project stringclasses 633
values | commit_id stringlengths 7 81 | target int64 0 1 | func stringlengths 5 484k | cwe stringclasses 131
values | big_vul_idx float64 0 189k ⌀ | idx int64 0 522k | hash stringlengths 34 39 | size float64 1 24k ⌀ | message stringlengths 0 11.5k ⌀ | dataset stringclasses 1
value |
|---|---|---|---|---|---|---|---|---|---|---|
savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | 1 | parse_encoding( T1_Face face,
T1_Loader loader )
{
T1_Parser parser = &loader->parser;
FT_Byte* cur;
FT_Byte* limit = parser->root.limit;
PSAux_Service psaux = (PSAux_Service)face->psaux;
T1_Skip_Spaces( parser );
cur = parser->root.cursor;
if ( cur >= lim... | CWE-399 | 178,009 | 177 | 272856134003844809072499589562648977382 | null | null | null |
haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | 1 | void check_request_for_cacheability(struct stream *s, struct channel *chn)
{
struct http_txn *txn = s->txn;
char *p1, *p2;
char *cur_ptr, *cur_end, *cur_next;
int pragma_found;
int cc_found;
int cur_idx;
if ((txn->flags & (TX_CACHEABLE|TX_CACHE_IGNORE)) == TX_CACHE_IGNORE)
return; /* nothing more to do here *... | CWE-200 | 178,013 | 178 | 324327278202769570327385397929081223567 | null | null | null |
savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | 1 | parse_fond( char* fond_data,
short* have_sfnt,
ResID* sfnt_id,
Str255 lwfn_file_name,
short face_index )
{
AsscEntry* assoc;
AsscEntry* base_assoc;
FamRec* fond;
*sfnt_id = 0;
*have_sfnt = 0;
lwfn_file_nam... | CWE-119 | 178,014 | 179 | 233045259701863811358636688341910118112 | null | null | null |
savannah | 0e2f5d518c60e2978f26400d110eff178fa7e3c3 | 1 | pcf_read_TOC( FT_Stream stream,
PCF_Face face )
{
FT_Error error;
PCF_Toc toc = &face->toc;
PCF_Table tables;
FT_Memory memory = FT_FACE( face )->memory;
FT_UInt n;
if ( FT_STREAM_SEEK ( 0 ) ||
FT_STREAM_READ_FIELDS ( pcf_toc_... | 178,015 | 180 | 99642060190973035507344569907798525276 | null | null | null | |
savannah | ef1eba75187adfac750f326b563fe543dd5ff4e6 | 1 | pcf_get_encodings( FT_Stream stream,
PCF_Face face )
{
FT_Error error;
FT_Memory memory = FT_FACE( face )->memory;
FT_ULong format, size;
int firstCol, lastCol;
int firstRow, lastRow;
int nencoding, encodingOffset;
int ... | CWE-189 | 178,016 | 181 | 176043909406430594682157391299639166951 | null | null | null |
savannah | 602040b1112c9f94d68e200be59ea7ac3d104565 | 1 | tt_cmap8_validate( FT_Byte* table,
FT_Validator valid )
{
FT_Byte* p = table + 4;
FT_Byte* is32;
FT_UInt32 length;
FT_UInt32 num_groups;
if ( table + 16 + 8192 > valid->limit )
FT_INVALID_TOO_SHORT;
length = TT_NEXT_ULONG( p );
if ( length > (FT_... | CWE-125 | 178,017 | 182 | 66140172033877381862359087550042336117 | null | null | null |
savannah | 257c270bd25e15890190a28a1456e7623bba4439 | 1 | tt_sbit_decoder_init( TT_SBitDecoder decoder,
TT_Face face,
FT_ULong strike_index,
TT_SBit_MetricsRec* metrics )
{
FT_Error error;
FT_Stream stream = face->root.stream;
FT_ULong ebdt_size;
... | CWE-189 | 178,018 | 183 | 275985852182915999395742860178488690228 | null | null | null |
savannah | 42fcd6693ec7bd6ffc65ddc63e74287a65dda669 | 1 | T42_Face_Init( FT_Stream stream,
FT_Face t42face, /* T42_Face */
FT_Int face_index,
FT_Int num_params,
FT_Parameter* params )
{
T42_Face face = (T42_Face)t42face;
FT_Error error;
... | 178,032 | 194 | 284802888516693989399704178152042676324 | null | null | null | |
savannah | f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c | 1 | tt_face_load_kern( TT_Face face,
FT_Stream stream )
{
FT_Error error;
FT_ULong table_size;
FT_Byte* p;
FT_Byte* p_limit;
FT_UInt nn, num_tables;
FT_UInt32 avail = 0, ordered = 0;
/* the kern table is optional; exit silently if it is missing */
e... | CWE-125 | 178,037 | 199 | 223904594839516096150742880543791775725 | null | null | null |
savannah | f0292bb9920aa1dbfed5f53861e7c7a89b35833a | 1 | tt_sbit_decoder_load_image( TT_SBitDecoder decoder,
FT_UInt glyph_index,
FT_Int x_pos,
FT_Int y_pos )
{
/*
* First, we find the correct strike range that applies to this
* glyph index... | CWE-119 | 178,038 | 200 | 28994602925432626900683012190657933065 | null | null | null |
savannah | 3774fc08b502c3e685afca098b6e8a195aded6a0 | 1 | ps_parser_to_token( PS_Parser parser,
T1_Token token )
{
FT_Byte* cur;
FT_Byte* limit;
FT_Int embed;
token->type = T1_TOKEN_TYPE_NONE;
token->start = NULL;
token->limit = NULL;
/* first of all, skip leading whitespace */
ps_parser_skip_spaces( parser... | CWE-119 | 178,047 | 204 | 328688916561979850895211877372718866822 | null | null | null |
savannah | f958c48ee431bef8d4d466b40c9cb2d4dbcb7791 | 1 | t1_decoder_parse_charstrings( T1_Decoder decoder,
FT_Byte* charstring_base,
FT_UInt charstring_len )
{
FT_Error error;
T1_Decoder_Zone zone;
FT_Byte* ip;
FT_Byte* limit;
T1_Builder builder = &d... | CWE-787 | 178,056 | 211 | 173319081189597155474138387684978602892 | null | null | null |
dbus | 7d65a3a6ed8815e34a99c680ac3869fde49dbbd4 | 1 | validate_body_helper (DBusTypeReader *reader,
int byte_order,
dbus_bool_t walk_reader_to_end,
const unsigned char *p,
const unsigned char *end,
const unsigned char **ne... | CWE-399 | 178,058 | 212 | 293803507783746447357509233379751643676 | null | null | null |
savannah | e6699596af5c5d6f0ae0ea06e19df87dce088df8 | 1 | tt_size_reset( TT_Size size,
FT_Bool only_height )
{
TT_Face face;
FT_Size_Metrics* metrics;
size->ttmetrics.valid = FALSE;
face = (TT_Face)size->root.face;
metrics = &size->metrics;
/* copy the result from base layer */
/* This bit flag, if set... | CWE-787 | 178,059 | 213 | 328349556850502930530519513006179954778 | null | null | null |
savannah | 7bbb91fbf47fc0775cc9705673caf0c47a81f94b | 1 | sfnt_init_face( FT_Stream stream,
TT_Face face,
FT_Int face_instance_index,
FT_Int num_params,
FT_Parameter* params )
{
FT_Error error;
FT_Memory memory = face->root.memory;
FT_Library librar... | CWE-787 | 178,060 | 214 | 119798325318146814691558712066205414712 | null | null | null |
poppler | 5c9b08a875b07853be6c44e43ff5f7f059df666a | 1 | int main (int argc, char *argv[])
{
int objectsCount = 0;
Guint numOffset = 0;
std::vector<Object> pages;
std::vector<Guint> offsets;
XRef *yRef, *countRef;
FILE *f;
OutStream *outStr;
int i;
int j, rootNum;
std::vector<PDFDoc *>docs;
int majorVersion = 0;
int minorVersion = 0;
char *fileName ... | CWE-476 | 178,062 | 215 | 180050936886598415271458736244884709418 | null | null | null |
savannah | 94e01571507835ff59dd8ce2a0b56a4b566965a4 | 1 | main (int argc _GL_UNUSED, char **argv)
{
struct timespec result;
struct timespec result2;
struct timespec expected;
struct timespec now;
const char *p;
int i;
long gmtoff;
time_t ref_time = 1304250918;
/* Set the time zone to US Eastern time with the 2012 rules. This
should disable any leap se... | CWE-119 | 178,063 | 216 | 85463602567582995767126053202641542542 | null | null | null |
savannah | 59eb9f8cfe7d1df379a2318316d1f04f80fba54a | 1 | ft_var_readpackedpoints( FT_Stream stream,
FT_UInt *point_cnt )
{
FT_UShort *points;
FT_Int n;
FT_Int runcnt;
FT_Int i;
FT_Int j;
FT_Int first;
FT_Memory memory = stream->memory;
FT_Error error = TT_Err_Ok;
FT_UNUSED( err... | CWE-119 | 178,069 | 217 | 176444419672545527315649492039587951909 | null | null | null |
ghostscript | 39b1e54b2968620723bf32e96764c88797714879 | 1 | set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat)
{
int code = gs_distance_transform_inverse(dx, dy, pmat, pdist);
double rounded;
if (code == gs_error_undefinedresult) {
/* The CTM is degenerate.
Can't know the distance in user space.
} else if (... | CWE-119 | 178,070 | 218 | 334604983653907615489271299004330168271 | null | null | null |
haproxy | 3f0e1ec70173593f4c2b3681b26c04a4ed5fc588 | 1 | static void h2_process_demux(struct h2c *h2c)
{
struct h2s *h2s;
if (h2c->st0 >= H2_CS_ERROR)
return;
if (unlikely(h2c->st0 < H2_CS_FRAME_H)) {
if (h2c->st0 == H2_CS_PREFACE) {
if (unlikely(h2c_frt_recv_preface(h2c) <= 0)) {
/* RFC7540#3.5: a GOAWAY frame MAY be omitted */
if (h2c->st0 == H2_CS_ERRO... | CWE-119 | 178,071 | 219 | 197791135802871490452896068201538076195 | null | null | null |
ghostscript | 5008105780c0b0182ea6eda83ad5598f225be3ee | 1 | static void cstm(JF, js_Ast *stm)
{
js_Ast *target;
int loop, cont, then, end;
emitline(J, F, stm);
switch (stm->type) {
case AST_FUNDEC:
break;
case STM_BLOCK:
cstmlist(J, F, stm->a);
break;
case STM_EMPTY:
if (F->script) {
emit(J, F, OP_POP);
emit(J, F, OP_UNDEF);
}
break;
case STM_VAR:... | CWE-476 | 178,073 | 220 | 119034873631662377239453193687499055805 | null | null | null |
libXvMC | 2cd95e7da8367cccdcdd5c9b160012d1dec5cbdb | 1 | Status XvMCGetDRInfo(Display *dpy, XvPortID port,
char **name, char **busID,
int *major, int *minor,
int *patchLevel,
int *isLocal)
{
XExtDisplayInfo *info = xvmc_find_display(dpy);
xvmcGetDRInfoReply rep;
xvmcGetDRInfoReq *req;
CARD32 magic;
#ifdef HAVE_SHMAT
volatile ... | CWE-119 | 178,085 | 223 | 225773238597816987128397211875317401076 | null | null | null |
libXfixes | 61c1039ee23a2d1de712843bed3480654d7ef42e | 1 | XFixesFetchRegionAndBounds (Display *dpy,
XserverRegion region,
int *nrectanglesRet,
XRectangle *bounds)
{
XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy);
xXFixesFetchRegionReq *req;
xXFixesFetchRegionReply rep;
XRectangle *rects;
int nrects;
lon... | CWE-190 | 178,094 | 231 | 306933036253550523681529656378317307640 | null | null | null |
libav | 136f55207521f0b03194ef5b55ba70f1635d6aee | 1 | static inline int hpel_motion(MpegEncContext *s,
uint8_t *dest, uint8_t *src,
int src_x, int src_y,
op_pixels_func *pix_op,
int motion_x, int motion_y)
{
int dxy = 0;
int emu = 0;
src_x +... | CWE-476 | 178,099 | 232 | 111292629842222758487961407224615725800 | null | null | null |
tartarus | 4ff22863d895cb7ebfced4cf923a012a614adaa8 | 1 | static void ssh_throttle_all(Ssh ssh, int enable, int bufsize)
{
int i;
struct ssh_channel *c;
if (enable == ssh->throttled_all)
return;
ssh->throttled_all = enable;
ssh->overall_bufsize = bufsize;
if (!ssh->channels)
return;
for (i = 0; NULL != (c = index234(ssh->channels, i)); i++) {
s... | CWE-119 | 178,103 | 233 | 325909590182680995779527787302149618683 | null | null | null |
openssl | 6e629b5be45face20b4ca71c4fcbfed78b864a2e | 1 | static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl,
X509 **pissuer, int *pscore, unsigned int *preasons,
STACK_OF(X509_CRL) *crls)
{
int i, crl_score, best_score = *pscore;
unsigned int reasons, best_reasons = 0;
X509 *x = ctx->current_ce... | CWE-476 | 178,112 | 234 | 135793188300012979952739633768625629213 | null | null | null |
spice | 9113dc6a303604a2d9812ac70c17d076ef11886c | 1 | vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status)
{
VCardAPDU *new_apdu;
*status = VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE;
if (len < 4) {
*status = VCARD7816_STATUS_ERROR_WRONG_LENGTH;
return NULL;
}
new_apdu = g_new(VCardAPDU, 1);
new_apdu->a_dat... | CWE-772 | 178,113 | 235 | 336092549544277958136877844795822151529 | null | null | null |
virglrenderer | 93761787b29f37fa627dea9082cdfc1a1ec608d6 | 1 | int vrend_create_shader(struct vrend_context *ctx,
uint32_t handle,
const struct pipe_stream_output_info *so_info,
const char *shd_text, uint32_t offlen, uint32_t num_tokens,
uint32_t type, uint32_t pkt_length)
{
struct v... | CWE-190 | 178,117 | 238 | 277560631509583395850123120925257608076 | null | null | null |
virglrenderer | a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4 | 1 | static struct vrend_linked_shader_program *add_shader_program(struct vrend_context *ctx,
struct vrend_shader *vs,
struct vrend_shader *fs,
... | CWE-772 | 178,118 | 239 | 323217311057867578248239667496178090457 | null | null | null |
virglrenderer | 0a5dff15912207b83018485f83e067474e818bab | 1 | void vrend_renderer_context_destroy(uint32_t handle)
{
struct vrend_decode_ctx *ctx;
bool ret;
if (handle >= VREND_MAX_CTX)
return;
ctx = dec_ctx[handle];
if (!ctx)
return;
vrend_hw_switch_context(dec_ctx[0]->grctx, true);
}
| CWE-476 | 178,121 | 240 | 248536757234533019908341843286492380403 | null | null | null |
virglrenderer | e534b51ca3c3cd25f3990589932a9ed711c59b27 | 1 | static boolean parse_identifier( const char **pcur, char *ret )
{
const char *cur = *pcur;
int i = 0;
if (is_alpha_underscore( cur )) {
ret[i++] = *cur++;
while (is_alpha_underscore( cur ) || is_digit( cur ))
ret[i++] = *cur++;
ret[i++] = '\0';
*pcur = cur;
retur... | CWE-119 | 178,123 | 241 | 142817990104108566810102542927701673732 | null | null | null |
virglrenderer | 114688c526fe45f341d75ccd1d85473c3b08f7a7 | 1 | int vrend_create_vertex_elements_state(struct vrend_context *ctx,
uint32_t handle,
unsigned num_elements,
const struct pipe_vertex_element *elements)
{
struct vrend_vertex_element_array *v = CALLOC_ST... | CWE-119 | 178,126 | 242 | 127813115019639337707795536823961346235 | null | null | null |
virglrenderer | a5ac49940c40ae415eac0cf912eac7070b4ba95d | 1 | static int vrend_decode_create_ve(struct vrend_decode_ctx *ctx, uint32_t handle, uint16_t length)
{
struct pipe_vertex_element *ve = NULL;
int num_elements;
int i;
int ret;
if (length < 1)
return EINVAL;
if ((length - 1) % 4)
return EINVAL;
num_elements = (length - 1) / 4;
if (nu... | CWE-125 | 178,129 | 243 | 279616717599430675241465878003165352261 | null | null | null |
infradead | 14cae65318d3ef1f7d449e463b72b6934e82f1c2 | 1 | static void set_banner(struct openconnect_info *vpninfo)
{
char *banner, *q;
const char *p;
if (!vpninfo->banner || !(banner = malloc(strlen(vpninfo->banner)))) {
unsetenv("CISCO_BANNER");
return;
}
p = vpninfo->banner;
q = banner;
while (*p) {
if ... | CWE-119 | 178,132 | 246 | 174272131383202600271920404270020112167 | null | null | null |
openssl | 2c0d295e26306e15a92eb23a84a1802005c1c137 | 1 | int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p,
unsigned char *limit, int *al)
{
unsigned short type;
unsigned short size;
unsigned short len;
unsigned char *data = *p;
int renegotiate_seen = 0;
int sigalg_seen = 0;
s->servername_done = 0;
s-... | CWE-399 | 178,136 | 249 | 29224115480775327782453555135433777408 | null | null | null |
openssl | e97763c92c655dcf4af2860b3abd2bc4c8a267f9 | 1 | static int tls_decrypt_ticket(SSL *s, const unsigned char *etick,
int eticklen, const unsigned char *sess_id,
int sesslen, SSL_SESSION **psess)
{
SSL_SESSION *sess;
unsigned char *sdec;
const unsigned char *p;
int slen, mlen, renew_ticket = 0, ... | CWE-20 | 178,138 | 250 | 2230119928438274047665345409737174926 | null | null | null |
busybox | 150dc7a2b483b8338a3e185c478b4b23ee884e71 | 1 | recv_and_process_client_pkt(void /*int fd*/)
{
ssize_t size;
len_and_sockaddr *to;
struct sockaddr *from;
msg_t msg;
uint8_t query_status;
l_fixedpt_t query_xmttime;
to = get_sock_lsa(G_listen_fd);
from = xzalloc(to->len);
size = recv_from_to(G_listen_fd, &msg, sizeof(msg),... | CWE-399 | 178,139 | 251 | 156100728183473686227543895216612348906 | null | null | null |
savannah | 5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 | 1 | main (int argc, char *argv[])
{
struct gengetopt_args_info args_info;
char *line = NULL;
size_t linelen = 0;
char *p, *r;
uint32_t *q;
unsigned cmdn = 0;
int rc;
setlocale (LC_ALL, "");
set_program_name (argv[0]);
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
if (cmdline_parser (a... | CWE-125 | 178,157 | 252 | 336554870084234386632359019600938342414 | null | null | null |
savannah | 45a3c76b547511fa9d97aca34b150a0663257375 | 1 | FT_Stream_EnterFrame( FT_Stream stream,
FT_ULong count )
{
FT_Error error = FT_Err_Ok;
FT_ULong read_bytes;
/* check for nested frame access */
FT_ASSERT( stream && stream->cursor == 0 );
if ( stream->read )
{
/* allocate the frame in memory */
FT_... | CWE-20 | 178,158 | 253 | 171308526437072917405338067244329397761 | null | null | null |
virglrenderer | 28894a30a17a84529be102b21118e55d6c9f23fa | 1 | parse_instruction(
struct translate_ctx *ctx,
boolean has_label )
{
uint i;
uint saturate = 0;
const struct tgsi_opcode_info *info;
struct tgsi_full_instruction inst;
const char *cur;
uint advance;
inst = tgsi_default_full_instruction();
/* Parse predicate.
*/
eat_opt_white( &ctx-... | CWE-119 | 178,159 | 254 | 207706300612945852467345419819110560855 | null | null | null |
haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | 1 | int http_request_forward_body(struct session *s, struct channel *req, int an_bit)
{
struct http_txn *txn = &s->txn;
struct http_msg *msg = &s->txn.req;
if (unlikely(msg->msg_state < HTTP_MSG_BODY))
return 0;
if ((req->flags & (CF_READ_ERROR|CF_READ_TIMEOUT|CF_WRITE_ERROR|CF_WRITE_TIMEOUT)) ||
((req->flags ... | CWE-189 | 178,162 | 256 | 74231898713312769363715897872246138359 | null | null | null |
kde | 82fdfd24d46966a117fa625b68784735a40f9065 | 1 | void Part::slotOpenExtractedEntry(KJob *job)
{
if (!job->error()) {
OpenJob *openJob = qobject_cast<OpenJob*>(job);
Q_ASSERT(openJob);
m_tmpExtractDirList << openJob->tempDir();
const QString fullName = openJob->validatedFilePath();
bool isWritable = m_model->archive() &&... | CWE-78 | 178,164 | 257 | 127189817454680839187942616776907215530 | null | null | null |
savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | 1 | Ins_IUP( INS_ARG )
{
IUP_WorkerRec V;
FT_Byte mask;
FT_UInt first_point; /* first point of contour */
FT_UInt end_point; /* end point (last+1) of contour */
FT_UInt first_touched; /* first touched point in contour */
FT_UInt cur_touched; /* current touched ... | CWE-119 | 178,174 | 263 | 271982803099189327229111379866845675067 | null | null | null |
savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | 1 | Mac_Read_POST_Resource( FT_Library library,
FT_Stream stream,
FT_Long *offsets,
FT_Long resource_cnt,
FT_Long face_index,
FT_Face *aface )
{
FT_Error error = FT_E... | CWE-119 | 178,175 | 264 | 239474837185248719277265167606864341043 | null | null | null |
savannah | 6305b869d86ff415a33576df6d43729673c66eee | 1 | gray_render_span( int y,
int count,
const FT_Span* spans,
PWorker worker )
{
unsigned char* p;
FT_Bitmap* map = &worker->target;
/* first of all, compute the scanline offset */
p = (unsigned char*)... | CWE-189 | 178,176 | 265 | 233903124056505689403424392136593938770 | null | null | null |
savannah | c69891a1345640096fbf396e8dd567fe879ce233 | 1 | Mac_Read_POST_Resource( FT_Library library,
FT_Stream stream,
FT_Long *offsets,
FT_Long resource_cnt,
FT_Long face_index,
FT_Face *aface )
{
FT_Error error = FT_E... | CWE-119 | 178,178 | 267 | 66761366277063878236162927407801840545 | null | null | null |
savannah | 8d22746c9e5af80ff4304aef440986403a5072e2 | 1 | psh_glyph_find_strong_points( PSH_Glyph glyph,
FT_Int dimension )
{
/* a point is `strong' if it is located on a stem edge and */
/* has an `in' or `out' tangent parallel to the hint's direction */
PSH_Hint_Table table = &glyph->hint_tables[dimension];
... | CWE-399 | 178,179 | 268 | 238917502809110546701210284595052003786 | null | null | null |
savannah | 7d3d2cc4fef72c6be9c454b3809c387e12b44cfc | 1 | cff_decoder_parse_charstrings( CFF_Decoder* decoder,
FT_Byte* charstring_base,
FT_ULong charstring_len )
{
FT_Error error;
CFF_Decoder_Zone* zone;
FT_Byte* ip;
FT_Byte* limit;
CFF_Builder*... | CWE-189 | 178,180 | 269 | 78533740565488192289380822412773176149 | null | null | null |
libXv | d9da580b46a28ab497de2e94fdc7b9ff953dab17 | 1 | XvQueryAdaptors(
Display *dpy,
Window window,
unsigned int *p_nAdaptors,
XvAdaptorInfo **p_pAdaptors)
{
XExtDisplayInfo *info = xv_find_display(dpy);
xvQueryAdaptorsReq *req;
xvQueryAdaptorsReply rep;
size_t size;
unsigned int ii, jj;
char *name;
XvAdaptorInfo *pas = NULL... | CWE-125 | 178,181 | 270 | 25138831966304988672154482243921916552 | null | null | null |
accountsservice | bd51aa4cdac380f55d607f4ffdf2ab3c00d08721 | 1 | method_invocation_get_uid (GDBusMethodInvocation *context)
{
const gchar *sender;
PolkitSubject *busname;
PolkitSubject *process;
uid_t uid;
sender = g_dbus_method_invocation_get_sender (context);
busname = polkit_system_bus_name_new (sender);
process = polkit_system_bus_name_get_process_sync (POLKIT_SYST... | CWE-362 | 178,182 | 271 | 24980212968361356668634529334558755546 | null | null | null |
accountsservice | 26213aa0e0d8dca5f36cc23f6942525224cbe9f5 | 1 | get_caller_uid (GDBusMethodInvocation *context, gint *uid)
{
PolkitSubject *subject;
PolkitSubject *process;
subject = polkit_system_bus_name_new (g_dbus_method_invocation_get_sender (context));
process = polkit_system_bus_name_get_process_sync (POLKIT_SYSTEM_BUS_NAME (subject), NULL,... | CWE-362 | 178,183 | 272 | 338964098978064792638046410608178684563 | null | null | null |
savannah | f290f48a621867084884bfff87f8093c15195e6a | 1 | intuit_diff_type (bool need_header, mode_t *p_file_type)
{
file_offset this_line = 0;
file_offset first_command_line = -1;
char first_ed_command_letter = 0;
lin fcl_line = 0; /* Pacify 'gcc -W'. */
bool this_is_a_command = false;
bool stars_this_line = false;
bool extended_headers = false;
... | CWE-476 | 178,192 | 274 | 119977677141531301071259218660699705481 | null | null | null |
savannah | 29c759284e305ec428703c9a5831d0b1fc3497ef | 1 | Ins_GETVARIATION( TT_ExecContext exc,
FT_Long* args )
{
FT_UInt num_axes = exc->face->blend->num_axis;
FT_Fixed* coords = exc->face->blend->normalizedcoords;
FT_UInt i;
if ( BOUNDS( num_axes, exc->stackSize + 1 - exc->top ) )
{
exc->error = FT_THROW( S... | CWE-476 | 178,193 | 275 | 139567459660525946313428439964298096333 | null | null | null |
openssl | 83764a989dcc87fbea337da5f8f86806fe767b7e | 1 | int ssl3_get_server_hello(SSL *s)
{
STACK_OF(SSL_CIPHER) *sk;
const SSL_CIPHER *c;
unsigned char *p,*d;
int i,al,ok;
unsigned int j;
long n;
#ifndef OPENSSL_NO_COMP
SSL_COMP *comp;
#endif
n=s->method->ssl_get_message(s,
SSL3_ST_CR_SRVR_HELLO_A,
SSL3_ST_CR_SRVR_HELLO_B,
-1,
20000, /* ?? */
&ok);
if... | 178,194 | 276 | 277497504299456757679652544715041856567 | null | null | null | |
openssl | 80bd7b41b30af6ee96f519e629463583318de3b0 | 1 | void ssl_set_client_disabled(SSL *s)
{
CERT *c = s->cert;
c->mask_a = 0;
c->mask_k = 0;
/* Don't allow TLS 1.2 only ciphers if we don't suppport them */
if (!SSL_CLIENT_USE_TLS1_2_CIPHERS(s))
c->mask_ssl = SSL_TLSV1_2;
else
c->mask_ssl = 0;
ssl_set_sig_mask(&c->mask_a, s, SSL_SECOP_SIGALG_MASK);
/* Disable... | 178,195 | 277 | 145190138964748869120683088287665695350 | null | null | null | |
kde | 9db872df82c258315c6ebad800af59e81ffb9212 | 1 | void DelayedExecutor::delayedExecute(const QString &udi)
{
Solid::Device device(udi);
QString exec = m_service.exec();
MacroExpander mx(device);
mx.expandMacros(exec);
KRun::runCommand(exec, QString(), m_service.icon(), 0);
deleteLater();
}
| CWE-78 | 178,196 | 278 | 185460399545264476872601191691271963408 | null | null | null |
kde | 8164beac15ea34ec0d1564f0557fe3e742bdd938 | 1 | uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id,
const QString &app_icon, const QString &summary, const QString &body,
const QStringList &actions, const QVariantMap &hints, int timeout)
{
uint partOf = 0;
const QString ... | CWE-200 | 178,197 | 279 | 66626965994794909671436631171592255350 | null | null | null |
kde | 5bc696b5abcdb460c1017592e80b2d7f6ed3107c | 1 | uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id,
const QString &app_icon, const QString &summary, const QString &body,
const QStringList &actions, const QVariantMap &hints, int timeout)
{
uint partOf = 0;
const QString ... | CWE-200 | 178,198 | 280 | 49080920792690681565819742613436372042 | null | null | null |
savannah | 9fb46e120655ac481b2af8f865d5ae56c39b831a | 1 | dns_stricmp(const char* str1, const char* str2)
{
char c1, c2;
*----------------------------------------------------------------------------*/
/* DNS variables */
static struct udp_pcb *dns_pcb;
static u8_t dns_seqno;
static struct dns_table_entry dns_table[DNS_TABLE_SIZE];
static str... | CWE-345 | 178,220 | 283 | 181259810056970673184917548254526485235 | null | null | null |
samba | 9280051bfba337458722fb157f3082f93cbd9f2b | 1 | static void reply_sesssetup_and_X_spnego(struct smb_request *req)
{
const uint8 *p;
DATA_BLOB blob1;
size_t bufrem;
char *tmp;
const char *native_os;
const char *native_lanman;
const char *primary_domain;
const char *p2;
uint16 data_blob_len = SVAL(req->vwv+7, 0);
enum remote_arch_types ra_type = get_remote_a... | CWE-119 | 178,226 | 287 | 252100526266913255109910552885875245221 | null | null | null |
savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | 1 | _asn1_extract_der_octet (asn1_node node, const unsigned char *der,
int der_len, unsigned flags)
{
int len2, len3;
int counter, counter_end;
int result;
len2 = asn1_get_length_der (der, der_len, &len3);
if (len2 < -1)
return ASN1_DER_ERROR;
counter = len3 + 1;
DECR_LEN(der_len, len3);
if (l... | CWE-399 | 178,249 | 288 | 199202175349742229581148475563569699182 | null | null | null |
enlightment | 37a96801663b7b4cd3fbe56cc0eb8b6a17e766a8 | 1 | load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
char immediate_load)
{
static const int intoffset[] = { 0, 4, 2, 1 };
static const int intjump[] = { 8, 8, 4, 2 };
int rc;
DATA32 *ptr;
GifFileType *gif;
GifRowType *r... | CWE-119 | 178,251 | 289 | 29413401693515776488286177132255863480 | null | null | null |
enlightment | ce94edca1ccfbe314cb7cd9453433fad404ec7ef | 1 | __imlib_MergeUpdate(ImlibUpdate * u, int w, int h, int hgapmax)
{
ImlibUpdate *nu = NULL, *uu;
struct _tile *t;
int tw, th, x, y, i;
int *gaps = NULL;
/* if theres no rects to process.. return NULL */
if (!u)
return NULL;
tw = w >> TB;
if (w & T... | CWE-119 | 178,252 | 290 | 36599931638812584056030971307038057704 | null | null | null |
savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | 1 | _gnutls_ciphertext2compressed (gnutls_session_t session,
opaque * compress_data,
int compress_size,
gnutls_datum_t ciphertext, uint8_t type,
record_parameters_st * params)
{
uint8_t MAC[MAX_HASH... | CWE-310 | 178,253 | 291 | 124737111803029213599184263327276296012 | null | null | null |
samba | 7706303828fcde524222babb2833864a4bd09e07 | 1 | int parse_arguments(int *argc_p, const char ***argv_p)
{
static poptContext pc;
char *ref = lp_refuse_options(module_id);
const char *arg, **argv = *argv_p;
int argc = *argc_p;
int opt;
if (ref && *ref)
set_refuse_options(ref);
set_refuse_options("log-file*");
#ifde... | 178,306 | 332 | 43904054426680477619840961774865216896 | null | null | null | |
openssl | 08229ad838c50f644d7e928e2eef147b4308ad64 | 1 | int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert,
BIO *dcont, BIO *out, unsigned int flags)
{
int r;
BIO *cont;
if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_enveloped) {
CMSerr(CMS_F_CMS_DECRYPT, CMS_R_TYPE_NOT_ENVELOPED_DATA);
return 0;
}
if (!dcont... | CWE-311 | 178,310 | 336 | 64941400402061506868395705688794168956 | null | null | null |
savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | 1 | _gnutls_ciphertext2compressed (gnutls_session_t session,
opaque * compress_data,
int compress_size,
gnutls_datum_t ciphertext, uint8_t type)
{
uint8_t MAC[MAX_HASH_SIZE];
uint16_t c_length;
uint8_t pad;
int length;
digest_hd_st td;
uint16_t blocksize;
int ret, i, pad_failed =... | CWE-189 | 178,318 | 344 | 240557542046470369478162712950471631896 | null | null | null |
strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | 1 | static bool on_accept(private_stroke_socket_t *this, stream_t *stream)
{
stroke_msg_t *msg;
uint16_t len;
FILE *out;
/* read length */
if (!stream->read_all(stream, &len, sizeof(len)))
{
if (errno != EWOULDBLOCK)
{
DBG1(DBG_CFG, "reading length of stroke message failed: %s",
strerror(errno));
... | CWE-787 | 178,324 | 346 | 76812337795623017581325005365702278382 | null | null | null |
openssl | 392fa7a952e97d82eac6958c81ed1e256e6b8ca5 | 1 | int ssl23_get_client_hello(SSL *s)
{
char buf_space[11]; /* Request this many bytes in initial read.
* We can detect SSL 3.0/TLS 1.0 Client Hellos
* ('type == 3') correctly only when the following
* is in a single record, which is not guaranteed by
... | 178,325 | 347 | 302715900060521114174962037430669439370 | null | null | null | |
openssl | 6ce9687b5aba5391fc0de50e18779eb676d0e04d | 1 | int ssl23_get_client_hello(SSL *s)
{
char buf_space[11]; /* Request this many bytes in initial read.
* We can detect SSL 3.0/TLS 1.0 Client Hellos
* ('type == 3') correctly only when the following
* is in a single record, which is not guaranteed by
... | 178,326 | 348 | 14016091918145812112657304672562481249 | null | null | null | |
openssl | b82924741b4bd590da890619be671f4635e46c2b | 1 | int ssl23_get_client_hello(SSL *s)
{
char buf_space[11]; /* Request this many bytes in initial read.
* We can detect SSL 3.0/TLS 1.0 Client Hellos
* ('type == 3') correctly only when the following
* is in a single record, which is not guaranteed by
... | 178,327 | 349 | 321379236827848909394746101848506513421 | null | null | null | |
openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | 1 | static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen,
const unsigned char *sess_id, int sesslen,
SSL_SESSION **psess)
{
SSL_SESSION *sess;
unsigned char *sdec;
const unsigned char *p;
int slen, mlen, renew_ticket = 0;
unsigned char tick_hmac[EVP_MAX_MD_SIZE];
HMAC_CTX hctx;
EVP... | CWE-20 | 178,331 | 353 | 40405055518110017250724029860459243757 | null | null | null |
gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | 1 | status_handler (void *opaque, int fd)
{
struct io_cb_data *data = (struct io_cb_data *) opaque;
engine_gpgsm_t gpgsm = (engine_gpgsm_t) data->handler_value;
gpgme_error_t err = 0;
char *line;
size_t linelen;
do
{
err = assuan_read_line (gpgsm->assuan_ctx, &line, &linelen);
if (err)
{
/*... | CWE-119 | 178,333 | 354 | 7203629874001971214417650726602123623 | null | null | null |
gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | 1 | status_handler (void *opaque, int fd)
{
struct io_cb_data *data = (struct io_cb_data *) opaque;
engine_uiserver_t uiserver = (engine_uiserver_t) data->handler_value;
gpgme_error_t err = 0;
char *line;
size_t linelen;
do
{
err = assuan_read_line (uiserver->assuan_ctx, &line, &linelen);
if (e... | CWE-119 | 178,334 | 355 | 77372948009689993078192342243939039842 | null | null | null |
openssl | 280b1f1ad12131defcd986676a8fc9717aaa601b | 1 | int ssl23_get_client_hello(SSL *s)
{
char buf_space[11]; /* Request this many bytes in initial read.
* We can detect SSL 3.0/TLS 1.0 Client Hellos
* ('type == 3') correctly only when the following
* is in a single record, which is not guaranteed by
... | 178,346 | 361 | 320820661878830943101551248404697759629 | null | null | null | |
openssl | fb0bc2b273bcc2d5401dd883fe869af4fc74bb21 | 1 | static int ssl_scan_serverhello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
{
unsigned short length;
unsigned short type;
unsigned short size;
unsigned char *data = *p;
int tlsext_servername = 0;
int renegotiate_seen = 0;
#ifndef OPENSSL_NO_NEXTPROTONEG
s->s3->next_proto_neg_seen = 0;
#... | CWE-362 | 178,347 | 362 | 26039161783827061921975058784343045283 | null | null | null |
openssl | 0042fb5fd1c9d257d713b15a1f45da05cf5c1c87 | 1 | int OBJ_obj2txt(char *buf, int buf_len, const ASN1_OBJECT *a, int no_name)
{
int i,n=0,len,nid, first, use_bn;
BIGNUM *bl;
unsigned long l;
const unsigned char *p;
char tbuf[DECIMAL_SIZE(i)+DECIMAL_SIZE(l)+2];
if ((a == NULL) || (a->data == NULL)) {
buf[0]='\0';
... | CWE-200 | 178,348 | 363 | 297699367960060599539119269244361477361 | null | null | null |
savannah | 1c3ccb3e040bf13e342ee60bc23b21b97b11923f | 1 | asn1_get_bit_der (const unsigned char *der, int der_len,
int *ret_len, unsigned char *str, int str_size,
int *bit_len)
{
int len_len, len_byte;
if (der_len <= 0)
return ASN1_GENERIC_ERROR;
len_byte = asn1_get_length_der (der, der_len, &len_len) - 1;
if (len_byte < 0)
return ASN1_DER_ERROR... | CWE-189 | 178,349 | 364 | 41675434541008202288249540494015225926 | null | null | null |
openafs | 396240cf070a806b91fea81131d034e1399af1e0 | 1 | newEntry(struct rx_call *call, char aname[], afs_int32 flag, afs_int32 oid,
afs_int32 *aid, afs_int32 *cid)
{
afs_int32 code;
struct ubik_trans *tt;
int admin;
char cname[PR_MAXNAMELEN];
stolower(aname);
code = Initdb();
if (code)
return code;
code = ubik_BeginTrans(dbase, UBIK_WRITET... | CWE-284 | 178,351 | 366 | 260875174871501419682775678302497067796 | null | null | null |
openssl | 578b956fe741bf8e84055547b1e83c28dd902c73 | 1 | _dopr(char **sbuffer,
char **buffer,
size_t *maxlen,
size_t *retlen, int *truncated, const char *format, va_list args)
{
char ch;
LLONG value;
LDOUBLE fvalue;
char *strvalue;
int min;
int max;
int state;
int flags;
int cflags;
size_t currlen;
state = DP_... | CWE-119 | 178,355 | 367 | 309192226193988062421957531577393101030 | null | null | null |
savannah | a3bc7e9400b214a0f078fdb19596ba54214a1442 | 1 | bgp_nlri_parse_vpnv4 (struct peer *peer, struct attr *attr,
struct bgp_nlri *packet)
{
u_char *pnt;
u_char *lim;
struct prefix p;
int psize;
int prefixlen;
u_int16_t type;
struct rd_as rd_as;
struct rd_ip rd_ip;
struct prefix_rd prd;
u_char *tagpnt;
/* Check peer status. */
if (peer->s... | CWE-119 | 178,361 | 368 | 189301502052689275853315045175183465473 | null | null | null |
openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | 1 | int dtls1_process_buffered_records(SSL *s)
{
pitem *item;
SSL3_BUFFER *rb;
item = pqueue_peek(s->rlayer.d->unprocessed_rcds.q);
if (item) {
/* Check if epoch is current. */
if (s->rlayer.d->unprocessed_rcds.epoch != s->rlayer.d->r_epoch)
return (1); /* Nothin... | CWE-189 | 178,366 | 371 | 299136167801831334632170022306068067325 | null | null | null |
openssl | 2919516136a4227d9e6d8f2fe66ef976aaf8c561 | 1 | char *X509_NAME_oneline(X509_NAME *a, char *buf, int len)
{
X509_NAME_ENTRY *ne;
int i;
int n, lold, l, l1, l2, num, j, type;
const char *s;
char *p;
unsigned char *q;
BUF_MEM *b = NULL;
static const char hex[17] = "0123456789ABCDEF";
int gs_doit[4];
char tmp_buf[80];
#ifdef CHAR... | CWE-119 | 178,379 | 383 | 92428507097973547653884047469651088423 | null | null | null |
samba | 0dedfbce2c1b851684ba658861fe9d620636c56a | 1 | static const char *check_secret(int module, const char *user, const char *group,
const char *challenge, const char *pass)
{
char line[1024];
char pass2[MAX_DIGEST_LEN*2];
const char *fname = lp_secrets_file(module);
STRUCT_STAT st;
int fd, ok = 1;
int user_len = strlen(user);... | CWE-20 | 178,380 | 384 | 212902940744913922862229672762941300732 | null | null | null |
openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | 1 | int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
const unsigned char *in, int inl)
{
int i, j, bl;
if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
i = ctx->cipher->do_cipher(ctx, out, in, inl);
if (i < 0)
return 0;
else
... | CWE-189 | 178,388 | 390 | 136934056290217214609523870578341166755 | null | null | null |
openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | 1 | void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
const unsigned char *in, int inl)
{
int i, j;
unsigned int total = 0;
*outl = 0;
if (inl <= 0)
return;
OPENSSL_assert(ctx->length <= (int)sizeof(ctx->enc_data));
if ((ctx->num + inl) < ctx... | CWE-189 | 178,389 | 391 | 270135404994675151022539958893968212454 | null | null | null |
infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | 1 | void *nlmsg_reserve(struct nl_msg *n, size_t len, int pad)
{
void *buf = n->nm_nlh;
size_t nlmsg_len = n->nm_nlh->nlmsg_len;
size_t tlen;
tlen = pad ? ((len + (pad - 1)) & ~(pad - 1)) : len;
if ((tlen + nlmsg_len) > n->nm_size)
n->nm_nlh->nlmsg_len += tlen;
if (tlen > len)
mems... | CWE-190 | 178,390 | 392 | 240126035042790297576269866332571113695 | null | null | null |
gnupg | da780c8183cccc8f533c8ace8211ac2cb2bdee7b | 1 | ecc_decrypt_raw (gcry_sexp_t *r_plain, gcry_sexp_t s_data, gcry_sexp_t keyparms)
{
unsigned int nbits;
gpg_err_code_t rc;
struct pk_encoding_ctx ctx;
gcry_sexp_t l1 = NULL;
gcry_mpi_t data_e = NULL;
ECC_secret_key sk;
gcry_mpi_t mpi_g = NULL;
char *curvename = NULL;
mpi_ec_t ec = NULL;
mpi_point_str... | CWE-200 | 178,392 | 393 | 65141540687160865752138954513842149463 | null | null | null |
savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | 1 | cf2_initGlobalRegionBuffer( CFF_Decoder* decoder,
CF2_UInt idx,
CF2_Buffer buf )
{
FT_ASSERT( decoder && decoder->globals );
FT_ZERO( buf );
idx += decoder->globals_bias;
if ( idx >= decoder->num_globals )
return TR... | CWE-20 | 178,393 | 394 | 57508056900925331860444886992748368704 | null | null | null |
ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | 1 | xps_parse_color(xps_document *doc, char *base_uri, char *string,
fz_colorspace **csp, float *samples)
{
char *p;
int i, n;
char buf[1024];
char *profile;
*csp = fz_device_rgb(doc->ctx);
samples[0] = 1;
samples[1] = 0;
samples[3] = 0;
if (st... | CWE-119 | 178,400 | 398 | 173680462593951007227148221492379395830 | null | null | null |
lxde | f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648 | 1 | gboolean lxterminal_socket_initialize(LXTermWindow * lxtermwin, gint argc, gchar * * argv)
{
/* Normally, LXTerminal uses one process to control all of its windows.
* The first process to start will create a Unix domain socket in /tmp.
* It will then bind and listen on this socket.
* The subsequent p... | CWE-284 | 178,404 | 402 | 132577294360438396002961072749352070730 | null | null | null |
savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | 1 | nsPluginInstance::setupCookies(const std::string& pageurl)
{
std::string::size_type pos;
pos = pageurl.find("/", pageurl.find("//", 0) + 2) + 1;
std::string url = pageurl.substr(0, pos);
std::string ncookie;
char *cookie = 0;
uint32_t length = 0;
NPError rv = NPERR_GENERIC_ERROR;
#if NPA... | CWE-264 | 178,405 | 403 | 40274614371620023740345762208670376695 | null | null | null |
ghostscript | d621292fb2c8157d9899dcd83fd04dd250e30fe4 | 1 | pdf14_pop_transparency_group(gs_gstate *pgs, pdf14_ctx *ctx,
const pdf14_nonseparable_blending_procs_t * pblend_procs,
int tos_num_color_comp, cmm_profile_t *curr_icc_profile, gx_device *dev)
{
pdf14_buf *tos = ctx->stack;
pdf14_buf *nos = tos->saved;
pdf14_mask_t *mask_stack = tos->mask_stack;
... | CWE-476 | 178,407 | 404 | 248910136039266602369854574320600069873 | null | null | null |
xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | 1 | LockServer(void)
{
char tmp[PATH_MAX], pid_str[12];
int lfd, i, haslock, l_pid, t;
char *tmppath = NULL;
int len;
char port[20];
if (nolock) return;
/*
* Path names
*/
tmppath = LOCK_DIR;
sprintf(port, "%d", atoi(display));
len = strlen(LOCK_PREFIX) > strlen(LOCK_TMP_PREFIX) ? strlen(LOCK_PR... | CWE-362 | 178,408 | 405 | 72009230071133363257853371640950296465 | null | null | null |
xserver | 6ba44b91e37622ef8c146d8f2ac92d708a18ed34 | 1 | LockServer(void)
{
char tmp[PATH_MAX], pid_str[12];
int lfd, i, haslock, l_pid, t;
char *tmppath = NULL;
int len;
char port[20];
if (nolock) return;
/*
* Path names
*/
tmppath = LOCK_DIR;
sprintf(port, "%d", atoi(display));
len = strlen(LOCK_PREFIX) > strlen(LOCK_TMP_PREFIX) ? strlen(LOCK_PR... | CWE-59 | 178,409 | 406 | 20891641801682437742426402633668824466 | null | null | null |
libXpm | d1167418f0fd02a27f617ec5afd6db053afbe185 | 1 | XpmCreateDataFromXpmImage(
char ***data_return,
XpmImage *image,
XpmInfo *info)
{
/* calculation variables */
int ErrorStatus;
char buf[BUFSIZ];
char **header = NULL, **data, **sptr, **sptr2, *s;
unsigned int header_size, header_nlines;
unsigned int data_size, data_nlines;
un... | CWE-787 | 178,410 | 407 | 265801679414920102856048697133914647403 | null | null | null |
libav | 635bcfccd439480003b74a665b5aa7c872c1ad6b | 1 | static int dv_extract_audio_info(DVDemuxContext* c, uint8_t* frame)
{
const uint8_t* as_pack;
int freq, stype, smpls, quant, i, ach;
as_pack = dv_extract_pack(frame, dv_audio_source);
if (!as_pack || !c->sys) { /* No audio ? */
c->ach = 0;
return 0;
}
smpls = as_pack[1] & 0... | CWE-20 | 178,415 | 408 | 278522087006542116303016430885015911931 | null | null | null |
libav | 5a396bb3a66a61a68b80f2369d0249729bf85e04 | 1 | int avpriv_dv_produce_packet(DVDemuxContext *c, AVPacket *pkt,
uint8_t* buf, int buf_size)
{
int size, i;
uint8_t *ppcm[4] = {0};
if (buf_size < DV_PROFILE_BYTES ||
!(c->sys = avpriv_dv_frame_profile(c->sys, buf, buf_size)) ||
buf_size < c->sys->frame_size) {
... | CWE-119 | 178,416 | 409 | 106330760518707613007105817589614452739 | null | null | null |
harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | 1 | static HB_Error Lookup_MarkMarkPos( GPOS_Instance* gpi,
HB_GPOS_SubTable* st,
HB_Buffer buffer,
HB_UShort flags,
HB_UShort context_length,
int nesting_level )
{
HB_UShort i, j, mark1_index, mark2_index, property, class;
HB_... | CWE-119 | 178,418 | 410 | 311194674003134329769297107152985881683 | null | null | null |
openssl | 259b664f950c2ba66fbf4b0fe5281327904ead21 | 1 | SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username)
{
int i;
SRP_user_pwd *user;
unsigned char digv[SHA_DIGEST_LENGTH];
unsigned char digs[SHA_DIGEST_LENGTH];
EVP_MD_CTX ctxt;
if (vb == NULL)
return NULL;
for (i = 0; i < sk_SRP_user_pwd_num(vb->users_pwd); i++)... | CWE-399 | 178,420 | 412 | 289337390467611969166521682004549666137 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.