}
/* class table hash keys, class names, properties, methods, constants, etc */
- for (idx = 0; idx < CG(class_table)->nNumUsed; idx++) {
+ for (idx = 0; idx < CG(class_table)->nNumUsed; idx++) {
+ zend_class_entry *ce;
+
p = CG(class_table)->arData + idx;
if (Z_TYPE(p->val) == IS_UNDEF) continue;
- zend_class_entry *ce = (zend_class_entry*)Z_PTR(p->val);
+ ce = (zend_class_entry*)Z_PTR(p->val);
if (p->key) {
p->key = accel_new_interned_string(p->key TSRMLS_CC);
char salt[PHP_MAX_SALT_LEN + 1];
char *str, *salt_in = NULL;
int str_len, salt_in_len = 0;
- salt[0] = salt[PHP_MAX_SALT_LEN] = '\0';
zend_string *result;
+ salt[0] = salt[PHP_MAX_SALT_LEN] = '\0';
+
/* This will produce suitable results if people depend on DES-encryption
* available (passing always 2-character salt). At least for glibc6.1 */
memset(&salt[1], '$', PHP_MAX_SALT_LEN - 1);
efree(transport_string);
if (stream && use_proxy && use_ssl) {
+ smart_str header = {0};
+
/* Set peer_name or name verification will try to use the proxy server name */
if (!context || (tmpzval = php_stream_context_get_option(context, "ssl", "peer_name")) == NULL) {
ZVAL_STRING(&ssl_proxy_peer_name, resource->host);
php_stream_context_set_option(stream->context, "ssl", "peer_name", &ssl_proxy_peer_name);
}
- smart_str header = {0};
-
smart_str_appendl(&header, "CONNECT ", sizeof("CONNECT ")-1);
smart_str_appends(&header, resource->host);
smart_str_appendc(&header, ':');
return ret;
}
-static void delete_internal_hashtable(void *data)
+static void delete_internal_hashtable(zval *zv)
{
+ void *data = Z_PTR_P(zv);
zend_hash_destroy(*(HashTable**)data);
free(*(HashTable**)data);
}
return (res);
}
-PHPAPI zend_string *php_str_to_str(char *haystack, int length, char *needle,
- int needle_len, char *str, int str_len);
+//???PHPAPI zend_string *php_str_to_str(char *haystack, int length, char *needle,
+//??? int needle_len, char *str, int str_len);
/* Escape \n. sequences
* We use php_str_to_str() and not php_str_replace_in_subject(), since the latter