[PHP-BUG] Bug #61606 [NEW]: Unstable function renaming
From: Operating system: Debian Squeeze PHP version: 5.4.0 Package: Reproducible crash Bug Type: Bug Bug description:Unstable function renaming Description: Since APD is no longer compatible with recent versions of PHP, I use custom extension functions for renaming (sources: http://www.developpez.net/forums/attachments/p92460d183074/c-cpp/c/besoin-daide-corriger-extension-php-toute-petite-jure/php_rename.zip/) Test script: --- Expected result: This extension should rename functions, native or not, for the execution context of the script called. Actual result: -- This extension fills its role very well but, strangely, in some executions (variable number, nearly one out of 10-15), the function function_rename () seems to have a permanent effect on PHP functions. Currently, the only way to fix this bug, it's a restart Apache. -- Edit bug report at https://bugs.php.net/bug.php?id=61606&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=61606&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=61606&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=61606&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=61606&r=fixed Fixed in SVN and need be documented: https://bugs.php.net/fix.php?id=61606&r=needdocs Fixed in release: https://bugs.php.net/fix.php?id=61606&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=61606&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=61606&r=needscript Try newer version: https://bugs.php.net/fix.php?id=61606&r=oldversion Not developer issue: https://bugs.php.net/fix.php?id=61606&r=support Expected behavior: https://bugs.php.net/fix.php?id=61606&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=61606&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=61606&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=61606&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=61606&r=php4 Daylight Savings:https://bugs.php.net/fix.php?id=61606&r=dst IIS Stability: https://bugs.php.net/fix.php?id=61606&r=isapi Install GNU Sed: https://bugs.php.net/fix.php?id=61606&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=61606&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=61606&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=61606&r=mysqlcfg
Req #61602 [Com]: Allow access to name of constant used as default value
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1 ID: 61602 Comment by: reeze dot xia at gmail dot com Reported by:sebast...@php.net Summary:Allow access to name of constant used as default value Status: Open Type: Feature/Change Request Package:Reflection related Operating System: Irrelevant PHP Version:5.4Git-2012-04-02 (Git) Block user comment: N Private report: N New Comment: PS: @pierrick pull request is here https://github.com/php/php-src/pull/35. thanks. Previous Comments: [2012-04-03 05:56:12] reeze dot xia at gmail dot com Hi, pierrick & sebastian: I have create another patch for this request. it differ's in: - rename defaultValueIsConstant to isDefaultValueConstant to match bool return values's is* method naming. - handle global constant. - refactor code to remove duplicate. - add 3 tests for it. and I've make test everything looks fine. please review it for me. Thanks. [2012-04-03 00:24:13] pierr...@php.net Just created a quick patch. If it's Ok with everybody I'll commit it to master with tests. [2012-04-03 00:23:24] pierr...@php.net The following patch has been added/updated: Patch Name: getDefaultValueConstantName.diff Revision: 1333412604 URL: https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604 [2012-04-02 14:34:44] der...@php.net It's definitely possible, I've just added something like this to VLD: https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8 [2012-04-02 14:14:16] sebast...@php.net Description: When a constant is used for the default value of an optional parameter, the Reflection API (tries to) resolve(s) the constant to its value and then returns it as the default value. In addition, I would like to have two additional methods in ReflectionParameter that expose 1) whether or not a default value "is a" constant and 2) the name of the constant. In the example below, I am using temporary names ("defaultValueIsConstant" and "getDefaultValueConstantName") for these two methods because I cannot think of sensible method names right now. Test script: --- getParameters(); foreach ($p as $_p) { var_dump($_p->getDefaultValue()); if ($_p->defaultValueIsConstant()) { var_dump($_p->getDefaultValueConstantName()); } } Expected result: string(3) "..." string(9) "self::bar" Actual result: -- string(3) "..." -- Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1
Bug #61588 [Fbk->Asn]: PDOStatement::getColumnMeta returns original table name from view
Edit report at https://bugs.php.net/bug.php?id=61588&edit=1 ID: 61588 User updated by:cdburgess at gmail dot com Reported by:cdburgess at gmail dot com Summary:PDOStatement::getColumnMeta returns original table name from view -Status: Feedback +Status: Assigned Type: Bug Package:PDO related Operating System: Mac OSX PHP Version:5.3.10 Assigned To:mysql Block user comment: N Private report: N New Comment: PHP v5.3.10 MySQL v5.5.22 Apache v2.2.21 Here is a script that contains all of the information you need to reproduce. The commented parts at the bottom contain all of the schema / data information. Just create your database, setup the PDO access, and run the script. It will provide the queries, descriptions, and getColumnMeta results to show you what I am seeing. Thanks! -- SCRIPT BELOW HERE -- ' . "\n"; echo 'In this query, you will see the table is reported as expected. (my_installs)'; $result = $connection->query($query); var_dump($result->getColumnMeta(2)); $query = "SELECT `MyInstall`.`id`, `MyInstall`.`user_id`, `MyInstall`.`script_id`, `MyInstall`.`path`, `MyInstall`.`url`, `MyInstall`.`created`, `MyInstall`.`version`, `MyInstall`.`admin_url`, `MyInstall`.`name`, `MyInstall`.`icon` FROM `my_installs` AS `MyInstall` WHERE `user_id` = 'dcc87a2c-7b4b-11e1-8397-60195b7d6275' ORDER BY `url` ASC"; echo $query . '' . "\n"; echo 'With the Alias format of the query and using only the user_id in the where clause, the table Alias is reported.'; $result = $connection->query($query); var_dump($result->getColumnMeta(2)); $query = "SELECT `MyInstall`.`id`, `MyInstall`.`user_id`, `MyInstall`.`script_id`, `MyInstall`.`path`, `MyInstall`.`url`, `MyInstall`.`created`, `MyInstall`.`version`, `MyInstall`.`admin_url`, `MyInstall`.`name`, `MyInstall`.`icon` FROM `my_installs` AS `MyInstall` WHERE `user_id` = 'dcc87a2c-7b4b-11e1-8397-60195b7d6275' AND `script_id` = '057de1e0- 7b48-11e1-8397-60195b7d6275' ORDER BY `url` ASC"; echo $query . '' . "\n"; echo 'When adding the second where clause (using script_id), the Script table alias is reported, but MyInstall or my_installs is expected.'; $result = $connection->query($query); var_dump($result->getColumnMeta(2)); /* -- phpMyAdmin SQL Dump -- version 3.4.10.2 -- http://www.phpmyadmin.net -- -- Host: localhost -- Generation Time: Apr 03, 2012 at 07:46 AM -- Server version: 5.5.22 -- PHP Version: 5.3.10 SET SQL_MODE="NO_AUTO_VALUE_ON_ZERO"; SET time_zone = "+00:00"; -- -- Database: `testpdo` -- DELIMITER $$ -- -- Procedures -- CREATE DEFINER=`root`@`localhost` PROCEDURE `BuildNewInstallStatPartition`() BEGIN DECLARE maxpart_date date; SELECT SUBSTR(MAX(PARTITION_DESCRIPTION) , 2, 19) + INTERVAL 1 MONTH INTO maxpart_date FROM INFORMATION_SCHEMA.PARTITIONS WHERE TABLE_NAME = 'install_stats'; SET @sql := CONCAT('ALTER TABLE install_stats ADD PARTITION (PARTITION p_' , YEAR(maxpart_date), MONTH(maxpart_date) , ' values less than(''' , CAST(maxpart_date as DATETIME) , '''))'); PREPARE stmt FROM @sql; EXECUTE stmt; DEALLOCATE PREPARE stmt; END$$ DELIMITER ; -- -- -- Stand-in structure for view `my_installs` -- CREATE TABLE IF NOT EXISTS `my_installs` ( `id` char(36) ,`user_id` char(36) ,`script_id` char(36) ,`script_version_id` char(36) ,`script_version_package_id` char(36) ,`name` varchar(35) ,`version` varchar(25) ,`path` varchar(255) ,`url` varchar(255) ,`admin_url` varchar(128) ,`icon` varchar(128) ,`created` datetime ); -- -- -- Table structure for table `scripts` -- CREATE TABLE IF NOT EXISTS `scripts` ( `id` char(36) NOT NULL, `category_id` char(36) NOT NULL, `name` varchar(35) NOT NULL, `icon` varchar(128) NOT NULL, `created` datetime NOT NULL, PRIMARY KEY (`id`), KEY `category_id` (`category_id`) ) ENGINE=MyISAM DEFAULT CHARSET=utf8; -- -- Dumping data for table `scripts` -- INSERT INTO `scripts` (`id`, `category_id`, `name`, `icon`, `created`) VALUES ('057de1e0-7b48-11e1-8397-60195b7d6275', '05aff694-7b48-11e1-8397-60195b7d6275', 'WordPress', 'icon_WordPress.gif', '-00-00 00:00:00'); -- -- -- Table structure for table `script_installs` -- CREATE TABLE IF NOT EXISTS `script_installs` ( `id` char(36) NOT NULL, `user_id` char(36) NOT NULL, `script_version_package_id` char(36) NOT NULL, `path` varchar(255) NOT NULL, `url` varchar(255) NOT NULL, `created` datetime NOT NULL, PRIMARY KEY (`id`), KEY `user_id` (`user_id`), KEY `script_version_package_id` (`script_version_package_id`) ) ENGINE=MyISAM DEFAULT CHARSET=utf8; -- -- Dum
Req #61602 [Com]: Allow access to name of constant used as default value
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1 ID: 61602 Comment by: reeze dot xia at gmail dot com Reported by:sebast...@php.net Summary:Allow access to name of constant used as default value Status: Open Type: Feature/Change Request Package:Reflection related Operating System: Irrelevant PHP Version:5.4Git-2012-04-02 (Git) Block user comment: N Private report: N New Comment: Hi, pierrick & sebastian: I have create another patch for this request. it differ's in: - rename defaultValueIsConstant to isDefaultValueConstant to match bool return values's is* method naming. - handle global constant. - refactor code to remove duplicate. - add 3 tests for it. and I've make test everything looks fine. please review it for me. Thanks. Previous Comments: [2012-04-03 00:24:13] pierr...@php.net Just created a quick patch. If it's Ok with everybody I'll commit it to master with tests. [2012-04-03 00:23:24] pierr...@php.net The following patch has been added/updated: Patch Name: getDefaultValueConstantName.diff Revision: 1333412604 URL: https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604 [2012-04-02 14:34:44] der...@php.net It's definitely possible, I've just added something like this to VLD: https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8 [2012-04-02 14:14:16] sebast...@php.net Description: When a constant is used for the default value of an optional parameter, the Reflection API (tries to) resolve(s) the constant to its value and then returns it as the default value. In addition, I would like to have two additional methods in ReflectionParameter that expose 1) whether or not a default value "is a" constant and 2) the name of the constant. In the example below, I am using temporary names ("defaultValueIsConstant" and "getDefaultValueConstantName") for these two methods because I cannot think of sensible method names right now. Test script: --- getParameters(); foreach ($p as $_p) { var_dump($_p->getDefaultValue()); if ($_p->defaultValueIsConstant()) { var_dump($_p->getDefaultValueConstantName()); } } Expected result: string(3) "..." string(9) "self::bar" Actual result: -- string(3) "..." -- Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1
Bug #60840 [Com]: undefined symbol: mysqlnd_debug_std_no_trace_funcs
Edit report at https://bugs.php.net/bug.php?id=60840&edit=1 ID: 60840 Comment by: luiz dot fk at gmail dot com Reported by:public at grik dot net Summary:undefined symbol: mysqlnd_debug_std_no_trace_funcs Status: Assigned Type: Bug Package:PDO related Operating System: linux PHP Version:5.4SVN-2012-01-22 (snap) Assigned To:uw Block user comment: N Private report: N New Comment: Hi... same here: PHP Warning: PHP Startup: Unable to load dynamic library '/usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so' - /usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so: undefined symbol: mysqlnd_debug_std_no_trace_funcs in Unknown on line 0 Warning: PHP Startup: Unable to load dynamic library '/usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so' - /usr/lib64/extensions/debug-non-zts-20100525/pdo_mysql.so: undefined symbol: mysqlnd_debug_std_no_trace_funcs in Unknown on line 0 Previous Comments: [2012-01-22 20:02:35] public at grik dot net I tried to compile without mysqlnd driver: # cd ext/pdo_mysql # ./configure --with-pdo-mysql=/usr checking for mysql_config... /usr/bin/mysql_config # make; make install #php undefined symbol: mysqlnd_debug_std_no_trace_funcs same issue, even when mysqlnd is not used [2012-01-22 18:58:33] public at grik dot net Description: I built PHP 5.4 from sources in debug mode with pdo_mysql extension as shared, compiled successfully, but when I starting php I get the startup warning. My configure command: './configure' \ '--prefix=/usr/local' \ '--sysconfdir=/etc' \ '--with-config-file-path=/etc' \ '--with-mysql=shared,mysqlnd' \ '--with-mysqli=shared,mysqlnd' \ '--with-pdo-mysql=shared,mysqlnd' \ --enable-fpm \ --enable-debug Test script: --- just running from command line Actual result: -- # php Warning: PHP Startup: Unable to load dynamic library '/usr/local/lib/php/extensions/debug-non-zts-20100525/pdo_mysql.so' - /usr/local/lib/php/extensions/debug-non-zts-20100525/pdo_mysql.so: undefined symbol: mysqlnd_debug_std_no_trace_funcs in Unknown on line 0 -- Edit this bug report at https://bugs.php.net/bug.php?id=60840&edit=1
Bug #61605 [Opn->Fbk]: header_remove() does not remove all headers
Edit report at https://bugs.php.net/bug.php?id=61605&edit=1 ID: 61605 Updated by: ahar...@php.net Reported by:david at grudl dot com Summary:header_remove() does not remove all headers -Status: Open +Status: Feedback Type: Bug Package:HTTP related PHP Version:5.4.0 Block user comment: N Private report: N New Comment: Which SAPI are you using? CGI, FPM, Apache2 handler, Apache2 filter, something else? Previous Comments: [2012-04-02 23:20:14] david at grudl dot com Description: header_remove($name) removes only one header $name. The function header() behaves the same way and replaces only first header. Test script: --- header('A: first'); header('A: second', FALSE); // append // removes only 'A: first' and header 'A: second' is sent header_remove('A'); Expected result: no 'A' header is sent Actual result: -- header A: second is sent -- Edit this bug report at https://bugs.php.net/bug.php?id=61605&edit=1
Req #60305 [Opn->Nab]: myClass::unset() keyword conflict
Edit report at https://bugs.php.net/bug.php?id=60305&edit=1 ID: 60305 Updated by: yohg...@php.net Reported by:matty023 at gmail dot com Summary:myClass::unset() keyword conflict -Status: Open +Status: Not a bug Type: Feature/Change Request Package:Scripting Engine problem PHP Version:5.4.0RC1 Block user comment: N Private report: N New Comment: Thank you for taking the time to write to us, but this is not a bug. Please double-check the documentation available at http://www.php.net/manual/ and the instructions on how to report a bug at http://bugs.php.net/how-to-report.php unset is keyword, so you cannot use it as previous comment describes. Previous Comments: [2011-11-21 03:50:41] anon at anon dot anon @francois: It's not a bug. It's a feature. It's kind of accepted that all programming languages have some keywords you can't use as identifier names. The general solution is to just choose a synonym. Possible alternative verbs for "unset" include: - clear - remove - delete - dispose - drop - erase Unusually, the language limitation is actually fixable for "unset" because of its obvious function-like syntax. It's probably not a priority though. Also, at best, it would break the history of PHP syntax-coloring editors turning "unset" keyword color. [2011-11-15 19:32:03] francois dot dambrine at isen-lille dot fr This bug also happen in php 5.3.6 (ubuntu 11.10 default version). [2011-11-15 02:19:37] matty023 at gmail dot com Description: While "keywords" and "language constructs" cannot be used as function names, I find myself with the need to have a function in my class named "unset", I also see that list is a very common and useful term. After the introduction of classes and namespaces it's time to look at enabling usage of these common terms in classes and namespaces. Test script: --- https://bugs.php.net/bug.php?id=60305&edit=1
Bug #60696 [Opn]: Large Integers problem
Edit report at https://bugs.php.net/bug.php?id=60696&edit=1 ID: 60696 Updated by: yohg...@php.net Reported by:danhen at web dot de Summary:Large Integers problem Status: Open Type: Bug Package:Scripting Engine problem Operating System: Windows PHP Version:5.4.0RC5 Block user comment: N Private report: N New Comment: Could you or anyone try see if this happens with other PDO drivers? $iTest is overflowed (i.e. larger than 31^2), but this should not matter. Previous Comments: [2012-01-10 05:20:22] danhen at web dot de Description: If large integer values ââare defined in the source code, connecting to MSSQL-Server fails. Setup: Windows Vista PHP5.4 RC5 php_pdo_sqlsrv as additional extension The code which defines the value doesn't need to be executed. It's enough defining such values before connecting to mssql (inside a previous loadad class in my case). When 90 is changed to 9 everything is fine. Test script: --- https://bugs.php.net/bug.php?id=60696&edit=1
Bug #61563 [Opn->Nab]: Installation/configuration problem with Apache 2.2.22; PHP 5.2.9-2 et OCI8 (wit
Edit report at https://bugs.php.net/bug.php?id=61563&edit=1 ID: 61563 Updated by: s...@php.net Reported by:alex_couturier at yahoo dot com Summary:Installation/configuration problem with Apache 2.2.22; PHP 5.2.9-2 et OCI8 (wit -Status: Open +Status: Not a bug Type: Bug Package:Dynamic loading Operating System: Windows 2003 server PHP Version:master-Git-2012-03-30 (Git) Block user comment: N Private report: N New Comment: Please ask this on a support forum before logging a bug. Try http://www.oracle.com/technology/forums/php.html Previous Comments: [2012-03-30 13:21:57] alex_couturier at yahoo dot com Description: ;extension=php_bz2.dll ;extension=php_curl.dll ;extension=php_dba.dll ;extension=php_dbase.dll ;extension=php_fdf.dll extension=php_gd2.dll ;extension=php_gettext.dll ;extension=php_gmp.dll ;extension=php_ifx.dll ;extension=php_imap.dll ;extension=php_interbase.dll ;extension=php_ldap.dll extension=php_mbstring.dll ;extension=php_exif.dll ;extension=php_mcrypt.dll ;extension=php_mhash.dll ;extension=php_mime_magic.dll ;extension=php_ming.dll ;extension=php_msql.dll ;extension=php_mssql.dll extension=php_mysql.dll extension=php_mysqli.dll extension=php_oci8.dll extension=php_openssl.dll extension=php_pdo.dll ;extension=php_pdo_firebird.dll ;extension=php_pdo_mssql.dll extension=php_pdo_mysql.dll ;extension=php_pdo_oci.dll ;extension=php_pdo_oci8.dll ;extension=php_pdo_odbc.dll ;extension=php_pdo_pgsql.dll extension=php_pdo_sqlite.dll ;extension=php_pgsql.dll ;extension=php_pspell.dll ;extension=php_shmop.dll ;extension=php_snmp.dll ;extension=php_soap.dll ;extension=php_sockets.dll ;extension=php_sqlite.dll ;extension=php_sybase_ct.dll ;extension=php_tidy.dll ;extension=php_xmlrpc.dll ;extension=php_xsl.dll extension=php_zip.dll extension=php_http.dll extension=php_oracle.dll Test script: --- Hello Support, I would like help about a problem that I could not answer. So I try to install Apache 2.2.22 with the link oci8 to connect my database with Oracle 10G on a OS windows server 2003. So I have installed exactly the pre requisite necessary to work together apache with oci8 - Oracle instant client - PHP 5.2.17 - Apache 2.2.22 - Oracle instant client 11G 32bits I create the environnement variable TNS_ADMIN and PATH with the directory "D:\www\instantclient_11_1" And when I start Apache, I have the error message in php log : PHP Warning: PHP Startup: Unable to load dynamic library 'ext/php_oci8.dll' - %1 is not a valid Win32 application.\r\n in Unknown on line 0 PHP Warning: PHP Startup: Unable to load dynamic library 'ext/php_oracle.dll' - %1 is not a valid Win32 application.\r\n in Unknown on line 0 Have you got an idea ? Many thanks AC -- Edit this bug report at https://bugs.php.net/bug.php?id=61563&edit=1
Req #61602 [Opn]: Allow access to name of constant used as default value
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1 ID: 61602 Updated by: pierr...@php.net Reported by:sebast...@php.net Summary:Allow access to name of constant used as default value Status: Open Type: Feature/Change Request Package:Reflection related Operating System: Irrelevant PHP Version:5.4Git-2012-04-02 (Git) Block user comment: N Private report: N New Comment: Just created a quick patch. If it's Ok with everybody I'll commit it to master with tests. Previous Comments: [2012-04-03 00:23:24] pierr...@php.net The following patch has been added/updated: Patch Name: getDefaultValueConstantName.diff Revision: 1333412604 URL: https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604 [2012-04-02 14:34:44] der...@php.net It's definitely possible, I've just added something like this to VLD: https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8 [2012-04-02 14:14:16] sebast...@php.net Description: When a constant is used for the default value of an optional parameter, the Reflection API (tries to) resolve(s) the constant to its value and then returns it as the default value. In addition, I would like to have two additional methods in ReflectionParameter that expose 1) whether or not a default value "is a" constant and 2) the name of the constant. In the example below, I am using temporary names ("defaultValueIsConstant" and "getDefaultValueConstantName") for these two methods because I cannot think of sensible method names right now. Test script: --- getParameters(); foreach ($p as $_p) { var_dump($_p->getDefaultValue()); if ($_p->defaultValueIsConstant()) { var_dump($_p->getDefaultValueConstantName()); } } Expected result: string(3) "..." string(9) "self::bar" Actual result: -- string(3) "..." -- Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1
Req #61602 [PATCH]: Allow access to name of constant used as default value
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1 ID: 61602 Patch added by: pierr...@php.net Reported by:sebast...@php.net Summary:Allow access to name of constant used as default value Status: Open Type: Feature/Change Request Package:Reflection related Operating System: Irrelevant PHP Version:5.4Git-2012-04-02 (Git) Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: getDefaultValueConstantName.diff Revision: 1333412604 URL: https://bugs.php.net/patch-display.php?bug=61602&patch=getDefaultValueConstantName.diff&revision=1333412604 Previous Comments: [2012-04-02 14:34:44] der...@php.net It's definitely possible, I've just added something like this to VLD: https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8 [2012-04-02 14:14:16] sebast...@php.net Description: When a constant is used for the default value of an optional parameter, the Reflection API (tries to) resolve(s) the constant to its value and then returns it as the default value. In addition, I would like to have two additional methods in ReflectionParameter that expose 1) whether or not a default value "is a" constant and 2) the name of the constant. In the example below, I am using temporary names ("defaultValueIsConstant" and "getDefaultValueConstantName") for these two methods because I cannot think of sensible method names right now. Test script: --- getParameters(); foreach ($p as $_p) { var_dump($_p->getDefaultValue()); if ($_p->defaultValueIsConstant()) { var_dump($_p->getDefaultValueConstantName()); } } Expected result: string(3) "..." string(9) "self::bar" Actual result: -- string(3) "..." -- Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1
Bug #61559 [Com]: Test Bug - ext/standard/tests/streams/bug61115-1
Edit report at https://bugs.php.net/bug.php?id=61559&edit=1 ID: 61559 Comment by: mattfic...@php.net Reported by:mattfic...@php.net Summary:Test Bug - ext/standard/tests/streams/bug61115-1 Status: Closed Type: Bug Package:Testing related Operating System: Windows PHP Version:5.4.0 Assigned To:shein Block user comment: N Private report: N New Comment: Both Windows and Linux have slightly different error messages. The current error message fails for me on both Windows and Linux. My above patch fixes the Linux error message and forks the test into a Windows specific test (with the correct Windows error message). Previous Comments: [2012-04-02 23:24:13] mattfic...@php.net The following patch has been added/updated: Patch Name: bug61115-1.patch.txt Revision: 1333409053 URL: https://bugs.php.net/patch-display.php?bug=61559&patch=bug61115-1.patch.txt&revision=1333409053 [2012-03-29 23:35:17] sh...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. Please, update, it should be fixed: http://git.php.net/?p=php- src.git;a=blobdiff;f=ext/standard/tests/streams/bug61115- 1.phpt;h=573496edf0e2dbf0a77dc771f77c815098002a6f;hp=43c54b497423cfb7c21b0a2a4e8b 5e769d41956e;hb=e1352b04165142c945d1fc98c0bcd0b85c3f659d;hpb=55b1e612421c52ea0bb8 a3772095c5bbd62045db [2012-03-29 22:45:01] mattfic...@php.net Description: Looks like this is a test bug, with the fatal error message text being slightly different than expected. Might have to fork test into Windows and non-Windows tests. Test Diff 001+ Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 2147483647 bytes) in C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php on line 5 001- Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to allocate %d bytes) in %s on line %d Test script: --- see ext/standard/tests/streams/bug61115-1.phpt Expected result: Pass -- Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to allocate %d bytes) in %s on line %d Actual result: -- Fail -- Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 2147483647 bytes) in C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php on line 5 -- Edit this bug report at https://bugs.php.net/bug.php?id=61559&edit=1
Bug #61559 [PATCH]: Test Bug - ext/standard/tests/streams/bug61115-1
Edit report at https://bugs.php.net/bug.php?id=61559&edit=1 ID: 61559 Patch added by: mattfic...@php.net Reported by:mattfic...@php.net Summary:Test Bug - ext/standard/tests/streams/bug61115-1 Status: Closed Type: Bug Package:Testing related Operating System: Windows PHP Version:5.4.0 Assigned To:shein Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: bug61115-1.patch.txt Revision: 1333409053 URL: https://bugs.php.net/patch-display.php?bug=61559&patch=bug61115-1.patch.txt&revision=1333409053 Previous Comments: [2012-03-29 23:35:17] sh...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. Please, update, it should be fixed: http://git.php.net/?p=php- src.git;a=blobdiff;f=ext/standard/tests/streams/bug61115- 1.phpt;h=573496edf0e2dbf0a77dc771f77c815098002a6f;hp=43c54b497423cfb7c21b0a2a4e8b 5e769d41956e;hb=e1352b04165142c945d1fc98c0bcd0b85c3f659d;hpb=55b1e612421c52ea0bb8 a3772095c5bbd62045db [2012-03-29 22:45:01] mattfic...@php.net Description: Looks like this is a test bug, with the fatal error message text being slightly different than expected. Might have to fork test into Windows and non-Windows tests. Test Diff 001+ Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 2147483647 bytes) in C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php on line 5 001- Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to allocate %d bytes) in %s on line %d Test script: --- see ext/standard/tests/streams/bug61115-1.phpt Expected result: Pass -- Fatal error: Allowed memory size of %d bytes exhausted at %s:%d (tried to allocate %d bytes) in %s on line %d Actual result: -- Fail -- Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 2147483647 bytes) in C:\php-sdk\0cf70b1\php-test-pack-5.4.1RC1-dev\ext\standard\tests\streams\bug61115-1.php on line 5 -- Edit this bug report at https://bugs.php.net/bug.php?id=61559&edit=1
[PHP-BUG] Bug #61605 [NEW]: header_remove() does not remove all headers
From: Operating system: PHP version: 5.4.0 Package: HTTP related Bug Type: Bug Bug description:header_remove() does not remove all headers Description: header_remove($name) removes only one header $name. The function header() behaves the same way and replaces only first header. Test script: --- header('A: first'); header('A: second', FALSE); // append // removes only 'A: first' and header 'A: second' is sent header_remove('A'); Expected result: no 'A' header is sent Actual result: -- header A: second is sent -- Edit bug report at https://bugs.php.net/bug.php?id=61605&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=61605&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=61605&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=61605&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=61605&r=fixed Fixed in SVN and need be documented: https://bugs.php.net/fix.php?id=61605&r=needdocs Fixed in release: https://bugs.php.net/fix.php?id=61605&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=61605&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=61605&r=needscript Try newer version: https://bugs.php.net/fix.php?id=61605&r=oldversion Not developer issue: https://bugs.php.net/fix.php?id=61605&r=support Expected behavior: https://bugs.php.net/fix.php?id=61605&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=61605&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=61605&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=61605&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=61605&r=php4 Daylight Savings:https://bugs.php.net/fix.php?id=61605&r=dst IIS Stability: https://bugs.php.net/fix.php?id=61605&r=isapi Install GNU Sed: https://bugs.php.net/fix.php?id=61605&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=61605&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=61605&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=61605&r=mysqlcfg
Bug #61518 [Com]: skip on windows - ext/standard/tests/streams/bug60106.phpt
Edit report at https://bugs.php.net/bug.php?id=61518&edit=1 ID: 61518 Comment by: mattfic...@php.net Reported by:mattfic...@php.net Summary:skip on windows - ext/standard/tests/streams/bug60106.phpt Status: Closed Type: Bug Package:Testing related Operating System: Windows PHP Version:5.3.10 Assigned To:ab Block user comment: N Private report: N New Comment: For me, patch skips this test on Windows (which its supposed to). However, on Linux, with PHP5.3.11rc1, the test fails (with or without the patch) because the socket name printed in the warning messages doesn't have 4096 'a' characters like the test expects. Previous Comments: [2012-03-29 04:23:43] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=da85d5b4a00943a267db910299bdaee04c081c25 Log: Fix bug #61518 skip on windows, fix on linux - ext/standard/tests/streams/bug60106.phpt [2012-03-27 17:30:50] a...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. [2012-03-27 17:26:06] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=da85d5b4a00943a267db910299bdaee04c081c25 Log: Fix bug #61518 skip on windows, fix on linux - ext/standard/tests/streams/bug60106.phpt [2012-03-27 08:58:09] a...@php.net extended the patch for the test to pass on linux - fixed a's count [2012-03-27 08:56:08] a...@php.net The following patch has been added/updated: Patch Name: bug60106.diff Revision: 1332838568 URL: https://bugs.php.net/patch-display.php?bug=61518&patch=bug60106.diff&revision=1332838568 The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=61518 -- Edit this bug report at https://bugs.php.net/bug.php?id=61518&edit=1
Bug #61460 [Com]: popen_close_error-win32 expected output is wrong
Edit report at https://bugs.php.net/bug.php?id=61460&edit=1 ID: 61460 Comment by: mattfic...@php.net Reported by:mattfic...@php.net Summary:popen_close_error-win32 expected output is wrong Status: Open Type: Bug Package:Testing related Operating System: Windows PHP Version:5.3.10 Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-20 22:56:43] mattfic...@php.net This patch fixes it: 20c20 < echo "*** Testing for error conditions ***\n"; --- > echo "*** Testing for error conditions ***".PHP_EOL; 22a23 > 23a25 > 29c31 < echo "\n--- Done ---"; --- > echo PHP_EOL.PHP_EOL."--- Done ---"; 44,46c46,48 < resource(%d) of type (stream) < 'abc.txt' is not recognized as an internal or external command, < operable program or batch file. --- > > Warning: popen(abc.txt,rw): Invalid argument in %s on line %d > bool(false) 57c59,61 < --- Done --- --- > > --- Done ---'abc.txt' is not recognized as an internal or external command, > operable program or batch file. [2012-03-20 22:54:08] mattfic...@php.net Description: Warning messages have changed since test written. Expected output is incorrect. See patch. Expected result: test pass Actual result: -- test fail -- Edit this bug report at https://bugs.php.net/bug.php?id=61460&edit=1
Bug #61401 [Com]: ext\openssl\tests\004.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61401&edit=1 ID: 61401 Comment by: mattfic...@php.net Reported by:a...@php.net Summary:ext\openssl\tests\004.phpt fails Status: Closed Type: Bug Package:OpenSSL related Operating System: windows PHP Version:Irrelevant Assigned To:ab Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-29 04:23:35] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=bff8152565375c863f67833b73e2629c4d50cf63 Log: Fix bug #61401 ext\openssl\tests\004.phpt fails [2012-03-28 15:39:53] a...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. [2012-03-28 15:34:18] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=bff8152565375c863f67833b73e2629c4d50cf63 Log: Fix bug #61401 ext\openssl\tests\004.phpt fails [2012-03-15 18:36:48] a...@php.net The patches set the appropriate config option, which overrides the wrong global valie. [2012-03-15 18:24:19] a...@php.net The following patch has been added/updated: Patch Name: php53_004.patch Revision: 1331835859 URL: https://bugs.php.net/patch-display.php?bug=61401&patch=php53_004.patch&revision=1331835859 The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=61401 -- Edit this bug report at https://bugs.php.net/bug.php?id=61401&edit=1
Bug #61517 [Com]: random test failure - ext/standard/tests/misc/time_sleep_until_basic.phpt
Edit report at https://bugs.php.net/bug.php?id=61517&edit=1 ID: 61517 Comment by: mattfic...@php.net Reported by:mattfic...@php.net Summary:random test failure - ext/standard/tests/misc/time_sleep_until_basic.phpt Status: Open Type: Bug Package:Testing related Operating System: Windows PHP Version:5.3.10 Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-26 16:55:24] mattfic...@php.net Description: on windows, time_sleep_until() has millisecond accuracy while microtime() is accurate to 10th of a second. this means there can be up to a .9 millisecond difference which will fail this test. Expected result: pass Actual result: -- randomly fails -- Edit this bug report at https://bugs.php.net/bug.php?id=61517&edit=1
Bug #61480 [Com]: test bug - ext/gd/tests/bug48555.phpt
Edit report at https://bugs.php.net/bug.php?id=61480&edit=1 ID: 61480 Comment by: mattfic...@php.net Reported by:mattfic...@php.net Summary:test bug - ext/gd/tests/bug48555.phpt Status: Open Type: Bug Package:Testing related PHP Version:5.3.10 Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-27 12:42:58] a...@php.net Things are more complicated on linux, that's what the tests give: FreeType Version => 2.3.11 Current: 001+ Top without line-break: -15 002+ Top with line-break: -15 001- Top without line-break: -14 002- Top with line-break: -14 With patch: skip FreeType Version => 2.4.9 Current pass With patch: 001+ Top without line-break: -14 002+ Top with line-break: -14 001- Top without line-break: -15 002- Top with line-break: -15 [2012-03-22 21:07:27] mattfic...@php.net The following patch has been added/updated: Patch Name: bug48555 Revision: 1332450447 URL: https://bugs.php.net/patch-display.php?bug=61480&patch=bug48555&revision=1332450447 [2012-03-22 21:07:19] mattfic...@php.net Description: Expected result: tests pass Actual result: -- tests fail 001+ Top without line-break: -15 002+ Top with line-break: -15 001- Top without line-break: -14 002- Top with line-break: -14 Failure occurs with FreeType 2.4.3 which is what PHP uses. Test patch will skip test if FreeType version is less than 2.4.3. -- Edit this bug report at https://bugs.php.net/bug.php?id=61480&edit=1
Bug #61481 [Com]: Test Bug - ext/com_dotnet/tests/bug49192
Edit report at https://bugs.php.net/bug.php?id=61481&edit=1 ID: 61481 Comment by: mattfic...@php.net Reported by:mattfic...@php.net Summary:Test Bug - ext/com_dotnet/tests/bug49192 Status: Open Type: Bug Package:Testing related Operating System: Windows PHP Version:5.3.10 Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-22 21:13:51] mattfic...@php.net The following patch has been added/updated: Patch Name: bug49192 Revision: 1332450831 URL: https://bugs.php.net/patch-display.php?bug=61481&patch=bug49192&revision=1332450831 [2012-03-22 21:13:29] mattfic...@php.net Description: Expected result: test pass Actual result: -- test fail 001+ Fatal error: Uncaught exception 'com_exception' with message 'Failed to create COM object `ADODB.Connection': The specified module could not be found. 001- int(0) 002+ ' in C:\php-sdk\php-5.3-src-r324324\ext\com_dotnet\tests\bug49192.php:15 003+ Stack trace: 004+ #0 C:\php-sdk\php-5.3-src-r324324\ext\com_dotnet\tests\bug49192.php(15): com->com('ADODB.Connectio...') 005+ #1 {main} 006+ thrown in C:\php-sdk\php-5.3-src-r324324\ext\com_dotnet\tests\bug49192.php on line 15 This test fails to load ADO (using COM). The patch marks it as XFAIL and provides this info. A change in windows longhorn x64(affecting vista, 7, 8, 2008, 2008r2) broke ADO. There is a fix available, but user has to install it. Given that ADO was deprecated a long time ago in favor of newer APIs, I don't think its worth the trouble of making the user install the fix to get an accurate test run. its better to just not run the test or expect it to fail. see: http://support.microsoft.com/kb/2517589 see: http://www.infoq.com/news/2011/10/ADO-Win7 -- Edit this bug report at https://bugs.php.net/bug.php?id=61481&edit=1
Bug #61454 [Com]: ext\standard\tests\general_functions\bug49847.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61454&edit=1 ID: 61454 Comment by: mattfic...@php.net Reported by:a...@php.net Summary:ext\standard\tests\general_functions\bug49847.phpt fails Status: Assigned Type: Bug Package:*General Issues Operating System: windows PHP Version:Irrelevant Assigned To:mattficken Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-20 23:04:38] mattfic...@php.net This patch fixes the bug for me on 5_3-r324324 [2012-03-20 13:49:11] a...@php.net The following patch has been added/updated: Patch Name: bug49847.diff Revision: 1332251351 URL: https://bugs.php.net/patch-display.php?bug=61454&patch=bug49847.diff&revision=1332251351 [2012-03-20 13:48:31] a...@php.net Description: The test fails with the following diff out: 001+ 'more' is not recognized as an internal or external command, 002+ operable program or batch file. 003+ array(0) { 001- array(1) { 002- [0]=> 003- string(4098) "%s 1" The patch supplied fixes the issue exchanging "more" with "type" Expected result: test pass Actual result: -- test fail -- Edit this bug report at https://bugs.php.net/bug.php?id=61454&edit=1
Bug #61519 [Com]: test fails, should pass - ext/zlib/tests/bug60761.phpt
Edit report at https://bugs.php.net/bug.php?id=61519&edit=1 ID: 61519 Comment by: mattfic...@php.net Reported by:mattfic...@php.net Summary:test fails, should pass - ext/zlib/tests/bug60761.phpt Status: Closed Type: Bug Package:Testing related Operating System: Windows PHP Version:5.3.10 Assigned To:ab Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-29 04:23:45] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=bcfcfb2fc5f358ebfdc76a773b20b3fc056b20c0 Log: Fix bug #61519 test fails, should pass - ext/zlib/tests/bug60761.phpt [2012-03-27 16:38:11] a...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. [2012-03-27 16:26:34] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=bcfcfb2fc5f358ebfdc76a773b20b3fc056b20c0 Log: Fix bug #61519 test fails, should pass - ext/zlib/tests/bug60761.phpt [2012-03-26 17:02:46] mattfic...@php.net Description: This test fails and should pass. It should be checking for bug #60761 or similar. The patch fixes it. Expected result: pass Actual result: -- fail -- Edit this bug report at https://bugs.php.net/bug.php?id=61519&edit=1
Bug #61459 [Com]: popen_close_basic-win32 can't run sort.exe
Edit report at https://bugs.php.net/bug.php?id=61459&edit=1 ID: 61459 Comment by: mattfic...@php.net Reported by:ITALOLINS59 at HOTMAIL dot COM Summary:popen_close_basic-win32 can't run sort.exe Status: Closed Type: Bug Package:Testing related Operating System: Windows PHP Version:5.3.10 Assigned To:ab Block user comment: Y Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-29 04:23:34] point@php-dev-dell.(none)@php.net Automatic comment on behalf of point@php-dev-dell.(none) Revision: http://git.php.net/?p=php-src.git;a=commit;h=eeab3be3037e2c537393f630b496017c9f888736 Log: Fix bug #61459 popen_close_basic-win32 can't run sort.exe [2012-03-28 17:56:49] a...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. [2012-03-28 17:54:49] point@php-dev-dell.(none)@php.net Automatic comment on behalf of point@php-dev-dell.(none) Revision: http://git.php.net/?p=php-src.git;a=commit;h=eeab3be3037e2c537393f630b496017c9f888736 Log: Fix bug #61459 popen_close_basic-win32 can't run sort.exe [2012-03-21 05:40:41] paj...@php.net Hi, Please add a SKIPIF section testing if sort.exe exists in this path. Thanks! [2012-03-20 22:51:43] mattfic...@php.net The following patch has been added/updated: Patch Name: popen_close_error-win32 Revision: 1332283902 URL: https://bugs.php.net/patch-display.php?bug=61459&patch=popen_close_error-win32&revision=1332283902 The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=61459 -- Edit this bug report at https://bugs.php.net/bug.php?id=61459&edit=1
Bug #61468 [Com]: ext/phar/tests/phar_oo_005.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61468&edit=1 ID: 61468 Comment by: mattfic...@php.net Reported by:a...@php.net Summary:ext/phar/tests/phar_oo_005.phpt fails Status: Closed Type: Bug Package:PHAR related Operating System: all PHP Version:Irrelevant Assigned To:ab Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-29 04:23:40] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=0b20329aaf4228e071ab03f4e96adeafa6c48f52 Log: Fix bug #61468 ext/phar/tests/phar_oo_005.phpt fails [2012-03-28 11:23:11] a...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. [2012-03-28 11:21:43] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=0b20329aaf4228e071ab03f4e96adeafa6c48f52 Log: Fix bug #61468 ext/phar/tests/phar_oo_005.phpt fails [2012-03-22 20:31:44] mattfic...@php.net With the patch, the test passes for me on Windows 7 sp1x64 with PHP_5_3-r324324 [2012-03-21 20:27:25] a...@php.net In the patch phar_oo_005.phpt.diff the output is adopted according to the new iterator functionality. The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=61468 -- Edit this bug report at https://bugs.php.net/bug.php?id=61468&edit=1
Bug #61404 [Com]: ext\openssl\tests\021.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61404&edit=1 ID: 61404 Comment by: mattfic...@php.net Reported by:a...@php.net Summary:ext\openssl\tests\021.phpt fails Status: Closed Type: Bug Package:OpenSSL related Operating System: windows PHP Version:Irrelevant Assigned To:ab Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-29 04:23:37] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=bd7bb973b1f4791f000a890b1c1387fcd28c65ee Log: Fix bug #61404 ext\openssl\tests\021.phpt fails [2012-03-29 04:23:36] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=4c5b427124a2af3d951fed869cc86452e8b6290c Log: Fix bug #61404 ext\openssl\tests\021.phpt fails [2012-03-28 15:34:21] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=4c5b427124a2af3d951fed869cc86452e8b6290c Log: Fix bug #61404 ext\openssl\tests\021.phpt fails [2012-03-28 15:34:19] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=bd7bb973b1f4791f000a890b1c1387fcd28c65ee Log: Fix bug #61404 ext\openssl\tests\021.phpt fails [2012-03-28 14:31:46] a...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=61404 -- Edit this bug report at https://bugs.php.net/bug.php?id=61404&edit=1
Bug #61405 [Com]: ext\openssl\tests\022.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61405&edit=1 ID: 61405 Comment by: mattfic...@php.net Reported by:a...@php.net Summary:ext\openssl\tests\022.phpt fails Status: Closed Type: Bug Package:OpenSSL related Operating System: windows PHP Version:Irrelevant Assigned To:ab Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-29 04:23:47] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213 Log: Fix bug #61405 ext\openssl\tests\022.phpt fails [2012-03-27 16:36:22] a...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. [2012-03-27 16:26:36] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213 Log: Fix bug #61405 ext\openssl\tests\022.phpt fails [2012-03-27 16:11:08] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213 Log: Fix bug #61405 ext\openssl\tests\022.phpt fails [2012-03-27 14:40:56] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=b638d3020c79e15c7187f25175a956fb9e3fe213 Log: Fix bug #61405 ext\openssl\tests\022.phpt fails The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=61405 -- Edit this bug report at https://bugs.php.net/bug.php?id=61405&edit=1
Bug #61412 [Com]: ext\openssl\tests\bug28382.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61412&edit=1 ID: 61412 Comment by: mattfic...@php.net Reported by:a...@php.net Summary:ext\openssl\tests\bug28382.phpt fails Status: Closed Type: Bug Package:OpenSSL related Operating System: all PHP Version:Irrelevant Assigned To:ab Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-29 04:23:50] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=7fdd35d697765680050dc8111d2772962698 Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails [2012-03-29 04:23:48] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=e55718b09121c79f3a6b0cfb7c446112fb378402 Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails [2012-03-27 16:26:39] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=7fdd35d697765680050dc8111d2772962698 Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails [2012-03-27 16:26:37] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=e55718b09121c79f3a6b0cfb7c446112fb378402 Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails [2012-03-27 16:11:09] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=e55718b09121c79f3a6b0cfb7c446112fb378402 Log: Fix bug #61412 ext\openssl\tests\bug28382.phpt fails The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=61412 -- Edit this bug report at https://bugs.php.net/bug.php?id=61412&edit=1
Bug #61413 [Com]: ext\openssl\tests\openssl_encrypt_crash.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61413&edit=1 ID: 61413 Comment by: mattfic...@php.net Reported by:a...@php.net Summary:ext\openssl\tests\openssl_encrypt_crash.phpt fails Status: Assigned Type: Bug Package:OpenSSL related Operating System: windows PHP Version:5.3.10 Assigned To:mattficken Block user comment: N Private report: N New Comment: This patch passes on PHP5.3.11rc1 on Windows 7 sp1x64. It does not break for me on Linux x64 (Gentoo and Fedora 16) with PHP5.3.11rc1. Previous Comments: [2012-03-16 11:07:56] a...@php.net fixed initializing i to zero [2012-03-16 11:07:27] a...@php.net The following patch has been added/updated: Patch Name: 61413.diff Revision: 1331896047 URL: https://bugs.php.net/patch-display.php?bug=61413&patch=61413.diff&revision=1331896047 [2012-03-16 10:41:58] a...@php.net Description: The test fails with the message "variable 'i' used without being initialized" Expected result: test pass Actual result: -- test fail, the diff is: 002- string(4) "done" -- Edit this bug report at https://bugs.php.net/bug.php?id=61413&edit=1
[PHP-BUG] Bug #61604 [NEW]: Add Apache 2.4 support
From: Operating system: Win 7 PHP version: 5.4.1RC1 Package: Apache2 related Bug Type: Bug Bug description:Add Apache 2.4 support Description: news.txt says - Fixed bug #61172 (Add Apache 2.4 support). (Chris Jones) but http://windows.php.net/downloads/qa/php-5.4.1RC1-Win32-VC9-x86.zip consits only php5apache2_3.dll There was no version of Apache 2.3. Only 2.2 and 2.4 released. Expected result: php5apache2_4.dll Actual result: -- php5apache2_3.dll -- Edit bug report at https://bugs.php.net/bug.php?id=61604&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=61604&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=61604&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=61604&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=61604&r=fixed Fixed in SVN and need be documented: https://bugs.php.net/fix.php?id=61604&r=needdocs Fixed in release: https://bugs.php.net/fix.php?id=61604&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=61604&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=61604&r=needscript Try newer version: https://bugs.php.net/fix.php?id=61604&r=oldversion Not developer issue: https://bugs.php.net/fix.php?id=61604&r=support Expected behavior: https://bugs.php.net/fix.php?id=61604&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=61604&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=61604&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=61604&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=61604&r=php4 Daylight Savings:https://bugs.php.net/fix.php?id=61604&r=dst IIS Stability: https://bugs.php.net/fix.php?id=61604&r=isapi Install GNU Sed: https://bugs.php.net/fix.php?id=61604&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=61604&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=61604&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=61604&r=mysqlcfg
Req #52504 [Com]: Support relative namespaces
Edit report at https://bugs.php.net/bug.php?id=52504&edit=1 ID: 52504 Comment by: francescrosasbosque at gmail dot com Reported by:robert dot de dot wilde at online dot nl Summary:Support relative namespaces Status: Not a bug Type: Feature/Change Request Package:Class/Object related Operating System: Any PHP Version:5.3.3 Block user comment: N Private report: N New Comment: As I understand it accessing parent namespaces would require the same brain power that it needs to access child namespaces as both of them rely on knowing what's the current namespace. To me it is weird to have one but not the other. Previous Comments: [2012-02-28 10:38:59] johan...@php.net Adding support for the ..\..\Foo\Bar notation quickly requires quite some brain power to read the code, especially in a longer file where the namespace declaration might not be on the same screen. We try to keep PHP code human-readable. Doing the use foo\*; thing is not possible due to PHP's dynamic nature. We do not know which classes there might be (think __autoload) so we'd like to do it but can't. [2012-02-26 10:10:33] tom at tomwardrop dot com I was just about to post the exact same feature suggestion. I'm using PHP 5.4 RC8 after 2 years of programming Ruby (I have a project that better lends itself to PHP template-orientated nature), and this was one of the first things I tried to do, reference a resource one level up in the namespace hierarchy. Luckily, my namespace isn't too deep, but I can imagine some of the larger frameworks which have 3-6+ level deep namespaces could really benefit from this. I'm surprised none of the dev's have commented on this. [2010-08-18 15:44:12] robert dot de dot wilde at online dot nl Any developer can have a look? [2010-07-31 10:54:14] giorgio dot liscio at email dot it very nice, i really like it it would be nice too having * on import works only if __autoload or spl_autoload_register is used, otherwise triggers an error use MyNS\Test\*; // imports all classes in the "Test" namespace use MyNS\Test\**; // imports all the namespace hierarchy (including subpackages) from namespace Test __autoload($className, $importAll = FALSE, $importDeep = FALSE) { // handle * as a full dir import // ** imports subdirs too } in my framework i need to put use \FW\String; use \FW\Int; use \FW\Float; use \FW\Vector; use \FW\Dictionary; use \FW\Types; etc in every file... [2010-07-31 09:58:03] robert dot de dot wilde at online dot nl Description: It would be nice to have relative namespace support to keep code clean and flexible. When inside of a namespace, it would be nice to have some directory-path-like option like '..'. Test script: --- namespace MyNs\Some\Path\Going\A\Long\Way { class GoClass extends ..\..\Short\Way\GoClass // << {} } -- Edit this bug report at https://bugs.php.net/bug.php?id=52504&edit=1
Req #61421 [Com]: Missing SHA256,SHA512 families of signature algorithms
Edit report at https://bugs.php.net/bug.php?id=61421&edit=1 ID: 61421 Comment by: mark at zedwood dot com Reported by:mark at zedwood dot com Summary:Missing SHA256,SHA512 families of signature algorithms Status: Assigned Type: Feature/Change Request Package:OpenSSL related Operating System: Ubuntu Linux PHP Version:5.4.0 Assigned To:pajoye Block user comment: N Private report: N New Comment: added openssl version check, added new patch with .phpt test Previous Comments: [2012-04-02 09:36:07] paj...@php.net hi, Thanks for the patch, I will apply it asap but it won't make it for the next releases of 5.3 or 5.4 as we are already in release phases. Btw, can you add some tests too please? About the patch, yes, please use the openssl version check instead. As what is done now won't work smoothly with older versions. As of getting a svn account (asked per email but adding answer here too), we usually give one after that one has provided a couple of patches :) Thanks for your work! [2012-04-02 09:21:11] der...@php.net Mark, yes, you probably should. It will also help a lot if you include test cases for the new functionality. Make sure those tests also run with older versions of openssl though! cheers, Derick [2012-03-31 04:00:54] mark at zedwood dot com should i submit a new patch with #if OPENSSL_VERSION_NUMBER >= 0x0090708fL instead of #ifndef OPENSSL_NO_SHA256 ? [2012-03-16 21:10:49] zedwoodnoreply at gmail dot com to generate a sample csr with sha256 sig use: openssl req -new -sha256-newkey rsa:2048 -nodes -out example_com_sha256.csr -keyout example_com_sha256.key-subj "/C=US/ST=/L=/O=/CN=example.com" to parse the csr with openssl (command line) use: openssl req -in example_com_sha256.csr-noout -text sample output: Certificate Request: Data: Version: 0 (0x0) Subject: C=US, CN=example.com Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:a7:7a:17:c4:17:72:8e:5b:36:36:05:8f:57:10: a5:b9:f2:4b:05:9e:88:62:bc:8b:a5:ad:c3:6a:41: b5:31:25:cc:86:7c:99:6b:f4:7f:74:a1:01:93:95: b9:3e:b7:dc:b4:b4:59:3c:ff:22:8c:d5:87:75:44: 93:9c:19:de:08:42:b2:fd:88:eb:71:6b:8b:21:4a: 06:66:9c:6d:2b:10:bb:f5:e8:7c:a2:3a:ae:51:86: 51:3a:d1:96:02:93:f1:de:3a:68:06:6d:36:20:41: b4:09:d8:ed:74:5e:ff:ae:ba:26:84:ac:4d:6a:30: 6a:b4:01:ec:3a:a0:f9:5c:08:5c:6c:5e:1f:f2:11: 2c:11:a1:3d:44:17:79:33:0a:97:a0:4e:b8:c3:81: e4:58:d7:10:b3:50:43:af:9e:4b:b9:05:e7:5d:da: 78:b1:85:c4:36:a7:d5:b2:82:7a:1a:ab:4c:6c:98: a1:b5:6c:1a:99:04:18:2b:8d:80:2f:11:23:1d:41: 53:7a:15:39:2b:84:23:bf:2d:b0:32:5a:7d:0d:d0: 3f:ac:d3:66:9c:9f:a2:df:40:4b:0d:9c:98:e4:64: 44:b7:58:1d:54:75:07:47:b9:03:e5:57:10:d3:1a: ac:85:c6:f1:19:1c:df:a6:33:12:25:0b:ee:9a:fb: 72:93 Exponent: 65537 (0x10001) Attributes: a0:00 Signature Algorithm: sha256WithRSAEncryption 48:ac:2e:08:93:95:ec:c3:12:ab:88:33:1f:7f:37:c3:5a:9b: 6a:9a:b3:ea:35:ca:f0:1d:40:47:f0:31:8f:f3:36:b4:3d:5d: ee:74:48:fe:1b:43:4b:78:d7:97:d5:d5:77:8f:ba:51:db:35: 75:c4:89:dc:b6:49:86:4e:4c:42:e7:01:e3:cb:72:da:9b:94: d1:ed:b7:59:be:f6:eb:44:68:54:e5:10:0c:bf:7a:9f:48:18: 86:f2:f2:84:ca:a1:3b:48:be:d1:4a:40:22:12:7b:c0:42:a5: a0:ce:0f:43:17:44:e2:cf:e8:27:1d:71:d5:92:d8:de:bd:82: c2:11:f2:73:8c:c3:ab:5e:a1:64:78:af:a6:10:19:b1:ed:b2: fb:4c:bb:66:20:fe:1a:34:af:43:9f:4d:4e:6d:a2:f0:d0:df: 33:93:e5:a7:d5:dc:2f:47:e3:56:31:fd:50:d2:2e:83:2f:d2: b2:fb:a8:7d:ce:4a:1f:a1:14:fc:45:92:ca:1c:85:3a:e7:32: e4:a8:13:fe:54:9a:ee:25:02:26:d3:b5:e1:96:08:f3:c8:36: 59:ef:f5:46:1c:62:e6:58:ea:d4:86:a8:3f:ed:92:77:d7:eb: d3:92:a1:91:8e:2c:1c:4e:c2:12:b0:c9:8b:3b:17:99:32:03: e3:9e:a5:dd [2012-03-16 19:35:04] mark at zedwood dot com Description: openssl_verify() takes as a parameter a signature algorithm. The current list of values is here http://us3.php.net/manual/en/openssl.signature-algos.php The SHA256 and SHA512 families algorithms have been s
Bug #61567 [Opn->Csd]: Fileinfo ext\fileinfo\tests\mime_content_type_002.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61567&edit=1 ID: 61567 Updated by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\mime_content_type_002.phpt fails -Status: Open +Status: Closed Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:Irrelevant -Assigned To: +Assigned To:ab Block user comment: N Private report: N New Comment: This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. Previous Comments: [2012-04-02 18:04:24] a...@php.net see https://bugs.php.net/bug.php?id=61566 for the fixes for this ticket [2012-03-30 15:14:22] a...@php.net Description: Test diff: 001+ 001- string(%d) "%s" 002- string(%d) "%s" 003- string(9) "directory" 004- string(9) "directory" Expected result: test pass Actual result: -- test fail -- Edit this bug report at https://bugs.php.net/bug.php?id=61567&edit=1
Bug #61567 [Com]: Fileinfo ext\fileinfo\tests\mime_content_type_002.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61567&edit=1 ID: 61567 Comment by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\mime_content_type_002.phpt fails Status: Open Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:Irrelevant Block user comment: N Private report: N New Comment: see https://bugs.php.net/bug.php?id=61566 for the fixes for this ticket Previous Comments: [2012-03-30 15:14:22] a...@php.net Description: Test diff: 001+ 001- string(%d) "%s" 002- string(%d) "%s" 003- string(9) "directory" 004- string(9) "directory" Expected result: test pass Actual result: -- test fail -- Edit this bug report at https://bugs.php.net/bug.php?id=61567&edit=1
Req #61379 [Com]: Set _SERVER['HTTPS'] to on for SPDY connections
Edit report at https://bugs.php.net/bug.php?id=61379&edit=1 ID: 61379 Comment by: mdsteele at google dot com Reported by:rickard at 0x539 dot se Summary:Set _SERVER['HTTPS'] to on for SPDY connections Status: Not a bug Type: Feature/Change Request Package:Apache2 related Operating System: Linux 2.6 PHP Version:5.3.10 Block user comment: N Private report: N New Comment: Yes, this was an issue with mod_spdy that has just been fixed; see http://code.google.com/p/mod-spdy/issues/detail?id=32 Previous Comments: [2012-03-14 01:18:44] ahar...@php.net It's going to be up to mod_spdy to set the relevant environment variable(s) in Apache. [2012-03-13 21:55:11] rickard at 0x539 dot se Description: When playing around with the mod_spdy Apache module it seems that the HTTPS key in the _SERVER variable is set to off. I'm not sure if this is the job for PHP or SPDY but I thought I'd start here. Test script: --- http://code.google.com/p/mod-spdy/wiki/GettingStarted Connect to the server and dump _SERVER */ var_dump($_SERVER); Expected result: ["HTTPS"]=> string(3) "On" Actual result: -- array(40) { ["REDIRECT_SPDY_VERSION"]=> string(1) "2" ["SPDY_VERSION"]=> string(1) "2" .. ["SERVER_PORT"]=> string(3) "443" .. ["HTTPS"]=> string(3) "Off" } -- Edit this bug report at https://bugs.php.net/bug.php?id=61379&edit=1
Bug #61565 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61565&edit=1 ID: 61565 Comment by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails Status: Open Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:Irrelevant Block user comment: N Private report: N New Comment: The patch is commited in the revision 0cdba53aae783fd63f0aa525bc92e73d9e4c0aab Previous Comments: [2012-04-02 15:48:16] a...@php.net Automatic comment on behalf of ab Revision: http://git.php.net/?p=php-src.git;a=commit;h=0cdba53aae783fd63f0aa525bc92e73d9e4c0aab Log: Fix bug #61565 Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails [2012-04-02 15:15:35] a...@php.net The patch fixes php_stream_open_wrapper_ex trying to open a directory descriptor under windows. [2012-03-31 10:04:32] a...@php.net The following patch has been added/updated: Patch Name: 61565.diff Revision: 1333188272 URL: https://bugs.php.net/patch-display.php?bug=61565&patch=61565.diff&revision=1333188272 [2012-03-30 15:09:43] a...@php.net Description: Test diff: 009+ 010+ Warning: finfo_file(.): failed to open stream: Permission denied in C:\php-sdk\php53\vc9\x86\php-src\ext\fileinfo\tests\finfo_file_001.php on line 7 011+ bool(false) 009- string(9) "directory" Expected result: test pass Actual result: -- test fail -- Edit this bug report at https://bugs.php.net/bug.php?id=61565&edit=1
Bug #61566 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1 ID: 61566 Comment by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails Status: Open Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:Irrelevant Block user comment: N Private report: N New Comment: The patch was commited in revisions: 8684fb7facd8f5c1589996c1ebfd782f77c245ff 909713e233704b4ac317ff3bb397cb40a82795b8 Previous Comments: [2012-04-02 15:11:29] a...@php.net The final patch fixes the failure caused by the posix lseek and read versions under windows in cdf_read() . Additionally all the occurences of lseek and read was replaced by _lseek and _reed for windows. [2012-04-02 15:07:31] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 179251 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=179251 [2012-04-02 12:58:03] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 171483 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483 [2012-03-31 10:02:49] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 1333188169 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169 [2012-03-30 15:11:21] a...@php.net Description: Test diff: 001+ 001- array(6) { 002- ["%s/resources/dir.zip"]=> 003- string(15) "application/zip" 004- ["%s/resources/test.bmp"]=> 005- string(14) "image/x-ms-bmp" 006- ["%s/resources/test.gif"]=> 007- string(9) "image/gif" 008- ["%s/resources/test.jpg"]=> 009- string(10) "image/jpeg" 010- ["%s/resources/test.pdf"]=> 011- string(15) "application/pdf" 012- ["%s/resources/test.png"]=> 013- string(9) "image/png" 014- } Expected result: test pass Actual result: -- test fails -- Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1
Bug #61565 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61565&edit=1 ID: 61565 Comment by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\finfo_file_001.phpt fails Status: Open Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:Irrelevant Block user comment: N Private report: N New Comment: The patch fixes php_stream_open_wrapper_ex trying to open a directory descriptor under windows. Previous Comments: [2012-03-31 10:04:32] a...@php.net The following patch has been added/updated: Patch Name: 61565.diff Revision: 1333188272 URL: https://bugs.php.net/patch-display.php?bug=61565&patch=61565.diff&revision=1333188272 [2012-03-30 15:09:43] a...@php.net Description: Test diff: 009+ 010+ Warning: finfo_file(.): failed to open stream: Permission denied in C:\php-sdk\php53\vc9\x86\php-src\ext\fileinfo\tests\finfo_file_001.php on line 7 011+ bool(false) 009- string(9) "directory" Expected result: test pass Actual result: -- test fail -- Edit this bug report at https://bugs.php.net/bug.php?id=61565&edit=1
Bug #61566 [Com]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1 ID: 61566 Comment by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails Status: Open Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:Irrelevant Block user comment: N Private report: N New Comment: The final patch fixes the failure caused by the posix lseek and read versions under windows in cdf_read() . Additionally all the occurences of lseek and read was replaced by _lseek and _reed for windows. Previous Comments: [2012-04-02 15:07:31] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 179251 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=179251 [2012-04-02 12:58:03] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 171483 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483 [2012-03-31 10:02:49] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 1333188169 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169 [2012-03-30 15:11:21] a...@php.net Description: Test diff: 001+ 001- array(6) { 002- ["%s/resources/dir.zip"]=> 003- string(15) "application/zip" 004- ["%s/resources/test.bmp"]=> 005- string(14) "image/x-ms-bmp" 006- ["%s/resources/test.gif"]=> 007- string(9) "image/gif" 008- ["%s/resources/test.jpg"]=> 009- string(10) "image/jpeg" 010- ["%s/resources/test.pdf"]=> 011- string(15) "application/pdf" 012- ["%s/resources/test.png"]=> 013- string(9) "image/png" 014- } Expected result: test pass Actual result: -- test fails -- Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1
Bug #61566 [PATCH]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1 ID: 61566 Patch added by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails Status: Open Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:Irrelevant Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: 61566.diff Revision: 179251 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=179251 Previous Comments: [2012-04-02 12:58:03] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 171483 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483 [2012-03-31 10:02:49] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 1333188169 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169 [2012-03-30 15:11:21] a...@php.net Description: Test diff: 001+ 001- array(6) { 002- ["%s/resources/dir.zip"]=> 003- string(15) "application/zip" 004- ["%s/resources/test.bmp"]=> 005- string(14) "image/x-ms-bmp" 006- ["%s/resources/test.gif"]=> 007- string(9) "image/gif" 008- ["%s/resources/test.jpg"]=> 009- string(10) "image/jpeg" 010- ["%s/resources/test.pdf"]=> 011- string(15) "application/pdf" 012- ["%s/resources/test.png"]=> 013- string(9) "image/png" 014- } Expected result: test pass Actual result: -- test fails -- Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1
Req #61602 [Opn]: Allow access to name of constant used as default value
Edit report at https://bugs.php.net/bug.php?id=61602&edit=1 ID: 61602 Updated by: der...@php.net Reported by:sebast...@php.net Summary:Allow access to name of constant used as default value Status: Open Type: Feature/Change Request Package:Reflection related Operating System: Irrelevant PHP Version:5.4Git-2012-04-02 (Git) Block user comment: N Private report: N New Comment: It's definitely possible, I've just added something like this to VLD: https://github.com/derickr/vld/commit/f22862bfa8620780906f0e692f929a543264b5f8 Previous Comments: [2012-04-02 14:14:16] sebast...@php.net Description: When a constant is used for the default value of an optional parameter, the Reflection API (tries to) resolve(s) the constant to its value and then returns it as the default value. In addition, I would like to have two additional methods in ReflectionParameter that expose 1) whether or not a default value "is a" constant and 2) the name of the constant. In the example below, I am using temporary names ("defaultValueIsConstant" and "getDefaultValueConstantName") for these two methods because I cannot think of sensible method names right now. Test script: --- getParameters(); foreach ($p as $_p) { var_dump($_p->getDefaultValue()); if ($_p->defaultValueIsConstant()) { var_dump($_p->getDefaultValueConstantName()); } } Expected result: string(3) "..." string(9) "self::bar" Actual result: -- string(3) "..." -- Edit this bug report at https://bugs.php.net/bug.php?id=61602&edit=1
[PHP-BUG] Req #61602 [NEW]: Allow access to name of constant used as default value
From: sebastian Operating system: Irrelevant PHP version: 5.4Git-2012-04-02 (Git) Package: Reflection related Bug Type: Feature/Change Request Bug description:Allow access to name of constant used as default value Description: When a constant is used for the default value of an optional parameter, the Reflection API (tries to) resolve(s) the constant to its value and then returns it as the default value. In addition, I would like to have two additional methods in ReflectionParameter that expose 1) whether or not a default value "is a" constant and 2) the name of the constant. In the example below, I am using temporary names ("defaultValueIsConstant" and "getDefaultValueConstantName") for these two methods because I cannot think of sensible method names right now. Test script: --- getParameters(); foreach ($p as $_p) { var_dump($_p->getDefaultValue()); if ($_p->defaultValueIsConstant()) { var_dump($_p->getDefaultValueConstantName()); } } Expected result: string(3) "..." string(9) "self::bar" Actual result: -- string(3) "..." -- Edit bug report at https://bugs.php.net/bug.php?id=61602&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=61602&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=61602&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=61602&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=61602&r=fixed Fixed in SVN and need be documented: https://bugs.php.net/fix.php?id=61602&r=needdocs Fixed in release: https://bugs.php.net/fix.php?id=61602&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=61602&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=61602&r=needscript Try newer version: https://bugs.php.net/fix.php?id=61602&r=oldversion Not developer issue: https://bugs.php.net/fix.php?id=61602&r=support Expected behavior: https://bugs.php.net/fix.php?id=61602&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=61602&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=61602&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=61602&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=61602&r=php4 Daylight Savings:https://bugs.php.net/fix.php?id=61602&r=dst IIS Stability: https://bugs.php.net/fix.php?id=61602&r=isapi Install GNU Sed: https://bugs.php.net/fix.php?id=61602&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=61602&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=61602&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=61602&r=mysqlcfg
Bug #60052 [Com]: Integer returned as a 64bit integer on X64_86
Edit report at https://bugs.php.net/bug.php?id=60052&edit=1 ID: 60052 Comment by: mar...@php.net Reported by:m dot vanduren at jonker dot nl Summary:Integer returned as a 64bit integer on X64_86 Status: Assigned Type: Bug Package:PDO related Operating System: All (linux tested) PHP Version:5.3.8 Assigned To:mariuz Block user comment: N Private report: N New Comment: LL_MASK it should be already be "l" see the php_pdo_firebird_int.h:# define LL_MASK "l" So in the in the slprintf slprintf(*ptr, CHAR_BUF_LEN, "%" LL_MASK "d", *(ISC_INT64*)var->sqldata); should be replaced with slprintf(*ptr, CHAR_BUF_LEN, "%" "l" "d", *(ISC_INT64*)var->sqldata); I will check and create a test for 5.3.x Previous Comments: [2011-10-13 13:01:36] m dot vanduren at jonker dot nl Description: Integer on firebird is treated as a 32 bit int and int64 is used as a 64 bit integer. In the pdo_firebird driver INT64 is not implemented and LONG (int32) is treated as a long integer. On an x86_64 machine this means that a SQL_LONG doesn't honor the bit-sign in a value and INT64 doesn't return anything. This patch should fix this value for x86_64 systems while leaving x86 systems unchanged. Test script: --- any firebirdSQL database with a integer field containing a negative value. retrieve the value with the pdo_firebird driver on a 64 bit machine and echo it to the screen. Expected result: negative values with integer and should be returned as a negative number. Actual result: -- negative values are returned as their unsigned counterpart. -- Edit this bug report at https://bugs.php.net/bug.php?id=60052&edit=1
Bug #61508 [Com]: various crashes after upgrading to 5.3
Edit report at https://bugs.php.net/bug.php?id=61508&edit=1 ID: 61508 Comment by: komanek at natur dot cuni dot cz Reported by:komanek at natur dot cuni dot cz Summary:various crashes after upgrading to 5.3 Status: Open Type: Bug Package:*General Issues Operating System: Debian 5 PHP Version:5.3.10 Block user comment: N Private report: N New Comment: This seems to be a duplicate of https://bugs.php.net/bug.php?id=40479 Previous Comments: [2012-03-26 11:21:34] komanek at natur dot cuni dot cz I should also mention that it is a server with relatively high load and that I do not have these problems on other (much smaller) servers. There should be a problem related to the load, OS or PHP itself. I also upgraded Apache to 2.2.22 which didn't resolve the issue. [2012-03-26 11:17:37] komanek at natur dot cuni dot cz Description: After upgrading from 5.2.17 na 5.3.10 there are rare crashes and segfaults: [Mon Mar 26 10:03:39 2012] [notice] child pid 22804 exit signal Segmentation fault (11), possible coredump in /usr/local/var/apache_cores [Mon Mar 26 10:05:06 2012] [notice] child pid 26428 exit signal Segmentation fault (11), possible coredump in /usr/local/var/apache_cores [Mon Mar 26 11:32:01 2012] [notice] child pid 1083 exit signal Bus error (7), possible coredump in /usr/local/var/apache_cores [Mon Mar 26 12:13:17 2012] [notice] child pid 26574 exit signal Segmentation fault (11), possible coredump in /usr/local/var/apache_cores Some of the stacktraces: #0 0x7fad2a19b67b in zend_vm_set_opcode_handler (op=0x1dca348) at /data/install/php-5.3.10/Zend/zend_vm_execute.h:34020 #1 0x7fad2a16df7e in pass_two (op_array=0x1dc6d00) at /data/install/php- 5.3.10/Zend/zend_opcode.c:412 #2 0x7fad2a161cf1 in zend_do_end_function_declaration (function_token=0x7ad843e0) at /data/install/php- 5.3.10/Zend/zend_compile.c:1447 #3 0x7fad2a1448fe in zendparse () at /data/install/php- 5.3.10/Zend/zend_language_parser.c:4088 #4 0x7fad2a150710 in compile_file (file_handle=0x7ad86240, type=8) at Zend/zend_language_scanner.l:364 #5 0x7fad29ff647a in phar_compile_file (file_handle=0x7ad86240, type=8) at /data/install/php-5.3.10/ext/phar/phar.c:3393 #6 0x7fad2a14fd4f in compile_filename (type=8, filename=0x451ffc0) at Zend/zend_language_scanner.l:407 #7 0x7fad2a1ad384 in ZEND_INCLUDE_OR_EVAL_SPEC_TMP_HANDLER (execute_data=0x451fa18) at /data/install/php-5.3.10/Zend/zend_vm_execute.h:5254 #8 0x7fad2a1a4969 in execute (op_array=0x3fcc538) at /data/install/php- 5.3.10/Zend/zend_vm_execute.h:107 #9 0x7fad2a175ffb in zend_execute_scripts (type=8, retval=0x0, file_count=3) at /data/install/php-5.3.10/Zend/zend.c:1236 #10 0x7fad2a11ee18 in php_execute_script (primary_file=0x7ad88910) at /data/install/php-5.3.10/main/main.c:2308 #11 0x7fad2a2041af in php_handler (r=0x1d53a90) at /data/install/php- 5.3.10/sapi/apache2handler/sapi_apache2.c:669 #12 0x00443f5a in ap_run_handler (r=0x1d53a90) at config.c:158 #13 0x0044747e in ap_invoke_handler (r=0x1d53a90) at config.c:376 #14 0x00465ece in ap_process_request (r=0x1d53a90) at http_request.c:282 #15 0x00462d78 in ap_process_http_connection (c=0x1d3c470) at http_core.c:190 #16 0x0044b45a in ap_run_process_connection (c=0x1d3c470) at connection.c:43 #17 0x0046abd0 in child_main (child_num_arg=) at prefork.c:667 #18 0x0046aea4 in make_child (s=0x11f5fe8, slot=7) at prefork.c:768 #19 0x0046baee in ap_mpm_run (_pconf=, plog=, s=) at prefork.c:903 #20 0x0043063a in main (argc=4, argv=0x7ad88ef8) at main.c:753 #0 zend_hash_find (ht=0x2869c38, arKey=0x2862210 "", nKeyLength=9, pData=0x7fffc2538958) at /data/install/php-5.3.10/Zend/zend_hash.c:884 #1 0x7f553a2f8f74 in zend_isset_isempty_dim_prop_obj_handler_SPEC_VAR_CONST (prop_dim=0, execute_data=0x2aed260) at /data/install/php- 5.3.10/Zend/zend_vm_execute.h:10926 #2 0x7f553a2ff969 in execute (op_array=0x2aac740) at /data/install/php- 5.3.10/Zend/zend_vm_execute.h:107 #3 0x7f553a2d0ffb in zend_execute_scripts (type=8, retval=0x0, file_count=3) at /data/install/php-5.3.10/Zend/zend.c:1236 #4 0x7f553a279e18 in php_execute_script (primary_file=0x7fffc253aea0) at /data/install/php-5.3.10/main/main.c:2308 #5 0x7f553a35f1af in php_handler (r=0x2895878) at /data/install/php- 5.3.10/sapi/apache2handler/sapi_apache2.c:669 #6 0x00443f5a in ap_run_handler (r=0x2895878) at config.c:158 #7 0x0044747e in ap_invoke_handler (r=0x2895878) at config.c:376 #8 0x00465d30 in ap_internal_redirect (new_uri=, r=) at http_request.c:554 #9 0x7f553afb8bb5 in handler_redirect (r
Bug #40479 [Com]: zend_mm_heap corrupted
Edit report at https://bugs.php.net/bug.php?id=40479&edit=1 ID: 40479 Comment by: komanek at natur dot cuni dot cz Reported by:rrossi at maggioli dot it Summary:zend_mm_heap corrupted Status: Feedback Type: Bug Package:Reproducible crash Operating System: Suse Linux 9.0 PHP Version:5.2.1 Block user comment: N Private report: N New Comment: For me it seems the solution is to compile PHP with --disable-zend-multibyte instead of --enable-zend-multibyte But I am not sure if it breaks something else, I didn't find much documentation on these options. Previous Comments: [2012-03-30 18:47:46] nathan at gt dot net Also to add, USE_ZEND_ALLOC=0 did not resolve but gc_disable(); did [2012-03-30 18:46:12] nathan at gt dot net I've also confirmed the above testcase triggers it on 5.3.10 via CLI. Can provide full access to any php developer interested in taking a look, just email me. [2012-03-28 11:42:16] komanek at natur dot cuni dot cz Hi, I used the USE_ZEND_ALLOC=0 and got another segfault. But in this case in the apache error log is hopefuly something useful: *** glibc detected *** /usr/local/apache2/bin/httpd: double free or corruption (!prev): 0x051d6e10 *** === Backtrace: = /lib/libc.so.6[0x7f5a8e3709a8] /lib/libc.so.6(cfree+0x76)[0x7f5a8e372ab6] /usr/local/apache2/modules/libphp5.so(zend_multibyte_read_script+0x2e)[0x7f5a887be90e] /usr/local/apache2/modules/libphp5.so(open_file_for_scanning+0x90)[0x7f5a887bed60] /usr/local/apache2/modules/libphp5.so(compile_file+0x9c)[0x7f5a887bf92c] /usr/local/apache2/modules/libphp5.so[0x7f5a8866575a] /usr/local/apache2/modules/libphp5.so[0x7f5a8881c733] /usr/local/apache2/modules/libphp5.so(execute+0x209)[0x7f5a88813c49] /usr/local/apache2/modules/libphp5.so(zend_execute_scripts+0x17b)[0x7f5a887e52db] /usr/local/apache2/modules/libphp5.so(php_execute_script+0x198)[0x7f5a8878e0f8] /usr/local/apache2/modules/libphp5.so[0x7f5a8887348f] /usr/local/apache2/bin/httpd(ap_run_handler+0x4a)[0x443f5a] /usr/local/apache2/bin/httpd(ap_invoke_handler+0xce)[0x44747e] /usr/local/apache2/bin/httpd(ap_process_request+0x18e)[0x465ece] /usr/local/apache2/bin/httpd[0x462d78] /usr/local/apache2/bin/httpd(ap_run_process_connection+0x4a)[0x44b45a] /usr/local/apache2/bin/httpd[0x46abd0] /usr/local/apache2/bin/httpd[0x46aea4] /usr/local/apache2/bin/httpd(ap_mpm_run+0xbde)[0x46baee] /usr/local/apache2/bin/httpd(main+0x99a)[0x43063a] /lib/libc.so.6(__libc_start_main+0xe6)[0x7f5a8e31b1a6] /usr/local/apache2/bin/httpd(apr_os_proc_mutex_put+0x49)[0x42f819] === Memory map: 0040-00493000 r-xp 08:01 442565 /usr/local/apache2/bin/httpd 00692000-00698000 rw-p 00092000 08:01 442565 /usr/local/apache2/bin/httpd 00698000-0069d000 rw-p 00698000 00:00 0 017e-053d4000 rw-p 017e 00:00 0 [heap] 7f5a8000-7f5a80021000 rw-p 7f5a8000 00:00 0 7f5a80021000-7f5a8400 ---p 7f5a80021000 00:00 0 7f5a8497c000-7f5a84992000 r-xp 08:01 835587 /lib/libgcc_s.so.1 7f5a84992000-7f5a84b92000 ---p 00016000 08:01 835587 /lib/libgcc_s.so.1 7f5a84b92000-7f5a84b93000 rw-p 00016000 08:01 835587 /lib/libgcc_s.so.1 7f5a84b9d000-7f5a84b9e000 r--s 08:11 78792612 /home/apache2/htdocs/horde/lib/core.php 7f5a84b9e000-7f5a84bc1000 r--p 08:11 78799575 /home/apache2/htdocs/horde/mnemo/locale/cs_CZ/LC_MESSAGES/mnemo.mo 7f5a84bc1000-7f5a84bc5000 r-xp 08:01 1884172 /lib/libnss_dns-2.7.so 7f5a84bc5000-7f5a84dc4000 ---p 4000 08:01 1884172 /lib/libnss_dns-2.7.so 7f5a84dc4000-7f5a84dc6000 rw-p 3000 08:01 1884172 /lib/libnss_dns-2.7.so 7f5a84dc6000-7f5a84dfd000 r--p 08:11 78790850 /home/apache2/htdocs/horde/imp/locale/cs_CZ/LC_MESSAGES/imp.mo 7f5a84dfd000-7f5a84dff000 r-xp 08:01 1327349 /usr/lib/gconv/ISO8859-2.so 7f5a84dff000-7f5a84ffe000 ---p 2000 08:01 1327349 /usr/lib/gconv/ISO8859-2.so 7f5a84ffe000-7f5a8500 rw-p 1000 08:01 1327349 /usr/lib/gconv/ISO8859-2.so 7f5a8500-7f5a85192000 r--p 08:01 428099 /usr/lib/locale/locale-archive 7f5a85192000-7f5a851e1000 rw-p 7f5a85192000 00:00 0 7f5a851e1000-7f5a851e3000 r-xp 08:01 451017 /usr/local/apache2/lib/apr-util-1/apr_ldap-1.so 7f5a851e3000-7f5a853e2000 ---p 2000 08:01 451017 /usr/local/apache2/lib/apr-util-1/apr_ldap-
Bug #61566 [PATCH]: Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails
Edit report at https://bugs.php.net/bug.php?id=61566&edit=1 ID: 61566 Patch added by: a...@php.net Reported by:a...@php.net Summary:Fileinfo ext\fileinfo\tests\finfo_file_002.phpt fails Status: Open Type: Bug Package:*Directory/Filesystem functions Operating System: Windows PHP Version:5.3Git-2012-03-30 (Git) Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: 61566.diff Revision: 171483 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=171483 Previous Comments: [2012-03-31 10:02:49] a...@php.net The following patch has been added/updated: Patch Name: 61566.diff Revision: 1333188169 URL: https://bugs.php.net/patch-display.php?bug=61566&patch=61566.diff&revision=1333188169 [2012-03-30 15:11:21] a...@php.net Description: Test diff: 001+ 001- array(6) { 002- ["%s/resources/dir.zip"]=> 003- string(15) "application/zip" 004- ["%s/resources/test.bmp"]=> 005- string(14) "image/x-ms-bmp" 006- ["%s/resources/test.gif"]=> 007- string(9) "image/gif" 008- ["%s/resources/test.jpg"]=> 009- string(10) "image/jpeg" 010- ["%s/resources/test.pdf"]=> 011- string(15) "application/pdf" 012- ["%s/resources/test.png"]=> 013- string(9) "image/png" 014- } Expected result: test pass Actual result: -- test fails -- Edit this bug report at https://bugs.php.net/bug.php?id=61566&edit=1
Req #61601 [Opn]: strftime format does not allow for all lower case month/weekday
Edit report at https://bugs.php.net/bug.php?id=61601&edit=1 ID: 61601 User updated by:koen at fotoloog dot org Reported by:koen at fotoloog dot org Summary:strftime format does not allow for all lower case month/weekday Status: Open Type: Feature/Change Request Package:Date/time related Operating System: All PHP Version:Irrelevant Block user comment: N Private report: N New Comment: I wrote "The usual way of writing the full/abbreviated name of a month or a weekday" but I meant to write "The usual way of writing the full/abbreviated name of a month or a weekday *for my locale*..." Previous Comments: [2012-04-02 11:47:08] koen at fotoloog dot org Description: --- >From manual page: >http://www.php.net/function.strftime#refsect1-function.strftime-description --- The usual way of writing the full/abbreviated name of a month or a weekday is with all lower case letters, e.g. 'december' as opposed to 'December'. And 'maandag' as opposed to 'Monday'. My locale is nl_nl. See http://nl.wikipedia.org/wiki/Hoofdletter_in_de_Nederlandse_spelling#Perioden (in Dutch) for explanation. Request is to add format parameters for weekdays and months: maandag;dinsdag;woensdag;donderdag;vrijdag;zaterdag;zondag januari;februari;maart;april;mei;juni;juli;augustus;september;oktober;november;december Test script: --- not applicable. -- Edit this bug report at https://bugs.php.net/bug.php?id=61601&edit=1
[PHP-BUG] Req #61601 [NEW]: strftime format does not allow for all lower case month/weekday
From: Operating system: All PHP version: Irrelevant Package: Date/time related Bug Type: Feature/Change Request Bug description:strftime format does not allow for all lower case month/weekday Description: --- >From manual page: http://www.php.net/function.strftime#refsect1-function.strftime-description --- The usual way of writing the full/abbreviated name of a month or a weekday is with all lower case letters, e.g. 'december' as opposed to 'December'. And 'maandag' as opposed to 'Monday'. My locale is nl_nl. See http://nl.wikipedia.org/wiki/Hoofdletter_in_de_Nederlandse_spelling#Perioden (in Dutch) for explanation. Request is to add format parameters for weekdays and months: maandag;dinsdag;woensdag;donderdag;vrijdag;zaterdag;zondag januari;februari;maart;april;mei;juni;juli;augustus;september;oktober;november;december Test script: --- not applicable. -- Edit bug report at https://bugs.php.net/bug.php?id=61601&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=61601&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=61601&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=61601&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=61601&r=fixed Fixed in SVN and need be documented: https://bugs.php.net/fix.php?id=61601&r=needdocs Fixed in release: https://bugs.php.net/fix.php?id=61601&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=61601&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=61601&r=needscript Try newer version: https://bugs.php.net/fix.php?id=61601&r=oldversion Not developer issue: https://bugs.php.net/fix.php?id=61601&r=support Expected behavior: https://bugs.php.net/fix.php?id=61601&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=61601&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=61601&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=61601&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=61601&r=php4 Daylight Savings:https://bugs.php.net/fix.php?id=61601&r=dst IIS Stability: https://bugs.php.net/fix.php?id=61601&r=isapi Install GNU Sed: https://bugs.php.net/fix.php?id=61601&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=61601&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=61601&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=61601&r=mysqlcfg
Req #53831 [Com]: DateInterval constructor does not handle valid ISO 8601 strings
Edit report at https://bugs.php.net/bug.php?id=53831&edit=1 ID: 53831 Comment by: jdp2234 at hotmail dot com Reported by:pallinger at dsd dot sztaki dot hu Summary:DateInterval constructor does not handle valid ISO 8601 strings Status: Open Type: Feature/Change Request Package:Date/time related Operating System: ubuntu linux 10.10 PHP Version:5.3.5 Block user comment: N Private report: N New Comment: http://joshp.me/dateinterval-milliseconds/ Quick class to get around it, while the bug still exists... class DateIntervalFractions extends DateInterval { public $milliseconds; public function __construct($interval_spec) { $this->milliseconds = 0; $matches = array(); preg_match_all("#([0-9]*[.,]?[0-9]*) [S]#",$interval_spec,$matches); foreach ($matches[0] as $result) { $original = $result; list($seconds,$milliseconds) = explode(".",substr($result,0,-1)); $this->milliseconds = $milliseconds / pow(10,strlen($milliseconds) - 3); // Replace the milliseconds back to seconds, // and let the original constructor do the rest. $interval_spec = str_replace($original,$seconds . "S",$interval_spec); } parent::__construct($interval_spec); } } Previous Comments: [2011-10-12 16:09:31] dagguh at gmail dot com http://en.wikipedia.org/wiki/Iso8601#Durations This decimal fraction may be specified with either a comma or a full stop, as in "P0,5Y" or "P0.5Y". Remember to accept both comma and a full stop. [2011-01-24 18:41:19] pallinger at dsd dot sztaki dot hu Description: --- >From manual page: http://www.php.net/dateinterval.construct --- The documentation says that "Each duration period is represented by an integer value followed by a period designator.", however, the ISO 8601 allows non-integer values for the last number (http://en.wikipedia.org/wiki/ISO_8601#Durations). This is quite important if I want to parse XML data which contains millisecond-precision durations, as the seconds will surely not be integers. Test script: --- Expected result: Should print out a valid DateInterval object, eg.: object(DateInterval)#1 (8) { ["y"]=> int(0) ["m"]=> int(0) ["d"]=> int(0) ["h"]=> int(0) ["i"]=> int(0) ["s"]=> float(1.1) ["invert"]=> int(0) ["days"]=> bool(false) } It could also include a millisecond/microsecond/nanosecond field to accomodate additional precision. However, if the durations that are stored are still integers, it would be difficult to handle durations like "P0.5Y". Actual result: -- PHP Fatal error: Uncaught exception 'Exception' with message 'DateInterval::__construct(): Unknown or bad format (PT1.1S)' in -:1 Stack trace: #0 -(1): DateInterval->__construct('PT1.1S') #1 {main} thrown in - on line 1 -- Edit this bug report at https://bugs.php.net/bug.php?id=53831&edit=1
Bug #61569 [Com]: Syntax error for calling a closure using array accesor on function call
Edit report at https://bugs.php.net/bug.php?id=61569&edit=1 ID: 61569 Comment by: ni...@php.net Reported by:oxygenus at gmail dot com Summary:Syntax error for calling a closure using array accesor on function call Status: Open Type: Bug Package:Scripting Engine problem Operating System: ANY PHP Version:master Block user comment: N Private report: N New Comment: I mentioned this some time ago on internals, but it didn't seem like anyone was interested in this :( Previous Comments: [2012-03-31 01:51:18] yohg...@php.net Changed package to Scripting Engine Problem and OS is irrelevant. Anyway, will this be supported? [2012-03-30 15:36:18] oxygenus at gmail dot com Description: Parse error: syntax error, unexpected '(' in C:\phpinfo.php on line 26 26: giveArray($arrFunctions)[0]("Hello world") Test script: --- function($strSomeParam) { return $strSomeParam; }, ]; //this works var_export( giveArray($arrFunctions)[0] ); //this works var_export( $arrFunctions[0]("Hello world") ); //this fails compilation with syntax error var_export( giveArray($arrFunctions)[0]("Hello world") ); Expected result: Closure::__set_state(array( ))'Hello world''Hello world' Actual result: -- Parse error: syntax error, unexpected '(' in C:\phpinfo.php on line 26 -- Edit this bug report at https://bugs.php.net/bug.php?id=61569&edit=1
Bug #60701 [Com]: __toString() which stores $this reference triggers segfault (with fix!)
Edit report at https://bugs.php.net/bug.php?id=60701&edit=1 ID: 60701 Comment by: arjen at react dot com Reported by:daan at react dot com Summary:__toString() which stores $this reference triggers segfault (with fix!) Status: Assigned Type: Bug Package:Reproducible crash Operating System: CentOS PHP Version:5.3.8 Assigned To:dmitry Block user comment: N Private report: N New Comment: 5.3.10 fixed the attached testcase, a more simple test now fails. a = $this; return 'waa?'; } } $a = new A; echo trim($a); echo trim($a->a); Results: 5.3.0 - 5.3.9 waa?1 5.3.10 waa? Warning: trim() expects parameter 1 to be string, unknown given in /home/deployer/public_html/php/tmp/ba8096acaf18c52bc12e38619634c25b on line 14 5.4.0 Segmentationfault Previous Comments: [2012-03-26 09:05:57] s...@php.net OK, I think I know what may be going on here. What you're getting as $this in toString() is not a real $object but a copy what was generated by SEPARATE_ZVAL_IF_NOT_REF() in parse_arg_object_to_string(). If you save this copy, there might be trouble since it'd be destroyed by writeobj and later cleanup of the function arguments. However, the patch proposed doesn't seem to solve the problem completely since $this->test variable is still corrupted in this scenario... [2012-03-26 08:38:59] s...@php.net I looked more into the code, and as far as I can see, the case where readobj == writeobj comes from parse_arg_object_to_string() - but there it is preceeded by SEPARATE_ZVAL_IF_NOT_REF(arg); so I don't see how you can get refcount > 1 there unless you have IS_REF. Something else is going on there... [2012-03-26 07:21:23] s...@php.net I'm not sure I understand the patch, especially this part: if (readobj == writeobj) { + if (Z_REFCOUNT_P(readobj) <= 1) { + INIT_PZVAL(writeobj); + } zval_dtor(readobj); It looks like you initializing the object and then immediately calling dtor on it (since readobj == writeobj). Could you explain why and what you are trying to do there? [2012-02-13 19:48:38] pada at hrz dot tu-chemnitz dot de @sjon: Now, I retried with the original Test script from daan. This patch works for me too, thanks :) [2012-02-13 19:16:25] sjon at hortensius dot net @andrew at localcoast dot net Did you try to remove all __toString methods from your application? If that didn't fix it you are experiencing another bug and will probably need to generate a small reproducing script yourself @pada at hrz dot tu-chemnitz dot de your problem has nothing to do with this bug, You are simply demonstrating a recursive loop. The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=60701 -- Edit this bug report at https://bugs.php.net/bug.php?id=60701&edit=1
Req #61421 [Opn->Asn]: Missing SHA256,SHA512 families of signature algorithms
Edit report at https://bugs.php.net/bug.php?id=61421&edit=1 ID: 61421 Updated by: paj...@php.net Reported by:mark at zedwood dot com Summary:Missing SHA256,SHA512 families of signature algorithms -Status: Open +Status: Assigned Type: Feature/Change Request Package:OpenSSL related Operating System: Ubuntu Linux PHP Version:5.4.0 -Assigned To: +Assigned To:pajoye Block user comment: N Private report: N New Comment: hi, Thanks for the patch, I will apply it asap but it won't make it for the next releases of 5.3 or 5.4 as we are already in release phases. Btw, can you add some tests too please? About the patch, yes, please use the openssl version check instead. As what is done now won't work smoothly with older versions. As of getting a svn account (asked per email but adding answer here too), we usually give one after that one has provided a couple of patches :) Thanks for your work! Previous Comments: [2012-04-02 09:21:11] der...@php.net Mark, yes, you probably should. It will also help a lot if you include test cases for the new functionality. Make sure those tests also run with older versions of openssl though! cheers, Derick [2012-03-31 04:00:54] mark at zedwood dot com should i submit a new patch with #if OPENSSL_VERSION_NUMBER >= 0x0090708fL instead of #ifndef OPENSSL_NO_SHA256 ? [2012-03-16 21:10:49] zedwoodnoreply at gmail dot com to generate a sample csr with sha256 sig use: openssl req -new -sha256-newkey rsa:2048 -nodes -out example_com_sha256.csr -keyout example_com_sha256.key-subj "/C=US/ST=/L=/O=/CN=example.com" to parse the csr with openssl (command line) use: openssl req -in example_com_sha256.csr-noout -text sample output: Certificate Request: Data: Version: 0 (0x0) Subject: C=US, CN=example.com Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:a7:7a:17:c4:17:72:8e:5b:36:36:05:8f:57:10: a5:b9:f2:4b:05:9e:88:62:bc:8b:a5:ad:c3:6a:41: b5:31:25:cc:86:7c:99:6b:f4:7f:74:a1:01:93:95: b9:3e:b7:dc:b4:b4:59:3c:ff:22:8c:d5:87:75:44: 93:9c:19:de:08:42:b2:fd:88:eb:71:6b:8b:21:4a: 06:66:9c:6d:2b:10:bb:f5:e8:7c:a2:3a:ae:51:86: 51:3a:d1:96:02:93:f1:de:3a:68:06:6d:36:20:41: b4:09:d8:ed:74:5e:ff:ae:ba:26:84:ac:4d:6a:30: 6a:b4:01:ec:3a:a0:f9:5c:08:5c:6c:5e:1f:f2:11: 2c:11:a1:3d:44:17:79:33:0a:97:a0:4e:b8:c3:81: e4:58:d7:10:b3:50:43:af:9e:4b:b9:05:e7:5d:da: 78:b1:85:c4:36:a7:d5:b2:82:7a:1a:ab:4c:6c:98: a1:b5:6c:1a:99:04:18:2b:8d:80:2f:11:23:1d:41: 53:7a:15:39:2b:84:23:bf:2d:b0:32:5a:7d:0d:d0: 3f:ac:d3:66:9c:9f:a2:df:40:4b:0d:9c:98:e4:64: 44:b7:58:1d:54:75:07:47:b9:03:e5:57:10:d3:1a: ac:85:c6:f1:19:1c:df:a6:33:12:25:0b:ee:9a:fb: 72:93 Exponent: 65537 (0x10001) Attributes: a0:00 Signature Algorithm: sha256WithRSAEncryption 48:ac:2e:08:93:95:ec:c3:12:ab:88:33:1f:7f:37:c3:5a:9b: 6a:9a:b3:ea:35:ca:f0:1d:40:47:f0:31:8f:f3:36:b4:3d:5d: ee:74:48:fe:1b:43:4b:78:d7:97:d5:d5:77:8f:ba:51:db:35: 75:c4:89:dc:b6:49:86:4e:4c:42:e7:01:e3:cb:72:da:9b:94: d1:ed:b7:59:be:f6:eb:44:68:54:e5:10:0c:bf:7a:9f:48:18: 86:f2:f2:84:ca:a1:3b:48:be:d1:4a:40:22:12:7b:c0:42:a5: a0:ce:0f:43:17:44:e2:cf:e8:27:1d:71:d5:92:d8:de:bd:82: c2:11:f2:73:8c:c3:ab:5e:a1:64:78:af:a6:10:19:b1:ed:b2: fb:4c:bb:66:20:fe:1a:34:af:43:9f:4d:4e:6d:a2:f0:d0:df: 33:93:e5:a7:d5:dc:2f:47:e3:56:31:fd:50:d2:2e:83:2f:d2: b2:fb:a8:7d:ce:4a:1f:a1:14:fc:45:92:ca:1c:85:3a:e7:32: e4:a8:13:fe:54:9a:ee:25:02:26:d3:b5:e1:96:08:f3:c8:36: 59:ef:f5:46:1c:62:e6:58:ea:d4:86:a8:3f:ed:92:77:d7:eb: d3:92:a1:91:8e:2c:1c:4e:c2:12:b0:c9:8b:3b:17:99:32:03: e3:9e:a5:dd [2012-03-16 19:35:04] mark at zedwood dot com Description: openssl_verify() takes as a parameter a signature algorithm. The current list of values is here http://us3.php.net/manual/en/openssl.signature-algos.php The SHA256 and SHA512 families algorithms have been supported in openssl for quite some time. RipeMD160 is also not included. Test script: --- http://pastebin.com/qdCyC0Pe
Req #61421 [Opn]: Missing SHA256,SHA512 families of signature algorithms
Edit report at https://bugs.php.net/bug.php?id=61421&edit=1 ID: 61421 Updated by: der...@php.net Reported by:mark at zedwood dot com Summary:Missing SHA256,SHA512 families of signature algorithms Status: Open Type: Feature/Change Request Package:OpenSSL related Operating System: Ubuntu Linux PHP Version:5.4.0 Block user comment: N Private report: N New Comment: Mark, yes, you probably should. It will also help a lot if you include test cases for the new functionality. Make sure those tests also run with older versions of openssl though! cheers, Derick Previous Comments: [2012-03-31 04:00:54] mark at zedwood dot com should i submit a new patch with #if OPENSSL_VERSION_NUMBER >= 0x0090708fL instead of #ifndef OPENSSL_NO_SHA256 ? [2012-03-16 21:10:49] zedwoodnoreply at gmail dot com to generate a sample csr with sha256 sig use: openssl req -new -sha256-newkey rsa:2048 -nodes -out example_com_sha256.csr -keyout example_com_sha256.key-subj "/C=US/ST=/L=/O=/CN=example.com" to parse the csr with openssl (command line) use: openssl req -in example_com_sha256.csr-noout -text sample output: Certificate Request: Data: Version: 0 (0x0) Subject: C=US, CN=example.com Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:a7:7a:17:c4:17:72:8e:5b:36:36:05:8f:57:10: a5:b9:f2:4b:05:9e:88:62:bc:8b:a5:ad:c3:6a:41: b5:31:25:cc:86:7c:99:6b:f4:7f:74:a1:01:93:95: b9:3e:b7:dc:b4:b4:59:3c:ff:22:8c:d5:87:75:44: 93:9c:19:de:08:42:b2:fd:88:eb:71:6b:8b:21:4a: 06:66:9c:6d:2b:10:bb:f5:e8:7c:a2:3a:ae:51:86: 51:3a:d1:96:02:93:f1:de:3a:68:06:6d:36:20:41: b4:09:d8:ed:74:5e:ff:ae:ba:26:84:ac:4d:6a:30: 6a:b4:01:ec:3a:a0:f9:5c:08:5c:6c:5e:1f:f2:11: 2c:11:a1:3d:44:17:79:33:0a:97:a0:4e:b8:c3:81: e4:58:d7:10:b3:50:43:af:9e:4b:b9:05:e7:5d:da: 78:b1:85:c4:36:a7:d5:b2:82:7a:1a:ab:4c:6c:98: a1:b5:6c:1a:99:04:18:2b:8d:80:2f:11:23:1d:41: 53:7a:15:39:2b:84:23:bf:2d:b0:32:5a:7d:0d:d0: 3f:ac:d3:66:9c:9f:a2:df:40:4b:0d:9c:98:e4:64: 44:b7:58:1d:54:75:07:47:b9:03:e5:57:10:d3:1a: ac:85:c6:f1:19:1c:df:a6:33:12:25:0b:ee:9a:fb: 72:93 Exponent: 65537 (0x10001) Attributes: a0:00 Signature Algorithm: sha256WithRSAEncryption 48:ac:2e:08:93:95:ec:c3:12:ab:88:33:1f:7f:37:c3:5a:9b: 6a:9a:b3:ea:35:ca:f0:1d:40:47:f0:31:8f:f3:36:b4:3d:5d: ee:74:48:fe:1b:43:4b:78:d7:97:d5:d5:77:8f:ba:51:db:35: 75:c4:89:dc:b6:49:86:4e:4c:42:e7:01:e3:cb:72:da:9b:94: d1:ed:b7:59:be:f6:eb:44:68:54:e5:10:0c:bf:7a:9f:48:18: 86:f2:f2:84:ca:a1:3b:48:be:d1:4a:40:22:12:7b:c0:42:a5: a0:ce:0f:43:17:44:e2:cf:e8:27:1d:71:d5:92:d8:de:bd:82: c2:11:f2:73:8c:c3:ab:5e:a1:64:78:af:a6:10:19:b1:ed:b2: fb:4c:bb:66:20:fe:1a:34:af:43:9f:4d:4e:6d:a2:f0:d0:df: 33:93:e5:a7:d5:dc:2f:47:e3:56:31:fd:50:d2:2e:83:2f:d2: b2:fb:a8:7d:ce:4a:1f:a1:14:fc:45:92:ca:1c:85:3a:e7:32: e4:a8:13:fe:54:9a:ee:25:02:26:d3:b5:e1:96:08:f3:c8:36: 59:ef:f5:46:1c:62:e6:58:ea:d4:86:a8:3f:ed:92:77:d7:eb: d3:92:a1:91:8e:2c:1c:4e:c2:12:b0:c9:8b:3b:17:99:32:03: e3:9e:a5:dd [2012-03-16 19:35:04] mark at zedwood dot com Description: openssl_verify() takes as a parameter a signature algorithm. The current list of values is here http://us3.php.net/manual/en/openssl.signature-algos.php The SHA256 and SHA512 families algorithms have been supported in openssl for quite some time. RipeMD160 is also not included. Test script: --- http://pastebin.com/qdCyC0Pe Expected result: verified Actual result: -- PHP Notice: Use of undefined constant OPENSSL_ALGO_SHA256 - assumed 'OPENSSL_ALGO_SHA256' in verify_sig.php on line 18 notverified -- Edit this bug report at https://bugs.php.net/bug.php?id=61421&edit=1
Bug #61588 [Asn->Fbk]: PDOStatement::getColumnMeta returns original table name from view
Edit report at https://bugs.php.net/bug.php?id=61588&edit=1 ID: 61588 Updated by: johan...@php.net Reported by:cdburgess at gmail dot com Summary:PDOStatement::getColumnMeta returns original table name from view -Status: Assigned +Status: Feedback Type: Bug Package:PDO related Operating System: Mac OSX PHP Version:5.3.10 Assigned To:mysql Block user comment: N Private report: N New Comment: I can't reproduce this. Please provide a reproduce script including table and view definition and information about the MySQL server version you are using. Previous Comments: [2012-04-01 03:58:58] cdburgess at gmail dot com Description: The data returned from PDOStatement::getColumnMeta is inconsistent when run on a MySQL view. It works fine against tables, but in some cases when run against a View in MySQL, it returns the original table name from the table that was used to create the view. Expected result: I would expect the Table name being returned to be the name of the View, not the original table the view is created from. -- Edit this bug report at https://bugs.php.net/bug.php?id=61588&edit=1
Bug #60947 [ReO->Csd]: Segmentation fault while executing ibase_db_info
Edit report at https://bugs.php.net/bug.php?id=60947&edit=1 ID: 60947 Updated by: mar...@php.net Reported by:a dot lukyanov at hostcomm dot ru Summary:Segmentation fault while executing ibase_db_info -Status: Re-Opened +Status: Closed Type: Bug Package:InterBase related Operating System: All PHP Version:Irrelevant Assigned To:mariuz Block user comment: N Private report: N New Comment: This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. Previous Comments: [2012-03-23 07:16:40] mar...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. iliaa fixed it in svn for all branches Thanks [2012-03-16 21:17:43] a dot lukyanov at hostcomm dot ru I'm sorry, but current code in trunk not solved the problem. Buffer increases on each iteration, because heap_p is bigger than heap_buf: - snprintf(heap_p, heap_buf_size - (heap_buf - heap_p), "%s\n", result); + snprintf(heap_p, heap_buf_size - (heap_p - heap_buf), "%s\n", result); This line should be corrected too: - heap_p += line_len +2; + heap_p += line_len +1; On each iteration I need overwrite last zero byte. In current code I recieve single line from Firebird server instead of multiline output (if not catch segfault). Sorry for my bad English. Thanks. [2012-03-15 19:59:22] il...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. For Windows: http://windows.php.net/snapshots/ Thank you for the report, and for helping us make PHP better. [2012-03-15 19:59:15] il...@php.net Automatic comment from SVN on behalf of iliaa Revision: http://svn.php.net/viewvc/?view=revision&revision=324281 Log: Fixed bug #60947 (Segmentation fault while executing ibase_db_info) [2012-02-01 10:39:15] a dot lukyanov at hostcomm dot ru Description: All versions of PHP takes segmentation fault while executing ibase_db_info() function. I solved this problem and wrote patch. Please apply it. Thanks. Test script: --- Expected result: testvh1 public_html # ./php-5.2.17/sapi/cli/php test.php Database "/var/lib/firebird/testvh11_fb1234.fdb" Database header page information: Flags 0 Checksum12345 Generation 65 Page size 8192 ODS version 11.2 Oldest transaction 20 Oldest active 21 Oldest snapshot 21 Next transaction26 Bumped transaction 1 Sequence number 0 Next attachment ID 38 Implementation ID 24 Shadow count0 Page buffers0 Next header page0 Database dialect3 Creation date Jan 30, 2012 15:10:47 Attributes force write Variable header data: *END* testvh1 public_html # Actual result: -- testvh1 public_html # php test.php Segmentation fault testvh1 public_html # -- Edit this bug report at https://bugs.php.net/bug.php?id=60947&edit=1
Bug #61586 [Opn->Fbk]: is_file("path/.ext");
Edit report at https://bugs.php.net/bug.php?id=61586&edit=1 ID: 61586 Updated by: ahar...@php.net Reported by:simon at cicoss dot net Summary:is_file("path/.ext"); -Status: Open +Status: Feedback Type: Bug Package:Filesystem function related Operating System: Suse Linux PHP Version:Irrelevant Block user comment: N Private report: N New Comment: Thank you for this bug report. To properly diagnose the problem, we need a short but complete example script to be able to reproduce this bug ourselves. A proper reproducing script starts with , is max. 10-20 lines long and does not require any external resources such as databases, etc. If the script requires a database to demonstrate the issue, please make sure it creates all necessary tables, stored procedures etc. Please avoid embedding huge scripts into the report. I also can't reproduce this. This script: Outputs bool(false) and bool(true), which is what I'd expect. Previous Comments: [2012-04-01 08:00:29] reeze dot xia at gmail dot com Hi simon: I don't get it. does it look like this? ./testscript.php ./path /a.json < a.json or any *.json ? file cat testscript.php bool(true) [2012-03-31 19:57:59] simon at cicoss dot net Description: --- >From manual page: http://www.php.net/function.is-file --- Due to a small error I found that is_file returns true for something like "path/.ext" when "path/" files there ".ext". Test script: --- https://bugs.php.net/bug.php?id=61586&edit=1