diff --git a/src/pkzip_fmt_plug.c b/src/pkzip_fmt_plug.c index 6ee66d9..3a800b5 100644 --- a/src/pkzip_fmt_plug.c +++ b/src/pkzip_fmt_plug.c @@ -1312,8 +1312,8 @@ SkipKeyLoadInit:; SigChecked = 0; if ( (C & 6) == 0) { // Check that checksum2 is 0 or 1. If not, I 'think' we can be done - if (C > 1) - goto Failed_Bailout; + //if (C > 1) + //goto Failed_Bailout; // now get 4 bytes. This is the length. It is made up of 2 16 bit values. // these 2 values are checksumed, so it is easy to tell if the data is WRONG. // correct data is u16_1 == (u16_2^0xFFFF) @@ -1326,8 +1326,8 @@ SkipKeyLoadInit:; } v1 = curDecryBuf[1] | (((u16)curDecryBuf[2])<<8); v2 = curDecryBuf[3] | (((u16)curDecryBuf[4])<<8); - if (v1 != (v2^0xFFFF)) - goto Failed_Bailout; + //if (v1 != (v2^0xFFFF)) + //goto Failed_Bailout; #if USE_PKZIP_MAGIC // Ok, if we have a signature, check it here, WITHOUT having to call zLib's inflate. if (salt->H[cur_hash_idx].pSig->max_len) {