|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
[1999-08-23 15:48 UTC] sas at cvs dot php dot net
[1999-08-25 09:13 UTC] christophe dot massiot at mail dot dotcom dot fr
[1999-09-25 13:13 UTC] andi at cvs dot php dot net
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Sat Dec 20 22:00:01 2025 UTC |
The following script using postgresql functions : <? pg_connect("localhost", 5432, "", "", "webase3"); $toto = pg_exec("select * from MEMBRE where login='MASSIOT'"); pg_fetch_array($toto, 0); ?> produces on pg_fetch_array() : 18:50 [webase3:p3] titi:~% php toto.php Content-Type: text/html toto.php: Freeing 0x080FADE8 (1 bytes), allocated in pgsql.c on line 915<br> toto.php: Last leak repeated 26 times