http://bugzilla.spamassassin.org/show_bug.cgi?id=3527
------- Additional Comments From [EMAIL PROTECTED] 2004-06-28 02:03 ------- I see the problem this caused with spamd_protocol_10.t and the proper fix. The short version of the explanation is that the code in 2.63 is correct and this code is a kludge that is not only more tricky but also is slightly off. I'll prepare a patch for review. Here's the long version of the explanation: spamd_protocol_10 tests protocol verion 1.0 which did not have content_length. The line that this patch changed compares a counter variable with a dereferenced reference. When there is a content_length, that is what the reference points to. When there isn't, the reference points to the counter variable itself. The comparison is supposed to always fail in that case, causing the loop to keep going until EOF. By changing the > to a >= the comparison always is true instead of always being false, causing tghe loop to stop before any input is read instead of continuing until EOF. This does imply that spamd will not work with SSL without the correct content_length, i.e., it will onl work with protocol version greater than 1.0. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
