- - the request bodies created in http_request_pool_attach() are not
- destroyed in http_request_pool_detach(); may be a memory problem
- in long running scripts
- - protected class members are not type safe
+ Our http_urlencode_hash() does not differentiate between prefixes
+ for numeric or string keys.
+ Inflating raw deflated data causes a re-initialization of the inflate
+ stream where the corresponding window bits are modified to tell libz
+ to not check for zlib header bytes. This is not preventable AFAICS.