[PHP-BUG] Bug #61606 [NEW]: Unstable function renaming

2012-04-02 Thread michael dot rouges at gmail dot com
From: 
Operating system: Debian Squeeze
PHP version:  5.4.0
Package:  Reproducible crash
Bug Type: Bug
Bug description:Unstable function renaming

Description:

Since APD is no longer compatible with recent versions of PHP, I use custom
extension functions for renaming (sources:
http://www.developpez.net/forums/attachments/p92460d183074/c-cpp/c/besoin-daide-corriger-extension-php-toute-petite-jure/php_rename.zip/)

Test script:
---


Expected result:

This extension should rename functions, native or not, for the execution
context of the script called.

Actual result:
--
This extension fills its role very well but, strangely, in some executions
(variable number, nearly one out of 10-15), the function function_rename ()
seems to have a permanent effect on PHP functions.

Currently, the only way to fix this bug, it's a restart Apache.

-- 
Edit bug report at https://bugs.php.net/bug.php?id=61606&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61606&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61606&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61606&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61606&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61606&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61606&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61606&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61606&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61606&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61606&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61606&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61606&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61606&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61606&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61606&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61606&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61606&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61606&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61606&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61606&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61606&r=mysqlcfg



Req #61602 [Com]: Allow access to name of constant used as default value

2012-04-02 Thread reeze dot xia at gmail dot com
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1

 ID: 61602
 Comment by: reeze dot xia at gmail dot com
 Reported by:sebast...@php.net
 Summary:Allow access to name of constant used as default
 value
 Status: Open
 Type:   Feature/Change Request
 Package:Reflection related
 Operating System:   Irrelevant
 PHP Version:5.4Git-2012-04-02 (Git)
 Block user comment: N
 Private report: N

 New Comment:

PS:

@pierrick pull request is here https://github.com/php/php-src/pull/35.

thanks.


Previous Comments:

[2012-04-03 05:56:12] reeze dot xia at gmail dot com

Hi, pierrick & sebastian:
   I have create another patch for this request. it differ's in:

   - rename defaultValueIsConstant to isDefaultValueConstant to match bool 
return values's is* method naming.
   - handle global constant.
   - refactor code to remove duplicate.
   - add 3 tests for it.

and I've make test everything looks fine.

please review it for me.

Thanks.


[2012-04-03 00:24:13] pierr...@php.net

Just created a quick patch. If it's Ok with everybody I'll commit it to master 
with tests.


[2012-04-03 00:23:24] pierr...@php.net

The following patch has been added/updated:

Patch Name: getDefaultValueConstantName.diff
Revision:   1333412604
URL:
https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604


[2012-04-02 14:34:44] der...@php.net

It's definitely possible, I've just added something like this to VLD: 
https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8


[2012-04-02 14:14:16] sebast...@php.net

Description:

When a constant is used for the default value of an optional parameter, the 
Reflection API (tries to) resolve(s) the constant to its value and then returns 
it as the default value.

In addition, I would like to have two additional methods in ReflectionParameter 
that expose 1) whether or not a default value "is a" constant and 2) the name 
of the constant.

In the example below, I am using temporary names ("defaultValueIsConstant" and 
"getDefaultValueConstantName") for these two methods because I cannot think of 
sensible method names right now.

Test script:
---
getParameters();

foreach ($p as $_p) {
var_dump($_p->getDefaultValue());

if ($_p->defaultValueIsConstant()) {
var_dump($_p->getDefaultValueConstantName());
}
}

Expected result:

string(3) "..."
string(9) "self::bar"

Actual result:
--
string(3) "..."






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1


Bug #61588 [Fbk->Asn]: PDOStatement::getColumnMeta returns original table name from view

2012-04-02 Thread cdburgess at gmail dot com
Edit report at https://bugs.php.net/bug.php?id=61588&edit=1

 ID: 61588
 User updated by:cdburgess at gmail dot com
 Reported by:cdburgess at gmail dot com
 Summary:PDOStatement::getColumnMeta returns original table
 name from view
-Status: Feedback
+Status: Assigned
 Type:   Bug
 Package:PDO related
 Operating System:   Mac OSX
 PHP Version:5.3.10
 Assigned To:mysql
 Block user comment: N
 Private report: N

 New Comment:

PHP v5.3.10
MySQL v5.5.22
Apache v2.2.21

Here is a script that contains all of the information you need to reproduce. 
The 
commented parts at the bottom contain all of the schema / data information. 
Just 
create your database, setup the PDO access, and run the script. It will provide 
the queries, descriptions, and getColumnMeta results to show you what I am 
seeing.

Thanks!

-- SCRIPT BELOW HERE --

' . "\n";
echo 'In this query, you will see the table is reported as expected. 
(my_installs)';
$result = $connection->query($query);
var_dump($result->getColumnMeta(2));

$query = "SELECT `MyInstall`.`id`, `MyInstall`.`user_id`, 
`MyInstall`.`script_id`, `MyInstall`.`path`, `MyInstall`.`url`, 
`MyInstall`.`created`, `MyInstall`.`version`, `MyInstall`.`admin_url`, 
`MyInstall`.`name`, `MyInstall`.`icon` FROM `my_installs` AS `MyInstall` WHERE 
`user_id` = 'dcc87a2c-7b4b-11e1-8397-60195b7d6275' ORDER BY `url` ASC";
echo $query . '' . "\n";
echo 'With the Alias format of the query and using only the user_id in the 
where 
clause, the table Alias is reported.';
$result = $connection->query($query);
var_dump($result->getColumnMeta(2));

$query = "SELECT `MyInstall`.`id`, `MyInstall`.`user_id`, 
`MyInstall`.`script_id`, `MyInstall`.`path`, `MyInstall`.`url`, 
`MyInstall`.`created`, `MyInstall`.`version`, `MyInstall`.`admin_url`, 
`MyInstall`.`name`, `MyInstall`.`icon` FROM `my_installs` AS `MyInstall` WHERE 
`user_id` = 'dcc87a2c-7b4b-11e1-8397-60195b7d6275' AND `script_id` = '057de1e0-
7b48-11e1-8397-60195b7d6275' ORDER BY `url` ASC";
echo $query . '' . "\n";
echo 'When adding the second where clause (using script_id), the Script table 
alias is reported, but MyInstall or my_installs is expected.';
$result = $connection->query($query);
var_dump($result->getColumnMeta(2));


/*
-- phpMyAdmin SQL Dump
-- version 3.4.10.2
-- http://www.phpmyadmin.net
--
-- Host: localhost
-- Generation Time: Apr 03, 2012 at 07:46 AM
-- Server version: 5.5.22
-- PHP Version: 5.3.10

SET SQL_MODE="NO_AUTO_VALUE_ON_ZERO";
SET time_zone = "+00:00";

--
-- Database: `testpdo`
--

DELIMITER $$
--
-- Procedures
--
CREATE DEFINER=`root`@`localhost` PROCEDURE `BuildNewInstallStatPartition`()
BEGIN

  DECLARE maxpart_date date;

  SELECT SUBSTR(MAX(PARTITION_DESCRIPTION) , 2, 19) + INTERVAL 1 MONTH
INTO maxpart_date
FROM INFORMATION_SCHEMA.PARTITIONS
WHERE TABLE_NAME =  'install_stats';

  
SET @sql := CONCAT('ALTER TABLE install_stats ADD PARTITION (PARTITION p_'
, YEAR(maxpart_date), MONTH(maxpart_date)
, ' values less than('''
, CAST(maxpart_date as DATETIME)
, '''))');

PREPARE stmt FROM @sql;
EXECUTE stmt;
DEALLOCATE PREPARE stmt;

END$$

DELIMITER ;

-- 

--
-- Stand-in structure for view `my_installs`
--
CREATE TABLE IF NOT EXISTS `my_installs` (
`id` char(36)
,`user_id` char(36)
,`script_id` char(36)
,`script_version_id` char(36)
,`script_version_package_id` char(36)
,`name` varchar(35)
,`version` varchar(25)
,`path` varchar(255)
,`url` varchar(255)
,`admin_url` varchar(128)
,`icon` varchar(128)
,`created` datetime
);
-- 

--
-- Table structure for table `scripts`
--

CREATE TABLE IF NOT EXISTS `scripts` (
  `id` char(36) NOT NULL,
  `category_id` char(36) NOT NULL,
  `name` varchar(35) NOT NULL,
  `icon` varchar(128) NOT NULL,
  `created` datetime NOT NULL,
  PRIMARY KEY (`id`),
  KEY `category_id` (`category_id`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8;

--
-- Dumping data for table `scripts`
--

INSERT INTO `scripts` (`id`, `category_id`, `name`, `icon`, `created`) VALUES
('057de1e0-7b48-11e1-8397-60195b7d6275', 
'05aff694-7b48-11e1-8397-60195b7d6275', 
'WordPress', 'icon_WordPress.gif', '-00-00 00:00:00');

-- 

--
-- Table structure for table `script_installs`
--

CREATE TABLE IF NOT EXISTS `script_installs` (
  `id` char(36) NOT NULL,
  `user_id` char(36) NOT NULL,
  `script_version_package_id` char(36) NOT NULL,
  `path` varchar(255) NOT NULL,
  `url` varchar(255) NOT NULL,
  `created` datetime NOT NULL,
  PRIMARY KEY (`id`),
  KEY `user_id` (`user_id`),
  KEY `script_version_package_id` (`script_version_package_id`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8;

--
-- Dum

Req #61602 [Com]: Allow access to name of constant used as default value

2012-04-02 Thread reeze dot xia at gmail dot com
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1

 ID: 61602
 Comment by: reeze dot xia at gmail dot com
 Reported by:sebast...@php.net
 Summary:Allow access to name of constant used as default
 value
 Status: Open
 Type:   Feature/Change Request
 Package:Reflection related
 Operating System:   Irrelevant
 PHP Version:5.4Git-2012-04-02 (Git)
 Block user comment: N
 Private report: N

 New Comment:

Hi, pierrick & sebastian:
   I have create another patch for this request. it differ's in:

   - rename defaultValueIsConstant to isDefaultValueConstant to match bool 
return values's is* method naming.
   - handle global constant.
   - refactor code to remove duplicate.
   - add 3 tests for it.

and I've make test everything looks fine.

please review it for me.

Thanks.


Previous Comments:

[2012-04-03 00:24:13] pierr...@php.net

Just created a quick patch. If it's Ok with everybody I'll commit it to master 
with tests.


[2012-04-03 00:23:24] pierr...@php.net

The following patch has been added/updated:

Patch Name: getDefaultValueConstantName.diff
Revision:   1333412604
URL:
https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604


[2012-04-02 14:34:44] der...@php.net

It's definitely possible, I've just added something like this to VLD: 
https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8


[2012-04-02 14:14:16] sebast...@php.net

Description:

When a constant is used for the default value of an optional parameter, the 
Reflection API (tries to) resolve(s) the constant to its value and then returns 
it as the default value.

In addition, I would like to have two additional methods in ReflectionParameter 
that expose 1) whether or not a default value "is a" constant and 2) the name 
of the constant.

In the example below, I am using temporary names ("defaultValueIsConstant" and 
"getDefaultValueConstantName") for these two methods because I cannot think of 
sensible method names right now.

Test script:
---
getParameters();

foreach ($p as $_p) {
var_dump($_p->getDefaultValue());

if ($_p->defaultValueIsConstant()) {
var_dump($_p->getDefaultValueConstantName());
}
}

Expected result:

string(3) "..."
string(9) "self::bar"

Actual result:
--
string(3) "..."






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1


Bug #60840 [Com]: undefined symbol: mysqlnd_debug_std_no_trace_funcs

2012-04-02 Thread luiz dot fk at gmail dot com
Edit report at https://bugs.php.net/bug.php?id=60840&edit=1

 ID: 60840
 Comment by: luiz dot fk at gmail dot com
 Reported by:public at grik dot net
 Summary:undefined symbol: mysqlnd_debug_std_no_trace_funcs
 Status: Assigned
 Type:   Bug
 Package:PDO related
 Operating System:   linux
 PHP Version:5.4SVN-2012-01-22 (snap)
 Assigned To:uw
 Block user comment: N
 Private report: N

 New Comment:

Hi... same here:

PHP Warning:  PHP Startup: Unable to load dynamic library 
'/usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so' - 
/usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so: undefined symbol: 
mysqlnd_debug_std_no_trace_funcs in Unknown on line 0

Warning: PHP Startup: Unable to load dynamic library 
'/usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so' - 
/usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so: undefined symbol: 
mysqlnd_debug_std_no_trace_funcs in Unknown on line 0


Previous Comments:

[2012-01-22 20:02:35] public at grik dot net

I tried to compile without mysqlnd driver:
# cd ext/pdo_mysql
# ./configure --with-pdo-mysql=/usr
checking for mysql_config... /usr/bin/mysql_config
# make; make install
#php
undefined symbol: mysqlnd_debug_std_no_trace_funcs

same issue, even when mysqlnd is not used


[2012-01-22 18:58:33] public at grik dot net

Description:

I built PHP 5.4 from sources in debug mode with pdo_mysql extension as shared,
compiled successfully, but when I starting php I get the startup warning.

My configure command:

'./configure' \
'--prefix=/usr/local' \
'--sysconfdir=/etc' \
'--with-config-file-path=/etc' \
'--with-mysql=shared,mysqlnd' \
'--with-mysqli=shared,mysqlnd' \
'--with-pdo-mysql=shared,mysqlnd' \
--enable-fpm \
--enable-debug



Test script:
---
just running from command line


Actual result:
--
# php

Warning: PHP Startup: Unable to load dynamic library 
'/usr/local/lib/php/extensions/debug-non-zts-20100525/pdo_mysql.so' - 
/usr/local/lib/php/extensions/debug-non-zts-20100525/pdo_mysql.so: undefined 
symbol: mysqlnd_debug_std_no_trace_funcs in Unknown on line 0






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=60840&edit=1


Bug #61605 [Opn->Fbk]: header_remove() does not remove all headers

2012-04-02 Thread aharvey
Edit report at https://bugs.php.net/bug.php?id=61605&edit=1

 ID: 61605
 Updated by: ahar...@php.net
 Reported by:david at grudl dot com
 Summary:header_remove() does not remove all headers
-Status: Open
+Status: Feedback
 Type:   Bug
 Package:HTTP related
 PHP Version:5.4.0
 Block user comment: N
 Private report: N

 New Comment:

Which SAPI are you using? CGI, FPM, Apache2 handler, Apache2 filter, something 
else?


Previous Comments:

[2012-04-02 23:20:14] david at grudl dot com

Description:

header_remove($name) removes only one header $name. The function header() 
behaves the same way and replaces only first header.

Test script:
---
header('A: first');
header('A: second', FALSE); // append

// removes only 'A: first' and header 'A: second' is sent
header_remove('A');



Expected result:

no 'A' header is sent

Actual result:
--
header A: second is sent






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61605&edit=1


Req #60305 [Opn->Nab]: myClass::unset() keyword conflict

2012-04-02 Thread yohgaki
Edit report at https://bugs.php.net/bug.php?id=60305&edit=1

 ID: 60305
 Updated by: yohg...@php.net
 Reported by:matty023 at gmail dot com
 Summary:myClass::unset() keyword conflict
-Status: Open
+Status: Not a bug
 Type:   Feature/Change Request
 Package:Scripting Engine problem
 PHP Version:5.4.0RC1
 Block user comment: N
 Private report: N

 New Comment:

Thank you for taking the time to write to us, but this is not
a bug. Please double-check the documentation available at
http://www.php.net/manual/ and the instructions on how to report
a bug at http://bugs.php.net/how-to-report.php

unset is keyword, so you cannot use it as previous comment describes.


Previous Comments:

[2011-11-21 03:50:41] anon at anon dot anon

@francois: It's not a bug. It's a feature.

It's kind of accepted that all programming languages have some keywords you 
can't use as identifier names. The general solution is to just choose a 
synonym. Possible alternative verbs for "unset" include:
- clear
- remove
- delete
- dispose
- drop
- erase

Unusually, the language limitation is actually fixable for "unset" because of 
its obvious function-like syntax. It's probably not a priority though. Also, at 
best, it would break the history of PHP syntax-coloring editors turning "unset" 
keyword color.


[2011-11-15 19:32:03] francois dot dambrine at isen-lille dot fr

This bug also happen in php 5.3.6 (ubuntu 11.10 default version).


[2011-11-15 02:19:37] matty023 at gmail dot com

Description:

While "keywords" and "language constructs" cannot be used as function names, I 
find myself with the need to have a function in my class named "unset", I also 
see that list is a very common and useful term.

After the introduction of classes and namespaces it's time to look at enabling 
usage of these common terms in classes and namespaces.



Test script:
---
https://bugs.php.net/bug.php?id=60305&edit=1


Bug #60696 [Opn]: Large Integers problem

2012-04-02 Thread yohgaki
Edit report at https://bugs.php.net/bug.php?id=60696&edit=1

 ID: 60696
 Updated by: yohg...@php.net
 Reported by:danhen at web dot de
 Summary:Large Integers problem
 Status: Open
 Type:   Bug
 Package:Scripting Engine problem
 Operating System:   Windows
 PHP Version:5.4.0RC5
 Block user comment: N
 Private report: N

 New Comment:

Could you or anyone try see if this happens with other PDO drivers?

$iTest is overflowed (i.e. larger than 31^2), but this should not matter.


Previous Comments:

[2012-01-10 05:20:22] danhen at web dot de

Description:

If large integer values ​​are defined in the source code, connecting to 
MSSQL-Server fails.

Setup:
Windows Vista
PHP5.4 RC5
php_pdo_sqlsrv as additional extension

The code which defines the value doesn't need to be executed. It's enough 
defining such values before connecting to mssql (inside a previous loadad class 
in my case). When 90 is changed to 9 everything is fine.

Test script:
---
https://bugs.php.net/bug.php?id=60696&edit=1


Bug #61563 [Opn->Nab]: Installation/configuration problem with Apache 2.2.22; PHP 5.2.9-2 et OCI8 (wit

2012-04-02 Thread sixd
Edit report at https://bugs.php.net/bug.php?id=61563&edit=1

 ID: 61563
 Updated by: s...@php.net
 Reported by:alex_couturier at yahoo dot com
 Summary:Installation/configuration problem with Apache
 2.2.22; PHP 5.2.9-2 et OCI8 (wit
-Status: Open
+Status: Not a bug
 Type:   Bug
 Package:Dynamic loading
 Operating System:   Windows 2003 server
 PHP Version:master-Git-2012-03-30 (Git)
 Block user comment: N
 Private report: N

 New Comment:

Please ask this on a support forum before logging a bug.
Try http://www.oracle.com/technology/forums/php.html


Previous Comments:

[2012-03-30 13:21:57] alex_couturier at yahoo dot com

Description:

;extension=php_bz2.dll
;extension=php_curl.dll
;extension=php_dba.dll
;extension=php_dbase.dll
;extension=php_fdf.dll
extension=php_gd2.dll
;extension=php_gettext.dll
;extension=php_gmp.dll
;extension=php_ifx.dll
;extension=php_imap.dll
;extension=php_interbase.dll
;extension=php_ldap.dll
extension=php_mbstring.dll
;extension=php_exif.dll
;extension=php_mcrypt.dll
;extension=php_mhash.dll
;extension=php_mime_magic.dll
;extension=php_ming.dll
;extension=php_msql.dll
;extension=php_mssql.dll
extension=php_mysql.dll
extension=php_mysqli.dll
extension=php_oci8.dll
extension=php_openssl.dll
extension=php_pdo.dll
;extension=php_pdo_firebird.dll
;extension=php_pdo_mssql.dll
extension=php_pdo_mysql.dll
;extension=php_pdo_oci.dll
;extension=php_pdo_oci8.dll
;extension=php_pdo_odbc.dll
;extension=php_pdo_pgsql.dll
extension=php_pdo_sqlite.dll
;extension=php_pgsql.dll
;extension=php_pspell.dll
;extension=php_shmop.dll
;extension=php_snmp.dll
;extension=php_soap.dll
;extension=php_sockets.dll
;extension=php_sqlite.dll
;extension=php_sybase_ct.dll
;extension=php_tidy.dll
;extension=php_xmlrpc.dll
;extension=php_xsl.dll
extension=php_zip.dll
extension=php_http.dll
extension=php_oracle.dll

Test script:
---
Hello Support,

I would like help about a problem that I could not answer.

So I try to install Apache 2.2.22 with the link oci8 to connect my database
with Oracle 10G on a OS windows server 2003.

So I have installed exactly the pre requisite necessary to work together apache
with oci8

- Oracle instant client
- PHP 5.2.17
- Apache 2.2.22
- Oracle instant client 11G 32bits

I create the environnement variable TNS_ADMIN and PATH with the directory
"D:\www\instantclient_11_1"

And when I start Apache, I have the error message in php log :

PHP Warning:  PHP Startup: Unable to load dynamic library 'ext/php_oci8.dll' - 
%1 is not a valid Win32 application.\r\n in Unknown on line 0

PHP Warning:  PHP Startup: Unable to load dynamic library 'ext/php_oracle.dll' 
- %1 is not a valid Win32 application.\r\n in Unknown on line 0


Have you got an idea ?

Many thanks

AC







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61563&edit=1


Req #61602 [Opn]: Allow access to name of constant used as default value

2012-04-02 Thread pierrick
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1

 ID: 61602
 Updated by: pierr...@php.net
 Reported by:sebast...@php.net
 Summary:Allow access to name of constant used as default
 value
 Status: Open
 Type:   Feature/Change Request
 Package:Reflection related
 Operating System:   Irrelevant
 PHP Version:5.4Git-2012-04-02 (Git)
 Block user comment: N
 Private report: N

 New Comment:

Just created a quick patch. If it's Ok with everybody I'll commit it to master 
with tests.


Previous Comments:

[2012-04-03 00:23:24] pierr...@php.net

The following patch has been added/updated:

Patch Name: getDefaultValueConstantName.diff
Revision:   1333412604
URL:
https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604


[2012-04-02 14:34:44] der...@php.net

It's definitely possible, I've just added something like this to VLD: 
https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8


[2012-04-02 14:14:16] sebast...@php.net

Description:

When a constant is used for the default value of an optional parameter, the 
Reflection API (tries to) resolve(s) the constant to its value and then returns 
it as the default value.

In addition, I would like to have two additional methods in ReflectionParameter 
that expose 1) whether or not a default value "is a" constant and 2) the name 
of the constant.

In the example below, I am using temporary names ("defaultValueIsConstant" and 
"getDefaultValueConstantName") for these two methods because I cannot think of 
sensible method names right now.

Test script:
---
getParameters();

foreach ($p as $_p) {
var_dump($_p->getDefaultValue());

if ($_p->defaultValueIsConstant()) {
var_dump($_p->getDefaultValueConstantName());
}
}

Expected result:

string(3) "..."
string(9) "self::bar"

Actual result:
--
string(3) "..."






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1


Req #61602 [PATCH]: Allow access to name of constant used as default value

2012-04-02 Thread pierr...@php.net
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1

 ID: 61602
 Patch added by: pierr...@php.net
 Reported by:sebast...@php.net
 Summary:Allow access to name of constant used as default
 value
 Status: Open
 Type:   Feature/Change Request
 Package:Reflection related
 Operating System:   Irrelevant
 PHP Version:5.4Git-2012-04-02 (Git)
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: getDefaultValueConstantName.diff
Revision:   1333412604
URL:
https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604


Previous Comments:

[2012-04-02 14:34:44] der...@php.net

It's definitely possible, I've just added something like this to VLD: 
https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8


[2012-04-02 14:14:16] sebast...@php.net

Description:

When a constant is used for the default value of an optional parameter, the 
Reflection API (tries to) resolve(s) the constant to its value and then returns 
it as the default value.

In addition, I would like to have two additional methods in ReflectionParameter 
that expose 1) whether or not a default value "is a" constant and 2) the name 
of the constant.

In the example below, I am using temporary names ("defaultValueIsConstant" and 
"getDefaultValueConstantName") for these two methods because I cannot think of 
sensible method names right now.

Test script:
---
getParameters();

foreach ($p as $_p) {
var_dump($_p->getDefaultValue());

if ($_p->defaultValueIsConstant()) {
var_dump($_p->getDefaultValueConstantName());
}
}

Expected result:

string(3) "..."
string(9) "self::bar"

Actual result:
--
string(3) "..."






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1


Bug #61559 [Com]: Test Bug - ext/standard/tests/streams/bug61115-1

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61559&edit=1

 ID: 61559
 Comment by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:Test Bug - ext/standard/tests/streams/bug61115-1
 Status: Closed
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.4.0
 Assigned To:shein
 Block user comment: N
 Private report: N

 New Comment:

Both Windows and Linux have slightly different error messages.

The current error message fails for me on both Windows and Linux.

My above patch fixes the Linux error message and forks the test into a Windows 
specific test (with the correct Windows error message).


Previous Comments:

[2012-04-02 23:24:13] mattfic...@php.net

The following patch has been added/updated:

Patch Name: bug61115-1.patch.txt
Revision:   1333409053
URL:
https://bugs.php.net/patch-display.php?bug=61559&patch=bug61115-1.patch.txt&revision=1333409053


[2012-03-29 23:35:17] sh...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.

Please, update, it should be fixed: http://git.php.net/?p=php-
src.git;a=blobdiff;f=ext/standard/tests/streams/bug61115-
1.phpt;h=573496edf0e2dbf0a77dc771f77c815098002a6f;hp=43c54b497423cfb7c21b0a2a4e8b
5e769d41956e;hb=e1352b04165142c945d1fc98c0bcd0b85c3f659d;hpb=55b1e612421c52ea0bb8
a3772095c5bbd62045db


[2012-03-29 22:45:01] mattfic...@php.net

Description:

Looks like this is a test bug, with the fatal error message text being slightly 
different than expected.

Might have to fork test into Windows and non-Windows tests.

Test Diff
001+ Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to 
allocate 2147483647 bytes) in 
C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php
 on line 5
001- Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to 
allocate %d bytes) in %s on line %d

Test script:
---
see ext/standard/tests/streams/bug61115-1.phpt

Expected result:

Pass
--
Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to 
allocate %d bytes) in %s on line %d

Actual result:
--
Fail
--
Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to 
allocate 2147483647 bytes) in 
C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php
 on line 5






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61559&edit=1


Bug #61559 [PATCH]: Test Bug - ext/standard/tests/streams/bug61115-1

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61559&edit=1

 ID: 61559
 Patch added by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:Test Bug - ext/standard/tests/streams/bug61115-1
 Status: Closed
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.4.0
 Assigned To:shein
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: bug61115-1.patch.txt
Revision:   1333409053
URL:
https://bugs.php.net/patch-display.php?bug=61559&patch=bug61115-1.patch.txt&revision=1333409053


Previous Comments:

[2012-03-29 23:35:17] sh...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.

Please, update, it should be fixed: http://git.php.net/?p=php-
src.git;a=blobdiff;f=ext/standard/tests/streams/bug61115-
1.phpt;h=573496edf0e2dbf0a77dc771f77c815098002a6f;hp=43c54b497423cfb7c21b0a2a4e8b
5e769d41956e;hb=e1352b04165142c945d1fc98c0bcd0b85c3f659d;hpb=55b1e612421c52ea0bb8
a3772095c5bbd62045db


[2012-03-29 22:45:01] mattfic...@php.net

Description:

Looks like this is a test bug, with the fatal error message text being slightly 
different than expected.

Might have to fork test into Windows and non-Windows tests.

Test Diff
001+ Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to 
allocate 2147483647 bytes) in 
C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php
 on line 5
001- Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to 
allocate %d bytes) in %s on line %d

Test script:
---
see ext/standard/tests/streams/bug61115-1.phpt

Expected result:

Pass
--
Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to 
allocate %d bytes) in %s on line %d

Actual result:
--
Fail
--
Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to 
allocate 2147483647 bytes) in 
C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php
 on line 5






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61559&edit=1


[PHP-BUG] Bug #61605 [NEW]: header_remove() does not remove all headers

2012-04-02 Thread david at grudl dot com
From: 
Operating system: 
PHP version:  5.4.0
Package:  HTTP related
Bug Type: Bug
Bug description:header_remove() does not remove all headers

Description:

header_remove($name) removes only one header $name. The function header()
behaves the same way and replaces only first header.

Test script:
---
header('A: first');
header('A: second', FALSE); // append

// removes only 'A: first' and header 'A: second' is sent
header_remove('A');



Expected result:

no 'A' header is sent

Actual result:
--
header A: second is sent

-- 
Edit bug report at https://bugs.php.net/bug.php?id=61605&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61605&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61605&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61605&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61605&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61605&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61605&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61605&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61605&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61605&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61605&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61605&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61605&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61605&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61605&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61605&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61605&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61605&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61605&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61605&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61605&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61605&r=mysqlcfg



Bug #61518 [Com]: skip on windows - ext/standard/tests/streams/bug60106.phpt

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61518&edit=1

 ID: 61518
 Comment by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:skip on windows -
 ext/standard/tests/streams/bug60106.phpt
 Status: Closed
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.3.10
 Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

For me, patch skips this test on Windows (which its supposed to).

However, on Linux, with PHP5.3.11rc1, the test fails (with or without the 
patch) because the socket name printed in the warning messages doesn't have 
4096 'a' characters like the test expects.


Previous Comments:

[2012-03-29 04:23:43] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=da85d5b4a00943a267db910299bdaee04c081c25
Log: Fix bug #61518 skip on windows, fix on linux - 
ext/standard/tests/streams/bug60106.phpt


[2012-03-27 17:30:50] a...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




[2012-03-27 17:26:06] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=da85d5b4a00943a267db910299bdaee04c081c25
Log: Fix bug #61518 skip on windows, fix on linux - 
ext/standard/tests/streams/bug60106.phpt


[2012-03-27 08:58:09] a...@php.net

extended the patch for the test to pass on linux - fixed a's count


[2012-03-27 08:56:08] a...@php.net

The following patch has been added/updated:

Patch Name: bug60106.diff
Revision:   1332838568
URL:
https://bugs.php.net/patch-display.php?bug=61518&patch=bug60106.diff&revision=1332838568




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61518


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61518&edit=1


Bug #61460 [Com]: popen_close_error-win32 expected output is wrong

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61460&edit=1

 ID: 61460
 Comment by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:popen_close_error-win32 expected output is wrong
 Status: Open
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.3.10
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-20 22:56:43] mattfic...@php.net

This patch fixes it:

20c20
< echo "*** Testing for error conditions ***\n";
---
> echo "*** Testing for error conditions ***".PHP_EOL;
22a23
> 
23a25
> 
29c31
< echo "\n--- Done ---";
---
> echo PHP_EOL.PHP_EOL."--- Done ---";
44,46c46,48
< resource(%d) of type (stream)
< 'abc.txt' is not recognized as an internal or external command,
< operable program or batch file.
---
> 
> Warning: popen(abc.txt,rw): Invalid argument in %s on line %d
> bool(false)
57c59,61
< --- Done ---
---
> 
> --- Done ---'abc.txt' is not recognized as an internal or external command,
> operable program or batch file.


[2012-03-20 22:54:08] mattfic...@php.net

Description:

Warning messages have changed since test written. Expected output is incorrect. 
See patch.

Expected result:

test pass

Actual result:
--
test fail








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61460&edit=1


Bug #61401 [Com]: ext\openssl\tests\004.phpt fails

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61401&edit=1

 ID: 61401
 Comment by: mattfic...@php.net
 Reported by:a...@php.net
 Summary:ext\openssl\tests\004.phpt fails
 Status: Closed
 Type:   Bug
 Package:OpenSSL related
 Operating System:   windows
 PHP Version:Irrelevant
 Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-29 04:23:35] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=bff8152565375c863f67833b73e2629c4d50cf63
Log: Fix bug #61401 ext\openssl\tests\004.phpt fails


[2012-03-28 15:39:53] a...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




[2012-03-28 15:34:18] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=bff8152565375c863f67833b73e2629c4d50cf63
Log: Fix bug #61401 ext\openssl\tests\004.phpt fails


[2012-03-15 18:36:48] a...@php.net

The patches set the appropriate config option, which overrides the wrong global 
valie.


[2012-03-15 18:24:19] a...@php.net

The following patch has been added/updated:

Patch Name: php53_004.patch
Revision:   1331835859
URL:
https://bugs.php.net/patch-display.php?bug=61401&patch=php53_004.patch&revision=1331835859




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61401


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61401&edit=1


Bug #61517 [Com]: random test failure - ext/standard/tests/misc/time_sleep_until_basic.phpt

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61517&edit=1

 ID: 61517
 Comment by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:random test failure -
 ext/standard/tests/misc/time_sleep_until_basic.phpt
 Status: Open
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.3.10
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-26 16:55:24] mattfic...@php.net

Description:

on windows, time_sleep_until() has millisecond accuracy while microtime() is 
accurate to 10th of a second. 

this means there can be up to a .9 millisecond difference which will fail this 
test. 

Expected result:

pass

Actual result:
--
randomly fails






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61517&edit=1


Bug #61480 [Com]: test bug - ext/gd/tests/bug48555.phpt

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61480&edit=1

 ID: 61480
 Comment by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:test bug - ext/gd/tests/bug48555.phpt
 Status: Open
 Type:   Bug
 Package:Testing related
 PHP Version:5.3.10
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-27 12:42:58] a...@php.net

Things are more complicated on linux, that's what the tests give:

FreeType Version => 2.3.11

Current:
001+ Top without line-break: -15
002+ Top with line-break: -15
001- Top without line-break: -14
002- Top with line-break: -14

With patch:
skip


FreeType Version => 2.4.9

Current
pass

With patch:
001+ Top without line-break: -14
002+ Top with line-break: -14
001- Top without line-break: -15
002- Top with line-break: -15


[2012-03-22 21:07:27] mattfic...@php.net

The following patch has been added/updated:

Patch Name: bug48555
Revision:   1332450447
URL:
https://bugs.php.net/patch-display.php?bug=61480&patch=bug48555&revision=1332450447


[2012-03-22 21:07:19] mattfic...@php.net

Description:

Expected result:

tests pass

Actual result:
--
tests fail
001+ Top without line-break: -15
002+ Top with line-break: -15
001- Top without line-break: -14
002- Top with line-break: -14

Failure occurs with FreeType 2.4.3 which is what PHP uses.

Test patch will skip test if FreeType version is less than 2.4.3.








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61480&edit=1


Bug #61481 [Com]: Test Bug - ext/com_dotnet/tests/bug49192

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61481&edit=1

 ID: 61481
 Comment by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:Test Bug - ext/com_dotnet/tests/bug49192
 Status: Open
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.3.10
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-22 21:13:51] mattfic...@php.net

The following patch has been added/updated:

Patch Name: bug49192
Revision:   1332450831
URL:
https://bugs.php.net/patch-display.php?bug=61481&patch=bug49192&revision=1332450831


[2012-03-22 21:13:29] mattfic...@php.net

Description:

Expected result:

test pass

Actual result:
--
test fail
001+ Fatal error: Uncaught exception 'com_exception' with message 'Failed to 
create COM object `ADODB.Connection': The specified module could not be found.
001- int(0)
002+ ' in C:\php-sdk\php-5.3-src-r324324\ext\com_dotnet\tests\bug49192.php:15
003+ Stack trace:
004+ #0 C:\php-sdk\php-5.3-src-r324324\ext\com_dotnet\tests\bug49192.php(15): 
com->com('ADODB.Connectio...')
005+ #1 {main}
006+   thrown in 
C:\php-sdk\php-5.3-src-r324324\ext\com_dotnet\tests\bug49192.php on line 15


This test fails to load ADO (using COM).

The patch marks it as XFAIL and provides this info.

A change in windows longhorn x64(affecting vista, 7, 8, 2008, 2008r2) broke ADO.

There is a fix available, but user has to install it.

Given that ADO was deprecated a long time ago in favor of newer APIs, I don't 
think its worth the trouble of making the user install the fix to get an 
accurate test run. its better to just not run the test or expect it to fail.

see: http://support.microsoft.com/kb/2517589
see: http://www.infoq.com/news/2011/10/ADO-Win7








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61481&edit=1


Bug #61454 [Com]: ext\standard\tests\general_functions\bug49847.phpt fails

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61454&edit=1

 ID: 61454
 Comment by: mattfic...@php.net
 Reported by:a...@php.net
 Summary:ext\standard\tests\general_functions\bug49847.phpt
 fails
 Status: Assigned
 Type:   Bug
 Package:*General Issues
 Operating System:   windows
 PHP Version:Irrelevant
 Assigned To:mattficken
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-20 23:04:38] mattfic...@php.net

This patch fixes the bug for me on 5_3-r324324


[2012-03-20 13:49:11] a...@php.net

The following patch has been added/updated:

Patch Name: bug49847.diff
Revision:   1332251351
URL:
https://bugs.php.net/patch-display.php?bug=61454&patch=bug49847.diff&revision=1332251351


[2012-03-20 13:48:31] a...@php.net

Description:

The test fails with the following diff out:

001+ 'more' is not recognized as an internal or external command,
002+ operable program or batch file.
003+ array(0) {
001- array(1) {
002-   [0]=>
003-   string(4098) "%s 1"

The patch supplied fixes the issue exchanging "more" with "type"

Expected result:

test pass

Actual result:
--
test fail






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61454&edit=1


Bug #61519 [Com]: test fails, should pass - ext/zlib/tests/bug60761.phpt

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61519&edit=1

 ID: 61519
 Comment by: mattfic...@php.net
 Reported by:mattfic...@php.net
 Summary:test fails, should pass -
 ext/zlib/tests/bug60761.phpt
 Status: Closed
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.3.10
 Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-29 04:23:45] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=bcfcfb2fc5f358ebfdc76a773b20b3fc056b20c0
Log: Fix bug #61519 test fails, should pass - ext/zlib/tests/bug60761.phpt


[2012-03-27 16:38:11] a...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




[2012-03-27 16:26:34] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=bcfcfb2fc5f358ebfdc76a773b20b3fc056b20c0
Log: Fix bug #61519 test fails, should pass - ext/zlib/tests/bug60761.phpt


[2012-03-26 17:02:46] mattfic...@php.net

Description:

This test fails and should pass.

It should be checking for bug #60761 or similar.

The patch fixes it.

Expected result:

pass

Actual result:
--
fail






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61519&edit=1


Bug #61459 [Com]: popen_close_basic-win32 can't run sort.exe

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61459&edit=1

 ID: 61459
 Comment by: mattfic...@php.net
 Reported by:ITALOLINS59 at HOTMAIL dot COM
 Summary:popen_close_basic-win32 can't run sort.exe
 Status: Closed
 Type:   Bug
 Package:Testing related
 Operating System:   Windows
 PHP Version:5.3.10
 Assigned To:ab
 Block user comment: Y
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-29 04:23:34] point@php-dev-dell.(none)@php.net

Automatic comment on behalf of point@php-dev-dell.(none)
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=eeab3be3037e2c537393f630b496017c9f888736
Log: Fix bug #61459 popen_close_basic-win32 can't run sort.exe


[2012-03-28 17:56:49] a...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




[2012-03-28 17:54:49] point@php-dev-dell.(none)@php.net

Automatic comment on behalf of point@php-dev-dell.(none)
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=eeab3be3037e2c537393f630b496017c9f888736
Log: Fix bug #61459 popen_close_basic-win32 can't run sort.exe


[2012-03-21 05:40:41] paj...@php.net

Hi,

Please add a SKIPIF section testing if sort.exe exists in this path. 

Thanks!


[2012-03-20 22:51:43] mattfic...@php.net

The following patch has been added/updated:

Patch Name: popen_close_error-win32
Revision:   1332283902
URL:
https://bugs.php.net/patch-display.php?bug=61459&patch=popen_close_error-win32&revision=1332283902




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61459


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61459&edit=1


Bug #61468 [Com]: ext/phar/tests/phar_oo_005.phpt fails

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61468&edit=1

 ID: 61468
 Comment by: mattfic...@php.net
 Reported by:a...@php.net
 Summary:ext/phar/tests/phar_oo_005.phpt fails
 Status: Closed
 Type:   Bug
 Package:PHAR related
 Operating System:   all
 PHP Version:Irrelevant
 Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-29 04:23:40] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=0b20329aaf4228e071ab03f4e96adeafa6c48f52
Log: Fix bug #61468 ext/phar/tests/phar_oo_005.phpt fails


[2012-03-28 11:23:11] a...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




[2012-03-28 11:21:43] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=0b20329aaf4228e071ab03f4e96adeafa6c48f52
Log: Fix bug #61468 ext/phar/tests/phar_oo_005.phpt fails


[2012-03-22 20:31:44] mattfic...@php.net

With the patch, the test passes for me on Windows 7 sp1x64 with PHP_5_3-r324324


[2012-03-21 20:27:25] a...@php.net

In the patch phar_oo_005.phpt.diff the output is adopted according to the new 
iterator functionality.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61468


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61468&edit=1


Bug #61404 [Com]: ext\openssl\tests\021.phpt fails

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61404&edit=1

 ID: 61404
 Comment by: mattfic...@php.net
 Reported by:a...@php.net
 Summary:ext\openssl\tests\021.phpt fails
 Status: Closed
 Type:   Bug
 Package:OpenSSL related
 Operating System:   windows
 PHP Version:Irrelevant
 Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-29 04:23:37] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=bd7bb973b1f4791f000a890b1c1387fcd28c65ee
Log: Fix bug #61404 ext\openssl\tests\021.phpt fails


[2012-03-29 04:23:36] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=4c5b427124a2af3d951fed869cc86452e8b6290c
Log: Fix bug #61404 ext\openssl\tests\021.phpt fails


[2012-03-28 15:34:21] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=4c5b427124a2af3d951fed869cc86452e8b6290c
Log: Fix bug #61404 ext\openssl\tests\021.phpt fails


[2012-03-28 15:34:19] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=bd7bb973b1f4791f000a890b1c1387fcd28c65ee
Log: Fix bug #61404 ext\openssl\tests\021.phpt fails


[2012-03-28 14:31:46] a...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.






The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61404


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61404&edit=1


Bug #61405 [Com]: ext\openssl\tests\022.phpt fails

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61405&edit=1

 ID: 61405
 Comment by: mattfic...@php.net
 Reported by:a...@php.net
 Summary:ext\openssl\tests\022.phpt fails
 Status: Closed
 Type:   Bug
 Package:OpenSSL related
 Operating System:   windows
 PHP Version:Irrelevant
 Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-29 04:23:47] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213
Log: Fix bug #61405 ext\openssl\tests\022.phpt fails


[2012-03-27 16:36:22] a...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




[2012-03-27 16:26:36] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213
Log: Fix bug #61405 ext\openssl\tests\022.phpt fails


[2012-03-27 16:11:08] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213
Log: Fix bug #61405 ext\openssl\tests\022.phpt fails


[2012-03-27 14:40:56] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213
Log: Fix bug #61405 ext\openssl\tests\022.phpt fails




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61405


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61405&edit=1


Bug #61412 [Com]: ext\openssl\tests\bug28382.phpt fails

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61412&edit=1

 ID: 61412
 Comment by: mattfic...@php.net
 Reported by:a...@php.net
 Summary:ext\openssl\tests\bug28382.phpt fails
 Status: Closed
 Type:   Bug
 Package:OpenSSL related
 Operating System:   all
 PHP Version:Irrelevant
 Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-29 04:23:50] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=7fdd35d697765680050dc8111d2772962698
Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails


[2012-03-29 04:23:48] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=e55718b09121c79f3a6b0cfb7c446112fb378402
Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails


[2012-03-27 16:26:39] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=7fdd35d697765680050dc8111d2772962698
Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails


[2012-03-27 16:26:37] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=e55718b09121c79f3a6b0cfb7c446112fb378402
Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails


[2012-03-27 16:11:09] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=e55718b09121c79f3a6b0cfb7c446112fb378402
Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61412


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61412&edit=1


Bug #61413 [Com]: ext\openssl\tests\openssl_encrypt_crash.phpt fails

2012-04-02 Thread mattfic...@php.net
Edit report at https://bugs.php.net/bug.php?id=61413&edit=1

 ID: 61413
 Comment by: mattfic...@php.net
 Reported by:a...@php.net
 Summary:ext\openssl\tests\openssl_encrypt_crash.phpt fails
 Status: Assigned
 Type:   Bug
 Package:OpenSSL related
 Operating System:   windows
 PHP Version:5.3.10
 Assigned To:mattficken
 Block user comment: N
 Private report: N

 New Comment:

This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64.

It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1.


Previous Comments:

[2012-03-16 11:07:56] a...@php.net

fixed initializing i to zero


[2012-03-16 11:07:27] a...@php.net

The following patch has been added/updated:

Patch Name: 61413.diff
Revision:   1331896047
URL:
https://bugs.php.net/patch-display.php?bug=61413&patch=61413.diff&revision=1331896047


[2012-03-16 10:41:58] a...@php.net

Description:

The test fails with the message "variable 'i' used without being initialized"

Expected result:

test pass

Actual result:
--
test fail, the diff is:

002- string(4) "done"






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61413&edit=1


[PHP-BUG] Bug #61604 [NEW]: Add Apache 2.4 support

2012-04-02 Thread bugzilla33 at gmail dot com
From: 
Operating system: Win 7
PHP version:  5.4.1RC1
Package:  Apache2 related
Bug Type: Bug
Bug description:Add Apache 2.4 support

Description:

news.txt says
- Fixed bug #61172 (Add Apache 2.4 support). (Chris Jones)

but

http://windows.php.net/downloads/qa/php-5.4.1RC1-Win32-VC9-x86.zip

consits only php5apache2_3.dll

There was no version of Apache 2.3. Only 2.2 and 2.4 released.

Expected result:

php5apache2_4.dll

Actual result:
--
php5apache2_3.dll

-- 
Edit bug report at https://bugs.php.net/bug.php?id=61604&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61604&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61604&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61604&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61604&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61604&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61604&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61604&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61604&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61604&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61604&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61604&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61604&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61604&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61604&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61604&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61604&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61604&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61604&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61604&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61604&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61604&r=mysqlcfg



Req #52504 [Com]: Support relative namespaces

2012-04-02 Thread francescrosasbosque at gmail dot com
Edit report at https://bugs.php.net/bug.php?id=52504&edit=1

 ID: 52504
 Comment by: francescrosasbosque at gmail dot com
 Reported by:robert dot de dot wilde at online dot nl
 Summary:Support relative namespaces
 Status: Not a bug
 Type:   Feature/Change Request
 Package:Class/Object related
 Operating System:   Any
 PHP Version:5.3.3
 Block user comment: N
 Private report: N

 New Comment:

As I understand it accessing parent namespaces would require the same brain 
power 
that it needs to access child namespaces as both of them rely on knowing what's 
the current namespace. To me it is weird to have one but not the other.


Previous Comments:

[2012-02-28 10:38:59] johan...@php.net

Adding support for the ..\..\Foo\Bar notation quickly requires quite some brain 
power to read the code, especially in a longer file where the namespace 
declaration might not be on the same screen. We try to keep PHP code 
human-readable.

Doing the use foo\*; thing is not possible due to PHP's dynamic nature. We do 
not know which classes there might be (think __autoload) so we'd like to do it 
but can't.


[2012-02-26 10:10:33] tom at tomwardrop dot com

I was just about to post the exact same feature suggestion. I'm using PHP 5.4 
RC8 
after 2 years of programming Ruby (I have a project that better lends itself to 
PHP template-orientated nature), and this was one of the first things I tried 
to 
do, reference a resource one level up in the namespace hierarchy. Luckily, my 
namespace isn't too deep, but I can imagine some of the larger frameworks which 
have 3-6+ level deep namespaces could really benefit from this.

I'm surprised none of the dev's have commented on this.


[2010-08-18 15:44:12] robert dot de dot wilde at online dot nl

Any developer can have a look?


[2010-07-31 10:54:14] giorgio dot liscio at email dot it

very nice, i really like it

it would be nice too having * on import

works only if __autoload or spl_autoload_register is used, otherwise triggers 
an error

use MyNS\Test\*;   // imports all classes in the "Test" namespace
use MyNS\Test\**;  // imports all the namespace hierarchy (including 
subpackages) from namespace Test

__autoload($className, $importAll = FALSE, $importDeep = FALSE)
{
  // handle * as a full dir import
  // ** imports subdirs too
}

in my framework i need to put

use \FW\String;
use \FW\Int;
use \FW\Float;
use \FW\Vector;
use \FW\Dictionary;
use \FW\Types;

etc in every file...


[2010-07-31 09:58:03] robert dot de dot wilde at online dot nl

Description:

It would be nice to have relative namespace support to keep code clean and 
flexible.

When inside of a namespace, it would be nice to have some directory-path-like 
option like '..'.

Test script:
---
namespace MyNs\Some\Path\Going\A\Long\Way
{
  class GoClass extends ..\..\Short\Way\GoClass  // <<
  {}
}







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=52504&edit=1


Req #61421 [Com]: Missing SHA256,SHA512 families of signature algorithms

2012-04-02 Thread mark at zedwood dot com
Edit report at https://bugs.php.net/bug.php?id=61421&edit=1

 ID: 61421
 Comment by: mark at zedwood dot com
 Reported by:mark at zedwood dot com
 Summary:Missing SHA256,SHA512 families of signature
 algorithms
 Status: Assigned
 Type:   Feature/Change Request
 Package:OpenSSL related
 Operating System:   Ubuntu Linux
 PHP Version:5.4.0
 Assigned To:pajoye
 Block user comment: N
 Private report: N

 New Comment:

added openssl version check, added new patch with .phpt test


Previous Comments:

[2012-04-02 09:36:07] paj...@php.net

hi,

Thanks for the patch, I will apply it asap but it won't make it for the next 
releases of 5.3 or 5.4 as we are already in release phases.

Btw, can you add some tests too please?

About the patch, yes, please use the openssl version check instead. As what is 
done now won't work smoothly with older versions.

As of getting a svn account (asked per email but adding answer here too), we 
usually give one after that one has provided a couple of patches :)

Thanks for your work!


[2012-04-02 09:21:11] der...@php.net

Mark, yes, you probably should. It will also help a lot if you include test 
cases for the new functionality. Make sure those tests also run with older 
versions of openssl though!

cheers,
Derick


[2012-03-31 04:00:54] mark at zedwood dot com

should i submit a new patch with
#if OPENSSL_VERSION_NUMBER >= 0x0090708fL 
instead of
#ifndef OPENSSL_NO_SHA256
?


[2012-03-16 21:10:49] zedwoodnoreply at gmail dot com

to generate a sample csr with sha256 sig use:
openssl req -new -sha256-newkey rsa:2048 -nodes -out example_com_sha256.csr 
   -keyout example_com_sha256.key-subj "/C=US/ST=/L=/O=/CN=example.com"

to parse the csr with openssl (command line) use:
openssl req -in example_com_sha256.csr-noout -text

sample output:
Certificate Request:
Data:
Version: 0 (0x0)
Subject: C=US, CN=example.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:a7:7a:17:c4:17:72:8e:5b:36:36:05:8f:57:10:
a5:b9:f2:4b:05:9e:88:62:bc:8b:a5:ad:c3:6a:41:
b5:31:25:cc:86:7c:99:6b:f4:7f:74:a1:01:93:95:
b9:3e:b7:dc:b4:b4:59:3c:ff:22:8c:d5:87:75:44:
93:9c:19:de:08:42:b2:fd:88:eb:71:6b:8b:21:4a:
06:66:9c:6d:2b:10:bb:f5:e8:7c:a2:3a:ae:51:86:
51:3a:d1:96:02:93:f1:de:3a:68:06:6d:36:20:41:
b4:09:d8:ed:74:5e:ff:ae:ba:26:84:ac:4d:6a:30:
6a:b4:01:ec:3a:a0:f9:5c:08:5c:6c:5e:1f:f2:11:
2c:11:a1:3d:44:17:79:33:0a:97:a0:4e:b8:c3:81:
e4:58:d7:10:b3:50:43:af:9e:4b:b9:05:e7:5d:da:
78:b1:85:c4:36:a7:d5:b2:82:7a:1a:ab:4c:6c:98:
a1:b5:6c:1a:99:04:18:2b:8d:80:2f:11:23:1d:41:
53:7a:15:39:2b:84:23:bf:2d:b0:32:5a:7d:0d:d0:
3f:ac:d3:66:9c:9f:a2:df:40:4b:0d:9c:98:e4:64:
44:b7:58:1d:54:75:07:47:b9:03:e5:57:10:d3:1a:
ac:85:c6:f1:19:1c:df:a6:33:12:25:0b:ee:9a:fb:
72:93
Exponent: 65537 (0x10001)
Attributes:
a0:00
Signature Algorithm: sha256WithRSAEncryption
48:ac:2e:08:93:95:ec:c3:12:ab:88:33:1f:7f:37:c3:5a:9b:
6a:9a:b3:ea:35:ca:f0:1d:40:47:f0:31:8f:f3:36:b4:3d:5d:
ee:74:48:fe:1b:43:4b:78:d7:97:d5:d5:77:8f:ba:51:db:35:
75:c4:89:dc:b6:49:86:4e:4c:42:e7:01:e3:cb:72:da:9b:94:
d1:ed:b7:59:be:f6:eb:44:68:54:e5:10:0c:bf:7a:9f:48:18:
86:f2:f2:84:ca:a1:3b:48:be:d1:4a:40:22:12:7b:c0:42:a5:
a0:ce:0f:43:17:44:e2:cf:e8:27:1d:71:d5:92:d8:de:bd:82:
c2:11:f2:73:8c:c3:ab:5e:a1:64:78:af:a6:10:19:b1:ed:b2:
fb:4c:bb:66:20:fe:1a:34:af:43:9f:4d:4e:6d:a2:f0:d0:df:
33:93:e5:a7:d5:dc:2f:47:e3:56:31:fd:50:d2:2e:83:2f:d2:
b2:fb:a8:7d:ce:4a:1f:a1:14:fc:45:92:ca:1c:85:3a:e7:32:
e4:a8:13:fe:54:9a:ee:25:02:26:d3:b5:e1:96:08:f3:c8:36:
59:ef:f5:46:1c:62:e6:58:ea:d4:86:a8:3f:ed:92:77:d7:eb:
d3:92:a1:91:8e:2c:1c:4e:c2:12:b0:c9:8b:3b:17:99:32:03:
e3:9e:a5:dd


[2012-03-16 19:35:04] mark at zedwood dot com

Description:

openssl_verify() takes as a parameter a signature algorithm.  The current list 
of values is here
http://us3.php.net/manual/en/openssl.signature-algos.php

The SHA256 and SHA512 families algorithms have been s

Bug #61567 [Opn->Csd]: Fileinfo ext\fileinfo\tests\mime_content_type_002.phpt fails

2012-04-02 Thread ab
Edit report at https://bugs.php.net/bug.php?id=61567&edit=1

 ID: 61567
 Updated by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo
 ext\fileinfo\tests\mime_content_type_002.phpt fails
-Status: Open
+Status: Closed
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:Irrelevant
-Assigned To:
+Assigned To:ab
 Block user comment: N
 Private report: N

 New Comment:

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




Previous Comments:

[2012-04-02 18:04:24] a...@php.net

see https://bugs.php.net/bug.php?id=61566 for the fixes for this ticket


[2012-03-30 15:14:22] a...@php.net

Description:

Test diff:

001+
001- string(%d) "%s"
002- string(%d) "%s"
003- string(9) "directory"
004- string(9) "directory"

Expected result:

test pass

Actual result:
--
test fail






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61567&edit=1


Bug #61567 [Com]: Fileinfo ext\fileinfo\tests\mime_content_type_002.phpt fails

2012-04-02 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=61567&edit=1

 ID: 61567
 Comment by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo
 ext\fileinfo\tests\mime_content_type_002.phpt fails
 Status: Open
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

see https://bugs.php.net/bug.php?id=61566 for the fixes for this ticket


Previous Comments:

[2012-03-30 15:14:22] a...@php.net

Description:

Test diff:

001+
001- string(%d) "%s"
002- string(%d) "%s"
003- string(9) "directory"
004- string(9) "directory"

Expected result:

test pass

Actual result:
--
test fail






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61567&edit=1


Req #61379 [Com]: Set _SERVER['HTTPS'] to on for SPDY connections

2012-04-02 Thread mdsteele at google dot com
Edit report at https://bugs.php.net/bug.php?id=61379&edit=1

 ID: 61379
 Comment by: mdsteele at google dot com
 Reported by:rickard at 0x539 dot se
 Summary:Set _SERVER['HTTPS'] to on for SPDY connections
 Status: Not a bug
 Type:   Feature/Change Request
 Package:Apache2 related
 Operating System:   Linux 2.6
 PHP Version:5.3.10
 Block user comment: N
 Private report: N

 New Comment:

Yes, this was an issue with mod_spdy that has just been fixed; see 
http://code.google.com/p/mod-spdy/issues/detail?id=32


Previous Comments:

[2012-03-14 01:18:44] ahar...@php.net

It's going to be up to mod_spdy to set the relevant environment variable(s) in 
Apache.


[2012-03-13 21:55:11] rickard at 0x539 dot se

Description:

When playing around with the mod_spdy Apache module it seems that the HTTPS key 
in 
the _SERVER variable is set to off. I'm not sure if this is the job for PHP or 
SPDY but I thought I'd start here. 

Test script:
---
http://code.google.com/p/mod-spdy/wiki/GettingStarted

Connect to the server and dump _SERVER */ 

var_dump($_SERVER); 

Expected result:

  ["HTTPS"]=>
  string(3) "On"

Actual result:
--
array(40) {
  ["REDIRECT_SPDY_VERSION"]=>
  string(1) "2"
  ["SPDY_VERSION"]=>
  string(1) "2"

..

  ["SERVER_PORT"]=>
  string(3) "443"

..

  ["HTTPS"]=>
  string(3) "Off"
}






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61379&edit=1


Bug #61565 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails

2012-04-02 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=61565&edit=1

 ID: 61565
 Comment by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo ext\fileinfo\tests\finfo_file_001.phpt
 fails
 Status: Open
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

The patch is commited in the revision 0cdba53aae783fd63f0aa525bc92e73d9e4c0aab


Previous Comments:

[2012-04-02 15:48:16] a...@php.net

Automatic comment on behalf of ab
Revision: 
http://git.php.net/?p=php-src.git;a=commit;h=0cdba53aae783fd63f0aa525bc92e73d9e4c0aab
Log: Fix bug #61565 Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails


[2012-04-02 15:15:35] a...@php.net

The patch fixes php_stream_open_wrapper_ex trying to open a directory 
descriptor under windows.


[2012-03-31 10:04:32] a...@php.net

The following patch has been added/updated:

Patch Name: 61565.diff
Revision:   1333188272
URL:
https://bugs.php.net/patch-display.php?bug=61565&patch=61565.diff&revision=1333188272


[2012-03-30 15:09:43] a...@php.net

Description:

Test diff:

009+
010+ Warning: finfo_file(.): failed to open stream: Permission denied in 
C:\php-sdk\php53\vc9\x86\php-src\ext\fileinfo\tests\finfo_file_001.php on line 7
011+ bool(false)
009- string(9) "directory"

Expected result:

test pass

Actual result:
--
test fail






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61565&edit=1


Bug #61566 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails

2012-04-02 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1

 ID: 61566
 Comment by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt
 fails
 Status: Open
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

The patch was commited in revisions:

8684fb7facd8f5c1589996c1ebfd782f77c245ff
909713e233704b4ac317ff3bb397cb40a82795b8


Previous Comments:

[2012-04-02 15:11:29] a...@php.net

The final patch fixes the failure caused by the posix lseek and read versions 
under windows in cdf_read() . Additionally all the occurences of lseek and read 
was replaced by _lseek and _reed for windows.


[2012-04-02 15:07:31] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   179251
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=179251


[2012-04-02 12:58:03] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   171483
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483


[2012-03-31 10:02:49] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   1333188169
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169


[2012-03-30 15:11:21] a...@php.net

Description:

Test diff:

001+
001- array(6) {
002-   ["%s/resources/dir.zip"]=>
003-   string(15) "application/zip"
004-   ["%s/resources/test.bmp"]=>
005-   string(14) "image/x-ms-bmp"
006-   ["%s/resources/test.gif"]=>
007-   string(9) "image/gif"
008-   ["%s/resources/test.jpg"]=>
009-   string(10) "image/jpeg"
010-   ["%s/resources/test.pdf"]=>
011-   string(15) "application/pdf"
012-   ["%s/resources/test.png"]=>
013-   string(9) "image/png"
014- }

Expected result:

test pass

Actual result:
--
test fails






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1


Bug #61565 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails

2012-04-02 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=61565&edit=1

 ID: 61565
 Comment by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo ext\fileinfo\tests\finfo_file_001.phpt
 fails
 Status: Open
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

The patch fixes php_stream_open_wrapper_ex trying to open a directory 
descriptor under windows.


Previous Comments:

[2012-03-31 10:04:32] a...@php.net

The following patch has been added/updated:

Patch Name: 61565.diff
Revision:   1333188272
URL:
https://bugs.php.net/patch-display.php?bug=61565&patch=61565.diff&revision=1333188272


[2012-03-30 15:09:43] a...@php.net

Description:

Test diff:

009+
010+ Warning: finfo_file(.): failed to open stream: Permission denied in 
C:\php-sdk\php53\vc9\x86\php-src\ext\fileinfo\tests\finfo_file_001.php on line 7
011+ bool(false)
009- string(9) "directory"

Expected result:

test pass

Actual result:
--
test fail






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61565&edit=1


Bug #61566 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails

2012-04-02 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1

 ID: 61566
 Comment by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt
 fails
 Status: Open
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

The final patch fixes the failure caused by the posix lseek and read versions 
under windows in cdf_read() . Additionally all the occurences of lseek and read 
was replaced by _lseek and _reed for windows.


Previous Comments:

[2012-04-02 15:07:31] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   179251
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=179251


[2012-04-02 12:58:03] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   171483
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483


[2012-03-31 10:02:49] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   1333188169
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169


[2012-03-30 15:11:21] a...@php.net

Description:

Test diff:

001+
001- array(6) {
002-   ["%s/resources/dir.zip"]=>
003-   string(15) "application/zip"
004-   ["%s/resources/test.bmp"]=>
005-   string(14) "image/x-ms-bmp"
006-   ["%s/resources/test.gif"]=>
007-   string(9) "image/gif"
008-   ["%s/resources/test.jpg"]=>
009-   string(10) "image/jpeg"
010-   ["%s/resources/test.pdf"]=>
011-   string(15) "application/pdf"
012-   ["%s/resources/test.png"]=>
013-   string(9) "image/png"
014- }

Expected result:

test pass

Actual result:
--
test fails






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1


Bug #61566 [PATCH]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails

2012-04-02 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1

 ID: 61566
 Patch added by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt
 fails
 Status: Open
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   179251
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=179251


Previous Comments:

[2012-04-02 12:58:03] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   171483
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483


[2012-03-31 10:02:49] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   1333188169
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169


[2012-03-30 15:11:21] a...@php.net

Description:

Test diff:

001+
001- array(6) {
002-   ["%s/resources/dir.zip"]=>
003-   string(15) "application/zip"
004-   ["%s/resources/test.bmp"]=>
005-   string(14) "image/x-ms-bmp"
006-   ["%s/resources/test.gif"]=>
007-   string(9) "image/gif"
008-   ["%s/resources/test.jpg"]=>
009-   string(10) "image/jpeg"
010-   ["%s/resources/test.pdf"]=>
011-   string(15) "application/pdf"
012-   ["%s/resources/test.png"]=>
013-   string(9) "image/png"
014- }

Expected result:

test pass

Actual result:
--
test fails






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1


Req #61602 [Opn]: Allow access to name of constant used as default value

2012-04-02 Thread derick
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1

 ID: 61602
 Updated by: der...@php.net
 Reported by:sebast...@php.net
 Summary:Allow access to name of constant used as default
 value
 Status: Open
 Type:   Feature/Change Request
 Package:Reflection related
 Operating System:   Irrelevant
 PHP Version:5.4Git-2012-04-02 (Git)
 Block user comment: N
 Private report: N

 New Comment:

It's definitely possible, I've just added something like this to VLD: 
https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8


Previous Comments:

[2012-04-02 14:14:16] sebast...@php.net

Description:

When a constant is used for the default value of an optional parameter, the 
Reflection API (tries to) resolve(s) the constant to its value and then returns 
it as the default value.

In addition, I would like to have two additional methods in ReflectionParameter 
that expose 1) whether or not a default value "is a" constant and 2) the name 
of the constant.

In the example below, I am using temporary names ("defaultValueIsConstant" and 
"getDefaultValueConstantName") for these two methods because I cannot think of 
sensible method names right now.

Test script:
---
getParameters();

foreach ($p as $_p) {
var_dump($_p->getDefaultValue());

if ($_p->defaultValueIsConstant()) {
var_dump($_p->getDefaultValueConstantName());
}
}

Expected result:

string(3) "..."
string(9) "self::bar"

Actual result:
--
string(3) "..."






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1


[PHP-BUG] Req #61602 [NEW]: Allow access to name of constant used as default value

2012-04-02 Thread sebast...@php.net
From: sebastian
Operating system: Irrelevant
PHP version:  5.4Git-2012-04-02 (Git)
Package:  Reflection related
Bug Type: Feature/Change Request
Bug description:Allow access to name of constant used as default value

Description:

When a constant is used for the default value of an optional parameter, the
Reflection API (tries to) resolve(s) the constant to its value and then
returns it as the default value.

In addition, I would like to have two additional methods in
ReflectionParameter that expose 1) whether or not a default value "is a"
constant and 2) the name of the constant.

In the example below, I am using temporary names ("defaultValueIsConstant"
and "getDefaultValueConstantName") for these two methods because I cannot
think of sensible method names right now.

Test script:
---
getParameters();

foreach ($p as $_p) {
var_dump($_p->getDefaultValue());

if ($_p->defaultValueIsConstant()) {
var_dump($_p->getDefaultValueConstantName());
}
}

Expected result:

string(3) "..."
string(9) "self::bar"

Actual result:
--
string(3) "..."

-- 
Edit bug report at https://bugs.php.net/bug.php?id=61602&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61602&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61602&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61602&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61602&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61602&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61602&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61602&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61602&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61602&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61602&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61602&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61602&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61602&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61602&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61602&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61602&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61602&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61602&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61602&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61602&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61602&r=mysqlcfg



Bug #60052 [Com]: Integer returned as a 64bit integer on X64_86

2012-04-02 Thread mar...@php.net
Edit report at https://bugs.php.net/bug.php?id=60052&edit=1

 ID: 60052
 Comment by: mar...@php.net
 Reported by:m dot vanduren at jonker dot nl
 Summary:Integer returned as a 64bit integer on X64_86
 Status: Assigned
 Type:   Bug
 Package:PDO related
 Operating System:   All (linux tested)
 PHP Version:5.3.8
 Assigned To:mariuz
 Block user comment: N
 Private report: N

 New Comment:

LL_MASK it should be already be "l" see the php_pdo_firebird_int.h:# define 
LL_MASK "l"

So in the in the slprintf 
slprintf(*ptr, CHAR_BUF_LEN, "%" LL_MASK "d", *(ISC_INT64*)var->sqldata);
should be replaced with 

slprintf(*ptr, CHAR_BUF_LEN, "%" "l" "d", *(ISC_INT64*)var->sqldata);

I will check and create a test for 5.3.x


Previous Comments:

[2011-10-13 13:01:36] m dot vanduren at jonker dot nl

Description:

Integer on firebird is treated as a 32 bit int and int64 is used as a 64 bit 
integer.
In the pdo_firebird driver INT64 is not implemented and LONG (int32) is treated 
as a long integer. On an x86_64 machine this means that a SQL_LONG doesn't 
honor the bit-sign in a value and INT64 doesn't return anything.

This patch should fix this value for x86_64 systems while leaving x86 systems 
unchanged.

Test script:
---
any firebirdSQL database with a integer field containing a negative value.
retrieve the value with the pdo_firebird driver on a 64 bit machine and echo it 
to the screen.

Expected result:

negative values with integer and should be returned as a negative number.

Actual result:
--
negative values are returned as their unsigned counterpart.






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=60052&edit=1


Bug #61508 [Com]: various crashes after upgrading to 5.3

2012-04-02 Thread komanek at natur dot cuni dot cz
Edit report at https://bugs.php.net/bug.php?id=61508&edit=1

 ID: 61508
 Comment by: komanek at natur dot cuni dot cz
 Reported by:komanek at natur dot cuni dot cz
 Summary:various crashes after upgrading to 5.3
 Status: Open
 Type:   Bug
 Package:*General Issues
 Operating System:   Debian 5
 PHP Version:5.3.10
 Block user comment: N
 Private report: N

 New Comment:

This seems to be a duplicate of https://bugs.php.net/bug.php?id=40479


Previous Comments:

[2012-03-26 11:21:34] komanek at natur dot cuni dot cz

I should also mention that it is a server with relatively high load and that I 
do 
not have these problems on other (much smaller) servers. There should be a 
problem 
related to the load, OS or PHP itself.

I also upgraded Apache to 2.2.22 which didn't resolve the issue.


[2012-03-26 11:17:37] komanek at natur dot cuni dot cz

Description:

After upgrading from 5.2.17 na 5.3.10 there are rare crashes and segfaults:


[Mon Mar 26 10:03:39 2012] [notice] child pid 22804 exit signal Segmentation 
fault (11), possible coredump in /usr/local/var/apache_cores
[Mon Mar 26 10:05:06 2012] [notice] child pid 26428 exit signal Segmentation 
fault (11), possible coredump in /usr/local/var/apache_cores

[Mon Mar 26 11:32:01 2012] [notice] child pid 1083 exit signal Bus error (7), 
possible coredump in /usr/local/var/apache_cores
[Mon Mar 26 12:13:17 2012] [notice] child pid 26574 exit signal Segmentation 
fault (11), possible coredump in /usr/local/var/apache_cores

Some of the stacktraces:


#0  0x7fad2a19b67b in zend_vm_set_opcode_handler (op=0x1dca348) at 
/data/install/php-5.3.10/Zend/zend_vm_execute.h:34020
#1  0x7fad2a16df7e in pass_two (op_array=0x1dc6d00) at /data/install/php-
5.3.10/Zend/zend_opcode.c:412
#2  0x7fad2a161cf1 in zend_do_end_function_declaration 
(function_token=0x7ad843e0) at /data/install/php-
5.3.10/Zend/zend_compile.c:1447
#3  0x7fad2a1448fe in zendparse () at /data/install/php-
5.3.10/Zend/zend_language_parser.c:4088
#4  0x7fad2a150710 in compile_file (file_handle=0x7ad86240, type=8) at 
Zend/zend_language_scanner.l:364
#5  0x7fad29ff647a in phar_compile_file (file_handle=0x7ad86240, 
type=8) 
at /data/install/php-5.3.10/ext/phar/phar.c:3393
#6  0x7fad2a14fd4f in compile_filename (type=8, filename=0x451ffc0) at 
Zend/zend_language_scanner.l:407
#7  0x7fad2a1ad384 in ZEND_INCLUDE_OR_EVAL_SPEC_TMP_HANDLER 
(execute_data=0x451fa18) at /data/install/php-5.3.10/Zend/zend_vm_execute.h:5254
#8  0x7fad2a1a4969 in execute (op_array=0x3fcc538) at /data/install/php-
5.3.10/Zend/zend_vm_execute.h:107
#9  0x7fad2a175ffb in zend_execute_scripts (type=8, retval=0x0, 
file_count=3) at /data/install/php-5.3.10/Zend/zend.c:1236
#10 0x7fad2a11ee18 in php_execute_script (primary_file=0x7ad88910) at 
/data/install/php-5.3.10/main/main.c:2308
#11 0x7fad2a2041af in php_handler (r=0x1d53a90) at /data/install/php-
5.3.10/sapi/apache2handler/sapi_apache2.c:669
#12 0x00443f5a in ap_run_handler (r=0x1d53a90) at config.c:158
#13 0x0044747e in ap_invoke_handler (r=0x1d53a90) at config.c:376
#14 0x00465ece in ap_process_request (r=0x1d53a90) at http_request.c:282
#15 0x00462d78 in ap_process_http_connection (c=0x1d3c470) at 
http_core.c:190
#16 0x0044b45a in ap_run_process_connection (c=0x1d3c470) at 
connection.c:43
#17 0x0046abd0 in child_main (child_num_arg=) at 
prefork.c:667
#18 0x0046aea4 in make_child (s=0x11f5fe8, slot=7) at prefork.c:768
#19 0x0046baee in ap_mpm_run (_pconf=, plog=, s=) at prefork.c:903
#20 0x0043063a in main (argc=4, argv=0x7ad88ef8) at main.c:753


#0  zend_hash_find (ht=0x2869c38, arKey=0x2862210 "", nKeyLength=9, 
pData=0x7fffc2538958) at /data/install/php-5.3.10/Zend/zend_hash.c:884
#1  0x7f553a2f8f74 in 
zend_isset_isempty_dim_prop_obj_handler_SPEC_VAR_CONST 
(prop_dim=0, execute_data=0x2aed260) at /data/install/php-
5.3.10/Zend/zend_vm_execute.h:10926
#2  0x7f553a2ff969 in execute (op_array=0x2aac740) at /data/install/php-
5.3.10/Zend/zend_vm_execute.h:107
#3  0x7f553a2d0ffb in zend_execute_scripts (type=8, retval=0x0, 
file_count=3) at /data/install/php-5.3.10/Zend/zend.c:1236
#4  0x7f553a279e18 in php_execute_script (primary_file=0x7fffc253aea0) at 
/data/install/php-5.3.10/main/main.c:2308
#5  0x7f553a35f1af in php_handler (r=0x2895878) at /data/install/php-
5.3.10/sapi/apache2handler/sapi_apache2.c:669
#6  0x00443f5a in ap_run_handler (r=0x2895878) at config.c:158
#7  0x0044747e in ap_invoke_handler (r=0x2895878) at config.c:376
#8  0x00465d30 in ap_internal_redirect (new_uri=, 
r=) at http_request.c:554
#9  0x7f553afb8bb5 in handler_redirect (r

Bug #40479 [Com]: zend_mm_heap corrupted

2012-04-02 Thread komanek at natur dot cuni dot cz
Edit report at https://bugs.php.net/bug.php?id=40479&edit=1

 ID: 40479
 Comment by: komanek at natur dot cuni dot cz
 Reported by:rrossi at maggioli dot it
 Summary:zend_mm_heap corrupted
 Status: Feedback
 Type:   Bug
 Package:Reproducible crash
 Operating System:   Suse Linux 9.0
 PHP Version:5.2.1
 Block user comment: N
 Private report: N

 New Comment:

For me it seems the solution is to compile PHP with

--disable-zend-multibyte

instead of

--enable-zend-multibyte

But I am not sure if it breaks something else, I didn't find much 
documentation on these options.


Previous Comments:

[2012-03-30 18:47:46] nathan at gt dot net

Also to add, USE_ZEND_ALLOC=0 did not resolve but gc_disable(); did


[2012-03-30 18:46:12] nathan at gt dot net

I've also confirmed the above testcase triggers it on 5.3.10 via CLI. Can 
provide 
full access to any php developer interested in taking a look, just email me.


[2012-03-28 11:42:16] komanek at natur dot cuni dot cz

Hi,
I used the USE_ZEND_ALLOC=0 and got another segfault. But in this case in the 
apache error log is hopefuly something useful:


*** glibc detected *** /usr/local/apache2/bin/httpd: double free or corruption 
(!prev): 0x051d6e10 ***
=== Backtrace: =
/lib/libc.so.6[0x7f5a8e3709a8]
/lib/libc.so.6(cfree+0x76)[0x7f5a8e372ab6]
/usr/local/apache2/modules/libphp5.so(zend_multibyte_read_script+0x2e)[0x7f5a887be90e]
/usr/local/apache2/modules/libphp5.so(open_file_for_scanning+0x90)[0x7f5a887bed60]
/usr/local/apache2/modules/libphp5.so(compile_file+0x9c)[0x7f5a887bf92c]
/usr/local/apache2/modules/libphp5.so[0x7f5a8866575a]
/usr/local/apache2/modules/libphp5.so[0x7f5a8881c733]
/usr/local/apache2/modules/libphp5.so(execute+0x209)[0x7f5a88813c49]
/usr/local/apache2/modules/libphp5.so(zend_execute_scripts+0x17b)[0x7f5a887e52db]
/usr/local/apache2/modules/libphp5.so(php_execute_script+0x198)[0x7f5a8878e0f8]
/usr/local/apache2/modules/libphp5.so[0x7f5a8887348f]
/usr/local/apache2/bin/httpd(ap_run_handler+0x4a)[0x443f5a]
/usr/local/apache2/bin/httpd(ap_invoke_handler+0xce)[0x44747e]
/usr/local/apache2/bin/httpd(ap_process_request+0x18e)[0x465ece]
/usr/local/apache2/bin/httpd[0x462d78]
/usr/local/apache2/bin/httpd(ap_run_process_connection+0x4a)[0x44b45a]
/usr/local/apache2/bin/httpd[0x46abd0]
/usr/local/apache2/bin/httpd[0x46aea4]
/usr/local/apache2/bin/httpd(ap_mpm_run+0xbde)[0x46baee]
/usr/local/apache2/bin/httpd(main+0x99a)[0x43063a]
/lib/libc.so.6(__libc_start_main+0xe6)[0x7f5a8e31b1a6]
/usr/local/apache2/bin/httpd(apr_os_proc_mutex_put+0x49)[0x42f819]
=== Memory map: 
0040-00493000 r-xp  08:01 442565 
/usr/local/apache2/bin/httpd
00692000-00698000 rw-p 00092000 08:01 442565 
/usr/local/apache2/bin/httpd
00698000-0069d000 rw-p 00698000 00:00 0 
017e-053d4000 rw-p 017e 00:00 0  [heap]
7f5a8000-7f5a80021000 rw-p 7f5a8000 00:00 0 
7f5a80021000-7f5a8400 ---p 7f5a80021000 00:00 0 
7f5a8497c000-7f5a84992000 r-xp  08:01 835587 
/lib/libgcc_s.so.1
7f5a84992000-7f5a84b92000 ---p 00016000 08:01 835587 
/lib/libgcc_s.so.1
7f5a84b92000-7f5a84b93000 rw-p 00016000 08:01 835587 
/lib/libgcc_s.so.1
7f5a84b9d000-7f5a84b9e000 r--s  08:11 78792612   
/home/apache2/htdocs/horde/lib/core.php
7f5a84b9e000-7f5a84bc1000 r--p  08:11 78799575   
/home/apache2/htdocs/horde/mnemo/locale/cs_CZ/LC_MESSAGES/mnemo.mo
7f5a84bc1000-7f5a84bc5000 r-xp  08:01 1884172
/lib/libnss_dns-2.7.so
7f5a84bc5000-7f5a84dc4000 ---p 4000 08:01 1884172
/lib/libnss_dns-2.7.so
7f5a84dc4000-7f5a84dc6000 rw-p 3000 08:01 1884172
/lib/libnss_dns-2.7.so
7f5a84dc6000-7f5a84dfd000 r--p  08:11 78790850   
/home/apache2/htdocs/horde/imp/locale/cs_CZ/LC_MESSAGES/imp.mo
7f5a84dfd000-7f5a84dff000 r-xp  08:01 1327349
/usr/lib/gconv/ISO8859-2.so
7f5a84dff000-7f5a84ffe000 ---p 2000 08:01 1327349
/usr/lib/gconv/ISO8859-2.so
7f5a84ffe000-7f5a8500 rw-p 1000 08:01 1327349
/usr/lib/gconv/ISO8859-2.so
7f5a8500-7f5a85192000 r--p  08:01 428099 
/usr/lib/locale/locale-archive
7f5a85192000-7f5a851e1000 rw-p 7f5a85192000 00:00 0 
7f5a851e1000-7f5a851e3000 r-xp  08:01 451017 
/usr/local/apache2/lib/apr-util-1/apr_ldap-1.so
7f5a851e3000-7f5a853e2000 ---p 2000 08:01 451017 
/usr/local/apache2/lib/apr-util-1/apr_ldap-

Bug #61566 [PATCH]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails

2012-04-02 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1

 ID: 61566
 Patch added by: a...@php.net
 Reported by:a...@php.net
 Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt
 fails
 Status: Open
 Type:   Bug
 Package:*Directory/Filesystem functions
 Operating System:   Windows
 PHP Version:5.3Git-2012-03-30 (Git)
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   171483
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483


Previous Comments:

[2012-03-31 10:02:49] a...@php.net

The following patch has been added/updated:

Patch Name: 61566.diff
Revision:   1333188169
URL:
https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169


[2012-03-30 15:11:21] a...@php.net

Description:

Test diff:

001+
001- array(6) {
002-   ["%s/resources/dir.zip"]=>
003-   string(15) "application/zip"
004-   ["%s/resources/test.bmp"]=>
005-   string(14) "image/x-ms-bmp"
006-   ["%s/resources/test.gif"]=>
007-   string(9) "image/gif"
008-   ["%s/resources/test.jpg"]=>
009-   string(10) "image/jpeg"
010-   ["%s/resources/test.pdf"]=>
011-   string(15) "application/pdf"
012-   ["%s/resources/test.png"]=>
013-   string(9) "image/png"
014- }

Expected result:

test pass

Actual result:
--
test fails






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1


Req #61601 [Opn]: strftime format does not allow for all lower case month/weekday

2012-04-02 Thread koen at fotoloog dot org
Edit report at https://bugs.php.net/bug.php?id=61601&edit=1

 ID: 61601
 User updated by:koen at fotoloog dot org
 Reported by:koen at fotoloog dot org
 Summary:strftime format does not allow for all lower case
 month/weekday
 Status: Open
 Type:   Feature/Change Request
 Package:Date/time related
 Operating System:   All
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

I wrote "The usual way of writing the full/abbreviated name of a month or a 
weekday" but I meant to write "The usual way of writing the full/abbreviated 
name of a month or a weekday *for my locale*..."


Previous Comments:

[2012-04-02 11:47:08] koen at fotoloog dot org

Description:

---
>From manual page: 
>http://www.php.net/function.strftime#refsect1-function.strftime-description
---

The usual way of writing the full/abbreviated name of a month or a weekday is 
with all lower case letters, e.g. 'december' as opposed to 'December'. And 
'maandag' as opposed to 'Monday'.

My locale is nl_nl. See 
http://nl.wikipedia.org/wiki/Hoofdletter_in_de_Nederlandse_spelling#Perioden 
(in Dutch) for explanation.

Request is to add format parameters for weekdays and months:
maandag;dinsdag;woensdag;donderdag;vrijdag;zaterdag;zondag
januari;februari;maart;april;mei;juni;juli;augustus;september;oktober;november;december

Test script:
---
not applicable.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61601&edit=1


[PHP-BUG] Req #61601 [NEW]: strftime format does not allow for all lower case month/weekday

2012-04-02 Thread koen at fotoloog dot org
From: 
Operating system: All
PHP version:  Irrelevant
Package:  Date/time related
Bug Type: Feature/Change Request
Bug description:strftime format does not allow for all lower case month/weekday

Description:

---
>From manual page:
http://www.php.net/function.strftime#refsect1-function.strftime-description
---

The usual way of writing the full/abbreviated name of a month or a weekday
is with all lower case letters, e.g. 'december' as opposed to 'December'.
And 'maandag' as opposed to 'Monday'.

My locale is nl_nl. See
http://nl.wikipedia.org/wiki/Hoofdletter_in_de_Nederlandse_spelling#Perioden
(in Dutch) for explanation.

Request is to add format parameters for weekdays and months:
maandag;dinsdag;woensdag;donderdag;vrijdag;zaterdag;zondag
januari;februari;maart;april;mei;juni;juli;augustus;september;oktober;november;december

Test script:
---
not applicable.


-- 
Edit bug report at https://bugs.php.net/bug.php?id=61601&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61601&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61601&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61601&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61601&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61601&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61601&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61601&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61601&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61601&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61601&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61601&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61601&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61601&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61601&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61601&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61601&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61601&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61601&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61601&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61601&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61601&r=mysqlcfg



Req #53831 [Com]: DateInterval constructor does not handle valid ISO 8601 strings

2012-04-02 Thread jdp2234 at hotmail dot com
Edit report at https://bugs.php.net/bug.php?id=53831&edit=1

 ID: 53831
 Comment by: jdp2234 at hotmail dot com
 Reported by:pallinger at dsd dot sztaki dot hu
 Summary:DateInterval constructor does not handle valid ISO
 8601 strings
 Status: Open
 Type:   Feature/Change Request
 Package:Date/time related
 Operating System:   ubuntu linux 10.10
 PHP Version:5.3.5
 Block user comment: N
 Private report: N

 New Comment:

http://joshp.me/dateinterval-milliseconds/
Quick class to get around it, while the bug still exists...
class DateIntervalFractions extends DateInterval {
public $milliseconds;
public function __construct($interval_spec) {
$this->milliseconds = 0;
$matches = array();
preg_match_all("#([0-9]*[.,]?[0-9]*)
[S]#",$interval_spec,$matches);
foreach ($matches[0] as $result)
{
$original = $result;
list($seconds,$milliseconds) = 
explode(".",substr($result,0,-1));
$this->milliseconds = $milliseconds / 
pow(10,strlen($milliseconds) - 3);

// Replace the milliseconds back to seconds,
// and let the original constructor do the rest.
$interval_spec = str_replace($original,$seconds . 
"S",$interval_spec);
}
parent::__construct($interval_spec);
}
}


Previous Comments:

[2011-10-12 16:09:31] dagguh at gmail dot com

http://en.wikipedia.org/wiki/Iso8601#Durations

This decimal fraction may be specified with either a comma or a full stop, as 
in 
"P0,5Y" or "P0.5Y".

Remember to accept both comma and a full stop.


[2011-01-24 18:41:19] pallinger at dsd dot sztaki dot hu

Description:

---
>From manual page: http://www.php.net/dateinterval.construct
---
The documentation says that "Each duration period is represented by an integer 
value followed by a period designator.", however, the ISO 8601 allows 
non-integer values for the last number 
(http://en.wikipedia.org/wiki/ISO_8601#Durations).
This is quite important if I want to parse XML data which contains 
millisecond-precision durations, as the seconds will surely not be integers.

Test script:
---


Expected result:

Should print out a valid DateInterval object, eg.:
object(DateInterval)#1 (8) {
  ["y"]=>
  int(0)
  ["m"]=>
  int(0)
  ["d"]=>
  int(0)
  ["h"]=>
  int(0)
  ["i"]=>
  int(0)
  ["s"]=>
  float(1.1)
  ["invert"]=>
  int(0)
  ["days"]=>
  bool(false)
}
It could also include a millisecond/microsecond/nanosecond field to accomodate 
additional precision. However, if the durations that are stored are still 
integers, it would be difficult to handle durations like "P0.5Y".

Actual result:
--
PHP Fatal error:  Uncaught exception 'Exception' with message 
'DateInterval::__construct(): Unknown or bad format (PT1.1S)' in -:1
Stack trace:
#0 -(1): DateInterval->__construct('PT1.1S')
#1 {main}
  thrown in - on line 1







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=53831&edit=1


Bug #61569 [Com]: Syntax error for calling a closure using array accesor on function call

2012-04-02 Thread ni...@php.net
Edit report at https://bugs.php.net/bug.php?id=61569&edit=1

 ID: 61569
 Comment by: ni...@php.net
 Reported by:oxygenus at gmail dot com
 Summary:Syntax error for calling a closure using array
 accesor on function call
 Status: Open
 Type:   Bug
 Package:Scripting Engine problem
 Operating System:   ANY
 PHP Version:master
 Block user comment: N
 Private report: N

 New Comment:

I mentioned this some time ago on internals, but it didn't seem like anyone was 
interested in this :(


Previous Comments:

[2012-03-31 01:51:18] yohg...@php.net

Changed package to Scripting Engine Problem and OS is irrelevant.

Anyway, will this be supported?


[2012-03-30 15:36:18] oxygenus at gmail dot com

Description:

Parse error: syntax error, unexpected '(' in C:\phpinfo.php on line 26

26: giveArray($arrFunctions)[0]("Hello world")

Test script:
---
function($strSomeParam)
{
return $strSomeParam;
},
];

//this works
var_export(
giveArray($arrFunctions)[0]
);

//this works
var_export(
$arrFunctions[0]("Hello world")
);

//this fails compilation with syntax error
var_export(
giveArray($arrFunctions)[0]("Hello world")
);


Expected result:

Closure::__set_state(array(
))'Hello world''Hello world'

Actual result:
--
Parse error: syntax error, unexpected '(' in C:\phpinfo.php on line 26






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61569&edit=1


Bug #60701 [Com]: __toString() which stores $this reference triggers segfault (with fix!)

2012-04-02 Thread arjen at react dot com
Edit report at https://bugs.php.net/bug.php?id=60701&edit=1

 ID: 60701
 Comment by: arjen at react dot com
 Reported by:daan at react dot com
 Summary:__toString() which stores $this reference triggers
 segfault (with fix!)
 Status: Assigned
 Type:   Bug
 Package:Reproducible crash
 Operating System:   CentOS
 PHP Version:5.3.8
 Assigned To:dmitry
 Block user comment: N
 Private report: N

 New Comment:

5.3.10 fixed the attached testcase, a more simple test now fails.

a = $this;
return 'waa?';
}
}

$a = new A;
echo trim($a);
echo trim($a->a);

Results:
5.3.0 - 5.3.9   waa?1
5.3.10 waa? Warning: trim() expects parameter 1 to be string, unknown given in 
/home/deployer/public_html/php/tmp/ba8096acaf18c52bc12e38619634c25b on line 14
5.4.0 Segmentationfault


Previous Comments:

[2012-03-26 09:05:57] s...@php.net

OK, I think I know what may be going on here. What you're getting as $this in 
toString() is not a real $object but a copy what was generated by 
SEPARATE_ZVAL_IF_NOT_REF() in parse_arg_object_to_string(). If you save this 
copy, there might be trouble since it'd be destroyed by writeobj and later 
cleanup of the function arguments. However, the patch proposed doesn't seem to 
solve the problem completely since $this->test variable is still corrupted in 
this scenario...


[2012-03-26 08:38:59] s...@php.net

I looked more into the code, and as far as I can see, the case where readobj == 
writeobj comes from parse_arg_object_to_string() - but there it is preceeded by 
SEPARATE_ZVAL_IF_NOT_REF(arg); so I don't see how you can get refcount > 1 
there 
unless you have IS_REF. Something else is going on there...


[2012-03-26 07:21:23] s...@php.net

I'm not sure I understand the patch, especially this part: 

if (readobj == writeobj) {
+   if (Z_REFCOUNT_P(readobj) <= 1) 
{
+   INIT_PZVAL(writeobj);
+   }
zval_dtor(readobj);

It looks like you initializing the object and then immediately calling dtor on 
it (since readobj == writeobj). Could you explain why and what you are trying 
to 
do there?


[2012-02-13 19:48:38] pada at hrz dot tu-chemnitz dot de

@sjon: Now, I retried with the original Test script from daan.
This patch works for me too, thanks :)


[2012-02-13 19:16:25] sjon at hortensius dot net

@andrew at localcoast dot net
Did you try to remove all __toString methods from your application? If that 
didn't fix it you are experiencing another bug and will probably need to 
generate 
a small reproducing script yourself

@pada at hrz dot tu-chemnitz dot de

your problem has nothing to do with this bug, You are simply demonstrating a 
recursive loop.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=60701


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=60701&edit=1


Req #61421 [Opn->Asn]: Missing SHA256,SHA512 families of signature algorithms

2012-04-02 Thread pajoye
Edit report at https://bugs.php.net/bug.php?id=61421&edit=1

 ID: 61421
 Updated by: paj...@php.net
 Reported by:mark at zedwood dot com
 Summary:Missing SHA256,SHA512 families of signature
 algorithms
-Status: Open
+Status: Assigned
 Type:   Feature/Change Request
 Package:OpenSSL related
 Operating System:   Ubuntu Linux
 PHP Version:5.4.0
-Assigned To:
+Assigned To:pajoye
 Block user comment: N
 Private report: N

 New Comment:

hi,

Thanks for the patch, I will apply it asap but it won't make it for the next 
releases of 5.3 or 5.4 as we are already in release phases.

Btw, can you add some tests too please?

About the patch, yes, please use the openssl version check instead. As what is 
done now won't work smoothly with older versions.

As of getting a svn account (asked per email but adding answer here too), we 
usually give one after that one has provided a couple of patches :)

Thanks for your work!


Previous Comments:

[2012-04-02 09:21:11] der...@php.net

Mark, yes, you probably should. It will also help a lot if you include test 
cases for the new functionality. Make sure those tests also run with older 
versions of openssl though!

cheers,
Derick


[2012-03-31 04:00:54] mark at zedwood dot com

should i submit a new patch with
#if OPENSSL_VERSION_NUMBER >= 0x0090708fL 
instead of
#ifndef OPENSSL_NO_SHA256
?


[2012-03-16 21:10:49] zedwoodnoreply at gmail dot com

to generate a sample csr with sha256 sig use:
openssl req -new -sha256-newkey rsa:2048 -nodes -out example_com_sha256.csr 
   -keyout example_com_sha256.key-subj "/C=US/ST=/L=/O=/CN=example.com"

to parse the csr with openssl (command line) use:
openssl req -in example_com_sha256.csr-noout -text

sample output:
Certificate Request:
Data:
Version: 0 (0x0)
Subject: C=US, CN=example.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:a7:7a:17:c4:17:72:8e:5b:36:36:05:8f:57:10:
a5:b9:f2:4b:05:9e:88:62:bc:8b:a5:ad:c3:6a:41:
b5:31:25:cc:86:7c:99:6b:f4:7f:74:a1:01:93:95:
b9:3e:b7:dc:b4:b4:59:3c:ff:22:8c:d5:87:75:44:
93:9c:19:de:08:42:b2:fd:88:eb:71:6b:8b:21:4a:
06:66:9c:6d:2b:10:bb:f5:e8:7c:a2:3a:ae:51:86:
51:3a:d1:96:02:93:f1:de:3a:68:06:6d:36:20:41:
b4:09:d8:ed:74:5e:ff:ae:ba:26:84:ac:4d:6a:30:
6a:b4:01:ec:3a:a0:f9:5c:08:5c:6c:5e:1f:f2:11:
2c:11:a1:3d:44:17:79:33:0a:97:a0:4e:b8:c3:81:
e4:58:d7:10:b3:50:43:af:9e:4b:b9:05:e7:5d:da:
78:b1:85:c4:36:a7:d5:b2:82:7a:1a:ab:4c:6c:98:
a1:b5:6c:1a:99:04:18:2b:8d:80:2f:11:23:1d:41:
53:7a:15:39:2b:84:23:bf:2d:b0:32:5a:7d:0d:d0:
3f:ac:d3:66:9c:9f:a2:df:40:4b:0d:9c:98:e4:64:
44:b7:58:1d:54:75:07:47:b9:03:e5:57:10:d3:1a:
ac:85:c6:f1:19:1c:df:a6:33:12:25:0b:ee:9a:fb:
72:93
Exponent: 65537 (0x10001)
Attributes:
a0:00
Signature Algorithm: sha256WithRSAEncryption
48:ac:2e:08:93:95:ec:c3:12:ab:88:33:1f:7f:37:c3:5a:9b:
6a:9a:b3:ea:35:ca:f0:1d:40:47:f0:31:8f:f3:36:b4:3d:5d:
ee:74:48:fe:1b:43:4b:78:d7:97:d5:d5:77:8f:ba:51:db:35:
75:c4:89:dc:b6:49:86:4e:4c:42:e7:01:e3:cb:72:da:9b:94:
d1:ed:b7:59:be:f6:eb:44:68:54:e5:10:0c:bf:7a:9f:48:18:
86:f2:f2:84:ca:a1:3b:48:be:d1:4a:40:22:12:7b:c0:42:a5:
a0:ce:0f:43:17:44:e2:cf:e8:27:1d:71:d5:92:d8:de:bd:82:
c2:11:f2:73:8c:c3:ab:5e:a1:64:78:af:a6:10:19:b1:ed:b2:
fb:4c:bb:66:20:fe:1a:34:af:43:9f:4d:4e:6d:a2:f0:d0:df:
33:93:e5:a7:d5:dc:2f:47:e3:56:31:fd:50:d2:2e:83:2f:d2:
b2:fb:a8:7d:ce:4a:1f:a1:14:fc:45:92:ca:1c:85:3a:e7:32:
e4:a8:13:fe:54:9a:ee:25:02:26:d3:b5:e1:96:08:f3:c8:36:
59:ef:f5:46:1c:62:e6:58:ea:d4:86:a8:3f:ed:92:77:d7:eb:
d3:92:a1:91:8e:2c:1c:4e:c2:12:b0:c9:8b:3b:17:99:32:03:
e3:9e:a5:dd


[2012-03-16 19:35:04] mark at zedwood dot com

Description:

openssl_verify() takes as a parameter a signature algorithm.  The current list 
of values is here
http://us3.php.net/manual/en/openssl.signature-algos.php

The SHA256 and SHA512 families algorithms have been supported in openssl for 
quite some time.  RipeMD160 is also not included.

Test script:
---
http://pastebin.com/qdCyC0Pe

Req #61421 [Opn]: Missing SHA256,SHA512 families of signature algorithms

2012-04-02 Thread derick
Edit report at https://bugs.php.net/bug.php?id=61421&edit=1

 ID: 61421
 Updated by: der...@php.net
 Reported by:mark at zedwood dot com
 Summary:Missing SHA256,SHA512 families of signature
 algorithms
 Status: Open
 Type:   Feature/Change Request
 Package:OpenSSL related
 Operating System:   Ubuntu Linux
 PHP Version:5.4.0
 Block user comment: N
 Private report: N

 New Comment:

Mark, yes, you probably should. It will also help a lot if you include test 
cases for the new functionality. Make sure those tests also run with older 
versions of openssl though!

cheers,
Derick


Previous Comments:

[2012-03-31 04:00:54] mark at zedwood dot com

should i submit a new patch with
#if OPENSSL_VERSION_NUMBER >= 0x0090708fL 
instead of
#ifndef OPENSSL_NO_SHA256
?


[2012-03-16 21:10:49] zedwoodnoreply at gmail dot com

to generate a sample csr with sha256 sig use:
openssl req -new -sha256-newkey rsa:2048 -nodes -out example_com_sha256.csr 
   -keyout example_com_sha256.key-subj "/C=US/ST=/L=/O=/CN=example.com"

to parse the csr with openssl (command line) use:
openssl req -in example_com_sha256.csr-noout -text

sample output:
Certificate Request:
Data:
Version: 0 (0x0)
Subject: C=US, CN=example.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:a7:7a:17:c4:17:72:8e:5b:36:36:05:8f:57:10:
a5:b9:f2:4b:05:9e:88:62:bc:8b:a5:ad:c3:6a:41:
b5:31:25:cc:86:7c:99:6b:f4:7f:74:a1:01:93:95:
b9:3e:b7:dc:b4:b4:59:3c:ff:22:8c:d5:87:75:44:
93:9c:19:de:08:42:b2:fd:88:eb:71:6b:8b:21:4a:
06:66:9c:6d:2b:10:bb:f5:e8:7c:a2:3a:ae:51:86:
51:3a:d1:96:02:93:f1:de:3a:68:06:6d:36:20:41:
b4:09:d8:ed:74:5e:ff:ae:ba:26:84:ac:4d:6a:30:
6a:b4:01:ec:3a:a0:f9:5c:08:5c:6c:5e:1f:f2:11:
2c:11:a1:3d:44:17:79:33:0a:97:a0:4e:b8:c3:81:
e4:58:d7:10:b3:50:43:af:9e:4b:b9:05:e7:5d:da:
78:b1:85:c4:36:a7:d5:b2:82:7a:1a:ab:4c:6c:98:
a1:b5:6c:1a:99:04:18:2b:8d:80:2f:11:23:1d:41:
53:7a:15:39:2b:84:23:bf:2d:b0:32:5a:7d:0d:d0:
3f:ac:d3:66:9c:9f:a2:df:40:4b:0d:9c:98:e4:64:
44:b7:58:1d:54:75:07:47:b9:03:e5:57:10:d3:1a:
ac:85:c6:f1:19:1c:df:a6:33:12:25:0b:ee:9a:fb:
72:93
Exponent: 65537 (0x10001)
Attributes:
a0:00
Signature Algorithm: sha256WithRSAEncryption
48:ac:2e:08:93:95:ec:c3:12:ab:88:33:1f:7f:37:c3:5a:9b:
6a:9a:b3:ea:35:ca:f0:1d:40:47:f0:31:8f:f3:36:b4:3d:5d:
ee:74:48:fe:1b:43:4b:78:d7:97:d5:d5:77:8f:ba:51:db:35:
75:c4:89:dc:b6:49:86:4e:4c:42:e7:01:e3:cb:72:da:9b:94:
d1:ed:b7:59:be:f6:eb:44:68:54:e5:10:0c:bf:7a:9f:48:18:
86:f2:f2:84:ca:a1:3b:48:be:d1:4a:40:22:12:7b:c0:42:a5:
a0:ce:0f:43:17:44:e2:cf:e8:27:1d:71:d5:92:d8:de:bd:82:
c2:11:f2:73:8c:c3:ab:5e:a1:64:78:af:a6:10:19:b1:ed:b2:
fb:4c:bb:66:20:fe:1a:34:af:43:9f:4d:4e:6d:a2:f0:d0:df:
33:93:e5:a7:d5:dc:2f:47:e3:56:31:fd:50:d2:2e:83:2f:d2:
b2:fb:a8:7d:ce:4a:1f:a1:14:fc:45:92:ca:1c:85:3a:e7:32:
e4:a8:13:fe:54:9a:ee:25:02:26:d3:b5:e1:96:08:f3:c8:36:
59:ef:f5:46:1c:62:e6:58:ea:d4:86:a8:3f:ed:92:77:d7:eb:
d3:92:a1:91:8e:2c:1c:4e:c2:12:b0:c9:8b:3b:17:99:32:03:
e3:9e:a5:dd


[2012-03-16 19:35:04] mark at zedwood dot com

Description:

openssl_verify() takes as a parameter a signature algorithm.  The current list 
of values is here
http://us3.php.net/manual/en/openssl.signature-algos.php

The SHA256 and SHA512 families algorithms have been supported in openssl for 
quite some time.  RipeMD160 is also not included.

Test script:
---
http://pastebin.com/qdCyC0Pe

Expected result:

verified

Actual result:
--
PHP Notice:  Use of undefined constant OPENSSL_ALGO_SHA256 - assumed 
'OPENSSL_ALGO_SHA256' in verify_sig.php on line 18
notverified






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61421&edit=1


Bug #61588 [Asn->Fbk]: PDOStatement::getColumnMeta returns original table name from view

2012-04-02 Thread johannes
Edit report at https://bugs.php.net/bug.php?id=61588&edit=1

 ID: 61588
 Updated by: johan...@php.net
 Reported by:cdburgess at gmail dot com
 Summary:PDOStatement::getColumnMeta returns original table
 name from view
-Status: Assigned
+Status: Feedback
 Type:   Bug
 Package:PDO related
 Operating System:   Mac OSX
 PHP Version:5.3.10
 Assigned To:mysql
 Block user comment: N
 Private report: N

 New Comment:

I can't reproduce this. Please provide a reproduce script including table and 
view definition and information about the MySQL server version you are using.


Previous Comments:

[2012-04-01 03:58:58] cdburgess at gmail dot com

Description:

The data returned from PDOStatement::getColumnMeta is inconsistent when run on 
a 
MySQL view. It works fine against tables, but in some cases when run against a 
View in MySQL, it returns the original table name from the table that was used 
to 
create the view.

Expected result:

I would expect the Table name being returned to be the name of the View, not 
the 
original table the view is created from.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61588&edit=1


Bug #60947 [ReO->Csd]: Segmentation fault while executing ibase_db_info

2012-04-02 Thread mariuz
Edit report at https://bugs.php.net/bug.php?id=60947&edit=1

 ID: 60947
 Updated by: mar...@php.net
 Reported by:a dot lukyanov at hostcomm dot ru
 Summary:Segmentation fault while executing ibase_db_info
-Status: Re-Opened
+Status: Closed
 Type:   Bug
 Package:InterBase related
 Operating System:   All
 PHP Version:Irrelevant
 Assigned To:mariuz
 Block user comment: N
 Private report: N

 New Comment:

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




Previous Comments:

[2012-03-23 07:16:40] mar...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.

iliaa fixed it in svn for all branches

Thanks


[2012-03-16 21:17:43] a dot lukyanov at hostcomm dot ru

I'm sorry, but current code in trunk not solved the problem.

Buffer increases on each iteration, because heap_p is bigger than heap_buf:

- snprintf(heap_p, heap_buf_size - (heap_buf - heap_p), "%s\n", result);
+ snprintf(heap_p, heap_buf_size - (heap_p - heap_buf), "%s\n", result);

This line should be corrected too:

- heap_p += line_len +2;
+ heap_p += line_len +1;

On each iteration I need overwrite last zero byte. In current code I recieve 
single line from Firebird server instead of multiline output (if not catch 
segfault).

Sorry for my bad English. Thanks.


[2012-03-15 19:59:22] il...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.




[2012-03-15 19:59:15] il...@php.net

Automatic comment from SVN on behalf of iliaa
Revision: http://svn.php.net/viewvc/?view=revision&revision=324281
Log: Fixed bug #60947 (Segmentation fault while executing ibase_db_info)


[2012-02-01 10:39:15] a dot lukyanov at hostcomm dot ru

Description:

All versions of PHP takes segmentation fault while executing ibase_db_info() 
function. I solved this problem and wrote patch. Please apply it.

Thanks.

Test script:
---


Expected result:

testvh1 public_html # ./php-5.2.17/sapi/cli/php test.php 
 
Database "/var/lib/firebird/testvh11_fb1234.fdb" 
Database header page information: 
Flags   0 
Checksum12345 
Generation  65 
Page size   8192 
ODS version 11.2 
Oldest transaction  20 
Oldest active   21 
Oldest snapshot 21 
Next transaction26 
Bumped transaction  1 
Sequence number 0 
Next attachment ID  38 
Implementation ID   24 
Shadow count0 
Page buffers0 
Next header page0 
Database dialect3 
Creation date   Jan 30, 2012 15:10:47 
Attributes  force write 
 
Variable header data: 
*END* 
testvh1 public_html #

Actual result:
--
testvh1 public_html # php test.php 
Segmentation fault
testvh1 public_html #






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=60947&edit=1


Bug #61586 [Opn->Fbk]: is_file("path/.ext");

2012-04-02 Thread aharvey
Edit report at https://bugs.php.net/bug.php?id=61586&edit=1

 ID: 61586
 Updated by: ahar...@php.net
 Reported by:simon at cicoss dot net
 Summary:is_file("path/.ext");
-Status: Open
+Status: Feedback
 Type:   Bug
 Package:Filesystem function related
 Operating System:   Suse Linux
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with ,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc. If the script requires a 
database to demonstrate the issue, please make sure it creates 
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.

I also can't reproduce this. This script:



Outputs bool(false) and bool(true), which is what I'd expect.


Previous Comments:

[2012-04-01 08:00:29] reeze dot xia at gmail dot com

Hi simon:
  I don't get it. does it look like this? 

./testscript.php
./path
/a.json   < a.json or any *.json ?
file
cat testscript.php
 bool(true)


[2012-03-31 19:57:59] simon at cicoss dot net

Description:

---
>From manual page: http://www.php.net/function.is-file
---
Due to a small error I found that is_file returns true for something like 
"path/.ext" when "path/" files there ".ext".

Test script:
---
https://bugs.php.net/bug.php?id=61586&edit=1