instruction
stringclasses
1 value
input
stringlengths
31
235k
output
class label
2 classes
Categorize the following code snippet as vulnerable or not. True or False
int mbfl_oddlen ( mbfl_string * string ) { int len , n , m , k ; unsigned char * p ; const unsigned char * mbtab ; const mbfl_encoding * encoding ; if ( string == NULL ) { return - 1 ; } encoding = mbfl_no2encoding ( string -> no_encoding ) ; if ( encoding == NULL ) { return - 1 ; } len = 0 ; if ( encoding -> flag & MBFL_ENCTYPE_SBCS ) { return 0 ; } else if ( encoding -> flag & ( MBFL_ENCTYPE_WCS2BE | MBFL_ENCTYPE_WCS2LE ) ) { return len % 2 ; } else if ( encoding -> flag & ( MBFL_ENCTYPE_WCS4BE | MBFL_ENCTYPE_WCS4LE ) ) { return len % 4 ; } else if ( encoding -> mblen_table != NULL ) { mbtab = encoding -> mblen_table ; n = 0 ; p = string -> val ; k = string -> len ; if ( p != NULL ) { while ( n < k ) { m = mbtab [ * p ] ; n += m ; p += m ; } ; } return n - k ; } else { return 0 ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dwarf_elf_object_access_get_section_info ( void * obj_in , Dwarf_Half section_index , Dwarf_Obj_Access_Section * ret_scn , int * error ) { dwarf_elf_object_access_internals_t * obj = ( dwarf_elf_object_access_internals_t * ) obj_in ; Elf32_Shdr * shdr32 = 0 ; # ifdef HAVE_ELF64_GETSHDR Elf64_Shdr * shdr64 = 0 ; # endif Elf_Scn * scn = 0 ; scn = elf_getscn ( obj -> elf , section_index ) ; if ( scn == NULL ) { * error = DW_DLE_MDE ; return DW_DLV_ERROR ; } if ( obj -> is_64bit ) { # ifdef HAVE_ELF64_GETSHDR shdr64 = elf64_getshdr ( scn ) ; if ( shdr64 == NULL ) { * error = DW_DLE_ELF_GETSHDR_ERROR ; return DW_DLV_ERROR ; } ret_scn -> type = shdr64 -> sh_type ; ret_scn -> size = shdr64 -> sh_size ; ret_scn -> addr = shdr64 -> sh_addr ; ret_scn -> link = shdr64 -> sh_link ; ret_scn -> info = shdr64 -> sh_info ; ret_scn -> entrysize = shdr64 -> sh_entsize ; ret_scn -> name = elf_strptr ( obj -> elf , obj -> ehdr64 -> e_shstrndx , shdr64 -> sh_name ) ; if ( ret_scn -> name == NULL ) { * error = DW_DLE_ELF_STRPTR_ERROR ; return DW_DLV_ERROR ; } return DW_DLV_OK ; # else * error = DW_DLE_MISSING_ELF64_SUPPORT ; return DW_DLV_ERROR ; # endif } if ( ( shdr32 = elf32_getshdr ( scn ) ) == NULL ) { * error = DW_DLE_ELF_GETSHDR_ERROR ; return DW_DLV_ERROR ; } ret_scn -> type = shdr32 -> sh_type ; ret_scn -> size = shdr32 -> sh_size ; ret_scn -> addr = shdr32 -> sh_addr ; ret_scn -> link = shdr32 -> sh_link ; ret_scn -> info = shdr32 -> sh_info ; ret_scn -> entrysize = shdr32 -> sh_entsize ; ret_scn -> name = elf_strptr ( obj -> elf , obj -> ehdr32 -> e_shstrndx , shdr32 -> sh_name ) ; if ( ret_scn -> name == NULL ) { * error = DW_DLE_ELF_STRPTR_ERROR ; return DW_DLV_ERROR ; } return DW_DLV_OK ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
xmlRegisterNodeFunc * __xmlRegisterNodeDefaultValue ( void ) { if ( IS_MAIN_THREAD ) return ( & xmlRegisterNodeDefaultValue ) ; else return ( & xmlGetGlobalState ( ) -> xmlRegisterNodeDefaultValue ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static uint64_t vmport_ioport_read ( void * opaque , hwaddr addr , unsigned size ) { VMPortState * s = opaque ; CPUX86State * env = cpu_single_env ; unsigned char command ; uint32_t eax ; cpu_synchronize_state ( CPU ( x86_env_get_cpu ( env ) ) ) ; eax = env -> regs [ R_EAX ] ; if ( eax != VMPORT_MAGIC ) return eax ; command = env -> regs [ R_ECX ] ; if ( command >= VMPORT_ENTRIES ) return eax ; if ( ! s -> func [ command ] ) { # ifdef VMPORT_DEBUG fprintf ( stderr , "vmport: unknown command %x\n" , command ) ; # endif return eax ; } return s -> func [ command ] ( s -> opaque [ command ] , addr ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static int selinux_sb_remount ( struct super_block * sb , void * data ) { int rc , i , * flags ; struct security_mnt_opts opts ; char * secdata , * * mount_options ; struct superblock_security_struct * sbsec = sb -> s_security ; if ( ! ( sbsec -> flags & SE_SBINITIALIZED ) ) return 0 ; if ( ! data ) return 0 ; if ( sb -> s_type -> fs_flags & FS_BINARY_MOUNTDATA ) return 0 ; security_init_mnt_opts ( & opts ) ; secdata = alloc_secdata ( ) ; if ( ! secdata ) return - ENOMEM ; rc = selinux_sb_copy_data ( data , secdata ) ; if ( rc ) goto out_free_secdata ; rc = selinux_parse_opts_str ( secdata , & opts ) ; if ( rc ) goto out_free_secdata ; mount_options = opts . mnt_opts ; flags = opts . mnt_opts_flags ; for ( i = 0 ; i < opts . num_mnt_opts ; i ++ ) { u32 sid ; if ( flags [ i ] == SBLABEL_MNT ) continue ; rc = security_context_str_to_sid ( mount_options [ i ] , & sid , GFP_KERNEL ) ; if ( rc ) { printk ( KERN_WARNING "SELinux: security_context_str_to_sid" "(%s) failed for (dev %s, type %s) errno=%d\n" , mount_options [ i ] , sb -> s_id , sb -> s_type -> name , rc ) ; goto out_free_opts ; } rc = - EINVAL ; switch ( flags [ i ] ) { case FSCONTEXT_MNT : if ( bad_option ( sbsec , FSCONTEXT_MNT , sbsec -> sid , sid ) ) goto out_bad_option ; break ; case CONTEXT_MNT : if ( bad_option ( sbsec , CONTEXT_MNT , sbsec -> mntpoint_sid , sid ) ) goto out_bad_option ; break ; case ROOTCONTEXT_MNT : { struct inode_security_struct * root_isec ; root_isec = backing_inode_security ( sb -> s_root ) ; if ( bad_option ( sbsec , ROOTCONTEXT_MNT , root_isec -> sid , sid ) ) goto out_bad_option ; break ; } case DEFCONTEXT_MNT : if ( bad_option ( sbsec , DEFCONTEXT_MNT , sbsec -> def_sid , sid ) ) goto out_bad_option ; break ; default : goto out_free_opts ; } } rc = 0 ; out_free_opts : security_free_mnt_opts ( & opts ) ; out_free_secdata : free_secdata ( secdata ) ; return rc ; out_bad_option : printk ( KERN_WARNING "SELinux: unable to change security options " "during remount (dev %s, type=%s)\n" , sb -> s_id , sb -> s_type -> name ) ; goto out_free_opts ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int mpc8_get_mask ( GetBitContext * gb , int size , int t ) { int mask = 0 ; if ( t && t != size ) mask = mpc8_dec_enum ( gb , FFMIN ( t , size - t ) , size ) ; if ( ( t << 1 ) > size ) mask = ~ mask ; return mask ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void ctl_putsys ( int varid ) { l_fp tmp ; char str [ 256 ] ; u_int u ; double kb ; double dtemp ; const char * ss ; # ifdef AUTOKEY struct cert_info * cp ; # endif # ifdef KERNEL_PLL static struct timex ntx ; static u_long ntp_adjtime_time ; static const double to_ms = # ifdef STA_NANO 1.0e-6 ; # else 1.0e-3 ; # endif if ( CS_KERN_FIRST <= varid && varid <= CS_KERN_LAST && current_time != ntp_adjtime_time ) { ZERO ( ntx ) ; if ( ntp_adjtime ( & ntx ) < 0 ) msyslog ( LOG_ERR , "ntp_adjtime() for mode 6 query failed: %m" ) ; else ntp_adjtime_time = current_time ; } # endif switch ( varid ) { case CS_LEAP : ctl_putuint ( sys_var [ CS_LEAP ] . text , sys_leap ) ; break ; case CS_STRATUM : ctl_putuint ( sys_var [ CS_STRATUM ] . text , sys_stratum ) ; break ; case CS_PRECISION : ctl_putint ( sys_var [ CS_PRECISION ] . text , sys_precision ) ; break ; case CS_ROOTDELAY : ctl_putdbl ( sys_var [ CS_ROOTDELAY ] . text , sys_rootdelay * 1e3 ) ; break ; case CS_ROOTDISPERSION : ctl_putdbl ( sys_var [ CS_ROOTDISPERSION ] . text , sys_rootdisp * 1e3 ) ; break ; case CS_REFID : if ( sys_stratum > 1 && sys_stratum < STRATUM_UNSPEC ) ctl_putadr ( sys_var [ varid ] . text , sys_refid , NULL ) ; else ctl_putrefid ( sys_var [ varid ] . text , sys_refid ) ; break ; case CS_REFTIME : ctl_putts ( sys_var [ CS_REFTIME ] . text , & sys_reftime ) ; break ; case CS_POLL : ctl_putuint ( sys_var [ CS_POLL ] . text , sys_poll ) ; break ; case CS_PEERID : if ( sys_peer == NULL ) ctl_putuint ( sys_var [ CS_PEERID ] . text , 0 ) ; else ctl_putuint ( sys_var [ CS_PEERID ] . text , sys_peer -> associd ) ; break ; case CS_PEERADR : if ( sys_peer != NULL && sys_peer -> dstadr != NULL ) ss = sptoa ( & sys_peer -> srcadr ) ; else ss = "0.0.0.0:0" ; ctl_putunqstr ( sys_var [ CS_PEERADR ] . text , ss , strlen ( ss ) ) ; break ; case CS_PEERMODE : u = ( sys_peer != NULL ) ? sys_peer -> hmode : MODE_UNSPEC ; ctl_putuint ( sys_var [ CS_PEERMODE ] . text , u ) ; break ; case CS_OFFSET : ctl_putdbl6 ( sys_var [ CS_OFFSET ] . text , last_offset * 1e3 ) ; break ; case CS_DRIFT : ctl_putdbl ( sys_var [ CS_DRIFT ] . text , drift_comp * 1e6 ) ; break ; case CS_JITTER : ctl_putdbl6 ( sys_var [ CS_JITTER ] . text , sys_jitter * 1e3 ) ; break ; case CS_ERROR : ctl_putdbl ( sys_var [ CS_ERROR ] . text , clock_jitter * 1e3 ) ; break ; case CS_CLOCK : get_systime ( & tmp ) ; ctl_putts ( sys_var [ CS_CLOCK ] . text , & tmp ) ; break ; case CS_PROCESSOR : # ifndef HAVE_UNAME ctl_putstr ( sys_var [ CS_PROCESSOR ] . text , str_processor , sizeof ( str_processor ) - 1 ) ; # else ctl_putstr ( sys_var [ CS_PROCESSOR ] . text , utsnamebuf . machine , strlen ( utsnamebuf . machine ) ) ; # endif break ; case CS_SYSTEM : # ifndef HAVE_UNAME ctl_putstr ( sys_var [ CS_SYSTEM ] . text , str_system , sizeof ( str_system ) - 1 ) ; # else snprintf ( str , sizeof ( str ) , "%s/%s" , utsnamebuf . sysname , utsnamebuf . release ) ; ctl_putstr ( sys_var [ CS_SYSTEM ] . text , str , strlen ( str ) ) ; # endif break ; case CS_VERSION : ctl_putstr ( sys_var [ CS_VERSION ] . text , Version , strlen ( Version ) ) ; break ; case CS_STABIL : ctl_putdbl ( sys_var [ CS_STABIL ] . text , clock_stability * 1e6 ) ; break ; case CS_VARLIST : { char buf [ CTL_MAX_DATA_LEN ] ; char * buffp , * buffend ; int firstVarName ; const char * ss1 ; int len ; const struct ctl_var * k ; buffp = buf ; buffend = buf + sizeof ( buf ) ; if ( buffp + strlen ( sys_var [ CS_VARLIST ] . text ) + 4 > buffend ) break ; snprintf ( buffp , sizeof ( buf ) , "%s=\"" , sys_var [ CS_VARLIST ] . text ) ; buffp += strlen ( buffp ) ; firstVarName = TRUE ; for ( k = sys_var ; ! ( k -> flags & EOV ) ; k ++ ) { if ( k -> flags & PADDING ) continue ; len = strlen ( k -> text ) ; if ( buffp + len + 1 >= buffend ) break ; if ( ! firstVarName ) * buffp ++ = ',' ; else firstVarName = FALSE ; memcpy ( buffp , k -> text , len ) ; buffp += len ; } for ( k = ext_sys_var ; k && ! ( k -> flags & EOV ) ; k ++ ) { if ( k -> flags & PADDING ) continue ; if ( NULL == k -> text ) continue ; ss1 = strchr ( k -> text , '=' ) ; if ( NULL == ss1 ) len = strlen ( k -> text ) ; else len = ss1 - k -> text ; if ( buffp + len + 1 >= buffend ) break ; if ( firstVarName ) { * buffp ++ = ',' ; firstVarName = FALSE ; } memcpy ( buffp , k -> text , ( unsigned ) len ) ; buffp += len ; } if ( buffp + 2 >= buffend ) break ; * buffp ++ = '"' ; * buffp = '\0' ; ctl_putdata ( buf , ( unsigned ) ( buffp - buf ) , 0 ) ; break ; } case CS_TAI : if ( sys_tai > 0 ) ctl_putuint ( sys_var [ CS_TAI ] . text , sys_tai ) ; break ; case CS_LEAPTAB : { leap_signature_t lsig ; leapsec_getsig ( & lsig ) ; if ( lsig . ttime > 0 ) ctl_putfs ( sys_var [ CS_LEAPTAB ] . text , lsig . ttime ) ; break ; } case CS_LEAPEND : { leap_signature_t lsig ; leapsec_getsig ( & lsig ) ; if ( lsig . etime > 0 ) ctl_putfs ( sys_var [ CS_LEAPEND ] . text , lsig . etime ) ; break ; } # ifdef LEAP_SMEAR case CS_LEAPSMEARINTV : if ( leap_smear_intv > 0 ) ctl_putuint ( sys_var [ CS_LEAPSMEARINTV ] . text , leap_smear_intv ) ; break ; case CS_LEAPSMEAROFFS : if ( leap_smear_intv > 0 ) ctl_putdbl ( sys_var [ CS_LEAPSMEAROFFS ] . text , leap_smear . doffset * 1e3 ) ; break ; # endif case CS_RATE : ctl_putuint ( sys_var [ CS_RATE ] . text , ntp_minpoll ) ; break ; case CS_MRU_ENABLED : ctl_puthex ( sys_var [ varid ] . text , mon_enabled ) ; break ; case CS_MRU_DEPTH : ctl_putuint ( sys_var [ varid ] . text , mru_entries ) ; break ; case CS_MRU_MEM : kb = mru_entries * ( sizeof ( mon_entry ) / 1024. ) ; u = ( u_int ) kb ; if ( kb - u >= 0.5 ) u ++ ; ctl_putuint ( sys_var [ varid ] . text , u ) ; break ; case CS_MRU_DEEPEST : ctl_putuint ( sys_var [ varid ] . text , mru_peakentries ) ; break ; case CS_MRU_MINDEPTH : ctl_putuint ( sys_var [ varid ] . text , mru_mindepth ) ; break ; case CS_MRU_MAXAGE : ctl_putint ( sys_var [ varid ] . text , mru_maxage ) ; break ; case CS_MRU_MAXDEPTH : ctl_putuint ( sys_var [ varid ] . text , mru_maxdepth ) ; break ; case CS_MRU_MAXMEM : kb = mru_maxdepth * ( sizeof ( mon_entry ) / 1024. ) ; u = ( u_int ) kb ; if ( kb - u >= 0.5 ) u ++ ; ctl_putuint ( sys_var [ varid ] . text , u ) ; break ; case CS_SS_UPTIME : ctl_putuint ( sys_var [ varid ] . text , current_time ) ; break ; case CS_SS_RESET : ctl_putuint ( sys_var [ varid ] . text , current_time - sys_stattime ) ; break ; case CS_SS_RECEIVED : ctl_putuint ( sys_var [ varid ] . text , sys_received ) ; break ; case CS_SS_THISVER : ctl_putuint ( sys_var [ varid ] . text , sys_newversion ) ; break ; case CS_SS_OLDVER : ctl_putuint ( sys_var [ varid ] . text , sys_oldversion ) ; break ; case CS_SS_BADFORMAT : ctl_putuint ( sys_var [ varid ] . text , sys_badlength ) ; break ; case CS_SS_BADAUTH : ctl_putuint ( sys_var [ varid ] . text , sys_badauth ) ; break ; case CS_SS_DECLINED : ctl_putuint ( sys_var [ varid ] . text , sys_declined ) ; break ; case CS_SS_RESTRICTED : ctl_putuint ( sys_var [ varid ] . text , sys_restricted ) ; break ; case CS_SS_LIMITED : ctl_putuint ( sys_var [ varid ] . text , sys_limitrejected ) ; break ; case CS_SS_KODSENT : ctl_putuint ( sys_var [ varid ] . text , sys_kodsent ) ; break ; case CS_SS_PROCESSED : ctl_putuint ( sys_var [ varid ] . text , sys_processed ) ; break ; case CS_BCASTDELAY : ctl_putdbl ( sys_var [ varid ] . text , sys_bdelay * 1e3 ) ; break ; case CS_AUTHDELAY : LFPTOD ( & sys_authdelay , dtemp ) ; ctl_putdbl ( sys_var [ varid ] . text , dtemp * 1e3 ) ; break ; case CS_AUTHKEYS : ctl_putuint ( sys_var [ varid ] . text , authnumkeys ) ; break ; case CS_AUTHFREEK : ctl_putuint ( sys_var [ varid ] . text , authnumfreekeys ) ; break ; case CS_AUTHKLOOKUPS : ctl_putuint ( sys_var [ varid ] . text , authkeylookups ) ; break ; case CS_AUTHKNOTFOUND : ctl_putuint ( sys_var [ varid ] . text , authkeynotfound ) ; break ; case CS_AUTHKUNCACHED : ctl_putuint ( sys_var [ varid ] . text , authkeyuncached ) ; break ; case CS_AUTHKEXPIRED : ctl_putuint ( sys_var [ varid ] . text , authkeyexpired ) ; break ; case CS_AUTHENCRYPTS : ctl_putuint ( sys_var [ varid ] . text , authencryptions ) ; break ; case CS_AUTHDECRYPTS : ctl_putuint ( sys_var [ varid ] . text , authdecryptions ) ; break ; case CS_AUTHRESET : ctl_putuint ( sys_var [ varid ] . text , current_time - auth_timereset ) ; break ; # ifndef KERNEL_PLL # define CTL_IF_KERNLOOP ( putfunc , args ) ctl_putint ( sys_var [ varid ] . text , 0 ) # else # define CTL_IF_KERNLOOP ( putfunc , args ) putfunc args # endif # ifndef KERNEL_PLL # define CTL_IF_KERNPPS ( putfunc , args ) ctl_putint ( sys_var [ varid ] . text , 0 ) # else # define CTL_IF_KERNPPS ( putfunc , args ) if ( 0 == ntx . shift ) ctl_putint ( sys_var [ varid ] . text , 0 ) ; else putfunc args # endif case CS_K_OFFSET : CTL_IF_KERNLOOP ( ctl_putdblf , ( sys_var [ varid ] . text , 0 , - 1 , to_ms * ntx . offset ) ) ; break ; case CS_K_FREQ : CTL_IF_KERNLOOP ( ctl_putsfp , ( sys_var [ varid ] . text , ntx . freq ) ) ; break ; case CS_K_MAXERR : CTL_IF_KERNLOOP ( ctl_putdblf , ( sys_var [ varid ] . text , 0 , 6 , to_ms * ntx . maxerror ) ) ; break ; case CS_K_ESTERR : CTL_IF_KERNLOOP ( ctl_putdblf , ( sys_var [ varid ] . text , 0 , 6 , to_ms * ntx . esterror ) ) ; break ; case CS_K_STFLAGS : # ifndef KERNEL_PLL ss = "" ; # else ss = k_st_flags ( ntx . status ) ; # endif ctl_putstr ( sys_var [ varid ] . text , ss , strlen ( ss ) ) ; break ; case CS_K_TIMECONST : CTL_IF_KERNLOOP ( ctl_putint , ( sys_var [ varid ] . text , ntx . constant ) ) ; break ; case CS_K_PRECISION : CTL_IF_KERNLOOP ( ctl_putdblf , ( sys_var [ varid ] . text , 0 , 6 , to_ms * ntx . precision ) ) ; break ; case CS_K_FREQTOL : CTL_IF_KERNLOOP ( ctl_putsfp , ( sys_var [ varid ] . text , ntx . tolerance ) ) ; break ; case CS_K_PPS_FREQ : CTL_IF_KERNPPS ( ctl_putsfp , ( sys_var [ varid ] . text , ntx . ppsfreq ) ) ; break ; case CS_K_PPS_STABIL : CTL_IF_KERNPPS ( ctl_putsfp , ( sys_var [ varid ] . text , ntx . stabil ) ) ; break ; case CS_K_PPS_JITTER : CTL_IF_KERNPPS ( ctl_putdbl , ( sys_var [ varid ] . text , to_ms * ntx . jitter ) ) ; break ; case CS_K_PPS_CALIBDUR : CTL_IF_KERNPPS ( ctl_putint , ( sys_var [ varid ] . text , 1 << ntx . shift ) ) ; break ; case CS_K_PPS_CALIBS : CTL_IF_KERNPPS ( ctl_putint , ( sys_var [ varid ] . text , ntx . calcnt ) ) ; break ; case CS_K_PPS_CALIBERRS : CTL_IF_KERNPPS ( ctl_putint , ( sys_var [ varid ] . text , ntx . errcnt ) ) ; break ; case CS_K_PPS_JITEXC : CTL_IF_KERNPPS ( ctl_putint , ( sys_var [ varid ] . text , ntx . jitcnt ) ) ; break ; case CS_K_PPS_STBEXC : CTL_IF_KERNPPS ( ctl_putint , ( sys_var [ varid ] . text , ntx . stbcnt ) ) ; break ; case CS_IOSTATS_RESET : ctl_putuint ( sys_var [ varid ] . text , current_time - io_timereset ) ; break ; case CS_TOTAL_RBUF : ctl_putuint ( sys_var [ varid ] . text , total_recvbuffs ( ) ) ; break ; case CS_FREE_RBUF : ctl_putuint ( sys_var [ varid ] . text , free_recvbuffs ( ) ) ; break ; case CS_USED_RBUF : ctl_putuint ( sys_var [ varid ] . text , full_recvbuffs ( ) ) ; break ; case CS_RBUF_LOWATER : ctl_putuint ( sys_var [ varid ] . text , lowater_additions ( ) ) ; break ; case CS_IO_DROPPED : ctl_putuint ( sys_var [ varid ] . text , packets_dropped ) ; break ; case CS_IO_IGNORED : ctl_putuint ( sys_var [ varid ] . text , packets_ignored ) ; break ; case CS_IO_RECEIVED : ctl_putuint ( sys_var [ varid ] . text , packets_received ) ; break ; case CS_IO_SENT : ctl_putuint ( sys_var [ varid ] . text , packets_sent ) ; break ; case CS_IO_SENDFAILED : ctl_putuint ( sys_var [ varid ] . text , packets_notsent ) ; break ; case CS_IO_WAKEUPS : ctl_putuint ( sys_var [ varid ] . text , handler_calls ) ; break ; case CS_IO_GOODWAKEUPS : ctl_putuint ( sys_var [ varid ] . text , handler_pkts ) ; break ; case CS_TIMERSTATS_RESET : ctl_putuint ( sys_var [ varid ] . text , current_time - timer_timereset ) ; break ; case CS_TIMER_OVERRUNS : ctl_putuint ( sys_var [ varid ] . text , alarm_overflow ) ; break ; case CS_TIMER_XMTS : ctl_putuint ( sys_var [ varid ] . text , timer_xmtcalls ) ; break ; case CS_FUZZ : ctl_putdbl ( sys_var [ varid ] . text , sys_fuzz * 1e3 ) ; break ; case CS_WANDER_THRESH : ctl_putdbl ( sys_var [ varid ] . text , wander_threshold * 1e6 ) ; break ; # ifdef AUTOKEY case CS_FLAGS : if ( crypto_flags ) ctl_puthex ( sys_var [ CS_FLAGS ] . text , crypto_flags ) ; break ; case CS_DIGEST : if ( crypto_flags ) { strlcpy ( str , OBJ_nid2ln ( crypto_nid ) , COUNTOF ( str ) ) ; ctl_putstr ( sys_var [ CS_DIGEST ] . text , str , strlen ( str ) ) ; } break ; case CS_SIGNATURE : if ( crypto_flags ) { const EVP_MD * dp ; dp = EVP_get_digestbynid ( crypto_flags >> 16 ) ; strlcpy ( str , OBJ_nid2ln ( EVP_MD_pkey_type ( dp ) ) , COUNTOF ( str ) ) ; ctl_putstr ( sys_var [ CS_SIGNATURE ] . text , str , strlen ( str ) ) ; } break ; case CS_HOST : if ( hostval . ptr != NULL ) ctl_putstr ( sys_var [ CS_HOST ] . text , hostval . ptr , strlen ( hostval . ptr ) ) ; break ; case CS_IDENT : if ( sys_ident != NULL ) ctl_putstr ( sys_var [ CS_IDENT ] . text , sys_ident , strlen ( sys_ident ) ) ; break ; case CS_CERTIF : for ( cp = cinfo ; cp != NULL ; cp = cp -> link ) { snprintf ( str , sizeof ( str ) , "%s %s 0x%x" , cp -> subject , cp -> issuer , cp -> flags ) ; ctl_putstr ( sys_var [ CS_CERTIF ] . text , str , strlen ( str ) ) ; ctl_putcal ( sys_var [ CS_REVTIME ] . text , & ( cp -> last ) ) ; } break ; case CS_PUBLIC : if ( hostval . tstamp != 0 ) ctl_putfs ( sys_var [ CS_PUBLIC ] . text , ntohl ( hostval . tstamp ) ) ; break ; # endif default : break ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
int decodets ( char * str , l_fp * lfp ) { char * cp ; char buf [ 30 ] ; size_t b ; if ( * str == '0' && ( * ( str + 1 ) == 'x' || * ( str + 1 ) == 'X' ) ) return hextolfp ( str + 2 , lfp ) ; if ( * str == '"' ) { cp = str + 1 ; b = 0 ; while ( '"' != * cp && '\0' != * cp && b < COUNTOF ( buf ) - 1 ) buf [ b ++ ] = * cp ++ ; buf [ b ] = '\0' ; return rtdatetolfp ( buf , lfp ) ; } if ( ( * str >= 'A' && * str <= 'F' ) || ( * str >= 'a' && * str <= 'f' ) ) return hextolfp ( str , lfp ) ; if ( atolfp ( str , lfp ) ) return 1 ; return rtdatetolfp ( str , lfp ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void option_error_reporter ( enum loglevel level , const char * format , ... ) { va_list args ; va_start ( args , format ) ; if ( level == ERROR_LEVEL || ! opt_bootstrap || global_system_variables . log_warnings ) { vprint_msg_to_log ( level , format , args ) ; } va_end ( args ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static char * fix_path_separator ( char * path ) { # ifdef WIN32 char * result ; char * c ; result = pg_strdup ( path ) ; for ( c = result ; * c != '\0' ; c ++ ) if ( * c == '/' ) * c = '\\' ; return result ; # else return path ; # endif }
0False
Categorize the following code snippet as vulnerable or not. True or False
void name ## _free ( type * a ) ; # define DECLARE_ASN1_PRINT_FUNCTION ( stname ) DECLARE_ASN1_PRINT_FUNCTION_fname ( stname , stname ) # define DECLARE_ASN1_PRINT_FUNCTION_fname ( stname , fname ) int fname ## _print_ctx ( BIO * out , stname * x , int indent , const ASN1_PCTX * pctx ) ; # define D2I_OF ( type ) type * ( * ) ( type * * , const unsigned char * * , long ) # define I2D_OF ( type ) int ( * ) ( type * , unsigned char * * ) # define I2D_OF_const ( type ) int ( * ) ( const type * , unsigned char * * ) # define CHECKED_D2I_OF ( type , d2i ) ( ( d2i_of_void * ) ( 1 ? d2i : ( ( D2I_OF ( type ) ) 0 ) ) ) # define CHECKED_I2D_OF ( type , i2d ) ( ( i2d_of_void * ) ( 1 ? i2d : ( ( I2D_OF ( type ) ) 0 ) ) ) # define CHECKED_NEW_OF ( type , xnew ) ( ( void * ( * ) ( void ) ) ( 1 ? xnew : ( ( type * ( * ) ( void ) ) 0 ) ) ) # define CHECKED_PTR_OF ( type , p ) ( ( void * ) ( 1 ? p : ( type * ) 0 ) ) # define CHECKED_PPTR_OF ( type , p ) ( ( void * * ) ( 1 ? p : ( type * * ) 0 ) ) # define TYPEDEF_D2I_OF ( type ) typedef type * d2i_of_ ## type ( type * * , const unsigned char * * , long ) # define TYPEDEF_I2D_OF ( type ) typedef int i2d_of_ ## type ( type * , unsigned char * * ) # define TYPEDEF_D2I2D_OF ( type ) TYPEDEF_D2I_OF ( type ) ; TYPEDEF_I2D_OF ( type ) TYPEDEF_D2I2D_OF ( void ) ; # ifndef OPENSSL_EXPORT_VAR_AS_FUNCTION typedef const ASN1_ITEM ASN1_ITEM_EXP ; # define ASN1_ITEM_ptr ( iptr ) ( iptr ) # define ASN1_ITEM_ref ( iptr ) ( & ( iptr ## _it ) ) # define ASN1_ITEM_rptr ( ref ) ( & ( ref ## _it ) ) # define DECLARE_ASN1_ITEM ( name ) OPENSSL_EXTERN const ASN1_ITEM name ## _it ; # else typedef const ASN1_ITEM * ASN1_ITEM_EXP ( void ) ; # define ASN1_ITEM_ptr ( iptr ) ( iptr ( ) ) # define ASN1_ITEM_ref ( iptr ) ( iptr ## _it ) # define ASN1_ITEM_rptr ( ref ) ( ref ## _it ( ) ) # define DECLARE_ASN1_ITEM ( name ) const ASN1_ITEM * name ## _it ( void ) ; # endif # define ASN1_STRFLGS_ESC_2253 1 # define ASN1_STRFLGS_ESC_CTRL 2 # define ASN1_STRFLGS_ESC_MSB 4 # define ASN1_STRFLGS_ESC_QUOTE 8 # define CHARTYPE_PRINTABLESTRING 0x10 # define CHARTYPE_FIRST_ESC_2253 0x20 # define CHARTYPE_LAST_ESC_2253 0x40 # define ASN1_STRFLGS_UTF8_CONVERT 0x10 # define ASN1_STRFLGS_IGNORE_TYPE 0x20 # define ASN1_STRFLGS_SHOW_TYPE 0x40 # define ASN1_STRFLGS_DUMP_ALL 0x80 # define ASN1_STRFLGS_DUMP_UNKNOWN 0x100 # define ASN1_STRFLGS_DUMP_DER 0x200 # define ASN1_STRFLGS_ESC_2254 0x400 # define ASN1_STRFLGS_RFC2253 ( ASN1_STRFLGS_ESC_2253 | ASN1_STRFLGS_ESC_CTRL | ASN1_STRFLGS_ESC_MSB | ASN1_STRFLGS_UTF8_CONVERT | ASN1_STRFLGS_DUMP_UNKNOWN | ASN1_STRFLGS_DUMP_DER ) DEFINE_STACK_OF ( ASN1_INTEGER ) DEFINE_STACK_OF ( ASN1_GENERALSTRING ) DEFINE_STACK_OF ( ASN1_UTF8STRING ) typedef struct asn1_type_st { int type ; union { char * ptr ; ASN1_BOOLEAN boolean ; ASN1_STRING * asn1_string ; ASN1_OBJECT * object ; ASN1_INTEGER * integer ; ASN1_ENUMERATED * enumerated ; ASN1_BIT_STRING * bit_string ; ASN1_OCTET_STRING * octet_string ; ASN1_PRINTABLESTRING * printablestring ; ASN1_T61STRING * t61string ; ASN1_IA5STRING * ia5string ; ASN1_GENERALSTRING * generalstring ; ASN1_BMPSTRING * bmpstring ; ASN1_UNIVERSALSTRING * universalstring ; ASN1_UTCTIME * utctime ; ASN1_GENERALIZEDTIME * generalizedtime ; ASN1_VISIBLESTRING * visiblestring ; ASN1_UTF8STRING * utf8string ; ASN1_STRING * set ; ASN1_STRING * sequence ; ASN1_VALUE * asn1_value ; } value ; } ASN1_TYPE ; DEFINE_STACK_OF ( ASN1_TYPE ) typedef STACK_OF ( ASN1_TYPE ) ASN1_SEQUENCE_ANY ; DECLARE_ASN1_ENCODE_FUNCTIONS_const ( ASN1_SEQUENCE_ANY , ASN1_SEQUENCE_ANY ) DECLARE_ASN1_ENCODE_FUNCTIONS_const ( ASN1_SEQUENCE_ANY , ASN1_SET_ANY ) typedef struct BIT_STRING_BITNAME_st { int bitnum ; const char * lname ; const char * sname ; } BIT_STRING_BITNAME ; # define B_ASN1_TIME B_ASN1_UTCTIME | B_ASN1_GENERALIZEDTIME # define B_ASN1_PRINTABLE B_ASN1_NUMERICSTRING | B_ASN1_PRINTABLESTRING | B_ASN1_T61STRING | B_ASN1_IA5STRING | B_ASN1_BIT_STRING | B_ASN1_UNIVERSALSTRING | B_ASN1_BMPSTRING | B_ASN1_UTF8STRING | B_ASN1_SEQUENCE | B_ASN1_UNKNOWN # define B_ASN1_DIRECTORYSTRING B_ASN1_PRINTABLESTRING | B_ASN1_TELETEXSTRING | B_ASN1_BMPSTRING | B_ASN1_UNIVERSALSTRING | B_ASN1_UTF8STRING # define B_ASN1_DISPLAYTEXT B_ASN1_IA5STRING | B_ASN1_VISIBLESTRING | B_ASN1_BMPSTRING | B_ASN1_UTF8STRING DECLARE_ASN1_FUNCTIONS_fname ( ASN1_TYPE , ASN1_ANY , ASN1_TYPE ) int ASN1_TYPE_get ( const ASN1_TYPE * a ) ; void ASN1_TYPE_set ( ASN1_TYPE * a , int type , void * value ) ; int ASN1_TYPE_set1 ( ASN1_TYPE * a , int type , const void * value ) ; int ASN1_TYPE_cmp ( const ASN1_TYPE * a , const ASN1_TYPE * b ) ; ASN1_TYPE * ASN1_TYPE_pack_sequence ( const ASN1_ITEM * it , void * s , ASN1_TYPE * * t ) ; void * ASN1_TYPE_unpack_sequence ( const ASN1_ITEM * it , const ASN1_TYPE * t ) ; ASN1_OBJECT * ASN1_OBJECT_new ( void ) ; void ASN1_OBJECT_free ( ASN1_OBJECT * a ) ; int i2d_ASN1_OBJECT ( const ASN1_OBJECT * a , unsigned char * * pp ) ; ASN1_OBJECT * d2i_ASN1_OBJECT ( ASN1_OBJECT * * a , const unsigned char * * pp , long length ) ; DECLARE_ASN1_ITEM ( ASN1_OBJECT ) DEFINE_STACK_OF ( ASN1_OBJECT ) ASN1_STRING * ASN1_STRING_new ( void ) ; void ASN1_STRING_free ( ASN1_STRING * a ) ; void ASN1_STRING_clear_free ( ASN1_STRING * a ) ; int ASN1_STRING_copy ( ASN1_STRING * dst , const ASN1_STRING * str ) ; ASN1_STRING * ASN1_STRING_dup ( const ASN1_STRING * a ) ; ASN1_STRING * ASN1_STRING_type_new ( int type ) ; int ASN1_STRING_cmp ( const ASN1_STRING * a , const ASN1_STRING * b ) ; int ASN1_STRING_set ( ASN1_STRING * str , const void * data , int len ) ; void ASN1_STRING_set0 ( ASN1_STRING * str , void * data , int len ) ; int ASN1_STRING_length ( const ASN1_STRING * x ) ; void ASN1_STRING_length_set ( ASN1_STRING * x , int n ) ; int ASN1_STRING_type ( const ASN1_STRING * x ) ; DEPRECATEDIN_1_1_0 ( unsigned char * ASN1_STRING_data ( ASN1_STRING * x ) ) const unsigned char * ASN1_STRING_get0_data ( const ASN1_STRING * x ) ; DECLARE_ASN1_FUNCTIONS ( ASN1_BIT_STRING ) int ASN1_BIT_STRING_set ( ASN1_BIT_STRING * a , unsigned char * d , int length ) ; int ASN1_BIT_STRING_set_bit ( ASN1_BIT_STRING * a , int n , int value ) ; int ASN1_BIT_STRING_get_bit ( const ASN1_BIT_STRING * a , int n ) ; int ASN1_BIT_STRING_check ( const ASN1_BIT_STRING * a , const unsigned char * flags , int flags_len ) ; int ASN1_BIT_STRING_name_print ( BIO * out , ASN1_BIT_STRING * bs , BIT_STRING_BITNAME * tbl , int indent ) ; int ASN1_BIT_STRING_num_asc ( const char * name , BIT_STRING_BITNAME * tbl ) ; int ASN1_BIT_STRING_set_asc ( ASN1_BIT_STRING * bs , const char * name , int value , BIT_STRING_BITNAME * tbl ) ; DECLARE_ASN1_FUNCTIONS ( ASN1_INTEGER ) ASN1_INTEGER * d2i_ASN1_UINTEGER ( ASN1_INTEGER * * a , const unsigned char * * pp , long length ) ; ASN1_INTEGER * ASN1_INTEGER_dup ( const ASN1_INTEGER * x ) ; int ASN1_INTEGER_cmp ( const ASN1_INTEGER * x , const ASN1_INTEGER * y ) ; DECLARE_ASN1_FUNCTIONS ( ASN1_ENUMERATED ) int ASN1_UTCTIME_check ( const ASN1_UTCTIME * a ) ; ASN1_UTCTIME * ASN1_UTCTIME_set ( ASN1_UTCTIME * s , time_t t ) ; ASN1_UTCTIME * ASN1_UTCTIME_adj ( ASN1_UTCTIME * s , time_t t , int offset_day , long offset_sec ) ; int ASN1_UTCTIME_set_string ( ASN1_UTCTIME * s , const char * str ) ; int ASN1_UTCTIME_cmp_time_t ( const ASN1_UTCTIME * s , time_t t ) ; int ASN1_GENERALIZEDTIME_check ( const ASN1_GENERALIZEDTIME * a ) ; ASN1_GENERALIZEDTIME * ASN1_GENERALIZEDTIME_set ( ASN1_GENERALIZEDTIME * s , time_t t ) ; ASN1_GENERALIZEDTIME * ASN1_GENERALIZEDTIME_adj ( ASN1_GENERALIZEDTIME * s , time_t t , int offset_day , long offset_sec ) ; int ASN1_GENERALIZEDTIME_set_string ( ASN1_GENERALIZEDTIME * s , const char * str ) ; int ASN1_TIME_diff ( int * pday , int * psec , const ASN1_TIME * from , const ASN1_TIME * to ) ; DECLARE_ASN1_FUNCTIONS ( ASN1_OCTET_STRING ) ASN1_OCTET_STRING * ASN1_OCTET_STRING_dup ( const ASN1_OCTET_STRING * a ) ; int ASN1_OCTET_STRING_cmp ( const ASN1_OCTET_STRING * a , const ASN1_OCTET_STRING * b ) ; int ASN1_OCTET_STRING_set ( ASN1_OCTET_STRING * str , const unsigned char * data , int len ) ; DECLARE_ASN1_FUNCTIONS ( ASN1_VISIBLESTRING ) DECLARE_ASN1_FUNCTIONS ( ASN1_UNIVERSALSTRING ) DECLARE_ASN1_FUNCTIONS ( ASN1_UTF8STRING ) DECLARE_ASN1_FUNCTIONS ( ASN1_NULL ) DECLARE_ASN1_FUNCTIONS ( ASN1_BMPSTRING ) int UTF8_getc ( const unsigned char * str , int len , unsigned long * val ) ; int UTF8_putc ( unsigned char * str , int len , unsigned long value ) ; DECLARE_ASN1_FUNCTIONS_name ( ASN1_STRING , ASN1_PRINTABLE ) DECLARE_ASN1_FUNCTIONS_name ( ASN1_STRING , DIRECTORYSTRING ) DECLARE_ASN1_FUNCTIONS_name ( ASN1_STRING , DISPLAYTEXT )
0False
Categorize the following code snippet as vulnerable or not. True or False
static size_t unicode_to_utf16le ( char * p , size_t remaining , uint32_t uc ) { char * utf16 = p ; if ( uc > 0xffff ) { if ( remaining < 4 ) return ( 0 ) ; uc -= 0x10000 ; archive_le16enc ( utf16 , ( ( uc >> 10 ) & 0x3ff ) + 0xD800 ) ; archive_le16enc ( utf16 + 2 , ( uc & 0x3ff ) + 0xDC00 ) ; return ( 4 ) ; } else { if ( remaining < 2 ) return ( 0 ) ; archive_le16enc ( utf16 , uc ) ; return ( 2 ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void my_coll_agg_error ( Item * * args , uint count , const char * fname , int item_sep ) { if ( count == 2 ) my_coll_agg_error ( args [ 0 ] -> collation , args [ item_sep ] -> collation , fname ) ; else if ( count == 3 ) my_coll_agg_error ( args [ 0 ] -> collation , args [ item_sep ] -> collation , args [ 2 * item_sep ] -> collation , fname ) ; else my_error ( ER_CANT_AGGREGATE_NCOLLATIONS , MYF ( 0 ) , fname ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void * evport_init ( struct event_base * base ) { struct evport_data * evpd ; int i ; if ( evutil_getenv ( "EVENT_NOEVPORT" ) ) return ( NULL ) ; if ( ! ( evpd = calloc ( 1 , sizeof ( struct evport_data ) ) ) ) return ( NULL ) ; if ( ( evpd -> ed_port = port_create ( ) ) == - 1 ) { free ( evpd ) ; return ( NULL ) ; } evpd -> ed_fds = calloc ( DEFAULT_NFDS , sizeof ( struct fd_info ) ) ; if ( evpd -> ed_fds == NULL ) { close ( evpd -> ed_port ) ; free ( evpd ) ; return ( NULL ) ; } evpd -> ed_nevents = DEFAULT_NFDS ; for ( i = 0 ; i < EVENTS_PER_GETN ; i ++ ) evpd -> ed_pending [ i ] = - 1 ; evsignal_init ( base ) ; return ( evpd ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void xps_draw_radial_gradient ( xps_document * doc , const fz_matrix * ctm , const fz_rect * area , struct stop * stops , int count , fz_xml * root , int spread ) { float x0 , y0 , r0 ; float x1 , y1 , r1 ; float xrad = 1 ; float yrad = 1 ; float invscale ; int i , ma = 1 ; fz_matrix local_ctm = * ctm ; fz_matrix inv ; fz_rect local_area = * area ; char * center_att = fz_xml_att ( root , "Center" ) ; char * origin_att = fz_xml_att ( root , "GradientOrigin" ) ; char * radius_x_att = fz_xml_att ( root , "RadiusX" ) ; char * radius_y_att = fz_xml_att ( root , "RadiusY" ) ; x0 = y0 = 0.0 ; x1 = y1 = 1.0 ; xrad = 1.0 ; yrad = 1.0 ; if ( origin_att ) xps_parse_point ( origin_att , & x0 , & y0 ) ; if ( center_att ) xps_parse_point ( center_att , & x1 , & y1 ) ; if ( radius_x_att ) xrad = fz_atof ( radius_x_att ) ; if ( radius_y_att ) yrad = fz_atof ( radius_y_att ) ; xrad = fz_max ( 0.01f , xrad ) ; yrad = fz_max ( 0.01f , yrad ) ; if ( fz_abs ( xrad ) > FLT_EPSILON ) { fz_pre_scale ( & local_ctm , 1 , yrad / xrad ) ; } if ( yrad != 0.0 ) { invscale = xrad / yrad ; y0 = y0 * invscale ; y1 = y1 * invscale ; } r0 = 0 ; r1 = xrad ; fz_transform_rect ( & local_area , fz_invert_matrix ( & inv , & local_ctm ) ) ; ma = fz_maxi ( ma , ceilf ( hypotf ( local_area . x0 - x0 , local_area . y0 - y0 ) / xrad ) ) ; ma = fz_maxi ( ma , ceilf ( hypotf ( local_area . x1 - x0 , local_area . y0 - y0 ) / xrad ) ) ; ma = fz_maxi ( ma , ceilf ( hypotf ( local_area . x0 - x0 , local_area . y1 - y0 ) / xrad ) ) ; ma = fz_maxi ( ma , ceilf ( hypotf ( local_area . x1 - x0 , local_area . y1 - y0 ) / xrad ) ) ; if ( spread == SPREAD_REPEAT ) { for ( i = ma - 1 ; i >= 0 ; i -- ) xps_draw_one_radial_gradient ( doc , & local_ctm , stops , count , 0 , x0 , y0 , r0 + i * xrad , x1 , y1 , r1 + i * xrad ) ; } else if ( spread == SPREAD_REFLECT ) { if ( ( ma % 2 ) != 0 ) ma ++ ; for ( i = ma - 2 ; i >= 0 ; i -= 2 ) { xps_draw_one_radial_gradient ( doc , & local_ctm , stops , count , 0 , x0 , y0 , r0 + i * xrad , x1 , y1 , r1 + i * xrad ) ; xps_draw_one_radial_gradient ( doc , & local_ctm , stops , count , 0 , x0 , y0 , r0 + ( i + 2 ) * xrad , x1 , y1 , r1 + i * xrad ) ; } } else { xps_draw_one_radial_gradient ( doc , & local_ctm , stops , count , 1 , x0 , y0 , r0 , x1 , y1 , r1 ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int decorrelate ( TAKDecContext * s , int c1 , int c2 , int length ) { GetBitContext * gb = & s -> gb ; int32_t * p1 = s -> decoded [ c1 ] + 1 ; int32_t * p2 = s -> decoded [ c2 ] + 1 ; int i ; int dshift , dfactor ; switch ( s -> dmode ) { case 1 : for ( i = 0 ; i < length ; i ++ ) { int32_t a = p1 [ i ] ; int32_t b = p2 [ i ] ; p2 [ i ] = a + b ; } break ; case 2 : for ( i = 0 ; i < length ; i ++ ) { int32_t a = p1 [ i ] ; int32_t b = p2 [ i ] ; p1 [ i ] = b - a ; } break ; case 3 : for ( i = 0 ; i < length ; i ++ ) { int32_t a = p1 [ i ] ; int32_t b = p2 [ i ] ; a -= b >> 1 ; p1 [ i ] = a ; p2 [ i ] = a + b ; } break ; case 4 : FFSWAP ( int32_t * , p1 , p2 ) ; case 5 : dshift = get_bits_esc4 ( gb ) ; dfactor = get_sbits ( gb , 10 ) ; for ( i = 0 ; i < length ; i ++ ) { int32_t a = p1 [ i ] ; int32_t b = p2 [ i ] ; b = dfactor * ( b >> dshift ) + 128 >> 8 << dshift ; p1 [ i ] = b - a ; } break ; case 6 : FFSWAP ( int32_t * , p1 , p2 ) ; case 7 : { LOCAL_ALIGNED_16 ( int16_t , filter , [ MAX_PREDICTORS ] ) ; int length2 , order_half , filter_order , dval1 , dval2 ; int av_uninit ( code_size ) ; memset ( filter , 0 , MAX_PREDICTORS * sizeof ( * filter ) ) ; if ( length < 256 ) return AVERROR_INVALIDDATA ; dshift = get_bits_esc4 ( gb ) ; filter_order = 8 << get_bits1 ( gb ) ; dval1 = get_bits1 ( gb ) ; dval2 = get_bits1 ( gb ) ; for ( i = 0 ; i < filter_order ; i ++ ) { if ( ! ( i & 3 ) ) code_size = 14 - get_bits ( gb , 3 ) ; filter [ i ] = get_sbits ( gb , code_size ) ; } order_half = filter_order / 2 ; length2 = length - ( filter_order - 1 ) ; if ( dval1 ) { for ( i = 0 ; i < order_half ; i ++ ) { int32_t a = p1 [ i ] ; int32_t b = p2 [ i ] ; p1 [ i ] = a + b ; } } if ( dval2 ) { for ( i = length2 + order_half ; i < length ; i ++ ) { int32_t a = p1 [ i ] ; int32_t b = p2 [ i ] ; p1 [ i ] = a + b ; } } av_fast_malloc ( & s -> residues , & s -> residues_buf_size , FFALIGN ( length + 16 , 16 ) * sizeof ( * s -> residues ) ) ; if ( ! s -> residues ) return AVERROR ( ENOMEM ) ; memset ( s -> residues , 0 , s -> residues_buf_size ) ; for ( i = 0 ; i < length ; i ++ ) s -> residues [ i ] = p2 [ i ] >> dshift ; p1 += order_half ; for ( i = 0 ; i < length2 ; i ++ ) { int v = 1 << 9 ; v += s -> dsp . scalarproduct_int16 ( & s -> residues [ i ] , filter , FFALIGN ( filter_order , 16 ) ) ; p1 [ i ] = ( av_clip ( v >> 10 , - 8192 , 8191 ) << dshift ) - p1 [ i ] ; } emms_c ( ) ; break ; } } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const char * cmd_geo_lookup_db ( cmd_parms * cmd , void * _dcfg , const char * p1 ) { const char * filename = resolve_relative_path ( cmd -> pool , cmd -> directive -> filename , p1 ) ; char * error_msg ; directory_config * dcfg = ( directory_config * ) _dcfg ; if ( dcfg == NULL ) return NULL ; if ( geo_init ( dcfg , filename , & error_msg ) <= 0 ) { return error_msg ; } return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
PHP_FUNCTION ( locale_get_display_variant ) { get_icu_disp_value_src_php ( LOC_VARIANT_TAG , INTERNAL_FUNCTION_PARAM_PASSTHRU ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int xhci_setup_packet ( XHCITransfer * xfer ) { USBEndpoint * ep ; int dir ; dir = xfer -> in_xfer ? USB_TOKEN_IN : USB_TOKEN_OUT ; if ( xfer -> packet . ep ) { ep = xfer -> packet . ep ; } else { ep = xhci_epid_to_usbep ( xfer -> epctx ) ; if ( ! ep ) { DPRINTF ( "xhci: slot %d has no device\n" , xfer -> slotid ) ; return - 1 ; } } xhci_xfer_create_sgl ( xfer , dir == USB_TOKEN_IN ) ; usb_packet_setup ( & xfer -> packet , dir , ep , xfer -> streamid , xfer -> trbs [ 0 ] . addr , false , xfer -> int_req ) ; usb_packet_map ( & xfer -> packet , & xfer -> sgl ) ; DPRINTF ( "xhci: setup packet pid 0x%x addr %d ep %d\n" , xfer -> packet . pid , ep -> dev -> addr , ep -> nr ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
hidden_def ( _nss_dns_gethostbyname3_r ) enum nss_status _nss_dns_gethostbyname2_r ( const char * name , int af , struct hostent * result , char * buffer , size_t buflen , int * errnop , int * h_errnop ) { return _nss_dns_gethostbyname3_r ( name , af , result , buffer , buflen , errnop , h_errnop , NULL , NULL ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void encode_nonrd_sb_row ( VP9_COMP * cpi , const TileInfo * const tile , int mi_row , TOKENEXTRA * * tp ) { SPEED_FEATURES * const sf = & cpi -> sf ; VP9_COMMON * const cm = & cpi -> common ; MACROBLOCK * const x = & cpi -> mb ; MACROBLOCKD * const xd = & x -> e_mbd ; int mi_col ; vpx_memset ( & xd -> left_context , 0 , sizeof ( xd -> left_context ) ) ; vpx_memset ( xd -> left_seg_context , 0 , sizeof ( xd -> left_seg_context ) ) ; for ( mi_col = tile -> mi_col_start ; mi_col < tile -> mi_col_end ; mi_col += MI_BLOCK_SIZE ) { int dummy_rate = 0 ; int64_t dummy_dist = 0 ; const int idx_str = cm -> mi_stride * mi_row + mi_col ; MODE_INFO * * mi = cm -> mi_grid_visible + idx_str ; MODE_INFO * * prev_mi = cm -> prev_mi_grid_visible + idx_str ; BLOCK_SIZE bsize ; x -> in_static_area = 0 ; x -> source_variance = UINT_MAX ; vp9_zero ( x -> pred_mv ) ; switch ( sf -> partition_search_type ) { case VAR_BASED_PARTITION : choose_partitioning ( cpi , tile , mi_row , mi_col ) ; nonrd_use_partition ( cpi , tile , mi , tp , mi_row , mi_col , BLOCK_64X64 , 1 , & dummy_rate , & dummy_dist , cpi -> pc_root ) ; break ; case SOURCE_VAR_BASED_PARTITION : set_source_var_based_partition ( cpi , tile , mi , mi_row , mi_col ) ; nonrd_use_partition ( cpi , tile , mi , tp , mi_row , mi_col , BLOCK_64X64 , 1 , & dummy_rate , & dummy_dist , cpi -> pc_root ) ; break ; case VAR_BASED_FIXED_PARTITION : case FIXED_PARTITION : bsize = sf -> partition_search_type == FIXED_PARTITION ? sf -> always_this_block_size : get_nonrd_var_based_fixed_partition ( cpi , mi_row , mi_col ) ; set_fixed_partitioning ( cpi , tile , mi , mi_row , mi_col , bsize ) ; nonrd_use_partition ( cpi , tile , mi , tp , mi_row , mi_col , BLOCK_64X64 , 1 , & dummy_rate , & dummy_dist , cpi -> pc_root ) ; break ; case REFERENCE_PARTITION : if ( sf -> partition_check || ! ( x -> in_static_area = is_background ( cpi , tile , mi_row , mi_col ) ) ) { set_modeinfo_offsets ( cm , xd , mi_row , mi_col ) ; auto_partition_range ( cpi , tile , mi_row , mi_col , & sf -> min_partition_size , & sf -> max_partition_size ) ; nonrd_pick_partition ( cpi , tile , tp , mi_row , mi_col , BLOCK_64X64 , & dummy_rate , & dummy_dist , 1 , INT64_MAX , cpi -> pc_root ) ; } else { copy_partitioning ( cm , mi , prev_mi ) ; nonrd_use_partition ( cpi , tile , mi , tp , mi_row , mi_col , BLOCK_64X64 , 1 , & dummy_rate , & dummy_dist , cpi -> pc_root ) ; } break ; default : assert ( 0 ) ; break ; } } }
1True
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_P ( DetachToBrowserTabDragControllerTest , DragInSameWindow ) { if ( input_source ( ) == INPUT_SOURCE_TOUCH ) { VLOG ( 1 ) << "Test is DISABLED for touch input." ; return ; } AddTabAndResetBrowser ( browser ( ) ) ; TabStrip * tab_strip = GetTabStripForBrowser ( browser ( ) ) ; TabStripModel * model = browser ( ) -> tab_strip_model ( ) ; gfx : : Point tab_1_center ( GetCenterInScreenCoordinates ( tab_strip -> tab_at ( 1 ) ) ) ; ASSERT_TRUE ( PressInput ( tab_1_center ) ) ; gfx : : Point tab_0_center ( GetCenterInScreenCoordinates ( tab_strip -> tab_at ( 0 ) ) ) ; ASSERT_TRUE ( DragInputTo ( tab_0_center ) ) ; ASSERT_TRUE ( ReleaseInput ( ) ) ; EXPECT_EQ ( "1 0" , IDString ( model ) ) ; EXPECT_FALSE ( TabDragController : : IsActive ( ) ) ; EXPECT_FALSE ( tab_strip -> IsDragSessionActive ( ) ) ; EXPECT_FALSE ( tab_strip -> GetWidget ( ) -> HasCapture ( ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int isprint ( int c ) { return ( ( c > 31 && c < 127 ) ? 1 : 0 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
SPL_METHOD ( SplFileInfo , func_name ) \ { \ spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ; \ zend_error_handling error_handling ; \ if ( zend_parse_parameters_none ( ) == FAILURE ) { \ return ; \ } \ \ zend_replace_error_handling ( EH_THROW , spl_ce_RuntimeException , & error_handling TSRMLS_CC ) ; \ spl_filesystem_object_get_file_name ( intern TSRMLS_CC ) ; \ php_stat ( intern -> file_name , intern -> file_name_len , func_num , return_value TSRMLS_CC ) ; \ zend_restore_error_handling ( & error_handling TSRMLS_CC ) ; \ } FileInfoFunction ( getPerms , FS_PERMS ) FileInfoFunction ( getInode , FS_INODE ) FileInfoFunction ( getSize , FS_SIZE ) FileInfoFunction ( getOwner , FS_OWNER ) FileInfoFunction ( getGroup , FS_GROUP ) FileInfoFunction ( getATime , FS_ATIME ) FileInfoFunction ( getMTime , FS_MTIME )
0False
Categorize the following code snippet as vulnerable or not. True or False
static int main_pipe_copier ( uint8_t * pipe_buf , usize_t pipe_bufsize , size_t nread , main_file * ifile , int outfd ) { int ret ; xoff_t skipped = 0 ; struct sigaction sa ; sa . sa_handler = SIG_IGN ; sigaction ( SIGPIPE , & sa , NULL ) ; for ( ; ; ) { int force_drain = 0 ; if ( nread > 0 && ( ret = main_pipe_write ( outfd , pipe_buf , nread ) ) ) { if ( ret == EPIPE ) { skipped += nread ; force_drain = 1 ; } else { XPR ( NT "pipe write failed: %s\n" , xd3_mainerror ( ret ) ) ; return ret ; } } if ( nread < pipe_bufsize && ! force_drain ) { break ; } if ( ( ret = main_file_read ( ifile , pipe_buf , pipe_bufsize , & nread , "pipe read failed" ) ) < 0 ) { return ret ; } } if ( option_verbose && skipped != 0 ) { XPR ( NT "skipping %" Q "u bytes in %s\n" , skipped , ifile -> filename ) ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( DownloadExtensionTest , MAYBE_DownloadExtensionTest_OnDeterminingFilename_ReservedFilename ) { GoOnTheRecord ( ) ; LoadExtension ( "downloads_split" ) ; AddFilenameDeterminer ( ) ; ASSERT_TRUE ( StartEmbeddedTestServer ( ) ) ; std : : string download_url = embedded_test_server ( ) -> GetURL ( "/slow?0" ) . spec ( ) ; std : : unique_ptr < base : : Value > result ( RunFunctionAndReturnResult ( new DownloadsDownloadFunction ( ) , base : : StringPrintf ( "[{ \"url\": \"%s\"} ]" , download_url . c_str ( ) ) ) ) ; ASSERT_TRUE ( result . get ( ) ) ; int result_id = - 1 ; ASSERT_TRUE ( result -> GetAsInteger ( & result_id ) ) ; DownloadItem * item = GetCurrentManager ( ) -> GetDownload ( result_id ) ; ASSERT_TRUE ( item ) ; ScopedCancellingItem canceller ( item ) ; ASSERT_EQ ( download_url , item -> GetOriginalUrl ( ) . spec ( ) ) ; ASSERT_TRUE ( WaitFor ( downloads : : OnCreated : : kEventName , base : : StringPrintf ( "[{ \"danger\": \"safe\"," " \"incognito\": false," " \"id\": %d," " \"mime\": \"text/plain\"," " \"paused\": false," " \"url\": \"%s\"} ]" , result_id , download_url . c_str ( ) ) ) ) ; ASSERT_TRUE ( WaitFor ( downloads : : OnDeterminingFilename : : kEventName , base : : StringPrintf ( "[{ \"id\": %d," " \"filename\":\"slow.txt\"} ]" , result_id ) ) ) ; ASSERT_TRUE ( item -> GetTargetFilePath ( ) . empty ( ) ) ; ASSERT_EQ ( DownloadItem : : IN_PROGRESS , item -> GetState ( ) ) ; std : : string error ; ASSERT_FALSE ( ExtensionDownloadsEventRouter : : DetermineFilename ( browser ( ) -> profile ( ) , false , GetExtensionId ( ) , result_id , base : : FilePath ( FILE_PATH_LITERAL ( "con.foo" ) ) , downloads : : FILENAME_CONFLICT_ACTION_UNIQUIFY , & error ) ) ; EXPECT_STREQ ( errors : : kInvalidFilename , error . c_str ( ) ) ; ASSERT_TRUE ( WaitFor ( downloads : : OnChanged : : kEventName , base : : StringPrintf ( "[{ \"id\": %d," " \"filename\": { " " \"previous\": \"\"," " \"current\": \"%s\"} } ]" , result_id , GetFilename ( "slow.txt" ) . c_str ( ) ) ) ) ; ASSERT_TRUE ( WaitFor ( downloads : : OnChanged : : kEventName , base : : StringPrintf ( "[{ \"id\": %d," " \"state\": { " " \"previous\": \"in_progress\"," " \"current\": \"complete\"} } ]" , result_id ) ) ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TSReturnCode TSHttpTxnConfigStringGet ( TSHttpTxn txnp , TSOverridableConfigKey conf , const char * * value , int * length ) { sdk_assert ( sdk_sanity_check_txn ( txnp ) == TS_SUCCESS ) ; sdk_assert ( sdk_sanity_check_null_ptr ( ( void * * ) value ) == TS_SUCCESS ) ; sdk_assert ( sdk_sanity_check_null_ptr ( ( void * ) length ) == TS_SUCCESS ) ; HttpSM * sm = ( HttpSM * ) txnp ; switch ( conf ) { case TS_CONFIG_HTTP_RESPONSE_SERVER_STR : * value = sm -> t_state . txn_conf -> proxy_response_server_string ; * length = sm -> t_state . txn_conf -> proxy_response_server_string_len ; break ; case TS_CONFIG_HTTP_GLOBAL_USER_AGENT_HEADER : * value = sm -> t_state . txn_conf -> global_user_agent_header ; * length = sm -> t_state . txn_conf -> global_user_agent_header_size ; break ; case TS_CONFIG_BODY_FACTORY_TEMPLATE_BASE : * value = sm -> t_state . txn_conf -> body_factory_template_base ; * length = sm -> t_state . txn_conf -> body_factory_template_base_len ; break ; default : return TS_ERROR ; break ; } return TS_SUCCESS ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void sbr_hf_g_filt_c ( float ( * Y ) [ 2 ] , const float ( * X_high ) [ 40 ] [ 2 ] , const float * g_filt , int m_max , intptr_t ixh ) { int m ; for ( m = 0 ; m < m_max ; m ++ ) { Y [ m ] [ 0 ] = X_high [ m ] [ ixh ] [ 0 ] * g_filt [ m ] ; Y [ m ] [ 1 ] = X_high [ m ] [ ixh ] [ 1 ] * g_filt [ m ] ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
void TSHttpTxnOverwriteExpireTime ( TSHttpTxn txnp , time_t expire_time ) { sdk_assert ( sdk_sanity_check_txn ( txnp ) == TS_SUCCESS ) ; HttpTransact : : State * s = & ( ( ( HttpSM * ) txnp ) -> t_state ) ; s -> plugin_set_expire_time = expire_time ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
int proto_registrar_get_parent ( const int n ) { header_field_info * hfinfo ; PROTO_REGISTRAR_GET_NTH ( n , hfinfo ) ; return hfinfo -> parent ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TSReturnCode sdk_sanity_check_url_handle ( TSMLoc field ) { if ( field == TS_NULL_MLOC ) { return TS_ERROR ; } MIMEFieldSDKHandle * field_handle = ( MIMEFieldSDKHandle * ) field ; if ( field_handle -> m_type != HDR_HEAP_OBJ_URL ) { return TS_ERROR ; } return TS_SUCCESS ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void link_info_read_state_free ( LinkInfoReadState * state ) { g_object_unref ( state -> cancellable ) ; g_free ( state ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void * pdf_new_processor ( fz_context * ctx , int size ) { return Memento_label ( fz_calloc ( ctx , 1 , size ) , "pdf_processor" ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
xmlHashTablePtr xmlHashCopy ( xmlHashTablePtr table , xmlHashCopier f ) { int i ; xmlHashEntryPtr iter ; xmlHashEntryPtr next ; xmlHashTablePtr ret ; if ( table == NULL ) return ( NULL ) ; if ( f == NULL ) return ( NULL ) ; ret = xmlHashCreate ( table -> size ) ; if ( ret == NULL ) return ( NULL ) ; if ( table -> table ) { for ( i = 0 ; i < table -> size ; i ++ ) { if ( table -> table [ i ] . valid == 0 ) continue ; iter = & ( table -> table [ i ] ) ; while ( iter ) { next = iter -> next ; xmlHashAddEntry3 ( ret , iter -> name , iter -> name2 , iter -> name3 , f ( iter -> payload , iter -> name ) ) ; iter = next ; } } } ret -> nbElems = table -> nbElems ; return ( ret ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void nlm_match_fhandle_request ( packet_info * pinfo , proto_tree * tree ) { nlm_msg_res_matched_data * md ; md = ( nlm_msg_res_matched_data * ) g_hash_table_lookup ( nlm_msg_res_matched , GINT_TO_POINTER ( pinfo -> fd -> num ) ) ; if ( md && md -> rep_frame ) { dissect_fhandle_hidden ( pinfo , tree , md -> rep_frame ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static vpx_codec_err_t ctrl_get_reference ( vpx_codec_alg_priv_t * ctx , va_list args ) { vp9_ref_frame_t * const frame = va_arg ( args , vp9_ref_frame_t * ) ; if ( frame != NULL ) { YV12_BUFFER_CONFIG * fb = get_ref_frame ( & ctx -> cpi -> common , frame -> idx ) ; if ( fb == NULL ) return VPX_CODEC_ERROR ; yuvconfig2image ( & frame -> img , fb , NULL ) ; return VPX_CODEC_OK ; } else { return VPX_CODEC_INVALID_PARAM ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void auto_partition_range ( VP9_COMP * cpi , const TileInfo * const tile , int mi_row , int mi_col , BLOCK_SIZE * min_block_size , BLOCK_SIZE * max_block_size ) { VP9_COMMON * const cm = & cpi -> common ; MACROBLOCKD * const xd = & cpi -> mb . e_mbd ; MODE_INFO * * mi_8x8 = xd -> mi ; const int left_in_image = xd -> left_available && mi_8x8 [ - 1 ] ; const int above_in_image = xd -> up_available && mi_8x8 [ - xd -> mi_stride ] ; int row8x8_remaining = tile -> mi_row_end - mi_row ; int col8x8_remaining = tile -> mi_col_end - mi_col ; int bh , bw ; BLOCK_SIZE min_size = BLOCK_32X32 ; BLOCK_SIZE max_size = BLOCK_8X8 ; int bsl = mi_width_log2 ( BLOCK_64X64 ) ; const int search_range_ctrl = ( ( ( mi_row + mi_col ) >> bsl ) + get_chessboard_index ( cm -> current_video_frame ) ) & 0x1 ; if ( search_range_ctrl && ( left_in_image || above_in_image || cm -> frame_type != KEY_FRAME ) ) { int block ; MODE_INFO * * mi ; BLOCK_SIZE sb_type ; if ( left_in_image ) { MODE_INFO * cur_mi ; mi = & mi_8x8 [ - 1 ] ; for ( block = 0 ; block < MI_BLOCK_SIZE ; ++ block ) { cur_mi = mi [ block * xd -> mi_stride ] ; sb_type = cur_mi ? cur_mi -> mbmi . sb_type : 0 ; min_size = MIN ( min_size , sb_type ) ; max_size = MAX ( max_size , sb_type ) ; } } if ( above_in_image ) { mi = & mi_8x8 [ - xd -> mi_stride * MI_BLOCK_SIZE ] ; for ( block = 0 ; block < MI_BLOCK_SIZE ; ++ block ) { sb_type = mi [ block ] ? mi [ block ] -> mbmi . sb_type : 0 ; min_size = MIN ( min_size , sb_type ) ; max_size = MAX ( max_size , sb_type ) ; } } min_size = min_partition_size [ min_size ] ; max_size = find_partition_size ( max_size , row8x8_remaining , col8x8_remaining , & bh , & bw ) ; min_size = MIN ( min_size , max_size ) ; min_size = MAX ( min_size , BLOCK_8X8 ) ; max_size = MIN ( max_size , BLOCK_32X32 ) ; } else { min_size = BLOCK_8X8 ; max_size = BLOCK_32X32 ; } * min_block_size = min_size ; * max_block_size = max_size ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static bool async_pf_msr_needed ( void * opaque ) { X86CPU * cpu = opaque ; return cpu -> env . async_pf_en_msr != 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
xmlLinkPtr xmlListEnd ( xmlListPtr l ) { if ( l == NULL ) return ( NULL ) ; return ( l -> sentinel -> prev ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static toff_t _tiffSizeProc ( thandle_t fd ) { _TIFF_stat_s sb ; return ( toff_t ) ( _TIFF_fstat_f ( ( int ) fd , & sb ) < 0 ? 0 : sb . st_size ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
vpx_codec_err_t vpx_codec_set_cx_data_buf ( vpx_codec_ctx_t * ctx , const vpx_fixed_buf_t * buf , unsigned int pad_before , unsigned int pad_after ) { if ( ! ctx || ! ctx -> priv ) return VPX_CODEC_INVALID_PARAM ; if ( buf ) { ctx -> priv -> enc . cx_data_dst_buf = * buf ; ctx -> priv -> enc . cx_data_pad_before = pad_before ; ctx -> priv -> enc . cx_data_pad_after = pad_after ; } else { ctx -> priv -> enc . cx_data_dst_buf . buf = NULL ; ctx -> priv -> enc . cx_data_dst_buf . sz = 0 ; ctx -> priv -> enc . cx_data_pad_before = 0 ; ctx -> priv -> enc . cx_data_pad_after = 0 ; } return VPX_CODEC_OK ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
struct zip_cdir * _zip_cdir_new ( int nentry , struct zip_error * error ) { struct zip_cdir * cd ; if ( ( cd = ( struct zip_cdir * ) malloc ( sizeof ( * cd ) ) ) == NULL ) { _zip_error_set ( error , ZIP_ER_MEMORY , 0 ) ; return NULL ; } if ( ( cd -> entry = ( struct zip_dirent * ) malloc ( sizeof ( * ( cd -> entry ) ) * nentry ) ) == NULL ) { _zip_error_set ( error , ZIP_ER_MEMORY , 0 ) ; free ( cd ) ; return NULL ; } cd -> nentry = nentry ; cd -> size = cd -> offset = 0 ; cd -> comment = NULL ; cd -> comment_len = 0 ; return cd ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void idr_set_num_beutf16 ( unsigned char * p , int num ) { static const uint16_t xdig [ ] = { 0x0030 , 0x0031 , 0x0032 , 0x0033 , 0x0034 , 0x0035 , 0x0036 , 0x0037 , 0x0038 , 0x0039 , 0x0041 , 0x0042 , 0x0043 , 0x0044 , 0x0045 , 0x0046 , 0x0047 , 0x0048 , 0x0049 , 0x004A , 0x004B , 0x004C , 0x004D , 0x004E , 0x004F , 0x0050 , 0x0051 , 0x0052 , 0x0053 , 0x0054 , 0x0055 , 0x0056 , 0x0057 , 0x0058 , 0x0059 , 0x005A } ; # define XDIG_CNT ( sizeof ( xdig ) / sizeof ( xdig [ 0 ] ) ) num %= XDIG_CNT * XDIG_CNT * XDIG_CNT ; archive_be16enc ( p , xdig [ ( num / ( XDIG_CNT * XDIG_CNT ) ) ] ) ; num %= XDIG_CNT * XDIG_CNT ; archive_be16enc ( p + 2 , xdig [ ( num / XDIG_CNT ) ] ) ; num %= XDIG_CNT ; archive_be16enc ( p + 4 , xdig [ num ] ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int tipc_nl_compat_name_table_dump ( struct tipc_nl_compat_msg * msg , struct nlattr * * attrs ) { char port_str [ 27 ] ; struct tipc_name_table_query * ntq ; struct nlattr * nt [ TIPC_NLA_NAME_TABLE_MAX + 1 ] ; struct nlattr * publ [ TIPC_NLA_PUBL_MAX + 1 ] ; u32 node , depth , type , lowbound , upbound ; static const char * const scope_str [ ] = { "" , " zone" , " cluster" , " node" } ; int err ; if ( ! attrs [ TIPC_NLA_NAME_TABLE ] ) return - EINVAL ; err = nla_parse_nested ( nt , TIPC_NLA_NAME_TABLE_MAX , attrs [ TIPC_NLA_NAME_TABLE ] , NULL ) ; if ( err ) return err ; if ( ! nt [ TIPC_NLA_NAME_TABLE_PUBL ] ) return - EINVAL ; err = nla_parse_nested ( publ , TIPC_NLA_PUBL_MAX , nt [ TIPC_NLA_NAME_TABLE_PUBL ] , NULL ) ; if ( err ) return err ; ntq = ( struct tipc_name_table_query * ) TLV_DATA ( msg -> req ) ; depth = ntohl ( ntq -> depth ) ; type = ntohl ( ntq -> type ) ; lowbound = ntohl ( ntq -> lowbound ) ; upbound = ntohl ( ntq -> upbound ) ; if ( ! ( depth & TIPC_NTQ_ALLTYPES ) && ( type != nla_get_u32 ( publ [ TIPC_NLA_PUBL_TYPE ] ) ) ) return 0 ; if ( lowbound && ( lowbound > nla_get_u32 ( publ [ TIPC_NLA_PUBL_UPPER ] ) ) ) return 0 ; if ( upbound && ( upbound < nla_get_u32 ( publ [ TIPC_NLA_PUBL_LOWER ] ) ) ) return 0 ; tipc_tlv_sprintf ( msg -> rep , "%-10u " , nla_get_u32 ( publ [ TIPC_NLA_PUBL_TYPE ] ) ) ; if ( depth == 1 ) goto out ; tipc_tlv_sprintf ( msg -> rep , "%-10u %-10u " , nla_get_u32 ( publ [ TIPC_NLA_PUBL_LOWER ] ) , nla_get_u32 ( publ [ TIPC_NLA_PUBL_UPPER ] ) ) ; if ( depth == 2 ) goto out ; node = nla_get_u32 ( publ [ TIPC_NLA_PUBL_NODE ] ) ; sprintf ( port_str , "<%u.%u.%u:%u>" , tipc_zone ( node ) , tipc_cluster ( node ) , tipc_node ( node ) , nla_get_u32 ( publ [ TIPC_NLA_PUBL_REF ] ) ) ; tipc_tlv_sprintf ( msg -> rep , "%-26s " , port_str ) ; if ( depth == 3 ) goto out ; tipc_tlv_sprintf ( msg -> rep , "%-10u %s" , nla_get_u32 ( publ [ TIPC_NLA_PUBL_KEY ] ) , scope_str [ nla_get_u32 ( publ [ TIPC_NLA_PUBL_SCOPE ] ) ] ) ; out : tipc_tlv_sprintf ( msg -> rep , "\n" ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_print_modes_and_motion_vectors ( VP9_COMMON * cm , const char * file ) { int mi_row ; int mi_col ; int mi_index = 0 ; FILE * mvs = fopen ( file , "a" ) ; MODE_INFO * * mi = cm -> mi_grid_visible ; int rows = cm -> mi_rows ; int cols = cm -> mi_cols ; print_mi_data ( cm , mvs , "Partitions:" , offsetof ( MB_MODE_INFO , sb_type ) ) ; print_mi_data ( cm , mvs , "Modes:" , offsetof ( MB_MODE_INFO , mode ) ) ; print_mi_data ( cm , mvs , "Skips:" , offsetof ( MB_MODE_INFO , skip ) ) ; print_mi_data ( cm , mvs , "Ref frame:" , offsetof ( MB_MODE_INFO , ref_frame [ 0 ] ) ) ; print_mi_data ( cm , mvs , "Transform:" , offsetof ( MB_MODE_INFO , tx_size ) ) ; print_mi_data ( cm , mvs , "UV Modes:" , offsetof ( MB_MODE_INFO , uv_mode ) ) ; log_frame_info ( cm , "Vectors " , mvs ) ; for ( mi_row = 0 ; mi_row < rows ; mi_row ++ ) { fprintf ( mvs , "V " ) ; for ( mi_col = 0 ; mi_col < cols ; mi_col ++ ) { fprintf ( mvs , "%4d:%4d " , mi [ mi_index ] -> mbmi . mv [ 0 ] . as_mv . row , mi [ mi_index ] -> mbmi . mv [ 0 ] . as_mv . col ) ; mi_index ++ ; } fprintf ( mvs , "\n" ) ; mi_index += 8 ; } fprintf ( mvs , "\n" ) ; fclose ( mvs ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static void gx_ttfReader__Seek ( ttfReader * self , int nPos ) { gx_ttfReader * r = ( gx_ttfReader * ) self ; r -> pos = nPos ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void set_alloc_limit ( size_t size ) { alloc_limit = size ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int s_aos_available ( stream * s , gs_offset_t * pl ) { * pl = ( ( aos_state_t * ) s -> state ) -> file_sz - stell ( s ) ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
Selectivity boolvarsel ( PlannerInfo * root , Node * arg , int varRelid ) { VariableStatData vardata ; double selec ; examine_variable ( root , arg , varRelid , & vardata ) ; if ( HeapTupleIsValid ( vardata . statsTuple ) ) { selec = var_eq_const ( & vardata , BooleanEqualOperator , BoolGetDatum ( true ) , false , true ) ; } else if ( is_funcclause ( arg ) ) { selec = 0.3333333 ; } else { selec = 0.5 ; } ReleaseVariableStats ( vardata ) ; return selec ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void e1000e_read_ext_rx_descr ( E1000ECore * core , uint8_t * desc , hwaddr * buff_addr ) { union e1000_rx_desc_extended * d = ( union e1000_rx_desc_extended * ) desc ; * buff_addr = le64_to_cpu ( d -> read . buffer_addr ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static guint prplcb_ev_input_add ( int fd , PurpleInputCondition cond , PurpleInputFunction func , gpointer udata ) { return b_input_add ( fd , cond | B_EV_FLAG_FORCE_REPEAT , ( b_event_handler ) func , udata ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void ImportGrayQuantum ( const Image * image , QuantumInfo * quantum_info , const MagickSizeType number_pixels , const unsigned char * magick_restrict p , Quantum * magick_restrict q , ExceptionInfo * exception ) { QuantumAny range ; register ssize_t x ; ssize_t bit ; unsigned int pixel ; assert ( image != ( Image * ) NULL ) ; assert ( image -> signature == MagickCoreSignature ) ; switch ( quantum_info -> depth ) { case 1 : { register Quantum black , white ; black = 0 ; white = QuantumRange ; if ( quantum_info -> min_is_white != MagickFalse ) { black = QuantumRange ; white = 0 ; } for ( x = 0 ; x < ( ( ssize_t ) number_pixels - 7 ) ; x += 8 ) { for ( bit = 0 ; bit < 8 ; bit ++ ) { SetPixelGray ( image , ( ( * p ) & ( 1 << ( 7 - bit ) ) ) == 0 ? black : white , q ) ; q += GetPixelChannels ( image ) ; } p ++ ; } for ( bit = 0 ; bit < ( ssize_t ) ( number_pixels % 8 ) ; bit ++ ) { SetPixelGray ( image , ( ( * p ) & ( 0x01 << ( 7 - bit ) ) ) == 0 ? black : white , q ) ; q += GetPixelChannels ( image ) ; } if ( bit != 0 ) p ++ ; break ; } case 4 : { register unsigned char pixel ; range = GetQuantumRange ( quantum_info -> depth ) ; for ( x = 0 ; x < ( ( ssize_t ) number_pixels - 1 ) ; x += 2 ) { pixel = ( unsigned char ) ( ( * p >> 4 ) & 0xf ) ; SetPixelGray ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; q += GetPixelChannels ( image ) ; pixel = ( unsigned char ) ( ( * p ) & 0xf ) ; SetPixelGray ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p ++ ; q += GetPixelChannels ( image ) ; } for ( bit = 0 ; bit < ( ssize_t ) ( number_pixels % 2 ) ; bit ++ ) { pixel = ( unsigned char ) ( * p ++ >> 4 ) ; SetPixelGray ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; q += GetPixelChannels ( image ) ; } break ; } case 8 : { unsigned char pixel ; if ( quantum_info -> min_is_white != MagickFalse ) { for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushCharPixel ( p , & pixel ) ; SetPixelGray ( image , ScaleCharToQuantum ( pixel ) , q ) ; SetPixelAlpha ( image , OpaqueAlpha , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushCharPixel ( p , & pixel ) ; SetPixelGray ( image , ScaleCharToQuantum ( pixel ) , q ) ; SetPixelAlpha ( image , OpaqueAlpha , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 10 : { range = GetQuantumRange ( quantum_info -> depth ) ; if ( quantum_info -> pack == MagickFalse ) { if ( image -> endian == LSBEndian ) { for ( x = 0 ; x < ( ssize_t ) ( number_pixels - 2 ) ; x += 3 ) { p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 22 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 12 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 2 ) & 0x3ff , range ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; if ( x ++ < ( ssize_t ) ( number_pixels - 1 ) ) { SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 22 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; } if ( x ++ < ( ssize_t ) number_pixels ) { SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 12 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; } break ; } for ( x = 0 ; x < ( ssize_t ) ( number_pixels - 2 ) ; x += 3 ) { p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 2 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 12 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 22 ) & 0x3ff , range ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; if ( x ++ < ( ssize_t ) ( number_pixels - 1 ) ) { SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 2 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; } if ( x ++ < ( ssize_t ) number_pixels ) { SetPixelGray ( image , ScaleAnyToQuantum ( ( pixel >> 12 ) & 0x3ff , range ) , q ) ; q += GetPixelChannels ( image ) ; } break ; } for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 12 : { range = GetQuantumRange ( quantum_info -> depth ) ; if ( quantum_info -> pack == MagickFalse ) { unsigned short pixel ; for ( x = 0 ; x < ( ssize_t ) ( number_pixels - 1 ) ; x += 2 ) { p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( QuantumAny ) ( pixel >> 4 ) , range ) , q ) ; q += GetPixelChannels ( image ) ; p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( QuantumAny ) ( pixel >> 4 ) , range ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } for ( bit = 0 ; bit < ( ssize_t ) ( number_pixels % 2 ) ; bit ++ ) { p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( ( QuantumAny ) ( pixel >> 4 ) , range ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } if ( bit != 0 ) p ++ ; break ; } for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 16 : { unsigned short pixel ; if ( quantum_info -> min_is_white != MagickFalse ) { for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleShortToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } if ( quantum_info -> format == FloatingPointQuantumFormat ) { for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ClampToQuantum ( QuantumRange * HalfToSinglePrecision ( pixel ) ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushShortPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleShortToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 32 : { unsigned int pixel ; if ( quantum_info -> format == FloatingPointQuantumFormat ) { float pixel ; for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushFloatPixel ( quantum_info , p , & pixel ) ; SetPixelGray ( image , ClampToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushLongPixel ( quantum_info -> endian , p , & pixel ) ; SetPixelGray ( image , ScaleLongToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } case 64 : { if ( quantum_info -> format == FloatingPointQuantumFormat ) { double pixel ; for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushDoublePixel ( quantum_info , p , & pixel ) ; SetPixelGray ( image , ClampToQuantum ( pixel ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } } default : { range = GetQuantumRange ( quantum_info -> depth ) ; for ( x = 0 ; x < ( ssize_t ) number_pixels ; x ++ ) { p = PushQuantumPixel ( quantum_info , p , & pixel ) ; SetPixelGray ( image , ScaleAnyToQuantum ( pixel , range ) , q ) ; p += quantum_info -> pad ; q += GetPixelChannels ( image ) ; } break ; } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_NewATMVCCommand ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_NewATMVCCommand , NewATMVCCommand_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static LZWInfo * AcquireLZWInfo ( Image * image , const size_t data_size ) { LZWInfo * lzw_info ; register ssize_t i ; size_t one ; lzw_info = ( LZWInfo * ) AcquireMagickMemory ( sizeof ( * lzw_info ) ) ; if ( lzw_info == ( LZWInfo * ) NULL ) return ( ( LZWInfo * ) NULL ) ; ( void ) ResetMagickMemory ( lzw_info , 0 , sizeof ( * lzw_info ) ) ; lzw_info -> image = image ; lzw_info -> data_size = data_size ; one = 1 ; lzw_info -> maximum_data_value = ( one << data_size ) - 1 ; lzw_info -> clear_code = lzw_info -> maximum_data_value + 1 ; lzw_info -> end_code = lzw_info -> maximum_data_value + 2 ; lzw_info -> table [ 0 ] = ( size_t * ) AcquireQuantumMemory ( MaximumLZWCode , sizeof ( * * lzw_info -> table ) ) ; lzw_info -> table [ 1 ] = ( size_t * ) AcquireQuantumMemory ( MaximumLZWCode , sizeof ( * * lzw_info -> table ) ) ; if ( ( lzw_info -> table [ 0 ] == ( size_t * ) NULL ) || ( lzw_info -> table [ 1 ] == ( size_t * ) NULL ) ) { lzw_info = RelinquishLZWInfo ( lzw_info ) ; return ( ( LZWInfo * ) NULL ) ; } for ( i = 0 ; i <= ( ssize_t ) lzw_info -> maximum_data_value ; i ++ ) { lzw_info -> table [ 0 ] [ i ] = 0 ; lzw_info -> table [ 1 ] [ i ] = ( size_t ) i ; } ResetLZWInfo ( lzw_info ) ; lzw_info -> code_info . buffer [ 0 ] = '\0' ; lzw_info -> code_info . buffer [ 1 ] = '\0' ; lzw_info -> code_info . count = 2 ; lzw_info -> code_info . bit = 8 * lzw_info -> code_info . count ; lzw_info -> code_info . eof = MagickFalse ; lzw_info -> genesis = MagickTrue ; lzw_info -> stack = ( LZWStack * ) AcquireMagickMemory ( sizeof ( * lzw_info -> stack ) ) ; if ( lzw_info -> stack == ( LZWStack * ) NULL ) { lzw_info = RelinquishLZWInfo ( lzw_info ) ; return ( ( LZWInfo * ) NULL ) ; } lzw_info -> stack -> codes = ( size_t * ) AcquireQuantumMemory ( 2UL * MaximumLZWCode , sizeof ( * lzw_info -> stack -> codes ) ) ; if ( lzw_info -> stack -> codes == ( size_t * ) NULL ) { lzw_info = RelinquishLZWInfo ( lzw_info ) ; return ( ( LZWInfo * ) NULL ) ; } lzw_info -> stack -> index = lzw_info -> stack -> codes ; lzw_info -> stack -> top = lzw_info -> stack -> codes + 2 * MaximumLZWCode ; return ( lzw_info ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
bool HasPendingUncleanExit ( Profile * profile ) { return profile -> GetLastSessionExitType ( ) == Profile : : EXIT_CRASHED && ! profile_launch_observer . Get ( ) . HasBeenLaunched ( profile ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static const u_char * print_sl_winchange ( netdissect_options * ndo , register const u_char * cp ) { register short i ; if ( ( i = * cp ++ ) == 0 ) { i = EXTRACT_16BITS ( cp ) ; cp += 2 ; } if ( i >= 0 ) ND_PRINT ( ( ndo , " W+%d" , i ) ) ; else ND_PRINT ( ( ndo , " W%d" , i ) ) ; return ( cp ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void finish_info_provider ( NautilusDirectory * directory , NautilusFile * file , NautilusInfoProvider * provider ) { file -> details -> pending_info_providers = g_list_remove ( file -> details -> pending_info_providers , provider ) ; g_object_unref ( provider ) ; nautilus_directory_async_state_changed ( directory ) ; if ( file -> details -> pending_info_providers == NULL ) { nautilus_file_info_providers_done ( file ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_FORM_1 ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep ) { proto_tree * subtree ; guint32 flags ; subtree = proto_tree_add_subtree ( tree , tvb , offset , 0 , ett_FORM_1 , NULL , "Form level 1" ) ; offset = dissect_ndr_str_pointer_item ( tvb , offset , pinfo , subtree , di , drep , NDR_POINTER_UNIQUE , "Name" , hf_form_name , 0 ) ; if ( tvb_reported_length_remaining ( tvb , offset ) <= 0 ) goto done ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_flags , & flags ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_unknown , NULL ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_width , NULL ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_height , NULL ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_left_margin , NULL ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_top_margin , NULL ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_horiz_len , NULL ) ; offset = dissect_ndr_uint32 ( tvb , offset , pinfo , subtree , di , drep , hf_form_vert_len , NULL ) ; done : return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void read_intra_frame_mode_info ( VP9_COMMON * const cm , MACROBLOCKD * const xd , int mi_row , int mi_col , vp9_reader * r ) { MODE_INFO * const mi = xd -> mi [ 0 ] . src_mi ; MB_MODE_INFO * const mbmi = & mi -> mbmi ; const MODE_INFO * above_mi = xd -> mi [ - cm -> mi_stride ] . src_mi ; const MODE_INFO * left_mi = xd -> left_available ? xd -> mi [ - 1 ] . src_mi : NULL ; const BLOCK_SIZE bsize = mbmi -> sb_type ; int i ; mbmi -> segment_id = read_intra_segment_id ( cm , xd , mi_row , mi_col , r ) ; mbmi -> skip = read_skip ( cm , xd , mbmi -> segment_id , r ) ; mbmi -> tx_size = read_tx_size ( cm , xd , cm -> tx_mode , bsize , 1 , r ) ; mbmi -> ref_frame [ 0 ] = INTRA_FRAME ; mbmi -> ref_frame [ 1 ] = NONE ; switch ( bsize ) { case BLOCK_4X4 : for ( i = 0 ; i < 4 ; ++ i ) mi -> bmi [ i ] . as_mode = read_intra_mode ( r , get_y_mode_probs ( mi , above_mi , left_mi , i ) ) ; mbmi -> mode = mi -> bmi [ 3 ] . as_mode ; break ; case BLOCK_4X8 : mi -> bmi [ 0 ] . as_mode = mi -> bmi [ 2 ] . as_mode = read_intra_mode ( r , get_y_mode_probs ( mi , above_mi , left_mi , 0 ) ) ; mi -> bmi [ 1 ] . as_mode = mi -> bmi [ 3 ] . as_mode = mbmi -> mode = read_intra_mode ( r , get_y_mode_probs ( mi , above_mi , left_mi , 1 ) ) ; break ; case BLOCK_8X4 : mi -> bmi [ 0 ] . as_mode = mi -> bmi [ 1 ] . as_mode = read_intra_mode ( r , get_y_mode_probs ( mi , above_mi , left_mi , 0 ) ) ; mi -> bmi [ 2 ] . as_mode = mi -> bmi [ 3 ] . as_mode = mbmi -> mode = read_intra_mode ( r , get_y_mode_probs ( mi , above_mi , left_mi , 2 ) ) ; break ; default : mbmi -> mode = read_intra_mode ( r , get_y_mode_probs ( mi , above_mi , left_mi , 0 ) ) ; } mbmi -> uv_mode = read_intra_mode ( r , vp9_kf_uv_mode_prob [ mbmi -> mode ] ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int dissect_h245_RequestMode ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) { offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_RequestMode , RequestMode_sequence ) ; return offset ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int loosened_object_can_be_discarded ( const unsigned char * sha1 , unsigned long mtime ) { if ( ! unpack_unreachable_expiration ) return 0 ; if ( mtime > unpack_unreachable_expiration ) return 0 ; if ( sha1_array_lookup ( & recent_objects , sha1 ) >= 0 ) return 0 ; return 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void min_heap_ctor ( min_heap_t * s ) { s -> p = 0 ; s -> n = 0 ; s -> a = 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int pfkey_create ( struct net * net , struct socket * sock , int protocol , int kern ) { struct netns_pfkey * net_pfkey = net_generic ( net , pfkey_net_id ) ; struct sock * sk ; int err ; if ( ! ns_capable ( net -> user_ns , CAP_NET_ADMIN ) ) return - EPERM ; if ( sock -> type != SOCK_RAW ) return - ESOCKTNOSUPPORT ; if ( protocol != PF_KEY_V2 ) return - EPROTONOSUPPORT ; err = - ENOMEM ; sk = sk_alloc ( net , PF_KEY , GFP_KERNEL , & key_proto ) ; if ( sk == NULL ) goto out ; sock -> ops = & pfkey_ops ; sock_init_data ( sock , sk ) ; sk -> sk_family = PF_KEY ; sk -> sk_destruct = pfkey_sock_destruct ; atomic_inc ( & net_pfkey -> socks_nr ) ; pfkey_insert ( sk ) ; return 0 ; out : return err ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline PixelChannel GetPixelChannelChannel ( const Image * restrict image , const ssize_t offset ) { return ( image -> channel_map [ offset ] . channel ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
extern int name ( int ) __THROW __exctype ( isalnum ) ; __exctype ( isalpha ) ; __exctype ( iscntrl ) ; __exctype ( isdigit ) ; __exctype ( islower ) ; __exctype ( isgraph ) ; __exctype ( isprint )
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_sad ## m ## x ## n ## x ## k ## _c ( const uint8_t * src , int src_stride , const uint8_t * ref , int ref_stride , unsigned int * sads ) { int i ; for ( i = 0 ; i < k ; ++ i ) sads [ i ] = vp9_sad ## m ## x ## n ## _c ( src , src_stride , & ref [ i ] , ref_stride ) ; \ } # define sadMxNx4D ( m , n ) void vp9_sad ## m ## x ## n ## x4d_c ( const uint8_t * src , int src_stride , const uint8_t * const refs [ ] , int ref_stride , unsigned int * sads ) { int i ; for ( i = 0 ; i < 4 ; ++ i ) sads [ i ] = vp9_sad ## m ## x ## n ## _c ( src , src_stride , refs [ i ] , ref_stride ) ; \ } sadMxN ( 64 , 64 ) sadMxNxK ( 64 , 64 , 3 ) sadMxNxK ( 64 , 64 , 8 ) sadMxNx4D ( 64 , 64 ) sadMxN ( 64 , 32 ) sadMxNx4D ( 64 , 32 ) sadMxN ( 32 , 64 ) sadMxNx4D ( 32 , 64 ) sadMxN ( 32 , 32 ) sadMxNxK ( 32 , 32 , 3 ) sadMxNxK ( 32 , 32 , 8 ) sadMxNx4D ( 32 , 32 ) sadMxN ( 32 , 16 ) sadMxNx4D ( 32 , 16 ) sadMxN ( 16 , 32 ) sadMxNx4D ( 16 , 32 ) sadMxN ( 16 , 16 ) sadMxNxK ( 16 , 16 , 3 )
0False
Categorize the following code snippet as vulnerable or not. True or False
int change_logfile ( const char * fname , int leave_crumbs ) { FILE * new_file ; const char * log_fname ; char * abs_fname ; # if ! defined ( SYS_WINNT ) && ! defined ( SYS_VXWORKS ) && ! defined ( VMS ) char curdir [ 512 ] ; size_t cd_octets ; size_t octets ; # endif REQUIRE ( fname != NULL ) ; log_fname = fname ; if ( syslog_file != NULL && syslog_fname != NULL && == strcmp ( syslog_fname , log_fname ) ) return 0 ; if ( 0 == strcmp ( log_fname , "stderr" ) ) { new_file = stderr ; abs_fname = estrdup ( log_fname ) ; } else if ( 0 == strcmp ( log_fname , "stdout" ) ) { new_file = stdout ; abs_fname = estrdup ( log_fname ) ; } else { if ( syslog_fname != NULL && == strcmp ( log_fname , syslog_fname ) ) log_fname = syslog_abs_fname ; # if ! defined ( SYS_WINNT ) && ! defined ( SYS_VXWORKS ) && ! defined ( VMS ) if ( log_fname != syslog_abs_fname && DIR_SEP != log_fname [ 0 ] && != strcmp ( log_fname , "stderr" ) && != strcmp ( log_fname , "stdout" ) && NULL != getcwd ( curdir , sizeof ( curdir ) ) ) { cd_octets = strlen ( curdir ) ; if ( cd_octets > 1 && DIR_SEP == curdir [ cd_octets - 1 ] ) cd_octets -- ; octets = cd_octets ; octets += 1 ; octets += strlen ( log_fname ) ; octets += 1 ; abs_fname = emalloc ( octets ) ; snprintf ( abs_fname , octets , "%.*s%c%s" , ( int ) cd_octets , curdir , DIR_SEP , log_fname ) ; } else # endif abs_fname = estrdup ( log_fname ) ; TRACE ( 1 , ( "attempting to open log %s\n" , abs_fname ) ) ; new_file = fopen ( abs_fname , "a" ) ; } if ( NULL == new_file ) { free ( abs_fname ) ; return - 1 ; } if ( leave_crumbs && ( syslogit || log_fname != syslog_abs_fname ) ) msyslog ( LOG_NOTICE , "switching logging to file %s" , abs_fname ) ; if ( syslog_file != NULL && syslog_file != stderr && syslog_file != stdout && fileno ( syslog_file ) != fileno ( new_file ) ) fclose ( syslog_file ) ; syslog_file = new_file ; if ( log_fname == syslog_abs_fname ) { free ( abs_fname ) ; } else { if ( syslog_abs_fname != NULL && syslog_abs_fname != syslog_fname ) free ( syslog_abs_fname ) ; if ( syslog_fname != NULL ) free ( syslog_fname ) ; syslog_fname = estrdup ( log_fname ) ; syslog_abs_fname = abs_fname ; } syslogit = FALSE ; return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static mtime_t DecoderGetDisplayDate ( decoder_t * p_dec , mtime_t i_ts ) { decoder_owner_sys_t * p_owner = p_dec -> p_owner ; vlc_mutex_lock ( & p_owner -> lock ) ; if ( p_owner -> b_waiting || p_owner -> b_paused ) i_ts = VLC_TS_INVALID ; vlc_mutex_unlock ( & p_owner -> lock ) ; if ( ! p_owner -> p_clock || i_ts <= VLC_TS_INVALID ) return i_ts ; if ( input_clock_ConvertTS ( VLC_OBJECT ( p_dec ) , p_owner -> p_clock , NULL , & i_ts , NULL , INT64_MAX ) ) { msg_Err ( p_dec , "Could not get display date for timestamp %" PRId64 "" , i_ts ) ; return VLC_TS_INVALID ; } return i_ts ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( IconLabelBubbleViewTest , AnimateLayout ) { VerifyWithAnimationStep ( 1 ) ; VerifyWithAnimationStep ( 5 ) ; VerifyWithAnimationStep ( 10 ) ; VerifyWithAnimationStep ( 25 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void pxa2xx_rtc_piupdate ( PXA2xxRTCState * s ) { int64_t rt = qemu_get_clock_ms ( rtc_clock ) ; if ( s -> rtsr & ( 1 << 15 ) ) s -> last_swcr += rt - s -> last_pi ; s -> last_pi = rt ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_ ## type ## _predictor_ ## size ## x ## size ## _c ( uint8_t * dst , ptrdiff_t stride , const uint8_t * above , const uint8_t * left ) { type ## _predictor ( dst , stride , size , above , left ) ; } # define intra_pred_allsizes ( type ) intra_pred_sized ( type , 4 ) intra_pred_sized ( type , 8 ) intra_pred_sized ( type , 16 ) intra_pred_sized ( type , 32 ) static INLINE void d207_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r , c ; ( void ) above ; for ( r = 0 ; r < bs - 1 ; ++ r ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r ] + left [ r + 1 ] , 1 ) ; dst [ ( bs - 1 ) * stride ] = left [ bs - 1 ] ; dst ++ ; for ( r = 0 ; r < bs - 2 ; ++ r ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r ] + left [ r + 1 ] * 2 + left [ r + 2 ] , 2 ) ; dst [ ( bs - 2 ) * stride ] = ROUND_POWER_OF_TWO ( left [ bs - 2 ] + left [ bs - 1 ] * 3 , 2 ) ; dst [ ( bs - 1 ) * stride ] = left [ bs - 1 ] ; dst ++ ; for ( c = 0 ; c < bs - 2 ; ++ c ) dst [ ( bs - 1 ) * stride + c ] = left [ bs - 1 ] ; for ( r = bs - 2 ; r >= 0 ; -- r ) for ( c = 0 ; c < bs - 2 ; ++ c ) dst [ r * stride + c ] = dst [ ( r + 1 ) * stride + c - 2 ] ; } intra_pred_allsizes ( d207 ) static INLINE void d63_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r , c ; ( void ) left ; for ( r = 0 ; r < bs ; ++ r ) { for ( c = 0 ; c < bs ; ++ c ) dst [ c ] = r & 1 ? ROUND_POWER_OF_TWO ( above [ r / 2 + c ] + above [ r / 2 + c + 1 ] * 2 + above [ r / 2 + c + 2 ] , 2 ) : ROUND_POWER_OF_TWO ( above [ r / 2 + c ] + above [ r / 2 + c + 1 ] , 1 ) ; dst += stride ; } } intra_pred_allsizes ( d63 ) static INLINE void d45_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r , c ; ( void ) left ; for ( r = 0 ; r < bs ; ++ r ) { for ( c = 0 ; c < bs ; ++ c ) dst [ c ] = r + c + 2 < bs * 2 ? ROUND_POWER_OF_TWO ( above [ r + c ] + above [ r + c + 1 ] * 2 + above [ r + c + 2 ] , 2 ) : above [ bs * 2 - 1 ] ; dst += stride ; } } intra_pred_allsizes ( d45 ) static INLINE void d117_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r , c ; for ( c = 0 ; c < bs ; c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 1 ] + above [ c ] , 1 ) ; dst += stride ; dst [ 0 ] = ROUND_POWER_OF_TWO ( left [ 0 ] + above [ - 1 ] * 2 + above [ 0 ] , 2 ) ; for ( c = 1 ; c < bs ; c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 2 ] + above [ c - 1 ] * 2 + above [ c ] , 2 ) ; dst += stride ; dst [ 0 ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] * 2 + left [ 1 ] , 2 ) ; for ( r = 3 ; r < bs ; ++ r ) dst [ ( r - 2 ) * stride ] = ROUND_POWER_OF_TWO ( left [ r - 3 ] + left [ r - 2 ] * 2 + left [ r - 1 ] , 2 ) ; for ( r = 2 ; r < bs ; ++ r ) { for ( c = 1 ; c < bs ; c ++ ) dst [ c ] = dst [ - 2 * stride + c - 1 ] ; dst += stride ; } } intra_pred_allsizes ( d117 ) static INLINE void d135_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r , c ; dst [ 0 ] = ROUND_POWER_OF_TWO ( left [ 0 ] + above [ - 1 ] * 2 + above [ 0 ] , 2 ) ; for ( c = 1 ; c < bs ; c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 2 ] + above [ c - 1 ] * 2 + above [ c ] , 2 ) ; dst [ stride ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] * 2 + left [ 1 ] , 2 ) ; for ( r = 2 ; r < bs ; ++ r ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r - 2 ] + left [ r - 1 ] * 2 + left [ r ] , 2 ) ; dst += stride ; for ( r = 1 ; r < bs ; ++ r ) { for ( c = 1 ; c < bs ; c ++ ) dst [ c ] = dst [ - stride + c - 1 ] ; dst += stride ; } } intra_pred_allsizes ( d135 ) static INLINE void d153_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r , c ; dst [ 0 ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] , 1 ) ; for ( r = 1 ; r < bs ; r ++ ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r - 1 ] + left [ r ] , 1 ) ; dst ++ ; dst [ 0 ] = ROUND_POWER_OF_TWO ( left [ 0 ] + above [ - 1 ] * 2 + above [ 0 ] , 2 ) ; dst [ stride ] = ROUND_POWER_OF_TWO ( above [ - 1 ] + left [ 0 ] * 2 + left [ 1 ] , 2 ) ; for ( r = 2 ; r < bs ; r ++ ) dst [ r * stride ] = ROUND_POWER_OF_TWO ( left [ r - 2 ] + left [ r - 1 ] * 2 + left [ r ] , 2 ) ; dst ++ ; for ( c = 0 ; c < bs - 2 ; c ++ ) dst [ c ] = ROUND_POWER_OF_TWO ( above [ c - 1 ] + above [ c ] * 2 + above [ c + 1 ] , 2 ) ; dst += stride ; for ( r = 1 ; r < bs ; ++ r ) { for ( c = 0 ; c < bs - 2 ; c ++ ) dst [ c ] = dst [ - stride + c - 2 ] ; dst += stride ; } } intra_pred_allsizes ( d153 ) static INLINE void v_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r ; ( void ) left ; for ( r = 0 ; r < bs ; r ++ ) { vpx_memcpy ( dst , above , bs ) ; dst += stride ; } } intra_pred_allsizes ( v ) static INLINE void h_predictor ( uint8_t * dst , ptrdiff_t stride , int bs , const uint8_t * above , const uint8_t * left ) { int r ; ( void ) above ; for ( r = 0 ; r < bs ; r ++ ) { vpx_memset ( dst , left [ r ] , bs ) ; dst += stride ; } } intra_pred_allsizes ( h )
1True
Categorize the following code snippet as vulnerable or not. True or False
void jpc_ft_invlift_colres ( jpc_fix_t * a , int numrows , int numcols , int stride , int parity ) { jpc_fix_t * lptr ; jpc_fix_t * hptr ; register jpc_fix_t * lptr2 ; register jpc_fix_t * hptr2 ; register int n ; register int i ; int llen ; llen = ( numrows + 1 - parity ) >> 1 ; if ( numrows > 1 ) { lptr = & a [ 0 ] ; hptr = & a [ llen * stride ] ; if ( ! parity ) { lptr2 = lptr ; hptr2 = hptr ; for ( i = 0 ; i < numcols ; ++ i ) { lptr2 [ 0 ] -= jpc_fix_asr ( hptr2 [ 0 ] + 1 , 1 ) ; ++ lptr2 ; ++ hptr2 ; } lptr += stride ; } n = llen - ( ! parity ) - ( parity != ( numrows & 1 ) ) ; while ( n -- > 0 ) { lptr2 = lptr ; hptr2 = hptr ; for ( i = 0 ; i < numcols ; ++ i ) { lptr2 [ 0 ] -= jpc_fix_asr ( hptr2 [ 0 ] + hptr2 [ stride ] + 2 , 2 ) ; ++ lptr2 ; ++ hptr2 ; } lptr += stride ; hptr += stride ; } if ( parity != ( numrows & 1 ) ) { lptr2 = lptr ; hptr2 = hptr ; for ( i = 0 ; i < numcols ; ++ i ) { lptr2 [ 0 ] -= jpc_fix_asr ( hptr2 [ 0 ] + 1 , 1 ) ; ++ lptr2 ; ++ hptr2 ; } } lptr = & a [ 0 ] ; hptr = & a [ llen * stride ] ; if ( parity ) { lptr2 = lptr ; hptr2 = hptr ; for ( i = 0 ; i < numcols ; ++ i ) { hptr2 [ 0 ] += lptr2 [ 0 ] ; ++ hptr2 ; ++ lptr2 ; } hptr += stride ; } n = numrows - llen - parity - ( parity == ( numrows & 1 ) ) ; while ( n -- > 0 ) { lptr2 = lptr ; hptr2 = hptr ; for ( i = 0 ; i < numcols ; ++ i ) { hptr2 [ 0 ] += jpc_fix_asr ( lptr2 [ 0 ] + lptr2 [ stride ] , 1 ) ; ++ lptr2 ; ++ hptr2 ; } hptr += stride ; lptr += stride ; } if ( parity == ( numrows & 1 ) ) { lptr2 = lptr ; hptr2 = hptr ; for ( i = 0 ; i < numcols ; ++ i ) { hptr2 [ 0 ] += lptr2 [ 0 ] ; ++ lptr2 ; ++ hptr2 ; } } } else { if ( parity ) { lptr2 = & a [ 0 ] ; for ( i = 0 ; i < numcols ; ++ i ) { lptr2 [ 0 ] = jpc_fix_asr ( lptr2 [ 0 ] , 1 ) ; ++ lptr2 ; } } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
IN_PROC_BROWSER_TEST_F ( BookmarkBubbleSignInDelegateTest , BrowserRemoved ) { Browser * extra_browser = CreateBrowser ( profile ( ) ) ; ReplaceBlank ( extra_browser ) ; int starting_tab_count = extra_browser -> tab_strip_model ( ) -> count ( ) ; scoped_ptr < BookmarkBubbleDelegate > delegate ; delegate . reset ( new BookmarkBubbleSignInDelegate ( browser ( ) ) ) ; BrowserList : : SetLastActive ( extra_browser ) ; browser ( ) -> tab_strip_model ( ) -> CloseAllTabs ( ) ; content : : RunAllPendingInMessageLoop ( ) ; delegate -> OnSignInLinkClicked ( ) ; int tab_count = extra_browser -> tab_strip_model ( ) -> count ( ) ; EXPECT_EQ ( starting_tab_count + 1 , tab_count ) ; }
1True
Categorize the following code snippet as vulnerable or not. True or False
static inline int vc1_pred_dc ( MpegEncContext * s , int overlap , int pq , int n , int a_avail , int c_avail , int16_t * * dc_val_ptr , int * dir_ptr ) { int a , b , c , wrap , pred ; int16_t * dc_val ; int mb_pos = s -> mb_x + s -> mb_y * s -> mb_stride ; int q1 , q2 = 0 ; int dqscale_index ; wrap = s -> block_wrap [ n ] ; dc_val = s -> dc_val [ 0 ] + s -> block_index [ n ] ; c = dc_val [ - 1 ] ; b = dc_val [ - 1 - wrap ] ; a = dc_val [ - wrap ] ; q1 = s -> current_picture . qscale_table [ mb_pos ] ; dqscale_index = s -> y_dc_scale_table [ q1 ] - 1 ; if ( dqscale_index < 0 ) return 0 ; if ( c_avail && ( n != 1 && n != 3 ) ) { q2 = s -> current_picture . qscale_table [ mb_pos - 1 ] ; if ( q2 && q2 != q1 ) c = ( c * s -> y_dc_scale_table [ q2 ] * ff_vc1_dqscale [ dqscale_index ] + 0x20000 ) >> 18 ; } if ( a_avail && ( n != 2 && n != 3 ) ) { q2 = s -> current_picture . qscale_table [ mb_pos - s -> mb_stride ] ; if ( q2 && q2 != q1 ) a = ( a * s -> y_dc_scale_table [ q2 ] * ff_vc1_dqscale [ dqscale_index ] + 0x20000 ) >> 18 ; } if ( a_avail && c_avail && ( n != 3 ) ) { int off = mb_pos ; if ( n != 1 ) off -- ; if ( n != 2 ) off -= s -> mb_stride ; q2 = s -> current_picture . qscale_table [ off ] ; if ( q2 && q2 != q1 ) b = ( b * s -> y_dc_scale_table [ q2 ] * ff_vc1_dqscale [ dqscale_index ] + 0x20000 ) >> 18 ; } if ( a_avail && c_avail ) { if ( abs ( a - b ) <= abs ( b - c ) ) { pred = c ; * dir_ptr = 1 ; } else { pred = a ; * dir_ptr = 0 ; } } else if ( a_avail ) { pred = a ; * dir_ptr = 0 ; } else if ( c_avail ) { pred = c ; * dir_ptr = 1 ; } else { pred = 0 ; * dir_ptr = 1 ; } * dc_val_ptr = & dc_val [ 0 ] ; return pred ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void encode_txfm_probs ( VP9_COMMON * cm , vp9_writer * w ) { vp9_write_literal ( w , MIN ( cm -> tx_mode , ALLOW_32X32 ) , 2 ) ; if ( cm -> tx_mode >= ALLOW_32X32 ) vp9_write_bit ( w , cm -> tx_mode == TX_MODE_SELECT ) ; if ( cm -> tx_mode == TX_MODE_SELECT ) { int i , j ; unsigned int ct_8x8p [ TX_SIZES - 3 ] [ 2 ] ; unsigned int ct_16x16p [ TX_SIZES - 2 ] [ 2 ] ; unsigned int ct_32x32p [ TX_SIZES - 1 ] [ 2 ] ; for ( i = 0 ; i < TX_SIZE_CONTEXTS ; i ++ ) { tx_counts_to_branch_counts_8x8 ( cm -> counts . tx . p8x8 [ i ] , ct_8x8p ) ; for ( j = 0 ; j < TX_SIZES - 3 ; j ++ ) vp9_cond_prob_diff_update ( w , & cm -> fc . tx_probs . p8x8 [ i ] [ j ] , ct_8x8p [ j ] ) ; } for ( i = 0 ; i < TX_SIZE_CONTEXTS ; i ++ ) { tx_counts_to_branch_counts_16x16 ( cm -> counts . tx . p16x16 [ i ] , ct_16x16p ) ; for ( j = 0 ; j < TX_SIZES - 2 ; j ++ ) vp9_cond_prob_diff_update ( w , & cm -> fc . tx_probs . p16x16 [ i ] [ j ] , ct_16x16p [ j ] ) ; } for ( i = 0 ; i < TX_SIZE_CONTEXTS ; i ++ ) { tx_counts_to_branch_counts_32x32 ( cm -> counts . tx . p32x32 [ i ] , ct_32x32p ) ; for ( j = 0 ; j < TX_SIZES - 1 ; j ++ ) vp9_cond_prob_diff_update ( w , & cm -> fc . tx_probs . p32x32 [ i ] [ j ] , ct_32x32p [ j ] ) ; } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int64_t timebase_units_to_ticks ( const vpx_rational_t * timebase , int64_t n ) { return n * TICKS_PER_SEC * timebase -> num / timebase -> den ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int transform_hook_handler ( TSCont contp , TSEvent event , void * edata ) { TSHttpTxn txnp = nullptr ; TransformTestData * data = nullptr ; CHECK_SPURIOUS_EVENT ( contp , event , edata ) ; data = ( TransformTestData * ) TSContDataGet ( contp ) ; switch ( event ) { case TS_EVENT_HTTP_READ_REQUEST_HDR : txnp = ( TSHttpTxn ) edata ; TSSkipRemappingSet ( txnp , 1 ) ; TSHttpTxnReenable ( txnp , TS_EVENT_HTTP_CONTINUE ) ; break ; case TS_EVENT_HTTP_READ_RESPONSE_HDR : txnp = ( TSHttpTxn ) edata ; if ( transformable ( txnp , data ) ) { transform_add ( txnp , data ) ; } { TSMBuffer bufp ; TSMLoc hdr ; TSMLoc field ; if ( TSHttpTxnClientReqGet ( txnp , & bufp , & hdr ) != TS_SUCCESS ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransform" , "TestCase" , TC_FAIL , "TSHttpTxnClientReqGet returns 0" ) ; } else { if ( TS_NULL_MLOC == ( field = TSMimeHdrFieldFind ( bufp , hdr , "Request" , - 1 ) ) ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransform" , "TestCase" , TC_FAIL , "Didn't find field request" ) ; } else { int reqid = TSMimeHdrFieldValueIntGet ( bufp , hdr , field , 0 ) ; if ( reqid == 1 ) { TSHttpTxnTransformedRespCache ( txnp , 0 ) ; TSHttpTxnUntransformedRespCache ( txnp , 1 ) ; } if ( reqid == 2 ) { TSHttpTxnTransformedRespCache ( txnp , 1 ) ; TSHttpTxnUntransformedRespCache ( txnp , 0 ) ; } if ( TSHandleMLocRelease ( bufp , hdr , field ) != TS_SUCCESS ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransform" , "TestCase" , TC_FAIL , "Unable to release handle to field in Client request" ) ; } } if ( TSHandleMLocRelease ( bufp , TS_NULL_MLOC , hdr ) != TS_SUCCESS ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransform" , "TestCase" , TC_FAIL , "Unable to release handle to Client request" ) ; } } } TSHttpTxnHookAdd ( txnp , TS_HTTP_SEND_RESPONSE_HDR_HOOK , contp ) ; TSHttpTxnReenable ( txnp , TS_EVENT_HTTP_CONTINUE ) ; break ; case TS_EVENT_HTTP_SEND_RESPONSE_HDR : { TSMBuffer bufp ; TSMLoc hdr ; txnp = ( TSHttpTxn ) edata ; if ( TSHttpTxnTransformRespGet ( txnp , & bufp , & hdr ) != TS_SUCCESS ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransformRespGet" , "TestCase" , TC_FAIL , "TSHttpTxnTransformRespGet returns 0" ) ; data -> test_passed_txn_transform_resp_get = false ; } else { if ( ( bufp == reinterpret_cast < TSMBuffer > ( & ( ( ( HttpSM * ) txnp ) -> t_state . hdr_info . transform_response ) ) ) && ( hdr == reinterpret_cast < TSMLoc > ( ( & ( ( ( HttpSM * ) txnp ) -> t_state . hdr_info . transform_response ) ) -> m_http ) ) ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransformRespGet" , "TestCase" , TC_PASS , "ok" ) ; } else { SDK_RPRINT ( data -> test , "TSHttpTxnTransformRespGet" , "TestCase" , TC_FAIL , "Value's Mismatch" ) ; data -> test_passed_txn_transform_resp_get = false ; } if ( TSHandleMLocRelease ( bufp , TS_NULL_MLOC , hdr ) != TS_SUCCESS ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransformRespGet" , "TestCase" , TC_FAIL , "Unable to release handle to Transform header handle" ) ; } } } TSHttpTxnReenable ( txnp , TS_EVENT_HTTP_CONTINUE ) ; break ; case TS_EVENT_IMMEDIATE : case TS_EVENT_TIMEOUT : switch ( data -> req_no ) { case 1 : if ( data -> browser1 -> status == REQUEST_INPROGRESS ) { TSContSchedule ( contp , 25 , TS_THREAD_POOL_DEFAULT ) ; return 0 ; } data -> req_no ++ ; Debug ( UTDBG_TAG "_transform" , "Running Browser 2" ) ; synclient_txn_send_request ( data -> browser2 , data -> request2 ) ; TSContSchedule ( contp , 25 , TS_THREAD_POOL_DEFAULT ) ; return 0 ; case 2 : if ( data -> browser2 -> status == REQUEST_INPROGRESS ) { TSContSchedule ( contp , 25 , TS_THREAD_POOL_DEFAULT ) ; return 0 ; } data -> req_no ++ ; Debug ( UTDBG_TAG "_transform" , "Running Browser 3" ) ; synclient_txn_send_request ( data -> browser3 , data -> request1 ) ; TSContSchedule ( contp , 25 , TS_THREAD_POOL_DEFAULT ) ; return 0 ; case 3 : if ( data -> browser3 -> status == REQUEST_INPROGRESS ) { TSContSchedule ( contp , 25 , TS_THREAD_POOL_DEFAULT ) ; return 0 ; } data -> req_no ++ ; Debug ( UTDBG_TAG "_transform" , "Running Browser 4" ) ; synclient_txn_send_request ( data -> browser4 , data -> request2 ) ; TSContSchedule ( contp , 25 , TS_THREAD_POOL_DEFAULT ) ; return 0 ; case 4 : if ( data -> browser4 -> status == REQUEST_INPROGRESS ) { TSContSchedule ( contp , 25 , TS_THREAD_POOL_DEFAULT ) ; return 0 ; } synserver_delete ( data -> os ) ; data -> os = nullptr ; data -> req_no ++ ; TSfree ( data -> request1 ) ; TSfree ( data -> request2 ) ; break ; default : SDK_RPRINT ( data -> test , "TSHttpTxnTransform" , "TestCase" , TC_FAIL , "Something terribly wrong with the test" ) ; exit ( 0 ) ; } { if ( ( strstr ( data -> browser1 -> response , TRANSFORM_APPEND_STRING ) != nullptr ) && ( strstr ( data -> browser3 -> response , TRANSFORM_APPEND_STRING ) == nullptr ) ) { SDK_RPRINT ( data -> test , "TSHttpTxnUntransformedResponseCache" , "TestCase1" , TC_PASS , "ok" ) ; data -> test_passed_txn_untransformed_resp_cache = true ; } else { SDK_RPRINT ( data -> test , "TSHttpTxnUntransformedResponseCache" , "TestCase1" , TC_FAIL , "Value's Mismatch" ) ; } if ( ( strstr ( data -> browser2 -> response , TRANSFORM_APPEND_STRING ) != nullptr ) && ( strstr ( data -> browser4 -> response , TRANSFORM_APPEND_STRING ) != nullptr ) ) { SDK_RPRINT ( data -> test , "TSHttpTxnTransformedResponseCache" , "TestCase1" , TC_PASS , "ok" ) ; data -> test_passed_txn_transformed_resp_cache = true ; } else { SDK_RPRINT ( data -> test , "TSHttpTxnTransformedResponseCache" , "TestCase1" , TC_FAIL , "Value's Mismatch" ) ; } * ( data -> pstatus ) = REGRESSION_TEST_PASSED ; if ( data -> browser1 -> status != REQUEST_SUCCESS ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "Browser 1 status was not REQUEST_SUCCESS" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } if ( data -> browser2 -> status != REQUEST_SUCCESS ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "Browser 2 status was not REQUEST_SUCCESS" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } if ( data -> browser3 -> status != REQUEST_SUCCESS ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "Browser 3 status was not REQUEST_SUCCESS" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } if ( data -> browser4 -> status != REQUEST_SUCCESS ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "Browser 4 status was not REQUEST_SUCCESS" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } if ( data -> test_passed_txn_transform_resp_get != true ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "did not pass transform_resp_get" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } if ( data -> test_passed_txn_transformed_resp_cache != true ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "did not pass transformed_resp_cache" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } if ( data -> test_passed_txn_untransformed_resp_cache != true ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "did not pass untransformed_resp_cache" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } if ( data -> test_passed_transform_create != true ) { SDK_RPRINT ( data -> test , "TSTransformCreate" , "TestCase1" , TC_FAIL , "did not pass transform_create" ) ; * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; } synclient_txn_delete ( data -> browser1 ) ; synclient_txn_delete ( data -> browser2 ) ; synclient_txn_delete ( data -> browser3 ) ; synclient_txn_delete ( data -> browser4 ) ; TSContDataSet ( contp , nullptr ) ; data -> magic = MAGIC_DEAD ; TSfree ( data ) ; } break ; default : * ( data -> pstatus ) = REGRESSION_TEST_FAILED ; SDK_RPRINT ( data -> test , "TSHttpTxnTransform" , "TestCase1" , TC_FAIL , "Unexpected event %d" , event ) ; break ; } return 0 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int ebml_read_num ( MatroskaDemuxContext * matroska , AVIOContext * pb , int max_size , uint64_t * number ) { int read = 1 , n = 1 ; uint64_t total = 0 ; if ( ! ( total = avio_r8 ( pb ) ) ) { if ( ! pb -> eof_reached ) { int64_t pos = avio_tell ( pb ) ; av_log ( matroska -> ctx , AV_LOG_ERROR , "Read error at pos. %" PRIu64 " (0x%" PRIx64 ")\n" , pos , pos ) ; return pb -> error ? pb -> error : AVERROR ( EIO ) ; } return AVERROR_EOF ; } read = 8 - ff_log2_tab [ total ] ; if ( read > max_size ) { int64_t pos = avio_tell ( pb ) - 1 ; av_log ( matroska -> ctx , AV_LOG_ERROR , "Invalid EBML number size tag 0x%02x at pos %" PRIu64 " (0x%" PRIx64 ")\n" , ( uint8_t ) total , pos , pos ) ; return AVERROR_INVALIDDATA ; } total ^= 1 << ff_log2_tab [ total ] ; while ( n ++ < read ) total = ( total << 8 ) | avio_r8 ( pb ) ; * number = total ; return read ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void * Type_Text_Read ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , cmsUInt32Number * nItems , cmsUInt32Number SizeOfTag ) { char * Text = NULL ; cmsMLU * mlu = NULL ; mlu = cmsMLUalloc ( self -> ContextID , 1 ) ; if ( mlu == NULL ) return NULL ; * nItems = 0 ; if ( SizeOfTag == UINT_MAX ) goto Error ; Text = ( char * ) _cmsMalloc ( self -> ContextID , SizeOfTag + 1 ) ; if ( Text == NULL ) goto Error ; if ( io -> Read ( io , Text , sizeof ( char ) , SizeOfTag ) != SizeOfTag ) goto Error ; Text [ SizeOfTag ] = 0 ; * nItems = 1 ; if ( ! cmsMLUsetASCII ( mlu , cmsNoLanguage , cmsNoCountry , Text ) ) goto Error ; _cmsFree ( self -> ContextID , Text ) ; return ( void * ) mlu ; Error : if ( mlu != NULL ) cmsMLUfree ( mlu ) ; if ( Text != NULL ) _cmsFree ( self -> ContextID , Text ) ; return NULL ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static bfd_boolean srec_get_section_contents ( bfd * abfd , asection * section , void * location , file_ptr offset , bfd_size_type count ) { if ( count == 0 ) return TRUE ; if ( offset + count < count || offset + count > section -> size ) { bfd_set_error ( bfd_error_invalid_operation ) ; return FALSE ; } if ( section -> used_by_bfd == NULL ) { section -> used_by_bfd = bfd_alloc ( abfd , section -> size ) ; if ( section -> used_by_bfd == NULL ) return FALSE ; if ( ! srec_read_section ( abfd , section , ( bfd_byte * ) section -> used_by_bfd ) ) return FALSE ; } memcpy ( location , ( bfd_byte * ) section -> used_by_bfd + offset , ( size_t ) count ) ; return TRUE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void _LMBCSOpenWorker ( UConverter * _this , UConverterLoadArgs * pArgs , UErrorCode * err , ulmbcs_byte_t OptGroup ) { UConverterDataLMBCS * extraInfo = ( UConverterDataLMBCS * ) uprv_malloc ( sizeof ( UConverterDataLMBCS ) ) ; _this -> extraInfo = extraInfo ; if ( extraInfo != NULL ) { UConverterNamePieces stackPieces ; UConverterLoadArgs stackArgs = UCNV_LOAD_ARGS_INITIALIZER ; ulmbcs_byte_t i ; uprv_memset ( extraInfo , 0 , sizeof ( UConverterDataLMBCS ) ) ; stackArgs . onlyTestIsLoadable = pArgs -> onlyTestIsLoadable ; for ( i = 0 ; i <= ULMBCS_GRP_LAST && U_SUCCESS ( * err ) ; i ++ ) { if ( OptGroupByteToCPName [ i ] != NULL ) { extraInfo -> OptGrpConverter [ i ] = ucnv_loadSharedData ( OptGroupByteToCPName [ i ] , & stackPieces , & stackArgs , err ) ; } } if ( U_FAILURE ( * err ) || pArgs -> onlyTestIsLoadable ) { _LMBCSClose ( _this ) ; return ; } extraInfo -> OptGroup = OptGroup ; extraInfo -> localeConverterIndex = FindLMBCSLocale ( pArgs -> locale ) ; } else { * err = U_MEMORY_ALLOCATION_ERROR ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void mclms_update ( WmallDecodeCtx * s , int icoef , int * pred ) { int i , j , ich , pred_error ; int order = s -> mclms_order ; int num_channels = s -> num_channels ; int range = 1 << ( s -> bits_per_sample - 1 ) ; for ( ich = 0 ; ich < num_channels ; ich ++ ) { pred_error = s -> channel_residues [ ich ] [ icoef ] - pred [ ich ] ; if ( pred_error > 0 ) { for ( i = 0 ; i < order * num_channels ; i ++ ) s -> mclms_coeffs [ i + ich * order * num_channels ] += s -> mclms_updates [ s -> mclms_recent + i ] ; for ( j = 0 ; j < ich ; j ++ ) { if ( s -> channel_residues [ j ] [ icoef ] > 0 ) s -> mclms_coeffs_cur [ ich * num_channels + j ] += 1 ; else if ( s -> channel_residues [ j ] [ icoef ] < 0 ) s -> mclms_coeffs_cur [ ich * num_channels + j ] -= 1 ; } } else if ( pred_error < 0 ) { for ( i = 0 ; i < order * num_channels ; i ++ ) s -> mclms_coeffs [ i + ich * order * num_channels ] -= s -> mclms_updates [ s -> mclms_recent + i ] ; for ( j = 0 ; j < ich ; j ++ ) { if ( s -> channel_residues [ j ] [ icoef ] > 0 ) s -> mclms_coeffs_cur [ ich * num_channels + j ] -= 1 ; else if ( s -> channel_residues [ j ] [ icoef ] < 0 ) s -> mclms_coeffs_cur [ ich * num_channels + j ] += 1 ; } } } for ( ich = num_channels - 1 ; ich >= 0 ; ich -- ) { s -> mclms_recent -- ; s -> mclms_prevvalues [ s -> mclms_recent ] = s -> channel_residues [ ich ] [ icoef ] ; if ( s -> channel_residues [ ich ] [ icoef ] > range - 1 ) s -> mclms_prevvalues [ s -> mclms_recent ] = range - 1 ; else if ( s -> channel_residues [ ich ] [ icoef ] < - range ) s -> mclms_prevvalues [ s -> mclms_recent ] = - range ; s -> mclms_updates [ s -> mclms_recent ] = 0 ; if ( s -> channel_residues [ ich ] [ icoef ] > 0 ) s -> mclms_updates [ s -> mclms_recent ] = 1 ; else if ( s -> channel_residues [ ich ] [ icoef ] < 0 ) s -> mclms_updates [ s -> mclms_recent ] = - 1 ; } if ( s -> mclms_recent == 0 ) { memcpy ( & s -> mclms_prevvalues [ order * num_channels ] , s -> mclms_prevvalues , 2 * order * num_channels ) ; memcpy ( & s -> mclms_updates [ order * num_channels ] , s -> mclms_updates , 2 * order * num_channels ) ; s -> mclms_recent = num_channels * order ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void printout_rate_control_summary ( struct RateControlMetrics * rc , vpx_codec_enc_cfg_t * cfg , int frame_cnt ) { unsigned int i = 0 ; int tot_num_frames = 0 ; printf ( "Total number of processed frames: %d\n\n" , frame_cnt - 1 ) ; printf ( "Rate control layer stats for %d layer(s):\n\n" , cfg -> ts_number_layers ) ; for ( i = 0 ; i < cfg -> ts_number_layers ; ++ i ) { const int num_dropped = ( i > 0 ) ? ( rc -> layer_input_frames [ i ] - rc -> layer_enc_frames [ i ] ) : ( rc -> layer_input_frames [ i ] - rc -> layer_enc_frames [ i ] - 1 ) ; tot_num_frames += rc -> layer_input_frames [ i ] ; rc -> layer_encoding_bitrate [ i ] = 0.001 * rc -> layer_framerate [ i ] * rc -> layer_encoding_bitrate [ i ] / tot_num_frames ; rc -> layer_avg_frame_size [ i ] = rc -> layer_avg_frame_size [ i ] / rc -> layer_enc_frames [ i ] ; rc -> layer_avg_rate_mismatch [ i ] = 100.0 * rc -> layer_avg_rate_mismatch [ i ] / rc -> layer_enc_frames [ i ] ; printf ( "For layer#: %d \n" , i ) ; printf ( "Bitrate (target vs actual): %d %f \n" , cfg -> ts_target_bitrate [ i ] , rc -> layer_encoding_bitrate [ i ] ) ; printf ( "Average frame size (target vs actual): %f %f \n" , rc -> layer_pfb [ i ] , rc -> layer_avg_frame_size [ i ] ) ; printf ( "Average rate_mismatch: %f \n" , rc -> layer_avg_rate_mismatch [ i ] ) ; printf ( "Number of input frames, encoded (non-key) frames, " "and perc dropped frames: %d %d %f \n" , rc -> layer_input_frames [ i ] , rc -> layer_enc_frames [ i ] , 100.0 * num_dropped / rc -> layer_input_frames [ i ] ) ; printf ( "\n" ) ; } if ( ( frame_cnt - 1 ) != tot_num_frames ) die ( "Error: Number of input frames not equal to output! \n" ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static guint16 de_cld_party_sub_addr ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len , gchar * add_string _U_ , int string_len _U_ ) { gchar * extr_addr ; de_sub_addr ( tvb , tree , pinfo , offset , len , & extr_addr ) ; if ( extr_addr && add_string ) g_snprintf ( add_string , string_len , " - (%s)" , extr_addr ) ; return ( len ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static guint16 de_prio ( tvbuff_t * tvb , proto_tree * tree , packet_info * pinfo _U_ , guint32 offset , guint len _U_ , gchar * add_string _U_ , int string_len _U_ ) { guint32 curr_offset ; curr_offset = offset ; proto_tree_add_item ( tree , hf_gsm_a_b8spare , tvb , curr_offset , 1 , ENC_BIG_ENDIAN ) ; proto_tree_add_bits_item ( tree , hf_gsm_a_call_prio , tvb , ( curr_offset << 3 ) + 5 , 3 , ENC_BIG_ENDIAN ) ; curr_offset ++ ; return ( curr_offset - offset ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static inline void handle_variation_selector_cluster ( const hb_ot_shape_normalize_context_t * c , unsigned int end , bool short_circuit ) { hb_buffer_t * const buffer = c -> buffer ; hb_font_t * const font = c -> font ; for ( ; buffer -> idx < end - 1 ; ) { if ( unlikely ( buffer -> unicode -> is_variation_selector ( buffer -> cur ( + 1 ) . codepoint ) ) ) { if ( font -> get_glyph ( buffer -> cur ( ) . codepoint , buffer -> cur ( + 1 ) . codepoint , & buffer -> cur ( ) . glyph_index ( ) ) ) { buffer -> replace_glyphs ( 2 , 1 , & buffer -> cur ( ) . codepoint ) ; } else { set_glyph ( buffer -> cur ( ) , font ) ; buffer -> next_glyph ( ) ; set_glyph ( buffer -> cur ( ) , font ) ; buffer -> next_glyph ( ) ; } while ( buffer -> idx < end && unlikely ( buffer -> unicode -> is_variation_selector ( buffer -> cur ( ) . codepoint ) ) ) { set_glyph ( buffer -> cur ( ) , font ) ; buffer -> next_glyph ( ) ; } } else { set_glyph ( buffer -> cur ( ) , font ) ; buffer -> next_glyph ( ) ; } } if ( likely ( buffer -> idx < end ) ) { set_glyph ( buffer -> cur ( ) , font ) ; buffer -> next_glyph ( ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void _uhash_allocate ( UHashtable * hash , int32_t primeIndex , UErrorCode * status ) { UHashElement * p , * limit ; UHashTok emptytok ; if ( U_FAILURE ( * status ) ) return ; U_ASSERT ( primeIndex >= 0 && primeIndex < PRIMES_LENGTH ) ; hash -> primeIndex = primeIndex ; hash -> length = PRIMES [ primeIndex ] ; p = hash -> elements = ( UHashElement * ) uprv_malloc ( sizeof ( UHashElement ) * hash -> length ) ; if ( hash -> elements == NULL ) { * status = U_MEMORY_ALLOCATION_ERROR ; return ; } emptytok . pointer = NULL ; emptytok . integer = 0 ; limit = p + hash -> length ; while ( p < limit ) { p -> key = emptytok ; p -> value = emptytok ; p -> hashcode = HASH_EMPTY ; ++ p ; } hash -> count = 0 ; hash -> lowWaterMark = ( int32_t ) ( hash -> length * hash -> lowWaterRatio ) ; hash -> highWaterMark = ( int32_t ) ( hash -> length * hash -> highWaterRatio ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void report_type_length_mismatch ( proto_tree * tree , const gchar * descr , int length , gboolean is_error ) { if ( is_error ) { expert_add_info_format ( NULL , tree , & ei_type_length_mismatch_error , "Trying to fetch %s with length %d" , descr , length ) ; } else { expert_add_info_format ( NULL , tree , & ei_type_length_mismatch_warn , "Trying to fetch %s with length %d" , descr , length ) ; } if ( is_error ) { THROW ( ReportedBoundsError ) ; } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void scale_and_extend_frame ( const YV12_BUFFER_CONFIG * src , YV12_BUFFER_CONFIG * dst ) { const int src_w = src -> y_crop_width ; const int src_h = src -> y_crop_height ; const int dst_w = dst -> y_crop_width ; const int dst_h = dst -> y_crop_height ; const uint8_t * const srcs [ 3 ] = { src -> y_buffer , src -> u_buffer , src -> v_buffer } ; const int src_strides [ 3 ] = { src -> y_stride , src -> uv_stride , src -> uv_stride } ; uint8_t * const dsts [ 3 ] = { dst -> y_buffer , dst -> u_buffer , dst -> v_buffer } ; const int dst_strides [ 3 ] = { dst -> y_stride , dst -> uv_stride , dst -> uv_stride } ; const InterpKernel * const kernel = vp9_get_interp_kernel ( EIGHTTAP ) ; int x , y , i ; for ( y = 0 ; y < dst_h ; y += 16 ) { for ( x = 0 ; x < dst_w ; x += 16 ) { for ( i = 0 ; i < MAX_MB_PLANE ; ++ i ) { const int factor = ( i == 0 || i == 3 ? 1 : 2 ) ; const int x_q4 = x * ( 16 / factor ) * src_w / dst_w ; const int y_q4 = y * ( 16 / factor ) * src_h / dst_h ; const int src_stride = src_strides [ i ] ; const int dst_stride = dst_strides [ i ] ; const uint8_t * src_ptr = srcs [ i ] + ( y / factor ) * src_h / dst_h * src_stride + ( x / factor ) * src_w / dst_w ; uint8_t * dst_ptr = dsts [ i ] + ( y / factor ) * dst_stride + ( x / factor ) ; vp9_convolve8 ( src_ptr , src_stride , dst_ptr , dst_stride , kernel [ x_q4 & 0xf ] , 16 * src_w / dst_w , kernel [ y_q4 & 0xf ] , 16 * src_h / dst_h , / factor , 16 / factor ) ; } } } vp9_extend_frame_borders ( dst ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
TEST_F ( PromoResourceServiceTest , NotificationPromoCompatNoStringsTest ) { NotificationPromoTest promo_test ; promo_test . Init ( "{ " " \"ntp_notification_promo\": [" " { " " \"date\":" " [" " { " " \"start\":\"3 Aug 1999 9:26:06 GMT\"," " \"end\":\"$1\"" " } " " ]," " \"grouping\":" " { " " \"buckets\":1000," " \"segment\":200," " \"increment\":100," " \"increment_frequency\":3600," " \"increment_max\":400" " } ," " \"payload\":" " { " " \"promo_message_short\":" " \"What do you think of Chrome?\"," " \"days_active\":7," " \"install_age_days\":21" " } ," " \"max_views\":30" " } " " ]" "} " , "What do you think of Chrome?" , 933672366 , 1000 , 200 , 100 , 3600 , 400 , 30 ) ; promo_test . InitPromoFromJson ( true ) ; promo_test . InitPromoFromJson ( false ) ; promo_test . TestInitFromPrefs ( ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void printAt ( UBreakIterator * boundary , int32_t pos , UChar * str ) { int32_t start ; int32_t end = ubrk_following ( boundary , pos ) ; start = ubrk_previous ( boundary ) ; printTextRange ( str , start , end ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void pxa2xx_rtc_sysbus_class_init ( ObjectClass * klass , void * data ) { DeviceClass * dc = DEVICE_CLASS ( klass ) ; SysBusDeviceClass * k = SYS_BUS_DEVICE_CLASS ( klass ) ; k -> init = pxa2xx_rtc_init ; dc -> desc = "PXA2xx RTC Controller" ; dc -> vmsd = & vmstate_pxa2xx_rtc_regs ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
EVP_PKEY * d2i_PrivateKey_bio ( BIO * bp , EVP_PKEY * * a ) { return ASN1_d2i_bio_of ( EVP_PKEY , EVP_PKEY_new , d2i_AutoPrivateKey , bp , a ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
void vp9_build_inter_predictors_sbuv ( MACROBLOCKD * xd , int mi_row , int mi_col , BLOCK_SIZE bsize ) { build_inter_predictors_for_planes ( xd , bsize , mi_row , mi_col , 1 , MAX_MB_PLANE - 1 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static bool SetEncChromaFormat ( encoder_t * p_enc , uint32_t i_codec ) { encoder_sys_t * p_sys = p_enc -> p_sys ; switch ( i_codec ) { case VLC_CODEC_I420 : p_enc -> fmt_in . i_codec = i_codec ; p_enc -> fmt_in . video . i_bits_per_pixel = 12 ; p_sys -> p_format -> chroma_format = SCHRO_CHROMA_420 ; break ; case VLC_CODEC_I422 : p_enc -> fmt_in . i_codec = i_codec ; p_enc -> fmt_in . video . i_bits_per_pixel = 16 ; p_sys -> p_format -> chroma_format = SCHRO_CHROMA_422 ; break ; case VLC_CODEC_I444 : p_enc -> fmt_in . i_codec = i_codec ; p_enc -> fmt_in . video . i_bits_per_pixel = 24 ; p_sys -> p_format -> chroma_format = SCHRO_CHROMA_444 ; break ; default : return false ; } return true ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static UBool prepareReorder ( const UBiDiLevel * levels , int32_t length , int32_t * indexMap , UBiDiLevel * pMinLevel , UBiDiLevel * pMaxLevel ) { int32_t start ; UBiDiLevel level , minLevel , maxLevel ; if ( levels == NULL || length <= 0 ) { return FALSE ; } minLevel = UBIDI_MAX_EXPLICIT_LEVEL + 1 ; maxLevel = 0 ; for ( start = length ; start > 0 ; ) { level = levels [ -- start ] ; if ( level > UBIDI_MAX_EXPLICIT_LEVEL + 1 ) { return FALSE ; } if ( level < minLevel ) { minLevel = level ; } if ( level > maxLevel ) { maxLevel = level ; } } * pMinLevel = minLevel ; * pMaxLevel = maxLevel ; for ( start = length ; start > 0 ; ) { -- start ; indexMap [ start ] = start ; } return TRUE ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int get_sha1_hex_from_objpath ( const char * path , unsigned char * sha1 ) { char hex [ 40 ] ; if ( strlen ( path ) != 41 ) return - 1 ; memcpy ( hex , path , 2 ) ; path += 2 ; path ++ ; memcpy ( hex , path , 38 ) ; return get_sha1_hex ( hex , sha1 ) ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static int hfinfo_mask_bitwidth ( const header_field_info * hfinfo ) { if ( ! hfinfo -> bitmask ) { return 0 ; } return ws_ilog2 ( hfinfo -> bitmask ) - ws_ctz ( hfinfo -> bitmask ) + 1 ; }
0False
Categorize the following code snippet as vulnerable or not. True or False
static void update_stats ( VP9_COMMON * cm , const MACROBLOCK * x ) { const MACROBLOCKD * const xd = & x -> e_mbd ; const MODE_INFO * const mi = xd -> mi [ 0 ] . src_mi ; const MB_MODE_INFO * const mbmi = & mi -> mbmi ; if ( ! frame_is_intra_only ( cm ) ) { const int seg_ref_active = vp9_segfeature_active ( & cm -> seg , mbmi -> segment_id , SEG_LVL_REF_FRAME ) ; if ( ! seg_ref_active ) { FRAME_COUNTS * const counts = & cm -> counts ; const int inter_block = is_inter_block ( mbmi ) ; counts -> intra_inter [ vp9_get_intra_inter_context ( xd ) ] [ inter_block ] ++ ; if ( inter_block ) { const MV_REFERENCE_FRAME ref0 = mbmi -> ref_frame [ 0 ] ; if ( cm -> reference_mode == REFERENCE_MODE_SELECT ) counts -> comp_inter [ vp9_get_reference_mode_context ( cm , xd ) ] [ has_second_ref ( mbmi ) ] ++ ; if ( has_second_ref ( mbmi ) ) { counts -> comp_ref [ vp9_get_pred_context_comp_ref_p ( cm , xd ) ] [ ref0 == GOLDEN_FRAME ] ++ ; } else { counts -> single_ref [ vp9_get_pred_context_single_ref_p1 ( xd ) ] [ 0 ] [ ref0 != LAST_FRAME ] ++ ; if ( ref0 != LAST_FRAME ) counts -> single_ref [ vp9_get_pred_context_single_ref_p2 ( xd ) ] [ 1 ] [ ref0 != GOLDEN_FRAME ] ++ ; } } } } }
0False
Categorize the following code snippet as vulnerable or not. True or False
static __always_inline __u64 __be64_to_cpup ( const __be64 * p ) { return __swab64p ( ( __u64 * ) p ) ; }
1True