Author: vlendec
Date: 2005-01-31 08:29:40 +0000 (Mon, 31 Jan 2005)
New Revision: 5124

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=5124

Log:
Fix bug 2113 -- thanks to [EMAIL PROTECTED]
Modified:
   trunk/source/rpc_parse/parse_lsa.c


Changeset:
Modified: trunk/source/rpc_parse/parse_lsa.c
===================================================================
--- trunk/source/rpc_parse/parse_lsa.c  2005-01-31 08:18:52 UTC (rev 5123)
+++ trunk/source/rpc_parse/parse_lsa.c  2005-01-31 08:29:40 UTC (rev 5124)
@@ -214,16 +214,12 @@
 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct 
*ps, 
                            int depth)
 {
-       uint32 start;
-
        prs_debug(ps, depth, desc, "lsa_io_obj_attr");
        depth++;
 
        if(!prs_align(ps))
                return False;
        
-       start = prs_offset(ps);
-
        /* these pointers had _better_ be zero, because we don't know
           what they point to!
         */
@@ -240,15 +236,6 @@
        if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* 
security quality of service (pointer) */
                return False;
 
-       /* code commented out as it's not necessary true (tested with hyena). 
JFM, 11/22/2001 */
-#if 0
-       if (attr->len != prs_offset(ps) - start) {
-               DEBUG(3,("lsa_io_obj_attr: length %x does not match size %x\n",
-                        attr->len, prs_offset(ps) - start));
-               return False;
-       }
-#endif
-
        if (attr->ptr_sec_qos != 0) {
                if (UNMARSHALLING(ps))
                        if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))

Reply via email to