https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6421
Mark Martinec <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- Target Milestone|3.4.1 |3.4.0 --- Comment #12 from Mark Martinec <[email protected]> --- I tried this on our system (openssl-1.0.1_2) and a 4 MB message was successfully passed from spamc to spamd over ssl. Even though the reason for a spamc cutoff threshold of about 160 kB on reporter's systems remains unexplained, looking as the libspamc.c code I can see that calls to SSL_write (and other SSL routines) lack any status checking, so anything is possible and any error reported by openssl remains stashed under a carpet. Not good. -- You are receiving this mail because: You are the assignee for the bug.
