From 4fe93c4bc6c88133432e141c790886d4c058c07c Mon Sep 17 00:00:00 2001 From: "Heiko Schlittermann (HS12-RIPE)" Date: Wed, 4 Apr 2018 21:39:36 +0200 Subject: compiler quietening --- src/src/malware.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'src') diff --git a/src/src/malware.c b/src/src/malware.c index 68eda4049..99fa1c347 100644 --- a/src/src/malware.c +++ b/src/src/malware.c @@ -1927,9 +1927,9 @@ b_seek: err = errno; uschar * scanrequest; enum {AVA_HELO, AVA_OPT, AVA_RSP, AVA_DONE} avast_stage; int nread; - int more_data; uschar * error_message = NULL; - int strict = TRUE; + BOOL more_data = FALSE; + BOOL strict = TRUE; /* According to Martin Tuma @avast the protocol uses "escaped whitespace", that is, every embedded whitespace is backslash @@ -2057,7 +2057,7 @@ b_seek: err = errno; if (pcre_exec(ava_re_clean, NULL, CS buf, slen, 0, 0, NULL, 0) == 0) break; - if (malware_name = m_pcre_exec(ava_re_virus, buf)) + if ((malware_name = m_pcre_exec(ava_re_virus, buf))) { unescape(malware_name); DEBUG(D_acl) @@ -2067,7 +2067,7 @@ b_seek: err = errno; if (strict) /* treat scanner errors as malware */ { - if (malware_name = m_pcre_exec(ava_re_error, buf)) + if ((malware_name = m_pcre_exec(ava_re_error, buf))) { unescape(malware_name); DEBUG(D_acl) -- cgit v1.2.3