mirror of
https://github.com/reactos/reactos.git
synced 2024-12-28 10:04:49 +00:00
[BROWSEUI] SHExplorerParseCmdLine: Fix parsing of /root (#6752)
Remove excessive (!pInfo->pidlPath) check in SHExplorerParseCmdLine function. JIRA issue: CORE-16939
This commit is contained in:
parent
ea34ecc9ec
commit
1b85a5fa06
1 changed files with 1 additions and 6 deletions
|
@ -252,9 +252,8 @@ SHExplorerParseCmdLine(_Out_ PEXPLORER_CMDLINE_PARSE_RESULTS pInfo)
|
|||
|
||||
PCWSTR strNextArg = _FindFirstField(strFieldArray);
|
||||
|
||||
BOOL hasNext = TRUE;
|
||||
BOOL hasNext = _ReadNextArg(&strNextArg, strField, _countof(strField));
|
||||
|
||||
hasNext = _ReadNextArg(&strNextArg, strField, _countof(strField));
|
||||
while (TRUE)
|
||||
{
|
||||
// Basic flags-only params first
|
||||
|
@ -319,9 +318,6 @@ SHExplorerParseCmdLine(_Out_ PEXPLORER_CMDLINE_PARSE_RESULTS pInfo)
|
|||
|
||||
TRACE("CmdLine Parser: Found %S flag\n", strField);
|
||||
|
||||
if (!pInfo->pidlPath)
|
||||
return FALSE;
|
||||
|
||||
if (!hasNext)
|
||||
return FALSE;
|
||||
|
||||
|
@ -414,7 +410,6 @@ SHExplorerParseCmdLine(_Out_ PEXPLORER_CMDLINE_PARSE_RESULTS pInfo)
|
|||
TRACE("CmdLine Parser: Parsed target path. dwFlags=%08lx, strPath=%S\n", pInfo->dwFlags, field);
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in a new issue