instruction
stringclasses
1 value
input
stringlengths
31
235k
output
class label
2 classes
Categorize the following code snippet as vulnerable or not. True or False
static int before ( celt x , celt y ) { if ( x < y ) return 1 ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline __u8 ip_reply_arg_flowi_flags ( const struct ip_reply_arg * arg ) { return ( arg -> flags & IP_REPLY_ARG_NOSRCCHECK ) ? FLOWI_FLAG_ANYSRC : 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExtensionServiceSyncTest , GetSyncDataDisableReasons ) { InitializeEmptyExtensionService ( ) ; const Extension * extension = InstallCRX ( data_dir ( ) . AppendASCII ( "good.crx" ) , INSTALL_NEW ) ; ASSERT_TRUE ( extension ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : EXTENSIONS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; { syncer : : SyncDataList list = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( list . size ( ) , 1U ) ; std : : unique_ptr < ExtensionSyncData > data = ExtensionSyncData : : CreateFromSyncData ( list [ 0 ] ) ; ASSERT_TRUE ( data . get ( ) ) ; EXPECT_TRUE ( data -> enabled ( ) ) ; EXPECT_TRUE ( data -> supports_disable_reasons ( ) ) ; EXPECT_EQ ( extensions : : disable_reason : : DISABLE_NONE , data -> disable_reasons ( ) ) ; } service ( ) -> DisableExtension ( good_crx , extensions : : disable_reason : : DISABLE_USER_ACTION ) ; { syncer : : SyncDataList list = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( list . size ( ) , 1U ) ; std : : unique_ptr < ExtensionSyncData > data = ExtensionSyncData : : CreateFromSyncData ( list [ 0 ] ) ; ASSERT_TRUE ( data . get ( ) ) ; EXPECT_FALSE ( data -> enabled ( ) ) ; EXPECT_TRUE ( data -> supports_disable_reasons ( ) ) ; EXPECT_EQ ( extensions : : disable_reason : : DISABLE_USER_ACTION , data -> disable_reasons ( ) ) ; } service ( ) -> EnableExtension ( good_crx ) ; service ( ) -> DisableExtension ( good_crx , extensions : : disable_reason : : DISABLE_RELOAD ) ; { syncer : : SyncDataList list = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( list . size ( ) , 1U ) ; std : : unique_ptr < ExtensionSyncData > data = ExtensionSyncData : : CreateFromSyncData ( list [ 0 ] ) ; ASSERT_TRUE ( data . get ( ) ) ; EXPECT_TRUE ( data -> enabled ( ) ) ; EXPECT_TRUE ( data -> supports_disable_reasons ( ) ) ; EXPECT_EQ ( extensions : : disable_reason : : DISABLE_NONE , data -> disable_reasons ( ) ) ; } service ( ) -> EnableExtension ( good_crx ) ; service ( ) -> DisableExtension ( good_crx , extensions : : disable_reason : : DISABLE_USER_ACTION | extensions : : disable_reason : : DISABLE_RELOAD ) ; { syncer : : SyncDataList list = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( list . size ( ) , 1U ) ; std : : unique_ptr < ExtensionSyncData > data = ExtensionSyncData : : CreateFromSyncData ( list [ 0 ] ) ; ASSERT_TRUE ( data . get ( ) ) ; EXPECT_FALSE ( data -> enabled ( ) ) ; EXPECT_TRUE ( data -> supports_disable_reasons ( ) ) ; EXPECT_EQ ( extensions : : disable_reason : : DISABLE_USER_ACTION , data -> disable_reasons ( ) ) ; } service ( ) -> EnableExtension ( good_crx ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_T_crcDesired ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_T_crcDesired , T_crcDesired_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
CharList * pkg_appendToList ( CharList * l , CharList * * end , const char * str ) { CharList * endptr = NULL , * tmp ; if ( end == NULL ) { end = & endptr ; } if ( ( * end == NULL ) && ( l != NULL ) ) { tmp = l ; while ( tmp -> next ) { tmp = tmp -> next ; } * end = tmp ; } if ( l == NULL ) { l = pkg_prependToList ( NULL , str ) ; } else { ( * end ) -> next = pkg_prependToList ( NULL , str ) ; } if ( * end ) { ( * end ) = ( * end ) -> next ; } else { * end = l ; } return l ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST ( ExtensionCSPValidator , IsSecure ) { EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( std : : string ( ) , OPTIONS_ALLOW_UNSAFE_EVAL ) , "script-src 'self'; object-src 'self'; " , MissingSecureSrcWarning ( "script-src" ) , MissingSecureSrcWarning ( "object-src" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "img-src https://google.com" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "img-src https://google.com; script-src 'self'; object-src 'self'; " , MissingSecureSrcWarning ( "script-src" ) , MissingSecureSrcWarning ( "object-src" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src a b" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "script-src; object-src 'self'; " , InsecureValueWarning ( "script-src" , "a" ) , InsecureValueWarning ( "script-src" , "b" ) , MissingSecureSrcWarning ( "object-src" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src *" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src; " , InsecureValueWarning ( "default-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self'; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'none'; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' ftp://google.com" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "ftp://google.com" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://google.com; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src *; default-src 'self'" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src; default-src 'self'; " , InsecureValueWarning ( "default-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self'; default-src *; " , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; default-src; " ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self'; default-src *; script-src *; script-src 'self'" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; default-src; script-src; script-src 'self'; " , InsecureValueWarning ( "script-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self'; default-src *; script-src 'self'; script-src *; " , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; default-src; script-src 'self'; script-src; " ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src *; script-src 'self'" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src; script-src 'self'; " , InsecureValueWarning ( "default-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src *; script-src 'self'; img-src 'self'" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src; script-src 'self'; img-src 'self'; " , InsecureValueWarning ( "default-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src *; script-src 'self'; object-src 'self'; " , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src; script-src 'self'; object-src 'self'; " ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src 'self'; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'unsafe-eval'; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'unsafe-eval'" , OPTIONS_NONE ) , "default-src; " , InsecureValueWarning ( "default-src" , "'unsafe-eval'" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'unsafe-inline'" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src; " , InsecureValueWarning ( "default-src" , "'unsafe-inline'" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'unsafe-inline' 'none'" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'none'; " , InsecureValueWarning ( "default-src" , "'unsafe-inline'" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://google.com" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "http://google.com" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://google.com; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' chrome://resources; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' chrome-extension://aabbcc; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' chrome-extension-resource://aabbcc; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https:" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https:" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http:" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "http:" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' google.com" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "google.com" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' *" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' *:*" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "*:*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' *:*/" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "*:*/" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' *:*/path" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "*:*/path" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*:*" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://*:*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*:*/" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://*:*/" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*:*/path" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://*:*/path" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.com" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://*.com" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.*.google.com/" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://*.*.google.com/" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.*.google.com:*/" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://*.*.google.com:*/" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://www.*.google.com/" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://www.*.google.com/" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://www.*.google.com:*/" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "https://www.*.google.com:*/" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' chrome://*" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "chrome://*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' chrome-extension://*" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "chrome-extension://*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' chrome-extension://" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "chrome-extension://" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.google.com; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.google.com:1; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.google.com:*; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.google.com:1/; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.google.com:*/; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://127.0.0.1; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://localhost; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://lOcAlHoSt; " , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self' http://lOcAlHoSt; " ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://127.0.0.1:9999; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://localhost:8888; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://127.0.0.1.example.com" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "http://127.0.0.1.example.com" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' http://localhost.example.com" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "http://localhost.example.com" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' blob:; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' blob:http://example.com/XXX" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "blob:http://example.com/XXX" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' filesystem:; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' filesystem:http://example.com/XX" , OPTIONS_ALLOW_UNSAFE_EVAL ) , "default-src 'self'; " , InsecureValueWarning ( "default-src" , "filesystem:http://example.com/XX" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://*.googleapis.com; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src 'self' https://x.googleapis.com; " , OPTIONS_ALLOW_UNSAFE_EVAL ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src *" , OPTIONS_NONE ) , "script-src 'self'; object-src; " , InsecureValueWarning ( "object-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src *" , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) , "script-src 'self'; object-src; " , InsecureValueWarning ( "object-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src *; plugin-types application/pdf; " , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src *; " "plugin-types application/x-shockwave-flash" , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) , "script-src 'self'; object-src; " "plugin-types application/x-shockwave-flash; " , InsecureValueWarning ( "object-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src *; " "plugin-types application/x-shockwave-flash application/pdf; " , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) , "script-src 'self'; object-src; " "plugin-types application/x-shockwave-flash application/pdf; " , InsecureValueWarning ( "object-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src http://www.example.com; " "plugin-types application/pdf; " , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "object-src http://www.example.com blob:; script-src 'self'; " "plugin-types application/pdf; " , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src 'self'; object-src http://*.example.com; " "plugin-types application/pdf; " , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "script-src *; object-src *; plugin-types application/pdf; " , OPTIONS_ALLOW_INSECURE_OBJECT_SRC ) , "script-src; object-src *; plugin-types application/pdf; " , InsecureValueWarning ( "script-src" , "*" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src; script-src" " 'sha256-hndjYvzUzy2Ykuad81Cwsl1FOXX/qYs/aDVyUyNZwBw='" " 'sha384-bSVm1i3sjPBRM4TwZtYTDjk9JxZMExYHWbFmP1SxDhJH4ue0Wu9OPOkY5hcqRcS" "t'" " 'sha512-440MmBLtj9Kp5Bqloogn9BqGDylY8vFsv5/zXL1zH2fJVssCoskRig4gyM+9Kqw" "vCSapSz5CVoUGHQcxv43UQg=='; " , OPTIONS_NONE ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src; script-src 'sha1-eYyYGmKWdhpUewohaXk9o8IaLSw='; " , OPTIONS_NONE ) , "default-src; script-src; " , InsecureValueWarning ( "script-src" , "'sha1-eYyYGmKWdhpUewohaXk9o8IaLSw='" ) ) ) ; EXPECT_TRUE ( CheckCSP ( SanitizeCSP ( "default-src; script-src 'sha256-hndjYvzUzy2Ykuad81Cwsl1FOXX/qYs/aDVyUyNZ" "wBw= sha256-qznLcsROx4GACP2dm0UCKCzCG+HiZ1guq6ZZDob/Tng='; " , OPTIONS_NONE ) , "default-src; script-src; " , InsecureValueWarning ( "script-src" , "'sha256-hndjYvzUzy2Ykuad81Cwsl1FOXX/qYs/aDVyUyNZwBw=" ) , InsecureValueWarning ( "script-src" , "sha256-qznLcsROx4GACP2dm0UCKCzCG+HiZ1guq6ZZDob/Tng='" ) ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void ff_h263_encode_mba ( MpegEncContext * s ) { int i , mb_pos ; for ( i = 0 ; i < 6 ; i ++ ) { if ( s -> mb_num - 1 <= ff_mba_max [ i ] ) break ; } mb_pos = s -> mb_x + s -> mb_width * s -> mb_y ; put_bits ( & s -> pb , ff_mba_length [ i ] , mb_pos ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void init_uncompress ( compress_filter_context_t * zfx , z_stream * zs ) { int rc ; if ( ( rc = zfx -> algo == 1 ? inflateInit2 ( zs , - 15 ) : inflateInit ( zs ) ) != Z_OK ) { log_fatal ( "zlib problem: %s\n" , zs -> msg ? zs -> msg : rc == Z_MEM_ERROR ? "out of core" : rc == Z_VERSION_ERROR ? "invalid lib version" : "unknown error" ) ; } zfx -> inbufsize = 2048 ; zfx -> inbuf = xmalloc ( zfx -> inbufsize ) ; zs -> avail_in = 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void e1000e_msix_notify ( E1000ECore * core , uint32_t causes ) { if ( causes & E1000_ICR_RXQ0 ) { e1000e_msix_notify_one ( core , E1000_ICR_RXQ0 , E1000_IVAR_RXQ0 ( core -> mac [ IVAR ] ) ) ; } if ( causes & E1000_ICR_RXQ1 ) { e1000e_msix_notify_one ( core , E1000_ICR_RXQ1 , E1000_IVAR_RXQ1 ( core -> mac [ IVAR ] ) ) ; } if ( causes & E1000_ICR_TXQ0 ) { e1000e_msix_notify_one ( core , E1000_ICR_TXQ0 , E1000_IVAR_TXQ0 ( core -> mac [ IVAR ] ) ) ; } if ( causes & E1000_ICR_TXQ1 ) { e1000e_msix_notify_one ( core , E1000_ICR_TXQ1 , E1000_IVAR_TXQ1 ( core -> mac [ IVAR ] ) ) ; } if ( causes & E1000_ICR_OTHER ) { e1000e_msix_notify_one ( core , E1000_ICR_OTHER , E1000_IVAR_OTHER ( core -> mac [ IVAR ] ) ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_INTEGER_27_78 ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_constrained_integer ( tvb , offset , actx , tree , hf_index , 27U , 78U , NULL , FALSE ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( WebUsbDetectorTest , ThreeUsbDevicesWereThereBeforeAndThenRemovedAfterWebUsbDetectorWasCreated ) { base : : string16 product_name_1 = base : : UTF8ToUTF16 ( kProductName_1 ) ; GURL landing_page_1 ( kLandingPage_1 ) ; scoped_refptr < device : : MockUsbDevice > device_1 ( new device : : MockUsbDevice ( 0 , 1 , "Google" , kProductName_1 , "002" , landing_page_1 ) ) ; std : : string guid_1 = device_1 -> guid ( ) ; base : : string16 product_name_2 = base : : UTF8ToUTF16 ( kProductName_2 ) ; GURL landing_page_2 ( kLandingPage_2 ) ; scoped_refptr < device : : MockUsbDevice > device_2 ( new device : : MockUsbDevice ( 3 , 4 , "Google" , kProductName_2 , "005" , landing_page_2 ) ) ; std : : string guid_2 = device_2 -> guid ( ) ; base : : string16 product_name_3 = base : : UTF8ToUTF16 ( kProductName_3 ) ; GURL landing_page_3 ( kLandingPage_3 ) ; scoped_refptr < device : : MockUsbDevice > device_3 ( new device : : MockUsbDevice ( 6 , 7 , "Google" , kProductName_3 , "008" , landing_page_3 ) ) ; std : : string guid_3 = device_3 -> guid ( ) ; device_client_ . usb_service ( ) -> AddDevice ( device_1 ) ; EXPECT_TRUE ( message_center_ -> FindVisibleNotificationById ( guid_1 ) == nullptr ) ; device_client_ . usb_service ( ) -> AddDevice ( device_2 ) ; EXPECT_TRUE ( message_center_ -> FindVisibleNotificationById ( guid_2 ) == nullptr ) ; device_client_ . usb_service ( ) -> AddDevice ( device_3 ) ; EXPECT_TRUE ( message_center_ -> FindVisibleNotificationById ( guid_3 ) == nullptr ) ; Initialize ( ) ; device_client_ . usb_service ( ) -> RemoveDevice ( device_1 ) ; EXPECT_TRUE ( message_center_ -> FindVisibleNotificationById ( guid_1 ) == nullptr ) ; device_client_ . usb_service ( ) -> RemoveDevice ( device_2 ) ; EXPECT_TRUE ( message_center_ -> FindVisibleNotificationById ( guid_2 ) == nullptr ) ; device_client_ . usb_service ( ) -> RemoveDevice ( device_3 ) ; EXPECT_TRUE ( message_center_ -> FindVisibleNotificationById ( guid_3 ) == nullptr ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const char * cmd_audit_engine ( cmd_parms * cmd , void * _dcfg , const char * p1 ) { directory_config * dcfg = _dcfg ; if ( strcasecmp ( p1 , "On" ) == 0 ) dcfg -> auditlog_flag = AUDITLOG_ON ; else if ( strcasecmp ( p1 , "Off" ) == 0 ) dcfg -> auditlog_flag = AUDITLOG_OFF ; else if ( strcasecmp ( p1 , "RelevantOnly" ) == 0 ) dcfg -> auditlog_flag = AUDITLOG_RELEVANT ; else return ( const char * ) apr_psprintf ( cmd -> pool , "ModSecurity: Unrecognised parameter value for SecAuditEngine: %s" , p1 ) ; return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int pxa2xx_clkcfg_read ( CPUARMState * env , const ARMCPRegInfo * ri , uint64_t * value ) { PXA2xxState * s = ( PXA2xxState * ) ri -> opaque ; * value = s -> clkcfg ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int my_kill ( int pid , int sig ) { # ifdef __WIN__ HANDLE proc ; if ( ( proc = OpenProcess ( SYNCHRONIZE | PROCESS_TERMINATE , FALSE , pid ) ) == NULL ) return - 1 ; if ( sig == 0 ) { DWORD wait_result = WaitForSingleObject ( proc , 0 ) ; CloseHandle ( proc ) ; return wait_result == WAIT_OBJECT_0 ? - 1 : 0 ; } ( void ) TerminateProcess ( proc , 201 ) ; CloseHandle ( proc ) ; return 1 ; # else return kill ( pid , sig ) ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
int vp9_get_frame_buffer ( void * cb_priv , size_t min_size , vpx_codec_frame_buffer_t * fb ) { int i ; InternalFrameBufferList * const int_fb_list = ( InternalFrameBufferList * ) cb_priv ; if ( int_fb_list == NULL ) return - 1 ; for ( i = 0 ; i < int_fb_list -> num_internal_frame_buffers ; ++ i ) { if ( ! int_fb_list -> int_fb [ i ] . in_use ) break ; } if ( i == int_fb_list -> num_internal_frame_buffers ) return - 1 ; if ( int_fb_list -> int_fb [ i ] . size < min_size ) { int_fb_list -> int_fb [ i ] . data = ( uint8_t * ) vpx_realloc ( int_fb_list -> int_fb [ i ] . data , min_size ) ; if ( ! int_fb_list -> int_fb [ i ] . data ) return - 1 ; vpx_memset ( int_fb_list -> int_fb [ i ] . data , 0 , min_size ) ; int_fb_list -> int_fb [ i ] . size = min_size ; } fb -> data = int_fb_list -> int_fb [ i ] . data ; fb -> size = int_fb_list -> int_fb [ i ] . size ; int_fb_list -> int_fb [ i ] . in_use = 1 ; fb -> priv = & int_fb_list -> int_fb [ i ] ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void pdf_tos_restore ( fz_context * ctx , pdf_text_object_state * tos , fz_matrix save [ 2 ] ) { tos -> tm = save [ 0 ] ; tos -> tlm = save [ 1 ] ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int get_zbin_mode_boost ( const MB_MODE_INFO * mbmi , int enabled ) { if ( enabled ) { if ( is_inter_block ( mbmi ) ) { if ( mbmi -> mode == ZEROMV ) { return mbmi -> ref_frame [ 0 ] != LAST_FRAME ? GF_ZEROMV_ZBIN_BOOST : LF_ZEROMV_ZBIN_BOOST ; } else { return mbmi -> sb_type < BLOCK_8X8 ? SPLIT_MV_ZBIN_BOOST : MV_ZBIN_BOOST ; } } else { return INTRA_ZBIN_BOOST ; } } else { return 0 ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
VALUE ossl_cipher_new ( const EVP_CIPHER * cipher ) { VALUE ret ; EVP_CIPHER_CTX * ctx ; ret = ossl_cipher_alloc ( cCipher ) ; AllocCipher ( ret , ctx ) ; if ( EVP_CipherInit_ex ( ctx , cipher , NULL , NULL , NULL , - 1 ) != 1 ) ossl_raise ( eCipherError , NULL ) ; return ret ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static PyObject * string_partition ( PyStringObject * self , PyObject * sep_obj ) { const char * sep ; Py_ssize_t sep_len ; if ( PyString_Check ( sep_obj ) ) { sep = PyString_AS_STRING ( sep_obj ) ; sep_len = PyString_GET_SIZE ( sep_obj ) ; } # ifdef Py_USING_UNICODE else if ( PyUnicode_Check ( sep_obj ) ) return PyUnicode_Partition ( ( PyObject * ) self , sep_obj ) ; # endif else if ( PyObject_AsCharBuffer ( sep_obj , & sep , & sep_len ) ) return NULL ; return stringlib_partition ( ( PyObject * ) self , PyString_AS_STRING ( self ) , PyString_GET_SIZE ( self ) , sep_obj , sep , sep_len ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void istr_set_insert ( GHashTable * table , const char * istr ) { char * key ; key = g_strdup ( istr ) ; g_hash_table_replace ( table , key , key ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int SpoolssGetJob_r ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep ) { dcerpc_call_value * dcv = ( dcerpc_call_value * ) di -> call_data ; gint32 level = GPOINTER_TO_UINT ( dcv -> se_data ) ; BUFFER buffer ; offset = dissect_spoolss_buffer ( tvb , offset , pinfo , tree , di , drep , & buffer ) ; if ( buffer . tvb ) { int buffer_offset = 0 ; switch ( level ) { case 1 : dissect_spoolss_JOB_INFO_1 ( buffer . tvb , buffer_offset , pinfo , buffer . tree , di , drep ) ; break ; case 2 : default : proto_tree_add_expert_format ( buffer . tree , pinfo , & ei_job_info_level , buffer . tvb , buffer_offset , - 1 , "Unknown job info level %d" , level ) ; break ; } } offset = dissect_ndr_uint32 ( tvb , offset , pinfo , tree , di , drep , hf_needed , NULL ) ; offset = dissect_doserror ( tvb , offset , pinfo , tree , di , drep , hf_rc , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static UBool action_mirror ( UBiDiTransform * pTransform , UErrorCode * pErrorCode ) { UChar32 c ; uint32_t i = 0 , j = 0 ; if ( 0 == ( pTransform -> reorderingOptions & UBIDI_DO_MIRRORING ) ) { return FALSE ; } if ( pTransform -> destSize < pTransform -> srcLength ) { * pErrorCode = U_BUFFER_OVERFLOW_ERROR ; return FALSE ; } do { UBool isOdd = ubidi_getLevelAt ( pTransform -> pBidi , i ) & 1 ; U16_NEXT ( pTransform -> src , i , pTransform -> srcLength , c ) ; U16_APPEND_UNSAFE ( pTransform -> dest , j , isOdd ? u_charMirror ( c ) : c ) ; } while ( i < pTransform -> srcLength ) ; * pTransform -> pDestLength = pTransform -> srcLength ; pTransform -> reorderingOptions = UBIDI_REORDER_DEFAULT ; return TRUE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static gint dissect_ac_if_hdr_body ( tvbuff_t * tvb , gint offset , packet_info * pinfo _U_ , proto_tree * tree , usb_conv_info_t * usb_conv_info ) { gint offset_start ; guint16 bcdADC ; guint8 ver_major ; double ver ; guint8 if_in_collection , i ; audio_conv_info_t * audio_conv_info ; offset_start = offset ; bcdADC = tvb_get_letohs ( tvb , offset ) ; ver_major = USB_AUDIO_BCD44_TO_DEC ( bcdADC >> 8 ) ; ver = ver_major + USB_AUDIO_BCD44_TO_DEC ( bcdADC & 0xFF ) / 100.0 ; proto_tree_add_double_format_value ( tree , hf_ac_if_hdr_ver , tvb , offset , 2 , ver , "%2.2f" , ver ) ; audio_conv_info = ( audio_conv_info_t * ) usb_conv_info -> class_data ; if ( ! audio_conv_info ) { audio_conv_info = wmem_new ( wmem_file_scope ( ) , audio_conv_info_t ) ; usb_conv_info -> class_data = audio_conv_info ; usb_conv_info -> class_data_type = USB_CONV_AUDIO ; } else if ( usb_conv_info -> class_data_type != USB_CONV_AUDIO ) { return 0 ; } audio_conv_info -> ver_major = ver_major ; offset += 2 ; if ( ver_major == 1 ) { proto_tree_add_item ( tree , hf_ac_if_hdr_total_len , tvb , offset , 2 , ENC_LITTLE_ENDIAN ) ; offset += 2 ; if_in_collection = tvb_get_guint8 ( tvb , offset ) ; proto_tree_add_item ( tree , hf_ac_if_hdr_bInCollection , tvb , offset , 1 , ENC_LITTLE_ENDIAN ) ; offset ++ ; for ( i = 0 ; i < if_in_collection ; i ++ ) { proto_tree_add_item ( tree , hf_ac_if_hdr_if_num , tvb , offset , 1 , ENC_LITTLE_ENDIAN ) ; offset ++ ; } } return offset - offset_start ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_P ( GLES2DecoderTestWithBlendEquationAdvanced , BlendBarrierKHRValidArgs ) { EXPECT_CALL ( * gl_ , BlendBarrierKHR ( ) ) ; SpecializedSetup < cmds : : BlendBarrierKHR , 0 > ( true ) ; cmds : : BlendBarrierKHR cmd ; cmd . Init ( ) ; EXPECT_EQ ( error : : kNoError , ExecuteCmd ( cmd ) ) ; EXPECT_EQ ( GL_NO_ERROR , GetGLError ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void InitializeSchemeWhitelist ( SchemeSet * whitelist , const SchemeSet & client_schemes_to_whitelist ) { DCHECK ( whitelist ) ; if ( ! whitelist -> empty ( ) ) return ; whitelist -> insert ( client_schemes_to_whitelist . begin ( ) , client_schemes_to_whitelist . end ( ) ) ; whitelist -> insert ( std : : string ( url : : kAboutScheme ) ) ; whitelist -> insert ( std : : string ( url : : kFileScheme ) ) ; whitelist -> insert ( std : : string ( url : : kFtpScheme ) ) ; whitelist -> insert ( std : : string ( url : : kHttpScheme ) ) ; whitelist -> insert ( std : : string ( url : : kHttpsScheme ) ) ; whitelist -> insert ( std : : string ( url : : kMailToScheme ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void auth_server_connection_disconnect ( struct auth_server_connection * conn , const char * reason ) { if ( ! conn -> connected ) return ; conn -> connected = FALSE ; conn -> handshake_received = FALSE ; conn -> version_received = FALSE ; conn -> has_plain_mech = FALSE ; conn -> server_pid = 0 ; conn -> connect_uid = 0 ; conn -> cookie = NULL ; array_clear ( & conn -> available_auth_mechs ) ; timeout_remove ( & conn -> to ) ; io_remove ( & conn -> io ) ; if ( conn -> fd != - 1 ) { i_stream_destroy ( & conn -> input ) ; o_stream_destroy ( & conn -> output ) ; if ( close ( conn -> fd ) < 0 ) i_error ( "close(auth server connection) failed: %m" ) ; conn -> fd = - 1 ; } auth_server_connection_remove_requests ( conn , reason ) ; if ( conn -> client -> connect_notify_callback != NULL ) { conn -> client -> connect_notify_callback ( conn -> client , FALSE , conn -> client -> connect_notify_context ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
MSG_PROCESS_RETURN tls_process_client_key_exchange ( SSL * s , PACKET * pkt ) { int al = - 1 ; unsigned long alg_k ; alg_k = s -> s3 -> tmp . new_cipher -> algorithm_mkey ; if ( ( alg_k & SSL_PSK ) && ! tls_process_cke_psk_preamble ( s , pkt , & al ) ) goto err ; if ( alg_k & SSL_kPSK ) { if ( PACKET_remaining ( pkt ) != 0 ) { al = SSL_AD_HANDSHAKE_FAILURE ; SSLerr ( SSL_F_TLS_PROCESS_CLIENT_KEY_EXCHANGE , SSL_R_LENGTH_MISMATCH ) ; goto err ; } if ( ! ssl_generate_master_secret ( s , NULL , 0 , 0 ) ) { al = SSL_AD_INTERNAL_ERROR ; SSLerr ( SSL_F_TLS_PROCESS_CLIENT_KEY_EXCHANGE , ERR_R_INTERNAL_ERROR ) ; goto err ; } } else if ( alg_k & ( SSL_kRSA | SSL_kRSAPSK ) ) { if ( ! tls_process_cke_rsa ( s , pkt , & al ) ) goto err ; } else if ( alg_k & ( SSL_kDHE | SSL_kDHEPSK ) ) { if ( ! tls_process_cke_dhe ( s , pkt , & al ) ) goto err ; } else if ( alg_k & ( SSL_kECDHE | SSL_kECDHEPSK ) ) { if ( ! tls_process_cke_ecdhe ( s , pkt , & al ) ) goto err ; } else if ( alg_k & SSL_kSRP ) { if ( ! tls_process_cke_srp ( s , pkt , & al ) ) goto err ; } else if ( alg_k & SSL_kGOST ) { if ( ! tls_process_cke_gost ( s , pkt , & al ) ) goto err ; } else { al = SSL_AD_HANDSHAKE_FAILURE ; SSLerr ( SSL_F_TLS_PROCESS_CLIENT_KEY_EXCHANGE , SSL_R_UNKNOWN_CIPHER_TYPE ) ; goto err ; } return MSG_PROCESS_CONTINUE_PROCESSING ; err : if ( al != - 1 ) ssl3_send_alert ( s , SSL3_AL_FATAL , al ) ; # ifndef OPENSSL_NO_PSK OPENSSL_clear_free ( s -> s3 -> tmp . psk , s -> s3 -> tmp . psklen ) ; s -> s3 -> tmp . psk = NULL ; # endif ossl_statem_set_error ( s ) ; return MSG_PROCESS_ERROR ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int su_main ( int argc , char * * argv , int mode ) { int optc ; const char * new_user = DEFAULT_USER , * runuser_user = NULL ; char * command = NULL ; int request_same_session = 0 ; char * shell = NULL ; struct passwd * pw ; struct passwd pw_copy ; gid_t * groups = NULL ; size_t ngroups = 0 ; bool use_supp = false ; bool use_gid = false ; gid_t gid = 0 ; static const struct option longopts [ ] = { { "command" , required_argument , NULL , 'c' } , { "session-command" , required_argument , NULL , 'C' } , { "fast" , no_argument , NULL , 'f' } , { "login" , no_argument , NULL , 'l' } , { "preserve-environment" , no_argument , NULL , 'p' } , { "shell" , required_argument , NULL , 's' } , { "group" , required_argument , NULL , 'g' } , { "supp-group" , required_argument , NULL , 'G' } , { "user" , required_argument , NULL , 'u' } , { "help" , no_argument , 0 , 'h' } , { "version" , no_argument , 0 , 'V' } , { NULL , 0 , NULL , 0 } } ; setlocale ( LC_ALL , "" ) ; bindtextdomain ( PACKAGE , LOCALEDIR ) ; textdomain ( PACKAGE ) ; atexit ( close_stdout ) ; su_mode = mode ; fast_startup = false ; simulate_login = false ; change_environment = true ; while ( ( optc = getopt_long ( argc , argv , "c:fg:G:lmps:u:hV" , longopts , NULL ) ) != - 1 ) { switch ( optc ) { case 'c' : command = optarg ; break ; case 'C' : command = optarg ; request_same_session = 1 ; break ; case 'f' : fast_startup = true ; break ; case 'g' : use_gid = true ; gid = add_supp_group ( optarg , & groups , & ngroups ) ; break ; case 'G' : use_supp = true ; add_supp_group ( optarg , & groups , & ngroups ) ; break ; case 'l' : simulate_login = true ; break ; case 'm' : case 'p' : change_environment = false ; break ; case 's' : shell = optarg ; break ; case 'u' : if ( su_mode != RUNUSER_MODE ) usage ( EXIT_FAILURE ) ; runuser_user = optarg ; break ; case 'h' : usage ( 0 ) ; case 'V' : printf ( UTIL_LINUX_VERSION ) ; exit ( EXIT_SUCCESS ) ; default : errtryhelp ( EXIT_FAILURE ) ; } } restricted = evaluate_uid ( ) ; if ( optind < argc && ! strcmp ( argv [ optind ] , "-" ) ) { simulate_login = true ; ++ optind ; } if ( simulate_login && ! change_environment ) { warnx ( _ ( "ignoring --preserve-environment, it's mutually exclusive with --login" ) ) ; change_environment = true ; } switch ( su_mode ) { case RUNUSER_MODE : if ( runuser_user ) { new_user = runuser_user ; if ( shell || fast_startup || command || simulate_login ) { errx ( EXIT_FAILURE , _ ( "options --{ shell,fast,command,session-command,login} and " "--user are mutually exclusive" ) ) ; } if ( optind == argc ) errx ( EXIT_FAILURE , _ ( "no command was specified" ) ) ; break ; } case SU_MODE : if ( optind < argc ) new_user = argv [ optind ++ ] ; break ; } if ( ( use_supp || use_gid ) && restricted ) errx ( EXIT_FAILURE , _ ( "only root can specify alternative groups" ) ) ; logindefs_load_defaults = load_config ; pw = getpwnam ( new_user ) ; if ( ! ( pw && pw -> pw_name && pw -> pw_name [ 0 ] && pw -> pw_dir && pw -> pw_dir [ 0 ] && pw -> pw_passwd ) ) errx ( EXIT_FAILURE , _ ( "user %s does not exist" ) , new_user ) ; pw_copy = * pw ; pw = & pw_copy ; pw -> pw_name = xstrdup ( pw -> pw_name ) ; pw -> pw_passwd = xstrdup ( pw -> pw_passwd ) ; pw -> pw_dir = xstrdup ( pw -> pw_dir ) ; pw -> pw_shell = xstrdup ( pw -> pw_shell && pw -> pw_shell [ 0 ] ? pw -> pw_shell : DEFAULT_SHELL ) ; endpwent ( ) ; if ( use_supp && ! use_gid ) pw -> pw_gid = groups [ 0 ] ; else if ( use_gid ) pw -> pw_gid = gid ; authenticate ( pw ) ; if ( request_same_session || ! command || ! pw -> pw_uid ) same_session = 1 ; if ( runuser_user ) { shell = NULL ; } else { if ( ! shell && ! change_environment ) shell = getenv ( "SHELL" ) ; if ( shell && getuid ( ) != 0 && restricted_shell ( pw -> pw_shell ) ) { warnx ( _ ( "using restricted shell %s" ) , pw -> pw_shell ) ; shell = NULL ; } shell = xstrdup ( shell ? shell : pw -> pw_shell ) ; } init_groups ( pw , groups , ngroups ) ; if ( ! simulate_login || command ) suppress_pam_info = 1 ; create_watching_parent ( ) ; change_identity ( pw ) ; if ( ! same_session ) setsid ( ) ; modify_environment ( pw , shell ) ; if ( simulate_login && chdir ( pw -> pw_dir ) != 0 ) warn ( _ ( "warning: cannot change directory to %s" ) , pw -> pw_dir ) ; if ( shell ) run_shell ( shell , command , argv + optind , max ( 0 , argc - optind ) ) ; else { execvp ( argv [ optind ] , & argv [ optind ] ) ; err ( EXIT_FAILURE , _ ( "failed to execute %s" ) , argv [ optind ] ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static gcry_err_code_t pkcs1_encode_for_signature ( gcry_mpi_t * r_result , unsigned int nbits , const unsigned char * value , size_t valuelen , int algo ) { gcry_err_code_t rc = 0 ; gcry_error_t err ; byte asn [ 100 ] ; byte * frame = NULL ; size_t nframe = ( nbits + 7 ) / 8 ; int i ; size_t n ; size_t asnlen , dlen ; asnlen = DIM ( asn ) ; dlen = gcry_md_get_algo_dlen ( algo ) ; if ( gcry_md_algo_info ( algo , GCRYCTL_GET_ASNOID , asn , & asnlen ) ) { return GPG_ERR_NOT_IMPLEMENTED ; } if ( valuelen != dlen ) { return GPG_ERR_CONFLICT ; } if ( ! dlen || dlen + asnlen + 4 > nframe ) { return GPG_ERR_TOO_SHORT ; } if ( ! ( frame = gcry_malloc ( nframe ) ) ) return gpg_err_code_from_syserror ( ) ; n = 0 ; frame [ n ++ ] = 0 ; frame [ n ++ ] = 1 ; i = nframe - valuelen - asnlen - 3 ; gcry_assert ( i > 1 ) ; memset ( frame + n , 0xff , i ) ; n += i ; frame [ n ++ ] = 0 ; memcpy ( frame + n , asn , asnlen ) ; n += asnlen ; memcpy ( frame + n , value , valuelen ) ; n += valuelen ; gcry_assert ( n == nframe ) ; err = gcry_mpi_scan ( r_result , GCRYMPI_FMT_USG , frame , n , & nframe ) ; if ( err ) rc = gcry_err_code ( err ) ; else if ( DBG_CIPHER ) log_mpidump ( "PKCS#1 block type 1 encoded data" , * r_result ) ; gcry_free ( frame ) ; return rc ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int parse_CCategorizationSpec ( tvbuff_t * tvb , int offset , proto_tree * parent_tree , proto_tree * pad_tree , const char * fmt , ... ) { proto_item * item ; proto_tree * tree ; const char * txt ; va_list ap ; va_start ( ap , fmt ) ; txt = wmem_strdup_vprintf ( wmem_packet_scope ( ) , fmt , ap ) ; va_end ( ap ) ; tree = proto_tree_add_subtree ( parent_tree , tvb , offset , 0 , ett_CCategorizationSpec , & item , txt ) ; offset = parse_CColumnSet ( tvb , offset , tree , "csColumns" ) ; offset = parse_CCategSpec ( tvb , offset , tree , pad_tree , "Spec" ) ; offset = parse_CAggregSet ( tvb , offset , tree , pad_tree , "AggregSet" ) ; offset = parse_CSortAggregSet ( tvb , offset , tree , pad_tree , "SortAggregSet" ) ; offset = parse_CInGroupSortAggregSets ( tvb , offset , tree , pad_tree , "InGroupSortAggregSets" ) ; proto_tree_add_item ( tree , hf_mswsp_categorizationspec_cmaxres , tvb , offset , 4 , ENC_LITTLE_ENDIAN ) ; offset += 4 ; proto_item_set_end ( item , tvb , offset ) ; return offset ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_shm_alloc_security ( struct shmid_kernel * shp ) { struct ipc_security_struct * isec ; struct common_audit_data ad ; u32 sid = current_sid ( ) ; int rc ; rc = ipc_alloc_security ( current , & shp -> shm_perm , SECCLASS_SHM ) ; if ( rc ) return rc ; isec = shp -> shm_perm . security ; ad . type = LSM_AUDIT_DATA_IPC ; ad . u . ipc_id = shp -> shm_perm . key ; rc = avc_has_perm ( sid , isec -> sid , SECCLASS_SHM , SHM__CREATE , & ad ) ; if ( rc ) { ipc_free_security ( & shp -> shm_perm ) ; return rc ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_T_responseCode ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h245_T_responseCode , T_responseCode_choice , NULL ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static __inline__ unsigned int tipc_zone ( __u32 addr ) { return addr >> TIPC_ZONE_OFFSET ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void CommuteRowCompareExpr ( RowCompareExpr * clause ) { List * newops ; List * temp ; ListCell * l ; if ( ! IsA ( clause , RowCompareExpr ) ) elog ( ERROR , "expected a RowCompareExpr" ) ; newops = NIL ; foreach ( l , clause -> opnos ) { Oid opoid = lfirst_oid ( l ) ; opoid = get_commutator ( opoid ) ; if ( ! OidIsValid ( opoid ) ) elog ( ERROR , "could not find commutator for operator %u" , lfirst_oid ( l ) ) ; newops = lappend_oid ( newops , opoid ) ; } switch ( clause -> rctype ) { case ROWCOMPARE_LT : clause -> rctype = ROWCOMPARE_GT ; break ; case ROWCOMPARE_LE : clause -> rctype = ROWCOMPARE_GE ; break ; case ROWCOMPARE_GE : clause -> rctype = ROWCOMPARE_LE ; break ; case ROWCOMPARE_GT : clause -> rctype = ROWCOMPARE_LT ; break ; default : elog ( ERROR , "unexpected RowCompare type: %d" , ( int ) clause -> rctype ) ; break ; } clause -> opnos = newops ; temp = clause -> largs ; clause -> largs = clause -> rargs ; clause -> rargs = temp ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static bool contain_mutable_functions_walker ( Node * node , void * context ) { if ( node == NULL ) return false ; if ( check_functions_in_node ( node , contain_mutable_functions_checker , context ) ) return true ; if ( IsA ( node , Query ) ) { return query_tree_walker ( ( Query * ) node , contain_mutable_functions_walker , context , 0 ) ; } return expression_tree_walker ( node , contain_mutable_functions_walker , context ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
apr_port_t mgs_hook_default_port ( const request_rec * r ) { mgs_srvconf_rec * sc ; if ( r == NULL ) return 0 ; sc = ( mgs_srvconf_rec * ) ap_get_module_config ( r -> server -> module_config , & gnutls_module ) ; _gnutls_log ( debug_log_fp , "%s: %d\n" , __func__ , __LINE__ ) ; if ( sc -> enabled == GNUTLS_ENABLED_FALSE ) { return 0 ; } return 443 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void test_view ( ) { MYSQL_STMT * stmt ; int rc , i ; MYSQL_BIND my_bind [ 1 ] ; char str_data [ 50 ] ; ulong length = 0L ; long is_null = 0L ; const char * query = "SELECT COUNT(*) FROM v1 WHERE SERVERNAME=?" ; myheader ( "test_view" ) ; rc = mysql_query ( mysql , "DROP TABLE IF EXISTS t1,t2,t3,v1" ) ; myquery ( rc ) ; rc = mysql_query ( mysql , "DROP VIEW IF EXISTS v1,t1,t2,t3" ) ; myquery ( rc ) ; rc = mysql_query ( mysql , "CREATE TABLE t1 (" " SERVERGRP varchar(20) NOT NULL default '', " " DBINSTANCE varchar(20) NOT NULL default '', " " PRIMARY KEY (SERVERGRP)) " " CHARSET=latin1 collate=latin1_bin" ) ; myquery ( rc ) ; rc = mysql_query ( mysql , "CREATE TABLE t2 (" " SERVERNAME varchar(20) NOT NULL, " " SERVERGRP varchar(20) NOT NULL, " " PRIMARY KEY (SERVERNAME)) " " CHARSET=latin1 COLLATE latin1_bin" ) ; myquery ( rc ) ; rc = mysql_query ( mysql , "CREATE TABLE t3 (" " SERVERGRP varchar(20) BINARY NOT NULL, " " TABNAME varchar(30) NOT NULL, MAPSTATE char(1) NOT NULL, " " ACTSTATE char(1) NOT NULL , " " LOCAL_NAME varchar(30) NOT NULL, " " CHG_DATE varchar(8) NOT NULL default '00000000', " " CHG_TIME varchar(6) NOT NULL default '000000', " " MXUSER varchar(12) NOT NULL default '', " " PRIMARY KEY (SERVERGRP, TABNAME, MAPSTATE, ACTSTATE, " " LOCAL_NAME)) CHARSET=latin1 COLLATE latin1_bin" ) ; myquery ( rc ) ; rc = mysql_query ( mysql , "CREATE VIEW v1 AS select sql_no_cache" " T0001.SERVERNAME AS SERVERNAME, T0003.TABNAME AS" " TABNAME,T0003.LOCAL_NAME AS LOCAL_NAME,T0002.DBINSTANCE AS" " DBINSTANCE from t2 T0001 join t1 T0002 join t3 T0003 where" " ((T0002.SERVERGRP = T0001.SERVERGRP) and" " (T0002.SERVERGRP = T0003.SERVERGRP)" " and (T0003.MAPSTATE = _latin1'A') and" " (T0003.ACTSTATE = _latin1' '))" ) ; myquery ( rc ) ; stmt = mysql_stmt_init ( mysql ) ; rc = mysql_stmt_prepare ( stmt , query , strlen ( query ) ) ; check_execute ( stmt , rc ) ; strmov ( str_data , "TEST" ) ; memset ( my_bind , 0 , sizeof ( my_bind ) ) ; my_bind [ 0 ] . buffer_type = MYSQL_TYPE_STRING ; my_bind [ 0 ] . buffer = ( char * ) & str_data ; my_bind [ 0 ] . buffer_length = 50 ; my_bind [ 0 ] . length = & length ; length = 4 ; my_bind [ 0 ] . is_null = ( char * ) & is_null ; rc = mysql_stmt_bind_param ( stmt , my_bind ) ; check_execute ( stmt , rc ) ; for ( i = 0 ; i < 3 ; i ++ ) { rc = mysql_stmt_execute ( stmt ) ; check_execute ( stmt , rc ) ; rc = my_process_stmt_result ( stmt ) ; DIE_UNLESS ( 1 == rc ) ; } mysql_stmt_close ( stmt ) ; rc = mysql_query ( mysql , "DROP TABLE t1,t2,t3" ) ; myquery ( rc ) ; rc = mysql_query ( mysql , "DROP VIEW v1" ) ; myquery ( rc ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( SplFileInfo , getPathInfo ) { spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; zend_class_entry * ce = intern -> info_class ; zend_error_handling error_handling ; zend_replace_error_handling ( EH_THROW , spl_ce_UnexpectedValueException , & error_handling TSRMLS_CC ) ; if ( zend_parse_parameters ( ZEND_NUM_ARGS ( ) TSRMLS_CC , "|C" , & ce ) == SUCCESS ) { int path_len ; char * path = spl_filesystem_object_get_pathname ( intern , & path_len TSRMLS_CC ) ; if ( path ) { char * dpath = estrndup ( path , path_len ) ; path_len = php_dirname ( dpath , path_len ) ; spl_filesystem_object_create_info ( intern , dpath , path_len , 1 , ce , return_value TSRMLS_CC ) ; efree ( dpath ) ; } } zend_restore_error_handling ( & error_handling TSRMLS_CC ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( NewAvatarMenuButtonTest , MAYBE_SignOut ) { if ( ! profiles : : IsMultipleProfilesEnabled ( ) ) return ; CreateTestingProfile ( ) ; ASSERT_NO_FATAL_FAILURE ( StartAvatarMenu ( ) ) ; BrowserList * browser_list = BrowserList : : GetInstance ( chrome : : GetActiveDesktop ( ) ) ; EXPECT_EQ ( 1U , browser_list -> size ( ) ) ; content : : WindowedNotificationObserver window_close_observer ( chrome : : NOTIFICATION_BROWSER_CLOSED , content : : Source < Browser > ( browser ( ) ) ) ; AvatarMenu * menu = ProfileChooserView : : profile_bubble_ -> avatar_menu_ . get ( ) ; const AvatarMenu : : Item & menu_item_before = menu -> GetItemAt ( menu -> GetActiveProfileIndex ( ) ) ; EXPECT_FALSE ( menu_item_before . signin_required ) ; ui : : MouseEvent mouse_ev ( ui : : ET_MOUSE_RELEASED , gfx : : Point ( ) , gfx : : Point ( ) , 0 , 0 ) ; ProfileChooserView : : profile_bubble_ -> ButtonPressed ( ProfileChooserView : : profile_bubble_ -> lock_button_ , mouse_ev ) ; EXPECT_TRUE ( menu -> GetItemAt ( menu -> GetActiveProfileIndex ( ) ) . signin_required ) ; window_close_observer . Wait ( ) ; EXPECT_TRUE ( browser_list -> empty ( ) ) ; if ( ! UserManagerView : : IsShowing ( ) ) base : : MessageLoop : : current ( ) -> RunUntilIdle ( ) ; chrome : : HideUserManager ( ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void cirrus_bitblt_start ( CirrusVGAState * s ) { uint8_t blt_rop ; if ( ! s -> enable_blitter ) { goto bitblt_ignore ; } s -> vga . gr [ 0x31 ] |= CIRRUS_BLT_BUSY ; s -> cirrus_blt_width = ( s -> vga . gr [ 0x20 ] | ( s -> vga . gr [ 0x21 ] << 8 ) ) + 1 ; s -> cirrus_blt_height = ( s -> vga . gr [ 0x22 ] | ( s -> vga . gr [ 0x23 ] << 8 ) ) + 1 ; s -> cirrus_blt_dstpitch = ( s -> vga . gr [ 0x24 ] | ( s -> vga . gr [ 0x25 ] << 8 ) ) ; s -> cirrus_blt_srcpitch = ( s -> vga . gr [ 0x26 ] | ( s -> vga . gr [ 0x27 ] << 8 ) ) ; s -> cirrus_blt_dstaddr = ( s -> vga . gr [ 0x28 ] | ( s -> vga . gr [ 0x29 ] << 8 ) | ( s -> vga . gr [ 0x2a ] << 16 ) ) ; s -> cirrus_blt_srcaddr = ( s -> vga . gr [ 0x2c ] | ( s -> vga . gr [ 0x2d ] << 8 ) | ( s -> vga . gr [ 0x2e ] << 16 ) ) ; s -> cirrus_blt_mode = s -> vga . gr [ 0x30 ] ; s -> cirrus_blt_modeext = s -> vga . gr [ 0x33 ] ; blt_rop = s -> vga . gr [ 0x32 ] ; s -> cirrus_blt_dstaddr &= s -> cirrus_addr_mask ; s -> cirrus_blt_srcaddr &= s -> cirrus_addr_mask ; # ifdef DEBUG_BITBLT printf ( "rop=0x%02x mode=0x%02x modeext=0x%02x w=%d h=%d dpitch=%d spitch=%d daddr=0x%08x saddr=0x%08x writemask=0x%02x\n" , blt_rop , s -> cirrus_blt_mode , s -> cirrus_blt_modeext , s -> cirrus_blt_width , s -> cirrus_blt_height , s -> cirrus_blt_dstpitch , s -> cirrus_blt_srcpitch , s -> cirrus_blt_dstaddr , s -> cirrus_blt_srcaddr , s -> vga . gr [ 0x2f ] ) ; # endif switch ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_PIXELWIDTHMASK ) { case CIRRUS_BLTMODE_PIXELWIDTH8 : s -> cirrus_blt_pixelwidth = 1 ; break ; case CIRRUS_BLTMODE_PIXELWIDTH16 : s -> cirrus_blt_pixelwidth = 2 ; break ; case CIRRUS_BLTMODE_PIXELWIDTH24 : s -> cirrus_blt_pixelwidth = 3 ; break ; case CIRRUS_BLTMODE_PIXELWIDTH32 : s -> cirrus_blt_pixelwidth = 4 ; break ; default : # ifdef DEBUG_BITBLT printf ( "cirrus: bitblt - pixel width is unknown\n" ) ; # endif goto bitblt_ignore ; } s -> cirrus_blt_mode &= ~ CIRRUS_BLTMODE_PIXELWIDTHMASK ; if ( ( s -> cirrus_blt_mode & ( CIRRUS_BLTMODE_MEMSYSSRC | CIRRUS_BLTMODE_MEMSYSDEST ) ) == ( CIRRUS_BLTMODE_MEMSYSSRC | CIRRUS_BLTMODE_MEMSYSDEST ) ) { # ifdef DEBUG_BITBLT printf ( "cirrus: bitblt - memory-to-memory copy is requested\n" ) ; # endif goto bitblt_ignore ; } if ( ( s -> cirrus_blt_modeext & CIRRUS_BLTMODEEXT_SOLIDFILL ) && ( s -> cirrus_blt_mode & ( CIRRUS_BLTMODE_MEMSYSDEST | CIRRUS_BLTMODE_TRANSPARENTCOMP | CIRRUS_BLTMODE_PATTERNCOPY | CIRRUS_BLTMODE_COLOREXPAND ) ) == ( CIRRUS_BLTMODE_PATTERNCOPY | CIRRUS_BLTMODE_COLOREXPAND ) ) { cirrus_bitblt_fgcol ( s ) ; cirrus_bitblt_solidfill ( s , blt_rop ) ; } else { if ( ( s -> cirrus_blt_mode & ( CIRRUS_BLTMODE_COLOREXPAND | CIRRUS_BLTMODE_PATTERNCOPY ) ) == CIRRUS_BLTMODE_COLOREXPAND ) { if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_TRANSPARENTCOMP ) { if ( s -> cirrus_blt_modeext & CIRRUS_BLTMODEEXT_COLOREXPINV ) cirrus_bitblt_bgcol ( s ) ; else cirrus_bitblt_fgcol ( s ) ; s -> cirrus_rop = cirrus_colorexpand_transp [ rop_to_index [ blt_rop ] ] [ s -> cirrus_blt_pixelwidth - 1 ] ; } else { cirrus_bitblt_fgcol ( s ) ; cirrus_bitblt_bgcol ( s ) ; s -> cirrus_rop = cirrus_colorexpand [ rop_to_index [ blt_rop ] ] [ s -> cirrus_blt_pixelwidth - 1 ] ; } } else if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_PATTERNCOPY ) { if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_COLOREXPAND ) { if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_TRANSPARENTCOMP ) { if ( s -> cirrus_blt_modeext & CIRRUS_BLTMODEEXT_COLOREXPINV ) cirrus_bitblt_bgcol ( s ) ; else cirrus_bitblt_fgcol ( s ) ; s -> cirrus_rop = cirrus_colorexpand_pattern_transp [ rop_to_index [ blt_rop ] ] [ s -> cirrus_blt_pixelwidth - 1 ] ; } else { cirrus_bitblt_fgcol ( s ) ; cirrus_bitblt_bgcol ( s ) ; s -> cirrus_rop = cirrus_colorexpand_pattern [ rop_to_index [ blt_rop ] ] [ s -> cirrus_blt_pixelwidth - 1 ] ; } } else { s -> cirrus_rop = cirrus_patternfill [ rop_to_index [ blt_rop ] ] [ s -> cirrus_blt_pixelwidth - 1 ] ; } } else { if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_TRANSPARENTCOMP ) { if ( s -> cirrus_blt_pixelwidth > 2 ) { printf ( "src transparent without colorexpand must be 8bpp or 16bpp\n" ) ; goto bitblt_ignore ; } if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_BACKWARDS ) { s -> cirrus_blt_dstpitch = - s -> cirrus_blt_dstpitch ; s -> cirrus_blt_srcpitch = - s -> cirrus_blt_srcpitch ; s -> cirrus_rop = cirrus_bkwd_transp_rop [ rop_to_index [ blt_rop ] ] [ s -> cirrus_blt_pixelwidth - 1 ] ; } else { s -> cirrus_rop = cirrus_fwd_transp_rop [ rop_to_index [ blt_rop ] ] [ s -> cirrus_blt_pixelwidth - 1 ] ; } } else { if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_BACKWARDS ) { s -> cirrus_blt_dstpitch = - s -> cirrus_blt_dstpitch ; s -> cirrus_blt_srcpitch = - s -> cirrus_blt_srcpitch ; s -> cirrus_rop = cirrus_bkwd_rop [ rop_to_index [ blt_rop ] ] ; } else { s -> cirrus_rop = cirrus_fwd_rop [ rop_to_index [ blt_rop ] ] ; } } } if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_MEMSYSSRC ) { if ( ! cirrus_bitblt_cputovideo ( s ) ) goto bitblt_ignore ; } else if ( s -> cirrus_blt_mode & CIRRUS_BLTMODE_MEMSYSDEST ) { if ( ! cirrus_bitblt_videotocpu ( s ) ) goto bitblt_ignore ; } else { if ( ! cirrus_bitblt_videotovideo ( s ) ) goto bitblt_ignore ; } } return ; bitblt_ignore : ; cirrus_bitblt_reset ( s ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
uint32_t mime_field_value_get_uint ( const MIMEField * field ) { int length ; const char * str = mime_field_value_get ( field , & length ) ; return mime_parse_uint ( str , str + length ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_socket_accept ( struct socket * sock , struct socket * newsock ) { int err ; struct inode_security_struct * isec ; struct inode_security_struct * newisec ; u16 sclass ; u32 sid ; err = sock_has_perm ( current , sock -> sk , SOCKET__ACCEPT ) ; if ( err ) return err ; isec = inode_security_novalidate ( SOCK_INODE ( sock ) ) ; spin_lock ( & isec -> lock ) ; sclass = isec -> sclass ; sid = isec -> sid ; spin_unlock ( & isec -> lock ) ; newisec = inode_security_novalidate ( SOCK_INODE ( newsock ) ) ; newisec -> sclass = sclass ; newisec -> sid = sid ; newisec -> initialized = LABEL_INITIALIZED ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_t38_UDPTLPacket ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { # line 232 "../../asn1/t38/t38.cnf" Data_Field_field_type_value = 1 ; offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_t38_UDPTLPacket , UDPTLPacket_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_tun_dev_create ( void ) { u32 sid = current_sid ( ) ; return avc_has_perm ( sid , sid , SECCLASS_TUN_SOCKET , TUN_SOCKET__CREATE , NULL ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int tcomp ( const void * _t1 , const void * _t2 ) { struct taboff * t1 = * ( ( struct taboff * * ) _t1 ) , * t2 = * ( ( struct taboff * * ) _t2 ) ; return ( t1 -> orderingval - t2 -> orderingval ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_Endpoint ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_Endpoint , Endpoint_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void TSSkipRemappingSet ( TSHttpTxn txnp , int flag ) { sdk_assert ( sdk_sanity_check_txn ( txnp ) == TS_SUCCESS ) ; HttpSM * sm = ( HttpSM * ) txnp ; sm -> t_state . api_skip_all_remapping = ( flag != 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static char * alloc_query_str ( ulong size ) { char * query ; if ( ! ( query = ( char * ) my_malloc ( size , MYF ( MY_WME ) ) ) ) die ( EX_MYSQLERR , "Couldn't allocate a query string." ) ; return query ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
enum block_op find_operand ( const char * start ) { char first = * start ; char next = * ( start + 1 ) ; if ( first == '=' && next == '=' ) return EQ_OP ; if ( first == '!' && next == '=' ) return NE_OP ; if ( first == '>' && next == '=' ) return GE_OP ; if ( first == '>' ) return GT_OP ; if ( first == '<' && next == '=' ) return LE_OP ; if ( first == '<' ) return LT_OP ; return ILLEG_OP ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void convolve_avg_horiz ( const uint8_t * src , ptrdiff_t src_stride , uint8_t * dst , ptrdiff_t dst_stride , const InterpKernel * x_filters , int x0_q4 , int x_step_q4 , int w , int h ) { int x , y ; src -= SUBPEL_TAPS / 2 - 1 ; for ( y = 0 ; y < h ; ++ y ) { int x_q4 = x0_q4 ; for ( x = 0 ; x < w ; ++ x ) { const uint8_t * const src_x = & src [ x_q4 >> SUBPEL_BITS ] ; const int16_t * const x_filter = x_filters [ x_q4 & SUBPEL_MASK ] ; int k , sum = 0 ; for ( k = 0 ; k < SUBPEL_TAPS ; ++ k ) sum += src_x [ k ] * x_filter [ k ] ; dst [ x ] = ROUND_POWER_OF_TWO ( dst [ x ] + clip_pixel ( ROUND_POWER_OF_TWO ( sum , FILTER_BITS ) ) , 1 ) ; x_q4 += x_step_q4 ; } src += src_stride ; dst += dst_stride ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_SEQUENCE_OF_DisplayName ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence_of ( tvb , offset , actx , tree , hf_index , ett_h225_SEQUENCE_OF_DisplayName , SEQUENCE_OF_DisplayName_sequence_of ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_SET_SIZE_1_14_OF_BEnhancementParameters ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_constrained_set_of ( tvb , offset , actx , tree , hf_index , ett_h245_SET_SIZE_1_14_OF_BEnhancementParameters , SET_SIZE_1_14_OF_BEnhancementParameters_set_of , 1 , 14 , FALSE ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int proc_releaseinterface ( struct usb_dev_state * ps , void __user * arg ) { unsigned int ifnum ; int ret ; if ( get_user ( ifnum , ( unsigned int __user * ) arg ) ) return - EFAULT ; ret = releaseintf ( ps , ifnum ) ; if ( ret < 0 ) return ret ; destroy_async_on_interface ( ps , ifnum ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static afs_int32 isAMemberOf ( struct rx_call * call , afs_int32 uid , afs_int32 gid , afs_int32 * flag , afs_int32 * cid ) { afs_int32 code ; struct ubik_trans * tt ; code = Initdb ( ) ; if ( code != PRSUCCESS ) return code ; code = ubik_BeginTransReadAny ( dbase , UBIK_READTRANS , & tt ) ; if ( code ) return code ; code = ubik_SetLock ( tt , 1 , 1 , LOCKREAD ) ; if ( code ) ABORT_WITH ( tt , code ) ; code = read_DbHeader ( tt ) ; if ( code ) ABORT_WITH ( tt , code ) ; { afs_int32 uloc = FindByID ( tt , uid ) ; afs_int32 gloc = FindByID ( tt , gid ) ; struct prentry uentry , gentry ; if ( ! uloc || ! gloc ) ABORT_WITH ( tt , PRNOENT ) ; code = WhoIsThis ( call , tt , cid ) ; if ( code ) ABORT_WITH ( tt , PRPERM ) ; code = pr_ReadEntry ( tt , 0 , uloc , & uentry ) ; if ( code ) ABORT_WITH ( tt , code ) ; code = pr_ReadEntry ( tt , 0 , gloc , & gentry ) ; if ( code ) ABORT_WITH ( tt , code ) ; # if ! defined ( SUPERGROUPS ) if ( ( uentry . flags & PRGRP ) || ! ( gentry . flags & PRGRP ) ) ABORT_WITH ( tt , PRBADARG ) ; # else if ( ! ( gentry . flags & PRGRP ) ) ABORT_WITH ( tt , PRBADARG ) ; # endif if ( ! AccessOK ( tt , * cid , & uentry , 0 , PRP_MEMBER_ANY ) && ! AccessOK ( tt , * cid , & gentry , PRP_MEMBER_MEM , PRP_MEMBER_ANY ) ) ABORT_WITH ( tt , PRPERM ) ; } * flag = IsAMemberOf ( tt , uid , gid ) ; code = ubik_EndTrans ( tt ) ; return code ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int rfc2231_parse ( struct rfc822_parser_context * ctx , const char * const * * result_r ) { ARRAY_TYPE ( const_string ) result ; ARRAY ( struct rfc2231_parameter ) rfc2231_params_arr ; struct rfc2231_parameter rfc2231_param ; const struct rfc2231_parameter * rfc2231_params ; const char * key , * value , * p , * p2 ; string_t * str ; unsigned int i , j , count , next , next_idx ; bool ok , have_extended , broken = FALSE ; int ret ; i_zero ( & rfc2231_param ) ; t_array_init ( & result , 8 ) ; t_array_init ( & rfc2231_params_arr , 8 ) ; while ( ( ret = rfc822_parse_content_param ( ctx , & key , & value ) ) != 0 ) { if ( ret < 0 ) { broken = TRUE ; if ( ctx -> data >= ctx -> end ) break ; ctx -> data ++ ; continue ; } p = strchr ( key , '*' ) ; if ( p != NULL ) { p2 = p ; if ( p [ 1 ] != '\0' ) { p ++ ; rfc2231_param . idx = 0 ; for ( ; * p >= '0' && * p <= '9' ; p ++ ) { rfc2231_param . idx = rfc2231_param . idx * 10 + * p - '0' ; } } if ( * p != '*' ) rfc2231_param . extended = FALSE ; else { rfc2231_param . extended = TRUE ; p ++ ; } if ( * p != '\0' ) p = NULL ; else { rfc2231_param . key = t_strdup_until ( key , p2 ) ; rfc2231_param . value = value ; array_append ( & rfc2231_params_arr , & rfc2231_param , 1 ) ; } } if ( p == NULL ) { array_append ( & result , & key , 1 ) ; array_append ( & result , & value , 1 ) ; } } if ( array_count ( & rfc2231_params_arr ) == 0 ) { array_append_zero ( & result ) ; * result_r = array_idx ( & result , 0 ) ; return broken ? - 1 : 0 ; } array_sort ( & rfc2231_params_arr , rfc2231_parameter_cmp ) ; rfc2231_params = array_get ( & rfc2231_params_arr , & count ) ; str = t_str_new ( 64 ) ; for ( i = 0 ; i < count ; i = next ) { ok = TRUE ; have_extended = FALSE ; next_idx = 0 ; for ( j = i ; j < count ; j ++ ) { if ( strcasecmp ( rfc2231_params [ i ] . key , rfc2231_params [ j ] . key ) != 0 ) break ; if ( rfc2231_params [ j ] . idx != next_idx ) { ok = FALSE ; } if ( rfc2231_params [ j ] . extended ) have_extended = TRUE ; next_idx ++ ; } next = j ; if ( ! ok ) { for ( j = i ; j < next ; j ++ ) { key = t_strdup_printf ( rfc2231_params [ j ] . extended ? "%s*%u*" : "%s*%u" , rfc2231_params [ j ] . key , rfc2231_params [ j ] . idx ) ; array_append ( & result , & key , 1 ) ; array_append ( & result , & rfc2231_params [ j ] . value , 1 ) ; } } else { str_truncate ( str , 0 ) ; if ( ! rfc2231_params [ i ] . extended && have_extended ) str_append ( str , "''" ) ; for ( j = i ; j < next ; j ++ ) { if ( ! rfc2231_params [ j ] . extended && have_extended ) { rfc2231_escape ( str , rfc2231_params [ j ] . value ) ; } else { str_append ( str , rfc2231_params [ j ] . value ) ; } } key = rfc2231_params [ i ] . key ; if ( have_extended ) key = t_strconcat ( key , "*" , NULL ) ; value = t_strdup ( str_c ( str ) ) ; array_append ( & result , & key , 1 ) ; array_append ( & result , & value , 1 ) ; } } array_append_zero ( & result ) ; * result_r = array_idx ( & result , 0 ) ; return broken ? - 1 : 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h225_ResourcesAvailableIndicate ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_ResourcesAvailableIndicate , ResourcesAvailableIndicate_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static cmsBool Type_ColorantOrderType_Write ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , void * Ptr , cmsUInt32Number nItems ) { cmsUInt8Number * ColorantOrder = ( cmsUInt8Number * ) Ptr ; cmsUInt32Number i , sz , Count ; for ( Count = i = 0 ; i < cmsMAXCHANNELS ; i ++ ) { if ( ColorantOrder [ i ] != 0xFF ) Count ++ ; } if ( ! _cmsWriteUInt32Number ( io , Count ) ) return FALSE ; sz = Count * sizeof ( cmsUInt8Number ) ; if ( ! io -> Write ( io , sz , ColorantOrder ) ) return FALSE ; return TRUE ; cmsUNUSED_PARAMETER ( nItems ) ; cmsUNUSED_PARAMETER ( self ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int dissect_ber_constrained_integer64 ( gboolean implicit_tag , asn1_ctx_t * actx , proto_tree * tree , tvbuff_t * tvb , int offset , gint64 min_len , gint64 max_len , gint hf_id , gint64 * value ) { gint64 val ; offset = dissect_ber_integer64 ( implicit_tag , actx , tree , tvb , offset , hf_id , & val ) ; if ( value ) { * value = val ; } ber_check_value64 ( val , min_len , max_len , actx , actx -> created_item ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int avi_read_header ( AVFormatContext * s ) { AVIContext * avi = s -> priv_data ; AVIOContext * pb = s -> pb ; unsigned int tag , tag1 , handler ; int codec_type , stream_index , frame_period ; unsigned int size ; int i ; AVStream * st ; AVIStream * ast = NULL ; int avih_width = 0 , avih_height = 0 ; int amv_file_format = 0 ; uint64_t list_end = 0 ; int64_t pos ; int ret ; AVDictionaryEntry * dict_entry ; avi -> stream_index = - 1 ; ret = get_riff ( s , pb ) ; if ( ret < 0 ) return ret ; av_log ( avi , AV_LOG_DEBUG , "use odml:%d\n" , avi -> use_odml ) ; avi -> io_fsize = avi -> fsize = avio_size ( pb ) ; if ( avi -> fsize <= 0 || avi -> fsize < avi -> riff_end ) avi -> fsize = avi -> riff_end == 8 ? INT64_MAX : avi -> riff_end ; stream_index = - 1 ; codec_type = - 1 ; frame_period = 0 ; for ( ; ; ) { if ( avio_feof ( pb ) ) goto fail ; tag = avio_rl32 ( pb ) ; size = avio_rl32 ( pb ) ; print_tag ( "tag" , tag , size ) ; switch ( tag ) { case MKTAG ( 'L' , 'I' , 'S' , 'T' ) : list_end = avio_tell ( pb ) + size ; tag1 = avio_rl32 ( pb ) ; print_tag ( "list" , tag1 , 0 ) ; if ( tag1 == MKTAG ( 'm' , 'o' , 'v' , 'i' ) ) { avi -> movi_list = avio_tell ( pb ) - 4 ; if ( size ) avi -> movi_end = avi -> movi_list + size + ( size & 1 ) ; else avi -> movi_end = avi -> fsize ; av_log ( NULL , AV_LOG_TRACE , "movi end=%" PRIx64 "\n" , avi -> movi_end ) ; goto end_of_header ; } else if ( tag1 == MKTAG ( 'I' , 'N' , 'F' , 'O' ) ) ff_read_riff_info ( s , size - 4 ) ; else if ( tag1 == MKTAG ( 'n' , 'c' , 'd' , 't' ) ) avi_read_nikon ( s , list_end ) ; break ; case MKTAG ( 'I' , 'D' , 'I' , 'T' ) : { unsigned char date [ 64 ] = { 0 } ; size += ( size & 1 ) ; size -= avio_read ( pb , date , FFMIN ( size , sizeof ( date ) - 1 ) ) ; avio_skip ( pb , size ) ; avi_metadata_creation_time ( & s -> metadata , date ) ; break ; } case MKTAG ( 'd' , 'm' , 'l' , 'h' ) : avi -> is_odml = 1 ; avio_skip ( pb , size + ( size & 1 ) ) ; break ; case MKTAG ( 'a' , 'm' , 'v' , 'h' ) : amv_file_format = 1 ; case MKTAG ( 'a' , 'v' , 'i' , 'h' ) : frame_period = avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; avi -> non_interleaved |= avio_rl32 ( pb ) & AVIF_MUSTUSEINDEX ; avio_skip ( pb , 2 * 4 ) ; avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; avih_width = avio_rl32 ( pb ) ; avih_height = avio_rl32 ( pb ) ; avio_skip ( pb , size - 10 * 4 ) ; break ; case MKTAG ( 's' , 't' , 'r' , 'h' ) : tag1 = avio_rl32 ( pb ) ; handler = avio_rl32 ( pb ) ; if ( tag1 == MKTAG ( 'p' , 'a' , 'd' , 's' ) ) { avio_skip ( pb , size - 8 ) ; break ; } else { stream_index ++ ; st = avformat_new_stream ( s , NULL ) ; if ( ! st ) goto fail ; st -> id = stream_index ; ast = av_mallocz ( sizeof ( AVIStream ) ) ; if ( ! ast ) goto fail ; st -> priv_data = ast ; } if ( amv_file_format ) tag1 = stream_index ? MKTAG ( 'a' , 'u' , 'd' , 's' ) : MKTAG ( 'v' , 'i' , 'd' , 's' ) ; print_tag ( "strh" , tag1 , - 1 ) ; if ( tag1 == MKTAG ( 'i' , 'a' , 'v' , 's' ) || tag1 == MKTAG ( 'i' , 'v' , 'a' , 's' ) ) { int64_t dv_dur ; if ( s -> nb_streams != 1 ) goto fail ; if ( handler != MKTAG ( 'd' , 'v' , 's' , 'd' ) && handler != MKTAG ( 'd' , 'v' , 'h' , 'd' ) && handler != MKTAG ( 'd' , 'v' , 's' , 'l' ) ) goto fail ; ast = s -> streams [ 0 ] -> priv_data ; av_freep ( & s -> streams [ 0 ] -> codecpar -> extradata ) ; av_freep ( & s -> streams [ 0 ] -> codecpar ) ; # if FF_API_LAVF_AVCTX FF_DISABLE_DEPRECATION_WARNINGS av_freep ( & s -> streams [ 0 ] -> codec ) ; FF_ENABLE_DEPRECATION_WARNINGS # endif if ( s -> streams [ 0 ] -> info ) av_freep ( & s -> streams [ 0 ] -> info -> duration_error ) ; av_freep ( & s -> streams [ 0 ] -> info ) ; if ( s -> streams [ 0 ] -> internal ) av_freep ( & s -> streams [ 0 ] -> internal -> avctx ) ; av_freep ( & s -> streams [ 0 ] -> internal ) ; av_freep ( & s -> streams [ 0 ] ) ; s -> nb_streams = 0 ; if ( CONFIG_DV_DEMUXER ) { avi -> dv_demux = avpriv_dv_init_demux ( s ) ; if ( ! avi -> dv_demux ) goto fail ; } else goto fail ; s -> streams [ 0 ] -> priv_data = ast ; avio_skip ( pb , 3 * 4 ) ; ast -> scale = avio_rl32 ( pb ) ; ast -> rate = avio_rl32 ( pb ) ; avio_skip ( pb , 4 ) ; dv_dur = avio_rl32 ( pb ) ; if ( ast -> scale > 0 && ast -> rate > 0 && dv_dur > 0 ) { dv_dur *= AV_TIME_BASE ; s -> duration = av_rescale ( dv_dur , ast -> scale , ast -> rate ) ; } stream_index = s -> nb_streams - 1 ; avio_skip ( pb , size - 9 * 4 ) ; break ; } av_assert0 ( stream_index < s -> nb_streams ) ; ast -> handler = handler ; avio_rl32 ( pb ) ; avio_rl16 ( pb ) ; avio_rl16 ( pb ) ; avio_rl32 ( pb ) ; ast -> scale = avio_rl32 ( pb ) ; ast -> rate = avio_rl32 ( pb ) ; if ( ! ( ast -> scale && ast -> rate ) ) { av_log ( s , AV_LOG_WARNING , "scale/rate is %" PRIu32 "/%" PRIu32 " which is invalid. " "(This file has been generated by broken software.)\n" , ast -> scale , ast -> rate ) ; if ( frame_period ) { ast -> rate = 1000000 ; ast -> scale = frame_period ; } else { ast -> rate = 25 ; ast -> scale = 1 ; } } avpriv_set_pts_info ( st , 64 , ast -> scale , ast -> rate ) ; ast -> cum_len = avio_rl32 ( pb ) ; st -> nb_frames = avio_rl32 ( pb ) ; st -> start_time = 0 ; avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; if ( ast -> cum_len * ast -> scale / ast -> rate > 3600 ) { av_log ( s , AV_LOG_ERROR , "crazy start time, iam scared, giving up\n" ) ; ast -> cum_len = 0 ; } ast -> sample_size = avio_rl32 ( pb ) ; ast -> cum_len *= FFMAX ( 1 , ast -> sample_size ) ; av_log ( s , AV_LOG_TRACE , "%" PRIu32 " %" PRIu32 " %d\n" , ast -> rate , ast -> scale , ast -> sample_size ) ; switch ( tag1 ) { case MKTAG ( 'v' , 'i' , 'd' , 's' ) : codec_type = AVMEDIA_TYPE_VIDEO ; ast -> sample_size = 0 ; st -> avg_frame_rate = av_inv_q ( st -> time_base ) ; break ; case MKTAG ( 'a' , 'u' , 'd' , 's' ) : codec_type = AVMEDIA_TYPE_AUDIO ; break ; case MKTAG ( 't' , 'x' , 't' , 's' ) : codec_type = AVMEDIA_TYPE_SUBTITLE ; break ; case MKTAG ( 'd' , 'a' , 't' , 's' ) : codec_type = AVMEDIA_TYPE_DATA ; break ; default : av_log ( s , AV_LOG_INFO , "unknown stream type %X\n" , tag1 ) ; } if ( ast -> sample_size < 0 ) { if ( s -> error_recognition & AV_EF_EXPLODE ) { av_log ( s , AV_LOG_ERROR , "Invalid sample_size %d at stream %d\n" , ast -> sample_size , stream_index ) ; goto fail ; } av_log ( s , AV_LOG_WARNING , "Invalid sample_size %d at stream %d " "setting it to 0\n" , ast -> sample_size , stream_index ) ; ast -> sample_size = 0 ; } if ( ast -> sample_size == 0 ) { st -> duration = st -> nb_frames ; if ( st -> duration > 0 && avi -> io_fsize > 0 && avi -> riff_end > avi -> io_fsize ) { av_log ( s , AV_LOG_DEBUG , "File is truncated adjusting duration\n" ) ; st -> duration = av_rescale ( st -> duration , avi -> io_fsize , avi -> riff_end ) ; } } ast -> frame_offset = ast -> cum_len ; avio_skip ( pb , size - 12 * 4 ) ; break ; case MKTAG ( 's' , 't' , 'r' , 'f' ) : if ( ! size && ( codec_type == AVMEDIA_TYPE_AUDIO || codec_type == AVMEDIA_TYPE_VIDEO ) ) break ; if ( stream_index >= ( unsigned ) s -> nb_streams || avi -> dv_demux ) { avio_skip ( pb , size ) ; } else { uint64_t cur_pos = avio_tell ( pb ) ; unsigned esize ; if ( cur_pos < list_end ) size = FFMIN ( size , list_end - cur_pos ) ; st = s -> streams [ stream_index ] ; if ( st -> codecpar -> codec_type != AVMEDIA_TYPE_UNKNOWN ) { avio_skip ( pb , size ) ; break ; } switch ( codec_type ) { case AVMEDIA_TYPE_VIDEO : if ( amv_file_format ) { st -> codecpar -> width = avih_width ; st -> codecpar -> height = avih_height ; st -> codecpar -> codec_type = AVMEDIA_TYPE_VIDEO ; st -> codecpar -> codec_id = AV_CODEC_ID_AMV ; avio_skip ( pb , size ) ; break ; } tag1 = ff_get_bmp_header ( pb , st , & esize ) ; if ( tag1 == MKTAG ( 'D' , 'X' , 'S' , 'B' ) || tag1 == MKTAG ( 'D' , 'X' , 'S' , 'A' ) ) { st -> codecpar -> codec_type = AVMEDIA_TYPE_SUBTITLE ; st -> codecpar -> codec_tag = tag1 ; st -> codecpar -> codec_id = AV_CODEC_ID_XSUB ; break ; } if ( size > 10 * 4 && size < ( 1 << 30 ) && size < avi -> fsize ) { if ( esize == size - 1 && ( esize & 1 ) ) { st -> codecpar -> extradata_size = esize - 10 * 4 ; } else st -> codecpar -> extradata_size = size - 10 * 4 ; if ( st -> codecpar -> extradata ) { av_log ( s , AV_LOG_WARNING , "New extradata in strf chunk, freeing previous one.\n" ) ; av_freep ( & st -> codecpar -> extradata ) ; } if ( ff_get_extradata ( s , st -> codecpar , pb , st -> codecpar -> extradata_size ) < 0 ) return AVERROR ( ENOMEM ) ; } if ( st -> codecpar -> extradata_size & 1 ) avio_r8 ( pb ) ; if ( st -> codecpar -> extradata_size && ( st -> codecpar -> bits_per_coded_sample <= 8 ) ) { int pal_size = ( 1 << st -> codecpar -> bits_per_coded_sample ) << 2 ; const uint8_t * pal_src ; pal_size = FFMIN ( pal_size , st -> codecpar -> extradata_size ) ; pal_src = st -> codecpar -> extradata + st -> codecpar -> extradata_size - pal_size ; if ( pal_src - st -> codecpar -> extradata >= 9 && ! memcmp ( st -> codecpar -> extradata + st -> codecpar -> extradata_size - 9 , "BottomUp" , 9 ) ) pal_src -= 9 ; for ( i = 0 ; i < pal_size / 4 ; i ++ ) ast -> pal [ i ] = 0xFFU << 24 | AV_RL32 ( pal_src + 4 * i ) ; ast -> has_pal = 1 ; } print_tag ( "video" , tag1 , 0 ) ; st -> codecpar -> codec_type = AVMEDIA_TYPE_VIDEO ; st -> codecpar -> codec_tag = tag1 ; st -> codecpar -> codec_id = ff_codec_get_id ( ff_codec_bmp_tags , tag1 ) ; if ( ! st -> codecpar -> codec_id ) { st -> codecpar -> codec_id = ff_codec_get_id ( ff_codec_movvideo_tags , tag1 ) ; if ( st -> codecpar -> codec_id ) av_log ( s , AV_LOG_WARNING , "mov tag found in avi (fourcc %s)\n" , av_fourcc2str ( tag1 ) ) ; } st -> need_parsing = AVSTREAM_PARSE_HEADERS ; if ( st -> codecpar -> codec_id == AV_CODEC_ID_MPEG4 && ast -> handler == MKTAG ( 'X' , 'V' , 'I' , 'D' ) ) st -> codecpar -> codec_tag = MKTAG ( 'X' , 'V' , 'I' , 'D' ) ; if ( st -> codecpar -> codec_tag == MKTAG ( 'V' , 'S' , 'S' , 'H' ) ) st -> need_parsing = AVSTREAM_PARSE_FULL ; if ( st -> codecpar -> codec_id == AV_CODEC_ID_RV40 ) st -> need_parsing = AVSTREAM_PARSE_NONE ; if ( st -> codecpar -> codec_tag == 0 && st -> codecpar -> height > 0 && st -> codecpar -> extradata_size < 1U << 30 ) { st -> codecpar -> extradata_size += 9 ; if ( ( ret = av_reallocp ( & st -> codecpar -> extradata , st -> codecpar -> extradata_size + AV_INPUT_BUFFER_PADDING_SIZE ) ) < 0 ) { st -> codecpar -> extradata_size = 0 ; return ret ; } else memcpy ( st -> codecpar -> extradata + st -> codecpar -> extradata_size - 9 , "BottomUp" , 9 ) ; } st -> codecpar -> height = FFABS ( st -> codecpar -> height ) ; break ; case AVMEDIA_TYPE_AUDIO : ret = ff_get_wav_header ( s , pb , st -> codecpar , size , 0 ) ; if ( ret < 0 ) return ret ; ast -> dshow_block_align = st -> codecpar -> block_align ; if ( ast -> sample_size && st -> codecpar -> block_align && ast -> sample_size != st -> codecpar -> block_align ) { av_log ( s , AV_LOG_WARNING , "sample size (%d) != block align (%d)\n" , ast -> sample_size , st -> codecpar -> block_align ) ; ast -> sample_size = st -> codecpar -> block_align ; } if ( size & 1 ) avio_skip ( pb , 1 ) ; st -> need_parsing = AVSTREAM_PARSE_TIMESTAMPS ; if ( st -> codecpar -> codec_id == AV_CODEC_ID_AAC && st -> codecpar -> extradata_size ) st -> need_parsing = AVSTREAM_PARSE_NONE ; if ( st -> codecpar -> codec_id == AV_CODEC_ID_FLAC ) st -> need_parsing = AVSTREAM_PARSE_NONE ; if ( ast -> handler == AV_RL32 ( "Axan" ) ) { st -> codecpar -> codec_id = AV_CODEC_ID_XAN_DPCM ; st -> codecpar -> codec_tag = 0 ; ast -> dshow_block_align = 0 ; } if ( amv_file_format ) { st -> codecpar -> codec_id = AV_CODEC_ID_ADPCM_IMA_AMV ; ast -> dshow_block_align = 0 ; } if ( ( st -> codecpar -> codec_id == AV_CODEC_ID_AAC || st -> codecpar -> codec_id == AV_CODEC_ID_FLAC || st -> codecpar -> codec_id == AV_CODEC_ID_MP2 ) && ast -> dshow_block_align <= 4 && ast -> dshow_block_align ) { av_log ( s , AV_LOG_DEBUG , "overriding invalid dshow_block_align of %d\n" , ast -> dshow_block_align ) ; ast -> dshow_block_align = 0 ; } if ( st -> codecpar -> codec_id == AV_CODEC_ID_AAC && ast -> dshow_block_align == 1024 && ast -> sample_size == 1024 || st -> codecpar -> codec_id == AV_CODEC_ID_AAC && ast -> dshow_block_align == 4096 && ast -> sample_size == 4096 || st -> codecpar -> codec_id == AV_CODEC_ID_MP3 && ast -> dshow_block_align == 1152 && ast -> sample_size == 1152 ) { av_log ( s , AV_LOG_DEBUG , "overriding sample_size\n" ) ; ast -> sample_size = 0 ; } break ; case AVMEDIA_TYPE_SUBTITLE : st -> codecpar -> codec_type = AVMEDIA_TYPE_SUBTITLE ; st -> request_probe = 1 ; avio_skip ( pb , size ) ; break ; default : st -> codecpar -> codec_type = AVMEDIA_TYPE_DATA ; st -> codecpar -> codec_id = AV_CODEC_ID_NONE ; st -> codecpar -> codec_tag = 0 ; avio_skip ( pb , size ) ; break ; } } break ; case MKTAG ( 's' , 't' , 'r' , 'd' ) : if ( stream_index >= ( unsigned ) s -> nb_streams || s -> streams [ stream_index ] -> codecpar -> extradata_size || s -> streams [ stream_index ] -> codecpar -> codec_tag == MKTAG ( 'H' , '2' , '6' , '4' ) ) { avio_skip ( pb , size ) ; } else { uint64_t cur_pos = avio_tell ( pb ) ; if ( cur_pos < list_end ) size = FFMIN ( size , list_end - cur_pos ) ; st = s -> streams [ stream_index ] ; if ( size < ( 1 << 30 ) ) { if ( st -> codecpar -> extradata ) { av_log ( s , AV_LOG_WARNING , "New extradata in strd chunk, freeing previous one.\n" ) ; av_freep ( & st -> codecpar -> extradata ) ; } if ( ff_get_extradata ( s , st -> codecpar , pb , size ) < 0 ) return AVERROR ( ENOMEM ) ; } if ( st -> codecpar -> extradata_size & 1 ) avio_r8 ( pb ) ; ret = avi_extract_stream_metadata ( s , st ) ; if ( ret < 0 ) { av_log ( s , AV_LOG_WARNING , "could not decoding EXIF data in stream header.\n" ) ; } } break ; case MKTAG ( 'i' , 'n' , 'd' , 'x' ) : pos = avio_tell ( pb ) ; if ( ( pb -> seekable & AVIO_SEEKABLE_NORMAL ) && ! ( s -> flags & AVFMT_FLAG_IGNIDX ) && avi -> use_odml && read_odml_index ( s , 0 ) < 0 && ( s -> error_recognition & AV_EF_EXPLODE ) ) goto fail ; avio_seek ( pb , pos + size , SEEK_SET ) ; break ; case MKTAG ( 'v' , 'p' , 'r' , 'p' ) : if ( stream_index < ( unsigned ) s -> nb_streams && size > 9 * 4 ) { AVRational active , active_aspect ; st = s -> streams [ stream_index ] ; avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; active_aspect . den = avio_rl16 ( pb ) ; active_aspect . num = avio_rl16 ( pb ) ; active . num = avio_rl32 ( pb ) ; active . den = avio_rl32 ( pb ) ; avio_rl32 ( pb ) ; if ( active_aspect . num && active_aspect . den && active . num && active . den ) { st -> sample_aspect_ratio = av_div_q ( active_aspect , active ) ; av_log ( s , AV_LOG_TRACE , "vprp %d/%d %d/%d\n" , active_aspect . num , active_aspect . den , active . num , active . den ) ; } size -= 9 * 4 ; } avio_skip ( pb , size ) ; break ; case MKTAG ( 's' , 't' , 'r' , 'n' ) : if ( s -> nb_streams ) { ret = avi_read_tag ( s , s -> streams [ s -> nb_streams - 1 ] , tag , size ) ; if ( ret < 0 ) return ret ; break ; } default : if ( size > 1000000 ) { av_log ( s , AV_LOG_ERROR , "Something went wrong during header parsing, " "tag %s has size %u, " "I will ignore it and try to continue anyway.\n" , av_fourcc2str ( tag ) , size ) ; if ( s -> error_recognition & AV_EF_EXPLODE ) goto fail ; avi -> movi_list = avio_tell ( pb ) - 4 ; avi -> movi_end = avi -> fsize ; goto end_of_header ; } case MKTAG ( 'i' , 'd' , 'x' , '1' ) : size += ( size & 1 ) ; avio_skip ( pb , size ) ; break ; } } end_of_header : if ( stream_index != s -> nb_streams - 1 ) { fail : return AVERROR_INVALIDDATA ; } if ( ! avi -> index_loaded && ( pb -> seekable & AVIO_SEEKABLE_NORMAL ) ) avi_load_index ( s ) ; calculate_bitrate ( s ) ; avi -> index_loaded |= 1 ; if ( ( ret = guess_ni_flag ( s ) ) < 0 ) return ret ; avi -> non_interleaved |= ret | ( s -> flags & AVFMT_FLAG_SORT_DTS ) ; dict_entry = av_dict_get ( s -> metadata , "ISFT" , NULL , 0 ) ; if ( dict_entry && ! strcmp ( dict_entry -> value , "PotEncoder" ) ) for ( i = 0 ; i < s -> nb_streams ; i ++ ) { AVStream * st = s -> streams [ i ] ; if ( st -> codecpar -> codec_id == AV_CODEC_ID_MPEG1VIDEO || st -> codecpar -> codec_id == AV_CODEC_ID_MPEG2VIDEO ) st -> need_parsing = AVSTREAM_PARSE_FULL ; } for ( i = 0 ; i < s -> nb_streams ; i ++ ) { AVStream * st = s -> streams [ i ] ; if ( st -> nb_index_entries ) break ; } if ( avi -> dv_demux ) avi -> non_interleaved = 0 ; if ( i == s -> nb_streams && avi -> non_interleaved ) { av_log ( s , AV_LOG_WARNING , "Non-interleaved AVI without index, switching to interleaved\n" ) ; avi -> non_interleaved = 0 ; } if ( avi -> non_interleaved ) { av_log ( s , AV_LOG_INFO , "non-interleaved AVI\n" ) ; clean_index ( s ) ; } ff_metadata_conv_ctx ( s , NULL , avi_metadata_conv ) ; ff_metadata_conv_ctx ( s , NULL , ff_riff_info_conv ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int proc_claiminterface ( struct usb_dev_state * ps , void __user * arg ) { unsigned int ifnum ; if ( get_user ( ifnum , ( unsigned int __user * ) arg ) ) return - EFAULT ; return claimintf ( ps , ifnum ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_usb_video_control_interface_descriptor ( proto_tree * parent_tree , tvbuff_t * tvb , guint8 descriptor_len , packet_info * pinfo , usb_conv_info_t * usb_conv_info ) { video_conv_info_t * video_conv_info = NULL ; video_entity_t * entity = NULL ; proto_item * item = NULL ; proto_item * subtype_item = NULL ; proto_tree * tree = NULL ; guint8 entity_id = 0 ; guint16 terminal_type = 0 ; int offset = 0 ; guint8 subtype ; subtype = tvb_get_guint8 ( tvb , offset + 2 ) ; if ( parent_tree ) { const gchar * subtype_str ; subtype_str = val_to_str_ext ( subtype , & vc_if_descriptor_subtypes_ext , "Unknown (0x%x)" ) ; tree = proto_tree_add_subtree_format ( parent_tree , tvb , offset , descriptor_len , ett_descriptor_video_control , & item , "VIDEO CONTROL INTERFACE DESCRIPTOR [%s]" , subtype_str ) ; } dissect_usb_descriptor_header ( tree , tvb , offset , & vid_descriptor_type_vals_ext ) ; subtype_item = proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_subtype , tvb , offset + 2 , 1 , ENC_LITTLE_ENDIAN ) ; offset += 3 ; if ( subtype == VC_HEADER ) { guint8 num_vs_interfaces ; proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_bcdUVC , tvb , offset , 2 , ENC_LITTLE_ENDIAN ) ; proto_tree_add_item ( tree , hf_usb_vid_ifdesc_wTotalLength , tvb , offset + 2 , 2 , ENC_LITTLE_ENDIAN ) ; proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_dwClockFrequency , tvb , offset + 4 , 4 , ENC_LITTLE_ENDIAN ) ; num_vs_interfaces = tvb_get_guint8 ( tvb , offset + 8 ) ; proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_bInCollection , tvb , offset + 8 , 1 , ENC_LITTLE_ENDIAN ) ; if ( num_vs_interfaces > 0 ) { proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_baInterfaceNr , tvb , offset + 9 , num_vs_interfaces , ENC_NA ) ; } offset += 9 + num_vs_interfaces ; } else if ( ( subtype == VC_INPUT_TERMINAL ) || ( subtype == VC_OUTPUT_TERMINAL ) ) { entity_id = tvb_get_guint8 ( tvb , offset ) ; terminal_type = tvb_get_letohs ( tvb , offset + 1 ) ; proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_terminal_id , tvb , offset , 1 , ENC_LITTLE_ENDIAN ) ; proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_terminal_type , tvb , offset + 1 , 2 , ENC_LITTLE_ENDIAN ) ; proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_assoc_terminal , tvb , offset + 3 , 1 , ENC_LITTLE_ENDIAN ) ; offset += 4 ; if ( subtype == VC_OUTPUT_TERMINAL ) { proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_src_id , tvb , offset , 1 , ENC_LITTLE_ENDIAN ) ; ++ offset ; } proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_iTerminal , tvb , offset , 1 , ENC_LITTLE_ENDIAN ) ; ++ offset ; if ( subtype == VC_INPUT_TERMINAL ) { if ( terminal_type == ITT_CAMERA ) { offset = dissect_usb_video_camera_terminal ( tree , tvb , offset ) ; } else if ( terminal_type == ITT_MEDIA_TRANSPORT_INPUT ) { } } if ( subtype == VC_OUTPUT_TERMINAL ) { if ( terminal_type == OTT_MEDIA_TRANSPORT_OUTPUT ) { } } } else { entity_id = tvb_get_guint8 ( tvb , offset ) ; proto_tree_add_item ( tree , hf_usb_vid_control_ifdesc_unit_id , tvb , offset , 1 , ENC_LITTLE_ENDIAN ) ; ++ offset ; if ( subtype == VC_PROCESSING_UNIT ) { offset = dissect_usb_video_processing_unit ( tree , tvb , offset ) ; } else if ( subtype == VC_SELECTOR_UNIT ) { offset = dissect_usb_video_selector_unit ( tree , tvb , offset ) ; } else if ( subtype == VC_EXTENSION_UNIT ) { offset = dissect_usb_video_extension_unit ( tree , tvb , offset ) ; } else if ( subtype == VC_ENCODING_UNIT ) { } else { expert_add_info_format ( pinfo , subtype_item , & ei_usb_vid_subtype_unknown , "Unknown VC subtype %u" , subtype ) ; } } if ( offset < descriptor_len ) { proto_tree_add_item ( tree , hf_usb_vid_descriptor_data , tvb , offset , descriptor_len - offset , ENC_NA ) ; } if ( entity_id != 0 ) proto_item_append_text ( item , " (Entity %d)" , entity_id ) ; if ( subtype != VC_HEADER && usb_conv_info ) { usb_conv_info = get_usb_iface_conv_info ( pinfo , usb_conv_info -> interfaceNum ) ; video_conv_info = ( video_conv_info_t * ) usb_conv_info -> class_data ; if ( ! video_conv_info ) { video_conv_info = wmem_new ( wmem_file_scope ( ) , video_conv_info_t ) ; video_conv_info -> entities = wmem_tree_new ( wmem_file_scope ( ) ) ; usb_conv_info -> class_data = video_conv_info ; } entity = ( video_entity_t * ) wmem_tree_lookup32 ( video_conv_info -> entities , entity_id ) ; if ( ! entity ) { entity = wmem_new ( wmem_file_scope ( ) , video_entity_t ) ; entity -> entityID = entity_id ; entity -> subtype = subtype ; entity -> terminalType = terminal_type ; wmem_tree_insert32 ( video_conv_info -> entities , entity_id , entity ) ; } } return descriptor_len ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
TSReturnCode TSHttpAltInfoCachedReqGet ( TSHttpAltInfo infop , TSMBuffer * bufp , TSMLoc * obj ) { sdk_assert ( sdk_sanity_check_alt_info ( infop ) == TS_SUCCESS ) ; HttpAltInfo * info = ( HttpAltInfo * ) infop ; * ( reinterpret_cast < HTTPHdr * * > ( bufp ) ) = & info -> m_cached_req ; * obj = reinterpret_cast < TSMLoc > ( info -> m_cached_req . m_http ) ; return sdk_sanity_check_mbuffer ( * bufp ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int decode_cabac_mb_ref ( H264Context * h , int list , int n ) { int refa = h -> ref_cache [ list ] [ scan8 [ n ] - 1 ] ; int refb = h -> ref_cache [ list ] [ scan8 [ n ] - 8 ] ; int ref = 0 ; int ctx = 0 ; if ( h -> slice_type_nos == AV_PICTURE_TYPE_B ) { if ( refa > 0 && ! ( h -> direct_cache [ scan8 [ n ] - 1 ] & ( MB_TYPE_DIRECT2 >> 1 ) ) ) ctx ++ ; if ( refb > 0 && ! ( h -> direct_cache [ scan8 [ n ] - 8 ] & ( MB_TYPE_DIRECT2 >> 1 ) ) ) ctx += 2 ; } else { if ( refa > 0 ) ctx ++ ; if ( refb > 0 ) ctx += 2 ; } while ( get_cabac ( & h -> cabac , & h -> cabac_state [ 54 + ctx ] ) ) { ref ++ ; ctx = ( ctx >> 2 ) + 4 ; if ( ref >= 32 ) { return - 1 ; } } return ref ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TSNextProtocolSet TSGetcloneProtoSet ( TSAcceptor tna ) { NetAccept * na = reinterpret_cast < NetAccept * > ( tna ) ; return ( na && na -> snpa ) ? reinterpret_cast < TSNextProtocolSet > ( na -> snpa -> cloneProtoSet ( ) ) : nullptr ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
krb5_error_code krb5_read_tkt_policy ( krb5_context context , krb5_ldap_context * ldap_context , krb5_db_entry * entries , char * policy ) { krb5_error_code st = 0 ; int mask = 0 , omask = 0 ; int tkt_mask = ( KDB_MAX_LIFE_ATTR | KDB_MAX_RLIFE_ATTR | KDB_TKT_FLAGS_ATTR ) ; krb5_ldap_policy_params * tktpoldnparam = NULL ; if ( ( st = krb5_get_attributes_mask ( context , entries , & mask ) ) != 0 ) goto cleanup ; if ( ( mask & tkt_mask ) == tkt_mask ) goto cleanup ; if ( policy != NULL ) { st = krb5_ldap_read_policy ( context , policy , & tktpoldnparam , & omask ) ; if ( st && st != KRB5_KDB_NOENTRY ) { prepend_err_str ( context , _ ( "Error reading ticket policy. " ) , st , st ) ; goto cleanup ; } st = 0 ; } if ( ( mask & KDB_MAX_LIFE_ATTR ) == 0 ) { if ( ( omask & KDB_MAX_LIFE_ATTR ) == KDB_MAX_LIFE_ATTR ) entries -> max_life = tktpoldnparam -> maxtktlife ; else if ( ldap_context -> lrparams -> max_life ) entries -> max_life = ldap_context -> lrparams -> max_life ; } if ( ( mask & KDB_MAX_RLIFE_ATTR ) == 0 ) { if ( ( omask & KDB_MAX_RLIFE_ATTR ) == KDB_MAX_RLIFE_ATTR ) entries -> max_renewable_life = tktpoldnparam -> maxrenewlife ; else if ( ldap_context -> lrparams -> max_renewable_life ) entries -> max_renewable_life = ldap_context -> lrparams -> max_renewable_life ; } if ( ( mask & KDB_TKT_FLAGS_ATTR ) == 0 ) { if ( ( omask & KDB_TKT_FLAGS_ATTR ) == KDB_TKT_FLAGS_ATTR ) entries -> attributes = tktpoldnparam -> tktflags ; else if ( ldap_context -> lrparams -> tktflags ) entries -> attributes |= ldap_context -> lrparams -> tktflags ; } krb5_ldap_free_policy ( context , tktpoldnparam ) ; cleanup : return st ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void final_reordering_syllable ( const hb_ot_shape_plan_t * plan , hb_buffer_t * buffer , unsigned int start , unsigned int end ) { const indic_shape_plan_t * indic_plan = ( const indic_shape_plan_t * ) plan -> data ; hb_glyph_info_t * info = buffer -> info ; if ( indic_plan -> virama_glyph ) { unsigned int virama_glyph = indic_plan -> virama_glyph ; for ( unsigned int i = start ; i < end ; i ++ ) if ( info [ i ] . codepoint == virama_glyph && _hb_glyph_info_ligated ( & info [ i ] ) && _hb_glyph_info_multiplied ( & info [ i ] ) ) { info [ i ] . indic_category ( ) = OT_H ; _hb_glyph_info_clear_ligated_and_multiplied ( & info [ i ] ) ; } } bool try_pref = ! ! indic_plan -> mask_array [ PREF ] ; unsigned int base ; for ( base = start ; base < end ; base ++ ) if ( info [ base ] . indic_position ( ) >= POS_BASE_C ) { if ( try_pref && base + 1 < end && indic_plan -> config -> pref_len == 2 ) { for ( unsigned int i = base + 1 ; i < end ; i ++ ) if ( ( info [ i ] . mask & indic_plan -> mask_array [ PREF ] ) != 0 ) { if ( ! ( _hb_glyph_info_substituted ( & info [ i ] ) && _hb_glyph_info_ligated_and_didnt_multiply ( & info [ i ] ) ) ) { base = i ; while ( base < end && is_halant_or_coeng ( info [ base ] ) ) base ++ ; info [ base ] . indic_position ( ) = POS_BASE_C ; try_pref = false ; } break ; } } if ( start < base && info [ base ] . indic_position ( ) > POS_BASE_C ) base -- ; break ; } if ( base == end && start < base && is_one_of ( info [ base - 1 ] , FLAG ( OT_ZWJ ) ) ) base -- ; if ( base < end ) while ( start < base && is_one_of ( info [ base ] , ( FLAG ( OT_N ) | HALANT_OR_COENG_FLAGS ) ) ) base -- ; if ( start + 1 < end && start < base ) { unsigned int new_pos = base == end ? base - 2 : base - 1 ; if ( buffer -> props . script != HB_SCRIPT_MALAYALAM && buffer -> props . script != HB_SCRIPT_TAMIL ) { while ( new_pos > start && ! ( is_one_of ( info [ new_pos ] , ( FLAG ( OT_M ) | HALANT_OR_COENG_FLAGS ) ) ) ) new_pos -- ; if ( is_halant_or_coeng ( info [ new_pos ] ) && info [ new_pos ] . indic_position ( ) != POS_PRE_M ) { if ( new_pos + 1 < end && is_joiner ( info [ new_pos + 1 ] ) ) new_pos ++ ; } else new_pos = start ; } if ( start < new_pos && info [ new_pos ] . indic_position ( ) != POS_PRE_M ) { for ( unsigned int i = new_pos ; i > start ; i -- ) if ( info [ i - 1 ] . indic_position ( ) == POS_PRE_M ) { unsigned int old_pos = i - 1 ; hb_glyph_info_t tmp = info [ old_pos ] ; memmove ( & info [ old_pos ] , & info [ old_pos + 1 ] , ( new_pos - old_pos ) * sizeof ( info [ 0 ] ) ) ; info [ new_pos ] = tmp ; if ( old_pos < base && base <= new_pos ) base -- ; buffer -> merge_clusters ( new_pos , MIN ( end , base + 1 ) ) ; new_pos -- ; } } else { for ( unsigned int i = start ; i < base ; i ++ ) if ( info [ i ] . indic_position ( ) == POS_PRE_M ) { buffer -> merge_clusters ( i , MIN ( end , base + 1 ) ) ; break ; } } } if ( start + 1 < end && info [ start ] . indic_position ( ) == POS_RA_TO_BECOME_REPH && ( ( info [ start ] . indic_category ( ) == OT_Repha ) ^ _hb_glyph_info_ligated_and_didnt_multiply ( & info [ start ] ) ) ) { unsigned int new_reph_pos ; reph_position_t reph_pos = indic_plan -> config -> reph_pos ; assert ( reph_pos != REPH_POS_DONT_CARE ) ; if ( reph_pos == REPH_POS_AFTER_POST ) { goto reph_step_5 ; } { new_reph_pos = start + 1 ; while ( new_reph_pos < base && ! is_halant_or_coeng ( info [ new_reph_pos ] ) ) new_reph_pos ++ ; if ( new_reph_pos < base && is_halant_or_coeng ( info [ new_reph_pos ] ) ) { if ( new_reph_pos + 1 < base && is_joiner ( info [ new_reph_pos + 1 ] ) ) new_reph_pos ++ ; goto reph_move ; } } if ( reph_pos == REPH_POS_AFTER_MAIN ) { new_reph_pos = base ; while ( new_reph_pos + 1 < end && info [ new_reph_pos + 1 ] . indic_position ( ) <= POS_AFTER_MAIN ) new_reph_pos ++ ; if ( new_reph_pos < end ) goto reph_move ; } if ( reph_pos == REPH_POS_AFTER_SUB ) { new_reph_pos = base ; while ( new_reph_pos < end && ! ( FLAG ( info [ new_reph_pos + 1 ] . indic_position ( ) ) & ( FLAG ( POS_POST_C ) | FLAG ( POS_AFTER_POST ) | FLAG ( POS_SMVD ) ) ) ) new_reph_pos ++ ; if ( new_reph_pos < end ) goto reph_move ; } reph_step_5 : { new_reph_pos = start + 1 ; while ( new_reph_pos < base && ! is_halant_or_coeng ( info [ new_reph_pos ] ) ) new_reph_pos ++ ; if ( new_reph_pos < base && is_halant_or_coeng ( info [ new_reph_pos ] ) ) { if ( new_reph_pos + 1 < base && is_joiner ( info [ new_reph_pos + 1 ] ) ) new_reph_pos ++ ; goto reph_move ; } } { new_reph_pos = end - 1 ; while ( new_reph_pos > start && info [ new_reph_pos ] . indic_position ( ) == POS_SMVD ) new_reph_pos -- ; if ( ! hb_options ( ) . uniscribe_bug_compatible && unlikely ( is_halant_or_coeng ( info [ new_reph_pos ] ) ) ) { for ( unsigned int i = base + 1 ; i < new_reph_pos ; i ++ ) if ( info [ i ] . indic_category ( ) == OT_M ) { new_reph_pos -- ; } } goto reph_move ; } reph_move : { buffer -> merge_clusters ( start , new_reph_pos + 1 ) ; hb_glyph_info_t reph = info [ start ] ; memmove ( & info [ start ] , & info [ start + 1 ] , ( new_reph_pos - start ) * sizeof ( info [ 0 ] ) ) ; info [ new_reph_pos ] = reph ; if ( start < base && base <= new_reph_pos ) base -- ; } } if ( try_pref && base + 1 < end ) { unsigned int pref_len = indic_plan -> config -> pref_len ; for ( unsigned int i = base + 1 ; i < end ; i ++ ) if ( ( info [ i ] . mask & indic_plan -> mask_array [ PREF ] ) != 0 ) { if ( _hb_glyph_info_substituted ( & info [ i ] ) && ( ( pref_len == 1 ) ^ _hb_glyph_info_ligated_and_didnt_multiply ( & info [ i ] ) ) ) { unsigned int new_pos = base ; if ( buffer -> props . script != HB_SCRIPT_MALAYALAM && buffer -> props . script != HB_SCRIPT_TAMIL ) { while ( new_pos > start && ! ( is_one_of ( info [ new_pos - 1 ] , FLAG ( OT_M ) | HALANT_OR_COENG_FLAGS ) ) ) new_pos -- ; if ( new_pos > start && info [ new_pos - 1 ] . indic_category ( ) == OT_M ) { unsigned int old_pos = i ; for ( unsigned int i = base + 1 ; i < old_pos ; i ++ ) if ( info [ i ] . indic_category ( ) == OT_M ) { new_pos -- ; break ; } } } if ( new_pos > start && is_halant_or_coeng ( info [ new_pos - 1 ] ) ) { if ( new_pos < end && is_joiner ( info [ new_pos ] ) ) new_pos ++ ; } { unsigned int old_pos = i ; buffer -> merge_clusters ( new_pos , old_pos + 1 ) ; hb_glyph_info_t tmp = info [ old_pos ] ; memmove ( & info [ new_pos + 1 ] , & info [ new_pos ] , ( old_pos - new_pos ) * sizeof ( info [ 0 ] ) ) ; info [ new_pos ] = tmp ; if ( new_pos <= base && base < old_pos ) base ++ ; } } break ; } } if ( info [ start ] . indic_position ( ) == POS_PRE_M && ( ! start || ! ( FLAG ( _hb_glyph_info_get_general_category ( & info [ start - 1 ] ) ) & FLAG_RANGE ( HB_UNICODE_GENERAL_CATEGORY_FORMAT , HB_UNICODE_GENERAL_CATEGORY_NON_SPACING_MARK ) ) ) ) info [ start ] . mask |= indic_plan -> mask_array [ INIT ] ; if ( hb_options ( ) . uniscribe_bug_compatible ) { switch ( ( hb_tag_t ) plan -> props . script ) { case HB_SCRIPT_TAMIL : case HB_SCRIPT_SINHALA : break ; default : buffer -> merge_clusters ( start , end ) ; break ; } } }
1True
Categorize the following code snippet as vulnerable or not. True or False
void proto_reg_handoff_btavdtp ( void ) { dissector_add_string ( "bluetooth.uuid" , "19" , btavdtp_handle ) ; dissector_add_uint ( "btl2cap.psm" , BTL2CAP_PSM_AVDTP , btavdtp_handle ) ; dissector_add_for_decode_as ( "btl2cap.cid" , btavdtp_handle ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
GPtrArray * proto_get_finfo_ptr_array ( const proto_tree * tree , const int id ) { if ( ! tree ) return NULL ; if ( PTREE_DATA ( tree ) -> interesting_hfids != NULL ) return ( GPtrArray * ) g_hash_table_lookup ( PTREE_DATA ( tree ) -> interesting_hfids , GINT_TO_POINTER ( id ) ) ; else return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline int op ( uint8_t * * dst , const uint8_t * dst_end , GetByteContext * gb , int pixel , int count , int * x , int width , int linesize ) { int remaining = width - * x ; while ( count > 0 ) { int striplen = FFMIN ( count , remaining ) ; if ( gb ) { if ( bytestream2_get_bytes_left ( gb ) < striplen ) goto exhausted ; bytestream2_get_bufferu ( gb , * dst , striplen ) ; } else if ( pixel >= 0 ) memset ( * dst , pixel , striplen ) ; * dst += striplen ; remaining -= striplen ; count -= striplen ; if ( remaining <= 0 ) { * dst += linesize - width ; remaining = width ; } if ( linesize > 0 ) { if ( * dst >= dst_end ) goto exhausted ; } else { if ( * dst <= dst_end ) goto exhausted ; } } * x = width - remaining ; return 0 ; exhausted : * x = width - remaining ; return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void pdf_run_TJ ( fz_context * ctx , pdf_processor * proc , pdf_obj * obj ) { pdf_run_processor * pr = ( pdf_run_processor * ) proc ; pdf_show_text ( ctx , pr , obj ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void intra_pred_dc_128 ( uint8_t * d , uint8_t * top , uint8_t * left , int stride ) { int y ; uint64_t a = 0x8080808080808080ULL ; for ( y = 0 ; y < 8 ; y ++ ) * ( ( uint64_t * ) ( d + y * stride ) ) = a ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int * __xmlDoValidityCheckingDefaultValue ( void ) { if ( IS_MAIN_THREAD ) return ( & xmlDoValidityCheckingDefaultValue ) ; else return ( & xmlGetGlobalState ( ) -> xmlDoValidityCheckingDefaultValue ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void real_proto_register_diameter ( void ) { module_t * diameter_module ; expert_module_t * expert_diameter ; guint i , ett_length ; hf_register_info hf_base [ ] = { { & hf_diameter_version , { "Version" , "diameter.version" , FT_UINT8 , BASE_HEX , NULL , 0x00 , NULL , HFILL } } , { & hf_diameter_length , { "Length" , "diameter.length" , FT_UINT24 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_flags , { "Flags" , "diameter.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_flags_request , { "Request" , "diameter.flags.request" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_R , NULL , HFILL } } , { & hf_diameter_flags_proxyable , { "Proxyable" , "diameter.flags.proxyable" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_P , NULL , HFILL } } , { & hf_diameter_flags_error , { "Error" , "diameter.flags.error" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_E , NULL , HFILL } } , { & hf_diameter_flags_T , { "T(Potentially re-transmitted message)" , "diameter.flags.T" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_T , NULL , HFILL } } , { & hf_diameter_flags_reserved4 , { "Reserved" , "diameter.flags.reserved4" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_RESERVED4 , NULL , HFILL } } , { & hf_diameter_flags_reserved5 , { "Reserved" , "diameter.flags.reserved5" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_RESERVED5 , NULL , HFILL } } , { & hf_diameter_flags_reserved6 , { "Reserved" , "diameter.flags.reserved6" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_RESERVED6 , NULL , HFILL } } , { & hf_diameter_flags_reserved7 , { "Reserved" , "diameter.flags.reserved7" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , DIAM_FLAGS_RESERVED7 , NULL , HFILL } } , { & hf_diameter_vendor_id , { "VendorId" , "diameter.vendorId" , FT_UINT32 , BASE_DEC | BASE_EXT_STRING , & sminmpec_values_ext , 0x0 , NULL , HFILL } } , { & hf_diameter_application_id , { "ApplicationId" , "diameter.applicationId" , FT_UINT32 , BASE_DEC | BASE_EXT_STRING , VALS_EXT_PTR ( dictionary . applications ) , 0x0 , NULL , HFILL } } , { & hf_diameter_hopbyhopid , { "Hop-by-Hop Identifier" , "diameter.hopbyhopid" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_endtoendid , { "End-to-End Identifier" , "diameter.endtoendid" , FT_UINT32 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_avp , { "AVP" , "diameter.avp" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_avp_len , { "AVP Length" , "diameter.avp.len" , FT_UINT24 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_avp_code , { "AVP Code" , "diameter.avp.code" , FT_UINT32 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_diameter_avp_flags , { "AVP Flags" , "diameter.avp.flags" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_avp_flags_vendor_specific , { "Vendor-Specific" , "diameter.flags.vendorspecific" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_V , NULL , HFILL } } , { & hf_diameter_avp_flags_mandatory , { "Mandatory" , "diameter.flags.mandatory" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_M , NULL , HFILL } } , { & hf_diameter_avp_flags_protected , { "Protected" , "diameter.avp.flags.protected" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_P , NULL , HFILL } } , { & hf_diameter_avp_flags_reserved3 , { "Reserved" , "diameter.avp.flags.reserved3" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_RESERVED3 , NULL , HFILL } } , { & hf_diameter_avp_flags_reserved4 , { "Reserved" , "diameter.avp.flags.reserved4" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_RESERVED4 , NULL , HFILL } } , { & hf_diameter_avp_flags_reserved5 , { "Reserved" , "diameter.avp.flags.reserved5" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_RESERVED5 , NULL , HFILL } } , { & hf_diameter_avp_flags_reserved6 , { "Reserved" , "diameter.avp.flags.reserved6" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_RESERVED6 , NULL , HFILL } } , { & hf_diameter_avp_flags_reserved7 , { "Reserved" , "diameter.avp.flags.reserved7" , FT_BOOLEAN , 8 , TFS ( & tfs_set_notset ) , AVP_FLAGS_RESERVED7 , NULL , HFILL } } , { & hf_diameter_avp_vendor_id , { "AVP Vendor Id" , "diameter.avp.vendorId" , FT_UINT32 , BASE_DEC | BASE_EXT_STRING , & sminmpec_values_ext , 0x0 , NULL , HFILL } } , { & ( unknown_avp . hf_value ) , { "Value" , "diameter.avp.unknown" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_avp_data_wrong_length , { "Data" , "diameter.avp.invalid-data" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_avp_pad , { "Padding" , "diameter.avp.pad" , FT_BYTES , BASE_NONE , NULL , 0x0 , NULL , HFILL } } , { & hf_diameter_code , { "Command Code" , "diameter.cmd.code" , FT_UINT32 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_diameter_answer_in , { "Answer In" , "diameter.answer_in" , FT_FRAMENUM , BASE_NONE , FRAMENUM_TYPE ( FT_FRAMENUM_RESPONSE ) , 0x0 , "The answer to this diameter request is in this frame" , HFILL } } , { & hf_diameter_answer_to , { "Request In" , "diameter.answer_to" , FT_FRAMENUM , BASE_NONE , FRAMENUM_TYPE ( FT_FRAMENUM_REQUEST ) , 0x0 , "This is an answer to the diameter request in this frame" , HFILL } } , { & hf_diameter_answer_time , { "Response Time" , "diameter.resp_time" , FT_RELATIVE_TIME , BASE_NONE , NULL , 0x0 , "The time between the request and the answer" , HFILL } } , { & hf_framed_ipv6_prefix_reserved , { "Framed IPv6 Prefix Reserved byte" , "diameter.framed_ipv6_prefix_reserved" , FT_UINT8 , BASE_HEX , NULL , 0 , NULL , HFILL } } , { & hf_framed_ipv6_prefix_length , { "Framed IPv6 Prefix length (in bits)" , "diameter.framed_ipv6_prefix_length" , FT_UINT8 , BASE_DEC , NULL , 0 , NULL , HFILL } } , { & hf_framed_ipv6_prefix_bytes , { "Framed IPv6 Prefix as a bytestring" , "diameter.framed_ipv6_prefix_bytes" , FT_BYTES , BASE_NONE , NULL , 0 , NULL , HFILL } } , { & hf_framed_ipv6_prefix_ipv6 , { "Framed IPv6 Prefix as an IPv6 address" , "diameter.framed_ipv6_prefix_ipv6" , FT_IPv6 , BASE_NONE , NULL , 0 , "This field is present only if the prefix length is 128" , HFILL } } , { & hf_diameter_3gpp2_exp_res , { "Experimental-Result-Code" , "diameter.3gpp2.exp_res" , FT_UINT32 , BASE_DEC , VALS ( diameter_3gpp2_exp_res_vals ) , 0x0 , NULL , HFILL } } , { & hf_diameter_other_vendor_exp_res , { "Experimental-Result-Code" , "diameter.other_vendor.Experimental-Result-Code" , FT_UINT32 , BASE_DEC , NULL , 0x0 , NULL , HFILL } } } ; gint * ett_base [ ] = { & ett_diameter , & ett_diameter_flags , & ett_diameter_avp_flags , & ett_diameter_avpinfo , & ett_unknown , & ett_err , & ( unknown_avp . ett ) } ; static ei_register_info ei [ ] = { { & ei_diameter_reserved_bit_set , { "diameter.reserved_bit_set" , PI_MALFORMED , PI_WARN , "Reserved bit set" , EXPFILL } } , { & ei_diameter_avp_code , { "diameter.avp.code.unknown" , PI_UNDECODED , PI_WARN , "Unknown AVP, if you know what this is you can add it to dictionary.xml" , EXPFILL } } , { & ei_diameter_avp_vendor_id , { "diameter.unknown_vendor" , PI_UNDECODED , PI_WARN , "Unknown Vendor, if you know whose this is you can add it to dictionary.xml" , EXPFILL } } , { & ei_diameter_avp_no_data , { "diameter.avp.no_data" , PI_UNDECODED , PI_WARN , "Data is empty" , EXPFILL } } , { & ei_diameter_avp_pad , { "diameter.avp.pad.non_zero" , PI_MALFORMED , PI_NOTE , "Padding is non-zero" , EXPFILL } } , { & ei_diameter_avp_len , { "diameter.avp.invalid-len" , PI_MALFORMED , PI_WARN , "Wrong length" , EXPFILL } } , { & ei_diameter_application_id , { "diameter.applicationId.unknown" , PI_UNDECODED , PI_WARN , "Unknown Application Id, if you know what this is you can add it to dictionary.xml" , EXPFILL } } , { & ei_diameter_version , { "diameter.version.unknown" , PI_UNDECODED , PI_WARN , "Unknown Diameter Version (decoding as RFC 3588)" , EXPFILL } } , { & ei_diameter_code , { "diameter.cmd.code.unknown" , PI_UNDECODED , PI_WARN , "Unknown command, if you know what this is you can add it to dictionary.xml" , EXPFILL } } , } ; wmem_array_append ( build_dict . hf , hf_base , array_length ( hf_base ) ) ; ett_length = array_length ( ett_base ) ; for ( i = 0 ; i < ett_length ; i ++ ) { g_ptr_array_add ( build_dict . ett , ett_base [ i ] ) ; } proto_diameter = proto_register_protocol ( "Diameter Protocol" , "DIAMETER" , "diameter" ) ; proto_register_field_array ( proto_diameter , ( hf_register_info * ) wmem_array_get_raw ( build_dict . hf ) , wmem_array_get_count ( build_dict . hf ) ) ; proto_register_subtree_array ( ( gint * * ) build_dict . ett -> pdata , build_dict . ett -> len ) ; expert_diameter = expert_register_protocol ( proto_diameter ) ; expert_register_field_array ( expert_diameter , ei , array_length ( ei ) ) ; g_ptr_array_free ( build_dict . ett , TRUE ) ; new_register_dissector ( "diameter" , dissect_diameter , proto_diameter ) ; diameter_dissector_table = register_dissector_table ( "diameter.base" , "DIAMETER_BASE_AVPS" , FT_UINT32 , BASE_DEC , DISSECTOR_TABLE_ALLOW_DUPLICATE ) ; diameter_3gpp_avp_dissector_table = register_dissector_table ( "diameter.3gpp" , "DIAMETER_3GPP_AVPS" , FT_UINT32 , BASE_DEC , DISSECTOR_TABLE_ALLOW_DUPLICATE ) ; diameter_ericsson_avp_dissector_table = register_dissector_table ( "diameter.ericsson" , "DIAMETER_ERICSSON_AVPS" , FT_UINT32 , BASE_DEC , DISSECTOR_TABLE_ALLOW_DUPLICATE ) ; diameter_expr_result_vnd_table = register_dissector_table ( "diameter.vnd_exp_res" , "DIAMETER Experimental-Result-Code" , FT_UINT32 , BASE_DEC , DISSECTOR_TABLE_ALLOW_DUPLICATE ) ; range_convert_str ( & global_diameter_tcp_port_range , DEFAULT_DIAMETER_PORT_RANGE , MAX_UDP_PORT ) ; range_convert_str ( & global_diameter_sctp_port_range , DEFAULT_DIAMETER_PORT_RANGE , MAX_SCTP_PORT ) ; range_convert_str ( & global_diameter_udp_port_range , "" , MAX_UDP_PORT ) ; diameter_module = prefs_register_protocol ( proto_diameter , proto_reg_handoff_diameter ) ; prefs_register_range_preference ( diameter_module , "tcp.ports" , "Diameter TCP ports" , "TCP ports to be decoded as Diameter (default: " DEFAULT_DIAMETER_PORT_RANGE ")" , & global_diameter_tcp_port_range , MAX_UDP_PORT ) ; prefs_register_range_preference ( diameter_module , "sctp.ports" , "Diameter SCTP Ports" , "SCTP ports to be decoded as Diameter (default: " DEFAULT_DIAMETER_PORT_RANGE ")" , & global_diameter_sctp_port_range , MAX_SCTP_PORT ) ; prefs_register_bool_preference ( diameter_module , "desegment" , "Reassemble Diameter messages\nspanning multiple TCP segments" , "Whether the Diameter dissector should reassemble messages spanning multiple TCP segments." " To use this option, you must also enable \"Allow subdissectors to reassemble TCP streams\" in the TCP protocol settings." , & gbl_diameter_desegment ) ; prefs_register_range_preference ( diameter_module , "udp.ports" , "Diameter UDP ports" , "UDP ports to be decoded as Diameter (default: 0 as Diameter over UDP is nonstandard)" , & global_diameter_udp_port_range , MAX_UDP_PORT ) ; prefs_register_obsolete_preference ( diameter_module , "version" ) ; prefs_register_obsolete_preference ( diameter_module , "tcp.port" ) ; prefs_register_obsolete_preference ( diameter_module , "sctp.port" ) ; prefs_register_obsolete_preference ( diameter_module , "command_in_header" ) ; prefs_register_obsolete_preference ( diameter_module , "dictionary.name" ) ; prefs_register_obsolete_preference ( diameter_module , "dictionary.use" ) ; prefs_register_obsolete_preference ( diameter_module , "allow_zero_as_app_id" ) ; prefs_register_obsolete_preference ( diameter_module , "suppress_console_output" ) ; diameter_tap = register_tap ( "diameter" ) ; register_srt_table ( proto_diameter , NULL , 1 , diameterstat_packet , diameterstat_init , NULL ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static UBool _isPrivateuseVariantSubtag ( const char * s , int32_t len ) { if ( len < 0 ) { len = ( int32_t ) uprv_strlen ( s ) ; } if ( len >= 1 && len <= 8 && _isAlphaNumericString ( s , len ) ) { return TRUE ; } return FALSE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_mount ( const char * dev_name , const struct path * path , const char * type , unsigned long flags , void * data ) { const struct cred * cred = current_cred ( ) ; if ( flags & MS_REMOUNT ) return superblock_has_perm ( cred , path -> dentry -> d_sb , FILESYSTEM__REMOUNT , NULL ) ; else return path_has_perm ( cred , path , FILE__MOUNTON ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
GPtrArray * proto_all_finfos ( proto_tree * tree ) { ffdata_t ffdata ; ffdata . array = g_ptr_array_new ( ) ; ffdata . id = 0 ; proto_tree_traverse_pre_order ( tree , every_finfo , & ffdata ) ; return ffdata . array ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void get_dav_remote_heads ( void ) { remote_ls ( "refs/" , ( PROCESS_FILES | PROCESS_DIRS | RECURSIVE ) , process_ls_ref , NULL ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static PGconn * get_db_conn ( ClusterInfo * cluster , const char * db_name ) { PQExpBufferData conn_opts ; PGconn * conn ; initPQExpBuffer ( & conn_opts ) ; appendPQExpBufferStr ( & conn_opts , "dbname=" ) ; appendConnStrVal ( & conn_opts , db_name ) ; appendPQExpBufferStr ( & conn_opts , " user=" ) ; appendConnStrVal ( & conn_opts , os_info . user ) ; appendPQExpBuffer ( & conn_opts , " port=%d" , cluster -> port ) ; if ( cluster -> sockdir ) { appendPQExpBufferStr ( & conn_opts , " host=" ) ; appendConnStrVal ( & conn_opts , cluster -> sockdir ) ; } conn = PQconnectdb ( conn_opts . data ) ; termPQExpBuffer ( & conn_opts ) ; return conn ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
u_int sl_if_print ( netdissect_options * ndo , const struct pcap_pkthdr * h , const u_char * p ) { register u_int caplen = h -> caplen ; register u_int length = h -> len ; register const struct ip * ip ; if ( caplen < SLIP_HDRLEN || length < SLIP_HDRLEN ) { ND_PRINT ( ( ndo , "%s" , tstr ) ) ; return ( caplen ) ; } caplen -= SLIP_HDRLEN ; length -= SLIP_HDRLEN ; ip = ( const struct ip * ) ( p + SLIP_HDRLEN ) ; if ( ndo -> ndo_eflag ) sliplink_print ( ndo , p , ip , length ) ; if ( caplen < 1 || length < 1 ) { ND_PRINT ( ( ndo , "%s" , tstr ) ) ; return ( caplen + SLIP_HDRLEN ) ; } switch ( IP_V ( ip ) ) { case 4 : ip_print ( ndo , ( const u_char * ) ip , length ) ; break ; case 6 : ip6_print ( ndo , ( const u_char * ) ip , length ) ; break ; default : ND_PRINT ( ( ndo , "ip v%d" , IP_V ( ip ) ) ) ; } return ( SLIP_HDRLEN ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void dissect_rsvp_message_id_ack ( proto_tree * ti , proto_tree * rsvp_object_tree , tvbuff_t * tvb , int offset , int obj_length , int rsvp_class _U_ , int type ) { int offset2 = offset + 4 ; switch ( type ) { case 1 : proto_tree_add_uint ( rsvp_object_tree , hf_rsvp_ctype , tvb , offset + 3 , 1 , type ) ; proto_tree_add_item ( rsvp_object_tree , hf_rsvp_message_id_ack_flags , tvb , offset + 4 , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( rsvp_object_tree , hf_rsvp_message_id_ack_epoch , tvb , offset + 5 , 3 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( rsvp_object_tree , hf_rsvp_message_id_ack_message_id , tvb , offset + 8 , 4 , ENC_BIG_ENDIAN ) ; proto_item_set_text ( ti , "MESSAGE-ID ACK: %d" , tvb_get_ntohl ( tvb , offset + 8 ) ) ; break ; case 2 : proto_tree_add_uint ( rsvp_object_tree , hf_rsvp_ctype , tvb , offset + 3 , 1 , type ) ; proto_tree_add_item ( rsvp_object_tree , hf_rsvp_message_id_ack_flags , tvb , offset + 4 , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( rsvp_object_tree , hf_rsvp_message_id_ack_epoch , tvb , offset + 5 , 3 , ENC_BIG_ENDIAN ) ; proto_tree_add_item ( rsvp_object_tree , hf_rsvp_message_id_ack_message_id , tvb , offset + 8 , 4 , ENC_BIG_ENDIAN ) ; proto_item_set_text ( ti , "MESSAGE-ID NACK: %d" , tvb_get_ntohl ( tvb , offset + 8 ) ) ; break ; default : proto_tree_add_uint_format_value ( rsvp_object_tree , hf_rsvp_ctype , tvb , offset + 3 , 1 , type , "Unknown (%u)" , type ) ; proto_tree_add_item ( rsvp_object_tree , hf_rsvp_message_id_ack_data , tvb , offset2 , obj_length - 4 , ENC_NA ) ; break ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( FramebustBlockBrowserTest , FramebustAllowedBySiteSetting ) { GURL top_level_url = embedded_test_server ( ) -> GetURL ( "/iframe.html" ) ; HostContentSettingsMap * settings_map = HostContentSettingsMapFactory : : GetForProfile ( browser ( ) -> profile ( ) ) ; settings_map -> SetContentSettingDefaultScope ( top_level_url , GURL ( ) , CONTENT_SETTINGS_TYPE_POPUPS , std : : string ( ) , CONTENT_SETTING_ALLOW ) ; CreateAndSetBrowser ( ) ; ui_test_utils : : NavigateToURL ( browser ( ) , top_level_url ) ; NavigateIframeToUrlWithoutGesture ( GetWebContents ( ) , "test" , embedded_test_server ( ) -> GetURL ( "a.com" , "/title1.html" ) ) ; content : : RenderFrameHost * child = content : : ChildFrameAt ( GetWebContents ( ) -> GetMainFrame ( ) , 0 ) ; ASSERT_TRUE ( child ) ; GURL redirect_url = embedded_test_server ( ) -> GetURL ( "b.com" , "/title1.html" ) ; content : : TestNavigationObserver observer ( GetWebContents ( ) ) ; child -> ExecuteJavaScriptForTests ( base : : ASCIIToUTF16 ( base : : StringPrintf ( "window.top.location = '%s'; " , redirect_url . spec ( ) . c_str ( ) ) ) ) ; observer . Wait ( ) ; EXPECT_TRUE ( GetFramebustTabHelper ( ) -> blocked_urls ( ) . empty ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int jas_stream_getc_func ( jas_stream_t * stream ) { assert ( stream -> ptr_ - stream -> bufbase_ <= stream -> bufsize_ + JAS_STREAM_MAXPUTBACK ) ; return jas_stream_getc_macro ( stream ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void stroke_initiate ( private_stroke_socket_t * this , stroke_msg_t * msg , FILE * out ) { pop_string ( msg , & msg -> initiate . name ) ; DBG1 ( DBG_CFG , "received stroke: initiate '%s'" , msg -> initiate . name ) ; this -> control -> initiate ( this -> control , msg , out ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const char * csv_escape_str ( AVBPrint * dst , const char * src , const char sep , void * log_ctx ) { char meta_chars [ ] = { sep , '"' , '\n' , '\r' , '\0' } ; int needs_quoting = ! ! src [ strcspn ( src , meta_chars ) ] ; if ( needs_quoting ) av_bprint_chars ( dst , '"' , 1 ) ; for ( ; * src ; src ++ ) { if ( * src == '"' ) av_bprint_chars ( dst , '"' , 1 ) ; av_bprint_chars ( dst , * src , 1 ) ; } if ( needs_quoting ) av_bprint_chars ( dst , '"' , 1 ) ; return dst -> str ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void virLogStackTraceToFd ( int fd ) { void * array [ 100 ] ; int size ; static bool doneWarning ; const char * msg = "Stack trace not available on this platform\n" ; # define STRIP_DEPTH 3 size = backtrace ( array , ARRAY_CARDINALITY ( array ) ) ; if ( size ) { backtrace_symbols_fd ( array + STRIP_DEPTH , size - STRIP_DEPTH , fd ) ; ignore_value ( safewrite ( fd , "\n" , 1 ) ) ; } else if ( ! doneWarning ) { ignore_value ( safewrite ( fd , msg , strlen ( msg ) ) ) ; doneWarning = true ; } # undef STRIP_DEPTH }
0False
Categorize the following code snippet as vulnerable or not. True or False
void sun4m_irq_info ( Monitor * mon , const QDict * qdict ) { if ( slavio_intctl ) slavio_irq_info ( mon , slavio_intctl ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void test_bug5126 ( ) { MYSQL_STMT * stmt ; MYSQL_BIND my_bind [ 2 ] ; int32 c1 , c2 ; const char * stmt_text ; int rc ; myheader ( "test_bug5126" ) ; stmt_text = "DROP TABLE IF EXISTS t1" ; rc = mysql_real_query ( mysql , stmt_text , strlen ( stmt_text ) ) ; myquery ( rc ) ; stmt_text = "CREATE TABLE t1 (a mediumint, b int)" ; rc = mysql_real_query ( mysql , stmt_text , strlen ( stmt_text ) ) ; myquery ( rc ) ; stmt_text = "INSERT INTO t1 VALUES (8386608, 1)" ; rc = mysql_real_query ( mysql , stmt_text , strlen ( stmt_text ) ) ; myquery ( rc ) ; stmt = mysql_stmt_init ( mysql ) ; stmt_text = "SELECT a, b FROM t1" ; rc = mysql_stmt_prepare ( stmt , stmt_text , strlen ( stmt_text ) ) ; check_execute ( stmt , rc ) ; rc = mysql_stmt_execute ( stmt ) ; check_execute ( stmt , rc ) ; memset ( my_bind , 0 , sizeof ( my_bind ) ) ; my_bind [ 0 ] . buffer_type = MYSQL_TYPE_LONG ; my_bind [ 0 ] . buffer = & c1 ; my_bind [ 1 ] . buffer_type = MYSQL_TYPE_LONG ; my_bind [ 1 ] . buffer = & c2 ; mysql_stmt_bind_result ( stmt , my_bind ) ; rc = mysql_stmt_fetch ( stmt ) ; DIE_UNLESS ( rc == 0 ) ; DIE_UNLESS ( c1 == 8386608 && c2 == 1 ) ; if ( ! opt_silent ) printf ( "%ld, %ld\n" , ( long ) c1 , ( long ) c2 ) ; mysql_stmt_close ( stmt ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int print_ip6cp_config_options ( netdissect_options * ndo , const u_char * p , int length ) { int len , opt ; if ( length < 2 ) return 0 ; ND_TCHECK2 ( * p , 2 ) ; len = p [ 1 ] ; opt = p [ 0 ] ; if ( length < len ) return 0 ; if ( len < 2 ) { ND_PRINT ( ( ndo , "\n\t %s Option (0x%02x), length %u (length bogus, should be >= 2)" , tok2str ( ip6cpopt_values , "unknown" , opt ) , opt , len ) ) ; return 0 ; } ND_PRINT ( ( ndo , "\n\t %s Option (0x%02x), length %u" , tok2str ( ip6cpopt_values , "unknown" , opt ) , opt , len ) ) ; switch ( opt ) { case IP6CP_IFID : if ( len != 10 ) { ND_PRINT ( ( ndo , " (length bogus, should be = 10)" ) ) ; return len ; } ND_TCHECK2 ( * ( p + 2 ) , 8 ) ; ND_PRINT ( ( ndo , ": %04x:%04x:%04x:%04x" , EXTRACT_16BITS ( p + 2 ) , EXTRACT_16BITS ( p + 4 ) , EXTRACT_16BITS ( p + 6 ) , EXTRACT_16BITS ( p + 8 ) ) ) ; break ; default : if ( ndo -> ndo_vflag < 2 ) print_unknown_data ( ndo , & p [ 2 ] , "\n\t " , len - 2 ) ; break ; } if ( ndo -> ndo_vflag > 1 ) print_unknown_data ( ndo , & p [ 2 ] , "\n\t " , len - 2 ) ; return len ; trunc : ND_PRINT ( ( ndo , "[|ip6cp]" ) ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void vga_draw_glyph8 ( uint8_t * d , int linesize , const uint8_t * font_ptr , int h , uint32_t fgcol , uint32_t bgcol ) { uint32_t font_data , xorcol ; xorcol = bgcol ^ fgcol ; do { font_data = font_ptr [ 0 ] ; vga_draw_glyph_line ( d , font_data , xorcol , bgcol ) ; font_ptr += 4 ; d += linesize ; } while ( -- h ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
bool id_h ( connection_t * c ) { char name [ MAX_STRING_SIZE ] ; if ( sscanf ( c -> buffer , "%*d " MAX_STRING " %d" , name , & c -> protocol_version ) != 2 ) { logger ( LOG_ERR , "Got bad %s from %s (%s)" , "ID" , c -> name , c -> hostname ) ; return false ; } if ( ! check_id ( name ) || ! strcmp ( name , myself -> name ) ) { logger ( LOG_ERR , "Got bad %s from %s (%s): %s" , "ID" , c -> name , c -> hostname , "invalid name" ) ; return false ; } if ( c -> outgoing ) { if ( strcmp ( c -> name , name ) ) { logger ( LOG_ERR , "Peer %s is %s instead of %s" , c -> hostname , name , c -> name ) ; return false ; } } else { if ( c -> name ) { free ( c -> name ) ; } c -> name = xstrdup ( name ) ; } if ( c -> protocol_version != myself -> connection -> protocol_version ) { logger ( LOG_ERR , "Peer %s (%s) uses incompatible version %d" , c -> name , c -> hostname , c -> protocol_version ) ; return false ; } if ( bypass_security ) { if ( ! c -> config_tree ) { init_configuration ( & c -> config_tree ) ; } c -> allow_request = ACK ; if ( ! c -> outgoing ) { send_id ( c ) ; } return send_ack ( c ) ; } if ( ! c -> config_tree ) { init_configuration ( & c -> config_tree ) ; if ( ! read_connection_config ( c ) ) { logger ( LOG_ERR , "Peer %s had unknown identity (%s)" , c -> hostname , c -> name ) ; return false ; } } if ( ! read_rsa_public_key ( c ) ) { return false ; } c -> allow_request = METAKEY ; if ( ! c -> outgoing ) { send_id ( c ) ; } return send_metakey ( c ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void terminate_chunked_cb ( struct evhttp_request * req , void * arg ) { struct terminate_state * state = arg ; struct timeval tv ; state -> req = req ; evhttp_send_reply_start ( req , HTTP_OK , "OK" ) ; tv . tv_sec = 0 ; tv . tv_usec = 3000 ; event_once ( - 1 , EV_TIMEOUT , terminate_chunked_trickle_cb , arg , & tv ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExtensionServiceSyncTest , GetSyncDataFilter ) { InitializeEmptyExtensionService ( ) ; InstallCRX ( data_dir ( ) . AppendASCII ( "good.crx" ) , INSTALL_NEW ) ; const Extension * extension = service ( ) -> GetInstalledExtension ( good_crx ) ; ASSERT_TRUE ( extension ) ; extension_sync_service ( ) -> MergeDataAndStartSyncing ( syncer : : APPS , syncer : : SyncDataList ( ) , base : : MakeUnique < syncer : : FakeSyncChangeProcessor > ( ) , base : : MakeUnique < syncer : : SyncErrorFactoryMock > ( ) ) ; syncer : : SyncDataList list = extension_sync_service ( ) -> GetAllSyncData ( syncer : : EXTENSIONS ) ; ASSERT_EQ ( list . size ( ) , 0U ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TSReturnCode TSBase64Decode ( const char * str , size_t str_len , unsigned char * dst , size_t dst_size , size_t * length ) { sdk_assert ( sdk_sanity_check_null_ptr ( ( void * ) str ) == TS_SUCCESS ) ; sdk_assert ( sdk_sanity_check_null_ptr ( ( void * ) dst ) == TS_SUCCESS ) ; return ats_base64_decode ( str , str_len , dst , dst_size , length ) ? TS_SUCCESS : TS_ERROR ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void moresubs ( struct vars * v , int wanted ) { struct subre * * p ; size_t n ; assert ( wanted > 0 && ( size_t ) wanted >= v -> nsubs ) ; n = ( size_t ) wanted * 3 / 2 + 1 ; if ( v -> subs == v -> sub10 ) { p = ( struct subre * * ) MALLOC ( n * sizeof ( struct subre * ) ) ; if ( p != NULL ) memcpy ( VS ( p ) , VS ( v -> subs ) , v -> nsubs * sizeof ( struct subre * ) ) ; } else p = ( struct subre * * ) REALLOC ( v -> subs , n * sizeof ( struct subre * ) ) ; if ( p == NULL ) { ERR ( REG_ESPACE ) ; return ; } v -> subs = p ; for ( p = & v -> subs [ v -> nsubs ] ; v -> nsubs < n ; p ++ , v -> nsubs ++ ) * p = NULL ; assert ( v -> nsubs == n ) ; assert ( ( size_t ) wanted < v -> nsubs ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) { return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ; } static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) { return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ; } static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) { return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ; } # define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ; typedef const char * OPENSSL_CSTRING ; DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char ) DEFINE_SPECIAL_STACK_OF_CONST ( OPENSSL_CSTRING , char )
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST ( AutocompleteMatchTest , MergeClassifications ) { EXPECT_EQ ( std : : string ( ) , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ACMatchClassifications ( ) , AutocompleteMatch : : ACMatchClassifications ( ) ) ) ) ; EXPECT_EQ ( "0,0" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ClassificationsFromString ( "0,0" ) , AutocompleteMatch : : ACMatchClassifications ( ) ) ) ) ; EXPECT_EQ ( "0,0" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ACMatchClassifications ( ) , AutocompleteMatch : : ClassificationsFromString ( "0,0" ) ) ) ) ; EXPECT_EQ ( "0,1" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ClassificationsFromString ( "0,1" ) , AutocompleteMatch : : ACMatchClassifications ( ) ) ) ) ; EXPECT_EQ ( "0,1" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ACMatchClassifications ( ) , AutocompleteMatch : : ClassificationsFromString ( "0,1" ) ) ) ) ; EXPECT_EQ ( "0,1" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ClassificationsFromString ( "0,0" ) , AutocompleteMatch : : ClassificationsFromString ( "0,1" ) ) ) ) ; EXPECT_EQ ( "0,3," "1,2" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ClassificationsFromString ( "0,1," "1,0" ) , AutocompleteMatch : : ClassificationsFromString ( "0,2" ) ) ) ) ; EXPECT_EQ ( "0,3," "1,2" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ClassificationsFromString ( "0,2" ) , AutocompleteMatch : : ClassificationsFromString ( "0,1," "1,0" ) ) ) ) ; EXPECT_EQ ( "0,3" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ClassificationsFromString ( "0,1," "1,2" ) , AutocompleteMatch : : ClassificationsFromString ( "0,2," "1,1" ) ) ) ) ; EXPECT_EQ ( "0,2," "1,0," "2,1," "4,3," "5,7," "6,3," "7,7," "15,1," "17,0" , AutocompleteMatch : : ClassificationsToString ( AutocompleteMatch : : MergeClassifications ( AutocompleteMatch : : ClassificationsFromString ( "0,0," "2,1," "4,3," "7,7," "10,6," "15,0" ) , AutocompleteMatch : : ClassificationsFromString ( "0,2," "1,0," "5,7," "6,1," "17,0" ) ) ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( ExternalProtocolHandlerTest , TestLaunchSchemeBlockedChromeDefault ) { DoTest ( ExternalProtocolHandler : : BLOCK , shell_integration : : IS_DEFAULT , Action : : BLOCK ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int get_intra_count ( MpegEncContext * s , uint8_t * src , uint8_t * ref , int stride ) { int x , y , w , h ; int acc = 0 ; w = s -> width & ~ 15 ; h = s -> height & ~ 15 ; for ( y = 0 ; y < h ; y += 16 ) { for ( x = 0 ; x < w ; x += 16 ) { int offset = x + y * stride ; int sad = s -> dsp . sad [ 0 ] ( NULL , src + offset , ref + offset , stride , 16 ) ; int mean = ( s -> dsp . pix_sum ( src + offset , stride ) + 128 ) >> 8 ; int sae = get_sae ( src + offset , mean , stride ) ; acc += sae + 500 < sad ; } } return acc ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void exsltMathConstantFunction ( xmlXPathParserContextPtr ctxt , int nargs ) { double ret ; xmlChar * name ; if ( nargs != 2 ) { xmlXPathSetArityError ( ctxt ) ; return ; } ret = xmlXPathPopNumber ( ctxt ) ; if ( xmlXPathCheckError ( ctxt ) ) return ; name = xmlXPathPopString ( ctxt ) ; if ( xmlXPathCheckError ( ctxt ) ) return ; ret = exsltMathConstant ( name , ret ) ; if ( name != NULL ) xmlFree ( name ) ; xmlXPathReturnNumber ( ctxt , ret ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void pdf_run_K ( fz_context * ctx , pdf_processor * proc , float c , float m , float y , float k ) { pdf_run_processor * pr = ( pdf_run_processor * ) proc ; float color [ 4 ] = { c , m , y , k } ; pr -> dev -> flags &= ~ FZ_DEVFLAG_STROKECOLOR_UNDEFINED ; pdf_set_colorspace ( ctx , pr , PDF_STROKE , fz_device_cmyk ( ctx ) ) ; pdf_set_color ( ctx , pr , PDF_STROKE , color ) ; }
0False