Displaying 13 results from an estimated 13 matches for "pool_alloconly_cr".
2018 Sep 10
1
make check (pigeonhole)
...5)
==29930==??? by 0x402FE5: main (test-edit-mail.c:765)
==29930==
==29930== 128 bytes in 1 blocks are possibly lost in loss record 48 of 77
==29930==??? at 0x4C2B9B5: calloc (vg_replace_malloc.c:711)
==29930==??? by 0x5277456: block_alloc.isra.1 (mempool-alloconly.c:254)
==29930==??? by 0x527768C: pool_alloconly_create (mempool-alloconly.c:138)
==29930==??? by 0x403159: test_init (test-edit-mail.c:101)
==29930==??? by 0x4036DA: test_edit_mail_concatenated (test-edit-mail.c:187)
==29930==??? by 0x524D8B1: test_run_funcs (test-common.c:244)
==29930==??? by 0x524E280: test_run (test-common.c:315)
==29930==??? by...
2018 Sep 10
0
make check (pigeonhole)
...E5: main (test-edit-mail.c:765)
> ==29930==
> ==29930== 128 bytes in 1 blocks are possibly lost in loss record 48 of 77
> ==29930==??? at 0x4C2B9B5: calloc (vg_replace_malloc.c:711)
> ==29930==??? by 0x5277456: block_alloc.isra.1 (mempool-alloconly.c:254)
> ==29930==??? by 0x527768C: pool_alloconly_create (mempool-alloconly.c:138)
> ==29930==??? by 0x403159: test_init (test-edit-mail.c:101)
> ==29930==??? by 0x4036DA: test_edit_mail_concatenated
> (test-edit-mail.c:187)
> ==29930==??? by 0x524D8B1: test_run_funcs (test-common.c:244)
> ==29930==??? by 0x524E280: test_run (test-com...
2018 Sep 09
3
make check (pigeonhole)
Hello list,
During the 'make check' (pigeonhole) portion of a building (rpmbuild) a
dovecot.spec file I'm getting the following error:
testsuite(root): Fatal: Couldn't drop privileges: User is missing UID
(see mail_uid setting)
I'm not sure how to resolve this, and any help would be appreciated to
help me finish the creating the rpm
--
Eric Broch
White Horse Technical
2012 Sep 05
2
Memory leak by getting the virtual size of a IMAP folder
...-------------------------------------
==10304== 12,288 bytes in 3 blocks are definitely lost in loss record 74
of 76
==10304== at 0x40222A4: calloc (in
/usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==10304== by 0x416EE9F: block_alloc (mempool-alloconly.c:237)
==10304== by 0x416F16C: pool_alloconly_create (mempool-alloconly.c:140)
==10304== by 0x409C07D: mail_search_build_init (mail-search-build.c:187)
==10304== by 0x40C77F1: index_mailbox_get_metadata (index-status.c:200)
==10304== by 0x4067102: maildir_mailbox_get_metadata
(maildir-storage.c:486)
==10304== by 0x409F78B: mailbox_ge...
2004 Jul 22
1
[PATCH] add LOGIN authentication mechanism
...lback(&reply, prompt1, auth_request->conn);
+
+ return TRUE;
+}
+
+static void mech_login_auth_free(struct auth_request *auth_request)
+{
+ pool_unref(auth_request->pool);
+}
+
+static struct auth_request *mech_login_auth_new(void)
+{
+ struct auth_request *auth;
+ pool_t pool;
+
+ pool = pool_alloconly_create("login_auth_request", 256);
+ auth = p_new(pool, struct auth_request, 1);
+
+ auth->refcount = 1;
+ auth->pool = pool;
+ auth->auth_initial = mech_login_auth_initial;
+ auth->auth_continue = mech_login_auth_continue;
+ auth->auth_free = mech_login_auth_free;
+
+ return...
2014 May 02
2
When the subject portion of an e-mail contains a control character, dovecot.sieve terminates unexpectatedly.
Hello.
We have currently set dovecot.sieve to insert the text "[SPAM]" at the
beginning of an e-mail's subject when it's X-Spam-Score is above 80%.
After we set our system as stated the following errors occur:
1) When an e-mail's subject contains control characters like
[Ctrl+V|^V], dovecot.sieve terminates with an error and an e-mail is not
able to be sent. When a MIME
2017 Sep 13
2
[RFC master-2.2 0/1] Support OpenSSL 1.1 API for setting allowed TLS versions
Hi,
I came up with the following patch while trying to figure out a good solution
for the situation described in Debian bug #871987[1]. In short, OpenSSL in
Debian unstable has disabled TLSv1.0 and TLSv1.1 *by default*. That means that
unless an application requests otherwise, only TLSv1.2 is supported. In the
world of e-mail this is seemingly an issue, as there are still way too many old
clients
2004 Jul 01
3
[PATCH, RFC] add APOP authentication mechanism
...PLAINTEXT,
+ apop_credentials_callback);
+
+ return TRUE;
+}
+
+static void
+mech_apop_auth_free(struct auth_request *auth_request)
+{
+ pool_unref(auth_request->pool);
+}
+
+static struct auth_request *mech_apop_auth_new(void)
+{
+ struct apop_auth_request *auth;
+ pool_t pool;
+
+ pool = pool_alloconly_create("apop_auth_request", 256);
+ auth = p_new(pool, struct apop_auth_request, 1);
+ auth->pool = pool;
+
+ auth->auth_request.refcount = 1;
+ auth->auth_request.pool = pool;
+ auth->auth_request.auth_initial = mech_apop_auth_initial;
+ auth->auth_request.auth_continue = NUL...
2006 Feb 03
0
rquotad (NFS) quota plugin
...ar *name,
+ struct rquotad_quota *quota);
+ static void rquotad_quota_root_update(struct rquotad_quota_root *root);
+
+ static struct quota *rquotad_quota_init(const char *data)
+ {
+ struct rquotad_quota *quota;
+ const char *const *qroots;
+ size_t qr_idx;
+ pool_t pool;
+
+ pool = pool_alloconly_create("quota", 1024);
+ quota = p_new(pool, struct rquotad_quota, 1);
+ quota->pool = pool;
+ quota->quota = rquotad_quota;
+
+ debugmsg("starting quota init");
+ qroots = t_strsplit(data, ",");
+ for (qr_idx = 0; qroots[qr_idx] != NULL; qr_idx++) {
+ /* N...
2018 Mar 04
1
2.2.34 fails to build on OpenBSD
...ream_openssl.so: undefined reference to
`i_stream_set_input_pending'
.libs/libssl_iostream_openssl.so: undefined reference to `i_stream_set_name'
.libs/libssl_iostream_openssl.so: undefined reference to
`buffer_create_dynamic'
.libs/libssl_iostream_openssl.so: undefined reference to
`pool_alloconly_create'
.libs/libssl_iostream_openssl.so: undefined reference to
`o_stream_set_no_error_handling'
.libs/libssl_iostream_openssl.so: undefined reference to `default_pool'
.libs/libssl_iostream_openssl.so: undefined reference to
`ssl_iostream_has_valid_client_cert'
.libs/libssl_iostrea...
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...ruct rpa_auth_request *auth =
+ (struct rpa_auth_request *)auth_request;
+
+ if (auth->pwd_md5)
+ safe_memset(auth->pwd_md5, 0, 16);
+
+ pool_unref(auth_request->pool);
+}
+
+static struct auth_request *mech_rpa_auth_new(void)
+{
+ struct rpa_auth_request *auth;
+ pool_t pool;
+
+ pool = pool_alloconly_create("rpa_auth_request", 256);
+ auth = p_new(pool, struct rpa_auth_request, 1);
+ auth->pool = pool;
+ auth->phase = 0;
+
+ auth->auth_request.refcount = 1;
+ auth->auth_request.pool = pool;
+ auth->auth_request.auth_initial = mech_rpa_auth_initial;
+ auth->auth_request....
2010 Apr 14
4
PostgreSQL driver supporting [round-robin] load balancing and redundancy [LONG]
...c_ioloop);
+}
+
+/*** non-transaction SQL driver methods */
+extern struct sql_db driver_multi_pgsql_db;
+
+static struct sql_db *multi_pgsql_init_v(char const *connect_string)
+{
+ struct multi_pgsql_db *pgdb;
+ pool_t pool;
+
+ dprintf(("%s: %s", __func__, connect_string));
+
+ pool = pool_alloconly_create("multi_pgsql_pool", MULTI_PGSQL_POOL);
+
+ pgdb = p_new(pool, struct multi_pgsql_db, 1);
+ pgdb->api = driver_multi_pgsql_db;
+ pgdb->pool = pool;
+
+ pgdb->query_q.link_to = &pgdb->query_q.first;
+ pgdb->pgc_q.link_to = &pgdb->pgc_q.first;
+
+ init_pgcs(p...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...t;, NULL);
diff -Nur dovecot-1.2.11/src/imap/client.c dovecot-1.2.11+lemonade/src/imap/client.c
--- dovecot-1.2.11/src/imap/client.c 2010-01-24 17:14:17.000000000 -0600
+++ dovecot-1.2.11+lemonade/src/imap/client.c 2010-04-08 09:59:12.000000000 -0500
@@ -53,6 +53,7 @@
client->command_pool =
pool_alloconly_create(MEMPOOL_GROWING"client command", 2048);
client->user = user;
+ client->submit = getenv("SUBMIT_USER") != NULL; /* APPLE - urlauth */
for (ns = user->namespaces; ns != NULL; ns = ns->next) {
mail_storage_set_callbacks(ns->storage,
@@ -225,6 +226,10 @...