Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:27345 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 81889 invoked by uid 1010); 10 Jan 2007 13:21:38 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 81873 invoked from network); 10 Jan 2007 13:21:38 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 10 Jan 2007 13:21:38 -0000 Authentication-Results: pb1.pair.com smtp.mail=php@hristov.com; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=php@hristov.com; sender-id=unknown Received-SPF: error (pb1.pair.com: domain hristov.com from 85.92.73.163 cause and error) X-PHP-List-Original-Sender: php@hristov.com X-Host-Fingerprint: 85.92.73.163 iko.gotobg.net Linux 2.6 Received: from [85.92.73.163] ([85.92.73.163:38528] helo=iko.gotobg.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 2C/91-03204-168E4A54 for ; Wed, 10 Jan 2007 08:21:38 -0500 Received: from e180006149.adsl.alicedsl.de ([85.180.6.149] helo=[192.168.179.10]) by iko.gotobg.net with esmtpa (Exim 4.63) (envelope-from ) id 1H4dOV-0006Lx-Pe for internals@lists.php.net; Wed, 10 Jan 2007 15:21:31 +0200 Message-ID: <45A4E7F4.7000303@hristov.com> Date: Wed, 10 Jan 2007 14:19:48 +0100 User-Agent: Thunderbird 1.5.0.7 (X11/20060911) MIME-Version: 1.0 To: PHP Internals List Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - iko.gotobg.net X-AntiAbuse: Original Domain - lists.php.net X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12] X-AntiAbuse: Sender Address Domain - hristov.com X-Source: X-Source-Args: X-Source-Dir: Subject: [PATCH] Missing casts From: php@hristov.com (Andrey Hristov) Hi, a small ZE patch : http://andrey.hristov.com/projects/php_stuff/patches/const_patch.txt which solves warnings if ZVAL_U_STRING() or ZVAL_U_STRINGL() are used with const char *. Thanks, Andrey