Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:59777 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 76695 invoked from network); 12 Apr 2012 02:40:04 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 12 Apr 2012 02:40:04 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.161.170 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.161.170 mail-gx0-f170.google.com Received: from [209.85.161.170] ([209.85.161.170:43473] helo=mail-gx0-f170.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 46/FF-23245-280468F4 for ; Wed, 11 Apr 2012 22:40:03 -0400 Received: by ggmb2 with SMTP id b2so969959ggm.29 for ; Wed, 11 Apr 2012 19:40:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date :x-google-sender-auth:message-id:subject:to:cc:content-type; bh=gqH1oEigOgW5N8RGbYInQlox64NWXs+DTH2RwX2K1Wg=; b=Ukm3fl02RUMSDCm0Q6VflzY/PL1d5EDTi8z+A0X+ZO3O/39K1H0Y4KPIhOtGZu+wqC /VGcMb4T91TeXptzqTpL+CxfLPhQGF0V9yNTLbrVo3Azn0tRg7bF1EWcgG3hpHCqVEle obJkyvalaDX25bGGpy76ZHdbG4Pb0F12o6r1uVHr4mSjbdvAkBX0bVUXJocUl4CaMTYt ymrh6B3SWy66/rdqS9VA6H1V2n0DyBEwc/bu51jqoLPaCThaJ/KO1CTgak1eWuee+LwJ mkfaK2gWjHSb+qMU7VvM65umnhrz1n5EkL/jmQRFzTe0QB2EIhvfaK4t0qdAtSUGKxUD 0L4A== Received: by 10.101.144.2 with SMTP id w2mr185271ann.30.1334198400521; Wed, 11 Apr 2012 19:40:00 -0700 (PDT) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.146.86.14 with HTTP; Wed, 11 Apr 2012 19:39:20 -0700 (PDT) In-Reply-To: <4F863785.7000709@sugarcrm.com> References: <0BAF545D-95F6-4C4B-8E03-025E8604B1ED@gmail.com> <4F863785.7000709@sugarcrm.com> Date: Thu, 12 Apr 2012 11:39:20 +0900 X-Google-Sender-Auth: K0GVEAF1adN3Letcv-T4z43kw6w Message-ID: To: Stas Malyshev Cc: "jason.gerfen@gmail.com" , "internals@lists.php.net" Content-Type: text/plain; charset=ISO-8859-1 Subject: Re: [PHP-DEV] Re: Push Request #21 From: yohgaki@ohgaki.net (Yasuo Ohgaki) Hi 2012/4/12 Stas Malyshev : > Hi! > >> There really doesn't seem to be much interest in this proposed patch. Should I continue development efforts on closing this feature request? > > Can't say anything here - I don't use these APIs personally, but maybe > other people need them. No idea :) > >> I do also have a few questions regarding standards adherence, and memory leak methods of detection. >> >> I ask about the memory leak detection as passing test scripts through valgrind only led me to find leaks in the openssl_pkey_new() function. > > There's two levels of leak detection - internal memory management & > valgrind. How to work with them: > > 1. Internal. Compile php with --enable-debug and run your tests. Leaks > will be reported by php. > 2. External. Set USE_ZEND_ALLOC environment variable to 0. Set > ZEND_DONT_UNLOAD_MODULES to 1. Run it under valgrind, see what it reports. You might want to do something like USE_ZEND_ALLOC=0 ZEND_DONT_UNLOAD_MODULES=1 TEST_PHP_EXECUTABLE=./sapi/cli/php php ./run-tests.php -m ext/openssl/ It seems your API is good. Isn't it just there aren't people who would like to responsible? Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net