ) ; prc -> numvcblks = JPC_FLOORDIVPOW2 ( brcblkbry - tlcblktly , rlvl -> cblkheightexpn ) ; prc -> numcblks = prc -> numhcblks * prc -> numvcblks ; if ( ! ( prc -> incltree = jpc_tagtree_create ( prc -> numhcblks , prc -> numvcblks ) ) ) { goto error ; } if ( ! ( prc -> nlibtree = jpc_tagtree_create ( prc -> numhcblks , prc -> numvcblks ) ) ) { goto error ; } if ( ! ( prc -> savincltree = jpc_tagtree_create ( prc -> numhcblks , prc -> numvcblks ) ) ) { goto error ; } if ( ! ( prc -> savnlibtree = jpc_tagtree_create ( prc -> numhcblks , prc -> numvcblks ) ) ) { goto error ; } if ( ! ( prc -> cblks = jas_alloc2 ( prc -> numcblks , sizeof ( jpc_enc_cblk_t ) ) ) ) { goto error ; } for ( cblkno = 0 , cblk = prc -> cblks ; cblkno < prc -> numcblks ; ++ cblkno , ++ cblk ) { cblk -> passes = 0 ; cblk -> stream = 0 ; cblk -> mqenc = 0 ; cblk -> data = 0 ; cblk -> flags = 0 ; cblk -> prc = prc ; } for ( cblkno = 0 , cblk = prc -> cblks ; cblkno < prc -> numcblks ; ++ cblkno , ++ cblk ) { if ( ! cblk_create ( cblk , cp , prc ) ) { goto error ; } } } else { prc -> tlx = prc -> brx ; prc -> tly = prc -> bry ; prc -> numcblks = 0 ; prc -> numhcblks = 0 ; prc -> numvcblks = 0 ; prc -> cblks = 0 ; prc -> incltree = 0 ; prc -> nlibtree = 0 ; prc -> savincltree = 0 ; prc -> savnlibtree = 0 ; } return prc ; error : prc_destroy ( prc ) ; return 0 ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
const EVP_CIPHER * EVP_aes_ ## keylen ## _ ## mode ( void ) \ { return & aes_ ## keylen ## _ ## mode ; } # define BLOCK_CIPHER_custom ( nid , keylen , blocksize , ivlen , mode , MODE , flags ) static const EVP_CIPHER aes_ ## keylen ## _ ## mode = { \ nid ## _ ## keylen ## _ ## mode , blocksize , \ ( EVP_CIPH_ ## MODE ## _MODE == EVP_CIPH_XTS_MODE ? 2 : 1 ) * keylen / 8 , ivlen , \ flags | EVP_CIPH_ ## MODE ## _MODE , \ aes_ ## mode ## _init_key , \ aes_ ## mode ## _cipher , \ aes_ ## mode ## _cleanup , \ sizeof ( EVP_AES_ ## MODE ## _CTX ) , \ NULL , NULL , aes_ ## mode ## _ctrl , NULL } ; const EVP_CIPHER * EVP_aes_ ## keylen ## _ ## mode ( void ) \ { return & aes_ ## keylen ## _ ## mode ; } # endif # if defined ( OPENSSL_CPUID_OBJ ) && ( defined ( __arm__ ) || defined ( __arm ) || defined ( __aarch64__ ) ) # include "arm_arch.h" # if __ARM_MAX_ARCH__ >= 7 # if defined ( BSAES_ASM ) # define BSAES_CAPABLE ( OPENSSL_armcap_P & ARMV7_NEON ) # endif # if defined ( VPAES_ASM ) # define VPAES_CAPABLE ( OPENSSL_armcap_P & ARMV7_NEON ) # endif # define HWAES_CAPABLE ( OPENSSL_armcap_P & ARMV8_AES ) # define HWAES_set_encrypt_key aes_v8_set_encrypt_key # define HWAES_set_decrypt_key aes_v8_set_decrypt_key # define HWAES_encrypt aes_v8_encrypt # define HWAES_decrypt aes_v8_decrypt # define HWAES_cbc_encrypt aes_v8_cbc_encrypt # define HWAES_ctr32_encrypt_blocks aes_v8_ctr32_encrypt_blocks # endif # endif # if defined ( HWAES_CAPABLE ) int HWAES_set_encrypt_key ( const unsigned char * userKey , const int bits , AES_KEY * key ) ; int HWAES_set_decrypt_key ( const unsigned char * userKey , const int bits , AES_KEY * key ) ; void HWAES_encrypt ( const unsigned char * in , unsigned char * out , const AES_KEY * key ) ; void HWAES_decrypt ( const unsigned char * in , unsigned char * out , const AES_KEY * key ) ; void HWAES_cbc_encrypt ( const unsigned char * in , unsigned char * out , size_t length , const AES_KEY * key , unsigned char * ivec , const int enc ) ; void HWAES_ctr32_encrypt_blocks ( const unsigned char * in , unsigned char * out , size_t len , const AES_KEY * key , const unsigned char ivec [ 16 ] ) ; void HWAES_xts_encrypt ( const unsigned char * inp , unsigned char * out , size_t len , const AES_KEY * key1 , const AES_KEY * key2 , const unsigned char iv [ 16 ] ) ; void HWAES_xts_decrypt ( const unsigned char * inp , unsigned char * out , size_t len , const AES_KEY * key1 , const AES_KEY * key2 , const unsigned char iv [ 16 ] ) ; # endif # define BLOCK_CIPHER_generic_pack ( nid , keylen , flags ) \ BLOCK_CIPHER_generic ( nid , keylen , 16 , 16 , cbc , cbc , CBC , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 16 , 0 , ecb , ecb , ECB , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , ofb128 , ofb , OFB , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , cfb128 , cfb , CFB , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , cfb1 , cfb1 , CFB , flags ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , cfb8 , cfb8 , CFB , flags ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , ctr , ctr , CTR , flags ) static int aes_init_key ( EVP_CIPHER_CTX * ctx , const unsigned char * key , const unsigned char * iv , int enc ) { int ret , mode ; EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; mode = EVP_CIPHER_CTX_mode ( ctx ) ; if ( ( mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE ) && ! enc ) { # ifdef HWAES_CAPABLE if ( HWAES_CAPABLE ) { ret = HWAES_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) HWAES_decrypt ; dat -> stream . cbc = NULL ; # ifdef HWAES_cbc_encrypt if ( mode == EVP_CIPH_CBC_MODE ) dat -> stream . cbc = ( cbc128_f ) HWAES_cbc_encrypt ; # endif } else # endif # ifdef BSAES_CAPABLE if ( BSAES_CAPABLE && mode == EVP_CIPH_CBC_MODE ) { ret = AES_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) AES_decrypt ; dat -> stream . cbc = ( cbc128_f ) bsaes_cbc_encrypt ; } else # endif # ifdef VPAES_CAPABLE if ( VPAES_CAPABLE ) { ret = vpaes_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) vpaes_decrypt ; dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) vpaes_cbc_encrypt : NULL ; } else # endif { ret = AES_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) AES_decrypt ; dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) AES_cbc_encrypt : NULL ; } } else # ifdef HWAES_CAPABLE if ( HWAES_CAPABLE ) { ret = HWAES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) HWAES_encrypt ; dat -> stream . cbc = NULL ; # ifdef HWAES_cbc_encrypt if ( mode == EVP_CIPH_CBC_MODE ) dat -> stream . cbc = ( cbc128_f ) HWAES_cbc_encrypt ; else # endif # ifdef HWAES_ctr32_encrypt_blocks if ( mode == EVP_CIPH_CTR_MODE ) dat -> stream . ctr = ( ctr128_f ) HWAES_ctr32_encrypt_blocks ; else # endif ( void ) 0 ; } else # endif # ifdef BSAES_CAPABLE if ( BSAES_CAPABLE && mode == EVP_CIPH_CTR_MODE ) { ret = AES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) AES_encrypt ; dat -> stream . ctr = ( ctr128_f ) bsaes_ctr32_encrypt_blocks ; } else # endif # ifdef VPAES_CAPABLE if ( VPAES_CAPABLE ) { ret = vpaes_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) vpaes_encrypt ; dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) vpaes_cbc_encrypt : NULL ; } else # endif { ret = AES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ; dat -> block = ( block128_f ) AES_encrypt ; dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) AES_cbc_encrypt : NULL ; # ifdef AES_CTR_ASM if ( mode == EVP_CIPH_CTR_MODE ) dat -> stream . ctr = ( ctr128_f ) AES_ctr32_encrypt ; # endif } if ( ret < 0 ) { EVPerr ( EVP_F_AES_INIT_KEY , EVP_R_AES_KEY_SETUP_FAILED ) ; return 0 ; } return 1 ; } static int aes_cbc_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; if ( dat -> stream . cbc ) ( * dat -> stream . cbc ) ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , EVP_CIPHER_CTX_encrypting ( ctx ) ) ; else if ( EVP_CIPHER_CTX_encrypting ( ctx ) ) CRYPTO_cbc128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , dat -> block ) ; else CRYPTO_cbc128_decrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , dat -> block ) ; return 1 ; } static int aes_ecb_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { size_t bl = EVP_CIPHER_CTX_block_size ( ctx ) ; size_t i ; EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; if ( len < bl ) return 1 ; for ( i = 0 , len -= bl ; i <= len ; i += bl ) ( * dat -> block ) ( in + i , out + i , & dat -> ks ) ; return 1 ; } static int aes_ofb_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; int num = EVP_CIPHER_CTX_num ( ctx ) ; CRYPTO_ofb128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; return 1 ; } static int aes_cfb_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; int num = EVP_CIPHER_CTX_num ( ctx ) ; CRYPTO_cfb128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; return 1 ; } static int aes_cfb8_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; int num = EVP_CIPHER_CTX_num ( ctx ) ; CRYPTO_cfb128_8_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; return 1 ; } static int aes_cfb1_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; if ( EVP_CIPHER_CTX_test_flags ( ctx , EVP_CIPH_FLAG_LENGTH_BITS ) ) { int num = EVP_CIPHER_CTX_num ( ctx ) ; CRYPTO_cfb128_1_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; return 1 ; } while ( len >= MAXBITCHUNK ) { int num = EVP_CIPHER_CTX_num ( ctx ) ; CRYPTO_cfb128_1_encrypt ( in , out , MAXBITCHUNK * 8 , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; len -= MAXBITCHUNK ; } if ( len ) { int num = EVP_CIPHER_CTX_num ( ctx ) ; CRYPTO_cfb128_1_encrypt ( in , out , len * 8 , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; } return 1 ; } static int aes_ctr_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) { unsigned int num = EVP_CIPHER_CTX_num ( ctx ) ; EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ; if ( dat -> stream . ctr ) CRYPTO_ctr128_encrypt_ctr32 ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , EVP_CIPHER_CTX_buf_noconst ( ctx ) , & num , dat -> stream . ctr ) ; else CRYPTO_ctr128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , EVP_CIPHER_CTX_buf_noconst ( ctx ) , & num , dat -> block ) ; EVP_CIPHER_CTX_set_num ( ctx , num ) ; return 1 ; } BLOCK_CIPHER_generic_pack ( NID_aes , 128 , 0 )
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ProtocolHandlerRegistryTest , TestRemoveHandler ) { ProtocolHandler ph1 = CreateProtocolHandler ( "test" , "test1" ) ; registry ( ) -> OnAcceptRegisterProtocolHandler ( ph1 ) ; registry ( ) -> OnAcceptRegisterProtocolHandler ( ph1 ) ; registry ( ) -> RemoveHandler ( ph1 ) ; ASSERT_FALSE ( registry ( ) -> IsRegistered ( ph1 ) ) ; ASSERT_FALSE ( registry ( ) -> IsHandledProtocol ( "test" ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int decode_cell_data ( Indeo3DecodeContext * ctx , Cell * cell , uint8_t * block , uint8_t * ref_block , int pitch , int h_zoom , int v_zoom , int mode , const vqEntry * delta [ 2 ] , int swap_quads [ 2 ] , const uint8_t * * data_ptr , const uint8_t * last_ptr ) { int x , y , line , num_lines ; int rle_blocks = 0 ; uint8_t code , * dst , * ref ; const vqEntry * delta_tab ; unsigned int dyad1 , dyad2 ; uint64_t pix64 ; int skip_flag = 0 , is_top_of_cell , is_first_row = 1 ; int row_offset , blk_row_offset , line_offset ; row_offset = pitch ; blk_row_offset = ( row_offset << ( 2 + v_zoom ) ) - ( cell -> width << 2 ) ; line_offset = v_zoom ? row_offset : 0 ; if ( cell -> height & v_zoom || cell -> width & h_zoom ) return IV3_BAD_DATA ; for ( y = 0 ; y < cell -> height ; is_first_row = 0 , y += 1 + v_zoom ) { for ( x = 0 ; x < cell -> width ; x += 1 + h_zoom ) { ref = ref_block ; dst = block ; if ( rle_blocks > 0 ) { if ( mode <= 4 ) { RLE_BLOCK_COPY ; } else if ( mode == 10 && ! cell -> mv_ptr ) { RLE_BLOCK_COPY_8 ; } rle_blocks -- ; } else { for ( line = 0 ; line < 4 ; ) { num_lines = 1 ; is_top_of_cell = is_first_row && ! line ; if ( mode <= 4 ) delta_tab = delta [ line & 1 ] ; else delta_tab = delta [ 1 ] ; BUFFER_PRECHECK ; code = bytestream_get_byte ( data_ptr ) ; if ( code < 248 ) { if ( code < delta_tab -> num_dyads ) { BUFFER_PRECHECK ; dyad1 = bytestream_get_byte ( data_ptr ) ; dyad2 = code ; if ( dyad1 >= delta_tab -> num_dyads || dyad1 >= 248 ) return IV3_BAD_DATA ; } else { code -= delta_tab -> num_dyads ; dyad1 = code / delta_tab -> quad_exp ; dyad2 = code % delta_tab -> quad_exp ; if ( swap_quads [ line & 1 ] ) FFSWAP ( unsigned int , dyad1 , dyad2 ) ; } if ( mode <= 4 ) { APPLY_DELTA_4 ; } else if ( mode == 10 && ! cell -> mv_ptr ) { APPLY_DELTA_8 ; } else { APPLY_DELTA_1011_INTER ; } } else { switch ( code ) { case RLE_ESC_FC : skip_flag = 0 ; rle_blocks = 1 ; code = 253 ; case RLE_ESC_FF : case RLE_ESC_FE : case RLE_ESC_FD : num_lines = 257 - code - line ; if ( num_lines <= 0 ) return IV3_BAD_RLE ; if ( mode <= 4 ) { RLE_LINES_COPY ; } else if ( mode == 10 && ! cell -> mv_ptr ) { RLE_LINES_COPY_M10 ; } break ; case RLE_ESC_FB : BUFFER_PRECHECK ; code = bytestream_get_byte ( data_ptr ) ; rle_blocks = ( code & 0x1F ) - 1 ; if ( code >= 64 || rle_blocks < 0 ) return IV3_BAD_COUNTER ; skip_flag = code & 0x20 ; num_lines = 4 - line ; if ( mode >= 10 || ( cell -> mv_ptr || ! skip_flag ) ) { if ( mode <= 4 ) { RLE_LINES_COPY ; } else if ( mode == 10 && ! cell -> mv_ptr ) { RLE_LINES_COPY_M10 ; } } break ; case RLE_ESC_F9 : skip_flag = 1 ; rle_blocks = 1 ; case RLE_ESC_FA : if ( line ) return IV3_BAD_RLE ; num_lines = 4 ; if ( cell -> mv_ptr ) { if ( mode <= 4 ) { RLE_LINES_COPY ; } else if ( mode == 10 && ! cell -> mv_ptr ) { RLE_LINES_COPY_M10 ; } } break ; default : return IV3_UNSUPPORTED ; } } line += num_lines ; ref += row_offset * ( num_lines << v_zoom ) ; dst += row_offset * ( num_lines << v_zoom ) ; } } block += 4 << h_zoom ; ref_block += 4 << h_zoom ; } ref_block += blk_row_offset ; block += blk_row_offset ; } return IV3_NOERR ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const char * unsigned32_avp ( diam_ctx_t * c , diam_avp_t * a , tvbuff_t * tvb , diam_sub_dis_t * diam_sub_dis_inf _U_ ) { char * label = NULL ; proto_item * pi ; gint length = tvb_reported_length ( tvb ) ; if ( length == 4 ) { if ( c -> tree ) { pi = proto_tree_add_item ( c -> tree , a -> hf_value , tvb , 0 , length , ENC_BIG_ENDIAN ) ; label = ( char * ) wmem_alloc ( wmem_packet_scope ( ) , ITEM_LABEL_LENGTH + 1 ) ; proto_item_fill_label ( PITEM_FINFO ( pi ) , label ) ; label = strstr ( label , ": " ) + 2 ; } } else { pi = proto_tree_add_bytes_format ( c -> tree , hf_diameter_avp_data_wrong_length , tvb , 0 , length , NULL , "Error! Bad Unsigned32 Length" ) ; expert_add_info_format ( c -> pinfo , pi , & ei_diameter_avp_len , "Bad Unsigned32 Length (%u)" , length ) ; PROTO_ITEM_SET_GENERATED ( pi ) ; } return label ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static my_bool get_one_option ( int optid , const struct my_option * opt __attribute__ ( ( unused ) ) , char * argument ) { switch ( optid ) { case 'p' : if ( argument == disabled_my_option ) argument = ( char * ) "" ; if ( argument ) { char * start = argument ; my_free ( opt_password ) ; opt_password = my_strdup ( argument , MYF ( MY_FAE ) ) ; while ( * argument ) * argument ++ = 'x' ; if ( * start ) start [ 1 ] = 0 ; tty_password = 0 ; } else tty_password = 1 ; break ; case 'r' : if ( ! ( md_result_file = my_fopen ( argument , O_WRONLY | FILE_BINARY , MYF ( MY_WME ) ) ) ) exit ( 1 ) ; break ; case 'W' : # ifdef __WIN__ opt_protocol = MYSQL_PROTOCOL_PIPE ; # endif break ; case 'N' : opt_set_charset = 0 ; break ; case 'T' : opt_disable_keys = 0 ; if ( strlen ( argument ) >= FN_REFLEN ) { die ( EX_USAGE , "Input filename too long: %s" , argument ) ; } break ; case '#' : DBUG_PUSH ( argument ? argument : default_dbug_option ) ; debug_check_flag = 1 ; break ; # include < sslopt - case . h > case 'V' : print_version ( ) ; exit ( 0 ) ; case 'X' : opt_xml = 1 ; extended_insert = opt_drop = opt_lock = opt_disable_keys = opt_autocommit = opt_create_db = 0 ; break ; case 'i' : opt_comments_used = 1 ; break ; case 'I' : case '?' : usage ( ) ; exit ( 0 ) ; case ( int ) OPT_MASTER_DATA : if ( ! argument ) opt_master_data = MYSQL_OPT_MASTER_DATA_EFFECTIVE_SQL ; break ; case ( int ) OPT_MYSQLDUMP_SLAVE_DATA : if ( ! argument ) opt_slave_data = MYSQL_OPT_SLAVE_DATA_EFFECTIVE_SQL ; break ; case ( int ) OPT_OPTIMIZE : extended_insert = opt_drop = opt_lock = quick = create_options = opt_disable_keys = lock_tables = opt_set_charset = 1 ; break ; case ( int ) OPT_SKIP_OPTIMIZATION : extended_insert = opt_drop = opt_lock = quick = create_options = opt_disable_keys = lock_tables = opt_set_charset = 0 ; break ; case ( int ) OPT_COMPACT : if ( opt_compact ) { opt_comments = opt_drop = opt_disable_keys = opt_lock = 0 ; opt_set_charset = 0 ; } break ; case ( int ) OPT_TABLES : opt_databases = 0 ; break ; case ( int ) OPT_IGNORE_TABLE : { if ( ! strchr ( argument , '.' ) ) { fprintf ( stderr , "Illegal use of option --ignore-table=<database>.<table>\n" ) ; exit ( 1 ) ; } if ( my_hash_insert ( & ignore_table , ( uchar * ) my_strdup ( argument , MYF ( 0 ) ) ) ) exit ( EX_EOM ) ; break ; } case ( int ) OPT_COMPATIBLE : { char buff [ 255 ] ; char * end = compatible_mode_normal_str ; int i ; ulong mode ; uint err_len ; opt_quoted = 1 ; opt_set_charset = 0 ; opt_compatible_mode_str = argument ; opt_compatible_mode = find_set ( & compatible_mode_typelib , argument , strlen ( argument ) , & err_ptr , & err_len ) ; if ( err_len ) { strmake ( buff , err_ptr , min ( sizeof ( buff ) - 1 , err_len ) ) ; fprintf ( stderr , "Invalid mode to --compatible: %s\n" , buff ) ; exit ( 1 ) ; } # if ! defined ( DBUG_OFF ) { size_t size_for_sql_mode = 0 ; const char * * ptr ; for ( ptr = compatible_mode_names ; * ptr ; ptr ++ ) size_for_sql_mode += strlen ( * ptr ) ; size_for_sql_mode += sizeof ( compatible_mode_names ) - 1 ; DBUG_ASSERT ( sizeof ( compatible_mode_normal_str ) >= size_for_sql_mode ) ; } # endif mode = opt_compatible_mode ; for ( i = 0 , mode = opt_compatible_mode ; mode ; mode >>= 1 , i ++ ) { if ( mode & 1 ) { end = strmov ( end , compatible_mode_names [ i ] ) ; end = strmov ( end , "," ) ; } } if ( end != compatible_mode_normal_str ) end [ - 1 ] = 0 ; if ( default_charset == mysql_universal_client_charset ) default_charset = ( char * ) MYSQL_DEFAULT_CHARSET_NAME ; break ; } case ( int ) OPT_MYSQL_PROTOCOL : opt_protocol = find_type_or_exit ( argument , & sql_protocol_typelib , opt -> name ) ; break ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_file_receive ( struct file * file ) { const struct cred * cred = current_cred ( ) ; return file_has_perm ( cred , file , file_to_av ( file ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void _kill_job_on_msg_fail ( uint32_t job_id ) { slurmctld_lock_t job_write_lock = { NO_LOCK , WRITE_LOCK , WRITE_LOCK , NO_LOCK , READ_LOCK } ; error ( "Job allocate response msg send failure, killing JobId=%u" , job_id ) ; lock_slurmctld ( job_write_lock ) ; job_complete ( job_id , slurmctld_conf . slurm_user_id , false , false , SIGTERM ) ; unlock_slurmctld ( job_write_lock ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void walk_splay ( cmap_splay * tree , unsigned int node , void ( * fn ) ( cmap_splay * , void * ) , void * arg ) { int from = TOP ; while ( node != EMPTY ) { switch ( from ) { case TOP : if ( tree [ node ] . left != EMPTY ) { node = tree [ node ] . left ; from = TOP ; break ; } case LEFT : fn ( & tree [ node ] , arg ) ; if ( tree [ node ] . right != EMPTY ) { node = tree [ node ] . right ; from = TOP ; break ; } case RIGHT : { unsigned int parent = tree [ node ] . parent ; if ( parent == EMPTY ) return ; if ( tree [ parent ] . left == node ) from = LEFT ; else { assert ( tree [ parent ] . right == node ) ; from = RIGHT ; } node = parent ; } } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline dma_addr_t xhci_mask64 ( uint64_t addr ) { if ( sizeof ( dma_addr_t ) == 4 ) { return addr & 0xffffffff ; } else { return addr ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static uint64_t nvic_sysreg_read ( void * opaque , hwaddr addr , unsigned size ) { nvic_state * s = ( nvic_state * ) opaque ; uint32_t offset = addr ; int i ; uint32_t val ; switch ( offset ) { case 0xd18 ... 0xd23 : val = 0 ; for ( i = 0 ; i < size ; i ++ ) { val |= s -> gic . priority1 [ ( offset - 0xd14 ) + i ] [ 0 ] << ( i * 8 ) ; } return val ; case 0xfe0 ... 0xfff : if ( offset & 3 ) { return 0 ; } return nvic_id [ ( offset - 0xfe0 ) >> 2 ] ; } if ( size == 4 ) { return nvic_readl ( s , offset ) ; } qemu_log_mask ( LOG_GUEST_ERROR , "NVIC: Bad read of size %d at offset 0x%x\n" , size , offset ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExtensionServiceSyncTest , ReenableDisabledExtensionFromSync ) { InitializeEmptyExtensionService ( ) ; browser_sync : : ProfileSyncService * sync_service = ProfileSyncServiceFactory : : GetForProfile ( profile ( ) ) ; sync_service -> SetFirstSetupComplete ( ) ; service ( ) -> Init ( ) ; extensions : : ChromeTestExtensionLoader extension_loader ( profile ( ) ) ; extension_loader . set_pack_extension ( true ) ; scoped_refptr < const Extension > extension = extension_loader . LoadExtension ( data_dir ( ) . AppendASCII ( "simple_with_file" ) ) ; ASSERT_TRUE ( extension ) ; const std : : string kExtensionId = extension -> id ( ) ; ASSERT_TRUE ( registry ( ) -> enabled_extensions ( ) . GetByID ( kExtensionId ) ) ; syncer : : FakeSyncChangeProcessor * processor_raw = nullptr ; { auto processor = base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) ; processor_raw = processor . get ( ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , std : : move ( processor ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; } processor_raw -> changes ( ) . clear ( ) ; DisableExtensionFromSync ( * extension , extensions : : disable_reason : : DISABLE_USER_ACTION ) ; EXPECT_TRUE ( registry ( ) -> disabled_extensions ( ) . GetByID ( kExtensionId ) ) ; EXPECT_EQ ( extensions : : disable_reason : : DISABLE_USER_ACTION , ExtensionPrefs : : Get ( profile ( ) ) -> GetDisableReasons ( kExtensionId ) ) ; EXPECT_TRUE ( processor_raw -> changes ( ) . empty ( ) ) ; service ( ) -> EnableExtension ( kExtensionId ) ; { ASSERT_EQ ( 1u , processor_raw -> changes ( ) . size ( ) ) ; const SyncChange & change = processor_raw -> changes ( ) [ 0 ] ; EXPECT_EQ ( SyncChange : : ACTION_UPDATE , change . change_type ( ) ) ; std : : unique_ptr < ExtensionSyncData > data = ExtensionSyncData : : CreateFromSyncData ( change . sync_data ( ) ) ; EXPECT_EQ ( kExtensionId , data -> id ( ) ) ; EXPECT_EQ ( 0 , data -> disable_reasons ( ) ) ; EXPECT_TRUE ( data -> enabled ( ) ) ; } processor_raw -> changes ( ) . clear ( ) ; service ( ) -> DisableExtension ( kExtensionId , extensions : : disable_reason : : DISABLE_USER_ACTION ) ; EXPECT_TRUE ( registry ( ) -> disabled_extensions ( ) . GetByID ( kExtensionId ) ) ; { ASSERT_EQ ( 1u , processor_raw -> changes ( ) . size ( ) ) ; const SyncChange & change = processor_raw -> changes ( ) [ 0 ] ; EXPECT_EQ ( SyncChange : : ACTION_UPDATE , change . change_type ( ) ) ; std : : unique_ptr < ExtensionSyncData > data = ExtensionSyncData : : CreateFromSyncData ( change . sync_data ( ) ) ; EXPECT_EQ ( kExtensionId , data -> id ( ) ) ; EXPECT_EQ ( extensions : : disable_reason : : DISABLE_USER_ACTION , data -> disable_reasons ( ) ) ; EXPECT_FALSE ( data -> enabled ( ) ) ; } processor_raw -> changes ( ) . clear ( ) ; EnableExtensionFromSync ( * extension ) ; EXPECT_TRUE ( registry ( ) -> enabled_extensions ( ) . GetByID ( kExtensionId ) ) ; EXPECT_TRUE ( processor_raw -> changes ( ) . empty ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int ivi_huff_desc_cmp ( const IVIHuffDesc * desc1 , const IVIHuffDesc * desc2 ) { return desc1 -> num_rows != desc2 -> num_rows || memcmp ( desc1 -> xbits , desc2 -> xbits , desc1 -> num_rows ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static ASN1_BIT_STRING * obj_to_asn1bstr ( VALUE obj , long unused_bits ) { ASN1_BIT_STRING * bstr ; if ( unused_bits < 0 ) unused_bits = 0 ; StringValue ( obj ) ; if ( ! ( bstr = ASN1_BIT_STRING_new ( ) ) ) ossl_raise ( eASN1Error , NULL ) ; ASN1_BIT_STRING_set ( bstr , ( unsigned char * ) RSTRING_PTR ( obj ) , RSTRING_LENINT ( obj ) ) ; bstr -> flags &= ~ ( ASN1_STRING_FLAG_BITS_LEFT | 0x07 ) ; bstr -> flags |= ASN1_STRING_FLAG_BITS_LEFT | ( unused_bits & 0x07 ) ; return bstr ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static ACL_USER * find_acl_user ( const char * host , const char * user , my_bool exact ) { DBUG_ENTER ( "find_acl_user" ) ; DBUG_PRINT ( "enter" , ( "host: '%s' user: '%s'" , host , user ) ) ; safe_mutex_assert_owner ( & acl_cache -> lock ) ; for ( uint i = 0 ; i < acl_users . elements ; i ++ ) { ACL_USER * acl_user = dynamic_element ( & acl_users , i , ACL_USER * ) ; DBUG_PRINT ( "info" , ( "strcmp('%s','%s'), compare_hostname('%s','%s')," , user , acl_user -> user ? acl_user -> user : "" , host , acl_user -> host . hostname ? acl_user -> host . hostname : "" ) ) ; if ( ( ! acl_user -> user && ! user [ 0 ] ) || ( acl_user -> user && ! strcmp ( user , acl_user -> user ) ) ) { if ( exact ? ! my_strcasecmp ( system_charset_info , host , acl_user -> host . hostname ? acl_user -> host . hostname : "" ) : compare_hostname ( & acl_user -> host , host , host ) ) { DBUG_RETURN ( acl_user ) ; } } } DBUG_RETURN ( 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int PEM_write_ ## name ( FILE * fp , const type * x ) ; # define DECLARE_PEM_write_cb_fp ( name , type ) int PEM_write_ ## name ( FILE * fp , type * x , const EVP_CIPHER * enc , unsigned char * kstr , int klen , pem_password_cb * cb , void * u ) ; # endif # define DECLARE_PEM_read_bio ( name , type ) type * PEM_read_bio_ ## name ( BIO * bp , type * * x , pem_password_cb * cb , void * u ) ; # define DECLARE_PEM_write_bio ( name , type ) int PEM_write_bio_ ## name ( BIO * bp , type * x ) ; # define DECLARE_PEM_write_bio_const ( name , type ) int PEM_write_bio_ ## name ( BIO * bp , const type * x ) ; # define DECLARE_PEM_write_cb_bio ( name , type ) int PEM_write_bio_ ## name ( BIO * bp , type * x , const EVP_CIPHER * enc , unsigned char * kstr , int klen , pem_password_cb * cb , void * u ) ; # define DECLARE_PEM_write ( name , type ) DECLARE_PEM_write_bio ( name , type ) DECLARE_PEM_write_fp ( name , type ) # define DECLARE_PEM_write_const ( name , type ) DECLARE_PEM_write_bio_const ( name , type ) DECLARE_PEM_write_fp_const ( name , type ) # define DECLARE_PEM_write_cb ( name , type ) DECLARE_PEM_write_cb_bio ( name , type ) DECLARE_PEM_write_cb_fp ( name , type ) # define DECLARE_PEM_read ( name , type ) DECLARE_PEM_read_bio ( name , type ) DECLARE_PEM_read_fp ( name , type ) # define DECLARE_PEM_rw ( name , type ) DECLARE_PEM_read ( name , type ) DECLARE_PEM_write ( name , type ) # define DECLARE_PEM_rw_const ( name , type ) DECLARE_PEM_read ( name , type ) DECLARE_PEM_write_const ( name , type ) # define DECLARE_PEM_rw_cb ( name , type ) DECLARE_PEM_read ( name , type ) DECLARE_PEM_write_cb ( name , type ) typedef int pem_password_cb ( char * buf , int size , int rwflag , void * userdata ) ; int PEM_get_EVP_CIPHER_INFO ( char * header , EVP_CIPHER_INFO * cipher ) ; int PEM_do_header ( EVP_CIPHER_INFO * cipher , unsigned char * data , long * len , pem_password_cb * callback , void * u ) ; int PEM_read_bio ( BIO * bp , char * * name , char * * header , unsigned char * * data , long * len ) ; # define PEM_FLAG_SECURE 0x1 # define PEM_FLAG_EAY_COMPATIBLE 0x2 # define PEM_FLAG_ONLY_B64 0x4 int PEM_read_bio_ex ( BIO * bp , char * * name , char * * header , unsigned char * * data , long * len , unsigned int flags ) ; int PEM_bytes_read_bio_secmem ( unsigned char * * pdata , long * plen , char * * pnm , const char * name , BIO * bp , pem_password_cb * cb , void * u ) ; int PEM_write_bio ( BIO * bp , const char * name , const char * hdr , const unsigned char * data , long len ) ; int PEM_bytes_read_bio ( unsigned char * * pdata , long * plen , char * * pnm , const char * name , BIO * bp , pem_password_cb * cb , void * u ) ; void * PEM_ASN1_read_bio ( d2i_of_void * d2i , const char * name , BIO * bp , void * * x , pem_password_cb * cb , void * u ) ; int PEM_ASN1_write_bio ( i2d_of_void * i2d , const char * name , BIO * bp , void * x , const EVP_CIPHER * enc , unsigned char * kstr , int klen , pem_password_cb * cb , void * u ) ; STACK_OF ( X509_INFO ) * PEM_X509_INFO_read_bio ( BIO * bp , STACK_OF ( X509_INFO ) * sk , pem_password_cb * cb , void * u ) ; int PEM_X509_INFO_write_bio ( BIO * bp , X509_INFO * xi , EVP_CIPHER * enc , unsigned char * kstr , int klen , pem_password_cb * cd , void * u ) ; # ifndef OPENSSL_NO_STDIO int PEM_read ( FILE * fp , char * * name , char * * header , unsigned char * * data , long * len ) ; int PEM_write ( FILE * fp , const char * name , const char * hdr , const unsigned char * data , long len ) ; void * PEM_ASN1_read ( d2i_of_void * d2i , const char * name , FILE * fp , void * * x , pem_password_cb * cb , void * u ) ; int PEM_ASN1_write ( i2d_of_void * i2d , const char * name , FILE * fp , void * x , const EVP_CIPHER * enc , unsigned char * kstr , int klen , pem_password_cb * callback , void * u ) ; STACK_OF ( X509_INFO ) * PEM_X509_INFO_read ( FILE * fp , STACK_OF ( X509_INFO ) * sk , pem_password_cb * cb , void * u ) ; # endif int PEM_SignInit ( EVP_MD_CTX * ctx , EVP_MD * type ) ; int PEM_SignUpdate ( EVP_MD_CTX * ctx , unsigned char * d , unsigned int cnt ) ; int PEM_SignFinal ( EVP_MD_CTX * ctx , unsigned char * sigret , unsigned int * siglen , EVP_PKEY * pkey ) ; int PEM_def_callback ( char * buf , int num , int rwflag , void * userdata ) ; void PEM_proc_type ( char * buf , int type ) ; void PEM_dek_info ( char * buf , const char * type , int len , char * str ) ; # include < openssl / symhacks . h > DECLARE_PEM_rw ( X509 , X509 ) DECLARE_PEM_rw ( X509_AUX , X509 ) DECLARE_PEM_rw ( X509_REQ , X509_REQ ) DECLARE_PEM_write ( X509_REQ_NEW , X509_REQ ) DECLARE_PEM_rw ( X509_CRL , X509_CRL ) DECLARE_PEM_rw ( PKCS7 , PKCS7 ) DECLARE_PEM_rw ( NETSCAPE_CERT_SEQUENCE , NETSCAPE_CERT_SEQUENCE ) DECLARE_PEM_rw ( PKCS8 , X509_SIG ) DECLARE_PEM_rw ( PKCS8_PRIV_KEY_INFO , PKCS8_PRIV_KEY_INFO ) # ifndef OPENSSL_NO_RSA DECLARE_PEM_rw_cb ( RSAPrivateKey , RSA ) DECLARE_PEM_rw_const ( RSAPublicKey , RSA ) DECLARE_PEM_rw ( RSA_PUBKEY , RSA ) # endif # ifndef OPENSSL_NO_DSA DECLARE_PEM_rw_cb ( DSAPrivateKey , DSA ) DECLARE_PEM_rw ( DSA_PUBKEY , DSA ) DECLARE_PEM_rw_const ( DSAparams , DSA ) # endif # ifndef OPENSSL_NO_EC DECLARE_PEM_rw_const ( ECPKParameters , EC_GROUP ) DECLARE_PEM_rw_cb ( ECPrivateKey , EC_KEY ) DECLARE_PEM_rw ( EC_PUBKEY , EC_KEY ) # endif # ifndef OPENSSL_NO_DH DECLARE_PEM_rw_const ( DHparams , DH )
0False
Categorize the following code snippet as vulnerable or not. True or False
static void checkpoint ( void ) { checkpoint_requested = 0 ; if ( object_count ) { cycle_packfile ( ) ; dump_branches ( ) ; dump_tags ( ) ; dump_marks ( ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
void input_DecoderDecode ( decoder_t * p_dec , block_t * p_block , bool b_do_pace ) { decoder_owner_sys_t * p_owner = p_dec -> p_owner ; if ( b_do_pace ) { if ( ! p_owner -> b_waiting ) block_FifoPace ( p_owner -> p_fifo , 10 , SIZE_MAX ) ; } # ifdef __arm__ else if ( block_FifoSize ( p_owner -> p_fifo ) > 50 * 1024 * 1024 ) # else else if ( block_FifoSize ( p_owner -> p_fifo ) > 400 * 1024 * 1024 ) # endif { msg_Warn ( p_dec , "decoder/packetizer fifo full (data not " "consumed quickly enough), resetting fifo!" ) ; block_FifoEmpty ( p_owner -> p_fifo ) ; } block_FifoPut ( p_owner -> p_fifo , p_block ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void virtio_pci_reset ( DeviceState * d ) { VirtIOPCIProxy * proxy = container_of ( d , VirtIOPCIProxy , pci_dev . qdev ) ; virtio_reset ( proxy -> vdev ) ; msix_reset ( & proxy -> pci_dev ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dissect_glabel_sdh ( proto_tree * ti _U_ , proto_tree * rsvp_object_tree , tvbuff_t * tvb , int offset ) { guint16 s ; guint8 u , k , l , m ; proto_tree * sonet_tree ; sonet_tree = proto_tree_add_subtree ( rsvp_object_tree , tvb , offset , 4 , TREE ( TT_SONET_SDH ) , NULL , "SONET/SDH Label" ) ; proto_tree_add_item ( sonet_tree , hf_rsvp_sonet_s , tvb , offset , 2 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( sonet_tree , hf_rsvp_sonet_u , tvb , offset + 2 , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( sonet_tree , hf_rsvp_sonet_k , tvb , offset + 2 , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( sonet_tree , hf_rsvp_sonet_l , tvb , offset + 3 , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( sonet_tree , hf_rsvp_sonet_m , tvb , offset + 3 , 1 , ENC_BIG_ENDIAN ) ; s = tvb_get_ntohs ( tvb , offset ) ; u = ( ( tvb_get_guint8 ( tvb , offset + 2 ) & 0xF0 ) >> 4 ) ; k = ( ( tvb_get_guint8 ( tvb , offset + 2 ) & 0x0F ) >> 0 ) ; l = ( ( tvb_get_guint8 ( tvb , offset + 3 ) & 0xF0 ) >> 4 ) ; m = ( ( tvb_get_guint8 ( tvb , offset + 3 ) & 0x0F ) >> 0 ) ; proto_item_append_text ( ti , ": SONET/SDH: S=%u, U=%u, K=%u, L=%u, M=%u" , s , u , k , l , m ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_decoder_remove ( VP9Decoder * pbi ) { VP9_COMMON * const cm = & pbi -> common ; int i ; vp9_get_worker_interface ( ) -> end ( & pbi -> lf_worker ) ; vpx_free ( pbi -> lf_worker . data1 ) ; vpx_free ( pbi -> tile_data ) ; for ( i = 0 ; i < pbi -> num_tile_workers ; ++ i ) { VP9Worker * const worker = & pbi -> tile_workers [ i ] ; vp9_get_worker_interface ( ) -> end ( worker ) ; vpx_free ( worker -> data1 ) ; vpx_free ( worker -> data2 ) ; } vpx_free ( pbi -> tile_workers ) ; if ( pbi -> num_tile_workers > 0 ) { vp9_loop_filter_dealloc ( & pbi -> lf_row_sync ) ; } vp9_remove_common ( cm ) ; vpx_free ( pbi ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static VALUE ossl_asn1_ ## klass ( int argc , VALUE * argv , VALUE self ) \ { return rb_funcall3 ( cASN1 ## klass , rb_intern ( "new" ) , argc , argv ) ; } OSSL_ASN1_IMPL_FACTORY_METHOD ( Boolean ) OSSL_ASN1_IMPL_FACTORY_METHOD ( Integer ) OSSL_ASN1_IMPL_FACTORY_METHOD ( Enumerated ) OSSL_ASN1_IMPL_FACTORY_METHOD ( BitString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( OctetString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( UTF8String ) OSSL_ASN1_IMPL_FACTORY_METHOD ( NumericString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( PrintableString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( T61String ) OSSL_ASN1_IMPL_FACTORY_METHOD ( VideotexString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( IA5String ) OSSL_ASN1_IMPL_FACTORY_METHOD ( GraphicString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( ISO64String ) OSSL_ASN1_IMPL_FACTORY_METHOD ( GeneralString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( UniversalString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( BMPString ) OSSL_ASN1_IMPL_FACTORY_METHOD ( Null ) OSSL_ASN1_IMPL_FACTORY_METHOD ( ObjectId )
0False