2012/4/5 Murray S. Kucherawy <msk_at_blackops.org>:
>> #3 0x00007f34636eaa02 in __GI___assert_fail (
>> assertion=assertion_at_entry=0x44aca6 "sig != ((void *)0)",
>> file=file_at_entry=0x4498d7 "opendkim.c", line=line_at_entry=14092,
>> function=function_at_entry=0x44e8ea "mlfi_eom") at assert.c:103
>> #4 0x000000000041a3bc in mlfi_eom (ctx=0x20c3370) at opendkim.c:14092
>
>
> Line 14092 in the 2.5.1 release was not an assertion check line. Are you
> running with some patches to the source?
I think it's this code segment, line 14097 in current develop HEAD:
else if (dfc->mctx_status == DKIMF_STATUS_VERIFYERR)
{
int errcode;
const char *err;
DKIM_SIGINFO *sig;
authresult = "permerror";
sig = dkim_getsignature(dfc->mctx_dkimv);
assert(sig != NULL);
...Todd
--
Always code as if the guy who ends up maintaining your code will be a
violent psychopath who knows where you live. -- Martin Golding
Received on Thu Apr 05 2012 - 18:33:49 PST