diff options
author | Heiko Schlittermann (HS12-RIPE) <hs@schlittermann.de> | 2018-04-04 21:39:36 +0200 |
---|---|---|
committer | Heiko Schlittermann (HS12-RIPE) <hs@schlittermann.de> | 2018-04-04 21:43:10 +0200 |
commit | 4fe93c4bc6c88133432e141c790886d4c058c07c (patch) | |
tree | 03afe18b10e9ff8dd5487b0441185b0676b53378 | |
parent | 46682a6793c54ef6cbccad08283ac35205622aac (diff) |
compiler quietening
-rw-r--r-- | src/src/malware.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/src/malware.c b/src/src/malware.c index 68eda4049..99fa1c347 100644 --- a/src/src/malware.c +++ b/src/src/malware.c @@ -1927,9 +1927,9 @@ b_seek: err = errno; uschar * scanrequest; enum {AVA_HELO, AVA_OPT, AVA_RSP, AVA_DONE} avast_stage; int nread; - int more_data; uschar * error_message = NULL; - int strict = TRUE; + BOOL more_data = FALSE; + BOOL strict = TRUE; /* According to Martin Tuma @avast the protocol uses "escaped whitespace", that is, every embedded whitespace is backslash @@ -2057,7 +2057,7 @@ b_seek: err = errno; if (pcre_exec(ava_re_clean, NULL, CS buf, slen, 0, 0, NULL, 0) == 0) break; - if (malware_name = m_pcre_exec(ava_re_virus, buf)) + if ((malware_name = m_pcre_exec(ava_re_virus, buf))) { unescape(malware_name); DEBUG(D_acl) @@ -2067,7 +2067,7 @@ b_seek: err = errno; if (strict) /* treat scanner errors as malware */ { - if (malware_name = m_pcre_exec(ava_re_error, buf)) + if ((malware_name = m_pcre_exec(ava_re_error, buf))) { unescape(malware_name); DEBUG(D_acl) |