diff --git "a/test.jsonl" "b/test.jsonl" --- "a/test.jsonl" +++ "b/test.jsonl" @@ -1,6456 +1,5260 @@ -{"code": " public function showall() {\r\n global $user, $sectionObj, $sections;\r\n\r\n expHistory::set('viewable', $this->params);\r\n $id = $sectionObj->id;\r\n $current = null;\r\n // all we need to do is determine the current section\r\n $navsections = $sections;\r\n if ($sectionObj->parent == -1) {\r\n $current = $sectionObj;\r\n } else {\r\n foreach ($navsections as $section) {\r\n if ($section->id == $id) {\r\n $current = $section;\r\n break;\r\n }\r\n }\r\n }\r\n assign_to_template(array(\r\n 'sections' => $navsections,\r\n 'current' => $current,\r\n 'canManage' => ((isset($user->is_acting_admin) && $user->is_acting_admin == 1) ? 1 : 0),\r\n ));\r\n }\r", "label": 0, "label_name": "vulnerable"} -{"code": "\tprivate function _adduser( $option, $tableAlias = '' ) {\n\t\t$tableAlias = ( !empty( $tableAlias ) ? $tableAlias . '.' : '' );\n\t\t$this->addSelect(\n\t\t\t[\n\t\t\t\t$tableAlias . 'revactor_actor',\n\t\t\t]\n\t\t);\n\t}", "label": 0, "label_name": "vulnerable"} -{"code": "(z=2);return z};var I=mxVertexHandler.prototype.getSelectionBorderBounds;mxVertexHandler.prototype.getSelectionBorderBounds=function(){return I.apply(this,arguments).grow(-this.getSelectionBorderInset())};var V=null,Q=mxVertexHandler.prototype.createCustomHandles;mxVertexHandler.prototype.createCustomHandles=function(){null==V&&(V=mxCellRenderer.defaultShapes.tableLine);var z=Q.apply(this,arguments);if(this.graph.isTable(this.state.cell)){var L=function(Ta,za,wa){for(var Ea=[],Da=0;DagetLength();\n $xml = $request->getXml();\n\n $this->debugOutput('
' . htmlspecialchars($xml) . PHP_EOL . '
');\n\n //This is where we deviate from the normal query()\n //Rather than open a normal sock, we will actually use the cURL\n //extensions to make the calls, and handle the SSL stuff.\n\n $curl = curl_init('https://' . $this->server . $this->path);\n\n curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);\n\n //Since 23Jun2004 (0.1.2) - Made timeout a class field\n curl_setopt($curl, CURLOPT_CONNECTTIMEOUT, $this->timeout);\n if (null !== $this->timeout_io) {\n curl_setopt($curl, CURLOPT_TIMEOUT, $this->timeout_io);\n }\n\n if ($this->debug) {\n curl_setopt($curl, CURLOPT_VERBOSE, 1);\n }\n\n curl_setopt($curl, CURLOPT_HEADER, 1);\n curl_setopt($curl, CURLOPT_POST, 1);\n curl_setopt($curl, CURLOPT_POSTFIELDS, $xml);\n if ($this->port !== 443) {\n curl_setopt($curl, CURLOPT_PORT, $this->port);\n }\n curl_setopt($curl, CURLOPT_HTTPHEADER, [\n \"Content-Type: text/xml\",\n \"Content-length: {$length}\"\n ]);\n\n // Process the SSL certificates, etc. to use\n if (!($this->_certFile === false)) {\n // We have a certificate file set, so add these to the cURL handler\n curl_setopt($curl, CURLOPT_SSLCERT, $this->_certFile);\n curl_setopt($curl, CURLOPT_SSLKEY, $this->_keyFile);\n\n if ($this->debug) {\n $this->debugOutput('SSL Cert at : ' . $this->_certFile);\n $this->debugOutput('SSL Key at : ' . $this->_keyFile);\n }\n\n // See if we need to give a passphrase\n if (!($this->_passphrase === '')) {\n curl_setopt($curl, CURLOPT_SSLCERTPASSWD, $this->_passphrase);\n }\n\n if ($this->_caFile === false) {\n // Don't verify their certificate, as we don't have a CA to verify against\n curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 0);\n } else {\n // Verify against a CA\n curl_setopt($curl, CURLOPT_CAINFO, $this->_caFile);\n }\n }\n\n // Call cURL to do it's stuff and return us the content\n $contents = curl_exec($curl);\n curl_close($curl);\n\n // Check for 200 Code in $contents\n if (!strstr($contents, '200 OK')) {\n //There was no \"200 OK\" returned - we failed\n return $this->handleError(-32300, 'transport error - HTTP status code was not 200');\n }\n\n if ($this->debug) {\n $this->debugOutput('
' . htmlspecialchars($contents) . PHP_EOL . '
');\n }\n // Now parse what we've got back\n // Since 20Jun2004 (0.1.1) - We need to remove the headers first\n // Why I have only just found this, I will never know...\n // So, remove everything before the first <\n $contents = substr($contents, strpos($contents, '<'));\n\n $this->message = new Message($contents);\n if (!$this->message->parse()) {\n // XML error\n return $this->handleError(-32700, 'parse error. not well formed');\n }\n // Is the message a fault?\n if ($this->message->messageType == 'fault') {\n return $this->handleError($this->message->faultCode, $this->message->faultString);\n }\n\n // Message must be OK\n return true;\n }", "label": 1, "label_name": "safe"} -{"code": " protected function getStrategy()\n {\n return new HTMLPurifier_Strategy_RemoveForeignElements();\n }", "label": 1, "label_name": "safe"} -{"code": "TEST_F(AsStringGraphTest, FloatWidthOnly) {\n TF_ASSERT_OK(Init(DT_FLOAT, /*fill=*/\"\", /*width=*/5));\n\n AddInputFromArray(TensorShape({4}), {-42, 0, 3.14159, 42});\n TF_ASSERT_OK(RunOpKernel());\n Tensor expected(allocator(), DT_STRING, TensorShape({4}));\n test::FillValues(\n &expected, {\"-42.000000\", \"0.000000\", \"3.141590\", \"42.000000\"});\n test::ExpectTensorEqual(expected, *GetOutput(0));\n}", "label": 1, "label_name": "safe"} -{"code": "static int atalk_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg,\n\t\t\t size_t size, int flags)\n{\n\tstruct sock *sk = sock->sk;\n\tstruct sockaddr_at *sat = (struct sockaddr_at *)msg->msg_name;\n\tstruct ddpehdr *ddp;\n\tint copied = 0;\n\tint offset = 0;\n\tint err = 0;\n\tstruct sk_buff *skb;\n\n\tskb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT,\n\t\t\t\t\t\tflags & MSG_DONTWAIT, &err);\n\tlock_sock(sk);\n\n\tif (!skb)\n\t\tgoto out;\n\n\t/* FIXME: use skb->cb to be able to use shared skbs */\n\tddp = ddp_hdr(skb);\n\tcopied = ntohs(ddp->deh_len_hops) & 1023;\n\n\tif (sk->sk_type != SOCK_RAW) {\n\t\toffset = sizeof(*ddp);\n\t\tcopied -= offset;\n\t}\n\n\tif (copied > size) {\n\t\tcopied = size;\n\t\tmsg->msg_flags |= MSG_TRUNC;\n\t}\n\terr = skb_copy_datagram_iovec(skb, offset, msg->msg_iov, copied);\n\n\tif (!err) {\n\t\tif (sat) {\n\t\t\tsat->sat_family = AF_APPLETALK;\n\t\t\tsat->sat_port = ddp->deh_sport;\n\t\t\tsat->sat_addr.s_node = ddp->deh_snode;\n\t\t\tsat->sat_addr.s_net = ddp->deh_snet;\n\t\t}\n\t\tmsg->msg_namelen = sizeof(*sat);\n\t}\n\n\tskb_free_datagram(sk, skb);\t/* Free the datagram. */\n\nout:\n\trelease_sock(sk);\n\treturn err ? : copied;\n}", "label": 0, "label_name": "vulnerable"} -{"code": " public function getFilesInFolder(Folder $folder, $start = 0, $maxNumberOfItems = 0, $useFilters = true, $recursive = false, $sort = '', $sortRev = false)\n {\n $this->assureFolderReadPermission($folder);\n\n $rows = $this->getFileIndexRepository()->findByFolder($folder);\n\n $filters = $useFilters == true ? $this->fileAndFolderNameFilters : [];\n $fileIdentifiers = array_values($this->driver->getFilesInFolder($folder->getIdentifier(), $start, $maxNumberOfItems, $recursive, $filters, $sort, $sortRev));\n\n $items = [];\n foreach ($fileIdentifiers as $identifier) {\n if (isset($rows[$identifier])) {\n $fileObject = $this->getFileFactory()->getFileObject($rows[$identifier]['uid'], $rows[$identifier]);\n } else {\n $fileObject = $this->getFileByIdentifier($identifier);\n }\n if ($fileObject instanceof FileInterface) {\n $key = $fileObject->getName();\n while (isset($items[$key])) {\n $key .= 'z';\n }\n $items[$key] = $fileObject;\n }\n }\n\n return $items;\n }", "label": 0, "label_name": "vulnerable"} -{"code": " public function testUpcomingTokenHasNewline()\n {\n $this->assertResult(\n'
Testfoobarbingbang\n\nboo
',\n'

Testfoobarbingbang

\n\n

boo

'\n);\n }", "label": 1, "label_name": "safe"} -{"code": " void testNotThrowWhenConvertFails() {\n final HttpHeadersBase headers = newEmptyHeaders();\n headers.set(\"name1\", \"\");\n assertThat(headers.getInt(\"name1\")).isNull();\n assertThat(headers.getInt(\"name1\", 1)).isEqualTo(1);\n\n assertThat(headers.getDouble(\"name\")).isNull();\n assertThat(headers.getDouble(\"name1\", 1)).isEqualTo(1);\n\n assertThat(headers.getFloat(\"name\")).isNull();\n assertThat(headers.getFloat(\"name1\", Float.MAX_VALUE)).isEqualTo(Float.MAX_VALUE);\n\n assertThat(headers.getLong(\"name\")).isNull();\n assertThat(headers.getLong(\"name1\", Long.MAX_VALUE)).isEqualTo(Long.MAX_VALUE);\n\n assertThat(headers.getTimeMillis(\"name\")).isNull();\n assertThat(headers.getTimeMillis(\"name1\", Long.MAX_VALUE)).isEqualTo(Long.MAX_VALUE);\n }", "label": 1, "label_name": "safe"} -{"code": "\t\tpassword: function(elem){\n\t\t\treturn \"password\" === elem.type;\n\t\t},", "label": 0, "label_name": "vulnerable"} -{"code": "void DCR_CLASS dcr_cam_xyz_coeff (DCRAW* p, double cam_xyz[4][3])\r\n{\r\n\tdouble cam_rgb[4][3], inverse[4][3], num;\r\n\tint i, j, k;\r\n int max_colors = p->colors;\r\n if (max_colors > 4) max_colors = 4;\r\n for (i=0; i < max_colors; i++)\t\t/* Multiply out XYZ colorspace */\r\n\t\tfor (j=0; j < 3; j++)\r\n\t\t\tfor (cam_rgb[i][j] = k=0; k < 3; k++)\r\n\t\t\t\tcam_rgb[i][j] += cam_xyz[i][k] * xyz_rgb[k][j];\r\n\r\n for (i=0; i < max_colors; i++) {\t\t/* Normalize cam_rgb so that */\r\n\t\tfor (num=j=0; j < 3; j++)\t\t/* cam_rgb * (1,1,1) is (1,1,1,1) */\r\n\t\t\tnum += cam_rgb[i][j];\r\n\t\tfor (j=0; j < 3; j++)\r\n\t\t\tcam_rgb[i][j] /= num;\r\n\t\tp->pre_mul[i] = 1 / (float)num;\r\n\t}\r\n dcr_pseudoinverse (cam_rgb, inverse, max_colors);\r\n\tfor (p->raw_color = i=0; i < 3; i++)\r\n\t\tfor (j=0; j < p->colors; j++)\r\n\t\t\tp->rgb_cam[i][j] = (float)inverse[j][i];\r\n}\r", "label": 1, "label_name": "safe"} -{"code": " protected function upgradeShop($request, $response)\n {\n /** @var DetachedShop $shop */\n $shop = $this->get('shop');\n\n $cookieKey = null;\n $cookieValue = null;\n\n switch (true) {\n case $request->getPost('sLanguage') !== null:\n $cookieKey = 'shop';\n $cookieValue = $request->getPost('sLanguage');\n break;\n case $request->getPost('sCurrency') !== null:\n $cookieKey = 'currency';\n $cookieValue = $request->getPost('sCurrency');\n break;\n case $request->getPost('__shop') !== null:\n $cookieKey = 'shop';\n $cookieValue = $request->getPost('__shop');\n break;\n case $request->getQuery('__shop') !== null:\n $cookieKey = 'shop';\n $cookieValue = $request->getQuery('__shop');\n break;\n case $request->getPost('__currency') !== null:\n $cookieKey = 'currency';\n $cookieValue = $request->getPost('__currency');\n break;\n }\n\n if ($cookieKey === 'shop' && $this->shouldRedirect($request, $shop)) {\n $repository = $this->get(ModelManager::class)->getRepository(Shop::class);\n\n $newShop = $repository->getActiveById($cookieValue);\n\n if ($newShop !== null) {\n $redirectUrl = $this->getNewShopUrl($request, $newShop);\n $response->setRedirect($redirectUrl);\n\n if ($newShop->getBasePath()) {\n $cookiePath = $newShop->getBasePath();\n } else {\n $cookiePath = $request->getBasePath();\n }\n\n $cookiePath = rtrim((string) $cookiePath, '/') . '/';\n\n // If shop is main, remove the cookie\n $cookieTime = $newShop->getMain() === null ? time() - 3600 : 0;\n\n $response->headers->setCookie(new Cookie($cookieKey, $cookieValue, $cookieTime, $cookiePath, null, $request->isSecure()));\n\n $this->refreshCart($newShop);\n\n return;\n }\n }\n\n //currency switch\n if ($cookieKey === 'currency') {\n $path = rtrim((string) $shop->getBasePath(), '/') . '/';\n $response->headers->setCookie(new Cookie($cookieKey, $cookieValue, 0, $path, null, $request->isSecure()));\n $url = sprintf(\n '%s://%s%s',\n $request->getScheme(),\n $request->getHttpHost(),\n $request->getRequestUri()\n );\n $response->setRedirect($url);\n\n return;\n }\n\n // Upgrade currency\n if ($request->getCookie('currency') !== null) {\n $currencyValue = $request->getCookie('currency');\n foreach ($shop->getCurrencies() as $currency) {\n if ($currencyValue == $currency->getId()\n || $currencyValue == $currency->getCurrency()) {\n $shop->setCurrency($currency);\n break;\n }\n }\n }\n\n // Start session in frontend controllers\n $session = $this->get('session');\n\n if ($cookieKey !== null) {\n $session->set($cookieKey, $cookieValue);\n }\n\n // Refresh basket on currency change\n if ($session->has('sBasketCurrency') && $shop->getCurrency()->getId() != $session->get('sBasketCurrency')) {\n Shopware()->Modules()->Basket()->sRefreshBasket();\n }\n\n // Upgrade template\n if ($session->has('template') && !empty($session->get('Admin'))) {\n $repository = $this->get(ModelManager::class)->getRepository(Template::class);\n $template = $session->get('template');\n $template = $repository->findOneBy(['template' => $template]);\n\n $this->get(Enlight_Template_Manager::class)->setTemplateDir([]);\n\n if ($template !== null) {\n $shop->setTemplate($template);\n } else {\n unset($session->template);\n }\n } else {\n unset($session->template);\n }\n\n // Save upgrades\n $this->get(ShopRegistrationServiceInterface::class)->registerShop($shop);\n\n if ($request->isSecure()) {\n $template = $this->get(Enlight_Template_Manager::class);\n $template->setCompileId($template->getCompileId() . '_secure');\n }\n }", "label": 0, "label_name": "vulnerable"} -{"code": "static void coerce_reg_to_size(struct bpf_reg_state *reg, int size)\n{\n\tu64 mask;\n\n\t/* clear high bits in bit representation */\n\treg->var_off = tnum_cast(reg->var_off, size);\n\n\t/* fix arithmetic bounds */\n\tmask = ((u64)1 << (size * 8)) - 1;\n\tif ((reg->umin_value & ~mask) == (reg->umax_value & ~mask)) {\n\t\treg->umin_value &= mask;\n\t\treg->umax_value &= mask;\n\t} else {\n\t\treg->umin_value = 0;\n\t\treg->umax_value = mask;\n\t}\n\treg->smin_value = reg->umin_value;\n\treg->smax_value = reg->umax_value;\n}", "label": 1, "label_name": "safe"} -{"code": " public function __construct($algo)\n {\n $this->algo = $algo;\n }", "label": 0, "label_name": "vulnerable"} -{"code": " public function setModelAttributes(&$model,&$attributeList,&$params) {\n $data = array ();\n foreach($attributeList as &$attr) {\n if(!isset($attr['name'],$attr['value']))\n continue;\n\n if(null !== $field = $model->getField($attr['name'])) {\n // first do variable/expression evaluation, // then process with X2Fields::parseValue()\n $type = $field->type;\n $value = $attr['value'];\n if(is_string($value)){\n if(strpos($value, '=') === 0){\n $evald = X2FlowFormatter::parseFormula($value, $params);\n if(!$evald[0])\n return false;\n $value = $evald[1];\n } elseif($params !== null){\n\n if(is_string($value) && isset($params['model'])){\n $value = X2FlowFormatter::replaceVariables(\n $value, $params['model'], $type);\n }\n }\n }\n\n $data[$attr['name']] = $value;\n }\n }\n if (!isset ($model->scenario)) \n $model->setScenario ('X2Flow');\n $model->setX2Fields ($data);\n\n if ($model instanceof Actions && isset($data['complete'])) {\n switch($data['complete']) {\n case 'Yes':\n $model->complete();\n break;\n case 'No':\n $model->uncomplete();\n break;\n }\n }\n\n return true;\n }", "label": 0, "label_name": "vulnerable"} -{"code": "CKEDITOR.document.getById(this._.labelId);return!b||1>b.getChildCount()?\"\":b.getChild(0).getText()},eventProcessors:o},!0);CKEDITOR.ui.dialog.button.prototype=CKEDITOR.tools.extend(new CKEDITOR.ui.dialog.uiElement,{click:function(){return!this._.disabled?this.fire(\"click\",{dialog:this._.dialog}):!1},enable:function(){this._.disabled=!1;var b=this.getElement();b&&b.removeClass(\"cke_disabled\")},disable:function(){this._.disabled=!0;this.getElement().addClass(\"cke_disabled\")},isVisible:function(){return this.getElement().getFirst().isVisible()},", "label": 1, "label_name": "safe"} -{"code": "\tfunction GetCVV2CodeMessage($CVV2Code)\n\t{\n\t\treturn $this->CVV2Codes[$CVV2Code];\t\n\t}", "label": 0, "label_name": "vulnerable"} -{"code": "\tstatic int sharedKeyLength(final JWEAlgorithm alg, final EncryptionMethod enc)\n\t\tthrows JOSEException {\n\n\t\tif (alg.equals(JWEAlgorithm.ECDH_ES)) {\n\n\t\t\tint length = enc.cekBitLength();\n\n\t\t\tif (length == 0) {\n\t\t\t\tthrow new JOSEException(\"Unsupported JWE encryption method \" + enc);\n\t\t\t}\n\n\t\t\treturn length;\n\n\t\t} else if (alg.equals(JWEAlgorithm.ECDH_ES_A128KW)) {\n\t\t\treturn 128;\n\t\t} else if (alg.equals(JWEAlgorithm.ECDH_ES_A192KW)) {\n\t\t\treturn 192;\n\t\t} else if (alg.equals(JWEAlgorithm.ECDH_ES_A256KW)) {\n\t\t\treturn 256;\n\t\t} else {\n\t\t\tthrow new JOSEException(AlgorithmSupportMessage.unsupportedJWEAlgorithm(\n\t\t\t\talg, ECDHCryptoProvider.SUPPORTED_ALGORITHMS));\n\t\t}\n\t}", "label": 1, "label_name": "safe"} -{"code": "\tprotected function _stat($path) {\n\t\t$sql = 'SELECT f.id, f.parent_id, f.name, f.size, f.mtime AS ts, f.mime, f.read, f.write, f.locked, f.hidden, f.width, f.height, IF(ch.id, 1, 0) AS dirs\n\t\t\t\tFROM '.$this->tbf.' AS f \n\t\t\t\tLEFT JOIN '.$this->tbf.' AS p ON p.id=f.parent_id\n\t\t\t\tLEFT JOIN '.$this->tbf.' AS ch ON ch.parent_id=f.id AND ch.mime=\"directory\"\n\t\t\t\tWHERE f.id=\"'.$path.'\"\n\t\t\t\tGROUP BY f.id';\n\n\t\t$res = $this->query($sql);\n\t\t\n\t\tif ($res) {\n\t\t\t$stat = $res->fetch_assoc();\n\t\t\tif ($stat['parent_id']) {\n\t\t\t\t$stat['phash'] = $this->encode($stat['parent_id']);\n\t\t\t} \n\t\t\tif ($stat['mime'] == 'directory') {\n\t\t\t\tunset($stat['width']);\n\t\t\t\tunset($stat['height']);\n\t\t\t} else {\n\t\t\t\tunset($stat['dirs']);\n\t\t\t}\n\t\t\tunset($stat['id']);\n\t\t\tunset($stat['parent_id']);\n\t\t\treturn $stat;\n\t\t\t\n\t\t}\n\t\treturn array();\n\t}", "label": 0, "label_name": "vulnerable"} -{"code": " def simulate_expire\n redis.del(\"#{@prefix}-key1\")\n end", "label": 1, "label_name": "safe"} -{"code": " function resetKA() {\n if (kainterval > 0) {\n kacount = 0;\n clearInterval(katimer);\n if (sock.writable)\n katimer = setInterval(sendKA, kainterval);\n }\n }", "label": 0, "label_name": "vulnerable"} -{"code": " public function confirm()\n {\n $project = $this->getProject();\n $column = $this->getColumn($project);\n\n $this->response->html($this->helper->layout->project('column/remove', array(\n 'column' => $column,\n 'project' => $project,\n )));\n }", "label": 1, "label_name": "safe"} -{"code": "\tprotected function imgSquareFit($path, $width, $height, $align = 'center', $valign = 'middle', $bgcolor = '#0000ff', $destformat = null, $jpgQuality = null) {\n\t\tif (($s = getimagesize($path)) == false) {\n\t\t\treturn false;\n\t\t}\n\n\t\t$result = false;\n\n\t\t/* Coordinates for image over square aligning */\n\t\t$y = ceil(abs($height - $s[1]) / 2); \n\t\t$x = ceil(abs($width - $s[0]) / 2);\n\n\t\tif (!$jpgQuality) {\n\t\t\t$jpgQuality = $this->options['jpgQuality'];\n\t\t}\n\n\t\telFinder::extendTimeLimit(300);\n\t\tswitch ($this->imgLib) {\n\t\t\tcase 'imagick':\n\t\t\t\ttry {\n\t\t\t\t\t$img = new imagick($path);\n\t\t\t\t} catch (Exception $e) {\n\t\t\t\t\treturn false;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tif ($bgcolor === 'transparent') {\n\t\t\t\t\t$bgcolor = 'rgba(255, 255, 255, 0.0)';\n\t\t\t\t}\n\t\t\t\t$ani = ($img->getNumberImages() > 1);\n\t\t\t\tif ($ani && is_null($destformat)) {\n\t\t\t\t\t$img1 = new Imagick();\n\t\t\t\t\t$img1->setFormat('gif');\n\t\t\t\t\t$img = $img->coalesceImages();\n\t\t\t\t\tdo {\n\t\t\t\t\t\t$gif = new Imagick();\n\t\t\t\t\t\t$gif->newImage($width, $height, new ImagickPixel($bgcolor));\n\t\t\t\t\t\t$gif->setImageColorspace($img->getImageColorspace());\n\t\t\t\t\t\t$gif->setImageFormat('gif');\n\t\t\t\t\t\t$gif->compositeImage( $img, imagick::COMPOSITE_OVER, $x, $y );\n\t\t\t\t\t\t$gif->setImageDelay($img->getImageDelay());\n\t\t\t\t\t\t$gif->setImageIterations($img->getImageIterations());\n\t\t\t\t\t\t$img1->addImage($gif);\n\t\t\t\t\t\t$gif->clear();\n\t\t\t\t\t} while ($img->nextImage());\n\t\t\t\t\t$img1 = $img1->optimizeImageLayers();\n\t\t\t\t\t$result = $img1->writeImages($path, true);\n\t\t\t\t} else {\n\t\t\t\t\tif ($ani) {\n\t\t\t\t\t\t$img->setFirstIterator();\n\t\t\t\t\t}\n\t\t\t\t\t$img1 = new Imagick();\n\t\t\t\t\t$img1->newImage($width, $height, new ImagickPixel($bgcolor));\n\t\t\t\t\t$img1->setImageColorspace($img->getImageColorspace());\n\t\t\t\t\t$img1->compositeImage( $img, imagick::COMPOSITE_OVER, $x, $y );\n\t\t\t\t\t$result = $this->imagickImage($img1, $path, $destformat, $jpgQuality);\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t$img1->clear();\n\t\t\t\t$img->clear();\n\t\t\t\treturn $result ? $path : false;\n\n\t\t\t\tbreak;\n\n\t\t\tcase 'convert':\n\t\t\t\textract($this->imageMagickConvertPrepare($path, $destformat, $jpgQuality, $s));\n\t\t\t\tif ($bgcolor === 'transparent') {\n\t\t\t\t\t$bgcolor = 'rgba(255, 255, 255, 0.0)';\n\t\t\t\t}\n\t\t\t\t$cmd = sprintf('convert -size %dx%d \"xc:%s\" png:- | convert%s%s png:- %s -geometry +%d+%d -compose over -composite%s %s', $width, $height, $bgcolor, $coalesce, $jpgQuality, $quotedPath, $x, $y, $deconstruct, $quotedDstPath);\n\t\t\t\t\n\t\t\t\t$result = false;\n\t\t\t\tif ($this->procExec($cmd) === 0) {\n\t\t\t\t\t$result = true;\n\t\t\t\t}\n\t\t\t\treturn $result ? $path : false;\n\n\t\t\t\tbreak;\n\n\t\t\tcase 'gd':\n\t\t\t\t$img = $this->gdImageCreate($path,$s['mime']);\n\n\t\t\t\tif ($img && false != ($tmp = imagecreatetruecolor($width, $height))) {\n\n\t\t\t\t\t$this->gdImageBackground($tmp, $bgcolor);\n\t\t\t\t\tif ($bgcolor === 'transparent' && ($destformat === 'png' || $s[2] === IMAGETYPE_PNG)) {\n\t\t\t\t\t\t$bgNum = imagecolorallocatealpha($tmp, 255, 255, 255, 127);\n\t\t\t\t\t\timagefill($tmp, 0, 0, $bgNum);\n\t\t\t\t\t}\n\n\t\t\t\t\tif (!imagecopy($tmp, $img, $x, $y, 0, 0, $s[0], $s[1])) {\n\t\t\t\t\t\treturn false;\n\t\t\t\t\t}\n\n\t\t\t\t\t$result = $this->gdImage($tmp, $path, $destformat, $s['mime'], $jpgQuality);\n\n\t\t\t\t\timagedestroy($img);\n\t\t\t\t\timagedestroy($tmp);\n\n\t\t\t\t\treturn $result ? $path : false;\n\t\t\t\t}\n\t\t\t\tbreak;\n\t\t}\n\n\t\treturn false;\n\t}", "label": 1, "label_name": "safe"} -{"code": "void enc28j60WritePhyReg(NetInterface *interface, uint16_t address,\n uint16_t data)\n{\n //Write register address\n enc28j60WriteReg(interface, ENC28J60_MIREGADR, address & REG_ADDR_MASK);\n\n //Write the lower 8 bits\n enc28j60WriteReg(interface, ENC28J60_MIWRL, LSB(data));\n //Write the upper 8 bits\n enc28j60WriteReg(interface, ENC28J60_MIWRH, MSB(data));\n\n //Wait until the PHY register has been written\n while((enc28j60ReadReg(interface, ENC28J60_MISTAT) & ENC28J60_MISTAT_BUSY) != 0)\n {\n }\n}", "label": 1, "label_name": "safe"} -{"code": " public function parseCDATA($string)\n {\n $string = trim($string);\n $string = str_replace(array(\"\\n\", \"\\t\", \"\\r\"), ' ', $string);\n return $string;\n }", "label": 1, "label_name": "safe"} -{"code": " relatedTypeString: this.translateEntityType(this.entityType),\n iconHtml: this.getIconHtml(this.entityType, this.entityId)\n }, Dep.prototype.data.call(this));\n },\n\n init: function () {\n if (this.getUser().isAdmin()) {\n this.isRemovable = true;\n }\n Dep.prototype.init.call(this);\n },\n\n setup: function () {\n var data = this.model.get('data') || {};\n\n this.entityType = this.model.get('relatedType') || data.entityType || null;\n this.entityId = this.model.get('relatedId') || data.entityId || null;\n this.entityName = this.model.get('relatedName') || data.entityName || null;\n\n this.messageData['relatedEntityType'] = this.translateEntityType(this.entityType);\n this.messageData['relatedEntity'] = '' + this.getHelper().escapeString(this.entityName) +'';\n\n this.createMessage();\n }\n });\n});", "label": 1, "label_name": "safe"} -{"code": "\t\tEXTENSIONS['.' + ext] = (module, filename, dirname) => {\n\t\t\tif (vm.options.require.context !== 'sandbox') {\n\t\t\t\ttry {\n\t\t\t\t\tmodule.exports = Contextify.readonly(host.require(filename));\n\t\t\t\t} catch (e) {\n\t\t\t\t\tthrow Contextify.value(e);\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tlet script;\n\n\t\t\t\ttry {\n\t\t\t\t\t// Load module\n\t\t\t\t\tlet contents = fs.readFileSync(filename, 'utf8');\n\t\t\t\t\tcontents = vm._compiler(contents, filename);\n\n\t\t\t\t\tconst code = host.STRICT_MODULE_PREFIX + contents + host.MODULE_SUFFIX;\n\n\t\t\t\t\tconst ccode = vm._hook('run', [code]);\n\n\t\t\t\t\t// Precompile script\n\t\t\t\t\tscript = new Script(ccode, {\n\t\t\t\t\t\t__proto__: null,\n\t\t\t\t\t\tfilename: filename || 'vm.js',\n\t\t\t\t\t\tdisplayErrors: false,\n\t\t\t\t\t\timportModuleDynamically\n\t\t\t\t\t});\n\n\t\t\t\t} catch (ex) {\n\t\t\t\t\tthrow Contextify.value(ex);\n\t\t\t\t}\n\n\t\t\t\tconst closure = script.runInContext(global, {\n\t\t\t\t\t__proto__: null,\n\t\t\t\t\tfilename: filename || 'vm.js',\n\t\t\t\t\tdisplayErrors: false,\n\t\t\t\t\timportModuleDynamically\n\t\t\t\t});\n\n\t\t\t\t// run the script\n\t\t\t\tclosure(module.exports, module.require, module, filename, dirname);\n\t\t\t}\n\t\t};", "label": 1, "label_name": "safe"} -{"code": "process_bitmap_updates(STREAM s)\n{\n\tuint16 num_updates;\n\tuint16 left, top, right, bottom, width, height;\n\tuint16 cx, cy, bpp, Bpp, compress, bufsize, size;\n\tuint8 *data, *bmpdata;\n\tint i;\n\n\tlogger(Protocol, Debug, \"%s()\", __func__);\n\n\tin_uint16_le(s, num_updates);\n\n\tfor (i = 0; i < num_updates; i++)\n\t{\n\t\tin_uint16_le(s, left);\n\t\tin_uint16_le(s, top);\n\t\tin_uint16_le(s, right);\n\t\tin_uint16_le(s, bottom);\n\t\tin_uint16_le(s, width);\n\t\tin_uint16_le(s, height);\n\t\tin_uint16_le(s, bpp);\n\t\tBpp = (bpp + 7) / 8;\n\t\tin_uint16_le(s, compress);\n\t\tin_uint16_le(s, bufsize);\n\n\t\tcx = right - left + 1;\n\t\tcy = bottom - top + 1;\n\n\t\tlogger(Graphics, Debug,\n\t\t \"process_bitmap_updates(), [%d,%d,%d,%d], [%d,%d], bpp=%d, compression=%d\",\n\t\t left, top, right, bottom, width, height, Bpp, compress);\n\n\t\tif (!compress)\n\t\t{\n\t\t\tint y;\n\t\t\tbmpdata = (uint8 *) xmalloc(width * height * Bpp);\n\t\t\tfor (y = 0; y < height; y++)\n\t\t\t{\n\t\t\t\tin_uint8a(s, &bmpdata[(height - y - 1) * (width * Bpp)],\n\t\t\t\t\t width * Bpp);\n\t\t\t}\n\t\t\tui_paint_bitmap(left, top, cx, cy, width, height, bmpdata);\n\t\t\txfree(bmpdata);\n\t\t\tcontinue;\n\t\t}\n\n\n\t\tif (compress & 0x400)\n\t\t{\n\t\t\tsize = bufsize;\n\t\t}\n\t\telse\n\t\t{\n\t\t\tin_uint8s(s, 2);\t/* pad */\n\t\t\tin_uint16_le(s, size);\n\t\t\tin_uint8s(s, 4);\t/* line_size, final_size */\n\t\t}\n\t\tin_uint8p(s, data, size);\n\t\tbmpdata = (uint8 *) xmalloc(width * height * Bpp);\n\t\tif (bitmap_decompress(bmpdata, width, height, data, size, Bpp))\n\t\t{\n\t\t\tui_paint_bitmap(left, top, cx, cy, width, height, bmpdata);\n\t\t}\n\t\telse\n\t\t{\n\t\t\tlogger(Graphics, Warning,\n\t\t\t \"process_bitmap_updates(), failed to decompress bitmap\");\n\t\t}\n\n\t\txfree(bmpdata);\n\t}\n}", "label": 0, "label_name": "vulnerable"} -{"code": " public function testRegenerateShortcode()\n {\n $assetStore = Injector::inst()->get(AssetStore::class);\n $member = Member::create();\n $member->write();\n // Logout first to throw away the existing session which may have image grants.\n $this->logOut();\n $this->logInAs($member);\n // image is in protected asset store\n $image = $this->objFromFixture(Image::class, 'imageWithTitle');\n $image->CanViewType = InheritedPermissions::ONLY_THESE_USERS;\n $image->write();\n $url = $image->getUrl(false);\n $args = [\n 'id' => $image->ID,\n 'src' => $url,\n 'width' => '550',\n 'height' => '366',\n 'class' => 'leftAlone ss-htmleditorfield-file image',\n ];\n $shortHash = substr($image->getHash(), 0, 10);\n $expected = implode(' ', [\n '[image id=\"' . $image->ID . '\" src=\"/assets/folder/' . $shortHash . '/test-image.png\" width=\"550\"',\n 'height=\"366\" class=\"leftAlone ss-htmleditorfield-file image\"]'\n ]);\n $parsedFileID = new ParsedFileID($image->getFilename(), $image->getHash());\n $html = ImageShortcodeProvider::regenerate_shortcode($args, '', '', 'image');\n $this->assertSame($expected, $html);\n $this->assertFalse($assetStore->isGranted($parsedFileID));\n Config::modify()->set(FileShortcodeProvider::class, 'allow_session_grant', true);\n $html = ImageShortcodeProvider::regenerate_shortcode($args, '', '', 'image');\n $this->assertSame($expected, $html);\n $this->assertTrue($assetStore->isGranted($parsedFileID));\n }", "label": 1, "label_name": "safe"} -{"code": " public void contextInitialized(ServletContextEvent sce) {\n try {\n configManager.init();\n } catch (Exception e) {\n throw createServletException(e);\n }\n sce.getServletContext().setAttribute(\"ConfigManager\", configManager);\n }", "label": 1, "label_name": "safe"} -{"code": "return null}))}),L,l,I,X.size)}),mxUtils.bind(this,function(){this.handleError({message:mxResources.get(\"invalidOrMissingFile\")})})))}else J=E.target.result,p(J,X.type,g+U*F,k+U*F,240,160,X.name,function(ba){M(U,function(){return ba})},X)});/(\\.v(dx|sdx?))($|\\?)/i.test(X.name)||/(\\.vs(x|sx?))($|\\?)/i.test(X.name)?p(null,X.type,g+U*F,k+U*F,240,160,X.name,function(E){M(U,function(){return E})},X):\"image\"==X.type.substring(0,5)||\"application/pdf\"==X.type?u.readAsDataURL(X):u.readAsText(X)}})(W)});if(C){C=", "label": 0, "label_name": "vulnerable"} -{"code": " void requestResetPasswordUnexistingUser()\n {\n when(this.userReference.toString()).thenReturn(\"user:Foobar\");\n when(this.userManager.exists(this.userReference)).thenReturn(false);\n String exceptionMessage = \"User [user:Foobar] doesn't exist\";\n when(this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.noUser\",\n \"user:Foobar\")).thenReturn(exceptionMessage);\n ResetPasswordException resetPasswordException = assertThrows(ResetPasswordException.class,\n () -> this.resetPasswordManager.requestResetPassword(this.userReference));\n assertEquals(exceptionMessage, resetPasswordException.getMessage());\n }", "label": 0, "label_name": "vulnerable"} -{"code": "Na+=\"@import url(\"+La+\");\\n\":Fa+='@font-face {\\nfont-family: \"'+Da+'\";\\nsrc: url(\"'+La+'\");\\n}\\n'}Ga.appendChild(za.createTextNode(Na+Fa));ra.getElementsByTagName(\"defs\")[0].appendChild(Ga)}null!=ja&&(this.shapeBackgroundColor=Ha,this.shapeForegroundColor=Ba,this.stylesheet=ja,this.refresh());return ra};var C=Graph.prototype.createSvgImageExport;Graph.prototype.createSvgImageExport=function(){var u=C.apply(this,arguments);if(this.mathEnabled){var E=u.drawText;u.drawText=function(J,T){if(null!=J.text&&\nnull!=J.text.value&&J.text.checkBounds()&&(mxUtils.isNode(J.text.value)||J.text.dialect==mxConstants.DIALECT_STRICTHTML)){var N=J.text.getContentNode();if(null!=N){N=N.cloneNode(!0);if(N.getElementsByTagNameNS)for(var Q=N.getElementsByTagNameNS(\"http://www.w3.org/1998/Math/MathML\",\"math\");0assertGenerateFromToken(\n new HTMLPurifier_Token_Start('img', array('alt' => '`foo` bar')),\n '\"`foo`'\n );\n }", "label": 1, "label_name": "safe"} -{"code": " public function actionGetItems($term){\n X2LinkableBehavior::getItems ($term, 'id', 'id');\n }", "label": 1, "label_name": "safe"} -{"code": " public function updateStream($path, $resource, Config $config)\n {\n return $this->writeStream($path, $resource, $config);\n }", "label": 0, "label_name": "vulnerable"} -{"code": "function db_start()\n{\n global $DatabaseServer, $DatabaseUsername, $DatabasePassword, $DatabaseName, $DatabasePort, $DatabaseType;\n\n switch ($DatabaseType) {\n case 'mysqli':\n $connection = new mysqli($DatabaseServer, $DatabaseUsername, $DatabasePassword, $DatabaseName, $DatabasePort);\n break;\n }\n\n // Error code for both.\n if ($connection === false) {\n switch ($DatabaseType) {\n case 'mysqli':\n $errormessage = mysqli_error($connection);\n break;\n }\n db_show_error(\"\", \"\" . _couldNotConnectToDatabase . \": $DatabaseServer\", $errormessage);\n }\n return $connection;\n}", "label": 0, "label_name": "vulnerable"} -{"code": " public function getTrustedProxyData()\n {\n return array(\n array(array(), array('127.0.0.1')),\n array(array('10.0.0.2'), array('10.0.0.2', '127.0.0.1')),\n array(array('10.0.0.2', '127.0.0.1'), array('10.0.0.2', '127.0.0.1')),\n );\n }", "label": 0, "label_name": "vulnerable"} -{"code": "static s32 gf_hevc_read_pps_bs_internal(GF_BitStream *bs, HEVCState *hevc)\n{\n\tu32 i;\n\ts32 pps_id;\n\tHEVC_PPS *pps;\n\n\t//NAL header already read\n\tpps_id = gf_bs_read_ue_log(bs, \"pps_id\");\n\n\tif ((pps_id < 0) || (pps_id >= 64)) {\n\t\tGF_LOG(GF_LOG_ERROR, GF_LOG_CODING, (\"[HEVC] wrong PPS ID %d in PPS\\n\", pps_id));\n\t\treturn -1;\n\t}\n\tpps = &hevc->pps[pps_id];\n\n\tif (!pps->state) {\n\t\tpps->id = pps_id;\n\t\tpps->state = 1;\n\t}\n\tpps->sps_id = gf_bs_read_ue_log(bs, \"sps_id\");\n\tif ((pps->sps_id<0) || (pps->sps_id >= 16)) {\n\t\tGF_LOG(GF_LOG_ERROR, GF_LOG_CODING, (\"[HEVC] wrong SPS ID %d in PPS\\n\", pps->sps_id));\n\t\tpps->sps_id=0;\n\t\treturn -1;\n\t}\n\thevc->sps_active_idx = pps->sps_id; /*set active sps*/\n\tpps->dependent_slice_segments_enabled_flag = gf_bs_read_int_log(bs, 1, \"dependent_slice_segments_enabled_flag\");\n\n\tpps->output_flag_present_flag = gf_bs_read_int_log(bs, 1, \"output_flag_present_flag\");\n\tpps->num_extra_slice_header_bits = gf_bs_read_int_log(bs, 3, \"num_extra_slice_header_bits\");\n\tpps->sign_data_hiding_flag = gf_bs_read_int_log(bs, 1, \"sign_data_hiding_flag\");\n\tpps->cabac_init_present_flag = gf_bs_read_int_log(bs, 1, \"cabac_init_present_flag\");\n\tpps->num_ref_idx_l0_default_active = 1 + gf_bs_read_ue_log(bs, \"num_ref_idx_l0_default_active\");\n\tpps->num_ref_idx_l1_default_active = 1 + gf_bs_read_ue_log(bs, \"num_ref_idx_l1_default_active\");\n\tpps->pic_init_qp_minus26 = gf_bs_read_se_log(bs, \"pic_init_qp_minus26\");\n\tpps->constrained_intra_pred_flag = gf_bs_read_int_log(bs, 1, \"constrained_intra_pred_flag\");\n\tpps->transform_skip_enabled_flag = gf_bs_read_int_log(bs, 1, \"transform_skip_enabled_flag\");\n\tif ((pps->cu_qp_delta_enabled_flag = gf_bs_read_int_log(bs, 1, \"cu_qp_delta_enabled_flag\")))\n\t\tpps->diff_cu_qp_delta_depth = gf_bs_read_ue_log(bs, \"diff_cu_qp_delta_depth\");\n\n\tpps->pic_cb_qp_offset = gf_bs_read_se_log(bs, \"pic_cb_qp_offset\");\n\tpps->pic_cr_qp_offset = gf_bs_read_se_log(bs, \"pic_cr_qp_offset\");\n\tpps->slice_chroma_qp_offsets_present_flag = gf_bs_read_int_log(bs, 1, \"slice_chroma_qp_offsets_present_flag\");\n\tpps->weighted_pred_flag = gf_bs_read_int_log(bs, 1, \"weighted_pred_flag\");\n\tpps->weighted_bipred_flag = gf_bs_read_int_log(bs, 1, \"weighted_bipred_flag\");\n\tpps->transquant_bypass_enable_flag = gf_bs_read_int_log(bs, 1, \"transquant_bypass_enable_flag\");\n\tpps->tiles_enabled_flag = gf_bs_read_int_log(bs, 1, \"tiles_enabled_flag\");\n\tpps->entropy_coding_sync_enabled_flag = gf_bs_read_int_log(bs, 1, \"entropy_coding_sync_enabled_flag\");\n\tif (pps->tiles_enabled_flag) {\n\t\tpps->num_tile_columns = 1 + gf_bs_read_ue_log(bs, \"num_tile_columns_minus1\");\n\t\tpps->num_tile_rows = 1 + gf_bs_read_ue_log(bs, \"num_tile_rows_minus1\");\n\t\tpps->uniform_spacing_flag = gf_bs_read_int_log(bs, 1, \"uniform_spacing_flag\");\n\t\tif (!pps->uniform_spacing_flag) {\n\t\t\tfor (i = 0; i < pps->num_tile_columns - 1; i++) {\n\t\t\t\tpps->column_width[i] = 1 + gf_bs_read_ue_log_idx(bs, \"column_width_minus1\", i);\n\t\t\t}\n\t\t\tfor (i = 0; i < pps->num_tile_rows - 1; i++) {\n\t\t\t\tpps->row_height[i] = 1 + gf_bs_read_ue_log_idx(bs, \"row_height_minus1\", i);\n\t\t\t}\n\t\t}\n\t\tpps->loop_filter_across_tiles_enabled_flag = gf_bs_read_int_log(bs, 1, \"loop_filter_across_tiles_enabled_flag\");\n\t}\n\tpps->loop_filter_across_slices_enabled_flag = gf_bs_read_int_log(bs, 1, \"loop_filter_across_slices_enabled_flag\");\n\tif ((pps->deblocking_filter_control_present_flag = gf_bs_read_int_log(bs, 1, \"deblocking_filter_control_present_flag\"))) {\n\t\tpps->deblocking_filter_override_enabled_flag = gf_bs_read_int_log(bs, 1, \"deblocking_filter_override_enabled_flag\");\n\t\tif (! (pps->pic_disable_deblocking_filter_flag = gf_bs_read_int_log(bs, 1, \"pic_disable_deblocking_filter_flag\"))) {\n\t\t\tpps->beta_offset_div2 = gf_bs_read_se_log(bs, \"beta_offset_div2\");\n\t\t\tpps->tc_offset_div2 = gf_bs_read_se_log(bs, \"tc_offset_div2\");\n\t\t}\n\t}\n\tif ((pps->pic_scaling_list_data_present_flag = gf_bs_read_int_log(bs, 1, \"pic_scaling_list_data_present_flag\"))) {\n\t\thevc_scaling_list_data(bs);\n\t}\n\tpps->lists_modification_present_flag = gf_bs_read_int_log(bs, 1, \"lists_modification_present_flag\");\n\tpps->log2_parallel_merge_level_minus2 = gf_bs_read_ue_log(bs, \"log2_parallel_merge_level_minus2\");\n\tpps->slice_segment_header_extension_present_flag = gf_bs_read_int_log(bs, 1, \"slice_segment_header_extension_present_flag\");\n\tif (gf_bs_read_int_log(bs, 1, \"pps_extension_flag\")) {\n#if 0\n\t\twhile (gf_bs_available(bs)) {\n\t\t\t/*pps_extension_data_flag */ gf_bs_read_int(bs, 1);\n\t\t}\n#endif\n\n\t}\n\treturn pps_id;\n}", "label": 1, "label_name": "safe"} -{"code": " public function assertTraceContains($trace)\n {\n $traces = $this->cache->getTraces();\n $traces = current($traces);\n\n $this->assertRegExp('/'.$trace.'/', implode(', ', $traces));\n }", "label": 0, "label_name": "vulnerable"} -{"code": "func (m *MockAuthorizeCodeStorage) GetAuthorizeCodeSession(arg0 context.Context, arg1 string, arg2 fosite.Session) (fosite.Requester, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetAuthorizeCodeSession\", arg0, arg1, arg2)\n\tret0, _ := ret[0].(fosite.Requester)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "label": 1, "label_name": "safe"} -{"code": "def iptables_flush_all_tables\n ['filter', 'nat', 'mangle', 'raw'].each do |t|\n expect(shell(\"iptables -t #{t} -F\").stderr).to eq(\"\")\n end\nend", "label": 0, "label_name": "vulnerable"} -{"code": "\t\t\t\t\tleft : parseInt(button.width())-icon.outerWidth(true)\n\t\t\t\t});\n\t\t\t}", "label": 0, "label_name": "vulnerable"} -{"code": " it \"should convert a negative number into a positive\" do\n result = scope.function_abs([\"-34\"])\n expect(result).to(eq(34))\n end", "label": 0, "label_name": "vulnerable"} -{"code": " public function make($string) {\n return clone $this->clone;\n }", "label": 1, "label_name": "safe"} -{"code": " public function __construct () {\n\n }", "label": 1, "label_name": "safe"} -{"code": "NO_INLINE JsVar *jspeFactorDelete() {\n JSP_ASSERT_MATCH(LEX_R_DELETE);\n JsVar *parent = 0;\n JsVar *a = jspeFactorMember(jspeFactor(), &parent);\n JsVar *result = 0;\n if (JSP_SHOULD_EXECUTE) {\n bool ok = false;\n if (jsvIsName(a) && !jsvIsNewChild(a)) {\n // if no parent, check in root?\n if (!parent && jsvIsChild(execInfo.root, a))\n parent = jsvLockAgain(execInfo.root);\n\n#ifdef DEBUG\n if (jsvHasChildren(parent)) assert(jsvIsChild(parent, a));\n#endif\n if (jsvHasChildren(parent) && jsvIsChild(parent, a)) {\n // else remove properly.\n /* we use jsvIsChild here just in case. delete probably isn't called\n that often so it pays to be safe */\n if (jsvIsArray(parent)) {\n // For arrays, we must make sure we don't change the length\n JsVarInt l = jsvGetArrayLength(parent);\n jsvRemoveChild(parent, a);\n jsvSetArrayLength(parent, l, false);\n } else {\n jsvRemoveChild(parent, a);\n }\n ok = true;\n }\n }\n\n result = jsvNewFromBool(ok);\n }\n jsvUnLock2(a, parent);\n return result;\n}", "label": 1, "label_name": "safe"} -{"code": " context.describe = context.context = function(title, fn){\n var suite = Suite.create(suites[0], title);\n suites.unshift(suite);\n fn.call(suite);\n suites.shift();\n return suite;\n };", "label": 0, "label_name": "vulnerable"} -{"code": "function shibboleth_login_form() {\n\t$login_url = add_query_arg('action', 'shibboleth');\n\t$login_url = remove_query_arg('reauth', $login_url);\n\techo '

' . __('Login with Shibboleth', 'shibboleth') . '

';\n}", "label": 1, "label_name": "safe"} -{"code": " private function decorate($content, $css)\n {\n return <<\n\n \n charset}\" />\n \n \n \n \n $content\n \n\nEOF;\n }", "label": 0, "label_name": "vulnerable"} -{"code": "function(){function O(ua,ya,Na){var Fa=U.menus.get(ua),Ra=R.addMenu(mxResources.get(ua),mxUtils.bind(this,function(){Fa.funct.apply(this,arguments)}),P);Ra.className=\"1\"==urlParams.sketch?\"geToolbarButton\":\"geMenuItem\";Ra.style.display=\"inline-block\";Ra.style.boxSizing=\"border-box\";Ra.style.top=\"6px\";Ra.style.marginRight=\"6px\";Ra.style.height=\"30px\";Ra.style.paddingTop=\"6px\";Ra.style.paddingBottom=\"6px\";Ra.style.cursor=\"pointer\";Ra.setAttribute(\"title\",mxResources.get(ua));U.menus.menuCreated(Fa,\nRa,\"geMenuItem\");null!=Na?(Ra.style.backgroundImage=\"url(\"+Na+\")\",Ra.style.backgroundPosition=\"center center\",Ra.style.backgroundRepeat=\"no-repeat\",Ra.style.backgroundSize=\"24px 24px\",Ra.style.width=\"34px\",Ra.innerText=\"\"):ya||(Ra.style.backgroundImage=\"url(\"+mxWindow.prototype.normalizeImage+\")\",Ra.style.backgroundPosition=\"right 6px center\",Ra.style.backgroundRepeat=\"no-repeat\",Ra.style.paddingRight=\"22px\");return Ra}function X(ua,ya,Na,Fa,Ra,db){var Va=document.createElement(\"a\");Va.className=", "label": 1, "label_name": "safe"} -{"code": " setup: function () {\n var data = this.model.get('data') || {};\n\n this.emailId = data.emailId;\n this.emailName = data.emailName;\n\n if (\n this.parentModel\n &&\n (this.model.get('parentType') == this.parentModel.name && this.model.get('parentId') == this.parentModel.id)\n ) {\n if (this.model.get('post')) {\n this.createField('post', null, null, 'views/stream/fields/post');\n this.hasPost = true;\n }\n if ((this.model.get('attachmentsIds') || []).length) {\n this.createField('attachments', 'attachmentMultiple', {}, 'views/stream/fields/attachment-multiple');\n this.hasAttachments = true;\n }\n }\n\n this.messageData['email'] = '' + this.getHelper().escapeString(data.emailName) + '';\n\n this.messageName = 'emailSent';\n\n this.messageData['by'] = '' + this.getHelper().escapeString(data.personEntityName) + '';\n\n\n if (this.isThis) {\n this.messageName += 'This';\n }\n\n this.createMessage();\n },", "label": 1, "label_name": "safe"} -{"code": " public function testSendWithSourceSuccess()\n {\n $this->setMockHttpResponse('PurchaseWithSourceSuccess.txt');\n $response = $this->request->send();\n\n $this->assertTrue($response->isSuccessful());\n $this->assertFalse($response->isRedirect());\n $this->assertSame('ch_1IU9gcUiNASROd', $response->getTransactionReference());\n $this->assertSame('card_15WgqxIobxWFFmzdk5V9z3g9', $response->getCardReference());\n $this->assertNull($response->getMessage());\n }", "label": 0, "label_name": "vulnerable"} -{"code": " def test_sneaky_import_in_style(self):\n # Prevent \"@@importimport\" -> \"@import\" replacement.\n style_codes = [\n \"@@importimport(extstyle.css)\",\n \"@ @ import import(extstyle.css)\",\n \"@ @ importimport(extstyle.css)\",\n \"@@ import import(extstyle.css)\",\n \"@ @import import(extstyle.css)\",\n \"@@importimport()\",\n ]\n for style_code in style_codes:\n html = '' % style_code\n s = lxml.html.fragment_fromstring(html)\n\n cleaned = lxml.html.tostring(clean_html(s))\n self.assertEqual(\n b'',\n cleaned,\n \"%s -> %s\" % (style_code, cleaned))", "label": 1, "label_name": "safe"} -{"code": "int get_evtchn_to_irq(evtchn_port_t evtchn)\n{\n\tif (evtchn >= xen_evtchn_max_channels())\n\t\treturn -1;\n\tif (evtchn_to_irq[EVTCHN_ROW(evtchn)] == NULL)\n\t\treturn -1;\n\treturn READ_ONCE(evtchn_to_irq[EVTCHN_ROW(evtchn)][EVTCHN_COL(evtchn)]);\n}", "label": 1, "label_name": "safe"} -{"code": " public function finalize()\n {\n $this->finalized = true;\n $this->parser = null;\n }", "label": 1, "label_name": "safe"} -{"code": " public static async Task GetCopyNameAsync(this IFile file, string suffix,\n CancellationToken cancellationToken = default)\n {\n cancellationToken.ThrowIfCancellationRequested();\n\n string name = Path.GetFileNameWithoutExtension(file.Name);\n string extension = file.Extension;\n\n if (string.IsNullOrEmpty(suffix))\n {\n suffix = \" - copy\";\n }\n\n string newName = $\"{name}{suffix}{extension}\";\n if (!File.Exists(PathHelper.SafelyCombine(file.DirectoryName, file.DirectoryName, newName)))\n return newName;\n else\n {\n var search = $\"{name}*{extension}\";\n var sameNames = (await file.Parent.GetFilesAsync(search, false, _ => true, cancellationToken: cancellationToken))\n .Select(f => f.Name).ToArray();\n\n var count = 1;\n while (count != int.MaxValue)\n {\n newName = $\"{name}{suffix}({count++}){extension}\";\n if (!sameNames.Contains(newName))\n return newName;\n }\n\n throw new StackOverflowException();\n }\n }", "label": 1, "label_name": "safe"} -{"code": " def MD5(self,data:str):\n sha = hashlib.md5(bytes(data.encode()))\n hash = str(sha.digest())\n return self.__Salt(hash,salt=self.salt)", "label": 0, "label_name": "vulnerable"} -{"code": "func (m *U) Unmarshal(dAtA []byte) error {\n\tl := len(dAtA)\n\tiNdEx := 0\n\tfor iNdEx < l {\n\t\tpreIndex := iNdEx\n\t\tvar wire uint64\n\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\tif shift >= 64 {\n\t\t\t\treturn ErrIntOverflowExample\n\t\t\t}\n\t\t\tif iNdEx >= l {\n\t\t\t\treturn io.ErrUnexpectedEOF\n\t\t\t}\n\t\t\tb := dAtA[iNdEx]\n\t\t\tiNdEx++\n\t\t\twire |= uint64(b&0x7F) << shift\n\t\t\tif b < 0x80 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tfieldNum := int32(wire >> 3)\n\t\twireType := int(wire & 0x7)\n\t\tif wireType == 4 {\n\t\t\treturn fmt.Errorf(\"proto: U: wiretype end group for non-group\")\n\t\t}\n\t\tif fieldNum <= 0 {\n\t\t\treturn fmt.Errorf(\"proto: U: illegal tag %d (wire type %d)\", fieldNum, wire)\n\t\t}\n\t\tswitch fieldNum {\n\t\tcase 1:\n\t\t\tif wireType != 2 {\n\t\t\t\treturn fmt.Errorf(\"proto: wrong wireType = %d for field A\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowExample\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthExample\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthExample\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif m.A == nil {\n\t\t\t\tm.A = &A{}\n\t\t\t}\n\t\t\tif err := m.A.Unmarshal(dAtA[iNdEx:postIndex]); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tcase 2:\n\t\t\tif wireType != 2 {\n\t\t\t\treturn fmt.Errorf(\"proto: wrong wireType = %d for field B\", wireType)\n\t\t\t}\n\t\t\tvar msglen int\n\t\t\tfor shift := uint(0); ; shift += 7 {\n\t\t\t\tif shift >= 64 {\n\t\t\t\t\treturn ErrIntOverflowExample\n\t\t\t\t}\n\t\t\t\tif iNdEx >= l {\n\t\t\t\t\treturn io.ErrUnexpectedEOF\n\t\t\t\t}\n\t\t\t\tb := dAtA[iNdEx]\n\t\t\t\tiNdEx++\n\t\t\t\tmsglen |= int(b&0x7F) << shift\n\t\t\t\tif b < 0x80 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif msglen < 0 {\n\t\t\t\treturn ErrInvalidLengthExample\n\t\t\t}\n\t\t\tpostIndex := iNdEx + msglen\n\t\t\tif postIndex < 0 {\n\t\t\t\treturn ErrInvalidLengthExample\n\t\t\t}\n\t\t\tif postIndex > l {\n\t\t\t\treturn io.ErrUnexpectedEOF\n\t\t\t}\n\t\t\tif m.B == nil {\n\t\t\t\tm.B = &B{}\n\t\t\t}\n\t\t\tif err := m.B.Unmarshal(dAtA[iNdEx:postIndex]); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tiNdEx = postIndex\n\t\tdefault:\n\t\t\tiNdEx = preIndex\n\t\t\tskippy, err := skipExample(dAtA[iNdEx:])\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif (skippy < 0) || (iNdEx+skippy) < 0 {\n\t\t\t\treturn ErrInvalidLengthExample\n\t\t\t}\n\t\t\tif (iNdEx + skippy) > l {\n\t\t\t\treturn io.ErrUnexpectedEOF\n\t\t\t}\n\t\t\tm.XXX_unrecognized = append(m.XXX_unrecognized, dAtA[iNdEx:iNdEx+skippy]...)\n\t\t\tiNdEx += skippy\n\t\t}\n\t}\n\n\tif iNdEx > l {\n\t\treturn io.ErrUnexpectedEOF\n\t}\n\treturn nil\n}", "label": 1, "label_name": "safe"} -{"code": "\t\t\t$prepared = $eml->prepareBody();\n\t\t}\n\n if (!$prepared) { // InlineEmail failed validation\n $errors = $eml->getErrors ();\n return array (false, array_shift ($errors));\n }\n\n list ($success, $message) = $this->checkDoNotEmailFields ($eml);\n if (!$success) {\n return array ($success, $message);\n }\n\n\t\t$result = $eml->send($historyFlag);\n\t\tif (isset($result['code']) && $result['code'] == 200) {\n if (YII_UNIT_TESTING) {\n return array(true, $eml->message);\n } else {\n return array(true, \"\");\n }\n } else {\n return array (false, Yii::t('app', \"Email could not be sent\"));\n }\n\t}", "label": 1, "label_name": "safe"} -{"code": " public function setClass($class)\n {\n $this->changes['class'] = true;\n\n return parent::setClass($class);\n }", "label": 0, "label_name": "vulnerable"} -{"code": " def destroy\n Log.add_info(request, params.inspect)\n\n return unless request.post?\n\n if params[:check_equipment].nil?\n list\n render(:action => 'list')\n return\n end\n\n count = 0\n params[:check_equipment].each do |equipment_id, value|\n SqlHelper.validate_token([equipment_id])\n if value == '1'\n Equipment.delete(equipment_id)\n\n count += 1\n end\n end\n flash[:notice] = count.to_s + t('equipment.deleted')\n list\n render(:action => 'list')\n end", "label": 1, "label_name": "safe"} -{"code": " public function testAllowedClasses()\n {\n $this->config->set('Attr.AllowedClasses', array('foo'));\n $this->assertDef('foo');\n $this->assertDef('bar', false);\n $this->assertDef('foo bar', 'foo');\n }", "label": 1, "label_name": "safe"} -{"code": "func prepareRootfs(pipe io.ReadWriter, iConfig *initConfig, mountFds []int) (err error) {\n\tconfig := iConfig.Config\n\tif err := prepareRoot(config); err != nil {\n\t\treturn fmt.Errorf(\"error preparing rootfs: %w\", err)\n\t}\n\n\tif mountFds != nil && len(mountFds) != len(config.Mounts) {\n\t\treturn fmt.Errorf(\"malformed mountFds slice. Expected size: %v, got: %v. Slice: %v\", len(config.Mounts), len(mountFds), mountFds)\n\t}\n\n\tmountConfig := &mountConfig{\n\t\troot: config.Rootfs,\n\t\tlabel: config.MountLabel,\n\t\tcgroup2Path: iConfig.Cgroup2Path,\n\t\trootlessCgroups: iConfig.RootlessCgroups,\n\t\tcgroupns: config.Namespaces.Contains(configs.NEWCGROUP),\n\t}\n\tsetupDev := needsSetupDev(config)\n\tfor i, m := range config.Mounts {\n\t\tfor _, precmd := range m.PremountCmds {\n\t\t\tif err := mountCmd(precmd); err != nil {\n\t\t\t\treturn fmt.Errorf(\"error running premount command: %w\", err)\n\t\t\t}\n\t\t}\n\n\t\t// Just before the loop we checked that if not empty, len(mountFds) == len(config.Mounts).\n\t\t// Therefore, we can access mountFds[i] without any concerns.\n\t\tif mountFds != nil && mountFds[i] != -1 {\n\t\t\tmountConfig.fd = &mountFds[i]\n\t\t}\n\n\t\tif err := mountToRootfs(m, mountConfig); err != nil {\n\t\t\treturn fmt.Errorf(\"error mounting %q to rootfs at %q: %w\", m.Source, m.Destination, err)\n\t\t}\n\n\t\tfor _, postcmd := range m.PostmountCmds {\n\t\t\tif err := mountCmd(postcmd); err != nil {\n\t\t\t\treturn fmt.Errorf(\"error running postmount command: %w\", err)\n\t\t\t}\n\t\t}\n\t}\n\n\tif setupDev {\n\t\tif err := createDevices(config); err != nil {\n\t\t\treturn fmt.Errorf(\"error creating device nodes: %w\", err)\n\t\t}\n\t\tif err := setupPtmx(config); err != nil {\n\t\t\treturn fmt.Errorf(\"error setting up ptmx: %w\", err)\n\t\t}\n\t\tif err := setupDevSymlinks(config.Rootfs); err != nil {\n\t\t\treturn fmt.Errorf(\"error setting up /dev symlinks: %w\", err)\n\t\t}\n\t}\n\n\t// Signal the parent to run the pre-start hooks.\n\t// The hooks are run after the mounts are setup, but before we switch to the new\n\t// root, so that the old root is still available in the hooks for any mount\n\t// manipulations.\n\t// Note that iConfig.Cwd is not guaranteed to exist here.\n\tif err := syncParentHooks(pipe); err != nil {\n\t\treturn err\n\t}\n\n\t// The reason these operations are done here rather than in finalizeRootfs\n\t// is because the console-handling code gets quite sticky if we have to set\n\t// up the console before doing the pivot_root(2). This is because the\n\t// Console API has to also work with the ExecIn case, which means that the\n\t// API must be able to deal with being inside as well as outside the\n\t// container. It's just cleaner to do this here (at the expense of the\n\t// operation not being perfectly split).\n\n\tif err := unix.Chdir(config.Rootfs); err != nil {\n\t\treturn &os.PathError{Op: \"chdir\", Path: config.Rootfs, Err: err}\n\t}\n\n\ts := iConfig.SpecState\n\ts.Pid = unix.Getpid()\n\ts.Status = specs.StateCreating\n\tif err := iConfig.Config.Hooks[configs.CreateContainer].RunHooks(s); err != nil {\n\t\treturn err\n\t}\n\n\tif config.NoPivotRoot {\n\t\terr = msMoveRoot(config.Rootfs)\n\t} else if config.Namespaces.Contains(configs.NEWNS) {\n\t\terr = pivotRoot(config.Rootfs)\n\t} else {\n\t\terr = chroot()\n\t}\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error jailing process inside rootfs: %w\", err)\n\t}\n\n\tif setupDev {\n\t\tif err := reOpenDevNull(); err != nil {\n\t\t\treturn fmt.Errorf(\"error reopening /dev/null inside container: %w\", err)\n\t\t}\n\t}\n\n\tif cwd := iConfig.Cwd; cwd != \"\" {\n\t\t// Note that spec.Process.Cwd can contain unclean value like \"../../../../foo/bar...\".\n\t\t// However, we are safe to call MkDirAll directly because we are in the jail here.\n\t\tif err := os.MkdirAll(cwd, 0o755); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "label": 1, "label_name": "safe"} -{"code": "static int key_verify(pam_handle_t *pamh, int flags, PKCS11_KEY *authkey)\n{\n\tint ok = 0;\n\tunsigned char challenge[30];\n\tunsigned char signature[256];\n\tunsigned int siglen = sizeof signature;\n\tconst EVP_MD *md = EVP_sha1();\n\tEVP_MD_CTX *md_ctx = EVP_MD_CTX_new();\n\tEVP_PKEY *privkey = PKCS11_get_private_key(authkey);\n\tEVP_PKEY *pubkey = PKCS11_get_public_key(authkey);\n\n\t/* Verify a SHA-1 hash of random data, signed by the key.\n\t *\n\t * Note that this will not work keys that aren't eligible for signing.\n\t * Unfortunately, libp11 currently has no way of checking\n\t * C_GetAttributeValue(CKA_SIGN), see\n\t * https://github.com/OpenSC/libp11/issues/219. Since we don't want to\n\t * implement try and error, we live with this limitation */\n\tif (1 != randomize(pamh, challenge, sizeof challenge)) {\n\t\tgoto err;\n\t}\n\tif (NULL == pubkey || NULL == privkey || NULL == md_ctx || NULL == md\n\t\t\t|| !EVP_SignInit(md_ctx, md)\n\t\t\t|| !EVP_SignUpdate(md_ctx, challenge, sizeof challenge)\n\t\t\t|| !EVP_SignFinal(md_ctx, signature, &siglen, privkey)\n\t\t\t|| !EVP_MD_CTX_reset(md_ctx)\n\t\t\t|| !EVP_VerifyInit(md_ctx, md)\n\t\t\t|| !EVP_VerifyUpdate(md_ctx, challenge, sizeof challenge)\n\t\t\t|| 1 != EVP_VerifyFinal(md_ctx, signature, siglen, pubkey)) {\n\t\tpam_syslog(pamh, LOG_DEBUG, \"Error verifying key: %s\\n\",\n\t\t\t\tERR_reason_error_string(ERR_get_error()));\n\t\tprompt(flags, pamh, PAM_ERROR_MSG, NULL, _(\"Error verifying key\"));\n\t\tgoto err;\n\t}\n\tok = 1;\n\nerr:\n\tif (NULL != pubkey)\n\t\tEVP_PKEY_free(pubkey);\n\tif (NULL != privkey)\n\t\tEVP_PKEY_free(privkey);\n\tif (NULL != md_ctx) {\n\t\tEVP_MD_CTX_free(md_ctx);\n\t}\n\treturn ok;\n}", "label": 0, "label_name": "vulnerable"} -{"code": "function ffprobe(file) {\n return new Promise((resolve, reject) => {\n if (!file)\n throw new Error('no file provided');\n fs_1.stat(file, (err, stats) => {\n if (err)\n throw err;\n child_process_1.exec('ffprobe -v quiet -print_format json -show_format -show_streams ' + file, (error, stdout, stderr) => {\n if (error)\n return reject(error);\n if (!stdout)\n return reject(new Error(\"can't probe file \" + file));\n let ffprobed;\n try {\n ffprobed = JSON.parse(stdout);\n }\n catch (err) {\n return reject(err);\n }\n for (let i = 0; i < ffprobed.streams.length; i++) {\n if (ffprobed.streams[i].codec_type === 'video')\n ffprobed.video = ffprobed.streams[i];\n if (ffprobed.streams[i].codec_type === 'audio' && ffprobed.streams[i].channels)\n ffprobed.audio = ffprobed.streams[i];\n }\n resolve(ffprobed);\n });\n });\n });\n}", "label": 0, "label_name": "vulnerable"} -{"code": "func TestRedactURL(t *testing.T) {\n\tcases := []struct {\n\t\tname string\n\t\turl *url.URL\n\t\twant string\n\t}{\n\t\t{\n\t\t\tname: \"non-blank Password\",\n\t\t\turl: &url.URL{\n\t\t\t\tScheme: \"http\",\n\t\t\t\tHost: \"host.tld\",\n\t\t\t\tPath: \"this:that\",\n\t\t\t\tUser: url.UserPassword(\"user\", \"password\"),\n\t\t\t},\n\t\t\twant: \"http://user:xxxxx@host.tld/this:that\",\n\t\t},\n\t\t{\n\t\t\tname: \"blank Password\",\n\t\t\turl: &url.URL{\n\t\t\t\tScheme: \"http\",\n\t\t\t\tHost: \"host.tld\",\n\t\t\t\tPath: \"this:that\",\n\t\t\t\tUser: url.User(\"user\"),\n\t\t\t},\n\t\t\twant: \"http://user@host.tld/this:that\",\n\t\t},\n\t\t{\n\t\t\tname: \"nil User\",\n\t\t\turl: &url.URL{\n\t\t\t\tScheme: \"http\",\n\t\t\t\tHost: \"host.tld\",\n\t\t\t\tPath: \"this:that\",\n\t\t\t\tUser: url.UserPassword(\"\", \"password\"),\n\t\t\t},\n\t\t\twant: \"http://:xxxxx@host.tld/this:that\",\n\t\t},\n\t\t{\n\t\t\tname: \"blank Username, blank Password\",\n\t\t\turl: &url.URL{\n\t\t\t\tScheme: \"http\",\n\t\t\t\tHost: \"host.tld\",\n\t\t\t\tPath: \"this:that\",\n\t\t\t},\n\t\t\twant: \"http://host.tld/this:that\",\n\t\t},\n\t\t{\n\t\t\tname: \"empty URL\",\n\t\t\turl: &url.URL{},\n\t\t\twant: \"\",\n\t\t},\n\t\t{\n\t\t\tname: \"nil URL\",\n\t\t\turl: nil,\n\t\t\twant: \"\",\n\t\t},\n\t}\n\n\tfor _, tt := range cases {\n\t\tt := t\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\tif g, w := RedactURL(tt.url), tt.want; g != w {\n\t\t\t\tt.Fatalf(\"got: %q\\nwant: %q\", g, w)\n\t\t\t}\n\t\t})\n\t}\n}", "label": 0, "label_name": "vulnerable"} -{"code": "module.exports = function(test) {\n\n let client;\n describe(\"SNAC Testing client accessing service before session is activated \", function() {\n\n beforeEach(function(done) {\n client = OPCUAClient.create();\n done();\n });\n afterEach(function(done) {\n client = null;\n done();\n });\n\n it(\"SNAC1- should return BadSessionNotActivated when service is called before session is activated\", (done) => {\n\n let session1;\n let last_response;\n let last_response_err;\n let activate_error;\n async.series([\n\n function(callback) {\n client.connect(test.endpointUrl, callback);\n },\n function(callback) {\n client._createSession(function(err, session) {\n if (err) {\n return callback(err);\n }\n session1 = session;\n callback();\n });\n },\n // let verify that it is now possible to send a request on client1's session\n function(callback) {\n // coerce nodeIds\n const request = new ReadRequest({\n nodesToRead: [{ nodeId: \"i=2255\", attributeId: 13 }],\n maxAge: 0,\n timestampsToReturn: TimestampsToReturn.Both\n });\n request.requestHeader.authenticationToken = session1.authenticationToken;\n\n client.performMessageTransaction(request, function(err, response) {\n console.log(err ? err.toString() : \"null\");\n console.log(response ? response.toString() : \"null\");\n last_response = response;\n last_response_err = err;\n callback();\n });\n },\n // verify the session can no longer be used\n function(callback) {\n client._activateSession(session1,(err) => {\n activate_error = err;\n // BadSessionIdInvalid, BadSessionClosed\n callback();\n });\n },\n\n function(callback) {\n client.closeSession(session1, true, callback);\n },\n function(callback) {\n console.log(\"disconnecting\")\n client.disconnect(callback);\n }\n ], (err) => {\n if (err) {\n return done(err);\n }\n last_response_err.response.responseHeader.serviceResult.should.eql(StatusCodes.BadSessionNotActivated);\n should.exist(activate_error, \n \"Activate Session should return an error if there has been an attempt to use it before being activated\");\n activate_error.message.should.match(/BadSessionIdInvalid|BadSessionClosed/);\n done();\n });\n });\n\n });\n}", "label": 1, "label_name": "safe"} -{"code": " def test_should_sanitize_img_dynsrc_lowsrc\n assert_sanitized(%(), \"\")\n end\n\n def test_should_sanitize_div_background_image_unicode_encoded\n raw = %(background-image:\\0075\\0072\\006C\\0028'\\006a\\0061\\0076\\0061\\0073\\0063\\0072\\0069\\0070\\0074\\003a\\0061\\006c\\0065\\0072\\0074\\0028.1027\\0058.1053\\0053\\0027\\0029'\\0029)\n assert_equal '', sanitize_css(raw)\n end\n\n def test_should_sanitize_div_style_expression\n raw = %(width: expression(alert('XSS'));)\n assert_equal '', sanitize_css(raw)\n end\n\n def test_should_sanitize_across_newlines\n raw = %(\\nwidth:\\nexpression(alert('XSS'));\\n)\n assert_equal '', sanitize_css(raw)\n end\n\n def test_should_sanitize_img_vbscript\n assert_sanitized %(), ''\n end\n\n def test_should_sanitize_cdata_section\n assert_sanitized \"section]]>\", \"section]]>\"\n end\n\n def test_should_sanitize_unterminated_cdata_section\n assert_sanitized \"neverending...\", \"neverending...\"\n end\n\n def test_should_not_mangle_urls_with_ampersand\n assert_sanitized %{my link}\n end\n\n def test_should_sanitize_neverending_attribute\n assert_sanitized \"\"\n end\n\n [\n %(),\n %(),\n %(),\n %()\n ].each_with_index do |enc_hack, i|\n define_method \"test_x03a_handling_#{i+1}\" do\n assert_sanitized enc_hack, \"\"\n end\n end\n\n def test_x03a_legitimate\n assert_sanitized %(), %()\n assert_sanitized %(), %()\n end\n\n def test_sanitize_ascii_8bit_string\n white_list_sanitize('hello'.encode('ASCII-8BIT')).tap do |sanitized|\n assert_equal 'hello', sanitized\n assert_equal Encoding::UTF_8, sanitized.encoding\n end\n end\n\nprotected\n\n def xpath_sanitize(input, options = {})\n XpathRemovalTestSanitizer.new.sanitize(input, options)\n end\n\n def full_sanitize(input, options = {})\n Rails::Html::FullSanitizer.new.sanitize(input, options)\n end\n\n def link_sanitize(input, options = {})\n Rails::Html::LinkSanitizer.new.sanitize(input, options)\n end\n\n def white_list_sanitize(input, options = {})\n Rails::Html::WhiteListSanitizer.new.sanitize(input, options)\n end\n\n def assert_sanitized(input, expected = nil)\n if input\n assert_dom_equal expected || input, white_list_sanitize(input)\n else\n assert_nil white_list_sanitize(input)\n end\n end\n\n def sanitize_css(input)\n Rails::Html::WhiteListSanitizer.new.sanitize_css(input)\n end\n\n def scope_allowed_tags(tags)\n Rails::Html::WhiteListSanitizer.allowed_tags = tags\n yield Rails::Html::WhiteListSanitizer.new\n\n ensure\n Rails::Html::WhiteListSanitizer.allowed_tags = nil\n end\n\n def scope_allowed_attributes(attributes)\n Rails::Html::WhiteListSanitizer.allowed_attributes = attributes\n yield Rails::Html::WhiteListSanitizer.new\n\n ensure\n Rails::Html::WhiteListSanitizer.allowed_attributes = nil\n end\nend", "label": 0, "label_name": "vulnerable"} -{"code": " self::$instance = new HTMLPurifier($prototype);\n } else {\n self::$instance = new HTMLPurifier();\n }\n }\n return self::$instance;\n }", "label": 1, "label_name": "safe"} -{"code": "\tstatic function validUTF($string) {\n\t\tif(!mb_check_encoding($string, 'UTF-8') OR !($string === mb_convert_encoding(mb_convert_encoding($string, 'UTF-32', 'UTF-8' ), 'UTF-8', 'UTF-32'))) {\n\t\t\treturn false;\n\t\t}\t\t\n\t\treturn true;\n\t}", "label": 0, "label_name": "vulnerable"} -{"code": "function vdesc_validate()\n{\n if (!V2validateData(this.desc, this.itemobj, this.error))\n {\n this.itemobj.focus();\n\n if(typeof submitBtn !== 'undefined' && submitBtn != '')\n {\n document.getElementById(submitBtn).disabled = false;\n }\n\n return false;\n }\n\n if(typeof submitBtn !== 'undefined' && submitBtn != '')\n {\n setTimeout(function () {\n document.getElementById(submitBtn).disabled = true;\n }, 10);\n }\n \n return true;\n}", "label": 1, "label_name": "safe"} -{"code": "int imap_open_connection(struct ImapAccountData *adata)\n{\n if (mutt_socket_open(adata->conn) < 0)\n return -1;\n\n adata->state = IMAP_CONNECTED;\n\n if (imap_cmd_step(adata) != IMAP_RES_OK)\n {\n imap_close_connection(adata);\n return -1;\n }\n\n if (mutt_istr_startswith(adata->buf, \"* OK\"))\n {\n if (!mutt_istr_startswith(adata->buf, \"* OK [CAPABILITY\") && check_capabilities(adata))\n {\n goto bail;\n }\n#ifdef USE_SSL\n /* Attempt STARTTLS if available and desired. */\n if ((adata->conn->ssf == 0) && (C_SslForceTls || (adata->capabilities & IMAP_CAP_STARTTLS)))\n {\n enum QuadOption ans;\n\n if (C_SslForceTls)\n ans = MUTT_YES;\n else if ((ans = query_quadoption(C_SslStarttls,\n _(\"Secure connection with TLS?\"))) == MUTT_ABORT)\n {\n goto err_close_conn;\n }\n if (ans == MUTT_YES)\n {\n enum ImapExecResult rc = imap_exec(adata, \"STARTTLS\", IMAP_CMD_SINGLE);\n // Clear any data after the STARTTLS acknowledgement\n mutt_socket_empty(adata->conn);\n\n if (rc == IMAP_EXEC_FATAL)\n goto bail;\n if (rc != IMAP_EXEC_ERROR)\n {\n if (mutt_ssl_starttls(adata->conn))\n {\n mutt_error(_(\"Could not negotiate TLS connection\"));\n goto err_close_conn;\n }\n else\n {\n /* RFC2595 demands we recheck CAPABILITY after TLS completes. */\n if (imap_exec(adata, \"CAPABILITY\", IMAP_CMD_NO_FLAGS))\n goto bail;\n }\n }\n }\n }\n\n if (C_SslForceTls && (adata->conn->ssf == 0))\n {\n mutt_error(_(\"Encrypted connection unavailable\"));\n goto err_close_conn;\n }\n#endif\n }\n else if (mutt_istr_startswith(adata->buf, \"* PREAUTH\"))\n {\n#ifdef USE_SSL\n /* Unless using a secure $tunnel, an unencrypted PREAUTH response may be a\n * MITM attack. The only way to stop \"STARTTLS\" MITM attacks is via\n * $ssl_force_tls: an attacker can easily spoof \"* OK\" and strip the\n * STARTTLS capability. So consult $ssl_force_tls, not $ssl_starttls, to\n * decide whether to abort. Note that if using $tunnel and\n * $tunnel_is_secure, adata->conn->ssf will be set to 1. */\n if ((adata->conn->ssf == 0) && C_SslForceTls)\n {\n mutt_error(_(\"Encrypted connection unavailable\"));\n goto err_close_conn;\n }\n#endif\n\n adata->state = IMAP_AUTHENTICATED;\n if (check_capabilities(adata) != 0)\n goto bail;\n FREE(&adata->capstr);\n }\n else\n {\n imap_error(\"imap_open_connection()\", adata->buf);\n goto bail;\n }\n\n return 0;\n\n#ifdef USE_SSL\nerr_close_conn:\n imap_close_connection(adata);\n#endif\nbail:\n FREE(&adata->capstr);\n return -1;\n}", "label": 0, "label_name": "vulnerable"} -{"code": "a.logotype;this.getElement().getParent().setStyles({\"text-align\":\"left\"})}}]},{type:\"select\",id:\"list_of_suggestions\",labelStyle:\"font: 12px/25px arial, sans-serif;\",size:\"6\",inputStyle:\"width: 140px; height: auto;\",items:[[\"loading...\"]],onShow:function(){p=this},onHide:function(){this.clear()},onChange:function(){a.textNode.SpellTab.setValue(this.getValue())}}]}]}]},{type:\"hbox\",id:\"rightCol\",align:\"right\",width:\"50%\",children:[{type:\"vbox\",id:\"rightCol_col__left\",widths:[\"50%\",\"50%\",\"50%\",\"50%\"],", "label": 1, "label_name": "safe"} -{"code": "var FileAnnsPane = function FileAnnsPane($element, opts) {\n\n var $header = $element.children('h1'),\n $body = $element.children('div'),\n $fileanns_container = $(\"#fileanns_container\"),\n objects = opts.selected;\n var self = this;\n\n var tmplText = $('#fileanns_template').html();\n var filesTempl = _.template(tmplText);\n\n\n var initEvents = (function initEvents() {\n\n $header.on('click', function(){\n $header.toggleClass('closed');\n $body.slideToggle();\n\n var expanded = !$header.hasClass('closed');\n OME.setPaneExpanded('files', expanded);\n\n if (expanded && $fileanns_container.is(\":empty\")) {\n this.render();\n }\n }.bind(this));\n }).bind(this);\n\n\n // set-up the attachment selection form to use AJAX. (requires jquery.form.js plugin)\n if ($(\"#choose_attachments_form\").length === 0) {\n $(\"
\")\n .hide().appendTo('body');\n }\n $('#choose_attachments_form').ajaxForm({\n beforeSubmit: function(data) {\n $(\"#batch_attachments_form\").dialog( \"close\" );\n $(\"#fileann_spinner\").show();\n },\n success: function() {\n $(\"#fileann_spinner\").hide();\n // update the list of file annotations and bind actions\n self.render();\n },\n error: function(data){\n $(\"#fileann_spinner\").hide();\n alert(\"Upload failed [\" + data.status + \" \" + data.statusText + \"]\");\n }\n });\n // prepare dialog for choosing file to attach...\n $(\"#choose_attachments_form\").dialog({\n autoOpen: false,\n resizable: false,\n height: 420,\n width:360,\n modal: true,\n buttons: {\n \"Accept\": function() {\n // simply submit the form (AJAX handling set-up above)\n $(\"#choose_attachments_form\").trigger('submit');\n $( this ).dialog( \"close\" );\n },\n \"Cancel\": function() {\n $( this ).dialog( \"close\" );\n }\n }\n });\n // show dialog for choosing file to attach...\n $(\"#choose_file_anns\").on('click', function() {\n // show dialog first, then do the AJAX call to load files...\n var $attach_form = $( \"#choose_attachments_form\" );\n $attach_form.dialog( \"open\" );\n // load form via AJAX...\n var load_url = $(this).attr('href');\n $attach_form.html(\" 
Loading attachments\");\n $attach_form.load(load_url);\n return false;\n });\n\n\n // Show/hide checkboxes beside files to select files for scripts\n $(\".toolbar input[type=button]\", $body).on('click',\n OME.toggleFileAnnotationCheckboxes\n );\n $(\"#fileanns_container\").on(\n \"change\", \"li input[type=checkbox]\",\n OME.fileAnnotationCheckboxChanged\n );\n\n $(\"#fileanns_container\").on(\"click\", \".removeFile\", function(event) {\n var url = $(this).attr('href'),\n parents = objects.join(\"|\"); // E.g image-123|image-456\n OME.removeItem(event, \".file_ann_wrapper\", url, parents);\n return false;\n });\n\n // delete action (files)\n $(\"#fileanns_container\").on(\"click\", \".deleteFile\", function(event) {\n var url = $(this).attr('href');\n OME.deleteItem(event, \"file_ann_wrapper\", url);\n });\n\n\n var isNotCompanionFile = function isNotCompanionFile(ann) {\n return ann.ns !== OMERO.constants.namespaces.NSCOMPANIONFILE;\n };\n\n var compareParentName = function(a, b){\n if (!a.parent.name || !b.parent.name) {\n return 1;\n }\n return a.parent.name.toLowerCase() > b.parent.name.toLowerCase() ? 1 : -1;\n };\n\n\n this.render = function render() {\n\n if ($fileanns_container.is(\":visible\")) {\n\n if ($fileanns_container.is(\":empty\")) {\n $fileanns_container.html(\"Loading attachments...\");\n }\n\n var request = objects.map(function(o){\n return o.replace(\"-\", \"=\");\n });\n request = request.join(\"&\");\n\n $.getJSON(WEBCLIENT.URLS.webindex + \"api/annotations/?type=file&\" + request, function(data){\n\n var checkboxesAreVisible = $(\n \"#fileanns_container input[type=checkbox]:visible\"\n ).length > 0;\n\n // manipulate data...\n // make an object of eid: experimenter\n var experimenters = data.experimenters.reduce(function(prev, exp){\n prev[exp.id + \"\"] = exp;\n return prev;\n }, {});\n\n // Populate experimenters within anns\n var anns = data.annotations.map(function(ann){\n ann.owner = experimenters[ann.owner.id];\n if (ann.link && ann.link.owner) {\n ann.link.owner = experimenters[ann.link.owner.id];\n }\n // AddedBy IDs for filtering\n ann.addedBy = [ann.link.owner.id];\n ann.description = _.escape(ann.description);\n ann.file.size = ann.file.size !== null ? ann.file.size.filesizeformat() : \"\";\n return ann;\n });\n // Don't show companion files\n anns = anns.filter(isNotCompanionFile);\n\n \n // If we are batch annotating multiple objects, we show a summary of each tag\n if (objects.length > 1) {\n\n // Map tag.id to summary for that tag\n var summary = {};\n anns.forEach(function(ann){\n var annId = ann.id,\n linkOwner = ann.link.owner.id;\n if (summary[annId] === undefined) {\n ann.canRemove = false;\n ann.canRemoveCount = 0;\n ann.links = [];\n ann.addedBy = [];\n summary[annId] = ann;\n }\n // Add link to list...\n var l = ann.link;\n // slice parent class 'ProjectI' > 'Project'\n l.parent.class = l.parent.class.slice(0, -1);\n summary[annId].links.push(l);\n\n // ...and summarise other properties on the ann\n if (l.permissions.canDelete) {\n summary[annId].canRemoveCount += 1;\n }\n summary[annId].canRemove = summary[annId].canRemove || l.permissions.canDelete;\n if (summary[annId].addedBy.indexOf(linkOwner) === -1) {\n summary[annId].addedBy.push(linkOwner);\n }\n });\n\n // convert summary back to list of 'anns'\n anns = [];\n for (var annId in summary) {\n if (summary.hasOwnProperty(annId)) {\n summary[annId].links.sort(compareParentName);\n anns.push(summary[annId]);\n }\n }\n }\n\n // Update html...\n var html = \"\";\n if (anns.length > 0) {\n html = filesTempl({'anns': anns,\n 'webindex': WEBCLIENT.URLS.webindex,\n 'userId': WEBCLIENT.USER.id});\n }\n $fileanns_container.html(html);\n\n // Finish up...\n OME.filterAnnotationsAddedBy();\n if (checkboxesAreVisible) {\n $(\"#fileanns_container input[type=checkbox]:not(:visible)\").toggle();\n }\n $(\".tooltip\", $fileanns_container).tooltip_init();\n });\n \n }\n };\n\n\n initEvents();\n\n if (OME.getPaneExpanded('files')) {\n $header.toggleClass('closed');\n $body.show();\n }\n\n this.render();\n};", "label": 0, "label_name": "vulnerable"} -{"code": " $navs[$i]->link = expCore::makeLink(array('section' => $navs[$i]->id), '', $navs[$i]->sef_name);\r\n if (!$view) {\r\n// unset($navs[$i]); //FIXME this breaks jstree if we remove a parent and not the child\r\n $attr = new stdClass();\r\n $attr->class = 'hidden'; // bs3 class to hide elements\r\n $navs[$i]->li_attr = $attr;\r\n }\r\n }\r", "label": 0, "label_name": "vulnerable"} -{"code": " function update() {\r\n parent::update();\r\n expSession::clearAllUsersSessionCache('navigation');\r\n }\r", "label": 0, "label_name": "vulnerable"} -{"code": " public function testPopBeforeSmtpGood()\n {\n //Start a fake POP server\n $pid = shell_exec('nohup ./runfakepopserver.sh >/dev/null 2>/dev/null & printf \"%u\" $!');\n $this->pids[] = $pid;\n\n sleep(2);\n //Test a known-good login\n $this->assertTrue(\n POP3::popBeforeSmtp('localhost', 1100, 10, 'user', 'test', $this->Mail->SMTPDebug),\n 'POP before SMTP failed'\n );\n //Kill the fake server\n shell_exec('kill -TERM '.escapeshellarg($pid));\n sleep(2);\n }", "label": 0, "label_name": "vulnerable"} -{"code": " public function __construct($path)\n {\n $this->_path = $path;\n parent::__construct($path);\n }", "label": 1, "label_name": "safe"} -{"code": "static void Np_toString(js_State *J)\n{\n\tchar buf[32];\n\tjs_Object *self = js_toobject(J, 0);\n\tint radix = js_isundefined(J, 1) ? 10 : js_tointeger(J, 1);\n\tif (self->type != JS_CNUMBER)\n\t\tjs_typeerror(J, \"not a number\");\n\tif (radix == 10) {\n\t\tjs_pushstring(J, jsV_numbertostring(J, buf, self->u.number));\n\t\treturn;\n\t}\n\tif (radix < 2 || radix > 36)\n\t\tjs_rangeerror(J, \"invalid radix\");\n\n\t/* lame number to string conversion for any radix from 2 to 36 */\n\t{\n\t\tstatic const char digits[] = \"0123456789abcdefghijklmnopqrstuvwxyz\";\n\t\tchar buf[100];\n\t\tdouble number = self->u.number;\n\t\tint sign = self->u.number < 0;\n\t\tjs_Buffer *sb = NULL;\n\t\tuint64_t u, limit = ((uint64_t)1<<52);\n\n\t\tint ndigits, exp, point;\n\n\t\tif (number == 0) { js_pushstring(J, \"0\"); return; }\n\t\tif (isnan(number)) { js_pushstring(J, \"NaN\"); return; }\n\t\tif (isinf(number)) { js_pushstring(J, sign ? \"-Infinity\" : \"Infinity\"); return; }\n\n\t\tif (sign)\n\t\t\tnumber = -number;\n\n\t\t/* fit as many digits as we want in an int */\n\t\texp = 0;\n\t\twhile (number * pow(radix, exp) > limit)\n\t\t\t--exp;\n\t\twhile (number * pow(radix, exp+1) < limit)\n\t\t\t++exp;\n\t\tu = number * pow(radix, exp) + 0.5;\n\n\t\t/* trim trailing zeros */\n\t\twhile (u > 0 && (u % radix) == 0) {\n\t\t\tu /= radix;\n\t\t\t--exp;\n\t\t}\n\n\t\t/* serialize digits */\n\t\tndigits = 0;\n\t\twhile (u > 0) {\n\t\t\tbuf[ndigits++] = digits[u % radix];\n\t\t\tu /= radix;\n\t\t}\n\t\tpoint = ndigits - exp;\n\n\t\tif (js_try(J)) {\n\t\t\tjs_free(J, sb);\n\t\t\tjs_throw(J);\n\t\t}\n\n\t\tif (sign)\n\t\t\tjs_putc(J, &sb, '-');\n\n\t\tif (point <= 0) {\n\t\t\tjs_putc(J, &sb, '0');\n\t\t\tjs_putc(J, &sb, '.');\n\t\t\twhile (point++ < 0)\n\t\t\t\tjs_putc(J, &sb, '0');\n\t\t\twhile (ndigits-- > 0)\n\t\t\t\tjs_putc(J, &sb, buf[ndigits]);\n\t\t} else {\n\t\t\twhile (ndigits-- > 0) {\n\t\t\t\tjs_putc(J, &sb, buf[ndigits]);\n\t\t\t\tif (--point == 0 && ndigits > 0)\n\t\t\t\t\tjs_putc(J, &sb, '.');\n\t\t\t}\n\t\t\twhile (point-- > 0)\n\t\t\t\tjs_putc(J, &sb, '0');\n\t\t}\n\n\t\tjs_putc(J, &sb, 0);\n\t\tjs_pushstring(J, sb->s);\n\n\t\tjs_endtry(J);\n\t\tjs_free(J, sb);\n\t}\n}", "label": 0, "label_name": "vulnerable"} -{"code": "\t\treset: function(elem){\n\t\t\treturn \"reset\" === elem.type;\n\t\t},", "label": 0, "label_name": "vulnerable"} -{"code": " public function test_frame_src_csp_header_has_drawio_host_added()\n {\n config()->set([\n 'app.iframe_sources' => 'https://example.com',\n 'services.drawio' => 'https://diagrams.example.com/testing?cat=dog',\n ]);\n\n $resp = $this->get('/');\n $scriptHeader = $this->getCspHeader($resp, 'frame-src');\n $this->assertEquals('frame-src \\'self\\' https://example.com https://diagrams.example.com', $scriptHeader);\n }", "label": 1, "label_name": "safe"} -{"code": "ECDSA_PrivateKey::create_signature_op(RandomNumberGenerator& rng,\n const std::string& params,\n const std::string& provider) const\n {\n#if defined(BOTAN_HAS_BEARSSL)\n if(provider == \"bearssl\" || provider.empty())\n {\n try\n {\n return make_bearssl_ecdsa_sig_op(*this, params);\n }\n catch(Lookup_Error& e)\n {\n if(provider == \"bearssl\")\n throw;\n }\n }\n#endif\n\n#if defined(BOTAN_HAS_OPENSSL)\n if(provider == \"openssl\" || provider.empty())\n {\n try\n {\n return make_openssl_ecdsa_sig_op(*this, params);\n }\n catch(Lookup_Error& e)\n {\n if(provider == \"openssl\")\n throw;\n }\n }\n#endif\n\n if(provider == \"base\" || provider.empty())\n return std::unique_ptr(new ECDSA_Signature_Operation(*this, params, rng));\n\n throw Provider_Not_Found(algo_name(), provider);\n }", "label": 1, "label_name": "safe"} -{"code": "header_put_marker (SF_PRIVATE *psf, int x)\n{\tpsf->header.ptr [psf->header.indx++] = (x >> 24) ;\n\tpsf->header.ptr [psf->header.indx++] = (x >> 16) ;\n\tpsf->header.ptr [psf->header.indx++] = (x >> 8) ;\n\tpsf->header.ptr [psf->header.indx++] = x ;\n} /* header_put_marker */", "label": 1, "label_name": "safe"} -{"code": " set: function(k, v) {\n for (const path of FORBIDDEN_KEY_PATHS) {\n if (k.startsWith(`${path}.`)) {\n return this\n }\n }\n\n v = coerce(k, v, this._schema, this)\n const path = k.split('.')\n const childKey = path.pop()\n const parentKey = path.join('.')\n const parent = walk(this._instance, parentKey, true)\n parent[childKey] = v\n return this\n },", "label": 1, "label_name": "safe"} -{"code": " it \"should exist\" do\n expect(Puppet::Parser::Functions.function(\"unique\")).to eq(\"function_unique\")\n end", "label": 0, "label_name": "vulnerable"} -{"code": "ta.style.width=\"40px\";ta.style.height=\"12px\";ta.style.marginBottom=\"-2px\";ta.style.backgroundImage=\"url(\"+mxWindow.prototype.normalizeImage+\")\";ta.style.backgroundPosition=\"top center\";ta.style.backgroundRepeat=\"no-repeat\";ta.setAttribute(\"title\",\"Minimize\");var Na=!1,Ca=mxUtils.bind(this,function(){S.innerHTML=\"\";if(!Na){var za=function(Da,La,Ya){Da=X(\"\",Da.funct,null,La,Da,Ya);Da.style.width=\"40px\";Da.style.opacity=\"0.7\";return wa(Da,null,\"pointer\")},wa=function(Da,La,Ya){null!=La&&Da.setAttribute(\"title\",", "label": 0, "label_name": "vulnerable"} -{"code": "int jpc_ppxstab_insert(jpc_ppxstab_t *tab, jpc_ppxstabent_t *ent)\n{\n\tint inspt;\n\tint i;\n\n\tfor (i = 0; i < tab->numents; ++i) {\n\t\tif (tab->ents[i]->ind > ent->ind) {\n\t\t\tbreak;\n\t\t}\n\t}\n\tinspt = i;\n\n\tif (tab->numents >= tab->maxents) {\n\t\tif (jpc_ppxstab_grow(tab, tab->maxents + 128)) {\n\t\t\treturn -1;\n\t\t}\n\t}\n\n\tfor (i = tab->numents; i > inspt; --i) {\n\t\ttab->ents[i] = tab->ents[i - 1];\n\t}\n\ttab->ents[i] = ent;\n\t++tab->numents;\n\n\treturn 0;\n}", "label": 0, "label_name": "vulnerable"} -{"code": "function set(root, space, value) {\n\tvar i,\n\t\tc,\n\t\tval,\n\t\tnextSpace,\n\t\tcurSpace = root;\n\n\tspace = parse(space);\n\n\tval = space.pop();\n\n\tfor (i = 0, c = space.length; i < c; i++) {\n\t\tnextSpace = space[i];\n\n\t\tif (\n\t\t\tnextSpace === '__proto__' ||\n\t\t\tnextSpace === 'constructor' ||\n\t\t\tnextSpace === 'prototype'\n\t\t) {\n\t\t\treturn null;\n\t\t}\n\n\t\tif (isUndefined(curSpace[nextSpace])) {\n\t\t\tcurSpace[nextSpace] = {};\n\t\t}\n\n\t\tcurSpace = curSpace[nextSpace];\n\t}\n\n\tcurSpace[val] = value;\n\n\treturn curSpace;\n}", "label": 0, "label_name": "vulnerable"} -{"code": "\tpublic void testMatchType() {\n\n\t\tJWKMatcher matcher = new JWKMatcher.Builder().keyType(KeyType.RSA).build();\n\n\t\tassertTrue(matcher.matches(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").build()));\n\t\tassertFalse(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, EC_P256_X, EC_P256_Y).keyID(\"2\").build()));\n\t\t\n\t\tassertEquals(\"kty=RSA\", matcher.toString());\n\t}", "label": 1, "label_name": "safe"} -{"code": " public static function getHelpVersion($version_id) {\n global $db;\n\n return $db->selectValue('help_version', 'version', 'id=\"'.intval($version_id).'\"');\n }", "label": 1, "label_name": "safe"} -{"code": "static void iwjpeg_scan_exif_ifd(struct iwjpegrcontext *rctx,\n\tstruct iw_exif_state *e, iw_uint32 ifd)\n{\n\tunsigned int tag_count;\n\tunsigned int i;\n\tunsigned int tag_pos;\n\tunsigned int tag_id;\n\tunsigned int v;\n\tdouble v_dbl;\n\n\tif(ifd<8 || ifd>e->d_len-18) return;\n\n\ttag_count = iw_get_ui16_e(&e->d[ifd],e->endian);\n\tif(tag_count>1000) return; // Sanity check.\n\n\tfor(i=0;i e->d_len) return; // Avoid overruns.\n\t\ttag_id = iw_get_ui16_e(&e->d[tag_pos],e->endian);\n\n\t\tswitch(tag_id) {\n\t\tcase 274: // 274 = Orientation\n\t\t\tif(get_exif_tag_int_value(e,tag_pos,&v)) {\n\t\t\t\trctx->exif_orientation = v;\n\t\t\t}\n\t\t\tbreak;\n\n\t\tcase 296: // 296 = ResolutionUnit\n\t\t\tif(get_exif_tag_int_value(e,tag_pos,&v)) {\n\t\t\t\trctx->exif_density_unit = v;\n\t\t\t}\n\t\t\tbreak;\n\n\t\tcase 282: // 282 = XResolution\n\t\t\tif(get_exif_tag_dbl_value(e,tag_pos,&v_dbl)) {\n\t\t\t\trctx->exif_density_x = v_dbl;\n\t\t\t}\n\t\t\tbreak;\n\n\t\tcase 283: // 283 = YResolution\n\t\t\tif(get_exif_tag_dbl_value(e,tag_pos,&v_dbl)) {\n\t\t\t\trctx->exif_density_y = v_dbl;\n\t\t\t}\n\t\t\tbreak;\n\t\t}\n\t}\n}", "label": 0, "label_name": "vulnerable"} -{"code": "func (p *CompactProtocol) ReadBinary() (value []byte, err error) {\n\tlength, e := p.readVarint32()\n\tif e != nil {\n\t\treturn nil, NewProtocolException(e)\n\t}\n\tif length == 0 {\n\t\treturn []byte{}, nil\n\t}\n\tif length < 0 {\n\t\treturn nil, invalidDataLength\n\t}\n\tif uint64(length) > p.trans.RemainingBytes() {\n\t\treturn nil, invalidDataLength\n\t}\n\n\tbuf := make([]byte, length)\n\t_, e = io.ReadFull(p.trans, buf)\n\treturn buf, NewProtocolException(e)\n}", "label": 0, "label_name": "vulnerable"} -{"code": "function nodeName_(element) {\n\treturn lowercase(element.nodeName || (element[0] && element[0].nodeName));\n}", "label": 1, "label_name": "safe"} -{"code": "static int read_entry(\n\tgit_index_entry **out,\n\tsize_t *out_size,\n\tgit_index *index,\n\tconst void *buffer,\n\tsize_t buffer_size,\n\tconst char *last)\n{\n\tsize_t path_length, entry_size;\n\tconst char *path_ptr;\n\tstruct entry_short source;\n\tgit_index_entry entry = {{0}};\n\tbool compressed = index->version >= INDEX_VERSION_NUMBER_COMP;\n\tchar *tmp_path = NULL;\n\n\tif (INDEX_FOOTER_SIZE + minimal_entry_size > buffer_size)\n\t\treturn -1;\n\n\t/* buffer is not guaranteed to be aligned */\n\tmemcpy(&source, buffer, sizeof(struct entry_short));\n\n\tentry.ctime.seconds = (git_time_t)ntohl(source.ctime.seconds);\n\tentry.ctime.nanoseconds = ntohl(source.ctime.nanoseconds);\n\tentry.mtime.seconds = (git_time_t)ntohl(source.mtime.seconds);\n\tentry.mtime.nanoseconds = ntohl(source.mtime.nanoseconds);\n\tentry.dev = ntohl(source.dev);\n\tentry.ino = ntohl(source.ino);\n\tentry.mode = ntohl(source.mode);\n\tentry.uid = ntohl(source.uid);\n\tentry.gid = ntohl(source.gid);\n\tentry.file_size = ntohl(source.file_size);\n\tgit_oid_cpy(&entry.id, &source.oid);\n\tentry.flags = ntohs(source.flags);\n\n\tif (entry.flags & GIT_IDXENTRY_EXTENDED) {\n\t\tuint16_t flags_raw;\n\t\tsize_t flags_offset;\n\n\t\tflags_offset = offsetof(struct entry_long, flags_extended);\n\t\tmemcpy(&flags_raw, (const char *) buffer + flags_offset,\n\t\t\tsizeof(flags_raw));\n\t\tflags_raw = ntohs(flags_raw);\n\n\t\tmemcpy(&entry.flags_extended, &flags_raw, sizeof(flags_raw));\n\t\tpath_ptr = (const char *) buffer + offsetof(struct entry_long, path);\n\t} else\n\t\tpath_ptr = (const char *) buffer + offsetof(struct entry_short, path);\n\n\tif (!compressed) {\n\t\tpath_length = entry.flags & GIT_IDXENTRY_NAMEMASK;\n\n\t\t/* if this is a very long string, we must find its\n\t\t * real length without overflowing */\n\t\tif (path_length == 0xFFF) {\n\t\t\tconst char *path_end;\n\n\t\t\tpath_end = memchr(path_ptr, '\\0', buffer_size);\n\t\t\tif (path_end == NULL)\n\t\t\t\treturn -1;\n\n\t\t\tpath_length = path_end - path_ptr;\n\t\t}\n\n\t\tentry_size = index_entry_size(path_length, 0, entry.flags);\n\t\tentry.path = (char *)path_ptr;\n\t} else {\n\t\tsize_t varint_len;\n\t\tsize_t strip_len = git_decode_varint((const unsigned char *)path_ptr,\n\t\t\t\t\t\t &varint_len);\n\t\tsize_t last_len = strlen(last);\n\t\tsize_t prefix_len = last_len - strip_len;\n\t\tsize_t suffix_len = strlen(path_ptr + varint_len);\n\t\tsize_t path_len;\n\n\t\tif (varint_len == 0)\n\t\t\treturn index_error_invalid(\"incorrect prefix length\");\n\n\t\tGITERR_CHECK_ALLOC_ADD(&path_len, prefix_len, suffix_len);\n\t\tGITERR_CHECK_ALLOC_ADD(&path_len, path_len, 1);\n\t\ttmp_path = git__malloc(path_len);\n\t\tGITERR_CHECK_ALLOC(tmp_path);\n\n\t\tmemcpy(tmp_path, last, prefix_len);\n\t\tmemcpy(tmp_path + prefix_len, path_ptr + varint_len, suffix_len + 1);\n\t\tentry_size = index_entry_size(suffix_len, varint_len, entry.flags);\n\t\tentry.path = tmp_path;\n\t}\n\n\tif (entry_size == 0)\n\t\treturn -1;\n\n\tif (INDEX_FOOTER_SIZE + entry_size > buffer_size)\n\t\treturn -1;\n\n\tif (index_entry_dup(out, index, &entry) < 0) {\n\t\tgit__free(tmp_path);\n\t\treturn -1;\n\t}\n\n\tgit__free(tmp_path);\n\t*out_size = entry_size;\n\treturn 0;\n}", "label": 0, "label_name": "vulnerable"} -{"code": " public function test_AllowedElements_invalidElement_xssAttempt()\n {\n $this->config->set('HTML.AllowedElements', '\");\n } else {\n add_to_head(\"\");\n add_to_head(\"\");\n }\n }\n\n $title = $label ? stripinput($label) : ucfirst(strtolower(str_replace(\"_\", \" \", $input_name)));\n $input_name = stripinput($input_name);\n $input_value = stripinput($input_value);\n $default_options = [\n 'input_id' => $input_name,\n 'required' => FALSE,\n 'placeholder' => '',\n 'deactivate' => FALSE,\n 'width' => '',\n 'inner_width' => '100%',\n 'class' => '',\n 'inline' => FALSE,\n 'error_text' => $locale['error_input_default'],\n 'safemode' => FALSE,\n 'icon' => \"\",\n \"tip\" => \"\",\n 'format' => 'hex', //options = the color format - hex | rgb | rgba.\n ];\n $options += $default_options;\n if (!$options['width']) {\n $options['width'] = $default_options['width'];\n }\n $input_id = $options['input_id'] ?: $default_options['input_id'];\n\n $error_class = \"\";\n if (\\defender::inputHasError($input_name)) {\n $error_class = \"has-error \";\n if (!empty($options['error_text'])) {\n $new_error_text = \\defender::getErrorText($input_name);\n if (!empty($new_error_text)) {\n $options['error_text'] = $new_error_text;\n }\n addNotice(\"danger\", \"$title - \".$options['error_text']);\n }\n }\n\n $html = \"
\\n\";", "label": 0, "label_name": "vulnerable"} -{"code": "\tprivate function readData() {\n\n\t\tif (isset($this->tid)\n\t\t\t&& $this->tid != - 1\n\t\t) {\n\t\t\t$_ticket_stmt = Database::prepare('\n\t\t\t\tSELECT * FROM `' . TABLE_PANEL_TICKETS . '` WHERE `id` = :tid'\n\t\t\t);\n\t\t\t$_ticket = Database::pexecute_first($_ticket_stmt, array('tid' => $this->tid));\n\n\t\t\t$this->Set('customer', $_ticket['customerid'], true, false);\n\t\t\t$this->Set('admin', $_ticket['adminid'], true, false);\n\t\t\t$this->Set('subject', $_ticket['subject'], true, false);\n\t\t\t$this->Set('category', $_ticket['category'], true, false);\n\t\t\t$this->Set('priority', $_ticket['priority'], true, false);\n\t\t\t$this->Set('message', $_ticket['message'], true, false);\n\t\t\t$this->Set('dt', $_ticket['dt'], true, false);\n\t\t\t$this->Set('lastchange', $_ticket['lastchange'], true, false);\n\t\t\t$this->Set('ip', $_ticket['ip'], true, false);\n\t\t\t$this->Set('status', $_ticket['status'], true, false);\n\t\t\t$this->Set('lastreplier', $_ticket['lastreplier'], true, false);\n\t\t\t$this->Set('by', $_ticket['by'], true, false);\n\t\t\t$this->Set('answerto', $_ticket['answerto'], true, false);\n\t\t\t$this->Set('archived', $_ticket['archived'], true, false);\n\t\t}\n\t}", "label": 0, "label_name": "vulnerable"} -{"code": " protected ObjectStreamClass readClassDescriptor()\n throws IOException, ClassNotFoundException {\n int type = read();\n if (type < 0) {\n throw new EOFException();\n }\n switch (type) {\n case ThrowableObjectOutputStream.TYPE_EXCEPTION:\n return ObjectStreamClass.lookup(Exception.class);\n case ThrowableObjectOutputStream.TYPE_STACKTRACEELEMENT:\n return ObjectStreamClass.lookup(StackTraceElement.class);\n case ThrowableObjectOutputStream.TYPE_FAT_DESCRIPTOR:\n return super.readClassDescriptor();\n case ThrowableObjectOutputStream.TYPE_THIN_DESCRIPTOR:\n String className = readUTF();\n Class clazz = loadClass(className);\n return ObjectStreamClass.lookup(clazz);\n default:\n throw new StreamCorruptedException(\n \"Unexpected class descriptor type: \" + type);\n }\n }", "label": 0, "label_name": "vulnerable"} -{"code": " stream.pipe(res);\n stream.end('Hello World HTTP\\n');\n break;\n }\n case '/invalid':\n res.writeHead(500, {\n 'Content-Type': 'text/plain'\n });\n res.end('Hello World HTTP\\n');\n break;\n\n case '/auth':\n res.writeHead(200, {\n 'Content-Type': 'text/plain'\n });\n res.end(Buffer.from(req.headers.authorization.split(' ').pop(), 'base64'));\n break;\n\n case '/cookie':\n res.writeHead(200, {\n 'Content-Type': 'text/plain'\n });\n res.end(req.headers.cookie);\n break;\n\n case '/ua':\n res.writeHead(200, {\n 'Content-Type': 'text/plain'\n });\n res.end(req.headers['user-agent']);\n break;\n\n case '/post': {\n let body = [];\n req.on('readable', function () {\n let chunk;\n while ((chunk = req.read()) !== null) {\n body.push(chunk);\n }\n });\n req.on('end', function () {\n res.writeHead(200, {\n 'Content-Type': 'text/plain'\n });\n res.end(Buffer.concat(body));\n });\n\n break;\n }\n default:\n res.writeHead(200, {\n 'Content-Type': 'text/plain'\n });\n res.end('Hello World HTTP\\n');\n }\n });", "label": 1, "label_name": "safe"} -{"code": " function edit_optiongroup_master() {\n expHistory::set('editable', $this->params);\n\n $id = isset($this->params['id']) ? $this->params['id'] : null;\n $record = new optiongroup_master($id);\n assign_to_template(array(\n 'record'=>$record\n ));\n }", "label": 1, "label_name": "safe"} -{"code": "MONGO_EXPORT int bson_append_finish_object( bson *b ) {\n char *start;\n int i;\n if ( bson_ensure_space( b, 1 ) == BSON_ERROR ) return BSON_ERROR;\n bson_append_byte( b , 0 );\n\n start = b->data + b->stack[ --b->stackPos ];\n i = b->cur - start;\n bson_little_endian32( start, &i );\n\n return BSON_OK;\n}", "label": 0, "label_name": "vulnerable"} -{"code": " def rs_remove(host, master)\n mongo_command(\"rs.remove(\\\"#{host}\\\")\", master)\n end", "label": 0, "label_name": "vulnerable"} -{"code": "\tpublic static function render_page_process($PATH)\n\t{\n\n\t\t$main = '

Recent Account Activity

';\n\n\t\t$stmt = phoromatic_server::$db->prepare('SELECT * FROM phoromatic_activity_stream WHERE AccountID = :account_id ORDER BY ActivityTime DESC');\n\t\t$stmt->bindValue(':account_id', $_SESSION['AccountID']);\n\t\t$result = $stmt->execute();\n\t\t$row = $result->fetchArray();\n\t\t$prev_date = null;\n\n\t\tif(empty($row))\n\t\t{\n\t\t\t$main .= '

No activity found.

';\n\t\t}\n\t\telse\n\t\t{\n\t\t\tdo\n\t\t\t{\n\t\t\t\tif($prev_date != substr($row['ActivityTime'], 0, 10))\n\t\t\t\t{\n\t\t\t\t\tif($prev_date != null)\n\t\t\t\t\t\t$main .= '


';\n\n\t\t\t\t\t$prev_date = substr($row['ActivityTime'], 0, 10);\n\t\t\t\t\t$new_date = strtotime($row['ActivityTime']);\n\n\t\t\t\t\tif(date('Y-m-d') == $prev_date)\n\t\t\t\t\t{\n\t\t\t\t\t\t$main .= '

Today

';\n\t\t\t\t\t}\n\t\t\t\t\telse if($new_date > (time() - (60 * 60 * 24 * 6)))\n\t\t\t\t\t{\n\t\t\t\t\t\t$main .= '

' . date('l', $new_date) . '

';\n\t\t\t\t\t}\n\t\t\t\t\telse\n\t\t\t\t\t{\n\t\t\t\t\t\t$main .= '

' . date('j F Y', $new_date) . '

';\n\t\t\t\t\t}\n\t\t\t\t\t$main .= '

';\n\t\t\t\t}\n\n\t\t\t\t$id_link_format = $row['ActivityEventID'];\n\t\t\t\tswitch($row['ActivityEvent'])\n\t\t\t\t{\n\t\t\t\t\tcase 'settings':\n\t\t\t\t\t\t$event_link_format = 'settings';\n\t\t\t\t\t\tbreak;\n\t\t\t\t\tcase 'users':\n\t\t\t\t\t\t$event_link_format = 'a user';\n\t\t\t\t\t\tbreak;\n\t\t\t\t\tcase 'schedule':\n\t\t\t\t\t\t$event_link_format = 'schedule';\n\n\t\t\t\t\t\t$stmt1 = phoromatic_server::$db->prepare('SELECT Title FROM phoromatic_schedules WHERE AccountID = :account_id AND ScheduleID = :schedule_id');\n\t\t\t\t\t\t$stmt1->bindValue(':account_id', $_SESSION['AccountID']);\n\t\t\t\t\t\t$stmt1->bindValue(':schedule_id', $row['ActivityEventID']);\n\t\t\t\t\t\t$result1 = $stmt1->execute();\n\t\t\t\t\t\t$row1 = $result1->fetchArray();\n\t\t\t\t\t\t$id_link_format = '' . $row1['Title'] . '';\n\t\t\t\t\t\tbreak;\n\t\t\t\t\tcase 'tests_for_schedule':\n\t\t\t\t\t\t$event_link_format = 'a test for a schedule';\n\n\t\t\t\t\t\t$stmt1 = phoromatic_server::$db->prepare('SELECT Title FROM phoromatic_schedules WHERE AccountID = :account_id AND ScheduleID = :schedule_id');\n\t\t\t\t\t\t$stmt1->bindValue(':account_id', $_SESSION['AccountID']);\n\t\t\t\t\t\t$stmt1->bindValue(':schedule_id', $row['ActivityEventID']);\n\t\t\t\t\t\t$result1 = $stmt1->execute();\n\t\t\t\t\t\t$row1 = $result1->fetchArray();\n\t\t\t\t\t\t$id_link_format = '' . $row1['Title'] . '';\n\t\t\t\t\t\tbreak;\n\t\t\t\t\tcase 'groups':\n\t\t\t\t\t\t$event_link_format = 'a group';\n\t\t\t\t\t\tbreak;\n\t\t\t\t\tdefault:\n\t\t\t\t\t\t$event_link_format = $row['ActivityEvent'];\n\t\t\t\t\t\tbreak;\n\t\t\t\t}\n\n\t\t\t\tif($row['ActivityCreatorType'] == 'USER')\n\t\t\t\t{\n\t\t\t\t\t$main .= '' . date('H:i', strtotime($row['ActivityTime'])) . '   ' . $row['ActivityCreator'] . ' ' . $row['ActivityEventType'] . ' ' . $event_link_format . '';\n\n\t\t\t\t\tif($id_link_format != null)\n\t\t\t\t\t\t$main .= ': ' . $id_link_format;\n\n\t\t\t\t\t$main .= '
' . PHP_EOL;\n\n\t\t\t\t}\n\n\t\t\t\t//$main .= '

' . $row['ActivityCreator'] . ' ' . $row['ActivityCreatorType'] . ' ' . $row['ActivityEvent'] . ' ' . $row['ActivityEventID'] . ' ' . $row['ActivityEventType'] . '

';\n\t\t\t}\n\t\t\twhile($row = $result->fetchArray());\n\n\t\t\tif($prev_date != null)\n\t\t\t\t$main .= '

';\n\t\t}\n\n\t\techo phoromatic_webui_header_logged_in();\n\t\techo phoromatic_webui_main($main);\n\t\techo phoromatic_webui_footer();\n\t}", "label": 0, "label_name": "vulnerable"} -{"code": "void CharCodeToUnicode::addMapping(CharCode code, char *uStr, int n,\n\t\t\t\t int offset) {\n CharCode oldLen, i;\n Unicode u;\n char uHex[5];\n int j;\n\n if (code >= mapLen) {\n oldLen = mapLen;\n mapLen = (code + 256) & ~255;\n map = (Unicode *)greallocn(map, mapLen, sizeof(Unicode));\n for (i = oldLen; i < mapLen; ++i) {\n map[i] = 0;\n }\n }\n if (n <= 4) {\n if (sscanf(uStr, \"%x\", &u) != 1) {\n error(-1, \"Illegal entry in ToUnicode CMap\");\n return;\n }\n map[code] = u + offset;\n } else {\n if (sMapLen >= sMapSize) {\n sMapSize = sMapSize + 16;\n sMap = (CharCodeToUnicodeString *)\n\t greallocn(sMap, sMapSize, sizeof(CharCodeToUnicodeString));\n }\n map[code] = 0;\n sMap[sMapLen].c = code;\n sMap[sMapLen].len = n / 4;\n for (j = 0; j < sMap[sMapLen].len && j < maxUnicodeString; ++j) {\n strncpy(uHex, uStr + j*4, 4);\n uHex[4] = '\\0';\n if (sscanf(uHex, \"%x\", &sMap[sMapLen].u[j]) != 1) {\n\terror(-1, \"Illegal entry in ToUnicode CMap\");\n }\n }\n sMap[sMapLen].u[sMap[sMapLen].len - 1] += offset;\n ++sMapLen;\n }\n}", "label": 0, "label_name": "vulnerable"} -{"code": " $cache[$key] = array_merge($fallback_cache[$key], $cache[$key]);\n }\n } else {\n $cache[$key] = $fallback_cache[$key];\n }\n }\n }\n\n // save to cache for later retrieval\n $this->cache[$code] = $cache;\n return;\n }", "label": 1, "label_name": "safe"} -{"code": " public function remove()\n {\n $this->checkCSRFParam();\n $project = $this->getProject();\n $tag_id = $this->request->getIntegerParam('tag_id');\n $tag = $this->tagModel->getById($tag_id);\n\n if ($tag['project_id'] != $project['id']) {\n throw new AccessForbiddenException();\n }\n\n if ($this->tagModel->remove($tag_id)) {\n $this->flash->success(t('Tag removed successfully.'));\n } else {\n $this->flash->failure(t('Unable to remove this tag.'));\n }\n\n $this->response->redirect($this->helper->url->to('ProjectTagController', 'index', array('project_id' => $project['id'])));\n }", "label": 0, "label_name": "vulnerable"} -{"code": " TfLiteRegistration CopyOpRegistration() {\n TfLiteRegistration reg = {nullptr, nullptr, nullptr, nullptr};\n\n reg.prepare = [](TfLiteContext* context, TfLiteNode* node) {\n // Set output size to input size\n const TfLiteTensor* tensor0;\n TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, 0, &tensor0));\n TfLiteTensor* tensor1;\n TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &tensor1));\n TfLiteIntArray* newSize = TfLiteIntArrayCopy(tensor0->dims);\n return context->ResizeTensor(context, tensor1, newSize);\n };\n\n reg.invoke = [](TfLiteContext* context, TfLiteNode* node) {\n CallReporting* call_reporting =\n static_cast(node->builtin_data);\n // Copy input data to output data.\n const TfLiteTensor* a0;\n TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, 0, &a0));\n TfLiteTensor* a1;\n TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &a1));\n int num = a0->dims->data[0];\n for (int i = 0; i < num; i++) {\n a1->data.f[i] = a0->data.f[i];\n }\n call_reporting->Record();\n return kTfLiteOk;\n };\n return reg;\n }", "label": 1, "label_name": "safe"} -{"code": "function usercheck_callback_p(data) {\r\n var response = (data == 1);\r\n\r\n var obj = document.getElementById('ajax_output_1');\r\n obj.style.color = (response) ? '#008800' : '#ff0000';\r\n obj.innerHTML = (response == 1) ? 'Username Available' : 'Username already taken';\r\n\r\n var staff_username = document.getElementById(\"USERNAME\").value;\r\n var staff_username_flag = document.getElementById(\"staff_username_flag\").value;\r\n\r\n if(staff_username != '' && staff_username_flag == '0')\r\n {\r\n var obj = document.getElementById('ajax_output_1');\r\n obj.style.color = '#ff0000';\r\n obj.innerHTML = 'Username can only contain letters, numbers, underscores, at the rate and dots';\r\n\r\n window.$(\"#mod_staff_btn\").attr(\"disabled\", true);\r\n }\r\n else\r\n {\r\n window.$(\"#mod_staff_btn\").attr(\"disabled\", false);\r\n }\r\n}\r", "label": 1, "label_name": "safe"} -{"code": "sec_decrypt(uint8 * data, int length)\n{\n\tif (length <= 0)\n\t\treturn;\n\n\tif (g_sec_decrypt_use_count == 4096)\n\t{\n\t\tsec_update(g_sec_decrypt_key, g_sec_decrypt_update_key);\n\t\trdssl_rc4_set_key(&g_rc4_decrypt_key, g_sec_decrypt_key, g_rc4_key_len);\n\t\tg_sec_decrypt_use_count = 0;\n\t}\n\n\trdssl_rc4_crypt(&g_rc4_decrypt_key, data, data, length);\n\tg_sec_decrypt_use_count++;\n}", "label": 1, "label_name": "safe"} -{"code": " public function getCustomerReference()\n {\n if (isset($this->data['object']) && 'customer' === $this->data['object']) {\n return $this->data['id'];\n }\n if (isset($this->data['object']) && 'card' === $this->data['object']) {\n if (!empty($this->data['customer'])) {\n return $this->data['customer'];\n }\n }\n\n return;\n }", "label": 0, "label_name": "vulnerable"} -{"code": "func (mbox *Mailbox) newClient() (*client.Client, error) {\n\tvar imapClient *client.Client\n\tvar err error\n\trestrictedDialer := dialer.Dialer()\n\tif mbox.TLS {\n\t\tconfig := new(tls.Config)\n\t\tconfig.InsecureSkipVerify = mbox.IgnoreCertErrors\n\t\timapClient, err = client.DialWithDialerTLS(restrictedDialer, mbox.Host, config)\n\t} else {\n\t\timapClient, err = client.DialWithDialer(restrictedDialer, mbox.Host)\n\t}\n\tif err != nil {\n\t\treturn imapClient, err\n\t}\n\n\terr = imapClient.Login(mbox.User, mbox.Pwd)\n\tif err != nil {\n\t\treturn imapClient, err\n\t}\n\n\t_, err = imapClient.Select(mbox.Folder, mbox.ReadOnly)\n\tif err != nil {\n\t\treturn imapClient, err\n\t}\n\n\treturn imapClient, nil\n}", "label": 1, "label_name": "safe"} -{"code": " def test_started_typing_remote_send(self):\n self.room_members = [U_APPLE, U_ONION]\n\n self.get_success(\n self.handler.started_typing(\n target_user=U_APPLE,\n requester=create_requester(U_APPLE),\n room_id=ROOM_ID,\n timeout=20000,\n )\n )\n\n put_json = self.hs.get_http_client().put_json\n put_json.assert_called_once_with(\n \"farm\",\n path=\"/_matrix/federation/v1/send/1000000\",\n data=_expect_edu_transaction(\n \"m.typing\",\n content={\n \"room_id\": ROOM_ID,\n \"user_id\": U_APPLE.to_string(),\n \"typing\": True,\n },\n ),\n json_data_callback=ANY,\n long_retries=True,\n backoff_on_404=True,\n try_trailing_slash_on_400=True,\n )", "label": 0, "label_name": "vulnerable"} -{"code": "TfLiteStatus ResizeOutput(TfLiteContext* context, TfLiteNode* node) {\n TfLiteIntArray* output_shape = GetOutputShape(context, node);\n std::unique_ptr\n scoped_output_shape(output_shape, TfLiteIntArrayFree);\n\n const TfLiteTensor* input;\n TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kInputTensor, &input));\n TfLiteTensor* output;\n TF_LITE_ENSURE_OK(context,\n GetOutputSafe(context, node, kOutputTensor, &output));\n\n // Tensorflow's Reshape allows one of the shape components to have the\n // special -1 value, meaning it will be calculated automatically based on the\n // input. Here we calculate what that dimension should be so that the number\n // of output elements in the same as the number of input elements.\n int num_input_elements = NumElements(input);\n\n int num_output_elements = 1;\n int stretch_dim = -1;\n for (int i = 0; i < output_shape->size; ++i) {\n int value = output_shape->data[i];\n if (value == -1) {\n TF_LITE_ENSURE_EQ(context, stretch_dim, -1);\n stretch_dim = i;\n } else {\n num_output_elements *= value;\n }\n }\n if (stretch_dim != -1) {\n output_shape->data[stretch_dim] = num_input_elements / num_output_elements;\n num_output_elements *= output_shape->data[stretch_dim];\n }\n\n TF_LITE_ENSURE_EQ(context, num_input_elements, num_output_elements);\n return context->ResizeTensor(context, output, scoped_output_shape.release());\n}", "label": 1, "label_name": "safe"} -{"code": "do_decrypt (const RIJNDAEL_context *ctx, unsigned char *bx,\n const unsigned char *ax)\n{\n#ifdef USE_AMD64_ASM\n return _gcry_aes_amd64_decrypt_block(ctx->keyschdec, bx, ax, ctx->rounds,\n\t\t\t\t &dec_tables);\n#elif defined(USE_ARM_ASM)\n return _gcry_aes_arm_decrypt_block(ctx->keyschdec, bx, ax, ctx->rounds,\n\t\t\t\t &dec_tables);\n#else\n return do_decrypt_fn (ctx, bx, ax);\n#endif /*!USE_ARM_ASM && !USE_AMD64_ASM*/\n}", "label": 0, "label_name": "vulnerable"} -{"code": "return null}))}),L,l,I,X.size)}),mxUtils.bind(this,function(){this.handleError({message:mxResources.get(\"invalidOrMissingFile\")})})))}else K=D.target.result,p(K,X.type,g+U*F,k+U*F,240,160,X.name,function(ba){M(U,function(){return ba})},X)});/(\\.v(dx|sdx?))($|\\?)/i.test(X.name)||/(\\.vs(x|sx?))($|\\?)/i.test(X.name)?p(null,X.type,g+U*F,k+U*F,240,160,X.name,function(D){M(U,function(){return D})},X):\"image\"==X.type.substring(0,5)||\"application/pdf\"==X.type?u.readAsDataURL(X):u.readAsText(X)}})(W)});if(C){C=", "label": 1, "label_name": "safe"} -{"code": " public function elements_count()\r\n {\r\n global $DB;\r\n global $webuser;\r\n $permission = (!empty($_SESSION['APP_USER#'.APP_UNIQUE])? 1 : 0);\r\n\r\n // public access / webuser based / webuser groups based\r\n $access = 2;\r\n if(!empty($current['webuser']))\r\n {\r\n $access = 1;\r\n if(!empty($webuser->groups))\r\n {\r\n $access_groups = array();\r\n foreach($webuser->groups as $wg)\r\n {\r\n if(empty($wg))\r\n continue;\r\n $access_groups[] = 'groups LIKE \"%g'.$wg.'%\"';\r\n }\r\n if(!empty($access_groups))\r\n $access_extra = ' OR (access = 3 AND ('.implode(' OR ', $access_groups).'))';\r\n }\r\n }\r\n\r\n $out = $DB->query_single(\r\n 'COUNT(id)',\r\n 'nv_items',\r\n ' category = '.intval($this->id).' AND\r\n website = '.intval($this->website).' AND\r\n permission <= '.$permission.' AND \r\n (date_published = 0 OR date_published < '.core_time().') AND \r\n (date_unpublish = 0 OR date_unpublish > '.core_time().') AND \r\n (access = 0 OR access = '.$access.$access_extra.')\r\n ');\r\n\r\n return $out;\r\n }\r", "label": 1, "label_name": "safe"} -{"code": "void AnnotateCondVarSignal(const char *file, int line,\n const volatile void *cv){}", "label": 0, "label_name": "vulnerable"} -{"code": "ast_for_expr_stmt(struct compiling *c, const node *n)\n{\n REQ(n, expr_stmt);\n /* expr_stmt: testlist_star_expr (annassign | augassign (yield_expr|testlist) |\n ('=' (yield_expr|testlist_star_expr))*)\n annassign: ':' test ['=' test]\n testlist_star_expr: (test|star_expr) (',' test|star_expr)* [',']\n augassign: '+=' | '-=' | '*=' | '@=' | '/=' | '%=' | '&=' | '|=' | '^='\n | '<<=' | '>>=' | '**=' | '//='\n test: ... here starts the operator precedence dance\n */\n\n if (NCH(n) == 1) {\n expr_ty e = ast_for_testlist(c, CHILD(n, 0));\n if (!e)\n return NULL;\n\n return Expr(e, LINENO(n), n->n_col_offset,\n n->n_end_lineno, n->n_end_col_offset, c->c_arena);\n }\n else if (TYPE(CHILD(n, 1)) == augassign) {\n expr_ty expr1, expr2;\n operator_ty newoperator;\n node *ch = CHILD(n, 0);\n\n expr1 = ast_for_testlist(c, ch);\n if (!expr1)\n return NULL;\n if(!set_context(c, expr1, Store, ch))\n return NULL;\n /* set_context checks that most expressions are not the left side.\n Augmented assignments can only have a name, a subscript, or an\n attribute on the left, though, so we have to explicitly check for\n those. */\n switch (expr1->kind) {\n case Name_kind:\n case Attribute_kind:\n case Subscript_kind:\n break;\n default:\n ast_error(c, ch, \"illegal expression for augmented assignment\");\n return NULL;\n }\n\n ch = CHILD(n, 2);\n if (TYPE(ch) == testlist)\n expr2 = ast_for_testlist(c, ch);\n else\n expr2 = ast_for_expr(c, ch);\n if (!expr2)\n return NULL;\n\n newoperator = ast_for_augassign(c, CHILD(n, 1));\n if (!newoperator)\n return NULL;\n\n return AugAssign(expr1, newoperator, expr2, LINENO(n), n->n_col_offset,\n n->n_end_lineno, n->n_end_col_offset, c->c_arena);\n }\n else if (TYPE(CHILD(n, 1)) == annassign) {\n expr_ty expr1, expr2, expr3;\n node *ch = CHILD(n, 0);\n node *deep, *ann = CHILD(n, 1);\n int simple = 1;\n\n /* we keep track of parens to qualify (x) as expression not name */\n deep = ch;\n while (NCH(deep) == 1) {\n deep = CHILD(deep, 0);\n }\n if (NCH(deep) > 0 && TYPE(CHILD(deep, 0)) == LPAR) {\n simple = 0;\n }\n expr1 = ast_for_testlist(c, ch);\n if (!expr1) {\n return NULL;\n }\n switch (expr1->kind) {\n case Name_kind:\n if (forbidden_name(c, expr1->v.Name.id, n, 0)) {\n return NULL;\n }\n expr1->v.Name.ctx = Store;\n break;\n case Attribute_kind:\n if (forbidden_name(c, expr1->v.Attribute.attr, n, 1)) {\n return NULL;\n }\n expr1->v.Attribute.ctx = Store;\n break;\n case Subscript_kind:\n expr1->v.Subscript.ctx = Store;\n break;\n case List_kind:\n ast_error(c, ch,\n \"only single target (not list) can be annotated\");\n return NULL;\n case Tuple_kind:\n ast_error(c, ch,\n \"only single target (not tuple) can be annotated\");\n return NULL;\n default:\n ast_error(c, ch,\n \"illegal target for annotation\");\n return NULL;\n }\n\n if (expr1->kind != Name_kind) {\n simple = 0;\n }\n ch = CHILD(ann, 1);\n expr2 = ast_for_expr(c, ch);\n if (!expr2) {\n return NULL;\n }\n if (NCH(ann) == 2) {\n return AnnAssign(expr1, expr2, NULL, simple,\n LINENO(n), n->n_col_offset,\n n->n_end_lineno, n->n_end_col_offset, c->c_arena);\n }\n else {\n ch = CHILD(ann, 3);\n if (TYPE(ch) == testlist) {\n expr3 = ast_for_testlist(c, ch);\n }\n else {\n expr3 = ast_for_expr(c, ch);\n }\n if (!expr3) {\n return NULL;\n }\n return AnnAssign(expr1, expr2, expr3, simple,\n LINENO(n), n->n_col_offset,\n n->n_end_lineno, n->n_end_col_offset, c->c_arena);\n }\n }\n else {\n int i;\n asdl_seq *targets;\n node *value;\n expr_ty expression;\n\n /* a normal assignment */\n REQ(CHILD(n, 1), EQUAL);\n targets = _Py_asdl_seq_new(NCH(n) / 2, c->c_arena);\n if (!targets)\n return NULL;\n for (i = 0; i < NCH(n) - 2; i += 2) {\n expr_ty e;\n node *ch = CHILD(n, i);\n if (TYPE(ch) == yield_expr) {\n ast_error(c, ch, \"assignment to yield expression not possible\");\n return NULL;\n }\n e = ast_for_testlist(c, ch);\n if (!e)\n return NULL;\n\n /* set context to assign */\n if (!set_context(c, e, Store, CHILD(n, i)))\n return NULL;\n\n asdl_seq_SET(targets, i / 2, e);\n }\n value = CHILD(n, NCH(n) - 1);\n if (TYPE(value) == testlist_star_expr)\n expression = ast_for_testlist(c, value);\n else\n expression = ast_for_expr(c, value);\n if (!expression)\n return NULL;\n return Assign(targets, expression, LINENO(n), n->n_col_offset,\n n->n_end_lineno, n->n_end_col_offset, c->c_arena);\n }\n}", "label": 0, "label_name": "vulnerable"} -{"code": " public function getStartTime()\n {\n return $this->debug ? $this->startTime : -INF;\n }", "label": 0, "label_name": "vulnerable"} -{"code": " $keys = array_keys($value);\n if (array_keys($keys) === $keys) {\n // list\n $subst['$'.$i] = $this->listify($value);\n } else {\n // associative array\n // no $i implementation yet, sorry\n $subst['$'.$i.'.Keys'] = $this->listify($keys);\n $subst['$'.$i.'.Values'] = $this->listify(array_values($value));\n }\n continue;\n }\n $subst['$' . $i] = $value;\n }", "label": 1, "label_name": "safe"} -{"code": "h.data.getTarget().is(\"a\")&&c!=b._.currentTabId&&(c=b._.currentTabId,d=b._.contents[c].Content,f=a.iframeNumber+\"_\"+c,a.div_overlay.setEnable(),d.getElement().getChildCount()?t(a.targetFromFrame[f],a.cmd[c]):(a.setIframe(d,c),g=document.getElementById(f),a.targetFromFrame[f]=g.contentWindow))})};a.buildSelectLang=function(a){var c=new CKEDITOR.dom.element(\"div\"),d=new CKEDITOR.dom.element(\"select\"),a=\"wscLang\"+a;c.addClass(\"cke_dialog_ui_input_select\");c.setAttribute(\"role\",\"presentation\");c.setStyles({height:\"auto\",\nposition:\"absolute\",right:\"0\",top:\"-1px\",width:\"160px\",\"white-space\":\"normal\"});d.setAttribute(\"id\",a);d.addClass(\"cke_dialog_ui_input_select\");d.setStyles({width:\"160px\"});c.append(d);return c};a.buildOptionLang=function(b,c){var d=document.getElementById(\"wscLang\"+c),f=document.createDocumentFragment(),g,h,e=[];if(0===d.options.length){for(g in b)e.push([g,b[g]]);e.sort();for(var k=0;k(AppModule);\n app.useWebSocketAdapter(new WsAdapter(app));\n\n // swagger setting\n const options = new DocumentBuilder()\n .setTitle('ptarmigan REST-API')\n .setDescription('Lightning Network implementation ptarmigan REST-API')\n .addBearerAuth('Authorization', 'header')\n .setVersion('0.2')\n .build();\n const document = SwaggerModule.createDocument(app, options);\n SwaggerModule.setup('api', app, document);\n\n const config = ConfigService;\n Logger.log('ptarmdRpcPort: ' + config.get('ptarmigan.ptarmdRpcPort'));\n Logger.log('ptarmdHost: + ' + config.get('ptarmigan.ptarmdHost'));\n Logger.log('bitcoindRpcPort: ' + config.get('ptarmigan.bitcoindRpcPort'));\n Logger.log('bitcoindHost: ' + config.get('ptarmigan.bitcoindHost'));\n Logger.log('bitcoindHost: ' + config.get('ptarmigan.apiToken'));\n\n await app.listen(3000);\n}", "label": 1, "label_name": "safe"} -{"code": " public function save()\n {\n $project = $this->getProject();\n $values = $this->request->getValues();\n $values['project_id'] = $project['id'];\n\n list($valid, $errors) = $this->tagValidator->validateCreation($values);\n\n if ($valid) {\n if ($this->tagModel->create($project['id'], $values['name']) > 0) {\n $this->flash->success(t('Tag created successfully.'));\n } else {\n $this->flash->failure(t('Unable to create this tag.'));\n }\n\n $this->response->redirect($this->helper->url->to('ProjectTagController', 'index', array('project_id' => $project['id'])));\n } else {\n $this->create($values, $errors);\n }\n }", "label": 1, "label_name": "safe"} -{"code": "rdpsnddbg_process(STREAM s)\n{\n\tunsigned int pkglen;\n\tstatic char *rest = NULL;\n\tchar *buf;\n\n\tif (!s_check(s))\n\t{\n\t\trdp_protocol_error(\"rdpsnddbg_process(), stream is in unstable state\", s);\n\t}\n\n\tpkglen = s->end - s->p;\n\t/* str_handle_lines requires null terminated strings */\n\tbuf = (char *) xmalloc(pkglen + 1);\n\tSTRNCPY(buf, (char *) s->p, pkglen + 1);\n\n\tstr_handle_lines(buf, &rest, rdpsnddbg_line_handler, NULL);\n\n\txfree(buf);\n}", "label": 1, "label_name": "safe"} -{"code": " private JWTClaimsSet fetchOidcProfile(BearerAccessToken accessToken) {\n final var userInfoRequest = new UserInfoRequest(configuration.findProviderMetadata().getUserInfoEndpointURI(),\n accessToken);\n final var userInfoHttpRequest = userInfoRequest.toHTTPRequest();\n configuration.configureHttpRequest(userInfoHttpRequest);\n try {\n final var httpResponse = userInfoHttpRequest.send();\n logger.debug(\"Token response: status={}, content={}\", httpResponse.getStatusCode(),\n httpResponse.getContent());\n final var userInfoResponse = UserInfoResponse.parse(httpResponse);\n if (userInfoResponse instanceof UserInfoErrorResponse) {\n throw new TechnicalException(\"Bad User Info response, error=\"\n + ((UserInfoErrorResponse) userInfoResponse).getErrorObject().toJSONObject());\n } else {\n final var userInfoSuccessResponse = (UserInfoSuccessResponse) userInfoResponse;\n final JWTClaimsSet userInfoClaimsSet;\n if (userInfoSuccessResponse.getUserInfo() != null) {\n userInfoClaimsSet = userInfoSuccessResponse.getUserInfo().toJWTClaimsSet();\n } else {\n userInfoClaimsSet = userInfoSuccessResponse.getUserInfoJWT().getJWTClaimsSet();\n }\n return userInfoClaimsSet;\n }\n } catch (IOException | ParseException | java.text.ParseException e) {\n throw new TechnicalException(e);\n }\n }", "label": 1, "label_name": "safe"} -{"code": "0,0,80,30,\"ellipse\");e(g)}finally{t.getModel().endUpdate()}if(\"horizontalTree\"==l){var k=new mxCompactTreeLayout(t);k.edgeRouting=!1;k.levelDistance=30;D=\"edgeStyle=elbowEdgeStyle;elbow=horizontal;\"}else\"verticalTree\"==l?(k=new mxCompactTreeLayout(t,!1),k.edgeRouting=!1,k.levelDistance=30,D=\"edgeStyle=elbowEdgeStyle;elbow=vertical;\"):\"radialTree\"==l?(k=new mxRadialTreeLayout(t,!1),k.edgeRouting=!1,k.levelDistance=80):\"verticalFlow\"==l?k=new mxHierarchicalLayout(t,mxConstants.DIRECTION_NORTH):\"horizontalFlow\"==\nl?k=new mxHierarchicalLayout(t,mxConstants.DIRECTION_WEST):\"organic\"==l?(k=new mxFastOrganicLayout(t,!1),k.forceConstant=80):\"circle\"==l&&(k=new mxCircleLayout(t));if(null!=k){var m=function(A,z){t.getModel().beginUpdate();try{null!=A&&A(),k.execute(t.getDefaultParent(),g)}catch(L){throw L;}finally{A=new mxMorphing(t),A.addListener(mxEvent.DONE,mxUtils.bind(this,function(){t.getModel().endUpdate();null!=z&&z()})),A.startAnimation()}},q=mxEdgeHandler.prototype.connect;mxEdgeHandler.prototype.connect=\nfunction(A,z,L,M,n){q.apply(this,arguments);m()};t.resizeCell=function(){mxGraph.prototype.resizeCell.apply(this,arguments);m()};t.connectionHandler.addListener(mxEvent.CONNECT,function(){m()})}var v=mxUtils.button(mxResources.get(\"close\"),function(){b.confirm(mxResources.get(\"areYouSure\"),function(){null!=u.parentNode&&(t.destroy(),u.parentNode.removeChild(u));b.hideDialog()})});v.className=\"geBtn\";b.editor.cancelFirst&&d.appendChild(v);var y=mxUtils.button(mxResources.get(\"insert\"),function(A){t.clearCellOverlays();", "label": 1, "label_name": "safe"} -{"code": " public static function post($vars) {\n switch (SMART_URL) {\n case true:\n # code...\n $url = Options::get('siteurl').\"/\".self::slug($vars).\"/{$vars}\";\n break;\n \n default:\n # code...\n $url = Options::get('siteurl').\"/index.php?post={$vars}\";\n break;\n\n }\n\n return $url;\n }", "label": 0, "label_name": "vulnerable"} -{"code": "function(){k.checked&&(null==g||g.checked)?q.removeAttribute(\"disabled\"):q.setAttribute(\"disabled\",\"disabled\")}));mxUtils.br(d);return{getLink:function(){return k.checked?\"blank\"===q.value?\"_blank\":p:null},getEditInput:function(){return k},getEditSelect:function(){return q}}};EditorUi.prototype.addLinkSection=function(d,g){function k(){var y=document.createElement(\"div\");y.style.width=\"100%\";y.style.height=\"100%\";y.style.boxSizing=\"border-box\";null!=q&&q!=mxConstants.NONE?(y.style.border=\"1px solid black\",\ny.style.backgroundColor=q):(y.style.backgroundPosition=\"center center\",y.style.backgroundRepeat=\"no-repeat\",y.style.backgroundImage=\"url('\"+Dialog.prototype.closeImage+\"')\");x.innerText=\"\";x.appendChild(y)}mxUtils.write(d,mxResources.get(\"links\")+\":\");var l=document.createElement(\"select\");l.style.width=\"100px\";l.style.padding=\"0px\";l.style.marginLeft=\"8px\";l.style.marginRight=\"10px\";l.className=\"geBtn\";var p=document.createElement(\"option\");p.setAttribute(\"value\",\"auto\");mxUtils.write(p,mxResources.get(\"automatic\"));", "label": 1, "label_name": "safe"} -{"code": "$.fn.elfinderpanel = function(fm) {\n\t\n\treturn this.each(function() {\n\t\tvar panel = $(this).addClass('elfinder-panel ui-state-default ui-corner-all'),\n\t\t\tmargin = 'margin-'+(fm.direction == 'ltr' ? 'left' : 'right');\n\t\t\n\t\tfm.one('load', function(e) {\n\t\t\tvar navbar = fm.getUI('navbar');\n\t\t\t\n\t\t\tpanel.css(margin, parseInt(navbar.outerWidth(true)));\n\t\t\tnavbar.on('resize', function() {\n\t\t\t\tpanel.is(':visible') && panel.css(margin, parseInt(navbar.outerWidth(true)))\n\t\t\t})\n\t\t})\n\t})\n}", "label": 0, "label_name": "vulnerable"} -{"code": "static int jas_iccputuint(jas_stream_t *out, int n, ulonglong val)\n{\n\tint i;\n\tint c;\n\tfor (i = n; i > 0; --i) {\n\t\tc = (val >> (8 * (i - 1))) & 0xff;\n\t\tif (jas_stream_putc(out, c) == EOF)\n\t\t\treturn -1;\n\t}\n\treturn 0;\n}", "label": 0, "label_name": "vulnerable"} -{"code": " $count += $db->dropTable($basename);\n }\n \n flash('message', gt('Deleted').' '.$count.' '.gt('unused tables').'.');\n expHistory::back();\n }", "label": 0, "label_name": "vulnerable"} -{"code": " public function countFoldersInFolder(Folder $folder, $useFilters = true, $recursive = false)\n {\n $this->assureFolderReadPermission($folder);\n $filters = $useFilters ? $this->getFileAndFolderNameFilters() : [];\n return $this->driver->countFoldersInFolder($folder->getIdentifier(), $recursive, $filters);\n }", "label": 1, "label_name": "safe"} -{"code": " public static File createTempFile(String prefix, String suffix, File directory) throws IOException {\n if (javaVersion() >= 7) {\n if (directory == null) {\n return Files.createTempFile(prefix, suffix).toFile();\n }\n return Files.createTempFile(directory.toPath(), prefix, suffix).toFile();\n }\n if (directory == null) {\n return File.createTempFile(prefix, suffix);\n }\n File file = File.createTempFile(prefix, suffix, directory);\n // Try to adjust the perms, if this fails there is not much else we can do...\n file.setReadable(false, false);\n file.setReadable(true, true);\n return file;\n }", "label": 1, "label_name": "safe"} -{"code": "void *enc_untrusted_realloc(void *ptr, size_t size) {\n MessageWriter input;\n input.Push(reinterpret_cast(ptr));\n input.Push(static_cast(size));\n\n MessageReader output;\n asylo::primitives::PrimitiveStatus status =\n asylo::host_call::NonSystemCallDispatcher(\n asylo::host_call::kReallocHandler, &input, &output);\n CheckStatusAndParamCount(status, output, \"enc_untrusted_realloc\", 2);\n\n void *result = output.next();\n int klinux_errno = output.next();\n\n // realloc only sets the errno (ENOMEM) when output pointer is null and a\n // non-zero |size| is provided.\n if (!result && size != 0) {\n errno = FromkLinuxErrorNumber(klinux_errno);\n }\n\n if (!::asylo::primitives::TrustedPrimitives::IsOutsideEnclave(result, size)) {\n ::asylo::primitives::TrustedPrimitives::BestEffortAbort(\n \"enc_untrusted_realloc: realloc result should be in untrusted \"\n \"memory\");\n }\n return result;\n}", "label": 1, "label_name": "safe"} -{"code": " selectionchange: function(rowModel, selected, eOpts ) {\n if (selected.length > 0) {\n var record = selected[0];\n var collectionId = record.data.id;\n var collectionName = Ext.util.Format.htmlEncode(record.data.name);\n\n this.collectionId = collectionId;\n\n this.relationsPanel.setTitle(t(\"relations\") + \" - \" + t(\"collection\") + \" \" + record.data.id + \" - \" + collectionName);\n this.relationsPanel.enable();\n var proxy = this.relationsStore.getProxy();\n proxy.setExtraParam(\"colId\", collectionId);\n this.relationsStore.reload();\n this.relationsGrid.show();\n }\n\n }.bind(this)", "label": 1, "label_name": "safe"} -{"code": "/** @license zlib.js 2012 - imaya [ https://github.com/imaya/zlib.js ] The MIT License */(function() {'use strict';function n(e) {throw e;}var q=void 0,aa=this;function r(e,c) {var d=e.split(\".\"),b=aa;!(d[0]in b)&&b.execScript&&b.execScript(\"var \"+d[0]);for(var a;d.length&&(a=d.shift());)!d.length&&c!==q?b[a]=c:b=b[a]?b[a]:b[a]={}};var u=\"undefined\"!==typeof Uint8Array&&\"undefined\"!==typeof Uint16Array&&\"undefined\"!==typeof Uint32Array&&\"undefined\"!==typeof DataView;new (u?Uint8Array:Array)(256);var v;for(v=0;256>v;++v)for(var w=v,ba=7,w=w>>>1;w;w>>>=1)--ba;function x(e,c,d) {var b,a=\"number\"===typeof c?c:c=0,f=\"number\"===typeof d?d:e.length;b=-1;for(a=f&7;a--;++c)b=b>>>8^z[(b^e[c])&255];for(a=f>>3;a--;c+=8)b=b>>>8^z[(b^e[c])&255],b=b>>>8^z[(b^e[c+1])&255],b=b>>>8^z[(b^e[c+2])&255],b=b>>>8^z[(b^e[c+3])&255],b=b>>>8^z[(b^e[c+4])&255],b=b>>>8^z[(b^e[c+5])&255],b=b>>>8^z[(b^e[c+6])&255],b=b>>>8^z[(b^e[c+7])&255];return(b^4294967295)>>>0}", "label": 1, "label_name": "safe"} -{"code": "0;k evar\n Log.add_error(request, evar)\n end\n\n if params[:from_action].nil?\n render(:text => params[:id])\n else\n params.delete(:controller)\n params.delete(:action)\n params.delete(:id)\n flash[:notice] = t('msg.delete_success')\n params[:action] = params[:from_action]\n redirect_to(params)\n end\n end", "label": 1, "label_name": "safe"} -{"code": " def drop_on_recyclebox\n Log.add_info(request, params.inspect)\n\n return unless request.post?\n\n SqlHelper.validate_token([params[:id]])\n unless @login_user.nil?\n Toy.destroy(params[:id])\n end\n\n render(:text => params[:id])\n end", "label": 1, "label_name": "safe"} -{"code": "void test_mkdir(const char *path)\n{\n\tsize_t len = strlen(path) + 30;\n\tchar *tmpname = alloca(len);\n\tsnprintf(tmpname, len, \"%s/%d\", path, (int)getpid());\n\n\tif (mkdir(path, 0755) == 0) {\n\t\tfprintf(stderr, \"leak at mkdir of %s\\n\", path);\n\t\texit(1);\n\t}\n\tif (errno != ENOENT) {\n\t\tfprintf(stderr, \"leak at mkdir of %s, errno was %s\\n\", path, strerror(errno));\n\t\texit(1);\n\t}\n\tif (mkdir(tmpname, 0755) == 0) {\n\t\tfprintf(stderr, \"leak at mkdir of %s\\n\", tmpname);\n\t\texit(1);\n\t}\n\tif (errno != ENOENT) {\n\t\tfprintf(stderr, \"leak at mkdir of %s, errno was %s\\n\", path, strerror(errno));\n\t\texit(1);\n\t}\n}", "label": 1, "label_name": "safe"} -{"code": "f_mzeval(typval_T *argvars, typval_T *rettv)\n{\n char_u\t*str;\n char_u\tbuf[NUMBUFLEN];\n\n if (check_restricted() || check_secure())\n\treturn;\n str = tv_get_string_buf(&argvars[0], buf);\n do_mzeval(str, rettv);\n}", "label": 1, "label_name": "safe"} -{"code": " setup: function () {\n if (this.model.get('data')) {\n var data = this.model.get('data');\n\n this.assignedUserId = data.assignedUserId || null;\n this.assignedUserName = data.assignedUserName || null;\n\n this.messageData['assignee'] = '' + this.getHelper().escapeString(this.assignedUserName) + '';\n\n var isYou = false;\n if (this.isUserStream) {\n if (this.assignedUserId == this.getUser().id) {\n isYou = true;\n }\n }\n\n if (this.assignedUserId) {\n this.messageName = 'createAssigned';\n\n if (this.isThis) {\n this.messageName += 'This';\n\n if (this.assignedUserId == this.model.get('createdById')) {\n this.messageName += 'Self';\n }\n } else {\n if (this.assignedUserId == this.model.get('createdById')) {\n this.messageName += 'Self';\n } else {\n if (isYou) {\n this.messageName += 'You';\n }\n }\n }\n }\n\n if (data.statusField) {\n var statusField = this.statusField = data.statusField;\n var statusValue = data.statusValue;\n this.statusStyle = data.statusStyle || 'default';\n this.statusText = this.getLanguage().translateOption(statusValue, statusField, this.model.get('parentType'));\n }\n }\n\n this.createMessage();\n },", "label": 1, "label_name": "safe"} -{"code": " it \"should return /root\" do\n Facter::Util::Resolution.expects(:exec).with(\"getent passwd root\").returns(root_ent)\n expect(Facter::Util::RootHome.get_root_home).to eq(expected_root_home)\n end", "label": 0, "label_name": "vulnerable"} -{"code": " public float GetGpuTemp(string gpuName)\n {\n try\n {\n var temp = InputChannel.GetGpuTemp(gpuName);\n return temp;\n }\n catch (EndpointNotFoundException)\n {\n return -1;\n }\n catch (CommunicationException)\n {\n return -1;\n }\n }", "label": 0, "label_name": "vulnerable"} -{"code": "\"blank\"===y.value?\"_blank\":q:null},getEditInput:function(){return g},getEditSelect:function(){return y}}};EditorUi.prototype.addLinkSection=function(d,f){function g(){var C=document.createElement(\"div\");C.style.width=\"100%\";C.style.height=\"100%\";C.style.boxSizing=\"border-box\";null!=y&&y!=mxConstants.NONE?(C.style.border=\"1px solid black\",C.style.backgroundColor=y):(C.style.backgroundPosition=\"center center\",C.style.backgroundRepeat=\"no-repeat\",C.style.backgroundImage=\"url('\"+Dialog.prototype.closeImage+\n\"')\");F.innerHTML=\"\";F.appendChild(C)}mxUtils.write(d,mxResources.get(\"links\")+\":\");var m=document.createElement(\"select\");m.style.width=\"100px\";m.style.padding=\"0px\";m.style.marginLeft=\"8px\";m.style.marginRight=\"10px\";m.className=\"geBtn\";var q=document.createElement(\"option\");q.setAttribute(\"value\",\"auto\");mxUtils.write(q,mxResources.get(\"automatic\"));m.appendChild(q);q=document.createElement(\"option\");q.setAttribute(\"value\",\"blank\");mxUtils.write(q,mxResources.get(\"openInNewWindow\"));m.appendChild(q);", "label": 0, "label_name": "vulnerable"} -{"code": "TfLiteStatus SimpleStatefulOp::Prepare(TfLiteContext* context,\n TfLiteNode* node) {\n OpData* data = reinterpret_cast(node->user_data);\n\n // Make sure that the input is in uint8_t with at least 1 data entry.\n const TfLiteTensor* input;\n TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kInputTensor, &input));\n if (input->type != kTfLiteUInt8) return kTfLiteError;\n if (NumElements(input->dims) == 0) return kTfLiteError;\n\n // Allocate a temporary buffer with the same size of input for sorting.\n TF_LITE_ENSURE_STATUS(context->RequestScratchBufferInArena(\n context, sizeof(uint8_t) * NumElements(input->dims),\n &data->sorting_buffer));\n // We can interleave scratch / persistent buffer allocation.\n data->invoke_count = reinterpret_cast(\n context->AllocatePersistentBuffer(context, sizeof(int)));\n *data->invoke_count = 0;\n\n return kTfLiteOk;\n}", "label": 1, "label_name": "safe"} -{"code": "func RunUsingChroot(spec *specs.Spec, bundlePath, homeDir string, stdin io.Reader, stdout, stderr io.Writer) (err error) {\n\tvar confwg sync.WaitGroup\n\tvar homeFound bool\n\tfor _, env := range spec.Process.Env {\n\t\tif strings.HasPrefix(env, \"HOME=\") {\n\t\t\thomeFound = true\n\t\t\tbreak\n\t\t}\n\t}\n\tif !homeFound {\n\t\tspec.Process.Env = append(spec.Process.Env, fmt.Sprintf(\"HOME=%s\", homeDir))\n\t}\n\truntime.LockOSThread()\n\tdefer runtime.UnlockOSThread()\n\n\t// Write the runtime configuration, mainly for debugging.\n\tspecbytes, err := json.Marshal(spec)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err = ioutils.AtomicWriteFile(filepath.Join(bundlePath, \"config.json\"), specbytes, 0600); err != nil {\n\t\treturn errors.Wrapf(err, \"error storing runtime configuration\")\n\t}\n\tlogrus.Debugf(\"config = %v\", string(specbytes))\n\n\t// Default to using stdin/stdout/stderr if we weren't passed objects to use.\n\tif stdin == nil {\n\t\tstdin = os.Stdin\n\t}\n\tif stdout == nil {\n\t\tstdout = os.Stdout\n\t}\n\tif stderr == nil {\n\t\tstderr = os.Stderr\n\t}\n\n\t// Create a pipe for passing configuration down to the next process.\n\tpreader, pwriter, err := os.Pipe()\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error creating configuration pipe\")\n\t}\n\tconfig, conferr := json.Marshal(runUsingChrootSubprocOptions{\n\t\tSpec: spec,\n\t\tBundlePath: bundlePath,\n\t})\n\tif conferr != nil {\n\t\treturn errors.Wrapf(conferr, \"error encoding configuration for %q\", runUsingChrootCommand)\n\t}\n\n\t// Set our terminal's mode to raw, to pass handling of special\n\t// terminal input to the terminal in the container.\n\tif spec.Process.Terminal && terminal.IsTerminal(unix.Stdin) {\n\t\tstate, err := terminal.MakeRaw(unix.Stdin)\n\t\tif err != nil {\n\t\t\tlogrus.Warnf(\"error setting terminal state: %v\", err)\n\t\t} else {\n\t\t\tdefer func() {\n\t\t\t\tif err = terminal.Restore(unix.Stdin, state); err != nil {\n\t\t\t\t\tlogrus.Errorf(\"unable to restore terminal state: %v\", err)\n\t\t\t\t}\n\t\t\t}()\n\t\t}\n\t}\n\n\t// Raise any resource limits that are higher than they are now, before\n\t// we drop any more privileges.\n\tif err = setRlimits(spec, false, true); err != nil {\n\t\treturn err\n\t}\n\n\t// Start the grandparent subprocess.\n\tcmd := unshare.Command(runUsingChrootCommand)\n\tcmd.Stdin, cmd.Stdout, cmd.Stderr = stdin, stdout, stderr\n\tcmd.Dir = \"/\"\n\tcmd.Env = append([]string{fmt.Sprintf(\"LOGLEVEL=%d\", logrus.GetLevel())}, os.Environ()...)\n\n\tlogrus.Debugf(\"Running %#v in %#v\", cmd.Cmd, cmd)\n\tconfwg.Add(1)\n\tgo func() {\n\t\t_, conferr = io.Copy(pwriter, bytes.NewReader(config))\n\t\tpwriter.Close()\n\t\tconfwg.Done()\n\t}()\n\tcmd.ExtraFiles = append([]*os.File{preader}, cmd.ExtraFiles...)\n\terr = cmd.Run()\n\tconfwg.Wait()\n\tif err == nil {\n\t\treturn conferr\n\t}\n\treturn err\n}", "label": 0, "label_name": "vulnerable"} -{"code": "this.init=function(){function G(H){if(null!=H){var S=H.getAttribute(\"background\");if(null==S||\"\"==S||S==mxConstants.NONE)S=Editor.isDarkMode()?\"transparent\":\"#ffffff\";B.style.backgroundColor=S;(new mxCodec(H.ownerDocument)).decode(H,I.getModel());I.maxFitScale=1;I.fit(8);I.center()}return H}function P(H){null!=H&&(H=G(Editor.parseDiagramNode(H)));return H}mxEvent.addListener(E,\"change\",function(H){z=parseInt(E.value);P(L[z]);mxEvent.consume(H)});if(\"mxfile\"==t.nodeName){var J=t.getElementsByTagName(\"diagram\");", "label": 1, "label_name": "safe"} -{"code": "this.update);this.refresh()};Format.prototype.clear=function(){this.container.innerText=\"\";if(null!=this.panels)for(var a=0;ais_vmalloc = 1;\n\t} else {\n\t\tout = kmalloc(HDRLEN_KMALLOC + size, GFP_KERNEL);\n\t\tif (!out)\n\t\t\tgoto done;\n\n\t\tout += HDRLEN_KMALLOC;\n\t\tcontainer_of(out, struct ipc_rcu_hdr, data)->is_vmalloc = 0;\n\t}\n\n\t/* set reference counter no matter what kind of allocation was done */\n\tatomic_set(&container_of(out, struct ipc_rcu_hdr, data)->refcount, 1);\ndone:\n\treturn out;\n}", "label": 1, "label_name": "safe"} -{"code": "Runner.prototype.parents = function() {\n var suite = this.suite\n , suites = [];\n while (suite = suite.parent) suites.push(suite);\n return suites;\n};", "label": 1, "label_name": "safe"} -{"code": "\tfunction editComment(comment, cdiv, saveCallback, deleteOnCancel)\n\t{\n\t\tcurEdited = {div: cdiv, comment: comment, saveCallback: saveCallback, deleteOnCancel: deleteOnCancel};\n\t\t\n\t\tvar commentTxt = cdiv.querySelector('.geCommentTxt');\n\t\tvar actionsDiv = cdiv.querySelector('.geCommentActionsList');\n\t\t\n\t\tvar textArea = document.createElement('textarea');\n\t\ttextArea.className = 'geCommentEditTxtArea';\n\t\ttextArea.style.minHeight = commentTxt.offsetHeight + 'px';\n\t\ttextArea.value = comment.content;\n\t\tcdiv.insertBefore(textArea, commentTxt);\n\t\t\n\t\tvar btnDiv = document.createElement('div');\n\t\tbtnDiv.className = 'geCommentEditBtns';\n\t\t\n\t\tfunction reset()\n\t\t{\n\t\t\tcdiv.removeChild(textArea);\n\t\t\tcdiv.removeChild(btnDiv);\n\t\t\tactionsDiv.style.display = 'block';\n\t\t\tcommentTxt.style.display = 'block';\t\n\t\t};\n\t\t\n\t\tvar cancelBtn = mxUtils.button(mxResources.get('cancel'), function()\n\t\t{\n\t\t\tif (deleteOnCancel)\n\t\t\t{\n\t\t\t\tcdiv.parentNode.removeChild(cdiv);\n\t\t\t\tupdateNoComments();\n\t\t\t}\n\t\t\telse\n\t\t\t{\n\t\t\t\treset();\n\t\t\t}\n\t\t\t\n\t\t\tcurEdited = null;\n\t\t});\n\t\t\n\t\tcancelBtn.className = 'geCommentEditBtn';\n\t\tbtnDiv.appendChild(cancelBtn);\n\t\t\n\t\tvar saveBtn = mxUtils.button(mxResources.get('save'), function()\n\t\t{\n\t\t\tcommentTxt.innerHTML = '';\n\t\t\tcomment.content = textArea.value;\n\t\t\tmxUtils.write(commentTxt, comment.content);\n\t\t\treset();\n\t\t\tsaveCallback(comment);\n\t\t\tcurEdited = null;\n\t\t});\n\t\t\n\t\t// Updates modified state and handles placeholder text\n\t\tmxEvent.addListener(textArea, 'keydown', mxUtils.bind(this, function(evt)\n\t\t{\n\t\t\tif (!mxEvent.isConsumed(evt))\n\t\t\t{\n\t\t\t\tif ((mxEvent.isControlDown(evt) || (mxClient.IS_MAC &&\n\t\t\t\t\tmxEvent.isMetaDown(evt))) && evt.keyCode == 13 /* Ctrl+Enter */)\n\t\t\t\t{\n\t\t\t\t\tsaveBtn.click();\n\t\t\t\t\tmxEvent.consume(evt);\n\t\t\t\t}\n\t\t\t\telse if (evt.keyCode == 27 /* Escape */)\n\t\t\t\t{\n\t\t\t\t\tcancelBtn.click();\n\t\t\t\t\tmxEvent.consume(evt);\n\t\t\t\t}\n\t\t\t}\n\t\t}));\n\t\t\n\t\t// Focused to include in viewport before focusin textbox\n\t\tsaveBtn.focus();\n\t\tsaveBtn.className = 'geCommentEditBtn gePrimaryBtn';\n\t\tbtnDiv.appendChild(saveBtn);\n\n\t\tcdiv.insertBefore(btnDiv, commentTxt);\n\t\tactionsDiv.style.display = 'none';\n\t\tcommentTxt.style.display = 'none';\n\t\ttextArea.focus();\n\t};", "label": 0, "label_name": "vulnerable"} -{"code": "null,null,function(P){console.log(P)},600,null,null,null,null,null,F):(v(H,void 0),n(H))}function L(P){function Q(S){E.style.background=\"transparent\";E.innerText=\"\";var Y=document.createElement(\"div\");Y.className=\"odPreviewStatus\";mxUtils.write(Y,S);E.appendChild(Y);N.stop()}if(null!=E)if(E.style.background=\"transparent\",E.innerText=\"\",null==P||P.folder||/\\.drawiolib$/.test(P.name))Q(mxResources.get(\"noPreview\"));else try{null!=P.remoteItem&&(P=P.remoteItem),U=P,N.spin(E),z(P,function(S){N.stop();\nif(U==P)if(\"mxlibrary\"==S.documentElement.nodeName)Q(mxResources.get(\"noPreview\"));else{var Y=S.getElementsByTagName(\"diagram\");F=AspectDialog.prototype.createViewer(E,0==Y.length?S.documentElement:Y[0],null,\"transparent\")}},function(){H=null;Q(mxResources.get(\"notADiagramFile\"))})}catch(S){H=null,Q(mxResources.get(\"notADiagramFile\"))}}function O(){var P=y(\".odFilesBreadcrumb\");if(null!=P){P.innerText=\"\";for(var Q=0;QgenerateFromToken($token)\n );\n } else {\n // check if we need to destroy all of the tag's children\n // CAN BE GENERICIZED\n if (isset($hidden_elements[$token->name])) {\n if ($token instanceof HTMLPurifier_Token_Start) {\n $remove_until = $token->name;\n } elseif ($token instanceof HTMLPurifier_Token_Empty) {\n // do nothing: we're still looking\n } else {\n $remove_until = false;\n }\n if ($e) {\n $e->send(E_ERROR, 'Strategy_RemoveForeignElements: Foreign meta element removed');\n }\n } else {\n if ($e) {\n $e->send(E_ERROR, 'Strategy_RemoveForeignElements: Foreign element removed');\n }\n }\n continue;\n }\n } elseif ($token instanceof HTMLPurifier_Token_Comment) {\n // textify comments in script tags when they are allowed\n if ($textify_comments !== false) {\n $data = $token->data;\n $token = new HTMLPurifier_Token_Text($data);\n } elseif ($trusted || $check_comments) {\n // always cleanup comments\n $trailing_hyphen = false;\n if ($e) {\n // perform check whether or not there's a trailing hyphen\n if (substr($token->data, -1) == '-') {\n $trailing_hyphen = true;\n }\n }\n $token->data = rtrim($token->data, '-');\n $found_double_hyphen = false;\n while (strpos($token->data, '--') !== false) {\n $found_double_hyphen = true;\n $token->data = str_replace('--', '-', $token->data);\n }\n if ($trusted || !empty($comment_lookup[trim($token->data)]) ||\n ($comment_regexp !== null && preg_match($comment_regexp, trim($token->data)))) {\n // OK good\n if ($e) {\n if ($trailing_hyphen) {\n $e->send(\n E_NOTICE,\n 'Strategy_RemoveForeignElements: Trailing hyphen in comment removed'\n );\n }\n if ($found_double_hyphen) {\n $e->send(E_NOTICE, 'Strategy_RemoveForeignElements: Hyphens in comment collapsed');\n }\n }\n } else {\n if ($e) {\n $e->send(E_NOTICE, 'Strategy_RemoveForeignElements: Comment removed');\n }\n continue;\n }\n } else {\n // strip comments\n if ($e) {\n $e->send(E_NOTICE, 'Strategy_RemoveForeignElements: Comment removed');\n }\n continue;\n }\n } elseif ($token instanceof HTMLPurifier_Token_Text) {\n } else {\n continue;\n }\n $result[] = $token;\n }", "label": 1, "label_name": "safe"} -{"code": " privateKey: this.getPrivateKey() || undefined,\r\n securityMode: this.securityMode\r\n });\r\n this._requests = {};\r\n\r\n this.messageBuilder\r\n .on(\"message\", (response: Response, msgType: string, requestId: number) => {\r\n this._on_message_received(response, msgType, requestId);\r\n })\r\n .on(\"start_chunk\", () => {\r\n //\r\n if (doPerfMonitoring) {\r\n this._tick2 = get_clock_tick();\r\n }\r\n })\r\n .on(\"error\", (err, requestId) => {\r\n //\r\n let requestData = this._requests[requestId];\r\n\r\n if (doDebug) {\r\n debugLog(\"request id = \", requestId, err);\r\n debugLog(\" message was \");\r\n debugLog(requestData);\r\n }\r\n\r\n if (!requestData) {\r\n requestData = this._requests[requestId + 1];\r\n if (doTraceClientRequestContent) {\r\n errorLog(\" message was 2:\", requestData ? requestData.request.toString() : \"\");\r\n }\r\n }\r\n });\r\n\r\n this.__in_normal_close_operation = false;\r\n\r\n this._timeout_request_count = 0;\r\n\r\n this._securityTokenTimeoutId = null;\r\n\r\n this.transportTimeout = options.transportTimeout || ClientSecureChannelLayer.defaultTransportTimeout;\r\n\r\n this.channelId = 0;\r\n\r\n this.connectionStrategy = coerceConnectionStrategy(options.connectionStrategy);\r\n }\r", "label": 0, "label_name": "vulnerable"} -{"code": "\tpublic function isPageNameList( $parameter ) {\n\t\tif ( array_key_exists( $parameter, $this->data ) ) {\n\t\t\tif ( array_key_exists( 'page_name_list', $this->data[$parameter] ) ) {\n\t\t\t\treturn (bool)$this->data[$parameter]['page_name_list'];\n\t\t\t}\n\n\t\t\treturn false;\n\t\t}\n\n\t\tthrow new MWException( __METHOD__ . \": Attempted to load a parameter that does not exist.\" );\n\t}", "label": 1, "label_name": "safe"} -{"code": "static int dcbnl_ieee_fill(struct sk_buff *skb, struct net_device *netdev)\n{\n\tstruct nlattr *ieee, *app;\n\tstruct dcb_app_type *itr;\n\tconst struct dcbnl_rtnl_ops *ops = netdev->dcbnl_ops;\n\tint dcbx;\n\tint err;\n\n\tif (nla_put_string(skb, DCB_ATTR_IFNAME, netdev->name))\n\t\treturn -EMSGSIZE;\n\n\tieee = nla_nest_start(skb, DCB_ATTR_IEEE);\n\tif (!ieee)\n\t\treturn -EMSGSIZE;\n\n\tif (ops->ieee_getets) {\n\t\tstruct ieee_ets ets;\n\t\tmemset(&ets, 0, sizeof(ets));\n\t\terr = ops->ieee_getets(netdev, &ets);\n\t\tif (!err &&\n\t\t nla_put(skb, DCB_ATTR_IEEE_ETS, sizeof(ets), &ets))\n\t\t\treturn -EMSGSIZE;\n\t}\n\n\tif (ops->ieee_getmaxrate) {\n\t\tstruct ieee_maxrate maxrate;\n\t\tmemset(&maxrate, 0, sizeof(maxrate));\n\t\terr = ops->ieee_getmaxrate(netdev, &maxrate);\n\t\tif (!err) {\n\t\t\terr = nla_put(skb, DCB_ATTR_IEEE_MAXRATE,\n\t\t\t\t sizeof(maxrate), &maxrate);\n\t\t\tif (err)\n\t\t\t\treturn -EMSGSIZE;\n\t\t}\n\t}\n\n\tif (ops->ieee_getpfc) {\n\t\tstruct ieee_pfc pfc;\n\t\tmemset(&pfc, 0, sizeof(pfc));\n\t\terr = ops->ieee_getpfc(netdev, &pfc);\n\t\tif (!err &&\n\t\t nla_put(skb, DCB_ATTR_IEEE_PFC, sizeof(pfc), &pfc))\n\t\t\treturn -EMSGSIZE;\n\t}\n\n\tapp = nla_nest_start(skb, DCB_ATTR_IEEE_APP_TABLE);\n\tif (!app)\n\t\treturn -EMSGSIZE;\n\n\tspin_lock(&dcb_lock);\n\tlist_for_each_entry(itr, &dcb_app_list, list) {\n\t\tif (itr->ifindex == netdev->ifindex) {\n\t\t\terr = nla_put(skb, DCB_ATTR_IEEE_APP, sizeof(itr->app),\n\t\t\t\t\t &itr->app);\n\t\t\tif (err) {\n\t\t\t\tspin_unlock(&dcb_lock);\n\t\t\t\treturn -EMSGSIZE;\n\t\t\t}\n\t\t}\n\t}\n\n\tif (netdev->dcbnl_ops->getdcbx)\n\t\tdcbx = netdev->dcbnl_ops->getdcbx(netdev);\n\telse\n\t\tdcbx = -EOPNOTSUPP;\n\n\tspin_unlock(&dcb_lock);\n\tnla_nest_end(skb, app);\n\n\t/* get peer info if available */\n\tif (ops->ieee_peer_getets) {\n\t\tstruct ieee_ets ets;\n\t\tmemset(&ets, 0, sizeof(ets));\n\t\terr = ops->ieee_peer_getets(netdev, &ets);\n\t\tif (!err &&\n\t\t nla_put(skb, DCB_ATTR_IEEE_PEER_ETS, sizeof(ets), &ets))\n\t\t\treturn -EMSGSIZE;\n\t}\n\n\tif (ops->ieee_peer_getpfc) {\n\t\tstruct ieee_pfc pfc;\n\t\tmemset(&pfc, 0, sizeof(pfc));\n\t\terr = ops->ieee_peer_getpfc(netdev, &pfc);\n\t\tif (!err &&\n\t\t nla_put(skb, DCB_ATTR_IEEE_PEER_PFC, sizeof(pfc), &pfc))\n\t\t\treturn -EMSGSIZE;\n\t}\n\n\tif (ops->peer_getappinfo && ops->peer_getapptable) {\n\t\terr = dcbnl_build_peer_app(netdev, skb,\n\t\t\t\t\t DCB_ATTR_IEEE_PEER_APP,\n\t\t\t\t\t DCB_ATTR_IEEE_APP_UNSPEC,\n\t\t\t\t\t DCB_ATTR_IEEE_APP);\n\t\tif (err)\n\t\t\treturn -EMSGSIZE;\n\t}\n\n\tnla_nest_end(skb, ieee);\n\tif (dcbx >= 0) {\n\t\terr = nla_put_u8(skb, DCB_ATTR_DCBX, dcbx);\n\t\tif (err)\n\t\t\treturn -EMSGSIZE;\n\t}\n\n\treturn 0;\n}", "label": 1, "label_name": "safe"} -{"code": " public function testPassesOnNonGetHeadRequests()\n {\n $this->setNextResponse(200);\n $this->request('POST', '/');\n $this->assertHttpKernelIsCalled();\n $this->assertResponseOk();\n $this->assertTraceContains('pass');\n $this->assertFalse($this->response->headers->has('Age'));\n }", "label": 0, "label_name": "vulnerable"} -{"code": " .on(\"message\", (request, msgType, requestId, channelId) => {\n this._on_common_message(request as Request, msgType, requestId, channelId);\n })", "label": 1, "label_name": "safe"} -{"code": " function edit_optiongroup_master() {\n expHistory::set('editable', $this->params);\n \n $id = isset($this->params['id']) ? $this->params['id'] : null;\n $record = new optiongroup_master($id); \n assign_to_template(array(\n 'record'=>$record\n ));\n }", "label": 0, "label_name": "vulnerable"} -{"code": " def testRaggedCountSparseOutput(self):\n splits = [0, 4, 7]\n values = [1, 1, 2, 1, 2, 10, 5]\n weights = [1, 2, 3, 4, 5, 6, 7]\n output_indices, output_values, output_shape = self.evaluate(\n gen_count_ops.RaggedCountSparseOutput(\n splits=splits, values=values, weights=weights, binary_output=False))\n self.assertAllEqual([[0, 1], [0, 2], [1, 2], [1, 5], [1, 10]],\n output_indices)\n self.assertAllEqual([7, 3, 5, 7, 6], output_values)\n self.assertAllEqual([2, 11], output_shape)", "label": 1, "label_name": "safe"} -{"code": " public function testNonNegative()\n {\n $this->def = new HTMLPurifier_AttrDef_CSS_Length('0');\n\n $this->assertDef('3cm');\n $this->assertDef('-3mm', false);\n\n }", "label": 1, "label_name": "safe"} -{"code": " beforeSend: function (xhr) {\n xhr.setRequestHeader('Authorization', authHeader);\n }", "label": 1, "label_name": "safe"} -{"code": " it \"should have a #{attr} property\" do\n expect(Puppet::Type.type(:postgresql_psql).attrtype(attr)).to eq(:property)\n end", "label": 0, "label_name": "vulnerable"} -{"code": " public FeatureProfilesController(\n IAuthorizationService authorizationService,\n FeatureProfilesManager featueProfilesManager,\n ISiteService siteService,\n INotifier notifier,\n IShapeFactory shapeFactory,\n IStringLocalizer stringLocalizer,\n IHtmlLocalizer htmlLocalizer\n )\n {\n _authorizationService = authorizationService;\n _featureProfilesManager = featueProfilesManager;\n _siteService = siteService;\n _notifier = notifier;\n New = shapeFactory;\n S = stringLocalizer;\n H = htmlLocalizer;\n }", "label": 0, "label_name": "vulnerable"} -{"code": "kg_unseal_iov(OM_uint32 *minor_status,\n gss_ctx_id_t context_handle,\n int *conf_state,\n gss_qop_t *qop_state,\n gss_iov_buffer_desc *iov,\n int iov_count,\n int toktype)\n{\n krb5_gss_ctx_id_rec *ctx;\n OM_uint32 code;\n\n ctx = (krb5_gss_ctx_id_rec *)context_handle;\n if (!ctx->established) {\n *minor_status = KG_CTX_INCOMPLETE;\n return GSS_S_NO_CONTEXT;\n }\n\n if (kg_locate_iov(iov, iov_count, GSS_IOV_BUFFER_TYPE_STREAM) != NULL) {\n code = kg_unseal_stream_iov(minor_status, ctx, conf_state, qop_state,\n iov, iov_count, toktype);\n } else {\n code = kg_unseal_iov_token(minor_status, ctx, conf_state, qop_state,\n iov, iov_count, toktype);\n }\n\n return code;\n}", "label": 0, "label_name": "vulnerable"} -{"code": "CKEDITOR.event||(CKEDITOR.event=function(){},CKEDITOR.event.implementOn=function(a){var e=CKEDITOR.event.prototype,b;for(b in e)a[b]==void 0&&(a[b]=e[b])},CKEDITOR.event.prototype=function(){function a(a){var d=e(this);return d[a]||(d[a]=new b(a))}var e=function(b){b=b.getPrivate&&b.getPrivate()||b._||(b._={});return b.events||(b.events={})},b=function(b){this.name=b;this.listeners=[]};b.prototype={getListenerIndex:function(b){for(var d=0,a=this.listeners;dsize = size;\n return ret;\n}", "label": 0, "label_name": "vulnerable"} -{"code": " def initialize(args = nil)\n args ||= {}\n @path = args[:path]\n @expires_in_seconds = args[:expires_in] || EXPIRES_IN_SECONDS\n raise ArgumentError.new :path unless @path\n FileUtils.mkdir_p(@path) unless ::File.exists?(@path)\n\n @timer_struct_cache = FileCache.new(@path, \"mp_timers\")\n @timer_struct_lock = Mutex.new\n @user_view_cache = FileCache.new(@path, \"mp_views\")\n @user_view_lock = Mutex.new\n\n @auth_token_cache = FileCache.new(@path, \"tokens\")\n @auth_token_lock = Mutex.new\n\n me = self\n t = CacheCleanupThread.new do\n interval = 10\n cleanup_cache_cycle = 3600\n cycle_count = 1\n\n begin\n until Thread.current[:should_exit] do\n # TODO: a sane retry count before bailing\n\n # We don't want to hit the filesystem every 10s to clean up the cache so we need to do a bit of\n # accounting to avoid sleeping that entire time. We don't want to sleep for the entire period because\n # it means the thread will stay live in hot deployment scenarios, keeping a potentially large memory\n # graph from being garbage collected upon undeploy.\n if cycle_count * interval >= cleanup_cache_cycle\n cycle_count = 1\n me.cleanup_cache\n end\n\n sleep(interval)\n cycle_count += 1\n end\n rescue\n # don't crash the thread, we can clean up next time\n end\n end\n\n at_exit { t[:should_exit] = true }\n\n t\n end", "label": 1, "label_name": "safe"} -{"code": "\tprivate function _notlastmodifiedby( $option ) {\n\t\t$this->userQueryBuilder->addNotLastModifiedByConstraint( $option );\n\t}", "label": 1, "label_name": "safe"} -{"code": " public function test_convertFromUTF8_phpNoChars()\n {\n $this->config->set('Core.Encoding', 'ISO-8859-1');\n $this->config->set('Test.ForceNoIconv', true);\n $this->assertIdentical(\n HTMLPurifier_Encoder::convertFromUTF8($this->getZhongWen(), $this->config, $this->context),\n \"?? (Chinese)\"\n );\n }", "label": 1, "label_name": "safe"} -{"code": "Graph.sanitizeHtml = function(value, editing)\n{\n\treturn DOMPurify.sanitize(value, {ADD_ATTR: ['target'], FORBID_TAGS: ['form'],\n\t\tALLOWED_URI_REGEXP: /^(?:(?:https?|mailto|tel|callto|data):|[^a-z]|[a-z+.\\-]+(?:[^a-z+.\\-:]|$))/i});\n};", "label": 1, "label_name": "safe"} -{"code": "\tstatic function validUTF($string) {\n\t\tif(!mb_check_encoding($string, 'UTF-8') OR !($string === mb_convert_encoding(mb_convert_encoding($string, 'UTF-32', 'UTF-8' ), 'UTF-8', 'UTF-32'))) {\n\t\t\treturn false;\n\t\t}\n\t\treturn true;\n\t}", "label": 1, "label_name": "safe"} -{"code": "function printUserPrivRow($privname, $rownum, $privs, $types, \n $cascadeprivs, $usergroup, $disabled) {\n\t$allprivs = $cascadeprivs + $privs;\n\tprint \" \\n\";\n\tif($usergroup == 'group') {\n\t\t$id = $allprivs[$privname]['id'];\n\t\tprint \" $privname\";\n\t\tif($usergroup == 'group' && ! empty($allprivs[$privname]['affiliation']))\n\t\t\tprint \"@{$allprivs[$privname]['affiliation']}\";\n\t\tprint \"\\n\";\n\t}\n\telse\n\t\tprint \"$privname\\n\";\n\n\tif($disabled)\n\t\t$disabled = 'disabled=disabled';\n\telse\n\t\t$disabled = '';\n\n\t# block rights\n\tif(array_key_exists($privname, $privs) && \n\t (($usergroup == 'user' &&\n\t in_array(\"block\", $privs[$privname])) ||\n\t ($usergroup == 'group' &&\n\t in_array(\"block\", $privs[$privname]['privs'])))) {\n\t\t$checked = \"checked\";\n\t\t$blocked = 1;\n\t}\n\telse {\n\t\t$checked = \"\";\n\t\t$blocked = 0;\n\t}\n\t$count = count($types) + 1;\n\tif($usergroup == 'user') {\n\t\t$usergroup = 1;\n\t\t$name = \"privrow[$privname:block]\";\n\t}\n\telseif($usergroup == 'group') {\n\t\t$usergroup = 2;\n\t\t$name = \"privrow[{$allprivs[$privname]['id']}:block]\";\n\t}\n\tprint \" \\n\";\n\tprint \"\\n\";\n\n\t#cascade rights\n\tif(array_key_exists($privname, $privs) && \n\t (($usergroup == 1 &&\n\t in_array(\"cascade\", $privs[$privname])) ||\n\t\t($usergroup == 2 &&\n\t in_array(\"cascade\", $privs[$privname]['privs']))))\n\t\t$checked = \"checked\";\n\telse\n\t\t$checked = \"\";\n\tif($usergroup == 1)\n\t\t$name = \"privrow[$privname:cascade]\";\n\telse\n\t\t$name = \"privrow[{$allprivs[$privname]['id']}:cascade]\";\n\tprint \" \";\n\tprint \"\\n\";\n\n\t# normal rights\n\t$j = 1;\n\tforeach($types as $type) {\n\t\t$bgcolor = \"\";\n\t\t$checked = \"\";\n\t\t$value = \"\";\n\t\t$cascaded = 0;\n\t\tif(array_key_exists($privname, $cascadeprivs) && \n\t\t (($usergroup == 1 &&\n\t\t in_array($type, $cascadeprivs[$privname])) ||\n\t\t ($usergroup == 2 &&\n\t\t in_array($type, $cascadeprivs[$privname]['privs'])))) {\n\t\t\t$bgcolor = \"bgcolor=\\\"#008000\\\"\";\n\t\t\t$checked = \"checked\";\n\t\t\t$value = \"value=cascade\";\n\t\t\t$cascaded = 1;\n\t\t}\n\t\tif(array_key_exists($privname, $privs) && \n\t\t (($usergroup == 1 &&\n\t\t in_array($type, $privs[$privname])) ||\n\t\t ($usergroup == 2 &&\n\t\t in_array($type, $privs[$privname]['privs'])))) {\n\t\t\tif($cascaded) {\n\t\t\t\t$value = \"value=cascadesingle\";\n\t\t\t}\n\t\t\telse {\n\t\t\t\t$checked = \"checked\";\n\t\t\t\t$value = \"value=single\";\n\t\t\t}\n\t\t}\n\t\tif($usergroup == 1)\n\t\t\t$name = \"privrow[$privname:$type]\";\n\t\telse\n\t\t\t$name = \"privrow[{$allprivs[$privname]['id']}:$type]\";\n\t\tprint \" \";\n\t\t#print \"onBlur=\\\"nodeCheck(this.checked, $rownum, $j, $usergroup)\\\">\";\n\t\tprint \"\\n\";\n\t\t$j++;\n\t}\n\tprint \" \\n\";\n\t$count = count($types) + 1;\n\tif($blocked) {\n\t\tprint \"\\n\";\n\t}\n}", "label": 0, "label_name": "vulnerable"} -{"code": "n.toDataURL();if(x.lengthquery(sprintf('DELETE FROM %s WHERE id=%d AND mime=\\'directory\\' LIMIT 1', $this->tbf, $path)) && $this->db->affected_rows;\n\t}", "label": 1, "label_name": "safe"} -{"code": "func (x *UpdateGroupUserStateRequest) Reset() {\n\t*x = UpdateGroupUserStateRequest{}\n\tif protoimpl.UnsafeEnabled {\n\t\tmi := &file_console_proto_msgTypes[19]\n\t\tms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))\n\t\tms.StoreMessageInfo(mi)\n\t}\n}", "label": 0, "label_name": "vulnerable"} -{"code": " public function testAddDefaultDir()\n {\n $this->assertResult( array(), array('dir' => 'ltr') );\n }", "label": 1, "label_name": "safe"} -{"code": " public function setHttpClient(HttpClientInterface $client)\n {\n $this->httpClient = $client;\n\n return $this;\n }", "label": 0, "label_name": "vulnerable"} -{"code": "mxClient.IS_IOS?(O.style.padding=\"0px 10px 20px 10px\",O.style.top=\"6px\"):mxClient.IS_FF&&(t.style.paddingTop=\"0px\",t.style.marginTop=\"-2px\");if(null!=A)for(p=0;p User in\n let userID = try req.parameters.require(\"userID\", as: Int.self)\n if userID == 1 {\n return User(id: 1, name: \"Tim\")\n } else {\n throw Abort(.notFound)\n }\n }\n\n XCTAssertNoThrow(try app.testable().test(.GET, \"/users/2\") { res in\n XCTAssertEqual(res.status, .notFound)\n let counter = metrics.counters[\"http_requests_total\"] as! TestCounter\n let pathDimension = try XCTUnwrap(counter.dimensions.first(where: { $0.0 == \"path\"}))\n XCTAssertEqual(pathDimension.1, \"/users/:userID\")\n let methodDimension = try XCTUnwrap(counter.dimensions.first(where: { $0.0 == \"method\"}))\n XCTAssertEqual(methodDimension.1, \"GET\")\n let status = try XCTUnwrap(counter.dimensions.first(where: { $0.0 == \"status\"}))\n XCTAssertEqual(status.1, \"404\")\n XCTAssertNil(counter.dimensions.first(where: { $0.1 == \"200\" }))\n XCTAssertNil(counter.dimensions.first(where: { $0.0 == \"path\" && $0.1 == \"/users/1\" }))\n\n let timer = metrics.timers[\"http_request_duration_seconds\"] as! TestTimer\n let timerPathDimension = try XCTUnwrap(timer.dimensions.first(where: { $0.0 == \"path\"}))\n XCTAssertEqual(timerPathDimension.1, \"/users/:userID\")\n let timerMethodDimension = try XCTUnwrap(timer.dimensions.first(where: { $0.0 == \"method\"}))\n XCTAssertEqual(timerMethodDimension.1, \"GET\")\n let timerStatusDimension = try XCTUnwrap(timer.dimensions.first(where: { $0.0 == \"status\"}))\n XCTAssertEqual(timerStatusDimension.1, \"404\")\n XCTAssertNil(timer.dimensions.first(where: { $0.1 == \"200\" }))\n })\n }", "label": 1, "label_name": "safe"} -{"code": "static ssize_t bat_socket_read(struct file *file, char __user *buf,\n\t\t\t size_t count, loff_t *ppos)\n{\n\tstruct socket_client *socket_client = file->private_data;\n\tstruct socket_packet *socket_packet;\n\tsize_t packet_len;\n\tint error;\n\n\tif ((file->f_flags & O_NONBLOCK) && (socket_client->queue_len == 0))\n\t\treturn -EAGAIN;\n\n\tif ((!buf) || (count < sizeof(struct icmp_packet)))\n\t\treturn -EINVAL;\n\n\tif (!access_ok(VERIFY_WRITE, buf, count))\n\t\treturn -EFAULT;\n\n\terror = wait_event_interruptible(socket_client->queue_wait,\n\t\t\t\t\t socket_client->queue_len);\n\n\tif (error)\n\t\treturn error;\n\n\tspin_lock_bh(&socket_client->lock);\n\n\tsocket_packet = list_first_entry(&socket_client->queue_list,\n\t\t\t\t\t struct socket_packet, list);\n\tlist_del(&socket_packet->list);\n\tsocket_client->queue_len--;\n\n\tspin_unlock_bh(&socket_client->lock);\n\n\tpacket_len = min(count, socket_packet->icmp_len);\n\terror = copy_to_user(buf, &socket_packet->icmp_packet, packet_len);\n\n\tkfree(socket_packet);\n\n\tif (error)\n\t\treturn -EFAULT;\n\n\treturn packet_len;\n}", "label": 1, "label_name": "safe"} -{"code": " it 'contains the changable 8.0.0.1 rule' do\n shell('iptables-save') do |r|\n expect(r.stdout).to match(/-A INPUT -s 8\\.0\\.0\\.1(\\/32)? -p tcp -m multiport --ports 101 -m comment --comment \"101 test source changes\" -j ACCEPT/)\n end\n end", "label": 0, "label_name": "vulnerable"} -{"code": " public void setStringInternEnabled(boolean stringInternEnabled) {\n this.stringInternEnabled = stringInternEnabled;\n }", "label": 1, "label_name": "safe"} -{"code": "var CreateDialog=function(b,f,l,d,u,t,D,c,e,g,k,m,q,v,x,A,z){function L(N,J,E,H){function S(){mxEvent.addListener(U,\"click\",function(){var p=E;if(D){var C=y.value,I=C.lastIndexOf(\".\");if(0>f.lastIndexOf(\".\")&&0>I){p=null!=p?p:G.value;var T=\"\";p==App.MODE_GOOGLE?T=b.drive.extension:p==App.MODE_GITHUB?T=b.gitHub.extension:p==App.MODE_GITLAB?T=b.gitLab.extension:p==App.MODE_TRELLO?T=b.trello.extension:p==App.MODE_DROPBOX?T=b.dropbox.extension:p==App.MODE_ONEDRIVE?T=b.oneDrive.extension:p==App.MODE_DEVICE&&\n(T=\".drawio\");0<=I&&(C=C.substring(0,I));y.value=C+T}}M(E)})}var U=document.createElement(\"a\");U.style.overflow=\"hidden\";var Q=document.createElement(\"img\");Q.src=N;Q.setAttribute(\"border\",\"0\");Q.setAttribute(\"align\",\"absmiddle\");Q.style.width=\"60px\";Q.style.height=\"60px\";Q.style.paddingBottom=\"6px\";U.style.display=\"inline-block\";U.className=\"geBaseButton\";U.style.position=\"relative\";U.style.margin=\"4px\";U.style.padding=\"8px 8px 10px 8px\";U.style.whiteSpace=\"nowrap\";U.appendChild(Q);U.style.color=", "label": 0, "label_name": "vulnerable"} -{"code": "var F=this.editorUi,G=F.editor.graph;if(G.isEnabled()&&\"1\"==urlParams.sketch){var N=this.createOption(mxResources.get(\"sketch\"),function(){return Editor.sketchMode},function(J,E){F.setSketchMode(!Editor.sketchMode);null!=E&&mxEvent.isShiftDown(E)||G.updateCellStyles({sketch:J?\"1\":null},G.getVerticesAndEdges())},{install:function(J){this.listener=function(){J(Editor.sketchMode)};F.addListener(\"sketchModeChanged\",this.listener)},destroy:function(){F.removeListener(this.listener)}});B.appendChild(N)}return B};", "label": 0, "label_name": "vulnerable"} -{"code": " it \"should raise an error if you pass a non-string password\" do\n expect { scope.function_str2saltedsha512([1234]) }.to( raise_error(Puppet::ParseError) )\n end", "label": 0, "label_name": "vulnerable"} -{"code": " setup: function () {\n var data = this.model.get('data') || {};\n\n this.entityType = this.model.get('relatedType') || data.entityType || null;\n this.entityId = this.model.get('relatedId') || data.entityId || null;\n this.entityName = this.model.get('relatedName') || data.entityName || null;\n\n this.messageData['relatedEntityType'] = this.translateEntityType(this.entityType);\n this.messageData['relatedEntity'] = '' + this.entityName +'';\n\n this.createMessage();\n }", "label": 0, "label_name": "vulnerable"} -{"code": "(f={page_id:c.closest(\"li\").find(\"input\").val(),_cat_ajax:1},g=CAT_ADMIN_URL+\"/pages/ajax_page_settings.php\",c.closest(\"li\").addClass(\"page_tree_open_options\"),b.find(\".fc_restorePageOnly, .fc_addPageOnly\").hide(),b.find(\"nav, ul, .fc_changePageOnly\").show());a.ajax({type:\"POST\",url:g,dataType:\"json\",data:f,cache:!1,beforeSend:function(b){a(\"#fc_addPage_keywords_ul\").remove();a(\"#fc_add_page\").is(\":visible\")&&a(\"#fc_add_page\").stop().animate({width:\"toggle\"},200)},success:function(b,e,f){e=a(\"#fc_add_page\");\nvar g='\";\"deleted\"==b.visibility?(e.find(\"nav, ul, .fc_changePageOnly, .fc_addPageOnly\").hide(),e.find(\".fc_restorePageOnly\").show()):(null!==b.parent_list&&a.each(b.parent_list,function(a,b){g=g+'