--- src/libdspam.c | 6 +++--- 1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/libdspam.c b/src/libdspam.c index 5d83113..8f6bab7 100644 --- a/src/libdspam.c +++ b/src/libdspam.c @@ -483,13 +483,13 @@ dspam_process (DSPAM_CTX * CTX, const char *message) return EINVAL; } - if (CTX->classification != DSR_NONE && CTX->source == DSR_NONE) + if (CTX->classification != DSR_NONE && CTX->source == DSS_NONE) { LOG(LOG_WARNING, "A classification requires a source be specified"); return EINVAL; } - if (CTX->classification == DSR_NONE && CTX->source != DSR_NONE) + if (CTX->classification == DSR_NONE && CTX->source != DSS_NONE) { LOG(LOG_WARNING, "A source requires a classification be specified"); return EINVAL; @@ -1192,7 +1192,7 @@ _ds_process_signature (DSPAM_CTX * CTX) LOGDEBUG ("processing signature. length: %ld", CTX->signature->length); - CTX->result = DSS_NONE; + CTX->result = DSR_NONE; if (!(CTX->flags & DSF_UNLEARN)) CTX->learned = 1; -- 1.6.3.3 ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ Dspam-devel mailing list Dspam-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/dspam-devel