[BROWSEUI] SHExplorerParseCmdLine: Fix parsing of /root (#6752)

Remove excessive (!pInfo->pidlPath) check in SHExplorerParseCmdLine
function.
JIRA issue: CORE-16939
This commit is contained in:
Katayama Hirofumi MZ 2024-04-15 09:41:01 +09:00 committed by GitHub
parent ea34ecc9ec
commit 1b85a5fa06
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -252,9 +252,8 @@ SHExplorerParseCmdLine(_Out_ PEXPLORER_CMDLINE_PARSE_RESULTS pInfo)
PCWSTR strNextArg = _FindFirstField(strFieldArray); PCWSTR strNextArg = _FindFirstField(strFieldArray);
BOOL hasNext = TRUE; BOOL hasNext = _ReadNextArg(&strNextArg, strField, _countof(strField));
hasNext = _ReadNextArg(&strNextArg, strField, _countof(strField));
while (TRUE) while (TRUE)
{ {
// Basic flags-only params first // Basic flags-only params first
@ -319,9 +318,6 @@ SHExplorerParseCmdLine(_Out_ PEXPLORER_CMDLINE_PARSE_RESULTS pInfo)
TRACE("CmdLine Parser: Found %S flag\n", strField); TRACE("CmdLine Parser: Found %S flag\n", strField);
if (!pInfo->pidlPath)
return FALSE;
if (!hasNext) if (!hasNext)
return FALSE; return FALSE;
@ -414,7 +410,6 @@ SHExplorerParseCmdLine(_Out_ PEXPLORER_CMDLINE_PARSE_RESULTS pInfo)
TRACE("CmdLine Parser: Parsed target path. dwFlags=%08lx, strPath=%S\n", pInfo->dwFlags, field); TRACE("CmdLine Parser: Parsed target path. dwFlags=%08lx, strPath=%S\n", pInfo->dwFlags, field);
} }
} }
} }
} }