*** VERSION 5.6.0 ***
[NeonServV5.git] / src / modules / NeonSpam.mod / cmd_neonspam_badwords.c
index 9767e35d3b1230260da1917219f923c9187f2791..02d4d4626ca44300232c9157b1f98ffec9f7d359 100644 (file)
@@ -1,4 +1,4 @@
-/* cmd_neonspam_badwords.c - NeonServ v5.4
+/* cmd_neonspam_badwords.c - NeonServ v5.6
  * Copyright (C) 2011-2012  Philipp Kreil (pk910)
  * 
  * This program is free software: you can redistribute it and/or modify
@@ -29,7 +29,7 @@ CMD_BIND(neonspam_cmd_badwords) {
         printf_mysql_query("SELECT `badword_match` FROM `spamserv_badwords` WHERE `badword_id` = '%d' AND `badword_cid` = '%d'", badword_id, chan->channel_id);
         res = mysql_use();
         if(!(row = mysql_fetch_row(res))) {
-            reply(getTextBot(), user, "SS_BADWORD_ID_UNKNOWN", badword_id, chan->name);
+            reply(textclient, user, "SS_BADWORD_ID_UNKNOWN", badword_id, chan->name);
             return;
         }
         //to be continued...
@@ -99,7 +99,7 @@ CMD_BIND(neonspam_cmd_badwords) {
         char **table_lines = table_end(table);
         int i;
         for(i = 0; i < table->entrys; i++) {
-            reply(getTextBot(), user, table_lines[i]);
+            reply(textclient, user, table_lines[i]);
         }
         table_free(table);
     }