Thus said Ralph Corderoy on Sun, 13 Nov 2022 21:29:23 +0000:

> Is this only seen with inc(1) reading from a particular source?

I believe the only  problem that I found was inc and  reading from a POP
source; sorry  for not  being more clear.  Specifically in  popsbr.c and
pop_getline(), it  would call netsec_readline()  which uses a  buffer of
65535 for  holding data, and  then pop_getline()  would stuff it  into a
buffer that was BUFSIZ (1024 on my system), thus truncating whatever was
returned to 1024.

For most cases, this actually  worked out fine because netsec_readline()
would always find a newline before  1024 bytes and return a pointer with
a length  of <  1024. But  in the  case of  really long  lines (probably
pretty rare in SMTP and POP), it would truncate them.

Andy


Reply via email to