summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* PHP 5.3.16php-5.3.16PHP-5.3.16Johannes Schlüter2012-08-153-4/+4
|
* Fixed bug #62715 (ReflectionParameter::isDefaultValueAvailable() wrong result)Xinchen Hui2012-08-013-3/+22
|
* Test for bug #62680Xinchen Hui2012-07-311-0/+13
|
* Limit test to ICU 49Gustavo André dos Santos Lopes2012-07-301-0/+2
|
* Remove executable bit from filesGustavo André dos Santos Lopes2012-07-30187-0/+0
|
* Sike test while there is no zend mm max_size guardXinchen Hui2012-07-291-0/+6
|
* Skip test while zend mm is disabledXinchen Hui2012-07-293-0/+11
|
* Merge branch 'PHP-5.3' of git.php.net:php-src into PHP-5.3Xinchen Hui2012-07-291-1/+1
|\
| * - Fixed bug #57933 (Wrong table type used in phpinfo output) patch by: ↵Felipe Pena2012-07-281-1/+1
| | | | | | | | selsky at columbia dot edu
* | Skip test while zend_mm is disabledXinchen Hui2012-07-291-0/+6
|/
* Fixed bug #60194 for eavlXinchen Hui2012-07-283-4/+4
| | | | same reason here
* Fixed bug #60194 (--with-zend-multibyte and --enable-debug reports LEAK with ↵Xinchen Hui2012-07-284-4/+8
| | | | | | run-test.php) It's not a big deal, just because lexer will read the char after cursor before leaving
* Fix bug #62654Rasmus Lerdorf2012-07-251-3/+3
|
* merge 5.3.15 NEWSJohannes Schlüter2012-07-221-4/+71
|
* missed the test scriptXinchen Hui2012-07-211-0/+15
|
* Fix test failedXinchen Hui2012-07-211-73/+72
|
* Fixed bug #62616 (ArrayIterator::count() from IteratorIterator instance ↵Xinchen Hui2012-07-212-0/+6
| | | | gives Segmentation fault)
* merge 9eb5cb6571698ca1c623ad3e02c8727c4b0c9a09 to 5.3Xinchen Hui2012-07-211-1/+1
|
* Fix for bug #62379 was missing in 5.3Anatoliy Belsky2012-07-174-65/+185
|
* Do not unload shared extensions when checking for leaksHannes Magnusson2012-07-171-0/+4
|
* Typofix in test-descriptionJille Timmermans2012-07-141-1/+1
|
* - Fixed bug #62525 (sigabrt while converting floating point to string)Felipe Pena2012-07-141-1/+1
|
* - Fixed memory leak when extending DOMXPathFelipe Pena2012-07-141-0/+6
|
* Fixed bug #61677 ext\zlib\tests\bug_52944.phpt failsAnatoliy Belsky2012-07-131-0/+5
| | | | | The test is known to fail on windows with zlib version < 1.2.7 (current dep is 1.2.5), with 1.2.7 it works. As it's primarily a zlib 1.2.5 issue on windows, skip it for now.
* reverted changes for #62477Anatoliy Belsky2012-07-125-46/+2
|
* updated NEWSAnatoliy Belsky2012-07-111-0/+1
|
* Fixed bug #62477 LimitIterator int overflowAnatoliy Belsky2012-07-114-2/+45
|
* Fixed Bug #62500 (Segfault in DateInterval class when extended)Xinchen Hui2012-07-103-0/+48
|
* Fixed bug #62499 (curl_setopt($ch, CURLOPT_COOKIEFILE, "") returns false)Xinchen Hui2012-07-093-2/+6
| | | | this bc break is caused by the fix for #61948
* appease MSVC (doesnt like unary minus of unsigned ints)Nuno Lopes2012-07-081-1/+1
|
* Fix two issues with run-tests.phpAnthony Ferrara2012-07-061-3/+6
| | | | | 1. E_STRICT error due to passing return of array_intersect() into reset() directly 2. Details in junit output can produce invalid UTF-8 and XML due to unescaped characters
* Fix potential integer overflow in nl2brNikita Popov2012-07-051-6/+5
| | | | | | | | The buffer size was calculated manually, thus creating integer overflows for very large inputs, e.g. nl2br(str_repeat("\n", 613566757)). The code now uses safe_emalloc, thus making the code throw an error instead of crashing.
* Fix potential integer overflow in bin2hexNikita Popov2012-07-051-1/+1
| | | | | | | The code was already using safe_emalloc but did the multiplication in the first argument, thus making the use of safe_emalloc pretty useless. The *2 is now moved to the second argument.
* This wil be PHP 5.3.16Johannes Schlüter2012-07-053-67/+8
|
* Revert change 3f3ad30c50: There shouldn't be new features in 5.3, especiallyjohannes2012-07-055-45/+25
| | | | not if they aren't in 5.4, too.
* fix (signed) integer overflow (part of bug #52550Nuno Lopes2012-07-021-1/+1
|
* Revert JSON changes to PHP 5.3Nikita Popov2012-07-0112-195/+46
| | | | | | | | | | This reverts the following commits: 974324676b2436f159f42d9241c569f813471684 4662151ea7d7b6920d115cf2a2d6e9d4232727a3 84fe2cc890e49f40bac7c3ba74b3cfc6dc4cef2f This does not revert the JSON changes released in PHP 5.3.14.
* remove duplicates, fix orderStanislav Malyshev2012-06-301-14/+7
|
* - Fixed bug #62415 (Undefined variable: diff in run-tests.php on line 2093 ↵Felipe Pena2012-06-301-1/+3
| | | | for successful XFAIL)
* fix Bug #62273 Segmentation Fault in Mysqli/Mysqlndandrey2012-06-291-0/+7
|
* Merge branch 'PHP-5.3' of ssh://git.php.net/php-src into PHP-5.3andrey2012-06-2931-73/+95
|\
| * Fix some lengths in crypt()Nikita Popov2012-06-291-6/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Use salt_len_in instead of strlen(salt) or PHP_MAX_SALT_LEN, otherwise too much memory will be allocated. sha512 has a 86 character checksum, not 43. That probably was a copy&paste from the sha256 code which indeed has 43. The allocation also was using sizeof(char *), thus allocating 4 or 8 times as much memory as necessary. The sizeof(char *) was removed in the 5.4 branch in b7a92c9 but forgotten on 5.3. The memset 0 call was using PHP_MAX_SALT_LEN which can be smaller than the output buffer and thus not zeroing out everything. Use the size of the output buffer (needed) instead.
| * Fixed bug #62443 (Crypt SHA256/512 Segfaults With Malformed Salt)Anthony Ferrara2012-06-283-2/+13
| | | | | | | | | | | | Fixed a memory allocation bug in crypt() SHA256/512 that can cause segmentation faults when passed in salts with a null byte early.
| * Add json_last_error_msg() functionNikita Popov2012-06-288-42/+51
| | | | | | | | | | This replaces json_last_error(true) and is consistent with other custom error handling functions.
| * Fix #62432 ReflectionMethod random corrupt memory on high concurrentJohannes Schlüter2012-06-2721-25/+27
| | | | | | | | | | This fixes the same issue in multiple extensions. This isn't needed in later branches as 5.4 introduced object_properties_init()
* | new charsetsandrey2012-06-291-19/+56
|/
* Improve JSON error handlingNikita Popov2012-06-279-49/+95
| | | | | | | | | json_encode() no longer throws warnings. Instead only the error code for json_last_error() is set. As it is hard to debug the error from just an error code an optional $as_string parameter was added to json_last_error(), which returns an error message instead of an error code.
* Fix memleak in CLIJohannes Schlüter2012-06-271-0/+3
|
* ws fixStanislav Malyshev2012-06-262-2/+2
|
* BFNMoriyoshi Koizumi2012-06-251-0/+2
|