[PHP-CVS-DAILY] cvs: php-src / ChangeLog

2005-06-06 Thread changelog
changelog   Mon Jun  6 20:35:45 2005 EDT

  Modified files:  
/php-srcChangeLog 
  Log:
  ChangeLog update
  http://cvs.php.net/diff.php/php-src/ChangeLog?r1=1.2005r2=1.2006ty=u
Index: php-src/ChangeLog
diff -u php-src/ChangeLog:1.2005 php-src/ChangeLog:1.2006
--- php-src/ChangeLog:1.2005Sun Jun  5 20:35:16 2005
+++ php-src/ChangeLog   Mon Jun  6 20:35:44 2005
@@ -1,3 +1,233 @@
+2005-06-06  Wez Furlong  [EMAIL PROTECTED]
+
+* ext/posix/config.m4
+  ext/posix/posix.c:
+  fix build on Solaris
+
+2005-06-06  Jani Taskinen  [EMAIL PROTECTED]
+
+* main/main.c:
+  silence warning
+
+2005-06-06  Brad House  [EMAIL PROTECTED]
+
+* (PHP_5_0)
+  ext/mcve/mcve.c
+  ext/mcve/php_mcve.h:
+  libmonetra 5.0 sync.
+  added m_validateidentifier, which is enabled by default to keep invalid
+  pointer addresses from causing PHP to crash
+  kept compatability with older versions of libmonetra.
+
+* ext/mcve/mcve.c
+  ext/mcve/php_mcve.h:
+  libmonetra-5.0 sync.
+  added m_validateidentifier, which is enabled by default to keep invalid
+  pointer addresses from causing PHP to crash
+  kept compatability with older versions of libmonetra.
+
+2005-06-06  Ilia Alshanetsky  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  ext/bz2/bz2.c
+  ext/bz2/bz2.c:
+  MFH: Better storage size for output length.
+
+* ext/bz2/bz2.c:
+  Better storage size for output length.
+
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* ZendEngine2/zend_vm_def.h
+  ZendEngine2/zend_vm_execute.h
+  ZendEngine2/zend_vm_opcodes.h:
+  - Regenerate VM files and add warning about regeneration
+
+* (PHP_5_0)
+  ZendEngine2/zend_execute.c
+  ZendEngine2/zend_vm_def.h:
+  - MH44: Problems with user defined error handler and wrong usage of
+  references
+
+2005-06-06  Ilia Alshanetsky  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  ext/standard/type.c:
+  MFH: Fixed strval to not print notices on strval(array()).
+
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  NEWS
+  ext/standard/http_fopen_wrapper.c:
+  - MFH: Fixed bug #33242 (Mangled error message when stream fails).
+
+* (PHP_5_0)
+  NEWS
+  ext/standard/http_fopen_wrapper.c
+  ext/standard/http_fopen_wrapper.c:
+  - Fixed bug #33242 (Mangled error message when stream fails).
+
+2005-06-06  Jani Taskinen  [EMAIL PROTECTED]
+
+* (PHP_5_0)
+  scripts/Makefile.frag:
+  ws
+
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  Zend/zend_execute.c:
+  - Swap lines so that user defined error handlers don't cause memory 
errors
+
+* (PHP_4_4)
+  scripts/Makefile.frag:
+  - We've man pages just fine
+
+2005-06-06  Dmitry Stogov  [EMAIL PROTECTED]
+
+* NEWS
+  ZendEngine2/zend_compile.c
+  ZendEngine2/tests/bug32428.phpt:
+  Fixed bug #32428 (The @ warning error supression operator is broken)
+
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  NEWS:
+  - Update NEWS with the bz fix
+
+2005-06-06  Uwe Schindler  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  scripts/Makefile.frag:
+  MFH: Fix bug #33166 for other branches and new bug #33255, no man pages 
for
+  4.4
+
+* (PHP_5_0)
+  scripts/Makefile.frag:
+  Fix bug #33166 for other branches and new bug #33255
+
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  ext/bz2/bz2.c:
+  - Merge back changes which where in 4.3 but somehow didn't make it into 
the
+  new
+branch.
+
+2005-06-06  Dmitry Stogov  [EMAIL PROTECTED]
+
+* ZendEngine2/tests/bug32799.phpt
+  ZendEngine2/tests/bug32799.phpt:
+  
+  file bug32799.phpt was initially added on branch PHP_5_0.
+
+* (PHP_5_0)
+  NEWS
+  ZendEngine2/zend_objects_API.c
+  ZendEngine2/zend_objects_API.c
+  ZendEngine2/tests/bug32799.phpt:
+  Fixed bug #32799 (crash: calling the corresponding global var during the
+  destruct)
+
+* ZendEngine2/tests/bug32596.phpt:
+  Added test for bug #32596 (Segfault/Memory Leak by getClass (etc) in
+  __destruct)
+
+* ZendEngine2/tests/bug32596.phpt
+  ZendEngine2/tests/bug32596.phpt:
+  
+  file bug32596.phpt was initially added on branch PHP_5_0.
+
+* (PHP_5_0)
+  NEWS
+  ZendEngine2/zend_execute_API.c:
+  Fixed bug #32596 (Segfault/Memory Leak by getClass (etc) in __destruct)
+
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  Zend/zend_extensions.h:
+  - Bumb ZEND EXT API NO for Stanislav
+
+2005-06-06  Edin Kadribasic  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  win32/php4dllts.dsp:
+  Sync with recent config.m4 changes
+
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* (PHP_4_4)
+  NEWS
+  Zend/zend_compile.c
+  Zend/zend_compile.h
+  Zend/zend_execute.c
+  Zend/zend_execute_globals.h
+  

[PHP-CVS-DAILY] cvs: ZendEngine2 / ChangeLog

2005-06-06 Thread changelog
changelog   Mon Jun  6 20:35:55 2005 EDT

  Modified files:  
/ZendEngine2ChangeLog 
  Log:
  ChangeLog update
  
http://cvs.php.net/diff.php/ZendEngine2/ChangeLog?r1=1.703r2=1.704ty=u
Index: ZendEngine2/ChangeLog
diff -u ZendEngine2/ChangeLog:1.703 ZendEngine2/ChangeLog:1.704
--- ZendEngine2/ChangeLog:1.703 Sat Jun  4 20:35:24 2005
+++ ZendEngine2/ChangeLog   Mon Jun  6 20:35:54 2005
@@ -1,3 +1,87 @@
+2005-06-06  Derick Rethans  [EMAIL PROTECTED]
+
+* zend_vm_def.h
+  zend_vm_execute.h
+  zend_vm_opcodes.h:
+  - Regenerate VM files and add warning about regeneration
+
+* (PHP_5_0)
+  zend_execute.c
+  zend_vm_def.h:
+  - MH44: Problems with user defined error handler and wrong usage of
+  references
+
+2005-06-06  Dmitry Stogov  [EMAIL PROTECTED]
+
+* zend_compile.c
+  tests/bug32428.phpt:
+  Fixed bug #32428 (The @ warning error supression operator is broken)
+
+* zend_objects_API.c
+  zend_objects_API.c
+  tests/bug32799.phpt:
+  Fixed bug #32799 (crash: calling the corresponding global var during the
+  destruct)
+
+* tests/bug32799.phpt
+  tests/bug32799.phpt:
+  
+  file bug32799.phpt was initially added on branch PHP_5_0.
+
+* tests/bug32596.phpt:
+  Added test for bug #32596 (Segfault/Memory Leak by getClass (etc) in
+  __destruct)
+
+* tests/bug32596.phpt
+  tests/bug32596.phpt:
+  
+  file bug32596.phpt was initially added on branch PHP_5_0.
+
+* (PHP_5_0)
+  zend_execute_API.c:
+  Fixed bug #32596 (Segfault/Memory Leak by getClass (etc) in __destruct)
+
+* (PHP_5_0)
+  tests/bug32993.phpt:
+  Added test for bug #32993 (implemented Iterator function current() don't
+  throw
+exception)
+
+* tests/bug32993.phpt
+  tests/bug32993.phpt:
+  
+  Fixed bug #32993 (implemented Iterator function current() don't throw
+  exception)
+
+* zend_vm_def.h
+  zend_vm_execute.h
+  zend_vm_opcodes.h:
+  Fixed bug #32993 (implemented Iterator function current() don't throw
+  exception)
+
+* zend_object_handlers.c
+  zend_object_handlers.c
+  tests/bug33171.phpt:
+  Fixed bug #33171 (foreach enumerates private fields declared in base
+  classes)
+
+* tests/bug33171.phpt
+  tests/bug33171.phpt:
+  
+  file bug33171.phpt was initially added on branch PHP_5_0.
+
+2005-06-06  Wez Furlong  [EMAIL PROTECTED]
+
+* zend_language_scanner.l:
+  Avoid double-freeing streams.
+  This can happen because all streams are registered as resources;
+  the engine also tracks them in the open_files global.
+  
+  Avoid the potential for double-freeing by simply making streams exposed 
to
+  the
+  engine have no closer for the engine to call; they will already be in the
+  resource list, and thus will be shut down properly at request end.
+
 2005-06-04  Zeev Suraski  [EMAIL PROTECTED]
 
 * zend_compile.h
@@ -8157,7 +8241,7 @@
 2003-06-10  Jani Taskinen  [EMAIL PROTECTED]
 
 * zend_multiply.h:
-  - Missing $Id: ChangeLog,v 1.703 2005/06/05 00:35:24 changelog Exp $ tag
+  - Missing $Id: ChangeLog,v 1.704 2005/06/07 00:35:54 changelog Exp $ tag
 
 2003-06-10  James Cox  [EMAIL PROTECTED]
 
@@ -9881,7 +9965,7 @@
   zend_types.h
   zend_variables.c
   zend_variables.h:
-  - Added some missing CVS $Id: ChangeLog,v 1.703 2005/06/05 00:35:24 
changelog Exp $ tags, headers and footers.
+  - Added some missing CVS $Id: ChangeLog,v 1.704 2005/06/07 00:35:54 
changelog Exp $ tags, headers and footers.
 
 2003-01-30  Ilia Alshanetsky  [EMAIL PROTECTED]
 


[PHP-CVS] cvs: php-src /sapi/cli php_cli.c

2005-06-06 Thread Marcus Boerger
helly   Mon Jun  6 03:11:10 2005 EDT

  Modified files:  
/php-src/sapi/cli   php_cli.c 
  Log:
  - Expose -a as special mode and show whether it is a shell or not
  
http://cvs.php.net/diff.php/php-src/sapi/cli/php_cli.c?r1=1.125r2=1.126ty=u
Index: php-src/sapi/cli/php_cli.c
diff -u php-src/sapi/cli/php_cli.c:1.125 php-src/sapi/cli/php_cli.c:1.126
--- php-src/sapi/cli/php_cli.c:1.125Tue May 17 10:33:15 2005
+++ php-src/sapi/cli/php_cli.c  Mon Jun  6 03:11:08 2005
@@ -20,7 +20,7 @@
+--+
 */
 
-/* $Id: php_cli.c,v 1.125 2005/05/17 14:33:15 johannes Exp $ */
+/* $Id: php_cli.c,v 1.126 2005/06/06 07:11:08 helly Exp $ */
 
 #include php.h
 #include php_globals.h
@@ -385,8 +385,13 @@
   %s [options] [-B begin_code] -R code [-E 
end_code] [--] [args...]\n
   %s [options] [-B begin_code] -F file [-E 
end_code] [--] [args...]\n
   %s [options] -- [args...]\n
+  %s [options] -a\n
\n
+#if HAVE_LIBREADLINE || HAVE_LIBEDIT
+ -a   Run as interactive shell\n
+#else
  -a   Run interactively\n
+#endif
  -c path|file Look for php.ini file in 
this directory\n
  -n   No php.ini file will be 
used\n
  -d foo[=bar] Define INI entry foo with 
value 'bar'\n
@@ -410,7 +415,7 @@
  args...  Arguments passed to script. 
Use -- args when first argument\n
   starts with - or script is 
read from stdin\n
\n
-   , prog, prog, prog, prog, prog);
+   , prog, prog, prog, prog, prog, prog);
 }
 /* }}} */
 

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) / configure.in /main php_version.h

2005-06-06 Thread Derick Rethans
derick  Mon Jun  6 05:23:59 2005 EDT

  Modified files:  (Branch: PHP_4_4)
/php-srcconfigure.in 
/php-src/main   php_version.h 
  Log:
  - Rename version.
  
  
http://cvs.php.net/diff.php/php-src/configure.in?r1=1.396.2.164r2=1.396.2.164.2.1ty=u
Index: php-src/configure.in
diff -u php-src/configure.in:1.396.2.164 php-src/configure.in:1.396.2.164.2.1
--- php-src/configure.in:1.396.2.164Thu Jun  2 17:32:49 2005
+++ php-src/configure.inMon Jun  6 05:23:55 2005
@@ -1,4 +1,4 @@
-dnl ## $Id: configure.in,v 1.396.2.164 2005/06/02 21:32:49 sniper Exp $ -*- sh 
-*-
+dnl ## $Id: configure.in,v 1.396.2.164.2.1 2005/06/06 09:23:55 derick Exp $ 
-*- sh -*-
 dnl ## Process this file with autoconf to produce a configure script.
 
 divert(1)
@@ -39,8 +39,8 @@
 AC_CONFIG_HEADER(main/php_config.h)
 
 MAJOR_VERSION=4
-MINOR_VERSION=3
-RELEASE_VERSION=12
+MINOR_VERSION=4
+RELEASE_VERSION=0
 EXTRA_VERSION=-dev
 VERSION=$MAJOR_VERSION.$MINOR_VERSION.$RELEASE_VERSION$EXTRA_VERSION
 
http://cvs.php.net/diff.php/php-src/main/php_version.h?r1=1.66.2.81r2=1.66.2.81.2.1ty=u
Index: php-src/main/php_version.h
diff -u php-src/main/php_version.h:1.66.2.81 
php-src/main/php_version.h:1.66.2.81.2.1
--- php-src/main/php_version.h:1.66.2.81Wed Mar 30 17:10:25 2005
+++ php-src/main/php_version.h  Mon Jun  6 05:23:58 2005
@@ -1,7 +1,7 @@
 /* automatically generated by configure */
 /* edit configure.in to change version number */
 #define PHP_MAJOR_VERSION 4
-#define PHP_MINOR_VERSION 3
-#define PHP_RELEASE_VERSION 12
+#define PHP_MINOR_VERSION 4
+#define PHP_RELEASE_VERSION 0
 #define PHP_EXTRA_VERSION -dev
-#define PHP_VERSION 4.3.12-dev
+#define PHP_VERSION 4.4.0-dev

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) /ext/bz2 bz2.c /scripts/man1 php-config.1.in phpize.1.in

2005-06-06 Thread Derick Rethans
derick  Mon Jun  6 06:59:47 2005 EDT

  Added files: (Branch: PHP_4_4)
/php-src/scripts/man1   php-config.1.in phpize.1.in 

  Modified files:  
/php-src/ext/bz2bz2.c 
  Log:
  - Merge back changes which where in 4.3 but somehow didn't make it into the 
new
branch.
  
  http://cvs.php.net/diff.php/php-src/ext/bz2/bz2.c?r1=1.1.2.4r2=1.1.2.4.2.1ty=u
Index: php-src/ext/bz2/bz2.c
diff -u php-src/ext/bz2/bz2.c:1.1.2.4 php-src/ext/bz2/bz2.c:1.1.2.4.2.1
--- php-src/ext/bz2/bz2.c:1.1.2.4   Sat Mar 19 08:56:56 2005
+++ php-src/ext/bz2/bz2.c   Mon Jun  6 06:59:45 2005
@@ -16,7 +16,7 @@
+--+
  */
  
-/* $Id: bz2.c,v 1.1.2.4 2005/03/19 13:56:56 tony2001 Exp $ */
+/* $Id: bz2.c,v 1.1.2.4.2.1 2005/06/06 10:59:45 derick Exp $ */
 
 #ifdef HAVE_CONFIG_H
 #include config.h
@@ -40,9 +40,6 @@
 #define PHP_BZ_ERRSTR  1
 #define PHP_BZ_ERRBOTH 2
 
-/* Blocksize of the decompression buffer */
-#define PHP_BZ_DECOMPRESS_SIZE 4096
-
 function_entry bz2_functions[] = {
PHP_FE(bzopen,   NULL)
PHP_FE(bzread,   NULL)
@@ -434,56 +431,49 @@
Decompresses BZip2 compressed data */
 PHP_FUNCTION(bzdecompress)
 {
-   zval**source, /* Source data to 
decompress */
-   **zsmall; /* (Optional) user 
specified small */
-   char *dest;   /* Destination buffer, 
initially allocated */
-   int   error,  /* Error container */
- iter = 1,   /* Iteration count for 
the compression loop */
- size,   /* Current size 
to realloc the dest buffer to */
- dest_len = PHP_BZ_DECOMPRESS_SIZE,  /* Size of the 
destination length */
- small= 0,   /* The actual 
small */
- argc = ZEND_NUM_ARGS(); /* Argument count 
*/
-   
-   if (argc  1 || argc  2 || zend_get_parameters_ex(argc, source, 
zsmall) == FAILURE) {
-   WRONG_PARAM_COUNT;
+   char *source, *dest;
+   int source_len, error;
+   long small = 0;
+   unsigned int size = 0;
+   bz_stream bzs;
+
+   if (FAILURE == zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, s|l, 
source, source_len, small)) {
+   RETURN_FALSE;
}
 
-   convert_to_string_ex(source);
-   
-   /* optional small argument handling */
-   if (argc  1) {
-   convert_to_long_ex(zsmall);
-   small = Z_LVAL_PP(zsmall);
+   bzs.bzalloc = NULL;
+   bzs.bzfree = NULL;
+
+   if (BZ2_bzDecompressInit(bzs, 0, small) != BZ_OK) {
+   RETURN_FALSE;
}
 
-   /* Depending on the size of the source buffer, either allocate
- the length of the source buffer or the a default decompression
- size */
-   dest = emalloc(PHP_BZ_DECOMPRESS_SIZE  Z_STRLEN_PP(source) ? 
PHP_BZ_DECOMPRESS_SIZE : Z_STRLEN_PP(source));
-
-   /* (de)Compression Loop */  
-   do {
-   /* Handle the (re)allocation of the buffer */
-   size = dest_len * iter;
-   if (iter  1) {
-   dest = erealloc(dest, size);
-   }
-   ++iter;
+   bzs.next_in = source;
+   bzs.avail_in = source_len;
 
-   /* Perform the decompression */
-   error = BZ2_bzBuffToBuffDecompress(dest, size, 
Z_STRVAL_PP(source), Z_STRLEN_PP(source), small, 0);
-   } while (error == BZ_OUTBUFF_FULL);
-   
-   if (error != BZ_OK) {
-   efree(dest);
-   RETURN_LONG(error);
-   } else {
-   /* we might have allocated a little to much, so erealloc the 
buffer 
-down to size, before returning it */
+   /* in most cases bz2 offers at least 2:1 compression, so we use that as 
our base */
+   bzs.avail_out = source_len * 2;
+   bzs.next_out = dest = emalloc(bzs.avail_out + 1);
+   
+   while ((error = BZ2_bzDecompress(bzs)) == BZ_OK  bzs.avail_in  0) {
+   /* compression is better then 2:1, need to allocate more memory 
*/
+   bzs.avail_out = source_len;
+   size = (bzs.total_out_hi32  32) + bzs.total_out_lo32;
+   dest = erealloc(dest, size + bzs.avail_out + 1);
+   bzs.next_out = dest + size;
+   }
+
+   if (error == BZ_STREAM_END || error == BZ_OK) {
+   size = (bzs.total_out_hi32  32) + bzs.total_out_lo32;
dest = erealloc(dest, size + 1);
-   dest[size] = 0;
-   RETURN_STRINGL(dest, size, 0);
+   dest[size] = '\0';
+   RETVAL_STRINGL(dest, size, 0);
+   } else { /* real error */
+   efree(dest);
+

[PHP-CVS] cvs: php-src(PHP_5_0) /scripts Makefile.frag

2005-06-06 Thread Uwe Schindler
thetaphiMon Jun  6 07:00:48 2005 EDT

  Modified files:  (Branch: PHP_5_0)
/php-src/scriptsMakefile.frag 
  Log:
  Fix bug #33166 for other branches and new bug #33255
  
http://cvs.php.net/diff.php/php-src/scripts/Makefile.frag?r1=1.10.2.7r2=1.10.2.8ty=u
Index: php-src/scripts/Makefile.frag
diff -u php-src/scripts/Makefile.frag:1.10.2.7 
php-src/scripts/Makefile.frag:1.10.2.8
--- php-src/scripts/Makefile.frag:1.10.2.7  Sat Apr 30 00:30:20 2005
+++ php-src/scripts/Makefile.frag   Mon Jun  6 07:00:48 2005
@@ -21,7 +21,6 @@
config.sub
 
 bin_SCRIPTS = phpize php-config
-bin_src_SCRIPTS =
 man_PAGES = phpize.1 php-config.1
 
 install-build:
@@ -76,10 +75,6 @@
echo   program: $(program_prefix)$$prog$(program_suffix); \
$(INSTALL) -m 755 $(builddir)/$$prog 
$(INSTALL_ROOT)$(bindir)/$(program_prefix)$$prog$(program_suffix); \
done
-   @for prog in $(bin_src_SCRIPTS); do \
-   echo   program: $(program_prefix)$$prog$(program_suffix); \
-   $(INSTALL) -m 755 $(top_srcdir)/scripts/$$prog 
$(INSTALL_ROOT)$(bindir)/$(program_prefix)$$prog$(program_suffix); \
-   done
@echo Installing man pages: $(INSTALL_ROOT)$(mandir)/man1/
@$(mkinstalldirs) $(INSTALL_ROOT)$(mandir)/man1
@for page in $(man_PAGES); do \

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) /scripts Makefile.frag

2005-06-06 Thread Uwe Schindler
thetaphiMon Jun  6 07:06:23 2005 EDT

  Modified files:  (Branch: PHP_4_4)
/php-src/scriptsMakefile.frag 
  Log:
  MFH: Fix bug #33166 for other branches and new bug #33255, no man pages for 
4.4
  
http://cvs.php.net/diff.php/php-src/scripts/Makefile.frag?r1=1.1.2.11r2=1.1.2.11.2.1ty=u
Index: php-src/scripts/Makefile.frag
diff -u php-src/scripts/Makefile.frag:1.1.2.11 
php-src/scripts/Makefile.frag:1.1.2.11.2.1
--- php-src/scripts/Makefile.frag:1.1.2.11  Sat Apr 30 00:28:24 2005
+++ php-src/scripts/Makefile.frag   Mon Jun  6 07:06:22 2005
@@ -21,7 +21,6 @@
config.sub
 
 bin_SCRIPTS = phpize php-config
-bin_src_SCRIPTS = 
 
 install-build:
@echo Installing build environment: $(INSTALL_ROOT)$(phpbuilddir)/
@@ -63,16 +62,6 @@
echo   program: $(program_prefix)$$prog$(program_suffix); \
$(INSTALL) -m 755 $(builddir)/$$prog 
$(INSTALL_ROOT)$(bindir)/$(program_prefix)$$prog$(program_suffix); \
done
-   @for prog in $(bin_src_SCRIPTS); do \
-   echo   program: $(program_prefix)$$prog$(program_suffix); \
-   $(INSTALL) -m 755 $(top_srcdir)/scripts/$$prog 
$(INSTALL_ROOT)$(bindir)/$(program_prefix)$$prog$(program_suffix); \
-   done
-   @echo Installing man pages: $(INSTALL_ROOT)$(mandir)/man1/
-   @$(mkinstalldirs) $(INSTALL_ROOT)$(mandir)/man1
-   @for page in $(man_PAGES); do \
-   echo   page: $$page; \
-   $(INSTALL_DATA) $(builddir)/man1/$$page 
$(INSTALL_ROOT)$(mandir)/man1/$$page; \
-   done

 $(builddir)/phpize: $(srcdir)/phpize.in $(top_builddir)/config.status
(CONFIG_FILES=$@ CONFIG_HEADERS= $(top_builddir)/config.status)

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) / NEWS

2005-06-06 Thread Derick Rethans
derick  Mon Jun  6 07:07:57 2005 EDT

  Modified files:  (Branch: PHP_4_4)
/php-srcNEWS 
  Log:
  - Update NEWS with the bz fix
  
http://cvs.php.net/diff.php/php-src/NEWS?r1=1.1247.2.920.2.1r2=1.1247.2.920.2.2ty=u
Index: php-src/NEWS
diff -u php-src/NEWS:1.1247.2.920.2.1 php-src/NEWS:1.1247.2.920.2.2
--- php-src/NEWS:1.1247.2.920.2.1   Mon Jun  6 05:30:09 2005
+++ php-src/NEWSMon Jun  6 07:07:55 2005
@@ -7,7 +7,7 @@
   them sort based on the current locale. (Derick)
 - Changed sha1_file() and md5_file() functions to use streams instead of 
   low level IO. (Uwe)
-- Fixed memory curruptions when using references in a wrong way. (Marcus,
+- Fixed memory corruptions when using references in a wrong way. (Marcus,
   Dmitry, Derick)
 - Fixed memory corruption in stristr(). (Derick)
 - Fixed bug #33222 (segfault when CURL handle is closed in a callback). (Tony)
@@ -18,6 +18,8 @@
   misbehave). (Jani)
 - Fixed bug #33072 (Add a safemode/open_basedir check for runtime save_path 
   change) (Rasmus)
+- Fixed bug #33070 (Improved performance of bzdecompress() by several orders
+  of magnitude). (Ilia)
 - Fixed bug #33057 (Don't send extraneous entity-headers on a 304 as per
   RFC 2616 section 10.3.5) (Rasmus, Choitel)
 - Fixed bug #33019 (socket errors cause memory leaks in php_strerror()). 

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



Re: [PHP-CVS] cvs: php-src(PHP_4_4) /scripts Makefile.frag

2005-06-06 Thread Derick Rethans
On Mon, 6 Jun 2005, Uwe Schindler wrote:

 thetaphi  Mon Jun  6 07:06:23 2005 EDT
 
   Modified files:  (Branch: PHP_4_4)
 /php-src/scripts  Makefile.frag 
   Log:
   MFH: Fix bug #33166 for other branches and new bug #33255, no man pages for 
 4.4

Please revert!

Derick

-- 
Derick Rethans
http://derickrethans.nl | http://ez.no | http://xdebug.org

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) /scripts Makefile.frag

2005-06-06 Thread Derick Rethans
derick  Mon Jun  6 07:24:17 2005 EDT

  Modified files:  (Branch: PHP_4_4)
/php-src/scriptsMakefile.frag 
  Log:
  - We've man pages just fine
  
http://cvs.php.net/diff.php/php-src/scripts/Makefile.frag?r1=1.1.2.11.2.1r2=1.1.2.11.2.2ty=u
Index: php-src/scripts/Makefile.frag
diff -u php-src/scripts/Makefile.frag:1.1.2.11.2.1 
php-src/scripts/Makefile.frag:1.1.2.11.2.2
--- php-src/scripts/Makefile.frag:1.1.2.11.2.1  Mon Jun  6 07:06:22 2005
+++ php-src/scripts/Makefile.frag   Mon Jun  6 07:24:16 2005
@@ -21,6 +21,7 @@
config.sub
 
 bin_SCRIPTS = phpize php-config
+bin_src_SCRIPTS = 
 
 install-build:
@echo Installing build environment: $(INSTALL_ROOT)$(phpbuilddir)/
@@ -62,6 +63,16 @@
echo   program: $(program_prefix)$$prog$(program_suffix); \
$(INSTALL) -m 755 $(builddir)/$$prog 
$(INSTALL_ROOT)$(bindir)/$(program_prefix)$$prog$(program_suffix); \
done
+   @for prog in $(bin_src_SCRIPTS); do \
+   echo   program: $(program_prefix)$$prog$(program_suffix); \
+   $(INSTALL) -m 755 $(top_srcdir)/scripts/$$prog 
$(INSTALL_ROOT)$(bindir)/$(program_prefix)$$prog$(program_suffix); \
+   done
+   @echo Installing man pages: $(INSTALL_ROOT)$(mandir)/man1/
+   @$(mkinstalldirs) $(INSTALL_ROOT)$(mandir)/man1
+   @for page in $(man_PAGES); do \
+   echo   page: $$page; \
+   $(INSTALL_DATA) $(builddir)/man1/$$page 
$(INSTALL_ROOT)$(mandir)/man1/$$page; \
+   done

 $(builddir)/phpize: $(srcdir)/phpize.in $(top_builddir)/config.status
(CONFIG_FILES=$@ CONFIG_HEADERS= $(top_builddir)/config.status)

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_5_0) /scripts Makefile.frag

2005-06-06 Thread Jani Taskinen
sniper  Mon Jun  6 07:50:25 2005 EDT

  Modified files:  (Branch: PHP_5_0)
/php-src/scriptsMakefile.frag 
  Log:
  ws
  
http://cvs.php.net/diff.php/php-src/scripts/Makefile.frag?r1=1.10.2.8r2=1.10.2.9ty=u
Index: php-src/scripts/Makefile.frag
diff -u php-src/scripts/Makefile.frag:1.10.2.8 
php-src/scripts/Makefile.frag:1.10.2.9
--- php-src/scripts/Makefile.frag:1.10.2.8  Mon Jun  6 07:00:48 2005
+++ php-src/scripts/Makefile.frag   Mon Jun  6 07:50:25 2005
@@ -47,7 +47,7 @@
ext/xml/expat/ \
ext/mbstring/ \
ext/mbstring/libmbfl/ \
-ext/mbstring/libmbfl/mbfl/ \
+   ext/mbstring/libmbfl/mbfl/ \
ext/sqlite/libsqlite/src/sqlite.h
 
 install-headers:

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_5_0) / NEWS /ext/standard http_fopen_wrapper.c

2005-06-06 Thread Derick Rethans
derick  Mon Jun  6 08:41:29 2005 EDT

  Modified files:  (Branch: PHP_5_0)
/php-src/ext/standard   http_fopen_wrapper.c 
/php-srcNEWS 
  Log:
  - Fixed bug #33242 (Mangled error message when stream fails).
  
  
http://cvs.php.net/diff.php/php-src/ext/standard/http_fopen_wrapper.c?r1=1.88.2.3r2=1.88.2.4ty=u
Index: php-src/ext/standard/http_fopen_wrapper.c
diff -u php-src/ext/standard/http_fopen_wrapper.c:1.88.2.3 
php-src/ext/standard/http_fopen_wrapper.c:1.88.2.4
--- php-src/ext/standard/http_fopen_wrapper.c:1.88.2.3  Thu May  5 22:19:36 2005
+++ php-src/ext/standard/http_fopen_wrapper.c   Mon Jun  6 08:41:28 2005
@@ -18,7 +18,7 @@
|  Wez Furlong [EMAIL PROTECTED]  |
+--+
  */
-/* $Id: http_fopen_wrapper.c,v 1.88.2.3 2005/05/06 02:19:36 iliaa Exp $ */ 
+/* $Id: http_fopen_wrapper.c,v 1.88.2.4 2005/06/06 12:41:28 derick Exp $ */ 
 
 #include php.h
 #include php_globals.h
@@ -101,6 +101,8 @@
char *transport_string, *errstr = NULL;
int transport_len, have_header = 0, request_fulluri = 0;
 
+   tmp_line[0] = '\0';
+
if (redirect_max  1) {
php_error_docref(NULL TSRMLS_CC, E_WARNING, Circular redirect, 
aborting.);
return NULL;
http://cvs.php.net/diff.php/php-src/NEWS?r1=1.1760.2.422r2=1.1760.2.423ty=u
Index: php-src/NEWS
diff -u php-src/NEWS:1.1760.2.422 php-src/NEWS:1.1760.2.423
--- php-src/NEWS:1.1760.2.422   Mon Jun  6 06:38:21 2005
+++ php-src/NEWSMon Jun  6 08:41:28 2005
@@ -14,6 +14,7 @@
 - Fixed memory corruption in ImageTTFText() with 64bit systems. (Andrey)
 - Fixed memory corruption in stristr(). (Derick)
 - Fixed segfaults when CURL callback functions throw exception. (Tony)
+- Fixed bug #33242 (Mangled error message when stream fails). (Derick)
 - Fixed bug #33222 (segfault when CURL handle is closed in a callback). (Tony)
 - Fixed bug #33214 (odbc_next_result does not signal SQL errors with 
   2-statement SQL batches). (rich at kastle dot com, Tony)

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) / NEWS /ext/standard http_fopen_wrapper.c

2005-06-06 Thread Derick Rethans
derick  Mon Jun  6 08:42:52 2005 EDT

  Modified files:  (Branch: PHP_4_4)
/php-src/ext/standard   http_fopen_wrapper.c 
/php-srcNEWS 
  Log:
  - MFH: Fixed bug #33242 (Mangled error message when stream fails).
  
  
http://cvs.php.net/diff.php/php-src/ext/standard/http_fopen_wrapper.c?r1=1.53.2.20r2=1.53.2.20.2.1ty=u
Index: php-src/ext/standard/http_fopen_wrapper.c
diff -u php-src/ext/standard/http_fopen_wrapper.c:1.53.2.20 
php-src/ext/standard/http_fopen_wrapper.c:1.53.2.20.2.1
--- php-src/ext/standard/http_fopen_wrapper.c:1.53.2.20 Thu May  5 22:19:04 2005
+++ php-src/ext/standard/http_fopen_wrapper.c   Mon Jun  6 08:42:50 2005
@@ -18,7 +18,7 @@
|  Wez Furlong [EMAIL PROTECTED]  |
+--+
  */
-/* $Id: http_fopen_wrapper.c,v 1.53.2.20 2005/05/06 02:19:04 iliaa Exp $ */ 
+/* $Id: http_fopen_wrapper.c,v 1.53.2.20.2.1 2005/06/06 12:42:50 derick Exp $ 
*/ 
 
 #include php.h
 #include php_globals.h
@@ -107,6 +107,8 @@
size_t chunk_size = 0, file_size = 0;
int eol_detect, have_header = 0;
 
+   tmp_line[0] = '\0';
+
if (redirect_max  1) {
php_error_docref(NULL TSRMLS_CC, E_WARNING, Circular redirect, 
aborting.);
return NULL;
http://cvs.php.net/diff.php/php-src/NEWS?r1=1.1247.2.920.2.2r2=1.1247.2.920.2.3ty=u
Index: php-src/NEWS
diff -u php-src/NEWS:1.1247.2.920.2.2 php-src/NEWS:1.1247.2.920.2.3
--- php-src/NEWS:1.1247.2.920.2.2   Mon Jun  6 07:07:55 2005
+++ php-src/NEWSMon Jun  6 08:42:51 2005
@@ -10,6 +10,7 @@
 - Fixed memory corruptions when using references in a wrong way. (Marcus,
   Dmitry, Derick)
 - Fixed memory corruption in stristr(). (Derick)
+- Fixed bug #33242 (Mangled error message when stream fails). (Derick)
 - Fixed bug #33222 (segfault when CURL handle is closed in a callback). (Tony)
 - Fixed bug #33214 (odbc_next_result does not signal SQL errors with 
   2-statement SQL batches). (rich at kastle dot com, Tony)

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) /ext/standard type.c

2005-06-06 Thread Ilia Alshanetsky
iliaa   Mon Jun  6 08:50:57 2005 EDT

  Modified files:  (Branch: PHP_4_4)
/php-src/ext/standard   type.c 
  Log:
  MFH: Fixed strval to not print notices on strval(array()).
  
  
http://cvs.php.net/diff.php/php-src/ext/standard/type.c?r1=1.20.4.2r2=1.20.4.2.4.1ty=u
Index: php-src/ext/standard/type.c
diff -u php-src/ext/standard/type.c:1.20.4.2 
php-src/ext/standard/type.c:1.20.4.2.4.1
--- php-src/ext/standard/type.c:1.20.4.2Thu Apr  1 03:56:32 2004
+++ php-src/ext/standard/type.c Mon Jun  6 08:50:57 2005
@@ -16,7 +16,7 @@
+--+
 */
 
-/* $Id: type.c,v 1.20.4.2 2004/04/01 08:56:32 derick Exp $ */
+/* $Id: type.c,v 1.20.4.2.4.1 2005/06/06 12:50:57 iliaa Exp $ */
 
 #include php.h
 #include php_incomplete_class.h
@@ -180,14 +180,24 @@
 PHP_FUNCTION(strval)
 {
pval **num;
+   zval expr_copy;
+   int use_copy;
 
if (ZEND_NUM_ARGS() != 1 || zend_get_parameters_ex(1, num) == FAILURE) 
{
WRONG_PARAM_COUNT;
}
 
*return_value = **num;
-   zval_copy_ctor(return_value);
-   convert_to_string(return_value);
+
+   zend_make_printable_zval(return_value, expr_copy, use_copy);
+   if (use_copy) {
+   *return_value = expr_copy;
+   INIT_PZVAL(return_value);
+   zval_copy_ctor(return_value);
+   zval_dtor(expr_copy);
+   } else {
+   zval_copy_ctor(return_value);
+   }
 }
 /* }}} */
 

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src /ext/bz2 bz2.c

2005-06-06 Thread Ilia Alshanetsky
iliaa   Mon Jun  6 12:30:49 2005 EDT

  Modified files:  
/php-src/ext/bz2bz2.c 
  Log:
  Better storage size for output length.
  # Thanks to Stefan for noticing the problem.
  
  
http://cvs.php.net/diff.php/php-src/ext/bz2/bz2.c?r1=1.10r2=1.11ty=u
Index: php-src/ext/bz2/bz2.c
diff -u php-src/ext/bz2/bz2.c:1.10 php-src/ext/bz2/bz2.c:1.11
--- php-src/ext/bz2/bz2.c:1.10  Sun Jun  5 14:04:20 2005
+++ php-src/ext/bz2/bz2.c   Mon Jun  6 12:30:46 2005
@@ -16,7 +16,7 @@
   +--+
 */
  
-/* $Id: bz2.c,v 1.10 2005/06/05 18:04:20 iliaa Exp $ */
+/* $Id: bz2.c,v 1.11 2005/06/06 16:30:46 iliaa Exp $ */
 
 #ifdef HAVE_CONFIG_H
 #include config.h
@@ -441,7 +441,7 @@
char *source, *dest;
int source_len, error;
long small = 0;
-   unsigned int size = 0;
+   unsigned long long size = 0;
bz_stream bzs;
 
if (FAILURE == zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, s|l, 
source, source_len, small)) {

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_5_0) /ext/bz2 bz2.c

2005-06-06 Thread Ilia Alshanetsky
iliaa   Mon Jun  6 12:31:00 2005 EDT

  Modified files:  (Branch: PHP_5_0)
/php-src/ext/bz2bz2.c 
  Log:
  MFH: Better storage size for output length.
  
  
http://cvs.php.net/diff.php/php-src/ext/bz2/bz2.c?r1=1.6.2.3r2=1.6.2.4ty=u
Index: php-src/ext/bz2/bz2.c
diff -u php-src/ext/bz2/bz2.c:1.6.2.3 php-src/ext/bz2/bz2.c:1.6.2.4
--- php-src/ext/bz2/bz2.c:1.6.2.3   Sun Jun  5 14:05:07 2005
+++ php-src/ext/bz2/bz2.c   Mon Jun  6 12:31:00 2005
@@ -16,7 +16,7 @@
   +--+
 */
  
-/* $Id: bz2.c,v 1.6.2.3 2005/06/05 18:05:07 iliaa Exp $ */
+/* $Id: bz2.c,v 1.6.2.4 2005/06/06 16:31:00 iliaa Exp $ */
 
 #ifdef HAVE_CONFIG_H
 #include config.h
@@ -438,7 +438,7 @@
char *source, *dest;
int source_len, error;
long small = 0;
-   unsigned int size = 0;
+   unsigned long long size = 0;
bz_stream bzs;
 
if (FAILURE == zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, s|l, 
source, source_len, small)) {

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_4_4) /ext/bz2 bz2.c

2005-06-06 Thread Ilia Alshanetsky
iliaa   Mon Jun  6 12:31:08 2005 EDT

  Modified files:  (Branch: PHP_4_4)
/php-src/ext/bz2bz2.c 
  Log:
  MFH: Better storage size for output length.
  
  
http://cvs.php.net/diff.php/php-src/ext/bz2/bz2.c?r1=1.1.2.4.2.1r2=1.1.2.4.2.2ty=u
Index: php-src/ext/bz2/bz2.c
diff -u php-src/ext/bz2/bz2.c:1.1.2.4.2.1 php-src/ext/bz2/bz2.c:1.1.2.4.2.2
--- php-src/ext/bz2/bz2.c:1.1.2.4.2.1   Mon Jun  6 06:59:45 2005
+++ php-src/ext/bz2/bz2.c   Mon Jun  6 12:31:08 2005
@@ -16,7 +16,7 @@
+--+
  */
  
-/* $Id: bz2.c,v 1.1.2.4.2.1 2005/06/06 10:59:45 derick Exp $ */
+/* $Id: bz2.c,v 1.1.2.4.2.2 2005/06/06 16:31:08 iliaa Exp $ */
 
 #ifdef HAVE_CONFIG_H
 #include config.h
@@ -434,7 +434,7 @@
char *source, *dest;
int source_len, error;
long small = 0;
-   unsigned int size = 0;
+   unsigned long long size = 0;
bz_stream bzs;
 
if (FAILURE == zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, s|l, 
source, source_len, small)) {

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src /ext/mcve mcve.c php_mcve.h

2005-06-06 Thread Brad House
bradmsswMon Jun  6 12:43:23 2005 EDT

  Modified files:  
/php-src/ext/mcve   mcve.c php_mcve.h 
  Log:
  libmonetra-5.0 sync.
  added m_validateidentifier, which is enabled by default to keep invalid 
pointer addresses from causing PHP to crash
  kept compatability with older versions of libmonetra.
  http://cvs.php.net/diff.php/php-src/ext/mcve/mcve.c?r1=1.30r2=1.31ty=u
Index: php-src/ext/mcve/mcve.c
diff -u php-src/ext/mcve/mcve.c:1.30 php-src/ext/mcve/mcve.c:1.31
--- php-src/ext/mcve/mcve.c:1.30Sun Jan  9 16:05:05 2005
+++ php-src/ext/mcve/mcve.c Mon Jun  6 12:43:23 2005
@@ -17,7 +17,7 @@
+--+
 */
 
-/* $Id: mcve.c,v 1.30 2005/01/09 21:05:05 sniper Exp $ */
+/* $Id: mcve.c,v 1.31 2005/06/06 16:43:23 bradmssw Exp $ */
 
 #ifdef HAVE_CONFIG_H
 #include config.h
@@ -73,6 +73,10 @@
PHP_FE(m_connect,   NULL)
PHP_FE(m_transnew,  NULL)
PHP_FE(m_transparam,NULL)
+#if LIBMONETRA_VERSION = 05
+   PHP_FE(m_transkeyval,   NULL)
+   PHP_FE(m_validateidentifier,NULL)
+#endif
PHP_FE(m_transsend, NULL)
PHP_FE(m_ping,  NULL)
PHP_FE(m_responseparam, NULL)
@@ -550,7 +554,7 @@
 PHP_MINFO_FUNCTION(mcve)
 {
php_info_print_table_start();
-   php_info_print_table_row(2, mcve support, enabled);
+   php_info_print_table_row(2, mcve/monetra support, enabled);
php_info_print_table_row(2, version, PHP_MCVE_VERSION);
php_info_print_table_end();
 }
@@ -589,6 +593,11 @@
 
MCVE_InitConn(conn);
 
+/* Since the identifiers are pointer addresses, we need to validate it by
+ * checking our linked list in PHP, since we don't want to cause segfaults */
+#if LIBMONETRA_VERSION = 05
+   M_ValidateIdentifier(conn, 1);
+#endif
ZEND_REGISTER_RESOURCE(return_value, conn, le_conn);
 }
 /* }}} */
@@ -890,7 +899,7 @@
 PHP_FUNCTION(m_connectionerror)
 {
MCVE_CONN *conn;
-   char *retval;
+   const char *retval;
zval **arg;
 
if (ZEND_NUM_ARGS() != 1 || zend_get_parameters_ex(1, arg) == FAILURE)
@@ -903,7 +912,7 @@
if (retval == NULL) {
RETVAL_STRING(,1);
} else {
-   RETVAL_STRING(retval, 1);
+   RETVAL_STRING(estrdup(retval), 0);
}
 }
 /* }}} */
@@ -965,8 +974,53 @@
 }
 /* }}} */
 
+#if LIBMONETRA_VERSION = 05
+/* {{{ proto int m_validateidentifier(resource conn, int tf)
+   Whether or not to validate the passed identifier on any transaction it is 
passed  to
+*/
+PHP_FUNCTION(m_validateidentifier)
+{
+   MCVE_CONN *conn;
+   int retval;
+   zval **arg1, **arg2;
+   
+   if (ZEND_NUM_ARGS() != 2 || zend_get_parameters_ex(2, arg1, arg2) == 
FAILURE)
+   WRONG_PARAM_COUNT;
+
+   ZEND_FETCH_RESOURCE(conn, MCVE_CONN *, arg1, -1, mcve connection, 
le_conn);
+
+   convert_to_long_ex(arg2);
+   retval = M_ValidateIdentifier(conn, (int)Z_LVAL_PP(arg2));
+   RETURN_LONG(retval);
+}
+/* }}} */
+
+/* {{{ proto int m_transkeyval(resource conn, long identifier, string key, 
string value)
+   Add key/value pair to a transaction.  Replaces deprecated transparam() */
+PHP_FUNCTION(m_transkeyval)
+{
+   MCVE_CONN *conn;
+   int retval;
+   zval **arg1, **arg2, **arg3, **arg4;
+
+   if (ZEND_NUM_ARGS() != 4 || zend_get_parameters_ex(4, arg1, arg2, 
arg3, arg4) == FAILURE)
+   WRONG_PARAM_COUNT;
+
+   ZEND_FETCH_RESOURCE(conn, MCVE_CONN *, arg1, -1, mcve connection, 
le_conn);
+   
+   convert_to_long_ex(arg2);
+   convert_to_string_ex(arg3);
+   convert_to_string_ex(arg4);
+   
+   retval = M_TransKeyVal(conn, (long)Z_LVAL_PP(arg2), Z_STRVAL_PP(arg3), 
Z_STRVAL_PP(arg4));
+
+   RETURN_LONG(retval);
+}
+/* }}} */
+#endif
+
 /* {{{ proto int m_transparam(resource conn, long identifier, int key, ...)
-   Add a parameter to a transaction */
+   Add a parameter to a transaction (deprecated) */
 PHP_FUNCTION(m_transparam)
 {
MCVE_CONN *conn;
@@ -1076,7 +1130,7 @@
 PHP_FUNCTION(m_responseparam)
 {
MCVE_CONN *conn;
-   char *retval;
+   const char *retval;
zval **arg1, **arg2, **arg3;
 
if (ZEND_NUM_ARGS() != 3 ||
@@ -1093,7 +1147,7 @@
if (retval == NULL) {
RETVAL_STRING(,1);
} else {
-   RETVAL_STRING(retval, 1);
+   RETVAL_STRING(estrdup(retval), 0);
}
 }
 /* }}} */
@@ -1103,7 +1157,7 @@
 PHP_FUNCTION(m_getuserparam)
 {
MCVE_CONN *conn;
-   char *retval;
+   const char *retval;
zval **arg1, **arg2, **arg3;
 
if (ZEND_NUM_ARGS() != 3 ||
@@ -1120,7 +1174,7 @@
if (retval == NULL) {
RETVAL_STRING(,1);
} else {
-   

[PHP-CVS] cvs: php-src(PHP_5_0) /ext/mcve mcve.c php_mcve.h

2005-06-06 Thread Brad House
bradmsswMon Jun  6 12:43:54 2005 EDT

  Modified files:  (Branch: PHP_5_0)
/php-src/ext/mcve   mcve.c php_mcve.h 
  Log:
  libmonetra 5.0 sync.
  added m_validateidentifier, which is enabled by default to keep invalid 
pointer addresses from causing PHP to crash
  kept compatability with older versions of libmonetra.
  http://cvs.php.net/diff.php/php-src/ext/mcve/mcve.c?r1=1.28.2.2r2=1.28.2.3ty=u
Index: php-src/ext/mcve/mcve.c
diff -u php-src/ext/mcve/mcve.c:1.28.2.2 php-src/ext/mcve/mcve.c:1.28.2.3
--- php-src/ext/mcve/mcve.c:1.28.2.2Sun Jan  9 16:05:16 2005
+++ php-src/ext/mcve/mcve.c Mon Jun  6 12:43:54 2005
@@ -17,7 +17,7 @@
+--+
 */
 
-/* $Id: mcve.c,v 1.28.2.2 2005/01/09 21:05:16 sniper Exp $ */
+/* $Id: mcve.c,v 1.28.2.3 2005/06/06 16:43:54 bradmssw Exp $ */
 
 #ifdef HAVE_CONFIG_H
 #include config.h
@@ -73,6 +73,10 @@
PHP_FE(m_connect,   NULL)
PHP_FE(m_transnew,  NULL)
PHP_FE(m_transparam,NULL)
+#if LIBMONETRA_VERSION = 05
+   PHP_FE(m_transkeyval,   NULL)
+   PHP_FE(m_validateidentifier,NULL)
+#endif
PHP_FE(m_transsend, NULL)
PHP_FE(m_ping,  NULL)
PHP_FE(m_responseparam, NULL)
@@ -550,7 +554,7 @@
 PHP_MINFO_FUNCTION(mcve)
 {
php_info_print_table_start();
-   php_info_print_table_row(2, mcve support, enabled);
+   php_info_print_table_row(2, mcve/monetra support, enabled);
php_info_print_table_row(2, version, PHP_MCVE_VERSION);
php_info_print_table_end();
 }
@@ -589,6 +593,11 @@
 
MCVE_InitConn(conn);
 
+/* Since the identifiers are pointer addresses, we need to validate it by
+ * checking our linked list in PHP, since we don't want to cause segfaults */
+#if LIBMONETRA_VERSION = 05
+   M_ValidateIdentifier(conn, 1);
+#endif
ZEND_REGISTER_RESOURCE(return_value, conn, le_conn);
 }
 /* }}} */
@@ -890,7 +899,7 @@
 PHP_FUNCTION(m_connectionerror)
 {
MCVE_CONN *conn;
-   char *retval;
+   const char *retval;
zval **arg;
 
if (ZEND_NUM_ARGS() != 1 || zend_get_parameters_ex(1, arg) == FAILURE)
@@ -903,7 +912,7 @@
if (retval == NULL) {
RETVAL_STRING(,1);
} else {
-   RETVAL_STRING(retval, 1);
+   RETVAL_STRING(estrdup(retval), 0);
}
 }
 /* }}} */
@@ -965,8 +974,53 @@
 }
 /* }}} */
 
+#if LIBMONETRA_VERSION = 05
+/* {{{ proto int m_validateidentifier(resource conn, int tf)
+   Whether or not to validate the passed identifier on any transaction it is 
passed  to
+*/
+PHP_FUNCTION(m_validateidentifier)
+{
+   MCVE_CONN *conn;
+   int retval;
+   zval **arg1, **arg2;
+   
+   if (ZEND_NUM_ARGS() != 2 || zend_get_parameters_ex(2, arg1, arg2) == 
FAILURE)
+   WRONG_PARAM_COUNT;
+
+   ZEND_FETCH_RESOURCE(conn, MCVE_CONN *, arg1, -1, mcve connection, 
le_conn);
+
+   convert_to_long_ex(arg2);
+   retval = M_ValidateIdentifier(conn, (int)Z_LVAL_PP(arg2));
+   RETURN_LONG(retval);
+}
+/* }}} */
+
+/* {{{ proto int m_transkeyval(resource conn, long identifier, string key, 
string value)
+   Add key/value pair to a transaction.  Replaces deprecated transparam() */
+PHP_FUNCTION(m_transkeyval)
+{
+   MCVE_CONN *conn;
+   int retval;
+   zval **arg1, **arg2, **arg3, **arg4;
+
+   if (ZEND_NUM_ARGS() != 4 || zend_get_parameters_ex(4, arg1, arg2, 
arg3, arg4) == FAILURE)
+   WRONG_PARAM_COUNT;
+
+   ZEND_FETCH_RESOURCE(conn, MCVE_CONN *, arg1, -1, mcve connection, 
le_conn);
+   
+   convert_to_long_ex(arg2);
+   convert_to_string_ex(arg3);
+   convert_to_string_ex(arg4);
+   
+   retval = M_TransKeyVal(conn, (long)Z_LVAL_PP(arg2), Z_STRVAL_PP(arg3), 
Z_STRVAL_PP(arg4));
+
+   RETURN_LONG(retval);
+}
+/* }}} */
+#endif
+
 /* {{{ proto int m_transparam(resource conn, long identifier, int key, ...)
-   Add a parameter to a transaction */
+   Add a parameter to a transaction (deprecated) */
 PHP_FUNCTION(m_transparam)
 {
MCVE_CONN *conn;
@@ -1076,7 +1130,7 @@
 PHP_FUNCTION(m_responseparam)
 {
MCVE_CONN *conn;
-   char *retval;
+   const char *retval;
zval **arg1, **arg2, **arg3;
 
if (ZEND_NUM_ARGS() != 3 ||
@@ -1093,7 +1147,7 @@
if (retval == NULL) {
RETVAL_STRING(,1);
} else {
-   RETVAL_STRING(retval, 1);
+   RETVAL_STRING(estrdup(retval), 0);
}
 }
 /* }}} */
@@ -1103,7 +1157,7 @@
 PHP_FUNCTION(m_getuserparam)
 {
MCVE_CONN *conn;
-   char *retval;
+   const char *retval;
zval **arg1, **arg2, **arg3;
 
if (ZEND_NUM_ARGS() != 3 ||
@@ -1120,7 +1174,7 @@
if (retval == NULL) {
RETVAL_STRING(,1);
 

[PHP-CVS] cvs: CVSROOT / avail

2005-06-06 Thread Wez Furlong
wez Mon Jun  6 13:46:17 2005 EDT

  Modified files:  
/CVSROOTavail 
  Log:
  tighten up PDO_ODBC and IBM DB2 commit access.
  
  
  
http://cvs.php.net/diff.php/CVSROOT/avail?r1=1.981r2=1.982ty=u
Index: CVSROOT/avail
diff -u CVSROOT/avail:1.981 CVSROOT/avail:1.982
--- CVSROOT/avail:1.981 Sun Jun  5 13:43:03 2005
+++ CVSROOT/avail   Mon Jun  6 13:46:15 2005
@@ -276,4 +276,13 @@
 # Curl modules
 
avail|bagder,sterling,crisb,linus_nielsen|curl,curl-cpp,curl-java,curl-perl,curl-php,curl-www
 
+# DB2 and PDO_ODBC have tighter restrictions, so that IBM are not overly
+# legally encumbered.  If you have contributions for these two extensions,
+# please contact the lead developers.  This is a temporary measure until
+# we can put in place a more general process.
+unavail||pecl/ibm_db2,pecl/pdo_odbc,ext/pdo_odbc
+avail|dbs,skoduru|pecl/ibm_db2
+avail|wez|pecl/pdo_odbc
+
+
 # :vim: set ft=sh

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src /main main.c

2005-06-06 Thread Jani Taskinen
sniper  Mon Jun  6 18:01:43 2005 EDT

  Modified files:  
/php-src/main   main.c 
  Log:
  silence warning
  
http://cvs.php.net/diff.php/php-src/main/main.c?r1=1.629r2=1.630ty=u
Index: php-src/main/main.c
diff -u php-src/main/main.c:1.629 php-src/main/main.c:1.630
--- php-src/main/main.c:1.629   Sun Jun  5 21:51:46 2005
+++ php-src/main/main.c Mon Jun  6 18:01:41 2005
@@ -18,7 +18,7 @@
+--+
 */
 
-/* $Id: main.c,v 1.629 2005/06/06 01:51:46 wez Exp $ */
+/* $Id: main.c,v 1.630 2005/06/06 22:01:41 sniper Exp $ */
 
 /* {{{ includes
  */
@@ -835,10 +835,12 @@
 }
 /* }}} */
 
+#if wez_0
 static void stream_closer_for_zend(void *handle TSRMLS_DC)
 {
php_stream_close((php_stream*)handle);
 }
+#endif
 
 static long stream_fteller_for_zend(void *handle TSRMLS_DC)
 {

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: php-src(PHP_5_0) /ext/posix config.m4 posix.c

2005-06-06 Thread Wez Furlong
wez Mon Jun  6 18:06:00 2005 EDT

  Modified files:  (Branch: PHP_5_0)
/php-src/ext/posix  config.m4 posix.c 
  Log:
  mfh: fix solaris build
  
http://cvs.php.net/diff.php/php-src/ext/posix/config.m4?r1=1.7.14.1r2=1.7.14.2ty=u
Index: php-src/ext/posix/config.m4
diff -u php-src/ext/posix/config.m4:1.7.14.1 
php-src/ext/posix/config.m4:1.7.14.2
--- php-src/ext/posix/config.m4:1.7.14.1Mon May  9 08:16:11 2005
+++ php-src/ext/posix/config.m4 Mon Jun  6 18:06:00 2005
@@ -1,5 +1,5 @@
 dnl
-dnl $Id: config.m4,v 1.7.14.1 2005/05/09 12:16:11 sniper Exp $
+dnl $Id: config.m4,v 1.7.14.2 2005/06/06 22:06:00 wez Exp $
 dnl
 
 PHP_ARG_ENABLE(posix,whether to enable POSIX-like functions,
@@ -9,5 +9,7 @@
   AC_DEFINE(HAVE_POSIX, 1, [whether to include POSIX-like functions])
   PHP_NEW_EXTENSION(posix, posix.c, $ext_shared)
 
-  AC_CHECK_FUNCS(seteuid setegid setsid getsid setpgid getpgid ctermid mkfifo 
getrlimit getlogin getgroups)
+  AC_CHECK_HEADERS(sys/mkdev.h)
+
+  AC_CHECK_FUNCS(seteuid setegid setsid getsid setpgid getpgid ctermid mkfifo 
mknod getrlimit getlogin getgroups)
 fi
http://cvs.php.net/diff.php/php-src/ext/posix/posix.c?r1=1.60.2.3r2=1.60.2.4ty=u
Index: php-src/ext/posix/posix.c
diff -u php-src/ext/posix/posix.c:1.60.2.3 php-src/ext/posix/posix.c:1.60.2.4
--- php-src/ext/posix/posix.c:1.60.2.3  Mon May  9 08:16:11 2005
+++ php-src/ext/posix/posix.c   Mon Jun  6 18:06:00 2005
@@ -16,7 +16,7 @@
+--+
  */
 
-/* $Id: posix.c,v 1.60.2.3 2005/05/09 12:16:11 sniper Exp $ */
+/* $Id: posix.c,v 1.60.2.4 2005/06/06 22:06:00 wez Exp $ */
 
 #ifdef HAVE_CONFIG_H
 #include config.h
@@ -44,6 +44,9 @@
 #include errno.h
 #include grp.h
 #include pwd.h
+#if HAVE_SYS_MKDEV_H
+# include sys/mkdev.h
+#endif
 
 ZEND_DECLARE_MODULE_GLOBALS(posix)
 
@@ -135,7 +138,7 @@
 static PHP_MINFO_FUNCTION(posix)
 {
php_info_print_table_start();
-   php_info_print_table_row(2, Revision, $Revision: 1.60.2.3 $);
+   php_info_print_table_row(2, Revision, $Revision: 1.60.2.4 $);
php_info_print_table_end();
 }
 /* }}} */

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



Re: [PHP-CVS] cvs: php-src /ext/mcve mcve.c php_mcve.h

2005-06-06 Thread Jani Taskinen


   Excuse me, but what's the point with this change:

-   RETVAL_STRING(retval, 1);
+   RETVAL_STRING(estrdup(retval), 0);

   The second parameter '1' will duplicate the value?

   --Jani


On Mon, 6 Jun 2005, Brad House wrote:


bradmsswMon Jun  6 12:43:23 2005 EDT

 Modified files:
   /php-src/ext/mcvemcve.c php_mcve.h
 Log:
 libmonetra-5.0 sync.
 added m_validateidentifier, which is enabled by default to keep invalid 
pointer addresses from causing PHP to crash
 kept compatability with older versions of libmonetra.



--
Donate @ http://pecl.php.net/wishlist.php/sniper

--
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



Re: [PHP-CVS] cvs: php-src /main main.c

2005-06-06 Thread Marcus Boerger
Hello Jani,

Tuesday, June 7, 2005, 12:01:43 AM, you wrote:

 sniper  Mon Jun  6 18:01:43 2005 EDT

   Modified files:  
 /php-src/main   main.c 
   Log:
   silence warning
  
 http://cvs.php.net/diff.php/php-src/main/main.c?r1=1.629r2=1.630ty=u
 Index: php-src/main/main.c
 diff -u php-src/main/main.c:1.629 php-src/main/main.c:1.630
 --- php-src/main/main.c:1.629   Sun Jun  5 21:51:46 2005
 +++ php-src/main/main.c Mon Jun  6 18:01:41 2005
 @@ -18,7 +18,7 @@

 +--+
  */
 
 -/* $Id: main.c,v 1.629 2005/06/06 01:51:46 wez Exp $ */
 +/* $Id: main.c,v 1.630 2005/06/06 22:01:41 sniper Exp $ */
 
  /* {{{ includes
   */
 @@ -835,10 +835,12 @@
  }
  /* }}} */
 
 +#if wez_0

i thought we were supposed to put the name of the one disabling it here
so that it should be #if jani_0 and not the name of the one providing the
superflous source like you did.

  static void stream_closer_for_zend(void *handle TSRMLS_DC)
  {
 php_stream_close((php_stream*)handle);
  }
 +#endif
 
  static long stream_fteller_for_zend(void *handle TSRMLS_DC)
  {




-- 
Best regards,
 Marcusmailto:[EMAIL PROTECTED]

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: CVSROOT / commitinfo.pl

2005-06-06 Thread Wez Furlong
wez Mon Jun  6 20:00:15 2005 EDT

  Modified files:  
/CVSROOTcommitinfo.pl 
  Log:
  Deny commits to PHP_4_3 branch.
  
  This is dependent on a patched version of CVS; we run the patched version only
  for commits over pserver, so people with shell on the cvs machine can still
  commit to the 4.3 branch if they really need to.
  
  
  
http://cvs.php.net/diff.php/CVSROOT/commitinfo.pl?r1=1.8r2=1.9ty=u
Index: CVSROOT/commitinfo.pl
diff -u CVSROOT/commitinfo.pl:1.8 CVSROOT/commitinfo.pl:1.9
--- CVSROOT/commitinfo.pl:1.8   Sat Oct 16 18:06:03 2004
+++ CVSROOT/commitinfo.pl   Mon Jun  6 20:00:14 2005
@@ -18,6 +18,11 @@
   exit 1;
 }
 
+if ($ENV{'ACL_PHP_4_3'} eq 'PHP_4_3') {
+  print This branch is closed, used PHP_4_4 instead.\n;
+  exit 1;
+}
+
 open(FC, $last_file.$id) || die cannot open last file;
 print FC $directory\n;
 close(FC);

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[PHP-CVS] cvs: CVSROOT / commitinfo.pl

2005-06-06 Thread Wez Furlong
wez Mon Jun  6 20:00:38 2005 EDT

  Modified files:  
/CVSROOTcommitinfo.pl 
  Log:
  fix typo
  
http://cvs.php.net/diff.php/CVSROOT/commitinfo.pl?r1=1.9r2=1.10ty=u
Index: CVSROOT/commitinfo.pl
diff -u CVSROOT/commitinfo.pl:1.9 CVSROOT/commitinfo.pl:1.10
--- CVSROOT/commitinfo.pl:1.9   Mon Jun  6 20:00:14 2005
+++ CVSROOT/commitinfo.pl   Mon Jun  6 20:00:38 2005
@@ -19,7 +19,7 @@
 }
 
 if ($ENV{'ACL_PHP_4_3'} eq 'PHP_4_3') {
-  print This branch is closed, used PHP_4_4 instead.\n;
+  print This branch is closed, use PHP_4_4 instead.\n;
   exit 1;
 }
 

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php