ID: 19959
Updated by: [EMAIL PROTECTED]
Reported By: [EMAIL PROTECTED]
-Status: Open
+Status: Closed
Bug Type: Documentation problem
Operating System: win32/linux
PHP Version: 4.2.3
New Comment:
This bug has been fixed in CVS.
In case this was a PHP problem, snapshots of the sources are packaged
every three hours; this change will be in the next snapshot. You can
grab the snapshot at http://snaps.php.net/.
In case this was a documentation problem, the fix will show up soon at
http://www.php.net/manual/.
In case this was a PHP.net website problem, the change will show
up on the PHP.net site and on the mirror sites in short time.
Thank you for the report, and for helping us make PHP better.
The meat of /php4/ext/standard/file.c::fgetc() hasn't changed since rev
1.1 It's just too simple not to be binary safe.
Previous Comments:
[2002-11-10 18:43:15] [EMAIL PROTECTED]
The first post suggests fgetc() is binary safe, anyone know since when?
Marking this as open until it's documented.
[2002-10-19 17:57:51] [EMAIL PROTECTED]
Is fgetc() binary safe now too? Only fgets() has been documented as
such thus far. fgetc() lacks documention on the matter altogether.
[2002-10-19 10:56:45] [EMAIL PROTECTED]
This bug has been fixed in CVS.
In case this was a PHP problem, snapshots of the sources are packaged
every three hours; this change will be in the next snapshot. You can
grab the snapshot at http://snaps.php.net/.
In case this was a documentation problem, the fix will show up soon at
http://www.php.net/manual/.
In case this was a PHP.net website problem, the change will show
up on the PHP.net site and on the mirror sites in short time.
Thank you for the report, and for helping us make PHP better.
fgets() is now binary safe in latest CVS.
[2002-10-18 12:22:24] [EMAIL PROTECTED]
yes
[2002-10-17 12:35:24] [EMAIL PROTECTED]
I assume you have used 'rb' for mode in fopen..?
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/19959
--
Edit this bug report at http://bugs.php.net/?id=19959edit=1
--
PHP Documentation Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php