X-Git-Url: https://git.m6w6.name/?p=m6w6%2Fext-http;a=blobdiff_plain;f=KnownIssues.txt;h=4c2ad80b6025a49554ce2b2c54e6b02063385c26;hp=8fa37c75e403221824f75bc2c3ced7dde7104e05;hb=refs%2Fheads%2Fv2.2.x;hpb=2acce3eb2d1815e2882608da632c3fd5614b389c diff --git a/KnownIssues.txt b/KnownIssues.txt index 8fa37c7..4c2ad80 100644 --- a/KnownIssues.txt +++ b/KnownIssues.txt @@ -1,32 +1,25 @@ Known Issues ============ -$Id$ -Issues I don't know how to solve yet are as follows: - -There are odd memory corruptions when HttpRequest objects -are created with urls out of an array and attached to an -HttpRequestPool object -- see HttpRequestPool_001.phpt - -[Tue Jun 14 20:19:34 2005] Script: 'tests/HttpRequestPool_001.php' ---------------------------------------- -/home/mike/dev/cvs/pecl/http/http_request_api.c(184) : Block 0x082919EF status: -Beginning: Overrun (magic=0x12F8DC00, expected=0x7312F8DC) - End: Unknown ---------------------------------------- -[Tue Jun 14 20:19:34 2005] Script: 'tests/HttpRequestPool_001.php' ---------------------------------------- -/home/mike/dev/cvs/pecl/http/http_request_api.c(184) : Block 0x08291BE7 status: -Beginning: Overrun (magic=0x12F8DC00, expected=0x7312F8DC) - End: Unknown ---------------------------------------- -[Tue Jun 14 20:19:34 2005] Script: 'tests/HttpRequestPool_001.php' ---------------------------------------- -/home/mike/dev/cvs/pecl/http/http_request_api.c(184) : Block 0x08291D3F status: -Beginning: Overrun (magic=0x12F8DC00, expected=0x7312F8DC) - End: Unknown ---------------------------------------- -/home/mike/dev/cvs/pecl/http/http_request_api.c(156) : Freeing 0x08291D68 (36 bytes), script=tests/HttpRequestPool_001.php -Last leak repeated 2 times -=== Total 3 memory leaks detected === +Windows: + If you keep getting "SSL connect error" when trying to issue + requests, try another (newer) libeay32.dll/ssleay32.dll pair. +Internals: + Inflating raw deflated data causes a re-initialization of the inflate + stream where the corresponding window bits are modified to tell libz + to not check for zlib header bytes. This is not preventable AFAICS. + LFS dependant parts of libcurl are left out because of off_t, + respectively off64_t confusion. + Persistent handles and "cookiestore" request option do interfere, + as libcurl saves the cookies to the file on curl_easy_destroy(), + cookies are not saved until the CURL handle will be recycled. + Thus one would either need to + * run PHP with raphf.persistent_handles.limit = 0 + * call raphf\persistent_handles_clean() every request + * call $client->flushCookies(), which is available + since libcurl v7.17.1 and does not work with the + procedural API + HTTP and Proxy authentication information (username/password) can not be + unset with NULL prior libcurl v7.19.6 and separate options for setting + username and password--which work--are only available since v7.19.6.