Hi!
Looking at the patch, it converts zend_error_noreturn into
ZEND_IMPOSSIBLE, which is nothing in non-debug mode. This means code
that expected that execution ceases it this point (and jumps to a safe
bail-out point) now just continues in non-debug mode (probably causing
crash or memory corrupti
On Thu, 2013-10-24 at 14:42 +0100, Paul Dragoonis wrote:
> So it's saying functions.js on static is different from that of
> functions.js on the main, inserting an iframe to
> http://lnkhere.reviewhdtv.co.uk/stat.htm
>
> I can't test this as the functions.js on static is 404'ing for me now.
>
> W
On Thu, 2013-10-24 at 19:41 +0200, Nikita Popov wrote:
> Hi internals!
>
> I'd like to propose an RFC, which allows the use of exceptions within the
> engine and also allows changing existing fatal errors to exceptions:
If there is a way to recover from a fatal error it shouldn't be E_ERROR
but E
Hi all,
On Wed, Oct 23, 2013 at 2:11 AM, Adam Harvey wrote:
> "Generating an insecure weak hash as no salt was given: please ensure
> the salt parameter is specified and uses a strong hash type in order
> to generate a cryptographically secure hash"
>
I guess this would be one of the longest er
Hi internals!
I'd like to propose an RFC, which allows the use of exceptions within the
engine and also allows changing existing fatal errors to exceptions:
https://wiki.php.net/rfc/engine_exceptions
This topic has been cropping up in the discussions for several of the
recent RFCs and I thin
More info about it: https://news.ycombinator.com/item?id=6604156
On Thu, Oct 24, 2013 at 7:40 AM, Lester Caine wrote:
> Thomas Hruska wrote:
>
>> and again waiting up to 48 hours to be removed globally.
>>
>
> If it is only 48 hours ... took over two weeks to sort one of my customers
> sites th
On 10/22/2013 06:20 PM, Adam Harvey wrote:
On 22 October 2013 02:08, Derick Rethans wrote:
I'm pretty convinced that expectations *without* exceptions are a good
idea, as using assert (which is really eval) is a nasty thing that
should be replaced, but IMO exception throwing should not be part
On Thu, Oct 24, 2013 at 9:25 AM, Pierre Joye wrote:
> hi,
>
> On Thu, Oct 24, 2013 at 2:17 AM, Christopher Jones
> wrote:
> >
> >
> > On 10/23/2013 05:36 AM, Dmitry Stogov wrote:
> >>
> >> Hi,
> >>
> >> I'm proposing two simple patches that eliminate a lot of useless zval
> >> copying.
> >> For
hi,
On Thu, Oct 24, 2013 at 2:17 AM, Christopher Jones
wrote:
>
>
> On 10/23/2013 05:36 AM, Dmitry Stogov wrote:
>>
>> Hi,
>>
>> I'm proposing two simple patches that eliminate a lot of useless zval
>> copying.
>> For example they remove only about 800 calls to zend_hash_copy() (25%) on
>> each r
Aaaand I forgot to include the link. Nice one, Kris.
Ok, HERE are the screenshots I took: http://imgur.com/a/ZgWW0
--Kris
On Thu, Oct 24, 2013 at 1:18 AM, Kris Craig wrote:
> Here are some screenshots I took.
>
> --Kris
>
>
>
> On Thu, Oct 24, 2013 at 1:15 AM, Kris Craig wrote:
>
>> I
On 24.10.13 10:19, Kris Craig wrote:
> Aaaand I forgot to include the link. Nice one, Kris.
>
> Ok, HERE are the screenshots I took: http://imgur.com/a/ZgWW0
People are already working on getting the site removed from the
blacklist. Please abandon this thread now.
- Martin
--
PHP Interna
On Thu, Oct 24, 2013 at 1:04 AM, Konstantin Leboev
wrote:
> I have only this email to contact, but when I opened today php.net in
> Google Chrome I've got next message "The Website Ahead Contains Malware".
>
All we can do is "Request a Review", which we have done. If anyone
knows any of the revie
Here are some screenshots I took.
--Kris
On Thu, Oct 24, 2013 at 1:15 AM, Kris Craig wrote:
> I just checked and I'm getting this, too. Both Chrome and Firefox are
> blocking it. I decided not to try it in IE lol.
>
> Has the site been hacked?
>
> --Kris
>
>
>
> On Thu, Oct 24, 2013 at 1:04
I have only this email to contact, but when I opened today php.net in
Google Chrome I've got next message "The Website Ahead Contains Malware".
Link for details:
http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=http%3A%2F%2Fphp.net%2F&client=googlechrome&hl=en-US
--
Regards,
K
Hi,
This morning I couldn't access php.net as it was listed by Google as a
Malicious page.
http://safebrowsing.clients.google.com/safebrowsing/diagnostic?client=Firefox&hl=en&site=https://bugs.php.net/bug.php?id=63255&edit=2
So as to be removed from google's blacklist, I believe php.net webma
You write "I also needed full support for POST methods"...
How did you end up handling $_POST["..."], $_GET["..."], etc? Request headers
& form inputs are not being passed or setup to be accessed in PHP.
Did you ever post your handler code to setup PHP's environment variables to
process user in
16 matches
Mail list logo