---
src/libdspam.c | 6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/libdspam.c b/src/libdspam.c
index 5d83113..8f6bab7 100644
--- a/src/libdspam.c
+++ b/src/libdspam.c
@@ -483,13 +483,13 @@ dspam_process (DSPAM_CTX * CTX, const char *message)
return EINVAL;
}
- if (CTX->classification != DSR_NONE && CTX->source == DSR_NONE)
+ if (CTX->classification != DSR_NONE && CTX->source == DSS_NONE)
{
LOG(LOG_WARNING, "A classification requires a source be specified");
return EINVAL;
}
- if (CTX->classification == DSR_NONE && CTX->source != DSR_NONE)
+ if (CTX->classification == DSR_NONE && CTX->source != DSS_NONE)
{
LOG(LOG_WARNING, "A source requires a classification be specified");
return EINVAL;
@@ -1192,7 +1192,7 @@ _ds_process_signature (DSPAM_CTX * CTX)
LOGDEBUG ("processing signature. length: %ld", CTX->signature->length);
- CTX->result = DSS_NONE;
+ CTX->result = DSR_NONE;
if (!(CTX->flags & DSF_UNLEARN))
CTX->learned = 1;
--
1.6.3.3
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Dspam-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspam-devel