Thus said Ralph Corderoy on Sun, 13 Nov 2022 21:29:23 +0000: > Is this only seen with inc(1) reading from a particular source?
I believe the only problem that I found was inc and reading from a POP source; sorry for not being more clear. Specifically in popsbr.c and pop_getline(), it would call netsec_readline() which uses a buffer of 65535 for holding data, and then pop_getline() would stuff it into a buffer that was BUFSIZ (1024 on my system), thus truncating whatever was returned to 1024. For most cases, this actually worked out fine because netsec_readline() would always find a newline before 1024 bytes and return a pointer with a length of < 1024. But in the case of really long lines (probably pretty rare in SMTP and POP), it would truncate them. Andy
