Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:59782 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 84632 invoked from network); 12 Apr 2012 03:09:37 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 12 Apr 2012 03:09:37 -0000 Authentication-Results: pb1.pair.com smtp.mail=jason.gerfen@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=jason.gerfen@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.210.170 as permitted sender) X-PHP-List-Original-Sender: jason.gerfen@gmail.com X-Host-Fingerprint: 209.85.210.170 mail-iy0-f170.google.com Received: from [209.85.210.170] ([209.85.210.170:35923] helo=mail-iy0-f170.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id F8/A1-23245-077468F4 for ; Wed, 11 Apr 2012 23:09:36 -0400 Received: by iaeh11 with SMTP id h11so2574577iae.29 for ; Wed, 11 Apr 2012 20:09:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:references:from:content-type:x-mailer:in-reply-to :message-id:date:to:content-transfer-encoding:mime-version; bh=JwX9DwkjaQ7RoF66hLqh1buqozo4mbECT6JVxyRAlhU=; b=c+v8xfIlcsGyzxI2+3MT3hEBDc8+yNz2Jj8h7Gdpd7BCxQQrUjyFPzJ1I5eryH0cu8 4DEhGjn0iWkxKZdtyLmbF2hEOSpYNeBQW9e8oY9rYFABcO91irR2YMvAivJjUSjAWQlY 3OlUL+HEQdHvvdyMqPRRudjW0NeV/JsT8Ir3HQmvThA6Mdk4vGN9GB6powMJNihGGY3z FJ9SRunSRd9QD7n6wyPHVSnxJDJ3rnuZIvrhapEzhTCMITNWtV9HY/YqNIKW9oPohC5A QWeqNv6hEWjHWK8euSzrqQjY0he14HQpVho3NYw37Cif2iusyxrMN2kZHrg87VXpzRZi aQBw== Received: by 10.43.131.194 with SMTP id hr2mr658321icc.34.1334200173315; Wed, 11 Apr 2012 20:09:33 -0700 (PDT) Received: from [192.168.1.101] (c-67-186-224-109.hsd1.ut.comcast.net. [67.186.224.109]) by mx.google.com with ESMTPS id iu5sm13045382igc.14.2012.04.11.20.09.31 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 11 Apr 2012 20:09:32 -0700 (PDT) References: <0BAF545D-95F6-4C4B-8E03-025E8604B1ED@gmail.com> <4F863785.7000709@sugarcrm.com> Content-Type: text/plain; charset=us-ascii X-Mailer: iPhone Mail (9B176) In-Reply-To: Message-ID: <11AF7A22-50C6-42C8-8706-910BCF0F2685@gmail.com> Date: Wed, 11 Apr 2012 21:09:28 -0600 To: "internals@lists.php.net" Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (1.0) Subject: Re: [PHP-DEV] Re: Push Request #21 From: jason.gerfen@gmail.com ("jason.gerfen@gmail.com") On Apr 11, 2012, at 8:39 PM, Yasuo Ohgaki wrote: > Hi >=20 > 2012/4/12 Stas Malyshev : >> Hi! >>=20 >>> There really doesn't seem to be much interest in this proposed patch. Sh= ould I continue development efforts on closing this feature request? >>=20 >> Can't say anything here - I don't use these APIs personally, but maybe >> other people need them. No idea :) On that note Mr. Malyshev has indicated (in addition to several other thread= s on the internals list) that no new features will be added in 5.3 or 5.4 br= anches. Any idea on when new features might make it in to the core? >>> I do also have a few questions regarding standards adherence, and memory= leak methods of detection. >>>=20 >>> I ask about the memory leak detection as passing test scripts through va= lgrind only led me to find leaks in the openssl_pkey_new() function. >>=20 >> There's two levels of leak detection - internal memory management & >> valgrind. How to work with them: >>=20 >> 1. Internal. Compile php with --enable-debug and run your tests. Leaks >> will be reported by php. >> 2. External. Set USE_ZEND_ALLOC environment variable to 0. Set >> ZEND_DONT_UNLOAD_MODULES to 1. Run it under valgrind, see what it reports= . >=20 > You might want to do something like >=20 Is this in the documentation? If so could you provide a link? > USE_ZEND_ALLOC=3D0 ZEND_DONT_UNLOAD_MODULES=3D1 > TEST_PHP_EXECUTABLE=3D./sapi/cli/php php ./run-tests.php -m ext/openssl/ >=20 > It seems your API is good. > Isn't it just there aren't people who would like to > responsible? >=20 > Regards, >=20 > -- > Yasuo Ohgaki > yohgaki@ohgaki.net