http://bugzilla.spamassassin.org/show_bug.cgi?id=3828
------- Additional Comments From [EMAIL PROTECTED] 2004-12-08 13:03 -------
there's quite a bit of code between check_end and that next logmsg. Notably
this:
# Build the message to send back and measure it
my $msg_resp = $status->rewrite_mail();
my $msg_resp_length = length($msg_resp);
if ( $version >= 1.3 ) # Spamc protocol 1.3 means multi hdrs are OK
{
syswrite( $client, "SPAMD/1.1 $resphash{$resp} $resp\r\n" .
"Content-length: $msg_resp_length\r\n" . $spamhdr . "\r\n\r\n" .
$msg_resp );
}
elsif (
$version >= 1.2 ) # Spamc protocol 1.2 means it accepts content-length
{
syswrite( $client, "SPAMD/1.1 $resphash{$resp} $resp\r\n" .
"Content-length: $msg_resp_length\r\n\r\n" . $msg_resp );
}
else # Earlier than 1.2 didn't accept content-length
{
syswrite( $client, "SPAMD/1.0 $resphash{$resp} $resp\r\n" . $msg_resp );
}
IOW, syswrite() calls to send data to the client. I think that's more likely,
since it involves socket I/O.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.