From: Ilia Alshanetsky Date: Mon, 13 Oct 2003 04:15:09 +0000 (+0000) Subject: Remove sendmail patch check. X-Git-Tag: RELEASE_1_3b3~69 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=3158ff714ec9e4f1110a0b684e45b867c8cc6718;p=php Remove sendmail patch check. --- diff --git a/ext/standard/mail.c b/ext/standard/mail.c index 0585be99a7..8556eff180 100644 --- a/ext/standard/mail.c +++ b/ext/standard/mail.c @@ -198,31 +198,6 @@ PHPAPI int php_mail(char *to, char *subject, char *message, char *headers, char #ifdef PHP_WIN32 sendmail = popen(sendmail_cmd, "wb"); #else - /* make sure that sendmail_path contains a valid executable, failure to do - * would make PHP abruptly exit without a useful error message. */ - { - char *s=NULL, *p; - - if ((s = strchr(sendmail_path, ' '))) { - p = estrndup(sendmail_path, s - sendmail_path); - } else { - p = sendmail_path; - } - if (VCWD_ACCESS(p, X_OK)) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Permission denied: unable to execute shell to run mail delivery binary '%s'", sendmail_path); - if (extra_cmd != NULL) { - efree(sendmail_cmd); - } - if (s) { - efree(p); - } - return 0; - } - if (s) { - efree(p); - } - } - /* Since popen() doesn't indicate if the internal fork() doesn't work * (e.g. the shell can't be executed) we explicitely set it to 0 to be * sure we don't catch any older errno value. */