SECURITY: Avoid memory corruption in dkim handling