search for: pool_alloconly_cr

Displaying 13 results from an estimated 13 matches for "pool_alloconly_cr".

2018 Sep 10
1
make check (pigeonhole)
...5) ==29930==??? by 0x402FE5: main (test-edit-mail.c:765) ==29930== ==29930== 128 bytes in 1 blocks are possibly lost in loss record 48 of 77 ==29930==??? at 0x4C2B9B5: calloc (vg_replace_malloc.c:711) ==29930==??? by 0x5277456: block_alloc.isra.1 (mempool-alloconly.c:254) ==29930==??? by 0x527768C: pool_alloconly_create (mempool-alloconly.c:138) ==29930==??? by 0x403159: test_init (test-edit-mail.c:101) ==29930==??? by 0x4036DA: test_edit_mail_concatenated (test-edit-mail.c:187) ==29930==??? by 0x524D8B1: test_run_funcs (test-common.c:244) ==29930==??? by 0x524E280: test_run (test-common.c:315) ==29930==??? by...
2018 Sep 10
0
make check (pigeonhole)
...E5: main (test-edit-mail.c:765) > ==29930== > ==29930== 128 bytes in 1 blocks are possibly lost in loss record 48 of 77 > ==29930==??? at 0x4C2B9B5: calloc (vg_replace_malloc.c:711) > ==29930==??? by 0x5277456: block_alloc.isra.1 (mempool-alloconly.c:254) > ==29930==??? by 0x527768C: pool_alloconly_create (mempool-alloconly.c:138) > ==29930==??? by 0x403159: test_init (test-edit-mail.c:101) > ==29930==??? by 0x4036DA: test_edit_mail_concatenated > (test-edit-mail.c:187) > ==29930==??? by 0x524D8B1: test_run_funcs (test-common.c:244) > ==29930==??? by 0x524E280: test_run (test-com...
2018 Sep 09
3
make check (pigeonhole)
Hello list, During the 'make check' (pigeonhole) portion of a building (rpmbuild) a dovecot.spec file I'm getting the following error: testsuite(root): Fatal: Couldn't drop privileges: User is missing UID (see mail_uid setting) I'm not sure how to resolve this, and any help would be appreciated to help me finish the creating the rpm -- Eric Broch White Horse Technical
2012 Sep 05
2
Memory leak by getting the virtual size of a IMAP folder
...------------------------------------- ==10304== 12,288 bytes in 3 blocks are definitely lost in loss record 74 of 76 ==10304== at 0x40222A4: calloc (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so) ==10304== by 0x416EE9F: block_alloc (mempool-alloconly.c:237) ==10304== by 0x416F16C: pool_alloconly_create (mempool-alloconly.c:140) ==10304== by 0x409C07D: mail_search_build_init (mail-search-build.c:187) ==10304== by 0x40C77F1: index_mailbox_get_metadata (index-status.c:200) ==10304== by 0x4067102: maildir_mailbox_get_metadata (maildir-storage.c:486) ==10304== by 0x409F78B: mailbox_ge...
2004 Jul 22
1
[PATCH] add LOGIN authentication mechanism
...lback(&reply, prompt1, auth_request->conn); + + return TRUE; +} + +static void mech_login_auth_free(struct auth_request *auth_request) +{ + pool_unref(auth_request->pool); +} + +static struct auth_request *mech_login_auth_new(void) +{ + struct auth_request *auth; + pool_t pool; + + pool = pool_alloconly_create("login_auth_request", 256); + auth = p_new(pool, struct auth_request, 1); + + auth->refcount = 1; + auth->pool = pool; + auth->auth_initial = mech_login_auth_initial; + auth->auth_continue = mech_login_auth_continue; + auth->auth_free = mech_login_auth_free; + + return...
2014 May 02
2
When the subject portion of an e-mail contains a control character, dovecot.sieve terminates unexpectatedly.
Hello. We have currently set dovecot.sieve to insert the text "[SPAM]" at the beginning of an e-mail's subject when it's X-Spam-Score is above 80%. After we set our system as stated the following errors occur: 1) When an e-mail's subject contains control characters like [Ctrl+V|^V], dovecot.sieve terminates with an error and an e-mail is not able to be sent. When a MIME
2017 Sep 13
2
[RFC master-2.2 0/1] Support OpenSSL 1.1 API for setting allowed TLS versions
Hi, I came up with the following patch while trying to figure out a good solution for the situation described in Debian bug #871987[1]. In short, OpenSSL in Debian unstable has disabled TLSv1.0 and TLSv1.1 *by default*. That means that unless an application requests otherwise, only TLSv1.2 is supported. In the world of e-mail this is seemingly an issue, as there are still way too many old clients
2004 Jul 01
3
[PATCH, RFC] add APOP authentication mechanism
...PLAINTEXT, + apop_credentials_callback); + + return TRUE; +} + +static void +mech_apop_auth_free(struct auth_request *auth_request) +{ + pool_unref(auth_request->pool); +} + +static struct auth_request *mech_apop_auth_new(void) +{ + struct apop_auth_request *auth; + pool_t pool; + + pool = pool_alloconly_create("apop_auth_request", 256); + auth = p_new(pool, struct apop_auth_request, 1); + auth->pool = pool; + + auth->auth_request.refcount = 1; + auth->auth_request.pool = pool; + auth->auth_request.auth_initial = mech_apop_auth_initial; + auth->auth_request.auth_continue = NUL...
2006 Feb 03
0
rquotad (NFS) quota plugin
...ar *name, + struct rquotad_quota *quota); + static void rquotad_quota_root_update(struct rquotad_quota_root *root); + + static struct quota *rquotad_quota_init(const char *data) + { + struct rquotad_quota *quota; + const char *const *qroots; + size_t qr_idx; + pool_t pool; + + pool = pool_alloconly_create("quota", 1024); + quota = p_new(pool, struct rquotad_quota, 1); + quota->pool = pool; + quota->quota = rquotad_quota; + + debugmsg("starting quota init"); + qroots = t_strsplit(data, ","); + for (qr_idx = 0; qroots[qr_idx] != NULL; qr_idx++) { + /* N...
2018 Mar 04
1
2.2.34 fails to build on OpenBSD
...ream_openssl.so: undefined reference to `i_stream_set_input_pending' .libs/libssl_iostream_openssl.so: undefined reference to `i_stream_set_name' .libs/libssl_iostream_openssl.so: undefined reference to `buffer_create_dynamic' .libs/libssl_iostream_openssl.so: undefined reference to `pool_alloconly_create' .libs/libssl_iostream_openssl.so: undefined reference to `o_stream_set_no_error_handling' .libs/libssl_iostream_openssl.so: undefined reference to `default_pool' .libs/libssl_iostream_openssl.so: undefined reference to `ssl_iostream_has_valid_client_cert' .libs/libssl_iostrea...
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...ruct rpa_auth_request *auth = + (struct rpa_auth_request *)auth_request; + + if (auth->pwd_md5) + safe_memset(auth->pwd_md5, 0, 16); + + pool_unref(auth_request->pool); +} + +static struct auth_request *mech_rpa_auth_new(void) +{ + struct rpa_auth_request *auth; + pool_t pool; + + pool = pool_alloconly_create("rpa_auth_request", 256); + auth = p_new(pool, struct rpa_auth_request, 1); + auth->pool = pool; + auth->phase = 0; + + auth->auth_request.refcount = 1; + auth->auth_request.pool = pool; + auth->auth_request.auth_initial = mech_rpa_auth_initial; + auth->auth_request....
2010 Apr 14
4
PostgreSQL driver supporting [round-robin] load balancing and redundancy [LONG]
...c_ioloop); +} + +/*** non-transaction SQL driver methods */ +extern struct sql_db driver_multi_pgsql_db; + +static struct sql_db *multi_pgsql_init_v(char const *connect_string) +{ + struct multi_pgsql_db *pgdb; + pool_t pool; + + dprintf(("%s: %s", __func__, connect_string)); + + pool = pool_alloconly_create("multi_pgsql_pool", MULTI_PGSQL_POOL); + + pgdb = p_new(pool, struct multi_pgsql_db, 1); + pgdb->api = driver_multi_pgsql_db; + pgdb->pool = pool; + + pgdb->query_q.link_to = &pgdb->query_q.first; + pgdb->pgc_q.link_to = &pgdb->pgc_q.first; + + init_pgcs(p...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...t;, NULL); diff -Nur dovecot-1.2.11/src/imap/client.c dovecot-1.2.11+lemonade/src/imap/client.c --- dovecot-1.2.11/src/imap/client.c 2010-01-24 17:14:17.000000000 -0600 +++ dovecot-1.2.11+lemonade/src/imap/client.c 2010-04-08 09:59:12.000000000 -0500 @@ -53,6 +53,7 @@ client->command_pool = pool_alloconly_create(MEMPOOL_GROWING"client command", 2048); client->user = user; + client->submit = getenv("SUBMIT_USER") != NULL; /* APPLE - urlauth */ for (ns = user->namespaces; ns != NULL; ns = ns->next) { mail_storage_set_callbacks(ns->storage, @@ -225,6 +226,10 @...