From 4b8e1aabb93fdb1f4bc4dd0df03d9a62f50a75e0 Mon Sep 17 00:00:00 2001 From: Jee Hyeok Kim Date: Fri, 11 Mar 2016 16:57:26 +0900 Subject: [PATCH] Remove broken validation check logic If requestUri contains host string like 'coap+tcp://127.0.0.1:5683', This function also adds host length to validate regardless it is not affect packet size. Change-Id: Id053ba6959181311d36d26a4b1a2853fb2e1af7d Signed-off-by: Jee Hyeok Kim Reviewed-on: https://gerrit.iotivity.org/gerrit/5717 Reviewed-by: Ziran Sun Tested-by: jenkins-iotivity --- resource/csdk/stack/src/ocstack.c | 7 ------- 1 file changed, 7 deletions(-) diff --git a/resource/csdk/stack/src/ocstack.c b/resource/csdk/stack/src/ocstack.c index 65aaa22..a5b7a66 100644 --- a/resource/csdk/stack/src/ocstack.c +++ b/resource/csdk/stack/src/ocstack.c @@ -2471,13 +2471,6 @@ OCStackResult OCDoResource(OCDoHandle *handle, char *resourceUri = NULL; char *resourceType = NULL; - // This validation is broken, but doesn't cause harm - size_t uriLen = strlen(requestUri ); - if ((result = verifyUriQueryLength(requestUri , uriLen)) != OC_STACK_OK) - { - goto exit; - } - /* * Support original behavior with address on resourceUri argument. */ -- 2.7.4