Changeset: 733ae48d0015 for MonetDB URL: http://dev.monetdb.org/hg/MonetDB?cmd=changeset;node=733ae48d0015 Modified Files: monetdb5/mal/mal_authorize.c Branch: Jun2016 Log Message:
Compare BUN to BUN. diffs (26 lines): diff --git a/monetdb5/mal/mal_authorize.c b/monetdb5/mal/mal_authorize.c --- a/monetdb5/mal/mal_authorize.c +++ b/monetdb5/mal/mal_authorize.c @@ -579,19 +579,17 @@ str AUTHgetUsername(str *username, Client cntxt) { BUN p; - oid id; BATiter useri; - id = cntxt->user; - p = id; + p = (BUN) cntxt->user; /* If you ask for a username using a client struct, and that user * doesn't exist, you seriously screwed up somehow. If this * happens, it may be a security breach/attempt, and hence * terminating the entire system seems like the right thing to do to * me. */ - if (p == BUN_NONE || id >= BATcount(user)) - GDKfatal("Internal error: user id that doesn't exist: " OIDFMT, id); + if (p == BUN_NONE || p >= BATcount(user)) + GDKfatal("Internal error: user id that doesn't exist: " OIDFMT, cntxt->user); useri = bat_iterator(user); if ((*username = GDKstrdup( BUNtail(useri, p))) == NULL) _______________________________________________ checkin-list mailing list checkin-list@monetdb.org https://www.monetdb.org/mailman/listinfo/checkin-list