|
|
@@ -1155,11 +1155,6 @@ saEvtEventAttributesGet(
|
|
|
}
|
|
|
pthread_mutex_lock(&edi->edi_mutex);
|
|
|
|
|
|
- /*
|
|
|
- * TODO: Check to make sure that the corresponding channel handle
|
|
|
- * TODO: is still valid (i.e. open)
|
|
|
- */
|
|
|
-
|
|
|
/*
|
|
|
* Go through the args and send back information if the pointer
|
|
|
* isn't NULL
|
|
|
@@ -1243,11 +1238,6 @@ saEvtEventDataGet(
|
|
|
}
|
|
|
pthread_mutex_lock(&edi->edi_mutex);
|
|
|
|
|
|
- /*
|
|
|
- * TODO: Check to make sure that the corresponding channel handle
|
|
|
- * TODO: is still valid (i.e. open)
|
|
|
- */
|
|
|
-
|
|
|
if (edi->edi_event_data && edi->edi_event_data_size) {
|
|
|
xfsize = min(*event_data_size, edi->edi_event_data_size);
|
|
|
*event_data_size = edi->edi_event_data_size;
|
|
|
@@ -1587,12 +1577,6 @@ saEvtEventSubscribe(
|
|
|
*/
|
|
|
sz = filt_size(filters);
|
|
|
|
|
|
- /*
|
|
|
- * TODO: Check to make sure that no filter string exceeds
|
|
|
- * TODO: the maximum allowed by the specification
|
|
|
- */
|
|
|
-
|
|
|
-
|
|
|
req = malloc(sizeof(*req) + sz);
|
|
|
|
|
|
if (!req) {
|