Xinchen Hui
10642aa9e4
Fixed bug #62715 (ReflectionParameter::isDefaultValueAvailable() wrong result)
2012-08-01 20:23:30 +08:00
Xinchen Hui
645f84e41b
Test for bug #62680
2012-07-31 10:49:13 +08:00
Gustavo André dos Santos Lopes
7e3e1837c8
Limit test to ICU 49
2012-07-30 10:27:41 +02:00
Gustavo André dos Santos Lopes
9762609cec
Remove executable bit from files
2012-07-30 10:25:17 +02:00
Xinchen Hui
f419d614ba
Sike test while there is no zend mm max_size guard
2012-07-29 14:30:01 +08:00
Xinchen Hui
880a6cee00
Skip test while zend mm is disabled
2012-07-29 13:25:31 +08:00
Xinchen Hui
14cebefb05
Merge branch 'PHP-5.3' of git.php.net:php-src into PHP-5.3
2012-07-29 12:18:07 +08:00
Xinchen Hui
015ee3b2c8
Skip test while zend_mm is disabled
2012-07-29 12:17:43 +08:00
Felipe Pena
068fc008c6
- Fixed bug #57933 (Wrong table type used in phpinfo output) patch by: selsky at columbia dot edu
2012-07-28 19:05:13 -03:00
Xinchen Hui
b477a84026
Fixed bug #60194 for eavl
...
same reason here
2012-07-28 17:00:05 +08:00
Xinchen Hui
ef7286a42f
Fixed bug #60194 (--with-zend-multibyte and --enable-debug reports LEAK with run-test.php)
...
It's not a big deal, just because lexer will read the char after cursor before leaving
2012-07-28 00:50:45 +08:00
Rasmus Lerdorf
5799ebdb0c
Fix bug #62654
2012-07-25 02:03:47 +02:00
Johannes Schlüter
ffa8461bfe
merge 5.3.15 NEWS
2012-07-22 22:45:39 +02:00
Xinchen Hui
777b6679a4
missed the test script
2012-07-21 23:30:32 +08:00
Xinchen Hui
ead076bac6
Fix test failed
2012-07-21 23:27:09 +08:00
Xinchen Hui
cc30524c89
Fixed bug #62616 (ArrayIterator::count() from IteratorIterator instance gives Segmentation fault)
2012-07-21 23:26:18 +08:00
Xinchen Hui
683b4f7a2b
merge 9eb5cb6571
to 5.3
2012-07-21 00:46:32 +08:00
Derick Rethans
d621a91a50
- Updated to version 2012.4 (2012d)
2012-07-20 10:07:23 +01:00
Anatoliy Belsky
bd39495332
Fix for bug #62379 was missing in 5.3
2012-07-17 17:50:05 +02:00
Hannes Magnusson
88f7f3c00f
Do not unload shared extensions when checking for leaks
2012-07-17 10:04:56 +01:00
Jille Timmermans
86b4252c8e
Typofix in test-description
2012-07-14 22:07:50 -07:00
Felipe Pena
63f3962a90
- Fixed bug #62525 (sigabrt while converting floating point to string)
2012-07-14 15:15:11 -03:00
Felipe Pena
864575251a
- Fixed memory leak when extending DOMXPath
2012-07-14 13:13:31 -03:00
Anatoliy Belsky
02b8362ec2
Fixed bug #61677 ext\zlib\tests\bug_52944.phpt fails
...
The test is known to fail on windows with zlib version < 1.2.7 (current dep is 1.2.5),
with 1.2.7 it works. As it's primarily a zlib 1.2.5 issue on windows, skip it for now.
2012-07-13 11:39:57 +02:00
Anatoliy Belsky
ad7eeba3c1
reverted changes for #62477
2012-07-12 10:54:14 +02:00
Anatoliy Belsky
896d0fcd41
updated NEWS
2012-07-11 22:33:42 +02:00
Anatoliy Belsky
b383ddf1e5
Fixed bug #62477 LimitIterator int overflow
2012-07-11 22:25:31 +02:00
Xinchen Hui
bcf5853eaa
Fixed Bug #62500 (Segfault in DateInterval class when extended)
2012-07-10 18:43:11 +08:00
Xinchen Hui
c819cf9d6b
Fixed bug #62499 (curl_setopt($ch, CURLOPT_COOKIEFILE, "") returns false)
...
this bc break is caused by the fix for #61948
2012-07-09 08:32:40 +08:00
Nuno Lopes
b2b018d5f7
appease MSVC (doesnt like unary minus of unsigned ints)
2012-07-08 15:28:29 -04:00
Anthony Ferrara
26b37f1792
Fix two issues with run-tests.php
...
1. E_STRICT error due to passing return of array_intersect() into reset() directly
2. Details in junit output can produce invalid UTF-8 and XML due to unescaped characters
2012-07-06 22:37:50 -04:00
Nikita Popov
157ddd9577
Fix potential integer overflow in nl2br
...
The buffer size was calculated manually, thus creating integer overflows
for very large inputs, e.g. nl2br(str_repeat("\n", 613566757)).
The code now uses safe_emalloc, thus making the code throw an error
instead of crashing.
2012-07-05 20:41:54 +02:00
Nikita Popov
88f46b162b
Fix potential integer overflow in bin2hex
...
The code was already using safe_emalloc but did the multiplication in
the first argument, thus making the use of safe_emalloc pretty useless.
The *2 is now moved to the second argument.
2012-07-05 20:14:49 +02:00
Johannes Schlüter
6b2b195267
This wil be PHP 5.3.16
2012-07-05 01:15:27 +02:00
johannes
bcc87ba68e
Revert change 3f3ad30c50
: There shouldn't be new features in 5.3, especially
...
not if they aren't in 5.4, too.
2012-07-05 00:55:47 +02:00
Nuno Lopes
d80ff39189
fix (signed) integer overflow (part of bug #52550
2012-07-02 01:35:28 -04:00
Nikita Popov
250393f925
Revert JSON changes to PHP 5.3
...
This reverts the following commits:
974324676b
4662151ea7
84fe2cc890
This does not revert the JSON changes released in PHP 5.3.14.
2012-07-01 16:28:57 +02:00
Stanislav Malyshev
5f31c81f07
remove duplicates, fix order
2012-06-30 17:36:22 -07:00
Felipe Pena
75d8af715c
- Fixed bug #62415 (Undefined variable: diff in run-tests.php on line 2093 for successful XFAIL)
2012-06-30 16:29:30 -03:00
andrey
8fe87e7fea
fix Bug #62273 Segmentation Fault in Mysqli/Mysqlnd
2012-06-29 14:42:36 +03:00
andrey
1ac611f24f
Merge branch 'PHP-5.3' of ssh://git.php.net/php-src into PHP-5.3
2012-06-29 14:40:41 +03:00
Nikita Popov
e6cf7d7745
Fix some lengths in crypt()
...
Use salt_len_in instead of strlen(salt) or PHP_MAX_SALT_LEN, otherwise too
much memory will be allocated.
sha512 has a 86 character checksum, not 43. That probably was a copy&paste
from the sha256 code which indeed has 43.
The allocation also was using sizeof(char *), thus allocating 4 or 8 times
as much memory as necessary. The sizeof(char *) was removed in the 5.4
branch in b7a92c9
but forgotten on 5.3.
The memset 0 call was using PHP_MAX_SALT_LEN which can be smaller than the
output buffer and thus not zeroing out everything. Use the size of the
output buffer (needed) instead.
2012-06-29 13:11:43 +02:00
andrey
f826ea093f
new charsets
2012-06-29 12:42:54 +03:00
Anthony Ferrara
7e8276ca68
Fixed bug #62443 (Crypt SHA256/512 Segfaults With Malformed Salt)
...
Fixed a memory allocation bug in crypt() SHA256/512 that can
cause segmentation faults when passed in salts with a null byte
early.
2012-06-28 20:00:03 -04:00
Nikita Popov
974324676b
Add json_last_error_msg() function
...
This replaces json_last_error(true) and is consistent with other custom
error handling functions.
2012-06-28 20:11:27 +02:00
Johannes Schlüter
b025b9d0cf
Fix #62432 ReflectionMethod random corrupt memory on high concurrent
...
This fixes the same issue in multiple extensions. This isn't needed
in later branches as 5.4 introduced object_properties_init()
2012-06-27 23:26:33 +02:00
Nikita Popov
4662151ea7
Improve JSON error handling
...
json_encode() no longer throws warnings. Instead only the error code for
json_last_error() is set.
As it is hard to debug the error from just an error code an optional
$as_string parameter was added to json_last_error(), which returns an
error message instead of an error code.
2012-06-27 12:21:48 +02:00
Johannes Schlüter
bc0972e78d
Fix memleak in CLI
2012-06-27 11:42:43 +02:00
Stanislav Malyshev
ad2bee193d
ws fix
2012-06-26 15:22:29 -07:00
Moriyoshi Koizumi
ce2082d24f
BFN
2012-06-25 19:20:38 +09:00