ID:               36526
 Updated by:       [EMAIL PROTECTED]
 Reported By:      terry at kryogenic dot co dot uk
-Status:           Open
+Status:           Bogus
 Bug Type:         *Compression related
 Operating System: Debian
 PHP Version:      5.1.2
 New Comment:

Sorry, but your problem does not imply a bug in PHP itself.  For a
list of more appropriate places to ask for help using PHP, please
visit http://www.php.net/support.php as this bug system is not the
appropriate forum for asking support questions.  Due to the volume
of reports we can not explain in detail here why your report is not
a bug.  The support channels will be able to provide an explanation
for you.

Thank you for your interest in PHP.

Treat the base64 encoded string with urlencode() prior passing in a
link.


Previous Comments:
------------------------------------------------------------------------

[2006-02-25 13:21:32] terry at kryogenic dot co dot uk

$decStr = bzdecompress(base64_decode($_REQUEST['error'])); should be
$decStr = bzdecompress(base64_decode($_REQUEST['object'])); in the
example code. My bad :)

------------------------------------------------------------------------

[2006-02-25 13:17:55] terry at kryogenic dot co dot uk

Description:
------------
serializing, compressing and bzcompress/gzcompress an object then
sending to another script via _REQUEST seems to cause corruption.
bzdecompress returns error code -4. This following code works in php4 &
php5.0.x but not 5.1.2. gzcompress also returns a very similar error.



Reproduce code:
---------------
script a)
  $compStr = bzcompress(serialize($an_array));
  $base64Str = base64_encode($compStr);

  /* send this to script b like so:
   * http://somehost/script_b.php?object=$base64Str
   */

script b)
  $decStr = bzdecompress(base64_decode($_REQUEST['error']));
  $array = unserialize($decStr);

Expected result:
----------------
bzdecompress should succeed and after unserialization I should end up
with the original array from script a.

Actual result:
--------------
bzdecompress returns -4 (data error) and unserialize would of course
fail in the code above.


------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=36526&edit=1

Reply via email to